[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Heads-up re Re: [xen-unstable test] 10867: regressions - FAIL



Am 18.01.2012 15:06, schrieb Ian Jackson:
xen.org writes ("[xen-unstable test] 10867: regressions - FAIL"):
Tests which did not succeed and are blocking,
including tests which could not be run:
  test-amd64-i386-rhel6hvm-intel  7 redhat-install       fail REGR. vs. 10649

My bisector is working on this and so far it seems to have narrowed it
down to: 75b8e982eb7e is good; 6c104b46ef89 is bad.

Hi Ian,

What symptoms have you seen when windows install failed? I tested windows xpsp3 installation manually with tip. The first stage of installation seem to pass but I got BSOD when guest tries to reboot for the first time.

I traced back to c/s 24465 and saw the same result. I also tried c/s 24300 blindly and this c/s seemed to work for me. But I got a lot of compilation error between 24465 and 24300, so could not bisect further.

Maybe we are not talking the issue here... But actually, the 2nd patch of my v4 patch queue will introduce a flag to disable all iommuv2 emulation codes from being running on old or non-iommu systems. This will help to isolate iommuv2 part from the rest parts of Xen. This patch was originally on top of the new hypercalls. But maybe I could drop a new patch to let this patch applicable on tip?

Thanks,

Wei


That means that one these commits has probably broken HVM:
   amd iommu: Add iommu emulation for hvm guest
   amd iommu: Introduces new helper functions to simplify bitwise operations
   amd iommu: Refactoring iommu ring buffer definition
   move declarations of some required per-arch functions into common headers
   ia64: fix build (once again)
   x86/mm: Code style fixes in mem_sharing.c
   x86/mm: Disable paging_prep

The bisector is currently testing e71bd3.  Full revision log below.

Ian.


changeset:   24492:6c104b46ef89
user:        Wei Wang<wei.wang2@xxxxxxx>
date:        Thu Jan 12 13:50:50 2012 +0100
files:       xen/arch/x86/hvm/intercept.c xen/drivers/passthrough/amd/Makefile 
xen/drivers/passthrough/amd/iommu_cmd.c 
xen/drivers/passthrough/amd/iommu_guest.c 
xen/drivers/passthrough/amd/iommu_map.c 
xen/drivers/passthrough/amd/pci_amd_iommu.c xen/include/asm-x86/amd-iommu.h 
xen/include/asm-x86/hvm/io.h xen/include/asm-x86/hvm/svm/amd-iommu-defs.h 
xen/include/asm-x86/hvm/svm/amd-iommu-proto.h xen/include/xen/hvm/iommu.h
description:
amd iommu: Add iommu emulation for hvm guest

ATS device driver that support PASID [1] and PRI [2] capabilites needs
to work with iommu driver in guest OS. We have to expose iommu
functionality to HVM guest, if we want assign ATS device to it. A new
hypervisor mmio handler is added to intercept iommu mmio accesses from
guest.

Signed-off-by: Wei Wang<wei.wang2@xxxxxxx>

[1] 
http://www.pcisig.com/specifications/pciexpress/specifications/ECN-PASID-ATS-2011-03-31.pdf
[2] 
http://www.pcisig.com/members/downloads/specifications/iov/ats_r1.1_26Jan09.pdf
Committed-by: Jan Beulich<jbeulich@xxxxxxxx>


changeset:   24491:522d544f4031
user:        Wei Wang<wei.wang2@xxxxxxx>
date:        Thu Jan 12 13:49:34 2012 +0100
files:       xen/drivers/passthrough/amd/iommu_cmd.c 
xen/drivers/passthrough/amd/iommu_init.c 
xen/include/asm-x86/hvm/svm/amd-iommu-defs.h 
xen/include/asm-x86/hvm/svm/amd-iommu-proto.h
description:
amd iommu: Introduces new helper functions to simplify bitwise operations

Signed-off-by: Wei Wang<wei.wang2@xxxxxxx>
Committed-by: Jan Beulich<jbeulich@xxxxxxxx>


changeset:   24490:d59816959ac0
user:        Wei Wang<wei.wang2@xxxxxxx>
date:        Thu Jan 12 13:48:57 2012 +0100
files:       xen/drivers/passthrough/amd/iommu_cmd.c 
xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/amd-iommu.h
description:
amd iommu: Refactoring iommu ring buffer definition

Introduce struct ring_buffer to represent iommu cmd buffer, event log and ppr 
log

Signed-off-by: Wei Wang<wei.wang2@xxxxxxx>
Committed-by: Jan Beulich<jbeulich@xxxxxxxx>


changeset:   24489:8d2fa20dd3f3
user:        Jan Beulich<jbeulich@xxxxxxxx>
date:        Thu Jan 12 13:45:47 2012 +0100
files:       xen/arch/ia64/xen/dom0_ops.c xen/arch/ia64/xen/domain.c 
xen/arch/ia64/xen/xensetup.c xen/arch/x86/domain.c xen/arch/x86/x86_64/domain.c 
xen/common/kernel.c xen/include/asm-ia64/hypercall.h 
xen/include/asm-x86/hypercall.h xen/include/asm-x86/setup.h 
xen/include/xen/hypercall.h
description:
move declarations of some required per-arch functions into common headers

... since it is pointless to have each arch declare them on their own
(and now and the - see ia64 - forget to do so).

Signed-off-by: Jan Beulich<jbeulich@xxxxxxxx>
Acked-by: Keir Fraser<keir@xxxxxxx>


changeset:   24488:e71bd3a75f07
user:        Jan Beulich<jbeulich@xxxxxxxx>
date:        Thu Jan 12 13:44:51 2012 +0100
files:       xen/arch/ia64/xen/mm.c xen/include/asm-ia64/kexec.h
description:
ia64: fix build (once again)

24423:069c08b7de46 failed to add a necessary include, and for a long
time kexec.h suffered from a missing structure forward declaration.

Signed-off-by: Jan Beulich<jbeulich@xxxxxxxx>
Acked-by: Keir Fraser<keir@xxxxxxx>


changeset:   24487:32dd444700bd
user:        Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx>
date:        Thu Jan 12 11:02:18 2012 +0000
files:       xen/arch/x86/mm.c xen/arch/x86/mm/mem_sharing.c
description:
x86/mm: Code style fixes in mem_sharing.c

No functional changes, only code style issues.

One small diff in mem_sharing_gref_to_gfn() looks like a logic change,
but it's not.  The flow was confusing, so it's been clarified.

Signed-off-by: Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx>
Signed-off-by: Adin Scannell<adin@xxxxxxxxxxx>
Acked-by: Tim Deegan<tim@xxxxxxx>
Committed-by: Tim Deegan<tim@xxxxxxx>


changeset:   24486:f04dfb11dd61
user:        Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx>
date:        Thu Jan 12 10:52:30 2012 +0000
files:       xen/arch/x86/mm/p2m.c
description:
x86/mm: Disable paging_prep

The only way to page-in a page is now the safe paging_load domctl.
(Unless the page was never paged out in the first place)

Signed-off-by: Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx>
Acked-by: Tim Deegan<tim@xxxxxxx>
Committed-by: Tim Deegan<tim@xxxxxxx>


changeset:   24485:75b8e982eb7e
user:        Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx>
date:        Thu Jan 12 10:52:30 2012 +0000
files:       xen/arch/x86/mm/p2m.c
description:
x86/mm: Allow a page in p2m_ram_paged_out state to be loaded

This removes the need for a page to be accessed in order to be pageable
again. A pager can now page-in pages at will with no need to map them
in a separate thread.

Signed-off-by: Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx>
Acked-by: Tim Deegan<tim@xxxxxxx>
Committed-by: Tim Deegan<tim@xxxxxxx>






_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.