[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[xen-4.5-testing baseline-only test] 44166: trouble: broken/pass



This run is configured for baseline tests only.

flight 44166 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44166/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-xl-rtds        <none executed>              broken
 build-amd64-libvirt             <none executed>              broken
 test-amd64-amd64-xl-qemuu-ovmf-amd64    <none executed>              broken
 test-armhf-armhf-xl-vhd         <none executed>              broken
 test-amd64-i386-pair            <none executed>              broken
 test-armhf-armhf-xl-multivcpu    <none executed>              broken
 test-amd64-i386-qemuu-rhel6hvm-intel    <none executed>              broken
 test-amd64-i386-migrupgrade     <none executed>              broken
 test-amd64-amd64-xl-rtds        <none executed>              broken
 test-amd64-i386-qemut-rhel6hvm-intel    <none executed>              broken
 test-amd64-i386-xl-qemuu-ovmf-amd64    <none executed>              broken
 test-amd64-amd64-xl-pvh-intel    <none executed>              broken
 test-amd64-amd64-xl-qemuu-winxpsp3    <none executed>              broken
 test-amd64-amd64-amd64-pvgrub    <none executed>              broken
 test-amd64-i386-qemut-rhel6hvm-amd    <none executed>              broken
 test-armhf-armhf-libvirt        <none executed>              broken
 test-amd64-amd64-xl-pvh-amd     <none executed>              broken
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1    <none executed>             broken
 test-amd64-i386-freebsd10-amd64    <none executed>              broken
 test-amd64-i386-rumpuserxen-i386    <none executed>              broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64    <none executed>            broken
 test-amd64-i386-xl-qemut-winxpsp3    <none executed>              broken
 test-amd64-amd64-xl-credit2     <none executed>              broken
 test-amd64-amd64-pygrub         <none executed>              broken
 test-amd64-amd64-libvirt-pair    <none executed>              broken
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1    <none executed>             broken
 test-amd64-i386-xl-raw          <none executed>              broken
 test-armhf-armhf-libvirt-qcow2    <none executed>              broken
 test-amd64-amd64-migrupgrade    <none executed>              broken
 test-amd64-amd64-xl-qcow2       <none executed>              broken
 test-amd64-amd64-qemuu-nested-amd    <none executed>              broken
 test-armhf-armhf-xl-midway      <none executed>              broken
 test-amd64-i386-libvirt         <none executed>              broken
 build-armhf-libvirt             <none executed>              broken
 test-amd64-amd64-pair           <none executed>              broken
 test-amd64-amd64-xl-multivcpu    <none executed>              broken
 test-amd64-i386-xl-qemuu-winxpsp3    <none executed>              broken
 build-amd64-rumpuserxen         <none executed>              broken
 test-amd64-amd64-rumpuserxen-amd64    <none executed>              broken
 test-amd64-i386-freebsd10-i386    <none executed>              broken
 test-amd64-i386-libvirt-pair    <none executed>              broken
 test-amd64-amd64-xl             <none executed>              broken
 test-amd64-i386-xl-qemut-win7-amd64    <none executed>              broken
 test-armhf-armhf-xl-credit2     <none executed>              broken
 test-amd64-amd64-xl-qemuu-win7-amd64    <none executed>              broken
 test-amd64-amd64-libvirt        <none executed>              broken
 test-armhf-armhf-xl             <none executed>              broken
 test-amd64-i386-xl-qemuu-win7-amd64    <none executed>              broken
 test-amd64-amd64-xl-qemut-winxpsp3    <none executed>              broken
 test-amd64-amd64-libvirt-vhd    <none executed>              broken
 test-amd64-amd64-xl-qemut-debianhvm-amd64    <none executed>            broken
 test-armhf-armhf-libvirt-raw    <none executed>              broken
 test-amd64-amd64-qemuu-nested-intel    <none executed>              broken
 test-amd64-i386-xl-qemut-debianhvm-amd64    <none executed>             broken
 test-amd64-amd64-xl-qemut-win7-amd64    <none executed>              broken
 test-amd64-amd64-i386-pvgrub    <none executed>              broken
 test-amd64-i386-xl-qemuu-debianhvm-amd64    <none executed>             broken
 test-amd64-i386-qemuu-rhel6hvm-amd    <none executed>              broken
 test-amd64-i386-xl              <none executed>              broken

version targeted for testing:
 xen                  fe71162ab965d4a3344bb867f88e967806c80af5
baseline version:
 xen                  7afddd3b945b11a7f5162d1355283b6b9ae7aba3

Last test of basis    38688  2016-01-22 23:05:41 Z   34 days
Testing same since    44166  2016-02-26 11:50:23 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alan.Robinson <alan.robinson@xxxxxxxxxxxxxx>
  Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  Anthony PERARD <anthony.perard@xxxxxxxxxx>
  Dirk Behme <dirk.behme@xxxxxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Juergen Gross <jgross@xxxxxxxx>
  Kevin Tian <kevin.tian@xxxxxxxxx>

jobs:
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          broken  
 build-armhf-libvirt                                          broken  
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      broken  
 build-i386-rumpuserxen                                       pass    
 test-amd64-amd64-xl                                          broken  
 test-armhf-armhf-xl                                          broken  
 test-amd64-i386-xl                                           broken  
 test-amd64-amd64-qemuu-nested-amd                            broken  
 test-amd64-amd64-xl-pvh-amd                                  broken  
 test-amd64-i386-qemut-rhel6hvm-amd                           broken  
 test-amd64-i386-qemuu-rhel6hvm-amd                           broken  
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemut-debianhvm-amd64                     broken  
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     broken  
 test-amd64-i386-freebsd10-amd64                              broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         broken  
 test-amd64-i386-xl-qemuu-ovmf-amd64                          broken  
 test-amd64-amd64-rumpuserxen-amd64                           broken  
 test-amd64-amd64-xl-qemut-win7-amd64                         broken  
 test-amd64-i386-xl-qemut-win7-amd64                          broken  
 test-amd64-amd64-xl-qemuu-win7-amd64                         broken  
 test-amd64-i386-xl-qemuu-win7-amd64                          broken  
 test-amd64-amd64-xl-credit2                                  broken  
 test-armhf-armhf-xl-credit2                                  broken  
 test-amd64-i386-freebsd10-i386                               broken  
 test-amd64-i386-rumpuserxen-i386                             broken  
 test-amd64-amd64-qemuu-nested-intel                          broken  
 test-amd64-amd64-xl-pvh-intel                                broken  
 test-amd64-i386-qemut-rhel6hvm-intel                         broken  
 test-amd64-i386-qemuu-rhel6hvm-intel                         broken  
 test-amd64-amd64-libvirt                                     broken  
 test-armhf-armhf-libvirt                                     broken  
 test-amd64-i386-libvirt                                      broken  
 test-armhf-armhf-xl-midway                                   broken  
 test-amd64-amd64-migrupgrade                                 broken  
 test-amd64-i386-migrupgrade                                  broken  
 test-amd64-amd64-xl-multivcpu                                broken  
 test-armhf-armhf-xl-multivcpu                                broken  
 test-amd64-amd64-pair                                        broken  
 test-amd64-i386-pair                                         broken  
 test-amd64-amd64-libvirt-pair                                broken  
 test-amd64-i386-libvirt-pair                                 broken  
 test-amd64-amd64-amd64-pvgrub                                broken  
 test-amd64-amd64-i386-pvgrub                                 broken  
 test-amd64-amd64-pygrub                                      broken  
 test-armhf-armhf-libvirt-qcow2                               broken  
 test-amd64-amd64-xl-qcow2                                    broken  
 test-armhf-armhf-libvirt-raw                                 broken  
 test-amd64-i386-xl-raw                                       broken  
 test-amd64-amd64-xl-rtds                                     broken  
 test-armhf-armhf-xl-rtds                                     broken  
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     broken  
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     broken  
 test-amd64-amd64-libvirt-vhd                                 broken  
 test-armhf-armhf-xl-vhd                                      broken  
 test-amd64-amd64-xl-qemut-winxpsp3                           broken  
 test-amd64-i386-xl-qemut-winxpsp3                            broken  
 test-amd64-amd64-xl-qemuu-winxpsp3                           broken  
 test-amd64-i386-xl-qemuu-winxpsp3                            broken  


------------------------------------------------------------
sg-report-flight on osstest.xs.citrite.net
logs: /home/osstest/logs
images: /home/osstest/images

Logs, config files, etc. are available at
    http://osstest.xs.citrite.net/~osstest/testlogs/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary

broken-job test-armhf-armhf-xl-rtds broken
broken-job build-amd64-libvirt broken
broken-job test-amd64-amd64-xl-qemuu-ovmf-amd64 broken
broken-job test-armhf-armhf-xl-vhd broken
broken-job test-amd64-i386-pair broken
broken-job test-armhf-armhf-xl-multivcpu broken
broken-job test-amd64-i386-qemuu-rhel6hvm-intel broken
broken-job test-amd64-i386-migrupgrade broken
broken-job test-amd64-amd64-xl-rtds broken
broken-job test-amd64-i386-qemut-rhel6hvm-intel broken
broken-job test-amd64-i386-xl-qemuu-ovmf-amd64 broken
broken-job test-amd64-amd64-xl-pvh-intel broken
broken-job test-amd64-amd64-xl-qemuu-winxpsp3 broken
broken-job test-amd64-amd64-amd64-pvgrub broken
broken-job test-amd64-i386-qemut-rhel6hvm-amd broken
broken-job test-armhf-armhf-libvirt broken
broken-job test-amd64-amd64-xl-pvh-amd broken
broken-job test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 broken
broken-job test-amd64-i386-freebsd10-amd64 broken
broken-job test-amd64-i386-rumpuserxen-i386 broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken
broken-job test-amd64-i386-xl-qemut-winxpsp3 broken
broken-job test-amd64-amd64-xl-credit2 broken
broken-job test-amd64-amd64-pygrub broken
broken-job test-amd64-amd64-libvirt-pair broken
broken-job test-amd64-i386-xl-qemut-winxpsp3-vcpus1 broken
broken-job test-amd64-i386-xl-raw broken
broken-job test-armhf-armhf-libvirt-qcow2 broken
broken-job test-amd64-amd64-migrupgrade broken
broken-job test-amd64-amd64-xl-qcow2 broken
broken-job test-amd64-amd64-qemuu-nested-amd broken
broken-job test-armhf-armhf-xl-midway broken
broken-job test-amd64-i386-libvirt broken
broken-job build-armhf-libvirt broken
broken-job test-amd64-amd64-pair broken
broken-job test-amd64-amd64-xl-multivcpu broken
broken-job test-amd64-i386-xl-qemuu-winxpsp3 broken
broken-job build-amd64-rumpuserxen broken
broken-job test-amd64-amd64-rumpuserxen-amd64 broken
broken-job test-amd64-i386-freebsd10-i386 broken
broken-job test-amd64-i386-libvirt-pair broken
broken-job test-amd64-amd64-xl broken
broken-job test-amd64-i386-xl-qemut-win7-amd64 broken
broken-job test-armhf-armhf-xl-credit2 broken
broken-job test-amd64-amd64-xl-qemuu-win7-amd64 broken
broken-job test-amd64-amd64-libvirt broken
broken-job test-armhf-armhf-xl broken
broken-job test-amd64-i386-xl-qemuu-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemut-winxpsp3 broken
broken-job test-amd64-amd64-libvirt-vhd broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-amd64 broken
broken-job test-armhf-armhf-libvirt-raw broken
broken-job test-amd64-amd64-qemuu-nested-intel broken
broken-job test-amd64-i386-xl-qemut-debianhvm-amd64 broken
broken-job test-amd64-amd64-xl-qemut-win7-amd64 broken
broken-job test-amd64-amd64-i386-pvgrub broken
broken-job test-amd64-i386-xl-qemuu-debianhvm-amd64 broken
broken-job test-amd64-i386-qemuu-rhel6hvm-amd broken
broken-job test-amd64-i386-xl broken

Push not applicable.

------------------------------------------------------------
commit fe71162ab965d4a3344bb867f88e967806c80af5
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Thu Feb 18 15:26:16 2016 +0100

    x86: fix unintended fallthrough case from XSA-154
    
    ... and annotate the other deliberate one: Coverity objects otherwise.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    
    One of the two instances was actually a bug.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: 8dd6d1c099865ee5f5916616a0ca79cd943c46f9
    master date: 2016-02-18 15:10:07 +0100

commit d4e0fcbed633b40ff4c313f72239c6b91bc1ba31
Author: Dirk Behme <dirk.behme@xxxxxxxxxxxx>
Date:   Thu Feb 18 15:25:43 2016 +0100

    xen/arm64: Make sure we get all debug output
    
    Starting in the wrong ELx mode I get the following debug output:
    
    ...
    - Current EL 00000004 -
    - Xen must be entered in NS EL2 mode -
    - Boot failed -
    
    The output of "Please update the bootloader" is missing here, because
    string concatenation in gas, unlike in C, keeps the \0 between each
    individual string.
    
    Make sure this is output, too. With this, we get
    
    ...
    - Current EL 00000004 -
    - Xen must be entered in NS EL2 mode -
    - Please update the bootloader -
    - Boot failed -
    
    as intended.
    
    Signed-off-by: Dirk Behme <dirk.behme@xxxxxxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    [ ijc -- added same change to arm32 case ]
    master commit: c31d34082555566eb27d0d1eb42962f72fa886d3
    master date: 2016-02-18 10:13:42 +0000

commit 820311c63d1dd713b7a50d31e92c5424fd791015
Author: Anthony PERARD <anthony.perard@xxxxxxxxxx>
Date:   Wed Feb 17 16:49:49 2016 +0100

    hvmloader: fix scratch_alloc to avoid overlaps
    
    scratch_alloc() set scratch_start to the last byte of the current
    allocation.  The value of scratch_start is then reused as is (if it is
    already aligned) in the next allocation.  This result in a potential reuse
    of the last byte of the previous allocation.
    
    Signed-off-by: Anthony PERARD <anthony.perard@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: 4ab3ac074cb1f101f42e02103fa263a1f4f422b5
    master date: 2016-02-10 14:46:45 +0100

commit 1d69621a48ed2cc429b04cada2cc59244c4a50c6
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Feb 17 16:49:18 2016 +0100

    x86/nHVM: avoid NULL deref during INVLPG intercept handling
    
    When intercepting (or emulating) L1 guest INVLPG, the nested P2M
    pointer may be (is?) NULL, and hence there's no point in calling
    p2m_flush(). In fact doing so would cause a dereference of that NULL
    pointer at least in the ASSERT() right at the beginning of the
    function.
    
    While so far nothing supports hap_invlpg() being reachable from the
    INVLPG intercept paths (only INVLPG insn emulation would lead there),
    and hence the code in question (added by dd6de3ab99 ["Implement
    Nested-on-Nested"]) appears to be dead, this seems to be the change
    which can be agreed on as an immediate fix. Ideally, however, the
    problematic code would go away altogether. See thread at
    lists.xenproject.org/archives/html/xen-devel/2016-01/msg03762.html.
    
    Reported-by: å??令 <liuling-it@xxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    master commit: 86c59615f4e7f38df24182f20d9dbdec3299c514
    master date: 2016-02-09 13:22:13 +0100

commit 836dc18a378464e3e89a6b6e01c4a24a21f0316b
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Wed Feb 17 16:48:37 2016 +0100

    credit: recalculate per-cpupool credits when updating timeslice
    
    When modifying the timeslice of the credit scheduler in a cpupool the
    cpupool global credit value (n_cpus * credits_per_tslice) isn't
    recalculated. This will lead to wrong scheduling decisions later.
    
    Do the recalculation when updating the timeslice.
    
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Tested-by: Alan.Robinson <alan.robinson@xxxxxxxxxxxxxx>
    Reviewed-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
    master commit: ffc342fbb060cd753fc3a5f6fb6f550dd29a2637
    master date: 2016-02-02 14:03:40 +0100

commit 3fa5fb56a96253f4fe1efdce235bb783001138ea
Author: Juergen Gross <jgross@xxxxxxxx>
Date:   Wed Feb 17 16:48:16 2016 +0100

    credit: update timeslice under lock
    
    When updating the timeslice of the credit scheduler protect the
    scheduler's private data by it's lock. Today a possible race could
    result only in some weird scheduling decisions during one timeslice,
    but further adjustments will need the lock anyway.
    
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Reviewed-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
    master commit: f2c96ac4dedf4976e46de34c69c2cd8b289c4ef2
    master date: 2016-02-02 14:03:06 +0100

commit 0baa07315c70880613e6c33e915c6941d09b4612
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Date:   Wed Feb 17 16:47:52 2016 +0100

    x86/vmx: don't clobber exception_bitmap when entering/leaving emulated real 
mode
    
    Most updates to the exception bitmaps set or clear an individual bits.
    
    However, entering or exiting emulated real mode unilaterally clobbers it,
    leaving the exit code to recalculate what it should have been.  This is 
error
    prone, and indeed currently fails to recalculate the TRAP_no_device 
intercept
    appropriately.
    
    Instead of overwriting exception_bitmap when entering emulated real mode, 
move
    the override into vmx_update_exception_bitmap() and leave exception_bitmap
    unmodified.
    
    This means that recalculation is unnecessary, and that the use of
    vmx_fpu_leave() and vmx_update_debug_state() while in emulated real mode
    doesn't result in TRAP_no_device and TRAP_int3 being un-intercepted.
    
    This is only a functional change on hardware lacking unrestricted guest
    support.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx>
    master commit: 78c93adf0a7f6a7abe249a63e7398ca1221a6d25
    master date: 2016-02-02 14:00:52 +0100

commit a7f6bcbcdeaba036349cc476268426fae094dda0
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Feb 17 16:47:21 2016 +0100

    x86/mce: fix misleading indentation in init_nonfatal_mce_checker()
    
    Debian bug 812166[0] reported this build failure due to
    Wmisleading-indentation with gcc-6:
    
    non-fatal.c: In function 'init_nonfatal_mce_checker':
    non-fatal.c:103:2: error: statement is indented as if it were guarded by... 
[-Werror=misleading-indentation]
      switch (c->x86_vendor) {
      ^~~~~~
    
    non-fatal.c:97:5: note: ...this 'if' clause, but it is not
         if ( __get_cpu_var(poll_bankmask) == NULL )
         ^~
    
    I was unable to reproduce (xen builds cleanly for me with "6.0.0 20160117
    (experimental) [trunk revision 232481]") but looking at the code the issue
    above is clearly real.
    
    Correctly reindent the if statement.
    
    This file uses Linux coding style (infact the use of Xen style for
    this line is the root cause of the wanring) so use tabs and while
    there remove the whitespace inside the if as Linux does.
    
    [0] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812166
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 2e46e3f2539d026594ec1618e7df2c2bc8785b42
    master date: 2016-01-22 16:19:51 +0100

commit 677eb6e2dc5295ea49d6d75971c96695567ae601
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Feb 17 16:46:52 2016 +0100

    x86: fix (and simplify) MTRR overlap checking
    
    Obtaining one individual range per variable range register (via
    get_mtrr_range()) was bogus from the beginning, as these registers may
    cover multiple disjoint ranges. Do away with that, in favor of simply
    comparing masked addresses.
    
    Also, for is_var_mtrr_overlapped()'s result to be correct when called
    from mtrr_wrmsr(), generic_set_mtrr() must update saved state first.
    
    As minor cleanup changes, constify is_var_mtrr_overlapped()'s parameter
    and make mtrr_wrmsr() static.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 3272230848f36eb5bbb660216898a90048a81d9f
    master date: 2016-01-21 16:11:04 +0100

commit e7fa1af3b3eab2d22cf260e5f7f7b233ddd071cc
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Feb 17 16:46:25 2016 +0100

    x86/mmuext: tighten TLB flush address checks
    
    Addresses passed by PV guests should be subjected to __addr_ok(),
    avoiding undue TLB flushes.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: 828e114f7cdd9910483783ab0563b178325e579a
    master date: 2016-01-21 16:09:22 +0100

commit 30b0e11898e2c2c67c64bd1ec48f88de8125d678
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Feb 17 16:43:56 2016 +0100

    x86/VMX: sanitize rIP before re-entering guest
    
    ... to prevent guest user mode arranging for a guest crash (due to
    failed VM entry). (On the AMD system I checked, hardware is doing
    exactly the canonicalization being added here.)
    
    Note that fixing this in an architecturally correct way would be quite
    a bit more involved: Making the x86 instruction emulator check all
    branch targets for validity, plus dealing with invalid rIP resulting
    from update_guest_eip() or incoming directly during a VM exit. The only
    way to get the latter right would be by not having hardware do the
    injection.
    
    Note further that there are a two early returns from
    vmx_vmexit_handler(): One (through vmx_failed_vmentry()) leads to
    domain_crash() anyway, and the other covers real mode only and can
    neither occur with a non-canonical rIP nor result in an altered rIP,
    so we don't need to force those paths through the checking logic.
    
    This is CVE-2016-2271 / XSA-170.
    
    Reported-by: å??令 <liuling-it@xxxxxx>
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Tested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: ffbbfda37782a2408953af1a3e00ada80bb141bc
    master date: 2016-02-17 16:18:08 +0100

commit 96b4955c51d37ee261b873d8ccb68a21e8f6a904
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Feb 17 16:43:21 2016 +0100

    x86: enforce consistent cachability of MMIO mappings
    
    We've been told by Intel that inconsistent cachability between
    multiple mappings of the same page can affect system stability only
    when the affected page is an MMIO one. Since the stale data issue is
    of no relevance to the hypervisor (since all guest memory accesses go
    through proper accessors and validation), handling of RAM pages
    remains unchanged here. Any MMIO mapped by domains however needs to be
    done consistently (all cachable mappings or all uncachable ones), in
    order to avoid Machine Check exceptions. Since converting existing
    cachable mappings to uncachable (at the time an uncachable mapping
    gets established) would in the PV case require tracking all mappings,
    allow MMIO to only get mapped uncachable (UC, UC-, or WC).
    
    This also implies that in the PV case we mustn't use the L1 PTE update
    fast path when cachability flags get altered.
    
    Since in the HVM case at least for now we want to continue honoring
    pinned cachability attributes for pages not mapped by the hypervisor,
    special case handling of r/o MMIO pages (forcing UC) gets added there.
    Arguably the counterpart change to p2m-pt.c may not be necessary, since
    UC- (which already gets enforced there) is probably strict enough.
    
    Note that the shadow code changes include fixing the write protection
    of r/o MMIO ranges: shadow_l1e_remove_flags() and its siblings, other
    than l1e_remove_flags() and alike, return the new PTE (and hence
    ignoring their return values makes them no-ops).
    
    This is CVE-2016-2270 / XSA-154.
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    master commit: c61a6f74f80eb36ed83a82f713db3143159b9009
    master date: 2016-02-17 16:16:53 +0100
(qemu changes not included)

_______________________________________________
osstest-output mailing list
osstest-output@xxxxxxxxxxxxxxxxxxxx
http://lists.xenproject.org/cgi-bin/mailman/listinfo/osstest-output

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.