[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Heads-up re Re: [xen-unstable test] 10867: regressions - FAIL
Am 18.01.2012 15:06, schrieb Ian Jackson: xen.org writes ("[xen-unstable test] 10867: regressions - FAIL"):Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs. 10649My bisector is working on this and so far it seems to have narrowed it down to: 75b8e982eb7e is good; 6c104b46ef89 is bad. Hi Ian,What symptoms have you seen when windows install failed? I tested windows xpsp3 installation manually with tip. The first stage of installation seem to pass but I got BSOD when guest tries to reboot for the first time. I traced back to c/s 24465 and saw the same result. I also tried c/s 24300 blindly and this c/s seemed to work for me. But I got a lot of compilation error between 24465 and 24300, so could not bisect further. Maybe we are not talking the issue here... But actually, the 2nd patch of my v4 patch queue will introduce a flag to disable all iommuv2 emulation codes from being running on old or non-iommu systems. This will help to isolate iommuv2 part from the rest parts of Xen. This patch was originally on top of the new hypercalls. But maybe I could drop a new patch to let this patch applicable on tip? Thanks, Wei That means that one these commits has probably broken HVM: amd iommu: Add iommu emulation for hvm guest amd iommu: Introduces new helper functions to simplify bitwise operations amd iommu: Refactoring iommu ring buffer definition move declarations of some required per-arch functions into common headers ia64: fix build (once again) x86/mm: Code style fixes in mem_sharing.c x86/mm: Disable paging_prep The bisector is currently testing e71bd3. Full revision log below. Ian. changeset: 24492:6c104b46ef89 user: Wei Wang<wei.wang2@xxxxxxx> date: Thu Jan 12 13:50:50 2012 +0100 files: xen/arch/x86/hvm/intercept.c xen/drivers/passthrough/amd/Makefile xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_guest.c xen/drivers/passthrough/amd/iommu_map.c xen/drivers/passthrough/amd/pci_amd_iommu.c xen/include/asm-x86/amd-iommu.h xen/include/asm-x86/hvm/io.h xen/include/asm-x86/hvm/svm/amd-iommu-defs.h xen/include/asm-x86/hvm/svm/amd-iommu-proto.h xen/include/xen/hvm/iommu.h description: amd iommu: Add iommu emulation for hvm guest ATS device driver that support PASID [1] and PRI [2] capabilites needs to work with iommu driver in guest OS. We have to expose iommu functionality to HVM guest, if we want assign ATS device to it. A new hypervisor mmio handler is added to intercept iommu mmio accesses from guest. Signed-off-by: Wei Wang<wei.wang2@xxxxxxx> [1] http://www.pcisig.com/specifications/pciexpress/specifications/ECN-PASID-ATS-2011-03-31.pdf [2] http://www.pcisig.com/members/downloads/specifications/iov/ats_r1.1_26Jan09.pdf Committed-by: Jan Beulich<jbeulich@xxxxxxxx> changeset: 24491:522d544f4031 user: Wei Wang<wei.wang2@xxxxxxx> date: Thu Jan 12 13:49:34 2012 +0100 files: xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/hvm/svm/amd-iommu-defs.h xen/include/asm-x86/hvm/svm/amd-iommu-proto.h description: amd iommu: Introduces new helper functions to simplify bitwise operations Signed-off-by: Wei Wang<wei.wang2@xxxxxxx> Committed-by: Jan Beulich<jbeulich@xxxxxxxx> changeset: 24490:d59816959ac0 user: Wei Wang<wei.wang2@xxxxxxx> date: Thu Jan 12 13:48:57 2012 +0100 files: xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/amd-iommu.h description: amd iommu: Refactoring iommu ring buffer definition Introduce struct ring_buffer to represent iommu cmd buffer, event log and ppr log Signed-off-by: Wei Wang<wei.wang2@xxxxxxx> Committed-by: Jan Beulich<jbeulich@xxxxxxxx> changeset: 24489:8d2fa20dd3f3 user: Jan Beulich<jbeulich@xxxxxxxx> date: Thu Jan 12 13:45:47 2012 +0100 files: xen/arch/ia64/xen/dom0_ops.c xen/arch/ia64/xen/domain.c xen/arch/ia64/xen/xensetup.c xen/arch/x86/domain.c xen/arch/x86/x86_64/domain.c xen/common/kernel.c xen/include/asm-ia64/hypercall.h xen/include/asm-x86/hypercall.h xen/include/asm-x86/setup.h xen/include/xen/hypercall.h description: move declarations of some required per-arch functions into common headers ... since it is pointless to have each arch declare them on their own (and now and the - see ia64 - forget to do so). Signed-off-by: Jan Beulich<jbeulich@xxxxxxxx> Acked-by: Keir Fraser<keir@xxxxxxx> changeset: 24488:e71bd3a75f07 user: Jan Beulich<jbeulich@xxxxxxxx> date: Thu Jan 12 13:44:51 2012 +0100 files: xen/arch/ia64/xen/mm.c xen/include/asm-ia64/kexec.h description: ia64: fix build (once again) 24423:069c08b7de46 failed to add a necessary include, and for a long time kexec.h suffered from a missing structure forward declaration. Signed-off-by: Jan Beulich<jbeulich@xxxxxxxx> Acked-by: Keir Fraser<keir@xxxxxxx> changeset: 24487:32dd444700bd user: Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx> date: Thu Jan 12 11:02:18 2012 +0000 files: xen/arch/x86/mm.c xen/arch/x86/mm/mem_sharing.c description: x86/mm: Code style fixes in mem_sharing.c No functional changes, only code style issues. One small diff in mem_sharing_gref_to_gfn() looks like a logic change, but it's not. The flow was confusing, so it's been clarified. Signed-off-by: Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx> Signed-off-by: Adin Scannell<adin@xxxxxxxxxxx> Acked-by: Tim Deegan<tim@xxxxxxx> Committed-by: Tim Deegan<tim@xxxxxxx> changeset: 24486:f04dfb11dd61 user: Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx> date: Thu Jan 12 10:52:30 2012 +0000 files: xen/arch/x86/mm/p2m.c description: x86/mm: Disable paging_prep The only way to page-in a page is now the safe paging_load domctl. (Unless the page was never paged out in the first place) Signed-off-by: Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx> Acked-by: Tim Deegan<tim@xxxxxxx> Committed-by: Tim Deegan<tim@xxxxxxx> changeset: 24485:75b8e982eb7e user: Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx> date: Thu Jan 12 10:52:30 2012 +0000 files: xen/arch/x86/mm/p2m.c description: x86/mm: Allow a page in p2m_ram_paged_out state to be loaded This removes the need for a page to be accessed in order to be pageable again. A pager can now page-in pages at will with no need to map them in a separate thread. Signed-off-by: Andres Lagar-Cavilla<andres@xxxxxxxxxxxxxxxx> Acked-by: Tim Deegan<tim@xxxxxxx> Committed-by: Tim Deegan<tim@xxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |