[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[xen-unstable-smoke test] 145806: tolerable all pass



flight 145806 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/145806/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-xl-xsm      13 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      14 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          14 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  3840e98f3e72b7b92071089a042cd7cf5be72732
baseline version:
 xen                  4dde27b6e0a0b0dcb8fdfc7580fbd9c976aa103f

Last test of basis   145752  2020-01-07 18:00:34 Z    0 days
Testing same since   145806  2020-01-08 15:00:58 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Juergen Gross <jgross@xxxxxxxx>
  Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
  Wei Liu <wl@xxxxxxx>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

ssh: Could not resolve hostname xenbits.xen.org: Temporary failure in name 
resolution
fatal: Could not read from remote repository.

Please make sure you have the correct access rights
and the repository exists.
------------------------------------------------------------
commit 3840e98f3e72b7b92071089a042cd7cf5be72732
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jan 8 15:04:36 2020 +0100

    libxl: don't needlessly report "highmem" in use
    
    Due to the unconditional updating of dom->highmem_end in
    libxl__domain_device_construct_rdm() I've observed on a 2Gb HVM guest
    with a passed through device (without overly large BARs, and with no RDM
    ranges at all)
    
    (d2) RAM in high memory; setting high_mem resource base to 100000000
    ...
    (d2) E820 table:
    (d2)  [00]: 00000000:00000000 - 00000000:000a0000: RAM
    (d2)  HOLE: 00000000:000a0000 - 00000000:000d0000
    (d2)  [01]: 00000000:000d0000 - 00000000:00100000: RESERVED
    (d2)  [02]: 00000000:00100000 - 00000000:7f800000: RAM
    (d2)  HOLE: 00000000:7f800000 - 00000000:fc000000
    (d2)  [03]: 00000000:fc000000 - 00000001:00000000: RESERVED
    (d2)  [04]: 00000001:00000000 - 00000001:00000000: RAM
    
    both of which aren't really appropriate in this case. Arrange for this
    to not happen.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Wei Liu <wl@xxxxxxx>

commit fe4df51ff776c8e543879ed552ace34d217e048d
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jan 8 15:03:58 2020 +0100

    x86/mm: re-order a few conditionals
    
    is_{hvm,pv}_*() can be expensive now, so where possible evaluate cheaper
    conditions first.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit a4cde0266d4287650ec62d8f850e4f84359e5e4f
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jan 8 15:03:19 2020 +0100

    x86/mm: rename and tidy create_pae_xen_mappings()
    
    After dad74b0f9e ("i386: fix handling of Xen entries in final L2 page
    table") and the removal of 32-bit support the function doesn't modify
    state anymore, and hence its name has been misleading. Change its name,
    constify parameters and a local variable, and make it return bool.
    
    Also drop the call to it from mod_l3_entry(): The function explicitly
    disallows 32-bit domains to modify slot 3. This way we also won't
    re-check slot 3 when a slot other than slot 3 changes. Doing so has
    needlessly disallowed making some L2 table recursively link back to an
    L2 used in some L3's 3rd slot, as we check for the type ref count to be
    1. (Note that allowing dynamic changes of L3 entries in the way we do is
    bogus anyway, as that's not how L3s behave in the native and EPT cases:
    They get re-evaluated only upon CR3 reloads. NPT is different in this
    regard.)
    
    As a result of this we no longer need to play games to get at the start
    of the L3 table.
    
    Additionally move the single remaining call site, allowing to drop one
    is_pv_32bit_domain() invocation and a _PAGE_PRESENT check (in the
    function itself) as well as to exit the loop early (remaining entries
    have all been set to empty just ahead of this loop).
    
    Further move a BUG_ON() such that in the common case its condition
    wouldn't need evaluating.
    
    Finally, since we're at it, move init_xen_pae_l2_slots() next to the
    renamed function, as they really belong together (in fact
    init_xen_pae_l2_slots() was [indirectly] broken out of this function).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit 8931fc9a1d7c7f4afd339b314fe7881fc06e2f5d
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Jan 8 15:02:26 2020 +0100

    x86/mm: mod_l<N>_entry() have no need to use __copy_from_user()
    
    mod_l1_entry()'s need to do so went away with commit 2d0557c5cb ("x86:
    Fold page_info lock into type_info"), and the other three never had such
    a need, at least going back as far as 3.2.0. Replace the uses by
    l<N>e_read_atomic().
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

commit d7f3c76317108ee9989f00545d394fa495fba752
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Wed Jan 8 14:59:25 2020 +0100

    sched: fix resuming from S3 with smt=0
    
    When resuming from S3 and smt=0 or maxcpus= are specified we must not
    do anything in cpu_schedule_callback(). This is not true today for
    taking down a cpu during resume.
    
    If anything goes wrong during resume all the scheduler related error
    handling is in cpupool.c, so we can just bail out early from
    cpu_schedule_callback() when suspending or resuming.
    
    This fixes commit 0763cd2687897b55e7 ("xen/sched: don't disable
    scheduler on cpus during suspend").
    
    Reported-by: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
    Tested-by: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
osstest-output mailing list
osstest-output@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/osstest-output

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.