[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.4-testing test] 36776: regressions - FAIL



flight 36776 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36776/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-multivcpu  9 guest-start              fail REGR. vs. 36527

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf-pin  7 debian-install            fail REGR. vs. 36527
 test-amd64-i386-pair        17 guest-migrate/src_host/dst_host fail like 36527

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-rumpuserxen-amd64  1 build-check(1)               blocked n/a
 test-amd64-i386-rumpuserxen-i386  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      9 guest-start                  fail   never pass
 build-amd64-rumpuserxen       6 xen-build                    fail   never pass
 test-armhf-armhf-xl-sedf     10 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 10 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-sedf-pin 10 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          10 migrate-support-check        fail   never pass
 build-i386-rumpuserxen        6 xen-build                    fail   never pass
 test-armhf-armhf-xl-midway   10 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      10 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     10 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-armhf-armhf-xl-credit2   5 xen-boot                     fail   never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xend-qemut-winxpsp3 17 leak-check/check        fail never pass
 test-amd64-amd64-xl-win7-amd64 14 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop              fail never pass
 test-amd64-i386-xl-win7-amd64 14 guest-stop                   fail  never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never pass
 test-amd64-i386-xend-winxpsp3 17 leak-check/check             fail  never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop               fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never pass
 test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never pass

version targeted for testing:
 xen                  fc6fe18f1511d4b393057c60a2e6b05ccd963e90
baseline version:
 xen                  39f513ba5dd45c80575ab68ea234d94d358736f6

------------------------------------------------------------
People who touched revisions under test:
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Kevin Tian <kevin.tian@xxxxxxxxx>
  Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
  Roger Pau Monné <roger.pau@xxxxxxxxxx>
  Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64-xend                                             pass
 build-i386-xend                                              pass
 build-amd64                                                  pass
 build-armhf                                                  pass
 build-i386                                                   pass
 build-amd64-libvirt                                          pass
 build-armhf-libvirt                                          pass
 build-i386-libvirt                                           pass
 build-amd64-pvops                                            pass
 build-armhf-pvops                                            pass
 build-i386-pvops                                             pass
 build-amd64-rumpuserxen                                      fail
 build-i386-rumpuserxen                                       fail
 test-amd64-amd64-xl                                          pass
 test-armhf-armhf-xl                                          pass
 test-amd64-i386-xl                                           pass
 test-amd64-i386-rhel6hvm-amd                                 pass
 test-amd64-i386-qemut-rhel6hvm-amd                           pass
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass
 test-amd64-i386-freebsd10-amd64                              pass
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass
 test-amd64-amd64-rumpuserxen-amd64                           blocked
 test-amd64-amd64-xl-qemut-win7-amd64                         fail
 test-amd64-i386-xl-qemut-win7-amd64                          fail
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail
 test-amd64-i386-xl-qemuu-win7-amd64                          fail
 test-amd64-amd64-xl-win7-amd64                               fail
 test-amd64-i386-xl-win7-amd64                                fail
 test-amd64-amd64-xl-credit2                                  pass
 test-armhf-armhf-xl-credit2                                  fail
 test-amd64-i386-freebsd10-i386                               pass
 test-amd64-i386-rumpuserxen-i386                             blocked
 test-amd64-amd64-xl-pcipt-intel                              fail
 test-amd64-i386-rhel6hvm-intel                               pass
 test-amd64-i386-qemut-rhel6hvm-intel                         pass
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass
 test-amd64-amd64-libvirt                                     pass
 test-armhf-armhf-libvirt                                     fail
 test-amd64-i386-libvirt                                      pass
 test-armhf-armhf-xl-midway                                   pass
 test-amd64-amd64-xl-multivcpu                                fail
 test-armhf-armhf-xl-multivcpu                                pass
 test-amd64-amd64-pair                                        pass
 test-amd64-i386-pair                                         fail
 test-amd64-amd64-xl-sedf-pin                                 fail
 test-armhf-armhf-xl-sedf-pin                                 pass
 test-amd64-amd64-pv                                          pass
 test-amd64-i386-pv                                           pass
 test-amd64-amd64-xl-sedf                                     pass
 test-armhf-armhf-xl-sedf                                     pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail
 test-amd64-i386-xend-qemut-winxpsp3                          fail
 test-amd64-amd64-xl-qemut-winxpsp3                           fail
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail
 test-amd64-i386-xend-winxpsp3                                fail
 test-amd64-amd64-xl-winxpsp3                                 fail


------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit fc6fe18f1511d4b393057c60a2e6b05ccd963e90
Author: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
Date:   Thu Mar 26 08:41:44 2015 +0100

    x86: don't apply reboot quirks if reboot set by user

    If reboot= is specified on the command-line, don't apply reboot quirks
    to allow the command-line option to take precedence.

    This is a port of Linux commit 5955633e91bf ("x86/reboot: Skip DMI
    checks if reboot set by user").

    Signed-off-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>

    Leverage (and make apply on top of) c643fb110a ("x86/EFI: allow
    reboot= overrides when running under EFI").

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 9832f5e8e3575f8affceb2751f7422704bf7b446
    master date: 2015-03-13 12:41:51 +0100

commit 77da6c2de65de3b00e5181cd26a3869744555ea4
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Mar 26 08:41:03 2015 +0100

    Revert "cpupools: update domU's node-affinity on the cpupool_unassign_cpu() 
path"

    This reverts commit 93be8285a79c6cbbf66c8681fec1d1bfb71d84cc.

    At the point this patch calls domain_update_node_affinity(), the vcpu
    hard affinities have not yet been updated; so calling it at this point
    can in some circumstances trigger an ASSERT().

    domain_update_node_affinity() is already called in
    cpu_disable_scheduler(), so adding it to cpupool_unassign_cpu() is
    redundant.  Simply reverting the patch is sufficient.

    Acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>

commit 42b446ed8d540057cd39f3bff945127939fa1cb6
Author: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Date:   Thu Mar 26 08:40:12 2015 +0100

    x86/EFI: allow reboot= overrides when running under EFI

    By default we will always use EFI reboot mechanism when
    running under EFI platforms. However some EFI platforms
    are buggy and need to use the ACPI mechanism to
    reboot (such as Lenovo ThinkCentre M57). As such
    respect the 'reboot=' override and DMI overrides
    for EFI platforms.

    Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

    - BOOT_INVALID is just zero
    - also consider acpi_disabled in BOOT_INVALID resolution
    - duplicate BOOT_INVALID resolution in machine_restart()
    - don't fall back from BOOT_ACPI to BOOT_EFI (if it was overridden, it
      surely was for a reason)
    - adjust doc change formatting

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

    x86/EFI: fix reboot after c643fb110a

    acpi_disabled needs to be moved out of .init.data.

    Reported-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
    From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Tested-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>

    master commit: c643fb110a51693e82a36ca9178d54f0b9744024
    master date: 2015-03-13 11:25:52 +0100
    master commit: 8ff330ec11e471919621bce97c069b83b0319d15
    master date: 2015-03-23 18:01:51 +0100

commit 21a97a7de7f0b2f633169235444c0ebcbb6cbf9b
Author: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
Date:   Thu Mar 26 08:38:35 2015 +0100

    EFI: fix getting EFI variable list on some systems

    Copy the entire output buffer to the guest because some firmwares update
    size on successful calls (contrary to the spec) and the buffer may
    contain data beyond the output size that the firmware requires on a
    subsequent GetNextVariableName() call (e.g. a NULL character).

    Note that this shouldn't change the amount of data copied because on 
success, a
    compliant firmware does not change size and so the entire buffer is copied
    anyway.  If size is changed, Xen does not copy the buffer.

    Without this change, the following (simplified) sequence would occur:
    GetNextVariableName: in \0, size 1024 || out AdminPw\0, size 7
    GetNextVariableName: in AdminPw\0, size 1024 || out UserPw\0, size 6
    GetNextVariableName: in UserPww\0, size 1024 || NOT FOUND

    This was seen on an Intel S1200RP_SE with firmware
    S1200RP.86B.02.02.0005.102320140911, version 4.6, date 2014-10-23.

    Signed-off-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 1f4eb9d27d0ebd62a0b6cdff8213726f5ae8f25c
    master date: 2015-03-10 13:52:01 +0100

commit b39e48d67a3baf2b3ce823df09bbfc044d7d5678
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Mar 26 08:37:56 2015 +0100

    VT-d: print_vtd_entries() should cope with superpages

    Even if VT-d code alone (i.e. when not sharing tables with EPT) still
    doesn't support superpages, this function - invoked upon DMA remapping
    faults - needs to cope with such.

    While at it also replace a few more plain numbers with suitable named
    constants.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>
    master commit: 92cf6c2456dc428694ed95b6b1dec5bb84319790
    master date: 2015-03-09 14:00:19 +0100

commit 4a49a29776520ebe7685978e0c8982b1491bc202
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Mar 26 08:37:08 2015 +0100

    honor MEMF_no_refcount in alloc_heap_pages()

    Non-anonymous allocations with this flag set should - for the purpose
    of the availability check - be treated just like anonymous ones, as
    they wouldn't lead to a reduction of ->outstanding_pages.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>
    master commit: 17294e69c4cd299da7ba3ca8077e24be76bd61b1
    master date: 2015-02-26 13:58:54 +0100

commit c0577aecaa4655be674d36ed3ec37dd2fd91b0ad
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Mar 26 08:29:30 2015 +0100

    update Xen version to 4.4.3-pre
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.