* [xen-4.8-testing baseline-only test] 75270: trouble: blocked/broken
@ 2018-09-23 4:22 Platform Team regression test user
0 siblings, 0 replies; only message in thread
From: Platform Team regression test user @ 2018-09-23 4:22 UTC (permalink / raw)
To: xen-devel, osstest-admin
This run is configured for baseline tests only.
flight 75270 xen-4.8-testing real [real]
http://osstest.xensource.com/osstest/logs/75270/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 <job status> broken
build-amd64-prev <job status> broken
build-i386 <job status> broken
build-armhf-pvops <job status> broken
build-i386-xsm <job status> broken
build-amd64-xtf <job status> broken
build-amd64-xsm <job status> broken
build-amd64-pvops <job status> broken
build-i386-pvops <job status> broken
build-armhf <job status> broken
build-i386-prev <job status> broken
build-armhf-pvops 4 host-install(4) broken REGR. vs. 75093
build-armhf 4 host-install(4) broken REGR. vs. 75093
build-i386-pvops 4 host-install(4) broken REGR. vs. 75093
build-amd64 4 host-install(4) broken REGR. vs. 75093
build-i386-xsm 4 host-install(4) broken REGR. vs. 75093
build-amd64-xsm 4 host-install(4) broken REGR. vs. 75093
build-i386-prev 4 host-install(4) broken REGR. vs. 75093
build-i386 4 host-install(4) broken REGR. vs. 75093
build-amd64-prev 4 host-install(4) broken REGR. vs. 75093
build-amd64-pvops 4 host-install(4) broken REGR. vs. 75093
build-amd64-xtf 4 host-install(4) broken REGR. vs. 75093
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 1 build-check(1) blocked n/a
test-amd64-i386-freebsd10-i386 1 build-check(1) blocked n/a
test-amd64-amd64-qemuu-nested-intel 1 build-check(1) blocked n/a
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
test-xtf-amd64-amd64-1 1 build-check(1) blocked n/a
test-amd64-amd64-xl-shadow 1 build-check(1) blocked n/a
test-armhf-armhf-xl-midway 1 build-check(1) blocked n/a
test-armhf-armhf-libvirt 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-migrupgrade 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemut-win10-i386 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-win10-i386 1 build-check(1) blocked n/a
test-armhf-armhf-libvirt-raw 1 build-check(1) blocked n/a
test-amd64-i386-libvirt-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-xl-multivcpu 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemut-ws16-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-win10-i386 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemut-debianhvm-amd64 1 build-check(1) blocked n/a
test-amd64-i386-qemut-rhel6hvm-intel 1 build-check(1) blocked n/a
test-amd64-i386-freebsd10-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-pair 1 build-check(1) blocked n/a
test-armhf-armhf-xl-credit2 1 build-check(1) blocked n/a
build-i386-rumprun 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-win10-i386 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-win7-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-pygrub 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-ws16-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qcow2 1 build-check(1) blocked n/a
test-amd64-amd64-amd64-pvgrub 1 build-check(1) blocked n/a
test-xtf-amd64-amd64-2 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-win7-amd64 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-debianhvm-amd64 1 build-check(1) blocked n/a
build-amd64-rumprun 1 build-check(1) blocked n/a
test-amd64-i386-xl 1 build-check(1) blocked n/a
build-i386-libvirt 1 build-check(1) blocked n/a
test-amd64-i386-libvirt-pair 1 build-check(1) blocked n/a
test-amd64-i386-livepatch 1 build-check(1) blocked n/a
test-xtf-amd64-amd64-4 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-ovmf-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt-vhd 1 build-check(1) blocked n/a
test-amd64-amd64-xl-credit2 1 build-check(1) blocked n/a
test-armhf-armhf-xl-multivcpu 1 build-check(1) blocked n/a
test-amd64-i386-xl-xsm 1 build-check(1) blocked n/a
build-amd64-libvirt 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-rumprun-amd64 1 build-check(1) blocked n/a
test-xtf-amd64-amd64-3 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-ovmf-amd64 1 build-check(1) blocked n/a
test-amd64-i386-xl-raw 1 build-check(1) blocked n/a
test-amd64-amd64-i386-pvgrub 1 build-check(1) blocked n/a
test-amd64-i386-qemuu-rhel6hvm-amd 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-ws16-amd64 1 build-check(1) blocked n/a
test-xtf-amd64-amd64-5 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-ws16-amd64 1 build-check(1) blocked n/a
build-armhf-libvirt 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt-pair 1 build-check(1) blocked n/a
test-amd64-i386-libvirt 1 build-check(1) blocked n/a
test-armhf-armhf-xl 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-i386-xl-shadow 1 build-check(1) blocked n/a
test-amd64-i386-qemuu-rhel6hvm-intel 1 build-check(1) blocked n/a
test-armhf-armhf-xl-vhd 1 build-check(1) blocked n/a
test-amd64-i386-migrupgrade 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-win7-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-xl 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 1 build-check(1) blocked n/a
test-amd64-i386-pair 1 build-check(1) blocked n/a
test-amd64-i386-rumprun-i386 1 build-check(1) blocked n/a
test-amd64-amd64-qemuu-nested-amd 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemut-win7-amd64 1 build-check(1) blocked n/a
test-amd64-i386-qemut-rhel6hvm-amd 1 build-check(1) blocked n/a
test-armhf-armhf-xl-rtds 1 build-check(1) blocked n/a
test-amd64-amd64-livepatch 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-debianhvm-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-xl-rtds 1 build-check(1) blocked n/a
version targeted for testing:
xen 005df911f6b4171b650942861bf44606e9e79be4
baseline version:
xen e52ec4b7874cf85041d2d957ed2608946565fe18
Last test of basis 75093 2018-08-20 02:52:41 Z 34 days
Testing same since 75270 2018-09-22 22:16:38 Z 0 days 1 attempts
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <andrew.cooper3@citrix.com>
Jan Beulich <jbeulich@suse.com>
Kevin Tian <kevin.tian@intel.com>
Paul Durrant <paul.durrant@citrix.com>
Razvan Cojocaru <rcojocaru@bitdefender.com>
Zhenzhong Duan <zhenzhong.duan@oracle.com>
jobs:
build-amd64-xsm broken
build-i386-xsm broken
build-amd64-xtf broken
build-amd64 broken
build-armhf broken
build-i386 broken
build-amd64-libvirt blocked
build-armhf-libvirt blocked
build-i386-libvirt blocked
build-amd64-prev broken
build-i386-prev broken
build-amd64-pvops broken
build-armhf-pvops broken
build-i386-pvops broken
build-amd64-rumprun blocked
build-i386-rumprun blocked
test-xtf-amd64-amd64-1 blocked
test-xtf-amd64-amd64-2 blocked
test-xtf-amd64-amd64-3 blocked
test-xtf-amd64-amd64-4 blocked
test-xtf-amd64-amd64-5 blocked
test-amd64-amd64-xl blocked
test-armhf-armhf-xl blocked
test-amd64-i386-xl blocked
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm blocked
test-amd64-i386-xl-qemut-debianhvm-amd64-xsm blocked
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm blocked
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm blocked
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm blocked
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm blocked
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm blocked
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm blocked
test-amd64-amd64-libvirt-xsm blocked
test-amd64-i386-libvirt-xsm blocked
test-amd64-amd64-xl-xsm blocked
test-amd64-i386-xl-xsm blocked
test-amd64-amd64-qemuu-nested-amd blocked
test-amd64-i386-qemut-rhel6hvm-amd blocked
test-amd64-i386-qemuu-rhel6hvm-amd blocked
test-amd64-amd64-xl-qemut-debianhvm-amd64 blocked
test-amd64-i386-xl-qemut-debianhvm-amd64 blocked
test-amd64-amd64-xl-qemuu-debianhvm-amd64 blocked
test-amd64-i386-xl-qemuu-debianhvm-amd64 blocked
test-amd64-i386-freebsd10-amd64 blocked
test-amd64-amd64-xl-qemuu-ovmf-amd64 blocked
test-amd64-i386-xl-qemuu-ovmf-amd64 blocked
test-amd64-amd64-rumprun-amd64 blocked
test-amd64-amd64-xl-qemut-win7-amd64 blocked
test-amd64-i386-xl-qemut-win7-amd64 blocked
test-amd64-amd64-xl-qemuu-win7-amd64 blocked
test-amd64-i386-xl-qemuu-win7-amd64 blocked
test-amd64-amd64-xl-qemut-ws16-amd64 blocked
test-amd64-i386-xl-qemut-ws16-amd64 blocked
test-amd64-amd64-xl-qemuu-ws16-amd64 blocked
test-amd64-i386-xl-qemuu-ws16-amd64 blocked
test-amd64-amd64-xl-credit2 blocked
test-armhf-armhf-xl-credit2 blocked
test-amd64-i386-freebsd10-i386 blocked
test-amd64-i386-rumprun-i386 blocked
test-amd64-amd64-xl-qemut-win10-i386 blocked
test-amd64-i386-xl-qemut-win10-i386 blocked
test-amd64-amd64-xl-qemuu-win10-i386 blocked
test-amd64-i386-xl-qemuu-win10-i386 blocked
test-amd64-amd64-qemuu-nested-intel blocked
test-amd64-i386-qemut-rhel6hvm-intel blocked
test-amd64-i386-qemuu-rhel6hvm-intel blocked
test-amd64-amd64-libvirt blocked
test-armhf-armhf-libvirt blocked
test-amd64-i386-libvirt blocked
test-amd64-amd64-livepatch blocked
test-amd64-i386-livepatch blocked
test-armhf-armhf-xl-midway blocked
test-amd64-amd64-migrupgrade blocked
test-amd64-i386-migrupgrade blocked
test-amd64-amd64-xl-multivcpu blocked
test-armhf-armhf-xl-multivcpu blocked
test-amd64-amd64-pair blocked
test-amd64-i386-pair blocked
test-amd64-amd64-libvirt-pair blocked
test-amd64-i386-libvirt-pair blocked
test-amd64-amd64-amd64-pvgrub blocked
test-amd64-amd64-i386-pvgrub blocked
test-amd64-amd64-pygrub blocked
test-amd64-amd64-xl-qcow2 blocked
test-armhf-armhf-libvirt-raw blocked
test-amd64-i386-xl-raw blocked
test-amd64-amd64-xl-rtds blocked
test-armhf-armhf-xl-rtds blocked
test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow blocked
test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow blocked
test-amd64-amd64-xl-shadow blocked
test-amd64-i386-xl-shadow blocked
test-amd64-amd64-libvirt-vhd blocked
test-armhf-armhf-xl-vhd blocked
------------------------------------------------------------
sg-report-flight on osstest.xs.citrite.net
logs: /home/osstest/logs
images: /home/osstest/images
Logs, config files, etc. are available at
http://osstest.xensource.com/osstest/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-i386 broken
broken-job build-armhf-pvops broken
broken-job build-i386-xsm broken
broken-job build-amd64-xtf broken
broken-job build-amd64-xsm broken
broken-job build-amd64-pvops broken
broken-job build-i386-pvops broken
broken-job build-armhf broken
broken-job build-i386-prev broken
broken-step build-armhf-pvops host-install(4)
broken-step build-armhf host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386 host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64-xtf host-install(4)
Push not applicable.
------------------------------------------------------------
commit 005df911f6b4171b650942861bf44606e9e79be4
Author: Jan Beulich <jbeulich@suse.com>
Date: Fri Sep 14 13:36:32 2018 +0200
x86: assorted array_index_nospec() insertions
Don't chance having Spectre v1 (including BCBS) gadgets. In some of the
cases the insertions are more of precautionary nature rather than there
provably being a gadget, but I think we should err on the safe (secure)
side here.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Paul Durrant <paul.durrant@citrix.com>
Acked-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 3f2002614af51dfd507168a1696658bac91155ce
master date: 2018-09-03 17:50:10 +0200
commit 8bfab2b5b6d6a208e3905b20bffe500a93d3c63d
Author: Zhenzhong Duan <zhenzhong.duan@oracle.com>
Date: Fri Sep 14 13:35:54 2018 +0200
VT-d/dmar: iommu mem leak fix
Release memory allocated for drhd iommu in error path.
Signed-off-by: Zhenzhong Duan <zhenzhong.duan@oracle.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
master commit: fd07b6648c4c8891dca5bd0f7ef174b6831f80b2
master date: 2018-08-27 11:37:24 +0200
commit dc814e1920442077bf5b046ab4129cf0eae62313
Author: Jan Beulich <jbeulich@suse.com>
Date: Fri Sep 14 13:35:27 2018 +0200
rangeset: make inquiry functions tolerate NULL inputs
Rather than special casing the ->iomem_caps check in x86's
get_page_from_l1e() for the dom_xen case, let's be more tolerant in
general, along the lines of rangeset_is_empty(): A never allocated
rangeset can't possibly contain or overlap any range.
Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Wei Liu <wei.liu2@citrix.com>
master commit: ad0a9f273d6d6f0545cd9b708b2d4be581a6cadd
master date: 2018-08-17 13:54:40 +0200
commit 5e8697735b7004adc637f3190165da0eaa7e39c7
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Fri Sep 14 13:34:57 2018 +0200
x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address
A number of corner cases (most obviously, no-real-mode and no Multiboot memory
map) can end up with e820_raw.nr_map being 0, at which point the L1TF
calculation will underflow.
Spotted by Coverity.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Wei Liu <wei.liu2@citrix.com>
master commit: 3e4ec07e14bce81f6ae22c31ff1302d1f297a226
master date: 2018-08-16 18:10:07 +0100
commit d1a5936d63ea1e33fd9dc8b3a8c41c804d77985a
Author: Paul Durrant <paul.durrant@citrix.com>
Date: Fri Sep 14 13:34:26 2018 +0200
x86/hvm/ioreq: MMIO range checking completely ignores direction flag
hvm_select_ioreq_server() is used to route an ioreq to the appropriate
ioreq server. For MMIO this is done by comparing the range of the ioreq
to the ranges registered by the device models of each ioreq server.
Unfortunately the calculation of the range if the ioreq completely ignores
the direction flag and thus may calculate the wrong range for comparison.
Thus the ioreq may either be routed to the wrong server or erroneously
terminated by null_ops.
NOTE: The patch also fixes whitespace in the switch statement to make it
style compliant.
Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 60a56dc0064a00830663ffe48215dcd080cb9504
master date: 2018-08-15 14:14:06 +0200
commit c9fc6b388ed85c97283cccfbb4328f0859a73a04
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Fri Sep 14 13:33:59 2018 +0200
x86/vlapic: Bugfixes and improvements to vlapic_{read,write}()
Firstly, there is no 'offset' boundary check on the non-32-bit write path
before the call to vlapic_read_aligned(), which allows an attacker to read
beyond the end of vlapic->regs->data[], which is only 1024 bytes long.
However, as the backing memory is a domheap page, and misaligned accesses get
chunked down to single bytes across page boundaries, I can't spot any
XSA-worthy problems which occur from the overrun.
On real hardware, bad accesses don't instantly crash the machine. Their
behaviour is undefined, but the domain_crash() prohibits sensible testing.
Behave more like other x86 MMIO and terminate bad accesses with appropriate
defaults.
While making these changes, clean up and simplify the the smaller-access
handling. In particular, avoid pointer based mechansims for 1/2-byte reads so
as to avoid forcing the value to be spilled to the stack.
add/remove: 0/0 grow/shrink: 0/2 up/down: 0/-175 (-175)
function old new delta
vlapic_read 211 142 -69
vlapic_write 304 198 -106
Finally, there are a plethora of read/write functions in the vlapic namespace,
so rename these to vlapic_mmio_{read,write}() to make their purpose more
clear.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
master commit: b6f43c14cef3af8477a9eca4efab87dd150a2885
master date: 2018-08-10 13:27:24 +0100
commit 21ac6c8e446ee6742e2e839b56d94617a6930b16
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Fri Sep 14 13:33:20 2018 +0200
x86/vmx: Avoid hitting BUG_ON() after EPTP-related domain_crash()
If the EPTP pointer can't be located in the altp2m list, the domain
is (legitimately) crashed.
Under those circumstances, execution will continue and guarentee to hit the
BUG_ON(idx >= MAX_ALTP2M) (unfortunately, just out of context).
Return from vmx_vmexit_handler() after the domain_crash(), which also has the
side effect of reentering the scheduler more promptly.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
master commit: 48dbb2dbe9d9f92a2890a15bb48a0598c065b9f8
master date: 2018-08-02 10:10:43 +0100
(qemu changes not included)
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2018-09-23 4:22 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-09-23 4:22 [xen-4.8-testing baseline-only test] 75270: trouble: blocked/broken Platform Team regression test user
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).