Skip to content

[ci-scan] Mute SVE2 and Runtime_105944 tests under jitstress#128008

Draft
github-actions[bot] wants to merge 2 commits intomainfrom
ci-scan/mute-sve2-jitstress-127955-c19fb6e10359b8a1
Draft

[ci-scan] Mute SVE2 and Runtime_105944 tests under jitstress#128008
github-actions[bot] wants to merge 2 commits intomainfrom
ci-scan/mute-sve2-jitstress-127955-c19fb6e10359b8a1

Conversation

@github-actions
Copy link
Copy Markdown
Contributor

Caution

Security scanning requires review for CI Outer-Loop Failure Scanner

Details

The threat detection results could not be parsed. The workflow output should be reviewed before merging.

Review the workflow run logs for details.

Linked KBE: #127955

Mark Sve2_r, Sve2_ro, and Runtime_105944 test projects as JitOptimizationSensitive so they are skipped in JIT stress modes where they consistently crash with the FPbased assertion during SVE2 code generation on arm64.

KBE verification

  1. Same test (or test family)? Yes — Sve2_r.csproj and Sve2_ro.csproj contain the SVE2 intrinsics tests listed in the KBE (Sve2_AbsSaturate_short etc.), and Runtime_105944 contains ReorderSetGetFfr listed in the KBE.
  2. Same failure signature? Yes — Assertion failed 'FPbased' during Generate code phase.
  3. Same OS? Yes — both linux and windows arm64, matching the KBE scope.
  4. Same architecture? Yes — arm64 only, matching the KBE scope.

Reasoning

The FPbased assertion fires across multiple jitstress modes (jitstress1, jitstress2, jitstressregs8) on both linux-arm64 and windows-arm64. The following legs are affected:

  • runtime-coreclr jitstress (def 109): linux-arm64, windows-arm64
  • runtime-coreclr jitstress2-jitstressregs (def 111): linux-arm64
  • runtime-coreclr r2r-extra (def 114): linux-arm64

JitOptimizationSensitive is the appropriate muting mechanism because it excludes from all JIT stress modes that modify optimization behavior, matching the observed failure scope (MinOpts/Tier0 under stress).

Warning

Firewall blocked 1 domain

The following domain was blocked by the firewall during workflow execution:

  • dotnet.github.io

To allow these domains, add them to the network.allowed list in your workflow frontmatter:

network:
  allowed:
    - defaults
    - "dotnet.github.io"

See Network Configuration for more information.

Note

🔒 Integrity filter blocked 8 items

The following items were blocked because they don't meet the GitHub integrity level.

  • #115515 search_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".
  • #117369 search_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".
  • #6385 search_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".
  • #7141 search_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".
  • #44158 search_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".
  • #5637 search_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".
  • #122721 search_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".
  • #107929 search_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".

To allow these resources, lower min-integrity in your GitHub frontmatter:

tools:
  github:
    min-integrity: approved  # merged | approved | unapproved | none

Generated by CI Outer-Loop Failure Scanner · ● 89.5M ·

Mark Sve2_r, Sve2_ro, and Runtime_105944 as JitOptimizationSensitive to
skip them in JIT stress modes where they consistently crash with a
FPbased assertion in SVE2 code generation (#127955).

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@github-actions github-actions Bot added the area-CodeGen-coreclr CLR JIT compiler in src/coreclr/src/jit and related components such as SuperPMI label May 10, 2026
@dotnet-policy-service
Copy link
Copy Markdown
Contributor

Tagging subscribers to this area: @JulieLeeMSFT, @jakobbotsch
See info in area-owners.md if you want to be subscribed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

agentic-threat-detected agentic-workflows area-CodeGen-coreclr CLR JIT compiler in src/coreclr/src/jit and related components such as SuperPMI

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants