[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 7065: trouble: blocked/broken/fail/pass
flight 7065 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/7065/ Failures and problems with tests :-( Tests which did not succeed and are blocking: build-i386-oldkern 2 host-install(2) broken build-i386-pvops 2 host-install(2) broken build-i386 2 host-install(2) broken Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-amd64-win 16 leak-check/check fail never pass test-amd64-amd64-xl-win 13 guest-stop fail never pass test-amd64-i386-pair 1 xen-build-check(1) blocked n/a test-amd64-i386-pv 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a test-amd64-i386-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-win 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a test-amd64-i386-xl-win-vcpus1 1 xen-build-check(1) blocked n/a test-amd64-i386-xl 1 xen-build-check(1) blocked n/a test-amd64-xcpkern-i386-pair 6 xen-install/dst_host fail like 7058 test-amd64-xcpkern-i386-pair 5 xen-install/src_host fail like 7058 test-amd64-xcpkern-i386-pv 4 xen-install fail like 7058 test-amd64-xcpkern-i386-rhel6hvm-amd 4 xen-install fail like 7058 test-amd64-xcpkern-i386-rhel6hvm-intel 4 xen-install fail like 7058 test-amd64-xcpkern-i386-win 4 xen-install fail like 7058 test-amd64-xcpkern-i386-xl-credit2 4 xen-install fail like 7058 test-amd64-xcpkern-i386-xl-multivcpu 4 xen-install fail like 7058 test-amd64-xcpkern-i386-xl-win 4 xen-install fail like 7058 test-amd64-xcpkern-i386-xl 4 xen-install fail like 7058 test-i386-i386-pair 1 xen-build-check(1) blocked n/a test-i386-i386-pv 1 xen-build-check(1) blocked n/a test-i386-i386-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pair 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pv 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-win 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-xl 1 xen-build-check(1) blocked n/a version targeted for testing: xen f9bb0bbea7c2 baseline version: xen 0c446850d85e ------------------------------------------------------------ People who touched revisions under test: Allen Kay <allen.m.kay@xxxxxxxxx> Christoph Egger <Christoph.Egger@xxxxxxx> David Brownlee <abs@xxxxxxxxxx> Jacob Shin <jacob.shin@xxxxxxx> Keir Fraser <keir@xxxxxxx> Liu, Jinsong <jinsong.liu@xxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> Tim Deegan <Tim.Deegan@xxxxxxxxxx> Uwe Dannowski <Uwe.Dannowski@xxxxxxx> ------------------------------------------------------------ jobs: build-i386-xcpkern pass build-amd64 pass build-i386 broken build-amd64-oldkern pass build-i386-oldkern broken build-amd64-pvops pass build-i386-pvops broken test-amd64-amd64-xl pass test-amd64-i386-xl blocked test-i386-i386-xl blocked test-amd64-xcpkern-i386-xl fail test-i386-xcpkern-i386-xl blocked test-amd64-i386-rhel6hvm-amd blocked test-amd64-xcpkern-i386-rhel6hvm-amd fail test-amd64-i386-xl-credit2 blocked test-amd64-xcpkern-i386-xl-credit2 fail test-amd64-i386-rhel6hvm-intel blocked test-amd64-xcpkern-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu blocked test-amd64-xcpkern-i386-xl-multivcpu fail test-amd64-amd64-pair pass test-amd64-i386-pair blocked test-i386-i386-pair blocked test-amd64-xcpkern-i386-pair fail test-i386-xcpkern-i386-pair blocked test-amd64-amd64-pv pass test-amd64-i386-pv blocked test-i386-i386-pv blocked test-amd64-xcpkern-i386-pv fail test-i386-xcpkern-i386-pv blocked test-amd64-i386-win-vcpus1 blocked test-amd64-i386-xl-win-vcpus1 blocked test-amd64-amd64-win fail test-amd64-i386-win blocked test-i386-i386-win blocked test-amd64-xcpkern-i386-win fail test-i386-xcpkern-i386-win blocked test-amd64-amd64-xl-win fail test-i386-i386-xl-win blocked test-amd64-xcpkern-i386-xl-win fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 23339:f9bb0bbea7c2 tag: tip user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Thu May 12 16:42:54 2011 +0100 x86: Check for valid pirq values in hvm_domain_use_pirq Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> changeset: 23338:9751bc49639e user: Keir Fraser <keir@xxxxxxx> date: Thu May 12 16:42:00 2011 +0100 vt-d: [CVE-2011-1898] Ensure that "iommu=required" enables interrupt remapping. Ensure that when Xen boots with "iommu=required" it will also insist that interrupt remapping is supported and enabled. It arranges that booting with that option on vulnerable hardware will fail, rather than appearing to succeed but actually being vulnerable to guests. From: Allen Kay <allen.m.kay@xxxxxxxxx> Signed-off-by: Keir Fraser <keir@xxxxxxx> changeset: 23337:cc91832a02c7 user: Keir Fraser <keir@xxxxxxx> date: Thu May 12 16:39:31 2011 +0100 x86, vtd: [CVE-2011-1898] Protect against malicious MSIs from untrusted devices. In the absence of VT-d interrupt remapping support, a device can send arbitrary APIC messages to host CPUs. One class of attack that results is to confuse the hypervisor by delivering asynchronous interrupts to vectors that are expected to handle only synchronous traps/exceptions. We block this class of attack by: (1) setting APIC.TPR=0x10, to block all interrupts below vector 0x20. This blocks delivery to all architectural exception vectors. (2) checking APIC.ISR[vec] for vectors 0x80 (fast syscall) and 0x82 (hypercall). In these cases we BUG if we detect we are handling a hardware interrupt -- turning a potentially more severe infiltration into a straightforward system crash (i.e, DoS). Thanks to Invisible Things Lab <http://www.invisiblethingslab.com> for discovery and detailed investigation of this attack. Signed-off-by: Keir Fraser <keir@xxxxxxx> changeset: 23336:955d4f369d5a user: Keir Fraser <keir@xxxxxxx> date: Thu May 12 09:33:59 2011 +0100 x86/hvm: Use UNLIKELY_{START,END} in a few suitable places in asm. Signed-off-by: Keir Fraser <keir@xxxxxxx> changeset: 23335:0957e0c5f0e4 user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> date: Thu May 12 09:15:05 2011 +0100 x86/hvm: pv-on-hvm: fix de/assert_irq checks The checks in assert_irq and deassert_irq to distinguish interrupts that have been remapped onto event channels from the others that have to be injected using the emulated lapic are wrong. Fix the condition checks using the convenient hvm_domain_use_pirq function. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> changeset: 23334:23e33ea79cac user: Jacob Shin <jacob.shin@xxxxxxx> date: Thu May 12 09:14:06 2011 +0100 hvm: vpmu: Enable HVM VPMU for AMD Family 12h and 14h processors HVM VPMU support can be enabled for AMD Family 12h and 14h processors by taking the same code path as 10h. Signed-off-by: Jacob Shin <jacob.shin@xxxxxxx> changeset: 23333:fabdd682420c user: Tim Deegan <Tim.Deegan@xxxxxxxxxx> date: Thu May 12 09:13:18 2011 +0100 x86: use compat hypercall handlers for calls from 32-bit HVM guests On 64-bit Xen, hypercalls from 32-bit HVM guests are handled as a special case, but not all the hypercalls are corrently redirected to their compat-mode wrappers. Use compat_* for xen_version, sched_op and set_timer_op for consistency. Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> changeset: 23332:1e29db7a3b6b user: Christoph Egger <Christoph.Egger@xxxxxxx> date: Thu May 12 09:07:35 2011 +0100 nestedsvm: fix shadow-on-hap Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx> Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> changeset: 23331:19d6541c4abe user: Christoph Egger <Christoph.Egger@xxxxxxx> date: Thu May 12 09:00:46 2011 +0100 nestedsvm: update rip on invlpga intercept Fixes endless loop. Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx> changeset: 23330:b6e8e916ed28 user: Christoph Egger <Christoph.Egger@xxxxxxx> date: Thu May 12 08:58:02 2011 +0100 nestedsvm: fix error path when VMRUN emulation fails With this, l1 guest keeps alive rather crashing the host. Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx> Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> changeset: 23329:8489494ee490 user: Christoph Egger <Christoph.Egger@xxxxxxx> date: Thu May 12 08:57:08 2011 +0100 nestedsvm: fix host crash with pv-on-hvm Linux KVM guest Nested SVM was unaware of the HVM direct vector eventchn mechanism. Attached patch fixes a host crash when starting a KVM L2 guest on a pv-on-hvm L1 Linux guest (e.g., HVM Debian Squeeze domU). Signed-off-by: Uwe Dannowski <Uwe.Dannowski@xxxxxxx> Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx> Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> changeset: 23328:6767d92dff13 user: Christoph Egger <Christoph.Egger@xxxxxxx> date: Thu May 12 08:55:12 2011 +0100 tools/xm-test: portability fix: Avoid using == in /bin/sh script From: David Brownlee <abs@xxxxxxxxxx> Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx> changeset: 23327:3d0ba2b4941f user: Liu, Jinsong <jinsong.liu@xxxxxxxxx> date: Thu May 12 08:53:42 2011 +0100 x86/mca: MCA bank clear 1). Add explicitly uc=pcc=1 fatal error detect, since under such case the s/ar/over bits status is undefined and hence may be mis-cleaned. Explicit fatal detect return 0 indicate stick MSR bank will have chance to be handled after reboot by polling; 2). Fix a little bug for case SRAR, over bit should be 0 when need clear bank, otherwise it would reset system; 3). When clear bank, add clear MCi_ADDR/MISC if it's valid, according to Intel SDM; Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx> changeset: 23326:f69f5836d8c2 user: Liu, Jinsong <jinsong.liu@xxxxxxxxx> date: Thu May 12 08:52:47 2011 +0100 x86/mca MCA minor bugfix This patch fix a minor bug, when in xen context and cannot safely return the mce break point, reset system; Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx> changeset: 23325:ab93de9a608d user: Liu, Jinsong <jinsong.liu@xxxxxxxxx> date: Thu May 12 08:52:18 2011 +0100 x86/mca: MCA physical address check when calculate domain Bank addr maybe invalid, or Bank addr maybe physical/memory/linear address or segment offset. This patch add mca MCi_STATUS_MISCV/MCi_STATUS_ADDRV check, and add physical address verify, so that it work safe when calculate domain. Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx> changeset: 23324:0c446850d85e user: Keir Fraser <keir@xxxxxxx> date: Wed May 11 12:58:04 2011 +0100 Simplify and build-fix (for some gcc versions) radix_tree_int_to_ptr(). Signed-off-by: Keir Fraser <keir@xxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |