From: xen.org <ian.jackson@eu.citrix.com>
To: xen-devel@lists.xensource.com
Cc: ian.jackson@eu.citrix.com
Subject: [xen-4.1-testing test] 13655: regressions - FAIL
Date: Thu, 6 Sep 2012 11:50:33 +0100 [thread overview]
Message-ID: <osstest-13655-mainreport@xen.org> (raw)
flight 13655 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/13655/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 4 kernel-build fail in 13651 REGR. vs. 13646
Tests which are failing intermittently (not blocking):
test-amd64-i386-qemuu-rhel6hvm-amd 7 redhat-install fail pass in 13651
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-pcipt-intel 8 debian-fixup fail like 13646
test-amd64-amd64-xl-sedf 5 xen-boot fail like 13646
Tests which did not succeed, but are not blocking:
test-amd64-i386-rhel6hvm-amd 11 leak-check/check fail never pass
test-amd64-i386-rhel6hvm-intel 11 leak-check/check fail never pass
test-amd64-i386-qemuu-rhel6hvm-intel 11 leak-check/check fail never pass
test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass
test-i386-i386-xl-winxpsp3 13 guest-stop fail never pass
test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass
test-i386-i386-xl-win 13 guest-stop fail never pass
test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass
test-amd64-i386-xl-win-vcpus1 13 guest-stop fail never pass
test-amd64-i386-win 16 leak-check/check fail never pass
test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass
test-i386-i386-win 16 leak-check/check fail never pass
test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-win 16 leak-check/check fail never pass
test-amd64-amd64-xl-win 13 guest-stop fail never pass
test-i386-i386-xl-qemuu-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-pcipt-intel 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-xl-sedf-pin 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-pv 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-xl 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-xl-sedf 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-pair 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-xl-qemuu-winxpsp3 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-i386-qemuu-rhel6hvm-amd 11 leak-check/check fail in 13651 never pass
test-amd64-amd64-xl-win7-amd64 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-xl-qemuu-win7-amd64 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-win 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-xl-win 1 xen-build-check(1) blocked in 13651 n/a
test-amd64-amd64-xl-winxpsp3 1 xen-build-check(1) blocked in 13651 n/a
version targeted for testing:
xen 3e4782f17f5c
baseline version:
xen d28a9ba889c0
------------------------------------------------------------
People who touched revisions under test:
Ian Campbell <ian.campbell@citrix.com>
Jan Beulich <jbeulich@suse.com>
Keir Fraser <keir@xen.org>
Tim Deegan <tim@xen.org>
------------------------------------------------------------
jobs:
build-amd64 pass
build-i386 pass
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl pass
test-amd64-i386-xl pass
test-i386-i386-xl pass
test-amd64-i386-rhel6hvm-amd fail
test-amd64-i386-qemuu-rhel6hvm-amd fail
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-win7-amd64 fail
test-amd64-i386-xl-win7-amd64 fail
test-amd64-i386-xl-credit2 pass
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel fail
test-amd64-i386-qemuu-rhel6hvm-intel fail
test-amd64-i386-xl-multivcpu pass
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-i386-i386-pair pass
test-amd64-amd64-xl-sedf-pin pass
test-amd64-amd64-pv pass
test-amd64-i386-pv pass
test-i386-i386-pv pass
test-amd64-amd64-xl-sedf fail
test-amd64-i386-win-vcpus1 fail
test-amd64-i386-xl-win-vcpus1 fail
test-amd64-i386-xl-winxpsp3-vcpus1 fail
test-amd64-amd64-win fail
test-amd64-i386-win fail
test-i386-i386-win fail
test-amd64-amd64-xl-win fail
test-i386-i386-xl-win fail
test-amd64-amd64-xl-qemuu-winxpsp3 fail
test-i386-i386-xl-qemuu-winxpsp3 fail
test-amd64-i386-xend-winxpsp3 fail
test-amd64-amd64-xl-winxpsp3 fail
test-i386-i386-xl-winxpsp3 fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
changeset: 23353:3e4782f17f5c
tag: tip
user: Ian Jackson <Ian.Jackson@eu.citrix.com>
date: Wed Sep 05 12:40:10 2012 +0100
QEMU_TAG update (XSA-17 / CVE-2012-3515)
changeset: 23352:936f63ee4dad
user: Ian Jackson <Ian.Jackson@eu.citrix.com>
date: Wed Sep 05 12:29:56 2012 +0100
x86/pvhvm: properly range-check PHYSDEVOP_map_pirq/MAP_PIRQ_TYPE_GSI
This is being used as a array index, and hence must be validated before
use.
This is XSA-16 / CVE-2012-3498.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
changeset: 23351:8ebda5388e4e
user: Ian Jackson <Ian.Jackson@eu.citrix.com>
date: Wed Sep 05 12:29:05 2012 +0100
xen: Don't BUG_ON() PoD operations on a non-translated guest.
This is XSA-14 / CVE-2012-3496
Signed-off-by: Tim Deegan <tim@xen.org>
Reviewed-by: Ian Campbell <ian.campbell@citrix.com>
Tested-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 23350:6779ddca8593
user: Ian Jackson <Ian.Jackson@eu.citrix.com>
date: Wed Sep 05 12:28:17 2012 +0100
xen: handle out-of-pirq condition correctly in PHYSDEVOP_get_free_pirq
This is XSA-13 / CVE-2012-3495
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Signed-off-by: Jan Beulich <JBeulich@suse.com>
changeset: 23349:bcc340292731
user: Ian Jackson <Ian.Jackson@eu.citrix.com>
date: Wed Sep 05 12:27:54 2012 +0100
xen: prevent a 64 bit guest setting reserved bits in DR7
The upper 32 bits of this register are reserved and should be written as
zero.
This is XSA-12 / CVE-2012-3494
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Ian Campbell <ian.campbell@citrix.com>
changeset: 23348:d28a9ba889c0
user: Jan Beulich <jbeulich@suse.com>
date: Tue Sep 04 14:56:48 2012 +0200
make all (native) hypercalls consistently have "long" return type
for common and x86 ones at least, to address the problem of storing
zero-extended values into the multicall result field otherwise.
Reported-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
xen-unstable changeset: 25744:47080c965937
xen-unstable date: Fri Aug 10 07:51:01 UTC 2012
(qemu changes not included)
reply other threads:[~2012-09-06 10:50 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=osstest-13655-mainreport@xen.org \
--to=ian.jackson@eu.citrix.com \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).