[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 130552: trouble: blocked/broken/pass



flight 130552 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130552/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-arm64-xsm                 <job status>                 broken
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 130289

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          14 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  73ee5574084b9bfa6194c1096cb1e4ce76fedb3f
baseline version:
 xen                  901abfef5de149546b16fba6f4d5bd7def08c672

Last test of basis   130289  2018-11-17 11:00:36 Z    2 days
Failing since        130490  2018-11-19 09:00:27 Z    0 days    5 attempts
Testing same since   130530  2018-11-19 17:03:29 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

jobs:
 build-arm64-xsm                                              broken  
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-arm64-xsm broken
broken-step build-arm64-xsm host-install(4)

Not pushing.

------------------------------------------------------------
commit 73ee5574084b9bfa6194c1096cb1e4ce76fedb3f
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Mon Nov 19 13:03:02 2018 +0000

    libx86: Work around GCC being unable to spill the PIC hard register
    
    Versions of GCC before 5 can't compile cpuid.c, and fail with the rather 
cryptic:
    
      In file included from lib/x86/cpuid.c:3:0:
      lib/x86/cpuid.c: In function ‘x86_cpuid_policy_fill_native’:
      include/xen/lib/x86/cpuid.h:25:5: error: inconsistent operand constraints 
in an ‘asm’
           asm ( "cpuid"
           ^
    
    See https://gcc.gnu.org/bugzilla/show_bug.cgi?id=54232 for more details.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 86d47adcd3c4f494456a3d6ee06e941b132e3eb2
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Fri Dec 1 13:29:36 2017 +0000

    x86/msr: Handle MSR_AMD64_DR{0-3}_ADDRESS_MASK in the new MSR infrastructure
    
    This is a followup to c/s 96f235c26 which fulfils the remaining TODO item.
    
    First of all, the pre-existing SVM code has a bug.  The value in
    msrs->dr_mask[] may be stale, as we allow direct access to these MSRs.
    Resolve this in guest_rdmsr() by reading directly from hardware in the
    affected case.
    
    With the reading/writing logic moved to the common guest_{rd,wr}msr()
    infrastructure, the migration logic can be simplified.  The PV migration 
logic
    drops all of its special casing, and SVM's entire {init,save,load}_msr()
    infrastructure becomes unnecessary.
    
    The resulting diffstat shows quite how expensive the PV special cases where 
in
    arch_do_domctl().
    
      add/remove: 0/3 grow/shrink: 4/6 up/down: 465/-1494 (-1029)
      Function                                     old     new   delta
      guest_rdmsr                                  252     484    +232
      guest_wrmsr                                  653     822    +169
      msrs_to_send                                   8      48     +40
      hvm_load_cpu_msrs                            489     513     +24
      svm_init_msr                                  21       -     -21
      hvm_save_cpu_msrs                            365     343     -22
      read_msr                                    1089    1001     -88
      write_msr                                   1829    1689    -140
      svm_msr_read_intercept                      1124     970    -154
      svm_load_msr                                 195       -    -195
      svm_save_msr                                 196       -    -196
      svm_msr_write_intercept                     1461    1265    -196
      arch_do_domctl                              9581    9099    -482
      Total: Before=3314610, After=3313581, chg -0.03%
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by:  Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 59e087bf6a9c8ad805294c32dfd7c77068d81eff
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Thu Sep 6 11:42:34 2018 +0000

    xen/keyhandler: Drop keyhandler_scratch
    
    With almost all users of keyhandler_scratch gone, clean up the 3 remaining
    users and drop the buffer.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 30311d2e82a3eb69aa1667382a6b2529f6d944c4
Author: Wei Liu <wei.liu2@xxxxxxxxxx>
Date:   Fri Nov 16 18:58:55 2018 +0000

    x86: fix efi.lds dependency generation
    
    RANDCONFIG builds discover efi.lds is not updated when autogenerated
    headers are updated.
    
    Upon inspection, the generated .d file contains xen.lds.o as target,
    not the once thought efi.lds.o. That's because gcc disregards the
    output object name specified by -o when generating dependency, so the
    sed invocation has no effect.
    
    Arguably that's a bug in gcc, which can be fixed at some point, so we
    make the sed rune work with *.lds. At the same time replace the
    hardcoded sed rune for xen.lds with the new one.
    
    Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit e9c4574d8156b537067d47bc4362cde7174cc3d7
Author: Wei Liu <wei.liu2@xxxxxxxxxx>
Date:   Mon Nov 19 10:03:54 2018 +0000

    Config.mk: update seabios
    
    This new release contains a fix for building legacy acpi tables with
    newer iasl, which we want.
    
    Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit d95da91fb497d8583826f673f9325e73a7514277
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Nov 19 09:41:25 2018 +0100

    x86/HVM: grow MMIO cache data size to 64 bytes
    
    This is needed before enabling any AVX512 insns in the emulator. Change
    the way alignment is enforced at the same time.
    
    Add a check that the buffer won't actually overflow, and while at it
    also convert the check for accesses to not cross page boundaries.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.