* [xen-4.2-testing test] 26237: regressions - FAIL
@ 2014-05-12 22:20 xen.org
2014-05-12 23:49 ` Andrew Cooper
0 siblings, 1 reply; 3+ messages in thread
From: xen.org @ 2014-05-12 22:20 UTC (permalink / raw)
To: xen-devel; +Cc: ian.jackson
flight 26237 xen-4.2-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/26237/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 4 xen-build fail REGR. vs. 26102
build-i386 4 xen-build fail REGR. vs. 26102
Tests which did not succeed, but are not blocking:
test-i386-i386-libvirt 1 xen-build-check(1) blocked n/a
test-amd64-i386-libvirt 1 xen-build-check(1) blocked n/a
test-amd64-amd64-libvirt 1 xen-build-check(1) blocked n/a
build-i386-libvirt 4 libvirt-build fail never pass
test-amd64-i386-xl-qemuu-ovmf-amd64 1 xen-build-check(1) blocked n/a
build-amd64-libvirt 4 libvirt-build fail never pass
test-amd64-amd64-xl-qemuu-ovmf-amd64 1 xen-build-check(1) blocked n/a
test-amd64-amd64-pv 1 xen-build-check(1) blocked n/a
test-i386-i386-pv 1 xen-build-check(1) blocked n/a
test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemut-rhel6hvm-intel 1 xen-build-check(1) blocked n/a
test-amd64-i386-pv 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-sedf 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-sedf-pin 1 xen-build-check(1) blocked n/a
test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-pcipt-intel 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemut-rhel6hvm-amd 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemuu-rhel6hvm-amd 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemuu-rhel6hvm-intel 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a
test-i386-i386-pair 1 xen-build-check(1) blocked n/a
test-amd64-i386-pair 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemuu-freebsd10-i386 1 xen-build-check(1) blocked n/a
test-amd64-i386-qemuu-freebsd10-amd64 1 xen-build-check(1) blocked n/a
test-i386-i386-xl 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-i386-xend-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-i386-xend-qemut-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-amd64-pair 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-qemut-win7-amd64 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-win7-amd64 1 xen-build-check(1) blocked n/a
test-i386-i386-xl-qemut-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-winxpsp3 1 xen-build-check(1) blocked n/a
test-i386-i386-xl-winxpsp3 1 xen-build-check(1) blocked n/a
test-i386-i386-xl-qemuu-winxpsp3 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 1 xen-build-check(1) blocked n/a
version targeted for testing:
xen 025500b9ae76fddd875aa981a2e8b767e390f6bb
baseline version:
xen 560d630110f9f11fe6a0bd18522d0e2bea9ab401
------------------------------------------------------------
People who touched revisions under test:
Don Dugger <donald.d.dugger@intel.com>
Feng Wu <feng.wu@intel.com>
Jan Beulich <jbeulich@suse.com>
Paul Durrant <paul.durrant@citrix.com>
Tim Deegan <tim@xen.org>
Xiantao Zhang <xiantao.zhang@intel.com>
------------------------------------------------------------
jobs:
build-amd64 fail
build-i386 fail
build-amd64-libvirt fail
build-i386-libvirt fail
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl blocked
test-amd64-i386-xl blocked
test-i386-i386-xl blocked
test-amd64-i386-rhel6hvm-amd blocked
test-amd64-i386-qemut-rhel6hvm-amd blocked
test-amd64-i386-qemuu-rhel6hvm-amd blocked
test-amd64-i386-qemuu-freebsd10-amd64 blocked
test-amd64-amd64-xl-qemuu-ovmf-amd64 blocked
test-amd64-i386-xl-qemuu-ovmf-amd64 blocked
test-amd64-amd64-xl-qemut-win7-amd64 blocked
test-amd64-i386-xl-qemut-win7-amd64 blocked
test-amd64-amd64-xl-qemuu-win7-amd64 blocked
test-amd64-i386-xl-qemuu-win7-amd64 blocked
test-amd64-amd64-xl-win7-amd64 blocked
test-amd64-i386-xl-win7-amd64 blocked
test-amd64-i386-xl-credit2 blocked
test-amd64-i386-qemuu-freebsd10-i386 blocked
test-amd64-amd64-xl-pcipt-intel blocked
test-amd64-i386-rhel6hvm-intel blocked
test-amd64-i386-qemut-rhel6hvm-intel blocked
test-amd64-i386-qemuu-rhel6hvm-intel blocked
test-amd64-amd64-libvirt blocked
test-amd64-i386-libvirt blocked
test-i386-i386-libvirt blocked
test-amd64-i386-xl-multivcpu blocked
test-amd64-amd64-pair blocked
test-amd64-i386-pair blocked
test-i386-i386-pair blocked
test-amd64-amd64-xl-sedf-pin blocked
test-amd64-amd64-pv blocked
test-amd64-i386-pv blocked
test-i386-i386-pv blocked
test-amd64-amd64-xl-sedf blocked
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 blocked
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 blocked
test-amd64-i386-xl-winxpsp3-vcpus1 blocked
test-amd64-i386-xend-qemut-winxpsp3 blocked
test-amd64-amd64-xl-qemut-winxpsp3 blocked
test-i386-i386-xl-qemut-winxpsp3 blocked
test-amd64-amd64-xl-qemuu-winxpsp3 blocked
test-i386-i386-xl-qemuu-winxpsp3 blocked
test-amd64-i386-xend-winxpsp3 blocked
test-amd64-amd64-xl-winxpsp3 blocked
test-i386-i386-xl-winxpsp3 blocked
------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 025500b9ae76fddd875aa981a2e8b767e390f6bb
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 12 17:43:00 2014 +0200
x86: fix guest CPUID handling
The way XEN_DOMCTL_set_cpuid got handled so far allowed for surprises
to the caller. With this set of operations
- set leaf A (using array index 0)
- set leaf B (using array index 1)
- clear leaf A (clearing array index 0)
- set leaf B (using array index 0)
- clear leaf B (clearing array index 0)
the entry for leaf B at array index 1 would still be in place, while
the caller would expect it to be cleared.
While looking at the use sites of d->arch.cpuid[] I also noticed that
the allocation of the array needlessly uses the zeroing form - the
relevant fields of the array elements get set in a loop immediately
following the allocation.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Tim Deegan <tim@xen.org>
master commit: 4c0ff6bd54b5a67f8f820f9ed0a89a79f1a26a1c
master date: 2014-05-02 12:09:03 +0200
commit ad109e48142ba887fa7721ca58deea2d6c493053
Author: Paul Durrant <paul.durrant@citrix.com>
Date: Mon May 12 17:42:33 2014 +0200
hvm_set_ioreq_page() releases wrong page in error path
The function calls prepare_ring_for_helper() to acquire a mapping for the
given gmfn, then checks (under lock) to see if the ioreq page is already
set up but, if it is, the function then releases the in-use ioreq page
mapping on the error path rather than the one it just acquired. This patch
fixes this bug.
Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 16e2a7596e9fc86881c73cef57602b2c88155528
master date: 2014-05-02 11:46:32 +0200
commit 1c23b1bfba9ebeb444bbf73382e5edb16042da46
Author: Feng Wu <feng.wu@intel.com>
Date: Mon May 12 17:41:42 2014 +0200
x86/HVM: correct the SMEP logic for HVM_CR0_GUEST_RESERVED_BITS
When checking the SMEP feature for HVM guests, we should check the
VCPU instead of the host CPU.
Signed-off-by: Feng Wu <feng.wu@intel.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 31ee951a3bee6e7cc21f94f900fe989e3701a79a
master date: 2014-04-28 12:47:24 +0200
commit e0c9abef3560591dc4984fecc4820e2db4dd8326
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 12 17:39:59 2014 +0200
passthrough: allow to suppress SERR and PERR signaling altogether
This is just to have a workaround at hand in case other chipsets (not
covered by the previous two patches) also have similar issues.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Don Dugger <donald.d.dugger@intel.com>
Acked-by: Tim Deegan <tim@xen.org>
Acked-by: Xiantao Zhang <xiantao.zhang@intel.com>
master commit: 1a2a390a560e8319a6be98c7ab6cfaebd230f67e
master date: 2014-04-25 12:13:31 +0200
commit a910070d4289fdf71c3ca35886192a602a3724d5
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 12 17:35:18 2014 +0200
VT-d: suppress UR signaling for desktop chipsets
Unsupported Requests can be signaled for malformed writes to the MSI
address region, e.g. due to buggy or malicious DMA set up to that
region. These should normally result in IOMMU faults, but don't on
the desktop chipsets dealt with here.
This is CVE-2013-3495 / XSA-59.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Don Dugger <donald.d.dugger@intel.com>
Acked-by: Tim Deegan <tim@xen.org>
Acked-by: Xiantao Zhang <xiantao.zhang@intel.com>
master commit: d6cb14b34ffc2a830022d059f1aa22bf19dcf55f
master date: 2014-04-25 12:12:38 +0200
commit 64c4c7c870dc8bf4786bb91faad431aa744dfa5c
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 12 17:33:41 2014 +0200
VT-d: suppress UR signaling for server chipsets
Unsupported Requests can be signaled for malformed writes to the MSI
address region, e.g. due to buggy or malicious DMA set up to that
region. These should normally result in IOMMU faults, but don't on
the server chipsets dealt with here.
IDs 0xe00, 0xe01, and 0xe04 ... 0xe0b (Ivytown) aren't needed here -
Intel confirmed the issue to be fixed in hardware there.
This is CVE-2013-3495 / XSA-59.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Don Dugger <donald.d.dugger@intel.com>
Acked-by: Tim Deegan <tim@xen.org>
Acked-by: Xiantao Zhang <xiantao.zhang@intel.com>
master commit: d061d200eb92bcb1d86f9b55c6de73e35ce63fdf
master date: 2014-04-25 12:11:55 +0200
commit c35ff6fa5478b7804fc66b01ed497fb3481f8763
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 12 17:32:15 2014 +0200
x86: add missing break in dom0_pit_access()
Coverity ID 1203045
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 815dc9f1dba5782dcef77d8a002a11f5b1e5cc37
master date: 2014-04-23 15:07:11 +0200
commit 50ea806e2cbb6160a12da98132ad2349d9c8c9f3
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 12 17:31:37 2014 +0200
x86/HAP: also flush TLB when altering a present 1G or intermediate entry
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Tim Deegan <tim@xen.org>
master commit: c82fbfe6ec8be597218eb943641d1f7a81c4c01e
master date: 2014-04-14 15:14:47 +0200
commit 4797cb940577f2de5d7fabd81a0bdae29aad6984
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 12 17:30:59 2014 +0200
x86/AMD: feature masking is unavailable on Fam11
Reported-by: Aravind Gopalakrishnan<aravind.gopalakrishnan@amd.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 70e79fad6dc6f533ff83ee23b8d13de5a696d896
master date: 2014-04-09 16:13:25 +0200
commit caa22c1e73b700eb9ac779f9e154f13d61e48c48
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon May 12 17:30:04 2014 +0200
x86/mm: fix checks against max_mapped_pfn
This value is an inclusive one, i.e. this fixes an off-by-one in memory
sharing and an off-by-two in shadow code.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Tim Deegan <tim@xen.org>
master commit: 088ee1d47b65d6bb92de61b404805f4ca92e3240
master date: 2014-04-03 12:08:43 +0100
(qemu changes not included)
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [xen-4.2-testing test] 26237: regressions - FAIL
2014-05-12 22:20 [xen-4.2-testing test] 26237: regressions - FAIL xen.org
@ 2014-05-12 23:49 ` Andrew Cooper
2014-05-13 6:28 ` Jan Beulich
0 siblings, 1 reply; 3+ messages in thread
From: Andrew Cooper @ 2014-05-12 23:49 UTC (permalink / raw)
To: Jan Beulich; +Cc: xen-devel
On 12/05/2014 23:20, xen.org wrote:
> flight 26237 xen-4.2-testing real [real]
> http://www.chiark.greenend.org.uk/~xensrcts/logs/26237/
>
> Regressions :-(
Jan:
quirks.c:30:25: fatal error: xen/pci_ids.h: No such file or directory
c/s 3f5e19b4eece needs backporting, or PCI_VENDOR_ID_INTEL needs
substituting.
~Andrew
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [xen-4.2-testing test] 26237: regressions - FAIL
2014-05-12 23:49 ` Andrew Cooper
@ 2014-05-13 6:28 ` Jan Beulich
0 siblings, 0 replies; 3+ messages in thread
From: Jan Beulich @ 2014-05-13 6:28 UTC (permalink / raw)
To: Andrew Cooper; +Cc: xen-devel
>>> On 13.05.14 at 01:49, <andrew.cooper3@citrix.com> wrote:
> On 12/05/2014 23:20, xen.org wrote:
>> flight 26237 xen-4.2-testing real [real]
>> http://www.chiark.greenend.org.uk/~xensrcts/logs/26237/
>>
>> Regressions :-(
>
> Jan:
>
> quirks.c:30:25: fatal error: xen/pci_ids.h: No such file or directory
>
> c/s 3f5e19b4eece needs backporting, or PCI_VENDOR_ID_INTEL needs
> substituting.
Just forgot to hit enter on the "git add" command line entered while
another command was still in progress...
Jan
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2014-05-13 6:28 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-05-12 22:20 [xen-4.2-testing test] 26237: regressions - FAIL xen.org
2014-05-12 23:49 ` Andrew Cooper
2014-05-13 6:28 ` Jan Beulich
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).