* [xen-unstable-smoke test] 105860: regressions - trouble: broken/fail/pass
@ 2017-02-16 21:26 osstest service owner
0 siblings, 0 replies; only message in thread
From: osstest service owner @ 2017-02-16 21:26 UTC (permalink / raw)
To: xen-devel, osstest-admin
flight 105860 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105860/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 14 guest-saverestore fail REGR. vs. 105852
test-armhf-armhf-xl 15 guest-start/debian.repeat fail REGR. vs. 105852
test-amd64-amd64-xl-qemuu-debianhvm-i386 12 guest-saverestore fail REGR. vs. 105852
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5 xen-build fail never pass
build-arm64-pvops 5 kernel-build fail never pass
test-armhf-armhf-xl 12 migrate-support-check fail never pass
test-armhf-armhf-xl 13 saverestore-support-check fail never pass
test-amd64-amd64-libvirt 12 migrate-support-check fail never pass
version targeted for testing:
xen 79903e50dba9e7442c9b7ca424661bb020e9dbf2
baseline version:
xen 7127d53fe891f9ea67357587a33a7aaba4b55f45
Last test of basis 105852 2017-02-16 14:01:33 Z 0 days
Failing since 105857 2017-02-16 16:01:30 Z 0 days 3 attempts
Testing same since 105858 2017-02-16 18:02:44 Z 0 days 2 attempts
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <andrew.cooper3@citrix.com>
Daniel Kiper <daniel.kiper@oracle.com>
Jan Beulich <jbeulich@suse.com>
Julien Grall <julien.grall@arm.com>
jobs:
build-amd64 pass
build-arm64 fail
build-armhf pass
build-amd64-libvirt pass
build-arm64-pvops fail
test-armhf-armhf-xl fail
test-arm64-arm64-xl-xsm broken
test-amd64-amd64-xl-qemuu-debianhvm-i386 fail
test-amd64-amd64-libvirt fail
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 79903e50dba9e7442c9b7ca424661bb020e9dbf2
Author: Jan Beulich <jbeulich@suse.com>
Date: Thu Feb 16 18:11:42 2017 +0100
x86emul: catch exceptions occurring in stubs
Before adding more use of stubs cloned from decoded guest insns, guard
ourselves against mistakes there: Should an exception (with the
noteworthy exception of #PF) occur inside the stub, forward it to the
guest.
Since the exception fixup table entry can't encode the address of the
faulting insn itself, attach it to the return address instead. This at
once provides a convenient place to hand the exception information
back: The return address is being overwritten by it before branching to
the recovery code.
Take the opportunity and (finally!) add symbol resolution to the
respective log messages (the new one is intentionally not being coded
that way, as it covers stub addresses only, which don't have symbols
associated).
Also take the opportunity and make search_one_extable() static again.
Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit 8c935f5ff1cac422b4de21cbab69e13d2ebb25be
Author: Daniel Kiper <daniel.kiper@oracle.com>
Date: Thu Feb 16 18:10:04 2017 +0100
x86: add "w" flag to .init.data section definition
init.data section is clearly writable, so, add "w" flag to its
definition in xen/arch/x86/boot/x86_64.S.
Signed-off-by: Daniel Kiper <daniel.kiper@oracle.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
commit e004384bb371f5ab76a79b83da79981f4c400b83
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Feb 15 19:15:41 2017 +0000
x86/hypercall: Move hypercall continuation logic
The newly-repurposed arch/x86/hypercall.c is a more appropriate place for the
hypercall continuation logic to live.
This is purely code motion.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
commit 0c221ae9d745de138850c6903a5861e2582df863
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Mon Feb 13 11:49:33 2017 +0000
x86/hypercall: Split out PV hypercall infrastructure
Repurpose arch/x86/hypercall.c to be common x86 hypercall infrastructure, and
move the PV specific routines to arch/x86/pv/hypercall.c
This is purely code motion.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
commit bb84ffc56ec14766f33a002a61fd97a62b6b17cd
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Tue Feb 14 18:21:22 2017 +0000
x86/hypercall: Make the HVM hcall_64bit boolean common
HVM guests currently make use of arch.hvm_vcpu.hcall_64bit to track the ABI of
the hypercall in use.
The rest of Xen deals in terms of the comat ABI or not, so rename the boolean
and make it common, guared by CONFIG_COMPAT to avoid bloat if a compat ABI is
not wanted/needed.
Set hcall_compat uniformly for PV guests as well as HVM guests. This removes
the remaining piece of guest-type-specific knowledge from
hypercall_create_continuation(), allowing it to operate only in terms of the
hypercall ABI in use.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit b26c93fb1b14501fece01b213590896c2c069770
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Tue Feb 14 18:06:59 2017 +0000
xen/multicall: Use the common hcall_preempted boolean
The now-common hcall_preempted boolean is perfectly usable for multicalls.
Remove the multicall-specific preemption mechanism.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Julien Grall <julien.grall@arm.com>
commit 9353e3628a8cba7edc5aea470b448f290af76118
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Tue Feb 14 17:56:33 2017 +0000
arm/hypercall: Use the common hcall_preempted boolean
With hcall_preempted having just been made common, ARM can use use it to
simplify its hypercall handling.
This simplifies the continuation logic and removes the risk of accidentally
skipping multiple instructions.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Julien Grall <julien.grall@arm.com>
commit 928ea919fc3c5476aa9df55c3b95debc8904927f
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Tue Feb 14 17:02:04 2017 +0000
x86/hypercall: Make the HVM hcall_preempted boolean common
HVM guests currently make use of arch.hvm_vcpu.hcall_preempted to track
hypercall preemption in struct vcpu. Move this boolean to being common at the
top level of struct vcpu, which will allow it to be reused elsewhere.
Alter the PV preemption logic to use this boolean. This simplifies the code
by removing guest-type-specific knowledge, and removes the risk of accidently
skipping backwards or forwards multiple times and corrupting %rip.
In pv_hypercall() the old_rip bodge can be removed, and parameter clobbering
can happen based on a more obvious condition.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 3044a2a81910bf993c0fe6fa34bee0bf5b410911
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Feb 15 17:32:30 2017 +0000
common/vcpu: Switch v->vcpu_info_mfn to mfn_t
No functional change.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit e0f6e6f614da1f3bc9147774a58ac1fbc7c74ed2
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Feb 15 17:30:48 2017 +0000
xen/sched.h Whitespace and bool cleanup
Extend the Maptrack comment to point at the Grant table subsystem.
No functional change.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
commit 3091080ef7724ddac77e0ae81c270936a630477f
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Feb 15 18:04:58 2017 +0000
xen/include: Include xen/kconfig.h automatically
generated/autoconf.h is already included automatically so CONFIG_* defines are
available. However, the companion macros such as IS_ENABLED() are not
included.
Include them uniformly everywhere.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Julien Grall <julien.grall@arm.com>
commit 480e011ea8952f32d46e4986f098638c97b7bea4
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Feb 15 17:48:47 2017 +0000
xen/include: Remove explicit asm/config.h includes
xen/config.h includes asm/config.h, and is included automatically via CFLAGS.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Julien Grall <julien.grall@arm.com>
commit d89f48f58ee5568fc58c574690b06cb10e2ed7f7
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Feb 15 17:45:47 2017 +0000
xen/include: Remove explicit xen/config.h includes
This file is included automatically via CFLAGS.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Julien Grall <julien.grall@arm.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
(qemu changes not included)
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2017-02-16 21:26 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-02-16 21:26 [xen-unstable-smoke test] 105860: regressions - trouble: broken/fail/pass osstest service owner
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.