flight 10867 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/10867/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs. 10649
test-amd64-i386-rhel6hvm-amd 7 redhat-install fail REGR. vs. 10649
test-amd64-i386-xend-winxpsp3 7 windows-install fail REGR. vs. 10649
test-amd64-amd64-xl-winxpsp3 7 windows-install fail REGR. vs. 10649
test-amd64-i386-xl-winxpsp3-vcpus1 7 windows-install fail REGR. vs. 10649
test-amd64-amd64-win 7 windows-install fail REGR. vs. 10649
test-amd64-amd64-xl-win 7 windows-install fail REGR. vs. 10649
test-i386-i386-xl-win 7 windows-install fail REGR. vs. 10649
test-amd64-i386-xl-win-vcpus1 7 windows-install fail REGR. vs. 10649
test-amd64-i386-win-vcpus1 7 windows-install fail REGR. vs. 10649
test-amd64-i386-win 7 windows-install fail REGR. vs. 10649
test-i386-i386-win 7 windows-install fail REGR. vs. 10649
test-i386-i386-xl-winxpsp3 7 windows-install fail REGR. vs. 10649
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass
version targeted for testing:
xen 15ab61865ecb
baseline version:
xen 5b2676ac1321
------------------------------------------------------------
People who touched revisions under test:
Adin Scannell <adin@scannell.ca>
Andres Lagar-Cavilla <andres@lagarcavilla.org>
Christoph Egger <Christoph.Egger@amd.com>
Daniel De Graaf <dgdegra@tycho.nsa.gov>
Dario Faggioli <dario.faggioli@citrix.com>
Gang Wei <gang.wei@intel.com>
George Dunlap <george.dunlap@eu.citrix.com>
Hui Lv <hui.lv@intel.com>
Ian Campbell <ian.campbell@citrix.com>
Ian Jackson <ian.jackson.citrix.com>
Ian Jackson <ian.jackson@eu.citrix.com>
Jan Beulich <jbeulich@suse.com>
Joseph Cihula <joseph.cihula@intel.com>
Keir Fraser <keir@xen.org>
Olaf Hering <olaf@aepfle.de>
Paul Durrant <paul.durrant@citrix.com>
Roger Pau Monne <roger.pau@entel.upc.edu>
Shane Wang <shane.wang@intel.com>
Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Tim Deegan <tim@xen.org>
Wei Wang <wei.wang2@amd.com>
Wei, Gang <gang.wei@intel.com>
------------------------------------------------------------
jobs:
build-amd64 pass
build-i386 pass
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl pass
test-amd64-i386-xl pass
test-i386-i386-xl pass
test-amd64-i386-rhel6hvm-amd fail
test-amd64-amd64-xl-win7-amd64 fail
test-amd64-i386-xl-win7-amd64 fail
test-amd64-i386-xl-credit2 pass
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel fail
test-amd64-i386-xl-multivcpu pass
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-i386-i386-pair pass
test-amd64-amd64-xl-sedf-pin pass
test-amd64-amd64-pv pass
test-amd64-i386-pv pass
test-i386-i386-pv pass
test-amd64-amd64-xl-sedf pass
test-amd64-i386-win-vcpus1 fail
test-amd64-i386-xl-win-vcpus1 fail
test-amd64-i386-xl-winxpsp3-vcpus1 fail
test-amd64-amd64-win fail
test-amd64-i386-win fail
test-i386-i386-win fail
test-amd64-amd64-xl-win fail
test-i386-i386-xl-win fail
test-amd64-i386-xend-winxpsp3 fail
test-amd64-amd64-xl-winxpsp3 fail
test-i386-i386-xl-winxpsp3 fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
(No revision log; it would be 870 lines long.)
Ian Jackson
2012-Jan-18 14:06 UTC
Heads-up re Re: [xen-unstable test] 10867: regressions - FAIL
xen.org writes ("[xen-unstable test] 10867: regressions -
FAIL"):> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs.
10649
My bisector is working on this and so far it seems to have narrowed it
down to: 75b8e982eb7e is good; 6c104b46ef89 is bad.
That means that one these commits has probably broken HVM:
amd iommu: Add iommu emulation for hvm guest
amd iommu: Introduces new helper functions to simplify bitwise operations
amd iommu: Refactoring iommu ring buffer definition
move declarations of some required per-arch functions into common headers
ia64: fix build (once again)
x86/mm: Code style fixes in mem_sharing.c
x86/mm: Disable paging_prep
The bisector is currently testing e71bd3. Full revision log below.
Ian.
changeset: 24492:6c104b46ef89
user: Wei Wang <wei.wang2@amd.com>
date: Thu Jan 12 13:50:50 2012 +0100
files: xen/arch/x86/hvm/intercept.c xen/drivers/passthrough/amd/Makefile
xen/drivers/passthrough/amd/iommu_cmd.c
xen/drivers/passthrough/amd/iommu_guest.c
xen/drivers/passthrough/amd/iommu_map.c
xen/drivers/passthrough/amd/pci_amd_iommu.c xen/include/asm-x86/amd-iommu.h
xen/include/asm-x86/hvm/io.h xen/include/asm-x86/hvm/svm/amd-iommu-defs.h
xen/include/asm-x86/hvm/svm/amd-iommu-proto.h xen/include/xen/hvm/iommu.h
description:
amd iommu: Add iommu emulation for hvm guest
ATS device driver that support PASID [1] and PRI [2] capabilites needs
to work with iommu driver in guest OS. We have to expose iommu
functionality to HVM guest, if we want assign ATS device to it. A new
hypervisor mmio handler is added to intercept iommu mmio accesses from
guest.
Signed-off-by: Wei Wang <wei.wang2@amd.com>
[1]
http://www.pcisig.com/specifications/pciexpress/specifications/ECN-PASID-ATS-2011-03-31.pdf
[2]
http://www.pcisig.com/members/downloads/specifications/iov/ats_r1.1_26Jan09.pdf
Committed-by: Jan Beulich <jbeulich@suse.com>
changeset: 24491:522d544f4031
user: Wei Wang <wei.wang2@amd.com>
date: Thu Jan 12 13:49:34 2012 +0100
files: xen/drivers/passthrough/amd/iommu_cmd.c
xen/drivers/passthrough/amd/iommu_init.c
xen/include/asm-x86/hvm/svm/amd-iommu-defs.h
xen/include/asm-x86/hvm/svm/amd-iommu-proto.h
description:
amd iommu: Introduces new helper functions to simplify bitwise operations
Signed-off-by: Wei Wang <wei.wang2@amd.com>
Committed-by: Jan Beulich <jbeulich@suse.com>
changeset: 24490:d59816959ac0
user: Wei Wang <wei.wang2@amd.com>
date: Thu Jan 12 13:48:57 2012 +0100
files: xen/drivers/passthrough/amd/iommu_cmd.c
xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/amd-iommu.h
description:
amd iommu: Refactoring iommu ring buffer definition
Introduce struct ring_buffer to represent iommu cmd buffer, event log and ppr
log
Signed-off-by: Wei Wang <wei.wang2@amd.com>
Committed-by: Jan Beulich <jbeulich@suse.com>
changeset: 24489:8d2fa20dd3f3
user: Jan Beulich <jbeulich@suse.com>
date: Thu Jan 12 13:45:47 2012 +0100
files: xen/arch/ia64/xen/dom0_ops.c xen/arch/ia64/xen/domain.c
xen/arch/ia64/xen/xensetup.c xen/arch/x86/domain.c xen/arch/x86/x86_64/domain.c
xen/common/kernel.c xen/include/asm-ia64/hypercall.h
xen/include/asm-x86/hypercall.h xen/include/asm-x86/setup.h
xen/include/xen/hypercall.h
description:
move declarations of some required per-arch functions into common headers
... since it is pointless to have each arch declare them on their own
(and now and the - see ia64 - forget to do so).
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
changeset: 24488:e71bd3a75f07
user: Jan Beulich <jbeulich@suse.com>
date: Thu Jan 12 13:44:51 2012 +0100
files: xen/arch/ia64/xen/mm.c xen/include/asm-ia64/kexec.h
description:
ia64: fix build (once again)
24423:069c08b7de46 failed to add a necessary include, and for a long
time kexec.h suffered from a missing structure forward declaration.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
changeset: 24487:32dd444700bd
user: Andres Lagar-Cavilla <andres@lagarcavilla.org>
date: Thu Jan 12 11:02:18 2012 +0000
files: xen/arch/x86/mm.c xen/arch/x86/mm/mem_sharing.c
description:
x86/mm: Code style fixes in mem_sharing.c
No functional changes, only code style issues.
One small diff in mem_sharing_gref_to_gfn() looks like a logic change,
but it''s not. The flow was confusing, so it''s been clarified.
Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org>
Signed-off-by: Adin Scannell <adin@scannell.ca>
Acked-by: Tim Deegan <tim@xen.org>
Committed-by: Tim Deegan <tim@xen.org>
changeset: 24486:f04dfb11dd61
user: Andres Lagar-Cavilla <andres@lagarcavilla.org>
date: Thu Jan 12 10:52:30 2012 +0000
files: xen/arch/x86/mm/p2m.c
description:
x86/mm: Disable paging_prep
The only way to page-in a page is now the safe paging_load domctl.
(Unless the page was never paged out in the first place)
Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org>
Acked-by: Tim Deegan <tim@xen.org>
Committed-by: Tim Deegan <tim@xen.org>
changeset: 24485:75b8e982eb7e
user: Andres Lagar-Cavilla <andres@lagarcavilla.org>
date: Thu Jan 12 10:52:30 2012 +0000
files: xen/arch/x86/mm/p2m.c
description:
x86/mm: Allow a page in p2m_ram_paged_out state to be loaded
This removes the need for a page to be accessed in order to be pageable
again. A pager can now page-in pages at will with no need to map them
in a separate thread.
Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org>
Acked-by: Tim Deegan <tim@xen.org>
Committed-by: Tim Deegan <tim@xen.org>
Wei Wang
2012-Jan-23 15:30 UTC
Re: Heads-up re Re: [xen-unstable test] 10867: regressions - FAIL
Am 18.01.2012 15:06, schrieb Ian Jackson:> xen.org writes ("[xen-unstable test] 10867: regressions - FAIL"): >> Tests which did not succeed and are blocking, >> including tests which could not be run: >> test-amd64-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs. 10649 > > My bisector is working on this and so far it seems to have narrowed it > down to: 75b8e982eb7e is good; 6c104b46ef89 is bad.Hi Ian, What symptoms have you seen when windows install failed? I tested windows xpsp3 installation manually with tip. The first stage of installation seem to pass but I got BSOD when guest tries to reboot for the first time. I traced back to c/s 24465 and saw the same result. I also tried c/s 24300 blindly and this c/s seemed to work for me. But I got a lot of compilation error between 24465 and 24300, so could not bisect further. Maybe we are not talking the issue here... But actually, the 2nd patch of my v4 patch queue will introduce a flag to disable all iommuv2 emulation codes from being running on old or non-iommu systems. This will help to isolate iommuv2 part from the rest parts of Xen. This patch was originally on top of the new hypercalls. But maybe I could drop a new patch to let this patch applicable on tip? Thanks, Wei> That means that one these commits has probably broken HVM: > amd iommu: Add iommu emulation for hvm guest > amd iommu: Introduces new helper functions to simplify bitwise operations > amd iommu: Refactoring iommu ring buffer definition > move declarations of some required per-arch functions into common headers > ia64: fix build (once again) > x86/mm: Code style fixes in mem_sharing.c > x86/mm: Disable paging_prep > > The bisector is currently testing e71bd3. Full revision log below. > > Ian. > > > changeset: 24492:6c104b46ef89 > user: Wei Wang<wei.wang2@amd.com> > date: Thu Jan 12 13:50:50 2012 +0100 > files: xen/arch/x86/hvm/intercept.c xen/drivers/passthrough/amd/Makefile xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_guest.c xen/drivers/passthrough/amd/iommu_map.c xen/drivers/passthrough/amd/pci_amd_iommu.c xen/include/asm-x86/amd-iommu.h xen/include/asm-x86/hvm/io.h xen/include/asm-x86/hvm/svm/amd-iommu-defs.h xen/include/asm-x86/hvm/svm/amd-iommu-proto.h xen/include/xen/hvm/iommu.h > description: > amd iommu: Add iommu emulation for hvm guest > > ATS device driver that support PASID [1] and PRI [2] capabilites needs > to work with iommu driver in guest OS. We have to expose iommu > functionality to HVM guest, if we want assign ATS device to it. A new > hypervisor mmio handler is added to intercept iommu mmio accesses from > guest. > > Signed-off-by: Wei Wang<wei.wang2@amd.com> > > [1] http://www.pcisig.com/specifications/pciexpress/specifications/ECN-PASID-ATS-2011-03-31.pdf > [2] http://www.pcisig.com/members/downloads/specifications/iov/ats_r1.1_26Jan09.pdf > Committed-by: Jan Beulich<jbeulich@suse.com> > > > changeset: 24491:522d544f4031 > user: Wei Wang<wei.wang2@amd.com> > date: Thu Jan 12 13:49:34 2012 +0100 > files: xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/hvm/svm/amd-iommu-defs.h xen/include/asm-x86/hvm/svm/amd-iommu-proto.h > description: > amd iommu: Introduces new helper functions to simplify bitwise operations > > Signed-off-by: Wei Wang<wei.wang2@amd.com> > Committed-by: Jan Beulich<jbeulich@suse.com> > > > changeset: 24490:d59816959ac0 > user: Wei Wang<wei.wang2@amd.com> > date: Thu Jan 12 13:48:57 2012 +0100 > files: xen/drivers/passthrough/amd/iommu_cmd.c xen/drivers/passthrough/amd/iommu_init.c xen/include/asm-x86/amd-iommu.h > description: > amd iommu: Refactoring iommu ring buffer definition > > Introduce struct ring_buffer to represent iommu cmd buffer, event log and ppr log > > Signed-off-by: Wei Wang<wei.wang2@amd.com> > Committed-by: Jan Beulich<jbeulich@suse.com> > > > changeset: 24489:8d2fa20dd3f3 > user: Jan Beulich<jbeulich@suse.com> > date: Thu Jan 12 13:45:47 2012 +0100 > files: xen/arch/ia64/xen/dom0_ops.c xen/arch/ia64/xen/domain.c xen/arch/ia64/xen/xensetup.c xen/arch/x86/domain.c xen/arch/x86/x86_64/domain.c xen/common/kernel.c xen/include/asm-ia64/hypercall.h xen/include/asm-x86/hypercall.h xen/include/asm-x86/setup.h xen/include/xen/hypercall.h > description: > move declarations of some required per-arch functions into common headers > > ... since it is pointless to have each arch declare them on their own > (and now and the - see ia64 - forget to do so). > > Signed-off-by: Jan Beulich<jbeulich@suse.com> > Acked-by: Keir Fraser<keir@xen.org> > > > changeset: 24488:e71bd3a75f07 > user: Jan Beulich<jbeulich@suse.com> > date: Thu Jan 12 13:44:51 2012 +0100 > files: xen/arch/ia64/xen/mm.c xen/include/asm-ia64/kexec.h > description: > ia64: fix build (once again) > > 24423:069c08b7de46 failed to add a necessary include, and for a long > time kexec.h suffered from a missing structure forward declaration. > > Signed-off-by: Jan Beulich<jbeulich@suse.com> > Acked-by: Keir Fraser<keir@xen.org> > > > changeset: 24487:32dd444700bd > user: Andres Lagar-Cavilla<andres@lagarcavilla.org> > date: Thu Jan 12 11:02:18 2012 +0000 > files: xen/arch/x86/mm.c xen/arch/x86/mm/mem_sharing.c > description: > x86/mm: Code style fixes in mem_sharing.c > > No functional changes, only code style issues. > > One small diff in mem_sharing_gref_to_gfn() looks like a logic change, > but it''s not. The flow was confusing, so it''s been clarified. > > Signed-off-by: Andres Lagar-Cavilla<andres@lagarcavilla.org> > Signed-off-by: Adin Scannell<adin@scannell.ca> > Acked-by: Tim Deegan<tim@xen.org> > Committed-by: Tim Deegan<tim@xen.org> > > > changeset: 24486:f04dfb11dd61 > user: Andres Lagar-Cavilla<andres@lagarcavilla.org> > date: Thu Jan 12 10:52:30 2012 +0000 > files: xen/arch/x86/mm/p2m.c > description: > x86/mm: Disable paging_prep > > The only way to page-in a page is now the safe paging_load domctl. > (Unless the page was never paged out in the first place) > > Signed-off-by: Andres Lagar-Cavilla<andres@lagarcavilla.org> > Acked-by: Tim Deegan<tim@xen.org> > Committed-by: Tim Deegan<tim@xen.org> > > > changeset: 24485:75b8e982eb7e > user: Andres Lagar-Cavilla<andres@lagarcavilla.org> > date: Thu Jan 12 10:52:30 2012 +0000 > files: xen/arch/x86/mm/p2m.c > description: > x86/mm: Allow a page in p2m_ram_paged_out state to be loaded > > This removes the need for a page to be accessed in order to be pageable > again. A pager can now page-in pages at will with no need to map them > in a separate thread. > > Signed-off-by: Andres Lagar-Cavilla<andres@lagarcavilla.org> > Acked-by: Tim Deegan<tim@xen.org> > Committed-by: Tim Deegan<tim@xen.org> > > >