Xen Project 4.4.3
We are pleased to announce the release of Xen 4.4.3. This is available immediately from its git repository
http://xenbits.xenproject.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.4 (tag RELEASE-4.4.3) or from this download page
This release contains the following bug-fixes and improvements in the Xen Project hypervisor:
- 27b82b0: update Xen version to 4.4.3 [Jan Beulich]
- 3646b13: libxl: poll: Avoid fd deregistration race POLLNVAL crash [Ian Jackson]
- 0348c45: libxl: poll: Use poller_get and poller_put for poller_app [Ian Jackson]
- 900c797: libxl: poll: Make libxl__poller_get have only one success return path [Ian Jackson]
- 1749add: tools: libxl: Handle failure to create qemu dm logfile [Ian Campbell]
- ca0f468: libxl: In libxl_set_vcpuonline check for maximum number of VCPUs against the cpumap. [Konrad Rzeszutek Wilk]
- 3e9054c: docs: workaround markdown parser error in xen-command-line.markdown [Ian Campbell]
- 214fd40: xl: Sane handling of extra config file arguments [Ian Jackson]
- 2b08c5c: QEMU_TAG update [Ian Jackson]
- d273ce7: dmar: device scope mem leak fix [Elena Ufimtseva]
- 1eda7e5: make rangeset_report_ranges() report all ranges [Jan Beulich]
- d55922f: xen: earlycpio: Pull in latest linux earlycpio.[ch] [Ian Campbell]
- d4ee871: x86/hvmloader: avoid data corruption with xenstore reads/writes [Andrew Cooper]
- 4ee998c: credit1: properly deal with pCPUs not in any cpupool [Dario Faggioli]
- 7ee0f1a: x86 / cpupool: clear the proper cpu_valid bit on pCPU teardown [Dario Faggioli]
- cc87ed9: x86/p2m-ept: don’t unmap the EPT pagetable while it is still in use [Andrew Cooper]
- f51089d: nested EPT: fix the handling of nested EPT [Liang Li]
- 33eba76: x86/traps: avoid using current too early on boot [Andrew Cooper]
- 04667d6: x86: avoid tripping watchdog when constructing dom0 [Ross Lagerwall]
- ea019a8: x86/EFI: adjust EFI_MEMORY_WP handling for spec version 2.5 [Jan Beulich]
- b51d47e: kexec: add more pages to v1 environment [Jan Beulich]
- f38be14: passthrough/amd: avoid reading an uninitialized variable [Tim Deegan]
- fb9fdb0: x86/traps: identify the vcpu in context when dumping registers [Andrew Cooper]
- 36c53c2: update Xen version to 4.4.3-rc1 [Jan Beulich]
- 6c1cb3d: tools/libxc: Fix build of 32bit toolstacks on CentOS 5.x following XSA-125 [Andrew Cooper]
- 7062ac6: Revert “tools/libxc: Fix build of 32bit toolstacks on CentOS 5.x following XSA-125” [Ian Jackson]
- dfed6d9: libxl: event handling: ao_inprogress does waits while reports outstanding [Ian Jackson]
- ba68310: libxl: event handling: Break out ao_work_outstanding [Ian Jackson]
- a2895ef: tools/libxc: Fix build of 32bit toolstacks on CentOS 5.x following XSA-125 [Andrew Cooper]
- a490f8d: tools/xenconsoled: Increase file descriptor limit [Andrew Cooper]
- c669c24: ocaml/xenctrl: Fix stub_xc_readconsolering() [Andrew Cooper]
- 9702e08: ocaml/xenctrl: Make failwith_xc() thread safe [Andrew Cooper]
- 10a9553: ocaml/xenctrl: Check return values from hypercalls [Andrew Cooper]
- 13623d5: libxl: In domain death search, start search at first domid we want [Ian Jackson]
- 4b63c53: QEMU_TAG update [Ian Jackson]
- c756224: xen/arm: Call context_saved() with interrupts enabled during context switch [denys drozdov]
- de53397: cpupool: fix shutdown with cpupools with different schedulers [Dario Faggioli]
- 472bdfe: libelf: fix elf_parse_bsdsyms call [Roger Pau Monné]
- 726dd5a: VT-d: extend quirks to newer desktop chipsets [Jan Beulich]
- d108622: EFI: support default attributes to map Runtime service areas with none given [Konrad Rzeszutek Wilk]
- 1f29e20: EFI/early: add /mapbs to map EfiBootServices{Code,Data} [Konrad Rzeszutek Wilk]
- a7c37b2: x86/EFI: fix EFI_MEMORY_WP handling [Jan Beulich]
- e50f047: efi: avoid calling boot services after ExitBootServices() [Ross Lagerwall]
- cd98a75: x86/VPMU: add lost Intel processor [Alan Robinson]
- d568854: x86/crash: don’t use set_fixmap() in the crash path [Andrew Cooper]
- ab1cc71: x86/apic: Disable the LAPIC later in smp_send_stop() [Andrew Cooper]
- 6ed66bf: efi: fix allocation problems if ExitBootServices() fails [Ross Lagerwall]
- c76aeb5: x86: don’t crash when mapping a page using EFI runtime page tables [Ross Lagerwall]
- 7140a69: x86/pvh: disable posted interrupts [Roger Pau Monné]
- 2691b20: x86: don’t unconditionally touch the hvm_domain union during domain construction [Andrew Cooper]
- 34b61e9: x86/EFI: keep EFI runtime services top level page tables up-to-date [Jan Beulich]
- adee062: cpupools: avoid crashing if shutting down with free CPUs [Dario Faggioli]
- 5d660a9: cpupool: assigning a CPU to a pool can fail [Dario Faggioli]
- 05ab771: x86/traps: loop in the correct direction in compat_iret() [Andrew Cooper]
- bcfa8d6: gnttab: add missing version check to GNTTABOP_swap_grant_ref handling [Jan Beulich]
- dc34ce4: QEMU_TAG update [Ian Jackson]
- 5624637: QEMU_TAG update [Ian Jackson]
- 2260598: x86: don’t clear high 32 bits of RAX on sub-word guest I/O port reads [Jan Beulich]
- 6cd44b0: x86_emulate: fix EFLAGS setting of CMPXCHG emulation [Eugene Korenevsky]
- 21a06bf: x86/efi: reserve SMBIOS table region when EFI booting [Ross Lagerwall]
- 718f183: x86: don’t change affinity with interrupt unmasked [Jan Beulich]
- cb296dd: x86_emulate: split the {reg,mem} union in struct operand [Tim Deegan]
- 19ae8c1: VT-d: improve fault info logging [Jan Beulich]
- 8f2d240: x86/MSI: fix error handling [Jan Beulich]
- ce516e8: LZ4 : fix the data abort issue [JeHyeon Yeon]
- 1af1095: hvmloader: don’t treat ROM BAR like other BARs [Jan Beulich]
- 5fea6a3: QEMU_UPSTREAM_REVISION = master again [Stefano Stabellini]
- 5365c7b: domctl/sysctl: don’t leak hypervisor stack to toolstacks [Andrew Cooper]
- 6b09a29: domctl: don’t allow a toolstack domain to call domain_pause() on itself [Andrew Cooper]
- 518ae14: Limit XEN_DOMCTL_memory_mapping hypercall to only process up to 64 GFNs (or less) [Konrad Rzeszutek Wilk]
- 491b55d: QEMU_TAG update [Ian Jackson]
- fc6fe18: x86: don’t apply reboot quirks if reboot set by user [Ross Lagerwall]
- 77da6c2: Revert “cpupools: update domU’s node-affinity on the cpupool_unassign_cpu() path” [Jan Beulich]
- 42b446e: x86/EFI: allow reboot= overrides when running under EFI [Konrad Rzeszutek Wilk]
- 21a97a7: EFI: fix getting EFI variable list on some systems [Ross Lagerwall]
- b39e48d: VT-d: print_vtd_entries() should cope with superpages [Jan Beulich]
- 4a49a29: honor MEMF_no_refcount in alloc_heap_pages() [Jan Beulich]
- c0577ae: update Xen version to 4.4.3-pre [Jan Beulich]
In addition, this release also contains the following fixes to qemu-traditional:
- 30c002b: ide: Clear DRQ after handling all expected accesses [Kevin Wolf]
- eb74574: ide: Check array bounds before writing to io_buffer (CVE-2015-5154) [Kevin Wolf]
- fd5c041: pcnet: force the buffer access to be in bounds during tx [Petr Matousek]
- 8d15b64: pcnet: fix Negative array index read [Gonglei]
- 5fabc18: xen/pt: unknown PCI config space fields should be read-only [Jan Beulich]
- 755f99f: xen/pt: add a few PCI config space field descriptions [Jan Beulich]
- 5c74b77: xen/pt: mark reserved bits in PCI config space fields [Jan Beulich]
- 65e39c8: xen/pt: mark all PCIe capability bits read-only [Jan Beulich]
- dd37ad7: xen/pt: split out calculation of throughable mask in PCI config space handling [Jan Beulich]
- 903ee00: xen/pt: correctly handle PM status bit [Jan Beulich]
- cdad723: xen/pt: consolidate PM capability emu_mask [Jan Beulich]
- 2736dd5: xen/MSI: don’t open-code pass-through of enable bit modifications [Jan Beulich]
- 6d7cdb1: xen/MSI-X: disable logging by default [Jan Beulich]
- 1e2a2be: xen: don’t allow guest to control MSI mask register [Jan Beulich]
- b0101be: xen: properly gate host writes of modified PCI CFG contents [Jan Beulich]
- c8c6ba0: fdc: force the fifo access to be in bounds of the allocated buffer [Petr Matousek]
- a03c5a7: xen: limit guest control of PCI command register [Jan Beulich]
This release also contains changes to qemu-upstream, whose changelogs we do not list here as it contains many changes that are not directly releated to the Xen Project Hypervisor and thus this release. However, you can check http://xenbits.xen.org/gitweb/?p=staging/qemu-upstream-4.4-testing.git;a=shortlog (between tags qemu-xen-4.4.2 and qemu-xen-4.4.3).
The fixes listed above also include security fixes for XSA-125 to XSA-139. The fix for XSA-140 has been applied to qemu-upstream, but has not been applied to qemu-traditional. See http://xenbits.xenproject.org/xsa/ for details related to Xen Project security advisories.
We recommend all users of the 4.4 stable series to update to this latest point release.