[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [xen-4.3-testing baseline-only test] 38686: regressions - trouble: blocked/broken/fail/pass
This run is configured for baseline tests only. flight 38686 xen-4.3-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38686/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 3 host-install(3) broken REGR. vs. 38617 test-amd64-amd64-pv 3 host-install(3) broken REGR. vs. 38617 test-amd64-amd64-xl-qcow2 3 host-install(3) broken REGR. vs. 38617 test-amd64-amd64-xl-qemuu-win7-amd64 3 host-install(3) broken REGR. vs. 38617 test-amd64-i386-xl-qemut-win7-amd64 3 host-install(3) broken REGR. vs. 38617 build-i386-rumpuserxen 3 host-install(3) broken REGR. vs. 38617 test-amd64-amd64-xl-multivcpu 3 host-install(3) broken REGR. vs. 38617 test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 38617 build-armhf 5 xen-build fail REGR. vs. 38617 Regressions which are regarded as allowable (not blocking): test-amd64-amd64-libvirt 3 host-install(3) broken REGR. vs. 38617 test-amd64-amd64-xl 19 guest-start/debian.repeat fail like 38617 Tests which did not succeed, but are not blocking: test-amd64-amd64-rumpuserxen-amd64 1 build-check(1) blocked n/a test-amd64-i386-rumpuserxen-i386 1 build-check(1) blocked n/a test-armhf-armhf-xl 1 build-check(1) blocked n/a test-armhf-armhf-libvirt-qcow2 1 build-check(1) blocked n/a test-armhf-armhf-xl-credit2 1 build-check(1) blocked n/a test-armhf-armhf-xl-vhd 1 build-check(1) blocked n/a test-armhf-armhf-xl-midway 1 build-check(1) blocked n/a test-armhf-armhf-libvirt 1 build-check(1) blocked n/a test-armhf-armhf-xl-multivcpu 1 build-check(1) blocked n/a test-armhf-armhf-libvirt-raw 1 build-check(1) blocked n/a build-armhf-libvirt 1 build-check(1) blocked n/a test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail never pass build-amd64-rumpuserxen 6 xen-build fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail never pass test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail never pass test-amd64-i386-xend-qemut-winxpsp3 20 leak-check/check fail never pass version targeted for testing: xen ac0cc84d7bdfc111d47236356e5d06b5681a1dd6 baseline version: xen ae05efd98917223a0e669026baceb7f489755a42 Last test of basis 38617 2016-01-11 05:55:51 Z 12 days Testing same since 38686 2016-01-22 16:35:31 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Ian Campbell <ian.campbell@xxxxxxxxxx> Jan Beulich <jbeulich@xxxxxxxx> Kevin Tian <kevin.tian@xxxxxxxxx> jobs: build-amd64 pass build-armhf fail build-i386 pass build-amd64-libvirt pass build-armhf-libvirt blocked build-i386-libvirt pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass build-amd64-rumpuserxen fail build-i386-rumpuserxen broken test-amd64-amd64-xl fail test-armhf-armhf-xl blocked test-amd64-i386-xl pass test-amd64-i386-qemut-rhel6hvm-amd pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemut-debianhvm-amd64 pass test-amd64-i386-xl-qemut-debianhvm-amd64 pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 broken test-amd64-i386-xl-qemuu-ovmf-amd64 fail test-amd64-amd64-rumpuserxen-amd64 blocked test-amd64-amd64-xl-qemut-win7-amd64 fail test-amd64-i386-xl-qemut-win7-amd64 broken test-amd64-amd64-xl-qemuu-win7-amd64 broken test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-credit2 pass test-armhf-armhf-xl-credit2 blocked test-amd64-i386-freebsd10-i386 pass test-amd64-i386-rumpuserxen-i386 blocked test-amd64-i386-qemut-rhel6hvm-intel broken test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt broken test-armhf-armhf-libvirt blocked test-amd64-i386-libvirt pass test-armhf-armhf-xl-midway blocked test-amd64-amd64-xl-multivcpu broken test-armhf-armhf-xl-multivcpu blocked test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-pv broken test-amd64-i386-pv pass test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub pass test-amd64-amd64-pygrub pass test-armhf-armhf-libvirt-qcow2 blocked test-amd64-amd64-xl-qcow2 broken test-armhf-armhf-libvirt-raw blocked test-amd64-i386-xl-raw pass test-amd64-i386-xl-qemut-winxpsp3-vcpus1 pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-xl-vhd blocked test-amd64-i386-xend-qemut-winxpsp3 fail test-amd64-amd64-xl-qemut-winxpsp3 pass test-amd64-amd64-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xs.citrite.net/~osstest/testlogs/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary broken-step test-amd64-amd64-xl-qemuu-ovmf-amd64 host-install(3) broken-step test-amd64-amd64-libvirt host-install(3) broken-step test-amd64-amd64-pv host-install(3) broken-step test-amd64-amd64-xl-qcow2 host-install(3) broken-step test-amd64-amd64-xl-qemuu-win7-amd64 host-install(3) broken-step test-amd64-i386-xl-qemut-win7-amd64 host-install(3) broken-step build-i386-rumpuserxen host-install(3) broken-step test-amd64-amd64-xl-multivcpu host-install(3) broken-step test-amd64-i386-qemut-rhel6hvm-intel host-install(3) Push not applicable. ------------------------------------------------------------ commit ac0cc84d7bdfc111d47236356e5d06b5681a1dd6 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Date: Wed Jan 20 14:20:57 2016 +0100 x86/vmx: Fix injection of #DB traps following XSA-156 Most #DB exceptions are traps rather than faults, meaning that the instruction pointer in the exception frame points after the instruction rather than at it. However, VMX intercepts all have fault semantics, even when intercepting a trap. Re-injecting an intercepted trap as a fault causes an infinite loop in the guest, by re-executing the same trapping instruction repeatedly. This breaks debugging inside the guest. Introduce a helper which copies VM_EXIT_INTR_INTO to VM_ENTRY_INTR_INFO, and use it to mirror the intercepted interrupt back to the guest. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> master commit: 0747bc8b4d85f3fc0ee1e58418418fa0229e8ff8 master date: 2016-01-05 11:28:56 +0000 commit 93d789e76102bc3ec940292f9c3450b777490931 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed Jan 20 14:12:48 2016 +0100 x86/VMX: prevent INVVPID failure due to non-canonical guest address While INVLPG (and on SVM INVLPGA) don't fault on non-canonical addresses, INVVPID fails (in the "individual address" case) when passed such an address. Since such intercepted INVLPG are effectively no-ops anyway, don't fix this in vmx_invlpg_intercept(), but instead have paging_invlpg() never return true in such a case. This is CVE-2016-1571 / XSA-168. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> master commit: bf05e88ed7342a91cceba050b6c622accb809842 master date: 2016-01-20 13:50:10 +0100 commit 4a47fbb72ed42b6e2d5b0afa1e8265e9b16b4b38 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed Jan 20 14:11:52 2016 +0100 x86/mm: PV superpage handling lacks sanity checks MMUEXT_{,UN}MARK_SUPER fail to check the input MFN for validity before dereferencing pointers into the superpage frame table. Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx> get_superpage() has a similar issue. This is CVE-2016-1570 / XSA-167. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> master commit: 47abf29a9255b2e7b94e56d66b455d0a584b68b8 master date: 2016-01-20 13:49:23 +0100 ======================================== _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |