From: Chuck Zmudzinski
This is a series of two patches:
The first fixes FTBFS when --enable-xen and --disable-xen-pci-passthrough
configure options are set with when building for the linux target os.
The second fixes a regression that was introduced many years ago with the
upgrade from the
From: Chuck Zmudzinski
Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus,
as noted in docs/igd-assign.txt in the Qemu source code.
Currently, when the xl toolstack is used to configure a Xen HVM guest with
Intel IGD passthrough to the guest with the Qemu upstream device
From: Chuck Zmudzinski
When Qemu is built with --enable-xen and --disable-xen-pci-passthrough
and the target os is linux, the build fails with:
meson.build:3477:2: ERROR: File xen_pt_stub.c does not exist.
Fixes: 582ea95f5f93 ("meson: convert hw/xen")
Signed-off-by: Chuck Zmudzinski
---
> On 26 Oct 2022, at 00:24, Stefano Stabellini wrote:
>
> On Tue, 25 Oct 2022, Luca Fancellu wrote:
>> Hi all,
>>
>> This is the V2 of the proposal for deviations tagging in the Xen codebase,
>> this includes
>> all the feedbacks from the FuSa session held at the Xen Summit 2022 and all
>>
On 25.10.2022 22:06, Julien Grall wrote:
> On 25/10/2022 10:21, Henry Wang wrote:
>> This series is a backported series for XSA-409 fixes from master for
>> 4.14 to 4.16, which cherry-picking commits:
>> 3783e583319f arm/p2m: Rework p2m_init()
>> c7cff1188802 xen/arm: p2m: Populate pages for GICv2
On Wed, Oct 26, 2022, 7:06 AM Andrew Cooper
wrote:
> On 24/10/2022 17:58, Tamas K Lengyel wrote:
> > Currently the XEN_DOMCTL_get_vcpu_msrs is only capable of gathering a
> handful
> > of predetermined vcpu MSRs. In our use-case gathering the vPMU MSRs by an
> > external privileged tool is
This is a series of two patches:
The first fixes FTBFS when --enable-xen and --disable-xen-pci-passthrough
configure options are set with when building for the linux target os.
The second fixes a regression that was introduced many years ago with the
upgrade from the Qemu traditional device
Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus,
as noted in docs/igd-assign.txt in the Qemu source code.
Currently, when the xl toolstack is used to configure a Xen HVM guest with
Intel IGD passthrough to the guest with the Qemu upstream device model,
a Qemu emulated PCI
When Qemu is built with --enable-xen and --disable-xen-pci-passthrough
and the target os is linux, the build fails with:
meson.build:3477:2: ERROR: File xen_pt_stub.c does not exist.
Fixes: 582ea95f5f93 ("meson: convert hw/xen")
Signed-off-by: Chuck Zmudzinski
---
v2: Remove From: tag at top
On Tue, Oct 25, 2022 at 01:48:36PM -0400, Tamas K Lengyel wrote:
> On Tue, Oct 25, 2022 at 4:13 AM Roger Pau Monné
> wrote:
> >
> > On Mon, Oct 24, 2022 at 12:58:54PM -0400, Tamas K Lengyel wrote:
> > > Currently the XEN_DOMCTL_get_vcpu_msrs is only capable of gathering a
> handful
> > > of
Allocating or freeing p2m pages doesn't alter the size of the mempool; only
the split between free and used pages.
Right now, the hypercalls operate on the free subset of the pool, meaning that
XEN_DOMCTL_get_p2m_mempool_size varies with time as the guest shuffles its
physmap, and
This reverts most of commit cf2a68d2ffbc3ce95e01449d46180bddb10d24a0, and bits
of cbea5a1149ca7fd4b7cdbfa3ec2e4f109b601ff7.
First of all, with ARM borrowing x86's implementation, the logic to set the
pool size should have been common, not duplicated. Introduce
libxl__domain_set_p2m_pool_size()
On 26.10.2022 13:34, Tamas K Lengyel wrote:
> On Wed, Oct 26, 2022, 7:06 AM Andrew Cooper
> wrote:
>
>> On 24/10/2022 17:58, Tamas K Lengyel wrote:
>>> Currently the XEN_DOMCTL_get_vcpu_msrs is only capable of gathering a
>> handful
>>> of predetermined vcpu MSRs. In our use-case gathering the
flight 174369 qemu-mainline real [real]
flight 174440 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/174369/
http://logs.test-lab.xenproject.org/osstest/logs/174440/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not
On 24/10/2022 17:58, Tamas K Lengyel wrote:
> Currently the XEN_DOMCTL_get_vcpu_msrs is only capable of gathering a handful
> of predetermined vcpu MSRs. In our use-case gathering the vPMU MSRs by an
> external privileged tool is necessary, thus we extend the domctl to allow for
> querying for any
flight 174383 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174383/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-seattle 14 guest-start fail REGR. vs. 172623
On 25.10.2022 12:13, Luca Fancellu wrote:
> Here is an example to add a new justification in safe.json::
>
> |{
> |"version": "1.0",
> |"content": [
> |{
> |"id":"SAF-0-safe",
> |"analyser": {
> |"cppcheck": "misra-c2012-20.7",
> |
On 25/10/2022 11:13, Luca Fancellu wrote:
Hi all,
Hi Luca,
Some comments below if we plan to merge the doc in the tree.
This is the V2 of the proposal for deviations tagging in the Xen codebase, this
includes
all the feedbacks from the FuSa session held at the Xen Summit 2022 and all
For 4.17, and backport to all stable releases.
Patch 2 doesn't technically need backporting, but it's safe and I'm
dis-enclined to forgo testing in older releases.
Andrew Cooper (4):
xen: Introduce non-broken hypercalls for the p2m pool size
tools/tests: Unit test for p2m pool size
The existing XEN_DOMCTL_SHADOW_OP_{GET,SET}_ALLOCATION have problems:
* All set_allocation() flavours have an overflow-before-widen bug when
calculating "sc->mb << (20 - PAGE_SHIFT)".
* All flavours have a granularity of of 1M. This was tolerable when the size
of the pool could only be
> On 26 Oct 2022, at 10:36, Julien Grall wrote:
>
>
>
> On 25/10/2022 11:13, Luca Fancellu wrote:
>> Hi all,
>
> Hi Luca,
>
> Some comments below if we plan to merge the doc in the tree.
>
>> This is the V2 of the proposal for deviations tagging in the Xen codebase,
>> this includes
>>
Exercise some basic functionality of the new xc_{get,set}_p2m_mempool_size()
hypercalls.
This passes on x86, but fails currently on ARM. ARM will be fixed up in
future patches.
This is part of XSA-409 / CVE-2022-33747.
Signed-off-by: Andrew Cooper
---
CC: Xen Security Team
CC: Jan Beulich
On Wed, Oct 26, 2022, 7:48 AM Jan Beulich wrote:
> On 26.10.2022 13:34, Tamas K Lengyel wrote:
> > On Wed, Oct 26, 2022, 7:06 AM Andrew Cooper
> > wrote:
> >
> >> On 24/10/2022 17:58, Tamas K Lengyel wrote:
> >>> Currently the XEN_DOMCTL_get_vcpu_msrs is only capable of gathering a
> >> handful
> On 26 Oct 2022, at 13:06, Jan Beulich wrote:
>
> On 25.10.2022 12:13, Luca Fancellu wrote:
>> Here is an example to add a new justification in safe.json::
>>
>> |{
>> |"version": "1.0",
>> |"content": [
>> |{
>> |"id":"SAF-0-safe",
>> |"analyser": {
Hi all,
On 25/10/2022 10:20, Bertrand Marquis wrote:
> Caution: This message originated from an External Source. Use proper caution
> when opening attachments, clicking links, or responding.
>
>
> Hi Michal,
>
>> On 25 Oct 2022, at 09:07, Michal Orzel wrote:
>>
>> Hi Bertrand,
>>
>> On
On 25.10.2022 16:44, Roger Pau Monne wrote:
> --- a/xen/drivers/vpci/header.c
> +++ b/xen/drivers/vpci/header.c
> @@ -121,7 +121,9 @@ static void modify_decoding(const struct pci_dev *pdev,
> uint16_t cmd,
> }
>
> if ( !rom_only &&
> - (bar->type != VPCI_BAR_ROM ||
Hi Julien,
> On 26 Oct 2022, at 2:36 pm, Julien Grall wrote:
>
>
>
> On 26/10/2022 14:17, Rahul Singh wrote:
>> Hi All,
>
> Hi Rahul,
>
>> At Arm, we started to implement the POC to support 2 levels of page
>> tables/nested translation in SMMUv3.
>> To support nested translation for guest
Hi Michal,
> On 26 Oct 2022, at 12:29, Michal Orzel wrote:
>
> Hi all,
>
> On 25/10/2022 10:20, Bertrand Marquis wrote:
>> Caution: This message originated from an External Source. Use proper caution
>> when opening attachments, clicking links, or responding.
>>
>>
>> Hi Michal,
>>
>>> On
Hi All,
At Arm, we started to implement the POC to support 2 levels of page
tables/nested translation in SMMUv3.
To support nested translation for guest OS Xen needs to expose the virtual
IOMMU. If we passthrough the
device to the guest that is behind an IOMMU and virtual IOMMU is enabled for
On 26/10/2022 15:24, Jan Beulich wrote:
> On 26.10.2022 12:20, Andrew Cooper wrote:
>> --- /dev/null
>> +++ b/tools/tests/p2m-pool/Makefile
>> @@ -0,0 +1,42 @@
>> +XEN_ROOT = $(CURDIR)/../../..
>> +include $(XEN_ROOT)/tools/Rules.mk
>> +
>> +TARGET := test-p2m-pool
>> +
>> +.PHONY: all
>> +all:
On Wed, Oct 26, 2022 at 02:35:44PM +0200, Jan Beulich wrote:
> On 25.10.2022 16:44, Roger Pau Monne wrote:
> > --- a/xen/drivers/vpci/header.c
> > +++ b/xen/drivers/vpci/header.c
> > @@ -121,7 +121,9 @@ static void modify_decoding(const struct pci_dev *pdev,
> > uint16_t cmd,
> > }
> >
Hi
> Subject: Re: [PATCH] CI: Drop more TravisCI remnants
>
> On 26.10.2022 14:39, Andrew Cooper wrote:
> > This was missed from previous attempts to remove Travis.
> >
> > Fixes: e0dc9b095e7c ("CI: Drop TravisCI")
> > Signed-off-by: Andrew Cooper
>
> Acked-by: Jan Beulich
Release-acked-by:
On 26/10/2022 14:22, Jason Andryuk wrote:
> On Wed, Oct 26, 2022 at 6:21 AM Andrew Cooper
> wrote:
>> This reverts most of commit cf2a68d2ffbc3ce95e01449d46180bddb10d24a0, and
>> bits
>> of cbea5a1149ca7fd4b7cdbfa3ec2e4f109b601ff7.
>>
>> First of all, with ARM borrowing x86's implementation,
On 26/10/2022 14:17, Rahul Singh wrote:
Hi All,
Hi Rahul,
At Arm, we started to implement the POC to support 2 levels of page
tables/nested translation in SMMUv3.
To support nested translation for guest OS Xen needs to expose the virtual
IOMMU. If we passthrough the
device to the guest
If a guest is running in 32 bit mode and it tries to access
"GICR_PENDBASER + 4" mmio reg, it will be trapped to Xen. vreg_reg64_extract()
will return the value stored "v->arch.vgic.rdist_pendbase + 4".
This will be stored in a 64bit cpu register.
So now we have the top 32 bits of GICR_PENDBASER
Hi Ayan,
On 26/10/2022 14:35, Ayan Kumar Halder wrote:
If a guest is running in 32 bit mode and it tries to access
"GICR_PENDBASER + 4" mmio reg, it will be trapped to Xen. vreg_reg64_extract()
will return the value stored "v->arch.vgic.rdist_pendbase + 4".
This will be stored in a 64bit cpu
On Wed, Oct 26, 2022 at 02:47:43PM +0200, Jan Beulich wrote:
> On 25.10.2022 16:44, Roger Pau Monne wrote:
> > Writes to the BARs are ignored if memory decoding is enabled for the
> > device, and the same happen with ROM BARs if the write is an attempt
> > to change the position of the BAR without
On 26.10.2022 15:58, Roger Pau Monné wrote:
> On Wed, Oct 26, 2022 at 02:47:43PM +0200, Jan Beulich wrote:
>> On 25.10.2022 16:44, Roger Pau Monne wrote:
>>> @@ -388,12 +391,12 @@ static void cf_check bar_write(
>>> else
>>> val &= PCI_BASE_ADDRESS_MEM_MASK;
>>>
>>> -if (
On 26.10.2022 12:20, Andrew Cooper wrote:
> --- /dev/null
> +++ b/tools/tests/p2m-pool/Makefile
> @@ -0,0 +1,42 @@
> +XEN_ROOT = $(CURDIR)/../../..
> +include $(XEN_ROOT)/tools/Rules.mk
> +
> +TARGET := test-p2m-pool
> +
> +.PHONY: all
> +all: $(TARGET)
> +
> +.PHONY: clean
> +clean:
> + $(RM)
On Wed, 26 Oct 2022, Bertrand Marquis wrote:
> > On 26 Oct 2022, at 12:29, Michal Orzel wrote:
> >
> > Hi all,
> >
> > On 25/10/2022 10:20, Bertrand Marquis wrote:
> >> Caution: This message originated from an External Source. Use proper
> >> caution when opening attachments, clicking links,
This was missed from previous attempts to remove Travis.
Fixes: e0dc9b095e7c ("CI: Drop TravisCI")
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Jan Beulich
CC: Stefano Stabellini
CC: Wei Liu
CC: Julien Grall
CC: Henry Wang
Preforably for 4.17. Not a bugfix, but this does reduce
On 25.10.2022 16:44, Roger Pau Monne wrote:
> Writes to the BARs are ignored if memory decoding is enabled for the
> device, and the same happen with ROM BARs if the write is an attempt
> to change the position of the BAR without disabling it first.
>
> The reason of ignoring such writes is a
On 26.10.2022 14:39, Andrew Cooper wrote:
> This was missed from previous attempts to remove Travis.
>
> Fixes: e0dc9b095e7c ("CI: Drop TravisCI")
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
On 26.10.2022 12:20, Andrew Cooper wrote:
> The existing XEN_DOMCTL_SHADOW_OP_{GET,SET}_ALLOCATION have problems:
>
> * All set_allocation() flavours have an overflow-before-widen bug when
>calculating "sc->mb << (20 - PAGE_SHIFT)".
> * All flavours have a granularity of of 1M. This was
On 26/10/2022 14:41, Julien Grall wrote:
Hi Ayan,
Hi Julien,
On 26/10/2022 14:35, Ayan Kumar Halder wrote:
If a guest is running in 32 bit mode and it tries to access
"GICR_PENDBASER + 4" mmio reg, it will be trapped to Xen.
vreg_reg64_extract()
will return the value stored
On 26.10.2022 13:58, Tamas K Lengyel wrote:
> On Wed, Oct 26, 2022, 7:48 AM Jan Beulich wrote:
>
>> On 26.10.2022 13:34, Tamas K Lengyel wrote:
>>> On Wed, Oct 26, 2022, 7:06 AM Andrew Cooper
>>> wrote:
>>>
On 24/10/2022 17:58, Tamas K Lengyel wrote:
> Currently the
On Wed, Oct 26, 2022 at 6:21 AM Andrew Cooper wrote:
>
> This reverts most of commit cf2a68d2ffbc3ce95e01449d46180bddb10d24a0, and bits
> of cbea5a1149ca7fd4b7cdbfa3ec2e4f109b601ff7.
>
> First of all, with ARM borrowing x86's implementation, the logic to set the
> pool size should have been
flight 174395 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174395/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-examine 8 reboot fail REGR. vs. 173462
On Wed, 26 Oct 2022, Andrew Cooper wrote:
> This was missed from previous attempts to remove Travis.
>
> Fixes: e0dc9b095e7c ("CI: Drop TravisCI")
> Signed-off-by: Andrew Cooper
Acked-by: Stefano Stabellini
> ---
> CC: George Dunlap
> CC: Jan Beulich
> CC: Stefano Stabellini
> CC: Wei Liu
On 26/10/2022 15:33, Rahul Singh wrote:
Hi Julien,
Hi Rahul,
On 26 Oct 2022, at 2:36 pm, Julien Grall wrote:
On 26/10/2022 14:17, Rahul Singh wrote:
Hi All,
Hi Rahul,
At Arm, we started to implement the POC to support 2 levels of page
tables/nested translation in SMMUv3.
To
flight 174411 xen-4.13-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174411/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-credit1 14 guest-start fail REGR. vs. 172549
Hi Andrew,
On 26/10/2022 20:22, Andrew Cooper wrote:
--- a/xen/arch/x86/mm/hap/hap.c
+++ b/xen/arch/x86/mm/hap/hap.c
@@ -345,6 +345,16 @@ unsigned int hap_get_allocation(struct domain *d)
+ ((pg & ((1 << (20 - PAGE_SHIFT)) - 1)) ? 1 : 0));
}
+int
On 26/10/2022 14:42, Jan Beulich wrote:
> On 26.10.2022 12:20, Andrew Cooper wrote:
>> The existing XEN_DOMCTL_SHADOW_OP_{GET,SET}_ALLOCATION have problems:
>>
>> * All set_allocation() flavours have an overflow-before-widen bug when
>>calculating "sc->mb << (20 - PAGE_SHIFT)".
>> * All
On Tue, Oct 11, 2022 at 10:05:22PM +0200, Laurent Vivier wrote:
> "-netdev socket" only supports inet sockets.
>
> It's not a complex task to add support for unix sockets, but
> the socket netdev parameters are not defined to manage well unix
> socket parameters.
Acked-by: Michael S. Tsirkin
flight 174434 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174434/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 174380
test-armhf-armhf-libvirt-qcow2 15
On Wed, Oct 26, 2022 at 8:22 AM Jan Beulich wrote:
>
> On 26.10.2022 13:58, Tamas K Lengyel wrote:
> > On Wed, Oct 26, 2022, 7:48 AM Jan Beulich wrote:
> >
> >> On 26.10.2022 13:34, Tamas K Lengyel wrote:
> >>> On Wed, Oct 26, 2022, 7:06 AM Andrew Cooper
> >>> wrote:
> >>>
> On 24/10/2022
Hi Rahul,
On 26/10/2022 16:33, Rahul Singh wrote:
>
>
> Hi Julien,
>
>> On 26 Oct 2022, at 2:36 pm, Julien Grall wrote:
>>
>>
>>
>> On 26/10/2022 14:17, Rahul Singh wrote:
>>> Hi All,
>>
>> Hi Rahul,
>>
>>> At Arm, we started to implement the POC to support 2 levels of page
>>> tables/nested
Hi Julien,
On 26/10/2022 17:45, Julien Grall wrote:
On 26/10/2022 16:06, Ayan Kumar Halder wrote:
... you also need to ensure that the writers are atomically setting
rdist_pendbase. Please correct if I am wrong, but the callers are
not using write_atomic(). So how does that work?
I
flight 174406 xen-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174406/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit2 broken in 173725
test-arm64-arm64-xl-xsm
Vikram Garhwal writes:
> Build fails when have_xen_pci_passthrough is disabled. This is because of
> incorrect build configuration for xen_pt_stub.c.
>
> Signed-off-by: Stefano Stabellini
> Signed-off-by: Vikram Garhwal
Reviewed-by: Alex Bennée
--
Alex Bennée
flight 174455 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174455/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus,
as noted in docs/igd-assign.txt in the Qemu source code.
Currently, when the xl toolstack is used to configure a Xen HVM guest with
Intel IGD passthrough to the guest with the Qemu upstream device model,
a Qemu emulated PCI
On Wed, Oct 26, 2022 at 8:18 PM Michal Orzel wrote:
> Hi Rahul,
>
Hello all
[sorry for the possible format issues]
>
> On 26/10/2022 16:33, Rahul Singh wrote:
> >
> >
> > Hi Julien,
> >
> >> On 26 Oct 2022, at 2:36 pm, Julien Grall wrote:
> >>
> >>
> >>
> >> On 26/10/2022 14:17, Rahul
On 26/10/2022 16:06, Ayan Kumar Halder wrote:
... you also need to ensure that the writers are atomically setting
rdist_pendbase. Please correct if I am wrong, but the callers are not
using write_atomic(). So how does that work?
I think read_atomic()/write_atomic() may not be the correct
If a guest is running in 32 bit mode and it tries to access
"GICR_PENDBASER + 4" mmio reg, it will be trapped to Xen. vreg_reg64_extract()
will return the value stored "v->arch.vgic.rdist_pendbase + 4".
This will be stored in a 64bit cpu register.
So now we have the top 32 bits of GICR_PENDBASER
Hi,
On 26/10/2022 17:30, Stefano Stabellini wrote:
>
>
> On Wed, 26 Oct 2022, Bertrand Marquis wrote:
>>> On 26 Oct 2022, at 12:29, Michal Orzel wrote:
>>>
>>> Hi all,
>>>
>>> On 25/10/2022 10:20, Bertrand Marquis wrote:
Caution: This message originated from an External Source. Use proper
On Wed, Oct 26, 2022 at 04:06:40PM +0200, Jan Beulich wrote:
> On 26.10.2022 15:58, Roger Pau Monné wrote:
> > On Wed, Oct 26, 2022 at 02:47:43PM +0200, Jan Beulich wrote:
> >> On 25.10.2022 16:44, Roger Pau Monne wrote:
> >>> @@ -388,12 +391,12 @@ static void cf_check bar_write(
> >>> else
>
This is a series of two patches:
The first fixes FTBFS when --enable-xen and --disable-xen-pci-passthrough
configure options are set with when building for the linux target os.
The second fixes a regression that was introduced many years ago with the
upgrade from the Qemu traditional device
When Qemu is built with --enable-xen and --disable-xen-pci-passthrough
and the target os is linux, the build fails with:
meson.build:3477:2: ERROR: File xen_pt_stub.c does not exist.
Fixes: 582ea95f5f93 ("meson: convert hw/xen")
Signed-off-by: Chuck Zmudzinski
---
v2: Remove From: tag at top
flight 174478 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174478/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 115cebbe4d7541c795b4f9baefc38f9a1733b7f6
baseline version:
ovmf
flight 174468 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174468/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf b6efc505e4d6eb2055a39afd0a1ee67846a1e5f9
baseline version:
ovmf
flight 174474 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174474/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
flight 174415 xen-4.15-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/174415/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 172547
73 matches
Mail list logo