[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.6-testing baseline-only test] 38687: trouble: blocked/broken/fail/pass
This run is configured for baseline tests only. flight 38687 xen-4.6-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38687/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-intel 14 capture-logs/l1(14) broken REGR. vs. 38681 build-i386-pvops 3 host-install(3) broken REGR. vs. 38681 build-i386 3 host-install(3) broken REGR. vs. 38681 test-amd64-amd64-migrupgrade 3 host-install/src_host(3) broken REGR. vs. 38681 test-amd64-amd64-migrupgrade 4 host-install/dst_host(4) broken REGR. vs. 38681 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 3 host-install(3) broken REGR. vs. 38681 test-amd64-amd64-xl-rtds 3 host-install(3) broken REGR. vs. 38681 test-amd64-amd64-rumpuserxen-amd64 3 host-install(3) broken like 38681 test-amd64-amd64-xl-qemuu-winxpsp3 3 host-install(3) broken like 38681 test-amd64-amd64-xl-pvh-amd 3 host-install(3) broken like 38681 test-amd64-amd64-qemuu-nested-amd 3 host-install(3) broken like 38681 test-amd64-amd64-xl-qemut-winxpsp3 3 host-install(3) broken like 38681 test-amd64-amd64-i386-pvgrub 10 guest-start fail like 38681 test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1 fail like 38681 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 38681 test-amd64-amd64-xl 19 guest-start/debian.repeat fail like 38681 Tests which did not succeed, but are not blocking: build-i386-rumpuserxen 1 build-check(1) blocked n/a build-i386-libvirt 1 build-check(1) blocked n/a test-amd64-i386-xl-xsm 1 build-check(1) blocked n/a test-amd64-i386-libvirt-xsm 1 build-check(1) blocked n/a test-amd64-i386-qemut-rhel6hvm-intel 1 build-check(1) blocked n/a test-amd64-i386-freebsd10-i386 1 build-check(1) blocked n/a test-amd64-i386-migrupgrade 1 build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-intel 1 build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-amd 1 build-check(1) blocked n/a test-amd64-i386-qemut-rhel6hvm-amd 1 build-check(1) blocked n/a test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a test-amd64-i386-libvirt-pair 1 build-check(1) blocked n/a test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 1 build-check(1) blocked n/a test-amd64-i386-pair 1 build-check(1) blocked n/a test-amd64-i386-xl-qemuu-win7-amd64 1 build-check(1) blocked n/a test-amd64-i386-xl-qemuu-ovmf-amd64 1 build-check(1) blocked n/a test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a test-amd64-i386-xl-qemut-debianhvm-amd64 1 build-check(1) blocked n/a test-amd64-i386-xl-qemuu-debianhvm-amd64 1 build-check(1) blocked n/a test-amd64-i386-xl-raw 1 build-check(1) blocked n/a test-amd64-i386-libvirt 1 build-check(1) blocked n/a test-amd64-i386-freebsd10-amd64 1 build-check(1) blocked n/a test-amd64-i386-rumpuserxen-i386 1 build-check(1) blocked n/a test-amd64-i386-xl-qemut-win7-amd64 1 build-check(1) blocked n/a test-amd64-i386-xl 1 build-check(1) blocked n/a test-amd64-i386-xl-qemut-winxpsp3-vcpus1 1 build-check(1) blocked n/a test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 1 build-check(1) blocked n/a test-amd64-i386-xl-qemut-winxpsp3 1 build-check(1) blocked n/a test-amd64-i386-xl-qemuu-winxpsp3 1 build-check(1) blocked n/a test-armhf-armhf-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-libvirt-xsm 14 guest-saverestore fail never pass test-armhf-armhf-libvirt 14 guest-saverestore fail never pass test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-armhf-armhf-xl-xsm 13 saverestore-support-check fail never pass test-armhf-armhf-xl-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-midway 13 saverestore-support-check fail never pass test-armhf-armhf-xl-midway 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 13 saverestore-support-check fail never pass test-armhf-armhf-xl-credit2 13 saverestore-support-check fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-armhf-armhf-libvirt-raw 13 guest-saverestore fail never pass test-armhf-armhf-libvirt-raw 11 migrate-support-check fail never pass test-armhf-armhf-libvirt-qcow2 13 guest-saverestore fail never pass test-armhf-armhf-libvirt-qcow2 11 migrate-support-check fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass test-armhf-armhf-xl-rtds 13 saverestore-support-check fail never pass test-armhf-armhf-xl-rtds 12 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 11 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 12 saverestore-support-check fail never pass test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-xsm 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass version targeted for testing: xen 19fc53a92312876761659e82a1ae5d69b603a4ef baseline version: xen 1fd615aa0108490ffc558d27627f509183cbfdaf Last test of basis 38681 2016-01-21 17:27:19 Z 1 days Testing same since 38687 2016-01-22 19:55:56 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Julien Grall <julien.grall@xxxxxxxxxx> Kevin Tian <kevin.tian@xxxxxxxxx> Paul Durrant <paul.durrant@xxxxxxxxxx> Tim Deegan <tim@xxxxxxx> jobs: build-amd64-xsm pass build-armhf-xsm pass build-i386-xsm pass build-amd64 pass build-armhf pass build-i386 broken build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt blocked build-amd64-prev pass build-i386-prev pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops broken build-amd64-rumpuserxen pass build-i386-rumpuserxen blocked test-amd64-amd64-xl fail test-armhf-armhf-xl pass test-amd64-i386-xl blocked test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm blocked test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm broken test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm blocked test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm blocked test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm blocked test-amd64-amd64-libvirt-xsm pass test-armhf-armhf-libvirt-xsm fail test-amd64-i386-libvirt-xsm blocked test-amd64-amd64-xl-xsm pass test-armhf-armhf-xl-xsm pass test-amd64-i386-xl-xsm blocked test-amd64-amd64-qemuu-nested-amd broken test-amd64-amd64-xl-pvh-amd broken test-amd64-i386-qemut-rhel6hvm-amd blocked test-amd64-i386-qemuu-rhel6hvm-amd blocked test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 blocked test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 blocked test-amd64-i386-freebsd10-amd64 blocked test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 blocked test-amd64-amd64-rumpuserxen-amd64 broken test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 blocked test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 blocked test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-amd64-i386-freebsd10-i386 blocked test-amd64-i386-rumpuserxen-i386 blocked test-amd64-amd64-qemuu-nested-intel broken test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel blocked test-amd64-i386-qemuu-rhel6hvm-intel blocked test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt fail test-amd64-i386-libvirt blocked test-armhf-armhf-xl-midway pass test-amd64-amd64-migrupgrade broken test-amd64-i386-migrupgrade blocked test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair blocked test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair blocked test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub fail test-amd64-amd64-pygrub pass test-armhf-armhf-libvirt-qcow2 fail test-amd64-amd64-xl-qcow2 pass test-armhf-armhf-libvirt-raw fail test-amd64-i386-xl-raw blocked test-amd64-amd64-xl-rtds broken test-armhf-armhf-xl-rtds pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 blocked test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 blocked test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd pass test-amd64-amd64-xl-qemut-winxpsp3 broken test-amd64-i386-xl-qemut-winxpsp3 blocked test-amd64-amd64-xl-qemuu-winxpsp3 broken test-amd64-i386-xl-qemuu-winxpsp3 blocked ------------------------------------------------------------ sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xs.citrite.net/~osstest/testlogs/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary broken-step test-amd64-amd64-qemuu-nested-intel capture-logs/l1(14) broken-step test-amd64-amd64-rumpuserxen-amd64 host-install(3) broken-step test-amd64-amd64-xl-qemuu-winxpsp3 host-install(3) broken-step test-amd64-amd64-xl-pvh-amd host-install(3) broken-step build-i386-pvops host-install(3) broken-step build-i386 host-install(3) broken-step test-amd64-amd64-qemuu-nested-amd host-install(3) broken-step test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm host-install(3) broken-step test-amd64-amd64-xl-rtds host-install(3) broken-step test-amd64-amd64-xl-qemut-winxpsp3 host-install(3) broken-step test-amd64-amd64-migrupgrade host-install/src_host(3) broken-step test-amd64-amd64-migrupgrade host-install/dst_host(4) Push not applicable. ------------------------------------------------------------ commit 19fc53a92312876761659e82a1ae5d69b603a4ef Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Jan 21 09:50:49 2016 +0100 x86/shadow: Fix missing newline in dprintk() to avoid console corruption. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> master commit: 42940c046902f4dbff383aaae2f1139afbbdfe17 master date: 2015-10-12 16:01:56 +0200 commit ffb237937a38989e5d598e7774ad45791f164ae7 Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Date: Thu Jan 21 09:48:21 2016 +0100 x86/VPMU: don't allow any non-zero writes to MSR_IA32_PEBS_ENABLE Calculation reserved bits for MSR_IA32_PEBS_ENABLE is model-dependent and since we don't support PEBS anyway we shouldn't allow any writes to it (but let's still permit guests wishing to disable PEBS). We should also report PEBS as unsupported to HVM, just like we do on PV. Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> master commit: fb424bf6b5b0df0155ab4e56a1b8f67e6470fa46 master date: 2016-01-07 15:27:16 +0100 commit 39d7fde885d5d9f8b035ce09211e64100ccfe288 Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Date: Thu Jan 21 09:47:59 2016 +0100 x86/VPMU: check more carefully which bits are allowed to be written to MSRs Current Intel VPMU emulation needs to perform more checks when writing PMU MSRs on guest's behalf: * MSR_CORE_PERF_GLOBAL_CTRL is not checked at all * MSR_CORE_PERF_FIXED_CTR_CTRL has more reserved bits in PMU version 2 * MSR_CORE_PERF_GLOBAL_OVF_CTRL's bit 61 is allowed on versions greater * than 2. We can also use precomputed mask in core2_vpmu_do_interrupt(). Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> master commit: 31af0d76759328161cb5db73b50b23dded51e15c master date: 2016-01-07 15:26:37 +0100 commit 2b62a5d83b24bd9304ecbfa2404166968c59ee59 Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Date: Thu Jan 21 09:47:30 2016 +0100 x86/VPMU: support only versions 2 through 4 of architectural performance monitoring We need to have at least version 2 since it's the first version to support various control and status registers (such as MSR_CORE_PERF_GLOBAL_CTRL) that VPMU relies on always having. We don't fully emulate version 4 but since it's back compatible with earlier versions we can fall back to v3. At this point there is no compatibility statement for v5 so anything above 4 is not supported. For guests querying PMU version via CPUID leaf 0xa clip it at v3. With explicit testing for PMU version we can now remove CPUID model check. Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> master commit: 00e248ce7f25d1e7705c87403065e1f6fd440dc8 master date: 2015-12-10 13:15:35 +0100 commit 18593631f2c0fbbd5eaee471ee838d407c74fb4e Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Thu Jan 21 09:46:38 2016 +0100 x86/hvm: make sure stdvga cache cannot be re-enabled As soon as the cache is disabled, it will become out-of-sync with the VGA device model and since no mechanism exists to acquire current VRAM state from the device model, re-enabling it leads to stale data being seen by the guest. The problem was introduced by commit 3bbaaec0 ("x86/hvm: unify stdvga mmio intercept with standard mmio intercept") and can be seen by deliberately crashing a Windows guest; the BSOD output is corrupted. This patch changes the existing 'cache' boolean in hvm_hw_stdvga into a tri-state enum and only allows the state to move from 'uninitialized' to 'enabled'. Once the cache state becomes 'disabled' it will remain so for the lifetime of the VM. Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> master commit: 22a1fbb575df3a3a7726cdeb5ddf19cc8f60827c master date: 2015-11-06 15:17:00 +0100 commit 19563a5b9e4c2006a7f2bee940a8f49408b77702 Author: Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Date: Thu Jan 14 19:44:07 2016 +0100 xen/arm: Add r1p12 to the list of supported Cadence UARTs Add r1p12 to the list of supported Cadence UARTs. Xen only uses the subset of features available in r1p8, so we don't need to differentiate between r1p8 and r1p12 yet. Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> (cherry picked from commit 67f7afd26f7a61c31f6b3c3112828a3996434e17) commit 70ed1226d2e27f43c6f7d3aa9d5f2a0e1b29347d Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Wed Nov 18 16:42:38 2015 +0000 xen/arm: vgic-v2: Implement correctly ITARGETSR0 - ITARGETSR7 read-only Each ITARGETSR register are 4-byte wide and the offset is in byte. The current implementation is computing the end of the range wrongly resulting to emulate only ITARGETSR{0,1} read-only. The rest will be treated as read-write. As 8 registers should be read-only, the end of the range should be ITARGETSR + (4 * 8) - 1. For convenience introduce ITARGETSR7 and ITARGETSR8. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Reviewed-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> (cherry picked from commit bc50de883847c1ebc7c8b4d73283d9be6c4df38e) commit 93f67ce718a020686d98db7edd7e9298bd7b36a5 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Thu Oct 8 19:23:51 2015 +0100 xen/arm: vgic-v2: Report the correct GICC size to the guest The GICv2 DT node is usually used by the guest to know the address/size of the regions (GICD, GICC...) to map into their virtual memory. While the GICv2 spec requires the size of the GICC to be 8KB, we correctly do an 8KB stage-2 mapping but erroneously report 256 in the device tree (based on GUEST_GICC_SIZE). I bet we didn't see any issue so far because all the registers except GICC_DIR lives in the first 256 bytes of the GICC region and all the guests I have seen so far are driving the GIC with GICC_CTLR.EIOmode = 0. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> [ ijc -- fixed some typos in commit message ] (cherry picked from commit 8ee6d574b7073b5c98fcf94d20a53197609b85e1) commit 00fa9ac155ff33f5a70655476fd086ab676d0a16 Author: Julien Grall <julien.grall@xxxxxxxxxx> Date: Mon Oct 19 13:58:00 2015 +0100 xen/device-tree: Print the DT path on error in dt_for_each_range With the current log is not possible for the user to understand properly the error: (XEN) Grant table range: 0x0000007fc00000-0x0000007fc72000 (XEN) DT: no ranges; cannot enumerate (XEN) Device tree generation failed (-22). (XEN) (XEN) **************************************** (XEN) Panic on CPU 0: (XEN) Could not set up DOM0 guest OS (XEN) **************************************** (XEN) The other error message within the function already print the DT path. Do the same here. Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx> (cherry picked from commit 01a8a8126d02b81bac4fe81541be0cccefc8a4c8) (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |