flight 185125 xen-unstable-smoke real [real]
flight 185130 xen-unstable-smoke real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/185125/
http://logs.test-lab.xenproject.org/osstest/logs/185130/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 12 debian-hvm-install fail REGR. vs. 
185109

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  ee973396f008ff0de2836b7ca100ce822740fa41
baseline version:
 xen                  eaafbd11344a8ec32309fe58a6e529fe1c34d62e

Last test of basis   185109  2024-03-20 09:03:31 Z    1 days
Failing since        185120  2024-03-21 09:03:04 Z    0 days    2 attempts
Testing same since   185125  2024-03-21 13:00:23 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.coop...@citrix.com>
  Anthony PERARD <anthony.per...@citrix.com>
  Carlo Nonato <carlo.non...@minervasys.tech>
  Elliott Mitchell <ehem+...@m5p.com>
  Jan Beulich <jbeul...@suse.com>
  Roger Pau Monné <roger....@citrix.com>
  Shawn Anastasio <sanasta...@raptorengineering.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    fail    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit ee973396f008ff0de2836b7ca100ce822740fa41
Author: Andrew Cooper <andrew.coop...@citrix.com>
Date:   Mon Mar 18 18:07:05 2024 +0000

    x86/cpuid: More AMD features
    
    All of these are informational and require no further logic changes in Xen 
to
    support.
    
    Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
    Reviewed-by: Jan Beulich <jbeul...@suse.com>

commit 5205bda5f11cc03ca62ad2bb6c34bf738bbb3247
Author: Andrew Cooper <andrew.coop...@citrix.com>
Date:   Mon Oct 22 14:53:26 2018 +0100

    x86/p2m: Coding style cleanup
    
    No functional change.
    
    Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
    Reviewed-by: Jan Beulich <jbeul...@suse.com>

commit 97b90f9bf2e5c93e0f61c927fa2bc8a56a213faa
Author: Shawn Anastasio <sanasta...@raptorengineering.com>
Date:   Thu Mar 21 09:49:20 2024 +0100

    xen/ppc: Ensure ELF sections' physical load addresses start at 0x0
    
    Some boot mechanisms, including the new linux file_load kexec systemcall
    used by system firmware v2.10 on RaptorCS systems will try to honor the
    physical address field of the ELF LOAD section header, which will fail
    when the address is based off of XEN_VIRT_START (0xc000000000000000).
    
    To ensure that the physical address of the LOAD section header starts at
    0x0, move x86's DECL_SECTION macro to xen.lds.h and use it to declare
    all sections.
    
    Signed-off-by: Shawn Anastasio <sanasta...@raptorengineering.com>
    Acked-by: Andrew Cooper <andrew.coop...@citrix.com>

commit 10e8d824b76f55dde7c1793f48d76d4ff9df5e0a
Author: Jan Beulich <jbeul...@suse.com>
Date:   Thu Mar 21 09:48:49 2024 +0100

    AMD/IOMMU: drop remaining guest-IOMMU bits too
    
    With a02174c6c885 ("amd/iommu: clean up unused guest iommu related
    functions") having removed the sole place where d->g_iommu would be set
    to non-NULL, guest_iommu_add_ppr_log() will unconditionally bail the
    latest from its 2nd if(). With it dropped, all other stuff in the file
    is unused, too. Delete iommu_guest.c altogether.
    
    Further delete struct guest{_buffer,_dev_table,_iommu{,_msi}} as well as
    struct mmio_reg for being unused with the unused g_iommu also dropped
    from struct arch_iommu.
    
    Signed-off-by: Jan Beulich <jbeul...@suse.com>
    Acked-by: Roger Pau Monné <roger....@citrix.com>

commit cc950c49ae6a6690f7fc3041a1f43122c250d250
Author: Jan Beulich <jbeul...@suse.com>
Date:   Thu Mar 21 09:48:10 2024 +0100

    x86/PoD: tie together P2M update and increment of entry count
    
    When not holding the PoD lock across the entire region covering P2M
    update and stats update, the entry count - if to be incorrect at all -
    should indicate too large a value in preference to a too small one, to
    avoid functions bailing early when they find the count is zero. However,
    instead of moving the increment ahead (and adjust back upon failure),
    extend the PoD-locked region.
    
    Fixes: 99af3cd40b6e ("x86/mm: Rework locking in the PoD layer")
    Signed-off-by: Jan Beulich <jbeul...@suse.com>
    Reviewed-by: George Dunlap <george.dun...@cloud.com>

commit f5c2b6da26d9becd5a1a03fcd3e5c950301030a2
Author: Carlo Nonato <carlo.non...@minervasys.tech>
Date:   Thu Mar 21 09:47:21 2024 +0100

    xen/page_alloc: introduce page flag to stop buddy merging
    
    Add a new PGC_no_buddy_merge flag that prevents the buddy algorithm in
    free_heap_pages() from merging pages that have it set. As of now, only
    PGC_static has this feature, but future work can extend it easier than
    before.
    
    Suggested-by: Jan Beulich <jbeul...@suse.com>
    Signed-off-by: Carlo Nonato <carlo.non...@minervasys.tech>
    Reviewed-by: Jan Beulich <jbeul...@suse.com>

commit 75214d5e53f60a7b19e90ebdb090c20044a052ca
Author: Carlo Nonato <carlo.non...@minervasys.tech>
Date:   Thu Mar 21 09:46:42 2024 +0100

    xen/page_alloc: introduce preserved page flags macro
    
    PGC_static and PGC_extra needs to be preserved when assigning a page.
    Define a new macro that groups those flags and use it instead of or'ing
    every time.
    
    To make preserved flags even more meaningful, they are kept also when
    switching state in mark_page_free().
    
    Signed-off-by: Carlo Nonato <carlo.non...@minervasys.tech>
    Reviewed-by: Jan Beulich <jbeul...@suse.com>

commit 6eb13b6b1d984af87460f60f2c0cbc5c059b8402
Author: Elliott Mitchell <ehem+...@m5p.com>
Date:   Thu Mar 21 09:46:13 2024 +0100

    tools/xl_parse: remove message for tsc mode string
    
    Normal behavior is to be silent.  Generating a message for the preferred
    input can be mistaken for an error.  As such remove this message to match
    other conditions.
    
    Signed-off-by: Elliott Mitchell <ehem+...@m5p.com>
    Acked-by: Anthony PERARD <anthony.per...@citrix.com>
(qemu changes not included)

Reply via email to