From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andrew Cooper Subject: Re: [xen-4.4-testing test] 30367: regressions - FAIL Date: Wed, 24 Sep 2014 10:21:54 +0100 Message-ID: <54228D32.2060803@citrix.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: "xen.org" , xen-devel@lists.xensource.com List-Id: xen-devel@lists.xenproject.org On 24/09/14 08:20, xen.org wrote: > flight 30367 xen-4.4-testing real [real] > http://www.chiark.greenend.org.uk/~xensrcts/logs/30367/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-amd64-xl-win7-amd64 7 windows-install fail REGR. vs. 30239 Can we just nuke this test? It has never worked reliably, and now only serves to delay movement from staging-4.4 to stable-4.4 ~Andrew > > Tests which did not succeed, but are not blocking: > test-amd64-amd64-rumpuserxen-amd64 1 build-check(1) blocked n/a > test-amd64-i386-rumpuserxen-i386 1 build-check(1) blocked n/a > test-amd64-i386-libvirt 9 guest-start fail never pass > test-amd64-amd64-libvirt 9 guest-start fail never pass > test-armhf-armhf-xl 10 migrate-support-check fail never pass > test-armhf-armhf-libvirt 9 guest-start fail never pass > test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass > build-amd64-rumpuserxen 6 xen-build fail never pass > build-i386-rumpuserxen 6 xen-build fail never pass > test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop fail never pass > test-amd64-i386-xend-qemut-winxpsp3 17 leak-check/check fail never pass > test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop fail never pass > test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop fail never pass > test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop fail never pass > test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop fail never pass > test-amd64-i386-xend-winxpsp3 17 leak-check/check fail never pass > test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop fail never pass > test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop fail never pass > test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop fail never pass > test-amd64-i386-xl-win7-amd64 14 guest-stop fail never pass > test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop fail never pass > test-amd64-amd64-xl-winxpsp3 14 guest-stop fail never pass > > version targeted for testing: > xen a299a3e88a387de88489d6a6f61bebdafc95ebe5 > baseline version: > xen be84c34e642f06107be8096b7e90dd0c86f13164 > > ------------------------------------------------------------ > People who touched revisions under test: > Andrei LUTAS > Andrew Cooper > Jan Beulich > Keir Fraser > ------------------------------------------------------------ > > jobs: > build-amd64-xend pass > build-i386-xend pass > build-amd64 pass > build-armhf pass > build-i386 pass > build-amd64-libvirt pass > build-armhf-libvirt pass > build-i386-libvirt pass > build-amd64-pvops pass > build-armhf-pvops pass > build-i386-pvops pass > build-amd64-rumpuserxen fail > build-i386-rumpuserxen fail > test-amd64-amd64-xl pass > test-armhf-armhf-xl pass > test-amd64-i386-xl pass > test-amd64-i386-rhel6hvm-amd pass > test-amd64-i386-qemut-rhel6hvm-amd pass > test-amd64-i386-qemuu-rhel6hvm-amd pass > test-amd64-amd64-xl-qemut-debianhvm-amd64 pass > test-amd64-i386-xl-qemut-debianhvm-amd64 pass > test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass > test-amd64-i386-xl-qemuu-debianhvm-amd64 pass > test-amd64-i386-freebsd10-amd64 pass > test-amd64-amd64-xl-qemuu-ovmf-amd64 pass > test-amd64-i386-xl-qemuu-ovmf-amd64 pass > test-amd64-amd64-rumpuserxen-amd64 blocked > test-amd64-amd64-xl-qemut-win7-amd64 fail > test-amd64-i386-xl-qemut-win7-amd64 fail > test-amd64-amd64-xl-qemuu-win7-amd64 fail > test-amd64-i386-xl-qemuu-win7-amd64 fail > test-amd64-amd64-xl-win7-amd64 fail > test-amd64-i386-xl-win7-amd64 fail > test-amd64-i386-xl-credit2 pass > test-amd64-i386-freebsd10-i386 pass > test-amd64-i386-rumpuserxen-i386 blocked > test-amd64-amd64-xl-pcipt-intel fail > test-amd64-i386-rhel6hvm-intel pass > test-amd64-i386-qemut-rhel6hvm-intel pass > test-amd64-i386-qemuu-rhel6hvm-intel pass > test-amd64-amd64-libvirt fail > test-armhf-armhf-libvirt fail > test-amd64-i386-libvirt fail > test-amd64-i386-xl-multivcpu pass > test-amd64-amd64-pair pass > test-amd64-i386-pair pass > test-amd64-amd64-xl-sedf-pin pass > test-amd64-amd64-pv pass > test-amd64-i386-pv pass > test-amd64-amd64-xl-sedf pass > test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail > test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 fail > test-amd64-i386-xl-winxpsp3-vcpus1 fail > test-amd64-i386-xend-qemut-winxpsp3 fail > test-amd64-amd64-xl-qemut-winxpsp3 fail > test-amd64-amd64-xl-qemuu-winxpsp3 fail > test-amd64-i386-xend-winxpsp3 fail > test-amd64-amd64-xl-winxpsp3 fail > > > ------------------------------------------------------------ > sg-report-flight on osstest.cam.xci-test.com > logs: /home/xc_osstest/logs > images: /home/xc_osstest/images > > Logs, config files, etc. are available at > http://www.chiark.greenend.org.uk/~xensrcts/logs > > Test harness code can be found at > http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary > > > Not pushing. > > ------------------------------------------------------------ > commit a299a3e88a387de88489d6a6f61bebdafc95ebe5 > Author: Jan Beulich > Date: Tue Sep 23 14:40:51 2014 +0200 > > x86emul: only emulate software interrupt injection for real mode > > Protected mode emulation currently lacks proper privilege checking of > the referenced IDT entry, and there's currently no legitimate way for > any of the respective instructions to reach the emulator when the guest > is in protected mode. > > This is XSA-106. > > Reported-by: Andrei LUTAS > Signed-off-by: Jan Beulich > Acked-by: Keir Fraser > master commit: 346d4545569928b652c40c7815c1732676f8587c > master date: 2014-09-23 14:33:50 +0200 > > commit 510f1717827b54e27acd86e1781bb472a10cc72a > Author: Andrew Cooper > Date: Tue Sep 23 14:40:12 2014 +0200 > > x86/emulate: check cpl for all privileged instructions > > Without this, it is possible for userspace to load its own IDT or GDT. > > This is XSA-105. > > Reported-by: Andrei LUTAS > Signed-off-by: Andrew Cooper > Tested-by: Andrei LUTAS > Reviewed-by: Jan Beulich > master commit: 0e442727ceccfa32a7276cccd205b4722e68fdc1 > master date: 2014-09-23 14:33:06 +0200 > > commit 20429b1274fe9ed0b40e73c295fa79b70c1bf80e > Author: Andrew Cooper > Date: Tue Sep 23 14:39:05 2014 +0200 > > x86/shadow: fix race condition sampling the dirty vram state > > d->arch.hvm_domain.dirty_vram must be read with the domain's paging lock held. > > If not, two concurrent hypercalls could both end up attempting to free > dirty_vram (the second of which will free a wild pointer), or both end up > allocating a new dirty_vram structure (the first of which will be leaked). > > This is XSA-104. > > Signed-off-by: Andrew Cooper > Reviewed-by: Tim Deegan > master commit: 46a49b91f1026f64430b84dd83e845a33f06415e > master date: 2014-09-23 14:31:47 +0200 > (qemu changes not included) > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xen.org > http://lists.xen.org/xen-devel