[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 126184: regressions - trouble: broken/fail/pass
flight 126184 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/126184/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xen-xsm-freebsd <job status> broken build-amd64-xen-xsm-freebsd 5 host-install(5) broken REGR. vs. 126012 test-xtf-amd64-amd64-4 6 xen-install fail REGR. vs. 126012 test-amd64-amd64-xl-qemuu-ovmf-amd64 15 guest-saverestore.2 fail REGR. vs. 126012 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop fail like 126012 test-armhf-armhf-libvirt 14 saverestore-support-check fail like 126012 test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail like 126012 test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail like 126012 test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop fail like 126012 test-armhf-armhf-libvirt-raw 13 saverestore-support-check fail like 126012 test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail like 126012 test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop fail like 126012 test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stop fail like 126012 build-amd64-xen-freebsd 7 xen-build-freebsd fail never pass test-amd64-i386-xl-pvshim 12 guest-start fail never pass test-amd64-i386-libvirt-xsm 13 migrate-support-check fail never pass test-amd64-amd64-libvirt 13 migrate-support-check fail never pass test-amd64-i386-libvirt 13 migrate-support-check fail never pass test-amd64-amd64-libvirt-xsm 13 migrate-support-check fail never pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass test-amd64-amd64-qemuu-nested-amd 17 debian-hvm-install/l1/l2 fail never pass test-amd64-amd64-libvirt-vhd 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 migrate-support-check fail never pass test-armhf-armhf-xl 14 saverestore-support-check fail never pass test-armhf-armhf-xl-rtds 13 migrate-support-check fail never pass test-armhf-armhf-xl-rtds 14 saverestore-support-check fail never pass test-armhf-armhf-xl-multivcpu 13 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 14 saverestore-support-check fail never pass test-armhf-armhf-xl-cubietruck 13 migrate-support-check fail never pass test-armhf-armhf-xl-cubietruck 14 saverestore-support-check fail never pass test-armhf-armhf-libvirt 13 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 13 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 14 saverestore-support-check fail never pass test-armhf-armhf-libvirt-raw 12 migrate-support-check fail never pass test-armhf-armhf-xl-arndale 13 migrate-support-check fail never pass test-armhf-armhf-xl-arndale 14 saverestore-support-check fail never pass test-armhf-armhf-xl-vhd 12 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 13 saverestore-support-check fail never pass test-amd64-i386-xl-qemut-ws16-amd64 17 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win10-i386 10 windows-install fail never pass test-amd64-i386-xl-qemuu-win10-i386 10 windows-install fail never pass test-amd64-amd64-xl-qemut-win10-i386 10 windows-install fail never pass test-amd64-i386-xl-qemut-win10-i386 10 windows-install fail never pass version targeted for testing: xen b8f33431f3dd23fb43a879f4bdb4283fdc9465ad baseline version: xen 3dd454c6c694409aaedd4ed075d6aeace2dd8391 Last test of basis 126012 2018-08-16 22:09:11 Z 3 days Testing same since 126184 2018-08-18 23:45:48 Z 1 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Christian Lindig <christian.lindig@xxxxxxxxxx> Christopher Clark <christopher.clark6@xxxxxxxxxxxxxx> Christopher Clark <christopher.w.clark@xxxxxxxxx> Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Gopalasetty, Manoj <manoj.gopalasetty@xxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Julien Grall <julien.grall@xxxxxxx> Paul Durrant <paul.durrant@xxxxxxxxxx> Roger Pau Monné <roger.pau@xxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx> jobs: build-amd64-xsm pass build-i386-xsm pass build-amd64-xtf pass build-amd64 pass build-armhf pass build-amd64-xen-freebsd fail build-amd64-xen-xsm-freebsd broken build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-prev pass build-i386-prev pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumprun pass build-i386-rumprun pass test-xtf-amd64-amd64-1 pass test-xtf-amd64-amd64-2 pass test-xtf-amd64-amd64-3 pass test-xtf-amd64-amd64-4 fail test-xtf-amd64-amd64-5 pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-xsm pass test-amd64-i386-libvirt-xsm pass test-amd64-amd64-xl-xsm pass test-amd64-i386-xl-xsm pass test-amd64-amd64-qemuu-nested-amd fail test-amd64-amd64-xl-pvhv2-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 fail test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumprun-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-qemut-ws16-amd64 fail test-amd64-i386-xl-qemut-ws16-amd64 fail test-amd64-amd64-xl-qemuu-ws16-amd64 fail test-amd64-i386-xl-qemuu-ws16-amd64 fail test-armhf-armhf-xl-arndale pass test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-armhf-armhf-xl-cubietruck pass test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict pass test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict pass test-amd64-amd64-examine pass test-armhf-armhf-examine pass test-amd64-i386-examine pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumprun-i386 pass test-amd64-amd64-xl-qemut-win10-i386 fail test-amd64-i386-xl-qemut-win10-i386 fail test-amd64-amd64-xl-qemuu-win10-i386 fail test-amd64-i386-xl-qemuu-win10-i386 fail test-amd64-amd64-qemuu-nested-intel pass test-amd64-amd64-xl-pvhv2-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt pass test-amd64-i386-libvirt pass test-amd64-amd64-livepatch pass test-amd64-i386-livepatch pass test-amd64-amd64-migrupgrade pass test-amd64-i386-migrupgrade pass test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair pass test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub pass test-amd64-amd64-xl-pvshim pass test-amd64-i386-xl-pvshim fail test-amd64-amd64-pygrub pass test-amd64-amd64-xl-qcow2 pass test-armhf-armhf-libvirt-raw pass test-amd64-i386-xl-raw pass test-amd64-amd64-xl-rtds pass test-armhf-armhf-xl-rtds pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow pass test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow pass test-amd64-amd64-xl-shadow pass test-amd64-i386-xl-shadow pass test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary broken-job build-amd64-xen-xsm-freebsd broken broken-step build-amd64-xen-xsm-freebsd host-install(5) Not pushing. ------------------------------------------------------------ commit b8f33431f3dd23fb43a879f4bdb4283fdc9465ad Author: Christopher Clark <christopher.w.clark@xxxxxxxxx> Date: Thu Aug 16 13:22:41 2018 -0700 libxl/arm: Fix build on arm64 + acpi w/ gcc 8.2 Add zero-padding to #defined ACPI table strings that are copied. Provides sufficient characters to satisfy the length required to fully populate the destination and prevent array-bounds warnings. Add BUILD_BUG_ON sizeof checks for compile-time length checking. Signed-off-by: Christopher Clark <christopher.clark6@xxxxxxxxxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 29fd98e425346d9e15913eae6d079ddfc835d54c Author: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx> Date: Fri Aug 17 15:04:27 2018 +0200 x86/mmcfg: rename pt_pci_init() and call it from acpi_mmcfg_init() Given what pt_pci_init() actually does, rename it properly and move its declaration to pci.h. Move the only call into acpi_mmcfg_init(). No functional change. Signed-off-by: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx> Tested-by: Gopalasetty, Manoj <manoj.gopalasetty@xxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit effed864104ad9bee3f72a2a7d9fb2146b8bf122 Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> Date: Fri Aug 17 13:59:35 2018 +0200 libxc: copy back the result of XEN_DOMCTL_createdomain Fixes the ARM guest boot breakage introduced by 54ed251dc7. Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit ad0a9f273d6d6f0545cd9b708b2d4be581a6cadd Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Aug 17 13:54:40 2018 +0200 rangeset: make inquiry functions tolerate NULL inputs Rather than special casing the ->iomem_caps check in x86's get_page_from_l1e() for the dom_xen case, let's be more tolerant in general, along the lines of rangeset_is_empty(): A never allocated rangeset can't possibly contain or overlap any range. Reported-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 4830902b043f2a28d18bf611c5f9112cf885dd30 Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> Date: Fri Aug 17 13:54:02 2018 +0200 dom0/pvh: change the order of the MMCFG initialization So it's done before the iommu is initialized. This is required in order to be able to fetch the MMCFG regions from the domain struct. No functional change. Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit dc436f1f7f5320e053a13306469f67a012a0f273 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Aug 17 13:52:55 2018 +0200 x86: remove page.h and processor.h inclusion from asm_defns.h Subsequent changes require this (too wide anyway imo) dependency to be dropped. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 0fb0de8b24e85d0317191f65c0c531aaa9d0e93c Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Aug 17 13:52:20 2018 +0200 x86/HVM: correct an inverted check in hvm_load() Clearly we want to put a vCPU to sleep if it is _not_ already down. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 520116f7b14e19668cfbc660cd42e8cdc09193cd Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Aug 17 13:51:27 2018 +0200 x86: make arch_set_info_guest() match comments in load_segments() For both fs_base and gs_base_user, there are comments saying "This can only be non-zero if selector is NULL." While save_segments() ensures this, so far arch_set_info_guest() didn't. Make behavior consistent (attaching comments identical to those in save_segments()). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 3e4ec07e14bce81f6ae22c31ff1302d1f297a226 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Aug 16 16:26:22 2018 +0100 x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address A number of corner cases (most obviously, no-real-mode and no Multiboot memory map) can end up with e820_raw.nr_map being 0, at which point the L1TF calculation will underflow. Spotted by Coverity. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit afc3f910d3434b540e4e4f51d9fd2723aea22fa2 Author: Jan Beulich <JBeulich@xxxxxxxx> Date: Thu Aug 16 00:49:29 2018 -0600 libxl: fix ARM build after 54ed251dc7 Commit "tools: Rework xc_domain_create() to take a full xen_domctl_createdomain" failed to replace one further instance of xc_config in libxl__arch_domain_save_config(). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> commit 70d8543950ad045fddcb78ae11302e713ef09c76 Author: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx> Date: Thu Aug 16 09:31:57 2018 +0200 x86/mmcfg: remove redundant code in pci_mmcfg_reject_broken() No functional change. Signed-off-by: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit a9e9837f54973ac45488c24e93ed34cbf20e4c66 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Aug 16 09:30:59 2018 +0200 gnttab/ARM: properly implement gnttab_create_status_page() Prevent the "BUG_ON(page_get_owner(pg) != d)" in gnttab_unpopulate_status_frames() from triggering. Reported-by: 王磊 <lei19.wang@xxxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 7626edeaca972e3e823535dcc44338f6b2f0b21f Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Thu Aug 16 09:27:30 2018 +0200 x86/hvm/emulate: make sure rep I/O emulation does not cross GFN boundaries When emulating a rep I/O operation it is possible that the ioreq will describe a single operation that spans multiple GFNs. This is fine as long as all those GFNs fall within an MMIO region covered by a single device model, but unfortunately the higher levels of the emulation code do not guarantee that. This is something that should almost certainly be fixed, but in the meantime this patch makes sure that MMIO is truncated at GFN boundaries and hence the appropriate device model is re-evaluated for each target GFN. NOTE: This patch does not deal with the case of a single MMIO operation spanning a GFN boundary. That is more complex to deal with and is deferred to a subsequent patch. Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Convert calculations to be 32-bit only. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> commit 4cdb6bfde2300c75725b3e267469bd6c9eeee55e Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Fri Mar 16 18:27:24 2018 +0000 xen/evtchn: Pass max_evtchn_port into evtchn_init() ... rather than setting it up once domain_create() has completed. This involves constructing a default value for dom0. No practical change in functionality. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> commit 4a83497635056d33fe20ef705f35617b1003a276 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Feb 27 17:39:37 2018 +0000 xen/domctl: Merge set_max_evtchn into createdomain set_max_evtchn is somewhat weird. It was introduced with the event_fifo work, but has never been used. Still, it is a bounding on resources consumed by the event channel infrastructure, and should be part of createdomain, rather than editable after the fact. Drop XEN_DOMCTL_set_max_evtchn completely (including XSM hooks and libxc wrappers), and retain the functionality in XEN_DOMCTL_createdomain. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Acked-by: Christian Lindig <christian.lindig@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> commit 54ed251dc7b85565820019102e533afcea814e16 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Fri Mar 9 14:38:35 2018 +0000 tools: Rework xc_domain_create() to take a full xen_domctl_createdomain In future patches, the structure will be extended with further information, and this is far cleaner than adding extra parameters. The python stubs are the only user which passes NULL for the existing config option (which is actually the arch substructure). Therefore, the #ifdefary moves to compensate. For libxl, pass the full config object down into libxl__arch_domain_{prepare,save}_config(), as there are in practice arch specific settings in the common part of the structure (flags s3_integrity and oos_off specifically). No practical change in behaviour. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Christian Lindig <christian.lindig@xxxxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit acc2a06c780e9e7ffa6373854735503b7d63a1d0 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Mar 12 10:40:33 2018 +0000 tools/ocaml: Pass a full domctl_create_config into stub_xc_domain_create() The underlying C function is about to make the same change, and the structure is going to gain extra fields. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Christian Lindig <christian.lindig@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |