[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 13964: regressions - FAIL



flight 13964 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/13964/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-pvops              4 kernel-build              fail REGR. vs. 13962
 build-i386-oldkern            4 xen-build                 fail REGR. vs. 13962
 build-i386                    4 xen-build                 fail REGR. vs. 13962

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf-pin 10 guest-saverestore            fail   like 13962
 test-amd64-amd64-xl-sedf      5 xen-boot                     fail   like 13962
 test-amd64-amd64-xl-qemuu-winxpsp3  9 guest-localmigrate       fail like 13962
 test-amd64-amd64-xl-qemuu-win7-amd64  9 guest-localmigrate     fail like 13962

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-qemuu-rhel6hvm-amd  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-xl            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-amd  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 xen-build-check(1)         blocked n/a
 test-amd64-i386-xend-winxpsp3  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-win-vcpus1  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-i386-pv            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-multivcpu  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win-vcpus1    1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-i386-rhel6hvm-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-win7-amd64  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-xl-credit2    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pair          1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass

version targeted for testing:
 xen                  c1c549c4fe9e
baseline version:
 xen                  e0e1350dfe9b

------------------------------------------------------------
People who touched revisions under test:
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jacob Shin <jacob.shin@xxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Wei Wang <wei.wang2@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   fail    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           fail    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             fail    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           blocked 
 test-amd64-i386-rhel6hvm-amd                                 blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                blocked 
 test-amd64-i386-xl-credit2                                   blocked 
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-i386-xl-multivcpu                                 blocked 
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-xl-sedf-pin                                 fail    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           blocked 
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-win-vcpus1                                   blocked 
 test-amd64-i386-xl-win-vcpus1                                blocked 
 test-amd64-i386-xl-winxpsp3-vcpus1                           blocked 
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          blocked 
 test-amd64-amd64-xl-win                                      fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                blocked 
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   26059:c1c549c4fe9e
tag:         tip
user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
date:        Mon Oct 15 16:51:44 2012 +0100
    
    xen: Add versions of rcu_lock_*_domain without IS_PRIV
    
    These functions will be used to avoid duplication of IS_PRIV calls
    that will be introduced in XSM hooks. This also fixes a build error
    with XSM enabled introduced by 25925:d1c3375c3f11 which depends on
    this patch.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Committed-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   26058:37bb894121c7
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Mon Oct 15 17:41:39 2012 +0200
    
    IOMMU: remove vendor specific bits from generic code
    
    - names of functions used independent of vendor should not have vendor
      specific names
    - vendor specific declarations should not live inn generic headers
    - other vendor specific items should not be used in generic code
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   26057:2e8a6c8fa89c
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Mon Oct 15 17:39:32 2012 +0200
    
    VT-d: drop bogus checks
    
    There were a number of cases where an "iommu" retrieved got passed to
    another function before being NULL-checked. While this by itself was
    not a problem as the called function did the checks, it is confusing to
    the reader and redundant in several cases (particularly with NULL-
    checking the return value of iommu_ir_ctrl()). Drop the redundant
    checks (also ones where the sole caller of a function did the checking
    already), and at once make the three similar functions proper inline
    instead of extern ones (they were prototyped in the wrong header file
    anyway, so would have needed touching sooner or later).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   26056:177fdda0be56
user:        Keir Fraser <keir@xxxxxxx>
date:        Mon Oct 15 16:38:11 2012 +0100
    
    More efficient TLB-flush filtering in alloc_heap_pages().
    
    Rather than per-cpu filtering for every page in a super-page
    allocation, simply remember the most recent TLB timestamp across all
    allocated pages, and filter on that, just once, at the end of the
    function.
    
    For large-CPU systems, doing 2MB allocations during domain creation,
    this cuts down the domain creation time *massively*.
    
    TODO: It may make sense to move the filtering out into some callers,
    such as memory.c:populate_physmap() and
    memory.c:increase_reservation(), so that the filtering can be moved
    outside their loops, too.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   26055:14e32621dbaf
user:        Jacob Shin <jacob.shin@xxxxxxx>
date:        Mon Oct 15 15:04:51 2012 +0200
    
    x86/xenoprof: fix kernel/user mode detection for HVM
    
    While trying oprofile under Xen, I noticed that HVM passive domain's
    kernel addresses were showing up as user application. It turns out
    under HVM get_cpu_user_regs()->cs contains 0x0000beef.
    
    Signed-off-by: Jacob Shin <jacob.shin@xxxxxxx>
    
    Don't cast away const-ness. Use SS instead of CS to determine ring.
    Special-case real and protected mode.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    Committed-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   26054:983108e1b56b
user:        Wei Wang <wei.wang2@xxxxxxx>
date:        Mon Oct 15 15:03:36 2012 +0200
    
    x86/amd: Fix xen_apic_write warnings in Dom0
    
    [    0.020294] ------------[ cut here ]------------
    [    0.020311] WARNING: at arch/x86/xen/enlighten.c:730
    xen_apic_write+0x15/0x17()
    [    0.020318] Hardware name: empty
    [    0.020323] Modules linked in:
    [    0.020334] Pid: 1, comm: swapper/0 Not tainted 3.3.8 #7
    [    0.020340] Call Trace:
    [    0.020354]  [<ffffffff81050379>] warn_slowpath_common+0x80/0x98
    [    0.020369]  [<ffffffff810503a6>] warn_slowpath_null+0x15/0x17
    [    0.020378]  [<ffffffff810034df>] xen_apic_write+0x15/0x17
    [    0.020392]  [<ffffffff8101cb2b>] perf_events_lapic_init+0x2e/0x30
    [    0.020410]  [<ffffffff81ee4dd0>] init_hw_perf_events+0x250/0x407
    [    0.020419]  [<ffffffff81ee4b80>] ? check_bugs+0x2d/0x2d
    [    0.020430]  [<ffffffff81002181>] do_one_initcall+0x7a/0x131
    [    0.020444]  [<ffffffff81edbbf9>] kernel_init+0x91/0x15d
    [    0.020456]  [<ffffffff817caaa4>] kernel_thread_helper+0x4/0x10
    [    0.020471]  [<ffffffff817c347c>] ? retint_restore_args+0x5/0x6
    [    0.020481]  [<ffffffff817caaa0>] ? gs_change+0x13/0x13
    [    0.020500] ---[ end trace a7919e7f17c0a725 ]---
    
    Kernel function check_hw_exists() writes 0xabcd to msr 0xc0010201 
(Performance Event
    Counter 0) and read it again to check if it is running as dom0. Early amd 
cpus does
    not reset perf counters during warm reboot. If the kernel is booted with 
bare metal
    and then as a dom0, the content of msr 0xc0010201 will stay and the 
checking will
    pass and PMU will be enabled unexpectedly.
    
    Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>
    
    Don't reset the counters when used for the NMI watchdog.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    Committed-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   26053:137dfbd3190e
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Mon Oct 15 12:59:14 2012 +0200
    
    AMD IOMMU: fix find_iommu_from_bdf_cap()
    
    The arguments passed for the "cap_offset" parameter get read from 16-
    bit fields, so the parameter should also have (at least) 16 bits.
    
    While fixing this I also noticed that this was yet another case where
    PCI segment information wasn't properly propagated, so a respective
    first parameter gets added to the function at once.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Wei Wang <wei.wang2@xxxxxxx>
    
    
changeset:   26052:e0e1350dfe9b
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Thu Oct 11 15:57:00 2012 +0100
    
    arm: mark heap and frametable limits as read mostly
    
    These are used in virt_to_page and page_to_virt so I imagine there's
    some small benefit to this (but I've not measured)
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.