[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen-unstable-smoke test] 105862: regressions - trouble: broken/fail/pass
flight 105862 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/105862/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 14 guest-saverestore fail REGR. vs. 105852 test-armhf-armhf-xl 15 guest-start/debian.repeat fail REGR. vs. 105852 test-amd64-amd64-xl-qemuu-debianhvm-i386 12 guest-saverestore fail REGR. vs. 105852 Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen-build fail never pass build-arm64-pvops 5 kernel-build fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass version targeted for testing: xen 378384399ed661bed711221a5d8dbdac66b8e851 baseline version: xen 7127d53fe891f9ea67357587a33a7aaba4b55f45 Last test of basis 105852 2017-02-16 14:01:33 Z 0 days Failing since 105857 2017-02-16 16:01:30 Z 0 days 4 attempts Testing same since 105862 2017-02-16 22:01:53 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Daniel Kiper <daniel.kiper@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Julien Grall <julien.grall@xxxxxxx> Stefano Stabellini <sstabellini@xxxxxxxxxx> jobs: build-amd64 pass build-arm64 fail build-armhf pass build-amd64-libvirt pass build-arm64-pvops fail test-armhf-armhf-xl fail test-arm64-arm64-xl-xsm broken test-amd64-amd64-xl-qemuu-debianhvm-i386 fail test-amd64-amd64-libvirt fail ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 378384399ed661bed711221a5d8dbdac66b8e851 Author: Stefano Stabellini <sstabellini@xxxxxxxxxx> Date: Fri Feb 10 18:05:22 2017 -0800 arm: read/write rank->vcpu atomically We don't need a lock in vgic_get_target_vcpu anymore, solving the following lock inversion bug: the rank lock should be taken first, then the vgic lock. However, gic_update_one_lr is called with the vgic lock held, and it calls vgic_get_target_vcpu, which tries to obtain the rank lock. Coverity-ID: 1381855 Coverity-ID: 1381853 Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit 79903e50dba9e7442c9b7ca424661bb020e9dbf2 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Feb 16 18:11:42 2017 +0100 x86emul: catch exceptions occurring in stubs Before adding more use of stubs cloned from decoded guest insns, guard ourselves against mistakes there: Should an exception (with the noteworthy exception of #PF) occur inside the stub, forward it to the guest. Since the exception fixup table entry can't encode the address of the faulting insn itself, attach it to the return address instead. This at once provides a convenient place to hand the exception information back: The return address is being overwritten by it before branching to the recovery code. Take the opportunity and (finally!) add symbol resolution to the respective log messages (the new one is intentionally not being coded that way, as it covers stub addresses only, which don't have symbols associated). Also take the opportunity and make search_one_extable() static again. Suggested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 8c935f5ff1cac422b4de21cbab69e13d2ebb25be Author: Daniel Kiper <daniel.kiper@xxxxxxxxxx> Date: Thu Feb 16 18:10:04 2017 +0100 x86: add "w" flag to .init.data section definition init.data section is clearly writable, so, add "w" flag to its definition in xen/arch/x86/boot/x86_64.S. Signed-off-by: Daniel Kiper <daniel.kiper@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit e004384bb371f5ab76a79b83da79981f4c400b83 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Feb 15 19:15:41 2017 +0000 x86/hypercall: Move hypercall continuation logic The newly-repurposed arch/x86/hypercall.c is a more appropriate place for the hypercall continuation logic to live. This is purely code motion. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit 0c221ae9d745de138850c6903a5861e2582df863 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Feb 13 11:49:33 2017 +0000 x86/hypercall: Split out PV hypercall infrastructure Repurpose arch/x86/hypercall.c to be common x86 hypercall infrastructure, and move the PV specific routines to arch/x86/pv/hypercall.c This is purely code motion. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit bb84ffc56ec14766f33a002a61fd97a62b6b17cd Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Feb 14 18:21:22 2017 +0000 x86/hypercall: Make the HVM hcall_64bit boolean common HVM guests currently make use of arch.hvm_vcpu.hcall_64bit to track the ABI of the hypercall in use. The rest of Xen deals in terms of the comat ABI or not, so rename the boolean and make it common, guared by CONFIG_COMPAT to avoid bloat if a compat ABI is not wanted/needed. Set hcall_compat uniformly for PV guests as well as HVM guests. This removes the remaining piece of guest-type-specific knowledge from hypercall_create_continuation(), allowing it to operate only in terms of the hypercall ABI in use. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit b26c93fb1b14501fece01b213590896c2c069770 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Feb 14 18:06:59 2017 +0000 xen/multicall: Use the common hcall_preempted boolean The now-common hcall_preempted boolean is perfectly usable for multicalls. Remove the multicall-specific preemption mechanism. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit 9353e3628a8cba7edc5aea470b448f290af76118 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Feb 14 17:56:33 2017 +0000 arm/hypercall: Use the common hcall_preempted boolean With hcall_preempted having just been made common, ARM can use use it to simplify its hypercall handling. This simplifies the continuation logic and removes the risk of accidentally skipping multiple instructions. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit 928ea919fc3c5476aa9df55c3b95debc8904927f Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Feb 14 17:02:04 2017 +0000 x86/hypercall: Make the HVM hcall_preempted boolean common HVM guests currently make use of arch.hvm_vcpu.hcall_preempted to track hypercall preemption in struct vcpu. Move this boolean to being common at the top level of struct vcpu, which will allow it to be reused elsewhere. Alter the PV preemption logic to use this boolean. This simplifies the code by removing guest-type-specific knowledge, and removes the risk of accidently skipping backwards or forwards multiple times and corrupting %rip. In pv_hypercall() the old_rip bodge can be removed, and parameter clobbering can happen based on a more obvious condition. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 3044a2a81910bf993c0fe6fa34bee0bf5b410911 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Feb 15 17:32:30 2017 +0000 common/vcpu: Switch v->vcpu_info_mfn to mfn_t No functional change. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit e0f6e6f614da1f3bc9147774a58ac1fbc7c74ed2 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Feb 15 17:30:48 2017 +0000 xen/sched.h Whitespace and bool cleanup Extend the Maptrack comment to point at the Grant table subsystem. No functional change. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 3091080ef7724ddac77e0ae81c270936a630477f Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Feb 15 18:04:58 2017 +0000 xen/include: Include xen/kconfig.h automatically generated/autoconf.h is already included automatically so CONFIG_* defines are available. However, the companion macros such as IS_ENABLED() are not included. Include them uniformly everywhere. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> commit 480e011ea8952f32d46e4986f098638c97b7bea4 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Feb 15 17:48:47 2017 +0000 xen/include: Remove explicit asm/config.h includes xen/config.h includes asm/config.h, and is included automatically via CFLAGS. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> commit d89f48f58ee5568fc58c574690b06cb10e2ed7f7 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Feb 15 17:45:47 2017 +0000 xen/include: Remove explicit xen/config.h includes This file is included automatically via CFLAGS. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> (qemu changes not included) _______________________________________________ osstest-output mailing list osstest-output@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/cgi-bin/mailman/listinfo/osstest-output
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |