[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.6-testing baseline-only test] 44431: trouble: blocked/broken/fail/pass



This run is configured for baseline tests only.

flight 44431 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44431/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-xsm               4 capture-logs             !broken [st=!broken!]
 build-armhf                   4 capture-logs             !broken [st=!broken!]
 build-armhf-pvops             4 capture-logs             !broken [st=!broken!]
 build-armhf-xsm               3 host-install(3)         broken REGR. vs. 44401
 build-armhf                   3 host-install(3)         broken REGR. vs. 44401
 build-armhf-pvops             3 host-install(3)         broken REGR. vs. 44401

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop              fail like 44401
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop             fail like 44401
 test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail like 44401
 test-amd64-amd64-xl-qemut-winxpsp3  9 windows-install          fail like 44401

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-xsm  1 build-check(1)               blocked  n/a
 build-armhf-libvirt           1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-midway    1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvh-amd  11 guest-start                  fail   never pass
 test-amd64-amd64-xl-pvh-intel 11 guest-start                  fail  never pass
 test-amd64-i386-libvirt      12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  12 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop             fail never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  aa3cdb6cb666400768950503863b7c3cf508f581
baseline version:
 xen                  39546d1360d954c2d0e2ff71dc74851e7081f61f

Last test of basis    44401  2016-05-10 17:29:14 Z    8 days
Testing same since    44431  2016-05-19 05:19:33 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxx>
  Kyle J. Temkin <temkink@xxxxxxxxxxxx>
  Kyle Temkin <temkink@xxxxxxxxxxxx>
  Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
  Stefano Stabellini <sstabellini@xxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Vikram Sethi <vikrams@xxxxxxxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

jobs:
 build-amd64-xsm                                              pass    
 build-armhf-xsm                                              broken  
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-armhf                                                  broken  
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          blocked 
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      pass    
 build-i386-rumpuserxen                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-armhf-armhf-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-armhf-armhf-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvh-amd                                  fail    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumpuserxen-amd64                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  blocked 
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumpuserxen-i386                             pass    
 test-amd64-amd64-qemuu-nested-intel                          fail    
 test-amd64-amd64-xl-pvh-intel                                fail    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      pass    
 test-armhf-armhf-xl-midway                                   blocked 
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 pass    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    pass    
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-xl-raw                                       pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     blocked 
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     pass    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-i386-xl-qemut-winxpsp3                            pass    
 test-amd64-amd64-xl-qemuu-winxpsp3                           pass    
 test-amd64-i386-xl-qemuu-winxpsp3                            pass    


------------------------------------------------------------
sg-report-flight on osstest.xs.citrite.net
logs: /home/osstest/logs
images: /home/osstest/images

Logs, config files, etc. are available at
    http://osstest.xs.citrite.net/~osstest/testlogs/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary

broken build-armhf-xsm capture-logs !broken
broken-step build-armhf-xsm host-install(3)
broken-step build-armhf host-install(3)
broken build-armhf capture-logs !broken
broken-step build-armhf-pvops host-install(3)
broken build-armhf-pvops capture-logs !broken

Push not applicable.

------------------------------------------------------------
commit aa3cdb6cb666400768950503863b7c3cf508f581
Author: Wei Liu <wei.liu2@xxxxxxxxxx>
Date:   Wed May 18 12:29:52 2016 +0200

    Config.mk: update mini-os changeset
    
    Patches pulled in:
        lib/sys.c: enclose file_types in define guards
        build: change MINI-OS_ROOT to MINIOS_ROOT
    
    Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit fa168e3b9f9547556d5267f55f4c8fa675b4d371
Author: Wei Liu <wei.liu2@xxxxxxxxxx>
Date:   Tue May 17 16:39:31 2016 +0200

    libxl: fix old style declarations
    
    Fix errors like:
    
    /local/work/xen.git/dist/install/usr/local/include/libxl_uuid.h:59:1: 
error: 'static' is not at beginning of declaration 
[-Werror=old-style-declaration]
     void static inline libxl_uuid_copy_0x040400(libxl_uuid *dst,
     ^
    /local/work/xen.git/dist/install/usr/local/include/libxl_uuid.h:59:1: 
error: 'inline' is not at beginning of declaration 
[-Werror=old-style-declaration]
    
    /local/work/xen.git/dist/install/usr/local/include/libxl.h:1233:1: error: 
'static' is not at beginning of declaration [-Werror=old-style-declaration]
     int static inline libxl_domain_create_restore_0x040200(
     ^
    
    Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    master commit: d5b6844942f7b21b24e92bccd85c1249592315c8
    master date: 2016-04-20 14:34:04 +0100

commit 62673da8ed1ded80f30d34cdbbb82acbc7d754cb
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue May 17 14:53:55 2016 +0200

    x86/mm: fully honor PS bits in guest page table walks
    
    In L4 entries it is currently unconditionally reserved (and hence
    should, when set, always result in a reserved bit page fault), and is
    reserved on hardware not supporting 1Gb pages (and hence should, when
    set, similarly cause a reserved bit page fault on such hardware).
    
    This is CVE-2016-4480 / XSA-176.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 46699c7393bd991234b5642763c5c24b6b39a6c4
    master date: 2016-05-17 14:41:14 +0200

commit 8d0b660324dbd47e39184a0d8446664cc62391e8
Author: Kyle J. Temkin <temkink@xxxxxxxxxxxx>
Date:   Thu Apr 28 13:14:07 2016 -0400

    xen/arm64: ensure that the correct SP is used for exceptions
    
    The ARMv8 architecture has a SPSel ("stack pointer selection") machine
    register that allows us to determine which exception level's stack
    pointer is loaded when an exception occurs. As we don't want to
    use the non-privileged SP_EL0 stack pointer -- or even assume that SP_EL0
    points to a valid address in the hypervisor context--  we'll need to ensure
    that our EL2 code sets the SPSel to SP_ELn mode, so exceptions that trap
    to EL2 use the EL2 stack pointer.
    
    This corrects an issue that can manifest as a hang-on-IRQ on some
    arm64 cores if the firmware/bootloader has previously initialized SPSel
    to 0; in which case Xen's exceptions will incorrectly use an invalid SP_EL0,
    and will endlessly spin on the synchronous abort handler.
    
    Signed-off-by: Kyle Temkin <temkink@xxxxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>
    Reviewed-by: Julien Grall <julien.grall@xxxxxxx>

commit 56b17b013ccf28336417503a80d02c3decff26d7
Author: Stefano Stabellini <sstabellini@xxxxxxxxxx>
Date:   Tue May 17 11:21:17 2016 +0100

    xen/arm: ignore writes to GICD_ICACTIVER ... GICD_ICACTIVERN
    
    Injecting a fault to the guest just because it is writing to one of the
    GICD_ICACTIVER registers, which are part of the GICv2 and GICv3 specs,
    is harsh. Additionally it causes recent linux kernels to fail to boot on
    Xen.
    
    Ignore writes to GICD_ICACTIVER ... GICD_ICACTIVERN instead, to solve
    the boot issue and for backportability. However implementing the
    registers properly might a better long term solution.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 0a43e3a969ed354f3d0adc168b9ca0dc39e1229b
Author: Vikram Sethi <vikrams@xxxxxxxxxxxxxx>
Date:   Mon Mar 28 23:46:12 2016 -0500

    arm: Fix asynchronous aborts (SError exceptions) due to bogus PTEs
    
    ARMv8 architecture allows performing prefetch data/instructions
    from memory locations marked as normal memory. Prefetch does not
    mean that the data/instruction has to be used/executed in code
    flow. All PTEs that appear to be valid to MMU must contain valid
    physical address with proper attributes otherwise MMU table walk
    might cause imprecise asynchronous aborts.
    
    The way current XEN code is preparing page tables for frametable
    and xenheap memory can create bogus PTEs. This patch fixes the
    issue by clearing page table memory before populating EL2 L0/L1
    PTEs. Without this patch XEN crashes on Qualcomm Technologies
    server chips due to asynchronous aborts.
    
    The speculative/prefetch feature explanation is scattered everywhere
    in ARM specification but below two sections have useful information.
    
    E2.8 Memory types and attributes (ver DDI0487A_h)
    G4.12.6 External abort on a translation table walk (ver DDI0487A_h)
    
    Signed-off-by: Vikram Sethi <vikrams@xxxxxxxxxxxxxx>
    Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>

commit 86f0960e37a1fc77a9c839abccbb6067549e1cb0
Author: Julien Grall <julien.grall@xxxxxxx>
Date:   Wed Apr 27 12:22:53 2016 +0100

    xen/arm: Force broadcast of TLB and instruction cache maintenance 
instructions
    
    UP guest may use TLB instructions to flush only on the local CPU.
    Therefore, TLB flush will not be broadcasted across all the CPUs within
    the same innershareable domain.
    
    When the vCPU is migrated between different CPUs, it may be rescheduled
    to a previous CPU where the TLB has not been flushed. The TLB may
    contain stale entries which will result to translate incorrectly a VA to
    IPA or even cause TLB conflicts.
    
    To avoid a such situation, it is possible to set HCR_EL2.FB, which will
    force the broadcast of TLB and instruction cache maintenance instructions.
    
    The performance impact of setting HCR_EL2.FB will depend on how often
    a guest makes use of local flush instructions.
    
    ARM64 Linux kernel is SMP-aware (no possibility to build only for UP).
    Most of the flush instructions are innershareable. The local flushes are
    limited to the boot (1 per CPU) and when a task is getting a new ASIC.
    Therefore the impact of setting HCR.FB for those guests is very limited.
    
    ARM32 Linux kernel offers the possibility to be built either for SMP or
    UP. The number of local flush is very limited in the former kernel
    whilst the latter will only issue local flushes. Therefore there will be
    an impact to set HCR.FB for guest kernel only built for UP.
    
    Note that the SMP kernel can run in a domain using 1 vCPU and it
    will still make use of innershareable flush instruction.
    
    Looking at other OSes, such as FreeBSD, they are very similar to ARM32
    Linux kernel (i.e offering two configuration: SMP and UP).
    
    However, nothing prevents an SMP-aware kernel to make more often use of
    local flush instrutions.
    
    In the case that HCR_EL2.FB is not set, Xen would need to:
        * Flush all the TLBs for the VMID associated to this domain
        * Invalidate all the entries from the branch predictor
        * Invalidate all the entries from the instruction cache
    Those actions would only be needed when the vCPU is migrating between 2
    physical CPUs.
    
    Whilst this solution would have a negative performance impact on kernels
    which do not heavily use local flush instructions, this may improve
    performance for kernels only built for UP system.
    
    For now implement the easiest solution (i.e setting HCR_EL2.FB). We can
    revisit it if the performance impact is too high for UP kernel.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxx>
    Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>

commit 94a12a35dc63493e0e44ecb9abfbf3c63aa49c50
Author: Julien Grall <julien.grall@xxxxxxx>
Date:   Fri Apr 22 16:58:33 2016 +0100

    xen/arm: traps: Correctly interpret the content of the register HPFAR_EL2
    
    The register HPFAR_EL2 (resp. HPFAR on arm32) contains the bits [47:12]
    (resp. [39:12]) of the faulting IPA. Unlike other registers that represent
    an address, the upper bits of the IPA are stored in the register bits
    [4:39] (resp. [4:21]).
    
    However, Xen assumes that the register contains the faulting IPA correctly
    offsetted. This will result to get a wrong IPA when the fault is happening
    during a translation table walk. Note this is only affecting  memaccess.
    
    Introduce a new helper to get the faulting IPA from HPFAR_EL2 and
    replace direct read from the register by the helper.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxx>
    Reviewed-by: Andre Przywara <andre.przywara@xxxxxxx>
    Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>

commit e7cb648d4db185f9fc69e7ca570f79e39180b11a
Author: Julien Grall <julien.grall@xxxxxxx>
Date:   Fri Apr 22 16:58:32 2016 +0100

    xen/bitops: Introduce GENMASK to generate mask
    
    The code has been imported from the header include/linux/bitops.h in
    Linux v4.6-rc3.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxx>
    Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>

commit 426783e661da942f8b7871613479db4daa6a16c3
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue May 10 19:19:36 2016 +0100

    Update QEMU_UPSTREAM_REVISION

commit 8919e76ccebfeafef49b9851dc4fd547cb4bd954
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue May 10 19:15:38 2016 +0100

    QEMU_TAG update

commit 5f05c100ca54acad94f73b6d679470323e664b16
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue May 10 18:58:50 2016 +0100

    QEMU_TAG update

commit ff4357574c989db9e73df4217cb7c6fc95b8b724
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue May 10 18:58:08 2016 +0100

    QEMU_TAG update
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.