[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen-unstable-smoke test] 181031: regressions - trouble: blocked/fail
flight 181031 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/181031/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-build fail REGR. vs. 181018 build-arm64-xsm 6 xen-build fail REGR. vs. 181018 build-armhf 6 xen-build fail REGR. vs. 181018 Tests which did not succeed, but are not blocking: build-amd64-libvirt 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 1 build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-debianhvm-amd64 1 build-check(1) blocked n/a test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-armhf-armhf-xl 1 build-check(1) blocked n/a version targeted for testing: xen 465217b0f872602b4084a1b0fa2ef75377cb3589 baseline version: xen 94200e1bae07e725cc07238c11569c5cab7befb7 Last test of basis 181018 2023-05-30 20:00:24 Z 0 days Testing same since 181031 2023-05-31 11:00:27 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Bobby Eshleman <bobbyeshleman@xxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Juergen Gross <jgross@xxxxxxxx> Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Stefano Stabellini <sstabellini@xxxxxxxxxx> jobs: build-arm64-xsm fail build-amd64 fail build-armhf fail build-amd64-libvirt blocked test-armhf-armhf-xl blocked test-arm64-arm64-xl-xsm blocked test-amd64-amd64-xl-qemuu-debianhvm-amd64 blocked test-amd64-amd64-libvirt blocked ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 465217b0f872602b4084a1b0fa2ef75377cb3589 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed May 31 12:01:11 2023 +0200 vPCI: account for hidden devices Hidden devices (e.g. an add-in PCI serial card used for Xen's serial console) are associated with DomXEN, not Dom0. This means that while looking for overlapping BARs such devices cannot be found on Dom0's list of devices; DomXEN's list also needs to be scanned. Suppress vPCI init altogether for r/o devices (which constitute a subset of hidden ones). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Tested-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 445fdc641e304ff41a544f8f5926a13b604c08ad Author: Juergen Gross <jgross@xxxxxxxx> Date: Wed May 31 12:00:40 2023 +0200 xen/include/public: fix 9pfs xenstore path description In xen/include/public/io/9pfs.h the name of the Xenstore backend node "security-model" should be "security_model", as this is how the Xen tools are creating it and qemu is reading it. Fixes: ad58142e73a9 ("xen/public: move xenstore related doc into 9pfs.h") Fixes: cf1d2d22fdfd ("docs/misc: Xen transport for 9pfs") Signed-off-by: Juergen Gross <jgross@xxxxxxxx> Reviewed-by: Jason Andryuk <jandryuk@xxxxxxxxx> Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> commit 0f80a46ffa6bfd5d111fc2e64ee5983513627e4d Author: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Date: Wed May 31 12:00:13 2023 +0200 xen/riscv: remove dummy_bss variable After introduction of initial pagetables there is no any sense in dummy_bss variable as bss section will not be empty anymore. Signed-off-by: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Acked-by: Bobby Eshleman <bobbyeshleman@xxxxxxxxx> commit 0d74fc2b2f85586ceb5672aedc79c666e529381d Author: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Date: Wed May 31 12:00:05 2023 +0200 xen/riscv: setup initial pagetables The patch does two thing: 1. Setup initial pagetables. 2. Enable MMU which end up with code in cont_after_mmu_is_enabled() Signed-off-by: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Acked-by: Bobby Eshleman <bobbyeshleman@xxxxxxxxx> commit ec337ce2e972b70619f5a076b20910a2ff4fea7a Author: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Date: Wed May 31 11:59:53 2023 +0200 xen/riscv: align __bss_start bss clear cycle requires proper alignment of __bss_start. ALIGN(PAGE_SIZE) before "*(.bss.page_aligned)" in xen.lds.S was removed as any contribution to "*(.bss.page_aligned)" have to specify proper aligntment themselves. Fixes: cfa0409f7cbb ("xen/riscv: initialize .bss section") Signed-off-by: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Bobby Eshleman <bobbyeshleman@xxxxxxxxx> commit e66003e7be1996c9dd8daca54ba34ad5bb58d668 Author: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Date: Wed May 31 11:55:58 2023 +0200 xen/riscv: introduce setup_initial_pages The idea was taken from xvisor but the following changes were done: * Use only a minimal part of the code enough to enable MMU * rename {_}setup_initial_pagetables functions * add an argument for setup_initial_mapping to have an opportunity to make set PTE flags. * update setup_initial_pagetables function to map sections with correct PTE flags. * Rewrite enable_mmu() to C. * map linker addresses range to load addresses range without 1:1 mapping. It will be 1:1 only in case when load_start_addr is equal to linker_start_addr. * add safety checks such as: * Xen size is less than page size * linker addresses range doesn't overlap load addresses range * Rework macros {THIRD,SECOND,FIRST,ZEROETH}_{SHIFT,MASK} * change PTE_LEAF_DEFAULT to RW instead of RWX. * Remove phys_offset as it is not used now * Remove alignment of {map, pa}_start &= XEN_PT_LEVEL_MAP_MASK(0); in setup_inital_mapping() as they should be already aligned. Make a check that {map_pa}_start are aligned. * Remove clear_pagetables() as initial pagetables will be zeroed during bss initialization * Remove __attribute__((section(".entry")) for setup_initial_pagetables() as there is no such section in xen.lds.S * Update the argument of pte_is_valid() to "const pte_t *p" * Add check that Xen's load address is aligned at 4k boundary * Refactor setup_initial_pagetables() so it is mapping linker address range to load address range. After setup needed permissions for specific section ( such as .text, .rodata, etc ) otherwise RW permission will be set by default. * Add function to check that requested SATP_MODE is supported Origin: git@xxxxxxxxxx:xvisor/xvisor.git 9be2fdd7 Signed-off-by: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Bobby Eshleman <bobbyeshleman@xxxxxxxxx> commit efadb18dd58abaa0c6102e04f1c25ac94c273853 Author: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Date: Wed May 31 11:55:46 2023 +0200 xen/riscv: add VM space layout Also it was added explanation about ignoring of top VA bits Signed-off-by: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> Acked-by: Bobby Eshleman <bobbyeshleman@xxxxxxxxx> (qemu changes not included)
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |