[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.4-testing test] 29819: regressions - FAIL



flight 29819 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/29819/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf                   5 xen-build                 fail REGR. vs. 29622
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-localmigrate/x10 fail REGR. vs. 
29622
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 13 guest-localmigrate/x10 fail REGR. 
vs. 29622
 test-amd64-i386-freebsd10-amd64 14 guest-localmigrate/x10 fail REGR. vs. 29622
 build-armhf-pvops             5 kernel-build              fail REGR. vs. 29622
 test-amd64-amd64-xl-qemut-debianhvm-amd64 13 guest-localmigrate/x10 fail REGR. 
vs. 29622
 test-amd64-amd64-xl-qemuu-ovmf-amd64 13 guest-localmigrate/x10 fail REGR. vs. 
29622
 test-amd64-i386-xl-win7-amd64 13 guest-localmigrate/x10   fail REGR. vs. 29622
 test-amd64-amd64-xl-win7-amd64 13 guest-localmigrate/x10  fail REGR. vs. 29622
 test-amd64-i386-freebsd10-i386 18 leak-check/check fail in 29754 REGR. vs. 
29622
 test-amd64-i386-xl-qemuu-ovmf-amd64 13 guest-localmigrate/x10 fail in 29754 
REGR. vs. 29622
 test-amd64-amd64-xl-winxpsp3 13 guest-localmigrate/x10 fail in 29754 REGR. vs. 
29622
 test-amd64-i386-xl-qemut-debianhvm-amd64 17 leak-check/check fail in 29697 
REGR. vs. 29622
 test-amd64-i386-xl-qemuu-win7-amd64 13 guest-localmigrate/x10 fail in 29697 
REGR. vs. 29622
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-localmigrate/x10 fail in 29773 
REGR. vs. 29622

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-sedf     19 leak-check/check            fail pass in 29754
 test-amd64-i386-freebsd10-i386 14 guest-localmigrate/x10    fail pass in 29754
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-localmigrate/x10 fail pass in 29754
 test-amd64-amd64-xl          19 leak-check/check            fail pass in 29773
 test-amd64-i386-xl-qemuu-ovmf-amd64 10 guest-localmigrate   fail pass in 29773
 test-amd64-i386-xl-qemuu-debianhvm-amd64 13 guest-localmigrate/x10 fail pass 
in 29754
 test-amd64-i386-xl-qemut-debianhvm-amd64 13 guest-localmigrate/x10 fail pass 
in 29800
 test-amd64-i386-xl-qemuu-win7-amd64 12 guest-localmigrate.2 fail pass in 29697
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-localmigrate/x10 fail pass in 
29686
 test-amd64-i386-xl-winxpsp3-vcpus1 10 guest-localmigrate    fail pass in 29773
 test-amd64-amd64-xl-winxpsp3 10 guest-localmigrate          fail pass in 29800
 test-amd64-i386-xl-multivcpu 19 leak-check/check   fail in 29754 pass in 29819
 test-amd64-amd64-xl-sedf-pin 19 leak-check/check   fail in 29754 pass in 29819
 test-amd64-i386-xl-qemuu-debianhvm-amd64 17 leak-check/check fail in 29754 
pass in 29697
 test-amd64-i386-xl-qemuu-win7-amd64 10 guest-localmigrate fail in 29754 pass 
in 29819
 test-amd64-amd64-xl-qemuu-win7-amd64 10 guest-localmigrate fail in 29754 pass 
in 29819
 test-amd64-i386-xl-credit2   19 leak-check/check   fail in 29697 pass in 29819
 test-amd64-amd64-xl-sedf     11 guest-saverestore  fail in 29697 pass in 29819
 test-amd64-i386-xl           19 leak-check/check   fail in 29697 pass in 29819
 test-amd64-amd64-xl-qemuu-ovmf-amd64 10 guest-localmigrate fail in 29697 pass 
in 29819
 test-amd64-amd64-xl-win7-amd64 10 guest-localmigrate fail in 29697 pass in 
29819
 test-amd64-amd64-xl-winxpsp3 12 guest-localmigrate.2 fail in 29697 pass in 
29754
 test-amd64-amd64-xl-qemuu-win7-amd64 12 guest-localmigrate.2 fail in 29773 
pass in 29819
 test-amd64-i386-pair  21 leak-check/check/dst_host fail in 29686 pass in 29819
 test-amd64-amd64-xl-qemuu-ovmf-amd64 12 guest-localmigrate.2 fail in 29686 
pass in 29819

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-rumpuserxen-amd64  1 build-check(1)               blocked n/a
 test-amd64-i386-rumpuserxen-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       9 guest-start                  fail   never pass
 test-amd64-amd64-libvirt      9 guest-start                  fail   never pass
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 build-i386-rumpuserxen        6 xen-build                    fail   never pass
 build-armhf-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-i386-xend-qemut-winxpsp3 17 leak-check/check        fail never pass
 build-amd64-rumpuserxen       6 xen-build                    fail   never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop              fail never pass
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop               fail never pass
 test-amd64-i386-xend-winxpsp3 17 leak-check/check             fail  never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop         fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop      fail in 29754 never pass
 test-armhf-armhf-xl          10 migrate-support-check fail in 29697 never pass
 test-armhf-armhf-libvirt      9 guest-start           fail in 29697 never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop    fail in 29686 never pass

version targeted for testing:
 xen                  7c5264902663da247d12a58c9177a969a984f884
baseline version:
 xen                  0f3cdfc4d7fa1e3dc93cc6153782872d90f25b53

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Julien Grall <julien.grall@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64-xend                                             pass    
 build-i386-xend                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  fail    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          blocked 
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            fail    
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      fail    
 build-i386-rumpuserxen                                       fail    
 test-amd64-amd64-xl                                          fail    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    fail    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     fail    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    fail    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     fail    
 test-amd64-i386-freebsd10-amd64                              fail    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         fail    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          fail    
 test-amd64-amd64-rumpuserxen-amd64                           blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-i386-freebsd10-i386                               fail    
 test-amd64-i386-rumpuserxen-i386                             blocked 
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     fail    
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 7c5264902663da247d12a58c9177a969a984f884
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Tue Aug 12 15:51:52 2014 +0200

    x86/cpu: undo BIOS CPUID max_leaf limit before querying for features
    
    If IA32_MISC_ENABLE[22] is set by the BIOS, CPUID.0.EAX will be limited to 
3.
    Lift this limit before considering whether to query CPUID.7[ECX=0].EBX for
    features.
    
    Without this change, dom0 is able to see this feature leaf (as the limit was
    subsequently lifted), and will set features appropriately in HVM domain 
cpuid
    policies.
    
    The specific bug XenServer observed was the advertisement of the FSGSBASE
    feature, but an inability to set CR4.FSGSBASE as Xen considered the bit to 
be
    reserved as cpu_has_fsgsbase incorrectly evaluated as false.
    
    This is a regression introduced by c/s 44e24f8567 "x86: don't call
    generic_identify() redundantly" where the redundant call actually resampled
    CPUID.7[ECX=0] properly to obtain the feature flags.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: a1ac4cf52e38386bac7ac3440c7da0099662ca5c
    master date: 2014-07-29 17:02:25 +0200

commit 0ddedcb8748f6db39f1825d5b2bb7d09fdabbaf2
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Aug 12 15:50:13 2014 +0200

    xen: arm: Correctly handle do_sysreg exception injection from 64-bit 
userspace
    
    The do_sysreg case was missing a return, so it would increment PC and
    inject the trap to the second instruction of the handler.
    
    This is CVE-2014-5148 / XSA-103.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>
    master commit: f2ae8bfa498831ee6343d672066b898d3cd73892
    master date: 2014-08-12 15:38:01 +0200

commit 61460b58192786b206d96cf8d3cb188c364266a6
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Aug 12 15:49:14 2014 +0200

    xen: arm: Handle traps from 32-bit userspace on 64-bit kernel as undef
    
    We are not setup to handle these properly. This turns a host crash
    into a trap to the guest kernel which will likely result in killing
    the offending process.
    
    This is part of CVE-2014-5147 / XSA-102.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>
    master commit: c0020e0997024eb741d60de9a480bf2878f891af
    master date: 2014-08-12 15:37:25 +0200

commit 935d51859a92b1fb88f1fa1bf596782bdf4a80ca
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Aug 12 15:48:28 2014 +0200

    xen: arm: Correctly handle exception injection from userspace on 64-bit.
    
    Firstly we must be prepared to propagate traps from 32-bit userspace even 
for
    64-bit guests, so wrap the existing inject_undef??_exception into
    inject_undef_exception and use that when injecting an undef exception. The
    various other exception cases (aborts etc) already do this.
    
    Secondly when injecting the trap we must pick the correct exception vector
    depending on whether the source of the trap was 32-bit EL0, 64-bit EL0 or 
EL1.
    
    This is part of CVE-2014-5147 / XSA-102.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>
    master commit: a98669781769e821413dfef4ef99b93171375610
    master date: 2014-08-12 15:36:15 +0200

commit 99a9f497cb070ba7168d45442ad8ea3604d95dcb
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Tue Aug 12 15:45:49 2014 +0200

    xen: arm: handle AArch32 userspace when dumping 64-bit guest state.
    
    A 64-bit guest can still be in 32-bit mode when running userspace,
    handle this case by dumping the correct 32-bit state.
    
    Note that on ARM it is not possible to change mode without the help
    of the next exception level, hence there is no way a 64-bit guest can
    be running in 32-bit kernel modes.
    
    This is part of CVE-2014-5147 / XSA-102.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxxxxx>
    master commit: fc0cafeab30fe93963457fafbad7a01c7f55ea5f
    master date: 2014-08-12 15:32:27 +0200

commit 89f167e04ed89109c06092b8edf46c1519cab5f3
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Aug 12 15:44:26 2014 +0200

    x86/paging: make log-dirty operations preemptible
    
    Both the freeing and the inspection of the bitmap get done in (nested)
    loops which - besides having a rather high iteration count in general,
    albeit that would be covered by XSA-77 - have the number of non-trivial
    iterations they need to perform (indirectly) controllable by both the
    guest they are for and any domain controlling the guest (including the
    one running qemu for it).
    
    This is CVE-2014-5146 / XSA-97.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Tim Deegan <tim@xxxxxxx>
    master commit: 95e6d82224689fdfd967a093a4d69efc24c17e91
    master date: 2014-08-12 15:30:11 +0200
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.