[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 100755: regressions - FAIL

flight 100755 xen-unstable-smoke real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemuu-debianhvm-i386  6 xen-boot     fail REGR. vs. 100736
 test-amd64-amd64-libvirt      6 xen-boot                 fail REGR. vs. 100736

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  7539772a65b044f326ebf9528bd40e7c6a78c540
baseline version:
 xen                  158dd1bdca161a6456ee6be293969f87ecde3922

Last test of basis   100736  2016-09-02 16:03:32 Z    2 days
Testing same since   100755  2016-09-05 11:01:49 Z    0 days    1 attempts

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  He Chen <he.chen@xxxxxxxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Luwei Kang <luwei.kang@xxxxxxxxx>
  Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
  Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     fail    
 test-amd64-amd64-libvirt                                     fail    

sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at

Explanation of these reports, and of osstest in general, is at

Test harness code can be found at

Not pushing.

commit 7539772a65b044f326ebf9528bd40e7c6a78c540
Author: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
Date:   Mon Sep 5 11:26:04 2016 +0200

    libxl: do not assume Dom0 backend while getting nic info
    Fill backend_domid field based on backend path.
    Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Cc: Wei Liu <wei.liu2@xxxxxxxxxx>
    Signed-off-by: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit b2f2ced591060588a45cdc7881a7335ba42b9cc5
Author: Wei Liu <wei.liu2@xxxxxxxxxx>
Date:   Mon Sep 5 11:36:45 2016 +0100

    tools/firmware: Rename bios.bin to seabios.bin
    bios.bin as a name is far too generic.  Rename it to seabios.bin.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    [ wei: fix up conflict, rerun autogen.sh ]
    Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit eb502cb30cc5af309ed824da024014afca1d0fcf
Author: Wei Liu <wei.liu2@xxxxxxxxxx>
Date:   Mon Sep 5 10:21:28 2016 +0100

    libxl: update flex output files for DSA 3653-2
    We updated flex output files in 4b314c89 ("libxl: update flex output
    files") for DSA 3653-1 / CVE-2016-6354. But Debian security team
    discovered the fix to flex was incomplete and issued DSA 3653-2. We need
    to update our flex output files accordingly.
    Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 5fdea6577098eda065c794c79e1ae23f33f103af
Author: He Chen <he.chen@xxxxxxxxxxxxxxx>
Date:   Mon Sep 5 12:49:43 2016 +0200

    x86: allow disabling sm{e,a}p for Xen itself
    SMEP/SMAP is a security feature to prevent kernel executing/accessing
    user address involuntarily, any such behavior will lead to a page fault.
    SMEP/SMAP is open (in CR4) for both Xen and HVM guest in earlier code.
    SMEP/SMAP bit set in Xen CR4 would enforce security checking for 32-bit
    PV guest which will suffer unknown SMEP/SMAP page fault when guest
    kernel attempt to access user address although SMEP/SMAP is close for
    PV guests.
    This patch introduces a new boot option value "hvm" for "sm{e,a}p", it
    is going to diable SMEP/SMAP for Xen hypervisor while enable them for
    HVM. In this way, 32-bit PV guest will not suffer SMEP/SMAP security
    issue. Users can choose whether open SMEP/SMAP for Xen itself,
    especially when they are going to run 32-bit PV guests.
    Signed-off-by: He Chen <he.chen@xxxxxxxxxxxxxxx>
    [jbeulich: doc and style adjustments]
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 698d0f377d72fdc8d4e247e76b6508090c366187
Author: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
Date:   Mon Sep 5 12:47:46 2016 +0200

    have __DEFINE_COMPAT_HANDLE() generate const versions
    each produce both const and non-const handles,
    does not). This patch has __DEFINE_COMPAT_HANDLE() also
    produce a const handle.
    Suggested-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit af74f65ef19450a89c1cada8214adcc9ea186307
Author: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx>
Date:   Mon Sep 5 12:47:16 2016 +0200

    x86/monitor: include EAX/ECX in CPUID monitor events
    Extend the CPUID monitor event to include EAX and ECX values that were used
    when CPUID was executed. This is useful in identifying which leaf was 
    We also adjust the xen-access output format to more closely resemble the 
    of the Linux cpuid tool's raw format.
    Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx>
    Acked-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit b942c31bc1d40234922be5bee9689fe349e1d835
Author: Luwei Kang <luwei.kang@xxxxxxxxx>
Date:   Mon Sep 5 12:46:13 2016 +0200

    x86/cpuid: AVX-512 feature detection
    AVX512 is an extention of AVX2. Its spec can be found at:
    This patch detects AVX512 features by CPUID.
    Signed-off-by: Luwei Kang <luwei.kang@xxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.