[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [linux-linus test] 118263: trouble: broken/fail/pass



flight 118263 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118263/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm    <job status>      broken
 test-amd64-amd64-xl-qemut-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm    <job status>           broken
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm    <job status>       broken
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm    <job status>            broken
 test-amd64-i386-xl-raw          <job status>                 broken
 test-amd64-amd64-libvirt-vhd    <job status>                 broken
 test-amd64-amd64-libvirt-vhd  4 host-install(4)        broken REGR. vs. 118250
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 4 host-install(4) broken REGR. 
vs. 118250
 test-amd64-i386-xl-raw        4 host-install(4)        broken REGR. vs. 118250
 test-amd64-amd64-xl-qemut-debianhvm-amd64 4 host-install(4) broken REGR. vs. 
118250
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 4 host-install(4) broken 
REGR. vs. 118250
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 4 host-install(4) broken REGR. 
vs. 118250
 test-amd64-i386-examine       5 host-install           broken REGR. vs. 118250
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 4 host-install(4) broken 
REGR. vs. 118250

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop            fail like 118250
 test-armhf-armhf-libvirt     14 saverestore-support-check    fail  like 118250
 test-armhf-armhf-libvirt-xsm 14 saverestore-support-check    fail  like 118250
 test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop             fail like 118250
 test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop            fail like 118250
 test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop             fail like 118250
 test-armhf-armhf-libvirt-raw 13 saverestore-support-check    fail  like 118250
 test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop            fail like 118250
 test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop            fail like 118250
 test-amd64-amd64-libvirt     13 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      13 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  14 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          14 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 14 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      14 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  14 saverestore-support-check    fail   never pass
 test-amd64-amd64-qemuu-nested-amd 17 debian-hvm-install/l1/l2  fail never pass
 test-armhf-armhf-libvirt     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-xsm      13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-xsm      14 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-xsm 13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 13 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 14 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 13 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 14 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-credit2  13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  14 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 12 migrate-support-check        fail   never pass
 test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stop              fail never pass
 test-amd64-i386-xl-qemut-ws16-amd64 17 guest-stop              fail never pass
 test-armhf-armhf-xl-vhd      12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      13 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-qemuu-win10-i386 10 windows-install         fail never pass
 test-amd64-amd64-xl-qemuu-win10-i386 10 windows-install        fail never pass
 test-amd64-amd64-xl-qemut-win10-i386 10 windows-install        fail never pass
 test-amd64-i386-xl-qemut-win10-i386 10 windows-install         fail never pass

version targeted for testing:
 linux                5515114211c5096987b8e622c2ca57929cebabaa
baseline version:
 linux                d517bb79f4994a87cfc2ddd4cc76bd1a627d4bed

Last test of basis   118250  2018-01-21 06:48:31 Z    1 days
Testing same since   118263  2018-01-21 23:17:15 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andi Kleen <ak@xxxxxxxxxxxxxxx>
  Dave Young <dyoung@xxxxxxxxxx>
  David Woodhouse <dwmw@xxxxxxxxxxxx>
  Keith Busch <keith.busch@xxxxxxxxx>
  Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
  Masami Hiramatsu <mhiramat@xxxxxxxxxx>
  Thomas Gleixner <tglx@xxxxxxxxxxxxx>
  Tom Lendacky <thomas.lendacky@xxxxxxx>
  zhenwei.pi <zhenwei.pi@xxxxxxxxxxxxxxx>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-armhf-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumprun                                          pass    
 build-i386-rumprun                                           pass    
 test-amd64-amd64-xl                                          pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm                broken  
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm                 broken  
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           broken  
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            broken  
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-armhf-armhf-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-armhf-armhf-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumprun-amd64                               pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      fail    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumprun-i386                                 pass    
 test-amd64-amd64-xl-qemut-win10-i386                         fail    
 test-amd64-i386-xl-qemut-win10-i386                          fail    
 test-amd64-amd64-xl-qemuu-win10-i386                         fail    
 test-amd64-i386-xl-qemuu-win10-i386                          fail    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-xl-raw                                       broken  
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-amd64-amd64-libvirt-vhd                                 broken  
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-amd64 broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm broken
broken-job test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm broken
broken-job test-amd64-i386-xl-qemut-debianhvm-amd64-xsm broken
broken-job test-amd64-i386-xl-raw broken
broken-job test-amd64-amd64-libvirt-vhd broken
broken-step test-amd64-amd64-libvirt-vhd host-install(4)
broken-step test-amd64-i386-xl-qemut-debianhvm-amd64-xsm host-install(4)
broken-step test-amd64-i386-xl-raw host-install(4)
broken-step test-amd64-amd64-xl-qemut-debianhvm-amd64 host-install(4)
broken-step test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm host-install(4)
broken-step test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm host-install(4)
broken-step test-amd64-i386-examine host-install
broken-step test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm host-install(4)

Not pushing.

------------------------------------------------------------
commit 5515114211c5096987b8e622c2ca57929cebabaa
Merge: 319f1e04c7e7 3f7d875566d8
Author: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Date:   Sun Jan 21 10:48:35 2018 -0800

    Merge branch 'x86-pti-for-linus' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
    
    Pull x86 pti fixes from Thomas Gleixner:
     "A small set of fixes for the meltdown/spectre mitigations:
    
       - Make kprobes aware of retpolines to prevent probes in the retpoline
         thunks.
    
       - Make the machine check exception speculation protected. MCE used to
         issue an indirect call directly from the ASM entry code. Convert
         that to a direct call into a C-function and issue the indirect call
         from there so the compiler can add the retpoline protection,
    
       - Make the vmexit_fill_RSB() assembly less stupid
    
       - Fix a typo in the PTI documentation"
    
    * 'x86-pti-for-linus' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
      x86/pti: Document fix wrong index
      kprobes/x86: Disable optimizing on the function jumps to indirect thunk
      kprobes/x86: Blacklist indirect thunk functions for kprobes
      retpoline: Introduce start/end markers of indirect thunk
      x86/mce: Make machine check speculation protected

commit 319f1e04c7e7016233f998a1a48cd3d17da2108f
Merge: 66f816241895 f23d74f6c66c
Author: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Date:   Sun Jan 21 10:41:48 2018 -0800

    Merge branch 'x86-urgent-for-linus' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
    
    Pull x86 kexec fix from Thomas Gleixner:
     "A single fix for the WBINVD issue introduced by the SME support which
      causes kexec fails on non AMD/SME capable CPUs. Issue WBINVD only when
      the CPU has SME and avoid doing so in a loop"
    
    [ Side note: this patch fixes the problem, but it isn't entirely clear
      why it is required. The wbinvd should just work regardless, but there
      seems to be some system - as opposed to CPU - issue, since the wbinvd
      causes more problems later in the shutdown sequence, but wbinvd
      instructions while the system is still active are not problematic.
    
      Possibly some SMI or pending machine check issue on the affected system ]
    
    * 'x86-urgent-for-linus' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      x86/mm: Rework wbinvd, hlt operation in stop_this_cpu()

commit 66f816241895dc8a1614c1114c0a97b167e4ce64
Merge: d517bb79f499 a0c9259dc4e1
Author: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Date:   Sun Jan 21 10:39:58 2018 -0800

    Merge branch 'irq-urgent-for-linus' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
    
    Pull irq fix from Thomas Gleixner:
     "A single fix for the new matrix allocator to prevent vector exhaustion
      by certain network drivers which allocate gazillions of unused vectors
      which cannot be put into reservation mode due to MSI and the lack of
      MSI entry masking.
    
      The fix/workaround is to spread the vectors across CPUs by searching
      the supplied target CPU mask for the CPU with the smallest number of
      allocated vectors"
    
    * 'irq-urgent-for-linus' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      irq/matrix: Spread interrupts on allocation

commit 3f7d875566d8e79c5e0b2c9a413e91b2c29e0854
Author: Andi Kleen <ak@xxxxxxxxxxxxxxx>
Date:   Wed Jan 17 14:53:28 2018 -0800

    x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
    
    The generated assembler for the C fill RSB inline asm operations has
    several issues:
    
    - The C code sets up the loop register, which is then immediately
      overwritten in __FILL_RETURN_BUFFER with the same value again.
    
    - The C code also passes in the iteration count in another register, which
      is not used at all.
    
    Remove these two unnecessary operations. Just rely on the single constant
    passed to the macro for the iterations.
    
    Signed-off-by: Andi Kleen <ak@xxxxxxxxxxxxxxx>
    Signed-off-by: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
    Acked-by: David Woodhouse <dwmw@xxxxxxxxxxxx>
    Cc: dave.hansen@xxxxxxxxx
    Cc: gregkh@xxxxxxxxxxxxxxxxxxx
    Cc: torvalds@xxxxxxxxxxxxxxxxxxxx
    Cc: arjan@xxxxxxxxxxxxxxx
    Link: https://lkml.kernel.org/r/20180117225328.15414-1-andi@xxxxxxxxxxxxxx

commit 98f0fceec7f84d80bc053e49e596088573086421
Author: zhenwei.pi <zhenwei.pi@xxxxxxxxxxxxxxx>
Date:   Thu Jan 18 09:04:52 2018 +0800

    x86/pti: Document fix wrong index
    
    In section <2. Runtime Cost>, fix wrong index.
    
    Signed-off-by: zhenwei.pi <zhenwei.pi@xxxxxxxxxxxxxxx>
    Signed-off-by: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
    Cc: dave.hansen@xxxxxxxxxxxxxxx
    Link: 
https://lkml.kernel.org/r/1516237492-27739-1-git-send-email-zhenwei.pi@xxxxxxxxxxxxxxx

commit c86a32c09f8ced67971a2310e3b0dda4d1749007
Author: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
Date:   Fri Jan 19 01:15:20 2018 +0900

    kprobes/x86: Disable optimizing on the function jumps to indirect thunk
    
    Since indirect jump instructions will be replaced by jump
    to __x86_indirect_thunk_*, those jmp instruction must be
    treated as an indirect jump. Since optprobe prohibits to
    optimize probes in the function which uses an indirect jump,
    it also needs to find out the function which jump to
    __x86_indirect_thunk_* and disable optimization.
    
    Add a check that the jump target address is between the
    __indirect_thunk_start/end when optimizing kprobe.
    
    Signed-off-by: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
    Signed-off-by: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
    Acked-by: David Woodhouse <dwmw@xxxxxxxxxxxx>
    Cc: Andi Kleen <ak@xxxxxxxxxxxxxxx>
    Cc: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
    Cc: Ananth N Mavinakayanahalli <ananth@xxxxxxxxxxxxxxxxxx>
    Cc: Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
    Cc: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxxx>
    Cc: stable@xxxxxxxxxxxxxxx
    Link: 
https://lkml.kernel.org/r/151629212062.10241.6991266100233002273.stgit@devbox

commit c1804a236894ecc942da7dc6c5abe209e56cba93
Author: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
Date:   Fri Jan 19 01:14:51 2018 +0900

    kprobes/x86: Blacklist indirect thunk functions for kprobes
    
    Mark __x86_indirect_thunk_* functions as blacklist for kprobes
    because those functions can be called from anywhere in the kernel
    including blacklist functions of kprobes.
    
    Signed-off-by: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
    Signed-off-by: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
    Acked-by: David Woodhouse <dwmw@xxxxxxxxxxxx>
    Cc: Andi Kleen <ak@xxxxxxxxxxxxxxx>
    Cc: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
    Cc: Ananth N Mavinakayanahalli <ananth@xxxxxxxxxxxxxxxxxx>
    Cc: Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
    Cc: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxxx>
    Cc: stable@xxxxxxxxxxxxxxx
    Link: 
https://lkml.kernel.org/r/151629209111.10241.5444852823378068683.stgit@devbox

commit 736e80a4213e9bbce40a7c050337047128b472ac
Author: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
Date:   Fri Jan 19 01:14:21 2018 +0900

    retpoline: Introduce start/end markers of indirect thunk
    
    Introduce start/end markers of __x86_indirect_thunk_* functions.
    To make it easy, consolidate .text.__x86.indirect_thunk.* sections
    to one .text.__x86.indirect_thunk section and put it in the
    end of kernel text section and adds __indirect_thunk_start/end
    so that other subsystem (e.g. kprobes) can identify it.
    
    Signed-off-by: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
    Signed-off-by: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
    Acked-by: David Woodhouse <dwmw@xxxxxxxxxxxx>
    Cc: Andi Kleen <ak@xxxxxxxxxxxxxxx>
    Cc: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
    Cc: Ananth N Mavinakayanahalli <ananth@xxxxxxxxxxxxxxxxxx>
    Cc: Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
    Cc: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxxx>
    Cc: stable@xxxxxxxxxxxxxxx
    Link: 
https://lkml.kernel.org/r/151629206178.10241.6828804696410044771.stgit@devbox

commit 6f41c34d69eb005e7848716bbcafc979b35037d5
Author: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
Date:   Thu Jan 18 16:28:26 2018 +0100

    x86/mce: Make machine check speculation protected
    
    The machine check idtentry uses an indirect branch directly from the low
    level code. This evades the speculation protection.
    
    Replace it by a direct call into C code and issue the indirect call there
    so the compiler can apply the proper speculation protection.
    
    Signed-off-by: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
    Reviewed-by:Borislav Petkov <bp@xxxxxxxxx>
    Reviewed-by: David Woodhouse <dwmw@xxxxxxxxxxxx>
    Niced-by: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
    Cc: stable@xxxxxxxxxxxxxxx
    Link: https://lkml.kernel.org/r/alpine.DEB.2.20.1801181626290.1847@nanos

commit f23d74f6c66c3697e032550eeef3f640391a3a7d
Author: Tom Lendacky <thomas.lendacky@xxxxxxx>
Date:   Wed Jan 17 17:41:41 2018 -0600

    x86/mm: Rework wbinvd, hlt operation in stop_this_cpu()
    
    Some issues have been reported with the for loop in stop_this_cpu() that
    issues the 'wbinvd; hlt' sequence.  Reverting this sequence to halt()
    has been shown to resolve the issue.
    
    However, the wbinvd is needed when running with SME.  The reason for the
    wbinvd is to prevent cache flush races between encrypted and non-encrypted
    entries that have the same physical address.  This can occur when
    kexec'ing from memory encryption active to inactive or vice-versa.  The
    important thing is to not have outside of kernel text memory references
    (such as stack usage), so the usage of the native_*() functions is needed
    since these expand as inline asm sequences.  So instead of reverting the
    change, rework the sequence.
    
    Move the wbinvd instruction outside of the for loop as native_wbinvd()
    and make its execution conditional on X86_FEATURE_SME.  In the for loop,
    change the asm 'wbinvd; hlt' sequence back to a halt sequence but use
    the native_halt() call.
    
    Fixes: bba4ed011a52 ("x86/mm, kexec: Allow kexec to be used with SME")
    Reported-by: Dave Young <dyoung@xxxxxxxxxx>
    Signed-off-by: Tom Lendacky <thomas.lendacky@xxxxxxx>
    Signed-off-by: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
    Tested-by: Dave Young <dyoung@xxxxxxxxxx>
    Cc: Juergen Gross <jgross@xxxxxxxx>
    Cc: Tony Luck <tony.luck@xxxxxxxxx>
    Cc: Yu Chen <yu.c.chen@xxxxxxxxx>
    Cc: Baoquan He <bhe@xxxxxxxxxx>
    Cc: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
    Cc: kexec@xxxxxxxxxxxxxxxxxxx
    Cc: ebiederm@xxxxxxxxxx
    Cc: Borislav Petkov <bp@xxxxxxxxx>
    Cc: Rui Zhang <rui.zhang@xxxxxxxxx>
    Cc: Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
    Cc: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
    Cc: Dan Williams <dan.j.williams@xxxxxxxxx>
    Cc: stable@xxxxxxxxxxxxxxx
    Link: 
https://lkml.kernel.org/r/20180117234141.21184.44067.stgit@xxxxxxxxxxxxxxxxxxxxxxxxx

commit a0c9259dc4e1923a98356967ce8b732da1979df8
Author: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
Date:   Wed Jan 17 16:01:47 2018 +0100

    irq/matrix: Spread interrupts on allocation
    
    Keith reported an issue with vector space exhaustion on a server machine
    which is caused by the i40e driver allocating 168 MSI interrupts when the
    driver is initialized, even when most of these interrupts are not used at
    all.
    
    The x86 vector allocation code tries to avoid the immediate allocation with
    the reservation mode, but the card uses MSI and does not support MSI entry
    masking, which prevents reservation mode and requires immediate vector
    allocation.
    
    The matrix allocator is a bit naive and prefers the first CPU in the
    cpumask which describes the possible target CPUs for an allocation. That
    results in allocating all 168 vectors on CPU0 which later causes vector
    space exhaustion when the NVMe driver tries to allocate managed interrupts
    on each CPU for the per CPU queues.
    
    Avoid this by finding the CPU which has the lowest vector allocation count
    to spread out the non managed interrupt accross the possible target CPUs.
    
    Fixes: 2f75d9e1c905 ("genirq: Implement bitmap matrix allocator")
    Reported-by: Keith Busch <keith.busch@xxxxxxxxx>
    Signed-off-by: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
    Tested-by: Keith Busch <keith.busch@xxxxxxxxx>
    Link: https://lkml.kernel.org/r/alpine.DEB.2.20.1801171557330.1777@nanos

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.