[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable-smoke test] 130562: trouble: blocked/broken/pass
flight 130562 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130562/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm <job status> broken build-arm64-xsm 4 host-install(4) broken REGR. vs. 130289 Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13 migrate-support-check fail never pass test-armhf-armhf-xl 13 migrate-support-check fail never pass test-armhf-armhf-xl 14 saverestore-support-check fail never pass version targeted for testing: xen 39611fdee5d138d4d39dc997051c3a7dd23b6df9 baseline version: xen 901abfef5de149546b16fba6f4d5bd7def08c672 Last test of basis 130289 2018-11-17 11:00:36 Z 2 days Failing since 130490 2018-11-19 09:00:27 Z 0 days 6 attempts Testing same since 130562 2018-11-20 00:01:22 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Doug Goldstein <cardoe@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-arm64-xsm broken build-amd64 pass build-armhf pass build-amd64-libvirt pass test-armhf-armhf-xl pass test-arm64-arm64-xl-xsm blocked test-amd64-amd64-xl-qemuu-debianhvm-i386 pass test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary broken-job build-arm64-xsm broken broken-step build-arm64-xsm host-install(4) Not pushing. ------------------------------------------------------------ commit 39611fdee5d138d4d39dc997051c3a7dd23b6df9 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Nov 19 21:16:28 2018 +0000 automation: Add 32bit Debian Jessie builds Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> [ wei: rebase ] Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit 219fc4840a793030f763cbf3cdd6b6660601b3ea Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Nov 19 16:01:20 2018 +0000 automation: Add a 32bit Debian Jessie dockerfile Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit d4f507e55d44a882753007b01fb973784e73e4b9 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Fri Nov 16 13:03:59 2018 +0000 automation: properly tag x86 jobs in Gitlab CI Since we have introduced arm64 variants, we'd better start tagging the old ones. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Doug Goldstein <cardoe@xxxxxxxxxx> commit 75c8037c1e46f9117518e451693b5ddb4f7b34b9 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Fri Nov 16 12:54:03 2018 +0000 automation: introduce some RANDCONFIG tests Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Doug Goldstein <cardoe@xxxxxxxxxx> commit 988ebbefc2a550ff8397f65b0a2dc18f4e72f474 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Fri Nov 16 11:40:56 2018 +0000 automation: refactor gitlab-ci.yaml Use the "extends" keyword introduced in 11.3 to reduce repetition in jobs. More importantly, this helps us better organise the properties of jobs. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Doug Goldstein <cardoe@xxxxxxxxxx> commit 73ee5574084b9bfa6194c1096cb1e4ce76fedb3f Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Mon Nov 19 13:03:02 2018 +0000 libx86: Work around GCC being unable to spill the PIC hard register Versions of GCC before 5 can't compile cpuid.c, and fail with the rather cryptic: In file included from lib/x86/cpuid.c:3:0: lib/x86/cpuid.c: In function ‘x86_cpuid_policy_fill_native’: include/xen/lib/x86/cpuid.h:25:5: error: inconsistent operand constraints in an ‘asm’ asm ( "cpuid" ^ See https://gcc.gnu.org/bugzilla/show_bug.cgi?id=54232 for more details. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 86d47adcd3c4f494456a3d6ee06e941b132e3eb2 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Fri Dec 1 13:29:36 2017 +0000 x86/msr: Handle MSR_AMD64_DR{0-3}_ADDRESS_MASK in the new MSR infrastructure This is a followup to c/s 96f235c26 which fulfils the remaining TODO item. First of all, the pre-existing SVM code has a bug. The value in msrs->dr_mask[] may be stale, as we allow direct access to these MSRs. Resolve this in guest_rdmsr() by reading directly from hardware in the affected case. With the reading/writing logic moved to the common guest_{rd,wr}msr() infrastructure, the migration logic can be simplified. The PV migration logic drops all of its special casing, and SVM's entire {init,save,load}_msr() infrastructure becomes unnecessary. The resulting diffstat shows quite how expensive the PV special cases where in arch_do_domctl(). add/remove: 0/3 grow/shrink: 4/6 up/down: 465/-1494 (-1029) Function old new delta guest_rdmsr 252 484 +232 guest_wrmsr 653 822 +169 msrs_to_send 8 48 +40 hvm_load_cpu_msrs 489 513 +24 svm_init_msr 21 - -21 hvm_save_cpu_msrs 365 343 -22 read_msr 1089 1001 -88 write_msr 1829 1689 -140 svm_msr_read_intercept 1124 970 -154 svm_load_msr 195 - -195 svm_save_msr 196 - -196 svm_msr_write_intercept 1461 1265 -196 arch_do_domctl 9581 9099 -482 Total: Before=3314610, After=3313581, chg -0.03% Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 59e087bf6a9c8ad805294c32dfd7c77068d81eff Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Thu Sep 6 11:42:34 2018 +0000 xen/keyhandler: Drop keyhandler_scratch With almost all users of keyhandler_scratch gone, clean up the 3 remaining users and drop the buffer. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 30311d2e82a3eb69aa1667382a6b2529f6d944c4 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Fri Nov 16 18:58:55 2018 +0000 x86: fix efi.lds dependency generation RANDCONFIG builds discover efi.lds is not updated when autogenerated headers are updated. Upon inspection, the generated .d file contains xen.lds.o as target, not the once thought efi.lds.o. That's because gcc disregards the output object name specified by -o when generating dependency, so the sed invocation has no effect. Arguably that's a bug in gcc, which can be fixed at some point, so we make the sed rune work with *.lds. At the same time replace the hardcoded sed rune for xen.lds with the new one. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit e9c4574d8156b537067d47bc4362cde7174cc3d7 Author: Wei Liu <wei.liu2@xxxxxxxxxx> Date: Mon Nov 19 10:03:54 2018 +0000 Config.mk: update seabios This new release contains a fix for building legacy acpi tables with newer iasl, which we want. Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit d95da91fb497d8583826f673f9325e73a7514277 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Nov 19 09:41:25 2018 +0100 x86/HVM: grow MMIO cache data size to 64 bytes This is needed before enabling any AVX512 insns in the emulator. Change the way alignment is enforced at the same time. Add a check that the buffer won't actually overflow, and while at it also convert the check for accesses to not cross page boundaries. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |