[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen-unstable-smoke test] 122640: trouble: blocked/broken/pass
flight 122640 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/122640/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm <job status> broken build-arm64-xsm 4 host-install(4) broken REGR. vs. 122635 Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13 migrate-support-check fail never pass test-armhf-armhf-xl 13 migrate-support-check fail never pass test-armhf-armhf-xl 14 saverestore-support-check fail never pass version targeted for testing: xen f78c8322850dbe3dbe9cd828ee00767190529100 baseline version: xen 3abe241190af31760c506a9f32bf25e958ea060c Last test of basis 122635 2018-05-07 10:01:00 Z 0 days Testing same since 122636 2018-05-07 12:00:28 Z 0 days 2 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Juergen Gross <jgross@xxxxxxxx> jobs: build-arm64-xsm broken build-amd64 pass build-armhf pass build-amd64-libvirt pass test-armhf-armhf-xl pass test-arm64-arm64-xl-xsm blocked test-amd64-amd64-xl-qemuu-debianhvm-i386 pass test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary broken-job build-arm64-xsm broken broken-step build-arm64-xsm host-install(4) Not pushing. ------------------------------------------------------------ commit f78c8322850dbe3dbe9cd828ee00767190529100 Author: Juergen Gross <jgross@xxxxxxxx> Date: Mon May 7 12:16:05 2018 +0200 doc: add credit2_cap_period_ms boot parameter description credit2_cap_period_ms isn't mentioned in xen-command-line.markdown. Add a description. Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 4d1b32e10dd25dc9ed6714c5e245f60a4473665c Author: Juergen Gross <jgross@xxxxxxxx> Date: Mon May 7 12:16:04 2018 +0200 doc: add architecture qualifier to boot parameter entries Many of the architecture specific boot parameters are not qualified as such. Correct that. Reorder PKU to be alphabetical. Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 589263031c04e2ba527783b4e04e8df27d364769 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Mar 20 19:36:40 2018 +0000 x86/pv: Hide more EFER bits from PV guests We don't advertise SVM in CPUID so a PV guest shouldn't be under the impression that it can use SVM functionality, but despite this, it really shouldn't see SVME set when reading EFER. On Intel processors, 32bit PV guests don't see, and can't use SYSCALL. Introduce EFER_KNOWN_MASK to whitelist the features Xen knows about, and use this to clamp the guests view. Take the opportunity to reuse the mask to simplify svm_vmcb_isvalid(), and change "undefined" to "unknown" in the print message, as there is at least EFER.TCE (Translation Cache Extension) defined but unknown to Xen. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> (qemu changes not included) _______________________________________________ osstest-output mailing list osstest-output@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/osstest-output
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |