[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.1-testing test] 13864: trouble: broken/fail/pass
flight 13864 xen-4.1-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/13864/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-pv 3 host-install(3) broken REGR. vs. 13820 test-amd64-i386-xl 3 host-install(3) broken REGR. vs. 13820 test-amd64-i386-xend-winxpsp3 3 host-install(3) broken REGR. vs. 13820 test-i386-i386-xl-win 3 host-install(3) broken REGR. vs. 13820 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-pcipt-intel 8 debian-fixup fail like 13820 test-amd64-amd64-xl-sedf 5 xen-boot fail like 13820 Tests which did not succeed, but are not blocking: test-amd64-i386-rhel6hvm-intel 11 leak-check/check fail never pass test-amd64-i386-qemuu-rhel6hvm-amd 11 leak-check/check fail never pass test-amd64-i386-rhel6hvm-amd 11 leak-check/check fail never pass test-i386-i386-xl-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-i386-qemuu-rhel6hvm-intel 11 leak-check/check fail never pass test-i386-i386-win 16 leak-check/check fail never pass test-amd64-i386-xl-win-vcpus1 13 guest-stop fail never pass test-amd64-i386-win 16 leak-check/check fail never pass test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-win 16 leak-check/check fail never pass test-amd64-amd64-xl-win 13 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass test-i386-i386-xl-qemuu-winxpsp3 13 guest-stop fail never pass version targeted for testing: xen fb0561ba7d9e baseline version: xen 6a17d5f11d66 ------------------------------------------------------------ People who touched revisions under test: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Jonathan Tripathy <jonnyt@xxxxxxxxxxx> Keir Fraser <keir@xxxxxxx> Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl broken test-i386-i386-xl pass test-amd64-i386-rhel6hvm-amd fail test-amd64-i386-qemuu-rhel6hvm-amd fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel fail test-amd64-i386-qemuu-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-i386-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv pass test-amd64-i386-pv broken test-i386-i386-pv pass test-amd64-amd64-xl-sedf fail test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-i386-i386-win fail test-amd64-amd64-xl-win fail test-i386-i386-xl-win broken test-amd64-amd64-xl-qemuu-winxpsp3 fail test-i386-i386-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 broken test-amd64-amd64-xl-winxpsp3 fail test-i386-i386-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 23377:fb0561ba7d9e tag: tip user: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx> date: Tue Sep 25 12:29:29 2012 +0200 tmem: bump pool version to 1 to fix restore issue when tmem enabled Restore fails when tmem is enabled both in hypervisor and guest. This is due to spec version mismatch when restoring a pool. Signed-off-by: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> xen-unstable changeset: 25929:fee83ac77d8c xen-unstable date: Wed Sep 19 15:38:47 UTC 2012 changeset: 23376:0c3286621912 user: Jan Beulich <jbeulich@xxxxxxxx> date: Tue Sep 25 12:28:56 2012 +0200 tmem: cleanup - one more case of checking for a specific rather than any error - drop redundant casts Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> xen-unstable changeset: 25860:e4cb84111610 xen-unstable date: Tue Sep 11 12:19:29 UTC 2012 changeset: 23375:00ff640ebc7b user: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> date: Tue Sep 25 12:28:24 2012 +0200 tmem: fixup 2010 cleanup patch that breaks tmem save/restore 20918:a3fa6d444b25 "Fix domain reference leaks" (in Feb 2010, by Jan) does some cleanup in addition to the leak fixes. Unfortunately, that cleanup inadvertently resulted in an incorrect fallthrough in a switch statement which breaks tmem save/restore. That broken patch was apparently applied to 4.0-testing and 4.1-testing so those are broken as well. What is the process now for requesting back-patches to 4.0 and 4.1? (Side note: This does not by itself entirely fix save/restore in 4.2.) Signed-off-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> xen-unstable changeset: 25859:16e0392c6594 xen-unstable date: Tue Sep 11 12:19:03 UTC 2012 changeset: 23374:5a3829c943ff user: Jan Beulich <jbeulich@xxxxxxxx> date: Tue Sep 25 12:27:50 2012 +0200 tmem: reduce severity of log messages Otherwise they can be used by a guest to spam the hypervisor log with all settings at their defaults. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx> xen-unstable changeset: 25858:0520982a602a xen-unstable date: Tue Sep 11 12:18:36 UTC 2012 changeset: 23373:91bf384afc83 user: Jan Beulich <jbeulich@xxxxxxxx> date: Tue Sep 25 12:27:21 2012 +0200 tmem: properly drop lock on error path in do_tmem_op() Reported-by: Tim Deegan <tim@xxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> xen-unstable changeset: 25857:109ea6a0c23a xen-unstable date: Tue Sep 11 12:18:26 UTC 2012 changeset: 23372:397cac9587fe user: Jan Beulich <jbeulich@xxxxxxxx> date: Tue Sep 25 12:26:57 2012 +0200 tmem: properly drop lock on error path in do_tmem_get() Also remove a bogus assertion. Reported-by: Tim Deegan <tim@xxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> xen-unstable changeset: 25856:83b97a59888b xen-unstable date: Tue Sep 11 12:18:08 UTC 2012 changeset: 23371:2cce0490a260 user: Jan Beulich <jbeulich@xxxxxxxx> date: Tue Sep 25 12:26:29 2012 +0200 tmem: detect arithmetic overflow in tmh_copy_{from,to}_client() This implies adjusting callers to deal with errors other than -EFAULT and removing some comments which would otherwise become stale. Reported-by: Tim Deegan <tim@xxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> xen-unstable changeset: 25855:33b8c42a87ec xen-unstable date: Tue Sep 11 12:17:59 UTC 2012 changeset: 23370:122caf666c0c user: Jan Beulich <jbeulich@xxxxxxxx> date: Tue Sep 25 12:26:06 2012 +0200 tmem: don't access guest memory without using the accessors intended for this This is not permitted, not even for buffers coming from Dom0 (and it would also break the moment Dom0 runs in HVM mode). An implication from the changes here is that tmh_copy_page() can't be used anymore for control operations calling tmh_copy_{from,to}_client() (as those pass the buffer by virtual address rather than MFN). Note that tmemc_save_get_next_page() previously didn't set the returned handle's pool_id field, while the new code does. It need to be confirmed that this is not a problem (otherwise the copy-out operation will require further tmh_...() abstractions to be added). Further note that the patch removes (rather than adjusts) an invalid call to unmap_domain_page() (no matching map_domain_page()) from tmh_compress_from_client() and adds a missing one to an error return path in tmh_copy_from_client(). Finally note that the patch adds a previously missing return statement to cli_get_page() (without which that function could de-reference a NULL pointer, triggerable from guest mode). This is part of XSA-15 / CVE-2012-3497. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> xen-unstable changeset: 25854:ccd60ed6c555 xen-unstable date: Tue Sep 11 12:17:49 UTC 2012 changeset: 23369:8dba0836f71b user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Tue Sep 25 12:25:25 2012 +0200 tmem: check for a valid client ("domain") in the save subops This is part of XSA-15 / CVE-2012-3497. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> xen-unstable changeset: 25853:f53c5aadbba9 xen-unstable date: Tue Sep 11 12:17:27 UTC 2012 changeset: 23368:6f61607a074b user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Tue Sep 25 12:24:57 2012 +0200 tmem: check the pool_id is valid when destroying a tmem pool This is part of XSA-15 / CVE-2012-3497. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> xen-unstable changeset: 25852:d189d99ef00c xen-unstable date: Tue Sep 11 12:06:54 UTC 2012 changeset: 23367:805f0ba5e11b user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Tue Sep 25 12:24:37 2012 +0200 tmem: consistently make pool_id a uint32_t Treating it as an int could allow a malicious guest to provide a negative pool_Id, by passing the MAX_POOLS_PER_DOMAIN limit check and allowing access to the negative offsets of the pool array. This is part of XSA-15 / CVE-2012-3497. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> xen-unstable changeset: 25851:fcf567acc92a xen-unstable date: Tue Sep 11 12:06:43 UTC 2012 changeset: 23366:240b1de53095 user: Ian Campbell <ian.campbell@xxxxxxxxxx> date: Tue Sep 25 12:24:06 2012 +0200 tmem: only allow tmem control operations from privileged domains This is part of XSA-15 / CVE-2012-3497. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> Acked-by: Jan Beulich <jbeulich@xxxxxxxx> xen-unstable changeset: 25850:0dba5a888655 xen-unstable date: Tue Sep 11 12:06:30 UTC 2012 changeset: 23365:6a17d5f11d66 user: Keir Fraser <keir@xxxxxxx> date: Thu Sep 20 11:01:04 2012 +0200 x86: Prefer multiboot-provided e820 over bios-provided e801 memory info. Some UEFI systems do not provide e820 information. In this case we should take the detailed memory map provided by a multiboot-capable loader, rather than rely on very conservative values from the e801 bios call. Using the latter on any modern system really hardly makes good sense. Signed-off-by: Keir Fraser <keir@xxxxxxx> Tested-by: Jonathan Tripathy <jonnyt@xxxxxxxxxxx> xen-unstable changeset: 25786:a0b5f8102a00 xen-unstable date: Tue Aug 28 21:40:45 UTC 2012 ======================================== commit d7d453f51459b591faa96d1c123b5bfff7c5b6b6 Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Date: Thu Sep 6 17:05:30 2012 +0100 Disable qemu monitor by default. The qemu monitor is an overly powerful feature which must be protected from untrusted (guest) administrators. Neither xl nor xend expect qemu to produce this monitor unless it is explicitly requested. This is a security problem, XSA-19. Previously it was CVE-2007-0998 in Red Hat but we haven't dealt with it in upstream. We hope to have a new CVE for it here but we don't have one yet. Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> (cherry picked from commit bacc0d302445c75f18f4c826750fb5853b60e7ca) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |