[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen-unstable-smoke test] 158142: regressions - FAIL
flight 158142 xen-unstable-smoke real [real] flight 158148 xen-unstable-smoke real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/158142/ http://logs.test-lab.xenproject.org/osstest/logs/158148/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 8 xen-boot fail REGR. vs. 158134 Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-check fail never pass test-arm64-arm64-xl-xsm 15 migrate-support-check fail never pass test-arm64-arm64-xl-xsm 16 saverestore-support-check fail never pass version targeted for testing: xen 6ea3e32a5e0e6ba0f568aa5fd5a6b016c0c21ca0 baseline version: xen 7ba2ab495be54f608cb47440e1497b2795bd301a Last test of basis 158134 2021-01-04 15:01:26 Z 0 days Testing same since 158142 2021-01-05 02:00:25 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Bertrand Marquis <bertrand.marquis@xxxxxxx> Stefano Stabellini <sstabellini@xxxxxxxxxx> jobs: build-arm64-xsm pass build-amd64 pass build-armhf pass build-amd64-libvirt pass test-armhf-armhf-xl fail test-arm64-arm64-xl-xsm pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-amd64-libvirt pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 6ea3e32a5e0e6ba0f568aa5fd5a6b016c0c21ca0 Author: Bertrand Marquis <bertrand.marquis@xxxxxxx> Date: Thu Dec 17 15:38:08 2020 +0000 xen/arm: Activate TID3 in HCR_EL2 Activate TID3 bit in HCR register when starting a guest. This will trap all coprecessor ID registers so that we can give to guest values corresponding to what they can actually use and mask some features to guests even though they would be supported by the underlying hardware (like SVE or MPAM). Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 73ff36144014218f796f7e07c1224a1c580012d1 Author: Bertrand Marquis <bertrand.marquis@xxxxxxx> Date: Thu Dec 17 15:38:07 2020 +0000 xen/arm: Add CP10 exception support to handle MVFR Add support for cp10 exceptions decoding to be able to emulate the values for MVFR0, MVFR1 and MVFR2 when TID3 bit of HSR is activated. This is required for aarch32 guests accessing MVFR registers using vmrs and vmsr instructions. Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 8f81064a07c64952931eafdd9a9a3017ed6ffd26 Author: Bertrand Marquis <bertrand.marquis@xxxxxxx> Date: Thu Dec 17 15:38:06 2020 +0000 xen/arm: Add handler for cp15 ID registers Add support for emulation of cp15 based ID registers (on arm32 or when running a 32bit guest on arm64). The handlers are returning the values stored in the guest_cpuinfo structure for known registers and RAZ for all reserved registers. In the current status the MVFR registers are no supported. Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> [Stefano: fix code style] Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 07b9acea116e8329d613004766b8606756986db5 Author: Bertrand Marquis <bertrand.marquis@xxxxxxx> Date: Thu Dec 17 15:38:05 2020 +0000 xen/arm: Add handler for ID registers on arm64 Add vsysreg emulation for registers trapped when TID3 bit is activated in HSR. The emulation is returning the value stored in cpuinfo_guest structure for know registers and is handling reserved registers as RAZ. Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 3669a1cb95983dc1c01be46e7df5dd9357d7b973 Author: Bertrand Marquis <bertrand.marquis@xxxxxxx> Date: Thu Dec 17 15:38:04 2020 +0000 xen/arm: create a cpuinfo structure for guest Create a cpuinfo structure for guest and mask into it the features that we do not support in Xen or that we do not want to publish to guests. Modify some values in the cpuinfo structure for guests to mask some features which we do not want to allow to guests (like AMU) or we do not support (like SVE). Modify some values in the guest cpuinfo structure to guests to hide some processor features: - SVE as this is not supported by Xen and guest are not allowed to use this features (ZEN is set to 0 in CPTR_EL2). - AMU as HCPTR_TAM is set in CPTR_EL2 so AMU cannot be used by guests All other bits are left untouched. - RAS as this is not supported by Xen. The code is trying to group together registers modifications for the same feature to be able in the long term to easily enable/disable a feature depending on user parameters or add other registers modification in the same place (like enabling/disabling HCR bits). Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 2d66a1f095f716e4bf7e47d61e1d1de13e99167a Author: Bertrand Marquis <bertrand.marquis@xxxxxxx> Date: Thu Dec 17 15:38:03 2020 +0000 xen/arm: Add arm64 ID registers definitions Add coprocessor registers definitions for all ID registers trapped through the TID3 bit of HSR. Those are the one that will be emulated in Xen to only publish to guests the features that are supported by Xen and that are accessible to guests. Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 9cfdb489af810f71acb7dcdb87075dc7b3b313a0 Author: Bertrand Marquis <bertrand.marquis@xxxxxxx> Date: Thu Dec 17 15:38:02 2020 +0000 xen/arm: Add ID registers and complete cpuinfo Add definition and entries in cpuinfo for ID registers introduced in newer Arm Architecture reference manual: - ID_PFR2: processor feature register 2 - ID_DFR1: debug feature register 1 - ID_MMFR4 and ID_MMFR5: Memory model feature registers 4 and 5 - ID_ISA6: ISA Feature register 6 Add more bitfield definitions in PFR fields of cpuinfo. Add MVFR2 register definition for aarch32. Add MVFRx_EL1 defines for aarch32. Add mvfr values in cpuinfo. Add some registers definition for arm64 in sysregs as some are not always know by compilers. Initialize the new values added in cpuinfo in identify_cpu during init. Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit a9f1f03b2710f5ce84f69c1c4516349531053fac Author: Bertrand Marquis <bertrand.marquis@xxxxxxx> Date: Thu Dec 17 15:38:01 2020 +0000 xen/arm: Use READ_SYSREG instead of 32/64 versions Modify identify_cpu function to use READ_SYSREG instead of READ_SYSREG32 or READ_SYSREG64. All aarch32 specific registers (for example ID_PFR0_EL1) are 64bit when accessed from aarch64 with upper bits read as 0, so it is right to access them as 64bit registers on a 64bit platform. Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> (qemu changes not included)
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |