[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [qemu-upstream-4.4-testing test] 62675: trouble: broken/pass



flight 62675 qemu-upstream-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62675/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-vhd        2 hosts-allocate               running
 test-amd64-i386-libvirt-qcow2  2 hosts-allocate               running
 test-amd64-i386-xl-qcow2      2 hosts-allocate               running
 test-amd64-i386-libvirt-raw   2 hosts-allocate               running
 test-amd64-amd64-xl-raw       2 hosts-allocate               running
 test-amd64-amd64-libvirt      2 hosts-allocate               running
 test-amd64-i386-libvirt       2 hosts-allocate               running
 test-amd64-amd64-xl           2 hosts-allocate               running
 test-amd64-i386-pv            2 hosts-allocate               running
 test-amd64-i386-qemuu-rhel6hvm-intel  2 hosts-allocate               running
 test-amd64-amd64-pair         2 hosts-allocate               running
 test-amd64-amd64-i386-pvgrub  2 hosts-allocate               running
 test-amd64-amd64-xl-multivcpu  2 hosts-allocate               running
 test-amd64-amd64-libvirt-qcow2  2 hosts-allocate               running
 test-amd64-amd64-xl-credit2   2 hosts-allocate               running
 test-amd64-amd64-pygrub       2 hosts-allocate               running
 test-amd64-amd64-libvirt-raw  2 hosts-allocate               running
 test-amd64-i386-pair          2 hosts-allocate               running
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  2 hosts-allocate            running
 test-amd64-i386-libvirt-pair  2 hosts-allocate               running
 test-amd64-i386-qemuu-rhel6hvm-amd  2 hosts-allocate               running
 test-amd64-amd64-xl-qcow2     2 hosts-allocate               running
 test-amd64-amd64-xl-vhd       2 hosts-allocate               running
 test-amd64-amd64-libvirt-vhd  2 hosts-allocate               running
 test-amd64-amd64-amd64-pvgrub  2 hosts-allocate               running
 test-amd64-i386-xl-qemuu-ovmf-amd64  2 hosts-allocate               running
 test-amd64-amd64-xl-qemuu-ovmf-amd64  2 hosts-allocate               running
 test-amd64-amd64-libvirt-pair  2 hosts-allocate               running
 test-amd64-amd64-xl-qemuu-win7-amd64  2 hosts-allocate               running
 test-amd64-i386-freebsd10-amd64  2 hosts-allocate               running
 test-amd64-i386-xl-qemuu-win7-amd64  2 hosts-allocate               running
 test-amd64-i386-xl            2 hosts-allocate               running
 test-amd64-i386-xl-qemuu-debianhvm-amd64  2 hosts-allocate             running
 test-amd64-amd64-pv           2 hosts-allocate               running
 test-amd64-i386-xl-raw        2 hosts-allocate               running
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1  2 hosts-allocate             running
 test-amd64-i386-freebsd10-i386  2 hosts-allocate               running
 test-amd64-i386-libvirt-vhd   2 hosts-allocate               running
 test-amd64-amd64-xl-qemuu-winxpsp3  2 hosts-allocate               running

version targeted for testing:
 qemuu                5fe74249f5ab528fe84a26fa60438a6de4c787f0
baseline version:
 qemuu                0fc147387f0b683d2dfefec7b1af569f17b72e9c

Last test of basis    60565  2015-08-04 01:59:38 Z   63 days
Failing since         61617  2015-09-08 12:10:54 Z   28 days   13 attempts
Testing same since    62062  2015-09-16 11:15:04 Z   20 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@xxxxxxxxxx>
  P J P <pjp@xxxxxxxxxxxxxxxxx>
  Peter Lieven <pl@xxxxxxx>
  Stefan Hajnoczi <stefanha@xxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

jobs:
 build-amd64-xend                                             pass    
 build-i386-xend                                              pass    
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          broken  
 test-amd64-i386-xl                                           broken  
 test-amd64-i386-qemuu-rhel6hvm-amd                           broken  
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     broken  
 test-amd64-i386-freebsd10-amd64                              broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         broken  
 test-amd64-i386-xl-qemuu-ovmf-amd64                          broken  
 test-amd64-amd64-xl-qemuu-win7-amd64                         broken  
 test-amd64-i386-xl-qemuu-win7-amd64                          broken  
 test-amd64-amd64-xl-credit2                                  broken  
 test-amd64-i386-freebsd10-i386                               broken  
 test-amd64-i386-qemuu-rhel6hvm-intel                         broken  
 test-amd64-amd64-libvirt                                     broken  
 test-amd64-i386-libvirt                                      broken  
 test-amd64-amd64-xl-multivcpu                                broken  
 test-amd64-amd64-pair                                        broken  
 test-amd64-i386-pair                                         broken  
 test-amd64-amd64-libvirt-pair                                broken  
 test-amd64-i386-libvirt-pair                                 broken  
 test-amd64-amd64-pv                                          broken  
 test-amd64-i386-pv                                           broken  
 test-amd64-amd64-amd64-pvgrub                                broken  
 test-amd64-amd64-i386-pvgrub                                 broken  
 test-amd64-amd64-pygrub                                      broken  
 test-amd64-amd64-libvirt-qcow2                               broken  
 test-amd64-i386-libvirt-qcow2                                broken  
 test-amd64-amd64-xl-qcow2                                    broken  
 test-amd64-i386-xl-qcow2                                     broken  
 test-amd64-amd64-libvirt-raw                                 broken  
 test-amd64-i386-libvirt-raw                                  broken  
 test-amd64-amd64-xl-raw                                      broken  
 test-amd64-i386-xl-raw                                       broken  
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     broken  
 test-amd64-amd64-libvirt-vhd                                 broken  
 test-amd64-i386-libvirt-vhd                                  broken  
 test-amd64-amd64-xl-vhd                                      broken  
 test-amd64-i386-xl-vhd                                       broken  
 test-amd64-amd64-xl-qemuu-winxpsp3                           broken  


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 5fe74249f5ab528fe84a26fa60438a6de4c787f0
Author: P J P <pjp@xxxxxxxxxxxxxxxxx>
Date:   Tue Sep 15 16:46:59 2015 +0530

    net: avoid infinite loop when receiving packets(CVE-2015-5278)
    
    Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152)
    bytes to process network packets. While receiving packets
    via ne2000_receive() routine, a local 'index' variable
    could exceed the ring buffer size, leading to an infinite
    loop situation.
    
    upstream-commit-id: 737d2b3c41d59eb8f94ab7eb419b957938f24943
    
    Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx>
    Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx>
    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 9aa569e21b612bcfa091ce3c7661652c033c61ab
Author: P J P <pjp@xxxxxxxxxxxxxxxxx>
Date:   Tue Sep 15 16:40:49 2015 +0530

    net: add checks to validate ring buffer pointers(CVE-2015-5279)
    
    Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152)
    bytes to process network packets. While receiving packets
    via ne2000_receive() routine, a local 'index' variable
    could exceed the ring buffer size, which could lead to a
    memory buffer overflow. Added other checks at initialisation.
    
    upstream-commit-id: 9bbdbc66e5765068dce76e9269dce4547afd8ad4
    
    Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx>
    Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx>
    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit f341982be6fa86d98f68f8200388b4f812aebf79
Author: P J P <pjp@xxxxxxxxxxxxxxxxx>
Date:   Fri Sep 4 17:21:06 2015 +0100

    e1000: Avoid infinite loop in processing transmit descriptor (CVE-2015-6815)
    
    While processing transmit descriptors, it could lead to an infinite
    loop if 'bytes' was to become zero; Add a check to avoid it.
    
    [The guest can force 'bytes' to 0 by setting the hdr_len and mss
    descriptor fields to 0.
    --Stefan]
    
    upstream-commit-id: b947ac2bf26479e710489739c465c8af336599e7
    
    Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx>
    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Reviewed-by: Thomas Huth <thuth@xxxxxxxxxx>
    Message-id: 1441383666-6590-1-git-send-email-stefanha@xxxxxxxxxx
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 181e2e0ff39cbfeab173fa6d6b31839f00efcd06
Author: Peter Lieven <pl@xxxxxxx>
Date:   Mon Jun 30 10:07:54 2014 +0200

    ui/vnc: limit client_cut_text msg payload size
    
    currently a malicious client could define a payload
    size of 2^32 - 1 bytes and send up to that size of
    data to the vnc server. The server would allocated
    that amount of memory which could easily create an
    out of memory condition.
    
    This patch limits the payload size to 1MB max.
    
    Please note that client_cut_text messages are currently
    silently ignored.
    
    Signed-off-by: Peter Lieven <pl@xxxxxxx>
    Signed-off-by: Gerd Hoffmann <kraxel@xxxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.