xen.org
2013-Jan-14 15:38 UTC
[xen-unstable bisection] complete test-amd64-i386-xend-winxpsp3
branch xen-unstable
xen branch xen-unstable
job test-amd64-i386-xend-winxpsp3
test windows-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
*** Found and reproduced problem changeset ***
Bug is in tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
Bug introduced: ba386fd2bf17
Bug not present: bf1e34d66558
changeset: 26350:ba386fd2bf17
user: Daniel De Graaf <dgdegra@tycho.nsa.gov>
date: Fri Jan 11 10:07:19 2013 +0000
xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
around an IS_PRIV_FOR check for the current domain. This is now
redundant with XSM hooks, so replace these calls with
rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
the duplicate permission checks.
When XSM_ENABLE is not defined or when the dummy XSM module is used,
this patch should not change any functionality. Because the locations
of privilege checks have sometimes moved below argument validation,
error returns of some functions may change from EPERM to EINVAL when
called with invalid arguments and from a domain without permission to
perform the operation.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Acked-by: Jan Beulich <jbeulich@suse.com>
Committed-by: Keir Fraser <keir@xen.org>
For bisection revision-tuple graph see:
http://www.chiark.greenend.org.uk/~xensrcts/results/bisect.xen-unstable.test-amd64-i386-xend-winxpsp3.windows-install.html
Revision IDs in each graph node refer, respectively, to the Trees above.
----------------------------------------
Searching for failure / basis pass:
14946 fail [host=bush-cricket] / 14856 ok.
Failure / basis pass flights: 14946 / 14856
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
Latest a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
Basis pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
Generating revisions with ./adhoc-revtuple-generator
git://xenbits.xen.org/linux-pvops.git#a938a246d34912423c560f475ccf1ce0c71d9d00-a938a246d34912423c560f475ccf1ce0c71d9d00
git://xenbits.xen.org/staging/qemu-xen-unstable.git#6a0cf3786f1964fdf5a17f88f26cb499f4e89c81-6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
git://xenbits.xen.org/staging/qemu-upstream-unstable.git#3752993df8af5cffa1b8219fe175d235597b4474-3752993df8af5cffa1b8219fe175d235597b4474
http://xenbits.xen.org/hg/staging/xen-unstable.hg#35a0556a7f76-5db9c4e12fbf
pulling from ssh://xen@xenbits.xen.org/HG/staging/xen-unstable.hg
searching for changes
no changes found
pulling from ssh://xen@xenbits.xen.org/HG/staging/xen-unstable.hg
searching for changes
no changes found
Loaded 116 nodes in revision graph
Searching for test results:
14855 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
14856 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
14857 []
14869 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 32758c974bf8
14884 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
14877 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
14898 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
14891 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
14909 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
14916 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
14932 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
14940 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
14941 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
14942 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 0bc879ecb8b3
14943 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 f59daf171886
14944 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 fd939d1a9b30
14946 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
14939 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
14945 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
14947 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
14948 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
15038 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
15036 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
15039 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
Searching for interesting versions
Result found: flight 14855 (pass), for basis pass
Result found: flight 14932 (fail), for basis failure
Repro found: flight 14940 (pass), for basis pass
Repro found: flight 14941 (fail), for basis failure
0 revisions at a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
No revisions left to test, checking graph state.
Result found: flight 14945 (pass), for last pass
Result found: flight 14947 (fail), for first failure
Repro found: flight 14948 (pass), for last pass
Repro found: flight 15036 (fail), for first failure
Repro found: flight 15038 (pass), for last pass
Repro found: flight 15039 (fail), for first failure
*** Found and reproduced problem changeset ***
Bug is in tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
Bug introduced: ba386fd2bf17
Bug not present: bf1e34d66558
pulling from ssh://xen@xenbits.xen.org/HG/staging/xen-unstable.hg
searching for changes
no changes found
changeset: 26350:ba386fd2bf17
user: Daniel De Graaf <dgdegra@tycho.nsa.gov>
date: Fri Jan 11 10:07:19 2013 +0000
xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
around an IS_PRIV_FOR check for the current domain. This is now
redundant with XSM hooks, so replace these calls with
rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
the duplicate permission checks.
When XSM_ENABLE is not defined or when the dummy XSM module is used,
this patch should not change any functionality. Because the locations
of privilege checks have sometimes moved below argument validation,
error returns of some functions may change from EPERM to EINVAL when
called with invalid arguments and from a domain without permission to
perform the operation.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Acked-by: Jan Beulich <jbeulich@suse.com>
Committed-by: Keir Fraser <keir@xen.org>
Revision graph left in
/home/xc_osstest/results/bisect.xen-unstable.test-amd64-i386-xend-winxpsp3.windows-install.{dot,ps,png,html}.
----------------------------------------
15039: tolerable ALL FAIL
flight 15039 xen-unstable real-bisect [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/15039/
Failures :-/ but no regressions.
Tests which did not succeed,
including tests which could not be run:
test-amd64-i386-xend-winxpsp3 7 windows-install fail baseline untested
jobs:
test-amd64-i386-xend-winxpsp3 fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary