[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 58502: regressions - trouble: broken/fail/pass
flight 58502 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/58502/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 3 host-install(3) broken REGR. vs. 58392 test-amd64-amd64-xl-xsm 6 xen-boot fail REGR. vs. 58392 test-amd64-i386-xl-xsm 6 xen-boot fail REGR. vs. 58392 test-amd64-i386-qemut-rhel6hvm-amd 6 xen-boot fail REGR. vs. 58392 test-amd64-i386-qemuu-rhel6hvm-intel 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-xl-qemut-debianhvm-amd64 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-pair 10 xen-boot/dst_host fail REGR. vs. 58392 test-amd64-amd64-pair 9 xen-boot/src_host fail REGR. vs. 58392 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-xl-qemuu-debianhvm-amd64 6 xen-boot fail REGR. vs. 58392 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs. 58392 test-amd64-i386-freebsd10-amd64 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boot fail REGR. vs. 58392 test-amd64-i386-xl-qemuu-winxpsp3 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-xl-qemuu-winxpsp3 6 xen-boot fail REGR. vs. 58392 test-amd64-i386-xl-qemut-winxpsp3 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-xl-qemut-winxpsp3 6 xen-boot fail REGR. vs. 58392 Regressions which are regarded as allowable (not blocking): test-amd64-i386-libvirt-xsm 6 xen-boot fail REGR. vs. 58392 test-amd64-i386-libvirt 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-libvirt-xsm 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-libvirt 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-xl-sedf-pin 6 xen-boot fail REGR. vs. 58392 test-amd64-amd64-xl-sedf 6 xen-boot fail REGR. vs. 58392 test-armhf-armhf-libvirt-xsm 11 guest-start fail REGR. vs. 58392 test-armhf-armhf-libvirt 11 guest-start fail blocked in 58392 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 58392 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-armhf-armhf-xl-arndale 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-xl-cubietruck 12 migrate-support-check fail never pass test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl-sedf-pin 12 migrate-support-check fail never pass test-armhf-armhf-xl-sedf 12 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail never pass version targeted for testing: xen ad7ea0dbb251176cb8beea1b46e14c9f039d95e5 baseline version: xen 12e817e281034f5881f46e0e4f1d127820101a78 ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Dario Faggioli <dario.faggioli@xxxxxxxxxx> Don Dugger <donald.d.dugger@xxxxxxxxx> George Dunlap <george.dunlap@xxxxxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Juergen Gross <jgross@xxxxxxxx> Kevin Tian <kevin.tian@xxxxxxxxx> Roger Pau Monné <roger.pau@xxxxxxxxxx> Ross Lagerwall <ross.lagerwall@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64-xsm pass build-armhf-xsm pass build-i386-xsm pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumpuserxen pass build-i386-rumpuserxen pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm fail test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm fail test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm fail test-amd64-amd64-libvirt-xsm fail test-armhf-armhf-libvirt-xsm fail test-amd64-i386-libvirt-xsm fail test-amd64-amd64-xl-xsm fail test-armhf-armhf-xl-xsm pass test-amd64-i386-xl-xsm fail test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd fail test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 fail test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 fail test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 fail test-amd64-amd64-xl-qemuu-ovmf-amd64 fail test-amd64-i386-xl-qemuu-ovmf-amd64 broken test-amd64-amd64-rumpuserxen-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-armhf-armhf-xl-arndale pass test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-armhf-armhf-xl-cubietruck pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumpuserxen-i386 pass test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel fail test-amd64-amd64-libvirt fail test-armhf-armhf-libvirt fail test-amd64-i386-libvirt fail test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair fail test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin fail test-armhf-armhf-xl-sedf-pin pass test-amd64-amd64-xl-sedf fail test-armhf-armhf-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-i386-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xl-qemuu-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary broken-step test-amd64-i386-xl-qemuu-ovmf-amd64 host-install(3) Not pushing. ------------------------------------------------------------ commit ad7ea0dbb251176cb8beea1b46e14c9f039d95e5 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Thu Jun 11 17:56:15 2015 +0100 libxl: libxl_internal.h: Clarify ao rule against internal callers Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx> CC: Ian Campbell <ian.campbell@xxxxxxxxxx> CC: Wei Liu <wei.liu2@xxxxxxxxxx> CC: Juergen Gross <jgross@xxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Juergen Gross <jgross@xxxxxxxx> commit c5089fae0f6f71443356530ecec4781788c7377a Author: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx> Date: Fri Jun 12 12:07:05 2015 +0200 x86: avoid tripping watchdog when constructing dom0 Constructing dom0 may take a few seconds, particularly if the slow VESA graphics terminal is used. Process pending softirqs a few times to avoid tripping a watchdog with a short timeout. Signed-off-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx> Move inclusion of xen/softirq.h (and at once clean up other includes). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> commit 98c51d0c7eb188745f564813443adcb5fd5db00b Author: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Date: Fri Jun 12 12:06:24 2015 +0200 cpupool: fix shutdown with cpupools with different schedulers trying to shutdown the host when a cpupool exists, has pCPUs, and has a scheduler different than the Xen's default one, produces this: root@Zhaman:~# xl cpupool-cpu-remove Pool-0 8 root@Zhaman:~# xl cpupool-create name=\"Pool-1\" sched=\"credit2\" Using config file "command line" cpupool name: Pool-1 scheduler: credit2 number of cpus: 0 root@Zhaman:~# xl cpupool-cpu-add Pool-1 8 root@Zhaman:~# shutdown -h now (XEN) ----[ Xen-4.6-unstable x86_64 debug=y Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e008:[<ffff82d080133bdf>] kill_timer+0x56/0x298 (XEN) RFLAGS: 0000000000010002 CONTEXT: hypervisor ... ... ... (XEN) Xen call trace: (XEN) [<ffff82d080133bdf>] kill_timer+0x56/0x298 (XEN) [<ffff82d08012233f>] csched_free_pdata+0x9b/0xcf (XEN) [<ffff82d08012c30c>] cpu_schedule_callback+0x64/0x8b (XEN) [<ffff82d08011bc7a>] notifier_call_chain+0x67/0x87 (XEN) [<ffff82d08010153e>] cpu_down+0xd9/0x12c (XEN) [<ffff82d080101744>] disable_nonboot_cpus+0x93/0x138 (XEN) [<ffff82d0801aa6e7>] enter_state_helper+0xbd/0x365 (XEN) [<ffff82d0801061e5>] continue_hypercall_tasklet_handler+0x4a/0xb1 (XEN) [<ffff82d080132387>] do_tasklet_work+0x78/0xab (XEN) [<ffff82d0801326bd>] do_tasklet+0x5e/0x8a (XEN) [<ffff82d0801646d2>] idle_loop+0x56/0x6b ... ... ... (XEN) **************************************** (XEN) Panic on CPU 0: (XEN) FATAL PAGE FAULT (XEN) [error_code=0000] (XEN) Faulting linear address: 0000000000000041 (XEN) **************************************** The fix is, when tearing down a pCPU, call the free_pdata() hook from the scheduler of the cpupool the pCPU belongs to, not always the one from the default scheduler. Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Reviewed-by: Juergen Gross <jgross@xxxxxxxx> Acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> commit 90b18f1666a89e7829912456ee32099c7669cb10 Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> Date: Fri Jun 12 12:05:54 2015 +0200 libelf: fix elf_parse_bsdsyms call elf_parse_bsdsyms expects the second paramater to be a physical address, not a virtual one. Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> commit 2cba5cfe8036eedf6654cdda2cabb6084508a81f Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Jun 12 12:04:26 2015 +0200 x86/context-switch: prefer is_..._domain() over is_..._vcpu() Latch both domains alongside both vCPU-s into local variables, making use of them where possible also beyond what the title says. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit c6e24bdc1bcd6c7736326ddc24104a597e754103 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Jun 12 12:03:56 2015 +0200 x86/HVM: prefer is_..._domain() over is_..._vcpu() ... when the domain pointer is already available or such operations occur frequently in a function. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 67a35cd752741d855b177b4d7b11b5ec80707e00 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Jun 12 12:03:13 2015 +0200 x86: prefer is_..._domain() over is_..._vcpu() ... when the domain pointer is already available or such operations occur frequently in a function. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit ee78176f98f60ad6de32faabba46d863b75ceb28 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Fri Jun 12 12:02:12 2015 +0200 domctl: prefer is_..._domain() over is_..._vcpu() ... when the domain pointer is already available. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 4c94684bb7c20ff01d03fb1f22c03cc0c2fc417b Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jun 11 14:47:54 2015 +0200 EFI: map allocation size must be set to zero Commit 8a753b3f1c ("efi: fix allocation problems if ExitBootServices() fails") replaced the use of a static (and hence zero-initialized) variable by an automatic (and hence uninitialized) one. Also drop the variable introduced by that commit in favor of re-using another available and suitable one. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 1f0721377952fc038b48f175d7061ec701359aac Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Jun 11 14:44:47 2015 +0200 x86/traps: loop in the correct direction in compat_iret() This is CVE-2015-4164 / XSA-136. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 5d5c09d853d3f212861f70c577c65d1703f752ae Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jun 11 14:44:12 2015 +0200 gnttab: add missing version check to GNTTABOP_swap_grant_ref handling ... avoiding NULL derefs when the version to use wasn't set yet (via GNTTABOP_setup_table or GNTTABOP_set_version). This is CVE-2015-4163 / XSA-134. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 44a84eac301fba0f5f4f430d8f81929ee22b1187 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jun 11 11:58:29 2015 +0200 EFI/ARM: don't treat EfiBootServices{Code,Data} as normal RAM under /mapbs Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit cdc6204b7749a53e6a4d95fac4440601c35a539d Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jun 11 11:55:05 2015 +0200 VT-d: extend quirks to newer desktop chipsets We're being told that while on the server side the issue we're trying to work around is fixed starting with IvyBridge (another round of double checking is going on before we're going to remove the one IvyBridge ID that we're currently applying the workaround for), on the desktop side even Skylake still requires the workaround. Hence we need to add a whole bunch of desktop IDs. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Don Dugger <donald.d.dugger@xxxxxxxxx> commit ae05fd3912b153e18efa3018d9f7cf9105ea5b43 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jun 11 11:54:10 2015 +0200 VT-d: use qword MMIO access for MSI address writes Also make dmar_{read,write}q() actually do what their names suggest (we don't need to be concerned of 32-bit restrictions anymore). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> commit 73cb5d43a8f48930e4594ef7b15b974487651ffe Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jun 11 11:53:20 2015 +0200 x86/MSI-X: use qword MMIO access for address writes Now that we support it for our guests, let's do so ourselves too. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 284ffb4f9b0d5c3a33c4c5bd87645d0cc342ca96 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Jun 11 11:52:18 2015 +0200 x86/vMSI-X: support qword MMIO access The specification explicitly provides for this, so we should have supported this from the beginning. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |