[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 104642: regressions - trouble: blocked/broken/fail



flight 104642 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104642/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   5 xen-build                fail REGR. vs. 104630
 build-armhf                   5 xen-build                fail REGR. vs. 104630

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386  1 build-check(1)         blocked n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 build-arm64-pvops             5 kernel-build                 fail   never pass
 build-arm64                   5 xen-build                    fail   never pass

version targeted for testing:
 xen                  d5c4a55e007db102ee6bd1ac771f0b05458609c2
baseline version:
 xen                  c13f0f9a331153a57eedfe8c80f1e2f6d4f01dcc

Last test of basis   104630  2017-01-24 19:01:56 Z    0 days
Testing same since   104642  2017-01-25 10:01:54 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Dario Faggioli <dario.faggioli@xxxxxxxxxx>
  Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Kevin Tian <kevin.tian@xxxxxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>
  Praveen Kumar <kpraveen.lkml@xxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Venu Busireddy <venu.busireddy@xxxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

jobs:
 build-amd64                                                  fail    
 build-arm64                                                  fail    
 build-armhf                                                  fail    
 build-amd64-libvirt                                          blocked 
 build-arm64-pvops                                            fail    
 test-armhf-armhf-xl                                          blocked 
 test-arm64-arm64-xl-xsm                                      broken  
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     blocked 
 test-amd64-amd64-libvirt                                     blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit d5c4a55e007db102ee6bd1ac771f0b05458609c2
Author: Praveen Kumar <kpraveen.lkml@xxxxxxxxx>
Date:   Wed Jan 25 10:51:47 2017 +0100

    credit2: performance counter for load balancing call
    
    The patch introduces a new performance counter that counts how many times 
we go
    through the load balancing logic in Credit2.
    
    Signed-off-by: Praveen Kumar <kpraveen.lkml@xxxxxxxxx>
    Acked-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx>

commit 9b7c0ce58396a20f01e8db4494e967ca4cb55ed4
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jan 25 10:51:10 2017 +0100

    x86/hvm: serialize trap injecting producer and consumer
    
    Since injection works on a remote vCPU, and since there's no
    enforcement of the subject vCPU being paused, there's a potential race
    between the producing and consuming sides. Fix this by leveraging the
    vector field as synchronization variable.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    [re-based]
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 58cbc034dc62c2c2e10aaddfed7ef874e03bc383
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Wed Jan 25 10:49:52 2017 +0100

    dm_op: convert HVMOP_inject_trap and HVMOP_inject_msi
    
    NOTE: This patch also modifies the types of the 'vector', 'type' and
          'insn_len' arguments of xc_hvm_inject_trap() from uint32_t to
          uint8_t. In practice the values passed were always truncated to
          8 bits.
    
    Suggested-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit ae20ccf070bc269eb24587dac7671fba86a9848a
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Wed Jan 25 10:48:25 2017 +0100

    dm_op: convert HVMOP_set_mem_type
    
    This patch removes the need for handling HVMOP restarts, so that
    infrastructure is removed.
    
    NOTE: This patch also modifies the type of the 'nr' argument of
          xc_hvm_set_mem_type() from uint64_t to uint32_t. In practice the
          value passed was always truncated to 32 bits.
    
    Suggested-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit b30c5979e02ca68f3d18bb3b130211aa7b9e6aee
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Wed Jan 25 10:47:13 2017 +0100

    dm_op: convert HVMOP_modified_memory
    
    This patch introduces code to handle DMOP continuations.
    
    NOTE: This patch also modifies the type of the 'nr' argument of
          xc_hvm_modified_memory() from uint64_t to uint32_t. In practice the
          value passed was always truncated to 32 bits.
    
    Suggested-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 7b2e218fd6ebd4839c8cef3c3e88d4370d7c0f94
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Wed Jan 25 10:44:50 2017 +0100

    dm_op: convert HVMOP_set_pci_intx_level, HVMOP_set_isa_irq_level, and...
    
    ... HVMOP_set_pci_link_route
    
    These HVMOPs were exposed to guests so their definitions need to be
    preserved for compatibility. This patch therefore updates
    __XEN_LATEST_INTERFACE_VERSION__ to 0x00040900 and makes the HVMOP
    defintions conditional on __XEN_INTERFACE_VERSION__ less than that value.
    
    NOTE: This patch also widens the 'domain' parameter of
          xc_hvm_set_pci_intx_level() from a uint8_t to a uint16_t.
    
    Suggested-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 86ad4d054a08d4a2172d6725c66b02c15a578066
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Wed Jan 25 10:43:14 2017 +0100

    dm_op: convert HVMOP_track_dirty_vram
    
    The handle type passed to the underlying shadow and hap functions is
    changed for compatibility with the new hypercall buffer.
    
    NOTE: This patch also modifies the type of the 'nr' parameter of
          xc_hvm_track_dirty_vram() from uint64_t to uint32_t. In practice
          the value passed was always truncated to 32 bits.
    
    Suggested-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit a2323df5f47c630eb763cac82f6680260ead24c4
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Wed Jan 25 10:41:35 2017 +0100

    dm_op: convert HVMOP_*ioreq_server*
    
    The definitions of HVM_IOREQSRV_BUFIOREQ_* have to persist as they are
    already in use by callers of the libxc interface.
    
    Suggested-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 524a98c2ac5e60b824033af32243bd4c8dd8e265
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Wed Jan 25 10:40:51 2017 +0100

    public / x86: introduce __HYPERCALL_dm_op...
    
    ...as a set of hypercalls to be used by a device model.
    
    As stated in the new docs/designs/dm_op.markdown:
    
    "The aim of DMOP is to prevent a compromised device model from
    compromising domains other then the one it is associated with. (And is
    therefore likely already compromised)."
    
    See that file for further information.
    
    This patch simply adds the boilerplate for the hypercall.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Suggested-by: Ian Jackson <ian.jackson@xxxxxxxxxx>
    Suggested-by: Jennifer Herbert <jennifer.herbert@xxxxxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 431685e8deb660976d8e986c41a647944e410c6c
Author: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx>
Date:   Wed Jan 25 10:38:05 2017 +0100

    VT-d: add command line option for extra rmrrs
    
    On some platforms firmware fails to specify RMRR regions in ACPI tables and
    thus those regions will not be mapped in dom0 or guests and may cause IO
    Page Faults and prevent dom0 from booting if "iommu=dom0-strict" option is
    specified on the Xen command line.
    
    New Xen command line option rmrr allows to specify such devices and
    memory regions. These regions are added to the list of RMRR defined in ACPI
    if the device is present in system. As a result, additional RMRRs will be
    mapped 1:1 in dom0 with correct permissions.
    
    The above mentioned problems were discovered during the PVH work with
    ThinkCentre M and Dell 5600T. No official documentation was found so far
    in regards to what devices and why cause this. Experiments show that
    ThinkCentre M USB devices with enabled debug port generate DMA read
    transactions to the regions of memory marked reserved in host e820 map.
    
    For Dell 5600T the device and faulting addresses are not found yet.
    For detailed history of the discussion please check following threads:
        http://lists.Xen.org/archives/html/xen-devel/2015-02/msg01724.html
        http://lists.Xen.org/archives/html/xen-devel/2015-01/msg02513.html
    
    Format for rmrr Xen command line option:
        
rmrr=start<-end>=[s1]bdf1[,[s1]bdf2[,...]];start<-end>=[s2]bdf1[,[s2]bdf2[,...]]
        For example, for Lenovo ThinkCentre M, use:
            rmrr=0xd5d45=0:0:1d.0;0xd5d46=0:0:1a.0
        If grub2 used and multiple ranges are specified, ';' should be
        quoted/escaped, refer to grub2 manual for more information.
    
    Signed-off-by: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx>
    Signed-off-by: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 537043d72774c044e25e3186d4683b96da30d72c
Author: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx>
Date:   Wed Jan 25 10:37:43 2017 +0100

    pci: add wrapper for parse_pci
    
    For sbdf's parsing in RMRR command line, add parse_pci_seg with additional
    parameter def_seg. parse_pci_seg will help to identify if segment was
    found in string being parsed or default segment was used.
    Make a wrapper parse_pci so the rest of the callers are not affected.
    
    Signed-off-by: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx>
    Signed-off-by: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 0cd6e37dc9bb79d9e7002565e91bee9c9eef1471
Author: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx>
Date:   Wed Jan 25 10:37:14 2017 +0100

    VT-d: separate rmrr addition function
    
    In preparation for auxiliary RMRR data provided on Xen command line,
    make RMRR adding a separate function.
    Also free memery for rmrr device scope in error path.
    
    Signed-off-by: Elena Ufimtseva <elena.ufimtseva@xxxxxxxxxx>
    Signed-off-by: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.