xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: xen.org <ian.jackson@eu.citrix.com>
To: xen-devel@lists.xensource.com
Cc: ian.jackson@eu.citrix.com
Subject: [xen-4.1-testing test] 13655: regressions - FAIL
Date: Thu, 6 Sep 2012 11:50:33 +0100	[thread overview]
Message-ID: <osstest-13655-mainreport@xen.org> (raw)

flight 13655 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/13655/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-pvops             4 kernel-build     fail in 13651 REGR. vs. 13646

Tests which are failing intermittently (not blocking):
 test-amd64-i386-qemuu-rhel6hvm-amd  7 redhat-install        fail pass in 13651

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-pcipt-intel  8 debian-fixup                fail like 13646
 test-amd64-amd64-xl-sedf      5 xen-boot                     fail   like 13646

Tests which did not succeed, but are not blocking:
 test-amd64-i386-rhel6hvm-amd 11 leak-check/check             fail   never pass
 test-amd64-i386-rhel6hvm-intel 11 leak-check/check             fail never pass
 test-amd64-i386-qemuu-rhel6hvm-intel 11 leak-check/check       fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-i386-i386-xl-winxpsp3   13 guest-stop                   fail   never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-i386-i386-xl-win        13 guest-stop                   fail   never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-i386-i386-xl-qemuu-winxpsp3 13 guest-stop                 fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-pcipt-intel  1 xen-build-check(1)     blocked in 13651 n/a
 test-amd64-amd64-xl-sedf-pin  1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-pv           1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl           1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl-sedf      1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-pair         1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl-qemuu-winxpsp3  1 xen-build-check(1)  blocked in 13651 n/a
 test-amd64-i386-qemuu-rhel6hvm-amd 11 leak-check/check fail in 13651 never pass
 test-amd64-amd64-xl-win7-amd64  1 xen-build-check(1)      blocked in 13651 n/a
 test-amd64-amd64-xl-qemuu-win7-amd64 1 xen-build-check(1) blocked in 13651 n/a
 test-amd64-amd64-win          1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl-win       1 xen-build-check(1)        blocked in 13651 n/a
 test-amd64-amd64-xl-winxpsp3  1 xen-build-check(1)        blocked in 13651 n/a

version targeted for testing:
 xen                  3e4782f17f5c
baseline version:
 xen                  d28a9ba889c0

------------------------------------------------------------
People who touched revisions under test:
  Ian Campbell <ian.campbell@citrix.com>
  Jan Beulich <jbeulich@suse.com>
  Keir Fraser <keir@xen.org>
  Tim Deegan <tim@xen.org>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-i386-i386-xl                                            pass    
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-i386-qemuu-rhel6hvm-amd                           fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               fail    
 test-amd64-i386-qemuu-rhel6hvm-intel                         fail    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-i386-i386-xl-qemuu-winxpsp3                             fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-i386-i386-xl-winxpsp3                                   fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23353:3e4782f17f5c
tag:         tip
user:        Ian Jackson <Ian.Jackson@eu.citrix.com>
date:        Wed Sep 05 12:40:10 2012 +0100
    
    QEMU_TAG update (XSA-17 / CVE-2012-3515)
    
    
changeset:   23352:936f63ee4dad
user:        Ian Jackson <Ian.Jackson@eu.citrix.com>
date:        Wed Sep 05 12:29:56 2012 +0100
    
    x86/pvhvm: properly range-check PHYSDEVOP_map_pirq/MAP_PIRQ_TYPE_GSI
    
    This is being used as a array index, and hence must be validated before
    use.
    
    This is XSA-16 / CVE-2012-3498.
    
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    
    
changeset:   23351:8ebda5388e4e
user:        Ian Jackson <Ian.Jackson@eu.citrix.com>
date:        Wed Sep 05 12:29:05 2012 +0100
    
    xen: Don't BUG_ON() PoD operations on a non-translated guest.
    
    This is XSA-14 / CVE-2012-3496
    
    Signed-off-by: Tim Deegan <tim@xen.org>
    Reviewed-by: Ian Campbell <ian.campbell@citrix.com>
    Tested-by: Ian Campbell <ian.campbell@citrix.com>
    
    
changeset:   23350:6779ddca8593
user:        Ian Jackson <Ian.Jackson@eu.citrix.com>
date:        Wed Sep 05 12:28:17 2012 +0100
    
    xen: handle out-of-pirq condition correctly in PHYSDEVOP_get_free_pirq
    
    This is XSA-13 / CVE-2012-3495
    
    Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
    Signed-off-by: Jan Beulich <JBeulich@suse.com>
    
    
changeset:   23349:bcc340292731
user:        Ian Jackson <Ian.Jackson@eu.citrix.com>
date:        Wed Sep 05 12:27:54 2012 +0100
    
    xen: prevent a 64 bit guest setting reserved bits in DR7
    
    The upper 32 bits of this register are reserved and should be written as
    zero.
    
    This is XSA-12 / CVE-2012-3494
    
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Ian Campbell <ian.campbell@citrix.com>
    
    
changeset:   23348:d28a9ba889c0
user:        Jan Beulich <jbeulich@suse.com>
date:        Tue Sep 04 14:56:48 2012 +0200
    
    make all (native) hypercalls consistently have "long" return type
    
    for common and x86 ones at least, to address the problem of storing
    zero-extended values into the multicall result field otherwise.
    
    Reported-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Acked-by: Keir Fraser <keir@xen.org>
    xen-unstable changeset: 25744:47080c965937
    xen-unstable date: Fri Aug 10 07:51:01 UTC 2012
    
    
(qemu changes not included)

                 reply	other threads:[~2012-09-06 10:50 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=osstest-13655-mainreport@xen.org \
    --to=ian.jackson@eu.citrix.com \
    --cc=xen-devel@lists.xensource.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).