[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.5-testing baseline-only test] 67706: tolerable FAIL
This run is configured for baseline tests only. flight 67706 xen-4.5-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67706/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1 fail like 67683 test-amd64-amd64-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail like 67683 test-amd64-amd64-xl-rtds 6 xen-boot fail like 67683 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 67683 test-amd64-amd64-xl-qemut-winxpsp3 9 windows-install fail like 67683 test-amd64-amd64-amd64-pvgrub 10 guest-start fail like 67683 Tests which did not succeed, but are not blocking: test-amd64-i386-rumprun-i386 1 build-check(1) blocked n/a test-amd64-amd64-rumprun-amd64 1 build-check(1) blocked n/a build-i386-rumprun 5 rumprun-build fail never pass test-armhf-armhf-xl-credit2 12 migrate-support-check fail never pass test-armhf-armhf-xl-credit2 13 saverestore-support-check fail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-check fail never pass test-armhf-armhf-xl-multivcpu 13 saverestore-support-check fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-xtf-amd64-amd64-2 19 xtf/test-hvm32-invlpg~shadow fail never pass test-xtf-amd64-amd64-2 26 xtf/test-hvm32pae-invlpg~shadow fail never pass test-xtf-amd64-amd64-2 34 xtf/test-hvm64-invlpg~shadow fail never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-armhf-armhf-xl-midway 12 migrate-support-check fail never pass test-armhf-armhf-xl-midway 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt-qcow2 10 guest-start fail never pass test-xtf-amd64-amd64-4 19 xtf/test-hvm32-invlpg~shadow fail never pass test-xtf-amd64-amd64-4 26 xtf/test-hvm32pae-invlpg~shadow fail never pass test-xtf-amd64-amd64-4 34 xtf/test-hvm64-invlpg~shadow fail never pass test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass test-armhf-armhf-xl-rtds 12 migrate-support-check fail never pass test-armhf-armhf-xl-rtds 13 saverestore-support-check fail never pass test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-armhf-armhf-libvirt 14 guest-saverestore fail never pass test-armhf-armhf-xl-vhd 10 guest-start fail never pass test-armhf-armhf-libvirt-raw 10 guest-start fail never pass test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2 fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail never pass build-amd64-rumprun 5 rumprun-build fail never pass test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail never pass version targeted for testing: xen c18dfbb88670e9f2cabd93bbb32f661b71ffb73a baseline version: xen 433ebca120e8750eb8085745ccac703e47358e6f Last test of basis 67683 2016-09-09 14:16:04 Z 4 days Testing same since 67706 2016-09-13 20:15:55 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: "Rockosov, Dmitry" <dmitry.rockosov@xxxxxxxxx> Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Tim Deegan <tim@xxxxxxx> jobs: build-amd64-xtf pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-prev pass build-i386-prev pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumprun fail build-i386-rumprun fail test-xtf-amd64-amd64-1 pass test-xtf-amd64-amd64-2 pass test-xtf-amd64-amd64-3 pass test-xtf-amd64-amd64-4 pass test-xtf-amd64-amd64-5 pass test-amd64-amd64-xl pass test-armhf-armhf-xl pass test-amd64-i386-xl pass test-amd64-amd64-qemuu-nested-amd fail test-amd64-amd64-xl-pvh-amd fail test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumprun-amd64 blocked test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumprun-i386 blocked test-amd64-amd64-qemuu-nested-intel fail test-amd64-amd64-xl-pvh-intel fail test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt fail test-amd64-i386-libvirt pass test-armhf-armhf-xl-midway pass test-amd64-amd64-migrupgrade pass test-amd64-i386-migrupgrade pass test-amd64-amd64-xl-multivcpu pass test-armhf-armhf-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair pass test-amd64-amd64-amd64-pvgrub fail test-amd64-amd64-i386-pvgrub pass test-amd64-amd64-pygrub pass test-armhf-armhf-libvirt-qcow2 fail test-amd64-amd64-xl-qcow2 pass test-armhf-armhf-libvirt-raw fail test-amd64-i386-xl-raw pass test-amd64-amd64-xl-rtds fail test-armhf-armhf-xl-rtds pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-i386-xl-qemut-winxpsp3 pass test-amd64-amd64-xl-qemuu-winxpsp3 pass test-amd64-i386-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xs.citrite.net/~osstest/testlogs/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Push not applicable. ------------------------------------------------------------ commit c18dfbb88670e9f2cabd93bbb32f661b71ffb73a Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Sep 12 17:50:13 2016 +0200 Revert "x86/hvm: Perform a user instruction fetch for a FEP in userspace" This reverts commit 95559492c958e45fa7c01b1b3e0fb704e5b8b9eb, which doesn't build and would, in its current form, use uninitialized data if it did. commit 9edce7c42e6c2e8dd19788cab688cb46f779a9ec Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Sep 12 16:05:09 2016 +0200 x86/segment: Bounds check accesses to emulation ctxt->seg_reg[] HVM HAP codepaths have space for all segment registers in the seg_reg[] cache (with x86_seg_none still risking an array overrun), while the shadow codepaths only have space for the user segments. Range check the input segment of *_get_seg_reg() against the size of the array used to cache the results, to avoid overruns in the case that the callers don't filter their input suitably. Subsume the is_x86_user_segment(seg) checks from the shadow code, which were an incomplete attempt at range checking, and are now superceeded. Make hvm_get_seg_reg() static, as it is not used outside of shadow/common.c No functional change, but far easier to reason that no overflow is possible. Reported-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> xen/x86: Fix build with clang following c/s 4fa0105 https://travis-ci.org/xen-project/xen/jobs/158494027#L2344 Clang complains: emulate.c:2016:14: error: comparison of unsigned enum expression < 0 is always false [-Werror,-Wtautological-compare] if ( seg < 0 || seg >= ARRAY_SIZE(hvmemul_ctxt->seg_reg) ) ~~~ ^ ~ Clang is wrong to raise a warning like this. The signed-ness of an enum is implementation defined in C, and robust code must not assume the choices made by the compiler. In this case, dropping the < 0 check creates a latent bug which would result in an array underflow when compiled with a compiler which chooses a signed enum. Work around the bug by explicitly pulling seg into an unsigned integer, and only perform the upper bounds check. No functional change. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx> master commit: 4fa0105d95be6e7145a1f6fd1036ccd43976228c master date: 2016-09-08 16:39:46 +0100 master commit: 4c47c47938ea24c73d9459f9f0b6923513772b5d master date: 2016-09-09 15:31:01 +0100 commit 95559492c958e45fa7c01b1b3e0fb704e5b8b9eb Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Sep 12 16:04:35 2016 +0200 x86/hvm: Perform a user instruction fetch for a FEP in userspace This matches hardware behaviour, and prevents erroneous failures when a guest has SMEP/SMAP active and issues a FEP from userspace. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: 0831e99446121636045cf6f616a1991d6ef22071 master date: 2016-09-08 16:39:46 +0100 commit 57e7172bb92888c300c19b51a5bb8a838f45f41e Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Sep 12 16:04:08 2016 +0200 hvm/fep: Allow testing of instructions crossing the -1 -> 0 virtual boundary The Force Emulation Prefix is named to follow its PV counterpart for cpuid or rdtsc, but isn't really an instruction prefix. It behaves as a break-out into Xen, with the purpose of emulating the next instruction in the current state. It is important to be able to test legal situations which occur in real hardware, including instruction which cross certain boundaries, and instructions starting at 0. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: 7b5cee79dad24e7006059667b02bd7de685d8ee5 master date: 2016-09-08 16:39:46 +0100 commit 11c0462417051f56be0537c8cbf5973b2c648c2a Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Sep 12 16:03:27 2016 +0200 VMX: correct feature checks for MPX Its VMCS field isn't tied to the respective base CPU feature flag but instead to a VMX specific one. Note that while the VMCS GUEST_BNDCFGS field exists if either of the two respective features is available, MPX continues to get exposed to guests only with both features present. Also add the so far missing handling of - GUEST_BNDCFGS in construct_vmcs() - MSR_IA32_BNDCFGS in vmx_msr_{read,write}_intercept() and mirror the extra correctness checks during MSR write to vmx_load_msr(). Reported-by: "Rockosov, Dmitry" <dmitry.rockosov@xxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Tested-by: "Rockosov, Dmitry" <dmitry.rockosov@xxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> master commit: 68eb1a4d92be58e26bd11d02b8e0317bd56294ac master date: 2016-09-07 12:34:43 +0200 (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |