* [xen-unstable test] 127573: regressions - trouble: broken/fail/pass
@ 2018-09-14 6:20 osstest service owner
2018-09-14 7:12 ` Roger Pau Monné
0 siblings, 1 reply; 2+ messages in thread
From: osstest service owner @ 2018-09-14 6:20 UTC (permalink / raw)
To: xen-devel, osstest-admin
flight 127573 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/127573/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-migrupgrade <job status> broken
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict <job status> broken
test-amd64-i386-qemuu-rhel6hvm-amd <job status> broken
test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow <job status> broken
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 4 host-install(4) broken REGR. vs. 127541
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm <job status> broken in 127557
test-xtf-amd64-amd64-3 <job status> broken in 127557
test-amd64-amd64-xl-multivcpu 7 xen-boot fail REGR. vs. 127541
test-amd64-i386-xl-xsm 7 xen-boot fail REGR. vs. 127541
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs. 127541
test-amd64-amd64-pygrub 7 xen-boot fail REGR. vs. 127541
test-amd64-amd64-i386-pvgrub 7 xen-boot fail REGR. vs. 127541
test-xtf-amd64-amd64-5 7 xen-boot fail REGR. vs. 127541
test-amd64-i386-qemut-rhel6hvm-intel 7 xen-boot fail REGR. vs. 127541
test-amd64-i386-xl-qemuu-ws16-amd64 7 xen-boot fail REGR. vs. 127541
test-amd64-i386-pair 10 xen-boot/src_host fail REGR. vs. 127541
test-amd64-i386-pair 11 xen-boot/dst_host fail REGR. vs. 127541
test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 16 guest-localmigrate/x10 fail in 127557 REGR. vs. 127541
Tests which are failing intermittently (not blocking):
test-xtf-amd64-amd64-3 4 host-install(4) broken in 127557 pass in 127573
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 4 host-install(4) broken in 127557 pass in 127573
test-amd64-i386-qemuu-rhel6hvm-amd 4 host-install(4) broken pass in 127557
test-amd64-i386-migrupgrade 5 host-install/dst_host(5) broken pass in 127557
test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 4 host-install(4) broken pass in 127557
test-xtf-amd64-amd64-1 7 xen-boot fail pass in 127557
test-amd64-amd64-migrupgrade 11 xen-boot/dst_host fail pass in 127557
test-amd64-amd64-xl 7 xen-boot fail pass in 127557
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop fail like 127541
test-armhf-armhf-libvirt 14 saverestore-support-check fail like 127541
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail like 127541
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail like 127541
test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop fail like 127541
test-armhf-armhf-libvirt-raw 13 saverestore-support-check fail like 127541
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail like 127541
test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop fail like 127541
test-amd64-i386-xl-pvshim 12 guest-start fail never pass
test-amd64-i386-libvirt-xsm 13 migrate-support-check fail never pass
test-arm64-arm64-xl 13 migrate-support-check fail never pass
test-arm64-arm64-xl 14 saverestore-support-check fail never pass
test-arm64-arm64-xl-credit2 13 migrate-support-check fail never pass
test-arm64-arm64-xl-credit2 14 saverestore-support-check fail never pass
test-arm64-arm64-xl-xsm 13 migrate-support-check fail never pass
test-arm64-arm64-xl-xsm 14 saverestore-support-check fail never pass
test-arm64-arm64-libvirt-xsm 13 migrate-support-check fail never pass
test-arm64-arm64-libvirt-xsm 14 saverestore-support-check fail never pass
test-amd64-i386-libvirt 13 migrate-support-check fail never pass
test-amd64-amd64-libvirt-xsm 13 migrate-support-check fail never pass
test-amd64-amd64-libvirt 13 migrate-support-check fail never pass
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check fail never pass
test-amd64-amd64-qemuu-nested-amd 17 debian-hvm-install/l1/l2 fail never pass
test-amd64-amd64-libvirt-vhd 12 migrate-support-check fail never pass
test-armhf-armhf-libvirt 13 migrate-support-check fail never pass
test-armhf-armhf-xl-credit2 13 migrate-support-check fail never pass
test-armhf-armhf-xl-credit2 14 saverestore-support-check fail never pass
test-armhf-armhf-xl-multivcpu 13 migrate-support-check fail never pass
test-armhf-armhf-xl-multivcpu 14 saverestore-support-check fail never pass
test-armhf-armhf-xl-arndale 13 migrate-support-check fail never pass
test-armhf-armhf-xl-arndale 14 saverestore-support-check fail never pass
test-armhf-armhf-libvirt-raw 12 migrate-support-check fail never pass
test-armhf-armhf-xl-vhd 12 migrate-support-check fail never pass
test-armhf-armhf-xl-vhd 13 saverestore-support-check fail never pass
test-armhf-armhf-xl-cubietruck 13 migrate-support-check fail never pass
test-armhf-armhf-xl-cubietruck 14 saverestore-support-check fail never pass
test-armhf-armhf-xl 13 migrate-support-check fail never pass
test-armhf-armhf-xl 14 saverestore-support-check fail never pass
test-armhf-armhf-xl-rtds 13 migrate-support-check fail never pass
test-armhf-armhf-xl-rtds 14 saverestore-support-check fail never pass
test-amd64-i386-xl-qemut-ws16-amd64 17 guest-stop fail never pass
test-amd64-amd64-xl-qemuu-win10-i386 10 windows-install fail never pass
test-amd64-i386-xl-qemuu-win10-i386 10 windows-install fail never pass
test-amd64-amd64-xl-qemut-win10-i386 10 windows-install fail never pass
test-amd64-i386-xl-qemut-win10-i386 10 windows-install fail never pass
version targeted for testing:
xen efaf9122b8d66cef9c67a9ca85e1ca9f7622e478
baseline version:
xen 1dfb8e6e0948912d1fd96d6ed9034527c5c74f31
Last test of basis 127541 2018-09-12 14:37:22 Z 1 days
Testing same since 127557 2018-09-13 03:43:38 Z 1 days 2 attempts
------------------------------------------------------------
People who touched revisions under test:
Adrian Pop <apop@bitdefender.com>
Alexandru Isaila <aisaila@bitdefender.com>
Alexandru Isaila <aisaila@bitdefender.com>i
Jan Beulich <jbeulich@suse.com>
Julien Grall <julien.grall@arm.com>
Roger Pau Monné <roger.pau@citrix.com>
Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
Tamas K Lengyel <tamas@tklengyel.com>
Vlad Ioan Topan <itopan@bitdefender.com>
jobs:
build-amd64-xsm pass
build-arm64-xsm pass
build-i386-xsm pass
build-amd64-xtf pass
build-amd64 pass
build-arm64 pass
build-armhf pass
build-amd64-xen-freebsd pass
build-amd64-xen-xsm-freebsd pass
build-i386 pass
build-amd64-libvirt pass
build-arm64-libvirt pass
build-armhf-libvirt pass
build-i386-libvirt pass
build-amd64-prev pass
build-i386-prev pass
build-amd64-pvops pass
build-arm64-pvops pass
build-armhf-pvops pass
build-i386-pvops pass
build-amd64-rumprun pass
build-i386-rumprun pass
test-xtf-amd64-amd64-1 fail
test-xtf-amd64-amd64-2 pass
test-xtf-amd64-amd64-3 pass
test-xtf-amd64-amd64-4 pass
test-xtf-amd64-amd64-5 fail
test-amd64-amd64-xl fail
test-arm64-arm64-xl pass
test-armhf-armhf-xl pass
test-amd64-i386-xl pass
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm pass
test-amd64-i386-xl-qemut-debianhvm-amd64-xsm pass
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm pass
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm fail
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm pass
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm pass
