[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 59833: regressions - FAIL



flight 59833 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59833/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 12 guest-localmigrate 
fail REGR. vs. 59817
 test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 59817

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail 
like 59817
 test-amd64-amd64-rumpuserxen-amd64 15 
rumpuserxen-demo-xenstorels/xenstorels.repeat fail like 59817
 test-armhf-armhf-xl-rtds     11 guest-start                  fail   like 59817
 test-amd64-i386-xl-qemut-debianhvm-amd64 11 guest-saverestore  fail like 59817
 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop             fail like 59817
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop              fail like 59817

Tests which did not succeed, but are not blocking:
 test-amd64-i386-libvirt-xsm  12 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      12 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start                  fail   never pass
 test-armhf-armhf-libvirt     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-xsm      12 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pvh-intel 11 guest-start                  fail  never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-check        fail  never pass
 test-armhf-armhf-libvirt-xsm 12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-check        fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop              fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop             fail never pass

version targeted for testing:
 xen                  9256f66c1606cd9339412bff7fbc7bd9e8beb28c
baseline version:
 xen                  7c60c2da3160766a265cb84c7411ff2c9cbd8d0b

Last test of basis    59817  2015-07-22 07:29:29 Z    3 days
Testing same since    59833  2015-07-23 10:56:30 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
  Dario Faggioli <dario.faggioli@xxxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Roger Pau Monné <roger.pau@xxxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

jobs:
 build-amd64-xsm                                              pass
 build-armhf-xsm                                              pass
 build-i386-xsm                                               pass
 build-amd64                                                  pass
 build-armhf                                                  pass
 build-i386                                                   pass
 build-amd64-libvirt                                          pass
 build-armhf-libvirt                                          pass
 build-i386-libvirt                                           pass
 build-amd64-oldkern                                          pass
 build-i386-oldkern                                           pass
 build-amd64-pvops                                            pass
 build-armhf-pvops                                            pass
 build-i386-pvops                                             pass
 build-amd64-rumpuserxen                                      pass
 build-i386-rumpuserxen                                       pass
 test-amd64-amd64-xl                                          pass
 test-armhf-armhf-xl                                          pass
 test-amd64-i386-xl                                           pass
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm                pass
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm                 pass
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                pass
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 pass
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        fail
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         fail
 test-amd64-amd64-libvirt-xsm                                 pass
 test-armhf-armhf-libvirt-xsm                                 pass
 test-amd64-i386-libvirt-xsm                                  pass
 test-amd64-amd64-xl-xsm                                      pass
 test-armhf-armhf-xl-xsm                                      pass
 test-amd64-i386-xl-xsm                                       pass
 test-amd64-amd64-xl-pvh-amd                                  fail
 test-amd64-i386-qemut-rhel6hvm-amd                           pass
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass
 test-amd64-i386-xl-qemut-debianhvm-amd64                     fail
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass
 test-amd64-i386-freebsd10-amd64                              pass
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass
 test-amd64-amd64-rumpuserxen-amd64                           fail
 test-amd64-amd64-xl-qemut-win7-amd64                         fail
 test-amd64-i386-xl-qemut-win7-amd64                          fail
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail
 test-amd64-i386-xl-qemuu-win7-amd64                          fail
 test-armhf-armhf-xl-arndale                                  pass
 test-amd64-amd64-xl-credit2                                  pass
 test-armhf-armhf-xl-credit2                                  pass
 test-armhf-armhf-xl-cubietruck                               pass
 test-amd64-i386-freebsd10-i386                               pass
 test-amd64-i386-rumpuserxen-i386                             pass
 test-amd64-amd64-xl-pvh-intel                                fail
 test-amd64-i386-qemut-rhel6hvm-intel                         pass
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass
 test-amd64-amd64-libvirt                                     pass
 test-armhf-armhf-libvirt                                     pass
 test-amd64-i386-libvirt                                      pass
 test-amd64-amd64-xl-multivcpu                                pass
 test-armhf-armhf-xl-multivcpu                                fail
 test-amd64-amd64-pair                                        pass
 test-amd64-i386-pair                                         pass
 test-amd64-amd64-xl-rtds                                     pass
 test-armhf-armhf-xl-rtds                                     fail
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass
 test-amd64-amd64-xl-qemut-winxpsp3                           pass
 test-amd64-i386-xl-qemut-winxpsp3                            pass
 test-amd64-amd64-xl-qemuu-winxpsp3                           pass
 test-amd64-i386-xl-qemuu-winxpsp3                            pass


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 9256f66c1606cd9339412bff7fbc7bd9e8beb28c
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jul 23 10:17:08 2015 +0200

    x86/PCI: intercept all PV Dom0 MMCFG writes

    ... to hook up pci_conf_write_intercept() even for Dom0 not using
    method 1 accesses for the base part of PCI device config space.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit aa7c1fdf9dd04a1287f4770906b2c41b88a28228
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jul 23 10:16:27 2015 +0200

    x86/MSI: properly track guest masking requests

    ... by monitoring writes to the mask register.

    This allows reverting the main effect of the XSA-129 patches in qemu.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 372900faf88d424136315cbd5d440fdcf22566a2
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jul 23 10:16:03 2015 +0200

    x86/MSI-X: reduce fiddling with control register during restore

    Rather than disabling and enabling MSI-X once per vector, do it just
    once per device.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 0dba393db07331e9cff42df10e95b67547dfdb3e
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jul 23 10:15:39 2015 +0200

    x86/MSI-X: access MSI-X table only after having enabled MSI-X

    As done in Linux by f598282f51 ("PCI: Fix the NIU MSI-X problem in a
    better way") and its broken predecessor, make sure we don't access the
    MSI-X table without having enabled MSI-X first, using the mask-all flag
    instead to prevent interrupts from occurring.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 082fdc6ce85e5b603f8fb24553cf200e3b67889f
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jul 23 10:14:59 2015 +0200

    x86/MSI-X: be more careful during teardown

    When a device gets detached from a guest, pciback will clear its
    command register, thus disabling both memory and I/O decoding. The
    disabled memory decoding, however, has an effect on the MSI-X table
    accesses the hypervisor does: These won't have the intended effect
    anymore. Even worse, for PCIe devices (but not SR-IOV virtual
    functions) such accesses may (will?) be treated as Unsupported
    Requests, causing respective errors to be surfaced, potentially in the
    form of NMIs that may be fatal to the hypervisor or Dom0 is different
    ways. Hence rather than carrying out these accesses, we should avoid
    them where we can, and use alternative (e.g. PCI config space based)
    mechanisms to achieve at least the same effect.

    At this time it continues to be unclear whether this is fixing an
    actual bug or is rather just working around bogus (but apparently
    common) system behavior.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 484d7c852e4ff79c945406ed28b5db63a5a0b7f3
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jul 23 10:14:13 2015 +0200

    x86/MSI-X: track host and guest mask-all requests separately

    Host uses of the bits will be added subsequently, and must not be
    overridden by guests (including Dom0, namely when acting on behalf of
    a guest).

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit a88b72fddd046a0978242411276861039ec99ad0
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jul 23 10:13:12 2015 +0200

    x86/PCI: add config space abstract write intercept logic

    This is to be used by MSI code, and later to also be hooked up to
    MMCFG accesses by Dom0.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit ce6ce4a8a88fa7930838fc9fa06300bc43713671
Merge: a08b914 afba7c6
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Jul 22 15:55:14 2015 +0100

    Merge branch 'staging' of ssh://xenbits.xen.org/home/xen/git/xen into 
staging

commit afba7c6d9566f1556117b78e767f9678433a1f01
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Wed Jul 22 16:53:22 2015 +0200

    remove non-POSIX error codes

    Xen was using some non-POSIX error codes that are removed in this patch. For
    future reference, the list of POSIX error codes has been obtained from:

    http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/errno.h.html

    The error codes already present and defined as optional (XSR), have been
    left in place.

    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit e919fb2ac32a27c262fee8a40c044008b3f8fd09
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Wed Jul 22 16:47:09 2015 +0200

    replace non-POSIX error codes

    Some DOMCTLs returned non-POSIX error codes, replace them with POSIX
    compilant values instead. EBADRQC and EBADSLT are replaced by EDOM, while
    EUSERS is replaced with EOVERFLOW.

    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>

    Replace two EDOM uses.

    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Release-acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit 21a85ed569e59c5968b770a913a83a6b45213be7
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Wed Jul 22 16:45:35 2015 +0200

    x86/libxl: replace non-POSIX error codes used by PSR code

    PSR was using EBADSLT and EUSERS which are not POSIX error codes, replace
    them with ENOTSOCK and EOVERFLOW respectively.

    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Release-acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit a08b914807b14a8328d005079d774e7f8efd1d24
Author: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
Date:   Tue Jul 21 19:31:57 2015 +0200

    xl: fix vcpus to vnode assignement in config file

    In fact, right now, the following (legitimate)
    configuration:

     vcpus       = '4'
     vnuma = [ [ "pnode=0","size=512","vcpus=0,1","vdistances=10,20"  ],
               [ "pnode=1","size=512","vcpus=2,3","vdistances=20,10"  ] ]

    Produces the following error:

     # xl create /etc/xen/test.cfg
     Parsing config from /etc/xen/test.cfg
     xl: maxvcpus < vcpu

    That is because, we only process the first element of the
    "vcpus=" list (of each vnode specification). Therefore,
    in the above case, we only see 2 vcpus, out of 4, being
    assigned to the vnodes, and hence the error.

    What we need is either a multidimentional array, or a
    bitmap, to temporary store the vcpus of a vnode, while
    parsing the vnuma config entry. Let's use the latter,
    which happens to also make it easier to copy the outcome
    of the parsing to its final destination in b_info, if
    everything goes ok.

    Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit bc299d01b925d934219b6e8c29fadcd1f1a9210b
Author: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
Date:   Wed Jul 22 14:15:37 2015 +0200

    x86/psr: remove invalid cpu_to_socket call

    cpu_to_socket() can't give correct socket value in CPU_PREPARE notifier
    as at that time phys_proc_id has not yet been initialized (the value is
    its default 0 in this case) which is incorrect for sockets other than
    socket 0.

    cos_to_cbm now is pre-allocated in CPU_PREPARE notifier and then consumed
    in CPU_STARTING notifier.

    Signed-off-by: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>

commit 23d72aaa0ccb206b0447b1efa9f1012f093162ee
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jul 22 14:15:12 2015 +0200

    libxl: fix build with glibc < 2.9

    htobe*() and be*toh() don't exist there. While replacing the 32-bit
    ones with hton() and ntoh() would be possible, there wouldn't be an
    obvious replacement for the 64-bit ones. Hence just take what current
    glibc (2.21) has (assuming __bswap_*() exists, which it does back to
    at least 2.4 according to my checking).

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.