[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable baseline-only test] 67628: regressions - FAIL
This run is configured for baseline tests only. flight 67628 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67628/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-pygrub 6 xen-boot fail REGR. vs. 67617 test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 67617 test-amd64-amd64-xl-multivcpu 6 xen-boot fail REGR. vs. 67617 test-amd64-i386-xl-xsm 6 xen-boot fail REGR. vs. 67617 test-amd64-i386-freebsd10-i386 6 xen-boot fail REGR. vs. 67617 test-amd64-i386-xl-qemuu-ovmf-amd64 6 xen-boot fail REGR. vs. 67617 test-amd64-amd64-qemuu-nested-intel 6 xen-boot fail REGR. vs. 67617 test-amd64-amd64-libvirt-xsm 6 xen-boot fail REGR. vs. 67617 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs. 67617 test-amd64-i386-xl-qemut-debianhvm-amd64 6 xen-boot fail REGR. vs. 67617 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 6 xen-boot fail REGR. vs. 67617 test-amd64-i386-qemuu-rhel6hvm-intel 6 xen-boot fail REGR. vs. 67617 test-amd64-amd64-amd64-pvgrub 6 xen-boot fail REGR. vs. 67617 test-amd64-amd64-i386-pvgrub 6 xen-boot fail REGR. vs. 67617 test-amd64-amd64-xl-qemut-debianhvm-amd64 6 xen-boot fail REGR. vs. 67617 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs. 67617 test-amd64-i386-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs. 67617 test-amd64-i386-pair 9 xen-boot/src_host fail REGR. vs. 67617 test-amd64-i386-pair 10 xen-boot/dst_host fail REGR. vs. 67617 test-amd64-i386-migrupgrade 10 xen-boot/dst_host fail REGR. vs. 67617 test-amd64-i386-libvirt-pair 9 xen-boot/src_host fail REGR. vs. 67617 test-amd64-i386-libvirt-pair 10 xen-boot/dst_host fail REGR. vs. 67617 Regressions which are regarded as allowable (not blocking): build-amd64-rumpuserxen 6 xen-build fail like 67617 build-i386-rumpuserxen 6 xen-build fail like 67617 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail like 67617 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 9 debian-hvm-install fail like 67617 test-amd64-i386-qemut-rhel6hvm-intel 9 redhat-install fail like 67617 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 67617 test-amd64-i386-xl-qemut-winxpsp3 9 windows-install fail like 67617 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 9 windows-install fail like 67617 Tests which did not succeed, but are not blocking: test-amd64-amd64-rumpuserxen-amd64 1 build-check(1) blocked n/a test-amd64-i386-rumpuserxen-i386 1 build-check(1) blocked n/a test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt 14 guest-saverestore fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-midway 12 migrate-support-check fail never pass test-armhf-armhf-xl-midway 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt-xsm 14 guest-saverestore fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 13 saverestore-support-check fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass test-armhf-armhf-xl-rtds 12 migrate-support-check fail never pass test-armhf-armhf-xl-rtds 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt-qcow2 11 migrate-support-check fail never pass test-armhf-armhf-libvirt-qcow2 13 guest-saverestore fail never pass test-amd64-i386-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-libvirt-raw 11 migrate-support-check fail never pass test-armhf-armhf-libvirt-raw 13 guest-saverestore fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 11 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 12 saverestore-support-check fail never pass test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2 fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail never pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass version targeted for testing: xen a4f39a6450abe5207cb33f877b4b6cd5db8a6cca baseline version: xen 4b314c89be24c26abfad47900f806cebeafc805e Last test of basis 67617 2016-08-31 17:44:44 Z 2 days Testing same since 67628 2016-09-02 14:15:01 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Feng Wu <feng.wu@xxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <JBeulich@xxxxxxxx> Julien Grall <julien.grall@xxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64-xsm pass build-armhf-xsm pass build-i386-xsm pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-prev pass build-i386-prev pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumpuserxen fail build-i386-rumpuserxen fail test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm fail test-amd64-i386-xl-qemut-debianhvm-amd64-xsm fail test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm fail test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm fail test-amd64-amd64-libvirt-xsm fail test-armhf-armhf-libvirt-xsm fail test-amd64-i386-libvirt-xsm pass test-amd64-amd64-xl-xsm pass test-armhf-armhf-xl-xsm pass test-amd64-i386-xl-xsm fail test-amd64-amd64-qemuu-nested-amd fail test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 fail test-amd64-i386-xl-qemut-debianhvm-amd64 fail test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 fail test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 fail test-amd64-amd64-rumpuserxen-amd64 blocked test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-amd64-i386-freebsd10-i386 fail test-amd64-i386-rumpuserxen-i386 blocked test-amd64-amd64-qemuu-nested-intel fail test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel fail test-amd64-i386-qemuu-rhel6hvm-intel fail test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt fail test-amd64-i386-libvirt pass test-armhf-armhf-xl-midway pass test-amd64-amd64-migrupgrade pass test-amd64-i386-migrupgrade fail test-amd64-amd64-xl-multivcpu fail test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair fail test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair fail test-amd64-amd64-amd64-pvgrub fail test-amd64-amd64-i386-pvgrub fail test-amd64-amd64-pygrub fail test-armhf-armhf-libvirt-qcow2 fail test-amd64-amd64-xl-qcow2 pass test-armhf-armhf-libvirt-raw fail test-amd64-i386-xl-raw pass test-amd64-amd64-xl-rtds pass test-armhf-armhf-xl-rtds pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 fail test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd pass test-amd64-amd64-xl-qemut-winxpsp3 pass test-amd64-i386-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 pass test-amd64-i386-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xs.citrite.net/~osstest/testlogs/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Push not applicable. ------------------------------------------------------------ commit a4f39a6450abe5207cb33f877b4b6cd5db8a6cca Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Sep 1 15:24:20 2016 +0200 x86: drop leftover uses of regparm attribute These were relevant only for 32-bit builds on Xen. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit ee1cc4bfdca84d526805c4c72302c026f5e9cd94 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Sep 1 15:23:46 2016 +0200 x86/32on64: misc adjustments to call gate emulation - There's no 32-bit displacement in 16-bit addressing mode. - It is wrong to ASSERT() anything on parts of an instruction fetched from guest memory. - The two scaling bits of a SIB byte don't affect whether there is a scaled index register or not. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit ca0c9ed26cff8acd3063bfa60017c71517487658 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Sep 1 15:21:06 2016 +0200 x86: drop pointless uses of __func__ / __FUNCTION__ Non-debugging message text should be (and is in the cases here) distinguishable without also logging function names. Debugging message text, otoh, already includes file name and line number, so also logging function names is redundant. One relatively pointless debugging message gets removed altogether. In another case a missing log level specifier gets added at once. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit eee5909e9d1e9fa991c7d76475612354c5a6729c Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Sep 1 15:19:40 2016 +0200 x86/EFI: use less crude a way of generating the build ID Recent enough binutils (2.25 onwards) support --build-id also for COFF/PE output, and hence we should use that in favor of the original hack when possible. This gets complicated by the linker requiring at least one COFF object file to attach the .buildid section to. Hence the patch introduces a buildid.ihex (in order to avoid introducing binary files into the repo) which then gets converted to a binary minimal COFF object (no sections, no symbols). Also (to avoid both code fragment going out of sync) remove an unneeded ALIGN() from xen.lds.S: Adding an equivalent of it to the .buildid section would cause the _erodata symbol to become associated with the wrong section again (see commit 0970299de5 ["x86/EFI + Live Patch: avoid symbol address truncation"]). And it's pointless because the alignment already gets properly set by the input section(s). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 08e7738ec3644350fbac0325085baac6b3c7cd11 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Aug 22 17:50:55 2016 +0100 x86/levelling: Provide architectural OSXSAVE handling to masked native CPUID Contrary to c/s b2507fe7 "x86/domctl: Update PV domain cpumasks when setting cpuid policy", Intel CPUID masks are applied after fast forwarding hardware state, rather than before. (All behaviour in this regard appears completely undocumented by both Intel and AMD). Therefore, a set bit in the MSR causes hardware to be fast-forwarded, while a clear bit forces the guests view to 0, even if Xen's CR4.OSXSAVE is actually set. This allows Xen to provide an architectural view of a guest kernels CR4.OSXSAVE setting to any native CPUID instruction issused by guest kernel or userspace, even when masking is used. The masking value defaults to 1 (if the guest has XSAVE available) to cause fast-forwarding to occur for the HVM and idle vcpus. When setting the MSRs, a PV guest kernel's choice of OXSAVE is taken into account, and clobbered from the MSR if not set. This causes the fast-forwarding of Xen's CR4 state not to happen. As a side effect however, levelling potentially need updating on all PV CR4 changes. Reported-by: Jan Beulich <JBeulich@xxxxxxxx> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 33b23e5ab319a6bf9bfd38c4d9268fa6d9d072c6 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Aug 22 17:39:44 2016 +0100 x86/levelling: Pass a vcpu rather than a domain to ctxt_switch_levelling() A subsequent change needs to special-case OSXSAVE handling, which is per-vcpu rather than per-domain. No functional change. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 3b7cac5232012e167b284aba738fef1eceda33f8 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Aug 23 11:10:12 2016 +0100 x86/levelling: Restrict non-architectural OSXSAVE handling to emulated CPUID There is no need to extend the workaround to the faulted CPUID view, as Linux's dependence on the workaround is stricly via the emulated view. This causes a guest kernel faulted CPUID to observe architectural behaviour with respect to its CR4.OSXSAVE setting. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit d5498f7fd64add3b4810c418f9fa671a81901e36 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Aug 18 16:15:39 2016 +0100 xen/Kconfig: Misc tweaks * Drop one piece of trailing whitespace * Reposition LATE_HWDOM so it sits properly nested inside XSM in menuconfig Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx> commit 563a160b3ae9baf10224b82448689ec12bb51e87 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Aug 18 13:14:05 2016 +0100 xen/Kconfig: Drop redundant comments from Kconfig files Most of the comments are duplicated from the help text, and those without help provide no useful additional input. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx> commit fb1f0e95654c8f995ddcdbd114100515814c1238 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed Aug 31 18:15:07 2016 +0200 x86/PV: remove read_descriptor()'s regs parameter As of commit a35dc6ccbb ("x86: remove the use of vm86_mode()") it is unused. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit f164d498810560322c9f3a3f801eace6ebc6c9e1 Author: Feng Wu <feng.wu@xxxxxxxxx> Date: Wed Aug 31 18:13:47 2016 +0200 passthrough: fix a BUG_ON issue The 'idx' can equal to the max number of vCPUs, fix it. Signed-off-by: Feng Wu <feng.wu@xxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit db6c2264e6982a027e806d87f7cffc3ffa30405d Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Wed Aug 31 16:26:52 2016 +0100 xen: add a gcov Kconfig option Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx> commit dcf22aa0dc08c0414fa31a20db8d054711e45961 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Wed Aug 31 16:26:51 2016 +0100 xen: fix gcov compilation Currently enabling gcov in hypervisor won't build because although 26c9d03d ("gcov: Adding support for coverage information") claimed that %.init.o files were excluded from applying compilation options, it was in fact not true. Fix that by filtering out the options correctly. Because the dependency of stub.o in x86 EFI build can't be eliminated easily and we prefer a generalised method going forward, we introduce nogcov-y to explicitly mark objects that don't need to build with gcov support. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Signed-off-by: Jan Beulich <JBeulich@xxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> commit 0ebbfa4f69cf7bd98ffd50ab35fabf9b36f2deab Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Wed Aug 31 16:26:50 2016 +0100 arm64: use "b" to branch to start_xen The cbz instruction has range limitation. When compiled with gcov support the object is larger so cbz can't handle that anymore. The error message is like: aarch64-linux-gnu-ld -EL -T xen.lds -N prelink.o \ /local/work/xen.git/xen/common/symbols-dummy.o -o /local/work/xen.git/xen/.xen-syms.0 prelink.o: In function `launch': /local/work/xen.git/xen/arch/arm/arm64/head.S:602:(.text+0x408): relocation truncated to fit: R_AARCH64_CONDBR19 against symbol `start_xen' defined in .init.text section in prelink.o Use "b" instead. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit 8b53aa66e6f17ee208f2f6b65c473ca907f057d0 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Wed Aug 31 16:26:49 2016 +0100 arm: acpi/boot.c is only used during initialisation That file should contain code and data used during initialisation only. Mark it as such in build system and correctly annotate enabled_cpus. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |