[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 105866: regressions - trouble: broken/fail/pass



flight 105866 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105866/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-libvirt     14 guest-saverestore        fail REGR. vs. 105852
 test-armhf-armhf-xl         15 guest-start/debian.repeat fail REGR. vs. 105852
 test-amd64-amd64-xl-qemuu-debianhvm-i386 12 guest-saverestore fail REGR. vs. 
105852

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 build-arm64                   5 xen-build                    fail   never pass
 build-arm64-pvops             5 kernel-build                 fail   never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  378384399ed661bed711221a5d8dbdac66b8e851
baseline version:
 xen                  7127d53fe891f9ea67357587a33a7aaba4b55f45

Last test of basis   105852  2017-02-16 14:01:33 Z    0 days
Failing since        105857  2017-02-16 16:01:30 Z    0 days    6 attempts
Testing same since   105862  2017-02-16 22:01:53 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Daniel Kiper <daniel.kiper@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxx>
  Stefano Stabellini <sstabellini@xxxxxxxxxx>

jobs:
 build-amd64                                                  pass    
 build-arm64                                                  fail    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 build-arm64-pvops                                            fail    
 test-armhf-armhf-xl                                          fail    
 test-arm64-arm64-xl-xsm                                      broken  
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     fail    
 test-amd64-amd64-libvirt                                     fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 378384399ed661bed711221a5d8dbdac66b8e851
Author: Stefano Stabellini <sstabellini@xxxxxxxxxx>
Date:   Fri Feb 10 18:05:22 2017 -0800

    arm: read/write rank->vcpu atomically
    
    We don't need a lock in vgic_get_target_vcpu anymore, solving the
    following lock inversion bug: the rank lock should be taken first, then
    the vgic lock. However, gic_update_one_lr is called with the vgic lock
    held, and it calls vgic_get_target_vcpu, which tries to obtain the rank
    lock.
    
    Coverity-ID: 1381855
    Coverity-ID: 1381853
    
    Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>
    Reviewed-by: Julien Grall <julien.grall@xxxxxxx>

commit 79903e50dba9e7442c9b7ca424661bb020e9dbf2
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Feb 16 18:11:42 2017 +0100

    x86emul: catch exceptions occurring in stubs
    
    Before adding more use of stubs cloned from decoded guest insns, guard
    ourselves against mistakes there: Should an exception (with the
    noteworthy exception of #PF) occur inside the stub, forward it to the
    guest.
    
    Since the exception fixup table entry can't encode the address of the
    faulting insn itself, attach it to the return address instead. This at
    once provides a convenient place to hand the exception information
    back: The return address is being overwritten by it before branching to
    the recovery code.
    
    Take the opportunity and (finally!) add symbol resolution to the
    respective log messages (the new one is intentionally not being coded
    that way, as it covers stub addresses only, which don't have symbols
    associated).
    
    Also take the opportunity and make search_one_extable() static again.
    
    Suggested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 8c935f5ff1cac422b4de21cbab69e13d2ebb25be
Author: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
Date:   Thu Feb 16 18:10:04 2017 +0100

    x86: add "w" flag to .init.data section definition
    
    init.data section is clearly writable, so, add "w" flag to its
    definition in xen/arch/x86/boot/x86_64.S.
    
    Signed-off-by: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit e004384bb371f5ab76a79b83da79981f4c400b83
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Feb 15 19:15:41 2017 +0000

    x86/hypercall: Move hypercall continuation logic
    
    The newly-repurposed arch/x86/hypercall.c is a more appropriate place for 
the
    hypercall continuation logic to live.
    
    This is purely code motion.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 0c221ae9d745de138850c6903a5861e2582df863
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Feb 13 11:49:33 2017 +0000

    x86/hypercall: Split out PV hypercall infrastructure
    
    Repurpose arch/x86/hypercall.c to be common x86 hypercall infrastructure, 
and
    move the PV specific routines to arch/x86/pv/hypercall.c
    
    This is purely code motion.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit bb84ffc56ec14766f33a002a61fd97a62b6b17cd
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Feb 14 18:21:22 2017 +0000

    x86/hypercall: Make the HVM hcall_64bit boolean common
    
    HVM guests currently make use of arch.hvm_vcpu.hcall_64bit to track the ABI 
of
    the hypercall in use.
    
    The rest of Xen deals in terms of the comat ABI or not, so rename the 
boolean
    and make it common, guared by CONFIG_COMPAT to avoid bloat if a compat ABI 
is
    not wanted/needed.
    
    Set hcall_compat uniformly for PV guests as well as HVM guests.  This 
removes
    the remaining piece of guest-type-specific knowledge from
    hypercall_create_continuation(), allowing it to operate only in terms of the
    hypercall ABI in use.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit b26c93fb1b14501fece01b213590896c2c069770
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Feb 14 18:06:59 2017 +0000

    xen/multicall: Use the common hcall_preempted boolean
    
    The now-common hcall_preempted boolean is perfectly usable for multicalls.
    Remove the multicall-specific preemption mechanism.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Julien Grall <julien.grall@xxxxxxx>

commit 9353e3628a8cba7edc5aea470b448f290af76118
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Feb 14 17:56:33 2017 +0000

    arm/hypercall: Use the common hcall_preempted boolean
    
    With hcall_preempted having just been made common, ARM can use use it to
    simplify its hypercall handling.
    
    This simplifies the continuation logic and removes the risk of accidentally
    skipping multiple instructions.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Julien Grall <julien.grall@xxxxxxx>

commit 928ea919fc3c5476aa9df55c3b95debc8904927f
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Feb 14 17:02:04 2017 +0000

    x86/hypercall: Make the HVM hcall_preempted boolean common
    
    HVM guests currently make use of arch.hvm_vcpu.hcall_preempted to track
    hypercall preemption in struct vcpu.  Move this boolean to being common at 
the
    top level of struct vcpu, which will allow it to be reused elsewhere.
    
    Alter the PV preemption logic to use this boolean.  This simplifies the code
    by removing guest-type-specific knowledge, and removes the risk of 
accidently
    skipping backwards or forwards multiple times and corrupting %rip.
    
    In pv_hypercall() the old_rip bodge can be removed, and parameter clobbering
    can happen based on a more obvious condition.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 3044a2a81910bf993c0fe6fa34bee0bf5b410911
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Feb 15 17:32:30 2017 +0000

    common/vcpu: Switch v->vcpu_info_mfn to mfn_t
    
    No functional change.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit e0f6e6f614da1f3bc9147774a58ac1fbc7c74ed2
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Feb 15 17:30:48 2017 +0000

    xen/sched.h Whitespace and bool cleanup
    
    Extend the Maptrack comment to point at the Grant table subsystem.
    
    No functional change.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 3091080ef7724ddac77e0ae81c270936a630477f
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Feb 15 18:04:58 2017 +0000

    xen/include: Include xen/kconfig.h automatically
    
    generated/autoconf.h is already included automatically so CONFIG_* defines 
are
    available.  However, the companion macros such as IS_ENABLED() are not
    included.
    
    Include them uniformly everywhere.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>

commit 480e011ea8952f32d46e4986f098638c97b7bea4
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Feb 15 17:48:47 2017 +0000

    xen/include: Remove explicit asm/config.h includes
    
    xen/config.h includes asm/config.h, and is included automatically via 
CFLAGS.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>

commit d89f48f58ee5568fc58c574690b06cb10e2ed7f7
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Feb 15 17:45:47 2017 +0000

    xen/include: Remove explicit xen/config.h includes
    
    This file is included automatically via CFLAGS.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.