[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.1-testing test] 7685: regressions - trouble: blocked/broken/fail/pass/running
flight 7685 xen-4.1-testing running [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/7685/ Regressions :-( Tests which did not succeed and are blocking: test-i386-i386-pair 3 host-install/src_host(3) running test-i386-i386-pair 4 host-install/dst_host(4) running build-amd64-oldkern 3 host-build-prep fail REGR. vs. 7679 build-amd64-pvops 3 host-build-prep fail REGR. vs. 7679 build-i386-xcpkern 3 host-build-prep fail REGR. vs. 7679 test-i386-i386-xl-win 7 windows-install running build-i386-oldkern 3 host-build-prep fail REGR. vs. 7679 Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-xcpkern-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a test-amd64-amd64-pv 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-pv 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pv 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-xl 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-xl 1 xen-build-check(1) blocked n/a test-amd64-amd64-pair 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-intel 12 guest-localmigrate/x10 fail like 7679 test-amd64-xcpkern-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-amd 8 guest-saverestore fail like 7651 test-amd64-xcpkern-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-pair 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pair 1 xen-build-check(1) blocked n/a test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass test-amd64-i386-xl-win-vcpus1 13 guest-stop fail never pass test-amd64-xcpkern-i386-xl-credit2 1 xen-build-check(1) blocked n/a test-amd64-i386-win 16 leak-check/check fail never pass test-amd64-amd64-win 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-win 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-win 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-xl-win 1 xen-build-check(1) blocked n/a test-i386-i386-win 16 leak-check/check fail never pass test-amd64-xcpkern-i386-win 1 xen-build-check(1) blocked n/a version targeted for testing: xen eab9c077003c baseline version: xen 9b5fbd8ff152 ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Fabio Fantoni <fabio.fantoni@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxxxx> Keir Fraser <keir@xxxxxxx> Li Xin <xin.li@xxxxxxxxx> Shan Haitao <haitao.shan@xxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Tim Deegan <Tim.Deegan@xxxxxxxxxx> Yang Wei <wei.y.yang@xxxxxxxxx> Yang, Wei <wei.y.yang@xxxxxxxxx> ------------------------------------------------------------ jobs: build-i386-xcpkern broken build-amd64 pass build-i386 pass build-amd64-oldkern broken build-i386-oldkern broken build-amd64-pvops broken build-i386-pvops pass test-amd64-amd64-xl blocked test-amd64-i386-xl pass test-i386-i386-xl pass test-amd64-xcpkern-i386-xl blocked test-i386-xcpkern-i386-xl blocked test-amd64-i386-rhel6hvm-amd fail test-amd64-xcpkern-i386-rhel6hvm-amd blocked test-amd64-i386-xl-credit2 pass test-amd64-xcpkern-i386-xl-credit2 blocked test-amd64-i386-rhel6hvm-intel fail test-amd64-xcpkern-i386-rhel6hvm-intel blocked test-amd64-i386-xl-multivcpu pass test-amd64-xcpkern-i386-xl-multivcpu blocked test-amd64-amd64-pair blocked test-amd64-i386-pair pass test-i386-i386-pair running test-amd64-xcpkern-i386-pair blocked test-i386-xcpkern-i386-pair blocked test-amd64-amd64-pv blocked test-amd64-i386-pv pass test-i386-i386-pv pass test-amd64-xcpkern-i386-pv blocked test-i386-xcpkern-i386-pv blocked test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-amd64-win blocked test-amd64-i386-win fail test-i386-i386-win fail test-amd64-xcpkern-i386-win blocked test-i386-xcpkern-i386-win blocked test-amd64-amd64-xl-win blocked test-i386-i386-xl-win running test-amd64-xcpkern-i386-xl-win blocked ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 23095:eab9c077003c tag: tip user: Keir Fraser <keir@xxxxxxx> date: Thu Jun 23 12:03:13 2011 +0100 xen-detect: Fix cpuid asm for 32-bit PIC compilation. Signed-off-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23553:eca057e4475c xen-unstable date: Fri Jun 17 08:08:13 2011 +0100 changeset: 23094:61dbf453167e user: Keir Fraser <keir@xxxxxxx> date: Thu Jun 23 12:02:54 2011 +0100 tasklets: Switch a few tasklets to run in softirq context. There are a couple of others which may also be safe. I've converted only the most obvious one. Signed-off-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23552:7b4a45a4075d xen-unstable date: Thu Jun 16 16:57:22 2011 +0100 changeset: 23093:37764332b378 user: Keir Fraser <keir@xxxxxxx> date: Thu Jun 23 12:02:33 2011 +0100 tasklets: Allow tasklets to be created that run in softirq context. Where this is safe, it can reduce latency and cpu overhead compared with scheduling the idle vcpu to perform the same tasklet work. Signed-off-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23551:3ff057cbb16b xen-unstable date: Thu Jun 16 16:56:31 2011 +0100 changeset: 23092:0f2b9b6c5a74 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Thu Jun 23 12:01:58 2011 +0100 pv-on-hvm: hvm_domain_use_pirq return positive no matter if the evtchn is bound This patch fixes PV on HVM interrupt remapping with recent Linux kernels and upstream qemu. hvm_domain_use_pirq should return positive even if the evtchn is not currently bound. If it doesn't assert_irq ends up injecting legacy interrupts even after the guest disabled the irq. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> xen-unstable changeset: 23550:fb5f0febeddc xen-unstable date: Thu Jun 16 16:17:35 2011 +0100 changeset: 23091:8ddcd2dd21f3 user: Keir Fraser <keir@xxxxxxx> date: Thu Jun 23 12:01:11 2011 +0100 Protect xen/stdarg.h for multiple inclusion. Signed-off-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23549:a574bf2f5059 xen-unstable date: Thu Jun 16 16:14:51 2011 +0100 changeset: 23090:896a9aea8b99 user: Keir Fraser <keir@xxxxxxx> date: Thu Jun 23 11:59:45 2011 +0100 x86: Backport CPUID feature passthroughs from xen-unstable Enable RDWRGSFS feature support for HVM guests Write/read FS/GS base instructions enable user level code to read/write FS & GS segment base registers for thread local storage. Signed-off-by: Yang, Wei <wei.y.yang@xxxxxxxxx> xen-unstable changeset: 23539:8c75f35d55f6 xen-unstable date: Wed Jun 15 16:06:48 2011 +0100 x86: Pass through ERMS CPUID feature for HVM and PV guests This patch exposes ERMS feature to HVM and PV guests. The REP MOVSB/STOSB instruction can enhance fast strings attempts to move as much of the data with larger size load/stores as possible. Signed-off-by: Yang, Wei <wei.y.yang@xxxxxxxxx> xen-unstable changeset: 23516:f4a47275aebf xen-unstable date: Tue Jun 14 13:13:18 2011 +0100 x86/hvm: Make DRNG feature visible in CPUID This patch exposes DRNG feature to HVM guests. The RDRAND instruction can provide software with sequences of random numbers generated from white noise. Signed-off-by: Yang, Wei <wei.y.yang@xxxxxxxxx> xen-unstable changeset: 23510:864a3dd1d9b4 xen-unstable date: Tue Jun 14 12:44:48 2011 +0100 changeset: 23089:0300d7f10d42 user: Keir Fraser <keir@xxxxxxx> date: Thu Jun 23 11:54:53 2011 +0100 x86/hvm: add SMEP support to HVM guest Intel new CPU supports SMEP (Supervisor Mode Execution Protection). SMEP prevents software operating with CPL < 3 (supervisor mode) from fetching instructions from any linear address with a valid translation for which the U/S flag (bit 2) is 1 in every paging-structure entry controlling the translation for the linear address. This patch adds SMEP support to HVM guest. Signed-off-by: Yang Wei <wei.y.yang@xxxxxxxxx> Signed-off-by: Shan Haitao <haitao.shan@xxxxxxxxx> Signed-off-by: Li Xin <xin.li@xxxxxxxxx> Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> xen-unstable changeset: 23504:c34604d5a293 xen-unstable date: Mon Jun 06 13:46:48 2011 +0100 changeset: 23088:37ba0319e2cf user: Keir Fraser <keir@xxxxxxx> date: Thu Jun 23 11:51:49 2011 +0100 x86: Enable Supervisor Mode Execution Protection (SMEP) Intel new CPU supports SMEP (Supervisor Mode Execution Protection). SMEP prevents software operating with CPL < 3 (supervisor mode) from fetching instructions from any linear address with a valid translation for which the U/S flag (bit 2) is 1 in every paging-structure entry controlling the translation for the linear address. This patch enables SMEP in Xen to protect Xen hypervisor from executing pv guest instructions, whose translation paging-structure entries' U/S flags are all set. Signed-off-by: Yang Wei <wei.y.yang@xxxxxxxxx> Signed-off-by: Shan Haitao <haitao.shan@xxxxxxxxx> Signed-off-by: Li Xin <xin.li@xxxxxxxxx> Signed-off-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23481:0c0884fd8b49 xen-unstable date: Fri Jun 03 21:39:00 2011 +0100 changeset: 23087:7e3ba7554d24 user: Keir Fraser <keir@xxxxxxx> date: Thu Jun 23 11:48:18 2011 +0100 kexec: Backport fixes from xen-unstable KEXEC: prevent panic on the kexec path when talking to the DMAR hardware Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> xen-unstable changeset: 23547:b5955b9fc26c xen-unstable date: Thu Jun 16 16:11:13 2011 +0100 KEXEC: correctly revert x2apic state when kexecing Introduce the boolean variable 'kexecing' which indicates to functions whether we are on the kexec path or not. This is used by disable_local_APIC() to try and revert the APIC mode back to how it was found on boot. We also need some fudging of the x2apic_enabled variable. It is used in multiple places over the codebase to mean multiple things, including: What did the user specifify on the command line? Did the BIOS boot me in x2apic mode? Is the BSP Local APIC in x2apic mode? What mode is my Local APIC in? Therefore, set it up to prevent a protection fault when disabling the IOAPICs. (In this case, it is used in the "What mode is my Local APIC in?" case, so the processor doesnt suffer a protection fault because of trying to use x2apic MSRs when it should be using xapic MMIO) Finally, make sure that interrupts are disabled when jumping into the purgatory code. It would be bad to service interrupts in the Xen context when the next kernel is booting. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> xen-unstable changeset: 23542:23c068b10923 xen-unstable date: Wed Jun 15 16:16:41 2011 +0100 IOMMU: add crash_shutdown iommu_op The kdump kernel has problems booting with interrupt/dma remapping enabled, so we need a new iommu_ops called crash_shutdown which is basically suspend but doesn't need to bother saving state. Make sure that crash_shutdown is called on the kexec path. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> xen-unstable changeset: 23541:c6307ddd3ab1 xen-unstable date: Wed Jun 15 16:10:11 2011 +0100 IOMMU VTD BUG: disable Extended Interrupt Mode when disabling Interupt Remapping Experimental evidence shows that Extended Interrupt Mode remains in effect even after Interrupt Remapping is disabled in each DMAR Global Command Register. A consiquence of this is that when we switch from x2apic mode back to xapic mode, and disable interrupt remapping for the kdump kernel, interrupts passing through the IO APICs are in x2apic format as opposed xapic. This causes a triple fault in the kexec kernel. As EIM is explicitly set up each time Interrup Remapping is enabled, it is safe for us to clobber this when taring down. Also, change the header definition of IRTA_REG_EIME_SHIFT. It caused verbose and error-prone code, and was only used in 1 place before. We now have IRTA_EIME which is the specific bit in the register. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> xen-unstable changeset: 23540:96f53d2b966e xen-unstable date: Wed Jun 15 16:07:45 2011 +0100 IOMMU VTD BUG: disable Extended Interrupt Mode when disabling Interrupt Remapping Experimental evidence shows that Extended Interrupt Mode remains in effect even after Interrupt Remapping is disabled in each DMAR Global Command Register. A consiquence of this is that when we switch from x2apic mode back to xapic mode, and disable interrupt remapping for the kdump kernel, interrupts passing through the IO APICs are in x2apic format as opposed xapic. This causes a triple fault in the kexec kernel. As EIM is explicitly set up each time Interrup Remapping is enabled, it is safe for us to clobber this when taring down. Also, change the header definition of IRTA_REG_EIME_SHIFT. It caused verbose and error-prone code, and was only used in 1 place before. We now have IRTA_EIME which is the specific bit in the register. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> xen-unstable changeset: 23515:337520d94cba xen-unstable date: Tue Jun 14 13:04:09 2011 +0100 x86/apic: record local APIC state on boot Xen does not store the boot local APIC state which leads to problems when shutting down for a kexec jump. This patch records the boot state so we can return to the boot state when kexecing. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Signed-off-by: Keir Fraser <keir@xxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxxxx> xen-unstable changeset: 23514:d04608ad70f8 xen-unstable date: Tue Jun 14 13:02:00 2011 +0100 x86/kexec: nmi_shootdown_cpus() should leave irqs disabled Signed-off-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23513:595a0c0804a9 xen-unstable date: Tue Jun 14 12:49:41 2011 +0100 changeset: 23086:9b5fbd8ff152 user: Fabio Fantoni <fabio.fantoni@xxxxxxxxxx> date: Tue Jun 21 18:21:10 2011 +0100 tools/hotplug/Linux: start all xen daemons in runlevel 2 Signed-off-by: Fabio Fantoni <fabio.fantoni@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |