[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen-unstable-smoke test] 185120: regressions - FAIL
flight 185120 xen-unstable-smoke real [real] flight 185121 xen-unstable-smoke real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/185120/ http://logs.test-lab.xenproject.org/osstest/logs/185121/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 12 debian-hvm-install fail REGR. vs. 185109 Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-check fail never pass test-arm64-arm64-xl-xsm 15 migrate-support-check fail never pass test-arm64-arm64-xl-xsm 16 saverestore-support-check fail never pass test-armhf-armhf-xl 15 migrate-support-check fail never pass test-armhf-armhf-xl 16 saverestore-support-check fail never pass version targeted for testing: xen 97b90f9bf2e5c93e0f61c927fa2bc8a56a213faa baseline version: xen eaafbd11344a8ec32309fe58a6e529fe1c34d62e Last test of basis 185109 2024-03-20 09:03:31 Z 1 days Testing same since 185120 2024-03-21 09:03:04 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Anthony PERARD <anthony.perard@xxxxxxxxxx> Carlo Nonato <carlo.nonato@xxxxxxxxxxxxxxx> Elliott Mitchell <ehem+xen@xxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Roger Pau Monné <roger.pau@xxxxxxxxxx> Shawn Anastasio <sanastasio@xxxxxxxxxxxxxxxxxxxxx> jobs: build-arm64-xsm pass build-amd64 pass build-armhf pass build-amd64-libvirt pass test-armhf-armhf-xl pass test-arm64-arm64-xl-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 fail test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 97b90f9bf2e5c93e0f61c927fa2bc8a56a213faa Author: Shawn Anastasio <sanastasio@xxxxxxxxxxxxxxxxxxxxx> Date: Thu Mar 21 09:49:20 2024 +0100 xen/ppc: Ensure ELF sections' physical load addresses start at 0x0 Some boot mechanisms, including the new linux file_load kexec systemcall used by system firmware v2.10 on RaptorCS systems will try to honor the physical address field of the ELF LOAD section header, which will fail when the address is based off of XEN_VIRT_START (0xc000000000000000). To ensure that the physical address of the LOAD section header starts at 0x0, move x86's DECL_SECTION macro to xen.lds.h and use it to declare all sections. Signed-off-by: Shawn Anastasio <sanastasio@xxxxxxxxxxxxxxxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> commit 10e8d824b76f55dde7c1793f48d76d4ff9df5e0a Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Mar 21 09:48:49 2024 +0100 AMD/IOMMU: drop remaining guest-IOMMU bits too With a02174c6c885 ("amd/iommu: clean up unused guest iommu related functions") having removed the sole place where d->g_iommu would be set to non-NULL, guest_iommu_add_ppr_log() will unconditionally bail the latest from its 2nd if(). With it dropped, all other stuff in the file is unused, too. Delete iommu_guest.c altogether. Further delete struct guest{_buffer,_dev_table,_iommu{,_msi}} as well as struct mmio_reg for being unused with the unused g_iommu also dropped from struct arch_iommu. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> commit cc950c49ae6a6690f7fc3041a1f43122c250d250 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Thu Mar 21 09:48:10 2024 +0100 x86/PoD: tie together P2M update and increment of entry count When not holding the PoD lock across the entire region covering P2M update and stats update, the entry count - if to be incorrect at all - should indicate too large a value in preference to a too small one, to avoid functions bailing early when they find the count is zero. However, instead of moving the increment ahead (and adjust back upon failure), extend the PoD-locked region. Fixes: 99af3cd40b6e ("x86/mm: Rework locking in the PoD layer") Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxx> commit f5c2b6da26d9becd5a1a03fcd3e5c950301030a2 Author: Carlo Nonato <carlo.nonato@xxxxxxxxxxxxxxx> Date: Thu Mar 21 09:47:21 2024 +0100 xen/page_alloc: introduce page flag to stop buddy merging Add a new PGC_no_buddy_merge flag that prevents the buddy algorithm in free_heap_pages() from merging pages that have it set. As of now, only PGC_static has this feature, but future work can extend it easier than before. Suggested-by: Jan Beulich <jbeulich@xxxxxxxx> Signed-off-by: Carlo Nonato <carlo.nonato@xxxxxxxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 75214d5e53f60a7b19e90ebdb090c20044a052ca Author: Carlo Nonato <carlo.nonato@xxxxxxxxxxxxxxx> Date: Thu Mar 21 09:46:42 2024 +0100 xen/page_alloc: introduce preserved page flags macro PGC_static and PGC_extra needs to be preserved when assigning a page. Define a new macro that groups those flags and use it instead of or'ing every time. To make preserved flags even more meaningful, they are kept also when switching state in mark_page_free(). Signed-off-by: Carlo Nonato <carlo.nonato@xxxxxxxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> commit 6eb13b6b1d984af87460f60f2c0cbc5c059b8402 Author: Elliott Mitchell <ehem+xen@xxxxxxx> Date: Thu Mar 21 09:46:13 2024 +0100 tools/xl_parse: remove message for tsc mode string Normal behavior is to be silent. Generating a message for the preferred input can be mistaken for an error. As such remove this message to match other conditions. Signed-off-by: Elliott Mitchell <ehem+xen@xxxxxxx> Acked-by: Anthony PERARD <anthony.perard@xxxxxxxxxx> (qemu changes not included)
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |