[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-unstable test] 29765: regressions - FAIL
flight 29765 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/29765/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf 5 xen-build fail REGR. vs. 29680 build-armhf-pvops 5 kernel-build fail REGR. vs. 29680 test-amd64-amd64-xl-qemuu-ovmf-amd64 17 leak-check/check fail in 29691 REGR. vs. 29680 Tests which are failing intermittently (not blocking): test-amd64-i386-xl 19 leak-check/check fail pass in 29743 test-amd64-amd64-xl 19 leak-check/check fail pass in 29724 test-amd64-amd64-xl-sedf-pin 19 leak-check/check fail pass in 29724 test-amd64-i386-freebsd10-i386 18 leak-check/check fail pass in 29743 test-amd64-amd64-xl-qemuu-debianhvm-amd64 17 leak-check/check fail pass in 29743 test-amd64-amd64-xl-qemuu-ovmf-amd64 7 debian-hvm-install fail pass in 29743 test-amd64-i386-xl-qemuu-win7-amd64 7 windows-install fail pass in 29743 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-localmigrate/x10 fail pass in 29724 test-amd64-amd64-xl-sedf 19 leak-check/check fail in 29743 pass in 29765 test-amd64-i386-xl-multivcpu 19 leak-check/check fail in 29743 pass in 29765 test-amd64-i386-xl-credit2 19 leak-check/check fail in 29743 pass in 29765 test-amd64-i386-xl-qemuu-debianhvm-amd64 17 leak-check/check fail in 29743 pass in 29765 test-amd64-i386-xl-qemuu-ovmf-amd64 13 guest-localmigrate/x10 fail in 29743 pass in 29765 test-amd64-amd64-xl-qemuu-win7-amd64 10 guest-localmigrate fail in 29743 pass in 29765 test-amd64-amd64-xl-qemut-debianhvm-amd64 17 leak-check/check fail in 29743 pass in 29765 test-amd64-amd64-xl-qemuu-ovmf-amd64 13 guest-localmigrate/x10 fail in 29743 pass in 29691 test-amd64-i386-xl-winxpsp3-vcpus1 10 guest-localmigrate fail in 29743 pass in 29765 test-amd64-i386-xl-winxpsp3 13 guest-localmigrate/x10 fail in 29743 pass in 29765 test-amd64-amd64-xl-win7-amd64 7 windows-install fail in 29743 pass in 29765 test-amd64-i386-xl-qemuu-ovmf-amd64 10 guest-localmigrate fail in 29724 pass in 29765 test-amd64-amd64-pair 21 leak-check/check/dst_host fail in 29724 pass in 29765 test-amd64-i386-pair 20 leak-check/check/src_host fail in 29724 pass in 29765 test-amd64-i386-xl-win7-amd64 13 guest-localmigrate/x10 fail in 29724 pass in 29765 test-amd64-amd64-xl-win7-amd64 13 guest-localmigrate/x10 fail in 29724 pass in 29765 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-localmigrate/x10 fail in 29691 pass in 29765 test-amd64-i386-pair 3 host-install/src_host(3) broken in 29691 pass in 29765 test-amd64-i386-pair 4 host-install/dst_host(4) broken in 29691 pass in 29765 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-localmigrate/x10 fail in 29691 pass in 29765 test-amd64-i386-xl-win7-amd64 10 guest-localmigrate fail in 29691 pass in 29765 test-amd64-i386-xl-qemuu-win7-amd64 13 guest-localmigrate/x10 fail in 29691 pass in 29743 Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 1 build-check(1) blocked n/a test-armhf-armhf-xl 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 9 guest-start fail never pass test-amd64-i386-libvirt 9 guest-start fail never pass test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass test-amd64-i386-xl-qemut-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-i386-xl-qemuu-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop fail never pass build-armhf-libvirt 1 build-check(1) blocked n/a test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop fail never pass test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop fail never pass test-amd64-amd64-xl-winxpsp3 14 guest-stop fail never pass test-amd64-i386-xl-win7-amd64 14 guest-stop fail never pass test-amd64-i386-xl-winxpsp3-vcpus1 14 guest-stop fail never pass test-amd64-i386-xl-winxpsp3 14 guest-stop fail never pass test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop fail never pass test-amd64-amd64-xl-win7-amd64 14 guest-stop fail never pass test-amd64-i386-xl-qemuu-win7-amd64 14 guest-stop fail in 29743 never pass test-armhf-armhf-libvirt 9 guest-start fail in 29724 never pass test-armhf-armhf-xl 10 migrate-support-check fail in 29724 never pass test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop fail in 29724 never pass version targeted for testing: xen f2ae8bfa498831ee6343d672066b898d3cd73892 baseline version: xen f093fcf90f420b18429dcbc6c91f9393171634ce ------------------------------------------------------------ People who touched revisions under test: Ian Campbell <ian.campbell@xxxxxxxxxx> Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Julien Grall <julien.grall@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf fail build-i386 pass build-amd64-libvirt pass build-armhf-libvirt blocked build-i386-libvirt pass build-amd64-oldkern pass build-i386-oldkern pass build-amd64-pvops pass build-armhf-pvops fail build-i386-pvops pass build-amd64-rumpuserxen pass build-i386-rumpuserxen pass test-amd64-amd64-xl fail test-armhf-armhf-xl blocked test-amd64-i386-xl fail test-amd64-i386-rhel6hvm-amd pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 fail test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 fail test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-rumpuserxen-amd64 pass test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 fail test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-win7-amd64 fail test-amd64-i386-xl-win7-amd64 fail test-amd64-i386-xl-credit2 pass test-amd64-i386-freebsd10-i386 fail test-amd64-i386-rumpuserxen-i386 pass test-amd64-amd64-xl-pcipt-intel fail test-amd64-i386-rhel6hvm-intel pass test-amd64-i386-qemut-rhel6hvm-intel pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt fail test-armhf-armhf-libvirt blocked test-amd64-i386-libvirt fail test-amd64-i386-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-xl-sedf-pin fail test-amd64-amd64-xl-sedf pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 fail test-amd64-i386-xl-winxpsp3-vcpus1 fail test-amd64-amd64-xl-qemut-winxpsp3 fail test-amd64-i386-xl-qemut-winxpsp3 fail test-amd64-amd64-xl-qemuu-winxpsp3 fail test-amd64-i386-xl-qemuu-winxpsp3 fail test-amd64-amd64-xl-winxpsp3 fail test-amd64-i386-xl-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on osstest.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit f2ae8bfa498831ee6343d672066b898d3cd73892 Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Tue Aug 12 15:38:01 2014 +0200 xen: arm: Correctly handle do_sysreg exception injection from 64-bit userspace The do_sysreg case was missing a return, so it would increment PC and inject the trap to the second instruction of the handler. This is CVE-2014-5148 / XSA-103. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxxxxx> commit c0020e0997024eb741d60de9a480bf2878f891af Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Tue Aug 12 15:37:25 2014 +0200 xen: arm: Handle traps from 32-bit userspace on 64-bit kernel as undef We are not setup to handle these properly. This turns a host crash into a trap to the guest kernel which will likely result in killing the offending process. This is part of CVE-2014-5147 / XSA-102. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxxxxx> commit a98669781769e821413dfef4ef99b93171375610 Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Tue Aug 12 15:36:15 2014 +0200 xen: arm: Correctly handle exception injection from userspace on 64-bit. Firstly we must be prepared to propagate traps from 32-bit userspace even for 64-bit guests, so wrap the existing inject_undef??_exception into inject_undef_exception and use that when injecting an undef exception. The various other exception cases (aborts etc) already do this. Secondly when injecting the trap we must pick the correct exception vector depending on whether the source of the trap was 32-bit EL0, 64-bit EL0 or EL1. This is part of CVE-2014-5147 / XSA-102. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxxxxx> commit fc0cafeab30fe93963457fafbad7a01c7f55ea5f Author: Ian Campbell <ian.campbell@xxxxxxxxxx> Date: Tue Aug 12 15:32:27 2014 +0200 xen: arm: handle AArch32 userspace when dumping 64-bit guest state. A 64-bit guest can still be in 32-bit mode when running userspace, handle this case by dumping the correct 32-bit state. Note that on ARM it is not possible to change mode without the help of the next exception level, hence there is no way a 64-bit guest can be running in 32-bit kernel modes. This is part of CVE-2014-5147 / XSA-102. Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxxxxx> commit 95e6d82224689fdfd967a093a4d69efc24c17e91 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Tue Aug 12 15:30:11 2014 +0200 x86/paging: make log-dirty operations preemptible Both the freeing and the inspection of the bitmap get done in (nested) loops which - besides having a rather high iteration count in general, albeit that would be covered by XSA-77 - have the number of non-trivial iterations they need to perform (indirectly) controllable by both the guest they are for and any domain controlling the guest (including the one running qemu for it). This is CVE-2014-5146 / XSA-97. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Tim Deegan <tim@xxxxxxx> (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |