[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 13963: regressions - FAIL

flight 13963 xen-unstable real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-win       7 windows-install           fail REGR. vs. 13962

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf-pin 10 guest-saverestore            fail   like 13962
 test-amd64-amd64-xl-sedf      5 xen-boot                     fail   like 13962
 test-amd64-amd64-xl-qemuu-winxpsp3  9 guest-localmigrate       fail like 13962
 test-amd64-amd64-xl-qemuu-win7-amd64  9 guest-localmigrate     fail like 13962

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass

version targeted for testing:
 xen                  14e32621dbaf
baseline version:
 xen                  e0e1350dfe9b

People who touched revisions under test:
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jacob Shin <jacob.shin@xxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Wei Wang <wei.wang2@xxxxxxx>

 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 fail    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-amd64-amd64-xl-win                                      fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

changeset:   26055:14e32621dbaf
tag:         tip
user:        Jacob Shin <jacob.shin@xxxxxxx>
date:        Mon Oct 15 15:04:51 2012 +0200
    x86/xenoprof: fix kernel/user mode detection for HVM
    While trying oprofile under Xen, I noticed that HVM passive domain's
    kernel addresses were showing up as user application. It turns out
    under HVM get_cpu_user_regs()->cs contains 0x0000beef.
    Signed-off-by: Jacob Shin <jacob.shin@xxxxxxx>
    Don't cast away const-ness. Use SS instead of CS to determine ring.
    Special-case real and protected mode.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    Committed-by: Jan Beulich <jbeulich@xxxxxxxx>
changeset:   26054:983108e1b56b
user:        Wei Wang <wei.wang2@xxxxxxx>
date:        Mon Oct 15 15:03:36 2012 +0200
    x86/amd: Fix xen_apic_write warnings in Dom0
    [    0.020294] ------------[ cut here ]------------
    [    0.020311] WARNING: at arch/x86/xen/enlighten.c:730
    [    0.020318] Hardware name: empty
    [    0.020323] Modules linked in:
    [    0.020334] Pid: 1, comm: swapper/0 Not tainted 3.3.8 #7
    [    0.020340] Call Trace:
    [    0.020354]  [<ffffffff81050379>] warn_slowpath_common+0x80/0x98
    [    0.020369]  [<ffffffff810503a6>] warn_slowpath_null+0x15/0x17
    [    0.020378]  [<ffffffff810034df>] xen_apic_write+0x15/0x17
    [    0.020392]  [<ffffffff8101cb2b>] perf_events_lapic_init+0x2e/0x30
    [    0.020410]  [<ffffffff81ee4dd0>] init_hw_perf_events+0x250/0x407
    [    0.020419]  [<ffffffff81ee4b80>] ? check_bugs+0x2d/0x2d
    [    0.020430]  [<ffffffff81002181>] do_one_initcall+0x7a/0x131
    [    0.020444]  [<ffffffff81edbbf9>] kernel_init+0x91/0x15d
    [    0.020456]  [<ffffffff817caaa4>] kernel_thread_helper+0x4/0x10
    [    0.020471]  [<ffffffff817c347c>] ? retint_restore_args+0x5/0x6
    [    0.020481]  [<ffffffff817caaa0>] ? gs_change+0x13/0x13
    [    0.020500] ---[ end trace a7919e7f17c0a725 ]---
    Kernel function check_hw_exists() writes 0xabcd to msr 0xc0010201 
(Performance Event
    Counter 0) and read it again to check if it is running as dom0. Early amd 
cpus does
    not reset perf counters during warm reboot. If the kernel is booted with 
bare metal
    and then as a dom0, the content of msr 0xc0010201 will stay and the 
checking will
    pass and PMU will be enabled unexpectedly.
    Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>
    Don't reset the counters when used for the NMI watchdog.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    Committed-by: Jan Beulich <jbeulich@xxxxxxxx>
changeset:   26053:137dfbd3190e
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Mon Oct 15 12:59:14 2012 +0200
    AMD IOMMU: fix find_iommu_from_bdf_cap()
    The arguments passed for the "cap_offset" parameter get read from 16-
    bit fields, so the parameter should also have (at least) 16 bits.
    While fixing this I also noticed that this was yet another case where
    PCI segment information wasn't properly propagated, so a respective
    first parameter gets added to the function at once.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Wei Wang <wei.wang2@xxxxxxx>
changeset:   26052:e0e1350dfe9b
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Thu Oct 11 15:57:00 2012 +0100
    arm: mark heap and frametable limits as read mostly
    These are used in virt_to_page and page_to_virt so I imagine there's
    some small benefit to this (but I've not measured)
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.