[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.5-testing test] 100897: regressions - FAIL



flight 100897 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100897/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 
100828
 test-amd64-amd64-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs. 
100828

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds      6 xen-boot                     fail  like 100828
 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop            fail like 100828
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop             fail like 100828
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop             fail like 100828
 test-armhf-armhf-xl-rtds     15 guest-start/debian.repeat    fail  like 100828

Tests which did not succeed, but are not blocking:
 test-amd64-i386-rumprun-i386  1 build-check(1)               blocked  n/a
 test-amd64-amd64-rumprun-amd64  1 build-check(1)               blocked  n/a
 build-i386-rumprun            5 rumprun-build                fail   never pass
 build-amd64-rumprun           5 rumprun-build                fail   never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 13 saverestore-support-check    fail  never pass
 test-armhf-armhf-libvirt     12 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     14 guest-saverestore            fail   never pass
 test-armhf-armhf-libvirt-qcow2 10 guest-start                  fail never pass
 test-armhf-armhf-xl-arndale  12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 10 guest-start                  fail   never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 saverestore-support-check    fail   never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start                  fail   never pass
 test-armhf-armhf-xl-vhd      10 guest-start                  fail   never pass
 test-amd64-amd64-xl-pvh-intel 11 guest-start                  fail  never pass
 test-armhf-armhf-xl-cubietruck 12 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 13 saverestore-support-check    fail never pass
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-check        fail   never pass
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-armhf-armhf-xl-rtds     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     13 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  9edce7c42e6c2e8dd19788cab688cb46f779a9ec
baseline version:
 xen                  433ebca120e8750eb8085745ccac703e47358e6f

Last test of basis   100828  2016-09-08 21:42:35 Z    4 days
Testing same since   100897  2016-09-12 14:42:24 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  "Rockosov, Dmitry" <dmitry.rockosov@xxxxxxxxx>
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Tim Deegan <tim@xxxxxxx>

jobs:
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumprun                                          fail    
 build-i386-rumprun                                           fail    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvh-amd                                  fail    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumprun-amd64                               blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumprun-i386                                 blocked 
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvh-intel                                fail    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     fail    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                fail    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 pass    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               fail    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-armhf-armhf-libvirt-raw                                 fail    
 test-amd64-i386-xl-raw                                       pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     fail    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     pass    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-armhf-armhf-xl-vhd                                      fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           pass    
 test-amd64-i386-xl-qemut-winxpsp3                            pass    
 test-amd64-amd64-xl-qemuu-winxpsp3                           pass    
 test-amd64-i386-xl-qemuu-winxpsp3                            pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 9edce7c42e6c2e8dd19788cab688cb46f779a9ec
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Sep 12 16:05:09 2016 +0200

    x86/segment: Bounds check accesses to emulation ctxt->seg_reg[]
    
    HVM HAP codepaths have space for all segment registers in the seg_reg[]
    cache (with x86_seg_none still risking an array overrun), while the shadow
    codepaths only have space for the user segments.
    
    Range check the input segment of *_get_seg_reg() against the size of the 
array
    used to cache the results, to avoid overruns in the case that the callers
    don't filter their input suitably.
    
    Subsume the is_x86_user_segment(seg) checks from the shadow code, which were
    an incomplete attempt at range checking, and are now superceeded.  Make
    hvm_get_seg_reg() static, as it is not used outside of shadow/common.c
    
    No functional change, but far easier to reason that no overflow is possible.
    
    Reported-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    xen/x86: Fix build with clang following c/s 4fa0105
    
    https://travis-ci.org/xen-project/xen/jobs/158494027#L2344
    
    Clang complains:
    
      emulate.c:2016:14: error: comparison of unsigned enum expression < 0
      is always false [-Werror,-Wtautological-compare]
          if ( seg < 0 || seg >= ARRAY_SIZE(hvmemul_ctxt->seg_reg) )
               ~~~ ^ ~
    
    Clang is wrong to raise a warning like this.  The signed-ness of an enum is
    implementation defined in C, and robust code must not assume the choices 
made
    by the compiler.
    
    In this case, dropping the < 0 check creates a latent bug which would result
    in an array underflow when compiled with a compiler which chooses a signed
    enum.
    
    Work around the bug by explicitly pulling seg into an unsigned integer, and
    only perform the upper bounds check.
    
    No functional change.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    master commit: 4fa0105d95be6e7145a1f6fd1036ccd43976228c
    master date: 2016-09-08 16:39:46 +0100
    master commit: 4c47c47938ea24c73d9459f9f0b6923513772b5d
    master date: 2016-09-09 15:31:01 +0100

commit 95559492c958e45fa7c01b1b3e0fb704e5b8b9eb
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Sep 12 16:04:35 2016 +0200

    x86/hvm: Perform a user instruction fetch for a FEP in userspace
    
    This matches hardware behaviour, and prevents erroneous failures when a 
guest
    has SMEP/SMAP active and issues a FEP from userspace.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: 0831e99446121636045cf6f616a1991d6ef22071
    master date: 2016-09-08 16:39:46 +0100

commit 57e7172bb92888c300c19b51a5bb8a838f45f41e
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Sep 12 16:04:08 2016 +0200

    hvm/fep: Allow testing of instructions crossing the -1 -> 0 virtual boundary
    
    The Force Emulation Prefix is named to follow its PV counterpart for cpuid 
or
    rdtsc, but isn't really an instruction prefix.  It behaves as a break-out 
into
    Xen, with the purpose of emulating the next instruction in the current 
state.
    
    It is important to be able to test legal situations which occur in real
    hardware, including instruction which cross certain boundaries, and
    instructions starting at 0.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: 7b5cee79dad24e7006059667b02bd7de685d8ee5
    master date: 2016-09-08 16:39:46 +0100

commit 11c0462417051f56be0537c8cbf5973b2c648c2a
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Sep 12 16:03:27 2016 +0200

    VMX: correct feature checks for MPX
    
    Its VMCS field isn't tied to the respective base CPU feature flag but
    instead to a VMX specific one.
    
    Note that while the VMCS GUEST_BNDCFGS field exists if either of the
    two respective features is available, MPX continues to get exposed to
    guests only with both features present.
    
    Also add the so far missing handling of
    - GUEST_BNDCFGS in construct_vmcs()
    - MSR_IA32_BNDCFGS in vmx_msr_{read,write}_intercept()
    and mirror the extra correctness checks during MSR write to
    vmx_load_msr().
    
    Reported-by: "Rockosov, Dmitry" <dmitry.rockosov@xxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Tested-by: "Rockosov, Dmitry" <dmitry.rockosov@xxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 68eb1a4d92be58e26bd11d02b8e0317bd56294ac
    master date: 2016-09-07 12:34:43 +0200
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.