[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable-smoke test] 104642: regressions - trouble: blocked/broken/fail
flight 104642 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/104642/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 5 xen-build fail REGR. vs. 104630 build-armhf 5 xen-build fail REGR. vs. 104630 Tests which did not succeed, but are not blocking: build-amd64-libvirt 1 build-check(1) blocked n/a test-armhf-armhf-xl 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 1 build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-debianhvm-i386 1 build-check(1) blocked n/a test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64-pvops 5 kernel-build fail never pass build-arm64 5 xen-build fail never pass version targeted for testing: xen d5c4a55e007db102ee6bd1ac771f0b05458609c2 baseline version: xen c13f0f9a331153a57eedfe8c80f1e2f6d4f01dcc Last test of basis 104630 2017-01-24 19:01:56 Z 0 days Testing same since 104642 2017-01-25 10:01:54 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Dario Faggioli <dario.faggioli@xxxxxxxxxx> Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx> George Dunlap <george.dunlap@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Kevin Tian <kevin.tian@xxxxxxxxx> Paul Durrant <paul.durrant@xxxxxxxxxx> Praveen Kumar <kpraveen.lkml@xxxxxxxxx> Tim Deegan <tim@xxxxxxx> Venu Busireddy <venu.busireddy@xxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64 fail build-arm64 fail build-armhf fail build-amd64-libvirt blocked build-arm64-pvops fail test-armhf-armhf-xl blocked test-arm64-arm64-xl-xsm broken test-amd64-amd64-xl-qemuu-debianhvm-i386 blocked test-amd64-amd64-libvirt blocked ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit d5c4a55e007db102ee6bd1ac771f0b05458609c2 Author: Praveen Kumar <kpraveen.lkml@xxxxxxxxx> Date: Wed Jan 25 10:51:47 2017 +0100 credit2: performance counter for load balancing call The patch introduces a new performance counter that counts how many times we go through the load balancing logic in Credit2. Signed-off-by: Praveen Kumar <kpraveen.lkml@xxxxxxxxx> Acked-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> commit 9b7c0ce58396a20f01e8db4494e967ca4cb55ed4 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed Jan 25 10:51:10 2017 +0100 x86/hvm: serialize trap injecting producer and consumer Since injection works on a remote vCPU, and since there's no enforcement of the subject vCPU being paused, there's a potential race between the producing and consuming sides. Fix this by leveraging the vector field as synchronization variable. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> [re-based] Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 58cbc034dc62c2c2e10aaddfed7ef874e03bc383 Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Wed Jan 25 10:49:52 2017 +0100 dm_op: convert HVMOP_inject_trap and HVMOP_inject_msi NOTE: This patch also modifies the types of the 'vector', 'type' and 'insn_len' arguments of xc_hvm_inject_trap() from uint32_t to uint8_t. In practice the values passed were always truncated to 8 bits. Suggested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit ae20ccf070bc269eb24587dac7671fba86a9848a Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Wed Jan 25 10:48:25 2017 +0100 dm_op: convert HVMOP_set_mem_type This patch removes the need for handling HVMOP restarts, so that infrastructure is removed. NOTE: This patch also modifies the type of the 'nr' argument of xc_hvm_set_mem_type() from uint64_t to uint32_t. In practice the value passed was always truncated to 32 bits. Suggested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit b30c5979e02ca68f3d18bb3b130211aa7b9e6aee Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Wed Jan 25 10:47:13 2017 +0100 dm_op: convert HVMOP_modified_memory This patch introduces code to handle DMOP continuations. NOTE: This patch also modifies the type of the 'nr' argument of xc_hvm_modified_memory() from uint64_t to uint32_t. In practice the value passed was always truncated to 32 bits. Suggested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 7b2e218fd6ebd4839c8cef3c3e88d4370d7c0f94 Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Wed Jan 25 10:44:50 2017 +0100 dm_op: convert HVMOP_set_pci_intx_level, HVMOP_set_isa_irq_level, and... ... HVMOP_set_pci_link_route These HVMOPs were exposed to guests so their definitions need to be preserved for compatibility. This patch therefore updates __XEN_LATEST_INTERFACE_VERSION__ to 0x00040900 and makes the HVMOP defintions conditional on __XEN_INTERFACE_VERSION__ less than that value. NOTE: This patch also widens the 'domain' parameter of xc_hvm_set_pci_intx_level() from a uint8_t to a uint16_t. Suggested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 86ad4d054a08d4a2172d6725c66b02c15a578066 Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Wed Jan 25 10:43:14 2017 +0100 dm_op: convert HVMOP_track_dirty_vram The handle type passed to the underlying shadow and hap functions is changed for compatibility with the new hypercall buffer. NOTE: This patch also modifies the type of the 'nr' parameter of xc_hvm_track_dirty_vram() from uint64_t to uint32_t. In practice the value passed was always truncated to 32 bits. Suggested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit a2323df5f47c630eb763cac82f6680260ead24c4 Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Wed Jan 25 10:41:35 2017 +0100 dm_op: convert HVMOP_*ioreq_server* The definitions of HVM_IOREQSRV_BUFIOREQ_* have to persist as they are already in use by callers of the libxc interface. Suggested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 524a98c2ac5e60b824033af32243bd4c8dd8e265 Author: Paul Durrant <paul.durrant@xxxxxxxxxx> Date: Wed Jan 25 10:40:51 2017 +0100 public / x86: introduce __HYPERCALL_dm_op... ...as a set of hypercalls to be used by a device model. As stated in the new docs/designs/dm_op.markdown: "The aim of DMOP is to prevent a compromised device model from compromising domains other then the one it is associated with. (And is therefore likely already compromised)." See that file for further information. This patch simply adds the boilerplate for the hypercall. Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Suggested-by: Ian Jackson <ian.jackson@xxxxxxxxxx> Suggested-by: Jennifer Herbert <jennifer.herbert@xxxxxxxxxx> Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 431685e8deb660976d8e986c41a647944e410c6c Author: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx> Date: Wed Jan 25 10:38:05 2017 +0100 VT-d: add command line option for extra rmrrs On some platforms firmware fails to specify RMRR regions in ACPI tables and thus those regions will not be mapped in dom0 or guests and may cause IO Page Faults and prevent dom0 from booting if "iommu=dom0-strict" option is specified on the Xen command line. New Xen command line option rmrr allows to specify such devices and memory regions. These regions are added to the list of RMRR defined in ACPI if the device is present in system. As a result, additional RMRRs will be mapped 1:1 in dom0 with correct permissions. The above mentioned problems were discovered during the PVH work with ThinkCentre M and Dell 5600T. No official documentation was found so far in regards to what devices and why cause this. Experiments show that ThinkCentre M USB devices with enabled debug port generate DMA read transactions to the regions of memory marked reserved in host e820 map. For Dell 5600T the device and faulting addresses are not found yet. For detailed history of the discussion please check following threads: http://lists.Xen.org/archives/html/xen-devel/2015-02/msg01724.html http://lists.Xen.org/archives/html/xen-devel/2015-01/msg02513.html Format for rmrr Xen command line option: rmrr=start<-end>=[s1]bdf1[,[s1]bdf2[,...]];start<-end>=[s2]bdf1[,[s2]bdf2[,...]] For example, for Lenovo ThinkCentre M, use: rmrr=0xd5d45=0:0:1d.0;0xd5d46=0:0:1a.0 If grub2 used and multiple ranges are specified, ';' should be quoted/escaped, refer to grub2 manual for more information. Signed-off-by: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx> Signed-off-by: Venu Busireddy <venu.busireddy@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 537043d72774c044e25e3186d4683b96da30d72c Author: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx> Date: Wed Jan 25 10:37:43 2017 +0100 pci: add wrapper for parse_pci For sbdf's parsing in RMRR command line, add parse_pci_seg with additional parameter def_seg. parse_pci_seg will help to identify if segment was found in string being parsed or default segment was used. Make a wrapper parse_pci so the rest of the callers are not affected. Signed-off-by: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx> Signed-off-by: Venu Busireddy <venu.busireddy@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit 0cd6e37dc9bb79d9e7002565e91bee9c9eef1471 Author: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx> Date: Wed Jan 25 10:37:14 2017 +0100 VT-d: separate rmrr addition function In preparation for auxiliary RMRR data provided on Xen command line, make RMRR adding a separate function. Also free memery for rmrr device scope in error path. Signed-off-by: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx> Signed-off-by: Venu Busireddy <venu.busireddy@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |