xen.org
2013-Jan-15  04:44 UTC
[xen-unstable bisection] complete test-amd64-i386-xl-win-vcpus1
branch xen-unstable
xen branch xen-unstable
job test-amd64-i386-xl-win-vcpus1
test guest-saverestore
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
*** Found and reproduced problem changeset ***
  Bug is in tree:  xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
  Bug introduced:  ba386fd2bf17
  Bug not present: bf1e34d66558
  changeset:   26350:ba386fd2bf17
  user:        Daniel De Graaf <dgdegra@tycho.nsa.gov>
  date:        Fri Jan 11 10:07:19 2013 +0000
      
      xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
      
      The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
      around an IS_PRIV_FOR check for the current domain. This is now
      redundant with XSM hooks, so replace these calls with
      rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
      the duplicate permission checks.
      
      When XSM_ENABLE is not defined or when the dummy XSM module is used,
      this patch should not change any functionality. Because the locations
      of privilege checks have sometimes moved below argument validation,
      error returns of some functions may change from EPERM to EINVAL when
      called with invalid arguments and from a domain without permission to
      perform the operation.
      
      Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
      Acked-by: Jan Beulich <jbeulich@suse.com>
      Committed-by: Keir Fraser <keir@xen.org>
      
      
For bisection revision-tuple graph see:
  
http://www.chiark.greenend.org.uk/~xensrcts/results/bisect.xen-unstable.test-amd64-i386-xl-win-vcpus1.guest-saverestore.html
Revision IDs in each graph node refer, respectively, to the Trees above.
----------------------------------------
Searching for failure / basis pass:
 15037 fail [host=earwig] / 14856 ok.
Failure / basis pass flights: 15037 / 14856
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
Latest a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 f6a81b41ad71
Basis pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
Generating revisions with ./adhoc-revtuple-generator 
git://xenbits.xen.org/linux-pvops.git#a938a246d34912423c560f475ccf1ce0c71d9d00-a938a246d34912423c560f475ccf1ce0c71d9d00
git://xenbits.xen.org/staging/qemu-xen-unstable.git#6a0cf3786f1964fdf5a17f88f26cb499f4e89c81-6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
git://xenbits.xen.org/staging/qemu-upstream-unstable.git#3752993df8af5cffa1b8219fe175d235597b4474-3752993df8af5cffa1b8219fe175d235597b4474
http://xenbits.xen.org/hg/staging/xen-unstable.hg#35a0556a7f76-f6a81b41ad71
pulling from ssh://xen@xenbits.xen.org/HG/staging/xen-unstable.hg
searching for changes
no changes found
pulling from ssh://xen@xenbits.xen.org/HG/staging/xen-unstable.hg
searching for changes
no changes found
Loaded 118 nodes in revision graph
Searching for test results:
 14855 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
 14856 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
 14857 []
 14869 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 32758c974bf8
 14884 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14877 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14898 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14891 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14909 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14916 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14932 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
 14946 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
 14939 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
 15041 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
 15040 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
 15042 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 0bc879ecb8b3
 15043 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 f59daf171886
 15048 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
 15037 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 f6a81b41ad71
 15045 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 fd939d1a9b30
 15047 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 f6a81b41ad71
 15049 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
 15050 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
 15051 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
 15053 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
 15054 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
Searching for interesting versions
 Result found: flight 14855 (pass), for basis pass
 Result found: flight 15037 (fail), for basis failure
 Repro found: flight 15040 (pass), for basis pass
 Repro found: flight 15047 (fail), for basis failure
 0 revisions at a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
No revisions left to test, checking graph state.
 Result found: flight 15048 (pass), for last pass
 Result found: flight 15049 (fail), for first failure
 Repro found: flight 15050 (pass), for last pass
 Repro found: flight 15051 (fail), for first failure
 Repro found: flight 15053 (pass), for last pass
 Repro found: flight 15054 (fail), for first failure
*** Found and reproduced problem changeset ***
  Bug is in tree:  xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
  Bug introduced:  ba386fd2bf17
  Bug not present: bf1e34d66558
pulling from ssh://xen@xenbits.xen.org/HG/staging/xen-unstable.hg
searching for changes
no changes found
  changeset:   26350:ba386fd2bf17
  user:        Daniel De Graaf <dgdegra@tycho.nsa.gov>
  date:        Fri Jan 11 10:07:19 2013 +0000
      
      xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
      
      The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
      around an IS_PRIV_FOR check for the current domain. This is now
      redundant with XSM hooks, so replace these calls with
      rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
      the duplicate permission checks.
      
      When XSM_ENABLE is not defined or when the dummy XSM module is used,
      this patch should not change any functionality. Because the locations
      of privilege checks have sometimes moved below argument validation,
      error returns of some functions may change from EPERM to EINVAL when
      called with invalid arguments and from a domain without permission to
      perform the operation.
      
      Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
      Acked-by: Jan Beulich <jbeulich@suse.com>
      Committed-by: Keir Fraser <keir@xen.org>
      
      
Revision graph left in
/home/xc_osstest/results/bisect.xen-unstable.test-amd64-i386-xl-win-vcpus1.guest-saverestore.{dot,ps,png,html}.
----------------------------------------
15054: tolerable ALL FAIL
flight 15054 xen-unstable real-bisect [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/15054/
Failures :-/ but no regressions.
Tests which did not succeed,
including tests which could not be run:
 test-amd64-i386-xl-win-vcpus1  8 guest-saverestore      fail baseline untested
jobs:
 test-amd64-i386-xl-win-vcpus1                                fail    
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Ian Campbell
2013-Jan-15  09:55 UTC
Re: [xen-unstable bisection] complete test-amd64-i386-xl-win-vcpus1
Adding Daniel & Jan.
Looking at the most recently failed flight
http://www.chiark.greenend.org.uk/~xensrcts/logs/15046/test-amd64-i386-xl-win-vcpus1/info.html
we have
http://www.chiark.greenend.org.uk/~xensrcts/logs/15046/test-amd64-i386-xl-win-vcpus1/8.ts-guest-saverestore.log
which contains:
        Loading new save file image (new xl fmt info 0x0/0x0/620)
         Savefile contains xl domain config
        WARNING: ignoring "kernel" directive for HVM guest. Use
"firmware_override" instead if you really want a non-default firmware
        xc: error: panic: xc_dom_boot.c:410: xc_dom_gnttab_hvm_seed: failed to
remove gnttab from physmap [errno=2]
        : Internal error
        xc: error: error seeding grant table: Internal error
        libxl: error: libxl_create.c:787:libxl__xc_domain_restore_done:
restoring domain: Resource temporarily unavailable
        libxl: error: libxl_create.c:869:domcreate_rebuild_done: cannot
(re-)build domain: -3
        libxl: error: libxl.c:1377:libxl__destroy_domid: non-existant domain 5
        libxl: error: libxl.c:1341:domain_destroy_callback: unable to destroy
guest with domid 5
        libxl: error: libxl_create.c:1175:domcreate_destruction_cb: unable to
destroy domain 5 following failed creation
        Parsing config from /etc/xen/win.guest.osstest.cfg
Which is the same as the bisection result here
http://www.chiark.greenend.org.uk/~xensrcts/logs/15054/test-amd64-i386-xl-win-vcpus1/8.ts-guest-saverestore.log
I''ve eye balled 26350:ba386fd2bf17, especially the bits about the
phsymap hypercalls and I can''t see anything obvious.
Ian.
On Tue, 2013-01-15 at 04:44 +0000, xen.org wrote:> branch xen-unstable
> xen branch xen-unstable
> job test-amd64-i386-xl-win-vcpus1
> test guest-saverestore
> 
> Tree: linux git://xenbits.xen.org/linux-pvops.git
> Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
> Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
> Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
> 
> *** Found and reproduced problem changeset ***
> 
>   Bug is in tree:  xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
>   Bug introduced:  ba386fd2bf17
>   Bug not present: bf1e34d66558
> 
> 
>   changeset:   26350:ba386fd2bf17
>   user:        Daniel De Graaf <dgdegra@tycho.nsa.gov>
>   date:        Fri Jan 11 10:07:19 2013 +0000
> 
>       xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
> 
>       The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
>       around an IS_PRIV_FOR check for the current domain. This is now
>       redundant with XSM hooks, so replace these calls with
>       rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
>       the duplicate permission checks.
> 
>       When XSM_ENABLE is not defined or when the dummy XSM module is used,
>       this patch should not change any functionality. Because the locations
>       of privilege checks have sometimes moved below argument validation,
>       error returns of some functions may change from EPERM to EINVAL when
>       called with invalid arguments and from a domain without permission to
>       perform the operation.
> 
>       Signed-off-by:  Jan Beulich <jbeulich@suse.com> Jan Beulich
<jbeulich@suse.com> Jan Beulich <jbeulich@suse.com>
>       Acked-by: Jan Beulich <jbeulich@suse.com>
>       Committed-by: Keir Fraser <keir@xen.org>
> 
> 
> 
> 
> For bisection revision-tuple graph see:
>   
http://www.chiark.greenend.org.uk/~xensrcts/results/bisect.xen-unstable.test-amd64-i386-xl-win-vcpus1.guest-saverestore.html
> Revision IDs in each graph node refer, respectively, to the Trees above.
> 
> ----------------------------------------
> Searching for failure / basis pass:
>  15037 fail [host=earwig] / 14856 ok.
> Failure / basis pass flights: 15037 / 14856
> Tree: linux git://xenbits.xen.org/linux-pvops.git
> Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
> Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
> Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
> Latest a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 f6a81b41ad71
> Basis pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
> Generating revisions with ./adhoc-revtuple-generator 
git://xenbits.xen.org/linux-pvops.git#a938a246d34912423c560f475ccf1ce0c71d9d00-a938a246d34912423c560f475ccf1ce0c71d9d00
git://xenbits.xen.org/staging/qemu-xen-unstable.git#6a0cf3786f1964fdf5a17f88f26cb499f4e89c81-6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
git://xenbits.xen.org/staging/qemu-upstream-unstable.git#3752993df8af5cffa1b8219fe175d235597b4474-3752993df8af5cffa1b8219fe175d235597b4474
http://xenbits.xen.org/hg/staging/xen-unstable.hg#35a0556a7f76-f6a81b41ad71
> pulling from ssh://xen@xenbits.xen.org/HG/staging/xen-unstable.hg
> searching for changes
> no changes found
> pulling from ssh://xen@xenbits.xen.org/HG/staging/xen-unstable.hg
> searching for changes
> no changes found
> Loaded 118 nodes in revision graph
> Searching for test results:
>  14855 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
>  14856 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
>  14857 []
>  14869 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 32758c974bf8
>  14884 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14877 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14898 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14891 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14909 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14916 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14932 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
>  14946 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
>  14939 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
>  15041 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
>  15040 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
>  15042 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 0bc879ecb8b3
>  15043 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 f59daf171886
>  15048 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
>  15037 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 f6a81b41ad71
>  15045 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 fd939d1a9b30
>  15047 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 f6a81b41ad71
>  15049 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
>  15050 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
>  15051 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
>  15053 pass a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
>  15054 fail a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
> Searching for interesting versions
>  Result found: flight 14855 (pass), for basis pass
>  Result found: flight 15037 (fail), for basis failure
>  Repro found: flight 15040 (pass), for basis pass
>  Repro found: flight 15047 (fail), for basis failure
>  0 revisions at a938a246d34912423c560f475ccf1ce0c71d9d00
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
> No revisions left to test, checking graph state.
>  Result found: flight 15048 (pass), for last pass
>  Result found: flight 15049 (fail), for first failure
>  Repro found: flight 15050 (pass), for last pass
>  Repro found: flight 15051 (fail), for first failure
>  Repro found: flight 15053 (pass), for last pass
>  Repro found: flight 15054 (fail), for first failure
> 
> *** Found and reproduced problem changeset ***
> 
>   Bug is in tree:  xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
>   Bug introduced:  ba386fd2bf17
>   Bug not present: bf1e34d66558
> 
> pulling from ssh://xen@xenbits.xen.org/HG/staging/xen-unstable.hg
> searching for changes
> no changes found
> 
>   changeset:   26350:ba386fd2bf17
>   user:        Daniel De Graaf <dgdegra@tycho.nsa.gov>
>   date:        Fri Jan 11 10:07:19 2013 +0000
> 
>       xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
> 
>       The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
>       around an IS_PRIV_FOR check for the current domain. This is now
>       redundant with XSM hooks, so replace these calls with
>       rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
>       the duplicate permission checks.
> 
>       When XSM_ENABLE is not defined or when the dummy XSM module is used,
>       this patch should not change any functionality. Because the locations
>       of privilege checks have sometimes moved below argument validation,
>       error returns of some functions may change from EPERM to EINVAL when
>       called with invalid arguments and from a domain without permission to
>       perform the operation.
> 
>       Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
>       Acked-by: Jan Beulich <jbeulich@suse.com>
>       Committed-by: Keir Fraser <keir@xen.org>
> 
> 
> 
> Revision graph left in
/home/xc_osstest/results/bisect.xen-unstable.test-amd64-i386-xl-win-vcpus1.guest-saverestore.{dot,ps,png,html}.
> ----------------------------------------
> 15054: tolerable ALL FAIL
> 
> flight 15054 xen-unstable real-bisect [real]
> http://www.chiark.greenend.org.uk/~xensrcts/logs/15054/
> 
> Failures :-/ but no regressions.
> 
> Tests which did not succeed,
> including tests which could not be run:
>  test-amd64-i386-xl-win-vcpus1  8 guest-saverestore      fail baseline
untested
> 
> 
> jobs:
>  test-amd64-i386-xl-win-vcpus1                                fail
> 
> 
> ------------------------------------------------------------
> sg-report-flight on woking.cam.xci-test.com
> logs: /home/xc_osstest/logs
> images: /home/xc_osstest/images
> 
> Logs, config files, etc. are available at
>     http://www.chiark.greenend.org.uk/~xensrcts/logs
> 
> Test harness code can be found at
>     http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
> 
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
Jan Beulich
2013-Jan-15  13:49 UTC
Re: [xen-unstable bisection] complete test-amd64-i386-xl-win-vcpus1
>>> On 15.01.13 at 10:55, Ian Campbell <Ian.Campbell@citrix.com> wrote: > Adding Daniel & Jan. > > Looking at the most recently failed flight > http://www.chiark.greenend.org.uk/~xensrcts/logs/15046/test-amd64-i386-xl-wi > n-vcpus1/info.html > we have > http://www.chiark.greenend.org.uk/~xensrcts/logs/15046/test-amd64-i386-xl-wi > n-vcpus1/8.ts-guest-saverestore.log which contains: > Loading new save file image (new xl fmt info 0x0/0x0/620) > Savefile contains xl domain config > WARNING: ignoring "kernel" directive for HVM guest. Use > "firmware_override" instead if you really want a non-default firmware > xc: error: panic: xc_dom_boot.c:410: xc_dom_gnttab_hvm_seed: failed > to remove gnttab from physmap [errno=2] > : Internal error > xc: error: error seeding grant table: Internal error > libxl: error: libxl_create.c:787:libxl__xc_domain_restore_done: > restoring domain: Resource temporarily unavailable > libxl: error: libxl_create.c:869:domcreate_rebuild_done: cannot > (re-)build domain: -3 > libxl: error: libxl.c:1377:libxl__destroy_domid: non-existant domain > 5 > libxl: error: libxl.c:1341:domain_destroy_callback: unable to > destroy guest with domid 5 > libxl: error: libxl_create.c:1175:domcreate_destruction_cb: unable > to destroy domain 5 following failed creation > Parsing config from /etc/xen/win.guest.osstest.cfg > > Which is the same as the bisection result here > http://www.chiark.greenend.org.uk/~xensrcts/logs/15054/test-amd64-i386-xl-wi > n-vcpus1/8.ts-guest-saverestore.log > > I''ve eye balled 26350:ba386fd2bf17, especially the bits about the > phsymap hypercalls and I can''t see anything obvious.Case XENMEM_remove_from_physmap in do_memory_op() no longer initializes "rc". I''m surprised there''s no compiler warning because of that (which would have failed the build). I''ll send a patch in a minute. Jan
Ian Campbell
2013-Jan-15  13:55 UTC
Re: [xen-unstable bisection] complete test-amd64-i386-xl-win-vcpus1
On Tue, 2013-01-15 at 13:49 +0000, Jan Beulich wrote:> Case XENMEM_remove_from_physmap in do_memory_op() no > longer initializes "rc".Well spotted. It''s the same in the compat case from the looks of things.> I''m surprised there''s no compiler warning > because of that (which would have failed the build).It''s quite a large function with a switch in it, perhaps there are too many paths to follow, especially in the compat case where the whole thing has a while loop round it too.> I''ll send a patch in a minute.Thanks! Ian.
Jan Beulich
2013-Jan-15  14:04 UTC
Re: [xen-unstable bisection] complete test-amd64-i386-xl-win-vcpus1
>>> On 15.01.13 at 14:55, Ian Campbell <Ian.Campbell@citrix.com> wrote: > On Tue, 2013-01-15 at 13:49 +0000, Jan Beulich wrote: >> Case XENMEM_remove_from_physmap in do_memory_op() no >> longer initializes "rc". > > Well spotted. It''s the same in the compat case from the looks of things.You mean in xen/common/compat/memory.c? If so - no, there the return value from the forwarded call to do_memory_op() get used. Jan
Ian Campbell
2013-Jan-15  14:30 UTC
Re: [xen-unstable bisection] complete test-amd64-i386-xl-win-vcpus1
On Tue, 2013-01-15 at 14:04 +0000, Jan Beulich wrote:> >>> On 15.01.13 at 14:55, Ian Campbell <Ian.Campbell@citrix.com> wrote: > > On Tue, 2013-01-15 at 13:49 +0000, Jan Beulich wrote: > >> Case XENMEM_remove_from_physmap in do_memory_op() no > >> longer initializes "rc". > > > > Well spotted. It''s the same in the compat case from the looks of things. > > You mean in xen/common/compat/memory.c? If so - no, there > the return value from the forwarded call to do_memory_op() > get used.I was confused and thought the block which translates the argument on entry included the actual functionality, which it clearly doesn''t. Sorry for the noise. Ian.