[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 19828: regressions - FAIL



flight 19828 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/19828/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-pvops             4 kernel-build              fail REGR. vs. 19794

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl           1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check        fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop         fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop              fail never pass

version targeted for testing:
 xen                  ec206e8ee4833c87746b0ef1e2e7ceeddc53e5f7
baseline version:
 xen                  5fc2176d9b3c5988c041fa5926fdd2da2ad560b9

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Matthew Daley <mattjd@xxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Zhu Yanhai <gaoyang.zyh@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            fail    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit ec206e8ee4833c87746b0ef1e2e7ceeddc53e5f7
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Sep 26 10:23:39 2013 +0200

    x86: fix compat guest handling of XENPF_enter_acpi_sleep
    
    Rather than blindly defining the native name to the compat one, when
    we want to pass the compat structure to a native function we ought to
    verify that their layouts match. With a respective xlat.lst entry
    there's then also no need anymore to do such aliasing.
    
    While cleaaning up that file I also noticed that the Cx and Px
    interface handling here has quite a few unnecessary #define-s - delete
    them.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

commit 07344c0f33be13bf9232a113681ef9087557f706
Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Date:   Thu Sep 26 10:15:47 2013 +0200

    fix DOMID_IO mapping permission checks (try 2)
    
    When the permission checks for memory mapping were moved from
    get_pg_owner to xsm_mmu_update in aaba7a677, the exception for DOMID_IO
    was not taken into account. This will cause IO memory mappings by PV
    domains (mini-os in particular) to fail when XSM/FLASK is not being
    used. This patch reintroduces the exception for DOMID_IO; the actual
    restrictions on IO memory mappings have always been checked separately
    using iomem_access_permitted, so this change should not break existing
    access control.
    
    Reported-by: Eduardo Peixoto Macedo <epm@xxxxxxxxxxx>
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>

commit f12c1f0b09205cdf18a2c4a615fdc3e7357ce704
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Thu Sep 26 10:14:51 2013 +0200

    x86/crash: Indicate how well nmi_shootdown_cpus() managed to do
    
    Having nmi_shootdown_cpus() report which pcpus failed to be shot down is a
    useful debugging hint as to what possibly went wrong (especially when the
    crash logs seem to indicate that an NMI timeout occurred while waiting for 
one
    of the problematic pcpus to perform an action).
    
    This is achieved by swapping an atomic_t count of unreported pcpus with a
    cpumask.  In the case that the 1 second timeout occurs, use the cpumask to
    identify the problematic pcpus.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit 573fd5bd2d8bd068a6cea7ae5fcc58b962d43a78
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Thu Sep 26 10:11:00 2013 +0200

    x86: fix rdrand asm()
    
    Just learned the hard way that at least for non-volatile asm()s gcc
    indeed does what the documentation says: It may move it across jumps
    (i.e. ahead of the cpu_has() check). While the documentation claims
    that this can also happen for volatile asm()s, if that was the case
    we'd have many more problems in our code (and e,g, Linux would too).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>

commit 7099bd90e1b84cb6a0143835ba050a445161715d
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Sep 25 18:13:06 2013 +0200

    Revert "fix DOMID_IO mapping permission checks"
    
    This reverts commit 145ae98bfab8280744ad5e800cc036e1c84c0486.

commit e435ac69be3ac47eff648cbf29c4920f7f1e7450
Author: Zhu Yanhai <gaoyang.zyh@xxxxxxxxxx>
Date:   Mon Sep 23 18:02:33 2013 +0800

    xm-test: add a missing %s
    
    Obviously we need a %s here.
    
    Signed-off-by: Zhu Yanhai <gaoyang.zyh@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit f220279c14f5bcbaeb520c4f2498f25d795213e6
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:56 2013 +1200

    xenstore: check socket path length before copying it
    
    Coverity-ID: 1055997
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 07fa854a43bfb52fb4abfe7865ef1fb0467bdba7
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:55 2013 +1200

    xenstored: fix faulty check for bad handle in domain_init
    
    Coverity-ID: 1054975
    Coverity-ID: 1055196
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit b865bda00f7cf5b0703e3d23ca22c8d1f607a1dd
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:54 2013 +1200

    xenstored: handle unlikely failure better in ask_parents
    
    Coverity-ID: 1055277
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 1a0f10a8c8673ed62c7b0cff8f8de5b97c402b7d
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:52 2013 +1200

    libxl: fix file open failure check in libxl__file_reference_map
    
    Coverity-ID: 1055567
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 6b2b15ead2152fd541e2de494f50cf99e63bfb3d
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:51 2013 +1200

    libxl: fix typo in libxl__hotplug_nic error checking
    
    Coverity-ID: 1055945
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 2e979531e51bafe3dbf9a36546a90176a6bd11e5
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:50 2013 +1200

    libxl: only free console reader if it was allocated in main_dmesg
    
    Coverity-ID: 1055304
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 96c0061c0168de4e322b0b869f9c7f3b907b53ce
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:45 2013 +1200

    libxl: fix out-of-memory check in parse_global_config
    
    Coverity-ID: 1055174
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 2989ef904236c941ed61f587e9ed5e0827e7a81b
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:44 2013 +1200

    libxl: fix leak of rune in main_remus
    
    Coverity-ID: 1087194
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 7737ecb20c5babff45445d27fff91894b43a2d28
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:43 2013 +1200

    libxl: fix leak of config_data in main_cpupoolcreate
    
    Coverity-ID: 1087193
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 12eaa1b4d2ae7b2e8c5f7d820bd9ec0476ead0f7
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:42 2013 +1200

    libxl: fix leak of corename in handle_domain_death
    
    Coverity-ID: 1087192
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 736491d1558dc97be4b8fac8957f3b5c7c0254f6
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:41 2013 +1200

    libxl: fix dispose without init of disk in cd_insert
    
    Coverity-ID: 1056078
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit b0be2b126ea75a83a3778b4e1710d248f92cf528
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:40 2013 +1200

    libxl: fix libxl_string_list_length and its only caller
    
    The wrong amount of indirections were being taken in
    libxl_string_list_length, and its only caller was miscounting the amount
    of initial non-list arguments, seemingly since the initial commit
    (599c784).
    
    This has been seen and reported in the wild (##xen):
    < Trixboxer> Hi, any idea why would I get
    < Trixboxer> xl: libxl_bootloader.c:42: bootloader_arg: Assertion 
`bl->nargs < bl->argsspace' failed.
    < Trixboxer> 4.2.2-23.el6
    
    Coverity-ID: 1054954
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 3b8782d95d03b40bfa255b61b224eeef614f09d2
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:38 2013 +1200

    libxc: fix memory leak in load_p2m_frame_list error handling
    
    Coverity-ID: 1055885
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 145ae98bfab8280744ad5e800cc036e1c84c0486
Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Date:   Wed Sep 25 10:48:20 2013 +0200

    fix DOMID_IO mapping permission checks
    
    When the permission checks for memory mapping were moved from
    get_pg_owner to xsm_mmu_update in aaba7a677, the exception for DOMID_IO
    was not taken into account. This will cause IO memory mappings by PV
    domains (mini-os in particular) to fail when XSM/FLASK is not being
    used. This patch reintroduces the exception for DOMID_IO; the actual
    restrictions on IO memory mappings have always been checked separately
    using iomem_access_permitted, so this change should not break existing
    access control.
    
    Reported-by: Eduardo Peixoto Macedo <epm@xxxxxxxxxxx>
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>

commit ae7c6b64c063a755097806e30dc24b94fabbda09
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Sep 25 10:45:53 2013 +0200

    x86/hap: Remove bogus assertion in hap_free_p2m_page()
    
    Coverity ID: 1055622
    
    Coverity correctly points out that this ASSERT() is unconditionally true as 
an
    unsigned integer is always >= 0.
    
    Judging from the shadow counterpart and p2m callsites, there is nothing
    invalid about freeing the final p2m page.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>

commit 688eeb878cc58150bf6e729c9c1836b8c1e4cc8f
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Sep 25 10:44:21 2013 +0200

    ns16550: Use correct #define symbol for HAS_IOPORTS
    
    CID 1091471, Regression caused by 7c1de0038895cbc75ebd0caffc5b0f3f03c5ad51
    
    This appears to be a typo which causes check_existence() to unconditionally
    return 1 in all cases.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 63a75ba0de817d6f384f96d25427a05c313e2179
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Sep 25 10:41:25 2013 +0200

    x86/xsave: initialize extended register state when guests enable it
    
    Till now, when setting previously unset bits in XCR0 we wouldn't touch
    the active register state, thus leaving in the newly enabled registers
    whatever a prior user of it left there, i.e. potentially leaking
    information between guests.
    
    This is CVE-2013-1442 / XSA-62.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.