[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 19811: regressions - trouble: blocked/broken/fail/pass



flight 19811 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/19811/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xend-qemut-winxpsp3  3 host-install(3)  broken REGR. vs. 19794
 build-armhf-pvops             4 kernel-build              fail REGR. vs. 19794

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl           1 xen-build-check(1)           blocked  n/a
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop         fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop              fail never pass

version targeted for testing:
 xen                  7099bd90e1b84cb6a0143835ba050a445161715d
baseline version:
 xen                  5fc2176d9b3c5988c041fa5926fdd2da2ad560b9

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Matthew Daley <mattjd@xxxxxxxxx>
  Tim Deegan <tim@xxxxxxx>
  Zhu Yanhai <gaoyang.zyh@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            fail    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          broken  
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 7099bd90e1b84cb6a0143835ba050a445161715d
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Sep 25 18:13:06 2013 +0200

    Revert "fix DOMID_IO mapping permission checks"
    
    This reverts commit 145ae98bfab8280744ad5e800cc036e1c84c0486.

commit e435ac69be3ac47eff648cbf29c4920f7f1e7450
Author: Zhu Yanhai <gaoyang.zyh@xxxxxxxxxx>
Date:   Mon Sep 23 18:02:33 2013 +0800

    xm-test: add a missing %s
    
    Obviously we need a %s here.
    
    Signed-off-by: Zhu Yanhai <gaoyang.zyh@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit f220279c14f5bcbaeb520c4f2498f25d795213e6
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:56 2013 +1200

    xenstore: check socket path length before copying it
    
    Coverity-ID: 1055997
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 07fa854a43bfb52fb4abfe7865ef1fb0467bdba7
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:55 2013 +1200

    xenstored: fix faulty check for bad handle in domain_init
    
    Coverity-ID: 1054975
    Coverity-ID: 1055196
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit b865bda00f7cf5b0703e3d23ca22c8d1f607a1dd
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:54 2013 +1200

    xenstored: handle unlikely failure better in ask_parents
    
    Coverity-ID: 1055277
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 1a0f10a8c8673ed62c7b0cff8f8de5b97c402b7d
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:52 2013 +1200

    libxl: fix file open failure check in libxl__file_reference_map
    
    Coverity-ID: 1055567
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 6b2b15ead2152fd541e2de494f50cf99e63bfb3d
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:51 2013 +1200

    libxl: fix typo in libxl__hotplug_nic error checking
    
    Coverity-ID: 1055945
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 2e979531e51bafe3dbf9a36546a90176a6bd11e5
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:50 2013 +1200

    libxl: only free console reader if it was allocated in main_dmesg
    
    Coverity-ID: 1055304
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 96c0061c0168de4e322b0b869f9c7f3b907b53ce
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:45 2013 +1200

    libxl: fix out-of-memory check in parse_global_config
    
    Coverity-ID: 1055174
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 2989ef904236c941ed61f587e9ed5e0827e7a81b
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:44 2013 +1200

    libxl: fix leak of rune in main_remus
    
    Coverity-ID: 1087194
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 7737ecb20c5babff45445d27fff91894b43a2d28
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:43 2013 +1200

    libxl: fix leak of config_data in main_cpupoolcreate
    
    Coverity-ID: 1087193
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 12eaa1b4d2ae7b2e8c5f7d820bd9ec0476ead0f7
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:42 2013 +1200

    libxl: fix leak of corename in handle_domain_death
    
    Coverity-ID: 1087192
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 736491d1558dc97be4b8fac8957f3b5c7c0254f6
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:41 2013 +1200

    libxl: fix dispose without init of disk in cd_insert
    
    Coverity-ID: 1056078
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit b0be2b126ea75a83a3778b4e1710d248f92cf528
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:40 2013 +1200

    libxl: fix libxl_string_list_length and its only caller
    
    The wrong amount of indirections were being taken in
    libxl_string_list_length, and its only caller was miscounting the amount
    of initial non-list arguments, seemingly since the initial commit
    (599c784).
    
    This has been seen and reported in the wild (##xen):
    < Trixboxer> Hi, any idea why would I get
    < Trixboxer> xl: libxl_bootloader.c:42: bootloader_arg: Assertion 
`bl->nargs < bl->argsspace' failed.
    < Trixboxer> 4.2.2-23.el6
    
    Coverity-ID: 1054954
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 3b8782d95d03b40bfa255b61b224eeef614f09d2
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Wed Sep 18 15:37:38 2013 +1200

    libxc: fix memory leak in load_p2m_frame_list error handling
    
    Coverity-ID: 1055885
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 145ae98bfab8280744ad5e800cc036e1c84c0486
Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Date:   Wed Sep 25 10:48:20 2013 +0200

    fix DOMID_IO mapping permission checks
    
    When the permission checks for memory mapping were moved from
    get_pg_owner to xsm_mmu_update in aaba7a677, the exception for DOMID_IO
    was not taken into account. This will cause IO memory mappings by PV
    domains (mini-os in particular) to fail when XSM/FLASK is not being
    used. This patch reintroduces the exception for DOMID_IO; the actual
    restrictions on IO memory mappings have always been checked separately
    using iomem_access_permitted, so this change should not break existing
    access control.
    
    Reported-by: Eduardo Peixoto Macedo <epm@xxxxxxxxxxx>
    Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>

commit ae7c6b64c063a755097806e30dc24b94fabbda09
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Sep 25 10:45:53 2013 +0200

    x86/hap: Remove bogus assertion in hap_free_p2m_page()
    
    Coverity ID: 1055622
    
    Coverity correctly points out that this ASSERT() is unconditionally true as 
an
    unsigned integer is always >= 0.
    
    Judging from the shadow counterpart and p2m callsites, there is nothing
    invalid about freeing the final p2m page.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>

commit 688eeb878cc58150bf6e729c9c1836b8c1e4cc8f
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Sep 25 10:44:21 2013 +0200

    ns16550: Use correct #define symbol for HAS_IOPORTS
    
    CID 1091471, Regression caused by 7c1de0038895cbc75ebd0caffc5b0f3f03c5ad51
    
    This appears to be a typo which causes check_existence() to unconditionally
    return 1 in all cases.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

commit 63a75ba0de817d6f384f96d25427a05c313e2179
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Sep 25 10:41:25 2013 +0200

    x86/xsave: initialize extended register state when guests enable it
    
    Till now, when setting previously unset bits in XCR0 we wouldn't touch
    the active register state, thus leaving in the newly enabled registers
    whatever a prior user of it left there, i.e. potentially leaking
    information between guests.
    
    This is CVE-2013-1442 / XSA-62.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.