[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[xen-unstable test] 133390: regressions - trouble: broken/fail/pass



flight 133390 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/133390/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-freebsd10-i386    <job status>                 broken
 test-amd64-i386-xl-qemut-debianhvm-amd64    <job status>                broken
 test-armhf-armhf-xl-credit1     <job status>                 broken
 test-amd64-i386-xl              <job status>                 broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-xl-qemut-win10-i386    <job status>                 broken
 test-amd64-i386-rumprun-i386    <job status>                 broken
 test-amd64-amd64-rumprun-amd64    <job status>                 broken
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm    <job status>       broken
 test-amd64-amd64-xl-credit2     <job status>                 broken
 test-amd64-i386-qemuu-rhel6hvm-intel    <job status>                 broken
 test-amd64-amd64-xl-qemut-debianhvm-amd64    <job status>               broken
 test-amd64-i386-xl-qemut-ws16-amd64    <job status>                 broken
 test-amd64-i386-qemuu-rhel6hvm-intel 4 host-install(4) broken REGR. vs. 133300
 test-amd64-i386-rumprun-i386  4 host-install(4)        broken REGR. vs. 133300
 test-amd64-amd64-rumprun-amd64  4 host-install(4)      broken REGR. vs. 133300
 test-amd64-amd64-xl-qemut-win10-i386 4 host-install(4) broken REGR. vs. 133300
 test-amd64-i386-xl-qemut-ws16-amd64  4 host-install(4) broken REGR. vs. 133300
 test-amd64-amd64-xl-qemut-debianhvm-amd64 4 host-install(4) broken REGR. vs. 
133300
 test-amd64-i386-xl-qemut-debianhvm-amd64 4 host-install(4) broken REGR. vs. 
133300
 test-amd64-amd64-xl-credit2   4 host-install(4)        broken REGR. vs. 133300
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 4 host-install(4) broken REGR. vs. 
133300
 test-amd64-i386-freebsd10-i386  4 host-install(4)      broken REGR. vs. 133300
 test-amd64-i386-xl            4 host-install(4)        broken REGR. vs. 133300
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 4 host-install(4) broken 
REGR. vs. 133300
 test-armhf-armhf-xl-credit1   4 host-install(4)        broken REGR. vs. 133300
 test-armhf-armhf-xl-arndale   7 xen-boot                 fail REGR. vs. 133300
 test-amd64-i386-xl-qemuu-debianhvm-amd64 10 debian-hvm-install fail REGR. vs. 
133300
 test-amd64-amd64-qemuu-nested-intel 10 debian-hvm-install fail REGR. vs. 133300
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 10 debian-hvm-install 
fail REGR. vs. 133300
 test-amd64-amd64-qemuu-nested-amd 10 debian-hvm-install  fail REGR. vs. 133300
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 10 debian-hvm-install fail REGR. 
vs. 133300
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 10 debian-hvm-install 
fail REGR. vs. 133300
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 debian-hvm-install fail 
REGR. vs. 133300
 test-amd64-amd64-i386-pvgrub 10 debian-di-install        fail REGR. vs. 133300
 test-amd64-amd64-xl-qcow2    10 debian-di-install        fail REGR. vs. 133300
 test-amd64-amd64-libvirt-vhd 10 debian-di-install        fail REGR. vs. 133300
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 10 debian-hvm-install fail REGR. 
vs. 133300
 test-amd64-i386-xl-raw       10 debian-di-install        fail REGR. vs. 133300
 test-armhf-armhf-xl-vhd      10 debian-di-install        fail REGR. vs. 133300

Tests which did not succeed, but are not blocking:
 test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stop             fail like 133282
 test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop            fail like 133300
 test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop             fail like 133300
 test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop             fail like 133300
 test-armhf-armhf-libvirt     14 saverestore-support-check    fail  like 133300
 test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop            fail like 133300
 test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop            fail like 133300
 test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop            fail like 133300
 test-armhf-armhf-libvirt-raw 13 saverestore-support-check    fail  like 133300
 test-amd64-i386-libvirt-xsm  13 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    12 guest-start                  fail   never pass
 test-arm64-arm64-xl-credit1  13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  14 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          14 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  14 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 13 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 14 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      14 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     13 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 13 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 14 saverestore-support-check    fail never pass
 test-amd64-i386-libvirt      13 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     13 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 12 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-qemuu-win10-i386 10 windows-install        fail never pass
 test-amd64-i386-xl-qemuu-win10-i386 10 windows-install         fail never pass
 test-amd64-i386-xl-qemut-win10-i386 10 windows-install         fail never pass
 test-armhf-armhf-xl-multivcpu 13 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 14 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          14 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  e72ecc7615410e5bf1a1c9a4c7772322c16eeb82
baseline version:
 xen                  365aabb6e5023cee476adf81106729efd49c644f

Last test of basis   133300  2019-02-18 10:44:15 Z    6 days
Failing since        133316  2019-02-19 22:18:02 Z    5 days    3 attempts
Testing same since   133390  2019-02-23 06:56:39 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  Roger Pau Monne <roger.pau@xxxxxxxxxx>
  Roger Pau Monné <roger.pau@xxxxxxxxxx>
  Varad Gautam <vrd@xxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumprun                                          pass    
 build-i386-rumprun                                           pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           broken  
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm                fail    
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm                 fail    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           fail    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            broken  
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        fail    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemut-debianhvm-amd64                     broken  
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     fail    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumprun-amd64                               broken  
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          broken  
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  fail    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  broken  
 test-amd64-amd64-xl-credit2                                  broken  
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         fail    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               broken  
 test-amd64-i386-rumprun-i386                                 broken  
 test-amd64-amd64-xl-qemut-win10-i386                         broken  
 test-amd64-i386-xl-qemut-win10-i386                          fail    
 test-amd64-amd64-xl-qemuu-win10-i386                         fail    
 test-amd64-i386-xl-qemuu-win10-i386                          fail    
 test-amd64-amd64-qemuu-nested-intel                          fail    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         broken  
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 fail    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-xl-qcow2                                    fail    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-xl-raw                                       fail    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-amd64-amd64-libvirt-vhd                                 fail    
 test-armhf-armhf-xl-vhd                                      fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-amd64-i386-freebsd10-i386 broken
broken-job test-amd64-i386-xl-qemut-debianhvm-amd64 broken
broken-job test-armhf-armhf-xl-credit1 broken
broken-job test-amd64-i386-xl broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken
broken-job test-amd64-amd64-xl-qemut-win10-i386 broken
broken-job test-amd64-i386-rumprun-i386 broken
broken-job test-amd64-amd64-rumprun-amd64 broken
broken-job test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-xl-credit2 broken
broken-job test-amd64-i386-qemuu-rhel6hvm-intel broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-amd64 broken
broken-job test-amd64-i386-xl-qemut-ws16-amd64 broken
broken-step test-amd64-i386-qemuu-rhel6hvm-intel host-install(4)
broken-step test-amd64-i386-rumprun-i386 host-install(4)
broken-step test-amd64-amd64-rumprun-amd64 host-install(4)
broken-step test-amd64-amd64-xl-qemut-win10-i386 host-install(4)
broken-step test-amd64-i386-xl-qemut-ws16-amd64 host-install(4)
broken-step test-amd64-amd64-xl-qemut-debianhvm-amd64 host-install(4)
broken-step test-amd64-i386-xl-qemut-debianhvm-amd64 host-install(4)
broken-step test-amd64-amd64-xl-credit2 host-install(4)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64 host-install(4)
broken-step test-amd64-i386-freebsd10-i386 host-install(4)
broken-step test-amd64-i386-xl host-install(4)
broken-step test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm host-install(4)
broken-step test-armhf-armhf-xl-credit1 host-install(4)

Not pushing.

------------------------------------------------------------
commit e72ecc7615410e5bf1a1c9a4c7772322c16eeb82
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Thu Jan 17 12:26:17 2019 +0000

    x86/altp2m: Rework #VE enable/disable paths
    
    Split altp2m_vcpu_{enable,disable}_ve() out of the
    HVMOP_altp2m_vcpu_{enable,disable}_notify marshalling logic.  A future 
change
    is going to need to call altp2m_vcpu_disable_ve() from the domain_kill() 
path.
    
    While at it, clean up the logic in altp2m_vcpu_{initialise,destroy}().
    altp2m_vcpu_reset() has no external callers, so fold it into its two
    callsites.  This in turn allows for altp2m_vcpu_destroy() to reuse
    altp2m_vcpu_disable_ve() rather than opencoding it.
    
    No practical change.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 0dfffe01d5681ede6a50c6b57131320d9f4a3361
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Feb 20 13:39:20 2019 +0000

    x86: Improve the efficiency of domain_relinquish_resources()
    
    pci_release_devices() takes the global PCI lock.  Once pci_release_devices()
    has completed, it will be called redundantly each time paging_teardown() and
    vcpu_destroy_pagetables() continue.
    
    This is liable to be millions of times for a reasonably sized guest, and is 
a
    serialising bottleneck now that domain_kill() can be run concurrently on
    different domains.
    
    Instead of propagating the opencoding of the relinquish state machine, take
    the opportunity to clean it up.
    
    Leave a proper set of comments explaining that domain_relinquish_resources()
    implements a co-routine.  Introduce a documented PROGRESS() macro to avoid
    latent bugs such as the RELMEM_xen case, and make the new PROG_* states
    private to domain_relinquish_resources().
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit db2af23d15077605f286d8ef86c8f5d9c1b8302a
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Feb 20 17:07:17 2019 +0100

    x86/shadow: don't pass wrong L4 MFN to guest_walk_tables()
    
    64-bit PV guest user mode runs on a different L4 table. Make sure
    - the accessed bit gets set in the correct table (and in log-dirty
      mode the correct page gets marked dirty) during guest walks,
    - the correct table gets audited by sh_audit_gw(),
    - correct info gets logged by print_gw().
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit b22c900c44a2db8db1c53e269e152206e55c273f
Author: Varad Gautam <vrd@xxxxxxxxx>
Date:   Wed Feb 20 17:06:25 2019 +0100

    x86/pmtimer: fix hvm_acpi_sleep_button behavior
    
    Commit 19fb14622e941 "x86/pmtimer: move ACPI registers from PMTState to
    hvm_domain" misconfigures pm1a_sts for hvm_acpi_sleep_button with
    PWRBTN_STS instead of SLPBTN_STS, which leads to
    XEN_DOMCTL_SENDTRIGGER_SLEEP causing guest powerdowns. Fix this.
    
    Signed-off-by: Varad Gautam <vrd@xxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 3c5552954c5c63860ccc01c6bc4f9c077bc26072
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Fri Feb 1 16:56:38 2019 +0000

    x86/vpmu: Improve documentation and parsing for vpmu=
    
    The behaviour of vpmu=<bool> being exclusive of vpmu=bts|ipc|arch is odd and
    contrary to Xen's normal command line parsing behaviour.  Rewrite the 
parsing
    to use the normal form, but retain the previous behaviour where the use of
    bts/ipc/arch implies vpmu=true.
    
    Parts of the documenation are stale, most notibly the HVM-only statement.
    Update it for consistency and correctness.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 1e12872d29cc36c61894e347dd3409d7d206699d
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Tue Feb 19 16:26:08 2019 +0100

    libs/gnttab: add missing FreeBSD functions
    
    The FreeBSD implementation is missing the following functions:
    
    osdep_gnttab_dmabuf_exp_from_refs
    osdep_gnttab_dmabuf_exp_wait_released
    osdep_gnttab_dmabuf_imp_to_refs
    osdep_gnttab_dmabuf_imp_release
    
    Which all deal with dmabufs, that only exists on Linux. Implement them
    using abort, since such functions should never be called on FreeBSD.
    
    FTR, I realized those functions where missing when attempting to use
    pygrub:
    
    Traceback (most recent call last):
      File "/usr/local/lib/xen/bin/pygrub", line 19, in <module>
        import xen.lowlevel.xc
    ImportError: /usr/local/lib/libxengnttab.so.1: Undefined symbol 
"osdep_gnttab_dmabuf_exp_from_refs"
    
    Fixes: ee8105 ("libgnttab: Add support for Linux dma-buf")
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>
    Reviewed-by: Oleksandr Andrushchenko <oleksandr_andrushchenko@xxxxxxxx>

commit 1bcd0b43a16b7a48ec9afce3887c6c841b687abb
Author: Roger Pau Monne <roger.pau@xxxxxxxxxx>
Date:   Mon Feb 18 17:24:28 2019 +0100

    vpci: reduce verboseness of BAR write warnings
    
    Avoid printing a warning message when writing to a BAR register with
    memory decoding enabled if the value written is the same as the
    current one.
    
    No functional change.
    
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 24d5282527f4647907b3572820b5335c15cd0356
Author: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
Date:   Mon Feb 18 13:46:02 2019 +0100

    x86/altp2m: fix HVMOP_altp2m_set_domain_state race
    
    HVMOP_altp2m_set_domain_state does not domain_pause(), presumably
    on purpose (as it was originally supposed to cater to a in-guest
    agent, and a domain pausing itself is not a good idea).
    
    This can lead to domain crashes in the vmx_vmexit_handler() code
    that checks if the guest has the ability to switch EPTP without an
    exit. That code can __vmread() the host p2m's EPT_POINTER
    (before HVMOP_altp2m_set_domain_state "for_each_vcpu()" has a
    chance to run altp2m_vcpu_initialise(), but after
    d->arch.altp2m_active is set).
    
    Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 29d28b29190ba09d53ae7e475108def84e16e363
Author: George Dunlap <george.dunlap@xxxxxxxxxx>
Date:   Mon Feb 18 13:45:24 2019 +0100

    altp2m: Prevent deadlocks when a domain performs altp2m operations on itself
    
    domain_pause_except_self() was introduced to allow a domain to pause
    itself while doing altp2m operations.  However, as written, it has a
    risk fo deadlock if two vcpus enter the loop at the same time.
    
    Luckily, there's already a solution for this: Attempt to call domain's
    hypercall_deadlock_mutex, and restart the entire hypercall if you
    fail.
    
    Make domain_pause_except_self() attempt to grab this mutex when
    pausing itself, returning -ERESTART if it fails.  Have the callers
    check for errors and pass the value up.  In both cases, the top-level
    do_hvm_op() should DTRT when -ERESTART is returned.
    
    The (necessary) reuse of the hypercall deadlock mutex poses the risk
    of getting called from a context where the lock was already acquired
    (e.g. someone may (say) call domctl_lock(), then afterwards call
    domain_pause_except_self()). However, in the interest of not
    overcomplicating things, no changes are made here to the mutex.
    Attempted nesting of this lock isn't a security issue, because all
    that will happen is that the vcpu will livelock taking continuations.
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Tested-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit fbaa0e58f39ae23263ad0935d88a7e61e0dd9ef1
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Mon Feb 18 13:44:53 2019 +0100

    pvh/dom0: warn when dom0_mem is not set
    
    There have been several reports of the dom0 builder running out of
    memory when building a PVH dom0 without having specified a dom0_mem
    value. Print a warning message if dom0_mem is not set when booting in
    PVH mode.
    
    This is a temporary workaround until accounting for internal memory
    required by Xen (ie: paging structures) is improved.
    
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 6fa1755644d0e63793007c8d911b4b520ca95301
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Mon Feb 18 13:44:24 2019 +0100

    amd/npt/shadow: replace assert that prevents creating 2M/1G MMIO entries
    
    The assert was originally added to make sure that higher order
    regions (> PAGE_ORDER_4K) could not be used to bypass the
    mmio_ro_ranges check performed by p2m_type_to_flags.
    
    This however is already checked in set_mmio_p2m_entry, which makes
    sure that higher order mappings don't overlap with mmio_ro_ranges,
    thus allowing the creation of high order MMIO mappings safely.
    
    Replace the assert to allow 2M/1G entries to be created for MMIO
    regions and add some extra asserts as a replacement to make sure
    there's no overlapping with MMIO read-only ranges.
    
    Note that 1G MMIO entries will not be created unless mmio_order is
    changed to allow it.
    
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 036c6cbddca28be5a526da045bb379fedfad8255
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Mon Feb 18 13:43:50 2019 +0100

    x86/pvh: reorder PVH dom0 iommu initialization
    
    So that the iommu is initialized before populating the p2m, and
    entries added get the corresponding iommu page table entries if
    required. This requires splitting the current pvh_setup_p2m into two
    different functions. One that crafts dom0 physmap and sets the paging
    allocation, and another one that actually populates the p2m with RAM
    regions.
    
    Note that this allows to remove the special casing done for the low
    1MB in hwdom_iommu_map.
    
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit dc0b0b1f2d5792ecd9e26f2e65b36682f8ec2b27
Author: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Date:   Mon Feb 18 13:42:51 2019 +0100

    dom0/pvh: align allocation and mapping order to start address
    
    The p2m and iommu mapping code always had the requirement that
    addresses and orders must be aligned when populating the p2m or the
    iommu page tables.
    
    PVH dom0 builder didn't take this requirement into account, and can
    call into the p2m/iommu mapping helpers with addresses and orders that
    are not aligned.
    
    Fix this by making sure the orders passed to the physmap population
    helpers are always aligned to the guest address to be populated.
    
    Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>
(qemu changes not included)

_______________________________________________
osstest-output mailing list
osstest-output@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/osstest-output

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.