flight 7065 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/7065/
Failures and problems with tests :-(
Tests which did not succeed and are blocking:
build-i386-oldkern 2 host-install(2) broken
build-i386-pvops 2 host-install(2) broken
build-i386 2 host-install(2) broken
Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
test-amd64-amd64-win 16 leak-check/check fail never pass
test-amd64-amd64-xl-win 13 guest-stop fail never pass
test-amd64-i386-pair 1 xen-build-check(1) blocked n/a
test-amd64-i386-pv 1 xen-build-check(1) blocked n/a
test-amd64-i386-rhel6hvm-amd 1 xen-build-check(1) blocked n/a
test-amd64-i386-rhel6hvm-intel 1 xen-build-check(1) blocked n/a
test-amd64-i386-win-vcpus1 1 xen-build-check(1) blocked n/a
test-amd64-i386-win 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-credit2 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-multivcpu 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl-win-vcpus1 1 xen-build-check(1) blocked n/a
test-amd64-i386-xl 1 xen-build-check(1) blocked n/a
test-amd64-xcpkern-i386-pair 6 xen-install/dst_host fail like 7058
test-amd64-xcpkern-i386-pair 5 xen-install/src_host fail like 7058
test-amd64-xcpkern-i386-pv 4 xen-install fail like 7058
test-amd64-xcpkern-i386-rhel6hvm-amd 4 xen-install fail like 7058
test-amd64-xcpkern-i386-rhel6hvm-intel 4 xen-install fail like 7058
test-amd64-xcpkern-i386-win 4 xen-install fail like 7058
test-amd64-xcpkern-i386-xl-credit2 4 xen-install fail like 7058
test-amd64-xcpkern-i386-xl-multivcpu 4 xen-install fail like 7058
test-amd64-xcpkern-i386-xl-win 4 xen-install fail like 7058
test-amd64-xcpkern-i386-xl 4 xen-install fail like 7058
test-i386-i386-pair 1 xen-build-check(1) blocked n/a
test-i386-i386-pv 1 xen-build-check(1) blocked n/a
test-i386-i386-win 1 xen-build-check(1) blocked n/a
test-i386-i386-xl-win 1 xen-build-check(1) blocked n/a
test-i386-i386-xl 1 xen-build-check(1) blocked n/a
test-i386-xcpkern-i386-pair 1 xen-build-check(1) blocked n/a
test-i386-xcpkern-i386-pv 1 xen-build-check(1) blocked n/a
test-i386-xcpkern-i386-win 1 xen-build-check(1) blocked n/a
test-i386-xcpkern-i386-xl 1 xen-build-check(1) blocked n/a
version targeted for testing:
xen f9bb0bbea7c2
baseline version:
xen 0c446850d85e
------------------------------------------------------------
People who touched revisions under test:
Allen Kay <allen.m.kay@xxxxxxxxx>
Christoph Egger <Christoph.Egger@xxxxxxx>
David Brownlee <abs@xxxxxxxxxx>
Jacob Shin <jacob.shin@xxxxxxx>
Keir Fraser <keir@xxxxxxx>
Liu, Jinsong <jinsong.liu@xxxxxxxxx>
Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
Tim Deegan <Tim.Deegan@xxxxxxxxxx>
Uwe Dannowski <Uwe.Dannowski@xxxxxxx>
------------------------------------------------------------
jobs:
build-i386-xcpkern pass
build-amd64 pass
build-i386 broken
build-amd64-oldkern pass
build-i386-oldkern broken
build-amd64-pvops pass
build-i386-pvops broken
test-amd64-amd64-xl pass
test-amd64-i386-xl blocked
test-i386-i386-xl blocked
test-amd64-xcpkern-i386-xl fail
test-i386-xcpkern-i386-xl blocked
test-amd64-i386-rhel6hvm-amd blocked
test-amd64-xcpkern-i386-rhel6hvm-amd fail
test-amd64-i386-xl-credit2 blocked
test-amd64-xcpkern-i386-xl-credit2 fail
test-amd64-i386-rhel6hvm-intel blocked
test-amd64-xcpkern-i386-rhel6hvm-intel fail
test-amd64-i386-xl-multivcpu blocked
test-amd64-xcpkern-i386-xl-multivcpu fail
test-amd64-amd64-pair pass
test-amd64-i386-pair blocked
test-i386-i386-pair blocked
test-amd64-xcpkern-i386-pair fail
test-i386-xcpkern-i386-pair blocked
test-amd64-amd64-pv pass
test-amd64-i386-pv blocked
test-i386-i386-pv blocked
test-amd64-xcpkern-i386-pv fail
test-i386-xcpkern-i386-pv blocked
test-amd64-i386-win-vcpus1 blocked
test-amd64-i386-xl-win-vcpus1 blocked
test-amd64-amd64-win fail
test-amd64-i386-win blocked
test-i386-i386-win blocked
test-amd64-xcpkern-i386-win fail
test-i386-xcpkern-i386-win blocked
test-amd64-amd64-xl-win fail
test-i386-i386-xl-win blocked
test-amd64-xcpkern-i386-xl-win fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
changeset: 23339:f9bb0bbea7c2
tag: tip
user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date: Thu May 12 16:42:54 2011 +0100
x86: Check for valid pirq values in hvm_domain_use_pirq
Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
changeset: 23338:9751bc49639e
user: Keir Fraser <keir@xxxxxxx>
date: Thu May 12 16:42:00 2011 +0100
vt-d: [CVE-2011-1898] Ensure that "iommu=required" enables interrupt
remapping.
Ensure that when Xen boots with "iommu=required" it will also insist
that interrupt remapping is supported and enabled. It arranges that
booting with that option on vulnerable hardware will fail, rather than
appearing to succeed but actually being vulnerable to guests.
From: Allen Kay <allen.m.kay@xxxxxxxxx>
Signed-off-by: Keir Fraser <keir@xxxxxxx>
changeset: 23337:cc91832a02c7
user: Keir Fraser <keir@xxxxxxx>
date: Thu May 12 16:39:31 2011 +0100
x86, vtd: [CVE-2011-1898] Protect against malicious MSIs from untrusted
devices.
In the absence of VT-d interrupt remapping support, a device can send
arbitrary APIC messages to host CPUs. One class of attack that results
is to confuse the hypervisor by delivering asynchronous interrupts to
vectors that are expected to handle only synchronous
traps/exceptions.
We block this class of attack by:
(1) setting APIC.TPR=0x10, to block all interrupts below vector
0x20. This blocks delivery to all architectural exception vectors.
(2) checking APIC.ISR[vec] for vectors 0x80 (fast syscall) and 0x82
(hypercall). In these cases we BUG if we detect we are handling a
hardware interrupt -- turning a potentially more severe infiltration
into a straightforward system crash (i.e, DoS).
Thanks to Invisible Things Lab <http://www.invisiblethingslab.com>
for discovery and detailed investigation of this attack.
Signed-off-by: Keir Fraser <keir@xxxxxxx>
changeset: 23336:955d4f369d5a
user: Keir Fraser <keir@xxxxxxx>
date: Thu May 12 09:33:59 2011 +0100
x86/hvm: Use UNLIKELY_{START,END} in a few suitable places in asm.
Signed-off-by: Keir Fraser <keir@xxxxxxx>
changeset: 23335:0957e0c5f0e4
user: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
date: Thu May 12 09:15:05 2011 +0100
x86/hvm: pv-on-hvm: fix de/assert_irq checks
The checks in assert_irq and deassert_irq to distinguish interrupts
that have been remapped onto event channels from the others that have
to be injected using the emulated lapic are wrong.
Fix the condition checks using the convenient hvm_domain_use_pirq
function.
Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
changeset: 23334:23e33ea79cac
user: Jacob Shin <jacob.shin@xxxxxxx>
date: Thu May 12 09:14:06 2011 +0100
hvm: vpmu: Enable HVM VPMU for AMD Family 12h and 14h processors
HVM VPMU support can be enabled for AMD Family 12h and 14h processors
by taking the same code path as 10h.
Signed-off-by: Jacob Shin <jacob.shin@xxxxxxx>
changeset: 23333:fabdd682420c
user: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
date: Thu May 12 09:13:18 2011 +0100
x86: use compat hypercall handlers for calls from 32-bit HVM guests
On 64-bit Xen, hypercalls from 32-bit HVM guests are handled as
a special case, but not all the hypercalls are corrently redirected
to their compat-mode wrappers. Use compat_* for xen_version,
sched_op and set_timer_op for consistency.
Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
changeset: 23332:1e29db7a3b6b
user: Christoph Egger <Christoph.Egger@xxxxxxx>
date: Thu May 12 09:07:35 2011 +0100
nestedsvm: fix shadow-on-hap
Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
changeset: 23331:19d6541c4abe
user: Christoph Egger <Christoph.Egger@xxxxxxx>
date: Thu May 12 09:00:46 2011 +0100
nestedsvm: update rip on invlpga intercept
Fixes endless loop.
Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
changeset: 23330:b6e8e916ed28
user: Christoph Egger <Christoph.Egger@xxxxxxx>
date: Thu May 12 08:58:02 2011 +0100
nestedsvm: fix error path when VMRUN emulation fails
With this, l1 guest keeps alive rather crashing the host.
Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
changeset: 23329:8489494ee490
user: Christoph Egger <Christoph.Egger@xxxxxxx>
date: Thu May 12 08:57:08 2011 +0100
nestedsvm: fix host crash with pv-on-hvm Linux KVM guest
Nested SVM was unaware of the HVM direct vector eventchn mechanism.
Attached patch fixes a host crash when starting a KVM L2 guest on a
pv-on-hvm L1 Linux guest (e.g., HVM Debian Squeeze domU).
Signed-off-by: Uwe Dannowski <Uwe.Dannowski@xxxxxxx>
Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
Acked-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
changeset: 23328:6767d92dff13
user: Christoph Egger <Christoph.Egger@xxxxxxx>
date: Thu May 12 08:55:12 2011 +0100
tools/xm-test: portability fix: Avoid using == in /bin/sh script
From: David Brownlee <abs@xxxxxxxxxx>
Signed-off-by: Christoph Egger <Christoph.Egger@xxxxxxx>
changeset: 23327:3d0ba2b4941f
user: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date: Thu May 12 08:53:42 2011 +0100
x86/mca: MCA bank clear
1). Add explicitly uc=pcc=1 fatal error detect, since under such case
the s/ar/over bits status is undefined and hence may be
mis-cleaned. Explicit fatal detect return 0 indicate stick MSR bank
will have chance to be handled after reboot by polling;
2). Fix a little bug for case SRAR, over bit should be 0 when need
clear bank, otherwise it would reset system;
3). When clear bank, add clear MCi_ADDR/MISC if it's valid, according
to Intel SDM;
Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
changeset: 23326:f69f5836d8c2
user: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date: Thu May 12 08:52:47 2011 +0100
x86/mca MCA minor bugfix
This patch fix a minor bug, when in xen context and cannot safely
return the mce break point, reset system;
Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
changeset: 23325:ab93de9a608d
user: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
date: Thu May 12 08:52:18 2011 +0100
x86/mca: MCA physical address check when calculate domain
Bank addr maybe invalid, or Bank addr maybe physical/memory/linear
address or segment offset. This patch add mca
MCi_STATUS_MISCV/MCi_STATUS_ADDRV check, and add physical address
verify, so that it work safe when calculate domain.
Signed-off-by: Liu, Jinsong <jinsong.liu@xxxxxxxxx>
changeset: 23324:0c446850d85e
user: Keir Fraser <keir@xxxxxxx>
date: Wed May 11 12:58:04 2011 +0100
Simplify and build-fix (for some gcc versions) radix_tree_int_to_ptr().
Signed-off-by: Keir Fraser <keir@xxxxxxx>
(qemu changes not included)
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|