[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 13652: regressions - FAIL



flight 13652 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/13652/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-pvops              4 kernel-build              fail REGR. vs. 13648

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf-pin 10 guest-saverestore            fail   like 13648
 test-amd64-amd64-xl-qemuu-winxpsp3  9 guest-localmigrate       fail like 13648
 test-amd64-amd64-xl-qemuu-win7-amd64  9 guest-localmigrate     fail like 13648

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-rhel6hvm-amd  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xl-credit2    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-multivcpu  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-intel  1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl-qemuu-winxpsp3  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xend-winxpsp3  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-win-vcpus1  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pv            1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-i386-i386-xl             1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win-vcpus1    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 xen-build-check(1)         blocked n/a
 test-amd64-i386-xl            1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-i386-i386-pair           1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl-winxpsp3    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-winxpsp3-vcpus1  1 xen-build-check(1)           blocked n/a
 test-i386-i386-pv             1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pair          1 xen-build-check(1)           blocked  n/a
 test-i386-i386-win            1 xen-build-check(1)           blocked  n/a
 test-i386-i386-xl-win         1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-i386-xl-win7-amd64  1 xen-build-check(1)           blocked  n/a

version targeted for testing:
 xen                  cbc0c2368a6d
baseline version:
 xen                  9dc729b75595

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Pasi K?rkk?inen <pasik@xxxxxx>
  Paul Durrant <paul.durrant@xxxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             fail    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           blocked 
 test-i386-i386-xl                                            blocked 
 test-amd64-i386-rhel6hvm-amd                                 blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                blocked 
 test-amd64-i386-xl-credit2                                   blocked 
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-i386-xl-multivcpu                                 blocked 
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         blocked 
 test-i386-i386-pair                                          blocked 
 test-amd64-amd64-xl-sedf-pin                                 fail    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           blocked 
 test-i386-i386-pv                                            blocked 
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-win-vcpus1                                   blocked 
 test-amd64-i386-xl-win-vcpus1                                blocked 
 test-amd64-i386-xl-winxpsp3-vcpus1                           blocked 
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          blocked 
 test-i386-i386-win                                           blocked 
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        blocked 
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-i386-i386-xl-qemuu-winxpsp3                             blocked 
 test-amd64-i386-xend-winxpsp3                                blocked 
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-i386-i386-xl-winxpsp3                                   blocked 


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   25820:cbc0c2368a6d
tag:         tip
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Wed Sep 05 15:09:48 2012 +0200
    
    x86: fix RCU locking in PHYSDEVOP_get_free_pirq
    
    Apart from properly pairing locks with unlocks, also reduce the lock
    scope - no need to do the copy_{from,to}_guest()-s inside the protected
    region.
    
    I actually wonder whether the RCU locks are needed here at all.
    
    Reported-by: Tim Deegan <tim@xxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25819:aa69843f0b02
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Wed Sep 05 15:07:42 2012 +0200
    
    x86: drop "index" parameter from get_free_pirq()
    
    It's unused.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25818:50adc933faaf
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:38:40 2012 +0100
    
    QEMU_TAG update (XSA-17 / CVE-2012-3515)
    
    
changeset:   25817:93e5a791d076
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:30:26 2012 +0100
    
    xen/gnttab: Validate input to GNTTABOP_swap_grant_ref
    
    xen-unstable c/s 24548:d115844ebfbb introduces a new GNTTABOP to swap
    grant refs.  However, it fails to validate the two refs passed from
    the guest.
    
    The result is that passing out-of-range refs can cause Xen to read
    past the end of the grant_table->active[] array, and deference
    whatever it finds.  Typically, this results in Xen trying to deference
    a low pointer and fail with a page-fault.
    
    As this hypercall can be issued by an unprivileged guest, this is a
    Denial of Service against Xen.  This is XSA-18 / CVE-2012-3516.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    
    
changeset:   25816:2750340a347d
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:29:52 2012 +0100
    
    x86/pvhvm: properly range-check PHYSDEVOP_map_pirq/MAP_PIRQ_TYPE_GSI
    
    This is being used as a array index, and hence must be validated before
    use.
    
    This is XSA-16 / CVE-2012-3498.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   25815:bcf58ef63b7c
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:29:03 2012 +0100
    
    xen: Don't BUG_ON() PoD operations on a non-translated guest.
    
    This is XSA-14 / CVE-2012-3496
    
    Signed-off-by: Tim Deegan <tim@xxxxxxx>
    Reviewed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Tested-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
changeset:   25814:4f1c69648201
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:27:25 2012 +0100
    
    xen: prevent a 64 bit guest setting reserved bits in DR7
    
    The upper 32 bits of this register are reserved and should be written as
    zero.
    
    This is XSA-12 / CVE-2012-3494
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
changeset:   25813:9dc729b75595
user:        Pasi K?rkk?inen <pasik@xxxxxx>
date:        Mon Sep 03 11:22:02 2012 +0100
    
    xl.cfg: videoram and stdvga documentation improvements
    
    - videoram: Document that only qemu-xen-traditional device-model currently
       supports changing the amount of video memory for stdvga graphics device.
    
    - videoram: Better document the default amount of videoram for both stdvga
      and Cirrus.
    
    - stdvga: Add a note that stdvga allows bigger amount of videoram and
      bigger resolutions.
    
    Signed-off-by: Pasi K?rkk?inen <pasik@xxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.