Re: [Xen-devel] [PATCH] x86: correct CPUID output for out of bounds input
>>> On 02.09.16 at 17:14, wrote: > On 01/09/16 16:27, Jan Beulich wrote: >> +{ +if ( d->arch.x86_vendor == X86_VENDOR_AMD ) +{ +*eax = 0; +*ebx = 0; +*ecx = 0; +*edx = 0; +return; +} +if ( input >> 16 ) +hvm_cpuid(0, &lvl, NULL, NULL, NULL); >>> Is this really the right way round? The AMD method of "reserved always >>> as zero" is the more sane default to take. >> If anything I'd then say let's _always_ follow the AMD model. > > It would certainly be better to default to AMD, and special case others > on an as-needed basis. > > Strictly speaking, following the AMD model is compatible with the > "Reserved" nature specified for Intel. > > Lets just go with this. Done. But before sending v2, just to be clear: The group check which you also didn't like won't go away. That's because if we didn't do it, we'd hide all CPUID info outside the basic and extended group, in particular (in case we run virtualized ourselves) and leaves coming from the lower level hypervisor (most notably our own ones, if it's another Xen underneath). Jan ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel
Re: [Xen-devel] [PATCH 2/3] mini-os: add testbuild target to Makefile
On 03/09/16 02:41, Samuel Thibault wrote: > Juergen Gross, on Fri 02 Sep 2016 10:56:46 +0200, wrote: >> Add a "testbuild" target to the Makefile to test building a set of >> pre-defined configurations. >> >> Configurations tested are stored under arch//testbuild in form >> of configuration files. All configurations found there are built in >> a local directory. > > Please also document just above the CONFIG_* lines in Config.mk that new > CONFIG options should be set in all-* testbuilds. Okay, will do. > >> Signed-off-by: Juergen Gross > > Reviewed-by: Samuel Thibault Thanks, Juergen ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel
[Xen-devel] [PATCH v6] xen/sm{e, a}p: allow disabling sm{e, a}p for Xen itself
SMEP/SMAP is a security feature to prevent kernel executing/accessing user address involuntarily, any such behavior will lead to a page fault. SMEP/SMAP is open (in CR4) for both Xen and HVM guest in earlier code. SMEP/SMAP bit set in Xen CR4 would enforce security checking for 32-bit PV guest which will suffer unknown SMEP/SMAP page fault when guest kernel attempt to access user address although SMEP/SMAP is close for PV guests. This patch introduces a new boot option value "hvm" for "sm{e,a}p", it is going to diable SMEP/SMAP for Xen hypervisor while enable them for HVM. In this way, 32-bit PV guest will not suffer SMEP/SMAP security issue. Users can choose whether open SMEP/SMAP for Xen itself, especially when they are going to run 32-bit PV guests. Signed-off-by: He Chen --- Changes in v6: * fix sm{e,a}p parameters parser flow. Changes in v5: * refine sm{e,a}p parameters parser flow. * replace cpu_has_sm{e,a}p with boot_cpu_has(X86_FEATURE_XEN_SM{E,A}P). * refine docs. Changes in v4: * introduce 2 new synthetic features X86_FEATURE_XEN_SMEP and X86_FEATURE_XEN_SMAP for Xen itself. * adjust SM{E,A}P related instruction patching code. * commit message refinement. Changes in v3: * fix boot options. * fix CR4 & mmu_cr4_features operations. * disable SMEP/SMAP for Dom0. * commit message refinement. Changes in v2: * allow "hvm" as a value to "smep" and "smap" command line options. * clear SMEP/SMAP CPUID bits for pv guests if they are set to hvm only. * refine docs. * rewrite commit message. --- docs/misc/xen-command-line.markdown | 2 + xen/arch/x86/setup.c| 76 +++-- xen/include/asm-x86/asm_defns.h | 10 ++--- xen/include/asm-x86/cpufeature.h| 4 +- 4 files changed, 73 insertions(+), 19 deletions(-) diff --git a/docs/misc/xen-command-line.markdown b/docs/misc/xen-command-line.markdown index 3a250cb..0225974 100644 --- a/docs/misc/xen-command-line.markdown +++ b/docs/misc/xen-command-line.markdown @@ -1433,6 +1433,7 @@ Set the serial transmit buffer size. > Default: `true` Flag to enable Supervisor Mode Execution Protection +Use `smep=hvm` to allow SMEP use by HVM guests only. ### smap > `= ` @@ -1440,6 +1441,7 @@ Flag to enable Supervisor Mode Execution Protection > Default: `true` Flag to enable Supervisor Mode Access Prevention +Use `smap=hvm` to allow SMAP use by HVM guests only. ### snb\_igd\_quirk > `= | cap | ` diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index 217c775..3c41715 100644 --- a/xen/arch/x86/setup.c +++ b/xen/arch/x86/setup.c @@ -61,14 +61,6 @@ boolean_param("nosmp", opt_nosmp); static unsigned int __initdata max_cpus; integer_param("maxcpus", max_cpus); -/* smep: Enable/disable Supervisor Mode Execution Protection (default on). */ -static bool_t __initdata opt_smep = 1; -boolean_param("smep", opt_smep); - -/* smap: Enable/disable Supervisor Mode Access Prevention (default on). */ -static bool_t __initdata opt_smap = 1; -boolean_param("smap", opt_smap); - unsigned long __read_mostly cr4_pv32_mask; /* Boot dom0 in pvh mode */ @@ -111,6 +103,62 @@ struct cpuinfo_x86 __read_mostly boot_cpu_data = { 0, 0, 0, 0, -1 }; unsigned long __read_mostly mmu_cr4_features = XEN_MINIMAL_CR4; +/* smep: Enable/disable Supervisor Mode Execution Protection (default on). */ +#define SMEP_HVM_ONLY (-1) +static s8 __initdata opt_smep = 1; +static void __init parse_smep_param(char *s) +{ +if ( !*s ) +{ +opt_smep = 1; +return; +} + +switch ( parse_bool(s) ) +{ +case 0: +opt_smep = 0; +return; +case 1: +opt_smep = 1; +return; +} + +if ( !strcmp(s, "hvm") ) +{ +opt_smep = SMEP_HVM_ONLY; +} +} +custom_param("smep", parse_smep_param); + +/* smap: Enable/disable Supervisor Mode Access Prevention (default on). */ +#define SMAP_HVM_ONLY (-1) +static s8 __initdata opt_smap = 1; +static void __init parse_smap_param(char *s) +{ +if ( !*s ) +{ +opt_smap = 1; +return; +} + +switch ( parse_bool(s) ) +{ +case 0: +opt_smap = 0; +return; +case 1: +opt_smap = 1; +return; +} + +if ( !strcmp(s, "hvm") ) +{ +opt_smap = SMAP_HVM_ONLY; +} +} +custom_param("smap", parse_smap_param); + bool_t __read_mostly acpi_disabled; bool_t __initdata acpi_force; static char __initdata acpi_param[10] = ""; @@ -1403,12 +1451,16 @@ void __init noreturn __start_xen(unsigned long mbi_p) if ( !opt_smep ) setup_clear_cpu_cap(X86_FEATURE_SMEP); -if ( cpu_has_smep ) +else if ( opt_smep == 1 ) +__set_bit(X86_FEATURE_XEN_SMEP, boot_cpu_data.x86_capability); +if ( boot_cpu_has(X86_FEATURE_XEN_SMEP) ) set_in_cr4(X86_CR4_SMEP); if ( !opt_smap ) setup_clear_cpu_cap(X86_FEATURE_SMAP); -if ( cpu_has_smap ) +else if ( opt_smap == 1 ) +__set_bit(X86_FEATURE_XEN_SMAP, boot_cpu_dat
Re: [Xen-devel] [PATCH v3 4/6] Pause/Unpause the domain before/after assigning PI hooks
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Friday, September 2, 2016 9:55 PM > To: Wu, Feng > Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com; > george.dun...@eu.citrix.com; Tian, Kevin ; xen- > de...@lists.xen.org > Subject: RE: [PATCH v3 4/6] Pause/Unpause the domain before/after assigning > PI hooks > > >>> On 02.09.16 at 15:15, wrote: > > > > >> -Original Message- > >> From: Jan Beulich [mailto:jbeul...@suse.com] > >> Sent: Friday, September 2, 2016 6:46 PM > >> To: Wu, Feng > >> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com; > >> george.dun...@eu.citrix.com; Tian, Kevin ; xen- > >> de...@lists.xen.org > >> Subject: RE: [PATCH v3 4/6] Pause/Unpause the domain before/after > assigning > >> PI hooks > >> > >> >>> On 02.09.16 at 12:30, wrote: > >> > >> > > >> >> -Original Message- > >> >> From: Jan Beulich [mailto:jbeul...@suse.com] > >> >> Sent: Friday, September 2, 2016 5:26 PM > >> >> To: Wu, Feng > >> >> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com; > >> >> george.dun...@eu.citrix.com; Tian, Kevin ; xen- > >> >> de...@lists.xen.org > >> >> Subject: RE: [PATCH v3 4/6] Pause/Unpause the domain before/after > >> assigning > >> >> PI hooks > >> >> > >> >> >>> On 02.09.16 at 10:40, wrote: > >> >> > >> >> > > >> >> >> -Original Message- > >> >> >> From: Jan Beulich [mailto:jbeul...@suse.com] > >> >> >> Sent: Friday, September 2, 2016 4:16 PM > >> >> >> To: Wu, Feng > >> >> >> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com; > >> >> >> george.dun...@eu.citrix.com; Tian, Kevin ; > xen- > >> >> >> de...@lists.xen.org > >> >> >> Subject: RE: [PATCH v3 4/6] Pause/Unpause the domain before/after > >> >> assigning > >> >> >> PI hooks > >> >> >> > >> >> >> >>> On 02.09.16 at 09:31, wrote: > >> >> >> > >> >> >> > > >> >> >> >> -Original Message- > >> >> >> >> From: Jan Beulich [mailto:jbeul...@suse.com] > >> >> >> >> Sent: Friday, September 2, 2016 3:04 PM > >> >> >> >> To: Wu, Feng > >> >> >> >> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com; > >> >> >> >> george.dun...@eu.citrix.com; Tian, Kevin ; > >> xen- > >> >> >> >> de...@lists.xen.org > >> >> >> >> Subject: RE: [PATCH v3 4/6] Pause/Unpause the domain > before/after > >> >> >> assigning > >> >> >> >> PI hooks > >> >> >> >> > >> >> >> >> >>> On 02.09.16 at 03:46, wrote: > >> >> >> >> > >> >> >> >> > > >> >> >> >> >> -Original Message- > >> >> >> >> >> From: Jan Beulich [mailto:jbeul...@suse.com] > >> >> >> >> >> Sent: Thursday, September 1, 2016 4:30 PM > >> >> >> >> >> To: Wu, Feng > >> >> >> >> >> Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com; > >> >> >> >> >> george.dun...@eu.citrix.com; Tian, Kevin > ; > >> >> xen- > >> >> >> >> >> de...@lists.xen.org > >> >> >> >> >> Subject: Re: [PATCH v3 4/6] Pause/Unpause the domain > >> before/after > >> >> >> >> assigning > >> >> >> >> >> PI hooks > >> >> >> >> >> > >> >> >> >> >> >>> On 31.08.16 at 05:56, wrote: > >> >> >> >> >> > --- a/xen/arch/x86/hvm/vmx/vmx.c > >> >> >> >> >> > +++ b/xen/arch/x86/hvm/vmx/vmx.c > >> >> >> >> >> > @@ -219,8 +219,19 @@ void vmx_pi_hooks_assign(struct > domain > >> *d) > >> >> >> >> >> > > >> >> >> >> >> > ASSERT(!d->arch.hvm_domain.vmx.vcpu_block); > >> >> >> >> >> > > >> >> >> >> >> > +/* > >> >> >> >> >> > + * Pausing the domain can make sure the vCPU is not > >> >> >> >> >> > + * running and hence calling the hooks simultaneously > >> >> >> >> >> > + * when deassigning the PI hooks. This makes sure that > >> >> >> >> >> > + * all the appropriate state of PI descriptor is > >> >> >> >> >> > actually > >> >> >> >> >> > + * set up for all vCPus before leaving this function. > >> >> >> >> >> > + */ > >> >> >> >> >> > +domain_pause(d); > >> >> >> >> >> > + > >> >> >> >> >> > d->arch.hvm_domain.vmx.vcpu_block = vmx_vcpu_block; > >> >> >> >> >> > d->arch.hvm_domain.vmx.pi_do_resume = > vmx_pi_do_resume; > >> >> >> >> >> > + > >> >> >> >> >> > +domain_unpause(d); > >> >> >> >> >> > } > >> >> >> >> >> > >> >> >> >> >> First of all I'm missing a word on whether the race mentioned > >> >> >> >> >> in > >> >> >> >> >> the description and comment can actually happen. Device > >> >> >> >> >> (de)assignment should already be pretty much serialized (via > >> >> >> >> >> the domctl lock, and maybe also via the pcidevs one). > >> >> >> >> > > >> >> >> >> > The purpose of this patch is to address the race condition that > >> >> >> >> > the _vCPU_ is running while we are installing these hooks. Do > >> >> >> >> > you > >> >> >> >> > think this cannot happen? This patch is trying to fix the issue > >> >> >> >> > described at: > >> >> >> >> > http://www.gossamer-threads.com/lists/xen/devel/433229 > >> >> >> >> > Consider that the other two hooks were installed when the VM > >> >> >> >> > is created, seems no such race condition. However, according > >> >> >> >> > to the discussion about pa
Re: [Xen-devel] [PATCH linux v3 3/9] xen: introduce xen_vcpu_id mapping
On 09/02/2016 11:29 AM, Julien Grall wrote: > >> diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c >> index 0f87db2..c833912 100644 >> --- a/arch/x86/xen/enlighten.c >> +++ b/arch/x86/xen/enlighten.c >> @@ -1795,6 +1806,12 @@ static void __init init_hvm_pv_info(void) >> >> xen_setup_features(); >> >> +cpuid(base + 4, &eax, &ebx, &ecx, &edx); >> +if (eax & XEN_HVM_CPUID_VCPU_ID_PRESENT) >> +this_cpu_write(xen_vcpu_id, ebx); >> +else >> +this_cpu_write(xen_vcpu_id, smp_processor_id()); >> + >> pv_info.name = "Xen HVM"; >> >> xen_domain_type = XEN_HVM_DOMAIN; >> @@ -1806,6 +1823,10 @@ static int xen_hvm_cpu_notify(struct >> notifier_block *self, unsigned long action, >> int cpu = (long)hcpu; >> switch (action) { >> case CPU_UP_PREPARE: >> +if (cpu_acpi_id(cpu) != U32_MAX) >> +per_cpu(xen_vcpu_id, cpu) = cpu_acpi_id(cpu); >> +else >> +per_cpu(xen_vcpu_id, cpu) = cpu; > > I have not tried myself. But looking at the code, the notifiers > xen_hvm_cpu_notifier and evtchn_fifo_cpu_notifier have the same > priority. So what does prevent the code above to be executed after the > event channel callback? We will be converting to new hotplug state machine where this order will be guaranteed: https://lists.xenproject.org/archives/html/xen-devel/2016-08/msg01914.html -boris ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel
[Xen-devel] [xen-unstable-coverity test] 100750: all pass - PUSHED
flight 100750 xen-unstable-coverity real [real] http://logs.test-lab.xenproject.org/osstest/logs/100750/ Perfect :-) All tests in this flight passed as required version targeted for testing: xen 158dd1bdca161a6456ee6be293969f87ecde3922 baseline version: xen 4b314c89be24c26abfad47900f806cebeafc805e Last test of basis 100676 2016-08-31 09:19:26 Z4 days Testing same since 100750 2016-09-04 09:19:37 Z0 days1 attempts People who touched revisions under test: Andrew Cooper Dario Faggioli Feng Wu George Dunlap Ian Jackson Jan Beulich Juergen Gross Julien Grall Razvan Cojocaru Tim Deegan Wei Liu jobs: coverity-amd64 pass sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Pushing revision : + branch=xen-unstable-coverity + revision=158dd1bdca161a6456ee6be293969f87ecde3922 + . ./cri-lock-repos ++ . ./cri-common +++ . ./cri-getconfig +++ umask 002 +++ getrepos getconfig Repos perl -e ' use Osstest; readglobalconfig(); print $c{"Repos"} or die $!; ' +++ local repos=/home/osstest/repos +++ '[' -z /home/osstest/repos ']' +++ '[' '!' -d /home/osstest/repos ']' +++ echo /home/osstest/repos ++ repos=/home/osstest/repos ++ repos_lock=/home/osstest/repos/lock ++ '[' x '!=' x/home/osstest/repos/lock ']' ++ OSSTEST_REPOS_LOCK_LOCKED=/home/osstest/repos/lock ++ exec with-lock-ex -w /home/osstest/repos/lock ./ap-push xen-unstable-coverity 158dd1bdca161a6456ee6be293969f87ecde3922 + branch=xen-unstable-coverity + revision=158dd1bdca161a6456ee6be293969f87ecde3922 + . ./cri-lock-repos ++ . ./cri-common +++ . ./cri-getconfig +++ umask 002 +++ getrepos getconfig Repos perl -e ' use Osstest; readglobalconfig(); print $c{"Repos"} or die $!; ' +++ local repos=/home/osstest/repos +++ '[' -z /home/osstest/repos ']' +++ '[' '!' -d /home/osstest/repos ']' +++ echo /home/osstest/repos ++ repos=/home/osstest/repos ++ repos_lock=/home/osstest/repos/lock ++ '[' x/home/osstest/repos/lock '!=' x/home/osstest/repos/lock ']' + . ./cri-common ++ . ./cri-getconfig ++ umask 002 + select_xenbranch + case "$branch" in + tree=xen + xenbranch=xen-unstable-coverity + qemuubranch=qemu-upstream-unstable-coverity + qemuubranch=qemu-upstream-unstable + '[' xxen = xlinux ']' + linuxbranch= + '[' xqemu-upstream-unstable = x ']' + select_prevxenbranch ++ ./cri-getprevxenbranch xen-unstable-coverity + prevxenbranch=xen-4.7-testing + '[' x158dd1bdca161a6456ee6be293969f87ecde3922 = x ']' + : tested/2.6.39.x + . ./ap-common ++ : osst...@xenbits.xen.org +++ getconfig OsstestUpstream +++ perl -e ' use Osstest; readglobalconfig(); print $c{"OsstestUpstream"} or die $!; ' ++ : ++ : git://xenbits.xen.org/xen.git ++ : osst...@xenbits.xen.org:/home/xen/git/xen.git ++ : git://xenbits.xen.org/qemu-xen-traditional.git ++ : git://git.kernel.org ++ : git://git.kernel.org/pub/scm/linux/kernel/git ++ : git ++ : git://xenbits.xen.org/libvirt.git ++ : osst...@xenbits.xen.org:/home/xen/git/libvirt.git ++ : git://xenbits.xen.org/libvirt.git ++ : git://xenbits.xen.org/rumpuser-xen.git ++ : git ++ : git://xenbits.xen.org/rumpuser-xen.git ++ : osst...@xenbits.xen.org:/home/xen/git/rumpuser-xen.git +++ besteffort_repo https://github.com/rumpkernel/rumpkernel-netbsd-src +++ local repo=https://github.com/rumpkernel/rumpkernel-netbsd-src +++ cached_repo https://github.com/rumpkernel/rumpkernel-netbsd-src '[fetch=try]' +++ local repo=https://github.com/rumpkernel/rumpkernel-netbsd-src +++ local 'options=[fetch=try]' getconfig GitCacheProxy perl -e ' use Osstest; readglobalconfig(); print $c{"GitCacheProxy"} or die $!; ' +++ local cache=git://cache:9419/ +++ '[' xgit://cache:9419/ '!=' x ']' +++ echo 'git://cache:9419/https://github.com/rumpkernel/rumpkernel-netbsd-src%20[fetch=try]' ++ : 'git://cache:9419/https://github.com/rumpkernel/rumpkernel-netbsd-src%20[fetch=try]' ++ : git ++ : git://git.seabios.org/seabios.git ++ : osst...@xenbits.xen.org:/home/xen/git/osstest/seabios.git ++ : git://xenbits.xen.org/osstest/seabios.git ++ : https://github.com/tianocore/edk2.git ++ : osst...@xenbits.xen.org:/home/xen/git/osstest/ovmf.git
[Xen-devel] [ovmf baseline-only test] 67636: all pass
This run is configured for baseline tests only. flight 67636 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67636/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 11eaa7affb8b325b3e00bbe9e4357705ce3b2b08 baseline version: ovmf 72092534a9283291edd6b497c9aa934049c4b928 Last test of basis67632 2016-09-03 05:52:56 Z1 days Testing same since67636 2016-09-04 07:48:42 Z0 days1 attempts People who touched revisions under test: Yonghong Zhu jobs: build-amd64-xsm pass build-i386-xsm pass build-amd64 pass build-i386 pass build-amd64-libvirt pass build-i386-libvirt pass build-amd64-pvopspass build-i386-pvops pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xs.citrite.net/~osstest/testlogs/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Push not applicable. commit 11eaa7affb8b325b3e00bbe9e4357705ce3b2b08 Author: Yonghong Zhu Date: Thu Sep 1 17:02:43 2016 +0800 BaseTools: Change source files to DOS format Cc: Liming Gao Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Yonghong Zhu Reviewed-by: Liming Gao ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel
[Xen-devel] [xen-unstable test] 100748: tolerable trouble: blocked/broken/fail/pass
flight 100748 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/100748/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-libvirt 3 host-install(3) broken in 100745 pass in 100748 test-amd64-i386-libvirt 3 host-install(3) broken pass in 100745 test-amd64-amd64-xl-rtds 6 xen-boot fail in 100745 pass in 100748 test-amd64-i386-xl-qemut-debianhvm-amd64 9 debian-hvm-install fail in 100745 pass in 100748 test-armhf-armhf-xl 7 host-ping-check-xenfail pass in 100745 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-rtds 9 debian-install fail like 100738 build-amd64-rumpuserxen 6 xen-buildfail like 100745 build-i386-rumpuserxen6 xen-buildfail like 100745 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 100745 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail like 100745 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stopfail like 100745 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail like 100745 Tests which did not succeed, but are not blocking: test-amd64-i386-rumpuserxen-i386 1 build-check(1) blocked n/a test-amd64-amd64-rumpuserxen-amd64 1 build-check(1) blocked n/a test-amd64-i386-libvirt 12 migrate-support-check fail in 100745 never pass test-armhf-armhf-xl 12 migrate-support-check fail in 100745 never pass test-armhf-armhf-xl 13 saverestore-support-check fail in 100745 never pass test-amd64-amd64-xl-pvh-amd 11 guest-start fail never pass test-amd64-amd64-libvirt-xsm 12 migrate-support-checkfail never pass test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-armhf-armhf-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-libvirt 14 guest-saverestorefail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-checkfail never pass test-armhf-armhf-xl-xsm 12 migrate-support-checkfail never pass test-armhf-armhf-xl-credit2 12 migrate-support-checkfail never pass test-armhf-armhf-xl-credit2 13 saverestore-support-checkfail never pass test-armhf-armhf-xl-xsm 13 saverestore-support-checkfail never pass test-armhf-armhf-xl-cubietruck 12 migrate-support-checkfail never pass test-armhf-armhf-xl-cubietruck 13 saverestore-support-checkfail never pass test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2 fail never pass test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail never pass test-armhf-armhf-libvirt-xsm 14 guest-saverestorefail never pass test-amd64-i386-libvirt-xsm 12 migrate-support-checkfail never pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-amd64-amd64-xl-pvh-intel 11 guest-start fail never pass test-armhf-armhf-xl-vhd 11 migrate-support-checkfail never pass test-armhf-armhf-xl-vhd 12 saverestore-support-checkfail never pass test-armhf-armhf-xl-arndale 12 migrate-support-checkfail never pass test-armhf-armhf-xl-arndale 13 saverestore-support-checkfail never pass test-armhf-armhf-xl-multivcpu 12 migrate-support-checkfail never pass test-armhf-armhf-xl-multivcpu 13 saverestore-support-checkfail never pass test-armhf-armhf-libvirt-raw 11 migrate-support-checkfail never pass test-armhf-armhf-libvirt-raw 13 guest-saverestorefail never pass test-armhf-armhf-libvirt-qcow2 11 migrate-support-checkfail never pass test-armhf-armhf-libvirt-qcow2 13 guest-saverestorefail never pass test-armhf-armhf-xl-rtds 12 migrate-support-checkfail never pass test-armhf-armhf-xl-rtds 13 saverestore-support-checkfail never pass version targeted for testing: xen 158dd1bdca161a6456ee6be293969f87ecde3922 baseline version: xen 158dd1bdca161a6456ee6be293969f87ecde3922 Last test of basis 100748 2016-09-04 01:59:01 Z0 days Testing same since0 1970-01-01 00:00:00 Z 17048 days0 attempts jobs: build-amd64-xsm pass build-armhf-xsm pass build-i386-xsm pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass bu
[Xen-devel] [ovmf test] 100749: all pass - PUSHED
flight 100749 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/100749/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 11eaa7affb8b325b3e00bbe9e4357705ce3b2b08 baseline version: ovmf 72092534a9283291edd6b497c9aa934049c4b928 Last test of basis 100743 2016-09-03 03:47:36 Z1 days Testing same since 100749 2016-09-04 05:45:45 Z0 days1 attempts People who touched revisions under test: Yonghong Zhu jobs: build-amd64-xsm pass build-i386-xsm pass build-amd64 pass build-i386 pass build-amd64-libvirt pass build-i386-libvirt pass build-amd64-pvopspass build-i386-pvops pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Pushing revision : + branch=ovmf + revision=11eaa7affb8b325b3e00bbe9e4357705ce3b2b08 + . ./cri-lock-repos ++ . ./cri-common +++ . ./cri-getconfig +++ umask 002 +++ getrepos getconfig Repos perl -e ' use Osstest; readglobalconfig(); print $c{"Repos"} or die $!; ' +++ local repos=/home/osstest/repos +++ '[' -z /home/osstest/repos ']' +++ '[' '!' -d /home/osstest/repos ']' +++ echo /home/osstest/repos ++ repos=/home/osstest/repos ++ repos_lock=/home/osstest/repos/lock ++ '[' x '!=' x/home/osstest/repos/lock ']' ++ OSSTEST_REPOS_LOCK_LOCKED=/home/osstest/repos/lock ++ exec with-lock-ex -w /home/osstest/repos/lock ./ap-push ovmf 11eaa7affb8b325b3e00bbe9e4357705ce3b2b08 + branch=ovmf + revision=11eaa7affb8b325b3e00bbe9e4357705ce3b2b08 + . ./cri-lock-repos ++ . ./cri-common +++ . ./cri-getconfig +++ umask 002 +++ getrepos getconfig Repos perl -e ' use Osstest; readglobalconfig(); print $c{"Repos"} or die $!; ' +++ local repos=/home/osstest/repos +++ '[' -z /home/osstest/repos ']' +++ '[' '!' -d /home/osstest/repos ']' +++ echo /home/osstest/repos ++ repos=/home/osstest/repos ++ repos_lock=/home/osstest/repos/lock ++ '[' x/home/osstest/repos/lock '!=' x/home/osstest/repos/lock ']' + . ./cri-common ++ . ./cri-getconfig ++ umask 002 + select_xenbranch + case "$branch" in + tree=ovmf + xenbranch=xen-unstable + '[' xovmf = xlinux ']' + linuxbranch= + '[' x = x ']' + qemuubranch=qemu-upstream-unstable + select_prevxenbranch ++ ./cri-getprevxenbranch xen-unstable + prevxenbranch=xen-4.7-testing + '[' x11eaa7affb8b325b3e00bbe9e4357705ce3b2b08 = x ']' + : tested/2.6.39.x + . ./ap-common ++ : osst...@xenbits.xen.org +++ getconfig OsstestUpstream +++ perl -e ' use Osstest; readglobalconfig(); print $c{"OsstestUpstream"} or die $!; ' ++ : ++ : git://xenbits.xen.org/xen.git ++ : osst...@xenbits.xen.org:/home/xen/git/xen.git ++ : git://xenbits.xen.org/qemu-xen-traditional.git ++ : git://git.kernel.org ++ : git://git.kernel.org/pub/scm/linux/kernel/git ++ : git ++ : git://xenbits.xen.org/libvirt.git ++ : osst...@xenbits.xen.org:/home/xen/git/libvirt.git ++ : git://xenbits.xen.org/libvirt.git ++ : git://xenbits.xen.org/rumpuser-xen.git ++ : git ++ : git://xenbits.xen.org/rumpuser-xen.git ++ : osst...@xenbits.xen.org:/home/xen/git/rumpuser-xen.git +++ besteffort_repo https://github.com/rumpkernel/rumpkernel-netbsd-src +++ local repo=https://github.com/rumpkernel/rumpkernel-netbsd-src +++ cached_repo https://github.com/rumpkernel/rumpkernel-netbsd-src '[fetch=try]' +++ local repo=https://github.com/rumpkernel/rumpkernel-netbsd-src +++ local 'options=[fetch=try]' getconfig GitCacheProxy perl -e ' use Osstest; readglobalconfig(); print $c{"GitCacheProxy"} or die $!; ' +++ local cache=git://cache:9419/ +++ '[' xgit://cache:9419/ '!=' x ']' +++ echo 'git://cache:9419/https://github.com/rumpkernel/rumpkernel-netbsd-src%20[fetch=try]' ++ : 'git://cache: