[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [qemu-upstream-4.4-testing test] 62316: regressions - FAIL
flight 62316 qemu-upstream-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/62316/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-vhd 9 debian-di-install fail REGR. vs. 60565 test-amd64-i386-xl-qcow2 9 debian-di-install fail REGR. vs. 60565 Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail pass in 62229 Regressions which are regarded as allowable (not blocking): test-amd64-i386-libvirt-raw 9 debian-di-install fail REGR. vs. 60565 test-amd64-i386-libvirt 11 guest-start fail like 60565 test-amd64-amd64-libvirt 11 guest-start fail like 60565 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail in 62229 never pass test-amd64-i386-libvirt-qcow2 9 debian-di-install fail never pass test-amd64-amd64-xl-raw 9 debian-di-install fail never pass test-amd64-amd64-libvirt-qcow2 11 migrate-support-check fail never pass test-amd64-amd64-libvirt-raw 11 migrate-support-check fail never pass test-amd64-i386-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail never pass test-amd64-i386-libvirt-pair 20 guest-start/debian fail never pass version targeted for testing: qemuu 5fe74249f5ab528fe84a26fa60438a6de4c787f0 baseline version: qemuu 0fc147387f0b683d2dfefec7b1af569f17b72e9c Last test of basis 60565 2015-08-04 01:59:38 Z 53 days Failing since 61617 2015-09-08 12:10:54 Z 17 days 8 attempts Testing same since 62062 2015-09-16 11:15:04 Z 9 days 4 attempts ------------------------------------------------------------ People who touched revisions under test: Gerd Hoffmann <kraxel@xxxxxxxxxx> P J P <pjp@xxxxxxxxxxxxxxxxx> Peter Lieven <pl@xxxxxxx> Stefan Hajnoczi <stefanha@xxxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> jobs: build-amd64-xend pass build-i386-xend pass build-amd64 pass build-i386 pass build-amd64-libvirt pass build-i386-libvirt pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt fail test-amd64-i386-libvirt fail test-amd64-amd64-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-libvirt-pair pass test-amd64-i386-libvirt-pair fail test-amd64-amd64-pv pass test-amd64-i386-pv pass test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub pass test-amd64-amd64-pygrub pass test-amd64-amd64-libvirt-qcow2 pass test-amd64-i386-libvirt-qcow2 fail test-amd64-amd64-xl-qcow2 pass test-amd64-i386-xl-qcow2 fail test-amd64-amd64-libvirt-raw pass test-amd64-i386-libvirt-raw fail test-amd64-amd64-xl-raw fail test-amd64-i386-xl-raw pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-libvirt-vhd pass test-amd64-i386-libvirt-vhd pass test-amd64-amd64-xl-vhd pass test-amd64-i386-xl-vhd fail test-amd64-amd64-xl-qemuu-winxpsp3 pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 5fe74249f5ab528fe84a26fa60438a6de4c787f0 Author: P J P <pjp@xxxxxxxxxxxxxxxxx> Date: Tue Sep 15 16:46:59 2015 +0530 net: avoid infinite loop when receiving packets(CVE-2015-5278) Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152) bytes to process network packets. While receiving packets via ne2000_receive() routine, a local 'index' variable could exceed the ring buffer size, leading to an infinite loop situation. upstream-commit-id: 737d2b3c41d59eb8f94ab7eb419b957938f24943 Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx> Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit 9aa569e21b612bcfa091ce3c7661652c033c61ab Author: P J P <pjp@xxxxxxxxxxxxxxxxx> Date: Tue Sep 15 16:40:49 2015 +0530 net: add checks to validate ring buffer pointers(CVE-2015-5279) Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152) bytes to process network packets. While receiving packets via ne2000_receive() routine, a local 'index' variable could exceed the ring buffer size, which could lead to a memory buffer overflow. Added other checks at initialisation. upstream-commit-id: 9bbdbc66e5765068dce76e9269dce4547afd8ad4 Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx> Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit f341982be6fa86d98f68f8200388b4f812aebf79 Author: P J P <pjp@xxxxxxxxxxxxxxxxx> Date: Fri Sep 4 17:21:06 2015 +0100 e1000: Avoid infinite loop in processing transmit descriptor (CVE-2015-6815) While processing transmit descriptors, it could lead to an infinite loop if 'bytes' was to become zero; Add a check to avoid it. [The guest can force 'bytes' to 0 by setting the hdr_len and mss descriptor fields to 0. --Stefan] upstream-commit-id: b947ac2bf26479e710489739c465c8af336599e7 Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx> Reviewed-by: Thomas Huth <thuth@xxxxxxxxxx> Message-id: 1441383666-6590-1-git-send-email-stefanha@xxxxxxxxxx Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit 181e2e0ff39cbfeab173fa6d6b31839f00efcd06 Author: Peter Lieven <pl@xxxxxxx> Date: Mon Jun 30 10:07:54 2014 +0200 ui/vnc: limit client_cut_text msg payload size currently a malicious client could define a payload size of 2^32 - 1 bytes and send up to that size of data to the vnc server. The server would allocated that amount of memory which could easily create an out of memory condition. This patch limits the payload size to 1MB max. Please note that client_cut_text messages are currently silently ignored. Signed-off-by: Peter Lieven <pl@xxxxxxx> Signed-off-by: Gerd Hoffmann <kraxel@xxxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |