[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable-smoke test] 130530: trouble: blocked/broken/pass
flight 130530 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130530/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm <job status> broken build-arm64-xsm 4 host-install(4) broken REGR. vs. 130289 Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13 migrate-support-check fail never pass test-armhf-armhf-xl 13 migrate-support-check fail never pass test-armhf-armhf-xl 14 saverestore-support-check fail never pass version targeted for testing: xen 73ee5574084b9bfa6194c1096cb1e4ce76fedb3f baseline version: xen 901abfef5de149546b16fba6f4d5bd7def08c672 Last test of basis 130289 2018-11-17 11:00:36 Z 2 days Failing since 130490 2018-11-19 09:00:27 Z 0 days 4 attempts Testing same since 130530 2018-11-19 17:03:29 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-arm64-xsm broken build-amd64 pass build-armhf pass build-amd64-libvirt pass test-armhf-armhf-xl pass test-arm64-arm64-xl-xsm blocked test-amd64-amd64-xl-qemuu-debianhvm-i386 pass test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary broken-job build-arm64-xsm broken broken-step build-arm64-xsm host-install(4) Not pushing. ------------------------------------------------------------ commit 73ee5574084b9bfa6194c1096cb1e4ce76fedb3f Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Nov 19 13:03:02 2018 +0000 libx86: Work around GCC being unable to spill the PIC hard register Versions of GCC before 5 can't compile cpuid.c, and fail with the rather cryptic: In file included from lib/x86/cpuid.c:3:0: lib/x86/cpuid.c: In function ‘x86_cpuid_policy_fill_native’: include/xen/lib/x86/cpuid.h:25:5: error: inconsistent operand constraints in an ‘asm’ asm ( "cpuid" ^ See https://gcc.gnu.org/bugzilla/show_bug.cgi?id=54232 for more details. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 86d47adcd3c4f494456a3d6ee06e941b132e3eb2 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Fri Dec 1 13:29:36 2017 +0000 x86/msr: Handle MSR_AMD64_DR{0-3}_ADDRESS_MASK in the new MSR infrastructure This is a followup to c/s 96f235c26 which fulfils the remaining TODO item. First of all, the pre-existing SVM code has a bug. The value in msrs->dr_mask[] may be stale, as we allow direct access to these MSRs. Resolve this in guest_rdmsr() by reading directly from hardware in the affected case. With the reading/writing logic moved to the common guest_{rd,wr}msr() infrastructure, the migration logic can be simplified. The PV migration logic drops all of its special casing, and SVM's entire {init,save,load}_msr() infrastructure becomes unnecessary. The resulting diffstat shows quite how expensive the PV special cases where in arch_do_domctl(). add/remove: 0/3 grow/shrink: 4/6 up/down: 465/-1494 (-1029) Function old new delta guest_rdmsr 252 484 +232 guest_wrmsr 653 822 +169 msrs_to_send 8 48 +40 hvm_load_cpu_msrs 489 513 +24 svm_init_msr 21 - -21 hvm_save_cpu_msrs 365 343 -22 read_msr 1089 1001 -88 write_msr 1829 1689 -140 svm_msr_read_intercept 1124 970 -154 svm_load_msr 195 - -195 svm_save_msr 196 - -196 svm_msr_write_intercept 1461 1265 -196 arch_do_domctl 9581 9099 -482 Total: Before=3314610, After=3313581, chg -0.03% Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 59e087bf6a9c8ad805294c32dfd7c77068d81eff Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Sep 6 11:42:34 2018 +0000 xen/keyhandler: Drop keyhandler_scratch With almost all users of keyhandler_scratch gone, clean up the 3 remaining users and drop the buffer. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 30311d2e82a3eb69aa1667382a6b2529f6d944c4 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Fri Nov 16 18:58:55 2018 +0000 x86: fix efi.lds dependency generation RANDCONFIG builds discover efi.lds is not updated when autogenerated headers are updated. Upon inspection, the generated .d file contains xen.lds.o as target, not the once thought efi.lds.o. That's because gcc disregards the output object name specified by -o when generating dependency, so the sed invocation has no effect. Arguably that's a bug in gcc, which can be fixed at some point, so we make the sed rune work with *.lds. At the same time replace the hardcoded sed rune for xen.lds with the new one. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit e9c4574d8156b537067d47bc4362cde7174cc3d7 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Mon Nov 19 10:03:54 2018 +0000 Config.mk: update seabios This new release contains a fix for building legacy acpi tables with newer iasl, which we want. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit d95da91fb497d8583826f673f9325e73a7514277 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Nov 19 09:41:25 2018 +0100 x86/HVM: grow MMIO cache data size to 64 bytes This is needed before enabling any AVX512 insns in the emulator. Change the way alignment is enforced at the same time. Add a check that the buffer won't actually overflow, and while at it also convert the check for accesses to not cross page boundaries. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |