* [xen-unstable-smoke test] 133233: trouble: blocked/broken/pass
@ 2019-02-13 20:54 osstest service owner
0 siblings, 0 replies; only message in thread
From: osstest service owner @ 2019-02-13 20:54 UTC (permalink / raw)
To: xen-devel, osstest-admin
flight 133233 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/133233/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm <job status> broken
Regressions which are regarded as allowable (not blocking):
build-arm64-xsm 2 hosts-allocate broken REGR. vs. 133005
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-xsm 3 capture-logs broken blocked in 133005
test-amd64-amd64-libvirt 13 migrate-support-check fail never pass
test-armhf-armhf-xl 13 migrate-support-check fail never pass
test-armhf-armhf-xl 14 saverestore-support-check fail never pass
version targeted for testing:
xen f178a00c30173c0b268d99160e19ad299b1823a2
baseline version:
xen 455301716e1ff358cb79367213003fba771dd466
Last test of basis 133005 2019-02-07 14:00:32 Z 6 days
Failing since 133011 2019-02-07 18:00:36 Z 6 days 34 attempts
Testing same since 133200 2019-02-12 16:00:56 Z 1 days 11 attempts
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <andrew.cooper3@citrix.com>
George Dunlap <george.dunlap@citrix.com>
Ian Jackson <ian.jackson@eu.citrix.com>
Jan Beulich <jbeulich@suse.com>
Juergen Gross <jgross@suse.com>
Kevin Tian <kevin.tian@intel.com>
Michael Tautschnig <tautschn@amazon.co.uk>
Norbert Manthey <nmanthey@amazon.com>
Norbert Manthey <nmanthey@amazon.de>
Stefano Stabellini <sstabellini@kernel.org>
Stefano Stabellini <stefanos@xilinx.com>
Tim Deegan <tim@xen.org>
Wei Liu <wei.liu2@citrix.com>
jobs:
build-arm64-xsm broken
build-amd64 pass
build-armhf pass
build-amd64-libvirt pass
test-armhf-armhf-xl pass
test-arm64-arm64-xl-xsm blocked
test-amd64-amd64-xl-qemuu-debianhvm-i386 pass
test-amd64-amd64-libvirt pass
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
broken-job build-arm64-xsm broken
broken-step build-arm64-xsm hosts-allocate
broken-step build-arm64-xsm capture-logs
Not pushing.
------------------------------------------------------------
commit f178a00c30173c0b268d99160e19ad299b1823a2
Author: Norbert Manthey <nmanthey@amazon.de>
Date: Tue Feb 12 15:20:15 2019 +0100
x86/hvm: block speculative out-of-bound accesses
There are multiple arrays in the HVM interface that are accessed
with indices that are provided by the guest. To avoid speculative
out-of-bound accesses, we use the array_index_nospec macro.
When blocking speculative out-of-bound accesses, we can classify arrays
into dynamic arrays and static arrays. Where the former are allocated
during run time, the size of the latter is known during compile time.
On static arrays, compiler might be able to block speculative accesses
in the future.
This is part of the speculative hardening effort.
Reported-by: Pawel Wieczorkiewicz <wipawel@amazon.de>
Signed-off-by: Norbert Manthey <nmanthey@amazon.de>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit 56d8d0119d270f846c6c4943712b8a21fbe5d4d0
Author: Jan Beulich <jbeulich@suse.com>
Date: Tue Feb 12 11:54:57 2019 +0100
VMX: don't ignore P2M setup error
set_mmio_p2m_entry() may fail, in particular with -ENOMEM. Don't ignore
such an error, but instead cause domain creation to fail in such a case.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit 88b92c3820cffed4b4abeb139edc2cbd8286cb12
Author: Juergen Gross <jgross@suse.com>
Date: Tue Feb 12 11:54:07 2019 +0100
iommu: fix iommu_ops initialization
Commit 32a5ea00ec75ef53e ("IOMMU/x86: remove indirection from certain
IOMMU hook accesses") introduced iommu_ops initialized at boot time
with data declared as __initconstrel.
On Intel systems there is another path where iommu_ops is initialized
and this path is relevant on resume after returning from system suspend.
As the initialization data is no longer accessible in this case that
second initialization must be dropped in case the system isn't just
booting.
Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit 09fc4de4a8ebb389641b8b8a632efcb7ca880e08
Author: Norbert Manthey <nmanthey@amazon.com>
Date: Wed Feb 6 15:09:33 2019 +0100
asm: handle comments when creating header file
In the early steps of compilation, the asm header files are created, such
as include/asm-$(TARGET_ARCH)/asm-offsets.h. These files depend on the
assembly file arch/$(TARGET_ARCH)/asm-offsets.s, which is generated
before. Depending on the used toolchain, there might be comments in the
assembly files. Especially the goto-gcc compiler of the bounded model
checker CBMC adds comments that start with a '#' symbol at the beginning
of the line.
This commit adds handling comments in assembler during the creation of the
asm header files, especially ignoring lines that start with '#', which
indicate comments for both ARM and x86 assembler. The used tool goto-as
produces exactly comments of this kind.
Signed-off-by: Norbert Manthey <nmanthey@amazon.de>
Signed-off-by: Michael Tautschnig <tautschn@amazon.co.uk>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit d04bf1eb656be8b2131d08c7e32cff343556cfa8
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon Feb 11 09:09:13 2019 +0100
x86/shadow: adjust minimum allocation calculations
A previously bad situation has become worse with the early setting of
->max_vcpus: The value returned by shadow_min_acceptable_pages() has
further grown, and hence now holds back even more memory from use for
the p2m.
Make sh_min_allocation() account for all p2m memory needed for
shadow_enable() to succeed during domain creation (at which point the
domain has no memory at all allocated to it yet, and hence use of
d->tot_pages is meaningless).
Also make shadow_min_acceptable_pages() no longer needlessly add 1 to
the vCPU count.
Finally make the debugging printk() in shadow_alloc_p2m_page() a little
more useful by logging some of the relevant domain settings.
Reported-by: Roger Pau Monné <roger.pau@citrix.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
Acked-by: George Dunlap <george.dunlap@citrix.com>
Acked-by: Tim Deegan <tim@xen.org>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit aca21442499c04b70d84164b46744b35ee7b8bf4
Author: George Dunlap <george.dunlap@citrix.com>
Date: Thu Feb 7 12:41:17 2019 +0000
docs: features/qemu-depriv formatting fixes
Need a space between the paragraph and the list so pandoc knows it's a
list.
Signed-off-by: George Dunlap <george.dunlap@citrix.com>
Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit 9db777dda33ba92c0a0feca76de5bba57358ebcc
Author: George Dunlap <george.dunlap@citrix.com>
Date: Thu Feb 7 12:05:43 2019 +0000
docs: Update credit/credit2 feature docs reflecting new default scheduler
Signed-off-by: George Dunlap <george.dunlap@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit 7b5278b28f8fbcd4402e4520d7a5d607d4a997a7
Author: Ian Jackson <ian.jackson@eu.citrix.com>
Date: Thu Feb 7 15:02:27 2019 +0000
tools: init scripts: make XEN_RUN_DIR and XEN_LOCK_DIR mode 700
These directories ought not to be even world-readable. If this script
for some reason runs with a lax umask they might be created
overly-writeable. Avoid any such bug by setting the mode explicitly.
Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com>
Acked-by: Wei Liu <wei.liu2@citrix.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit 0c4a38c098f9bffeb33f8cf88abdea4b0f9a9070
Author: Ian Jackson <ian.jackson@eu.citrix.com>
Date: Thu Feb 7 15:02:26 2019 +0000
tools: init scripts: xencommons: Fixes to Description
`neeeded' is a typo. And xend is long gone.
No functional change.
Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com>
Acked-by: Wei Liu <wei.liu2@citrix.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit 01097e0194321d27262513cf1291fddfea1606c3
Author: Ian Jackson <ian.jackson@eu.citrix.com>
Date: Thu Feb 7 15:02:25 2019 +0000
tools: init scripts: xencommons: Provides `xen'
It is useful to have a single `xen' facility (in the LSB Provides
namespace). That allows other facilities to specify that they should
go after `xen' without needing to know the implementation details.
This service name is already Provide'd by the (fairly different) init
scripts used in Debian.
Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com>
Acked-by: Wei Liu <wei.liu2@citrix.com>
Release-acked-by: Juergen Gross <jgross@suse.com>
commit b4df73de493954c44f240f78779c9bd3782e1572
Author: Stefano Stabellini <sstabellini@kernel.org>
Date: Tue Feb 5 13:38:53 2019 -0800
xen/arm: gic-v2: deactivate interrupts during initialization
Interrupts could be ACTIVE at boot. Make sure to deactivate them during
initialization.
Signed-off-by: Stefano Stabellini <stefanos@xilinx.com>
Reviewed-by: Julien Grall <julien.grall@arm.com>
CC: julien.grall@arm.com
CC: peng.fan@nxp.com
CC: jgross@suse.com
(qemu changes not included)
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2019-02-13 20:54 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-02-13 20:54 [xen-unstable-smoke test] 133233: trouble: blocked/broken/pass osstest service owner
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.