[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.0-testing test] 14391: trouble: broken/fail/pass



flight 14391 xen-4.0-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/14391/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-rhel6hvm-intel  3 host-install(3)       broken REGR. vs. 13719

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-sedf-pin 13 guest-localmigrate.2      fail REGR. vs. 13719
 test-amd64-i386-xl-credit2    5 xen-boot                     fail   like 13719

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  8 debian-fixup                fail never pass
 test-amd64-amd64-xl-sedf     15 guest-stop                   fail   never pass
 test-amd64-amd64-xl          15 guest-stop                   fail   never pass
 test-amd64-i386-xl-multivcpu 15 guest-stop                   fail   never pass
 test-i386-i386-xl            15 guest-stop                   fail   never pass
 test-amd64-i386-xl           15 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemuu-win7-amd64  8 guest-saverestore      fail never pass
 test-amd64-i386-xl-win7-amd64  8 guest-saverestore            fail  never pass
 test-amd64-i386-qemuu-rhel6hvm-amd  7 redhat-install           fail never pass
 test-amd64-amd64-xl-win7-amd64  8 guest-saverestore            fail never pass
 test-amd64-i386-qemuu-rhel6hvm-intel  7 redhat-install         fail never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-rhel6hvm-amd  7 redhat-install               fail   never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1  7 windows-install          fail never pass
 test-i386-i386-xl-winxpsp3    7 windows-install              fail   never pass
 test-i386-i386-xl-win         7 windows-install              fail   never pass
 test-amd64-i386-xl-win-vcpus1  7 windows-install              fail  never pass
 test-amd64-amd64-xl-win       7 windows-install              fail   never pass
 test-amd64-amd64-xl-winxpsp3  7 windows-install              fail   never pass
 test-amd64-amd64-xl-qemuu-winxpsp3  7 windows-install          fail never pass
 test-i386-i386-xl-qemuu-winxpsp3  7 windows-install            fail never pass

version targeted for testing:
 xen                  68d7b9cc8259
baseline version:
 xen                  1d1538beeada

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          fail    
 test-amd64-i386-xl                                           fail    
 test-i386-i386-xl                                            fail    
 test-amd64-i386-rhel6hvm-amd                                 fail    
 test-amd64-i386-qemuu-rhel6hvm-amd                           fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   fail    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               broken  
 test-amd64-i386-qemuu-rhel6hvm-intel                         fail    
 test-amd64-i386-xl-multivcpu                                 fail    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          pass    
 test-amd64-amd64-xl-sedf-pin                                 fail    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-amd64-xl-sedf                                     fail    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-i386-i386-xl-qemuu-winxpsp3                             fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-i386-i386-xl-winxpsp3                                   fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   21621:68d7b9cc8259
tag:         tip
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Nov 14 11:46:35 2012 +0000
    
    compat/gnttab: Prevent infinite loop in compat code
    
    c/s 20281:95ea2052b41b, which introduces Grant Table version 2
    hypercalls introduces a vulnerability whereby the compat hypercall
    handler can fall into an infinite loop.
    
    If the watchdog is enabled, Xen will die after the timeout.
    
    This is a security problem, XSA-24 / CVE-2012-4539.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    xen-unstable changeset: 26151:b64a7d868f06
    Backport-requested-by: security@xxxxxxx
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   21620:c52d74b254dc
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Nov 14 11:44:46 2012 +0000
    
    xen/mm/shadow: check toplevel pagetables are present before unhooking them.
    
    If the guest has not fully populated its top-level PAE entries when it calls
    HVMOP_pagetable_dying, the shadow code could try to unhook entries from
    MFN 0.  Add a check to avoid that case.
    
    This issue was introduced by c/s 21239:b9d2db109cf5.
    
    This is a security problem, XSA-23 / CVE-2012-4538.
    
    Signed-off-by: Tim Deegan <tim@xxxxxxx>
    Tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    xen-4.1-testing changeset: 23409:61eb3d030f52
    Backport-requested-by: security@xxxxxxx
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   21619:04462a8c7966
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Nov 14 11:40:51 2012 +0000
    
    x86/physmap: Prevent incorrect updates of m2p mappings
    
    In certain conditions, such as low memory, set_p2m_entry() can fail.
    Currently, the p2m and m2p tables will get out of sync because we still
    update the m2p table after the p2m update has failed.
    
    If that happens, subsequent guest-invoked memory operations can cause
    BUG()s and ASSERT()s to kill Xen.
    
    This is fixed by only updating the m2p table iff the p2m was
    successfully updated.
    
    This is a security problem, XSA-22 / CVE-2012-4537.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   21618:6b9809dc1e86
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Nov 14 11:37:55 2012 +0000
    
    VCPU/timers: Prevent overflow in calculations, leading to DoS vulnerability
    
    The timer action for a vcpu periodic timer is to calculate the next
    expiry time, and to reinsert itself into the timer queue.  If the
    deadline ends up in the past, Xen never leaves __do_softirq().  The
    affected PCPU will stay in an infinite loop until Xen is killed by the
    watchdog (if enabled).
    
    This is a security problem, XSA-20 / CVE-2012-4535.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    xen-unstable changeset: 26148:bf58b94b3cef
    Backport-requested-by: security@xxxxxxx
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
changeset:   21617:1d1538beeada
user:        Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
date:        Wed Sep 12 11:18:03 2012 +0100
    
    QEMU_TAG fix to refer to correct tree
    
    
========================================
commit eaa1bd612f50d2f253738ed19e14981e4ede98a5
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Thu Sep 6 17:05:30 2012 +0100

    Disable qemu monitor by default.  The qemu monitor is an overly
    powerful feature which must be protected from untrusted (guest)
    administrators.
    
    Neither xl nor xend expect qemu to produce this monitor unless it is
    explicitly requested.
    
    This is a security problem, XSA-19.  Previously it was CVE-2007-0998
    in Red Hat but we haven't dealt with it in upstream.  We hope to have
    a new CVE for it here but we don't have one yet.
    
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    (cherry picked from commit bacc0d302445c75f18f4c826750fb5853b60e7ca)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.