[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Heads-up re Re: [xen-unstable test] 10867: regressions - FAIL



xen.org writes ("[xen-unstable test] 10867: regressions - FAIL"):
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>  test-amd64-i386-rhel6hvm-intel  7 redhat-install       fail REGR. vs. 10649

My bisector is working on this and so far it seems to have narrowed it
down to: 75b8e982eb7e is good; 6c104b46ef89 is bad.

That means that one these commits has probably broken HVM:
  amd iommu: Add iommu emulation for hvm guest
  amd iommu: Introduces new helper functions to simplify bitwise operations
  amd iommu: Refactoring iommu ring buffer definition
  move declarations of some required per-arch functions into common headers
  ia64: fix build (once again)
  x86/mm: Code style fixes in mem_sharing.c
  x86/mm: Disable paging_prep

The bisector is currently testing e71bd3.  Full revision log below.

Ian.


changeset:   24492:6c104b46ef89
user:        Wei Wang <wei.wang2@xxxxxxx>
date:        Thu Jan 12 13:50:50 2012 +0100
files:       xen/arch/x86/hvm/intercept.c xen/drivers/passthrough/amd/Makefile 
xen/drivers/passthrough/amd/iommu_cmd.c 
xen/drivers/passthrough/amd/iommu_guest.c 
xen/drivers/passthrough/amd/iommu_map.c 
xen/drivers/passthrough/amd/pci_amd_iommu.c xen/include/asm-x86/amd-iommu.h 
xen/include/asm-x86/hvm/io.h xen/include/asm-x86/hvm/svm/amd-iommu-defs.h 
xen/include/asm-x86/hvm/svm/amd-iommu-proto.h xen/include/xen/hvm/iommu.h
description:
amd iommu: Add iommu emulation for hvm guest

ATS device driver that support PASID [1] and PRI [2] capabilites needs
to work with iommu driver in guest OS. We have to expose iommu
functionality to HVM guest, if we want assign ATS device to it. A new
hypervisor mmio handler is added to intercept iommu mmio accesses from
guest.

Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>

[1] 
http://www.pcisig.com/specifications/pciexpress/specifications/ECN-PASID-ATS-2011-03-31.pdf
[2] 
http://www.pcisig.com/members/downloads/specifications/iov/ats_r1.1_26Jan09.pdf
Committed-by: Jan Beulich <jbeulich@xxxxxxxx>


changeset:   24491:522d544f4031
user:        Wei Wang <wei.wang2@xxxxxxx>
date:        Thu Jan 12 13:49:34 2012 +0100
files:       xen/drivers/passthrough/amd/iommu_cmd.c 
xen/drivers/passthrough/amd/iommu_init.c 
xen/include/asm-x86/hvm/svm/amd-iommu-defs.h 
xen/include/asm-x86/hvm/svm/amd-iommu-proto.h
description:
amd iommu: Introduces new helper functions to simplify bitwise operations

Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>
Committed-by: Jan Beulich <jbeulich@xxxxxxxx>


changeset:   24490:d59816959ac0
user:        Wei Wang <wei.wang2@xxxxxxx>
date:        Thu Jan 12 13:48:57 2012 +0100
files:       xen/drivers/passthrough/amd/iommu_cmd.c 
xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/amd-iommu.h
description:
amd iommu: Refactoring iommu ring buffer definition

Introduce struct ring_buffer to represent iommu cmd buffer, event log and ppr 
log

Signed-off-by: Wei Wang <wei.wang2@xxxxxxx>
Committed-by: Jan Beulich <jbeulich@xxxxxxxx>


changeset:   24489:8d2fa20dd3f3
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Jan 12 13:45:47 2012 +0100
files:       xen/arch/ia64/xen/dom0_ops.c xen/arch/ia64/xen/domain.c 
xen/arch/ia64/xen/xensetup.c xen/arch/x86/domain.c xen/arch/x86/x86_64/domain.c 
xen/common/kernel.c xen/include/asm-ia64/hypercall.h 
xen/include/asm-x86/hypercall.h xen/include/asm-x86/setup.h 
xen/include/xen/hypercall.h
description:
move declarations of some required per-arch functions into common headers

... since it is pointless to have each arch declare them on their own
(and now and the - see ia64 - forget to do so).

Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
Acked-by: Keir Fraser <keir@xxxxxxx>


changeset:   24488:e71bd3a75f07
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Thu Jan 12 13:44:51 2012 +0100
files:       xen/arch/ia64/xen/mm.c xen/include/asm-ia64/kexec.h
description:
ia64: fix build (once again)

24423:069c08b7de46 failed to add a necessary include, and for a long
time kexec.h suffered from a missing structure forward declaration.

Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
Acked-by: Keir Fraser <keir@xxxxxxx>


changeset:   24487:32dd444700bd
user:        Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
date:        Thu Jan 12 11:02:18 2012 +0000
files:       xen/arch/x86/mm.c xen/arch/x86/mm/mem_sharing.c
description:
x86/mm: Code style fixes in mem_sharing.c

No functional changes, only code style issues.

One small diff in mem_sharing_gref_to_gfn() looks like a logic change,
but it's not.  The flow was confusing, so it's been clarified.

Signed-off-by: Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
Signed-off-by: Adin Scannell <adin@xxxxxxxxxxx>
Acked-by: Tim Deegan <tim@xxxxxxx>
Committed-by: Tim Deegan <tim@xxxxxxx>


changeset:   24486:f04dfb11dd61
user:        Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
date:        Thu Jan 12 10:52:30 2012 +0000
files:       xen/arch/x86/mm/p2m.c
description:
x86/mm: Disable paging_prep

The only way to page-in a page is now the safe paging_load domctl.
(Unless the page was never paged out in the first place)

Signed-off-by: Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
Acked-by: Tim Deegan <tim@xxxxxxx>
Committed-by: Tim Deegan <tim@xxxxxxx>


changeset:   24485:75b8e982eb7e
user:        Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
date:        Thu Jan 12 10:52:30 2012 +0000
files:       xen/arch/x86/mm/p2m.c
description:
x86/mm: Allow a page in p2m_ram_paged_out state to be loaded

This removes the need for a page to be accessed in order to be pageable
again. A pager can now page-in pages at will with no need to map them
in a separate thread.

Signed-off-by: Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx>
Acked-by: Tim Deegan <tim@xxxxxxx>
Committed-by: Tim Deegan <tim@xxxxxxx>



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.