[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 50425: regressions - FAIL
flight 50425 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/50425/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-amd64 13 guest-localmigrate fail REGR. vs. 50405 test-amd64-i386-xl-qemuu-debianhvm-amd64 18 guest-start/debianhvm.repeat fail REGR. vs. 50405 Regressions which are regarded as allowable (not blocking): test-amd64-i386-freebsd10-i386 16 guest-localmigrate/x10 fail blocked in 50405 test-amd64-i386-pair 21 guest-migrate/src_host/dst_host fail like 50405 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-xsm 11 guest-start fail never pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 9 debian-hvm-install fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-amd64-i386-libvirt-xsm 11 guest-start fail never pass test-amd64-amd64-libvirt-xsm 11 guest-start fail never pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail never pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 9 debian-hvm-install fail never pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail never pass test-armhf-armhf-libvirt-xsm 6 xen-boot fail never pass test-amd64-i386-xl-xsm 11 guest-start fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 6 xen-boot fail never pass test-armhf-armhf-xl-arndale 12 migrate-support-check fail never pass test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 16 guest-stop fail never pass test-amd64-i386-xl-qemuu-winxpsp3 16 guest-stop fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 16 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 16 guest-stop fail never pass test-amd64-i386-xl-winxpsp3 16 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 16 guest-stop fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-armhf-armhf-xl-sedf 12 migrate-support-check fail never pass test-armhf-armhf-xl-cubietruck 12 migrate-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl-sedf-pin 12 migrate-support-check fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 16 guest-stop fail never pass test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 16 guest-stop fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 16 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3 16 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 16 guest-stop fail never pass version targeted for testing: xen df9f5676b3711c95127d44e871ad7ca38d6ed28a baseline version: xen 123c7793797502b222300eb710cd3873dcca41ee ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx> Dario Faggioli <dario.faggioli@xxxxxxxxxx> David Vrabel <david.vrabel@xxxxxxxxxx> Don Slutz <dslutz@xxxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64-xsm pass build-armhf-xsm pass build-i386-xsm pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumpuserxen pass build-i386-rumpuserxen pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm fail test-amd64-i386-xl-qemut-debianhvm-amd64-xsm fail test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm fail test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm fail test-amd64-amd64-libvirt-xsm fail test-armhf-armhf-libvirt-xsm fail test-amd64-i386-libvirt-xsm fail test-amd64-amd64-xl-xsm fail test-armhf-armhf-xl-xsm fail test-amd64-i386-xl-xsm fail test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 fail test-amd64-i386-freebsd10-amd64 fail test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumpuserxen-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-armhf-armhf-xl-arndale pass test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-armhf-armhf-xl-cubietruck pass test-amd64-i386-freebsd10-i386 fail test-amd64-i386-rumpuserxen-i386 pass test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt pass test-amd64-i386-libvirt pass test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair fail test-amd64-amd64-xl-sedf-pin pass test-armhf-armhf-xl-sedf-pin pass test-amd64-amd64-xl-sedf pass test-armhf-armhf-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-i386-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xl-qemuu-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail test-amd64-i386-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/osstest/pub/logs images: /home/osstest/pub/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit df9f5676b3711c95127d44e871ad7ca38d6ed28a Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Apr 14 16:51:18 2015 +0200 x86/vMSI-X: add valid bits for read acceleration Again because Xen doesn't get to see all guest writes, it shouldn't serve reads from its cache before having seen a write to the respective address. Also use DECLARE_BITMAP() in a related field declaration instead of open coding it. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 70a3cbb8c9cb17a61fa25c48ba3d7b44fd059c90 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Apr 14 16:50:35 2015 +0200 x86/vMSI-X: honor all mask requests Commit 74fd0036de ("x86: properly handle MSI-X unmask operation from guests") didn't go far enough: it fixed an issue with unmasking, but left an issue with masking in place: Due to the (late) point in time when qemu requests the hypervisor to set up MSI-X interrupts (which is where the MMIO intercept gets put in place), the hypervisor doesn't see all guest writes, and hence shouldn't make assumptions on the state the virtual MSI-X resources are in. Bypassing the rest of the logic on a guest mask operation leads to [00:04.0] pci_msix_write: Error: Can't update msix entry 1 since MSI-X is already enabled. which surprisingly enough doesn't lead to the device not working anymore (I didn't dig in deep enough to figure out why that is). But it does prevent the IRQ to be migrated inside the guest, i.e. all interrupts will always arrive in vCPU 0. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 881d6bf2d16a7d6a900d7de8ae83d1e8eb2f3f3b Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Apr 14 15:29:19 2015 +0200 x86: use real assert frames for ASSERT_INTERRUPTS_{EN,DIS}ABLED Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 0a3e27e8325d357c3df5a8286b550689524ea031 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Apr 14 15:07:24 2015 +0200 x86: infrastructure to create BUG_FRAMES in asm code Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 50c9e20a9e63a308a36d9bd765ef3a6a6702da74 Author: Don Slutz <dslutz@xxxxxxxxxxx> Date: Tue Apr 14 15:03:27 2015 +0200 x86: set regs->entry_vector for early_page_fault This changes: (XEN) Early fatal page fault at e008:ffff82d080164252 (cr2=0000000000000000, ec=0000) (XEN) ----[ Xen-4.6-unstable x86_64 debug=y Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e008:[<ffff82d080164252>] arch_domain_create+0x3e/0x4ef ... (XEN) Xen call trace: (XEN) [<ffff82d080164252>] arch_domain_create+0x3e/0x4ef (XEN) [<ffff82d080105262>] domain_create+0x384/0x556 (XEN) [<ffff82d0802a0de4>] scheduler_init+0x1c4/0x244 (XEN) [<ffff82d0802be359>] __start_xen+0x1d0e/0x22a1 (XEN) [<ffff82d080100067>] __high_start+0x53/0x58 (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 0: (XEN) FATAL TRAP: vector = 0 (divide error) (XEN) [error_code=0000] , IN INTERRUPT CONTEXT (XEN) **************************************** ... to: (XEN) Early fatal page fault at e008:ffff82d080164252 (cr2=0000000000000000, ec=0000) (XEN) ----[ Xen-4.6-unstable x86_64 debug=y Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e008:[<ffff82d080164252>] arch_domain_create+0x3e/0x4ef ... (XEN) Xen call trace: (XEN) [<ffff82d080164252>] arch_domain_create+0x3e/0x4ef (XEN) [<ffff82d080105262>] domain_create+0x384/0x556 (XEN) [<ffff82d0802a0de4>] scheduler_init+0x1c4/0x244 (XEN) [<ffff82d0802be359>] __start_xen+0x1d0e/0x22a1 (XEN) [<ffff82d080100067>] __high_start+0x53/0x58 (XEN) (XEN) Faulting linear address: 0000000000000000 (XEN) Pagetable walk from 0000000000000000: (XEN) L4[0x000] = 000000083a1a6063 ffffffffffffffff (XEN) L3[0x000] = 000000083a1a5063 ffffffffffffffff (XEN) L2[0x000] = 000000083a1a4063 ffffffffffffffff (XEN) L1[0x000] = 0000000000000000 ffffffffffffffff (XEN) (XEN) **************************************** (XEN) Panic on CPU 0: (XEN) FATAL TRAP: vector = 14 (page fault) (XEN) [error_code=0000] , IN INTERRUPT CONTEXT (XEN) **************************************** ... Signed-off-by: Don Slutz <dslutz@xxxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit f70df9ec1ab72b6bbebad72d81109c1b214007e1 Author: David Vrabel <david.vrabel@xxxxxxxxxx> Date: Tue Apr 14 15:02:32 2015 +0200 x86/mtrr: include asm/atomic.h asm/atomic.h is needed but only included indirectly via asm/spinlock.h. Signed-off-by: David Vrabel <david.vrabel@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 63dcef9fe5b880007075b5eb53f9950a826519ce Author: David Vrabel <david.vrabel@xxxxxxxxxx> Date: Tue Apr 14 15:02:10 2015 +0200 x86/hvm: don't include asm/spinlock.h asm/spinlock.h should not be included directly. Signed-off-by: David Vrabel <david.vrabel@xxxxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 9b43a2a2e9a236cf5537f853d0175f326b4d9cb8 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Tue Apr 14 15:01:14 2015 +0200 Revert "x86/hvm: wait for at least one ioreq server to be enabled" We don't need this workaround anymore since we have fixed the toolstack interlock problem that affects stubdom. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx> commit 364aa90a5461050ac18eddf239ea1315d351d47f Author: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx> Date: Tue Apr 14 15:00:44 2015 +0200 x86: clean up psr boot parameter parsing Change type of opt_psr from bool to int so more psr features can fit. Introduce a new routine to parse bool parameter so that both cmt and future psr features like cat can use it. Signed-off-by: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 2c2666aa8f76d5d64c06e9937c4e7506f7fffec8 Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Tue Apr 14 15:00:28 2015 +0200 docs: efi: given some hint about the dom0 command line Suggested-by: Carlos Gustavo Ramirez Rodriguez <carlosgrr@xxxxxxxxx> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> commit e59abf8c8c9c1d99a531292c6a548d6dfd0ceacc Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Apr 14 14:59:53 2015 +0200 x86/traps: identify the vcpu in context when dumping registers Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 9bdea267f6d3c3bc127ccdcc1a3e7e167524b540 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Apr 14 14:59:37 2015 +0200 x86/cpuidle: identify a legitimate fallthrough case to appease the Missing Break checker. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Coverity-id: 1291938 commit afaa5616f3da457109b37e59e3408dd325cc9e71 Author: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Date: Tue Apr 14 14:58:52 2015 +0200 sched_credit2: more info when dumping more specifically, for each runqueue, print what pCPUs belong to it, which ones are idle and which ones have been tickled. While there, also convert the whole file to use keyhandler_scratch for printing cpumask-s. Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> commit b7c82abc1a920bcccbd64abe4c388f7208a2c185 Author: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Date: Tue Apr 14 14:56:13 2015 +0200 rework locking for dump of scheduler info (debug-key r) such as it is taken care of by the various schedulers, rather than happening in schedule.c. In fact, it is the schedulers that know better which locks are necessary for the specific dumping operations. While there, fix a few style issues (indentation, trailing whitespace, parentheses and blank line after var declarations) Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |