[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [qemu-upstream-4.4-testing baseline-only test] 38139: tolerable FAIL
This run is configured for baseline tests only. flight 38139 qemu-upstream-4.4-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38139/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-i386-pvgrub 10 guest-start fail pass in 38063 test-amd64-amd64-libvirt-pair 9 xen-boot/src_host fail pass in 38063 test-amd64-amd64-xl-qemuu-win7-amd64 15 guest-localmigrate.2 fail pass in 38063 test-amd64-amd64-xl-qemuu-winxpsp3 13 guest-localmigrate fail pass in 38063 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail in 38063 never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-raw 11 migrate-support-check fail never pass test-amd64-i386-libvirt-raw 11 migrate-support-check fail never pass test-amd64-amd64-libvirt-qcow2 11 migrate-support-check fail never pass test-amd64-i386-libvirt-qcow2 11 migrate-support-check fail never pass test-amd64-i386-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass version targeted for testing: qemuu 5fe74249f5ab528fe84a26fa60438a6de4c787f0 baseline version: qemuu 0fc147387f0b683d2dfefec7b1af569f17b72e9c Last test of basis 38084 2015-09-27 08:50:46 Z 11 days Testing same since 38139 2015-10-08 18:19:02 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Gerd Hoffmann <kraxel@xxxxxxxxxx> P J P <pjp@xxxxxxxxxxxxxxxxx> Peter Lieven <pl@xxxxxxx> Stefan Hajnoczi <stefanha@xxxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> jobs: build-amd64-xend pass build-i386-xend pass build-amd64 pass build-i386 pass build-amd64-libvirt pass build-i386-libvirt pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl pass test-amd64-i386-xl pass test-amd64-i386-qemuu-rhel6hvm-amd pass test-amd64-amd64-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-xl-qemuu-debianhvm-amd64 pass test-amd64-i386-freebsd10-amd64 pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass test-amd64-amd64-xl-qemuu-win7-amd64 fail test-amd64-i386-xl-qemuu-win7-amd64 fail test-amd64-amd64-xl-credit2 pass test-amd64-i386-freebsd10-i386 pass test-amd64-i386-qemuu-rhel6hvm-intel pass test-amd64-amd64-libvirt pass test-amd64-i386-libvirt pass test-amd64-amd64-xl-multivcpu pass test-amd64-amd64-pair pass test-amd64-i386-pair pass test-amd64-amd64-libvirt-pair fail test-amd64-i386-libvirt-pair pass test-amd64-amd64-pv pass test-amd64-i386-pv pass test-amd64-amd64-amd64-pvgrub pass test-amd64-amd64-i386-pvgrub fail test-amd64-amd64-pygrub pass test-amd64-amd64-libvirt-qcow2 pass test-amd64-i386-libvirt-qcow2 pass test-amd64-amd64-xl-qcow2 pass test-amd64-i386-xl-qcow2 pass test-amd64-amd64-libvirt-raw pass test-amd64-i386-libvirt-raw pass test-amd64-amd64-xl-raw pass test-amd64-i386-xl-raw pass test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 pass test-amd64-amd64-libvirt-vhd pass test-amd64-i386-libvirt-vhd pass test-amd64-amd64-xl-vhd pass test-amd64-i386-xl-vhd pass test-amd64-amd64-xl-qemuu-winxpsp3 fail ------------------------------------------------------------ sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xs.citrite.net/~osstest/testlogs/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Push not applicable. ------------------------------------------------------------ commit 5fe74249f5ab528fe84a26fa60438a6de4c787f0 Author: P J P <pjp@xxxxxxxxxxxxxxxxx> Date: Tue Sep 15 16:46:59 2015 +0530 net: avoid infinite loop when receiving packets(CVE-2015-5278) Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152) bytes to process network packets. While receiving packets via ne2000_receive() routine, a local 'index' variable could exceed the ring buffer size, leading to an infinite loop situation. upstream-commit-id: 737d2b3c41d59eb8f94ab7eb419b957938f24943 Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx> Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit 9aa569e21b612bcfa091ce3c7661652c033c61ab Author: P J P <pjp@xxxxxxxxxxxxxxxxx> Date: Tue Sep 15 16:40:49 2015 +0530 net: add checks to validate ring buffer pointers(CVE-2015-5279) Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152) bytes to process network packets. While receiving packets via ne2000_receive() routine, a local 'index' variable could exceed the ring buffer size, which could lead to a memory buffer overflow. Added other checks at initialisation. upstream-commit-id: 9bbdbc66e5765068dce76e9269dce4547afd8ad4 Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx> Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit f341982be6fa86d98f68f8200388b4f812aebf79 Author: P J P <pjp@xxxxxxxxxxxxxxxxx> Date: Fri Sep 4 17:21:06 2015 +0100 e1000: Avoid infinite loop in processing transmit descriptor (CVE-2015-6815) While processing transmit descriptors, it could lead to an infinite loop if 'bytes' was to become zero; Add a check to avoid it. [The guest can force 'bytes' to 0 by setting the hdr_len and mss descriptor fields to 0. --Stefan] upstream-commit-id: b947ac2bf26479e710489739c465c8af336599e7 Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx> Reviewed-by: Thomas Huth <thuth@xxxxxxxxxx> Message-id: 1441383666-6590-1-git-send-email-stefanha@xxxxxxxxxx Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit 181e2e0ff39cbfeab173fa6d6b31839f00efcd06 Author: Peter Lieven <pl@xxxxxxx> Date: Mon Jun 30 10:07:54 2014 +0200 ui/vnc: limit client_cut_text msg payload size currently a malicious client could define a payload size of 2^32 - 1 bytes and send up to that size of data to the vnc server. The server would allocated that amount of memory which could easily create an out of memory condition. This patch limits the payload size to 1MB max. Please note that client_cut_text messages are currently silently ignored. Signed-off-by: Peter Lieven <pl@xxxxxxx> Signed-off-by: Gerd Hoffmann <kraxel@xxxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |