[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.2-testing test] 22242: regressions - trouble: broken/fail/pass
flight 22242 xen-4.2-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/22242/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-pvops 4 kernel-build fail in 22230 REGR. vs. 22161 build-amd64-oldkern 4 xen-build fail in 22230 REGR. vs. 22161 build-amd64 4 xen-build fail in 22230 REGR. vs. 22161 Tests which are failing intermittently (not blocking): test-i386-i386-xl 9 guest-start fail pass in 22230 test-amd64-amd64-pv 16 guest-start.2 fail pass in 22220 test-amd64-amd64-xl 5 xen-boot fail pass in 22220 test-i386-i386-pair 16 guest-start fail pass in 22230 test-i386-i386-xl-qemut-winxpsp3 3 host-install(3) broken pass in 22230 test-amd64-i386-xl-credit2 10 guest-saverestore fail in 22220 pass in 22242 test-amd64-i386-qemuu-freebsd10-i386 3 host-install(3) broken in 22220 pass in 22242 Regressions which are regarded as allowable (not blocking): test-amd64-i386-qemuu-freebsd10-amd64 3 host-install(3) broken in 22220 like 22149 Tests which did not succeed, but are not blocking: test-amd64-i386-qemuu-freebsd10-amd64 7 freebsd-install fail never pass test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-qemuu-freebsd10-i386 7 freebsd-install fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass test-i386-i386-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail never pass test-i386-i386-xl-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass test-amd64-i386-qemuu-freebsd10-amd64 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-xl-pcipt-intel 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-qemuu-rhel6hvm-intel 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-pv 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-xl-sedf-pin 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-qemut-rhel6hvm-intel 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-pv 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-qemuu-freebsd10-i386 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-xl 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-xl 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-qemut-rhel6hvm-amd 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-qemuu-rhel6hvm-amd 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-pair 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-xl-sedf 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-xl-winxpsp3-vcpus1 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-xl-qemut-win7-amd64 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-xl-qemut-win7-amd64 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-pair 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-xl-win7-amd64 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-xl-qemuu-win7-amd64 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-xend-winxpsp3 1 xen-build-check(1) blocked in 22230 n/a test-i386-i386-xl-qemut-winxpsp3 13 guest-stop fail in 22230 never pass test-amd64-amd64-xl-winxpsp3 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-xl-qemut-winxpsp3 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-xl-qemut-winxpsp3-vcpus1 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-xend-qemut-winxpsp3 1 xen-build-check(1) blocked in 22230 n/a test-amd64-amd64-xl-qemuu-winxpsp3 1 xen-build-check(1) blocked in 22230 n/a test-amd64-i386-xl-win7-amd64 1 xen-build-check(1) blocked in 22230 n/a version targeted for testing: xen a22a77f036da315b7cb7cefb4eef191e7cd9a247 baseline version: xen 420ff58052d22c6f49fb71949a9989256017caae ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Dario Faggioli <dario.faggioli@xxxxxxxxxx> David Vrabel <david.vrabel@xxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Keir Fraser <keir@xxxxxxx> Liu Jinsong <jinsong.liu@xxxxxxxxx> Nate Studer <nate.studer@xxxxxxxxxxxxxxx> Tomasz Wroblewski <tomasz.wroblewski@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl fail test-amd64-i386-xl pass test-i386-i386-xl fail test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-i386-qemuu-freebsd10-amd64 fail test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-i386-qemuu-freebsd10-i386 fail test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-i386-i386-pair fail test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv fail test-amd64-i386-pv pass test-i386-i386-pv pass test-amd64-amd64-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-i386-xend-qemut-winxpsp3 fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-i386-i386-xl-qemut-winxpsp3 broken test-amd64-amd64-xl-qemuu-winxpsp3 fail test-i386-i386-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail test-i386-i386-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit a22a77f036da315b7cb7cefb4eef191e7cd9a247 Author: Liu Jinsong <jinsong.liu@xxxxxxxxx> Date: Mon Dec 2 15:56:09 2013 +0100 x86/xsave: fix nonlazy state handling Nonlazy xstates should be xsaved each time when vcpu_save_fpu. Operation to nonlazy xstates will not trigger #NM exception, so whenever vcpu scheduled in it got restored and whenever scheduled out it should get saved. Currently this bug affects AMD LWP feature, and later Intel MPX feature. With the bugfix both LWP and MPX will work fine. Signed-off-by: Liu Jinsong <jinsong.liu@xxxxxxxxx> Furthermore, during restore we also need to set nonlazy_xstate_used according to the incoming accumulated XCR0. Also adjust the changes to i387.c such that there won't be a pointless clts()/stts() pair. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: 7d8b5dd98463524686bdee8b973b53c00c232122 master date: 2013-11-25 11:19:04 +0100 commit 122ce1427fd43143c3a2613cf77c4b04012a2f2b Author: David Vrabel <david.vrabel@xxxxxxxxxx> Date: Mon Dec 2 15:55:16 2013 +0100 x86/crash: disable the watchdog NMIs on the crashing cpu nmi_shootdown_cpus() is called during a crash to park all the other CPUs. This changes the NMI trap handlers which means there's no point in having the watchdog still running. This also disables the watchdog before executing any crash kexec image and prevents the image from receiving unexpected NMIs. Signed-off-by: David Vrabel <david.vrabel@xxxxxxxxxx> PVOps Linux as a kexec image shoots itself in the foot otherwise. On a Core2 system, Linux declares a firmware bug and tries to invert some bits in the performance counter register. It ends up setting the number of retired instructions to generate another NMI to fewer instructions than the NMI interrupt path itself, and ceases to make any useful progress. The call to disable_lapic_nmi_watchdog() must be this late into the kexec path to be sure that this cpu is the one which will execute the kexec image. Otherwise there are race conditions where the NMIs might be disabled on the wrong cpu, resulting in the kexec image still receiving NMIs. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> master commit: 2a16fcd5ba0244fef764886211452acc69c0ed00 master date: 2013-11-22 14:48:12 +0100 commit cbb45ac29ff24222b80209e580e01677315f8101 Author: Tomasz Wroblewski <tomasz.wroblewski@xxxxxxxxxx> Date: Mon Dec 2 15:54:42 2013 +0100 x86/hvm: reset TSC to 0 after domain resume from S3 Host S3 implicitly resets the host TSC to 0, but the tsc offset for hvm domains is not recalculated when they resume, causing it to go into negative values. In Linux guest using tsc clocksource, this results in a hang after wrap back to positive values since the tsc clocksource implementation expects it reset. Signed-off-by: Tomasz Wroblewski <tomasz.wroblewski@xxxxxxxxxx> master commit: e95dc6ba69daef6468b3ae5912710727244d6e2f master date: 2013-11-22 14:47:24 +0100 commit 9e7ee90d11b0ba078b051b8bb1fc1b04687c100b Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Dec 2 15:53:50 2013 +0100 x86: consider modules when cutting off memory The code in question runs after module ranges got already removed from the E820 table, so when determining the new maximum page/PDX we need to explicitly take them into account. Furthermore we need to round up the ending addresses here, in order to fully cover eventual partial trailing pages. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> master commit: a5db2c7aab7a638d84f22ac8fe5089d81175438b master date: 2013-11-18 13:57:20 +0100 commit f6d67d15969396f37a699e85e95bf84db28e3971 Author: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Date: Mon Dec 2 15:52:20 2013 +0100 fix leaking of v->cpu_affinity_saved on domain destruction Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: 6757efe1bf50ac7ff68fa4dd7d9333529f70ae9a master date: 2013-11-15 17:43:28 +0100 commit 88f72c707e9588c60a81cb8a917b0a2b1d5aa1a1 Author: Nate Studer <nate.studer@xxxxxxxxxxxxxxx> Date: Mon Dec 2 15:51:00 2013 +0100 credit: Update other parameters when setting tslice_ms Add a utility function to update the rest of the timeslice accounting fields when updating the timeslice of the credit scheduler, so that capped CPUs behave correctly. Before this patch changing the timeslice to a value higher than the default would result in a domain not utilizing its full capacity and changing the timeslice to a value lower than the default would result in a domain exceeding its capacity. Signed-off-by: Nate Studer <nate.studer@xxxxxxxxxxxxxxx> Reviewed-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> master commit: 1320b8100c2ed390fc640557a050f5c700d8338d master date: 2013-11-15 17:38:10 +0100 (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |