[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable-smoke test] 128556: regressions - FAIL
flight 128556 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/128556/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-build fail REGR. vs. 128513 build-armhf 6 xen-build fail REGR. vs. 128513 Tests which did not succeed, but are not blocking: test-armhf-armhf-xl 1 build-check(1) blocked n/a test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13 migrate-support-check fail never pass version targeted for testing: xen cd395b1d69a773556d2af206b4ecbf56b33057ea baseline version: xen 85b00385827e4e061b2ff38b549c03d0f1e66b6a Last test of basis 128513 2018-10-08 18:01:11 Z 1 days Testing same since 128527 2018-10-09 15:00:42 Z 0 days 6 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Nicolas Poirot <nicolas.poirot@xxxxxxxxx> Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> Roger Pau Monné <roger.pau@xxxxxxxxxx> Wei Liu <wei.liu2@xxxxxxxxxx> jobs: build-arm64-xsm fail build-amd64 pass build-armhf fail build-amd64-libvirt pass test-armhf-armhf-xl blocked test-arm64-arm64-xl-xsm blocked test-amd64-amd64-xl-qemuu-debianhvm-i386 pass test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit cd395b1d69a773556d2af206b4ecbf56b33057ea Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Oct 9 16:27:59 2018 +0200 x86: put_page_from_l2e() should honor _PAGE_RW 56fff3e5e9 ("x86: nuke PV superpage option and code") has introduced a (luckily latent only) bug here, in that it didn't make reference dropping dependent on whether the page was mapped writable. The only current source of large page mappings for PV domains is the Dom0 builder, which only produces writeable ones. Take the opportunity and also convert to bool both put_data_page()'s respective parameter and the argument put_page_from_l3e() passes. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx> commit e9be34be5f9a1a6ecbf05ba9502cd705ae441476 Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> Date: Tue Oct 9 16:27:13 2018 +0200 x86/vtd: fix iommu_share_p2m_table Commit 2916951c1 "mm / iommu: include need_iommu() test in iommu_use_hap_pt()" changed the check in iommu_share_p2m_table to use need_iommu(d) (as part of iommu_use_hap_pt) instead of iommu_enabled, which broke the check because at the point in domain construction where iommu_share_p2m_table is called need_iommu(d) will always return false. Fix this by reverting to the previous logic. While there turn the hap_enabled check into an ASSERT, since the only caller of iommu_share_p2m_table already performs the hap_enabled check before calling the function. Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 5e04bf333b954fcfd86eda3d258dc69bcf0586a3 Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Date: Tue Oct 9 16:26:54 2018 +0200 flask: sort io{port,mem}con entries These entries are not always sorted by checkpolicy, so sort them during policy load (as is already done for later ocontext additions). Reported-by: Nicolas Poirot <nicolas.poirot@xxxxxxxxx> Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Tested-by: Nicolas Poirot <nicolas.poirot@xxxxxxxxx> Reviewed-by: Nicolas Poirot <nicolas.poirot@xxxxxxxxx> commit 27225bbb6d148f6d373a4a89b0dc3f3f5bf4d193 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Oct 9 16:25:35 2018 +0200 x86/HVM: move vendor independent CPU save/restore logic to shared code A few pieces of the handling here are (no longer?) vendor specific, and hence there's no point in replicating the code. Zero the full structure before calling the save hook, eliminating the need for the hook functions to zero individual fields. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx> commit 5866b00ce05a7a7c39a0d5eb7f9de4149c5efe8b Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Tue Oct 9 15:06:25 2018 +0100 tools/libxenstat: Fix SONAME following c/s 57077cc42 The unstable ABI version is 4.12, not 4.11 Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |