[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 31387: trouble: blocked/broken/fail/pass



flight 31387 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31387/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-pvops             3 host-install(3)         broken REGR. vs. 31358

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-pair        17 guest-migrate/src_host/dst_host fail like 31358

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       9 guest-start                  fail   never pass
 test-amd64-amd64-libvirt      9 guest-start                  fail   never pass
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xl-qemut-winxpsp3 14 guest-stop                fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3 14 guest-stop                fail never pass
 test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop              fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop               fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xl-winxpsp3  14 guest-stop                   fail   never pass
 test-amd64-amd64-xl-win7-amd64 14 guest-stop                   fail never pass
 test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-win7-amd64 14 guest-stop                   fail  never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never pass

version targeted for testing:
 xen                  5c8dd034f083dbc0cca2ba375a754978f8e25332
baseline version:
 xen                  5283b310e14884341f51be35253cdd59c4cb034c

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  David Scott <dave.scott@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Martin Pohlack <mpohlack@xxxxxxxxx>
  Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  Rob Hoes <rob.hoes@xxxxxxxxxx>
  Roy Franz <roy.franz@xxxxxxxxxx>
  Simon Rowe <simon.rowe@xxxxxxxxxxxxx>
  Willy Tarreau <w@xxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      pass    
 build-i386-rumpuserxen                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumpuserxen-amd64                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumpuserxen-i386                             pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     fail    
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         fail    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-i386-xl-qemut-winxpsp3                            fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xl-qemuu-winxpsp3                            fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-amd64-i386-xl-winxpsp3                                  fail    


------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary

broken-step build-armhf-pvops host-install(3)

Not pushing.

------------------------------------------------------------
commit 5c8dd034f083dbc0cca2ba375a754978f8e25332
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Nov 4 13:15:58 2014 +0100

    ... as being more like a hypervisor extension into the guest than a
    part of the tool stack.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 413e9215ace59eb9d0dcbd00376e1029ec23c6ab
Author: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
Date:   Tue Nov 4 13:13:55 2014 +0100

    x86: disable emulate.c REP optimization if introspection is active
    
    Emulation for REP instructions is optimized to perform a single
    write for all repeats in the current page if possible. However,
    this interferes with a memory introspection application's ability
    to detect suspect behaviour, since it will cause only one
    mem_event to be sent per page touched.
    This patch disables the optimization, gated on introspection
    being active for the domain.
    
    Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>

commit c38cf865ec82f27c62a60f0edfc717a5dc5fc6b4
Author: Roy Franz <roy.franz@xxxxxxxxxx>
Date:   Tue Nov 4 13:13:26 2014 +0100

    EFI: ignore EFI commandline, skip console setup when booted from GRUB
    
    Update EFI code to completely ignore the EFI comnandline when booted from 
GRUB.
    Previusly it was parsed of EFI boot specific options, but these aren't used
    when booted from GRUB.
    
    Don't do EFI console or video configuration when booted by GRUB.  The EFI 
boot
    code does some console and video initialization to support native EFI boot 
from
    the EFI boot manager or EFI shell.  This initlization should not be done 
when
    booted using GRUB.
    
    Update EFI documentation to indicate that it describes EFI native boot, and
    does not apply at all when Xen is booted using GRUB.
    
    Signed-off-by: Roy Franz <roy.franz@xxxxxxxxxx>

commit 10a94ddbd2eb97365872cd14be93837c4613e09d
Author: Willy Tarreau <w@xxxxxx>
Date:   Tue Nov 4 13:09:09 2014 +0100

    lzo: check for length overrun in variable length encoding
    
    This fix ensures that we never meet an integer overflow while adding
    255 while parsing a variable length encoding. It works differently from
    commit 504f70b6 ("lzo: properly check for overruns") because instead of
    ensuring that we don't overrun the input, which is tricky to guarantee
    due to many assumptions in the code, it simply checks that the cumulated
    number of 255 read cannot overflow by bounding this number.
    
    The MAX_255_COUNT is the maximum number of times we can add 255 to a base
    count without overflowing an integer. The multiply will overflow when
    multiplying 255 by more than MAXINT/255. The sum will overflow earlier
    depending on the base count. Since the base count is taken from a u8
    and a few bits, it is safe to assume that it will always be lower than
    or equal to 2*255, thus we can always prevent any overflow by accepting
    two less 255 steps.
    
    This patch also reduces the CPU overhead and actually increases performance
    by 1.1% compared to the initial code, while the previous fix costs 3.1%
    (measured on x86_64).
    
    The fix needs to be backported to all currently supported stable kernels.
    
    Reported-by: Willem Pinckaers <willem@xxxxxxxxxxxxxx>
    Signed-off-by: Willy Tarreau <w@xxxxxx>
    [original Linux commit: 72cf9012]
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 092978f2ffcf017b95c6ca674e629268d46222b4
Author: Willy Tarreau <w@xxxxxx>
Date:   Tue Nov 4 13:08:32 2014 +0100

    Revert "lzo: properly check for overruns"
    
    This reverts commit 504f70b6 ("lzo: properly check for overruns").
    
    As analysed by Willem Pinckaers, this fix is still incomplete on
    certain rare corner cases, and it is easier to restart from the
    original code.
    
    Reported-by: Willem Pinckaers <willem@xxxxxxxxxxxxxx>
    Signed-off-by: Willy Tarreau <w@xxxxxx>
    [original Linux commit: af958a38]
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 01c019c843df313f62ca5c106544026867da9e9e
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Nov 4 13:07:23 2014 +0100

    x86/PVH: replace bogus assertion with conditional
    
    While PVH guests currently have to start in 64-bit mode, nothing keeps
    them from entering compatibility mode via a suitable ring-0 code
    selector and making a hypercall from there. Fail such attempts rather
    than asserting they won't happen.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit c9a1b736426b9ba5a96660ef3b23bb2f5100e79e
Author: David Scott <dave.scott@xxxxxxxxxx>
Date:   Wed Oct 22 14:52:41 2014 +0100

    libxl: a domain can be dying but not shutdown
    
    The shutdown code is only present if the domain is shutdown.
    If we attempt to extract it from the flags from a dying but not
    shutdown domain then we get values like '255' which is not a
    valid LIBXL_SHUTDOWN_REASON_. We should use LIBXL_SHUTDOWN_UNKNOWN
    in this case.
    
    Signed-off-by: David Scott <dave.scott@xxxxxxxxxx>
    Acked-by: Rob Hoes <rob.hoes@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    [ ijc -- updated comment in libxl_types.idl to match ]

commit 6f78e851395394ece4385b65ad0788840db2b5d1
Author: Martin Pohlack <mpohlack@xxxxxxxxx>
Date:   Tue Oct 28 13:35:21 2014 +0100

    blktap: CONFIG_GCRYPT detection
    
    Wrap make variable in () to allow correct evaluation.
    
    This fixes broken CONFIG_GCRYPT detection which was introduced by
    commit 85896a7c4dc7b6b1dba2db79dfb0ca61738a92a4 in 2012.
    
    Signed-off-by: Martin Pohlack <mpohlack@xxxxxxxxx>
    Reviewed-by: Uwe Dannowski <uwed@xxxxxxxxx>
    Reviewed-by: Anthony Liguori <aliguori@xxxxxxxxxx>
    Reviewed-by: Matt Wilson <msw@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit beb0ef5f747bac4c6464383d74259b14adbfce19
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Oct 29 14:09:41 2014 +0000

    tools/pygrub: Fix TOCTOU race introduced by c/s 63dcc68
    
    In addition, use os.makedirs() which will also create intermediate 
directories
    if they don't exist.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    CC: Ian Campbell <Ian.Campbell@xxxxxxxxxx>
    CC: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
    CC: Wei Liu <wei.liu2@xxxxxxxxxx>
    CC: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
    CC: Olaf Hering <olaf@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 4ee393f9d6528640c29a0554fdc6cb3e795fb6e8
Author: Simon Rowe <simon.rowe@xxxxxxxxxxxxx>
Date:   Mon Oct 27 16:00:14 2014 +0000

    pygrub: fix non-interactive parsing of grub1 config files
    
    Changes to handle non-numeric default attributes for grub2 caused run_grub()
    to attempt to index into the images list using a string. Pull out the code
    that handles submenus into a new function and use that to ensure sel is
    numeric.
    
    Reported-by: David Scott <dave.scott@xxxxxxxxxx>
    Signed-off-by: Simon Rowe <simon.rowe@xxxxxxxxxxxxx>
    Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
    Reviewed-and-tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.