[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [xen-unstable test] 103540: regressions - FAIL



On 18/12/2016 10:38, Andrew Cooper wrote:
> On 18/12/2016 05:21, osstest service owner wrote:
>> flight 103540 xen-unstable real [real]
>> http://logs.test-lab.xenproject.org/osstest/logs/103540/
>>
>> Regressions :-(
>>
>> Tests which did not succeed and are blocking,
>> including tests which could not be run:
>>  test-amd64-amd64-i386-pvgrub  6 xen-boot                 fail REGR. vs. 
>> 103466
>>  test-xtf-amd64-amd64-3        6 xen-boot                 fail REGR. vs. 
>> 103466
>>  test-amd64-amd64-xl-qemuu-debianhvm-amd64  6 xen-boot    fail REGR. vs. 
>> 103466
>>  test-amd64-amd64-xl-qemuu-win7-amd64  6 xen-boot         fail REGR. vs. 
>> 103466
>>  test-armhf-armhf-libvirt-raw  4 host-ping-check-native   fail REGR. vs. 
>> 103466
>>  test-xtf-amd64-amd64-5        6 xen-boot                 fail REGR. vs. 
>> 103466
>>  test-xtf-amd64-amd64-4        6 xen-boot                 fail REGR. vs. 
>> 103466
>>  test-amd64-i386-xl-qemuu-ovmf-amd64  6 xen-boot          fail REGR. vs. 
>> 103466
>>  test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 6 xen-boot fail REGR. 
>> vs. 103466
>>  test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail REGR. 
>> vs. 103466
> http://logs.test-lab.xenproject.org/osstest/logs/103540/test-xtf-amd64-amd64-3/serial-merlot0.log
> from 22:48:30.821939
>
> (XEN) ----[ Xen-4.9-unstable  x86_64  debug=y   Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    e008:[<ffff82d080100660>] __bitmap_and+0x24/0x33
> (XEN) RFLAGS: 0000000000010202   CONTEXT: hypervisor
> (XEN) rax: 0000000000000000   rbx: ffff82d08030fd58   rcx: 0000000000000001
> (XEN) rdx: ffff82d0802edda0   rsi: ffff83023ffd1ef0   rdi: 0000000000000000
> (XEN) rbp: ffff82d08030fd18   rsp: ffff82d08030fd18   r8:  0000000000000004
> (XEN) r9:  ffff82d080323a48   r10: 0000000000000000   r11: 00000000ffffffff
> (XEN) r12: 0000000000000028   r13: ffff83023ffd1ef0   r14: 0000000000000000
> (XEN) r15: ffff82d080343aa0   cr0: 000000008005003b   cr4: 00000000000406e0
> (XEN) cr3: 00000000bdaff000   cr2: 0000000000000000
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
> (XEN) Xen code around <ffff82d080100660> (__bitmap_and+0x24/0x33):
> (XEN)  48 8b 0c c2 48 23 0c c6 <48> 89 0c c7 48 83 c0 01 41 39 c0 7f eb
> 5d c3 55
> (XEN) Xen stack trace from rsp=ffff82d08030fd18:
> (XEN)    ffff82d08030fd48 ffff82d0801719cc ffff83023e203800 ffff83023e384030
> (XEN)    ffff82d08030fd58 0000000000000000 ffff82d08030fd88 ffff82d080171bbc
> (XEN)    0000000000000000 0000000000000000 ffff82d08030fd88 ffff83023e384010
> (XEN)    ffff82d080329b70 0000000000000038 ffff82d08030fdc8 ffff82d0802afb8b
> (XEN)    00000000c0000000 0000000000000000 00000000ffffffed ffff82d08030ffff
> (XEN)    0000000000000000 ffff82d080343aa0 ffff82d08030fdd8 ffff82d0802b00d7
> (XEN)    ffff82d08030fdf8 ffff82d0802ac9cb ffff82d080343aa0 ffff83023fff5fe0
> (XEN)    ffff82d08030ff08 ffff82d0802c0ff2 0000000000000000 0000000000100000
> (XEN)    00000000000001ff 0000000000000001 0000000000000001 0000000000000001
> (XEN)    0000000000000001 0000000000000001 0000000000000001 0000000000000001
> (XEN)    0000000000000000 00000000011f3000 000000000043efff 0000000000800163
> (XEN)    fffffffffffff001 000000043ee00000 0000000000000002 ffff83000008dd80
> (XEN)    ffff83000008def0 ffff83000008dfb0 0000000000000000 0000000000000000
> (XEN)    0000000800000000 000000010000006e 0000000000000003 00000000000002f8
> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
> (XEN)    0000000000000000 0000000000000000 0000000000000000 ffff82d080100073
> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
> (XEN) Xen call trace:
> (XEN)    [<ffff82d080100660>] __bitmap_and+0x24/0x33
> (XEN)    [<ffff82d0801719cc>] msi_compose_msg+0x7e/0xf5
> (XEN)    [<ffff82d080171bbc>] __setup_msi_irq+0x2f/0x5c
> (XEN)    [<ffff82d0802afb8b>] amd_iommu_init+0x460/0x6b7
> (XEN)    [<ffff82d0802b00d7>] amd_iov_detect+0x69/0xad
> (XEN)    [<ffff82d0802ac9cb>] iommu_setup+0x61/0x1c1
> (XEN)    [<ffff82d0802c0ff2>] __start_xen+0x23a8/0x2878
> (XEN)    [<ffff82d080100073>] __high_start+0x53/0x55
> (XEN)
> (XEN) Pagetable walk from 0000000000000000:
> (XEN)  L4[0x000] = 000000023fff3063 ffffffffffffffff
> (XEN)  L3[0x000] = 000000023fff2063 ffffffffffffffff
> (XEN)  L2[0x000] = 000000023fff1063 ffffffffffffffff
> (XEN)  L1[0x000] = 0000000000000000 ffffffffffffffff
> (XEN)
> (XEN) ****************************************
> (XEN) Panic on CPU 0:
> (XEN) FATAL PAGE FAULT
> (XEN) [error_code=0002]
> (XEN) Faulting linear address: 0000000000000000
> (XEN) ****************************************
> (XEN)
> (XEN) Reboot in five seconds...
>
> This will be caused by 7f885a1f49a75c770360b030666a5c1545156e5c or
> 3b6172645880f6324d0394d0d707f5d76b69ae1f

Yes.  15aa6c6748 introduced early_msi_init() along with a CPU notifier
it called early to allocate the scratch mask.  Now that the scratch mask
is allocated via the normal smp route, it is later than
early_msi_init(), so hasn't been allocated yet.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.