WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [xen-unstable test] 6757: regressions - FAIL

To: <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-devel] [xen-unstable test] 6757: regressions - FAIL
From: xen.org <ian.jackson@xxxxxxxxxxxxx>
Date: Wed, 6 Apr 2011 15:22:27 +0100
Cc: ian.jackson@xxxxxxxxxxxxx
Delivery-date: Wed, 06 Apr 2011 07:23:09 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
flight 6757 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/6757/

Regressions :-(

Tests which did not succeed and are blocking:
 test-amd64-amd64-win          7 windows-install            fail REGR. vs. 6756
 test-amd64-i386-win-vcpus1    7 windows-install            fail REGR. vs. 6756
 test-amd64-i386-win           7 windows-install            fail REGR. vs. 6756
 test-amd64-i386-xl-win-vcpus1  7 windows-install           fail REGR. vs. 6756
 test-amd64-xcpkern-i386-rhel6hvm-intel  7 redhat-install   fail REGR. vs. 6756
 test-amd64-xcpkern-i386-win   7 windows-install            fail REGR. vs. 6756
 test-amd64-xcpkern-i386-xl-win  7 windows-install          fail REGR. vs. 6756
 test-i386-i386-win            7 windows-install            fail REGR. vs. 6756
 test-i386-i386-xl-win         7 windows-install            fail REGR. vs. 6756
 test-i386-xcpkern-i386-win    7 windows-install            fail REGR. vs. 6756

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-i386-rhel6hvm-amd  8 guest-saverestore            fail   never pass
 test-amd64-i386-rhel6hvm-intel  7 redhat-install               fail  like 6756
 test-amd64-xcpkern-i386-rhel6hvm-amd  8 guest-saverestore      fail never pass

version targeted for testing:
 xen                  dc8b05d22a59
baseline version:
 xen                  97763efc41f9

------------------------------------------------------------
People who touched revisions under test:
  Allen Kay <allen.m.kay@xxxxxxxxx>
  Christoph Egger <Christoph.Egger@xxxxxxx>
  Eddie Dong <eddie.dong@xxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
  Wei Huang <wei.huang2@xxxxxxx>
------------------------------------------------------------

jobs:
 build-i386-xcpkern                                           pass     
 build-amd64                                                  pass     
 build-i386                                                   pass     
 build-amd64-oldkern                                          pass     
 build-i386-oldkern                                           pass     
 build-amd64-pvops                                            pass     
 build-i386-pvops                                             pass     
 test-amd64-amd64-xl                                          pass     
 test-amd64-i386-xl                                           pass     
 test-i386-i386-xl                                            pass     
 test-amd64-xcpkern-i386-xl                                   pass     
 test-i386-xcpkern-i386-xl                                    pass     
 test-amd64-i386-rhel6hvm-amd                                 fail     
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail     
 test-amd64-i386-xl-credit2                                   pass     
 test-amd64-xcpkern-i386-xl-credit2                           pass     
 test-amd64-i386-rhel6hvm-intel                               fail     
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail     
 test-amd64-i386-xl-multivcpu                                 pass     
 test-amd64-xcpkern-i386-xl-multivcpu                         pass     
 test-amd64-amd64-pair                                        pass     
 test-amd64-i386-pair                                         pass     
 test-i386-i386-pair                                          pass     
 test-amd64-xcpkern-i386-pair                                 pass     
 test-i386-xcpkern-i386-pair                                  pass     
 test-amd64-amd64-pv                                          pass     
 test-amd64-i386-pv                                           pass     
 test-i386-i386-pv                                            pass     
 test-amd64-xcpkern-i386-pv                                   pass     
 test-i386-xcpkern-i386-pv                                    pass     
 test-amd64-i386-win-vcpus1                                   fail     
 test-amd64-i386-xl-win-vcpus1                                fail     
 test-amd64-amd64-win                                         fail     
 test-amd64-i386-win                                          fail     
 test-i386-i386-win                                           fail     
 test-amd64-xcpkern-i386-win                                  fail     
 test-i386-xcpkern-i386-win                                   fail     
 test-amd64-amd64-xl-win                                      fail     
 test-i386-i386-xl-win                                        fail     
 test-amd64-xcpkern-i386-xl-win                               fail     


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23172:dc8b05d22a59
tag:         tip
user:        George Dunlap <george.dunlap@xxxxxxxxxxxxx>
date:        Wed Apr 06 11:40:54 2011 +0100
    
    x86/hvm: load CPU structures from xen versions <=3.4
    
    Xen 4.0 added "msr_tsc_aux" in the middle of the hvm_hw_cpu structure, 
making
    it incompatible with pre-3.4 savefiles.  This patch uses the recently 
introduced
    backwards-compatibility infrastructure to convert the old to the new.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23171:6a5830de7b54
user:        George Dunlap <george.dunlap@xxxxxxxxxxxxx>
date:        Wed Apr 06 11:40:51 2011 +0100
    
    hvm: infrastructure for backwards-compatible loading
    
    The hvm_save code is used to save and restore hypervisor-related
    hvm state, either for classic save/restore, or for migration
    (including remus).  This is meant to be backwards-compatible across
    some hypervisor versions; but if it does change, there is no way to
    handle the old format as well as the new.
    
    This patch introduces the infrastructure to allow a single older
    version ("compat") of any given "save type" to be defined, along with
    a function to turn the "old" version into the "new" version.  If the
    size check fails for the "normal" version, it will check the "compat"
    version, and if it matches, will read the old entry and call the
    conversion function.
    
    This patch involves some preprocessor hackery, but I'm only extending the
    hackery that's already there.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23170:86f87da1445a
user:        Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date:        Wed Apr 06 11:22:39 2011 +0100
    
    Nested SVM: fix race in remote shootdown.
    
    nestedhvm_flushtlb_ipi() can run between nsvm_vcpu_switch() and CLGI,
    which would leave the VMCB pointing at the wrong p2m table.
    Check for this after CLGI.
    
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23169:2a39222f0071
user:        Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date:        Wed Apr 06 11:22:39 2011 +0100
    
    xen: fix non-debug and 32-bit builds after nested HVM series
    
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23168:7714b42e72fa
user:        cegger
date:        Tue Apr 05 15:44:09 2011 +0200
    
    Implement Nested-on-Nested.
    This allows the guest to run nested guest with hap enabled.
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23167:9c3fbfa7d0d5
user:        cegger
date:        Wed Mar 09 12:36:23 2011 +0100
    
    Implement generic piece to finally enable nested virtualization
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23166:4530152eec39
user:        cegger
date:        Wed Mar 09 12:36:17 2011 +0100
    
    Implement SVM specific interrupt handling
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23165:a5e69b6fdd16
user:        cegger
date:        Wed Mar 09 12:36:05 2011 +0100
    
    Implement SVM specific part for Nested Virtualization
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23164:a21d019bb8fe
user:        cegger
date:        Mon Feb 28 12:21:57 2011 +0100
    
    Handle interrupts (generic part)
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23163:340862a9e1cc
user:        cegger
date:        Mon Feb 28 12:21:54 2011 +0100
    
    Allow guest to enable SVM in EFER
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23162:c856533343bf
user:        cegger
date:        Mon Feb 28 12:21:52 2011 +0100
    
    When injecting an exception into L2 guest,
    inject a #VMEXIT if L1 guest intercepts the exception
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23161:f9ba1b2ba93d
user:        cegger
date:        Mon Feb 28 12:21:49 2011 +0100
    
    Allow paged real mode during vmrun emulation.
    Emulate cr0 and cr4 when guest does not intercept them.
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23160:981397a3a586
user:        cegger
date:        Mon Feb 28 12:21:46 2011 +0100
    
    Nested Virtualization core implementation
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23159:5a137177a6df
user:        cegger
date:        Mon Feb 28 12:21:44 2011 +0100
    
    add nestedhvm function hooks for svm/vmx specific code
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23158:029f0a5301f0
user:        cegger
date:        Mon Feb 28 12:21:41 2011 +0100
    
    Data structures for Nested Virtualization
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23157:69e932728d75
user:        cegger
date:        Mon Feb 28 12:21:38 2011 +0100
    
    tools: Add nestedhvm guest config option
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Eddie Dong <eddie.dong@xxxxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    Committed-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23156:1984297894a7
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed Apr 06 09:20:40 2011 +0100
    
    Remove __init specifier from function declarations in header files.
    
    The specifier only needs to be added to the function's definition.
    
    At the same time, fix init_cpu_to_node() to be __init rather than
    __devinit (it is only called at boot time).
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   23155:c7916d6f4dfb
user:        Allen Kay <allen.m.kay@xxxxxxxxx>
date:        Wed Apr 06 09:11:02 2011 +0100
    
    [VTD] Fixes to ACPI DMAR flag checks.
    
     * platform_supports_{intremap,x2apic} should not be marked __init as
       they are used during S3 resume.
     * DMAR flags should be taken from the table passed to
       acpi_parse_dmar() -- this is the trusted copy of the DMAR, when
       running in TXT mode.
    
    Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx>
    
    
changeset:   23154:42fa70e0761b
user:        Wei Huang <wei.huang2@xxxxxxx>
date:        Wed Apr 06 09:02:13 2011 +0100
    
    x86, amd, MTRR: remove k8_enable_fixed_iorrs()
    
    AMD64 defines two special bits (bit 3 and 4) RdMem and WrMem in fixed
    MTRR type. Their values are supposed to be 0 after BIOS hands the
    control to OS according to AMD BKDG. Unless OS specificially turn them
    on, they are kept 0 all the time. As a result, k8_enable_fixed_iorrs()
    is unnecessary and removed from upstream kernel (see
    https://patchwork.kernel.org/patch/11425/). This patch does the same
    thing.
    
    Signed-off-by: Wei Huang <wei.huang2@xxxxxxx>
    
    
changeset:   23153:8fb61c9ebe49
user:        Wei Huang <wei.huang2@xxxxxxx>
date:        Wed Apr 06 09:01:31 2011 +0100
    
    x86, amd, MTRR: correct DramModEn bit of SYS_CFG MSR
    
    Some buggy BIOS might set SYS_CFG DramModEn bit to 1, which can cause
    unexpected behavior on AMD platforms. This patch clears DramModEn bit
    if it is 1.
    
    Signed-off-by: Wei Huang <wei.huang2@xxxxxxx>
    
    
changeset:   23152:97763efc41f9
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Tue Apr 05 18:23:54 2011 +0100
    
    libxl: Drop unnecessary \n from log message
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] [xen-unstable test] 6757: regressions - FAIL, xen . org <=