[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable-smoke test] 133219: trouble: blocked/broken/pass
flight 133219 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/133219/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm <job status> broken Regressions which are regarded as allowable (not blocking): build-arm64-xsm 2 hosts-allocate broken REGR. vs. 133005 Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64-xsm 3 capture-logs broken blocked in 133005 test-amd64-amd64-libvirt 13 migrate-support-check fail never pass test-armhf-armhf-xl 13 migrate-support-check fail never pass test-armhf-armhf-xl 14 saverestore-support-check fail never pass version targeted for testing: xen f178a00c30173c0b268d99160e19ad299b1823a2 baseline version: xen 455301716e1ff358cb79367213003fba771dd466 Last test of basis 133005 2019-02-07 14:00:32 Z 5 days Failing since 133011 2019-02-07 18:00:36 Z 5 days 29 attempts Testing same since 133200 2019-02-12 16:00:56 Z 0 days 6 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> George Dunlap <george.dunlap@xxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Juergen Gross <jgross@xxxxxxxx> Kevin Tian <kevin.tian@xxxxxxxxx> Michael Tautschnig <tautschn@xxxxxxxxxxxx> Norbert Manthey <nmanthey@xxxxxxxxxx> Norbert Manthey <nmanthey@xxxxxxxxx> Stefano Stabellini <sstabellini@xxxxxxxxxx> Stefano Stabellini <stefanos@xxxxxxxxxx> Tim Deegan <tim@xxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-arm64-xsm broken build-amd64 pass build-armhf pass build-amd64-libvirt pass test-armhf-armhf-xl pass test-arm64-arm64-xl-xsm blocked test-amd64-amd64-xl-qemuu-debianhvm-i386 pass test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary broken-job build-arm64-xsm broken broken-step build-arm64-xsm hosts-allocate broken-step build-arm64-xsm capture-logs Not pushing. ------------------------------------------------------------ commit f178a00c30173c0b268d99160e19ad299b1823a2 Author: Norbert Manthey <nmanthey@xxxxxxxxx> Date: Tue Feb 12 15:20:15 2019 +0100 x86/hvm: block speculative out-of-bound accesses There are multiple arrays in the HVM interface that are accessed with indices that are provided by the guest. To avoid speculative out-of-bound accesses, we use the array_index_nospec macro. When blocking speculative out-of-bound accesses, we can classify arrays into dynamic arrays and static arrays. Where the former are allocated during run time, the size of the latter is known during compile time. On static arrays, compiler might be able to block speculative accesses in the future. This is part of the speculative hardening effort. Reported-by: Pawel Wieczorkiewicz <wipawel@xxxxxxxxx> Signed-off-by: Norbert Manthey <nmanthey@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit 56d8d0119d270f846c6c4943712b8a21fbe5d4d0 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Feb 12 11:54:57 2019 +0100 VMX: don't ignore P2M setup error set_mmio_p2m_entry() may fail, in particular with -ENOMEM. Don't ignore such an error, but instead cause domain creation to fail in such a case. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit 88b92c3820cffed4b4abeb139edc2cbd8286cb12 Author: Juergen Gross <jgross@xxxxxxxx> Date: Tue Feb 12 11:54:07 2019 +0100 iommu: fix iommu_ops initialization Commit 32a5ea00ec75ef53e ("IOMMU/x86: remove indirection from certain IOMMU hook accesses") introduced iommu_ops initialized at boot time with data declared as __initconstrel. On Intel systems there is another path where iommu_ops is initialized and this path is relevant on resume after returning from system suspend. As the initialization data is no longer accessible in this case that second initialization must be dropped in case the system isn't just booting. Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit 09fc4de4a8ebb389641b8b8a632efcb7ca880e08 Author: Norbert Manthey <nmanthey@xxxxxxxxxx> Date: Wed Feb 6 15:09:33 2019 +0100 asm: handle comments when creating header file In the early steps of compilation, the asm header files are created, such as include/asm-$(TARGET_ARCH)/asm-offsets.h. These files depend on the assembly file arch/$(TARGET_ARCH)/asm-offsets.s, which is generated before. Depending on the used toolchain, there might be comments in the assembly files. Especially the goto-gcc compiler of the bounded model checker CBMC adds comments that start with a '#' symbol at the beginning of the line. This commit adds handling comments in assembler during the creation of the asm header files, especially ignoring lines that start with '#', which indicate comments for both ARM and x86 assembler. The used tool goto-as produces exactly comments of this kind. Signed-off-by: Norbert Manthey <nmanthey@xxxxxxxxx> Signed-off-by: Michael Tautschnig <tautschn@xxxxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit d04bf1eb656be8b2131d08c7e32cff343556cfa8 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Feb 11 09:09:13 2019 +0100 x86/shadow: adjust minimum allocation calculations A previously bad situation has become worse with the early setting of ->max_vcpus: The value returned by shadow_min_acceptable_pages() has further grown, and hence now holds back even more memory from use for the p2m. Make sh_min_allocation() account for all p2m memory needed for shadow_enable() to succeed during domain creation (at which point the domain has no memory at all allocated to it yet, and hence use of d->tot_pages is meaningless). Also make shadow_min_acceptable_pages() no longer needlessly add 1 to the vCPU count. Finally make the debugging printk() in shadow_alloc_p2m_page() a little more useful by logging some of the relevant domain settings. Reported-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit aca21442499c04b70d84164b46744b35ee7b8bf4 Author: George Dunlap <george.dunlap@xxxxxxxxxx> Date: Thu Feb 7 12:41:17 2019 +0000 docs: features/qemu-depriv formatting fixes Need a space between the paragraph and the list so pandoc knows it's a list. Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit 9db777dda33ba92c0a0feca76de5bba57358ebcc Author: George Dunlap <george.dunlap@xxxxxxxxxx> Date: Thu Feb 7 12:05:43 2019 +0000 docs: Update credit/credit2 feature docs reflecting new default scheduler Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit 7b5278b28f8fbcd4402e4520d7a5d607d4a997a7 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Thu Feb 7 15:02:27 2019 +0000 tools: init scripts: make XEN_RUN_DIR and XEN_LOCK_DIR mode 700 These directories ought not to be even world-readable. If this script for some reason runs with a lax umask they might be created overly-writeable. Avoid any such bug by setting the mode explicitly. Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit 0c4a38c098f9bffeb33f8cf88abdea4b0f9a9070 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Thu Feb 7 15:02:26 2019 +0000 tools: init scripts: xencommons: Fixes to Description `neeeded' is a typo. And xend is long gone. No functional change. Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit 01097e0194321d27262513cf1291fddfea1606c3 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Thu Feb 7 15:02:25 2019 +0000 tools: init scripts: xencommons: Provides `xen' It is useful to have a single `xen' facility (in the LSB Provides namespace). That allows other facilities to specify that they should go after `xen' without needing to know the implementation details. This service name is already Provide'd by the (fairly different) init scripts used in Debian. Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> commit b4df73de493954c44f240f78779c9bd3782e1572 Author: Stefano Stabellini <sstabellini@xxxxxxxxxx> Date: Tue Feb 5 13:38:53 2019 -0800 xen/arm: gic-v2: deactivate interrupts during initialization Interrupts could be ACTIVE at boot. Make sure to deactivate them during initialization. Signed-off-by: Stefano Stabellini <stefanos@xxxxxxxxxx> Reviewed-by: Julien Grall <julien.grall@xxxxxxx> CC: julien.grall@xxxxxxx CC: peng.fan@xxxxxxx CC: jgross@xxxxxxxx (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |