[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 20807: regressions - trouble: broken/fail/pass



flight 20807 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/20807/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-multivcpu 10 guest-saverestore         fail REGR. vs. 20673
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 3 host-install(3) broken REGR. vs. 
20673

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-armhf-armhf-xl           5 xen-boot                     fail   never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop              fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check        fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop             fail never pass

version targeted for testing:
 xen                  6fd9b0361e2eb5a7f12bdd5cbf7e42c0d1937d26
baseline version:
 xen                  4c37ed562224295c0f8b00211287d57cae629782

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          fail    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 fail    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     broken  
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 6fd9b0361e2eb5a7f12bdd5cbf7e42c0d1937d26
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri Oct 11 09:31:16 2013 +0200

    x86: check for canonical address before doing page walks
    
    ... as there doesn't really exists any valid mapping for them.
    
    Particularly in the case of do_page_walk() this also avoids returning
    non-NULL for such invalid input.
    
    Suggested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit 4b46e7be783df641b2889e514e85643febd378c2
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri Oct 11 09:30:31 2013 +0200

    x86: use {rd,wr}{fs,gs}base when available
    
    ... as being intended to be faster than MSR reads/writes.
    
    In the case of emulate_privileged_op() also use these in favor of the
    cached (but possibly stale) addresses from arch.pv_vcpu. This allows
    entirely removing the code that was the subject of XSA-67.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit d06a0d715ec1423b6c42141ab1b0ff69a3effb56
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri Oct 11 09:29:43 2013 +0200

    x86: add address validity check to guest_map_l1e()
    
    Just like for guest_get_eff_l1e() this prevents accessing as page
    tables (and with the wrong memory attribute) internal data inside Xen
    happening to be mapped with 1Gb pages.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit 40d66baa46ca8a9ffa6df3e063a967d08ec92bcf
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Fri Oct 11 09:28:26 2013 +0200

    x86: correct LDT checks
    
    - MMUEXT_SET_LDT should behave as similarly to the LLDT instruction as
      possible: fail only if the base address is non-canonical
    - instead LDT descriptor accesses should fault if the descriptor
      address ends up being non-canonical (by ensuring this we at once
      avoid reading an entry from the mach-to-phys table and consider it a
      page table entry)
    - fault propagation on using LDT selectors must distinguish #PF and #GP
      (the latter must be raised for a non-canonical descriptor address,
      which also applies to several other uses of propagate_page_fault(),
      and hence the problem is being fixed there)
    - map_ldt_shadow_page() should properly wrap addresses for 32-bit VMs
    
    At once remove the odd invokation of map_ldt_shadow_page() from the
    MMUEXT_SET_LDT handler: There's nothing really telling us that the
    first LDT page is going to be preferred over others.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.