[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.5-testing test] 56898: regressions - FAIL



flight 56898 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/56898/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop         fail REGR. vs. 56728
 test-amd64-amd64-rumpuserxen-amd64 15 
rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs. 56728

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop          fail pass in 56821

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop              fail like 56728

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pvh-intel 11 guest-start                  fail  never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start                  fail   never pass
 test-amd64-i386-libvirt      12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-sedf-pin 12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-sedf     12 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop             fail never pass
 test-armhf-armhf-libvirt     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  ddfe333aef87e6c5f52b84c8beb3277be4663313
baseline version:
 xen                  0c4e0ef608c98abef6220b0b027d9ce8ec65fd5f

------------------------------------------------------------
People who touched revisions under test:
  Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>
  Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
  Suravee Suthikulpanit <Suravee.Suthikulpanit@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      pass    
 build-i386-rumpuserxen                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-xl-pvh-amd                                  fail    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumpuserxen-amd64                           fail    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumpuserxen-i386                             pass    
 test-amd64-amd64-xl-pvh-intel                                fail    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-armhf-armhf-xl-sedf-pin                                 pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-armhf-armhf-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     pass    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass    
 test-amd64-amd64-xl-qemut-winxpsp3                           pass    
 test-amd64-i386-xl-qemut-winxpsp3                            pass    
 test-amd64-amd64-xl-qemuu-winxpsp3                           pass    
 test-amd64-i386-xl-qemuu-winxpsp3                            pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit ddfe333aef87e6c5f52b84c8beb3277be4663313
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue May 19 12:00:09 2015 +0200

    x86: don't change affinity with interrupt unmasked
    
    With ->startup unmasking the IRQ, setting the affinity afterwards
    without masking the IRQ again is invalid namely for MSI (address and
    data can't be updated atomically and may - at least for MSI-X - be
    cached while unmasked).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    
    AMD IOMMU: only translate remapped IO-APIC RTEs
    
    1aeb1156fa ("x86 don't change affinity with interrupt unmasked")
    introducing RTE reads prior to the respective interrupt having got
    enabled for the first time uncovered a bug in 2ca9fbd739 ("AMD IOMMU:
    allocate IRTE entries instead of using a static mapping"): We obviously
    shouldn't be translating RTEs for which remapping didn't get set up
    yet.
    
    Reported-by: Sander Eikelenboom <linux@xxxxxxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Suravee Suthikulpanit <Suravee.Suthikulpanit@xxxxxxx>
    
    master commit: 1aeb1156fa43fe2cd2b5003995b20466cd19a622
    master date: 2015-03-26 11:18:28 +0100
    master commit: c33c51b81c82a51515bf4fa2a9717098c03e5013
    master date: 2015-04-24 12:06:26 +0200

commit bf30232bf17ad2cdf55d50a98759ee45c0ad00e0
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue May 19 11:47:13 2015 +0200

    x86: don't clear high 32 bits of RAX on sub-word guest I/O port reads
    
    1- or 2-byte operations never alter the high halves of registers.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 1191aa9d1988c469844eb4545689617a8b13eae1
    master date: 2015-05-11 10:37:58 +0200

commit a824bf9daff246d8b6a269028fb7c391917cad24
Author: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
Date:   Tue May 19 11:46:31 2015 +0200

    x86_emulate: fix EFLAGS setting of CMPXCHG emulation
    
    CMPXCHG sets CF, PF, AF, SF, and OF flags according to the results of the
    comparison the rAX with the operand of the instruction.
    rAX must be the first argument of the comparison (a minuend), the operand
    must be the second one (a subtrahend).
    
    Due to improper order of comparison arguments, CF, PF, AF, SF and OF flags 
were
    set incorrectly in the case of inequality. Need to swap them.
    
    Signed-off-by: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
    
    # Commit 20fd4b70a7647656812b8f276510e09b252db9f7
    # Date 2015-05-04 12:03:19 +0200
    # Author Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
    # Committer Jan Beulich <jbeulich@xxxxxxxx>
    test_x86_emulate: extend EFLAGS check of CMPXCHG test
    
    CMPXCHG: in the case of inequality of the rAX and the operand,
    need to check CF, PF, AF, SF and OF flags as well.
    
    This adjustment covers the fix of incorrect comparison during
    CMPXCHG emulation.
    
    Signed-off-by: Eugene Korenevsky <ekorenevsky@xxxxxxxxx>
    master commit: 2232628ecbab42e7700287204daad71a3ce2208c
    master date: 2015-05-04 11:55:41 +0200
    master commit: 20fd4b70a7647656812b8f276510e09b252db9f7
    master date: 2015-05-04 12:03:19 +0200

commit f653b7fd6a876195ee99f021d735d5d1ae6bc330
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Tue May 19 11:45:34 2015 +0200

    x86/hvm: implicitly disable an ioreq server when it is destroyed
    
    Currently, unless a (non-default) ioreq server is explicitly disabled before
    being destroyed, its gmfns will not be placed back into the p2m but still
    released back into the ioreq_gmfn mask. This is somewhat counter-intuitive
    and easily remedied by this small patch.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: ebd41901b96565b392e8d434a4c4ab543d5fb52b
    master date: 2015-04-24 12:14:23 +0200

commit 8dbdcc391001e50fad177400c85f11a2739b9e25
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Tue May 19 11:44:59 2015 +0200

    x86/hvm: actually release ioreq server pages
    
    hvm_free_ioreq_gmfn has the sense of the ioreq_gmfn mask inverted; it
    needs to set a bit to release the gmfn, not clear it.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: cb791b84e7c0adce14194647912c4c3d28cddc4a
    master date: 2015-04-24 12:13:48 +0200

commit d0725109f73c1a400e39862c7eceac72b407b1b5
Author: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
Date:   Tue May 19 11:43:35 2015 +0200

    x86/efi: reserve SMBIOS table region when EFI booting
    
    Some EFI firmware implementations may place the SMBIOS table in RAM
    marked as BootServicesData, which Xen does not consider as reserved.
    When dom0 tries to access the SMBIOS, the region is not contained in the
    initial P2M and it crashes with a page fault. To fix this, reserve the
    SMBIOS region.
    
    Also, fix the memcmp checks for existence of the SMBIOS.
    
    Signed-off-by: Ross Lagerwall <ross.lagerwall@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: bf68adcadaa2b0885c5d2f1c8e2e068e209eb041
    master date: 2015-04-17 10:44:48 +0200
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.