[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-4.2-testing test] 20675: trouble: broken/fail/pass

flight 20675 xen-4.2-testing real [real]

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-credit2    3 host-install(3)         broken REGR. vs. 19878

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 13 guest-stop              fail never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 13 guest-stop             fail never pass
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-stop             fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-qemut-winxpsp3 13 guest-stop               fail never pass
 test-i386-i386-xl-qemut-winxpsp3 13 guest-stop                 fail never pass
 test-i386-i386-xl-qemuu-winxpsp3 13 guest-stop                 fail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 13 guest-stop         fail never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-i386-i386-xl-winxpsp3   13 guest-stop                   fail   never pass
 test-amd64-i386-xend-qemut-winxpsp3 16 leak-check/check        fail never pass
 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-stop               fail never pass

version targeted for testing:
 xen                  eba971d94289d91e4a3959d2c083a59deb100568
baseline version:
 xen                  09962956f799de2a0f5d6589d52ed7755eaf6ac3

People who touched revisions under test:
  Ian Campbell <Ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Matthew Daley <mattjd@xxxxxxxxx>

 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-i386-i386-xl                                            pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   broken  
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          pass    
 test-amd64-amd64-xl-sedf-pin                                 pass    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-i386-xend-qemut-winxpsp3                          fail    
 test-amd64-amd64-xl-qemut-winxpsp3                           fail    
 test-i386-i386-xl-qemut-winxpsp3                             fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-i386-i386-xl-qemuu-winxpsp3                             fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-i386-i386-xl-winxpsp3                                   fail    

sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

Not pushing.

commit eba971d94289d91e4a3959d2c083a59deb100568
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Tue Sep 10 22:18:46 2013 +1200

    libxl: fix out-of-memory error handling in libxl_list_cpupool
    ...otherwise it will return freed memory. All the current users of this
    function check already for a NULL return, so use that.
    Coverity-ID: 1056194
    This is CVE-2013-4371 / XSA-70
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    (cherry picked from commit 4c37ed562224295c0f8b00211287d57cae629782)
    (cherry picked from commit 2350e70ee06c903a927340f7a0bf9ca25acce3f3)

commit 4d747f7c638b6cc6fce8f98ce89b53b4eefc991a
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Tue Sep 10 23:12:45 2013 +1200

    tools/ocaml: fix erroneous free of cpumap in stub_xc_vcpu_getaffinity
    Not sure how it got there...
    Coverity-ID: 1056196
    This is CVE-2013-4370 / XSA-69
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    (cherry picked from commit 3cd10fd21220f2b814324e6e732004f8f0487d0a)
    (cherry picked from commit debfacf7d68de8e39a06ebc7f7b22386b28ce6fb)

commit 8f749b254def91001124367d687e9fc6a2793f6b
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Thu Oct 10 15:48:55 2013 +0100

    libxl: fix vif rate parsing
    strtok can return NULL here. We don't need to use strtok anyway, so just
    use a simple strchr method.
    Coverity-ID: 1055642
    This is CVE-2013-4369 / XSA-68
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Fix type. Add test case
    Signed-off-by: Ian Campbell <Ian.campbell@xxxxxxxxxx>
    (cherry picked from commit c53702cee1d6f9f1b72f0cae0b412e21bcda8724)
    (cherry picked from commit 60aefd150bc0ad0c7d325da5ffea0bf4e0544130)

commit 0a3b0fb38ee4cf4eadfb108534acf5ac4665633a
Author: Matthew Daley <mattjd@xxxxxxxxx>
Date:   Thu Oct 10 15:24:15 2013 +0200

    x86: check segment descriptor read result in 64-bit OUTS emulation
    When emulating such an operation from a 64-bit context (CS has long
    mode set), and the data segment is overridden to FS/GS, the result of
    reading the overridden segment's descriptor (read_descriptor) is not
    checked. If it fails, data_base is left uninitialized.
    This can lead to 8 bytes of Xen's stack being leaked to the guest
    (implicitly, i.e. via the address given in a #PF).
    Coverity-ID: 1055116
    This is CVE-2013-4368 / XSA-67.
    Signed-off-by: Matthew Daley <mattjd@xxxxxxxxx>
    Fix formatting.
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: 0771faba163769089c9f05f7f76b63e397677613
    master date: 2013-10-10 15:19:53 +0200
(qemu changes not included)

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.