From patchwork Sat Aug 10 06:59:18 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefano Stabellini X-Patchwork-Id: 13759439 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 85114C3DA7F for ; Sat, 10 Aug 2024 06:59:53 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.775037.1185407 (Exim 4.92) (envelope-from ) id 1scg4f-0007aQ-B2; Sat, 10 Aug 2024 06:59:37 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 775037.1185407; Sat, 10 Aug 2024 06:59:37 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1scg4f-0007Zv-81; Sat, 10 Aug 2024 06:59:37 +0000 Received: by outflank-mailman (input) for mailman id 775037; Sat, 10 Aug 2024 06:59:36 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1scg4d-0007L7-VI for xen-devel@lists.xenproject.org; Sat, 10 Aug 2024 06:59:35 +0000 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on20601.outbound.protection.outlook.com [2a01:111:f403:2416::601]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 19f40a5b-56e6-11ef-bc04-fd08da9f4363; Sat, 10 Aug 2024 08:59:35 +0200 (CEST) Received: from CH5PR05CA0024.namprd05.prod.outlook.com (2603:10b6:610:1f0::29) by PH0PR12MB7791.namprd12.prod.outlook.com (2603:10b6:510:280::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7849.15; Sat, 10 Aug 2024 06:59:27 +0000 Received: from DS2PEPF00003446.namprd04.prod.outlook.com (2603:10b6:610:1f0:cafe::a1) by CH5PR05CA0024.outlook.office365.com (2603:10b6:610:1f0::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7875.12 via Frontend Transport; Sat, 10 Aug 2024 06:59:26 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by DS2PEPF00003446.mail.protection.outlook.com (10.167.17.73) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7849.8 via Frontend Transport; Sat, 10 Aug 2024 06:59:26 +0000 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Sat, 10 Aug 2024 01:59:24 -0500 Received: from smtp.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Sat, 10 Aug 2024 01:59:23 -0500 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 19f40a5b-56e6-11ef-bc04-fd08da9f4363 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dEYe21sj6F0Nikl+LDNZA1Pse+qaAwaEoHizTaYFcHgpQwABvXUdn7CL/hpqdUUl3h0uIfFSZvDMb9PGQI9kGZQc1z2+yG6uG4Xjv5rR2NG1IKq/nq39kIjfTwtT04t8HmHYLFF2qDbuydwnr/rOvM6oQLKkgUpnJWk1W12JUDcQBeTUjADOzpKH58gbX226fWVu4FQ8XKVqVA4cyAIfyTz/hM/yDwHnwfWCNuUmSTxpSD16w4VSZlf2rP3dSNIoeAX3G6jF65bjv8ldGkXh97gN2viFmFcYJUFDhX2qMnrDUY02ZEqpNhNWYigWiCj/LRxG/JWB/3Dw8x/DmfFhdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GuMHa6PFELuzKmtNAeqLrGN+Q5ZS4SG6rDQOYJWFiwY=; b=EUEx4fBesHomRnTJqUtyLfYH/B3d68BXOuv0ZUWp+0E9P1Mzy7ZMY0WaIUKDDG2SK8Q8OkV7pXnSdI1Z/YuSpA4kL1hHOB8JOqSyhJKVdFdTLNbqbvcef1vv0B48AYZ6/YZEgQ3fo7PC9pGHHipJ/oMCyX7dQNpjfFKbl8CFmjlHvwPaqvQk1Xaudpv59Ny3WjNXmxekZCeXNoiLQdL/a53fxXhLHR4FCd5onZ81zKEJl4fFSskuu1GSFZ/FvcAuhZ13ixV61DBcKLGyLUpBR8sKBOhLTVEgyYkl4kuUdlx0WpmebR0cDHK/l55AR0a29UvTL4e9BDjSu9HizkZzfA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GuMHa6PFELuzKmtNAeqLrGN+Q5ZS4SG6rDQOYJWFiwY=; b=DlKydzNiBqYkuJ6btA9Ym/ZUkMBOZMxkglhZX+Zf47UXUeyPe9tjh7cpo7XBrDd3uQm49ZZmxE3QNS7l3dqMbLgqc/CHKxUrfkmGEcufPuaViu7SLka4DuRrV6fiTWblVKr5oLT17r6yjKUBRhE1/5NGpgjSfODfIFU5kPxb2p8= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Stefano Stabellini To: CC: , , , Stefano Stabellini Subject: [PATCH 1/3] automation: disable Yocto jobs Date: Fri, 9 Aug 2024 23:59:18 -0700 Message-ID: <20240810065920.415345-1-stefano.stabellini@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Received-SPF: None (SATLEXMB04.amd.com: stefano.stabellini@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS2PEPF00003446:EE_|PH0PR12MB7791:EE_ X-MS-Office365-Filtering-Correlation-Id: 96a2db7e-2bf7-4ef4-b7af-08dcb909f912 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(376014)(82310400026)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Aug 2024 06:59:26.3115 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 96a2db7e-2bf7-4ef4-b7af-08dcb909f912 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS2PEPF00003446.namprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR12MB7791 The Yocto jobs take a long time to run. We are changing Gitlab ARM64 runners and the new runners might not be able to finish the Yocto jobs in a reasonable time. For now, disable the Yocto jobs by turning them into "manual" trigger (they need to be manually executed.) Signed-off-by: Stefano Stabellini Reviewed-by: Michal Orzel --- automation/gitlab-ci/build.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/automation/gitlab-ci/build.yaml b/automation/gitlab-ci/build.yaml index 32045cef0c..c668736bdc 100644 --- a/automation/gitlab-ci/build.yaml +++ b/automation/gitlab-ci/build.yaml @@ -470,17 +470,20 @@ yocto-qemuarm64: extends: .yocto-test-arm64 variables: YOCTO_BOARD: qemuarm64 + when: manual yocto-qemuarm: extends: .yocto-test-arm64 variables: YOCTO_BOARD: qemuarm YOCTO_OUTPUT: --copy-output + when: manual yocto-qemux86-64: extends: .yocto-test-x86-64 variables: YOCTO_BOARD: qemux86-64 + when: manual # Cppcheck analysis jobs From patchwork Sat Aug 10 06:59:19 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefano Stabellini X-Patchwork-Id: 13759441 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id BF649C531DB for ; Sat, 10 Aug 2024 06:59:55 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.775038.1185412 (Exim 4.92) (envelope-from ) id 1scg4f-0007d4-KN; Sat, 10 Aug 2024 06:59:37 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 775038.1185412; Sat, 10 Aug 2024 06:59:37 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1scg4f-0007c8-EC; Sat, 10 Aug 2024 06:59:37 +0000 Received: by outflank-mailman (input) for mailman id 775038; Sat, 10 Aug 2024 06:59:36 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1scg4e-0007ZQ-Iy for xen-devel@lists.xenproject.org; Sat, 10 Aug 2024 06:59:36 +0000 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on20600.outbound.protection.outlook.com [2a01:111:f403:2416::600]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 18ef3b80-56e6-11ef-8776-851b0ebba9a2; Sat, 10 Aug 2024 08:59:33 +0200 (CEST) Received: from CH5PR05CA0020.namprd05.prod.outlook.com (2603:10b6:610:1f0::13) by SJ0PR12MB5664.namprd12.prod.outlook.com (2603:10b6:a03:42b::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7849.14; Sat, 10 Aug 2024 06:59:28 +0000 Received: from DS2PEPF00003446.namprd04.prod.outlook.com (2603:10b6:610:1f0:cafe::10) by CH5PR05CA0020.outlook.office365.com (2603:10b6:610:1f0::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7875.10 via Frontend Transport; Sat, 10 Aug 2024 06:59:28 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by DS2PEPF00003446.mail.protection.outlook.com (10.167.17.73) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7849.8 via Frontend Transport; Sat, 10 Aug 2024 06:59:28 +0000 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Sat, 10 Aug 2024 01:59:25 -0500 Received: from smtp.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Sat, 10 Aug 2024 01:59:24 -0500 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 18ef3b80-56e6-11ef-8776-851b0ebba9a2 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=V95WD4fjCFUM2vHV58SzfkMRhSegNnjut6c1Alkgk6xJo/daxOuAT2KChAapfofaaQduOoM7Pnd8DzESQx0Y3t0piaU5/BKhzH0927ptSV04ApIyefkffsprifVa++KGHDRJkehzAW6vijpgPiz6njcqmjOWBDOSVC4ydUyfjghPgqDn1HS8cuyZCqmYBR0tSY0JGkXftxE0mcqKYgLTOxUYH8CyuPzblLA68rkbPjkv5SUanAP9LqGuPdb0V0tIeHX5+qgLhOC5tbOHlXIPenBSJ1o8N8iwF9U98KhnM/hOuCRPzC3ymUTgxP5qCEXZRDELT4oJ6GtUKUoSbUS90g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OhV9SNmCmqV3CEmvdRVQ2xzdM7v4lWF5RK7xW812IoI=; b=L59SnjZJvwsRS+AAU80GOeNRUIrooBTouNZDaxPElGaDRJBaG1N7Dgo2Q5mxqBl/fcm9Ftu+h6cCF6F09LK0LetXkhVKHyFbZFHDmybd43DC7xllKvgyw4YWWzBvTwV7nC8h8J/N0+cWGuz18nfQtk/3Xcu5yDwAB5RWg9rSlUMeqU5dbGyPlSEsOHR8TVEuhFrAey1VJQQdI2ld9xbyyIQRtE6rYITv35zK8et87SZ3/j4lgMKRRkIQkXZyyfPooxOtZOAkJyBDVqe8ECqnVYGTCp2tYKLMwrpeb2TNLZ+Yx+pejNPbYMa1Pz5m7xIJK1aykdEiHKLksSfjmnaLpw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OhV9SNmCmqV3CEmvdRVQ2xzdM7v4lWF5RK7xW812IoI=; b=tWqb73wuDp4OQJWIgSwr1Rp7B7jX8yQmRpnwsThZnYSYKBeLPZHS7TWV33401msWZPV3hr+v0MuVCJDYUxTYD6PlkozCxV72mWVR/IcLW3LeUFJq/qRzya/X8p6OqW+ksh0hnXTtAKEeCXDdUCw2aKQxixCwMdUvNQ9ZS2wIMrA= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Stefano Stabellini To: CC: , , , Stefano Stabellini Subject: [PATCH 2/3] automation: add "expect" to containers used to run QEMU tests Date: Fri, 9 Aug 2024 23:59:19 -0700 Message-ID: <20240810065920.415345-2-stefano.stabellini@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Received-SPF: None (SATLEXMB04.amd.com: stefano.stabellini@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS2PEPF00003446:EE_|SJ0PR12MB5664:EE_ X-MS-Office365-Filtering-Correlation-Id: 86a1acdd-c34c-4d1f-7016-08dcb909fa0f X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|1800799024|376014|82310400026; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700013)(1800799024)(376014)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Aug 2024 06:59:28.0146 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 86a1acdd-c34c-4d1f-7016-08dcb909fa0f X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS2PEPF00003446.namprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR12MB5664 It will be used for QEMU tests. Signed-off-by: Stefano Stabellini Reviewed-by: Michal Orzel --- automation/build/debian/12-ppc64le.dockerfile | 1 + automation/build/debian/12-riscv64.dockerfile | 1 + automation/build/debian/bookworm-arm64v8.dockerfile | 1 + automation/build/debian/bookworm.dockerfile | 1 + 4 files changed, 4 insertions(+) diff --git a/automation/build/debian/12-ppc64le.dockerfile b/automation/build/debian/12-ppc64le.dockerfile index 3b311e675e..1d5b486bb4 100644 --- a/automation/build/debian/12-ppc64le.dockerfile +++ b/automation/build/debian/12-ppc64le.dockerfile @@ -26,6 +26,7 @@ RUN < X-Patchwork-Id: 13759442 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 88899C3DA4A for ; Sat, 10 Aug 2024 06:59:55 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.775039.1185427 (Exim 4.92) (envelope-from ) id 1scg4h-00083x-0C; Sat, 10 Aug 2024 06:59:39 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 775039.1185427; Sat, 10 Aug 2024 06:59:38 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1scg4g-00083m-TI; Sat, 10 Aug 2024 06:59:38 +0000 Received: by outflank-mailman (input) for mailman id 775039; Sat, 10 Aug 2024 06:59:37 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1scg4e-0007L7-VP for xen-devel@lists.xenproject.org; Sat, 10 Aug 2024 06:59:37 +0000 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on20627.outbound.protection.outlook.com [2a01:111:f403:200a::627]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 18a00e15-56e6-11ef-bc04-fd08da9f4363; Sat, 10 Aug 2024 08:59:34 +0200 (CEST) Received: from CH5PR05CA0024.namprd05.prod.outlook.com (2603:10b6:610:1f0::29) by DS7PR12MB6192.namprd12.prod.outlook.com (2603:10b6:8:97::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7849.17; Sat, 10 Aug 2024 06:59:29 +0000 Received: from DS2PEPF00003446.namprd04.prod.outlook.com (2603:10b6:610:1f0:cafe::65) by CH5PR05CA0024.outlook.office365.com (2603:10b6:610:1f0::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7875.12 via Frontend Transport; Sat, 10 Aug 2024 06:59:29 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by DS2PEPF00003446.mail.protection.outlook.com (10.167.17.73) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7849.8 via Frontend Transport; Sat, 10 Aug 2024 06:59:28 +0000 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Sat, 10 Aug 2024 01:59:26 -0500 Received: from smtp.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Sat, 10 Aug 2024 01:59:25 -0500 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 18a00e15-56e6-11ef-bc04-fd08da9f4363 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=y06hgCpMKbnVFsBeizTCc3Af0vtNkDcWcTxouAj/qSkjGKEuszbof2QSXdsPOnpp56tqymMlzNn3MnRQn1ah9QiTJHaX9lONSh07XL5H2H+ma6zrvh52LQO5Ss7VqRwqhPjSX1/RPjnTGVE5JXWND+mDhbkIvKFg5RRqNrHM972Gat+EigEOSvEuiuIi7XPa92BZP8Wq8VpN+ResJKICszT3xErDZLyb7BCFUdY4ywbBXlEdJbi7EDyzQ/9npML+2+f2PNbdL7rH39A9a2cIlHGEqkhTo1H5TYN3wmw4YQYrY4ydPtmwW5rLihuEkgGPdstb2BZkTM2PV0T527zMXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0XnNG3qW9EH+V9tal+y68KGxesAb9KisVIj+BBdD00Y=; b=wTn8DPaowUe6vvqOhAfPAcucr6GUFSgOYTT+Pq07t85jI00wvhWRXp27ryZJ77BpWRmVheZkax/VmtELvchMvWL3YJi0eZCsMSzXht5Habj0a5Hk9m6ygH/Y6RwrDNiLosQ5jW18z6iRakay0FN0Bn7G8hfXxc934NtGXRSOZO9ozSnCMSgyxVBzJnyH11dJyv+LwUPGHcMGtEFo8r2P/J0XM6nqrV1P1LWX4IBVDEcRs4vmu/6TXuRDHtUkkbh6mpxiKhiAnEL2pOqy4MUOzRY+4g29NvlJxIrvc8sX5WwGa60AcxUfSfrksc6xcjMCTO219fW0oSCVht3vfAthKw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0XnNG3qW9EH+V9tal+y68KGxesAb9KisVIj+BBdD00Y=; b=saOU/ixInAAdcHjTZ5OJKOqZ7tgK/o8YVcTqTt87vCqmqa+HfVm7BaZ9sEnjFn+ed5o2momwOlVzZy9GcpN0XdnJ3qjVXIa4xePvYqzRSYryjLcWz0deAPx/LNV50dVknYpsHIvuJm3DuPUAQ/faO+Sqcy7xdf32667s6JFDmU8= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Stefano Stabellini To: CC: , , , Stefano Stabellini Subject: [PATCH 3/3] automation: use expect to run QEMU Date: Fri, 9 Aug 2024 23:59:20 -0700 Message-ID: <20240810065920.415345-3-stefano.stabellini@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Received-SPF: None (SATLEXMB04.amd.com: stefano.stabellini@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS2PEPF00003446:EE_|DS7PR12MB6192:EE_ X-MS-Office365-Filtering-Correlation-Id: 85c468a8-08ae-4c26-0671-08dcb909faa8 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|82310400026|376014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(82310400026)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Aug 2024 06:59:28.9677 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 85c468a8-08ae-4c26-0671-08dcb909faa8 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS2PEPF00003446.namprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR12MB6192 Use expect to invoke QEMU so that we can terminate the test as soon as we get the right string in the output instead of waiting until the final timeout. For timeout, instead of an hardcoding the value, use a Gitlab CI variable "QEMU_TIMEOUT" that can be changed depending on the latest status of the Gitlab CI runners. Note that for simplicity in the case of dom0less test, the script only checks for the $passed string. That is because the dom0 prompt and the $passed string could happen in any order making it difficult to check with expect which checks for strings in a specific order. Signed-off-by: Stefano Stabellini Reviewed-by: Michal Orzel --- automation/scripts/qemu-alpine-x86_64.sh | 15 +++---- automation/scripts/qemu-key.ex | 42 +++++++++++++++++++ automation/scripts/qemu-smoke-dom0-arm32.sh | 15 ++++--- automation/scripts/qemu-smoke-dom0-arm64.sh | 15 ++++--- .../scripts/qemu-smoke-dom0less-arm32.sh | 14 +++---- .../scripts/qemu-smoke-dom0less-arm64.sh | 14 +++---- automation/scripts/qemu-smoke-ppc64le.sh | 12 +++--- automation/scripts/qemu-smoke-riscv64.sh | 12 +++--- automation/scripts/qemu-smoke-x86-64.sh | 14 +++---- automation/scripts/qemu-xtf-dom0less-arm64.sh | 14 +++---- 10 files changed, 97 insertions(+), 70 deletions(-) create mode 100755 automation/scripts/qemu-key.ex diff --git a/automation/scripts/qemu-alpine-x86_64.sh b/automation/scripts/qemu-alpine-x86_64.sh index 8e398dcea3..24b23a573c 100755 --- a/automation/scripts/qemu-alpine-x86_64.sh +++ b/automation/scripts/qemu-alpine-x86_64.sh @@ -77,18 +77,15 @@ EOF # Run the test rm -f smoke.serial set +e -timeout -k 1 720 \ -qemu-system-x86_64 \ +export qemu_cmd="qemu-system-x86_64 \ -cpu qemu64,+svm \ -m 2G -smp 2 \ -monitor none -serial stdio \ -nographic \ -device virtio-net-pci,netdev=n0 \ - -netdev user,id=n0,tftp=binaries,bootfile=/pxelinux.0 |& \ - # Remove carriage returns from the stdout output, as gitlab - # interface chokes on them - tee smoke.serial | sed 's/\r//' + -netdev user,id=n0,tftp=binaries,bootfile=/pxelinux.0" -set -e -(grep -q "Domain-0" smoke.serial && grep -q "BusyBox" smoke.serial) || exit 1 -exit 0 +export qemu_log="smoke.serial" +export log_msg="Domain-0" +export passed="BusyBox" +./automation/scripts/qemu-key.ex diff --git a/automation/scripts/qemu-key.ex b/automation/scripts/qemu-key.ex new file mode 100755 index 0000000000..569ef2781f --- /dev/null +++ b/automation/scripts/qemu-key.ex @@ -0,0 +1,42 @@ +#!/usr/bin/expect -f + +set timeout $env(QEMU_TIMEOUT) + +log_file -a $env(qemu_log) + +match_max 10000 + +eval spawn $env(qemu_cmd) + +expect_after { + -re "(.*)\r" { + exp_continue + } + timeout {send_user "ERROR-Timeout!\n"; exit 1} + eof {send_user "ERROR-EOF!\n"; exit 1} +} + +if {[info exists env(uboot_cmd)]} { + expect "=>" + + send "$env(uboot_cmd)\r" +} + +if {[info exists env(log_msg)]} { + expect "$env(log_msg)" +} + +if {[info exists env(xen_cmd)]} { + send "$env(xen_cmd)\r" +} + +if {[info exists env(passed)]} { + expect { + "$env(passed)" { + exit 0 + } + } +} + +expect eof + diff --git a/automation/scripts/qemu-smoke-dom0-arm32.sh b/automation/scripts/qemu-smoke-dom0-arm32.sh index eaaea5a982..2835d8a908 100755 --- a/automation/scripts/qemu-smoke-dom0-arm32.sh +++ b/automation/scripts/qemu-smoke-dom0-arm32.sh @@ -78,9 +78,7 @@ bash imagebuilder/scripts/uboot-script-gen -t tftp -d . -c config rm -f ${serial_log} set +e -echo " virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000"| \ -timeout -k 1 720 \ -./qemu-system-arm \ +export qemu_cmd="./qemu-system-arm \ -machine virt \ -machine virtualization=true \ -smp 4 \ @@ -91,9 +89,10 @@ timeout -k 1 720 \ -no-reboot \ -device virtio-net-pci,netdev=n0 \ -netdev user,id=n0,tftp=./ \ - -bios /usr/lib/u-boot/qemu_arm/u-boot.bin |& \ - tee ${serial_log} | sed 's/\r//' + -bios /usr/lib/u-boot/qemu_arm/u-boot.bin" -set -e -(grep -q "Domain-0" ${serial_log} && grep -q "^/ #" ${serial_log}) || exit 1 -exit 0 +export uboot_cmd="virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000" +export qemu_log="${serial_log}" +export log_msg="Domain-0" +export passed="/ #" +../automation/scripts/qemu-key.ex diff --git a/automation/scripts/qemu-smoke-dom0-arm64.sh b/automation/scripts/qemu-smoke-dom0-arm64.sh index 352963a741..c2eac941d2 100755 --- a/automation/scripts/qemu-smoke-dom0-arm64.sh +++ b/automation/scripts/qemu-smoke-dom0-arm64.sh @@ -94,9 +94,7 @@ bash imagebuilder/scripts/uboot-script-gen -t tftp -d binaries/ -c binaries/conf # Run the test rm -f smoke.serial set +e -echo " virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000"| \ -timeout -k 1 720 \ -./binaries/qemu-system-aarch64 \ +export qemu_cmd="./binaries/qemu-system-aarch64 \ -machine virtualization=true \ -cpu cortex-a57 -machine type=virt \ -m 2048 -monitor none -serial stdio \ @@ -104,9 +102,10 @@ timeout -k 1 720 \ -no-reboot \ -device virtio-net-pci,netdev=n0 \ -netdev user,id=n0,tftp=binaries \ - -bios /usr/lib/u-boot/qemu_arm64/u-boot.bin |& \ - tee smoke.serial | sed 's/\r//' + -bios /usr/lib/u-boot/qemu_arm64/u-boot.bin" -set -e -(grep -q "Domain-0" smoke.serial && grep -q "BusyBox" smoke.serial) || exit 1 -exit 0 +export uboot_cmd="virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000" +export qemu_log="smoke.serial" +export log_msg="Domain-0" +export passed="BusyBox" +./automation/scripts/qemu-key.ex diff --git a/automation/scripts/qemu-smoke-dom0less-arm32.sh b/automation/scripts/qemu-smoke-dom0less-arm32.sh index c027c8c5c8..9fe08c337a 100755 --- a/automation/scripts/qemu-smoke-dom0less-arm32.sh +++ b/automation/scripts/qemu-smoke-dom0less-arm32.sh @@ -131,9 +131,7 @@ bash imagebuilder/scripts/uboot-script-gen -t tftp -d . -c config # Run the test rm -f ${serial_log} set +e -echo " virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000"| \ -timeout -k 1 240 \ -./qemu-system-arm \ +export qemu_cmd="./qemu-system-arm \ -machine virt \ -machine virtualization=true \ -smp 4 \ @@ -144,9 +142,9 @@ timeout -k 1 240 \ -no-reboot \ -device virtio-net-pci,netdev=n0 \ -netdev user,id=n0,tftp=./ \ - -bios /usr/lib/u-boot/qemu_arm/u-boot.bin |& \ - tee ${serial_log} | sed 's/\r//' + -bios /usr/lib/u-boot/qemu_arm/u-boot.bin" -set -e -(grep -q "${dom0_prompt}" ${serial_log} && grep -q "${passed}" ${serial_log}) || exit 1 -exit 0 +export uboot_cmd="virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000" +export qemu_log="${serial_log}" +export passed="${passed}" +../automation/scripts/qemu-key.ex diff --git a/automation/scripts/qemu-smoke-dom0less-arm64.sh b/automation/scripts/qemu-smoke-dom0less-arm64.sh index 15258692d5..fd11482f25 100755 --- a/automation/scripts/qemu-smoke-dom0less-arm64.sh +++ b/automation/scripts/qemu-smoke-dom0less-arm64.sh @@ -205,9 +205,7 @@ bash imagebuilder/scripts/uboot-script-gen -t tftp -d binaries/ -c binaries/conf # Run the test rm -f smoke.serial set +e -echo " virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000"| \ -timeout -k 1 240 \ -./binaries/qemu-system-aarch64 \ +export qemu_cmd="./binaries/qemu-system-aarch64 \ -machine virtualization=true \ -cpu cortex-a57 -machine type=virt,gic-version=$gic_version \ -m 2048 -monitor none -serial stdio \ @@ -215,9 +213,9 @@ timeout -k 1 240 \ -no-reboot \ -device virtio-net-pci,netdev=n0 \ -netdev user,id=n0,tftp=binaries \ - -bios /usr/lib/u-boot/qemu_arm64/u-boot.bin |& \ - tee smoke.serial | sed 's/\r//' + -bios /usr/lib/u-boot/qemu_arm64/u-boot.bin" -set -e -(grep -q "^Welcome to Alpine Linux" smoke.serial && grep -q "${passed}" smoke.serial) || exit 1 -exit 0 +export uboot_cmd="virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000" +export qemu_log="smoke.serial" +export passed="${passed}" +./automation/scripts/qemu-key.ex diff --git a/automation/scripts/qemu-smoke-ppc64le.sh b/automation/scripts/qemu-smoke-ppc64le.sh index 9088881b73..72ee9765e9 100755 --- a/automation/scripts/qemu-smoke-ppc64le.sh +++ b/automation/scripts/qemu-smoke-ppc64le.sh @@ -11,8 +11,7 @@ machine=$1 rm -f ${serial_log} set +e -timeout -k 1 20 \ -qemu-system-ppc64 \ +export qemu_cmd="qemu-system-ppc64 \ -bios skiboot.lid \ -M $machine \ -m 2g \ @@ -21,9 +20,8 @@ qemu-system-ppc64 \ -monitor none \ -nographic \ -serial stdio \ - -kernel binaries/xen \ - |& tee ${serial_log} | sed 's/\r//' + -kernel binaries/xen" -set -e -(grep -q "Hello, ppc64le!" ${serial_log}) || exit 1 -exit 0 +export qemu_log="${serial_log}" +export passed="Hello, ppc64le!" +./automation/scripts/qemu-key.ex diff --git a/automation/scripts/qemu-smoke-riscv64.sh b/automation/scripts/qemu-smoke-riscv64.sh index f90df3c051..64630ba7d7 100755 --- a/automation/scripts/qemu-smoke-riscv64.sh +++ b/automation/scripts/qemu-smoke-riscv64.sh @@ -6,15 +6,13 @@ set -ex rm -f smoke.serial set +e -timeout -k 1 2 \ -qemu-system-riscv64 \ +export qemu_cmd="qemu-system-riscv64 \ -M virt \ -smp 1 \ -nographic \ -m 2g \ - -kernel binaries/xen \ - |& tee smoke.serial | sed 's/\r//' + -kernel binaries/xen" -set -e -(grep -q "All set up" smoke.serial) || exit 1 -exit 0 +export qemu_log="smoke.serial" +export passed="All set up" +./automation/scripts/qemu-key.ex diff --git a/automation/scripts/qemu-smoke-x86-64.sh b/automation/scripts/qemu-smoke-x86-64.sh index 3014d07314..269396f805 100755 --- a/automation/scripts/qemu-smoke-x86-64.sh +++ b/automation/scripts/qemu-smoke-x86-64.sh @@ -16,11 +16,11 @@ esac rm -f smoke.serial set +e -timeout -k 1 30 \ -qemu-system-x86_64 -nographic -kernel binaries/xen \ +export qemu_cmd="qemu-system-x86_64 -nographic -kernel binaries/xen \ -initrd xtf/tests/example/$k \ - -append "loglvl=all console=com1 noreboot console_timestamps=boot $extra" \ - -m 512 -monitor none -serial file:smoke.serial -set -e -grep -q 'Test result: SUCCESS' smoke.serial || exit 1 -exit 0 + -append \"loglvl=all console=com1 noreboot console_timestamps=boot $extra\" \ + -m 512 -monitor none -serial stdio" + +export qemu_log="smoke.serial" +export passed="Test result: SUCCESS" +./automation/scripts/qemu-key.ex diff --git a/automation/scripts/qemu-xtf-dom0less-arm64.sh b/automation/scripts/qemu-xtf-dom0less-arm64.sh index b08c2d44fb..042f4ed2d9 100755 --- a/automation/scripts/qemu-xtf-dom0less-arm64.sh +++ b/automation/scripts/qemu-xtf-dom0less-arm64.sh @@ -51,9 +51,7 @@ bash imagebuilder/scripts/uboot-script-gen -t tftp -d binaries/ -c binaries/conf # Run the test rm -f smoke.serial set +e -echo " virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000"| \ -timeout -k 1 120 \ -./binaries/qemu-system-aarch64 \ +export qemu_cmd="./binaries/qemu-system-aarch64 \ -machine virtualization=true \ -cpu cortex-a57 -machine type=virt \ -m 2048 -monitor none -serial stdio \ @@ -61,9 +59,9 @@ timeout -k 1 120 \ -no-reboot \ -device virtio-net-pci,netdev=n0 \ -netdev user,id=n0,tftp=binaries \ - -bios /usr/lib/u-boot/qemu_arm64/u-boot.bin |& \ - tee smoke.serial | sed 's/\r//' + -bios /usr/lib/u-boot/qemu_arm64/u-boot.bin" -set -e -(grep -q "${passed}" smoke.serial) || exit 1 -exit 0 +export uboot_cmd="virtio scan; dhcp; tftpb 0x40000000 boot.scr; source 0x40000000" +export qemu_log="smoke.serial" +export passed="${passed}" +./automation/scripts/qemu-key.ex