* [xen-4.4-testing test] 29856: regressions - trouble: blocked/broken/fail/pass
@ 2014-08-20 17:34 xen.org
0 siblings, 0 replies; only message in thread
From: xen.org @ 2014-08-20 17:34 UTC (permalink / raw)
To: xen-devel; +Cc: ian.jackson
flight 29856 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/29856/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 5 xen-build fail REGR. vs. 29622
test-amd64-amd64-xl-qemut-win7-amd64 13 guest-localmigrate/x10 fail REGR. vs. 29622
build-armhf-pvops 5 kernel-build fail REGR. vs. 29622
test-amd64-i386-freebsd10-i386 18 leak-check/check fail in 29754 REGR. vs. 29622
test-amd64-i386-xl-qemuu-ovmf-amd64 13 guest-localmigrate/x10 fail in 29754 REGR. vs. 29622
test-amd64-i386-freebsd10-amd64 14 guest-localmigrate/x10 fail in 29754 REGR. vs. 29622
test-amd64-amd64-xl-qemuu-debianhvm-amd64 13 guest-localmigrate/x10 fail in 29754 REGR. vs. 29622
test-amd64-amd64-xl-qemut-debianhvm-amd64 13 guest-localmigrate/x10 fail in 29754 REGR. vs. 29622
test-amd64-amd64-xl-qemuu-ovmf-amd64 13 guest-localmigrate/x10 fail in 29754 REGR. vs. 29622
test-amd64-i386-xl-win7-amd64 13 guest-localmigrate/x10 fail in 29754 REGR. vs. 29622
test-amd64-amd64-xl-win7-amd64 13 guest-localmigrate/x10 fail in 29754 REGR. vs. 29622
test-amd64-amd64-xl-winxpsp3 13 guest-localmigrate/x10 fail in 29754 REGR. vs. 29622
test-amd64-i386-xl-qemut-debianhvm-amd64 17 leak-check/check fail in 29835 REGR. vs. 29622
test-amd64-i386-xl-qemuu-win7-amd64 13 guest-localmigrate/x10 fail in 29697 REGR. vs. 29622
test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-localmigrate/x10 fail in 29686 REGR. vs. 29622
Tests which are failing intermittently (not blocking):
test-amd64-i386-freebsd10-i386 14 guest-localmigrate/x10 fail pass in 29754
test-amd64-i386-xl-qemuu-ovmf-amd64 12 guest-localmigrate.2 fail pass in 29835
test-amd64-i386-xl-multivcpu 19 leak-check/check fail pass in 29835
test-amd64-amd64-xl-sedf 19 leak-check/check fail pass in 29754
test-amd64-amd64-xl-sedf-pin 19 leak-check/check fail pass in 29819
test-amd64-i386-xl-qemuu-win7-amd64 10 guest-localmigrate fail pass in 29819
test-amd64-i386-xl-qemuu-debianhvm-amd64 17 leak-check/check fail pass in 29697
test-amd64-i386-xl-qemut-debianhvm-amd64 7 debian-hvm-install fail pass in 29835
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 3 host-install(3) broken pass in 29835
test-amd64-i386-xl 3 host-install(3) broken pass in 29835
test-amd64-i386-xl-qemut-win7-amd64 3 host-install(3) broken pass in 29835
test-amd64-amd64-xl-qemuu-winxpsp3 3 host-install(3) broken pass in 29835
test-amd64-i386-qemuu-rhel6hvm-amd 3 host-install(3) broken pass in 29835
test-amd64-i386-freebsd10-amd64 3 host-install(3) broken pass in 29835
test-amd64-amd64-xl-qemuu-debianhvm-amd64 3 host-install(3) broken pass in 29835
test-amd64-i386-libvirt 3 host-install(3) broken pass in 29835
test-amd64-amd64-libvirt 3 host-install(3) broken pass in 29835
test-amd64-i386-xend-qemut-winxpsp3 3 host-install(3) broken pass in 29835
test-amd64-amd64-xl-qemut-debianhvm-amd64 3 host-install(3) broken pass in 29835
test-amd64-amd64-xl-qemut-winxpsp3 3 host-install(3) broken pass in 29835
test-amd64-amd64-xl-qemuu-win7-amd64 3 host-install(3) broken pass in 29835
test-amd64-amd64-xl-qemuu-ovmf-amd64 3 host-install(3) broken pass in 29835
test-amd64-i386-xend-winxpsp3 3 host-install(3) broken pass in 29835
test-amd64-i386-xl-winxpsp3-vcpus1 3 host-install(3) broken pass in 29835
test-amd64-i386-xl-win7-amd64 3 host-install(3) broken pass in 29835
test-amd64-amd64-xl-win7-amd64 3 host-install(3) broken pass in 29835
test-amd64-amd64-xl-winxpsp3 3 host-install(3) broken pass in 29835
test-amd64-i386-pair 4 host-install/dst_host(4) broken pass in 29835
test-amd64-i386-pair 3 host-install/src_host(3) broken pass in 29835
test-amd64-amd64-pair 3 host-install/src_host(3) broken pass in 29835
test-amd64-i386-xl-qemut-debianhvm-amd64 13 guest-localmigrate/x10 fail in 29754 pass in 29835
test-amd64-amd64-xl-qemuu-win7-amd64 10 guest-localmigrate fail in 29754 pass in 29835
test-amd64-i386-xl-winxpsp3-vcpus1 10 guest-localmigrate fail in 29754 pass in 29773
test-amd64-i386-xl-credit2 19 leak-check/check fail in 29835 pass in 29856
test-amd64-i386-xl-qemuu-debianhvm-amd64 13 guest-localmigrate/x10 fail in 29835 pass in 29856
test-amd64-amd64-xl-qemut-winxpsp3 13 guest-localmigrate/x10 fail in 29835 pass in 29754
test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-localmigrate/x10 fail in 29835 pass in 29686
test-amd64-amd64-xl-qemuu-ovmf-amd64 12 guest-localmigrate.2 fail in 29835 pass in 29819
test-amd64-amd64-xl-winxpsp3 7 windows-install fail in 29835 pass in 29819
test-amd64-i386-xl-qemuu-ovmf-amd64 10 guest-localmigrate fail in 29819 pass in 29856
test-amd64-amd64-xl 19 leak-check/check fail in 29819 pass in 29856
test-amd64-i386-xl-qemuu-win7-amd64 12 guest-localmigrate.2 fail in 29819 pass in 29697
test-amd64-amd64-xl-winxpsp3 10 guest-localmigrate fail in 29819 pass in 29800
test-amd64-amd64-xl-sedf 11 guest-saverestore fail in 29697 pass in 29856
test-amd64-i386-xl 19 leak-check/check fail in 29697 pass in 29835
test-amd64-amd64-xl-qemuu-ovmf-amd64 10 guest-localmigrate fail in 29697 pass in 29835
test-amd64-amd64-xl-win7-amd64 10 guest-localmigrate fail in 29697 pass in 29835
test-amd64-amd64-xl-winxpsp3 12 guest-localmigrate.2 fail in 29697 pass in 29754
test-amd64-i386-pair 21 leak-check/check/dst_host fail in 29686 pass in 29835
test-amd64-amd64-xl-qemuu-win7-amd64 12 guest-localmigrate.2 fail in 29773 pass in 29835
Tests which did not succeed, but are not blocking:
test-amd64-i386-rumpuserxen-i386 1 build-check(1) blocked n/a
test-amd64-amd64-rumpuserxen-amd64 1 build-check(1) blocked n/a
test-armhf-armhf-xl 1 build-check(1) blocked n/a
test-armhf-armhf-libvirt 1 build-check(1) blocked n/a
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
build-i386-rumpuserxen 6 xen-build fail never pass
build-armhf-libvirt 1 build-check(1) blocked n/a
build-amd64-rumpuserxen 6 xen-build fail never pass
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop fail never pass
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 14 guest-stop fail in 29754 never pass
test-amd64-amd64-xl-qemuu-winxpsp3 14 guest-stop fail in 29754 never pass
test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop fail in 29754 never pass
test-amd64-i386-libvirt 9 guest-start fail in 29754 never pass
test-amd64-amd64-libvirt 9 guest-start fail in 29754 never pass
test-amd64-i386-xend-qemut-winxpsp3 17 leak-check/check fail in 29754 never pass
test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop fail in 29754 never pass
test-amd64-i386-xend-winxpsp3 17 leak-check/check fail in 29754 never pass
test-armhf-armhf-xl 10 migrate-support-check fail in 29697 never pass
test-armhf-armhf-libvirt 9 guest-start fail in 29697 never pass
test-amd64-amd64-xl-qemuu-win7-amd64 14 guest-stop fail in 29686 never pass
version targeted for testing:
xen 7c5264902663da247d12a58c9177a969a984f884
baseline version:
xen 0f3cdfc4d7fa1e3dc93cc6153782872d90f25b53
------------------------------------------------------------
People who touched revisions under test:
Andrew Cooper <andrew.cooper3@citrix.com>
Ian Campbell <ian.campbell@citrix.com>
Ian Jackson <ian.jackson@eu.citrix.com>
Jan Beulich <jbeulich@suse.com>
Julien Grall <julien.grall@linaro.org>
------------------------------------------------------------
jobs:
build-amd64-xend pass
build-i386-xend pass
build-amd64 pass
build-armhf fail
build-i386 pass
build-amd64-libvirt pass
build-armhf-libvirt blocked
build-i386-libvirt pass
build-amd64-pvops pass
build-armhf-pvops fail
build-i386-pvops pass
build-amd64-rumpuserxen fail
build-i386-rumpuserxen fail
test-amd64-amd64-xl pass
test-armhf-armhf-xl blocked
test-amd64-i386-xl broken
test-amd64-i386-rhel6hvm-amd pass
test-amd64-i386-qemut-rhel6hvm-amd pass
test-amd64-i386-qemuu-rhel6hvm-amd broken
test-amd64-amd64-xl-qemut-debianhvm-amd64 broken
test-amd64-i386-xl-qemut-debianhvm-amd64 fail
test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken
test-amd64-i386-xl-qemuu-debianhvm-amd64 fail
test-amd64-i386-freebsd10-amd64 broken
test-amd64-amd64-xl-qemuu-ovmf-amd64 broken
test-amd64-i386-xl-qemuu-ovmf-amd64 fail
test-amd64-amd64-rumpuserxen-amd64 blocked
test-amd64-amd64-xl-qemut-win7-amd64 fail
test-amd64-i386-xl-qemut-win7-amd64 broken
test-amd64-amd64-xl-qemuu-win7-amd64 broken
test-amd64-i386-xl-qemuu-win7-amd64 fail
test-amd64-amd64-xl-win7-amd64 broken
test-amd64-i386-xl-win7-amd64 broken
test-amd64-i386-xl-credit2 pass
test-amd64-i386-freebsd10-i386 fail
test-amd64-i386-rumpuserxen-i386 blocked
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel pass
test-amd64-i386-qemut-rhel6hvm-intel pass
test-amd64-i386-qemuu-rhel6hvm-intel pass
test-amd64-amd64-libvirt broken
test-armhf-armhf-libvirt blocked
test-amd64-i386-libvirt broken
test-amd64-i386-xl-multivcpu fail
test-amd64-amd64-pair broken
test-amd64-i386-pair broken
test-amd64-amd64-xl-sedf-pin fail
test-amd64-amd64-pv pass
test-amd64-i386-pv pass
test-amd64-amd64-xl-sedf fail
test-amd64-i386-xl-qemut-winxpsp3-vcpus1 fail
test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 broken
test-amd64-i386-xl-winxpsp3-vcpus1 broken
test-amd64-i386-xend-qemut-winxpsp3 broken
test-amd64-amd64-xl-qemut-winxpsp3 broken
test-amd64-amd64-xl-qemuu-winxpsp3 broken
test-amd64-i386-xend-winxpsp3 broken
test-amd64-amd64-xl-winxpsp3 broken
------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
commit 7c5264902663da247d12a58c9177a969a984f884
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date: Tue Aug 12 15:51:52 2014 +0200
x86/cpu: undo BIOS CPUID max_leaf limit before querying for features
If IA32_MISC_ENABLE[22] is set by the BIOS, CPUID.0.EAX will be limited to 3.
Lift this limit before considering whether to query CPUID.7[ECX=0].EBX for
features.
Without this change, dom0 is able to see this feature leaf (as the limit was
subsequently lifted), and will set features appropriately in HVM domain cpuid
policies.
The specific bug XenServer observed was the advertisement of the FSGSBASE
feature, but an inability to set CR4.FSGSBASE as Xen considered the bit to be
reserved as cpu_has_fsgsbase incorrectly evaluated as false.
This is a regression introduced by c/s 44e24f8567 "x86: don't call
generic_identify() redundantly" where the redundant call actually resampled
CPUID.7[ECX=0] properly to obtain the feature flags.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
master commit: a1ac4cf52e38386bac7ac3440c7da0099662ca5c
master date: 2014-07-29 17:02:25 +0200
commit 0ddedcb8748f6db39f1825d5b2bb7d09fdabbaf2
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Tue Aug 12 15:50:13 2014 +0200
xen: arm: Correctly handle do_sysreg exception injection from 64-bit userspace
The do_sysreg case was missing a return, so it would increment PC and
inject the trap to the second instruction of the handler.
This is CVE-2014-5148 / XSA-103.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com>
Acked-by: Julien Grall <julien.grall@linaro.org>
master commit: f2ae8bfa498831ee6343d672066b898d3cd73892
master date: 2014-08-12 15:38:01 +0200
commit 61460b58192786b206d96cf8d3cb188c364266a6
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Tue Aug 12 15:49:14 2014 +0200
xen: arm: Handle traps from 32-bit userspace on 64-bit kernel as undef
We are not setup to handle these properly. This turns a host crash
into a trap to the guest kernel which will likely result in killing
the offending process.
This is part of CVE-2014-5147 / XSA-102.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Julien Grall <julien.grall@linaro.org>
master commit: c0020e0997024eb741d60de9a480bf2878f891af
master date: 2014-08-12 15:37:25 +0200
commit 935d51859a92b1fb88f1fa1bf596782bdf4a80ca
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Tue Aug 12 15:48:28 2014 +0200
xen: arm: Correctly handle exception injection from userspace on 64-bit.
Firstly we must be prepared to propagate traps from 32-bit userspace even for
64-bit guests, so wrap the existing inject_undef??_exception into
inject_undef_exception and use that when injecting an undef exception. The
various other exception cases (aborts etc) already do this.
Secondly when injecting the trap we must pick the correct exception vector
depending on whether the source of the trap was 32-bit EL0, 64-bit EL0 or EL1.
This is part of CVE-2014-5147 / XSA-102.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Julien Grall <julien.grall@linaro.org>
master commit: a98669781769e821413dfef4ef99b93171375610
master date: 2014-08-12 15:36:15 +0200
commit 99a9f497cb070ba7168d45442ad8ea3604d95dcb
Author: Ian Campbell <ian.campbell@citrix.com>
Date: Tue Aug 12 15:45:49 2014 +0200
xen: arm: handle AArch32 userspace when dumping 64-bit guest state.
A 64-bit guest can still be in 32-bit mode when running userspace,
handle this case by dumping the correct 32-bit state.
Note that on ARM it is not possible to change mode without the help
of the next exception level, hence there is no way a 64-bit guest can
be running in 32-bit kernel modes.
This is part of CVE-2014-5147 / XSA-102.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Julien Grall <julien.grall@linaro.org>
master commit: fc0cafeab30fe93963457fafbad7a01c7f55ea5f
master date: 2014-08-12 15:32:27 +0200
commit 89f167e04ed89109c06092b8edf46c1519cab5f3
Author: Jan Beulich <jbeulich@suse.com>
Date: Tue Aug 12 15:44:26 2014 +0200
x86/paging: make log-dirty operations preemptible
Both the freeing and the inspection of the bitmap get done in (nested)
loops which - besides having a rather high iteration count in general,
albeit that would be covered by XSA-77 - have the number of non-trivial
iterations they need to perform (indirectly) controllable by both the
guest they are for and any domain controlling the guest (including the
one running qemu for it).
This is CVE-2014-5146 / XSA-97.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Tim Deegan <tim@xen.org>
master commit: 95e6d82224689fdfd967a093a4d69efc24c17e91
master date: 2014-08-12 15:30:11 +0200
(qemu changes not included)
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2014-08-20 17:34 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-08-20 17:34 [xen-4.4-testing test] 29856: regressions - trouble: blocked/broken/fail/pass xen.org
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.