[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [qemu-upstream-unstable test] 60546: trouble: blocked/broken/fail/pass



flight 60546 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60546/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf                   3 host-install(3)         broken REGR. vs. 58880

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-qcow2     1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 build-armhf-libvirt           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-raw       1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  11 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-raw 11 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 11 migrate-support-check        fail never pass
 test-amd64-i386-libvirt-qcow2 11 migrate-support-check        fail  never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-vhd  11 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start                  fail   never pass
 test-amd64-i386-libvirt-xsm  12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      12 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop             fail never pass
 test-amd64-amd64-xl-pvh-intel 11 guest-start                  fail  never pass
 test-armhf-armhf-xl-xsm      12 migrate-support-check        fail   never pass
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop              fail never pass

version targeted for testing:
 qemuu                bcf35eec0b621c46dbf0aeb40c6bc06b5d3981aa
baseline version:
 qemuu                c4a962ec0c61aa9b860a3635c8424472e6c2cc2c

Last test of basis    58880  2015-06-24 13:45:58 Z   41 days
Failing since         59777  2015-07-20 12:49:32 Z   15 days   10 attempts
Testing same since    60546  2015-08-03 16:17:04 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Kevin Wolf <kwolf@xxxxxxxxxx>
  Marc-André Lureau <marcandre.lureau@xxxxxxxxx>
  Paolo Bonzini <pbonzini@xxxxxxxxxx>
  Stefan Hajnoczi <stefanha@xxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

jobs:
 build-amd64-xsm                                              pass
 build-armhf-xsm                                              pass
 build-i386-xsm                                               pass
 build-amd64                                                  pass
 build-armhf                                                  broken
 build-i386                                                   pass
 build-amd64-libvirt                                          pass
 build-armhf-libvirt                                          blocked
 build-i386-libvirt                                           pass
 build-amd64-pvops                                            pass
 build-armhf-pvops                                            pass
 build-i386-pvops                                             pass
 test-amd64-amd64-xl                                          pass
 test-armhf-armhf-xl                                          blocked
 test-amd64-i386-xl                                           pass
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                pass
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 pass
 test-amd64-amd64-libvirt-xsm                                 pass
 test-armhf-armhf-libvirt-xsm                                 blocked
 test-amd64-i386-libvirt-xsm                                  pass
 test-amd64-amd64-xl-xsm                                      pass
 test-armhf-armhf-xl-xsm                                      pass
 test-amd64-i386-xl-xsm                                       pass
 test-amd64-amd64-xl-pvh-amd                                  fail
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass
 test-amd64-i386-freebsd10-amd64                              pass
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail
 test-amd64-i386-xl-qemuu-win7-amd64                          fail
 test-armhf-armhf-xl-arndale                                  blocked
 test-amd64-amd64-xl-credit2                                  pass
 test-armhf-armhf-xl-credit2                                  blocked
 test-armhf-armhf-xl-cubietruck                               blocked
 test-amd64-i386-freebsd10-i386                               pass
 test-amd64-amd64-xl-pvh-intel                                fail
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass
 test-amd64-amd64-libvirt                                     pass
 test-armhf-armhf-libvirt                                     blocked
 test-amd64-i386-libvirt                                      pass
 test-amd64-amd64-xl-multivcpu                                pass
 test-armhf-armhf-xl-multivcpu                                blocked
 test-amd64-amd64-pair                                        pass
 test-amd64-i386-pair                                         pass
 test-amd64-amd64-amd64-pvgrub                                pass
 test-amd64-amd64-i386-pvgrub                                 pass
 test-amd64-amd64-pygrub                                      pass
 test-amd64-amd64-libvirt-qcow2                               pass
 test-armhf-armhf-libvirt-qcow2                               blocked
 test-amd64-i386-libvirt-qcow2                                pass
 test-amd64-amd64-xl-qcow2                                    pass
 test-armhf-armhf-xl-qcow2                                    blocked
 test-amd64-i386-xl-qcow2                                     pass
 test-amd64-amd64-libvirt-raw                                 pass
 test-armhf-armhf-libvirt-raw                                 blocked
 test-amd64-i386-libvirt-raw                                  pass
 test-amd64-amd64-xl-raw                                      pass
 test-armhf-armhf-xl-raw                                      blocked
 test-amd64-i386-xl-raw                                       pass
 test-amd64-amd64-xl-rtds                                     pass
 test-armhf-armhf-xl-rtds                                     blocked
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass
 test-amd64-amd64-libvirt-vhd                                 pass
 test-armhf-armhf-libvirt-vhd                                 blocked
 test-amd64-i386-libvirt-vhd                                  pass
 test-amd64-amd64-xl-vhd                                      pass
 test-armhf-armhf-xl-vhd                                      blocked
 test-amd64-i386-xl-vhd                                       pass
 test-amd64-amd64-xl-qemuu-winxpsp3                           pass
 test-amd64-i386-xl-qemuu-winxpsp3                            pass


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-step build-armhf host-install(3)

Not pushing.

------------------------------------------------------------
commit bcf35eec0b621c46dbf0aeb40c6bc06b5d3981aa
Author: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
Date:   Mon Aug 3 13:56:57 2015 +0000

    Fix release_drive on unplugged devices (pci_piix3_xen_ide_unplug)

    pci_piix3_xen_ide_unplug should completely unhook the unplugged
    IDEDevice from the corresponding BlockBackend, otherwise the next call
    to release_drive will try to detach the drive again.

    Suggested-by: Kevin Wolf <kwolf@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 94db81945c93c679fb5d2eb7d3beb98802f99d93
Author: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
Date:   Wed Jul 15 18:17:04 2015 +0100

    rtl8139: check TCP Data Offset field

    The TCP Data Offset field contains the length of the header.  Make sure
    it is valid and does not exceed the IP data length.

    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 6d75b8f79bfaa352566147ea606ca4ea504992d2
Author: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
Date:   Wed Jul 15 18:17:03 2015 +0100

    rtl8139: skip offload on short TCP header

    TCP Large Segment Offload accesses the TCP header in the packet.  If the
    packet is too short we must not attempt to access header fields:

      tcp_header *p_tcp_hdr = (tcp_header*)(eth_payload_data + hlen);
      int tcp_hlen = TCP_HEADER_DATA_OFFSET(p_tcp_hdr);

    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit b649863740fb3b93ba716d665fbfa1ce83cb5936
Author: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
Date:   Wed Jul 15 18:17:02 2015 +0100

    rtl8139: check IP Total Length field

    The IP Total Length field includes the IP header and data.  Make sure it
    is valid and does not exceed the Ethernet payload size.

    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 5f7cccedaaa8dac367f3dbda857f57e915d8e775
Author: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
Date:   Wed Jul 15 18:17:01 2015 +0100

    rtl8139: check IP Header Length field

    The IP Header Length field was only checked in the IP checksum case, but
    is used in other cases too.

    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit fa1d29345aa1140d70d4962327f382f9866e6fcb
Author: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
Date:   Wed Jul 15 18:17:00 2015 +0100

    rtl8139: skip offload on short Ethernet/IP header

    Transmit offload features access Ethernet and IP headers the packet.  If
    the packet is too short we must not attempt to access header fields:

      int proto = be16_to_cpu(*(uint16_t *)(saved_buffer + 12));
      ...
      eth_payload_data = saved_buffer + ETH_HLEN;
      ...
      ip = (ip_header*)eth_payload_data;
      if (IP_HEADER_VERSION(ip) != IP_HEADER_VERSION_4) {

    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 1f559270d11f62b0d7ea20a741876fb3f2f376af
Author: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
Date:   Wed Jul 15 18:16:59 2015 +0100

    rtl8139: drop tautologous if (ip) {...} statement

    The previous patch stopped using the ip pointer as an indicator that the
    IP header is present.  When we reach the if (ip) {...} statement we know
    ip is always non-NULL.

    Remove the if statement to reduce nesting.

    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 4b47e318c956c6cf7287870bf88cd306c1e4c068
Author: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
Date:   Wed Jul 15 18:16:58 2015 +0100

    rtl8139: avoid nested ifs in IP header parsing

    Transmit offload needs to parse packet headers.  If header fields have
    unexpected values the offload processing is skipped.

    The code currently uses nested ifs because there is relatively little
    input validation.  The next patches will add missing input validation
    and a goto label is more appropriate to avoid deep if statement nesting.

