* [xen-unstable-smoke test] 100759: regressions - FAIL
@ 2016-09-05 14:44 osstest service owner
0 siblings, 0 replies; only message in thread
From: osstest service owner @ 2016-09-05 14:44 UTC (permalink / raw)
To: xen-devel, osstest-admin
[-- Attachment #1: Type: text/plain, Size: 6934 bytes --]
flight 100759 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/100759/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 6 xen-boot fail REGR. vs. 100736
test-amd64-amd64-libvirt 6 xen-boot fail REGR. vs. 100736
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-check fail never pass
test-armhf-armhf-xl 13 saverestore-support-check fail never pass
version targeted for testing:
xen 7539772a65b044f326ebf9528bd40e7c6a78c540
baseline version:
xen 158dd1bdca161a6456ee6be293969f87ecde3922
Last test of basis 100736 2016-09-02 16:03:32 Z 2 days
Testing same since 100755 2016-09-05 11:01:49 Z 0 days 2 attempts
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <andrew.cooper3@citrix.com>
He Chen <he.chen@linux.intel.com>
Ian Jackson <ian.jackson@eu.citrix.com>
Jan Beulich <jbeulich@suse.com>
Luwei Kang <luwei.kang@intel.com>
Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Razvan Cojocaru <rcojocaru@bitdefender.com>
Tamas K Lengyel <tamas.lengyel@zentific.com>
Wei Liu <wei.liu2@citrix.com>
jobs:
build-amd64 pass
build-armhf pass
build-amd64-libvirt pass
test-armhf-armhf-xl pass
test-amd64-amd64-xl-qemuu-debianhvm-i386 fail
test-amd64-amd64-libvirt fail
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 7539772a65b044f326ebf9528bd40e7c6a78c540
Author: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Date: Mon Sep 5 11:26:04 2016 +0200
libxl: do not assume Dom0 backend while getting nic info
Fill backend_domid field based on backend path.
Cc: Ian Jackson <ian.jackson@eu.citrix.com>
Cc: Wei Liu <wei.liu2@citrix.com>
Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Acked-by: Wei Liu <wei.liu2@citrix.com>
commit b2f2ced591060588a45cdc7881a7335ba42b9cc5
Author: Wei Liu <wei.liu2@citrix.com>
Date: Mon Sep 5 11:36:45 2016 +0100
tools/firmware: Rename bios.bin to seabios.bin
bios.bin as a name is far too generic. Rename it to seabios.bin.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Wei Liu <wei.liu2@citrix.com>
[ wei: fix up conflict, rerun autogen.sh ]
Signed-off-by: Wei Liu <wei.liu2@citrix.com>
commit eb502cb30cc5af309ed824da024014afca1d0fcf
Author: Wei Liu <wei.liu2@citrix.com>
Date: Mon Sep 5 10:21:28 2016 +0100
libxl: update flex output files for DSA 3653-2
We updated flex output files in 4b314c89 ("libxl: update flex output
files") for DSA 3653-1 / CVE-2016-6354. But Debian security team
discovered the fix to flex was incomplete and issued DSA 3653-2. We need
to update our flex output files accordingly.
Signed-off-by: Wei Liu <wei.liu2@citrix.com>
Acked-by: Ian Jackson <ian.jackson@eu.citrix.com>
commit 5fdea6577098eda065c794c79e1ae23f33f103af
Author: He Chen <he.chen@linux.intel.com>
Date: Mon Sep 5 12:49:43 2016 +0200
x86: allow disabling sm{e,a}p for Xen itself
SMEP/SMAP is a security feature to prevent kernel executing/accessing
user address involuntarily, any such behavior will lead to a page fault.
SMEP/SMAP is open (in CR4) for both Xen and HVM guest in earlier code.
SMEP/SMAP bit set in Xen CR4 would enforce security checking for 32-bit
PV guest which will suffer unknown SMEP/SMAP page fault when guest
kernel attempt to access user address although SMEP/SMAP is close for
PV guests.
This patch introduces a new boot option value "hvm" for "sm{e,a}p", it
is going to diable SMEP/SMAP for Xen hypervisor while enable them for
HVM. In this way, 32-bit PV guest will not suffer SMEP/SMAP security
issue. Users can choose whether open SMEP/SMAP for Xen itself,
especially when they are going to run 32-bit PV guests.
Signed-off-by: He Chen <he.chen@linux.intel.com>
[jbeulich: doc and style adjustments]
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 698d0f377d72fdc8d4e247e76b6508090c366187
Author: Razvan Cojocaru <rcojocaru@bitdefender.com>
Date: Mon Sep 5 12:47:46 2016 +0200
have __DEFINE_COMPAT_HANDLE() generate const versions
Both DEFINE_XEN_GUEST_HANDLE() and __DEFINE_XEN_GUEST_HANDLE()
each produce both const and non-const handles,
only DEFINE_COMPAT_HANDLE() does (__DEFINE_COMPAT_HANDLE()
does not). This patch has __DEFINE_COMPAT_HANDLE() also
produce a const handle.
Suggested-by: Jan Beulich <jbeulich@suse.com>
Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
commit af74f65ef19450a89c1cada8214adcc9ea186307
Author: Tamas K Lengyel <tamas.lengyel@zentific.com>
Date: Mon Sep 5 12:47:16 2016 +0200
x86/monitor: include EAX/ECX in CPUID monitor events
Extend the CPUID monitor event to include EAX and ECX values that were used
when CPUID was executed. This is useful in identifying which leaf was queried.
We also adjust the xen-access output format to more closely resemble the output
of the Linux cpuid tool's raw format.
Signed-off-by: Tamas K Lengyel <tamas.lengyel@zentific.com>
Acked-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit b942c31bc1d40234922be5bee9689fe349e1d835
Author: Luwei Kang <luwei.kang@intel.com>
Date: Mon Sep 5 12:46:13 2016 +0200
x86/cpuid: AVX-512 feature detection
AVX512 is an extention of AVX2. Its spec can be found at:
https://software.intel.com/sites/default/files/managed/b4/3a/319433-024.pdf
This patch detects AVX512 features by CPUID.
Signed-off-by: Luwei Kang <luwei.kang@intel.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
(qemu changes not included)
[-- Attachment #2: Type: text/plain, Size: 127 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2016-09-05 14:44 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-09-05 14:44 [xen-unstable-smoke test] 100759: regressions - FAIL osstest service owner
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.