[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 133231: trouble: blocked/broken/pass

flight 133231 xen-unstable-smoke real [real]

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-arm64-xsm                 <job status>                 broken

Regressions which are regarded as allowable (not blocking):
 build-arm64-xsm               2 hosts-allocate         broken REGR. vs. 133005

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 build-arm64-xsm               3 capture-logs          broken blocked in 133005
 test-amd64-amd64-libvirt     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          14 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  f178a00c30173c0b268d99160e19ad299b1823a2
baseline version:
 xen                  455301716e1ff358cb79367213003fba771dd466

Last test of basis   133005  2019-02-07 14:00:32 Z    6 days
Failing since        133011  2019-02-07 18:00:36 Z    5 days   33 attempts
Testing same since   133200  2019-02-12 16:00:56 Z    1 days   10 attempts

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Juergen Gross <jgross@xxxxxxxx>
  Kevin Tian <kevin.tian@xxxxxxxxx>
  Michael Tautschnig <tautschn@xxxxxxxxxxxx>
  Norbert Manthey <nmanthey@xxxxxxxxxx>
  Norbert Manthey <nmanthey@xxxxxxxxx>
  Stefano Stabellini <sstabellini@xxxxxxxxxx>
  Stefano Stabellini <stefanos@xxxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

 build-arm64-xsm                                              broken  
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     pass    
 test-amd64-amd64-libvirt                                     pass    

sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at

Explanation of these reports, and of osstest in general, is at

Test harness code can be found at

broken-job build-arm64-xsm broken
broken-step build-arm64-xsm hosts-allocate
broken-step build-arm64-xsm capture-logs

Not pushing.

commit f178a00c30173c0b268d99160e19ad299b1823a2
Author: Norbert Manthey <nmanthey@xxxxxxxxx>
Date:   Tue Feb 12 15:20:15 2019 +0100

    x86/hvm: block speculative out-of-bound accesses
    There are multiple arrays in the HVM interface that are accessed
    with indices that are provided by the guest. To avoid speculative
    out-of-bound accesses, we use the array_index_nospec macro.
    When blocking speculative out-of-bound accesses, we can classify arrays
    into dynamic arrays and static arrays. Where the former are allocated
    during run time, the size of the latter is known during compile time.
    On static arrays, compiler might be able to block speculative accesses
    in the future.
    This is part of the speculative hardening effort.
    Reported-by: Pawel Wieczorkiewicz <wipawel@xxxxxxxxx>
    Signed-off-by: Norbert Manthey <nmanthey@xxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 56d8d0119d270f846c6c4943712b8a21fbe5d4d0
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Tue Feb 12 11:54:57 2019 +0100

    VMX: don't ignore P2M setup error
    set_mmio_p2m_entry() may fail, in particular with -ENOMEM. Don't ignore
    such an error, but instead cause domain creation to fail in such a case.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 88b92c3820cffed4b4abeb139edc2cbd8286cb12
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Tue Feb 12 11:54:07 2019 +0100

    iommu: fix iommu_ops initialization
    Commit 32a5ea00ec75ef53e ("IOMMU/x86: remove indirection from certain
    IOMMU hook accesses") introduced iommu_ops initialized at boot time
    with data declared as __initconstrel.
    On Intel systems there is another path where iommu_ops is initialized
    and this path is relevant on resume after returning from system suspend.
    As the initialization data is no longer accessible in this case that
    second initialization must be dropped in case the system isn't just
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 09fc4de4a8ebb389641b8b8a632efcb7ca880e08
Author: Norbert Manthey <nmanthey@xxxxxxxxxx>
Date:   Wed Feb 6 15:09:33 2019 +0100

    asm: handle comments when creating header file
    In the early steps of compilation, the asm header files are created, such
    as include/asm-$(TARGET_ARCH)/asm-offsets.h. These files depend on the
    assembly file arch/$(TARGET_ARCH)/asm-offsets.s, which is generated
    before. Depending on the used toolchain, there might be comments in the
    assembly files. Especially the goto-gcc compiler of the bounded model
    checker CBMC adds comments that start with a '#' symbol at the beginning
    of the line.
    This commit adds handling comments in assembler during the creation of the
    asm header files, especially ignoring lines that start with '#', which
    indicate comments for both ARM and x86 assembler. The used tool goto-as
    produces exactly comments of this kind.
    Signed-off-by: Norbert Manthey <nmanthey@xxxxxxxxx>
    Signed-off-by: Michael Tautschnig <tautschn@xxxxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit d04bf1eb656be8b2131d08c7e32cff343556cfa8
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Mon Feb 11 09:09:13 2019 +0100

    x86/shadow: adjust minimum allocation calculations
    A previously bad situation has become worse with the early setting of
    ->max_vcpus: The value returned by shadow_min_acceptable_pages() has
    further grown, and hence now holds back even more memory from use for
    the p2m.
    Make sh_min_allocation() account for all p2m memory needed for
    shadow_enable() to succeed during domain creation (at which point the
    domain has no memory at all allocated to it yet, and hence use of
    d->tot_pages is meaningless).
    Also make shadow_min_acceptable_pages() no longer needlessly add 1 to
    the vCPU count.
    Finally make the debugging printk() in shadow_alloc_p2m_page() a little
    more useful by logging some of the relevant domain settings.
    Reported-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
    Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit aca21442499c04b70d84164b46744b35ee7b8bf4
Author: George Dunlap <george.dunlap@xxxxxxxxxx>
Date:   Thu Feb 7 12:41:17 2019 +0000

    docs: features/qemu-depriv formatting fixes
    Need a space between the paragraph and the list so pandoc knows it's a
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 9db777dda33ba92c0a0feca76de5bba57358ebcc
Author: George Dunlap <george.dunlap@xxxxxxxxxx>
Date:   Thu Feb 7 12:05:43 2019 +0000

    docs: Update credit/credit2 feature docs reflecting new default scheduler
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 7b5278b28f8fbcd4402e4520d7a5d607d4a997a7
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Thu Feb 7 15:02:27 2019 +0000

    tools: init scripts: make XEN_RUN_DIR and XEN_LOCK_DIR mode 700
    These directories ought not to be even world-readable.  If this script
    for some reason runs with a lax umask they might be created
    overly-writeable.  Avoid any such bug by setting the mode explicitly.
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 0c4a38c098f9bffeb33f8cf88abdea4b0f9a9070
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Thu Feb 7 15:02:26 2019 +0000

    tools: init scripts: xencommons: Fixes to Description
    `neeeded' is a typo.  And xend is long gone.
    No functional change.
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit 01097e0194321d27262513cf1291fddfea1606c3
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Thu Feb 7 15:02:25 2019 +0000

    tools: init scripts: xencommons: Provides `xen'
    It is useful to have a single `xen' facility (in the LSB Provides
    namespace).  That allows other facilities to specify that they should
    go after `xen' without needing to know the implementation details.
    This service name is already Provide'd by the (fairly different) init
    scripts used in Debian.
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

commit b4df73de493954c44f240f78779c9bd3782e1572
Author: Stefano Stabellini <sstabellini@xxxxxxxxxx>
Date:   Tue Feb 5 13:38:53 2019 -0800

    xen/arm: gic-v2: deactivate interrupts during initialization
    Interrupts could be ACTIVE at boot. Make sure to deactivate them during
    Signed-off-by: Stefano Stabellini <stefanos@xxxxxxxxxx>
    Reviewed-by: Julien Grall <julien.grall@xxxxxxx>
    CC: julien.grall@xxxxxxx
    CC: peng.fan@xxxxxxx
    CC: jgross@xxxxxxxx
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.