    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit f748613efca3cd444db26d5aae9244ffa7d7d313
Author: Kevin Wolf <kwolf@xxxxxxxxxx>
Date:   Sun Jul 26 23:42:53 2015 -0400

    ide: Clear DRQ after handling all expected accesses (CVE-2015-5154)

    This is additional hardening against an end_transfer_func that fails to
    clear the DRQ status bit. The bit must be unset as soon as the PIO
    transfer has completed, so it's better to do this in a central place
    instead of duplicating the code in all commands (and forgetting it in
    some).

    upstream-commit-id: cb72cba83021fa42719e73a5249c12096a4d1cfc

    Signed-off-by: Kevin Wolf <kwolf@xxxxxxxxxx>
    Reviewed-by: John Snow <jsnow@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 325ec5e0b290b47b177c42e4a930b6644c538321
Author: Kevin Wolf <kwolf@xxxxxxxxxx>
Date:   Sun Jul 26 23:42:53 2015 -0400

    ide/atapi: Fix START STOP UNIT command completion (CVE-2015-5154)

    The command must be completed on all code paths. START STOP UNIT with
    pwrcnd set should succeed without doing anything.

    upstream-commit-id: 03441c3a4a42beb25460dd11592539030337d0f8

    Signed-off-by: Kevin Wolf <kwolf@xxxxxxxxxx>
    Reviewed-by: John Snow <jsnow@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit aaaa1f4499a81204a96ed8273ee3d90d684102ed
Author: Kevin Wolf <kwolf@xxxxxxxxxx>
Date:   Sun Jul 26 23:42:53 2015 -0400

    ide: Check array bounds before writing to io_buffer (CVE-2015-5154)

    If the end_transfer_func of a command is called because enough data has
    been read or written for the current PIO transfer, and it fails to
    correctly call the command completion functions, the DRQ bit in the
    status register and s->end_transfer_func may remain set. This allows the
    guest to access further bytes in s->io_buffer beyond s->data_end, and
    eventually overflowing the io_buffer.

    One case where this currently happens is emulation of the ATAPI command
    START STOP UNIT.

    This patch fixes the problem by adding explicit array bounds checks
    before accessing the buffer instead of relying on end_transfer_func to
    function correctly.

    upstream-commit-id: d2ff85854512574e7209f295e87b0835d5b032c6

    Cc: qemu-stable@xxxxxxxxxx
    Signed-off-by: Kevin Wolf <kwolf@xxxxxxxxxx>
    Reviewed-by: John Snow <jsnow@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit e40ae8730e83e25f160c7576dd32d882bf2a3846
Author: Paolo Bonzini <pbonzini@xxxxxxxxxx>
Date:   Tue Jul 21 08:59:39 2015 +0200

    scsi: fix buffer overflow in scsi_req_parse_cdb (CVE-2015-5158)

    This is a guest-triggerable buffer overflow present in QEMU 2.2.0
    and newer.  scsi_cdb_length returns -1 as an error value, but the
    caller does not check it.

    Luckily, the massive overflow means that QEMU will just SIGSEGV,
    making the impact much smaller.

    upstream-commit-id: c170aad8b057223b1139d72e5ce7acceafab4fa9

    Reported-by: Zhu Donghai (��海) <donghai.zdh@xxxxxxxxxxxxxxx>
    Fixes: 1894df02811f6b79ea3ffbf1084599d96f316173
    Reviewed-by: Fam Zheng <famz@xxxxxxxxxx>
    Cc: qemu-stable@xxxxxxxxxx
    Signed-off-by: Paolo Bonzini <pbonzini@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 9ad5c2cf05a084ef2fab2b21c4175f0a34482664
Author: Jan Beulich <JBeulich@xxxxxxxx>
Date:   Fri Jul 24 03:38:28 2015 -0600

    xen/HVM: atomically access pointers in bufioreq handling

    The number of slots per page being 511 (i.e. not a power of two) means
    that the (32-bit) read and write indexes going beyond 2^32 will likely
    disturb operation. The hypervisor side gets I/O req server creation
    extended so we can indicate that we're using suitable atomic accesses
    where needed, allowing it to atomically canonicalize both pointers when
    both have gone through at least one cycle.

    The Xen side counterpart (which is not a functional prereq to this
    change, albeit a build one) went in already (commit b7007bc6f9).

    upstream-commit-id: 95728305c4781e69896e9f72d1023daa7be46dbe

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit c3eb5b77be3c731c2ecd6eddab403bb8dabc135a
Author: Marc-André Lureau <marcandre.lureau@xxxxxxxxx>
Date:   Thu May 28 15:04:58 2015 +0200

    spice: fix spice_chr_add_watch() pre-condition

    Since e02bc6de30c44fd668dc0d6e1cd1804f2eed3ed3, add_watch() is called
    with G_IO_HUP. Even if spice-qemu-char ignores this flag, the
    precondition must be changed.

    https://bugzilla.redhat.com/show_bug.cgi?id=1128992

    upstream-commit-id: f7a8beb5e6a13dc924895244777d9ef08b23b367

    Signed-off-by: Gerd Hoffmann <kraxel@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.