[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [xen-unstable-smoke test] 171511: regressions - FAIL


  • To: Julien Grall <julien@xxxxxxx>, Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Wed, 6 Jul 2022 10:46:46 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OYwDSGtlzCDza/XFA6m56Oh4qahZA6wtvisv2G3Sy9w=; b=FiE0b/s6hXvj5DGqGZ9t4WuWdgTcz+zwdwmVU8xRZNlRTLeBGczcyiaEfx0oGnd1puQ8yXqdw+r4m05xGC7+m2nfGFqCm5jVSQE/5NXh4oMY6jMxrPk/bh0kL+m/0QMi+lD5/AdnPwn3WVcpi5Nfu8PY01zy2b2XBxj/BOidpQOlC2ayM9Dd1uv7BuQUgSD5aHIX8oHv5hwhg/ShpRSPDsVY+pACRt7I0aCtlvbavsgDkcKyNgQXqkwZBLNompR3eJ3UsXQMJ+uCwbX4lsoCWejFKG5XpS8my5SgtFFppDHlJWijzj0IbGpIKQ+GJsn7BjPBA2Tiv8vrV34yRhqnxw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ioR0u1HhB8K4jlvKallxTUrg3q78M8c0OPCD49Vdc0PNKW4CWOGYSXwpsnDBC0UyevOutK2mzaRQde6XESqgMBPSP/k6lq7S/T+Lvitdt7vHhrOM5sNiS3WiSCtkg8aCjwOBRyqrG/0E6c+px2V2ZbgHEQiGs84PimIXvRvmKHVDANUvjyhraTbLFs1JK3hiNJUkxyJBO/glLK6RJWOaAxehfryHsxX5/dTu+PkYO5OdD/dPjrL8m+rnIQEhFVkh9d3zRjGTg52F59pNGQWMRIJg9gF+z/aTAO0hvLI54M+GCnUKzJ0366M9KslKZvme6OHpYe2bLlf/tmZYeIBYGQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: osstest service owner <osstest-admin@xxxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Wed, 06 Jul 2022 08:46:54 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 06.07.2022 10:17, Julien Grall wrote:
> Hi Demi,
> 
> On 06/07/2022 09:05, Demi Marie Obenour wrote:
>> On Wed, Jul 06, 2022 at 08:53:49AM +0100, Julien Grall wrote:
>>> Hi Jan,
>>>
>>> On 06/07/2022 07:44, Jan Beulich wrote:
>>>> On 06.07.2022 05:39, osstest service owner wrote:
>>>>> flight 171511 xen-unstable-smoke real [real]
>>>>> flight 171517 xen-unstable-smoke real-retest [real]
>>>>> http://logs.test-lab.xenproject.org/osstest/logs/171511/
>>>>> http://logs.test-lab.xenproject.org/osstest/logs/171517/
>>>>>
>>>>> Regressions :-(
>>>>>
>>>>> Tests which did not succeed and are blocking,
>>>>> including tests which could not be run:
>>>>>    test-arm64-arm64-xl-xsm       8 xen-boot                 fail REGR. 
>>>>> vs. 171486
>>>>
>>>> Looking at what's under test, I guess ...
>>>>
>>>>> commit 8d410ac2c178e1dd1001cadddbe9ca75a9738c95
>>>>> Author: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
>>>>> Date:   Tue Jul 5 13:10:46 2022 +0200
>>>>>
>>>>>       EFI: preserve the System Resource Table for dom0
>>>>>       The EFI System Resource Table (ESRT) is necessary for fwupd to 
>>>>> identify
>>>>>       firmware updates to install.  According to the UEFI specification 
>>>>> §23.4,
>>>>>       the ESRT shall be stored in memory of type EfiBootServicesData.  
>>>>> However,
>>>>>       memory of type EfiBootServicesData is considered general-purpose 
>>>>> memory
>>>>>       by Xen, so the ESRT needs to be moved somewhere where Xen will not
>>>>>       overwrite it.  Copy the ESRT to memory of type 
>>>>> EfiRuntimeServicesData,
>>>>>       which Xen will not reuse.  dom0 can use the ESRT if (and only if) 
>>>>> it is
>>>>>       in memory of type EfiRuntimeServicesData.
>>>>>       Earlier versions of this patch reserved the memory in which the 
>>>>> ESRT was
>>>>>       located.  This created awkward alignment problems, and required 
>>>>> either
>>>>>       splitting the E820 table or wasting memory.  It also would have 
>>>>> required
>>>>>       a new platform op for dom0 to use to indicate if the ESRT is 
>>>>> reserved.
>>>>>       By copying the ESRT into EfiRuntimeServicesData memory, the E820 
>>>>> table
>>>>>       does not need to be modified, and dom0 can just check the type of 
>>>>> the
>>>>>       memory region containing the ESRT.  The copy is only done if the 
>>>>> ESRT is
>>>>>       not already in EfiRuntimeServicesData memory, avoiding memory leaks 
>>>>> on
>>>>>       repeated kexec.
>>>>>       See 
>>>>> https://lore.kernel.org/xen-devel/20200818184018.GN1679@mail-itl/T/
>>>>>       for details.
>>>>>       Signed-off-by: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
>>>>>       Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
>>>>
>>>> ... this is the most likely candidate, considering in the log all we
>>>> see is:
>>>>
>>>> Xen 4.17-unstable (c/s Mon Jun 27 15:15:39 2022 +0200 
>>>> git:61ff273322-dirty) EFI loader
>>>> Jul  5 23:09:15.692859 Using configuration file 'xen.cfg'
>>>> Jul  5 23:09:15.704878 vmlinuz: 0x00000083fb1ac000-0x00000083fc880a00
>>>> Jul  5 23:09:15.704931 initrd.gz: 0x00000083f94b7000-0x00000083fb1ab6e8
>>>> Jul  5 23:09:15.836836 xenpolicy: 0x00000083f94b4000-0x00000083f94b6a5f
>>>> Jul  5 23:09:15.980866 Using bootargs from Xen configuration file.
>>>>
>>>> But I guess we'll want to wait for the bi-sector to give us a more
>>>> solid indication ...
>>>
>>> I have tested a Xen with and without this patch this morning and can EFI. I
>>> haven't looked into details yet why.
>>>
>>> Can we consider to revert it?
>>
>> I'm fine with reverting it for now, but I would like to know what the
>> bug was.  Does a Xen with this patch boot okay on x86?
> 
> I haven't tried and I don't know whether we have UEFI system on x86.
> 
>>  If so, could it
>> be temporarily turned off on ARM until the problem can be tracked down?
> 
> I am not in favor of this approach. There are no reason for this to be 
> x86-only aside there is a bug in the code.

I agree - either we keep the patch in anticipation of a soon-ish fix,
or we revert it.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.