test-amd64-amd64-libvirt-xsm pass
test-arm64-arm64-libvirt-xsm pass
test-amd64-i386-libvirt-xsm pass
test-amd64-amd64-xl-xsm pass
test-arm64-arm64-xl-xsm pass
test-amd64-i386-xl-xsm fail
test-amd64-amd64-qemuu-nested-amd fail
test-amd64-amd64-xl-pvhv2-amd pass
test-amd64-i386-qemut-rhel6hvm-amd pass
test-amd64-i386-qemuu-rhel6hvm-amd broken
test-amd64-amd64-xl-qemut-debianhvm-amd64 pass
test-amd64-i386-xl-qemut-debianhvm-amd64 pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass
test-amd64-i386-xl-qemuu-debianhvm-amd64 pass
test-amd64-i386-freebsd10-amd64 pass
test-amd64-amd64-xl-qemuu-ovmf-amd64 pass
test-amd64-i386-xl-qemuu-ovmf-amd64 pass
test-amd64-amd64-rumprun-amd64 pass
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 fail
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-i386-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-qemut-ws16-amd64 fail
test-amd64-i386-xl-qemut-ws16-amd64 fail
test-amd64-amd64-xl-qemuu-ws16-amd64 fail
test-amd64-i386-xl-qemuu-ws16-amd64 fail
test-armhf-armhf-xl-arndale pass
test-amd64-amd64-xl-credit2 pass
test-arm64-arm64-xl-credit2 pass
test-armhf-armhf-xl-credit2 pass
test-armhf-armhf-xl-cubietruck pass
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict broken
test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict pass
test-amd64-amd64-examine pass
test-arm64-arm64-examine pass
test-armhf-armhf-examine pass
test-amd64-i386-examine pass
test-amd64-i386-freebsd10-i386 pass
test-amd64-i386-rumprun-i386 pass
test-amd64-amd64-xl-qemut-win10-i386 fail
test-amd64-i386-xl-qemut-win10-i386 fail
test-amd64-amd64-xl-qemuu-win10-i386 fail
test-amd64-i386-xl-qemuu-win10-i386 fail
test-amd64-amd64-qemuu-nested-intel pass
test-amd64-amd64-xl-pvhv2-intel pass
test-amd64-i386-qemut-rhel6hvm-intel fail
test-amd64-i386-qemuu-rhel6hvm-intel pass
test-amd64-amd64-libvirt pass
test-armhf-armhf-libvirt pass
test-amd64-i386-libvirt pass
test-amd64-amd64-livepatch pass
test-amd64-i386-livepatch pass
test-amd64-amd64-migrupgrade fail
test-amd64-i386-migrupgrade broken
test-amd64-amd64-xl-multivcpu fail
test-armhf-armhf-xl-multivcpu pass
test-amd64-amd64-pair pass
test-amd64-i386-pair fail
test-amd64-amd64-libvirt-pair pass
test-amd64-i386-libvirt-pair pass
test-amd64-amd64-amd64-pvgrub pass
test-amd64-amd64-i386-pvgrub fail
test-amd64-amd64-xl-pvshim pass
test-amd64-i386-xl-pvshim fail
test-amd64-amd64-pygrub fail
test-amd64-amd64-xl-qcow2 pass
test-armhf-armhf-libvirt-raw pass
test-amd64-i386-xl-raw pass
test-amd64-amd64-xl-rtds pass
test-armhf-armhf-xl-rtds pass
test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow broken
test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow pass
test-amd64-amd64-xl-shadow pass
test-amd64-i386-xl-shadow pass
test-amd64-amd64-libvirt-vhd pass
test-armhf-armhf-xl-vhd pass
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
broken-job test-amd64-i386-migrupgrade broken
broken-job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict broken
broken-job test-amd64-i386-qemuu-rhel6hvm-amd broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow broken
broken-step test-amd64-i386-qemuu-rhel6hvm-amd host-install(4)
broken-step test-amd64-i386-migrupgrade host-install/dst_host(5)
broken-step test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict host-install(4)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow host-install(4)
broken-job test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm broken
broken-job test-xtf-amd64-amd64-3 broken
broken-job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict broken
Not pushing.
------------------------------------------------------------
commit efaf9122b8d66cef9c67a9ca85e1ca9f7622e478
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:27:00 2018 +0200
x86/domctl: don't pause the whole domain if only getting vcpu state
This patch is focused on moving changing hvm_save_one() to save one
typecode from one vcpu and now that the save functions get data from a
single vcpu we can pause the specific vcpu instead of the domain.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit d0d8980138c45bddbb846e80e80edca2ad33ff75
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:27:00 2018 +0200
x86/hvm: remove redundant save functions
This patch removes the redundant save functions and renames the
save_one* to save. It then changes the domain param to vcpu in the
save funcs and adapts print messages in order to match the format of the
other save related messages.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit aab0ce62ce01fb82df93372ab16bcef30aa1f2b6
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:27:00 2018 +0200
x86/domctl: use hvm_save_vcpu_handler
This patch is aimed on using the new save_one fuctions in the hvm_save
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit b39605fa3f2b7486e58e89466fef20fe6a4a2c55
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:27:00 2018 +0200
x86/hvm: add handler for save_one funcs
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 261623d8a57afe6d340f4f0ac1fb0ed368451fba
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:26:00 2018 +0200
x86/hvm: introduce lapic_save_regs_one()
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 0dff42ddc903fd25bf08428e666ad76046532e74
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:26:00 2018 +0200
x86/hvm: introduce lapic_save_hidden_one()
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 824800a062b0690e9554eedc73bdb81a67f85808
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:26:00 2018 +0200
x86/hvm: introduce viridian_save_vcpu_ctxt_one()
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Paul Durrant <paul.durrant@citrix.com>
commit 343eb57023c7f1f676422aab5c41fadbab1ff8dc
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:26:00 2018 +0200
x86/hvm: introduce hvm_save_mtrr_msr_one()
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>i
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit c7e02761309779981a8fb5e4c6a0955ce85aef99
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:26:00 2018 +0200
x86/hvm: introduce hvm_save_cpu_msrs_one()
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Paul Durrant <paul.durrant@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 653abbb8144bfbff69b8bbc383f20d7dfaf03fcb
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:26:00 2018 +0200
x86/hvm: introduce hvm_save_cpu_xsave_states_one()
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 9a5ce83d08dad2a54da92dfce4705552b18b6c5d
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:26:00 2018 +0200
x86/hvm: introduce hvm_save_cpu_ctxt_one()
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit a0a173ef59cf3c2621ccf6991c8c45f6244f700c
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:26:00 2018 +0200
x86/hvm: introduce hvm_save_tsc_adjust_one()
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 3f8ea0ca65839bb79f128cc82bdabcea497f7d8c
Author: Alexandru Isaila <aisaila@bitdefender.com>
Date: Mon Sep 10 16:26:00 2018 +0200
x86/cpu: introduce vmce_save_vcpu_ctxt_one()
This is used to save data from a single instance.
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit eea4ec2b66dad87ec745778ab9f00e12ef0f2760
Author: Vlad Ioan Topan <itopan@bitdefender.com>
Date: Wed Sep 12 09:50:00 2018 +0200
x86/mm: change default value for suppress #VE in set_mem_access()
The default value for the "suppress #VE" bit set by set_mem_access()
currently depends on whether the call is made from the same domain (the
bit is set when called from another domain and cleared if called from
the same domain). This patch changes that behavior to inherit the old
suppress #VE bit value if it is already set and to set it to 1
otherwise, which is safer and more reliable.
Signed-off-by: Vlad Ioan Topan <itopan@bitdefender.com>
Signed-off-by: Adrian Pop <apop@bitdefender.com>
Acked-by: Tamas K Lengyel <tamas@tklengyel.com>
commit 0426787629417dcc338f03c1682b34d3540cb674
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri Sep 7 11:08:00 2018 +0200
x86/iommu: add map-reserved dom0-iommu option to map reserved memory ranges
Several people have reported hardware issues (malfunctioning USB
controllers) due to iommu page faults on Intel hardware. Those faults
are caused by missing RMRR (VTd) entries in the ACPI tables. Those can
be worked around on VTd hardware by manually adding RMRR entries on
the command line, this is however limited to Intel hardware and quite
cumbersome to do.
In order to solve those issues add a new dom0-iommu=map-reserved
option that identity maps all regions marked as reserved in the memory
map. Note that regions used by devices emulated by Xen (LAPIC, IO-APIC
or PCIe MCFG regions) are specifically avoided. Note that this option
is available to all Dom0 modes (as opposed to the inclusive option
which only works for PV Dom0).
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Kevin Tian <kevin.tian@intel.com>
Reviewed-by: Wei Liu <wei.liu2@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Julien Grall <julien.grall@arm.com>
Reviewed-by: Paul Durrant <paul.durrant@citrix.com>
Acked-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
commit 6bf0be5af852f2317b75ab94f1d2bb045ebef452
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri Sep 7 11:08:00 2018 +0200
x86/iommu: switch the hwdom mapping function to use page_get_type
This avoids repeated calls to page_is_ram_type which improves
performance and makes the code easier to read.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Wei Liu <wei.liu2@citrix.com>
commit 7f855b514146478dfdd1f796ed5578a138164d11
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri Sep 7 11:08:00 2018 +0200
mm: introduce a helper to get the memory type of a page
Returns all the memory types applicable to a page.
This function is unimplemented for ARM.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 66a9274cc3435117783cd3f07b238309d7f9c6de
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri Sep 7 11:08:00 2018 +0200
iommu: make iommu_inclusive_mapping a suboption of dom0-iommu
Introduce a new dom0-iommu=map-inclusive generic option that
supersedes iommu_inclusive_mapping. The previous behavior is preserved
and the option should only be enabled by default on Intel hardware.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Paul Durrant <paul.durrant@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Kevin Tian <kevin.tian@intel.com>
Acked-by: Julien Grall <julien.grall@arm.com>
Acked-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
commit 391266f0120c92ce8eb5bdb4a41bd314daaf6070
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri Sep 7 11:08:00 2018 +0200
iommu: introduce dom0-iommu option
To select the iommu configuration used by Dom0. This option supersedes
iommu=dom0-strict|dom0-passthrough.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Wei Liu <wei.liu2@citrix.com>
commit cf44ba9810ebe98a8612098783b29c4fe323c363
Author: Roger Pau Monné <roger.pau@citrix.com>
Date: Fri Sep 7 11:07:00 2018 +0200
iommu: rename iommu_dom0_strict and iommu_passthrough
To iommu_hwdom_strict and iommu_hwdom_passthrough which is more
descriptive of their usage. Also change their type from bool_t to
bool.
No functional change.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Kevin Tian <kevin.tian@intel.com>
Reviewed-by: Wei Liu <wei.liu2@citrix.com>
Acked-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
(qemu changes not included)
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [xen-unstable test] 127573: regressions - trouble: broken/fail/pass
2018-09-14 6:20 [xen-unstable test] 127573: regressions - trouble: broken/fail/pass osstest service owner
@ 2018-09-14 7:12 ` Roger Pau Monné
0 siblings, 0 replies; 2+ messages in thread
From: Roger Pau Monné @ 2018-09-14 7:12 UTC (permalink / raw)
To: osstest service owner; +Cc: xen-devel, Dario Faggioli
On Fri, Sep 14, 2018 at 06:20:40AM +0000, osstest service owner wrote:
> flight 127573 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/127573/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-migrupgrade <job status> broken
> test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict <job status> broken
> test-amd64-i386-qemuu-rhel6hvm-amd <job status> broken
> test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow <job status> broken
> test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 4 host-install(4) broken REGR. vs. 127541
> test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm <job status> broken in 127557
> test-xtf-amd64-amd64-3 <job status> broken in 127557
> test-amd64-amd64-xl-multivcpu 7 xen-boot fail REGR. vs. 127541
> test-amd64-i386-xl-xsm 7 xen-boot fail REGR. vs. 127541
> test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs. 127541
> test-amd64-amd64-pygrub 7 xen-boot fail REGR. vs. 127541
> test-amd64-amd64-i386-pvgrub 7 xen-boot fail REGR. vs. 127541
> test-xtf-amd64-amd64-5 7 xen-boot fail REGR. vs. 127541
> test-amd64-i386-qemut-rhel6hvm-intel 7 xen-boot fail REGR. vs. 127541
> test-amd64-i386-xl-qemuu-ws16-amd64 7 xen-boot fail REGR. vs. 127541
> test-amd64-i386-pair 10 xen-boot/src_host fail REGR. vs. 127541
> test-amd64-i386-pair 11 xen-boot/dst_host fail REGR. vs. 127541
> test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 16 guest-localmigrate/x10 fail in 127557 REGR. vs. 127541
Those xen-boot failures are caused by my iommu series, which changes
the order of iommu setup and now the iommu is enabled before the
inclusive mappings are setup. This should lead to iommu faults, but on
some hardware this leads to freezes:
Sep 13 22:31:18.334573 (XEN) *** Building a PV Dom0 ***
Sep 13 22:31:18.334635 (XEN) ELF: phdr: paddr=0x1000000 memsz=0x10bc000
Sep 13 22:31:18.586625 (XEN) ELF: phdr: paddr=0x2200000 memsz=0x52a000
Sep 13 22:31:18.586711 (XEN) ELF: phdr: paddr=0x272a000 memsz=0x23018
Sep 13 22:31:18.598587 (XEN) ELF: phdr: paddr=0x274e000 memsz=0x205000
Sep 13 22:31:18.598667 (XEN) ELF: memory: 0x1000000 -> 0x2953000
Sep 13 22:31:18.598695 (XEN) ELF: note: GUEST_OS = "linux"
Sep 13 22:31:18.610579 (XEN) ELF: note: GUEST_VERSION = "2.6"
Sep 13 22:31:18.610639 (XEN) ELF: note: XEN_VERSION = "xen-3.0"
Sep 13 22:31:18.610666 (XEN) ELF: note: VIRT_BASE = 0xffffffff80000000
Sep 13 22:31:18.622584 (XEN) ELF: note: INIT_P2M = 0x8000000000
Sep 13 22:31:18.622615 (XEN) ELF: note: ENTRY = 0xffffffff8274e180
Sep 13 22:31:18.622642 (XEN) ELF: note: HYPERCALL_PAGE = 0xffffffff81001000
Sep 13 22:31:18.634555 (XEN) ELF: note: FEATURES = "!writable_page_tables|pae_pgdir_above_4gb"
Sep 13 22:31:18.634589 (XEN) ELF: note: SUPPORTED_FEATURES = 0x801
Sep 13 22:31:18.646567 (XEN) ELF: note: PAE_MODE = "yes"
Sep 13 22:31:18.646623 (XEN) ELF: note: LOADER = "generic"
Sep 13 22:31:18.646672 (XEN) ELF: note: unknown (0xd)
Sep 13 22:31:18.658578 (XEN) ELF: note: SUSPEND_CANCEL = 0x1
Sep 13 22:31:18.658614 (XEN) ELF: note: MOD_START_PFN = 0x1
Sep 13 22:31:18.658641 (XEN) ELF: note: HV_START_LOW = 0xffff800000000000
Sep 13 22:31:18.670589 (XEN) ELF: note: PADDR_OFFSET = 0
Sep 13 22:31:18.670645 (XEN) ELF: note: PHYS32_ENTRY = 0x1000360
Sep 13 22:31:18.670695 (XEN) ELF: Found PVH image
Sep 13 22:31:18.682602 (XEN) ELF: addresses:
Sep 13 22:31:18.682655 (XEN) virt_base = 0xffffffff80000000
Sep 13 22:31:18.682707 (XEN) elf_paddr_offset = 0x0
Sep 13 22:31:18.682756 (XEN) virt_offset = 0xffffffff80000000
Sep 13 22:31:18.694609 (XEN) virt_kstart = 0xffffffff81000000
Sep 13 22:31:18.694673 (XEN) virt_kend = 0xffffffff82953000
Sep 13 22:31:18.706605 (XEN) virt_entry = 0xffffffff8274e180
Sep 13 22:31:18.706670 (XEN) p2m_base = 0x8000000000
Sep 13 22:31:18.706720 (XEN) Xen kernel: 64-bit, lsb, compat32
Sep 13 22:31:18.718550 (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x295300
Dario already reported this issue to me yesterday and I'm currently
working on a fix to restore the previous behavior and only enable the
iommu once inclusive mappings are setup.
Roger.
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-09-14 7:12 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-09-14 6:20 [xen-unstable test] 127573: regressions - trouble: broken/fail/pass osstest service owner
2018-09-14 7:12 ` Roger Pau Monné
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.