xen.org
2011-May-13 13:30 UTC
[Xen-devel] [xen-4.0-testing test] 7071: trouble: broken/fail/pass
flight 7071 xen-4.0-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/7071/ Failures and problems with tests :-( Tests which did not succeed and are blocking: build-i386-oldkern 2 host-install(2) broken Tests which did not succeed, but are not blocking, including regressions (tests previously passed) regarded as allowable: test-amd64-amd64-win 16 leak-check/check fail never pass test-amd64-amd64-xl-win 7 windows-install fail never pass test-amd64-amd64-xl 15 guest-stop fail never pass test-amd64-i386-rhel6hvm-amd 7 redhat-install fail never pass test-amd64-i386-rhel6hvm-intel 7 redhat-install fail never pass test-amd64-i386-win-vcpus1 16 leak-check/check fail never pass test-amd64-i386-win 16 leak-check/check fail never pass test-amd64-i386-xl-credit2 5 xen-boot fail REGR. vs. 7059 test-amd64-i386-xl-multivcpu 15 guest-stop fail never pass test-amd64-i386-xl-win-vcpus1 7 windows-install fail never pass test-amd64-i386-xl 15 guest-stop fail never pass test-amd64-xcpkern-i386-rhel6hvm-amd 7 redhat-install fail never pass test-amd64-xcpkern-i386-rhel6hvm-intel 7 redhat-install fail never pass test-amd64-xcpkern-i386-win 16 leak-check/check fail never pass test-amd64-xcpkern-i386-xl-credit2 15 guest-stop fail never pass test-amd64-xcpkern-i386-xl-multivcpu 15 guest-stop fail never pass test-amd64-xcpkern-i386-xl-win 7 windows-install fail never pass test-amd64-xcpkern-i386-xl 15 guest-stop fail never pass test-i386-i386-win 16 leak-check/check fail never pass test-i386-i386-xl-win 7 windows-install fail never pass test-i386-i386-xl 15 guest-stop fail never pass test-i386-xcpkern-i386-win 16 leak-check/check fail never pass test-i386-xcpkern-i386-xl 15 guest-stop fail never pass version targeted for testing: xen b85a9e58ec3a baseline version: xen f47c6786ea6d ------------------------------------------------------------ People who touched revisions under test: Keir Fraser <keir@xen.org> Tim Deegan <Tim.Deegan@citrix.com> ------------------------------------------------------------ jobs: build-i386-xcpkern pass build-amd64 pass build-i386 pass build-amd64-oldkern pass build-i386-oldkern broken build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl fail test-amd64-i386-xl fail test-i386-i386-xl fail test-amd64-xcpkern-i386-xl fail test-i386-xcpkern-i386-xl fail test-amd64-i386-rhel6hvm-amd fail test-amd64-xcpkern-i386-rhel6hvm-amd fail test-amd64-i386-xl-credit2 fail test-amd64-xcpkern-i386-xl-credit2 fail test-amd64-i386-rhel6hvm-intel fail test-amd64-xcpkern-i386-rhel6hvm-intel fail test-amd64-i386-xl-multivcpu fail test-amd64-xcpkern-i386-xl-multivcpu fail test-amd64-amd64-pair pass test-amd64-i386-pair pass test-i386-i386-pair pass test-amd64-xcpkern-i386-pair pass test-i386-xcpkern-i386-pair pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-i386-i386-pv pass test-amd64-xcpkern-i386-pv pass test-i386-xcpkern-i386-pv pass test-amd64-i386-win-vcpus1 fail test-amd64-i386-xl-win-vcpus1 fail test-amd64-amd64-win fail test-amd64-i386-win fail test-i386-i386-win fail test-amd64-xcpkern-i386-win fail test-i386-xcpkern-i386-win fail test-amd64-amd64-xl-win fail test-i386-i386-xl-win fail test-amd64-xcpkern-i386-xl-win fail ------------------------------------------------------------ sg-report-flight on woking.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ changeset: 21485:b85a9e58ec3a tag: tip user: Keir Fraser <keir@xen.org> date: Thu May 12 18:07:45 2011 +0100 x86, vtd: [CVE-2011-1898] Protect against malicious MSIs from untrusted devices. In the absence of VT-d interrupt remapping support, a device can send arbitrary APIC messages to host CPUs. One class of attack that results is to confuse the hypervisor by delivering asynchronous interrupts to vectors that are expected to handle only synchronous traps/exceptions. We block this class of attack by: (1) setting APIC.TPR=0x10, to block all interrupts below vector 0x20. This blocks delivery to all architectural exception vectors. (2) checking APIC.ISR[vec] for vectors 0x80 (fast syscall) and 0x82 (hypercall). In these cases we BUG if we detect we are handling a hardware interrupt -- turning a potentially more severe infiltration into a straightforward system crash (i.e, DoS). Thanks to Invisible Things Lab <http://www.invisiblethingslab.com> for discovery and detailed investigation of this attack. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23337:cc91832a02c7 xen-unstable date: Thu May 12 16:39:31 2011 +0100 changeset: 21484:f47c6786ea6d user: Tim Deegan <Tim.Deegan@citrix.com> date: Thu May 12 09:23:21 2011 +0100 x86: use compat hypercall handlers for calls from 32-bit HVM guests On 64-bit Xen, hypercalls from 32-bit HVM guests are handled as a special case, but not all the hypercalls are corrently redirected to their compat-mode wrappers. Use compat_* for xen_version, sched_op and set_timer_op for consistency. Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23333:fabdd682420c xen-unstable date: Thu May 12 09:13:18 2011 +0100 (qemu changes not included) _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel