From: xen.org <ian.jackson@eu.citrix.com>
To: xen-devel@lists.xensource.com
Cc: ian.jackson@eu.citrix.com
Subject: [xen-4.1-testing test] 22153: regressions - trouble: broken/fail/pass
Date: Thu, 28 Nov 2013 00:25:05 +0000 [thread overview]
Message-ID: <osstest-22153-mainreport@xen.org> (raw)
flight 22153 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/22153/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 3 host-build-prep fail in 22150 REGR. vs. 22135
build-i386-oldkern 3 host-build-prep fail in 22150 REGR. vs. 22135
build-amd64-oldkern 3 host-build-prep fail in 22150 REGR. vs. 22135
Tests which are failing intermittently (not blocking):
test-amd64-i386-xend-winxpsp3 3 host-install(3) broken pass in 22150
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-qemuu-freebsd10-i386 5 xen-boot fail in 22150 blocked in 22135
Tests which did not succeed, but are not blocking:
test-amd64-i386-qemuu-freebsd10-amd64 4 xen-install fail never pass
test-amd64-i386-qemuu-freebsd10-i386 7 freebsd-install fail never pass
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop fail never pass
test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop fail never pass
test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop fail never pass
test-amd64-i386-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop fail never pass
test-amd64-amd64-xl-win7-amd64 13 guest-stop fail never pass
test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check fail never pass
test-amd64-amd64-xl-winxpsp3 13 guest-stop fail never pass
test-i386-i386-xl-qemut-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop fail never pass
test-i386-i386-xl-winxpsp3 13 guest-stop fail never pass
test-amd64-amd64-xl-sedf-pin 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-amd64-xl-pcipt-intel 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-amd64-xl 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-amd64-pv 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-amd64-xl-sedf 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-amd64-pair 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-amd64-xl-qemut-win7-amd64 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-amd64-xl-win7-amd64 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-amd64-xl-winxpsp3 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-amd64-xl-qemut-winxpsp3 1 xen-build-check(1) blocked in 22150 n/a
test-amd64-i386-xend-winxpsp3 16 leak-check/check fail in 22150 never pass
version targeted for testing:
xen 21c17c15931f1dcb3da5520d8d542e973098297d
baseline version:
xen c20715a812b3e638923a9feb5f75495705c121ef
------------------------------------------------------------
People who touched revisions under test:
Ian Campbell <ian.campbell@citrix.com>
Jan Beulich <jbeulich@suse.com>
------------------------------------------------------------
jobs:
build-amd64 pass
build-i386 pass
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl pass
test-amd64-i386-xl pass
test-i386-i386-xl pass
test-amd64-i386-rhel6hvm-amd pass
test-amd64-i386-qemut-rhel6hvm-amd pass
test-amd64-i386-qemuu-freebsd10-amd64 fail
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 fail
test-amd64-amd64-xl-win7-amd64 fail
test-amd64-i386-xl-win7-amd64 fail
test-amd64-i386-xl-credit2 pass
test-amd64-i386-qemuu-freebsd10-i386 fail
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel pass
test-amd64-i386-qemut-rhel6hvm-intel pass
test-amd64-i386-xl-multivcpu pass
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-i386-i386-pair pass
test-amd64-amd64-xl-sedf-pin pass
test-amd64-amd64-pv pass
test-amd64-i386-pv pass
test-i386-i386-pv pass
test-amd64-amd64-xl-sedf pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail
test-amd64-i386-xl-winxpsp3-vcpus1 fail
test-amd64-i386-xend-qemut-winxpsp3 fail
test-amd64-amd64-xl-qemut-winxpsp3 fail
test-i386-i386-xl-qemut-winxpsp3 fail
test-amd64-i386-xend-winxpsp3 broken
test-amd64-amd64-xl-winxpsp3 fail
test-i386-i386-xl-winxpsp3 fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 21c17c15931f1dcb3da5520d8d542e973098297d
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Nov 27 09:52:08 2013 +0100
x86/HVM: only allow ring 0 guest code to make hypercalls
Anything else would allow for privilege escalation.
This is CVE-2013-4554 / XSA-76.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
master commit: 5c447caaf49192c7b2c057ffbb565ce72aac666d
master date: 2013-11-27 09:01:49 +0100
commit 8b596d92dbe8504c9c8284c451f3442d8e301af9
Author: Jan Beulich <jbeulich@suse.com>
Date: Wed Nov 27 09:50:43 2013 +0100
x86: restrict XEN_DOMCTL_getmemlist
Coverity ID 1055652
(See the code comment.)
This is CVE-2013-4553 / XSA-74.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Tim Deegan <tim@xen.org>
master commit: 19f027cc5daff4a37fd0a28bca2514c721852dd0
master date: 2013-11-27 09:00:41 +0100
(qemu changes not included)
reply other threads:[~2013-11-28 0:25 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=osstest-22153-mainreport@xen.org \
--to=ian.jackson@eu.citrix.com \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).