[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [qemu-upstream-4.4-testing test] 62675: trouble: broken/pass
flight 62675 qemu-upstream-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/62675/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-vhd 2 hosts-allocate running test-amd64-i386-libvirt-qcow2 2 hosts-allocate running test-amd64-i386-xl-qcow2 2 hosts-allocate running test-amd64-i386-libvirt-raw 2 hosts-allocate running test-amd64-amd64-xl-raw 2 hosts-allocate running test-amd64-amd64-libvirt 2 hosts-allocate running test-amd64-i386-libvirt 2 hosts-allocate running test-amd64-amd64-xl 2 hosts-allocate running test-amd64-i386-pv 2 hosts-allocate running test-amd64-i386-qemuu-rhel6hvm-intel 2 hosts-allocate running test-amd64-amd64-pair 2 hosts-allocate running test-amd64-amd64-i386-pvgrub 2 hosts-allocate running test-amd64-amd64-xl-multivcpu 2 hosts-allocate running test-amd64-amd64-libvirt-qcow2 2 hosts-allocate running test-amd64-amd64-xl-credit2 2 hosts-allocate running test-amd64-amd64-pygrub 2 hosts-allocate running test-amd64-amd64-libvirt-raw 2 hosts-allocate running test-amd64-i386-pair 2 hosts-allocate running test-amd64-amd64-xl-qemuu-debianhvm-amd64 2 hosts-allocate running test-amd64-i386-libvirt-pair 2 hosts-allocate running test-amd64-i386-qemuu-rhel6hvm-amd 2 hosts-allocate running test-amd64-amd64-xl-qcow2 2 hosts-allocate running test-amd64-amd64-xl-vhd 2 hosts-allocate running test-amd64-amd64-libvirt-vhd 2 hosts-allocate running test-amd64-amd64-amd64-pvgrub 2 hosts-allocate running test-amd64-i386-xl-qemuu-ovmf-amd64 2 hosts-allocate running test-amd64-amd64-xl-qemuu-ovmf-amd64 2 hosts-allocate running test-amd64-amd64-libvirt-pair 2 hosts-allocate running test-amd64-amd64-xl-qemuu-win7-amd64 2 hosts-allocate running test-amd64-i386-freebsd10-amd64 2 hosts-allocate running test-amd64-i386-xl-qemuu-win7-amd64 2 hosts-allocate running test-amd64-i386-xl 2 hosts-allocate running test-amd64-i386-xl-qemuu-debianhvm-amd64 2 hosts-allocate running test-amd64-amd64-pv 2 hosts-allocate running test-amd64-i386-xl-raw 2 hosts-allocate running test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 2 hosts-allocate running test-amd64-i386-freebsd10-i386 2 hosts-allocate running test-amd64-i386-libvirt-vhd 2 hosts-allocate running test-amd64-amd64-xl-qemuu-winxpsp3 2 hosts-allocate running version targeted for testing: qemuu 5fe74249f5ab528fe84a26fa60438a6de4c787f0 baseline version: qemuu 0fc147387f0b683d2dfefec7b1af569f17b72e9c Last test of basis 60565 2015-08-04 01:59:38 Z 63 days Failing since 61617 2015-09-08 12:10:54 Z 28 days 13 attempts Testing same since 62062 2015-09-16 11:15:04 Z 20 days 9 attempts ------------------------------------------------------------ People who touched revisions under test: Gerd Hoffmann <kraxel@xxxxxxxxxx> P J P <pjp@xxxxxxxxxxxxxxxxx> Peter Lieven <pl@xxxxxxx> Stefan Hajnoczi <stefanha@xxxxxxxxxx> Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> jobs: build-amd64-xend pass build-i386-xend pass build-amd64 pass build-i386 pass build-amd64-libvirt pass build-i386-libvirt pass build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl broken test-amd64-i386-xl broken test-amd64-i386-qemuu-rhel6hvm-amd broken test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken test-amd64-i386-xl-qemuu-debianhvm-amd64 broken test-amd64-i386-freebsd10-amd64 broken test-amd64-amd64-xl-qemuu-ovmf-amd64 broken test-amd64-i386-xl-qemuu-ovmf-amd64 broken test-amd64-amd64-xl-qemuu-win7-amd64 broken test-amd64-i386-xl-qemuu-win7-amd64 broken test-amd64-amd64-xl-credit2 broken test-amd64-i386-freebsd10-i386 broken test-amd64-i386-qemuu-rhel6hvm-intel broken test-amd64-amd64-libvirt broken test-amd64-i386-libvirt broken test-amd64-amd64-xl-multivcpu broken test-amd64-amd64-pair broken test-amd64-i386-pair broken test-amd64-amd64-libvirt-pair broken test-amd64-i386-libvirt-pair broken test-amd64-amd64-pv broken test-amd64-i386-pv broken test-amd64-amd64-amd64-pvgrub broken test-amd64-amd64-i386-pvgrub broken test-amd64-amd64-pygrub broken test-amd64-amd64-libvirt-qcow2 broken test-amd64-i386-libvirt-qcow2 broken test-amd64-amd64-xl-qcow2 broken test-amd64-i386-xl-qcow2 broken test-amd64-amd64-libvirt-raw broken test-amd64-i386-libvirt-raw broken test-amd64-amd64-xl-raw broken test-amd64-i386-xl-raw broken test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 broken test-amd64-amd64-libvirt-vhd broken test-amd64-i386-libvirt-vhd broken test-amd64-amd64-xl-vhd broken test-amd64-i386-xl-vhd broken test-amd64-amd64-xl-qemuu-winxpsp3 broken ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 5fe74249f5ab528fe84a26fa60438a6de4c787f0 Author: P J P <pjp@xxxxxxxxxxxxxxxxx> Date: Tue Sep 15 16:46:59 2015 +0530 net: avoid infinite loop when receiving packets(CVE-2015-5278) Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152) bytes to process network packets. While receiving packets via ne2000_receive() routine, a local 'index' variable could exceed the ring buffer size, leading to an infinite loop situation. upstream-commit-id: 737d2b3c41d59eb8f94ab7eb419b957938f24943 Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx> Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit 9aa569e21b612bcfa091ce3c7661652c033c61ab Author: P J P <pjp@xxxxxxxxxxxxxxxxx> Date: Tue Sep 15 16:40:49 2015 +0530 net: add checks to validate ring buffer pointers(CVE-2015-5279) Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152) bytes to process network packets. While receiving packets via ne2000_receive() routine, a local 'index' variable could exceed the ring buffer size, which could lead to a memory buffer overflow. Added other checks at initialisation. upstream-commit-id: 9bbdbc66e5765068dce76e9269dce4547afd8ad4 Reported-by: Qinghao Tang <luodalongde@xxxxxxxxx> Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit f341982be6fa86d98f68f8200388b4f812aebf79 Author: P J P <pjp@xxxxxxxxxxxxxxxxx> Date: Fri Sep 4 17:21:06 2015 +0100 e1000: Avoid infinite loop in processing transmit descriptor (CVE-2015-6815) While processing transmit descriptors, it could lead to an infinite loop if 'bytes' was to become zero; Add a check to avoid it. [The guest can force 'bytes' to 0 by setting the hdr_len and mss descriptor fields to 0. --Stefan] upstream-commit-id: b947ac2bf26479e710489739c465c8af336599e7 Signed-off-by: P J P <pjp@xxxxxxxxxxxxxxxxx> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxx> Reviewed-by: Thomas Huth <thuth@xxxxxxxxxx> Message-id: 1441383666-6590-1-git-send-email-stefanha@xxxxxxxxxx Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> commit 181e2e0ff39cbfeab173fa6d6b31839f00efcd06 Author: Peter Lieven <pl@xxxxxxx> Date: Mon Jun 30 10:07:54 2014 +0200 ui/vnc: limit client_cut_text msg payload size currently a malicious client could define a payload size of 2^32 - 1 bytes and send up to that size of data to the vnc server. The server would allocated that amount of memory which could easily create an out of memory condition. This patch limits the payload size to 1MB max. Please note that client_cut_text messages are currently silently ignored. Signed-off-by: Peter Lieven <pl@xxxxxxx> Signed-off-by: Gerd Hoffmann <kraxel@xxxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |