[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable bisection] complete test-amd64-i386-xend-winxpsp3



branch xen-unstable
xen branch xen-unstable
job test-amd64-i386-xend-winxpsp3
test windows-install

Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
  Bug introduced:  ba386fd2bf17
  Bug not present: bf1e34d66558


  changeset:   26350:ba386fd2bf17
  user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  date:        Fri Jan 11 10:07:19 2013 +0000
      
      xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
      
      The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
      around an IS_PRIV_FOR check for the current domain. This is now
      redundant with XSM hooks, so replace these calls with
      rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
      the duplicate permission checks.
      
      When XSM_ENABLE is not defined or when the dummy XSM module is used,
      this patch should not change any functionality. Because the locations
      of privilege checks have sometimes moved below argument validation,
      error returns of some functions may change from EPERM to EINVAL when
      called with invalid arguments and from a domain without permission to
      perform the operation.
      
      Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
      Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
      Committed-by: Keir Fraser <keir@xxxxxxx>
      
      


For bisection revision-tuple graph see:
   
http://www.chiark.greenend.org.uk/~xensrcts/results/bisect.xen-unstable.test-amd64-i386-xend-winxpsp3.windows-install.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Searching for failure / basis pass:
 14946 fail [host=bush-cricket] / 14856 ok.
Failure / basis pass flights: 14946 / 14856
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
Latest a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
Basis pass a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
Generating revisions with ./adhoc-revtuple-generator  
git://xenbits.xen.org/linux-pvops.git#a938a246d34912423c560f475ccf1ce0c71d9d00-a938a246d34912423c560f475ccf1ce0c71d9d00
 
git://xenbits.xen.org/staging/qemu-xen-unstable.git#6a0cf3786f1964fdf5a17f88f26cb499f4e89c81-6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
 
git://xenbits.xen.org/staging/qemu-upstream-unstable.git#3752993df8af5cffa1b8219fe175d235597b4474-3752993df8af5cffa1b8219fe175d235597b4474
 http://xenbits.xen.org/hg/staging/xen-unstable.hg#35a0556a7f76-5db9c4e12fbf
pulling from ssh://xen@xxxxxxxxxxxxxxx/HG/staging/xen-unstable.hg
searching for changes
no changes found
pulling from ssh://xen@xxxxxxxxxxxxxxx/HG/staging/xen-unstable.hg
searching for changes
no changes found
Loaded 116 nodes in revision graph
Searching for test results:
 14855 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
 14856 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
 14857 []
 14869 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 32758c974bf8
 14884 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14877 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14898 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14891 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14909 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14916 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
 14932 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
 14940 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
 14941 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
 14942 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 0bc879ecb8b3
 14943 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 f59daf171886
 14944 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 fd939d1a9b30
 14946 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
 14939 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
 14945 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
 14947 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
 14948 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
 15038 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
 15036 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
 15039 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
Searching for interesting versions
 Result found: flight 14855 (pass), for basis pass
 Result found: flight 14932 (fail), for basis failure
 Repro found: flight 14940 (pass), for basis pass
 Repro found: flight 14941 (fail), for basis failure
 0 revisions at a938a246d34912423c560f475ccf1ce0c71d9d00 
6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
No revisions left to test, checking graph state.
 Result found: flight 14945 (pass), for last pass
 Result found: flight 14947 (fail), for first failure
 Repro found: flight 14948 (pass), for last pass
 Repro found: flight 15036 (fail), for first failure
 Repro found: flight 15038 (pass), for last pass
 Repro found: flight 15039 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
  Bug introduced:  ba386fd2bf17
  Bug not present: bf1e34d66558

pulling from ssh://xen@xxxxxxxxxxxxxxx/HG/staging/xen-unstable.hg
searching for changes
no changes found

  changeset:   26350:ba386fd2bf17
  user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  date:        Fri Jan 11 10:07:19 2013 +0000
      
      xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
      
      The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
      around an IS_PRIV_FOR check for the current domain. This is now
      redundant with XSM hooks, so replace these calls with
      rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
      the duplicate permission checks.
      
      When XSM_ENABLE is not defined or when the dummy XSM module is used,
      this patch should not change any functionality. Because the locations
      of privilege checks have sometimes moved below argument validation,
      error returns of some functions may change from EPERM to EINVAL when
      called with invalid arguments and from a domain without permission to
      perform the operation.
      
      Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
      Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
      Committed-by: Keir Fraser <keir@xxxxxxx>
      
      

Revision graph left in 
/home/xc_osstest/results/bisect.xen-unstable.test-amd64-i386-xend-winxpsp3.windows-install.{dot,ps,png,html}.
----------------------------------------
15039: tolerable ALL FAIL

flight 15039 xen-unstable real-bisect [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/15039/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 test-amd64-i386-xend-winxpsp3  7 windows-install        fail baseline untested


jobs:
 test-amd64-i386-xend-winxpsp3                                fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.