[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 25392: regressions - FAIL

flight 25392 xen-unstable real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-pv           14 guest-localmigrate.2      fail REGR. vs. 25389
 test-amd64-amd64-xl-win7-amd64  7 windows-install         fail REGR. vs. 25389

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf      7 debian-install            fail REGR. vs. 25389

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl          10 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xend-qemut-winxpsp3 17 leak-check/check        fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xend-winxpsp3 17 leak-check/check             fail  never pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop               fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop             fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xl-win7-amd64 14 guest-stop                   fail  never pass
 test-amd64-amd64-xl-winxpsp3 14 guest-stop                   fail   never pass
 test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop              fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop             fail never pass

version targeted for testing:
 xen                  e3a379c35eff1674ab87f9fc7cb7c5608a8450f3
baseline version:
 xen                  4888ac5891f3daa37bdb3059893db084b50f497b

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  David Vrabel <david.vrabel@xxxxxxxxxx>
  Dongxiao Xu <dongxiao.xu@xxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Len Brown <len.brown@xxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>

 build-amd64-xend                                             pass    
 build-i386-xend                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           fail    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

commit e3a379c35eff1674ab87f9fc7cb7c5608a8450f3
Author: Tim Deegan <tim@xxxxxxx>
Date:   Mon Mar 10 11:18:49 2014 +0100

    x86/time: always count s_time from Xen boot
    Timestamped printks() can call NOW() before init_xen_time().
    Set a baseline TSC as soon as we've calibrated the TSC rate,
    so that NOW() consistently counts from boot time.
    Signed-off-by: Tim Deegan <tim@xxxxxxx>
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 7fb8e8b4e58cdd0a4ac457fd25342b35b6851521
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Mar 10 11:18:05 2014 +0100

    x86/schedule: remove noreturn from schedule_tail() function pointer
    XenServer has recently had a support case where this bugframe in
    context_switch() was hit, presumably from a corrupt function pointer as the
    vcpu pointer was fine.
    On balance, it is better to leave the bugframe around for peace of mind in
    exceptional circumstances, than to use the optimisations provided by 
    At any meaningful levels of optimisation, the noreturn causes the bugframe 
    be optimised out, meaning that any exceptional returns fall into unlikely
    branches, which will result in very weird behaviour.
    The unreachable() in BUG() does the useful part of noreturn for us, allowing
    the compiler not to mess about restoring stack frames etc, but causes a ud2
    instruction to be present.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit bf15e5b64e262b5e44244f4ea605de25d6af1ea6
Author: Len Brown <len.brown@xxxxxxxxx>
Date:   Mon Mar 10 11:14:25 2014 +0100

    x86/mwait_idle: support Intel Atom Processor C2000 product family
    Support the "Intel(R) Atom(TM) Processor C2000 Product Family",
    formerly code-named Avoton.  It is based on the next generation
    Intel Atom processor architecture, formerly code-named Silvermont.
    Signed-off-by: Len Brown <len.brown@xxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

commit a9b87b3ccfdc7e2a6767e2ce7dcbe5c0b035acc2
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Mar 10 11:12:30 2014 +0100

    x86/MCE: mctelem_init() cleanup
    The function can be __init with its caller taking care of only calling
    it on the BSP. And with that all its static variables can be dropped.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper@xxxxxxxxxx>
    Reviewed-by: Liu Jinsong <jinsong.liu@xxxxxxxxx>

commit 4509ada6ba1f09cc8f4fa23e009e7e5a963b6086
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Mar 10 11:11:28 2014 +0100

    kexec: identify which cpu the kexec image is being executed on
    A patch to this effect has been in XenServer for a little while, and has
    proved to be a useful debugging point for servers which have different
    behaviours depending when crashing on the non-bootstrap processor.
    Moving the printk() from kexec_panic() to one_cpu_only() means that it will
    only be printed for the cpu which wins the race along the kexec path.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: David Vrabel <david.vrabel@xxxxxxxxxx>

commit a14a2db700e930f96830d05e3ab3f886ac26c247
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Mar 10 11:06:40 2014 +0100

    x86/HVM: adjust data definitions in mtrr.c
    - use proper section attributes
    - use initializers where possible
    - clean up pat_type_2_pte_flags()
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit 9963a1aa033ce7716dd55659787ba99210066b24
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Mar 10 11:05:51 2014 +0100

    x86/HVM: use manifest constants / enumerators for memory types
    ... instead of literal numbers, thus making it possible for the reader
    to understand the code without having to look up the meaning of these
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit 3089a6d82bdf3112ccb1dd074ce34a8cbdc4ccd8
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Mar 10 11:04:36 2014 +0100

    x86/HVM: consolidate passthrough handling in epte_get_entry_emt()
    It is inconsistent to depend on iommu_enabled alone: For a guest
    without devices passed through to it, it is of no concern whether the
    IOMMU is enabled.
    There's one rather special case to take care of: VMX code marks the
    LAPIC access page as MMIO. The added assertion needs to take this into
    consideration, and the subsequent handling of the direct MMIO case was
    inconsistent too: That page would have been WB in the absence of an
    IOMMU, but UC in the presence of it, while in fact the cachabilty of
    this page is entirely unrelated to an IOMMU being in use.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: "Xu, Dongxiao" <dongxiao.xu@xxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit b99113b9d5fac5149de8496f55afa00e285b1ff3
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Mar 10 11:03:53 2014 +0100

    x86/HVM: fix memory type merging in epte_get_entry_emt()
    Using the minimum numeric value of guest and host specified memory
    types is too simplistic - it works only correctly for a subset of
    types. It is in particular the WT/WP combination that needs conversion
    to UC if the two types conflict.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: "Xu, Dongxiao" <dongxiao.xu@xxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit cadfd7bca999c0a795dc27be72d43c92e8943a0b
Author: Dongxiao Xu <dongxiao.xu@xxxxxxxxx>
Date:   Mon Mar 10 11:02:25 2014 +0100

    x86/hvm: refine the judgment on IDENT_PT for EMT
    When trying to get the EPT EMT type, the judgment on
    HVM_PARAM_IDENT_PT is not correct which always returns WB type if
    the parameter is not set. Remove the related code.
    Signed-off-by: Dongxiao Xu <dongxiao.xu@xxxxxxxxx>
    We can't fully drop the dependency yet, but we should certainly avoid
    overriding cases already properly handled. The reason for this is that
    the guest setting up its MTRRs happens _after_ the EPT tables got
    already constructed, and no code is in place to propagate this to the
    EPT code. Without this check we're forcing the guest to run with all of
    its memory uncachable until something happens to re-write every single
    EPT entry. But of course this has to be just a temporary solution.
    In the same spirit we should defer the "very early" (when the guest is
    still being constructed and has no vCPU yet) override to the last
    possible point.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: "Xu, Dongxiao" <dongxiao.xu@xxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.