[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-smoke test] 147020: regressions - FAIL

flight 147020 xen-unstable-smoke real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 146882

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm      13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      14 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          14 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  d3cec8e1f230750a5d1b83412e8f86d0c95fcab6
baseline version:
 xen                  6c47c37b9b40d6fe40bce8c8fd39135f6d549c8c

Last test of basis   146882  2020-02-11 16:00:54 Z    2 days
Failing since        146893  2020-02-11 20:01:02 Z    1 days   21 attempts
Testing same since   147020  2020-02-13 17:00:35 Z    0 days    1 attempts

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Anthony PERARD <anthony.perard@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Juergen Gross <jgross@xxxxxxxx>
  Julien Grall <julien@xxxxxxx>
  Roger Pau Monné <roger.pau@xxxxxxxxxx>
  Wei Liu <wl@xxxxxxx>

 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          fail    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     blocked 

sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at

Explanation of these reports, and of osstest in general, is at

Test harness code can be found at

Not pushing.

commit d3cec8e1f230750a5d1b83412e8f86d0c95fcab6
Author: Wei Liu <wl@xxxxxxx>
Date:   Thu Feb 13 15:27:51 2020 +0000

    libxl: fix libxl__cpuid_legacy in libxl_nocpuid.c
    Its last parameter should be libxl_domain_build_info.
    Fixes: 1b3cec69 ("tools/libxl: Combine legacy CPUID handling logic")
    Signed-off-by: Wei Liu <wl@xxxxxxx>
    Acked-by: Anthony PERARD <anthony.perard@xxxxxxxxxx>

commit c968e3ada478e5c9a11ba13a0f90d56323872693
Author: Anthony PERARD <anthony.perard@xxxxxxxxxx>
Date:   Thu Feb 13 13:42:00 2020 +0000

    automation: update debian:unstable-arm64v8 to have python3-config
    The Arm container wasn't updated in the original patch.
    Fixes: 1a3673da6482 ("automation: updating container to have python3-config 
    Signed-off-by: Anthony PERARD <anthony.perard@xxxxxxxxxx>
    Acked-by: Wei Liu <wl@xxxxxxx>

commit 1fb9a8bd8c7158eed26acb5ecd3210b82f1c31d4
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Wed Feb 12 08:41:54 2020 +0100

    xenstore: remove not applicable control commands in stubdom
    When run in a stubdom environment Xenstore can't select a logfile or
    emit memory statistics to a specific file.
    So remove or modify those control commands accordingly.
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Wei Liu <wl@xxxxxxx>

commit a9594631b645be862857e3debbd1f04e932eb197
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Wed Feb 12 08:41:53 2020 +0100

    xenstore: add console xenstore entries for xenstore stubdom
    In order to be able to connect to the console of Xenstore stubdom we
    need to create the appropriate entries in Xenstore.
    For the moment we don't support xenconsoled living in another domain
    than dom0, as this information isn't available other then via
    Xenstore which we are just setting up.
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Wei Liu <wl@xxxxxxx>

commit 5d1f9cd27eae7338bd149cc98edcf2a55468d1d3
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Wed Feb 12 08:41:52 2020 +0100

    xenstore: setup xenstore stubdom console interface properly
    In order to be able to get access to the console of Xenstore stubdom
    we need an appropriate granttab entry. So call xc_dom_gnttab_init()
    when constructing the domain and preset some information needed
    for that function in the dom structure.
    We need to create the event channel for the console, too. Do that and
    store all necessary data locally.
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Wei Liu <wl@xxxxxxx>

commit af09b7d79cb8ae7498882e61efec75486eb69544
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Wed Feb 12 10:55:06 2020 +0100

    xen: remove empty softirq_init()
    softirq_init() is empty since Xen 4.1. Remove it together with its call
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 66b282bbb1aa64a3d7a6f7d705cf10ba844cd611
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Feb 12 10:54:08 2020 +0100

    AMD/IOMMU: drop redundant code
    The level 1 special exit path is unnecessary in iommu_pde_from_dfn() -
    the subsequent code takes care of this case quite fine.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 6827bea2b3b99153821b8b7446bdced27f720188
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Feb 12 10:52:20 2020 +0100

    dom0-build: fix build with clang5
    With non-empty CONFIG_DOM0_MEM clang5 produces
    dom0_build.c:344:24: error: use of logical '&&' with constant operand 
        if ( !dom0_mem_set && CONFIG_DOM0_MEM[0] )
                           ^  ~~~~~~~~~~~~~~~~~~
    dom0_build.c:344:24: note: use '&' for a bitwise operation
        if ( !dom0_mem_set && CONFIG_DOM0_MEM[0] )
    dom0_build.c:344:24: note: remove constant to silence this warning
        if ( !dom0_mem_set && CONFIG_DOM0_MEM[0] )
    1 error generated.
    Obviously neither of the two suggestions are an option here. Oddly
    enough swapping the operands of the && helps, while e.g. casting or
    parenthesizing doesn't. Another workable variant looks to be the use of
    !! on the constant.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Julien Grall <julien@xxxxxxx>
    Acked-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>

commit 1b3cec69bf300e012a0269f0a4f28cca1ebf22c9
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Feb 5 15:25:21 2020 +0000

    tools/libxl: Combine legacy CPUID handling logic
    While we are in the process of overhauling boot time CPUID/MSR handling, the
    existing logic is going to have to remain in roughly this form for backwards
    Fold libxl__cpuid_apply_policy() and libxl__cpuid_set() together into a 
    libxl__cpuid_legacy() to reduce the complexity for callers.
    No functional change.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit dacb80f9757c011161cec6609f39837c9ea8caa8
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Jan 8 12:53:49 2020 +0000

    tools/libxl: Remove libxl_cpuid_{set,apply_policy}() from the API
    These functions should never have been exposed.  They don't have external
    users, and can't usefully be used for several reasons.
    Move libxl_cpuid_{set,apply_policy}() to being internal functions, and leave
    an equivalent of the nop stubs in the API for caller compatibility.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.