[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[qemu-upstream-4.4-testing test] 62400: regressions - FAIL



flight 62400 qemu-upstream-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/62400/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-xl-vhd        9 debian-di-install         fail REGR. vs. 60565
 test-amd64-i386-xl-qcow2      9 debian-di-install         fail REGR. vs. 60565

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail in 62316 
pass in 62400
 test-amd64-i386-xl-qemuu-debianhvm-amd64 18 guest-start.2   fail pass in 62316

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-libvirt-raw   9 debian-di-install         fail REGR. vs. 60565
 test-amd64-i386-libvirt      11 guest-start                  fail   like 60565
 test-amd64-amd64-libvirt     11 guest-start                  fail   like 60565

Tests which did not succeed, but are not blocking:
 test-amd64-i386-libvirt-qcow2  9 debian-di-install            fail  never pass
 test-amd64-amd64-xl-raw       9 debian-di-install            fail   never pass
 test-amd64-amd64-libvirt-qcow2 11 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 11 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop             fail never pass
 test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop              fail never pass
 test-amd64-i386-libvirt-vhd  11 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-pair 20 guest-start/debian           fail   never pass

version targeted for testing:
 qemuu                5fe74249f5ab528fe84a26fa60438a6de4c787f0
baseline version:
 qemuu                0fc147387f0b683d2dfefec7b1af569f17b72e9c

Last test of basis    60565  2015-08-04 01:59:38 Z   55 days
Failing since         61617  2015-09-08 12:10:54 Z   20 days    9 attempts
Testing same since    62062  2015-09-16 11:15:04 Z   12 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@xxxxxxxxxx>
  P J P <pjp@xxxxxxxxxxxxxxxxx>
  Peter Lieven <pl@xxxxxxx>
  Stefan Hajnoczi <stefanha@xxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

jobs:
 build-amd64-xend                                             pass    
 build-i386-xend                                              pass    
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     fail    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-credit2                                  pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     fail    
 test-amd64-i386-libvirt                                      fail    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 fail    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-amd64-i386-libvirt-qcow2                                fail    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-amd64-i386-xl-qcow2                                     fail    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  fail    
 test-amd64-amd64-xl-raw                                      fail    
 test-amd64-i386-xl-raw                                       pass    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-amd64-i386-libvirt-vhd                                  pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 5fe74249f5ab528fe84a26fa60438a6de4c787f0
Author: P J P <pjp@xxxxxxxxxxxxxxxxx>
Date:   Tue Sep 15 16:46:59 2015 +0530

    net: avoid infinite loop when receiving packets(CVE-2015-5278)
    
    Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152)
    bytes to process network packets. While receiving packets
    via ne2000_receive() routine, a local 'index' variable
    could exceed the ring buffer size, leading to an infinite
    loop situation.
    
    upstream-commit-id: 737d2b3c41d59eb8f94ab7eb419b957938f24943
    
    Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx>
    Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx>
    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 9aa569e21b612bcfa091ce3c7661652c033c61ab
Author: P J P <pjp@xxxxxxxxxxxxxxxxx>
Date:   Tue Sep 15 16:40:49 2015 +0530

    net: add checks to validate ring buffer pointers(CVE-2015-5279)
    
    Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152)
    bytes to process network packets. While receiving packets
    via ne2000_receive() routine, a local 'index' variable
    could exceed the ring buffer size, which could lead to a
    memory buffer overflow. Added other checks at initialisation.
    
    upstream-commit-id: 9bbdbc66e5765068dce76e9269dce4547afd8ad4
    
    Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx>
    Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx>
    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit f341982be6fa86d98f68f8200388b4f812aebf79
Author: P J P <pjp@xxxxxxxxxxxxxxxxx>
Date:   Fri Sep 4 17:21:06 2015 +0100

    e1000: Avoid infinite loop in processing transmit descriptor (CVE-2015-6815)
    
    While processing transmit descriptors, it could lead to an infinite
    loop if 'bytes' was to become zero; Add a check to avoid it.
    
    [The guest can force 'bytes' to 0 by setting the hdr_len and mss
    descriptor fields to 0.
    --Stefan]
    
    upstream-commit-id: b947ac2bf26479e710489739c465c8af336599e7
    
    Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx>
    Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
    Reviewed-by: Thomas Huth <thuth@xxxxxxxxxx>
    Message-id: 1441383666-6590-1-git-send-email-stefanha@xxxxxxxxxx
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 181e2e0ff39cbfeab173fa6d6b31839f00efcd06
Author: Peter Lieven <pl@xxxxxxx>
Date:   Mon Jun 30 10:07:54 2014 +0200

    ui/vnc: limit client_cut_text msg payload size
    
    currently a malicious client could define a payload
    size of 2^32 - 1 bytes and send up to that size of
    data to the vnc server. The server would allocated
    that amount of memory which could easily create an
    out of memory condition.
    
    This patch limits the payload size to 1MB max.
    
    Please note that client_cut_text messages are currently
    silently ignored.
    
    Signed-off-by: Peter Lieven <pl@xxxxxxx>
    Signed-off-by: Gerd Hoffmann <kraxel@xxxxxxxxxx>

_______________________________________________
osstest-output mailing list
osstest-output@xxxxxxxxxxxxxxxxxxxx
http://lists.xenproject.org/cgi-bin/mailman/listinfo/osstest-output


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.