[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.6-testing test] 122923: regressions - FAIL



flight 122923 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122923/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow 16 guest-localmigrate/x10 fail 
REGR. vs. 122753
 test-armhf-armhf-xl-arndale  12 guest-start              fail REGR. vs. 122753
 test-armhf-armhf-xl-xsm      12 guest-start              fail REGR. vs. 122753
 test-armhf-armhf-libvirt-xsm 12 guest-start              fail REGR. vs. 122753

Tests which did not succeed, but are not blocking:
 test-xtf-amd64-amd64-3      50 xtf/test-hvm64-lbr-tsx-vmentry fail like 122699
 test-xtf-amd64-amd64-1      50 xtf/test-hvm64-lbr-tsx-vmentry fail like 122699
 test-xtf-amd64-amd64-2      50 xtf/test-hvm64-lbr-tsx-vmentry fail like 122753
 test-xtf-amd64-amd64-5      50 xtf/test-hvm64-lbr-tsx-vmentry fail like 122753
 test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop             fail like 122753
 test-armhf-armhf-xl-rtds     16 guest-start/debian.repeat    fail  like 122753
 test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stop            fail like 122753
 test-armhf-armhf-libvirt     14 saverestore-support-check    fail  like 122753
 test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop            fail like 122753
 test-armhf-armhf-libvirt-raw 13 saverestore-support-check    fail  like 122753
 test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop             fail like 122753
 test-amd64-i386-xl-qemut-ws16-amd64 17 guest-stop             fail like 122753
 test-xtf-amd64-amd64-2       37 xtf/test-hvm32pae-memop-seg  fail   never pass
 test-xtf-amd64-amd64-2       52 xtf/test-hvm64-memop-seg     fail   never pass
 test-xtf-amd64-amd64-2       76 xtf/test-pv32pae-xsa-194     fail   never pass
 test-xtf-amd64-amd64-3       37 xtf/test-hvm32pae-memop-seg  fail   never pass
 test-xtf-amd64-amd64-3       52 xtf/test-hvm64-memop-seg     fail   never pass
 test-xtf-amd64-amd64-3       76 xtf/test-pv32pae-xsa-194     fail   never pass
 test-xtf-amd64-amd64-5       37 xtf/test-hvm32pae-memop-seg  fail   never pass
 test-xtf-amd64-amd64-4       37 xtf/test-hvm32pae-memop-seg  fail   never pass
 test-xtf-amd64-amd64-5       52 xtf/test-hvm64-memop-seg     fail   never pass
 test-xtf-amd64-amd64-1       37 xtf/test-hvm32pae-memop-seg  fail   never pass
 test-xtf-amd64-amd64-4       52 xtf/test-hvm64-memop-seg     fail   never pass
 test-xtf-amd64-amd64-1       52 xtf/test-hvm64-memop-seg     fail   never pass
 test-xtf-amd64-amd64-5       76 xtf/test-pv32pae-xsa-194     fail   never pass
 test-xtf-amd64-amd64-4       76 xtf/test-pv32pae-xsa-194     fail   never pass
 test-xtf-amd64-amd64-1       76 xtf/test-pv32pae-xsa-194     fail   never pass
 test-amd64-i386-libvirt-xsm  13 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      13 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 13 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     13 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check 
fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 11 migrate-support-check 
fail never pass
 test-amd64-amd64-qemuu-nested-amd 17 debian-hvm-install/l1/l2  fail never pass
 test-armhf-armhf-xl-rtds     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     14 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 13 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 14 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          14 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 13 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 14 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-raw 12 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop             fail never pass
 test-amd64-i386-xl-qemuu-ws16-amd64 17 guest-stop              fail never pass
 test-amd64-amd64-xl-qemut-ws16-amd64 17 guest-stop             fail never pass
 test-armhf-armhf-xl-vhd      12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      13 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-qemut-win10-i386 10 windows-install         fail never pass
 test-amd64-amd64-xl-qemut-win10-i386 10 windows-install        fail never pass
 test-amd64-i386-xl-qemuu-win10-i386 10 windows-install         fail never pass
 test-amd64-amd64-xl-qemuu-win10-i386 10 windows-install        fail never pass

version targeted for testing:
 xen                  12b9fca6046741ffcda9eb3320f47093ed5d9ef0
baseline version:
 xen                  6a74f4e31dc28fb0d5c9e56b54d4b2aaf9b46bbe

Last test of basis   122753  2018-05-13 17:02:45 Z    7 days
Testing same since   122923  2018-05-18 12:07:02 Z    2 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Juergen Gross <jgross@xxxxxxxx>

jobs:
 build-amd64-xsm                                              pass    
 build-armhf-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumprun                                          pass    
 build-i386-rumprun                                           pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-armhf-armhf-libvirt-xsm                                 fail    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-armhf-armhf-xl-xsm                                      fail    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumprun-amd64                               pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  fail    
 test-amd64-amd64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumprun-i386                                 pass    
 test-amd64-amd64-xl-qemut-win10-i386                         fail    
 test-amd64-i386-xl-qemut-win10-i386                          fail    
 test-amd64-amd64-xl-qemuu-win10-i386                         fail    
 test-amd64-i386-xl-qemuu-win10-i386                          fail    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-xl-raw                                       pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              fail    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 12b9fca6046741ffcda9eb3320f47093ed5d9ef0
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Fri May 18 13:32:05 2018 +0200

    xpti: fix bug in double fault handling
    
    When entering the hypervisor via the double fault handler resetting
    xen_cr3 was missing. This led to switching to pv_cr3 when returning
    from the next following exception, so repair this in order to allow
    exception handling to work even after a double fault.
    
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: d80af845de7a4db01a4a3b4d779e0e0dcb5e738b
    master date: 2018-04-23 16:13:01 +0200

commit 916ef0dce5d010942de22a0a9479347ed4fa58d8
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Fri May 18 13:31:33 2018 +0200

    x86/spec_ctrl: Updates to retpoline-safety decision making
    
    All of this is as recommended by the Intel whitepaper:
    
    
https://software.intel.com/sites/default/files/managed/1d/46/Retpoline-A-Branch-Target-Injection-Mitigation.pdf
    
    The 'RSB Alternative' bit in MSR_ARCH_CAPABILITIES may be set by a 
hypervisor
    to indicate that the virtual machine may migrate to a processor which isn't
    retpoline-safe.  Introduce a shortened name (to reduce code volume), treat 
it
    as authorative in retpoline_safe(), and print its value along with the other
    ARCH_CAPS bits.
    
    The exact processor models which do have RSB semantics which fall back to 
BTB
    predictions are enumerated, and include Kabylake and Coffeelake.  Leave a
    printk() in the default case to help identify cases which aren't covered.
    
    The exact microcode versions from Broadwell RSB-safety are taken from the
    referenced microcode update file (adjusting for the known-bad microcode
    versions).  Despite the exact wording of the text, it is only Broadwell
    processors which need a microcode check.
    
    In practice, this means that all Broadwell hardware with up-to-date 
microcode
    will use retpoline in preference to IBRS, which will be a performance
    improvement for desktop and server systems which would previously always opt
    for IBRS over retpoline.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    x86/spec_ctrl: Fix typo in ARCH_CAPS decode
    
    Reported-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: 1232378bd2fef45f613db049b33852fdf84d7ddf
    master date: 2018-04-19 17:28:23 +0100
    master commit: 27170adb54a558e11defcd51989326a9beb95afe
    master date: 2018-04-24 13:34:12 +0100

commit 055abe41980b429eca9a899701f8327def937206
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Fri May 18 13:31:01 2018 +0200

    x86/msr: Correct the emulation behaviour of MSR_PRED_CMD
    
    Experimentally, the behaviour of reserved bits in MSR_PRED_CMD changed 
between
    beta and production microcode, and now raises a #GP fault for set reserved
    bits.  The AMD spec for future hardware also specifies this behaviour, and 
it
    is the more sensible behaviour to implement.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    x86/msr: further correct the emulation behaviour of MSR_PRED_CMD
    
    Following commit a6aa678fa3 ("x86/msr: Correct the emulation behaviour
    of MSR_PRED_CMD") we may end up writing the low bit with the wrong
    value. While it's unlikely for a guest to want to write zero there, we
    should still permit (this without incurring the overhead of an actual
    barrier). Correcting this right away will also help whenever further
    bits in the MSR might become defined.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: a6aa678fa380e9369cc44701a181142322b3a4b0
    master date: 2018-04-16 13:18:19 +0100
    master commit: a996273d1fc10d14598985703227bfa35a91f681
    master date: 2018-04-18 11:16:37 +0200

commit c4333f586f8595c6afdf7ec4a1847443dbb5c55b
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri May 18 13:30:30 2018 +0200

    x86: suppress BTI mitigations around S3 suspend/resume
    
    NMI and #MC can occur at any time after S3 resume, yet the MSR_SPEC_CTRL
    may become available only once we're reloaded microcode. Make
    SPEC_CTRL_ENTRY_FROM_INTR_IST and DO_SPEC_CTRL_EXIT_TO_XEN no-ops for
    the critical period of time.
    
    Also set the MSR back to its intended value.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    
    x86: Use spec_ctrl_{enter,exit}_idle() in the S3/S5 path
    
    The main purpose of this patch is to avoid opencoding the recovery logic at
    the end, but also has the positive side effect of relaxing the SPEC_CTRL
    mitigations when working to shut the final CPU down.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: 710a8ebf2bc111a34bba04d1c85b6d07ed3d9389
    master date: 2018-04-16 14:09:55 +0200
    master commit: ef3ab46493f650b7e5cca2b2578a99ca0cbff195
    master date: 2018-04-19 10:55:59 +0100

commit 3d6970d3f504e26bacb820f678ff52770e2826e1
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri May 18 13:30:05 2018 +0200

    x86: correct ordering of operations during S3 resume
    
    Microcode loading needs to happen before re-enabling interrupts, in case
    only updated microcode allows the use of e.g. the SPEC_{CTRL,CMD} MSRs.
    Otoh it doesn't need to happen at all when we didn't suspend in the
    first place. It needs to happen before spin_debug_enable() though, as it
    acquires a lock and hence would otherwise make
    common/spinlock.c:check_lock() unhappy. As micrcode loading can be
    pretty verbose, also make sure it only runs after console_end_sync().
    
    cpufreq_add_cpu() doesn't need calling on the only "goto enable_cpu"
    path, which sits ahead of cpufreq_del_cpu().
    
    Reported-by: Simon Gaiser <simon@xxxxxxxxxxxxxxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: cb2a4a449dfd50af309a333aa805835015fbc8c8
    master date: 2018-04-16 14:08:30 +0200

commit a0db1f211f4970066d5544f7408d8cbdb3a302a0
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Fri May 18 13:26:15 2018 +0200

    x86/pv: Protect multicalls against Spectre v2 - Branch Target Injection
    
    This is a missing adjustment in c/s 88602190f69 "x86: Support indirect 
thunks
    from assembly code".
    
    This is part of XSA-254.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.