[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 14392: regressions - FAIL

flight 14392 xen-unstable real [real]

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-pvops              4 kernel-build              fail REGR. vs. 14389

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf-pin 10 guest-saverestore            fail   like 14389
 test-amd64-amd64-xl-sedf      5 xen-boot                     fail   like 14389
 test-amd64-amd64-xl-qemuu-winxpsp3  9 guest-localmigrate       fail like 14389
 test-amd64-amd64-xl-qemuu-win7-amd64  9 guest-localmigrate     fail like 14389

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xl-credit2    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl            1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-multivcpu  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-amd  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 xen-build-check(1)           blocked n/a
 test-amd64-i386-xend-winxpsp3  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-win           1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-win-vcpus1  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-pv            1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-i386-win-vcpus1    1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-rhel6hvm-intel  1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 xen-build-check(1)         blocked n/a
 test-amd64-i386-xl-win7-amd64  1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-i386-pair          1 xen-build-check(1)           blocked  n/a
 test-amd64-i386-xl-winxpsp3-vcpus1  1 xen-build-check(1)           blocked n/a
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass

version targeted for testing:
 xen                  b64a7d868f06
baseline version:
 xen                  8b93ac0c93f3

People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jacek Konieczny <jajcus@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Ronny Hegewald <Ronny.Hegewald@xxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>

 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             fail    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           blocked 
 test-amd64-i386-rhel6hvm-amd                                 blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                blocked 
 test-amd64-i386-xl-credit2                                   blocked 
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-i386-xl-multivcpu                                 blocked 
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-xl-sedf-pin                                 fail    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           blocked 
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-win-vcpus1                                   blocked 
 test-amd64-i386-xl-win-vcpus1                                blocked 
 test-amd64-i386-xl-winxpsp3-vcpus1                           blocked 
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          blocked 
 test-amd64-amd64-xl-win                                      fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                blocked 
 test-amd64-amd64-xl-winxpsp3                                 fail    

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

changeset:   26151:b64a7d868f06
tag:         tip
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Nov 14 11:45:37 2012 +0000
    compat/gnttab: Prevent infinite loop in compat code
    c/s 20281:95ea2052b41b, which introduces Grant Table version 2
    hypercalls introduces a vulnerability whereby the compat hypercall
    handler can fall into an infinite loop.
    If the watchdog is enabled, Xen will die after the timeout.
    This is a security problem, XSA-24 / CVE-2012-4539.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   26150:c7a01b6450e4
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Nov 14 11:42:21 2012 +0000
    xen/mm/shadow: check toplevel pagetables are present before unhooking them.
    If the guest has not fully populated its top-level PAE entries when it calls
    HVMOP_pagetable_dying, the shadow code could try to unhook entries from
    MFN 0.  Add a check to avoid that case.
    This issue was introduced by c/s 21239:b9d2db109cf5.
    This is a security problem, XSA-23 / CVE-2012-4538.
    Signed-off-by: Tim Deegan <tim@xxxxxxx>
    Tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   26149:6b6a4007a609
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Nov 14 11:36:02 2012 +0000
    x86/physmap: Prevent incorrect updates of m2p mappings
    In certain conditions, such as low memory, set_p2m_entry() can fail.
    Currently, the p2m and m2p tables will get out of sync because we still
    update the m2p table after the p2m update has failed.
    If that happens, subsequent guest-invoked memory operations can cause
    BUG()s and ASSERT()s to kill Xen.
    This is fixed by only updating the m2p table iff the p2m was
    successfully updated.
    This is a security problem, XSA-22 / CVE-2012-4537.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   26148:bf58b94b3cef
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Nov 14 11:30:34 2012 +0000
    VCPU/timers: Prevent overflow in calculations, leading to DoS vulnerability
    The timer action for a vcpu periodic timer is to calculate the next
    expiry time, and to reinsert itself into the timer queue.  If the
    deadline ends up in the past, Xen never leaves __do_softirq().  The
    affected PCPU will stay in an infinite loop until Xen is killed by the
    watchdog (if enabled).
    This is a security problem, XSA-20 / CVE-2012-4535.
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
changeset:   26147:3186c04af582
user:        Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
date:        Wed Nov 14 10:24:28 2012 +0000
    xen-tmem-list-parse: fix ugly parse output
    The program xen-tmem-list-parse parses the output of xm/xl tmem-list
    into human-readable format.  A missing NULL terminator sometimes
    causes garbage to be spewed where the two-letter pool type
    should be output.
    Signed-off-by: Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
changeset:   26146:92c52eb4b270
user:        Jacek Konieczny <jajcus@xxxxxxxxxx>
date:        Wed Nov 14 10:24:28 2012 +0000
    hotplug/Linux: Fix locking in tools/hotplug/Linux/locking.sh
    The claim_lock() function would fail in the perl code with:
      Invalid argument at -e line 2.
    because the Perl snippet opens for reading the file descriptor, which
    was earlier opened for write (append).
    Signed-off-by: Jacek Konieczny <jajcus@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
changeset:   26145:8b93ac0c93f3
user:        Ronny Hegewald <ronny.hegewald@xxxxxxxxx>
date:        Tue Nov 13 11:19:17 2012 +0000
    libxl: fix vfb related assertion problem when starting pv-domU
    When a config-file for a pv-domU has a vfb section with a vnc=0
    option then a "xl create" for that domU crashes with the message
    xl: libxl.c:252: libxl_defbool_val: Assertion 
    and the domU hangs early in the start.
    This patch fixes the cause of the assertion and let the domU start
    This problem exists since xen 4.2.
    Signed-off-by: Ronny Hegewald <Ronny.Hegewald@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.