From: xen.org <ian.jackson@eu.citrix.com>
To: xen-devel@lists.xensource.com
Cc: ian.jackson@eu.citrix.com
Subject: [xen-unstable test] 19828: regressions - FAIL
Date: Thu, 26 Sep 2013 23:48:58 +0100 [thread overview]
Message-ID: <osstest-19828-mainreport@xen.org> (raw)
flight 19828 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/19828/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 4 kernel-build fail REGR. vs. 19794
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 1 xen-build-check(1) blocked n/a
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
test-amd64-i386-xend-winxpsp3 16 leak-check/check fail never pass
test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop fail never pass
test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass
test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check fail never pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail never pass
test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass
test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass
version targeted for testing:
xen ec206e8ee4833c87746b0ef1e2e7ceeddc53e5f7
baseline version:
xen 5fc2176d9b3c5988c041fa5926fdd2da2ad560b9
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <andrew.cooper3@citrix.com>
Daniel De Graaf <dgdegra@tycho.nsa.gov>
Ian Campbell <ian.campbell@citrix.com>
Jan Beulich <jbeulich@suse.com>
Keir Fraser <keir@xen.org>
Matthew Daley <mattjd@gmail.com>
Tim Deegan <tim@xen.org>
Zhu Yanhai <gaoyang.zyh@taobao.com>
------------------------------------------------------------
jobs:
build-amd64 pass
build-armhf pass
build-i386 pass
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-armhf-pvops fail
build-i386-pvops pass
test-amd64-amd64-xl pass
test-armhf-armhf-xl blocked
test-amd64-i386-xl pass
test-amd64-i386-rhel6hvm-amd pass
test-amd64-i386-qemut-rhel6hvm-amd pass
test-amd64-i386-qemuu-rhel6hvm-amd pass
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 fail
test-amd64-amd64-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-win7-amd64 fail
test-amd64-i386-xl-win7-amd64 fail
test-amd64-i386-xl-credit2 pass
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel pass
test-amd64-i386-qemut-rhel6hvm-intel pass
test-amd64-i386-qemuu-rhel6hvm-intel pass
test-amd64-i386-xl-multivcpu pass
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-amd64-amd64-xl-sedf-pin pass
test-amd64-amd64-pv pass
test-amd64-i386-pv pass
test-amd64-amd64-xl-sedf pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail
test-amd64-i386-xl-winxpsp3-vcpus1 fail
test-amd64-i386-xend-qemut-winxpsp3 fail
test-amd64-amd64-xl-qemut-winxpsp3 fail
test-amd64-amd64-xl-qemuu-winxpsp3 fail
test-amd64-i386-xend-winxpsp3 fail
test-amd64-amd64-xl-winxpsp3 fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit ec206e8ee4833c87746b0ef1e2e7ceeddc53e5f7
Author: Jan Beulich <jbeulich@suse.com>
Date: Thu Sep 26 10:23:39 2013 +0200
x86: fix compat guest handling of XENPF_enter_acpi_sleep
Rather than blindly defining the native name to the compat one, when
we want to pass the compat structure to a native function we ought to
verify that their layouts match. With a respective xlat.lst entry
there's then also no need anymore to do such aliasing.
While cleaaning up that file I also noticed that the Cx and Px
interface handling here has quite a few unnecessary #define-s - delete
them.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
commit 07344c0f33be13bf9232a113681ef9087557f706
Author: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Date: Thu Sep 26 10:15:47 2013 +0200
fix DOMID_IO mapping permission checks (try 2)
When the permission checks for memory mapping were moved from
get_pg_owner to xsm_mmu_update in aaba7a677, the exception for DOMID_IO
was not taken into account. This will cause IO memory mappings by PV
domains (mini-os in particular) to fail when XSM/FLASK is not being
used. This patch reintroduces the exception for DOMID_IO; the actual
restrictions on IO memory mappings have always been checked separately
using iomem_access_permitted, so this change should not break existing
access control.
Reported-by: Eduardo Peixoto Macedo <epm@cin.ufpe.br>
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
commit f12c1f0b09205cdf18a2c4a615fdc3e7357ce704
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Thu Sep 26 10:14:51 2013 +0200
x86/crash: Indicate how well nmi_shootdown_cpus() managed to do
Having nmi_shootdown_cpus() report which pcpus failed to be shot down is a
useful debugging hint as to what possibly went wrong (especially when the
crash logs seem to indicate that an NMI timeout occurred while waiting for one
of the problematic pcpus to perform an action).
This is achieved by swapping an atomic_t count of unreported pcpus with a
cpumask. In the case that the 1 second timeout occurs, use the cpumask to
identify the problematic pcpus.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
commit 573fd5bd2d8bd068a6cea7ae5fcc58b962d43a78
Author: Jan Beulich <jbeulich@suse.com>
Date: Thu Sep 26 10:11:00 2013 +0200
x86: fix rdrand asm()
Just learned the hard way that at least for non-volatile asm()s gcc
indeed does what the documentation says: It may move it across jumps
(i.e. ahead of the cpu_has() check). While the documentation claims
that this can also happen for volatile asm()s, if that was the case
we'd have many more problems in our code (and e,g, Linux would too).
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
commit 7099bd90e1b84cb6a0143835ba050a445161715d
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Sep 25 18:13:06 2013 +0200
Revert "fix DOMID_IO mapping permission checks"
This reverts commit 145ae98bfab8280744ad5e800cc036e1c84c0486.
commit e435ac69be3ac47eff648cbf29c4920f7f1e7450
Author: Zhu Yanhai <gaoyang.zyh@taobao.com>
Date: Mon Sep 23 18:02:33 2013 +0800
xm-test: add a missing %s
Obviously we need a %s here.
Signed-off-by: Zhu Yanhai <gaoyang.zyh@taobao.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit f220279c14f5bcbaeb520c4f2498f25d795213e6
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:56 2013 +1200
xenstore: check socket path length before copying it
Coverity-ID: 1055997
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 07fa854a43bfb52fb4abfe7865ef1fb0467bdba7
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:55 2013 +1200
xenstored: fix faulty check for bad handle in domain_init
Coverity-ID: 1054975
Coverity-ID: 1055196
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit b865bda00f7cf5b0703e3d23ca22c8d1f607a1dd
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:54 2013 +1200
xenstored: handle unlikely failure better in ask_parents
Coverity-ID: 1055277
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 1a0f10a8c8673ed62c7b0cff8f8de5b97c402b7d
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:52 2013 +1200
libxl: fix file open failure check in libxl__file_reference_map
Coverity-ID: 1055567
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 6b2b15ead2152fd541e2de494f50cf99e63bfb3d
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:51 2013 +1200
libxl: fix typo in libxl__hotplug_nic error checking
Coverity-ID: 1055945
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 2e979531e51bafe3dbf9a36546a90176a6bd11e5
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:50 2013 +1200
libxl: only free console reader if it was allocated in main_dmesg
Coverity-ID: 1055304
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 96c0061c0168de4e322b0b869f9c7f3b907b53ce
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:45 2013 +1200
libxl: fix out-of-memory check in parse_global_config
Coverity-ID: 1055174
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 2989ef904236c941ed61f587e9ed5e0827e7a81b
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:44 2013 +1200
libxl: fix leak of rune in main_remus
Coverity-ID: 1087194
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 7737ecb20c5babff45445d27fff91894b43a2d28
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:43 2013 +1200
libxl: fix leak of config_data in main_cpupoolcreate
Coverity-ID: 1087193
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 12eaa1b4d2ae7b2e8c5f7d820bd9ec0476ead0f7
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:42 2013 +1200
libxl: fix leak of corename in handle_domain_death
Coverity-ID: 1087192
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 736491d1558dc97be4b8fac8957f3b5c7c0254f6
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:41 2013 +1200
libxl: fix dispose without init of disk in cd_insert
Coverity-ID: 1056078
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit b0be2b126ea75a83a3778b4e1710d248f92cf528
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:40 2013 +1200
libxl: fix libxl_string_list_length and its only caller
The wrong amount of indirections were being taken in
libxl_string_list_length, and its only caller was miscounting the amount
of initial non-list arguments, seemingly since the initial commit
(599c784).
This has been seen and reported in the wild (##xen):
< Trixboxer> Hi, any idea why would I get
< Trixboxer> xl: libxl_bootloader.c:42: bootloader_arg: Assertion `bl->nargs < bl->argsspace' failed.
< Trixboxer> 4.2.2-23.el6
Coverity-ID: 1054954
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 3b8782d95d03b40bfa255b61b224eeef614f09d2
Author: Matthew Daley <mattjd@gmail.com>
Date: Wed Sep 18 15:37:38 2013 +1200
libxc: fix memory leak in load_p2m_frame_list error handling
Coverity-ID: 1055885
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 145ae98bfab8280744ad5e800cc036e1c84c0486
Author: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Date: Wed Sep 25 10:48:20 2013 +0200
fix DOMID_IO mapping permission checks
When the permission checks for memory mapping were moved from
get_pg_owner to xsm_mmu_update in aaba7a677, the exception for DOMID_IO
was not taken into account. This will cause IO memory mappings by PV
domains (mini-os in particular) to fail when XSM/FLASK is not being
used. This patch reintroduces the exception for DOMID_IO; the actual
restrictions on IO memory mappings have always been checked separately
using iomem_access_permitted, so this change should not break existing
access control.
Reported-by: Eduardo Peixoto Macedo <epm@cin.ufpe.br>
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
commit ae7c6b64c063a755097806e30dc24b94fabbda09
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Sep 25 10:45:53 2013 +0200
x86/hap: Remove bogus assertion in hap_free_p2m_page()
Coverity ID: 1055622
Coverity correctly points out that this ASSERT() is unconditionally true as an
unsigned integer is always >= 0.
Judging from the shadow counterpart and p2m callsites, there is nothing
invalid about freeing the final p2m page.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Tim Deegan <tim@xen.org>
commit 688eeb878cc58150bf6e729c9c1836b8c1e4cc8f
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Wed Sep 25 10:44:21 2013 +0200
ns16550: Use correct #define symbol for HAS_IOPORTS
CID 1091471, Regression caused by 7c1de0038895cbc75ebd0caffc5b0f3f03c5ad51
This appears to be a typo which causes check_existence() to unconditionally
return 1 in all cases.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
commit 63a75ba0de817d6f384f96d25427a05c313e2179
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Sep 25 10:41:25 2013 +0200
x86/xsave: initialize extended register state when guests enable it
Till now, when setting previously unset bits in XCR0 we wouldn't touch
the active register state, thus leaving in the newly enabled registers
whatever a prior user of it left there, i.e. potentially leaking
information between guests.
This is CVE-2013-1442 / XSA-62.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
(qemu changes not included)
reply other threads:[~2013-09-26 22:48 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=osstest-19828-mainreport@xen.org \
--to=ian.jackson@eu.citrix.com \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).