[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 19811: regressions - trouble: blocked/broken/fail/pass
flight 19811 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/19811/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xend-qemut-winxpsp3 3 host-install(3) broken REGR. vs. 19794 build-armhf-pvops 4 kernel-build fail REGR. vs. 19794 Tests which did not succeed, but are not blocking: test-armhf-armhf-xl 1 xen-build-check(1) blocked n/a test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass version targeted for testing: xen 7099bd90e1b84cb6a0143835ba050a445161715d baseline version: xen 5fc2176d9b3c5988c041fa5926fdd2da2ad560b9 ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Matthew Daley <mattjd@xxxxxxxxx> Tim Deegan <tim@xxxxxxx> Zhu Yanhai <gaoyang.zyh@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops fail build-i386-pvops pass test-amd64-amd64-xl pass test-armhf-armhf-xl blocked test-amd64-i386-xl pass test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-amd64-amd64-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-i386-xend-qemut-winxpsp3 broken test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xend-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 7099bd90e1b84cb6a0143835ba050a445161715d Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed Sep 25 18:13:06 2013 +0200 Revert "fix DOMID_IO mapping permission checks" This reverts commit 145ae98bfab8280744ad5e800cc036e1c84c0486. commit e435ac69be3ac47eff648cbf29c4920f7f1e7450 Author: Zhu Yanhai <gaoyang.zyh@xxxxxxxxxx> Date: Mon Sep 23 18:02:33 2013 +0800 xm-test: add a missing %s Obviously we need a %s here. Signed-off-by: Zhu Yanhai <gaoyang.zyh@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit f220279c14f5bcbaeb520c4f2498f25d795213e6 Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:56 2013 +1200 xenstore: check socket path length before copying it Coverity-ID: 1055997 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 07fa854a43bfb52fb4abfe7865ef1fb0467bdba7 Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:55 2013 +1200 xenstored: fix faulty check for bad handle in domain_init Coverity-ID: 1054975 Coverity-ID: 1055196 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit b865bda00f7cf5b0703e3d23ca22c8d1f607a1dd Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:54 2013 +1200 xenstored: handle unlikely failure better in ask_parents Coverity-ID: 1055277 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 1a0f10a8c8673ed62c7b0cff8f8de5b97c402b7d Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:52 2013 +1200 libxl: fix file open failure check in libxl__file_reference_map Coverity-ID: 1055567 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 6b2b15ead2152fd541e2de494f50cf99e63bfb3d Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:51 2013 +1200 libxl: fix typo in libxl__hotplug_nic error checking Coverity-ID: 1055945 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 2e979531e51bafe3dbf9a36546a90176a6bd11e5 Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:50 2013 +1200 libxl: only free console reader if it was allocated in main_dmesg Coverity-ID: 1055304 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 96c0061c0168de4e322b0b869f9c7f3b907b53ce Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:45 2013 +1200 libxl: fix out-of-memory check in parse_global_config Coverity-ID: 1055174 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 2989ef904236c941ed61f587e9ed5e0827e7a81b Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:44 2013 +1200 libxl: fix leak of rune in main_remus Coverity-ID: 1087194 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 7737ecb20c5babff45445d27fff91894b43a2d28 Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:43 2013 +1200 libxl: fix leak of config_data in main_cpupoolcreate Coverity-ID: 1087193 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 12eaa1b4d2ae7b2e8c5f7d820bd9ec0476ead0f7 Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:42 2013 +1200 libxl: fix leak of corename in handle_domain_death Coverity-ID: 1087192 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 736491d1558dc97be4b8fac8957f3b5c7c0254f6 Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:41 2013 +1200 libxl: fix dispose without init of disk in cd_insert Coverity-ID: 1056078 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit b0be2b126ea75a83a3778b4e1710d248f92cf528 Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:40 2013 +1200 libxl: fix libxl_string_list_length and its only caller The wrong amount of indirections were being taken in libxl_string_list_length, and its only caller was miscounting the amount of initial non-list arguments, seemingly since the initial commit (599c784). This has been seen and reported in the wild (##xen): < Trixboxer> Hi, any idea why would I get < Trixboxer> xl: libxl_bootloader.c:42: bootloader_arg: Assertion `bl->nargs < bl->argsspace' failed. < Trixboxer> 4.2.2-23.el6 Coverity-ID: 1054954 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 3b8782d95d03b40bfa255b61b224eeef614f09d2 Author: Matthew Daley <mattjd@xxxxxxxxx> Date: Wed Sep 18 15:37:38 2013 +1200 libxc: fix memory leak in load_p2m_frame_list error handling Coverity-ID: 1055885 Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 145ae98bfab8280744ad5e800cc036e1c84c0486 Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Date: Wed Sep 25 10:48:20 2013 +0200 fix DOMID_IO mapping permission checks When the permission checks for memory mapping were moved from get_pg_owner to xsm_mmu_update in aaba7a677, the exception for DOMID_IO was not taken into account. This will cause IO memory mappings by PV domains (mini-os in particular) to fail when XSM/FLASK is not being used. This patch reintroduces the exception for DOMID_IO; the actual restrictions on IO memory mappings have always been checked separately using iomem_access_permitted, so this change should not break existing access control. Reported-by: Eduardo Peixoto Macedo <epm@xxxxxxxxxxx> Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> commit ae7c6b64c063a755097806e30dc24b94fabbda09 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Sep 25 10:45:53 2013 +0200 x86/hap: Remove bogus assertion in hap_free_p2m_page() Coverity ID: 1055622 Coverity correctly points out that this ASSERT() is unconditionally true as an unsigned integer is always >= 0. Judging from the shadow counterpart and p2m callsites, there is nothing invalid about freeing the final p2m page. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> commit 688eeb878cc58150bf6e729c9c1836b8c1e4cc8f Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Sep 25 10:44:21 2013 +0200 ns16550: Use correct #define symbol for HAS_IOPORTS CID 1091471, Regression caused by 7c1de0038895cbc75ebd0caffc5b0f3f03c5ad51 This appears to be a typo which causes check_existence() to unconditionally return 1 in all cases. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> commit 63a75ba0de817d6f384f96d25427a05c313e2179 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed Sep 25 10:41:25 2013 +0200 x86/xsave: initialize extended register state when guests enable it Till now, when setting previously unset bits in XCR0 we wouldn't touch the active register state, thus leaving in the newly enabled registers whatever a prior user of it left there, i.e. potentially leaking information between guests. This is CVE-2013-1442 / XSA-62. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |