[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 25392: regressions - FAIL
flight 25392 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/25392/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-pv 14 guest-localmigrate.2 fail REGR. vs. 25389 test-amd64-amd64-xl-win7-amd64 7 windows-install fail REGR. vs. 25389 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-sedf 7 debian-install fail REGR. vs. 25389 Tests which did not succeed, but are not blocking: test-armhf-armhf-xl 10 migrate-support-check fail never pass test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xend-qemut-winxpsp3 17 leak-check/check fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-i386-xend-winxpsp3 17 leak-check/check fail never pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop fail never pass version targeted for testing: xen e3a379c35eff1674ab87f9fc7cb7c5608a8450f3 baseline version: xen 4888ac5891f3daa37bdb3059893db084b50f497b ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> David Vrabel <david.vrabel@xxxxxxxxxx> Dongxiao Xu <dongxiao.xu@xxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Keir Fraser <keir@xxxxxxx> Len Brown <len.brown@xxxxxxxxx> Tim Deegan <tim@xxxxxxx> ------------------------------------------------------------ jobs: build-amd64-xend pass build-i386-xend pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv pass test-amd64-i386-pv fail test-amd64-amd64-xl-sedf fail test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-i386-xend-qemut-winxpsp3 fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit e3a379c35eff1674ab87f9fc7cb7c5608a8450f3 Author: Tim Deegan <tim@xxxxxxx> Date: Mon Mar 10 11:18:49 2014 +0100 x86/time: always count s_time from Xen boot Timestamped printks() can call NOW() before init_xen_time(). Set a baseline TSC as soon as we've calibrated the TSC rate, so that NOW() consistently counts from boot time. Signed-off-by: Tim Deegan <tim@xxxxxxx> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 7fb8e8b4e58cdd0a4ac457fd25342b35b6851521 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Mar 10 11:18:05 2014 +0100 x86/schedule: remove noreturn from schedule_tail() function pointer XenServer has recently had a support case where this bugframe in context_switch() was hit, presumably from a corrupt function pointer as the vcpu pointer was fine. On balance, it is better to leave the bugframe around for peace of mind in exceptional circumstances, than to use the optimisations provided by noreturn. At any meaningful levels of optimisation, the noreturn causes the bugframe to be optimised out, meaning that any exceptional returns fall into unlikely branches, which will result in very weird behaviour. The unreachable() in BUG() does the useful part of noreturn for us, allowing the compiler not to mess about restoring stack frames etc, but causes a ud2 instruction to be present. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit bf15e5b64e262b5e44244f4ea605de25d6af1ea6 Author: Len Brown <len.brown@xxxxxxxxx> Date: Mon Mar 10 11:14:25 2014 +0100 x86/mwait_idle: support Intel Atom Processor C2000 product family Support the "Intel(R) Atom(TM) Processor C2000 Product Family", formerly code-named Avoton. It is based on the next generation Intel Atom processor architecture, formerly code-named Silvermont. Signed-off-by: Len Brown <len.brown@xxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> commit a9b87b3ccfdc7e2a6767e2ce7dcbe5c0b035acc2 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Mar 10 11:12:30 2014 +0100 x86/MCE: mctelem_init() cleanup The function can be __init with its caller taking care of only calling it on the BSP. And with that all its static variables can be dropped. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper@xxxxxxxxxx> Reviewed-by: Liu Jinsong <jinsong.liu@xxxxxxxxx> commit 4509ada6ba1f09cc8f4fa23e009e7e5a963b6086 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Mar 10 11:11:28 2014 +0100 kexec: identify which cpu the kexec image is being executed on A patch to this effect has been in XenServer for a little while, and has proved to be a useful debugging point for servers which have different behaviours depending when crashing on the non-bootstrap processor. Moving the printk() from kexec_panic() to one_cpu_only() means that it will only be printed for the cpu which wins the race along the kexec path. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: David Vrabel <david.vrabel@xxxxxxxxxx> commit a14a2db700e930f96830d05e3ab3f886ac26c247 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Mar 10 11:06:40 2014 +0100 x86/HVM: adjust data definitions in mtrr.c - use proper section attributes - use initializers where possible - clean up pat_type_2_pte_flags() Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit 9963a1aa033ce7716dd55659787ba99210066b24 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Mar 10 11:05:51 2014 +0100 x86/HVM: use manifest constants / enumerators for memory types ... instead of literal numbers, thus making it possible for the reader to understand the code without having to look up the meaning of these numbers. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit 3089a6d82bdf3112ccb1dd074ce34a8cbdc4ccd8 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Mar 10 11:04:36 2014 +0100 x86/HVM: consolidate passthrough handling in epte_get_entry_emt() It is inconsistent to depend on iommu_enabled alone: For a guest without devices passed through to it, it is of no concern whether the IOMMU is enabled. There's one rather special case to take care of: VMX code marks the LAPIC access page as MMIO. The added assertion needs to take this into consideration, and the subsequent handling of the direct MMIO case was inconsistent too: That page would have been WB in the absence of an IOMMU, but UC in the presence of it, while in fact the cachabilty of this page is entirely unrelated to an IOMMU being in use. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: "Xu, Dongxiao" <dongxiao.xu@xxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit b99113b9d5fac5149de8496f55afa00e285b1ff3 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Mar 10 11:03:53 2014 +0100 x86/HVM: fix memory type merging in epte_get_entry_emt() Using the minimum numeric value of guest and host specified memory types is too simplistic - it works only correctly for a subset of types. It is in particular the WT/WP combination that needs conversion to UC if the two types conflict. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: "Xu, Dongxiao" <dongxiao.xu@xxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> commit cadfd7bca999c0a795dc27be72d43c92e8943a0b Author: Dongxiao Xu <dongxiao.xu@xxxxxxxxx> Date: Mon Mar 10 11:02:25 2014 +0100 x86/hvm: refine the judgment on IDENT_PT for EMT When trying to get the EPT EMT type, the judgment on HVM_PARAM_IDENT_PT is not correct which always returns WB type if the parameter is not set. Remove the related code. Signed-off-by: Dongxiao Xu <dongxiao.xu@xxxxxxxxx> We can't fully drop the dependency yet, but we should certainly avoid overriding cases already properly handled. The reason for this is that the guest setting up its MTRRs happens _after_ the EPT tables got already constructed, and no code is in place to propagate this to the EPT code. Without this check we're forcing the guest to run with all of its memory uncachable until something happens to re-write every single EPT entry. But of course this has to be just a temporary solution. In the same spirit we should defer the "very early" (when the guest is still being constructed and has no vCPU yet) override to the last possible point. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: "Xu, Dongxiao" <dongxiao.xu@xxxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |