[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable bisection] complete test-amd64-amd64-xl



branch xen-unstable
xen branch xen-unstable
job test-amd64-amd64-xl
test guest-localmigrate

Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  d639e6a05a0f8ee0e61c6cc4eebba78934ef3648
  Bug not present: 88a2372c6ba44dd42b915a95a823cf9d4d260e25


  commit d639e6a05a0f8ee0e61c6cc4eebba78934ef3648
  Author: Jan Beulich <jbeulich@xxxxxxxx>
  Date:   Mon Mar 23 16:51:14 2015 +0100
  
      x86: allow 64-bit PV guest kernels to suppress user mode exposure of M2P
      
      Xen L4 entries being uniformly installed into any L4 table and 64-bit
      PV kernels running in ring 3 means that user mode was able to see the
      read-only M2P presented by Xen to the guests. While apparently not
      really representing an exploitable information leak, this still very
      certainly was never meant to be that way.
      
      Building on the fact that these guests already have separate kernel and
      user mode page tables we can allow guest kernels to tell Xen that they
      don't want user mode to see this table. We can't, however, do this by
      default: There is no ABI requirement that kernel and user mode page
      tables be separate. Therefore introduce a new VM-assist flag allowing
      the guest to control respective hypervisor behavior:
      - when not set, L4 tables get created with the respective slot blank,
        and whenever the L4 table gets used as a kernel one the missing
        mapping gets inserted,
      - when set, L4 tables get created with the respective slot initialized
        as before, and whenever the L4 table gets used as a user one the
        mapping gets zapped.
      
      Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
      Reviewed-by: Tim Deegan <tim@xxxxxxx>


For bisection revision-tuple graph see:
   
http://www.chiark.greenend.org.uk/~xensrcts/results/bisect.xen-unstable.test-amd64-amd64-xl.guest-localmigrate.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Searching for failure / basis pass:
 36772 fail [host=grain-weevil] / 36622 [host=rice-weevil] 36540 
[host=moss-bug] 36514 [host=gall-mite] 35957 [host=scape-moth] 35887 
[host=fire-frog] 35810 [host=rice-weevil] 35556 [host=lace-bug] 35257 
[host=lake-frog] 34715 [host=leaf-beetle] 34629 [host=scape-moth] 34574 
[host=lake-frog] 34529 [host=fire-frog] 34484 [host=rice-weevil] 34426 
[host=gall-mite] 34341 [host=field-cricket] 34257 [host=bush-cricket] 34181 
[host=lake-frog] 34137 ok.
Failure / basis pass flights: 36772 / 34137
(tree with no url: ovmf)
(tree with no url: seabios)
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git
Latest 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
84066dd4ef4bb5983e246c629a26ef4f3394e5d5
Basis pass c3b70f0bbb6a883f4afa639286043d3f71fbbddf 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
0d37748342e29854db7c9f6c47d7f58c6cfba6b2 
a1b4af132077de694054d757fea4573d482c8b3a
Generating revisions with ./adhoc-revtuple-generator  
git://xenbits.xen.org/linux-pvops.git#c3b70f0bbb6a883f4afa639286043d3f71fbbddf-8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9
 
git://xenbits.xen.org/osstest/linux-firmware.git#c530a75c1e6a472b0eb9558310b518f0dfcd8860-c530a75c1e6a472b0eb9558310b518f0dfcd8860
 
git://xenbits.xen.org/staging/qemu-xen-unstable.git#a4b276b4ce49c8d70dd841ff885b900ec652b994-a4b276b4ce49c8d70dd841ff885b900ec652b994
 
git://xenbits.xen.org/staging/qemu-upstream-unstable.git#0d37748342e29854db7c9f6c47d7f58c6cfba6b2-42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de
 
git://xenbits.xen.org/xen.git#a1b4af132077de694054d757fea4573d482c8b3a-84066dd4ef4bb5983e246c629a26ef4f3394e5d5
+ exec
+ sh -xe
+ cd /export/home/osstest/repos/linux-pvops
+ git remote set-url origin 
git://drall.uk.xensource.com:9419/git://xenbits.xen.org/linux-pvops.git
+ git fetch -p origin +refs/heads/*:refs/remotes/origin/*
+ exec
+ sh -xe
+ cd /export/home/osstest/repos/qemu-upstream-unstable
+ git remote set-url origin 
git://drall.uk.xensource.com:9419/git://xenbits.xen.org/staging/qemu-upstream-unstable.git
+ git fetch -p origin +refs/heads/*:refs/remotes/origin/*
+ exec
+ sh -xe
+ cd /export/home/osstest/repos/xen
+ git remote set-url origin 
git://drall.uk.xensource.com:9419/git://xenbits.xen.org/xen.git
+ git fetch -p origin +refs/heads/*:refs/remotes/origin/*
+ exec
+ sh -xe
+ cd /export/home/osstest/repos/linux-pvops
+ git remote set-url origin 
git://drall.uk.xensource.com:9419/git://xenbits.xen.org/linux-pvops.git
+ git fetch -p origin +refs/heads/*:refs/remotes/origin/*
+ exec
+ sh -xe
+ cd /export/home/osstest/repos/qemu-upstream-unstable
+ git remote set-url origin 
git://drall.uk.xensource.com:9419/git://xenbits.xen.org/staging/qemu-upstream-unstable.git
+ git fetch -p origin +refs/heads/*:refs/remotes/origin/*
+ exec
+ sh -xe
+ cd /export/home/osstest/repos/xen
+ git remote set-url origin 
git://drall.uk.xensource.com:9419/git://xenbits.xen.org/xen.git
+ git fetch -p origin +refs/heads/*:refs/remotes/origin/*
Loaded 10530 nodes in revision graph
Searching for test results:
 34137 pass c3b70f0bbb6a883f4afa639286043d3f71fbbddf 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
0d37748342e29854db7c9f6c47d7f58c6cfba6b2 
a1b4af132077de694054d757fea4573d482c8b3a
 34257 [host=bush-cricket]
 34181 [host=lake-frog]
 34341 [host=field-cricket]
 34426 [host=gall-mite]
 34484 [host=rice-weevil]
 34574 [host=lake-frog]
 34529 [host=fire-frog]
 34629 [host=scape-moth]
 34715 [host=leaf-beetle]
 35257 [host=lake-frog]
 35556 [host=lace-bug]
 35709 []
 35758 []
 35810 [host=rice-weevil]
 35887 [host=fire-frog]
 35957 [host=scape-moth]
 36514 [host=gall-mite]
 36540 [host=moss-bug]
 36622 [host=rice-weevil]
 36772 fail 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
84066dd4ef4bb5983e246c629a26ef4f3394e5d5
 36728 fail irrelevant
 36875 pass 413cb08cebe9fd8107f556eee48b2d40773cacde 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
be11dc1e9172f91e798a8f831b30c14b479e08e8 
27fa184b9c2faacb16dfd22773b5bfe9a35e740f
 36856 pass c3b70f0bbb6a883f4afa639286043d3f71fbbddf 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
0d37748342e29854db7c9f6c47d7f58c6cfba6b2 
a1b4af132077de694054d757fea4573d482c8b3a
 36901 pass 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
78d22f2dfcff39336ba0861f4bb5f8d0f380b7d4
 36859 fail 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
84066dd4ef4bb5983e246c629a26ef4f3394e5d5
 36888 pass f563d4825241ad7c9fd8fd3538efece0607d5869 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
fe3cafd89ab7a9e171a4e8542b00f5f08c7b4f2f
 36877 pass a74f1d1204a5c892466b52ac68ee6443c1e459d7 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
be11dc1e9172f91e798a8f831b30c14b479e08e8 
4f3283fea384229366b6df101c6c0e008b35105b
 36862 pass 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
916735e1814d4d6df0d90b871b0666cdfaf134cd
 36863 pass 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
51f2224552cc1e6cb22b8b169999cd9711bc8cbc
 36879 pass 413cb08cebe9fd8107f556eee48b2d40773cacde 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
be11dc1e9172f91e798a8f831b30c14b479e08e8 
d568f5b668b19b8f257dc60eb3252b74bf70ec10
 36865 pass 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
e32e9c76bcfc235cb29575c542709f327ba72cb4
 36866 pass e8f616ae4f32159f77e60f73a4267b5806c418bd 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
2bd6add4f5fa4ea2ba9297d6139e9dea42ea70a9
 36881 pass b55e8b26547e1aed16b1a6d6a179f651747f8f29 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
be11dc1e9172f91e798a8f831b30c14b479e08e8 
56c002976f18dc0ff1a43bb14a339096c977a9da
 36869 pass e8f616ae4f32159f77e60f73a4267b5806c418bd 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
cde92647ea4f5c487059a3c89f2e3f1aec9a42d3
 36871 blocked e8f616ae4f32159f77e60f73a4267b5806c418bd 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
879b181f38b0e4e3c7314de980289f4ecd1c5982
 36902 pass 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
88a2372c6ba44dd42b915a95a823cf9d4d260e25
 36873 blocked e8f616ae4f32159f77e60f73a4267b5806c418bd 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
72c7e0ffd15f48f346e1b740d074679d5207e5d1
 36892 pass 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
207fe9adc2e77b2a9684fc223d9441e915878245
 36884 pass e8f616ae4f32159f77e60f73a4267b5806c418bd 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
daf525ab15e337fe09b4f2d95442ccd37bc51525
 36909 fail 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
d639e6a05a0f8ee0e61c6cc4eebba78934ef3648
 36886 pass a16f0642cca75fc126566fc70b8fe9fb4da870f1 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
fe3cafd89ab7a9e171a4e8542b00f5f08c7b4f2f
 36896 fail 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
289eea77b6d9d59ccdceca94c5033b0f094e9065
 36911 pass 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
88a2372c6ba44dd42b915a95a823cf9d4d260e25
 36898 pass 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
2090f14c5cbd659c3adebc8cd27d423fae8b6b54
 36904 fail 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
d639e6a05a0f8ee0e61c6cc4eebba78934ef3648
 36907 pass 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
88a2372c6ba44dd42b915a95a823cf9d4d260e25
 36912 fail 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
d639e6a05a0f8ee0e61c6cc4eebba78934ef3648
Searching for interesting versions
 Result found: flight 34137 (pass), for basis pass
 Result found: flight 36772 (fail), for basis failure
 Repro found: flight 36856 (pass), for basis pass
 Repro found: flight 36859 (fail), for basis failure
 0 revisions at 8a5f782c33c04ea5c9b3ca6fb32d6039e2e5c0c9 
c530a75c1e6a472b0eb9558310b518f0dfcd8860 
a4b276b4ce49c8d70dd841ff885b900ec652b994 
42ffdf360dd9df66b0a4a7ada059c02a3cf3a8de 
88a2372c6ba44dd42b915a95a823cf9d4d260e25
No revisions left to test, checking graph state.
 Result found: flight 36902 (pass), for last pass
 Result found: flight 36904 (fail), for first failure
 Repro found: flight 36907 (pass), for last pass
 Repro found: flight 36909 (fail), for first failure
 Repro found: flight 36911 (pass), for last pass
 Repro found: flight 36912 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  d639e6a05a0f8ee0e61c6cc4eebba78934ef3648
  Bug not present: 88a2372c6ba44dd42b915a95a823cf9d4d260e25

+ exec
+ sh -xe
+ cd /export/home/osstest/repos/xen
+ git remote set-url origin 
git://drall.uk.xensource.com:9419/git://xenbits.xen.org/xen.git
+ git fetch -p origin +refs/heads/*:refs/remotes/origin/*

  commit d639e6a05a0f8ee0e61c6cc4eebba78934ef3648
  Author: Jan Beulich <jbeulich@xxxxxxxx>
  Date:   Mon Mar 23 16:51:14 2015 +0100
  
      x86: allow 64-bit PV guest kernels to suppress user mode exposure of M2P
      
      Xen L4 entries being uniformly installed into any L4 table and 64-bit
      PV kernels running in ring 3 means that user mode was able to see the
      read-only M2P presented by Xen to the guests. While apparently not
      really representing an exploitable information leak, this still very
      certainly was never meant to be that way.
      
      Building on the fact that these guests already have separate kernel and
      user mode page tables we can allow guest kernels to tell Xen that they
      don't want user mode to see this table. We can't, however, do this by
      default: There is no ABI requirement that kernel and user mode page
      tables be separate. Therefore introduce a new VM-assist flag allowing
      the guest to control respective hypervisor behavior:
      - when not set, L4 tables get created with the respective slot blank,
        and whenever the L4 table gets used as a kernel one the missing
        mapping gets inserted,
      - when set, L4 tables get created with the respective slot initialized
        as before, and whenever the L4 table gets used as a user one the
        mapping gets zapped.
      
      Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
      Reviewed-by: Tim Deegan <tim@xxxxxxx>

dot: graph is too large for cairo-renderer bitmaps. Scaling by 0.696622 to fit
Revision graph left in 
/home/xc_osstest/results/bisect.xen-unstable.test-amd64-amd64-xl.guest-localmigrate.{dot,ps,png,html}.
----------------------------------------
36912: tolerable ALL FAIL

flight 36912 xen-unstable real-bisect [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/36912/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 test-amd64-amd64-xl          12 guest-localmigrate      fail baseline untested


jobs:
 test-amd64-amd64-xl                                          fail    


------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.