From: osstest service owner <osstest-admin@xenproject.org>
To: xen-devel@lists.xensource.com, osstest-admin@xenproject.org
Subject: [xen-4.3-testing test] 77074: regressions - FAIL
Date: Wed, 06 Jan 2016 02:03:04 +0000 [thread overview]
Message-ID: <osstest-77074-mainreport@xen.org> (raw)
flight 77074 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/77074/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-build fail REGR. vs. 65650
build-amd64-prev 5 xen-build fail REGR. vs. 65650
build-i386 5 xen-build fail REGR. vs. 65650
build-i386-prev 5 xen-build fail REGR. vs. 65650
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt-vhd 1 build-check(1) blocked n/a
test-amd64-amd64-rumpuserxen-amd64 1 build-check(1) blocked n/a
test-amd64-i386-freebsd10-amd64 1 build-check(1) blocked n/a
build-i386-libvirt 1 build-check(1) blocked n/a
build-i386-rumpuserxen 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-ovmf-amd64 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-win7-amd64 1 build-check(1) blocked n/a
test-amd64-i386-qemut-rhel6hvm-intel 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-debianhvm-amd64 1 build-check(1) blocked n/a
test-amd64-i386-freebsd10-i386 1 build-check(1) blocked n/a
test-amd64-i386-qemuu-rhel6hvm-amd 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 1 build-check(1) blocked n/a
test-amd64-i386-pv 1 build-check(1) blocked n/a
test-amd64-i386-qemuu-rhel6hvm-intel 1 build-check(1) blocked n/a
test-amd64-i386-migrupgrade 1 build-check(1) blocked n/a
test-amd64-i386-pair 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemut-win7-amd64 1 build-check(1) blocked n/a
test-amd64-i386-qemut-rhel6hvm-amd 1 build-check(1) blocked n/a
test-amd64-i386-xl 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 1 build-check(1) blocked n/a
test-amd64-i386-xl-qemut-debianhvm-amd64 1 build-check(1) blocked n/a
test-amd64-i386-xend-qemut-winxpsp3 1 build-check(1) blocked n/a
test-amd64-amd64-pv 1 build-check(1) blocked n/a
test-amd64-amd64-migrupgrade 1 build-check(1) blocked n/a
build-amd64-libvirt 1 build-check(1) blocked n/a
build-amd64-rumpuserxen 1 build-check(1) blocked n/a
test-amd64-amd64-pair 1 build-check(1) blocked n/a
test-amd64-amd64-pygrub 1 build-check(1) blocked n/a
test-amd64-amd64-i386-pvgrub 1 build-check(1) blocked n/a
test-amd64-i386-libvirt 1 build-check(1) blocked n/a
test-amd64-i386-rumpuserxen-i386 1 build-check(1) blocked n/a
test-amd64-i386-xl-raw 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-debianhvm-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qcow2 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-win7-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-xl-credit2 1 build-check(1) blocked n/a
test-amd64-amd64-xl-multivcpu 1 build-check(1) blocked n/a
test-amd64-amd64-xl 1 build-check(1) blocked n/a
test-amd64-amd64-amd64-pvgrub 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-ovmf-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-win7-amd64 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemuu-winxpsp3 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-winxpsp3 1 build-check(1) blocked n/a
test-amd64-amd64-xl-qemut-debianhvm-amd64 1 build-check(1) blocked n/a
test-armhf-armhf-xl-arndale 6 xen-boot fail never pass
test-armhf-armhf-xl-multivcpu 6 xen-boot fail never pass
test-armhf-armhf-xl 6 xen-boot fail never pass
test-armhf-armhf-xl-vhd 6 xen-boot fail never pass
test-armhf-armhf-libvirt 6 xen-boot fail never pass
test-armhf-armhf-libvirt-raw 6 xen-boot fail never pass
test-armhf-armhf-xl-credit2 6 xen-boot fail never pass
test-armhf-armhf-xl-cubietruck 6 xen-boot fail never pass
test-armhf-armhf-libvirt-qcow2 6 xen-boot fail never pass
version targeted for testing:
xen 0fe03d7ed26d41e9434fb007d6fe4d05077efa7d
baseline version:
xen 54dd84062d4e0f0298508826fc06990415da431e
Last test of basis 65650 2015-12-10 03:50:48 Z 26 days
Failing since 66463 2015-12-17 13:41:33 Z 19 days 8 attempts
Testing same since 77074 2016-01-05 00:52:37 Z 1 days 1 attempts
------------------------------------------------------------
People who touched revisions under test:
Ian Campbell <ian.campbell@citrix.com>
Ian Jackson <ian.jackson@eu.citrix.com>
Jan Beulich <jbeulich@suse.com>
Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Stefano Stabellini <stefano.stabellini@eu.citrix.com>
jobs:
build-amd64 fail
build-armhf pass
build-i386 fail
build-amd64-libvirt blocked
build-armhf-libvirt pass
build-i386-libvirt blocked
build-amd64-prev fail
build-i386-prev fail
build-amd64-pvops pass
build-armhf-pvops pass
build-i386-pvops pass
build-amd64-rumpuserxen blocked
build-i386-rumpuserxen blocked
test-amd64-amd64-xl blocked
test-armhf-armhf-xl fail
test-amd64-i386-xl blocked
test-amd64-i386-qemut-rhel6hvm-amd blocked
test-amd64-i386-qemuu-rhel6hvm-amd blocked
test-amd64-amd64-xl-qemut-debianhvm-amd64 blocked
test-amd64-i386-xl-qemut-debianhvm-amd64 blocked
test-amd64-amd64-xl-qemuu-debianhvm-amd64 blocked
test-amd64-i386-xl-qemuu-debianhvm-amd64 blocked
test-amd64-i386-freebsd10-amd64 blocked
test-amd64-amd64-xl-qemuu-ovmf-amd64 blocked
test-amd64-i386-xl-qemuu-ovmf-amd64 blocked
test-amd64-amd64-rumpuserxen-amd64 blocked
test-amd64-amd64-xl-qemut-win7-amd64 blocked
test-amd64-i386-xl-qemut-win7-amd64 blocked
test-amd64-amd64-xl-qemuu-win7-amd64 blocked
test-amd64-i386-xl-qemuu-win7-amd64 blocked
test-armhf-armhf-xl-arndale fail
test-amd64-amd64-xl-credit2 blocked
test-armhf-armhf-xl-credit2 fail
test-armhf-armhf-xl-cubietruck fail
test-amd64-i386-freebsd10-i386 blocked
test-amd64-i386-rumpuserxen-i386 blocked
test-amd64-i386-qemut-rhel6hvm-intel blocked
test-amd64-i386-qemuu-rhel6hvm-intel blocked
test-amd64-amd64-libvirt blocked
test-armhf-armhf-libvirt fail
test-amd64-i386-libvirt blocked
test-amd64-amd64-migrupgrade blocked
test-amd64-i386-migrupgrade blocked
test-amd64-amd64-xl-multivcpu blocked
test-armhf-armhf-xl-multivcpu fail
test-amd64-amd64-pair blocked
test-amd64-i386-pair blocked
test-amd64-amd64-pv blocked
test-amd64-i386-pv blocked
test-amd64-amd64-amd64-pvgrub blocked
test-amd64-amd64-i386-pvgrub blocked
test-amd64-amd64-pygrub blocked
test-armhf-armhf-libvirt-qcow2 fail
test-amd64-amd64-xl-qcow2 blocked
test-armhf-armhf-libvirt-raw fail
test-amd64-i386-xl-raw blocked
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 blocked
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 blocked
test-amd64-amd64-libvirt-vhd blocked
test-armhf-armhf-xl-vhd fail
test-amd64-i386-xend-qemut-winxpsp3 blocked
test-amd64-amd64-xl-qemut-winxpsp3 blocked
test-amd64-amd64-xl-qemuu-winxpsp3 blocked
------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images
Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs
Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master
Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 0fe03d7ed26d41e9434fb007d6fe4d05077efa7d
Author: Ian Jackson <ian.jackson@eu.citrix.com>
Date: Mon Jan 4 15:36:53 2016 +0000
QEMU_TAG update
commit 0574a773238f0ecce3873dc525082f6e16ac655b
Author: Ian Jackson <ian.jackson@eu.citrix.com>
Date: Fri Dec 18 14:59:01 2015 +0000
QEMU_TAG update
commit 83349eede062fc636f89657628a772438012673a
Author: Jan Beulich <jbeulich@suse.com>
Date: Thu Dec 17 14:33:22 2015 +0100
x86/HVM: avoid reading ioreq state more than once
Otherwise, especially when the compiler chooses to translate the
switch() to a jump table, unpredictable behavior (and in the jump table
case arbitrary code execution) can result.
This is XSA-166.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
master commit: b452430a4cdfc801fa4bc391aed7522365e1deb6
master date: 2015-12-17 14:22:46 +0100
commit f5119912e9a5f888273306ff6b462d6fd1f7a6bd
Author: Jan Beulich <jbeulich@suse.com>
Date: Thu Dec 17 14:32:56 2015 +0100
x86: don't leak ST(n)/XMMn values to domains first using them
FNINIT doesn't alter these registers, and hence using it is
insufficient to initialize a guest's initial state.
This is CVE-2015-8555 / XSA-165.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 81818b3f277544535974204f8d840da86fa8a44f
master date: 2015-12-17 14:22:13 +0100
========================================
commit b96625e17169a7958575c2fb41499bb9ea2c212e
Author: Jan Beulich <jbeulich@suse.com>
Date: Mon Jan 4 15:34:29 2016 +0000
MSI-X: avoid array overrun upon MSI-X table writes
pt_msix_init() allocates msix->msix_entry[] to just cover
msix->total_entries entries. While pci_msix_readl() resorts to reading
physical memory for out of bounds reads, pci_msix_writel() so far
simply accessed/corrupted unrelated memory.
pt_iomem_map()'s call to cpu_register_physical_memory() registers a
page granular region, which is necessary as the Pending Bit Array may
share space with the MSI-X table (but nothing else is allowed to). This
also explains why pci_msix_readl() actually honors out of bounds reads,
but pci_msi_writel() doesn't need to.
This is XSA-164.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
(cherry picked from commit 569eac99e8ddccd15fe78e8a3af5622afe780e3b)
(cherry picked from commit 7457f4beae2583a106a4176949514e81248fc22d)
(cherry picked from commit f5bf3ed6eaa752d91e4d1fb1675b4c3e9f984c71)
(cherry picked from commit 2bbe49494f5e910c6fb49f6800d143cae9eb5758)
commit 95872ff9713292f1c859c093feae0a2eaff8f810
Author: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Date: Fri Nov 20 10:56:00 2015 -0500
blkif: Avoid double access to src->nr_segments
src is stored in shared memory and src->nr_segments is dereferenced
twice at the end of the function. If a compiler decides to compile this
into two separate memory accesses then the size limitation could be
bypassed.
Fix it by removing the double access to src->nr_segments.
This is part of XSA-155.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
commit 806a941fb5c68f0b25f209b92553acb298d30c04
Author: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Date: Fri Nov 20 10:37:08 2015 -0500
xenfb: avoid reading twice the same fields from the shared page
Reading twice the same field could give the guest an attack of
opportunity. In the case of event->type, gcc could compile the switch
statement into a jump table, effectively ending up reading the type
field multiple times.
This is part of XSA-155.
Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
reply other threads:[~2016-01-06 2:03 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=osstest-77074-mainreport@xen.org \
--to=osstest-admin@xenproject.org \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.