[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 7065: trouble: blocked/broken/fail/pass



flight 7065 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/7065/

Failures and problems with tests :-(

Tests which did not succeed and are blocking:
 build-i386-oldkern            2 host-install(2)              broken
 build-i386-pvops              2 host-install(2)              broken
 build-i386                    2 host-install(2)              broken

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-i386-pair          1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pv            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-amd  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win-vcpus1    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-credit2    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-multivcpu  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-win-vcpus1  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl            1 xen-build-check(1)           blocked  n/a
 test-amd64-xcpkern-i386-pair  6 xen-install/dst_host         fail    like 7058
 test-amd64-xcpkern-i386-pair  5 xen-install/src_host         fail    like 7058
 test-amd64-xcpkern-i386-pv    4 xen-install                  fail    like 7058
 test-amd64-xcpkern-i386-rhel6hvm-amd  4 xen-install             fail like 7058
 test-amd64-xcpkern-i386-rhel6hvm-intel  4 xen-install           fail like 7058
 test-amd64-xcpkern-i386-win   4 xen-install                  fail    like 7058
 test-amd64-xcpkern-i386-xl-credit2  4 xen-install               fail like 7058
 test-amd64-xcpkern-i386-xl-multivcpu  4 xen-install             fail like 7058
 test-amd64-xcpkern-i386-xl-win  4 xen-install                  fail  like 7058
 test-amd64-xcpkern-i386-xl    4 xen-install                  fail    like 7058
 test-i386-i386-pair           1 xen-build-check(1)           blocked  n/a
 test-i386-i386-pv             1 xen-build-check(1)           blocked  n/a
 test-i386-i386-win            1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl-win         1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl             1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-pair   1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-pv     1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-win    1 xen-build-check(1)           blocked  n/a
 test-i386-xcpkern-i386-xl     1 xen-build-check(1)           blocked  n/a

version targeted for testing:
 xen                  f9bb0bbea7c2
baseline version:
 xen                  0c446850d85e

------------------------------------------------------------
People who touched revisions under test:
  Allen Kay <allen.m.kay@xxxxxxxxx>
  Christoph Egger <Christoph.Egger@xxxxxxx>
  David Brownlee <abs@xxxxxxxxxx>
  Jacob Shin <jacob.shin@xxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Liu, Jinsong <jinsong.liu@xxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
  Uwe Dannowski <Uwe.Dannowski@xxxxxxx>
------------------------------------------------------------

jobs:
 build-i386-xcpkern                                           pass     
 build-amd64                                                  pass     
 build-i386                                                   broken   
 build-amd64-oldkern                                          pass     
 build-i386-oldkern                                           broken   
 build-amd64-pvops                                            pass     
 build-i386-pvops                                             broken   
 test-amd64-amd64-xl                                          pass     
 test-amd64-i386-xl                                           blocked  
 test-i386-i386-xl                                            blocked  
 test-amd64-xcpkern-i386-xl                                   fail     
 test-i386-xcpkern-i386-xl                                    blocked  
 test-amd64-i386-rhel6hvm-amd                                 blocked  
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail     
 test-amd64-i386-xl-credit2                                   blocked  
 test-amd64-xcpkern-i386-xl-credit2                           fail     
 test-amd64-i386-rhel6hvm-intel                               blocked  
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail     
 test-amd64-i386-xl-multivcpu                                 blocked  
 test-amd64-xcpkern-i386-xl-multivcpu                         fail     
 test-amd64-amd64-pair                                        pass     
 test-amd64-i386-pair                                         blocked  
 test-i386-i386-pair                                          blocked  
 test-amd64-xcpkern-i386-pair                                 fail     
 test-i386-xcpkern-i386-pair                                  blocked  
 test-amd64-amd64-pv                                          pass     
 test-amd64-i386-pv                                           blocked  
 test-i386-i386-pv                                            blocked  
 test-amd64-xcpkern-i386-pv                                   fail     
 test-i386-xcpkern-i386-pv                                    blocked  
 test-amd64-i386-win-vcpus1                                   blocked  
 test-amd64-i386-xl-win-vcpus1                                blocked  
 test-amd64-amd64-win                                         fail     
 test-amd64-i386-win                                          blocked  
 test-i386-i386-win                                           blocked  
 test-amd64-xcpkern-i386-win                                  fail     
 test-i386-xcpkern-i386-win                                   blocked  
 test-amd64-amd64-xl-win                                      fail     
 test-i386-i386-xl-win                                        blocked  
 test-amd64-xcpkern-i386-xl-win                               fail     


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23339:f9bb0bbea7c2
tag:         tip
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Thu May 12 16:42:54 2011 +0100
    
    x86: Check for valid pirq values in hvm_domain_use_pirq
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    
    
changeset:   23338:9751bc49639e
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu May 12 16:42:00 2011 +0100
    
    vt-d: [CVE-2011-1898] Ensure that "iommu=required" enables interrupt 
remapping.
    
    Ensure that when Xen boots with "iommu=required" it will also insist
    that interrupt remapping is supported and enabled.  It arranges that
    booting with that option on vulnerable hardware will fail, rather than
    appearing to succeed but actually being vulnerable to guests.
    
    From: Allen Kay <allen.m.kay@xxxxxxxxx>
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   23337:cc91832a02c7
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu May 12 16:39:31 2011 +0100
    
    x86, vtd: [CVE-2011-1898] Protect against malicious MSIs from untrusted 
devices.
    
    In the absence of VT-d interrupt remapping support, a device can send
    arbitrary APIC messages to host CPUs. One class of attack that results
    is to confuse the hypervisor by delivering asynchronous interrupts to
    vectors that are expected to handle only synchronous
    traps/exceptions.
    
    We block this class of attack by:
    (1) setting APIC.TPR=0x10, to block all interrupts below vector
    0x20. This blocks delivery to all architectural exception vectors.
    (2) checking APIC.ISR[vec] for vectors 0x80 (fast syscall) and 0x82
    (hypercall). In these cases we BUG if we detect we are handling a
    hardware interrupt -- turning a potentially more severe infiltration
    into a straightforward system crash (i.e, DoS).
    
    Thanks to Invisible Things Lab <http://www.invisiblethingslab.com>
    for discovery and detailed investigation of this attack.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   23336:955d4f369d5a
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu May 12 09:33:59 2011 +0100
    
    x86/hvm: Use UNLIKELY_{START,END} in a few suitable places in asm.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   23335:0957e0c5f0e4
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Thu May 12 09:15:05 2011 +0100
    
    x86/hvm: pv-on-hvm: fix de/assert_irq checks
    
    The checks in assert_irq and deassert_irq to distinguish interrupts
    that have been remapped onto event channels from the others that have
    to be injected using the emulated lapic are wrong.
    
    Fix the condition checks using the convenient hvm_domain_use_pirq
    function.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    
    
changeset:   23334:23e33ea79cac
user:        Jacob Shin <jacob.shin@xxxxxxx>
date:        Thu May 12 09:14:06 2011 +0100
    
    hvm: vpmu: Enable HVM VPMU for AMD Family 12h and 14h processors
    
    HVM VPMU support can be enabled for AMD Family 12h and 14h processors
    by taking the same code path as 10h.
    
    Signed-off-by: Jacob Shin <jacob.shin@xxxxxxx>
    
    
changeset:   23333:fabdd682420c
user:        Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date:        Thu May 12 09:13:18 2011 +0100
    
    x86: use compat hypercall handlers for calls from 32-bit HVM guests
    
    On 64-bit Xen, hypercalls from 32-bit HVM guests are handled as
    a special case, but not all the hypercalls are corrently redirected
    to their compat-mode wrappers.  Use compat_* for xen_version,
    sched_op and set_timer_op for consistency.
    
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23332:1e29db7a3b6b
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Thu May 12 09:07:35 2011 +0100
    
    nestedsvm: fix shadow-on-hap
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23331:19d6541c4abe
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Thu May 12 09:00:46 2011 +0100
    
    nestedsvm: update rip on invlpga intercept
    
    Fixes endless loop.
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    
    
changeset:   23330:b6e8e916ed28
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Thu May 12 08:58:02 2011 +0100
    
    nestedsvm: fix error path when VMRUN emulation fails
    
    With this, l1 guest keeps alive rather crashing the host.
    
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23329:8489494ee490
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Thu May 12 08:57:08 2011 +0100
    
    nestedsvm: fix host crash with pv-on-hvm Linux KVM guest
    
    Nested SVM was unaware of the HVM direct vector eventchn mechanism.
    Attached patch fixes a host crash when starting a KVM L2 guest on a
    pv-on-hvm L1 Linux guest (e.g., HVM Debian Squeeze domU).
    
    Signed-off-by: Uwe Dannowski <Uwe.Dannowski@xxxxxxx>
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    
    
changeset:   23328:6767d92dff13
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Thu May 12 08:55:12 2011 +0100
    
    tools/xm-test: portability fix: Avoid using == in /bin/sh script
    
    From: David Brownlee <abs@xxxxxxxxxx>
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    
    
changeset:   23327:3d0ba2b4941f
user:        Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date:        Thu May 12 08:53:42 2011 +0100
    
    x86/mca: MCA bank clear
    
    1). Add explicitly uc=pcc=1 fatal error detect, since under such case
    the s/ar/over bits status is undefined and hence may be
    mis-cleaned. Explicit fatal detect return 0 indicate stick MSR bank
    will have chance to be handled after reboot by polling;
    2). Fix a little bug for case SRAR, over bit should be 0 when need
    clear bank, otherwise it would reset system;
    3). When clear bank, add clear MCi_ADDR/MISC if it's valid, according
    to Intel SDM;
    
    Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
    
    
changeset:   23326:f69f5836d8c2
user:        Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date:        Thu May 12 08:52:47 2011 +0100
    
    x86/mca MCA minor bugfix
    
    This patch fix a minor bug, when in xen context and cannot safely
    return the mce break point, reset system;
    
    Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
    
    
changeset:   23325:ab93de9a608d
user:        Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date:        Thu May 12 08:52:18 2011 +0100
    
    x86/mca: MCA physical address check when calculate domain
    
    Bank addr maybe invalid, or Bank addr maybe physical/memory/linear
    address or segment offset.  This patch add mca
    MCi_STATUS_MISCV/MCi_STATUS_ADDRV check, and add physical address
    verify, so that it work safe when calculate domain.
    
    Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
    
    
changeset:   23324:0c446850d85e
user:        Keir Fraser <keir@xxxxxxx>
date:        Wed May 11 12:58:04 2011 +0100
    
    Simplify and build-fix (for some gcc versions) radix_tree_int_to_ptr().
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.