WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [xen-4.1-testing test] 7064: regressions - FAIL

To: <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-devel] [xen-4.1-testing test] 7064: regressions - FAIL
From: xen.org <ian.jackson@xxxxxxxxxxxxx>
Date: Fri, 13 May 2011 08:25:20 +0100
Cc: ian.jackson@xxxxxxxxxxxxx
Delivery-date: Fri, 13 May 2011 00:26:13 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
flight 7064 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/7064/

Regressions :-(

Tests which did not succeed and are blocking:
 test-amd64-xcpkern-i386-pair 16 guest-start                fail REGR. vs. 7035

Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass
 test-amd64-i386-rhel6hvm-amd  8 guest-saverestore            fail   never pass
 test-amd64-i386-rhel6hvm-intel  8 guest-saverestore            fail never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-xcpkern-i386-rhel6hvm-amd  8 guest-saverestore      fail never pass
 test-amd64-xcpkern-i386-rhel6hvm-intel  8 guest-saverestore    fail never pass
 test-amd64-xcpkern-i386-win  16 leak-check/check             fail   never pass
 test-amd64-xcpkern-i386-xl-win 13 guest-stop                   fail never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-i386-i386-xl-win        13 guest-stop                   fail   never pass
 test-i386-xcpkern-i386-win   16 leak-check/check             fail   never pass

version targeted for testing:
 xen                  51ad19c58962
baseline version:
 xen                  e2e575f8b5d9

------------------------------------------------------------
People who touched revisions under test:
  Christoph Egger <Christoph.Egger@xxxxxxx>
  David Brownlee <abs@xxxxxxxxxx>
  Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Tim Deegan <Tim.Deegan@xxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-i386-xcpkern                                           pass     
 build-amd64                                                  pass     
 build-i386                                                   pass     
 build-amd64-oldkern                                          pass     
 build-i386-oldkern                                           pass     
 build-amd64-pvops                                            pass     
 build-i386-pvops                                             pass     
 test-amd64-amd64-xl                                          pass     
 test-amd64-i386-xl                                           pass     
 test-i386-i386-xl                                            pass     
 test-amd64-xcpkern-i386-xl                                   pass     
 test-i386-xcpkern-i386-xl                                    pass     
 test-amd64-i386-rhel6hvm-amd                                 fail     
 test-amd64-xcpkern-i386-rhel6hvm-amd                         fail     
 test-amd64-i386-xl-credit2                                   pass     
 test-amd64-xcpkern-i386-xl-credit2                           pass     
 test-amd64-i386-rhel6hvm-intel                               fail     
 test-amd64-xcpkern-i386-rhel6hvm-intel                       fail     
 test-amd64-i386-xl-multivcpu                                 pass     
 test-amd64-xcpkern-i386-xl-multivcpu                         pass     
 test-amd64-amd64-pair                                        pass     
 test-amd64-i386-pair                                         pass     
 test-i386-i386-pair                                          pass     
 test-amd64-xcpkern-i386-pair                                 fail     
 test-i386-xcpkern-i386-pair                                  pass     
 test-amd64-amd64-pv                                          pass     
 test-amd64-i386-pv                                           pass     
 test-i386-i386-pv                                            pass     
 test-amd64-xcpkern-i386-pv                                   pass     
 test-i386-xcpkern-i386-pv                                    pass     
 test-amd64-i386-win-vcpus1                                   fail     
 test-amd64-i386-xl-win-vcpus1                                fail     
 test-amd64-amd64-win                                         fail     
 test-amd64-i386-win                                          fail     
 test-i386-i386-win                                           fail     
 test-amd64-xcpkern-i386-win                                  fail     
 test-i386-xcpkern-i386-win                                   fail     
 test-amd64-amd64-xl-win                                      fail     
 test-i386-i386-xl-win                                        fail     
 test-amd64-xcpkern-i386-xl-win                               fail     


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   23047:51ad19c58962
tag:         tip
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Thu May 12 18:04:14 2011 +0100
    
    x86: Check for valid pirq values in hvm_domain_use_pirq
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    xen-unstable changeset:   23339:f9bb0bbea7c2
    xen-unstable date:        Thu May 12 16:42:54 2011 +0100
    
    
changeset:   23046:ed630a821de1
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu May 12 18:03:47 2011 +0100
    
    x86, vtd: [CVE-2011-1898] Protect against malicious MSIs from untrusted 
devices.
    
    In the absence of VT-d interrupt remapping support, a device can send
    arbitrary APIC messages to host CPUs. One class of attack that results
    is to confuse the hypervisor by delivering asynchronous interrupts to
    vectors that are expected to handle only synchronous
    traps/exceptions.
    
    We block this class of attack by:
    (1) setting APIC.TPR=0x10, to block all interrupts below vector
    0x20. This blocks delivery to all architectural exception vectors.
    (2) checking APIC.ISR[vec] for vectors 0x80 (fast syscall) and 0x82
    (hypercall). In these cases we BUG if we detect we are handling a
    hardware interrupt -- turning a potentially more severe infiltration
    into a straightforward system crash (i.e, DoS).
    
    Thanks to Invisible Things Lab <http://www.invisiblethingslab.com>
    for discovery and detailed investigation of this attack.
    
    Signed-off-by: Keir Fraser <keir@xxxxxxx>
    xen-unstable changeset:   23337:cc91832a02c7
    xen-unstable date:        Thu May 12 16:39:31 2011 +0100
    
    
changeset:   23045:bf9a086b4d63
user:        Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date:        Thu May 12 09:20:09 2011 +0100
    
    x86/hvm: pv-on-hvm: fix de/assert_irq checks
    
    The checks in assert_irq and deassert_irq to distinguish interrupts
    that have been remapped onto event channels from the others that have
    to be injected using the emulated lapic are wrong.
    
    Fix the condition checks using the convenient hvm_domain_use_pirq
    function.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    xen-unstable changeset:   23335:0957e0c5f0e4
    xen-unstable date:        Thu May 12 09:15:05 2011 +0100
    
    
changeset:   23044:bd9b2a067682
user:        Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date:        Thu May 12 09:19:29 2011 +0100
    
    x86: use compat hypercall handlers for calls from 32-bit HVM guests
    
    On 64-bit Xen, hypercalls from 32-bit HVM guests are handled as
    a special case, but not all the hypercalls are corrently redirected
    to their compat-mode wrappers.  Use compat_* for xen_version,
    sched_op and set_timer_op for consistency.
    
    Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
    xen-unstable changeset:   23333:fabdd682420c
    xen-unstable date:        Thu May 12 09:13:18 2011 +0100
    
    
changeset:   23043:f04847b78328
user:        Christoph Egger <Christoph.Egger@xxxxxxx>
date:        Thu May 12 09:18:42 2011 +0100
    
    tools/xm-test: portability fix: Avoid using == in /bin/sh script
    
    From: David Brownlee <abs@xxxxxxxxxx>
    Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
    xen-unstable changeset:   23328:6767d92dff13
    xen-unstable date:        Thu May 12 08:55:12 2011 +0100
    
    
changeset:   23042:e2e575f8b5d9
user:        Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
date:        Mon May 09 15:04:01 2011 +0100
    
    libxc: [CVE-2011-1583] pv kernel image validation
    
    The functions which interpret the kernel image supplied for a
    paravirtualised guest, and decompress it into memory when booting the
    domain, are incautious.  Specifically:
    
     (i) Integer overflow in the decompression loop memory allocator might
        result in overrunning the buffer used for the decompressed image;
     (ii) Integer overflows and lack of checking of certain length fields
        can result in the loader reading its own address space beyond the
        size of the supplied kernel image file.
     (iii) Lack of error checking in the decompression loop can lead to an
        infinite loop.
    
    This patch fixes these problems.
    
    CVE-2011-1583.
    
    Signed-off-by: Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx>
    Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    Committed-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
    
    
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] [xen-4.1-testing test] 7064: regressions - FAIL, xen . org <=