[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [xen-unstable test] 106435: regressions - FAIL
> -----Original Message----- > From: Andrew Cooper [mailto:amc96@xxxxxxxxxxxxxxxx] On Behalf Of > Andrew Cooper > Sent: 04 March 2017 15:45 > To: Paul Durrant <Paul.Durrant@xxxxxxxxxx> > Cc: osstest service owner <osstest-admin@xxxxxxxxxxxxxx>; xen- > devel@xxxxxxxxxxxxxxxxxxx; Jan Beulich <JBeulich@xxxxxxxx> > Subject: Re: [Xen-devel] [xen-unstable test] 106435: regressions - FAIL > > On 04/03/2017 15:19, osstest service owner wrote: > > flight 106435 xen-unstable real [real] > > http://logs.test-lab.xenproject.org/osstest/logs/106435/ > > > > Regressions :-( > > > > Tests which did not succeed and are blocking, > > including tests which could not be run: > > test-amd64-amd64-xl-qemuu-win7-amd64 9 windows-install fail REGR. vs. > 106412 > > test-armhf-armhf-libvirt-raw 9 debian-di-install fail REGR. vs. > > 106412 > > From > http://logs.test-lab.xenproject.org/osstest/logs/106435/test-amd64-amd64- > xl-qemuu-win7-amd64/9.ts-windows-install.log > > Mar 4 12:49:08.069641 (d3) Booting from DVD/CD... > Mar 4 12:49:08.069670 (d3) Booting from 0000:7c00 > Mar 4 12:49:08.069697 (XEN) stdvga.c:178:d3v0 leaving stdvga mode > Mar 4 12:49:13.045676 (XEN) d3: VIRIDIAN GUEST_OS_ID: vendor: 1 os: 4 > major: 6 minor: 1 sp: 0 build: 1db0 > Mar 4 12:49:41.461683 (XEN) d3: VIRIDIAN HYPERCALL: enabled: 1 pfn: 3ffff > Mar 4 12:49:41.461731 (XEN) d3v0: VIRIDIAN APIC_ASSIST: enabled: 1 pfn: > 3fffe > Mar 4 12:49:41.469596 (XEN) domain_crash called from viridian.c:306 > Mar 4 12:49:41.477595 (XEN) Domain 3 (vcpu#0) crashed on cpu#1: > Mar 4 12:49:41.477633 (XEN) ----[ Xen-4.9-unstable x86_64 debug=y Not > tainted ]---- > Mar 4 12:49:41.485589 (XEN) CPU: 1 > Mar 4 12:49:41.485620 (XEN) RIP: 0010:[<fffff80002653479>] > Mar 4 12:49:41.485650 (XEN) RFLAGS: 0000000000000286 CONTEXT: hvm > guest (d3v0) > Mar 4 12:49:41.493591 (XEN) rax: 0000000000000000 rbx: fffff800027ede80 > rcx: 0000000000000001 > Mar 4 12:49:41.501560 (XEN) rdx: 0000000000000000 rsi: fffffa8001291040 > rdi: fffff800027fbc40 > Mar 4 12:49:41.509588 (XEN) rbp: 0000000000000080 rsp: fffff880009b0d80 > r8: 0000000000000000 > Mar 4 12:49:41.517584 (XEN) r9: fffff800027ede80 r10: fffffa8001291040 > r11: fffff800027ede90 > Mar 4 12:49:41.517624 (XEN) r12: fffff800008129c0 r13: fffff800028afbe0 > r14: fffffa800122db30 > Mar 4 12:49:41.525586 (XEN) r15: fffff80000b96080 cr0: 0000000080050031 > cr4: 00000000000006b8 > Mar 4 12:49:41.533582 (XEN) cr3: 0000000000187000 cr2: 0000000000000000 > Mar 4 12:49:41.541578 (XEN) ds: 002b es: 002b fs: 0053 gs: 002b ss: > 0018 > cs: 0010 > > > Looks like this intermittent bug is still biting. Should we kill > VIRIDIAN APIC_ASSIST until we have got to the bottom of it? > Alternatively, add some printk() to actually give us useful information > when it does go wrong. I actually think this may be a bug in Windows 7. I normally run with this enlightenment on and have seen this very occasionally and only with Windows 7. I think it would probably be useful to stash info about the last interrupt injected into the guest and then reduce the domain_crash() to a gprintk() dumping that info plus info about the interrupt that's about to be injected. I'll post a patch. Paul > > ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |