[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 96307: trouble: blocked/broken/pass



flight 96307 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96307/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf                   3 host-install(3)         broken REGR. vs. 96214

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  08cffe6696c047123bd552e095163924c8ef4353
baseline version:
 xen                  8384dc2d95538c5910d98db3df3ff5448bf0af48

Last test of basis    96214  2016-06-24 11:02:52 Z    3 days
Testing same since    96307  2016-06-27 10:03:47 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Julien Grall <julien.grall@xxxxxxx>

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  broken  
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-step build-armhf host-install(3)

Not pushing.

------------------------------------------------------------
commit 08cffe6696c047123bd552e095163924c8ef4353
Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Date:   Mon Jun 20 10:04:26 2016 -0400

    xsm: add a default policy to .init.data
    
    This adds a Kconfig option and support for including the XSM policy from
    tools/flask/policy in the hypervisor so that the bootloader does not
    need to provide a policy to get sane behavior from an XSM-enabled
    hypervisor.  The policy provided by the bootloader, if present, will
    override the built-in policy.
    
    Enabling this option only builds the policy if checkpolicy is available
    during compilation of the hypervisor; otherwise, it does nothing.  The
    XSM policy is not moved out of tools because that remains the primary
    location for installing and configuring the policy.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
    Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Julien Grall <julien.grall@xxxxxxx>

commit 668ba1f85bf2e4086cf18c35abc880b9eee4e8f2
Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Date:   Mon Jun 20 10:04:25 2016 -0400

    xen: Make FLASK_AVC_STATS kconfig option visible
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx>

commit 5efcebc66de0c34b071fea5c84e7d379541929af
Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Date:   Mon Jun 20 10:04:24 2016 -0400

    xsm: clean up unregistration
    
    The only possible value of original_ops was &dummy_xsm_ops, and
    unregister_xsm was never used.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
    Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx>

commit 70dda5f4e9c92b35c88b8f52f0fddd52f8778e51
Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Date:   Mon Jun 20 10:04:23 2016 -0400

    xsm: annotate setup functions with __init
    
    These functions were only called from __init functions.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx>

commit 6a962ebddce8f287588dfb6599d37ff7b6f583b7
Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Date:   Tue Jun 21 13:09:23 2016 -0400

    xen: move FLASK entry under XSM in Kconfig
    
    Since enabling XSM is required to enable FLASK, place the option for
    FLASK below the one for XSM.  In addition, since it does not make sense
    to enable XSM without any XSM providers, and FLASK is the only XSM
    provider, hide the option to disable FLASK under EXPERT.
    
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Reviewed-by: Doug Goldstein <cardoe@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.