[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.6-testing baseline-only test] 44431: trouble: blocked/broken/fail/pass
This run is configured for baseline tests only. flight 44431 xen-4.6-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/44431/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm 4 capture-logs !broken [st=!broken!] build-armhf 4 capture-logs !broken [st=!broken!] build-armhf-pvops 4 capture-logs !broken [st=!broken!] build-armhf-xsm 3 host-install(3) broken REGR. vs. 44401 build-armhf 3 host-install(3) broken REGR. vs. 44401 build-armhf-pvops 3 host-install(3) broken REGR. vs. 44401 Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 44401 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 44401 test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail like 44401 test-amd64-amd64-xl-qemut-winxpsp3 9 windows-install fail like 44401 Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 1 build-check(1) blocked n/a test-armhf-armhf-libvirt-xsm 1 build-check(1) blocked n/a build-armhf-libvirt 1 build-check(1) blocked n/a test-armhf-armhf-libvirt-qcow2 1 build-check(1) blocked n/a test-armhf-armhf-xl-midway 1 build-check(1) blocked n/a test-armhf-armhf-libvirt-raw 1 build-check(1) blocked n/a test-armhf-armhf-xl-multivcpu 1 build-check(1) blocked n/a test-armhf-armhf-xl-credit2 1 build-check(1) blocked n/a test-armhf-armhf-xl 1 build-check(1) blocked n/a test-armhf-armhf-xl-xsm 1 build-check(1) blocked n/a test-armhf-armhf-xl-rtds 1 build-check(1) blocked n/a test-armhf-armhf-xl-vhd 1 build-check(1) blocked n/a test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-xsm 12 migrate-support-check fail never pass test-amd64-i386-libvirt-xsm 12 migrate-support-check fail never pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2 fail never pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass version targeted for testing: xen aa3cdb6cb666400768950503863b7c3cf508f581 baseline version: xen 39546d1360d954c2d0e2ff71dc74851e7081f61f Last test of basis 44401 2016-05-10 17:29:14 Z 8 days Testing same since 44431 2016-05-19 05:19:33 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Julien Grall <julien.grall@xxxxxxx> Kyle J. Temkin <temkink@xxxxxxxxxxxx> Kyle Temkin <temkink@xxxxxxxxxxxx> Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Stefano Stabellini <sstabellini@xxxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Vikram Sethi <vikrams@xxxxxxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64-xsm pass build-armhf-xsm broken build-i386-xsm pass build-amd64 pass build-armhf broken build-i386 pass build-amd64-libvirt pass build-armhf-libvirt blocked build-i386-libvirt pass build-amd64-prev pass build-i386-prev pass build-amd64-pvops pass build-armhf-pvops broken build-i386-pvops pass build-amd64-rumpuserxen pass build-i386-rumpuserxen pass test-amd64-amd64-xl pass test-armhf-armhf-xl blocked test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-xsm pass test-armhf-armhf-libvirt-xsm blocked test-amd64-i386-libvirt-xsm pass test-amd64-amd64-xl-xsm pass test-armhf-armhf-xl-xsm blocked test-amd64-i386-xl-xsm pass test-amd64-amd64-qemuu-nested-amd fail test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumpuserxen-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 pass test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 blocked test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumpuserxen-i386 pass test-amd64-amd64-qemuu-nested-intel fail test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt blocked test-amd64-i386-libvirt pass test-armhf-armhf-xl-midway blocked test-amd64-amd64-migrupgrade pass test-amd64-i386-migrupgrade pass test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu blocked test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair pass test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub pass test-amd64-amd64-pygrub pass test-armhf-armhf-libvirt-qcow2 blocked test-amd64-amd64-xl-qcow2 pass test-armhf-armhf-libvirt-raw blocked test-amd64-i386-xl-raw pass test-amd64-amd64-xl-rtds pass test-armhf-armhf-xl-rtds blocked test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd blocked test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-i386-xl-qemut-winxpsp3 pass test-amd64-amd64-xl-qemuu-winxpsp3 pass test-amd64-i386-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xs.citrite.net/~osstest/testlogs/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary broken build-armhf-xsm capture-logs !broken broken-step build-armhf-xsm host-install(3) broken-step build-armhf host-install(3) broken build-armhf capture-logs !broken broken-step build-armhf-pvops host-install(3) broken build-armhf-pvops capture-logs !broken Push not applicable. ------------------------------------------------------------ commit aa3cdb6cb666400768950503863b7c3cf508f581 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Wed May 18 12:29:52 2016 +0200 Config.mk: update mini-os changeset Patches pulled in: lib/sys.c: enclose file_types in define guards build: change MINI-OS_ROOT to MINIOS_ROOT Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit fa168e3b9f9547556d5267f55f4c8fa675b4d371 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Tue May 17 16:39:31 2016 +0200 libxl: fix old style declarations Fix errors like: /local/work/xen.git/dist/install/usr/local/include/libxl_uuid.h:59:1: error: 'static' is not at beginning of declaration [-Werror=old-style-declaration] void static inline libxl_uuid_copy_0x040400(libxl_uuid *dst, ^ /local/work/xen.git/dist/install/usr/local/include/libxl_uuid.h:59:1: error: 'inline' is not at beginning of declaration [-Werror=old-style-declaration] /local/work/xen.git/dist/install/usr/local/include/libxl.h:1233:1: error: 'static' is not at beginning of declaration [-Werror=old-style-declaration] int static inline libxl_domain_create_restore_0x040200( ^ Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> master commit: d5b6844942f7b21b24e92bccd85c1249592315c8 master date: 2016-04-20 14:34:04 +0100 commit 62673da8ed1ded80f30d34cdbbb82acbc7d754cb Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue May 17 14:53:55 2016 +0200 x86/mm: fully honor PS bits in guest page table walks In L4 entries it is currently unconditionally reserved (and hence should, when set, always result in a reserved bit page fault), and is reserved on hardware not supporting 1Gb pages (and hence should, when set, similarly cause a reserved bit page fault on such hardware). This is CVE-2016-4480 / XSA-176. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> master commit: 46699c7393bd991234b5642763c5c24b6b39a6c4 master date: 2016-05-17 14:41:14 +0200 commit 8d0b660324dbd47e39184a0d8446664cc62391e8 Author: Kyle J. Temkin <temkink@xxxxxxxxxxxx> Date: Thu Apr 28 13:14:07 2016 -0400 xen/arm64: ensure that the correct SP is used for exceptions The ARMv8 architecture has a SPSel ("stack pointer selection") machine register that allows us to determine which exception level's stack pointer is loaded when an exception occurs. As we don't want to use the non-privileged SP_EL0 stack pointer -- or even assume that SP_EL0 points to a valid address in the hypervisor context-- we'll need to ensure that our EL2 code sets the SPSel to SP_ELn mode, so exceptions that trap to EL2 use the EL2 stack pointer. This corrects an issue that can manifest as a hang-on-IRQ on some arm64 cores if the firmware/bootloader has previously initialized SPSel to 0; in which case Xen's exceptions will incorrectly use an invalid SP_EL0, and will endlessly spin on the synchronous abort handler. Signed-off-by: Kyle Temkin <temkink@xxxxxxxxxxxx> Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit 56b17b013ccf28336417503a80d02c3decff26d7 Author: Stefano Stabellini <sstabellini@xxxxxxxxxx> Date: Tue May 17 11:21:17 2016 +0100 xen/arm: ignore writes to GICD_ICACTIVER ... GICD_ICACTIVERN Injecting a fault to the guest just because it is writing to one of the GICD_ICACTIVER registers, which are part of the GICv2 and GICv3 specs, is harsh. Additionally it causes recent linux kernels to fail to boot on Xen. Ignore writes to GICD_ICACTIVER ... GICD_ICACTIVERN instead, to solve the boot issue and for backportability. However implementing the registers properly might a better long term solution. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 0a43e3a969ed354f3d0adc168b9ca0dc39e1229b Author: Vikram Sethi <vikrams@xxxxxxxxxxxxxx> Date: Mon Mar 28 23:46:12 2016 -0500 arm: Fix asynchronous aborts (SError exceptions) due to bogus PTEs ARMv8 architecture allows performing prefetch data/instructions from memory locations marked as normal memory. Prefetch does not mean that the data/instruction has to be used/executed in code flow. All PTEs that appear to be valid to MMU must contain valid physical address with proper attributes otherwise MMU table walk might cause imprecise asynchronous aborts. The way current XEN code is preparing page tables for frametable and xenheap memory can create bogus PTEs. This patch fixes the issue by clearing page table memory before populating EL2 L0/L1 PTEs. Without this patch XEN crashes on Qualcomm Technologies server chips due to asynchronous aborts. The speculative/prefetch feature explanation is scattered everywhere in ARM specification but below two sections have useful information. E2.8 Memory types and attributes (ver DDI0487A_h) G4.12.6 External abort on a translation table walk (ver DDI0487A_h) Signed-off-by: Vikram Sethi <vikrams@xxxxxxxxxxxxxx> Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> commit 86f0960e37a1fc77a9c839abccbb6067549e1cb0 Author: Julien Grall <julien.grall@xxxxxxx> Date: Wed Apr 27 12:22:53 2016 +0100 xen/arm: Force broadcast of TLB and instruction cache maintenance instructions UP guest may use TLB instructions to flush only on the local CPU. Therefore, TLB flush will not be broadcasted across all the CPUs within the same innershareable domain. When the vCPU is migrated between different CPUs, it may be rescheduled to a previous CPU where the TLB has not been flushed. The TLB may contain stale entries which will result to translate incorrectly a VA to IPA or even cause TLB conflicts. To avoid a such situation, it is possible to set HCR_EL2.FB, which will force the broadcast of TLB and instruction cache maintenance instructions. The performance impact of setting HCR_EL2.FB will depend on how often a guest makes use of local flush instructions. ARM64 Linux kernel is SMP-aware (no possibility to build only for UP). Most of the flush instructions are innershareable. The local flushes are limited to the boot (1 per CPU) and when a task is getting a new ASIC. Therefore the impact of setting HCR.FB for those guests is very limited. ARM32 Linux kernel offers the possibility to be built either for SMP or UP. The number of local flush is very limited in the former kernel whilst the latter will only issue local flushes. Therefore there will be an impact to set HCR.FB for guest kernel only built for UP. Note that the SMP kernel can run in a domain using 1 vCPU and it will still make use of innershareable flush instruction. Looking at other OSes, such as FreeBSD, they are very similar to ARM32 Linux kernel (i.e offering two configuration: SMP and UP). However, nothing prevents an SMP-aware kernel to make more often use of local flush instrutions. In the case that HCR_EL2.FB is not set, Xen would need to: * Flush all the TLBs for the VMID associated to this domain * Invalidate all the entries from the branch predictor * Invalidate all the entries from the instruction cache Those actions would only be needed when the vCPU is migrating between 2 physical CPUs. Whilst this solution would have a negative performance impact on kernels which do not heavily use local flush instructions, this may improve performance for kernels only built for UP system. For now implement the easiest solution (i.e setting HCR_EL2.FB). We can revisit it if the performance impact is too high for UP kernel. Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 94a12a35dc63493e0e44ecb9abfbf3c63aa49c50 Author: Julien Grall <julien.grall@xxxxxxx> Date: Fri Apr 22 16:58:33 2016 +0100 xen/arm: traps: Correctly interpret the content of the register HPFAR_EL2 The register HPFAR_EL2 (resp. HPFAR on arm32) contains the bits [47:12] (resp. [39:12]) of the faulting IPA. Unlike other registers that represent an address, the upper bits of the IPA are stored in the register bits [4:39] (resp. [4:21]). However, Xen assumes that the register contains the faulting IPA correctly offsetted. This will result to get a wrong IPA when the fault is happening during a translation table walk. Note this is only affecting memaccess. Introduce a new helper to get the faulting IPA from HPFAR_EL2 and replace direct read from the register by the helper. Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Andre Przywara <andre.przywara@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit e7cb648d4db185f9fc69e7ca570f79e39180b11a Author: Julien Grall <julien.grall@xxxxxxx> Date: Fri Apr 22 16:58:32 2016 +0100 xen/bitops: Introduce GENMASK to generate mask The code has been imported from the header include/linux/bitops.h in Linux v4.6-rc3. Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 426783e661da942f8b7871613479db4daa6a16c3 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Tue May 10 19:19:36 2016 +0100 Update QEMU_UPSTREAM_REVISION commit 8919e76ccebfeafef49b9851dc4fd547cb4bd954 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Tue May 10 19:15:38 2016 +0100 QEMU_TAG update commit 5f05c100ca54acad94f73b6d679470323e664b16 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Tue May 10 18:58:50 2016 +0100 QEMU_TAG update commit ff4357574c989db9e73df4217cb7c6fc95b8b724 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Tue May 10 18:58:08 2016 +0100 QEMU_TAG update (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |