[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable-smoke test] 99722: regressions - FAIL
flight 99722 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/99722/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 12 guest-saverestore fail REGR. vs. 99707 Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass version targeted for testing: xen 7179cd39efdb22ac847ae465d1aa11cd6263f19b baseline version: xen d5438accceecc8172db2d37d98b695eb8bc43afc Last test of basis 99707 2016-07-26 10:01:43 Z 1 days Testing same since 99722 2016-07-27 18:01:50 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Juergen Gross <jgross@xxxxxxxx> Julien Grall <julien.grall@xxxxxxx> Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Stefano Stabellini <sstabellini@xxxxxxxxxx> Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64 pass build-armhf pass build-amd64-libvirt pass test-armhf-armhf-xl pass test-amd64-amd64-xl-qemuu-debianhvm-i386 fail test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 7179cd39efdb22ac847ae465d1aa11cd6263f19b Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Fri Jul 15 16:43:48 2016 +0100 xen/domctl: Add DOMINFO_hap to xen_domctl_getdomaininfo This allows a toolstack to identify whether a running domain is using hardware assisted paging or not. The appropriate tests differ by architecture, so introduce arch_get_domain_info(). ARM unconditionally sets the new flag, while x86 checks with the paging subsystem first. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx> commit d2412fd63b14c6c21d0a3d4367afa448425dfb8a Author: Juergen Gross <jgross@xxxxxxxx> Date: Tue Jul 12 17:30:44 2016 +0200 libxl: move common nic stuff into one source Put all nic related stuff of libxl form common files into a dedicated source file. Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 9f3fbaff6cccdab9122e8c987fa5694f0930d7f4 Author: Juergen Gross <jgross@xxxxxxxx> Date: Tue Jul 12 17:30:43 2016 +0200 libxl: add config update callback to device type framework Some device types require a configuration update after resume of domain. Add a callback for this purpose. Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 20609ad8ee914c6e040bd64dac11e61aa5186ceb Author: Juergen Gross <jgross@xxxxxxxx> Date: Tue Jul 12 17:30:42 2016 +0200 libxl: split libxl vtpm code into one source Put all vtpm related stuff of libxl into a dedicated source file. Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 803d4d332243fc2aa87c63a0ed871197252d23d1 Author: Juergen Gross <jgross@xxxxxxxx> Date: Tue Jul 12 17:30:41 2016 +0200 libxl: move library pvusb specific code into libxl_pvusb.c Outside libxl_pvusb.c only libxl_util.c still contains some pvusb code. Move it to libxl_pvusb.c. Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit e320815ea5a4ba538210d91c8527b9eabeb15333 Author: Juergen Gross <jgross@xxxxxxxx> Date: Tue Jul 12 17:30:40 2016 +0200 libxl: add "pv device mode needed" support to device type framework Add another callback to the device type framework in order to aid decision whether a pv domain needs a device model. Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit de0b58c574b0bafb13585a94815049398a1fd9fe Author: Juergen Gross <jgross@xxxxxxxx> Date: Tue Jul 12 17:30:39 2016 +0200 libxl: add "merge" function to generic device type support Instead of using a macro generating the code to merge xenstore and json configuration data, use the generic device type support for this purpose. This requires to add some accessor functions to the framework and a structure for disks (as disks are added separately they didn't need such a structure up to now). Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 653948018a6f2e7c4fe314329a9886c6b8388f96 Author: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Date: Wed Jul 27 10:31:59 2016 +0100 altp2m: Allow shared entries to be copied to altp2m views during lazycopy Move sharing locks above altp2m to avoid locking order violation and crashing the hypervisor during unsharing operations when altp2m is active. Applying mem_access settings or remapping gfns in altp2m views will automatically unshare the page if it was shared previously. Also, disallow nominating pages for which there are pre-existing altp2m mem_access settings or remappings present. However, allow altp2m to populate altp2m views with shared entries during lazycopy as unsharing will automatically propagate the change to these entries in altp2m views as well. While we're here, switch to using the appropriate wrappers rather than calling p2m->get_entry() directly. Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx> commit a97bedb2120eb5b277eb5a9cca85f4e659c17cbe Author: Julien Grall <julien.grall@xxxxxxx> Date: Wed Jul 20 17:10:50 2016 +0100 xen/arm: p2m: Simplify p2m type check by using bitmask The resulting assembly code for the macros is much simpler and will never contain more than one instruction branch. The idea is taken from x86 (see include/asm-x86/p2m.h). Also move the two helpers earlier to keep all the p2m type definitions together. Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 8cfe8bcf33cf371f3f1cbf7029d0bc1e2fa12769 Author: Julien Grall <julien.grall@xxxxxxx> Date: Wed Jul 20 17:10:49 2016 +0100 xen/arm: p2m: Use p2m_is_foreign in get_page_from_gfn to avoid open coding No functional change. Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 4b11387906fdcc3ad66de1038699b9293144ab8b Author: Julien Grall <julien.grall@xxxxxxx> Date: Wed Jul 20 17:10:47 2016 +0100 xen/arm: p2m: Clean-up mfn_to_p2m_entry The physical address is computed from the machine frame number, so checking if the physical address is page aligned is pointless. Furthermore, directly assigned the MFN to the corresponding field in the entry rather than converting to a physical address and orring the value. It will avoid to rely on the field position and make the code clearer. Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 96d1be3788805257690a58dbea65d4d6b7ac30dc Author: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Date: Wed Jul 20 09:00:56 2016 -0500 arm/vgic: Change fixed number of mmio handlers to variable number Compute the number of mmio handlers that are required for vGICv3 and vGICv2 emulation drivers in vgic_v3_init()/vgic_v2_init(). Augment this variable number of mmio handlers to a fixed number MAX_IO_HANDLER and pass it to domain_io_init() to allocate enough memory. New code path: domain_vgic_register(&count) domain_io_init(count + MAX_IO_HANDLER) domain_vgic_init() Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> commit 8047e090f42a39bda911f6b2e81fdab12603b64a Author: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Date: Wed Jul 20 09:00:55 2016 -0500 xen/arm: io: Use binary search for mmio handler lookup As the number of I/O handlers increase, the overhead associated with linear lookup also increases. The system might have maximum of 144 (assuming CONFIG_NR_CPUS=128) mmio handlers. In worst case scenario, it would require 144 iterations for finding a matching handler. Now it is time for us to change from linear (complexity O(n)) to a binary search (complexity O(log n) for reducing mmio handler lookup overhead. Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit e3eb84e33c365ce0af1a75ef25ec36cf646c958b Author: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Date: Wed Jul 20 09:00:54 2016 -0500 xen: Add generic implementation of binary search This patch adds the generic implementation of binary search algorithm which is copied from Linux kernel v4.7-rc7. No functional changes. Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit 96a1eeef79194b04877f1e3f4fcef3f155fbd393 Author: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Date: Wed Jul 20 09:00:53 2016 -0500 arm/io: Use separate memory allocation for mmio handlers The number of mmio handlers are limited to a compile time macro MAX_IO_HANDLER which is 16. This number is not at all sufficient to support per CPU distributor regions. Either it needs to be increased to a bigger number, at least CONFIG_NR_CPUS+16, or allocate a separate memory for mmio handlers dynamically during domain build. This patch uses the dynamic allocation strategy to reduce memory footprint for 'struct domain' instead of static allocation. Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 9f1441487aa215193a7c00fd9cb80b335542465e Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Jun 15 18:32:14 2016 +0100 x86/entry: Avoid SMAP violation in compat_create_bounce_frame() A 32bit guest kernel might be running on user mappings. compat_create_bounce_frame() must whitelist its guest accesses to avoid risking a SMAP violation. For both variants of create_bounce_frame(), re-blacklist user accesses if execution exits via an exception table redirection. This is XSA-183 / CVE-2016-6259 Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit e1bff4c2ea3b32464510ac00c320bba28a8dbcca Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Jul 11 14:32:03 2016 +0100 x86/pv: Remove unsafe bits from the mod_l?_entry() fastpath All changes in writeability and cacheability must go through full re-validation. Rework the logic as a whitelist, to make it clearer to follow. This is XSA-182 Reported-by: Jérémie Boutoille <jboutoille@xxxxxxxxxxxxxxxxx> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Tim Deegan <tim@xxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |