flight 10867 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/10867/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs. 10649 test-amd64-i386-rhel6hvm-amd 7 redhat-install fail REGR. vs. 10649 test-amd64-i386-xend-winxpsp3 7 windows-install fail REGR. vs. 10649 test-amd64-amd64-xl-winxpsp3 7 windows-install fail REGR. vs. 10649 test-amd64-i386-xl-winxpsp3-vcpus1 7 windows-install fail REGR. vs. 10649 test-amd64-amd64-win 7 windows-install fail REGR. vs. 10649 test-amd64-amd64-xl-win 7 windows-install fail REGR. vs. 10649 test-i386-i386-xl-win 7 windows-install fail REGR. vs. 10649 test-amd64-i386-xl-win-vcpus1 7 windows-install fail REGR. vs. 10649 test-amd64-i386-win-vcpus1 7 windows-install fail REGR. vs. 10649 test-amd64-i386-win 7 windows-install fail REGR. vs. 10649 test-i386-i386-win 7 windows-install fail REGR. vs. 10649 test-i386-i386-xl-winxpsp3 7 windows-install fail REGR. vs. 10649 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass version targeted for testing: xen 15ab61865ecb baseline version: xen 5b2676ac1321 ------------------------------------------------------------ People who touched revisions under test: Adin Scannell <adin@scannell.ca> Andres Lagar-Cavilla <andres@lagarcavilla.org> Christoph Egger <Christoph.Egger@amd.com> Daniel De Graaf <dgdegra@tycho.nsa.gov> Dario Faggioli <dario.faggioli@citrix.com> Gang Wei <gang.wei@intel.com> George Dunlap <george.dunlap@eu.citrix.com> Hui Lv <hui.lv@intel.com> Ian Campbell <ian.campbell@citrix.com> Ian Jackson <ian.jackson.citrix.com> Ian Jackson <ian.jackson@eu.citrix.com> Jan Beulich <jbeulich@suse.com> Joseph Cihula <joseph.cihula@intel.com> Keir Fraser <keir@xen.org> Olaf Hering <olaf@aepfle.de> Paul Durrant <paul.durrant@citrix.com> Roger Pau Monne <roger.pau@entel.upc.edu> Shane Wang <shane.wang@intel.com> Stefano Stabellini <stefano.stabellini@eu.citrix.com> Tim Deegan <tim@xen.org> Wei Wang <wei.wang2@amd.com> Wei, Gang <gang.wei@intel.com> ------------------------------------------------------------ jobs: build-amd64 pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl pass test-i386-i386-xl pass test-amd64-i386-rhel6hvm-amd fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-i386-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-i386-i386-pv pass test-amd64-amd64-xl-sedf pass test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-i386-i386-win fail test-amd64-amd64-xl-win fail test-i386-i386-xl-win fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail test-i386-i386-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. (No revision log; it would be 870 lines long.)
Ian Jackson
2012-Jan-18 14:06 UTC
Heads-up re Re: [xen-unstable test] 10867: regressions - FAIL
xen.org writes ("[xen-unstable test] 10867: regressions - FAIL"):> Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs. 10649My bisector is working on this and so far it seems to have narrowed it down to: 75b8e982eb7e is good; 6c104b46ef89 is bad. That means that one these commits has probably broken HVM: amd iommu: Add iommu emulation for hvm guest amd iommu: Introduces new helper functions to simplify bitwise operations amd iommu: Refactoring iommu ring buffer definition move declarations of some required per-arch functions into common headers ia64: fix build (once again) x86/mm: Code style fixes in mem_sharing.c x86/mm: Disable paging_prep The bisector is currently testing e71bd3. Full revision log below. Ian. changeset: 24492:6c104b46ef89 user: Wei Wang <wei.wang2@amd.com> date: Thu Jan 12 13:50:50 2012 +0100 files: xen/arch/x86/hvm/intercept.c xen/drivers/passthrough/amd/Makefile xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_guest.c xen/drivers/passthrough/amd/iommu_map.c xen/drivers/passthrough/amd/pci_amd_iommu.c xen/include/asm-x86/amd-iommu.h xen/include/asm-x86/hvm/io.h xen/include/asm-x86/hvm/svm/amd-iommu-defs.h xen/include/asm-x86/hvm/svm/amd-iommu-proto.h xen/include/xen/hvm/iommu.h description: amd iommu: Add iommu emulation for hvm guest ATS device driver that support PASID [1] and PRI [2] capabilites needs to work with iommu driver in guest OS. We have to expose iommu functionality to HVM guest, if we want assign ATS device to it. A new hypervisor mmio handler is added to intercept iommu mmio accesses from guest. Signed-off-by: Wei Wang <wei.wang2@amd.com> [1] http://www.pcisig.com/specifications/pciexpress/specifications/ECN-PASID-ATS-2011-03-31.pdf [2] http://www.pcisig.com/members/downloads/specifications/iov/ats_r1.1_26Jan09.pdf Committed-by: Jan Beulich <jbeulich@suse.com> changeset: 24491:522d544f4031 user: Wei Wang <wei.wang2@amd.com> date: Thu Jan 12 13:49:34 2012 +0100 files: xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/hvm/svm/amd-iommu-defs.h xen/include/asm-x86/hvm/svm/amd-iommu-proto.h description: amd iommu: Introduces new helper functions to simplify bitwise operations Signed-off-by: Wei Wang <wei.wang2@amd.com> Committed-by: Jan Beulich <jbeulich@suse.com> changeset: 24490:d59816959ac0 user: Wei Wang <wei.wang2@amd.com> date: Thu Jan 12 13:48:57 2012 +0100 files: xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/amd-iommu.h description: amd iommu: Refactoring iommu ring buffer definition Introduce struct ring_buffer to represent iommu cmd buffer, event log and ppr log Signed-off-by: Wei Wang <wei.wang2@amd.com> Committed-by: Jan Beulich <jbeulich@suse.com> changeset: 24489:8d2fa20dd3f3 user: Jan Beulich <jbeulich@suse.com> date: Thu Jan 12 13:45:47 2012 +0100 files: xen/arch/ia64/xen/dom0_ops.c xen/arch/ia64/xen/domain.c xen/arch/ia64/xen/xensetup.c xen/arch/x86/domain.c xen/arch/x86/x86_64/domain.c xen/common/kernel.c xen/include/asm-ia64/hypercall.h xen/include/asm-x86/hypercall.h xen/include/asm-x86/setup.h xen/include/xen/hypercall.h description: move declarations of some required per-arch functions into common headers ... since it is pointless to have each arch declare them on their own (and now and the - see ia64 - forget to do so). Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> changeset: 24488:e71bd3a75f07 user: Jan Beulich <jbeulich@suse.com> date: Thu Jan 12 13:44:51 2012 +0100 files: xen/arch/ia64/xen/mm.c xen/include/asm-ia64/kexec.h description: ia64: fix build (once again) 24423:069c08b7de46 failed to add a necessary include, and for a long time kexec.h suffered from a missing structure forward declaration. Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Keir Fraser <keir@xen.org> changeset: 24487:32dd444700bd user: Andres Lagar-Cavilla <andres@lagarcavilla.org> date: Thu Jan 12 11:02:18 2012 +0000 files: xen/arch/x86/mm.c xen/arch/x86/mm/mem_sharing.c description: x86/mm: Code style fixes in mem_sharing.c No functional changes, only code style issues. One small diff in mem_sharing_gref_to_gfn() looks like a logic change, but it''s not. The flow was confusing, so it''s been clarified. Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org> Signed-off-by: Adin Scannell <adin@scannell.ca> Acked-by: Tim Deegan <tim@xen.org> Committed-by: Tim Deegan <tim@xen.org> changeset: 24486:f04dfb11dd61 user: Andres Lagar-Cavilla <andres@lagarcavilla.org> date: Thu Jan 12 10:52:30 2012 +0000 files: xen/arch/x86/mm/p2m.c description: x86/mm: Disable paging_prep The only way to page-in a page is now the safe paging_load domctl. (Unless the page was never paged out in the first place) Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org> Acked-by: Tim Deegan <tim@xen.org> Committed-by: Tim Deegan <tim@xen.org> changeset: 24485:75b8e982eb7e user: Andres Lagar-Cavilla <andres@lagarcavilla.org> date: Thu Jan 12 10:52:30 2012 +0000 files: xen/arch/x86/mm/p2m.c description: x86/mm: Allow a page in p2m_ram_paged_out state to be loaded This removes the need for a page to be accessed in order to be pageable again. A pager can now page-in pages at will with no need to map them in a separate thread. Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org> Acked-by: Tim Deegan <tim@xen.org> Committed-by: Tim Deegan <tim@xen.org>
Wei Wang
2012-Jan-23 15:30 UTC
Re: Heads-up re Re: [xen-unstable test] 10867: regressions - FAIL
Am 18.01.2012 15:06, schrieb Ian Jackson:> xen.org writes ("[xen-unstable test] 10867: regressions - FAIL"): >> Tests which did not succeed and are blocking, >> including tests which could not be run: >> test-amd64-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs. 10649 > > My bisector is working on this and so far it seems to have narrowed it > down to: 75b8e982eb7e is good; 6c104b46ef89 is bad.Hi Ian, What symptoms have you seen when windows install failed? I tested windows xpsp3 installation manually with tip. The first stage of installation seem to pass but I got BSOD when guest tries to reboot for the first time. I traced back to c/s 24465 and saw the same result. I also tried c/s 24300 blindly and this c/s seemed to work for me. But I got a lot of compilation error between 24465 and 24300, so could not bisect further. Maybe we are not talking the issue here... But actually, the 2nd patch of my v4 patch queue will introduce a flag to disable all iommuv2 emulation codes from being running on old or non-iommu systems. This will help to isolate iommuv2 part from the rest parts of Xen. This patch was originally on top of the new hypercalls. But maybe I could drop a new patch to let this patch applicable on tip? Thanks, Wei> That means that one these commits has probably broken HVM: > amd iommu: Add iommu emulation for hvm guest > amd iommu: Introduces new helper functions to simplify bitwise operations > amd iommu: Refactoring iommu ring buffer definition > move declarations of some required per-arch functions into common headers > ia64: fix build (once again) > x86/mm: Code style fixes in mem_sharing.c > x86/mm: Disable paging_prep > > The bisector is currently testing e71bd3. Full revision log below. > > Ian. > > > changeset: 24492:6c104b46ef89 > user: Wei Wang<wei.wang2@amd.com> > date: Thu Jan 12 13:50:50 2012 +0100 > files: xen/arch/x86/hvm/intercept.c xen/drivers/passthrough/amd/Makefile xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_guest.c xen/drivers/passthrough/amd/iommu_map.c xen/drivers/passthrough/amd/pci_amd_iommu.c xen/include/asm-x86/amd-iommu.h xen/include/asm-x86/hvm/io.h xen/include/asm-x86/hvm/svm/amd-iommu-defs.h xen/include/asm-x86/hvm/svm/amd-iommu-proto.h xen/include/xen/hvm/iommu.h > description: > amd iommu: Add iommu emulation for hvm guest > > ATS device driver that support PASID [1] and PRI [2] capabilites needs > to work with iommu driver in guest OS. We have to expose iommu > functionality to HVM guest, if we want assign ATS device to it. A new > hypervisor mmio handler is added to intercept iommu mmio accesses from > guest. > > Signed-off-by: Wei Wang<wei.wang2@amd.com> > > [1] http://www.pcisig.com/specifications/pciexpress/specifications/ECN-PASID-ATS-2011-03-31.pdf > [2] http://www.pcisig.com/members/downloads/specifications/iov/ats_r1.1_26Jan09.pdf > Committed-by: Jan Beulich<jbeulich@suse.com> > > > changeset: 24491:522d544f4031 > user: Wei Wang<wei.wang2@amd.com> > date: Thu Jan 12 13:49:34 2012 +0100 > files: xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/hvm/svm/amd-iommu-defs.h xen/include/asm-x86/hvm/svm/amd-iommu-proto.h > description: > amd iommu: Introduces new helper functions to simplify bitwise operations > > Signed-off-by: Wei Wang<wei.wang2@amd.com> > Committed-by: Jan Beulich<jbeulich@suse.com> > > > changeset: 24490:d59816959ac0 > user: Wei Wang<wei.wang2@amd.com> > date: Thu Jan 12 13:48:57 2012 +0100 > files: xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/amd-iommu.h > description: > amd iommu: Refactoring iommu ring buffer definition > > Introduce struct ring_buffer to represent iommu cmd buffer, event log and ppr log > > Signed-off-by: Wei Wang<wei.wang2@amd.com> > Committed-by: Jan Beulich<jbeulich@suse.com> > > > changeset: 24489:8d2fa20dd3f3 > user: Jan Beulich<jbeulich@suse.com> > date: Thu Jan 12 13:45:47 2012 +0100 > files: xen/arch/ia64/xen/dom0_ops.c xen/arch/ia64/xen/domain.c xen/arch/ia64/xen/xensetup.c xen/arch/x86/domain.c xen/arch/x86/x86_64/domain.c xen/common/kernel.c xen/include/asm-ia64/hypercall.h xen/include/asm-x86/hypercall.h xen/include/asm-x86/setup.h xen/include/xen/hypercall.h > description: > move declarations of some required per-arch functions into common headers > > ... since it is pointless to have each arch declare them on their own > (and now and the - see ia64 - forget to do so). > > Signed-off-by: Jan Beulich<jbeulich@suse.com> > Acked-by: Keir Fraser<keir@xen.org> > > > changeset: 24488:e71bd3a75f07 > user: Jan Beulich<jbeulich@suse.com> > date: Thu Jan 12 13:44:51 2012 +0100 > files: xen/arch/ia64/xen/mm.c xen/include/asm-ia64/kexec.h > description: > ia64: fix build (once again) > > 24423:069c08b7de46 failed to add a necessary include, and for a long > time kexec.h suffered from a missing structure forward declaration. > > Signed-off-by: Jan Beulich<jbeulich@suse.com> > Acked-by: Keir Fraser<keir@xen.org> > > > changeset: 24487:32dd444700bd > user: Andres Lagar-Cavilla<andres@lagarcavilla.org> > date: Thu Jan 12 11:02:18 2012 +0000 > files: xen/arch/x86/mm.c xen/arch/x86/mm/mem_sharing.c > description: > x86/mm: Code style fixes in mem_sharing.c > > No functional changes, only code style issues. > > One small diff in mem_sharing_gref_to_gfn() looks like a logic change, > but it''s not. The flow was confusing, so it''s been clarified. > > Signed-off-by: Andres Lagar-Cavilla<andres@lagarcavilla.org> > Signed-off-by: Adin Scannell<adin@scannell.ca> > Acked-by: Tim Deegan<tim@xen.org> > Committed-by: Tim Deegan<tim@xen.org> > > > changeset: 24486:f04dfb11dd61 > user: Andres Lagar-Cavilla<andres@lagarcavilla.org> > date: Thu Jan 12 10:52:30 2012 +0000 > files: xen/arch/x86/mm/p2m.c > description: > x86/mm: Disable paging_prep > > The only way to page-in a page is now the safe paging_load domctl. > (Unless the page was never paged out in the first place) > > Signed-off-by: Andres Lagar-Cavilla<andres@lagarcavilla.org> > Acked-by: Tim Deegan<tim@xen.org> > Committed-by: Tim Deegan<tim@xen.org> > > > changeset: 24485:75b8e982eb7e > user: Andres Lagar-Cavilla<andres@lagarcavilla.org> > date: Thu Jan 12 10:52:30 2012 +0000 > files: xen/arch/x86/mm/p2m.c > description: > x86/mm: Allow a page in p2m_ram_paged_out state to be loaded > > This removes the need for a page to be accessed in order to be pageable > again. A pager can now page-in pages at will with no need to map them > in a separate thread. > > Signed-off-by: Andres Lagar-Cavilla<andres@lagarcavilla.org> > Acked-by: Tim Deegan<tim@xen.org> > Committed-by: Tim Deegan<tim@xen.org> > > >