[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.0-testing test] 7007: regressions - trouble: blocked/broken/fail/pass
flight 7007 xen-4.0-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/7007/ Regressions :-( Tests which did not succeed and are blocking: build-amd64-oldkern 2 host-install(2) broken build-amd64-pvops 2 host-install(2) broken test-i386-xcpkern-i386-pair 16 guest-start fail REGR. vs. 6931 Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-amd64-pair 1 xen-build-check(1) blocked n/a test-amd64-amd64-pv 1 xen-build-check(1) blocked n/a test-amd64-amd64-win 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-win 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-amd 7 redhat-install fail never pass test-amd64-i386-rhel6hvm-intel 7 redhat-install fail never pass test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass test-amd64-i386-win 16 leak-check/check fail never pass test-amd64-i386-xl-credit2 13 guest-localmigrate.2 fail blocked in 6931 test-amd64-i386-xl-multivcpu 15 guest-stop fail never pass test-amd64-i386-xl-win-vcpus1 7 windows-install fail never pass test-amd64-i386-xl 15 guest-stop fail never pass test-amd64-xcpkern-i386-rhel6hvm-amd 7 redhat-install fail never pass test-amd64-xcpkern-i386-rhel6hvm-intel 7 redhat-install fail never pass test-amd64-xcpkern-i386-win 16 leak-check/check fail never pass test-amd64-xcpkern-i386-xl-credit2 15 guest-stop fail never pass test-amd64-xcpkern-i386-xl-multivcpu 15 guest-stop fail never pass test-amd64-xcpkern-i386-xl-win 7 windows-install fail never pass test-amd64-xcpkern-i386-xl 15 guest-stop fail never pass test-i386-i386-win 16 leak-check/check fail never pass test-i386-i386-xl-win 7 windows-install fail never pass test-i386-i386-xl 15 guest-stop fail never pass test-i386-xcpkern-i386-win 16 leak-check/check fail never pass test-i386-xcpkern-i386-xl 15 guest-stop fail never pass version targeted for testing: xen c2adc059e931 baseline version: xen 50066fb241dd ------------------------------------------------------------ People who touched revisions under test: Daniel Kiper <dkiper@xxxxxxxxxxxx> Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Keir Fraser <keir@xxxxxxx> ------------------------------------------------------------ jobs: build-i386-xcpkern pass build-amd64 pass build-i386 pass build-amd64-oldkern broken build-i386-oldkern pass build-amd64-pvops broken build-i386-pvops pass test-amd64-amd64-xl blocked test-amd64-i386-xl fail test-i386-i386-xl fail test-amd64-xcpkern-i386-xl fail test-i386-xcpkern-i386-xl fail test-amd64-i386-rhel6hvm-amd fail test-amd64-xcpkern-i386-rhel6hvm-amd fail test-amd64-i386-xl-credit2 fail test-amd64-xcpkern-i386-xl-credit2 fail test-amd64-i386-rhel6hvm-intel fail test-amd64-xcpkern-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu fail test-amd64-xcpkern-i386-xl-multivcpu fail test-amd64-amd64-pair blocked test-amd64-i386-pair pass test-i386-i386-pair pass test-amd64-xcpkern-i386-pair pass test-i386-xcpkern-i386-pair fail test-amd64-amd64-pv blocked test-amd64-i386-pv pass test-i386-i386-pv pass test-amd64-xcpkern-i386-pv pass test-i386-xcpkern-i386-pv pass test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-amd64-win blocked test-amd64-i386-win fail test-i386-i386-win fail test-amd64-xcpkern-i386-win fail test-i386-xcpkern-i386-win fail test-amd64-amd64-xl-win blocked test-i386-i386-xl-win fail test-amd64-xcpkern-i386-xl-win fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 21482:c2adc059e931 tag: tip user: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> date: Mon May 09 15:06:17 2011 +0100 libxc: [CVE-2011-1583] pv kernel image validation The functions which interpret the kernel image supplied for a paravirtualised guest, and decompress it into memory when booting the domain, are incautious. Specifically: (i) Integer overflow in the decompression loop memory allocator might result in overrunning the buffer used for the decompressed image; (ii) Integer overflows and lack of checking of certain length fields can result in the loader reading its own address space beyond the size of the supplied kernel image file. (iii) Lack of error checking in the decompression loop can lead to an infinite loop. This patch fixes these problems. CVE-2011-1583. Signed-off-by: Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx> Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> changeset: 21481:e91977e7ab3a user: Keir Fraser <keir@xxxxxxx> date: Mon May 09 12:20:24 2011 +0100 x86: Clean up smp_call_function handling. We don't need so many communication fields between caller and handler. Signed-off-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23285:a7ac0a0170b0 xen-unstable date: Sun May 01 09:32:48 2011 +0100 changeset: 21480:50066fb241dd user: Daniel Kiper <dkiper@xxxxxxxxxxxx> date: Wed Apr 27 13:31:04 2011 +0100 pv-grub: Fix for incorrect dom->p2m_host[] list initialization Introduction of Linux Kernel git commit ceefccc93932b920a8ec6f35f596db05202a12fe (x86: default CONFIG_PHYSICAL_START and CONFIG_PHYSICAL_ALIGN to 16 MB) revealed deeply hidden bug in pv-grub. During kernel load stage dom->p2m_host[] list has been incorrectly initialized. At the beginning of kernel load stage dom->p2m_host[] list is populated with current PFN->MFN layout. Later during memory allocation (memory is allocated page by page in kexec_allocate()) page order is changed to establish linear layout in new domain. It is done by exchanging subsequent MFNs with newly allocated MFNs. dom->p2m_host[] list is indexed by currently requested PFN (it is incremented from 0) and PFN of newly allocated paged. If PFN of newly allocated page is less than currently requested PFN then earlier allocated MFN is overwritten which leads to domain crash later. This patch corrects that issue. If PFN of newly allocated page is less then currently requested PFN then relevant PFN/MFN pair is properly calculated and usual exchange occurs later. Signed-off-by: Daniel Kiper <dkiper@xxxxxxxxxxxx> Reviewed-by: Samuel Thibault <samuel.thibault@xxxxxxxxxxxx> xen-unstable changeset: 23249:83fe79c0225f xen-unstable date: Wed Apr 27 13:29:14 2011 +0100 (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |