[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable-coverity test] 122088: regressions - ALL FAIL

flight 122088 xen-unstable-coverity real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 coverity-amd64                7 coverity-upload          fail REGR. vs. 121767

version targeted for testing:
 xen                  451004603247205467ec34b366b4cfa3814a5d95
baseline version:
 xen                  913acc1aa019054742217926dea0827e7a9df02e

Last test of basis   121767  2018-04-04 09:39:19 Z    4 days
Testing same since   122088  2018-04-08 09:25:13 Z    0 days    1 attempts

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Petre Pircalabu <ppircalabu@xxxxxxxxxxxxxxx>
  Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  Sergey Dyasli <sergey.dyasli@xxxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

 coverity-amd64                                               fail    

sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at

Explanation of these reports, and of osstest in general, is at

Test harness code can be found at

Not pushing.

commit 451004603247205467ec34b366b4cfa3814a5d95
Author: Sergey Dyasli <sergey.dyasli@xxxxxxxxxx>
Date:   Thu Mar 22 11:32:36 2018 +0000

    x86/cpuid: update signature of hvm_cr4_guest_valid_bits()
    With the new cpuid infrastructure there is a domain-wide struct cpuid
    policy and there is no need to pass a separate struct vcpu * into
    hvm_cr4_guest_valid_bits() anymore. Make the function accept struct
    domain * instead and update callers.
    Signed-off-by: Sergey Dyasli <sergey.dyasli@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx>

commit 9383de210e747f15d0fd10ade89e35d543fbc4e8
Author: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
Date:   Fri Mar 30 18:39:05 2018 +0300

    x86/altp2m: support for setting restrictions for an array of pages
    For the default EPT view we have xc_set_mem_access_multi(), which
    is able to set an array of pages to an array of access rights with
    a single hypercall. However, this functionality was lacking for the
    altp2m subsystem, which could only set page restrictions for one
    page at a time. This patch addresses the gap.
    HVMOP_altp2m_set_mem_access_multi has been added as a HVMOP (as opposed to a
    DOMCTL) for consistency with its HVMOP_altp2m_set_mem_access counterpart 
    hence with the original altp2m design, where domains are allowed - with the
    proper altp2m access rights - to alter these settings), in the absence of an
    official position on the issue from the original altp2m designers.
    Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
    Signed-off-by: Petre Pircalabu <ppircalabu@xxxxxxxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx>

commit 90eff18cc5e16e0749605d88092ecfa4ab126c8f
Author: Wei Liu <wei.liu2@xxxxxxxxxx>
Date:   Wed Apr 4 12:03:14 2018 +0100

    x86/hvm/ioreq: fix two bugs in hvm_create_ioreq_server
    It is possible to call the error path with i pointing beyond the end
    of the array.
    There is another bug that if there is already a default ioreq server,
    the code will actually sets the element to NULL, hence leaking memory.
    Move setting NULL to where it is needed.
    Coverity-ID: 1433777
    Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>
    Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.