[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable-smoke test] 100755: regressions - FAIL
flight 100755 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/100755/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 6 xen-boot fail REGR. vs. 100736 test-amd64-amd64-libvirt 6 xen-boot fail REGR. vs. 100736 Tests which did not succeed, but are not blocking: test-armhf-armhf-xl 12 migrate-support-check fail never pass test-armhf-armhf-xl 13 saverestore-support-check fail never pass version targeted for testing: xen 7539772a65b044f326ebf9528bd40e7c6a78c540 baseline version: xen 158dd1bdca161a6456ee6be293969f87ecde3922 Last test of basis 100736 2016-09-02 16:03:32 Z 2 days Testing same since 100755 2016-09-05 11:01:49 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> He Chen <he.chen@xxxxxxxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Luwei Kang <luwei.kang@xxxxxxxxx> Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx> Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-amd64 pass build-armhf pass build-amd64-libvirt pass test-armhf-armhf-xl pass test-amd64-amd64-xl-qemuu-debianhvm-i386 fail test-amd64-amd64-libvirt fail ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 7539772a65b044f326ebf9528bd40e7c6a78c540 Author: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx> Date: Mon Sep 5 11:26:04 2016 +0200 libxl: do not assume Dom0 backend while getting nic info Fill backend_domid field based on backend path. Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Cc: Wei Liu <wei.liu2@xxxxxxxxxx> Signed-off-by: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit b2f2ced591060588a45cdc7881a7335ba42b9cc5 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Mon Sep 5 11:36:45 2016 +0100 tools/firmware: Rename bios.bin to seabios.bin bios.bin as a name is far too generic. Rename it to seabios.bin. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> [ wei: fix up conflict, rerun autogen.sh ] Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit eb502cb30cc5af309ed824da024014afca1d0fcf Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Mon Sep 5 10:21:28 2016 +0100 libxl: update flex output files for DSA 3653-2 We updated flex output files in 4b314c89 ("libxl: update flex output files") for DSA 3653-1 / CVE-2016-6354. But Debian security team discovered the fix to flex was incomplete and issued DSA 3653-2. We need to update our flex output files accordingly. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> commit 5fdea6577098eda065c794c79e1ae23f33f103af Author: He Chen <he.chen@xxxxxxxxxxxxxxx> Date: Mon Sep 5 12:49:43 2016 +0200 x86: allow disabling sm{e,a}p for Xen itself SMEP/SMAP is a security feature to prevent kernel executing/accessing user address involuntarily, any such behavior will lead to a page fault. SMEP/SMAP is open (in CR4) for both Xen and HVM guest in earlier code. SMEP/SMAP bit set in Xen CR4 would enforce security checking for 32-bit PV guest which will suffer unknown SMEP/SMAP page fault when guest kernel attempt to access user address although SMEP/SMAP is close for PV guests. This patch introduces a new boot option value "hvm" for "sm{e,a}p", it is going to diable SMEP/SMAP for Xen hypervisor while enable them for HVM. In this way, 32-bit PV guest will not suffer SMEP/SMAP security issue. Users can choose whether open SMEP/SMAP for Xen itself, especially when they are going to run 32-bit PV guests. Signed-off-by: He Chen <he.chen@xxxxxxxxxxxxxxx> [jbeulich: doc and style adjustments] Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 698d0f377d72fdc8d4e247e76b6508090c366187 Author: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> Date: Mon Sep 5 12:47:46 2016 +0200 have __DEFINE_COMPAT_HANDLE() generate const versions Both DEFINE_XEN_GUEST_HANDLE() and __DEFINE_XEN_GUEST_HANDLE() each produce both const and non-const handles, only DEFINE_COMPAT_HANDLE() does (__DEFINE_COMPAT_HANDLE() does not). This patch has __DEFINE_COMPAT_HANDLE() also produce a const handle. Suggested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit af74f65ef19450a89c1cada8214adcc9ea186307 Author: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Date: Mon Sep 5 12:47:16 2016 +0200 x86/monitor: include EAX/ECX in CPUID monitor events Extend the CPUID monitor event to include EAX and ECX values that were used when CPUID was executed. This is useful in identifying which leaf was queried. We also adjust the xen-access output format to more closely resemble the output of the Linux cpuid tool's raw format. Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Acked-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit b942c31bc1d40234922be5bee9689fe349e1d835 Author: Luwei Kang <luwei.kang@xxxxxxxxx> Date: Mon Sep 5 12:46:13 2016 +0200 x86/cpuid: AVX-512 feature detection AVX512 is an extention of AVX2. Its spec can be found at: https://software.intel.com/sites/default/files/managed/b4/3a/319433-024.pdf This patch detects AVX512 features by CPUID. Signed-off-by: Luwei Kang <luwei.kang@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |