[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.1-testing test] 7685: regressions - trouble: blocked/broken/fail/pass/running



flight 7685 xen-4.1-testing running [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/7685/

Regressions :-(

Tests which did not succeed and are blocking:
 test-i386-i386-pair           3 host-install/src_host(3)     running
 test-i386-i386-pair           4 host-install/dst_host(4)     running
 build-amd64-oldkern           3 host-build-prep            fail REGR. vs. 7679
 build-amd64-pvops             3 host-build-prep            fail REGR. vs. 7679
 build-i386-xcpkern            3 host-build-prep            fail REGR. vs. 7679
 test-i386-i386-xl-win         7 windows-install              running
 build-i386-oldkern            3 host-build-prep            fail REGR. vs. 7679

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-xcpkern-i386-xl-multivcpu  1 xen-build-check(1)         blocked n/a
 test-amd64-amd64-pv           1 xen-build-check(1)           blocked  n/a
 test-amd64-xcpkern-i386-pv    1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-pv     1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl           1 xen-build-check(1)           blocked  n/a
 test-amd64-xcpkern-i386-xl    1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-xl     1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-pair         1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-intel 12 guest-localmigrate/x10       fail  like 7679
 test-amd64-xcpkern-i386-rhel6hvm-intel  1 xen-build-check(1)       blocked n/a
 test-amd64-i386-rhel6hvm-amd  8 guest-saverestore            fail    like 7651
 test-amd64-xcpkern-i386-rhel6hvm-amd  1 xen-build-check(1)         blocked n/a
 test-amd64-xcpkern-i386-pair  1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-pair   1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-xcpkern-i386-xl-credit2  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-amd64-win          1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win       1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-win    1 xen-build-check(1)           blocked  n/a
 test-amd64-xcpkern-i386-xl-win  1 xen-build-check(1)           blocked  n/a
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-amd64-xcpkern-i386-win   1 xen-build-check(1)           blocked  n/a

version targeted for testing:
 xen                  eab9c077003c
baseline version:
 xen                  9b5fbd8ff152

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Fabio Fantoni <fabio.fantoni@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Li Xin <xin.li@xxxxxxxxx>
  Shan Haitao <haitao.shan@xxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
  Yang Wei <wei.y.yang@xxxxxxxxx>
  Yang, Wei <wei.y.yang@xxxxxxxxx>
------------------------------------------------------------

jobs:
 build-i386-xcpkern                                           broken  
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          broken  
 build-i386-oldkern                                           broken  
 build-amd64-pvops                                            broken  
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          blocked 
 test-amd64-i386-xl                                           pass    
 test-i386-i386-xl                                            pass    
 test-amd64-xcpkern-i386-xl                                   blocked 
 test-i386-xcpkern-i386-xl                                    blocked 
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-xcpkern-i386-rhel6hvm-amd                         blocked 
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-xcpkern-i386-xl-credit2                           blocked 
 test-amd64-i386-rhel6hvm-intel                               fail    
 test-amd64-xcpkern-i386-rhel6hvm-intel                       blocked 
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-xcpkern-i386-xl-multivcpu                         blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          running 
 test-amd64-xcpkern-i386-pair                                 blocked 
 test-i386-xcpkern-i386-pair                                  blocked 
 test-amd64-amd64-pv                                          blocked 
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-xcpkern-i386-pv                                   blocked 
 test-i386-xcpkern-i386-pv                                    blocked 
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-amd64-win                                         blocked 
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-xcpkern-i386-win                                  blocked 
 test-i386-xcpkern-i386-win                                   blocked 
 test-amd64-amd64-xl-win                                      blocked 
 test-i386-i386-xl-win                                        running 
 test-amd64-xcpkern-i386-xl-win                               blocked 


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23095:eab9c077003c
tag:         tip
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Jun 23 12:03:13 2011 +0100
    
    xen-detect: Fix cpuid asm for 32-bit PIC compilation.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23553:eca057e4475c
    xen-unstable date:        Fri Jun 17 08:08:13 2011 +0100
    
    
changeset:   23094:61dbf453167e
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Jun 23 12:02:54 2011 +0100
    
    tasklets: Switch a few tasklets to run in softirq context.
    
    There are a couple of others which may also be safe. I've converted
    only the most obvious one.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23552:7b4a45a4075d
    xen-unstable date:        Thu Jun 16 16:57:22 2011 +0100
    
    
changeset:   23093:37764332b378
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Jun 23 12:02:33 2011 +0100
    
    tasklets: Allow tasklets to be created that run in softirq context.
    
    Where this is safe, it can reduce latency and cpu overhead compared
    with scheduling the idle vcpu to perform the same tasklet work.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23551:3ff057cbb16b
    xen-unstable date:        Thu Jun 16 16:56:31 2011 +0100
    
    
changeset:   23092:0f2b9b6c5a74
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Thu Jun 23 12:01:58 2011 +0100
    
    pv-on-hvm: hvm_domain_use_pirq return positive no matter if the evtchn is 
bound
    
    This patch fixes PV on HVM interrupt remapping with recent Linux
    kernels and upstream qemu.  hvm_domain_use_pirq should return positive
    even if the evtchn is not currently bound. If it doesn't assert_irq
    ends up injecting legacy interrupts even after the guest disabled the
    irq.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    xen-unstable changeset:   23550:fb5f0febeddc
    xen-unstable date:        Thu Jun 16 16:17:35 2011 +0100
    
    
changeset:   23091:8ddcd2dd21f3
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Jun 23 12:01:11 2011 +0100
    
    Protect xen/stdarg.h for multiple inclusion.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23549:a574bf2f5059
    xen-unstable date:        Thu Jun 16 16:14:51 2011 +0100
    
    
changeset:   23090:896a9aea8b99
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Jun 23 11:59:45 2011 +0100
    
    x86: Backport CPUID feature passthroughs from xen-unstable
    
    Enable RDWRGSFS feature support for HVM guests
    
    Write/read FS/GS base instructions enable user level code to
    read/write FS & GS segment base registers for thread local storage.
    
    Signed-off-by: Yang, Wei <wei.y.yang@xxxxxxxxx>
    xen-unstable changeset:   23539:8c75f35d55f6
    xen-unstable date:        Wed Jun 15 16:06:48 2011 +0100
    
    x86: Pass through ERMS CPUID feature for HVM and PV guests
    
    This patch exposes ERMS feature to HVM and PV guests.
    
    The REP MOVSB/STOSB instruction can enhance fast strings attempts to
    move as much of the data with larger size load/stores as possible.
    
    Signed-off-by: Yang, Wei <wei.y.yang@xxxxxxxxx>
    xen-unstable changeset:   23516:f4a47275aebf
    xen-unstable date:        Tue Jun 14 13:13:18 2011 +0100
    
    x86/hvm: Make DRNG feature visible in CPUID
    
    This patch exposes DRNG feature to HVM guests.
    
    The RDRAND instruction can provide software with sequences of
    random numbers generated from white noise.
    
    Signed-off-by: Yang, Wei <wei.y.yang@xxxxxxxxx>
    xen-unstable changeset:   23510:864a3dd1d9b4
    xen-unstable date:        Tue Jun 14 12:44:48 2011 +0100
    
    
changeset:   23089:0300d7f10d42
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Jun 23 11:54:53 2011 +0100
    
    x86/hvm: add SMEP support to HVM guest
    
    Intel new CPU supports SMEP (Supervisor Mode Execution
    Protection). SMEP
    prevents software operating with CPL < 3 (supervisor mode) from
    fetching
    instructions from any linear address with a valid translation for
    which the U/S
    flag (bit 2) is 1 in every paging-structure entry controlling the
    translation
    for the linear address.
    
    This patch adds SMEP support to HVM guest.
    
    Signed-off-by: Yang Wei <wei.y.yang@xxxxxxxxx>
    Signed-off-by: Shan Haitao <haitao.shan@xxxxxxxxx>
    Signed-off-by: Li Xin <xin.li@xxxxxxxxx>
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    xen-unstable changeset:   23504:c34604d5a293
    xen-unstable date:        Mon Jun 06 13:46:48 2011 +0100
    
    
changeset:   23088:37ba0319e2cf
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Jun 23 11:51:49 2011 +0100
    
    x86: Enable Supervisor Mode Execution Protection (SMEP)
    
    Intel new CPU supports SMEP (Supervisor Mode Execution
    Protection). SMEP prevents software operating with CPL < 3 (supervisor
    mode) from fetching instructions from any linear address with a valid
    translation for which the U/S flag (bit 2) is 1 in every
    paging-structure entry controlling the translation for the linear
    address.
    
    This patch enables SMEP in Xen to protect Xen hypervisor from
    executing pv guest instructions, whose translation paging-structure
    entries' U/S flags are all set.
    
    Signed-off-by: Yang Wei <wei.y.yang@xxxxxxxxx>
    Signed-off-by: Shan Haitao <haitao.shan@xxxxxxxxx>
    Signed-off-by: Li Xin <xin.li@xxxxxxxxx>
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23481:0c0884fd8b49
    xen-unstable date:        Fri Jun 03 21:39:00 2011 +0100
    
    
changeset:   23087:7e3ba7554d24
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Jun 23 11:48:18 2011 +0100
    
    kexec: Backport fixes from xen-unstable
    
    KEXEC: prevent panic on the kexec path when talking to the DMAR
    hardware
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    xen-unstable changeset:   23547:b5955b9fc26c
    xen-unstable date:        Thu Jun 16 16:11:13 2011 +0100
    
    KEXEC: correctly revert x2apic state when kexecing
    
    Introduce the boolean variable 'kexecing' which indicates to functions
    whether we are on the kexec path or not.  This is used by
    disable_local_APIC() to try and revert the APIC mode back to how it
    was found on boot.
    
    We also need some fudging of the x2apic_enabled variable.  It is used
    in multiple places over the codebase to mean multiple things,
    including:
        What did the user specifify on the command line?
        Did the BIOS boot me in x2apic mode?
        Is the BSP Local APIC in x2apic mode?
        What mode is my Local APIC in?
    
    Therefore, set it up to prevent a protection fault when disabling the
    IOAPICs.  (In this case, it is used in the "What mode is my Local APIC
    in?" case, so the processor doesnt suffer a protection fault because
    of trying to use x2apic MSRs when it should be using xapic MMIO)
    
    Finally, make sure that interrupts are disabled when jumping into the
    purgatory code.  It would be bad to service interrupts in the Xen
    context when the next kernel is booting.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    xen-unstable changeset:   23542:23c068b10923
    xen-unstable date:        Wed Jun 15 16:16:41 2011 +0100
    
    IOMMU: add crash_shutdown iommu_op
    
    The kdump kernel has problems booting with interrupt/dma
    remapping enabled, so we need a new iommu_ops called
    crash_shutdown which is basically suspend but doesn't
    need to bother saving state.
    
    Make sure that crash_shutdown is called on the kexec
    path.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    xen-unstable changeset:   23541:c6307ddd3ab1
    xen-unstable date:        Wed Jun 15 16:10:11 2011 +0100
    
    IOMMU VTD BUG: disable Extended Interrupt Mode when disabling Interupt
    Remapping
    
    Experimental evidence shows that Extended Interrupt Mode remains in
    effect even after Interrupt Remapping is disabled in each DMAR Global
    Command Register.  A consiquence of this is that when we switch from
    x2apic mode back to xapic mode, and disable interrupt remapping for
    the kdump kernel, interrupts passing through the IO APICs are in
    x2apic format as opposed xapic.  This causes a triple fault in the
    kexec kernel.
    
    As EIM is explicitly set up each time Interrup Remapping is enabled,
    it is safe for us to clobber this when taring down.
    
    Also, change the header definition of IRTA_REG_EIME_SHIFT.  It caused
    verbose and error-prone code, and was only used in 1 place before.  We
    now have IRTA_EIME which is the specific bit in the register.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    xen-unstable changeset:   23540:96f53d2b966e
    xen-unstable date:        Wed Jun 15 16:07:45 2011 +0100
    
    IOMMU VTD BUG: disable Extended Interrupt Mode when disabling
    Interrupt Remapping
    
    Experimental evidence shows that Extended Interrupt Mode remains in
    effect even after Interrupt Remapping is disabled in each DMAR Global
    Command Register.  A consiquence of this is that when we switch from
    x2apic mode back to xapic mode, and disable interrupt remapping for
    the kdump kernel, interrupts passing through the IO APICs are in
    x2apic format as opposed xapic.  This causes a triple fault in the
    kexec kernel.
    
    As EIM is explicitly set up each time Interrup Remapping is enabled,
    it is safe for us to clobber this when taring down.
    
    Also, change the header definition of IRTA_REG_EIME_SHIFT.  It caused
    verbose and error-prone code, and was only used in 1 place before.  We
    now have IRTA_EIME which is the specific bit in the register.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    xen-unstable changeset:   23515:337520d94cba
    xen-unstable date:        Tue Jun 14 13:04:09 2011 +0100
    
    
    x86/apic: record local APIC state on boot
    
    Xen does not store the boot local APIC state which leads to problems
    when shutting down for a kexec jump.  This patch records the boot
    state so we can return to the boot state when kexecing.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxxxx>
    xen-unstable changeset:   23514:d04608ad70f8
    xen-unstable date:        Tue Jun 14 13:02:00 2011 +0100
    
    
    x86/kexec: nmi_shootdown_cpus() should leave irqs disabled
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23513:595a0c0804a9
    xen-unstable date:        Tue Jun 14 12:49:41 2011 +0100
    
    
changeset:   23086:9b5fbd8ff152
user:        Fabio Fantoni <fabio.fantoni@xxxxxxxxxx>
date:        Tue Jun 21 18:21:10 2011 +0100
    
    tools/hotplug/Linux: start all xen daemons in runlevel 2
    
    Signed-off-by: Fabio Fantoni <fabio.fantoni@xxxxxxxxxx>
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.