[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.5-testing test] 94518: regressions - FAIL

flight 94518 xen-4.5-testing real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-libvirt            5 libvirt-build             fail REGR. vs. 93989
 build-amd64-libvirt           5 libvirt-build             fail REGR. vs. 93989
 build-armhf-libvirt           5 libvirt-build             fail REGR. vs. 93989
 test-amd64-amd64-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs. 
 test-amd64-i386-xl-qemuu-winxpsp3 15 guest-localmigrate/x10 fail REGR. vs. 

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds     11 guest-start                  fail   like 93928
 test-amd64-amd64-xl-rtds      6 xen-boot                     fail   like 93989
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop              fail like 93989
 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop             fail like 93989
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop              fail like 93989

Tests which did not succeed, but are not blocking:
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvh-intel 11 guest-start                  fail  never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start                  fail   never pass
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      10 guest-start                  fail   never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 13 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 13 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-check        fail  never pass

version targeted for testing:
 xen                  62e890246736d48030640198d3fd9d71fe392de3
baseline version:
 xen                  2bc9bd9483b254a80b7f83408f45aa1c6ef17ef3

Last test of basis    93989  2016-05-10 14:43:18 Z    7 days
Failing since         94030  2016-05-11 13:08:55 Z    6 days   11 attempts
Testing same since    94518  2016-05-17 13:41:54 Z    0 days    1 attempts

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxx>
  Kyle J. Temkin <temkink@xxxxxxxxxxxx>
  Kyle Temkin <temkink@xxxxxxxxxxxx>
  Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
  Stefano Stabellini <sstabellini@xxxxxxxxxx>
  Vikram Sethi <vikrams@xxxxxxxxxxxxxx>

 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      pass    
 build-i386-rumpuserxen                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvh-amd                                  fail    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumpuserxen-amd64                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumpuserxen-i386                             pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvh-intel                                fail    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 pass    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    pass    
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-xl-raw                                       pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     fail    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     pass    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass    
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-armhf-armhf-xl-vhd                                      fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           pass    
 test-amd64-i386-xl-qemut-winxpsp3                            pass    
 test-amd64-amd64-xl-qemuu-winxpsp3                           pass    
 test-amd64-i386-xl-qemuu-winxpsp3                            fail    

sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at

Explanation of these reports, and of osstest in general, is at

Test harness code can be found at

Not pushing.

commit 62e890246736d48030640198d3fd9d71fe392de3
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue May 17 14:55:32 2016 +0200

    x86/mm: fully honor PS bits in guest page table walks
    In L4 entries it is currently unconditionally reserved (and hence
    should, when set, always result in a reserved bit page fault), and is
    reserved on hardware not supporting 1Gb pages (and hence should, when
    set, similarly cause a reserved bit page fault on such hardware).
    This is CVE-2016-4480 / XSA-176.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 46699c7393bd991234b5642763c5c24b6b39a6c4
    master date: 2016-05-17 14:41:14 +0200

commit 4065709a02a963c86ba64631c123ea2481c71712
Author: Kyle J. Temkin <temkink@xxxxxxxxxxxx>
Date:   Thu Apr 28 13:14:07 2016 -0400

    xen/arm64: ensure that the correct SP is used for exceptions
    The ARMv8 architecture has a SPSel ("stack pointer selection") machine
    register that allows us to determine which exception level's stack
    pointer is loaded when an exception occurs. As we don't want to
    use the non-privileged SP_EL0 stack pointer -- or even assume that SP_EL0
    points to a valid address in the hypervisor context--  we'll need to ensure
    that our EL2 code sets the SPSel to SP_ELn mode, so exceptions that trap
    to EL2 use the EL2 stack pointer.
    This corrects an issue that can manifest as a hang-on-IRQ on some
    arm64 cores if the firmware/bootloader has previously initialized SPSel
    to 0; in which case Xen's exceptions will incorrectly use an invalid SP_EL0,
    and will endlessly spin on the synchronous abort handler.
    Signed-off-by: Kyle Temkin <temkink@xxxxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>
    Reviewed-by: Julien Grall <julien.grall@xxxxxxx>

commit d19f9412f2fe046247bc6bf68dc6a4c5129bfd41
Author: Vikram Sethi <vikrams@xxxxxxxxxxxxxx>
Date:   Mon Mar 28 23:46:12 2016 -0500

    arm: Fix asynchronous aborts (SError exceptions) due to bogus PTEs
    ARMv8 architecture allows performing prefetch data/instructions
    from memory locations marked as normal memory. Prefetch does not
    mean that the data/instruction has to be used/executed in code
    flow. All PTEs that appear to be valid to MMU must contain valid
    physical address with proper attributes otherwise MMU table walk
    might cause imprecise asynchronous aborts.
    The way current XEN code is preparing page tables for frametable
    and xenheap memory can create bogus PTEs. This patch fixes the
    issue by clearing page table memory before populating EL2 L0/L1
    PTEs. Without this patch XEN crashes on Qualcomm Technologies
    server chips due to asynchronous aborts.
    The speculative/prefetch feature explanation is scattered everywhere
    in ARM specification but below two sections have useful information.
    E2.8 Memory types and attributes (ver DDI0487A_h)
    G4.12.6 External abort on a translation table walk (ver DDI0487A_h)
    Signed-off-by: Vikram Sethi <vikrams@xxxxxxxxxxxxxx>
    Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>

commit c0bb033951c7595a020025e2e765e0e5b4aa1312
Author: Julien Grall <julien.grall@xxxxxxx>
Date:   Wed Apr 27 12:22:53 2016 +0100

    xen/arm: Force broadcast of TLB and instruction cache maintenance 
    UP guest may use TLB instructions to flush only on the local CPU.
    Therefore, TLB flush will not be broadcasted across all the CPUs within
    the same innershareable domain.
    When the vCPU is migrated between different CPUs, it may be rescheduled
    to a previous CPU where the TLB has not been flushed. The TLB may
    contain stale entries which will result to translate incorrectly a VA to
    IPA or even cause TLB conflicts.
    To avoid a such situation, it is possible to set HCR_EL2.FB, which will
    force the broadcast of TLB and instruction cache maintenance instructions.
    The performance impact of setting HCR_EL2.FB will depend on how often
    a guest makes use of local flush instructions.
    ARM64 Linux kernel is SMP-aware (no possibility to build only for UP).
    Most of the flush instructions are innershareable. The local flushes are
    limited to the boot (1 per CPU) and when a task is getting a new ASIC.
    Therefore the impact of setting HCR.FB for those guests is very limited.
    ARM32 Linux kernel offers the possibility to be built either for SMP or
    UP. The number of local flush is very limited in the former kernel
    whilst the latter will only issue local flushes. Therefore there will be
    an impact to set HCR.FB for guest kernel only built for UP.
    Note that the SMP kernel can run in a domain using 1 vCPU and it
    will still make use of innershareable flush instruction.
    Looking at other OSes, such as FreeBSD, they are very similar to ARM32
    Linux kernel (i.e offering two configuration: SMP and UP).
    However, nothing prevents an SMP-aware kernel to make more often use of
    local flush instrutions.
    In the case that HCR_EL2.FB is not set, Xen would need to:
        * Flush all the TLBs for the VMID associated to this domain
        * Invalidate all the entries from the branch predictor
        * Invalidate all the entries from the instruction cache
    Those actions would only be needed when the vCPU is migrating between 2
    physical CPUs.
    Whilst this solution would have a negative performance impact on kernels
    which do not heavily use local flush instructions, this may improve
    performance for kernels only built for UP system.
    For now implement the easiest solution (i.e setting HCR_EL2.FB). We can
    revisit it if the performance impact is too high for UP kernel.
    Signed-off-by: Julien Grall <julien.grall@xxxxxxx>
    Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>

commit 1334fa937ad269e9f476fc6a69fd895f5fc99864
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue May 10 19:20:16 2016 +0100


commit 478ad3fddeeaf57b883f21e506e65e8393668d23
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue May 10 19:16:08 2016 +0100

    QEMU_TAG update

commit 2c438f811f8c9fb615f1f05bc11ab1de5aaab857
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue May 10 19:07:29 2016 +0100

    QEMU_TAG update
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.