[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable-smoke test] 146454: regressions - FAIL
flight 146454 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/146454/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-build fail REGR. vs. 146401 build-armhf 6 xen-build fail REGR. vs. 146401 Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-armhf-armhf-xl 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13 migrate-support-check fail never pass version targeted for testing: xen 2aa977eb6baaa4e43a9ef3ad26f9eb117eb178f5 baseline version: xen 021cc01ecac111be3301ad33ff5cda4543ca8b92 Last test of basis 146401 2020-01-22 23:00:35 Z 1 days Testing same since 146420 2020-01-23 15:00:29 Z 0 days 6 attempts ------------------------------------------------------------ People who touched revisions under test: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx> Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx> George Dunlap <george.dunlap@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Tamas K Lengyel <tamas@xxxxxxxxxxxxx> jobs: build-arm64-xsm fail build-amd64 pass build-armhf fail build-amd64-libvirt pass test-armhf-armhf-xl blocked test-arm64-arm64-xl-xsm blocked test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 2aa977eb6baaa4e43a9ef3ad26f9eb117eb178f5 Author: Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx> Date: Fri Jan 17 13:31:33 2020 +0000 x86/mm: Make use of the default access param from xc_altp2m_create_view At this moment the default_access param from xc_altp2m_create_view is not used. This patch assigns default_access to p2m->default_access at the time of initializing a new altp2m view. Signed-off-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Tamas K Lengyel <tamas@xxxxxxxxxxxxx> Reviewed-by: Petre Pircalabu <ppircalabu@xxxxxxxxxxxxxxx> Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx> commit b701adbee37befa58c7bdec80b65f93e033252e6 Author: Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx> Date: Fri Jan 17 13:31:31 2020 +0000 x86/mm: Pull vendor-independent altp2m code out of p2m-ept.c and into p2m.c No functional changes. Requested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Petre Pircalabu <ppircalabu@xxxxxxxxxxxxxxx> Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx> commit ea22bcd030da771be18821bf4a898ed7a314eb83 Author: Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx> Date: Fri Jan 17 13:31:30 2020 +0000 x86/altp2m: Add hypercall to set a range of sve bits By default the sve bits are not set. This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(), to set a range of sve bits. The core function, p2m_set_suppress_ve_multi(), does not break in case of a error and it is doing a best effort for setting the bits in the given range. A check for continuation is made in order to have preemption on large ranges. The gfn of the first error is stored in xen_hvm_altp2m_suppress_ve_multi.first_error_gfn and the error code is stored in xen_hvm_altp2m_suppress_ve_multi.first_error. If no error occurred the values will be 0. Signed-off-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Petre Pircalabu <ppircalabu@xxxxxxxxxxxxxxx> Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx> commit 5160dbd512523d865f7271af23636aa3f3536186 Author: Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx> Date: Fri Jan 17 13:31:26 2020 +0000 x86/mm: Add array_index_nospec to guest provided index values This patch aims to sanitize indexes, potentially guest provided values, for altp2m_eptp[] and altp2m_p2m[] arrays. Requested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx> Acked-by: Tamas K Lengyel <tamas@xxxxxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |