[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable baseline-only test] 68637: regressions - trouble: blocked/broken/fail/pass
This run is configured for baseline tests only. flight 68637 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68637/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 15 guest-start/debian.repeat fail REGR. vs. 68635 test-amd64-amd64-libvirt-xsm 17 guest-start/debian.repeat fail REGR. vs. 68635 Regressions which are regarded as allowable (not blocking): test-amd64-i386-rumprun-i386 16 rumprun-demo-xenstorels/xenstorels.repeat fail REGR. vs. 68635 test-armhf-armhf-libvirt 13 saverestore-support-check fail like 68635 test-armhf-armhf-libvirt-xsm 13 saverestore-support-check fail like 68635 test-armhf-armhf-libvirt-raw 12 saverestore-support-check fail like 68635 test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail like 68635 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 68635 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 9 windows-install fail like 68635 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 9 windows-install fail like 68635 test-amd64-amd64-xl-qemut-winxpsp3 9 windows-install fail like 68635 Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a test-arm64-arm64-xl 1 build-check(1) blocked n/a build-arm64-libvirt 1 build-check(1) blocked n/a test-arm64-arm64-libvirt-qcow2 1 build-check(1) blocked n/a test-arm64-arm64-libvirt 1 build-check(1) blocked n/a test-arm64-arm64-xl-credit2 1 build-check(1) blocked n/a test-arm64-arm64-xl-rtds 1 build-check(1) blocked n/a test-arm64-arm64-xl-multivcpu 1 build-check(1) blocked n/a test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64-xsm 2 hosts-allocate broken never pass build-arm64 2 hosts-allocate broken never pass build-arm64-pvops 2 hosts-allocate broken never pass build-arm64-xsm 3 capture-logs broken never pass build-arm64 3 capture-logs broken never pass build-arm64-pvops 3 capture-logs broken never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 13 saverestore-support-check fail never pass test-armhf-armhf-xl-midway 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-xl-midway 13 saverestore-support-check fail never pass test-armhf-armhf-xl-multivcpu 13 saverestore-support-check fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-armhf-armhf-xl-rtds 12 migrate-support-check fail never pass test-armhf-armhf-xl-rtds 13 saverestore-support-check fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-amd64-i386-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-libvirt-raw 11 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 11 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 12 saverestore-support-check fail never pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2 fail never pass test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail never pass version targeted for testing: xen 6d55c0c316357a412526b9dccd45d3c3abb75227 baseline version: xen b151125b4d89d7ec139ac34470e3c709fb4b1b4d Last test of basis 68635 2017-03-04 12:46:29 Z 0 days Testing same since 68637 2017-03-05 01:44:37 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Chao Gao <chao.gao@xxxxxxxxx> Feng Wu <feng.wu@xxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Kevin Tian <kevin.tian@xxxxxxxxx> Olaf Hering <olaf@xxxxxxxxx> Sander Eikelenboom <linux@xxxxxxxxxxxxxx> Stefano Stabellini <sstabellini@xxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64-xsm pass build-arm64-xsm broken build-armhf-xsm pass build-i386-xsm pass build-amd64-xtf pass build-amd64 pass build-arm64 broken build-armhf pass build-i386 pass build-amd64-libvirt pass build-arm64-libvirt blocked build-armhf-libvirt pass build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-prev pass build-i386-prev pass build-amd64-pvops pass build-arm64-pvops broken build-armhf-pvops pass build-i386-pvops pass build-amd64-rumprun pass build-i386-rumprun pass test-xtf-amd64-amd64-1 pass test-xtf-amd64-amd64-2 pass test-xtf-amd64-amd64-3 pass test-xtf-amd64-amd64-4 pass test-xtf-amd64-amd64-5 pass test-amd64-amd64-xl pass test-arm64-arm64-xl blocked test-armhf-armhf-xl fail test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-xsm fail test-arm64-arm64-libvirt-xsm blocked test-armhf-armhf-libvirt-xsm pass test-amd64-i386-libvirt-xsm pass test-amd64-amd64-xl-xsm pass test-arm64-arm64-xl-xsm blocked test-armhf-armhf-xl-xsm pass test-amd64-i386-xl-xsm pass test-amd64-amd64-qemuu-nested-amd fail test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumprun-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-credit2 pass test-arm64-arm64-xl-credit2 blocked test-armhf-armhf-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumprun-i386 fail test-amd64-amd64-qemuu-nested-intel fail test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-arm64-arm64-libvirt blocked test-armhf-armhf-libvirt pass test-amd64-i386-libvirt pass test-armhf-armhf-xl-midway pass test-amd64-amd64-migrupgrade pass test-amd64-i386-migrupgrade pass test-amd64-amd64-xl-multivcpu pass test-arm64-arm64-xl-multivcpu blocked test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair pass test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub pass test-amd64-amd64-pygrub pass test-arm64-arm64-libvirt-qcow2 blocked test-amd64-amd64-xl-qcow2 pass test-armhf-armhf-libvirt-raw pass test-amd64-i386-xl-raw pass test-amd64-amd64-xl-rtds pass test-arm64-arm64-xl-rtds blocked test-armhf-armhf-xl-rtds pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 fail test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd pass test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-i386-xl-qemut-winxpsp3 pass test-amd64-amd64-xl-qemuu-winxpsp3 pass test-amd64-i386-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xs.citrite.net/~osstest/testlogs/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary broken-step build-arm64-xsm hosts-allocate broken-step build-arm64 hosts-allocate broken-step build-arm64-pvops hosts-allocate broken-step build-arm64-xsm capture-logs broken-step build-arm64 capture-logs broken-step build-arm64-pvops capture-logs Push not applicable. ------------------------------------------------------------ commit 6d55c0c316357a412526b9dccd45d3c3abb75227 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Mar 2 19:58:20 2017 +0000 x86/cpuid: Fix booting on AMD Phenom 6-core platform c/s 5cecf60f4 "x86/cpuid: Handle leaf 0x1 in guest_cpuid()" causes Linux 4.10 to crash during boot. It turns out to be because of the reported apic_id, which was altered to be more consistent across guests. Revert back to the previous behaviour, by limiting the apic_id adjustment to HVM guests only. Whomever gets to fixes topology representation is going to have a lot of fun with non-power-of-2 AMD boxes. Reported-by: Sander Eikelenboom <linux@xxxxxxxxxxxxxx> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Tested-by: Sander Eikelenboom <linux@xxxxxxxxxxxxxx> commit 9d686d1269faea0447f48ed2ce789c4a06756e07 Author: Olaf Hering <olaf@xxxxxxxxx> Date: Fri Mar 3 08:52:09 2017 +0000 tools/xenstore: define off_t talloc.h uses off_t, but did not include <sys/types.h>. Signed-off-by: Olaf Hering <olaf@xxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 56ac30f92bddc23f356d779d8c7478dabe5839e7 Author: Stefano Stabellini <sstabellini@xxxxxxxxxx> Date: Wed Mar 1 11:43:15 2017 -0800 xen/arm: introduce vwfi parameter Introduce new Xen command line parameter called "vwfi", which stands for virtual wfi. The default is "trap": Xen traps guest wfi and wfe instructions. In the case of wfi, Xen calls vcpu_block on the guest vcpu; in the case of guest wfe, Xen calls vcpu_yield on the guest vcpu. The behavior can be changed by setting vwfi to "native", in that case Xen doesn't trap neither wfi nor wfe, running them in guest context. The result is strong reduction in irq latency (from 5000ns to 2000ns, measured using https://github.com/edgarigl/tbm, the physical timer, and 1 pcpu dedicated to 1 vcpu). The downside is that the scheduler thinks that the guest is busy when actually is sleeping, leading to suboptimal scheduling decisions. Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Reviewed-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit f2c608444261824a9463a7847be2d08ee3ae0c48 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Mar 3 17:08:36 2017 +0100 x86/SVM: correct boot time cpu_data[] handling start_svm() already runs after cpu_data[] was set up, so it shouldn't modify it anymore (at least not directly). Constify the involved pointers. Furthermore LMSLE feature detection was broken by 566ddbe833 ("x86: Fail CPU bringup cleanly if it cannot initialise HVM"), as Andrew Cooper has pointed out: c couldn't possibly equal &boot_cpu_data anymore. (But since it's unsafe migration-wise for some more time, suppress the feature actually being enabled for us.) Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper@xxxxxxxxxx> Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> commit 3c76488305ddb6adb3cf03f636e1c0b80ca3a76b Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Mar 3 17:08:11 2017 +0100 x86/tboot: remove dead declarations These aren't needed anymore as of c9a4a1c419 ("x86/layout: Correct Xen's idea of its own memory layout"). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 9152b5f8d917cccd811846d5dd48ade70fbae284 Author: Feng Wu <feng.wu@xxxxxxxxx> Date: Fri Mar 3 17:07:08 2017 +0100 VMX: properly handle pi when all the assigned devices are removed This patch handles some corner cases when the last assigned device is removed from the domain. In this case we should carefully handle pi descriptor and the per-cpu blocking list, to make sure: - all the PI descriptor are in the right state when next time a devices is assigned to the domain again. - No remaining vcpus of the domain in the per-cpu blocking list. Here we call vmx_pi_unblock_vcpu() to remove the vCPU from the blocking list if it is on the list. However, this could happen when vmx_vcpu_block() is being called, hence we might incorrectly add the vCPU to the blocking list while the last devcie is detached from the domain. Consider that the situation can only occur when detaching the last device from the domain and it is not a frequent operation, so we use domain_pause before that, which is considered as an clean and maintainable solution for the situation. Signed-off-by: Feng Wu <feng.wu@xxxxxxxxx> Signed-off-by: Chao Gao <chao.gao@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> commit 3176aa8a9515dcb7b60c8123f609dc3f84e57b57 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Wed Mar 1 15:35:24 2017 +0000 xen: include xen/types.h in domain.h The public header expects a few types to be present. This works in the code base only because types.h is included by some other headers which happen to be placed before the inclusion of domain.h. Include types.h before xen.h in domain.h to fix it properly. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit 616de1d6bf2c56f7fc2dc77d8f572cfce8854df9 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Wed Mar 1 15:23:31 2017 +0000 xen: move round_pg{up,down} to pfn.h They are going to be needed in multiple places. Instead of replicating more, move them to pfn.h. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 92cf67888aeb8a7dd8c1d2e8e835b8b271c13ce1 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Mar 2 11:41:17 2017 +0000 x86/emul: Hold x86_emulate() to strict X86EMUL_EXCEPTION requirements All known paths raising faults behind the back of the emulator have been fixed. Reinstate the original intended assertion concerning the behaviour of X86EMUL_EXCEPTION and ctxt->event_pending. As x86_emulate_wrapper() now covers both PV and HVM guests properly, there is no need for the PV assertions following calls to x86_emulate(). Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 9c5a84fff576ad2e38d34d2b5d1a465e3129f298 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Mar 2 12:41:38 2017 +0000 x86/hvm: Don't raise #GP behind the emulators back for CR writes hvm_set_cr{0,4}() are reachable from the emulator, but use hvm_inject_hw_exception() directly. Alter the API to make the callers of hvm_set_cr{0,3,4}() responsible for raising #GP, and apply this change to all existing callers. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> --- Issues identified which I am purposefully not fixing in this patch: (I will try to get around to them, but probably not in the 4.9 timeframe, at this point.) * hvm_set_cr3() doesn't handle bad 32bit PAE PDPTRs properly, as it doesn't actually have a path which raises #GP. * There is a lot of redundancy in our HVM CR setting routines, but not enough to trivially dedup at this point. * Both nested VT-x and SVM are liable raise #GP with L1, rather than failing the virtual vmentry/vmexit. This is not a change in behaviour, but is far more obvious now. * The hvm_do_resume() path for vm_event processing has the same bug as the MSR side, where exceptions are raised after %rip has moved forwards. This is also not a change in behaviour. commit 3ae98aef839c1c420f04456a658f491d9580c4ba Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Fri Feb 3 13:55:26 2017 +0000 x86/kconfig: Introduce CONFIG_PV and CONFIG_HVM Making PV and HVM guests individually compilable is useful as a reduction in hypervisor size, and as an aid to enforcing clean API boundaries. Introduce CONFIG_PV and CONFIG_HVM, although there is a lot of work to do until either can actually be disabled. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |