[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.0-testing test] 7088: trouble: blocked/broken/fail/pass
flight 7088 xen-4.0-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/7088/ Failures and problems with tests :-( Tests which did not succeed and are blocking: build-amd64-pvops 2 host-install(2) broken build-i386 2 host-install(2) broken Tests which are failing intermittently (not blocking): test-amd64-i386-pair 6 xen-install/dst_host fail pass in 7085 test-amd64-i386-pair 5 xen-install/src_host fail pass in 7085 test-amd64-i386-pv 4 xen-install fail pass in 7085 test-amd64-i386-rhel6hvm-amd 4 xen-install fail pass in 7085 test-amd64-i386-rhel6hvm-intel 4 xen-install fail pass in 7085 test-amd64-i386-win-vcpus1 4 xen-install fail pass in 7085 test-amd64-i386-win 4 xen-install fail pass in 7085 test-amd64-i386-xl-credit2 4 xen-install fail pass in 7085 test-amd64-i386-xl-multivcpu 4 xen-install fail pass in 7085 test-amd64-i386-xl-win-vcpus1 4 xen-install fail pass in 7085 test-amd64-i386-xl 4 xen-install fail pass in 7085 test-amd64-xcpkern-i386-pair 6 xen-install/dst_host fail pass in 7085 test-amd64-xcpkern-i386-pair 5 xen-install/src_host fail pass in 7085 test-amd64-xcpkern-i386-pv 4 xen-install fail pass in 7085 test-amd64-xcpkern-i386-rhel6hvm-amd 4 xen-install fail pass in 7085 test-amd64-xcpkern-i386-rhel6hvm-intel 4 xen-install fail pass in 7085 test-amd64-xcpkern-i386-win 4 xen-install fail pass in 7085 test-amd64-xcpkern-i386-xl-credit2 4 xen-install fail pass in 7085 test-amd64-xcpkern-i386-xl-multivcpu 4 xen-install fail pass in 7085 test-amd64-xcpkern-i386-xl-win 4 xen-install fail pass in 7085 test-amd64-xcpkern-i386-xl 4 xen-install fail pass in 7085 Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-amd64-pair 1 xen-build-check(1) blocked n/a test-amd64-amd64-pv 1 xen-build-check(1) blocked n/a test-amd64-amd64-win 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-win 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl 1 xen-build-check(1) blocked n/a test-i386-i386-pair 1 xen-build-check(1) blocked n/a test-i386-i386-pv 1 xen-build-check(1) blocked n/a test-i386-i386-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl-win 1 xen-build-check(1) blocked n/a test-i386-i386-xl 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pair 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-pv 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-win 1 xen-build-check(1) blocked n/a test-i386-xcpkern-i386-xl 1 xen-build-check(1) blocked n/a version targeted for testing: xen 26a4cedefec0 baseline version: xen b85a9e58ec3a ------------------------------------------------------------ People who touched revisions under test: Allen Kay <allen.m.kay@xxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Igor Mammedov <imammedo@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxxxx> Keir Fraser <keir@xxxxxxx> ------------------------------------------------------------ jobs: build-i386-xcpkern pass build-amd64 pass build-i386 broken build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops broken build-i386-pvops pass test-amd64-amd64-xl blocked test-amd64-i386-xl fail test-i386-i386-xl blocked test-amd64-xcpkern-i386-xl fail test-i386-xcpkern-i386-xl blocked test-amd64-i386-rhel6hvm-amd fail test-amd64-xcpkern-i386-rhel6hvm-amd fail test-amd64-i386-xl-credit2 fail test-amd64-xcpkern-i386-xl-credit2 fail test-amd64-i386-rhel6hvm-intel fail test-amd64-xcpkern-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu fail test-amd64-xcpkern-i386-xl-multivcpu fail test-amd64-amd64-pair blocked test-amd64-i386-pair fail test-i386-i386-pair blocked test-amd64-xcpkern-i386-pair fail test-i386-xcpkern-i386-pair blocked test-amd64-amd64-pv blocked test-amd64-i386-pv fail test-i386-i386-pv blocked test-amd64-xcpkern-i386-pv fail test-i386-xcpkern-i386-pv blocked test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-amd64-win blocked test-amd64-i386-win fail test-i386-i386-win blocked test-amd64-xcpkern-i386-win fail test-i386-xcpkern-i386-win blocked test-amd64-amd64-xl-win blocked test-i386-i386-xl-win blocked test-amd64-xcpkern-i386-xl-win fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 21489:26a4cedefec0 tag: tip user: Jan Beulich <jbeulich@xxxxxxxxxx> date: Mon May 16 13:41:58 2011 +0100 x86-64: remove left over uses of .got entries These were caused by some declarations happening before the compiler would have seen the visibility pragma. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx> xen-unstable changeset: 23345:ba4bd20e581a xen-unstable date: Mon May 16 13:32:37 2011 +0100 changeset: 21488:f9355c999a0f user: Igor Mammedov <imammedo@xxxxxxxxxx> date: Mon May 16 13:41:25 2011 +0100 VT-d: Fix resource leaks on error paths On error exit from functions, maped pages should be unmapped and acquired locks released. Signed-off-by: Igor Mammedov <imammedo@xxxxxxxxxx> Acked-by: Allen Kay <allen.m.kay@xxxxxxxxx> xen-unstable changeset: 23343:edcf8fc77b64 xen-unstable date: Mon May 16 13:29:24 2011 +0100 changeset: 21487:0e31cda80a7b user: Keir Fraser <keir@xxxxxxx> date: Mon May 16 13:40:51 2011 +0100 x86/tsc: Remove incorrect assertion from cstate_restore_tsc()... ..fix and move to write_tsc(). Signed-off-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23342:16d12acccacf xen-unstable date: Mon May 16 13:24:05 2011 +0100 changeset: 21486:44eb0ea74022 user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Mon May 16 13:39:51 2011 +0100 x86/ioapic: avoid gcc 4.6 warnings about uninitialised variables gcc 4.6 complains: io_apic.c: In function 'restore_IO_APIC_setup': /build/user-xen_4.1.0-3-amd64-zSon7K/xen-4.1.0/debian/build/build-hypervisor_amd64_amd64/xen/include/asm/io_apic.h:150:26: error: '*((void *)&entry+4)' may be used uninitialized in this function [-Werror=uninitialized] io_apic.c:221:32: note: '*((void *)&entry+4)' was declared here /build/user-xen_4.1.0-3-amd64-zSon7K/xen-4.1.0/debian/build/build-hypervisor_amd64_amd64/xen/include/asm/io_apic.h:150:26: error: 'entry' may be used uninitialized in this function [-Werror=uninitialized] io_apic.c:221:32: note: 'entry' was declared here cc1: all warnings being treated as errors Add functions to read/write an entire IO APIC entry using an explicit union to allow gcc to spot the initialisation. Reported as Debian bug #625438, thanks to Matthias Klose. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxxxx> xen-unstable changeset: 23341:87084ca76c9c xen-unstable date: Mon May 16 13:13:41 2011 +0100 changeset: 21485:b85a9e58ec3a user: Keir Fraser <keir@xxxxxxx> date: Thu May 12 18:07:45 2011 +0100 x86, vtd: [CVE-2011-1898] Protect against malicious MSIs from untrusted devices. In the absence of VT-d interrupt remapping support, a device can send arbitrary APIC messages to host CPUs. One class of attack that results is to confuse the hypervisor by delivering asynchronous interrupts to vectors that are expected to handle only synchronous traps/exceptions. We block this class of attack by: (1) setting APIC.TPR=0x10, to block all interrupts below vector 0x20. This blocks delivery to all architectural exception vectors. (2) checking APIC.ISR[vec] for vectors 0x80 (fast syscall) and 0x82 (hypercall). In these cases we BUG if we detect we are handling a hardware interrupt -- turning a potentially more severe infiltration into a straightforward system crash (i.e, DoS). Thanks to Invisible Things Lab <http://www.invisiblethingslab.com> for discovery and detailed investigation of this attack. Signed-off-by: Keir Fraser <keir@xxxxxxx> xen-unstable changeset: 23337:cc91832a02c7 xen-unstable date: Thu May 12 16:39:31 2011 +0100 (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |