flight 22230 xen-4.2-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/22230/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 4 xen-build fail REGR. vs. 22161 build-amd64-pvops 4 kernel-build fail REGR. vs. 22161 build-amd64-oldkern 4 xen-build fail REGR. vs. 22161 Tests which did not succeed, but are not blocking: test-amd64-i386-qemuu-freebsd10-amd64 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-pcipt-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-amd64-pv 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-sedf-pin 1 xen-build-check(1) blocked n/a test-amd64-i386-qemut-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-pv 1 xen-build-check(1) blocked n/a test-amd64-i386-qemuu-freebsd10-i386 1 xen-build-check(1) blocked n/a test-amd64-i386-xl 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl 1 xen-build-check(1) blocked n/a test-amd64-i386-qemut-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-qemuu-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-pair 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-sedf 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-qemut-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemut-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-amd64-pair 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-win7-amd64 1 xen-build-check(1) blocked n/a test-amd64-i386-xend-winxpsp3 1 xen-build-check(1) blocked n/a test-i386-i386-xl-qemut-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemut-winxpsp3 1 xen-build-check(1) blocked n/a test-i386-i386-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a test-i386-i386-xl-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xend-qemut-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-winxpsp3 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-win7-amd64 1 xen-build-check(1) blocked n/a version targeted for testing: xen a22a77f036da315b7cb7cefb4eef191e7cd9a247 baseline version: xen 420ff58052d22c6f49fb71949a9989256017caae ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@citrix.com> Dario Faggioli <dario.faggioli@citrix.com> David Vrabel <david.vrabel@citrix.com> Ian Jackson <ian.jackson@eu.citrix.com> Jan Beulich <jbeulich@suse.com> Keir Fraser <keir@xen.org> Liu Jinsong <jinsong.liu@intel.com> Nate Studer <nate.studer@dornerworks.com> Tomasz Wroblewski <tomasz.wroblewski@citrix.com> ------------------------------------------------------------ jobs: build-amd64 fail build-i386 pass build-amd64-oldkern fail build-i386-oldkern pass build-amd64-pvops fail build-i386-pvops pass test-amd64-amd64-xl blocked test-amd64-i386-xl blocked test-i386-i386-xl pass test-amd64-i386-rhel6hvm-amd blocked test-amd64-i386-qemut-rhel6hvm-amd blocked test-amd64-i386-qemuu-rhel6hvm-amd blocked test-amd64-i386-qemuu-freebsd10-amd64 blocked test-amd64-amd64-xl-qemut-win7-amd64 blocked test-amd64-i386-xl-qemut-win7-amd64 blocked test-amd64-amd64-xl-qemuu-win7-amd64 blocked test-amd64-amd64-xl-win7-amd64 blocked test-amd64-i386-xl-win7-amd64 blocked test-amd64-i386-xl-credit2 blocked test-amd64-i386-qemuu-freebsd10-i386 blocked test-amd64-amd64-xl-pcipt-intel blocked test-amd64-i386-rhel6hvm-intel blocked test-amd64-i386-qemut-rhel6hvm-intel blocked test-amd64-i386-qemuu-rhel6hvm-intel blocked test-amd64-i386-xl-multivcpu blocked test-amd64-amd64-pair blocked test-amd64-i386-pair blocked test-i386-i386-pair pass test-amd64-amd64-xl-sedf-pin blocked test-amd64-amd64-pv blocked test-amd64-i386-pv blocked test-i386-i386-pv pass test-amd64-amd64-xl-sedf blocked test-amd64-i386-xl-qemut-winxpsp3-vcpus1 blocked test-amd64-i386-xl-winxpsp3-vcpus1 blocked test-amd64-i386-xend-qemut-winxpsp3 blocked test-amd64-amd64-xl-qemut-winxpsp3 blocked test-i386-i386-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 blocked test-i386-i386-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 blocked test-amd64-amd64-xl-winxpsp3 blocked test-i386-i386-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit a22a77f036da315b7cb7cefb4eef191e7cd9a247 Author: Liu Jinsong <jinsong.liu@intel.com> Date: Mon Dec 2 15:56:09 2013 +0100 x86/xsave: fix nonlazy state handling Nonlazy xstates should be xsaved each time when vcpu_save_fpu. Operation to nonlazy xstates will not trigger #NM exception, so whenever vcpu scheduled in it got restored and whenever scheduled out it should get saved. Currently this bug affects AMD LWP feature, and later Intel MPX feature. With the bugfix both LWP and MPX will work fine. Signed-off-by: Liu Jinsong <jinsong.liu@intel.com> Furthermore, during restore we also need to set nonlazy_xstate_used according to the incoming accumulated XCR0. Also adjust the changes to i387.c such that there won''t be a pointless clts()/stts() pair. Signed-off-by: Jan Beulich <jbeulich@suse.com> master commit: 7d8b5dd98463524686bdee8b973b53c00c232122 master date: 2013-11-25 11:19:04 +0100 commit 122ce1427fd43143c3a2613cf77c4b04012a2f2b Author: David Vrabel <david.vrabel@citrix.com> Date: Mon Dec 2 15:55:16 2013 +0100 x86/crash: disable the watchdog NMIs on the crashing cpu nmi_shootdown_cpus() is called during a crash to park all the other CPUs. This changes the NMI trap handlers which means there''s no point in having the watchdog still running. This also disables the watchdog before executing any crash kexec image and prevents the image from receiving unexpected NMIs. Signed-off-by: David Vrabel <david.vrabel@citrix.com> PVOps Linux as a kexec image shoots itself in the foot otherwise. On a Core2 system, Linux declares a firmware bug and tries to invert some bits in the performance counter register. It ends up setting the number of retired instructions to generate another NMI to fewer instructions than the NMI interrupt path itself, and ceases to make any useful progress. The call to disable_lapic_nmi_watchdog() must be this late into the kexec path to be sure that this cpu is the one which will execute the kexec image. Otherwise there are race conditions where the NMIs might be disabled on the wrong cpu, resulting in the kexec image still receiving NMIs. Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> master commit: 2a16fcd5ba0244fef764886211452acc69c0ed00 master date: 2013-11-22 14:48:12 +0100 commit cbb45ac29ff24222b80209e580e01677315f8101 Author: Tomasz Wroblewski <tomasz.wroblewski@citrix.com> Date: Mon Dec 2 15:54:42 2013 +0100 x86/hvm: reset TSC to 0 after domain resume from S3 Host S3 implicitly resets the host TSC to 0, but the tsc offset for hvm domains is not recalculated when they resume, causing it to go into negative values. In Linux guest using tsc clocksource, this results in a hang after wrap back to positive values since the tsc clocksource implementation expects it reset. Signed-off-by: Tomasz Wroblewski <tomasz.wroblewski@citrix.com> master commit: e95dc6ba69daef6468b3ae5912710727244d6e2f master date: 2013-11-22 14:47:24 +0100 commit 9e7ee90d11b0ba078b051b8bb1fc1b04687c100b Author: Jan Beulich <jbeulich@suse.com> Date: Mon Dec 2 15:53:50 2013 +0100 x86: consider modules when cutting off memory The code in question runs after module ranges got already removed from the E820 table, so when determining the new maximum page/PDX we need to explicitly take them into account. Furthermore we need to round up the ending addresses here, in order to fully cover eventual partial trailing pages. Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> master commit: a5db2c7aab7a638d84f22ac8fe5089d81175438b master date: 2013-11-18 13:57:20 +0100 commit f6d67d15969396f37a699e85e95bf84db28e3971 Author: Dario Faggioli <dario.faggioli@citrix.com> Date: Mon Dec 2 15:52:20 2013 +0100 fix leaking of v->cpu_affinity_saved on domain destruction Signed-off-by: Dario Faggioli <dario.faggioli@citrix.com> Reviewed-by: George Dunlap <george.dunlap@eu.citrix.com> Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> Reviewed-by: Jan Beulich <jbeulich@suse.com> master commit: 6757efe1bf50ac7ff68fa4dd7d9333529f70ae9a master date: 2013-11-15 17:43:28 +0100 commit 88f72c707e9588c60a81cb8a917b0a2b1d5aa1a1 Author: Nate Studer <nate.studer@dornerworks.com> Date: Mon Dec 2 15:51:00 2013 +0100 credit: Update other parameters when setting tslice_ms Add a utility function to update the rest of the timeslice accounting fields when updating the timeslice of the credit scheduler, so that capped CPUs behave correctly. Before this patch changing the timeslice to a value higher than the default would result in a domain not utilizing its full capacity and changing the timeslice to a value lower than the default would result in a domain exceeding its capacity. Signed-off-by: Nate Studer <nate.studer@dornerworks.com> Reviewed-by: Dario Faggioli <dario.faggioli@citrix.com> Reviewed-by: George Dunlap <george.dunlap@eu.citrix.com> master commit: 1320b8100c2ed390fc640557a050f5c700d8338d master date: 2013-11-15 17:38:10 +0100 (qemu changes not included)