[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 99722: regressions - FAIL



flight 99722 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99722/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemuu-debianhvm-i386 12 guest-saverestore fail REGR. vs. 
99707

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  7179cd39efdb22ac847ae465d1aa11cd6263f19b
baseline version:
 xen                  d5438accceecc8172db2d37d98b695eb8bc43afc

Last test of basis    99707  2016-07-26 10:01:43 Z    1 days
Testing same since    99722  2016-07-27 18:01:50 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Juergen Gross <jgross@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxx>
  Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
  Stefano Stabellini <sstabellini@xxxxxxxxxx>
  Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     fail    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 7179cd39efdb22ac847ae465d1aa11cd6263f19b
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Fri Jul 15 16:43:48 2016 +0100

    xen/domctl: Add DOMINFO_hap to xen_domctl_getdomaininfo
    
    This allows a toolstack to identify whether a running domain is using 
hardware
    assisted paging or not.
    
    The appropriate tests differ by architecture, so introduce
    arch_get_domain_info().  ARM unconditionally sets the new flag, while x86
    checks with the paging subsystem first.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Reviewed-by: Julien Grall <julien.grall@xxxxxxx>
    Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx>

commit d2412fd63b14c6c21d0a3d4367afa448425dfb8a
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Tue Jul 12 17:30:44 2016 +0200

    libxl: move common nic stuff into one source
    
    Put all nic related stuff of libxl form common files into a dedicated
    source file.
    
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit 9f3fbaff6cccdab9122e8c987fa5694f0930d7f4
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Tue Jul 12 17:30:43 2016 +0200

    libxl: add config update callback to device type framework
    
    Some device types require a configuration update after resume of
    domain. Add a callback for this purpose.
    
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit 20609ad8ee914c6e040bd64dac11e61aa5186ceb
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Tue Jul 12 17:30:42 2016 +0200

    libxl: split libxl vtpm code into one source
    
    Put all vtpm related stuff of libxl into a dedicated source file.
    
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit 803d4d332243fc2aa87c63a0ed871197252d23d1
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Tue Jul 12 17:30:41 2016 +0200

    libxl: move library pvusb specific code into libxl_pvusb.c
    
    Outside libxl_pvusb.c only libxl_util.c still contains some pvusb code.
    
    Move it to libxl_pvusb.c.
    
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit e320815ea5a4ba538210d91c8527b9eabeb15333
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Tue Jul 12 17:30:40 2016 +0200

    libxl: add "pv device mode needed" support to device type framework
    
    Add another callback to the device type framework in order to aid
    decision whether a pv domain needs a device model.
    
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit de0b58c574b0bafb13585a94815049398a1fd9fe
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Tue Jul 12 17:30:39 2016 +0200

    libxl: add "merge" function to generic device type support
    
    Instead of using a macro generating the code to merge xenstore and
    json configuration data, use the generic device type support for
    this purpose.
    
    This requires to add some accessor functions to the framework and
    a structure for disks (as disks are added separately they didn't need
    such a structure up to now).
    
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit 653948018a6f2e7c4fe314329a9886c6b8388f96
Author: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx>
Date:   Wed Jul 27 10:31:59 2016 +0100

    altp2m: Allow shared entries to be copied to altp2m views during lazycopy
    
    Move sharing locks above altp2m to avoid locking order violation and 
crashing
    the hypervisor during unsharing operations when altp2m is active.
    
    Applying mem_access settings or remapping gfns in altp2m views will
    automatically unshare the page if it was shared previously. Also,
    disallow nominating pages for which there are pre-existing altp2m
    mem_access settings or remappings present. However, allow altp2m to
    populate altp2m views with shared entries during lazycopy as unsharing
    will automatically propagate the change to these entries in altp2m
    views as well.
    
    While we're here, switch to using the appropriate wrappers rather than
    calling p2m->get_entry() directly.
    
    Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx>
    Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx>

commit a97bedb2120eb5b277eb5a9cca85f4e659c17cbe
Author: Julien Grall <julien.grall@xxxxxxx>
Date:   Wed Jul 20 17:10:50 2016 +0100

    xen/arm: p2m: Simplify p2m type check by using bitmask
    
    The resulting assembly code for the macros is much simpler and will
    never contain more than one instruction branch.
    
    The idea is taken from x86 (see include/asm-x86/p2m.h). Also move the
    two helpers earlier to keep all the p2m type definitions together.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxx>
    Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>

commit 8cfe8bcf33cf371f3f1cbf7029d0bc1e2fa12769
Author: Julien Grall <julien.grall@xxxxxxx>
Date:   Wed Jul 20 17:10:49 2016 +0100

    xen/arm: p2m: Use p2m_is_foreign in get_page_from_gfn to avoid open coding
    
    No functional change.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxx>
    Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>

commit 4b11387906fdcc3ad66de1038699b9293144ab8b
Author: Julien Grall <julien.grall@xxxxxxx>
Date:   Wed Jul 20 17:10:47 2016 +0100

    xen/arm: p2m: Clean-up mfn_to_p2m_entry
    
    The physical address is computed from the machine frame number, so
    checking if the physical address is page aligned is pointless.
    
    Furthermore, directly assigned the MFN to the corresponding field in the
    entry rather than converting to a physical address and orring the value.
    It will avoid to rely on the field position and make the code clearer.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxx>
    Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>

commit 96d1be3788805257690a58dbea65d4d6b7ac30dc
Author: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
Date:   Wed Jul 20 09:00:56 2016 -0500

    arm/vgic: Change fixed number of mmio handlers to variable number
    
    Compute the number of mmio handlers that are required for vGICv3 and
    vGICv2 emulation drivers in vgic_v3_init()/vgic_v2_init(). Augment
    this variable number of mmio handlers to a fixed number MAX_IO_HANDLER
    and pass it to domain_io_init() to allocate enough memory.
    
    New code path:
     domain_vgic_register(&count)
       domain_io_init(count + MAX_IO_HANDLER)
         domain_vgic_init()
    
    Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>

commit 8047e090f42a39bda911f6b2e81fdab12603b64a
Author: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
Date:   Wed Jul 20 09:00:55 2016 -0500

    xen/arm: io: Use binary search for mmio handler lookup
    
    As the number of I/O handlers increase, the overhead associated with
    linear lookup also increases. The system might have maximum of 144
    (assuming CONFIG_NR_CPUS=128) mmio handlers. In worst case scenario,
    it would require 144 iterations for finding a matching handler. Now
    it is time for us to change from linear (complexity O(n)) to a binary
    search (complexity O(log n) for reducing mmio handler lookup overhead.
    
    Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>
    Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>

commit e3eb84e33c365ce0af1a75ef25ec36cf646c958b
Author: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
Date:   Wed Jul 20 09:00:54 2016 -0500

    xen: Add generic implementation of binary search
    
    This patch adds the generic implementation of binary search algorithm
    which is copied from Linux kernel v4.7-rc7. No functional changes.
    
    Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Julien Grall <julien.grall@xxxxxxx>

commit 96a1eeef79194b04877f1e3f4fcef3f155fbd393
Author: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
Date:   Wed Jul 20 09:00:53 2016 -0500

    arm/io: Use separate memory allocation for mmio handlers
    
    The number of mmio handlers are limited to a compile time macro
    MAX_IO_HANDLER which is 16. This number is not at all sufficient
    to support per CPU distributor regions. Either it needs to be
    increased to a bigger number, at least CONFIG_NR_CPUS+16, or
    allocate a separate memory for mmio handlers dynamically during
    domain build.
    
    This patch uses the dynamic allocation strategy to reduce memory
    footprint for 'struct domain' instead of static allocation.
    
    Signed-off-by: Shanker Donthineni <shankerd@xxxxxxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>
    Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>

commit 9f1441487aa215193a7c00fd9cb80b335542465e
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Jun 15 18:32:14 2016 +0100

    x86/entry: Avoid SMAP violation in compat_create_bounce_frame()
    
    A 32bit guest kernel might be running on user mappings.
    compat_create_bounce_frame() must whitelist its guest accesses to avoid
    risking a SMAP violation.
    
    For both variants of create_bounce_frame(), re-blacklist user accesses if
    execution exits via an exception table redirection.
    
    This is XSA-183 / CVE-2016-6259
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit e1bff4c2ea3b32464510ac00c320bba28a8dbcca
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Jul 11 14:32:03 2016 +0100

    x86/pv: Remove unsafe bits from the mod_l?_entry() fastpath
    
    All changes in writeability and cacheability must go through full
    re-validation.
    
    Rework the logic as a whitelist, to make it clearer to follow.
    
    This is XSA-182
    
    Reported-by: Jérémie Boutoille <jboutoille@xxxxxxxxxxxxxxxxx>
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.