[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.1-testing test] 13864: trouble: broken/fail/pass



flight 13864 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/13864/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-pv            3 host-install(3)         broken REGR. vs. 13820
 test-amd64-i386-xl            3 host-install(3)         broken REGR. vs. 13820
 test-amd64-i386-xend-winxpsp3  3 host-install(3)        broken REGR. vs. 13820
 test-i386-i386-xl-win         3 host-install(3)         broken REGR. vs. 13820

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-pcipt-intel  8 debian-fixup                fail like 13820
 test-amd64-amd64-xl-sedf      5 xen-boot                     fail   like 13820

Tests which did not succeed, but are not blocking:
 test-amd64-i386-rhel6hvm-intel 11 leak-check/check             fail never pass
 test-amd64-i386-qemuu-rhel6hvm-amd 11 leak-check/check         fail never pass
 test-amd64-i386-rhel6hvm-amd 11 leak-check/check             fail   never pass
 test-i386-i386-xl-winxpsp3   13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-amd64-i386-qemuu-rhel6hvm-intel 11 leak-check/check       fail never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-i386-i386-xl-qemuu-winxpsp3 13 guest-stop                 fail never pass

version targeted for testing:
 xen                  fb0561ba7d9e
baseline version:
 xen                  6a17d5f11d66

------------------------------------------------------------
People who touched revisions under test:
  Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Jonathan Tripathy <jonnyt@xxxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           broken  
 test-i386-i386-xl                                            pass    
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-i386-qemuu-rhel6hvm-amd                           fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               fail    
 test-amd64-i386-qemuu-rhel6hvm-intel                         fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           broken  
 test-i386-i386-pv                                            pass    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        broken  
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-i386-i386-xl-qemuu-winxpsp3                             fail    
 test-amd64-i386-xend-winxpsp3                                broken  
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-i386-i386-xl-winxpsp3                                   fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23377:fb0561ba7d9e
tag:         tip
user:        Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx>
date:        Tue Sep 25 12:29:29 2012 +0200
    
    tmem: bump pool version to 1 to fix restore issue when tmem enabled
    
    Restore fails when tmem is enabled both in hypervisor and guest. This
    is due to spec version mismatch when restoring a pool.
    
    Signed-off-by: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    xen-unstable changeset: 25929:fee83ac77d8c
    xen-unstable date: Wed Sep 19 15:38:47 UTC 2012
    
    
changeset:   23376:0c3286621912
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Tue Sep 25 12:28:56 2012 +0200
    
    tmem: cleanup
    
    - one more case of checking for a specific rather than any error
    - drop redundant casts
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    xen-unstable changeset: 25860:e4cb84111610
    xen-unstable date: Tue Sep 11 12:19:29 UTC 2012
    
    
changeset:   23375:00ff640ebc7b
user:        Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
date:        Tue Sep 25 12:28:24 2012 +0200
    
    tmem: fixup 2010 cleanup patch that breaks tmem save/restore
    
    20918:a3fa6d444b25 "Fix domain reference leaks" (in Feb 2010, by Jan)
    does some cleanup in addition to the leak fixes.  Unfortunately, that
    cleanup inadvertently resulted in an incorrect fallthrough in a switch
    statement which breaks tmem save/restore.
    
    That broken patch was apparently applied to 4.0-testing and 4.1-testing
    so those are broken as well.
    
    What is the process now for requesting back-patches to 4.0 and 4.1?
    
    (Side note: This does not by itself entirely fix save/restore in 4.2.)
    
    Signed-off-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    xen-unstable changeset: 25859:16e0392c6594
    xen-unstable date: Tue Sep 11 12:19:03 UTC 2012
    
    
changeset:   23374:5a3829c943ff
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Tue Sep 25 12:27:50 2012 +0200
    
    tmem: reduce severity of log messages
    
    Otherwise they can be used by a guest to spam the hypervisor log with
    all settings at their defaults.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx>
    xen-unstable changeset: 25858:0520982a602a
    xen-unstable date: Tue Sep 11 12:18:36 UTC 2012
    
    
changeset:   23373:91bf384afc83
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Tue Sep 25 12:27:21 2012 +0200
    
    tmem: properly drop lock on error path in do_tmem_op()
    
    Reported-by: Tim Deegan <tim@xxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    xen-unstable changeset: 25857:109ea6a0c23a
    xen-unstable date: Tue Sep 11 12:18:26 UTC 2012
    
    
changeset:   23372:397cac9587fe
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Tue Sep 25 12:26:57 2012 +0200
    
    tmem: properly drop lock on error path in do_tmem_get()
    
    Also remove a bogus assertion.
    
    Reported-by: Tim Deegan <tim@xxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    xen-unstable changeset: 25856:83b97a59888b
    xen-unstable date: Tue Sep 11 12:18:08 UTC 2012
    
    
changeset:   23371:2cce0490a260
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Tue Sep 25 12:26:29 2012 +0200
    
    tmem: detect arithmetic overflow in tmh_copy_{from,to}_client()
    
    This implies adjusting callers to deal with errors other than -EFAULT
    and removing some comments which would otherwise become stale.
    
    Reported-by: Tim Deegan <tim@xxxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    xen-unstable changeset: 25855:33b8c42a87ec
    xen-unstable date: Tue Sep 11 12:17:59 UTC 2012
    
    
changeset:   23370:122caf666c0c
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Tue Sep 25 12:26:06 2012 +0200
    
    tmem: don't access guest memory without using the accessors intended for 
this
    
    This is not permitted, not even for buffers coming from Dom0 (and it
    would also break the moment Dom0 runs in HVM mode). An implication from
    the changes here is that tmh_copy_page() can't be used anymore for
    control operations calling tmh_copy_{from,to}_client() (as those pass
    the buffer by virtual address rather than MFN).
    
    Note that tmemc_save_get_next_page() previously didn't set the returned
    handle's pool_id field, while the new code does. It need to be
    confirmed that this is not a problem (otherwise the copy-out operation
    will require further tmh_...() abstractions to be added).
    
    Further note that the patch removes (rather than adjusts) an invalid
    call to unmap_domain_page() (no matching map_domain_page()) from
    tmh_compress_from_client() and adds a missing one to an error return
    path in tmh_copy_from_client().
    
    Finally note that the patch adds a previously missing return statement
    to cli_get_page() (without which that function could de-reference a
    NULL pointer, triggerable from guest mode).
    
    This is part of XSA-15 / CVE-2012-3497.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    xen-unstable changeset: 25854:ccd60ed6c555
    xen-unstable date: Tue Sep 11 12:17:49 UTC 2012
    
    
changeset:   23369:8dba0836f71b
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Tue Sep 25 12:25:25 2012 +0200
    
    tmem: check for a valid client ("domain") in the save subops
    
    This is part of XSA-15 / CVE-2012-3497.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    xen-unstable changeset: 25853:f53c5aadbba9
    xen-unstable date: Tue Sep 11 12:17:27 UTC 2012
    
    
changeset:   23368:6f61607a074b
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Tue Sep 25 12:24:57 2012 +0200
    
    tmem: check the pool_id is valid when destroying a tmem pool
    
    This is part of XSA-15 / CVE-2012-3497.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    xen-unstable changeset: 25852:d189d99ef00c
    xen-unstable date: Tue Sep 11 12:06:54 UTC 2012
    
    
changeset:   23367:805f0ba5e11b
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Tue Sep 25 12:24:37 2012 +0200
    
    tmem: consistently make pool_id a uint32_t
    
    Treating it as an int could allow a malicious guest to provide a
    negative pool_Id, by passing the MAX_POOLS_PER_DOMAIN limit check and
    allowing access to the negative offsets of the pool array.
    
    This is part of XSA-15 / CVE-2012-3497.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    xen-unstable changeset: 25851:fcf567acc92a
    xen-unstable date: Tue Sep 11 12:06:43 UTC 2012
    
    
changeset:   23366:240b1de53095
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Tue Sep 25 12:24:06 2012 +0200
    
    tmem: only allow tmem control operations from privileged domains
    
    This is part of XSA-15 / CVE-2012-3497.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    xen-unstable changeset: 25850:0dba5a888655
    xen-unstable date: Tue Sep 11 12:06:30 UTC 2012
    
    
changeset:   23365:6a17d5f11d66
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Sep 20 11:01:04 2012 +0200
    
    x86: Prefer multiboot-provided e820 over bios-provided e801 memory info.
    
    Some UEFI systems do not provide e820 information. In this case we
    should take the detailed memory map provided by a multiboot-capable
    loader, rather than rely on very conservative values from the e801
    bios call. Using the latter on any modern system really hardly makes
    good sense.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    Tested-by: Jonathan Tripathy <jonnyt@xxxxxxxxxxx>
    xen-unstable changeset: 25786:a0b5f8102a00
    xen-unstable date: Tue Aug 28 21:40:45 UTC 2012
    
    
========================================
commit d7d453f51459b591faa96d1c123b5bfff7c5b6b6
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Thu Sep 6 17:05:30 2012 +0100

    Disable qemu monitor by default.  The qemu monitor is an overly
    powerful feature which must be protected from untrusted (guest)
    administrators.
    
    Neither xl nor xend expect qemu to produce this monitor unless it is
    explicitly requested.
    
    This is a security problem, XSA-19.  Previously it was CVE-2007-0998
    in Red Hat but we haven't dealt with it in upstream.  We hope to have
    a new CVE for it here but we don't have one yet.
    
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    (cherry picked from commit bacc0d302445c75f18f4c826750fb5853b60e7ca)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.