[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [xen-unstable-smoke test] 171511: regressions - FAIL


  • To: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
  • From: Luca Fancellu <Luca.Fancellu@xxxxxxx>
  • Date: Wed, 6 Jul 2022 08:50:18 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=CurvSqp5cNyRqwFe+syBbBLuj4xpK6gdCm7CiBgIV6k=; b=ekQT0FJQndR2ZXmqibn0DsmKjz2+AV1Iyre21qE0x0woPjycA7cr6md560qyIFTG8jjPA918SRnJSJDnXC+aG0gt2NrCJA2hdagHiiP1i72RR+btgxu912X7CFJ7pmnLzR+iSh1iCTvZIEz84BVHCDKHZfpwsPG0fv/PAm6b/jBYb3rEeHz1MF+XUBZaqTMzGHhDIElxHWkxE3dlJOqE/t5UTiQuu67ttmGWbNyScQqKqKFyPVrfVZMKu/iU/A1p+AxIjheMy+M3Z6s9xC/53v1UUA++BksuRDjM3LlaaCmoVP07O0hfL/9I6KlDok5t4zbCze3XhZ3xsa1CSwNmTA==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=CurvSqp5cNyRqwFe+syBbBLuj4xpK6gdCm7CiBgIV6k=; b=H4kGDsAv+bWOuG64nhgxE//siosLAGezLeR8yKod5SsoCb5CrRaRAX2Kq0m7Am5o4LmnTf4VBD6v8P2nZGzCRUAnxqnLoGC3QjZosKfWXKXnCyxd92TJBBSWYZcshJQ8h9hwkU+jg6uSECQgnObQXAZHoaoYl1adCyWThleEGvATjdw/oJCOf6n+LzMAjw3RWLOYDMIHbxNcQLJ8532d6SkDyeQrIXW/HyCQvv2Nqh65cR0lgFmKDbWDP+XdnfT6/keB+tPxpsIoqKNZbpw3d0ehSq4qxu4t5CHbA5GA7F91fMjC4Nd8qTIyUsi0kO3UQ8JOhcz2WVBMhfnhytEQ+w==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=TzKYarNmkO80RB7iuGwuu9IpKed2ezndcKtdYJaQWMiR7MxJdV+W5Sezph1ZhlRI/ZO4/ETefQefRv904kLPvZEoKJ14jQMG32J15t+DNA4xktrTUtAp5GRCFDxPua/eAoqgKJVZZwybwendM2p9/tM2PKh2Vq7PIFlNhji4XVvCYK0oB37n8jmtCpENAXGsFb9cSvMgetH7UhE7Ct3UzW365oD2Jkun7iACpiJ6FTZS1OyCLQja01eZSKbcW3V28Wo56krPTPVBdLNuxe4vnFa3BIAvyxBuyqfp0mkVidIb3ll/dx3NDdhpAXM8lBvq9is4fSC0DDBQ33KcNKUkIA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cTrVSXOevZaAxRdjZomablstJ8xmoZ4esFzndXchSXwVNizMe13sLTHl5BVfdTtBRj3R4/1PPzgEX2wpmAUCJJjCxtqOfSOvBy9YK4/fFkdCf27SIFeKlM7PLapJrVkvn1oHnGrnTfrDNyrryQzqdB5PKzBQ5qcHpoDKuJFATBJyUecuE5CEWzlViwvxP+fgzesccUoSELlj+0dDMYgT6BMvI5HtIw/kjKYUnm54v8Z2wxWlW7u/N1t8sDp20E9Vyv7hzhWCQexVuZ3dlEhzP7xRxwfBdtT4Va3eWSS6m2TPn1M3chVWC7/T1lVuDKrUM1lpkW52Z6zD8cbIoDfeLQ==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Julien Grall <julien@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, osstest service owner <osstest-admin@xxxxxxxxxxxxxx>
  • Delivery-date: Wed, 06 Jul 2022 08:50:39 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHYkQ2ayCyruiBcx0aaLuSnIAU1TK1w/DyAgAAMfAA=
  • Thread-topic: [xen-unstable-smoke test] 171511: regressions - FAIL


> On 6 Jul 2022, at 09:05, Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx> 
> wrote:
> 
> On Wed, Jul 06, 2022 at 08:53:49AM +0100, Julien Grall wrote:
>> Hi Jan,
>> 
>> On 06/07/2022 07:44, Jan Beulich wrote:
>>> On 06.07.2022 05:39, osstest service owner wrote:
>>>> flight 171511 xen-unstable-smoke real [real]
>>>> flight 171517 xen-unstable-smoke real-retest [real]
>>>> http://logs.test-lab.xenproject.org/osstest/logs/171511/
>>>> http://logs.test-lab.xenproject.org/osstest/logs/171517/
>>>> 
>>>> Regressions :-(
>>>> 
>>>> Tests which did not succeed and are blocking,
>>>> including tests which could not be run:
>>>> test-arm64-arm64-xl-xsm 8 xen-boot fail REGR. vs. 171486
>>> 
>>> Looking at what's under test, I guess ...
>>> 
>>>> commit 8d410ac2c178e1dd1001cadddbe9ca75a9738c95
>>>> Author: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
>>>> Date: Tue Jul 5 13:10:46 2022 +0200
>>>> 
>>>> EFI: preserve the System Resource Table for dom0
>>>> The EFI System Resource Table (ESRT) is necessary for fwupd to identify
>>>> firmware updates to install. According to the UEFI specification §23.4,
>>>> the ESRT shall be stored in memory of type EfiBootServicesData. However,
>>>> memory of type EfiBootServicesData is considered general-purpose memory
>>>> by Xen, so the ESRT needs to be moved somewhere where Xen will not
>>>> overwrite it. Copy the ESRT to memory of type EfiRuntimeServicesData,
>>>> which Xen will not reuse. dom0 can use the ESRT if (and only if) it is
>>>> in memory of type EfiRuntimeServicesData.
>>>> Earlier versions of this patch reserved the memory in which the ESRT was
>>>> located. This created awkward alignment problems, and required either
>>>> splitting the E820 table or wasting memory. It also would have required
>>>> a new platform op for dom0 to use to indicate if the ESRT is reserved.
>>>> By copying the ESRT into EfiRuntimeServicesData memory, the E820 table
>>>> does not need to be modified, and dom0 can just check the type of the
>>>> memory region containing the ESRT. The copy is only done if the ESRT is
>>>> not already in EfiRuntimeServicesData memory, avoiding memory leaks on
>>>> repeated kexec.
>>>> See https://lore.kernel.org/xen-devel/20200818184018.GN1679@mail-itl/T/
>>>> for details.
>>>> Signed-off-by: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
>>>> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
>>> 
>>> ... this is the most likely candidate, considering in the log all we
>>> see is:
>>> 
>>> Xen 4.17-unstable (c/s Mon Jun 27 15:15:39 2022 +0200 git:61ff273322-dirty) 
>>> EFI loader
>>> Jul 5 23:09:15.692859 Using configuration file 'xen.cfg'
>>> Jul 5 23:09:15.704878 vmlinuz: 0x00000083fb1ac000-0x00000083fc880a00
>>> Jul 5 23:09:15.704931 initrd.gz: 0x00000083f94b7000-0x00000083fb1ab6e8
>>> Jul 5 23:09:15.836836 xenpolicy: 0x00000083f94b4000-0x00000083f94b6a5f
>>> Jul 5 23:09:15.980866 Using bootargs from Xen configuration file.
>>> 
>>> But I guess we'll want to wait for the bi-sector to give us a more
>>> solid indication ...
>> 
>> I have tested a Xen with and without this patch this morning and can EFI. I
>> haven't looked into details yet why.
>> 
>> Can we consider to revert it?
> 
> I'm fine with reverting it for now, but I would like to know what the
> bug was. Does a Xen with this patch boot okay on x86? If so, could it
> be temporarily turned off on ARM until the problem can be tracked down?

I can test it with an arm64 machine, I will try it now, will let you know.

Cheers,
Luca

> -- 
> Sincerely,
> Demi Marie Obenour (she/her/hers)
> Invisible Things Lab


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.