[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 77400: trouble: blocked/broken/pass



flight 77400 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77400/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf                   3 host-install(3)         broken REGR. vs. 77380

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  03809ae77daf17a7e3104019758aa4c4b23b631c
baseline version:
 xen                  68778eeaa3babedba9677400f63f1e7564bba561

Last test of basis    77380  2016-01-07 14:00:56 Z    0 days
Testing same since    77400  2016-01-07 16:02:20 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Doug Goldstein <cardoe@xxxxxxxxxx>
  Feng Wu <feng.wu@xxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Joshua Otto <jtotto@xxxxxxxxxxxx>
  Kevin Tian <kevin.tian@xxxxxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  broken  
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-step build-armhf host-install(3)

Not pushing.

------------------------------------------------------------
commit 03809ae77daf17a7e3104019758aa4c4b23b631c
Author: Paul Durrant <paul.durrant@xxxxxxxxxx>
Date:   Thu Jan 7 15:28:33 2016 +0100

    public/io/netif.h: document transmit and receive wire formats separately
    
    Currently there is no documented wire format for guest receive-side
    packets but the location of the 'wire format' comment block suggests
    it is the same as transmit-side. This is almost true but there is a
    subtle difference in the use of the 'size' field for the first fragment.
    
    For clarity this patch creates separate comment blocks for receive
    and transmit side packet wire formats, tries to be more clear about the
    distinction between 'fragments' and 'extras', and documents the subtlety
    concerning the size field of the first fragment.
    
    Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>

commit 9c419ee77f3e6c3a90a4a08c8682b4216bed8cb0
Author: Joshua Otto <jtotto@xxxxxxxxxxxx>
Date:   Thu Jan 7 15:28:08 2016 +0100

    credit: remove pointless local variable initialization
    
    Coverity CID 1343301
    
    No functional changes.
    
    Signed-off-by: Joshua Otto <jtotto@xxxxxxxxxxxx>

commit 373c3cf6dd0674fc2aa95f7db6b9add851817076
Author: Doug Goldstein <cardoe@xxxxxxxxxx>
Date:   Thu Jan 7 15:27:43 2016 +0100

    remove dups in x86 and x86_64 variables
    
    Currently the Xen build uses x86 and x86_64 variables as well as
    CONFIG_X86 and CONFIG_X86_64. This just removes the duplication. The
    CONFIG_ variables are now managed by Kconfig but existed previously so
    this duplication existed prior to the Kconfig migration.
    
    Signed-off-by: Doug Goldstein <cardoe@xxxxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Feng Wu <feng.wu@xxxxxxxxx>
    
    $(CONFIG_X86_64) -> y in x86 makefiles.
    $(CONFIG_X86_64) -> $(CONFIG_X86) in non-x86 makefiles.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

commit fb424bf6b5b0df0155ab4e56a1b8f67e6470fa46
Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
Date:   Thu Jan 7 15:27:16 2016 +0100

    x86/VPMU: don't allow any non-zero writes to MSR_IA32_PEBS_ENABLE
    
    Calculation reserved bits for MSR_IA32_PEBS_ENABLE is model-dependent
    and since we don't support PEBS anyway we shouldn't allow any writes to
    it (but let's still permit guests wishing to disable PEBS).
    
    We should also report PEBS as unsupported to HVM, just like we do on PV.
    
    Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>

commit 31af0d76759328161cb5db73b50b23dded51e15c
Author: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
Date:   Thu Jan 7 15:26:37 2016 +0100

    x86/VPMU: check more carefully which bits are allowed to be written to MSRs
    
    Current Intel VPMU emulation needs to perform more checks when writing
    PMU MSRs on guest's behalf:
    * MSR_CORE_PERF_GLOBAL_CTRL is not checked at all
    * MSR_CORE_PERF_FIXED_CTR_CTRL has more reserved bits in PMU version 2
    * MSR_CORE_PERF_GLOBAL_OVF_CTRL's bit 61 is allowed on versions greater
    * than 2.
    
    We can also use precomputed mask in core2_vpmu_do_interrupt().
    
    Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>

commit 2b2ab5d88b2d2ab0155101a0a6922025064061af
Author: Doug Goldstein <cardoe@xxxxxxxxxx>
Date:   Thu Jan 7 15:25:58 2016 +0100

    convert XSM_ENABLE to Kconfig
    
    Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM
    within Kconfig. This also re-adds the dependency of CONFIG_FLASK on
    CONFIG_XSM.
    
    Signed-off-by: Doug Goldstein <cardoe@xxxxxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>

commit b36bf230270baba4f0fe35b230ea8b80ebb2c4a7
Author: Doug Goldstein <cardoe@xxxxxxxxxx>
Date:   Thu Jan 7 15:18:45 2016 +0100

    convert FLASK_ENABLE to Kconfig
    
    Converts the Config.mk option of FLASK_ENABLE into a Kconfig option for
    the hypervisor called CONFIG_FLASK. This commit knowingly breaks the
    dependent relationship on XSM_ENABLE which is addressed when XSM_ENABLE
    is converted to Kconfig.
    
    Signed-off-by: Doug Goldstein <cardoe@xxxxxxxxxx>
    Acked-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>

commit c68b6fa2b68b23014f2947c2f8e331660e999c73
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Jan 7 15:15:01 2016 +0100

    x86: misc printk() adjustments
    
    - a missing newline
    - missing log levels (in Dom0-only messages)
    - one dprintk() -> printk() conversion
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.