[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.8-testing test] 106728: regressions - FAIL
flight 106728 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/106728/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail REGR. vs. 106659 Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 106659 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 106659 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 106659 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail like 106659 test-amd64-amd64-xl-rtds 9 debian-install fail like 106659 Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a test-arm64-arm64-xl 1 build-check(1) blocked n/a build-arm64-libvirt 1 build-check(1) blocked n/a test-arm64-arm64-libvirt-qcow2 1 build-check(1) blocked n/a test-arm64-arm64-libvirt 1 build-check(1) blocked n/a test-arm64-arm64-xl-credit2 1 build-check(1) blocked n/a test-arm64-arm64-xl-rtds 1 build-check(1) blocked n/a test-arm64-arm64-xl-multivcpu 1 build-check(1) blocked n/a test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen-build fail never pass build-arm64-pvops 5 kernel-build fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-amd64-amd64-libvirt-xsm 12 migrate-support-check fail never pass test-amd64-i386-libvirt-xsm 12 migrate-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass build-arm64-xsm 5 xen-build fail never pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-armhf-armhf-xl-arndale 12 migrate-support-check fail never pass test-armhf-armhf-xl-arndale 13 saverestore-support-check fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2 fail never pass test-armhf-armhf-xl-rtds 12 migrate-support-check fail never pass test-armhf-armhf-xl-rtds 13 saverestore-support-check fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-armhf-armhf-xl-xsm 12 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 13 saverestore-support-check fail never pass test-armhf-armhf-xl-xsm 13 saverestore-support-check fail never pass test-armhf-armhf-xl-cubietruck 12 migrate-support-check fail never pass test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-xl-cubietruck 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt 13 saverestore-support-check fail never pass test-armhf-armhf-xl-multivcpu 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-libvirt-xsm 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt-raw 11 migrate-support-check fail never pass test-armhf-armhf-libvirt-raw 12 saverestore-support-check fail never pass test-armhf-armhf-xl-vhd 11 migrate-support-check fail never pass test-armhf-armhf-xl-vhd 12 saverestore-support-check fail never pass version targeted for testing: xen c75fe6473b73705c9b9f7d8ecc3d043afef55727 baseline version: xen 049b13dce84655cd73ac4acc051e7df46af00a4f Last test of basis 106659 2017-03-14 12:13:14 Z 2 days Testing same since 106728 2017-03-16 21:13:23 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrii Anisov <andrii_anisov@xxxxxxxx> Artem Mygaiev <artem_mygaiev@xxxxxxxx> Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Julien Grall <julien.grall@xxxxxxx> Jun Sun <jsun@xxxxxxxxxx> Oleksandr Tyshchenko <oleksandr_tyshchenko@xxxxxxxx> Oleksandr Tyshchenko <olekstysh@xxxxxxxxx> Stefano Stabellini <sstabellini@xxxxxxxxxx> Steve Capper <steve.capper@xxxxxxxxxx> Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Vijaya Kumar K <Vijaya.Kumar@xxxxxxxxxxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64-xsm pass build-arm64-xsm fail build-armhf-xsm pass build-i386-xsm pass build-amd64-xtf pass build-amd64 pass build-arm64 fail build-armhf pass build-i386 pass build-amd64-libvirt pass build-arm64-libvirt blocked build-armhf-libvirt pass build-i386-libvirt pass build-amd64-prev pass build-i386-prev pass build-amd64-pvops pass build-arm64-pvops fail build-armhf-pvops pass build-i386-pvops pass build-amd64-rumprun pass build-i386-rumprun pass test-xtf-amd64-amd64-1 pass test-xtf-amd64-amd64-2 pass test-xtf-amd64-amd64-3 pass test-xtf-amd64-amd64-4 pass test-xtf-amd64-amd64-5 pass test-amd64-amd64-xl pass test-arm64-arm64-xl blocked test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm pass test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass test-amd64-amd64-libvirt-xsm pass test-arm64-arm64-libvirt-xsm blocked test-armhf-armhf-libvirt-xsm pass test-amd64-i386-libvirt-xsm pass test-amd64-amd64-xl-xsm pass test-arm64-arm64-xl-xsm blocked test-armhf-armhf-xl-xsm pass test-amd64-i386-xl-xsm pass test-amd64-amd64-qemuu-nested-amd fail test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumprun-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-armhf-armhf-xl-arndale pass test-amd64-amd64-xl-credit2 pass test-arm64-arm64-xl-credit2 blocked test-armhf-armhf-xl-credit2 fail test-armhf-armhf-xl-cubietruck pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumprun-i386 pass test-amd64-amd64-qemuu-nested-intel pass test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-arm64-arm64-libvirt blocked test-armhf-armhf-libvirt pass test-amd64-i386-libvirt pass test-amd64-amd64-migrupgrade pass test-amd64-i386-migrupgrade pass test-amd64-amd64-xl-multivcpu pass test-arm64-arm64-xl-multivcpu blocked test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair pass test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub pass test-amd64-amd64-pygrub pass test-arm64-arm64-libvirt-qcow2 blocked test-amd64-amd64-xl-qcow2 pass test-armhf-armhf-libvirt-raw pass test-amd64-i386-xl-raw pass test-amd64-amd64-xl-rtds fail test-arm64-arm64-xl-rtds blocked test-armhf-armhf-xl-rtds pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd pass test-amd64-amd64-xl-qemut-winxpsp3 pass test-amd64-i386-xl-qemut-winxpsp3 pass test-amd64-amd64-xl-qemuu-winxpsp3 pass test-amd64-i386-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit c75fe6473b73705c9b9f7d8ecc3d043afef55727 Author: Stefano Stabellini <sstabellini@xxxxxxxxxx> Date: Fri Feb 10 18:05:22 2017 -0800 arm: read/write rank->vcpu atomically We don't need a lock in vgic_get_target_vcpu anymore, solving the following lock inversion bug: the rank lock should be taken first, then the vgic lock. However, gic_update_one_lr is called with the vgic lock held, and it calls vgic_get_target_vcpu, which tries to obtain the rank lock. Coverity-ID: 1381855 Coverity-ID: 1381853 Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit af18ca94f3fdbea87687c07ba532269dbb483e64 Author: Julien Grall <julien.grall@xxxxxxx> Date: Wed Mar 8 18:06:02 2017 +0000 xen/arm: p2m: Perform local TLB invalidation on vCPU migration The ARM architecture allows an OS to have per-CPU page tables, as it guarantees that TLBs never migrate from one CPU to another. This works fine until this is done in a guest. Consider the following scenario: - vcpu-0 maps P to V - vpcu-1 maps P' to V If run on the same physical CPU, vcpu-1 can hit in TLBs generated by vcpu-0 accesses, and access the wrong physical page. The solution to this is to keep a per-p2m map of which vCPU ran the last on each given pCPU and invalidate local TLBs if two vPCUs from the same VM run on the same CPU. Unfortunately it is not possible to allocate per-cpu variable on the fly. So for now the size of the array is NR_CPUS, this is fine because we still have space in the structure domain. We may want to add an helper to allocate per-cpu variable in the future. Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 30c2dd762bcf938475632e28fcbd8d6592a71d5d Author: Julien Grall <julien.grall@xxxxxxx> Date: Wed Mar 8 18:06:01 2017 +0000 xen/arm: Introduce INVALID_VCPU_ID Define INVALID_VCPU_ID as MAX_VIRT_CPUS to avoid casting problem later on. At the moment it can always fit in uint8_t. Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 1780ea794780cf410fcb857d83add72ee088ff6e Author: Vijaya Kumar K <Vijaya.Kumar@xxxxxxxxxxxxxxxxxx> Date: Mon Feb 1 14:56:13 2016 +0530 xen/arm: Set nr_cpu_ids to available number of cpus nr_cpu_ids for arm platforms is incorrectly set to NR_CPUS irrespective of the number of cpus supported by platform. Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@xxxxxxxxxxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 42290f02715e62bfe9edf32daac1b224758b7ae4 Author: Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Date: Thu Jan 26 14:16:02 2017 +0100 xen/arm: acpi: Relax hw domain mapping attributes to p2m_mmio_direct_c Since the hardware domain is a trusted domain, we extend the trust to include making final decisions on what attributes to use when mapping memory regions. For ACPI configured hardware domains, this patch relaxes the hardware domains mapping attributes to p2m_mmio_direct_c. This will allow the hardware domain to control the attributes via its S1 mappings. Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit bd684c2d0aae7edc587f8dfd3dbffef739c853e4 Author: Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Date: Thu Jan 26 14:16:01 2017 +0100 Revert "xen/arm: Map mmio-sram nodes as un-cached memory" This reverts commit 1e75ed8b64bc1a9b47e540e6f100f17ec6d97f1b. The default attribute mapping for MMIO as been relaxed and now rely on the hardware domain to set the correct memory attribute Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 783b67073f4e0348af617a1f470f991814254ae2 Author: Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Date: Thu Jan 26 14:16:00 2017 +0100 xen/arm: dt: Relax hw domain mapping attributes to p2m_mmio_direct_c Since the hardware domain is a trusted domain, we extend the trust to include making final decisions on what attributes to use when mapping memory regions. For device-tree configured hardware domains, this patch relaxes the hardware domains mapping attributes to p2m_mmio_direct_c. This will allow the hardware domain to control the attributes via its S1 mappings. Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 07f9ddfc9abe9d25288168dfe3c4b830b416f33b Author: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Date: Fri Jan 27 11:25:23 2017 -0700 xen/arm: flush icache as well when XEN_DOMCTL_cacheflush is issued When the toolstack modifies memory of a running ARM VM it may happen that the underlying memory of a current vCPU PC is changed. Without flushing the icache the vCPU may continue executing stale instructions. Also expose the xc_domain_cacheflush through xenctrl.h. Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit d31d0cd810b038f4711553d07b26aee6f4b80934 Author: Stefano Stabellini <sstabellini@xxxxxxxxxx> Date: Wed Dec 21 18:15:10 2016 -0800 xen/arm: fix GIC_INVALID_LR GIC_INVALID_LR should be 0xff, but actually, defined as ~(uint8_t)0, is 0xffffffff. Fix the problem by placing the ~ operator before the cast. Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit b2e678e81dd9635eb33279e2817168d13b78c1fa Author: Stefano Stabellini <sstabellini@xxxxxxxxxx> Date: Thu Dec 8 17:17:04 2016 -0800 fix out of bound access to mode_strings mode == ARRAY_SIZE(mode_strings) causes an out of bound access to the mode_strings array. Coverity-ID: 1381859 Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit 05946b58420c693748366b7c6f71ec2ec2456242 Author: Stefano Stabellini <sstabellini@xxxxxxxxxx> Date: Thu Dec 8 16:59:28 2016 -0800 missing vgic_unlock_rank in gic_remove_irq_from_guest Add missing vgic_unlock_rank on the error path in gic_remove_irq_from_guest. Coverity-ID: 1381843 Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit e020ff3fff796459399015460929edefa8c94568 Author: Artem Mygaiev <artem_mygaiev@xxxxxxxx> Date: Tue Dec 6 16:16:45 2016 +0200 xen/arm: Fix macro for ARM Jazelle CPU feature identification Fix macro for ARM Jazelle CPU feature identification: value of 0 indicates that CPU does not support ARM Jazelle (ID_PFR0[11:8]) Coverity-ID: 1381849 Signed-off-by: Artem Mygaiev <artem_mygaiev@xxxxxxxx> Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> commit 308c646ee6f11fa87d67343005942a3186a69206 Author: Julien Grall <julien.grall@xxxxxxx> Date: Mon Dec 5 17:43:23 2016 +0000 xen/arm: traps: Emulate ICC_SRE_EL1 as RAZ/WI Recent Linux kernel (4.4 and onwards [1]) is checking whether it is possible to enable sysreg access (ICC_SRE_EL1.SRE) when the ID register (ID_AA64PRF0_EL1.GIC) is reporting the presence of the sysreg interface. When the guest has been configured to use GICv2, the hypervisor will disable sysreg access for this vm (via ICC_SRE_EL2.Enable) and therefore access to system register such as ICC_SRE_EL1 are trapped in EL2. However, ICC_SRE_EL1 is not emulated by the hypervisor. This means that Linux will crash as soon as it is trying to access ICC_SRE_EL1. To solve this problem, Xen can implement ICC_SRE_EL1 as read-as-zero write-ignore. The emulation will only be used when sysreg are disabled for EL1. [1] 963fcd409 "arm64: cpufeatures: Check ICC_EL1_SRE.SRE before enabling ARM64_HAS_SYSREG_GIC_CPUIF" Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit fceae911f6e7af87cd31321385d779b47eff1857 Author: Artem Mygaiev <artem_mygaiev@xxxxxxxx> Date: Wed Nov 30 15:53:11 2016 +0200 xen/arm: Fix misplaced parentheses for PSCI version check Fix misplaced parentheses for PSCI version check Signed-off-by: Artem Mygaiev <artem_mygaiev@xxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit f66739326c9de51acc15e8b6b335b3781b4e3f48 Author: Oleksandr Tyshchenko <olekstysh@xxxxxxxxx> Date: Fri Dec 2 18:38:16 2016 +0200 arm/irq: Reorder check when the IRQ is already used by someone Call irq_get_domain for the IRQ we are interested in only after making sure that it is the guest IRQ to avoid ASSERT(test_bit(_IRQ_GUEST, &desc->status)) triggering. Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@xxxxxxxx> Signed-off-by: Andrii Anisov <andrii_anisov@xxxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 768b250b31361bf8acfef4b7dca61ee37c91f3f6 Author: Jun Sun <jsun@xxxxxxxxxx> Date: Mon Oct 10 12:27:56 2016 -0700 Don't clear HCR_VM bit when updating VTTBR. Currently function p2m_restore_state() would clear HCR_VM bit, i.e., disabling stage2 translation, before updating VTTBR register. After some research and talking to ARM support, I got confirmed that this is not necessary. We are currently working on a new platform that would need this to be removed. The patch is tested on FVP foundation model. Signed-off-by: Jun Sun <jsun@xxxxxxxxxx> Acked-by: Steve Capper <steve.capper@xxxxxxxxxx> Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |