[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen-unstable-smoke test] 181514: trouble: blocked/broken/pass
flight 181514 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/181514/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf <job status> broken build-armhf 4 host-install(4) broken REGR. vs. 181476 Tests which did not succeed, but are not blocking: test-armhf-armhf-xl 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 15 migrate-support-check fail never pass test-arm64-arm64-xl-xsm 15 migrate-support-check fail never pass test-arm64-arm64-xl-xsm 16 saverestore-support-check fail never pass version targeted for testing: xen 42473bae2394b6602372ab8b83a9ca294b1e40f4 baseline version: xen 7a25a1501ca941c3e01b0c4e624ace05417f1587 Last test of basis 181476 2023-06-17 04:00:28 Z 3 days Failing since 181504 2023-06-19 11:00:26 Z 1 days 3 attempts Testing same since 181514 2023-06-20 03:03:46 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Alistair Francis <alistair.francis@xxxxxxx> Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Anthony PERARD <anthony.perard@xxxxxxxxxx> Henry Wang <Henry.Wang@xxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Julien Grall <jgrall@xxxxxxxxxx> Michal Orzel <michal.orzel@xxxxxxx> Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Roger Pau Monné <roger.pau@xxxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxx> jobs: build-arm64-xsm pass build-amd64 pass build-armhf broken build-amd64-libvirt pass test-armhf-armhf-xl blocked test-arm64-arm64-xl-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary broken-job build-armhf broken broken-step build-armhf host-install(4) Not pushing. ------------------------------------------------------------ commit 42473bae2394b6602372ab8b83a9ca294b1e40f4 Author: Michal Orzel <michal.orzel@xxxxxxx> Date: Wed Jun 7 11:27:27 2023 +0200 xen/arm: pl011: Add SBSA UART device-tree support We already have all the bits necessary in PL011 driver to support SBSA UART thanks to commit 032ea8c736d10f02672863c6e369338f948f7ed8 that enabled it for ACPI. Plumb in the remaining part for device-tree boot: - add arm,sbsa-uart compatible to pl011_dt_match (no need for a separate struct and DT_DEVICE_START as SBSA is a subset of PL011), - from pl011_dt_uart_init(), check for SBSA UART compatible to determine the UART type in use. Signed-off-by: Michal Orzel <michal.orzel@xxxxxxx> Reviewed-by: Henry Wang <Henry.Wang@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Tested-by: Henry Wang <Henry.Wang@xxxxxxx> commit 47e3941d2eee347e9c41b311d19048c41e1b33e3 Author: Michal Orzel <michal.orzel@xxxxxxx> Date: Wed Jun 7 11:27:26 2023 +0200 xen/arm: pl011: Use correct accessors At the moment, we use 32-bit only accessors (i.e. readl/writel) to match the SBSA v2.x requirement. This should not be the default case for normal PL011 where accesses shall be 8/16-bit (max register size is 16-bit). There are however implementations of this UART that can only handle 32-bit MMIO. This is advertised by dt property "reg-io-width" set to 4. Introduce new struct pl011 member mmio32 and replace pl011_{read/write} macros with static inline helpers that use 32-bit or 16-bit accessors (largest-common not to end up using different ones depending on the actual register size) according to mmio32 value. By default this property is set to false, unless: - reg-io-width is specified with value 4, - SBSA UART is in use. For now, no changes done for ACPI due to lack of testing possibilities (i.e. current behavior maintained resulting in 32-bit accesses). Signed-off-by: Michal Orzel <michal.orzel@xxxxxxx> Tested-by: Henry Wang <Henry.Wang@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 4fa2272458114b5e4872f835b803909333d5ccd4 Author: Michal Orzel <michal.orzel@xxxxxxx> Date: Wed Jun 7 11:27:25 2023 +0200 xen/arm: debug-pl011: Add support for 32-bit only MMIO There are implementations of PL011 that can only handle 32-bit accesses as oppose to the normal behavior where accesses are 8/16-bit wide. This is usually advertised by setting a dt property 'reg-io-width' to 4. Introduce CONFIG_EARLY_UART_PL011_MMIO32 Kconfig option to be able to enable the use of 32-bit only accessors in PL011 early printk code. Define macros PL011_{STRH,STRB,LDRH} to distinguish accessors for normal case from 32-bit MMIO one and use them in arm32/arm64 pl011 early printk code. Update documentation accordingly. Signed-off-by: Michal Orzel <michal.orzel@xxxxxxx> Tested-by: Henry Wang <Henry.Wang@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 655d0798d29b7ac490444b2daf9bffa16d41e822 Author: Michal Orzel <michal.orzel@xxxxxxx> Date: Wed Jun 7 11:27:24 2023 +0200 xen/arm: debug-pl011: Use correct accessors Although most PL011 UARTs can cope with 32-bit accesses, some of the old legacy ones might not. PL011 registers are 8/16-bit wide and this shall be perceived as the normal behavior. Modify early printk pl011 code for arm32/arm64 to use the correct accessors depending on the register size (refer ARM DDI 0183G, Table 3.1). Signed-off-by: Michal Orzel <michal.orzel@xxxxxxx> Tested-by: Henry Wang <Henry.Wang@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 314a54c1c2805883f50582c40308554a102fdb8a Author: Stefano Stabellini <stefano.stabellini@xxxxxxx> Date: Thu Jun 15 14:27:16 2023 -0700 xen/misra: add rules 1.4 and 2.1 Also add a comment at the top of the file to say rules.rst could be changed. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxx> Reviewed-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> Reviewed-by: Luca Fancellu <luca.fancellu@xxxxxxx> commit d95f436c7dc6ccee68e1b77a3b01476ef41add55 Author: Stefano Stabellini <stefano.stabellini@xxxxxxx> Date: Thu Jun 15 14:19:22 2023 -0700 docs/misra: new rules addition For Dir 1.1, a document describing all implementation-defined behaviour (i.e. gcc-specific behavior) will be added to docs/misra, also including implementation-specific (gcc-specific) appropriate types for bit-field relevant to Rule 6.1. Rule 21.21 is lacking an example on gitlab but the rule is straightforward: we don't use stdlib at all in Xen. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxx> Reviewed-by: Michal Orzel <michal.orzel@xxxxxxx> Reviewed-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> commit 43e863a02d81f5fff32763b23d2a39f041f7e62b Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Fri Jun 16 17:28:21 2023 +0100 x86/boot: Clean up early error asm The asm forming early error handling is a mix of local and non-local symbols, and has some pointless comments. Drop the "# Error message" comments, tweaking the style on modified lines, and make the symbols local. However, leave behind one real symbol so this logic disassembles nicely without merging in to acpi_boot_init(), which is the thing that happens to be immediately prior in my build. No functional change. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 3a07da55e63d110851c36b0dae32a5dcf00c54b9 Author: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Date: Mon Jun 19 15:47:37 2023 +0200 xen/riscv: introduce reset_stack() function The reason for reset_stack() introduction is that stack should be reset twice: 1. Before jumping to C world at the start of _start() function. 2. After jumping from 1:1 mapping world. Signed-off-by: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Reviewed-by: Alistair Francis <alistair.francis@xxxxxxx> commit 652ccd1f4afa56b15cb4863d545deac7d1effb30 Author: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Date: Mon Jun 19 15:47:23 2023 +0200 xen/riscv: add .sbss section to .bss Sometimes variables are located in .sbss section but it won't be mapped after MMU will be enabled. To avoid MMU failures .sbss should be mapped Signed-off-by: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Acked-by: Alistair Francis <alistair.francis@xxxxxxx> commit c6df21062beb9a9bc29a3a2ffb652e0bfa185c3a Author: Anthony PERARD <anthony.perard@xxxxxxxxxx> Date: Mon Jun 19 15:47:05 2023 +0200 Config.mk: update OVMF to edk2-stable202305 Update to OVMF's latest stable tag. This is been prompt by trying to build Xen on Debian Bookworm, where edk2-stable202108 doesn't build. Also, it's been too long since the last update. Signed-off-by: Anthony PERARD <anthony.perard@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> commit 82b28deb25f37e8422b14493a2efa2852638206d Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> Date: Mon Jun 19 15:46:03 2023 +0200 iommu/vtd: fix address translation for leaf entries Fix two issues related to leaf address lookups in VT-d: * When translating an address that falls inside of a superpage in the IOMMU page tables the fetching of the PTE value wasn't masking of the contiguous related data, which caused the returned data to be corrupt as it would contain bits that the caller would interpret as part of the address. * When the requested leaf address wasn't mapped by a superpage the returned value wouldn't have any of the low 12 bits set, thus missing the permission bits expected by the caller. Take the opportunity to also adjust the function comment to note that when returning the full PTE the bits above PADDR_BITS are removed. Fixes: c71e55501a61 ('VT-d: have callers specify the target level for page table walks') Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx> commit ea613d2367ac9dca3875997034e8f4aff74ab635 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Mon Jun 19 15:45:07 2023 +0200 SUPPORT.md: write down restriction of 32-bit tool stacks Let's try to avoid giving the impression that 32-bit tool stacks are as capable as 64-bit ones. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Julien Grall <jgrall@xxxxxxxxxx> commit a17fd0feb6b6bbe82550f43d70654d894ed377ec Author: Anthony PERARD <anthony.perard@xxxxxxxxxx> Date: Mon Jun 19 10:09:32 2023 +0100 automation: Disable QEMU build with Clang older than 10.0 Since QEMU commit 74a1b256d775 ("configure: Bump minimum Clang version to 10.0"), or QEMU v8.0, Clang 10.0 is now the minimum to build QEMU. QEMU 8.0 fails to build on Ubuntu Bionic. Signed-off-by: Anthony PERARD <anthony.perard@xxxxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> (qemu changes not included)
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |