[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [xen-unstable bisection] complete test-amd64-i386-xl-win-vcpus1



Adding Daniel & Jan.

Looking at the most recently failed flight
http://www.chiark.greenend.org.uk/~xensrcts/logs/15046/test-amd64-i386-xl-win-vcpus1/info.html
we have
http://www.chiark.greenend.org.uk/~xensrcts/logs/15046/test-amd64-i386-xl-win-vcpus1/8.ts-guest-saverestore.log
 which contains:
        Loading new save file image (new xl fmt info 0x0/0x0/620)
         Savefile contains xl domain config
        WARNING: ignoring "kernel" directive for HVM guest. Use 
"firmware_override" instead if you really want a non-default firmware
        xc: error: panic: xc_dom_boot.c:410: xc_dom_gnttab_hvm_seed: failed to 
remove gnttab from physmap [errno=2]
        : Internal error
        xc: error: error seeding grant table: Internal error
        libxl: error: libxl_create.c:787:libxl__xc_domain_restore_done: 
restoring domain: Resource temporarily unavailable
        libxl: error: libxl_create.c:869:domcreate_rebuild_done: cannot 
(re-)build domain: -3
        libxl: error: libxl.c:1377:libxl__destroy_domid: non-existant domain 5
        libxl: error: libxl.c:1341:domain_destroy_callback: unable to destroy 
guest with domid 5
        libxl: error: libxl_create.c:1175:domcreate_destruction_cb: unable to 
destroy domain 5 following failed creation
        Parsing config from /etc/xen/win.guest.osstest.cfg

Which is the same as the bisection result here
http://www.chiark.greenend.org.uk/~xensrcts/logs/15054/test-amd64-i386-xl-win-vcpus1/8.ts-guest-saverestore.log

I've eye balled 26350:ba386fd2bf17, especially the bits about the
phsymap hypercalls and I can't see anything obvious.

Ian.

On Tue, 2013-01-15 at 04:44 +0000, xen.org wrote:
> branch xen-unstable
> xen branch xen-unstable
> job test-amd64-i386-xl-win-vcpus1
> test guest-saverestore
> 
> Tree: linux git://xenbits.xen.org/linux-pvops.git
> Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
> Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
> Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
> 
> *** Found and reproduced problem changeset ***
> 
>   Bug is in tree:  xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
>   Bug introduced:  ba386fd2bf17
>   Bug not present: bf1e34d66558
> 
> 
>   changeset:   26350:ba386fd2bf17
>   user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
>   date:        Fri Jan 11 10:07:19 2013 +0000
> 
>       xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
> 
>       The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
>       around an IS_PRIV_FOR check for the current domain. This is now
>       redundant with XSM hooks, so replace these calls with
>       rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
>       the duplicate permission checks.
> 
>       When XSM_ENABLE is not defined or when the dummy XSM module is used,
>       this patch should not change any functionality. Because the locations
>       of privilege checks have sometimes moved below argument validation,
>       error returns of some functions may change from EPERM to EINVAL when
>       called with invalid arguments and from a domain without permission to
>       perform the operation.
> 
>       Signed-off-by:  Jan Beulich <jbeulich@xxxxxxxx> Jan Beulich 
> <jbeulich@xxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx>
>       Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
>       Committed-by: Keir Fraser <keir@xxxxxxx>
> 
> 
> 
> 
> For bisection revision-tuple graph see:
>    
> http://www.chiark.greenend.org.uk/~xensrcts/results/bisect.xen-unstable.test-amd64-i386-xl-win-vcpus1.guest-saverestore.html
> Revision IDs in each graph node refer, respectively, to the Trees above.
> 
> ----------------------------------------
> Searching for failure / basis pass:
>  15037 fail [host=earwig] / 14856 ok.
> Failure / basis pass flights: 15037 / 14856
> Tree: linux git://xenbits.xen.org/linux-pvops.git
> Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
> Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
> Tree: xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
> Latest a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 f6a81b41ad71
> Basis pass a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
> Generating revisions with ./adhoc-revtuple-generator  
> git://xenbits.xen.org/linux-pvops.git#a938a246d34912423c560f475ccf1ce0c71d9d00-a938a246d34912423c560f475ccf1ce0c71d9d00
>  
> git://xenbits.xen.org/staging/qemu-xen-unstable.git#6a0cf3786f1964fdf5a17f88f26cb499f4e89c81-6a0cf3786f1964fdf5a17f88f26cb499f4e89c81
>  
> git://xenbits.xen.org/staging/qemu-upstream-unstable.git#3752993df8af5cffa1b8219fe175d235597b4474-3752993df8af5cffa1b8219fe175d235597b4474
>  http://xenbits.xen.org/hg/staging/xen-unstable.hg#35a0556a7f76-f6a81b41ad71
> pulling from ssh://xen@xxxxxxxxxxxxxxx/HG/staging/xen-unstable.hg
> searching for changes
> no changes found
> pulling from ssh://xen@xxxxxxxxxxxxxxx/HG/staging/xen-unstable.hg
> searching for changes
> no changes found
> Loaded 118 nodes in revision graph
> Searching for test results:
>  14855 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
>  14856 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
>  14857 []
>  14869 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 32758c974bf8
>  14884 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14877 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14898 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14891 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14909 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14916 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 1e2195cb4410
>  14932 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
>  14946 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
>  14939 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
>  15041 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 5db9c4e12fbf
>  15040 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 35a0556a7f76
>  15042 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 0bc879ecb8b3
>  15043 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 f59daf171886
>  15048 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
>  15037 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 f6a81b41ad71
>  15045 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 fd939d1a9b30
>  15047 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 f6a81b41ad71
>  15049 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
>  15050 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
>  15051 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
>  15053 pass a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
>  15054 fail a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 ba386fd2bf17
> Searching for interesting versions
>  Result found: flight 14855 (pass), for basis pass
>  Result found: flight 15037 (fail), for basis failure
>  Repro found: flight 15040 (pass), for basis pass
>  Repro found: flight 15047 (fail), for basis failure
>  0 revisions at a938a246d34912423c560f475ccf1ce0c71d9d00 
> 6a0cf3786f1964fdf5a17f88f26cb499f4e89c81 
> 3752993df8af5cffa1b8219fe175d235597b4474 bf1e34d66558
> No revisions left to test, checking graph state.
>  Result found: flight 15048 (pass), for last pass
>  Result found: flight 15049 (fail), for first failure
>  Repro found: flight 15050 (pass), for last pass
>  Repro found: flight 15051 (fail), for first failure
>  Repro found: flight 15053 (pass), for last pass
>  Repro found: flight 15054 (fail), for first failure
> 
> *** Found and reproduced problem changeset ***
> 
>   Bug is in tree:  xen http://xenbits.xen.org/hg/staging/xen-unstable.hg
>   Bug introduced:  ba386fd2bf17
>   Bug not present: bf1e34d66558
> 
> pulling from ssh://xen@xxxxxxxxxxxxxxx/HG/staging/xen-unstable.hg
> searching for changes
> no changes found
> 
>   changeset:   26350:ba386fd2bf17
>   user:        Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
>   date:        Fri Jan 11 10:07:19 2013 +0000
> 
>       xen: avoid calling rcu_lock_*target_domain when an XSM hook exists
> 
>       The rcu_lock_{,remote_}target_domain_by_id functions are wrappers
>       around an IS_PRIV_FOR check for the current domain. This is now
>       redundant with XSM hooks, so replace these calls with
>       rcu_lock_domain_by_any_id or rcu_lock_remote_domain_by_id to remove
>       the duplicate permission checks.
> 
>       When XSM_ENABLE is not defined or when the dummy XSM module is used,
>       this patch should not change any functionality. Because the locations
>       of privilege checks have sometimes moved below argument validation,
>       error returns of some functions may change from EPERM to EINVAL when
>       called with invalid arguments and from a domain without permission to
>       perform the operation.
> 
>       Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
>       Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
>       Committed-by: Keir Fraser <keir@xxxxxxx>
> 
> 
> 
> Revision graph left in 
> /home/xc_osstest/results/bisect.xen-unstable.test-amd64-i386-xl-win-vcpus1.guest-saverestore.{dot,ps,png,html}.
> ----------------------------------------
> 15054: tolerable ALL FAIL
> 
> flight 15054 xen-unstable real-bisect [real]
> http://www.chiark.greenend.org.uk/~xensrcts/logs/15054/
> 
> Failures :-/ but no regressions.
> 
> Tests which did not succeed,
> including tests which could not be run:
>  test-amd64-i386-xl-win-vcpus1  8 guest-saverestore      fail baseline 
> untested
> 
> 
> jobs:
>  test-amd64-i386-xl-win-vcpus1                                fail
> 
> 
> ------------------------------------------------------------
> sg-report-flight on woking.cam.xci-test.com
> logs: /home/xc_osstest/logs
> images: /home/xc_osstest/images
> 
> Logs, config files, etc. are available at
>     http://www.chiark.greenend.org.uk/~xensrcts/logs
> 
> Test harness code can be found at
>     http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
> 
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> http://lists.xen.org/xen-devel



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.