* [xen-unstable-smoke test] 103356: regressions - FAIL
@ 2016-12-14 21:50 osstest service owner
0 siblings, 0 replies; only message in thread
From: osstest service owner @ 2016-12-14 21:50 UTC (permalink / raw)
To: xen-devel, osstest-admin
[-- Attachment #1: Type: text/plain, Size: 12520 bytes --]
flight 103356 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103356/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-build fail REGR. vs. 103284
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 1 build-check(1) blocked n/a
test-armhf-armhf-xl 12 migrate-support-check fail never pass
test-armhf-armhf-xl 13 saverestore-support-check fail never pass
version targeted for testing:
xen 7b9f21cabc14d823d888ff00413e49b41ca430fe
baseline version:
xen fc9229c4bb35c5474fbc67f78e628dcbcc90afc5
Last test of basis 103284 2016-12-13 19:03:56 Z 1 days
Failing since 103292 2016-12-13 22:19:08 Z 0 days 8 attempts
Testing same since 103356 2016-12-14 19:02:39 Z 0 days 1 attempts
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <andrew.cooper3@citrix.com>
Cédric Bosdonnat <cbosdonnat@suse.com>
Ian Jackson <ian.jackson@eu.citrix.com>
Jan Beulich <jbeulich@suse.com>
Juergen Gross <jgross@suse.com>
Ross Lagerwall <ross.lagerwall@citrix.com>
Stefano Stabellini <sstabellini@kernel.org>
Wei Liu <wei.liu2@citrix.com>
jobs:
build-amd64 pass
build-armhf pass
build-amd64-libvirt fail
test-armhf-armhf-xl pass
test-amd64-amd64-xl-qemuu-debianhvm-i386 pass
test-amd64-amd64-libvirt blocked
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 7b9f21cabc14d823d888ff00413e49b41ca430fe
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Dec 14 11:33:17 2016 +0000
x86/traps: Correct pagefault handling issues introduced in c/s d5c251c
There are two bugs.
Firstly, the ASSERT(paging_mode_only_log_dirty(d)) can trip when servicing a
hypervisor #PF in the context of an HVM guest, e.g. a copy_to_user() failure
in the shadow pagetable code.
Secondly, the entry conditions paging_fault() were previously guarded on
!paging_mode_external(d) which limited entry to PV contexts, but for both
guest and hypervisor faults. Switching this to paging_mode_log_dirty() opened
it up to HVM contexts as well.
Reinstate the old !paging_mode_external(d) check, as it is actually the
relevent fact, and extend the comment to explicitly state that hypervisor
faults should follow this path.
Inside, we are now guarenteed to be in the context of a PV guest, so can
safely use the assertion about log dirty.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Tim Deegan <tim@xen.org>
commit 6a6bbedd39e39f6c45001ce468c5e53a3a2b3ba6
Author: Ross Lagerwall <ross.lagerwall@citrix.com>
Date: Wed Dec 14 11:12:01 2016 +0000
x86: Use ACPI reboot method for Dell OptiPlex 9020
When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the
EFI runtime instead of rebooting. Quirk this hardware to use the ACPI
reboot method instead.
dmidecode info:
BIOS Information
Vendor: Dell Inc.
Version: A15
Release Date: 11/08/2015
System Information
Manufacturer: Dell Inc.
Product Name: OptiPlex 9020
Version: 00
Signed-off-by: Ross Lagerwall <ross.lagerwall@citrix.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 47591e012f08f95858d444641e773f101ba41e21
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Dec 14 10:58:08 2016 +0000
x86/emul: Further simplify DstBitBase handling
The masking of src.val is common to both paths. Move it later and simplify
the entry condition for adjusting the memory operand.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 713b23ccd1e6c9188b9beb52494e4a4196329056
Author: Wei Liu <wei.liu2@citrix.com>
Date: Wed Dec 14 14:44:33 2016 +0000
Config.mk: update mini-os changeset
Signed-off-by: Wei Liu <wei.liu2@citrix.com>
commit 0738d6fe7116cc2398bcb557c957ab38b712fe96
Author: Juergen Gross <jgross@suse.com>
Date: Tue Dec 13 16:38:06 2016 +0100
stubdom: modify ioemu linkfarm only if necessary
Several stubdom libraries are being rebuilt each time a top level make
is called as they depend on stubdom/ioemu/linkfarm.stamp which is
depending on tools/qemu-xen-traditional-dir. Unfortunately this
directory is modified by each "make tools" call.
This can be avoided by writing stubdom/ioemu/linkfarm.stamp only if
a source file beneath tools/qemu-xen-traditional-dir has been added
or removed.
Signed-off-by: Juergen Gross <jgross@suse.com>
Acked-by: Wei Liu <wei.liu2@citrix.com>
Reviewed-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
commit 96a7cb37b921d2b320183d194d143262e1dd5b53
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 10:11:08 2016 +0100
x86emul: MOVNTI does not allow REP prefixes
Just like 66, prefixes F3 and F2 cause #UD.
Also adjust a related comment, which in its previous wording was
misleading (as in 16-bit mode there would nothing be undone when
adjusting operand size from 2 to 4).
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit bd201eb1681ce6eb1b2d53b4d26a27081956770f
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 10:10:39 2016 +0100
x86emul: check for LAHF_LM availability
We can't exclude someone wanting to hide LAHF/SAHF from 64-bit guests.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 4133077d06a14d041d68250e67eac4d7bcbabfcf
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 10:10:11 2016 +0100
x86emul: check for CLFLUSH{,OPT} availability
We can't exclude someone wanting to hide either of the instructions
from guests.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit d95533f554cde498b9afe731b94a4d9198b47cbe
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 10:09:40 2016 +0100
x86emul: check for SYSENTER/SYSEXIT availability
We can't exclude someone wanting to hide the instructions from guests.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 54abe826c8297e12f805be2bcf318ef75cc7f58d
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 10:08:22 2016 +0100
x86emul: CMPXCHG{8,16}B ignore prefixes
This removes 0F C7 from the list of two-byte opcodes treating prefixes
66, F3, and F2 as opcode extensions. We better manually handle this in
the opcode specific code:
- CMPXCHG8B ignores all these prefixes (its handling is being adjusted
accordingly, with a respective test case added as well, to avoid
re-introducing the subject of XSA-200),
- RDRAND/RDSEED (support to be added subsequently) honor 66, but treat
F3 and F2 as opcode extensions (resolving to RDPID in the RDSEED
case, which in turn ignores 66).
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 6cf995f1f59240532e27cb788a390185f4276d6f
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 09:54:35 2016 +0100
x86/PV: prefer pv_inject_hw_exception()
... over editing the error code and calling do_guest_trap().
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 4999bf3e8b4ced3fbdc4f64443a7fdab638322bb
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 09:54:03 2016 +0100
x86/PV: use generic emulator for privileged instruction handling
There's a new emulator return code being added to allow bypassing
certain operations (see the code comment).
Another small tweak to the emulator is to single iteration handling
of INS and OUTS: Since we don't want to handle any other memory access
instructions, we want these to be handled by the rep_ins() / rep_outs()
hooks here too.
And then long-mode related bits now get hidden from the guest. This
should have been that way from the beginning, but becomes a requirement
now as the emulator's in_longmode() needs this to reflect guest view.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 36a808eeb2b9d365ab7ab13a8659e66e49d049bf
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 09:53:09 2016 +0100
x86emul: make write and cmpxchg hooks optional
While the read and fetch hooks are basically unavoidable, write and
cmpxchg aren't really needed by that many insns.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 53f87c03b4ead25df97ccfbeaeddc78ff8375c91
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 09:52:35 2016 +0100
x86emul: generalize exception handling for rep_* hooks
If any of those hooks returns X86EMUL_EXCEPTION, some register state
should still get updated if some iterations have been performed (but
the rIP update will get suppressed if not all of them did get handled).
This updating is done by register_address_increment() and
__put_rep_prefix() (which hence must no longer be bypassed). As a
result put_rep_prefix() can then skip most of the writeback, but needs
to ensure proper completion of the executed instruction.
While on the HVM side the VA -> LA -> PA translation process ensures
that an exception would be raised on the first iteration only, doing so
would unduly complicate the PV side code about to be added.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Paul Durrant <paul.durrant@citrix.com>
commit 653cae725cea44c867bb450617da3b08596287ff
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Dec 14 09:51:40 2016 +0100
x86/32on64: use generic instruction decoding for call gate emulation
... instead of custom handling. Note that we can't use generic
emulation, as the emulator's far branch support is rather rudimentary
at this point in time.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 1035fe9b160bf298985296a6c73f2ab3d1ae55c5
Author: Cédric Bosdonnat <cbosdonnat@suse.com>
Date: Tue Dec 13 17:31:52 2016 +0100
libxl: QED disks support
Qdisk supports qcow and qcow2, extend it to also support qed disk
format.
Signed-off-by: Cédric Bosdonnat <cbosdonnat@suse.com>
[ wei: regenerate libxlu_disk_l.{c,h} ]
Acked-by: Wei Liu <wei.liu2@citrix.com>
Acked-by: Ian Jackson <ian.jackson@eu.citrix.com>
commit 9963caae97ad140fa207c3c61a9442b417afc1e9
Author: Stefano Stabellini <sstabellini@kernel.org>
Date: Tue Dec 13 11:08:39 2016 -0800
fix LDRB Thumb2 decoding
Rt is four bit at offset 12, not three. See see encoding T2 for LDRB
A8.8.70 in ARM DDI 0406C.c
Suggested-by: Julien Grall <julien.grall@arm.com>
Signed-off-by: Stefano Stabellini <sstabellini@kernel.org>
Reviewed-by: Julien Grall <julien.grall@arm.com>
(qemu changes not included)
[-- Attachment #2: Type: text/plain, Size: 127 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2016-12-14 21:50 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-12-14 21:50 [xen-unstable-smoke test] 103356: regressions - FAIL osstest service owner
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).