From: osstest service owner <osstest-admin@xenproject.org>
To: xen-devel@lists.xensource.com, osstest-admin@xenproject.org
Subject: [xen-unstable bisection] complete build-armhf-xsm
Date: Wed, 29 Jun 2016 20:34:12 +0000 [thread overview]
Message-ID: <E1bIMBY-0006Qa-D9@osstest.test-lab.xenproject.org> (raw)
branch xen-unstable
xenbranch xen-unstable
job build-armhf-xsm
testid xen-build
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in tree: xen git://xenbits.xen.org/xen.git
Bug introduced: 08cffe6696c047123bd552e095163924c8ef4353
Bug not present: 668ba1f85bf2e4086cf18c35abc880b9eee4e8f2
Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/96403/
commit 08cffe6696c047123bd552e095163924c8ef4353
Author: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Date: Mon Jun 20 10:04:26 2016 -0400
xsm: add a default policy to .init.data
This adds a Kconfig option and support for including the XSM policy from
tools/flask/policy in the hypervisor so that the bootloader does not
need to provide a policy to get sane behavior from an XSM-enabled
hypervisor. The policy provided by the bootloader, if present, will
override the built-in policy.
Enabling this option only builds the policy if checkpolicy is available
during compilation of the hypervisor; otherwise, it does nothing. The
XSM policy is not moved out of tools because that remains the primary
location for installing and configuring the policy.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Reviewed-by: Doug Goldstein <cardoe@cardoe.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Julien Grall <julien.grall@arm.com>
For bisection revision-tuple graph see:
http://logs.test-lab.xenproject.org/osstest/results/bisect/xen-unstable/build-armhf-xsm.xen-build.html
Revision IDs in each graph node refer, respectively, to the Trees above.
----------------------------------------
Running cs-bisection-step --graph-out=/home/logs/results/bisect/xen-unstable/build-armhf-xsm.xen-build --summary-out=tmp/96403.bisection-summary --basis-template=96296 --blessings=real,real-bisect xen-unstable build-armhf-xsm xen-build
Searching for failure / basis pass:
96351 fail [host=cubietruck-gleizes] / 96296 ok.
Failure / basis pass flights: 96351 / 96296
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
Latest 44a072f0de0d57c95c2212bbce02888832b7b74f 9b15b2e367a8565c73d5ba975e05c89c99078e60
Basis pass 44a072f0de0d57c95c2212bbce02888832b7b74f 8384dc2d95538c5910d98db3df3ff5448bf0af48
Generating revisions with ./adhoc-revtuple-generator git://xenbits.xen.org/qemu-xen.git#44a072f0de0d57c95c2212bbce02888832b7b74f-44a072f0de0d57c95c2212bbce02888832b7b74f git://xenbits.xen.org/xen.git#8384dc2d95538c5910d98db3df3ff5448bf0af48-9b15b2e367a8565c73d5ba975e05c89c99078e60
Loaded 1001 nodes in revision graph
Searching for test results:
96234 [host=cubietruck-metzinger]
96251 [host=cubietruck-metzinger]
96278 [host=arndale-bluewater]
96296 pass 44a072f0de0d57c95c2212bbce02888832b7b74f 8384dc2d95538c5910d98db3df3ff5448bf0af48
96372 pass 44a072f0de0d57c95c2212bbce02888832b7b74f 8384dc2d95538c5910d98db3df3ff5448bf0af48
96351 fail 44a072f0de0d57c95c2212bbce02888832b7b74f 9b15b2e367a8565c73d5ba975e05c89c99078e60
96375 fail 44a072f0de0d57c95c2212bbce02888832b7b74f 9b15b2e367a8565c73d5ba975e05c89c99078e60
96380 pass 44a072f0de0d57c95c2212bbce02888832b7b74f 668ba1f85bf2e4086cf18c35abc880b9eee4e8f2
96388 fail 44a072f0de0d57c95c2212bbce02888832b7b74f dca07f30021ca0840bd923f107d546301a5dba7a
96392 fail 44a072f0de0d57c95c2212bbce02888832b7b74f 08cffe6696c047123bd552e095163924c8ef4353
96396 pass 44a072f0de0d57c95c2212bbce02888832b7b74f 668ba1f85bf2e4086cf18c35abc880b9eee4e8f2
96397 fail 44a072f0de0d57c95c2212bbce02888832b7b74f 08cffe6696c047123bd552e095163924c8ef4353
96401 pass 44a072f0de0d57c95c2212bbce02888832b7b74f 668ba1f85bf2e4086cf18c35abc880b9eee4e8f2
96403 fail 44a072f0de0d57c95c2212bbce02888832b7b74f 08cffe6696c047123bd552e095163924c8ef4353
Searching for interesting versions
Result found: flight 96296 (pass), for basis pass
Result found: flight 96351 (fail), for basis failure
Repro found: flight 96372 (pass), for basis pass
Repro found: flight 96375 (fail), for basis failure
0 revisions at 44a072f0de0d57c95c2212bbce02888832b7b74f 668ba1f85bf2e4086cf18c35abc880b9eee4e8f2
No revisions left to test, checking graph state.
Result found: flight 96380 (pass), for last pass
Result found: flight 96392 (fail), for first failure
Repro found: flight 96396 (pass), for last pass
Repro found: flight 96397 (fail), for first failure
Repro found: flight 96401 (pass), for last pass
Repro found: flight 96403 (fail), for first failure
*** Found and reproduced problem changeset ***
Bug is in tree: xen git://xenbits.xen.org/xen.git
Bug introduced: 08cffe6696c047123bd552e095163924c8ef4353
Bug not present: 668ba1f85bf2e4086cf18c35abc880b9eee4e8f2
Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/96403/
commit 08cffe6696c047123bd552e095163924c8ef4353
Author: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Date: Mon Jun 20 10:04:26 2016 -0400
xsm: add a default policy to .init.data
This adds a Kconfig option and support for including the XSM policy from
tools/flask/policy in the hypervisor so that the bootloader does not
need to provide a policy to get sane behavior from an XSM-enabled
hypervisor. The policy provided by the bootloader, if present, will
override the built-in policy.
Enabling this option only builds the policy if checkpolicy is available
during compilation of the hypervisor; otherwise, it does nothing. The
XSM policy is not moved out of tools because that remains the primary
location for installing and configuring the policy.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Reviewed-by: Doug Goldstein <cardoe@cardoe.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Julien Grall <julien.grall@arm.com>
Revision graph left in /home/logs/results/bisect/xen-unstable/build-armhf-xsm.xen-build.{dot,ps,png,html,svg}.
----------------------------------------
96403: tolerable ALL FAIL
flight 96403 xen-unstable real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/96403/
Failures :-/ but no regressions.
Tests which did not succeed,
including tests which could not be run:
build-armhf-xsm 5 xen-build fail baseline untested
jobs:
build-armhf-xsm fail
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
reply other threads:[~2016-06-29 20:34 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=E1bIMBY-0006Qa-D9@osstest.test-lab.xenproject.org \
--to=osstest-admin@xenproject.org \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).