[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.1-testing test] 13655: regressions - FAIL



flight 13655 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/13655/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-pvops             4 kernel-build     fail in 13651 REGR. vs. 13646

Tests which are failing intermittently (not blocking):
 test-amd64-i386-qemuu-rhel6hvm-amd  7 redhat-install        fail pass in 13651

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-pcipt-intel  8 debian-fixup                fail like 13646
 test-amd64-amd64-xl-sedf      5 xen-boot                     fail   like 13646

Tests which did not succeed, but are not blocking:
 test-amd64-i386-rhel6hvm-amd 11 leak-check/check             fail   never pass
 test-amd64-i386-rhel6hvm-intel 11 leak-check/check             fail never pass
 test-amd64-i386-qemuu-rhel6hvm-intel 11 leak-check/check       fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-i386-i386-xl-winxpsp3   13 guest-stop                   fail   never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-i386-i386-xl-win        13 guest-stop                   fail   never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-i386-i386-xl-qemuu-winxpsp3 13 guest-stop                 fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-pcipt-intel  1 xen-build-check(1)     blocked in 13651 n/a
 test-amd64-amd64-xl-sedf-pin  1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-pv           1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl           1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl-sedf      1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-pair         1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl-qemuu-winxpsp3  1 xen-build-check(1)  blocked in 13651 n/a
 test-amd64-i386-qemuu-rhel6hvm-amd 11 leak-check/check fail in 13651 never pass
 test-amd64-amd64-xl-win7-amd64  1 xen-build-check(1)      blocked in 13651 n/a
 test-amd64-amd64-xl-qemuu-win7-amd64 1 xen-build-check(1) blocked in 13651 n/a
 test-amd64-amd64-win          1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl-win       1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl-winxpsp3  1 xen-build-check(1)        blocked in 13651 n/a

version targeted for testing:
 xen                  3e4782f17f5c
baseline version:
 xen                  d28a9ba889c0

------------------------------------------------------------
People who touched revisions under test:
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Tim Deegan <tim@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-i386-i386-xl                                            pass    
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-i386-qemuu-rhel6hvm-amd                           fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               fail    
 test-amd64-i386-qemuu-rhel6hvm-intel                         fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-i386-i386-xl-qemuu-winxpsp3                             fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-i386-i386-xl-winxpsp3                                   fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23353:3e4782f17f5c
tag:         tip
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:40:10 2012 +0100
    
    QEMU_TAG update (XSA-17 / CVE-2012-3515)
    
    
changeset:   23352:936f63ee4dad
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:29:56 2012 +0100
    
    x86/pvhvm: properly range-check PHYSDEVOP_map_pirq/MAP_PIRQ_TYPE_GSI
    
    This is being used as a array index, and hence must be validated before
    use.
    
    This is XSA-16 / CVE-2012-3498.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    
    
changeset:   23351:8ebda5388e4e
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:29:05 2012 +0100
    
    xen: Don't BUG_ON() PoD operations on a non-translated guest.
    
    This is XSA-14 / CVE-2012-3496
    
    Signed-off-by: Tim Deegan <tim@xxxxxxx>
    Reviewed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Tested-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
changeset:   23350:6779ddca8593
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:28:17 2012 +0100
    
    xen: handle out-of-pirq condition correctly in PHYSDEVOP_get_free_pirq
    
    This is XSA-13 / CVE-2012-3495
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Signed-off-by: Jan Beulich <JBeulich@xxxxxxxx>
    
    
changeset:   23349:bcc340292731
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 05 12:27:54 2012 +0100
    
    xen: prevent a 64 bit guest setting reserved bits in DR7
    
    The upper 32 bits of this register are reserved and should be written as
    zero.
    
    This is XSA-12 / CVE-2012-3494
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
changeset:   23348:d28a9ba889c0
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Tue Sep 04 14:56:48 2012 +0200
    
    make all (native) hypercalls consistently have "long" return type
    
    for common and x86 ones at least, to address the problem of storing
    zero-extended values into the multicall result field otherwise.
    
    Reported-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset: 25744:47080c965937
    xen-unstable date: Fri Aug 10 07:51:01 UTC 2012
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.