flight 113125 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113125/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-arm64                     <job status>                 broken
 test-arm64-arm64-xl-xsm         <job status>                 broken
 build-arm64-pvops               <job status>                 broken

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 build-arm64-pvops             2 hosts-allocate              broken like 113039
 build-arm64-pvops             3 capture-logs                broken like 113039
 build-arm64                   2 hosts-allocate              broken like 113039
 build-arm64                   3 capture-logs                broken like 113039
 test-armhf-armhf-xl          13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          14 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     13 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  65c256266477e72f455a45a54597d5816646c74f
baseline version:
 xen                  6dfb43d6f2cd8ea6274d203ca00ecfc7c565f11a

Last test of basis   113039  2017-09-04 15:02:08 Z    2 days
Failing since        113052  2017-09-05 13:01:29 Z    1 days   21 attempts
Testing same since   113097  2017-09-06 17:02:46 Z    0 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexandru Isaila <aisa...@bitdefender.com>
  Andrew Cooper <andrew.coop...@citrix.com>
  Jan Beulich <jbeul...@suse.com>
  Olaf Hering <o...@aepfle.de>
  Tamas K Lengyel <ta...@tklengyel.com>
  Wei Liu <wei.l...@citrix.com>
  Yi Sun <yi.y....@linux.intel.com>

jobs:
 build-amd64                                                  pass    
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 build-arm64-pvops                                            broken  
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      broken  
 test-amd64-amd64-xl-qemuu-debianhvm-i386                     pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-arm64 broken
broken-job test-arm64-arm64-xl-xsm broken
broken-job build-arm64-pvops broken
broken-step build-arm64-pvops hosts-allocate
broken-step build-arm64-pvops capture-logs
broken-step build-arm64 hosts-allocate
broken-step build-arm64 capture-logs

Not pushing.

------------------------------------------------------------
commit 65c256266477e72f455a45a54597d5816646c74f
Author: Yi Sun <yi.y....@linux.intel.com>
Date:   Mon Sep 4 19:01:44 2017 +0800

    tools: change the type of '*nr' in 'libxl_psr_cat_get_info'
    
    Due to historical reason, type of parameter '*nr' in 
'libxl_psr_cat_get_info'
    is 'int'. But this is not right. It should be 'unsigned int'. This patch 
fixes
    this and does related changes.
    
    Suggested-by: Roger Pau Monné <roger....@citrix.com>
    Signed-off-by: Yi Sun <yi.y....@linux.intel.com>
    Acked-by: Wei Liu <wei.l...@citrix.com>

commit 5fe3e6a74afa21dd4f4abc18b47ed0f2e1550329
Author: Yi Sun <yi.y....@linux.intel.com>
Date:   Mon Sep 4 19:01:43 2017 +0800

    tools: use '__i386__' and '__x86_64__' to replace PSR macros
    
    The libxl interfaces and related functions are not necessary to be included 
by
    'LIBXL_HAVE_PSR_CMT' and 'LIBXL_HAVE_PSR_CAT'. So replace them to common x86
    macros. Furthermore, only compile 'xl_psr.c' under x86.
    
    Suggested-by: Roger Pau Monné <roger....@citrix.com>
    Suggested-by: Wei Liu <wei.l...@citrix.com>
    Signed-off-by: Yi Sun <yi.y....@linux.intel.com>
    Reviewed-by: Roger Pau Monné <roger....@citrix.com>
    Acked-by: Wei Liu <wei.l...@citrix.com>

commit 0829a6bdbdc6b79990bd0668e847275b6a2717e5
Author: Jan Beulich <jbeul...@suse.com>
Date:   Wed Sep 6 12:32:00 2017 +0200

    x86: introduce and use setup_force_cpu_cap()
    
    For XEN_SMEP and XEN_SMAP to not be cleared while bringing up APs we'd
    need to clone the respective hack used for CPUID_FAULTING. Introduce an
    inverse of setup_clear_cpu_cap() instead, but let clearing of features
    overrule forced setting of them.
    
    XEN_SMAP being wrong post-boot is a problem specifically for live
    patching, as a live patch may need alternative instruction patching
    keyed off of that feature flag.
    
    Reported-by: Sarah Newman <secur...@prgmr.com>
    Signed-off-by: Jan Beulich <jbeul...@suse.com>
    Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com>

commit fd903a35daf3e7e6bfa782b18dfd43746f940bed
Author: Andrew Cooper <andrew.coop...@citrix.com>
Date:   Tue Sep 5 17:54:45 2017 +0100

    x86/traps: Fix show_page_walk() to avoid printing trailing whitespace
    
    This moves the L2 line to be consistent with the L3 line.
    
    Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
    Reviewed-by: Wei Liu <wei.l...@citrix.com>
    Acked-by: Jan Beulich <jbeul...@suse.com>

commit 12257de3cfff9b4ffa0b7379ef82c9ad7c8dbec9
Author: Andrew Cooper <andrew.coop...@citrix.com>
Date:   Fri Sep 1 17:05:21 2017 +0000

    xen: Drop asmlinkage everywhere
    
    asmlinkage is defined as nothing on all architectures, and not used
    consistently anywhere, even in common code.  Remove it all.
    
    Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
    Acked-by: Jan Beulich <jbeul...@suse.com>
    Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>

commit 150dd3946c521a9257c4dd97e6190c6b0df680d3
Author: Olaf Hering <o...@aepfle.de>
Date:   Tue Sep 5 11:03:38 2017 +0200

    libxc/bitops: correct comment for bitmap_size
    
    The returned value represents now units of bytes instead of longs.
    
    Fixes commit 11d0044a16 ("tools/libxc: Modify bitmap operations to
    take void pointers").
    
    Signed-off-by: Olaf Hering <o...@aepfle.de>
    Acked-by: Wei Liu <wei.l...@citrix.com>

commit 15e4dd5e866b43bbc2d438034445c6582db1d3de
Author: Alexandru Isaila <aisa...@bitdefender.com>
Date:   Wed Aug 30 12:04:00 2017 +0300

    common/vm_event: Initialize vm_event lists on domain creation
    
    The patch splits the vm_event into three structures:vm_event_share,
    vm_event_paging, vm_event_monitor. The allocation for the
    structure is moved to vm_event_enable so that it can be
    allocated/init when needed and freed in vm_event_disable.
    
    Signed-off-by: Alexandru Isaila <aisa...@bitdefender.com>
    Acked-by: Jan Beulich <jbeul...@suse.com>
    Acked-by: Wei Liu <wei.l...@citrix.com>
    Acked-by: Tamas K Lengyel <ta...@tklengyel.com>

commit eb4e638a474792137414f03409e78477810c3436
Author: Jan Beulich <jbeul...@suse.com>
Date:   Tue Sep 5 17:32:43 2017 +0200

    x86emul: correct EVEX decoding
    
    While these are latent issues only for now, correct them right away:
    - unnamed (in the SDM) EVEX bits need to be set/clear respectively
    - EVEX.V' (called RX in our code) needs to uniformly be 1 in non-64-bit
      modes,
    - EXEX.R' (called R in our code) is uniformly being ignored in
      non-64-bit modes.
    
    Signed-off-by: Jan Beulich <jbeul...@suse.com>
    Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com>

commit a6488965ca3ec30f2e0b7022b539bba78c2aeede
Author: Jan Beulich <jbeul...@suse.com>
Date:   Tue Sep 5 17:32:05 2017 +0200

    x86emul: correct VEX.L handling for VCVT{,T}S{S,D}2SI
    
    Recent changes to the SDM (and XED) have made clear that older hardware
    raising #UD when the bit is set was really an erratum. Generalize the
    so far AMD-only override.
    
    Signed-off-by: Jan Beulich <jbeul...@suse.com>
    Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com>

commit 9c2babd05a213f8802e3cc1c64a2af932b5cbd7d
Author: Jan Beulich <jbeul...@suse.com>
Date:   Tue Sep 5 17:31:01 2017 +0200

    x86emul: correct VEX.W handling for non-64-bit VPINSRD
    
    Going though the XED commits from the last couple of months made me
    notice that VPINSRD, other than VPEXTRD, does not clear VEX.W for non-
    64-bit modes, leading to an insertion of stray 32-bits of zero in case
    the original instruction had the bit set.
    
    Also remove a pointless fall-through in VPEXTRW handling, bringing
    things in line with VPINSRW.
    
    Signed-off-by: Jan Beulich <jbeul...@suse.com>
    Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com>

commit 4d3f0fde471e7588ce512eaff1abdab209d8cd4b
Author: Andrew Cooper <andrew.coop...@citrix.com>
Date:   Tue Sep 5 09:40:58 2017 +0100

    x86/emul: Fix the handling of unimplemented Grp7 instructions
    
    Grp7 is abnormally complicated to decode, even by x86's standards, with
    {s,l}msw being the problematic cases.
    
    Previously, any value which fell through the first switch statement (looking
    for instructions with entirely implicit operands) would be interpreted by 
the
    second switch statement (handling instructions with memory operands).
    
    Unimplemented instructions would then hit the #UD case for having a 
non-memory
    operand, rather than taking the cannot_emulate path.
    
    Consolidate the two switch statements into a single one, using ranges to 
cover
    the instructions with memory operands.
    
    Reported-by: Petre Pircalabu <ppircal...@bitdefender.com>
    Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
    Reviewed-by: Jan Beulich <jbeul...@suse.com>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

Reply via email to