flight 114318 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114318/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 7 xen-boot fail REGR. vs. 114299
Tests which
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-pvh-intel
testid guest-start
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditio
flight 114273 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114273/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 12 guest-start fail REGR. vs. 114029
test-amd
flight 114263 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114263/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-winxpsp3 16 guest-localmigrate/x10 fail in 114101
pass in 114263
test-amd64-amd64
> On Oct 10, 2017, at 6:26 PM, Ian Jackson wrote:
>
> George Dunlap writes ("[PATCH v3 09/12] fuzz/x86_emulate: Make input more
> compact"):
>> At the moment, AFL reckons that for any given input, 87% of it is
>> completely irrelevant: that is, it can change it as much as it wants
>> but have n
This run is configured for baseline tests only.
flight 72226 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72226/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 3673214c6e0eb94de9e52221cca454a3ba5976ab
baseline v
On 10/10/17 17:20, George Dunlap wrote:
> This is in preparation for adding the option for a more "compact"
> interpretation of the fuzzing data, in which we only change select
> bits of the state.
>
> Signed-off-by: George Dunlap
> Acked-by: Jan Beulich
> ---
> v3:
> - Move DATA_OFFSET inside t
On 10/10/17 17:20, George Dunlap wrote:
> @@ -659,7 +667,10 @@ static void setup_state(struct x86_emulate_ctxt *ctxt)
> {
> /* Fuzz all of the state in one go */
> if ( !input_read(s, s, DATA_SIZE_FULL) )
> +{
> +printf("Input size too small\n");
>
This run is configured for baseline tests only.
flight 72225 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72225/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-qemuu-nested-intel 17 debian-hvm-install/l1/l2 fail b
The 64-bit DMAR fault address is composed of two 32 bits registers
DMAR_FEADDR_REG and DMAR_FEUADDR_REG. According to VT-d spec:
"Software is expected to access 32-bit registers as aligned doublewords",
a hypervisor should use two 32-bit writes to DMAR_FEADDR_REG and
DMAR_FEUADDR_REG separately in
> -Original Message-
> From: Alexandru Isaila [mailto:aisa...@bitdefender.com]
> Sent: 09 October 2017 11:56
> To: xen-devel@lists.xen.org
> Cc: jbeul...@suse.com; Andrew Cooper ;
> Paul Durrant ; Alexandru Isaila
>
> Subject: [PATCH v9] x86/hvm: Implement hvmemul_write() using real
> mapp
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan
> Beulich
> Sent: 10 October 2017 11:26
> To: Paul Durrant
> Cc: Stefano Stabellini ; Wei Liu
> ; KonradRzeszutek Wilk ;
> George Dunlap ; Andrew Cooper
> ; Ian Jackson ; Tim
> (Xen.org) ; xen-
flight 114230 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114230/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 12 guest-start fail REGR. vs. 114036
test-amd64-amd64-xl-p
On Wed, Oct 04, 2017 at 08:34:43AM +, Jan Beulich wrote:
> >>> On 19.09.17 at 17:29, wrote:
> > +const struct vpci_bar *bars;
> > +struct vpci_msix *msix;
> > +const struct vpci_msix_entry *entry;
> > +unsigned int offset;
> > +
> > +*data = ~0ul;
> > +
> > +msix = vpci
On 10/10/17 17:58, George Dunlap wrote:
> On 10/10/2017 05:56 PM, Andrew Cooper wrote:
>> On 10/10/17 17:20, George Dunlap wrote:
>>> @@ -65,12 +68,15 @@ int main(int argc, char **argv)
>>> #ifdef __AFL_HAVE_MANUAL_CONTROL
>>> __AFL_INIT();
>>>
>>> -while ( __AFL_LOOP(1000) )
>>> +f
On 10/10/17 18:13, George Dunlap wrote:
> On 10/10/2017 06:11 PM, Andrew Cooper wrote:
>> On 10/10/17 18:01, George Dunlap wrote:
>>> On 10/10/2017 05:59 PM, Andrew Cooper wrote:
On 10/10/17 17:20, George Dunlap wrote:
> At the moment, AFL reckons that for any given input, 87% of it is
>>>
On 10/10/17 17:20, George Dunlap wrote:
> ...to generate a "normal" coverage-instrumented binary, suitable for
> use with gcov or afl-cov.
>
> This is slightly annoying because:
>
> - Every object file needs to have been instrumented to work
>effectively
>
> - You generally want to have both
On 10/10/17 18:01, George Dunlap wrote:
> On 10/10/2017 05:59 PM, Andrew Cooper wrote:
>> On 10/10/17 17:20, George Dunlap wrote:
>>> At the moment, AFL reckons that for any given input, 87% of it is
>>> completely irrelevant: that is, it can change it as much as it wants
>>> but have no impact on
On 10/10/17 17:20, George Dunlap wrote:
> At the moment, AFL reckons that for any given input, 87% of it is
> completely irrelevant: that is, it can change it as much as it wants
> but have no impact on the result of the test; and yet it can't remove
> it.
>
> This is largely because we interpret t
On 10/10/17 17:20, George Dunlap wrote:
> Rather than open-coding the "read" from the input file.
>
> Signed-off-by: George Dunlap
Acked-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 10/10/17 17:20, George Dunlap wrote:
> @@ -65,12 +68,15 @@ int main(int argc, char **argv)
> #ifdef __AFL_HAVE_MANUAL_CONTROL
> __AFL_INIT();
>
> -while ( __AFL_LOOP(1000) )
> +for( count = 0; __AFL_LOOP(1000); )
> +#else
> +for( count = 0; count < max; count++ )
> #endif
>
On 10/10/17 17:47, George Dunlap wrote:
> On 10/10/2017 05:20 PM, George Dunlap wrote:
>> Once feof() returns true for a stream, it will continue to return true
>> for that stream until clearerr() is called (or the stream is closed
>> and re-opened).
>>
>> In llvm-clang-fast-mode, the same file des
The whole value array is transferred into 'do_write_psr_msrs'. Then, we can
write all features values on the cos id into MSRs.
Because multiple features may co-exist, we need handle all features to write
values of them into a COS register with new COS ID. E.g:
1. L3 CAT and L2 CAT co-exist.
2. Dom
flight 114270 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114270/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 3673214c6e0eb94de9e52221cca454a3ba5976ab
baseline version:
ovmf 728d74973c9262b6c7b7e
flight 114308 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114308/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 7 xen-boot fail REGR. vs. 114299
Tests which
> -Original Message-
> From: Paul Durrant
> Sent: 10 October 2017 15:10
> To: 'Jan Beulich'
> Cc: Andrew Cooper ; Wei Liu
> ; George Dunlap ; Ian
> Jackson ; Stefano Stabellini
> ; xen-de...@lists.xenproject.org; Konrad Rzeszutek
> Wilk ; Tim (Xen.org)
> Subject: RE: [PATCH v9 05/11] x86/
This run is configured for baseline tests only.
flight 72224 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72224/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 15 guest-start/deb
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 09 October 2017 16:21
> To: Paul Durrant
> Cc: Andrew Cooper ; Ian Jackson
> ; Stefano Stabellini ; xen-
> de...@lists.xenproject.org; Konrad Rzeszutek Wilk
> ; Tim (Xen.org)
> Subject: Re: [PATCH v9 06/11] x86/hv
On Sat, 7 Oct 2017, Andre Przywara wrote:
> So far we only supported the Allwinner A20 SoC. Add support for most
> of the other virtualization capable Allwinner SoCs by:
> - supporting the watchdog in newer (sun8i) SoCs
> - getting the watchdog address from DT
> - adding compatible strings for othe
> On Oct 10, 2017, at 6:31 PM, Andrew Cooper wrote:
>
> On 10/10/17 18:13, George Dunlap wrote:
>> On 10/10/2017 06:11 PM, Andrew Cooper wrote:
>>> On 10/10/17 18:01, George Dunlap wrote:
On 10/10/2017 05:59 PM, Andrew Cooper wrote:
> On 10/10/17 17:20, George Dunlap wrote:
>> At th
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 09 October 2017 15:23
> To: Paul Durrant
> Cc: Andrew Cooper ; Wei Liu
> ; George Dunlap ; Ian
> Jackson ; Stefano Stabellini
> ; xen-de...@lists.xenproject.org; Konrad Rzeszutek
> Wilk ; Tim (Xen.org)
> Subject:
On Wed, 4 Oct 2017, Awais Masood wrote:
> This patch fixes an ISR lockup seen on Allwinner uart
>
> On Allwinner H5, serial driver goes into an infinite loop
> when interrupts are enabled. The reason is a residual
> "busy detect" interrupt. Since the condition UART_IIR_NOINT
> will not be true unl
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-pvh-intel
testid guest-start
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditio
On Sun, 27 Aug 2017, Zhongze Liu wrote:
> This series implements the new xl config entry proposed in [1]. Users can use
> the new config entry to statically setup shared memory areas among VMs that
> don't have grant table support so that they could communicate with each other
> through the static
On Mon, 2 Oct 2017, Anthony PERARD wrote:
> On Tue, Sep 26, 2017 at 02:43:39PM +, Owen Smith wrote:
> > Writes "feature-raw-pointer" during init to indicate the backend
> > can pass raw unscaled values for absolute axes to the frontend.
> > Frontends set "request-raw-pointer" to indicate the ba
On Tue, 10 Oct 2017, Julien Grall wrote:
> The function get_ipa_output_size is check whether the input size
> configured by the guest is valid and will return it.
>
> The check is done with the IPS already shifted against
> TCR_EL1_IPS_48_BIT. However the constant has been defined with the
> shift
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 09 October 2017 14:06
> To: Paul Durrant
> Cc: Andrew Cooper ; Wei Liu
> ; George Dunlap ; Ian
> Jackson ; Stefano Stabellini
> ; xen-de...@lists.xenproject.org; Konrad Rzeszutek
> Wilk ; Tim (Xen.org)
> Subject:
On Tue, 10 Oct 2017, Volodymyr Babchuk wrote:
> Added type xen_uuid_t. This type represents UUID as an array of 16
> bytes in big endian format.
>
> Added macro XEN_DEFINE_UUID that constructs UUID in the usual way:
>
> XEN_DEFINE_UUID(0x00112233, 0x4455, 0x6677, 0x8899,
> 0xaa, 0x
Make RTDS scheduler work conserving without breaking the real-time guarantees.
VCPU model:
Each real-time VCPU is extended to have an extratime flag
and a priority_level field.
When a VCPU's budget is depleted in the current period,
if it has extratime flag set,
its priority_level will increase by
This series of patches make RTDS scheduler work-conserving
without breaking real-time guarantees.
VCPUs with extratime flag set can get extra time
from the unreserved system resource.
System administrators can decide which VCPUs have extratime flag set.
Example:
Set the extratime bit of all VCPUs
Change main_sched_rtds and related output functions to support
per-VCPU extratime flag.
Signed-off-by: Meng Xu
---
Changes from v2
Validate the -e option input that can only be 0 or 1
Update docs/man/xl.pod.1.in
Change EXTRATIME to Extratime
Changes from v1
No change because we agree on using -
Revise xl tool use case by adding -e option
Remove work-conserving from TODO list
Signed-off-by: Meng Xu
---
No change from v2
Changes from v1
Revise rtds docs
---
docs/features/sched_rtds.pandoc | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/docs/features/sched_rtd
Modify libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
functions to support per-VCPU extratime flag
Signed-off-by: Meng Xu
---
Changes from v2
1) Move extratime out of the section
that is marked as depreciated in libxl_domain_sched_params.
2) Set vcpu extratime in sched_rtds_vcpu_
Change repl_budget event output for xentrace formats and xenalyze
Signed-off-by: Meng Xu
---
No changes from v2
Changes from v1
Add this changes from v1
---
tools/xentrace/formats| 2 +-
tools/xentrace/xenalyze.c | 8 +---
2 files changed, 6 insertions(+), 4 deletions(-)
diff --git a/
Several logging messages cite "bad ref %#x", without identifying which domain
the ref belongs to. Add a domain back-pointer to struct grant_table to
improve the debugability.
While editing the messages, clean up some others:
* Remove extranious punctuation
* Use d%d rather than Dom%d
* Remove
On Mon, 9 Oct 2017 00:13:47 +0800
"Tan, Jianfeng" wrote:
> Hi,
>
>
> On 10/8/2017 12:54 PM, Bill Bonaparte wrote:
> > Thanks Jianfeng for taking time to reply.
> >
> > please allow me to briefly explain why I want to run dpdk on xen.
> > our system is based on dpdk, which means we use dpdk as p
Certain memory resources associated with a guest are not necessarily
present in the guest P2M.
This patch adds the boilerplate for new memory op to allow such a resource
to be priv-mapped directly, by either a PV or HVM tools domain.
NOTE: Whilst the new op is not intrinsicly specific to the x86
Markus Armbruster writes ("Re: [Qemu-devel] [PATCH 7/8] os-posix: Provide new
-runasid option"):
> Actually, a numeric UID without group name or ID could be made to work
> just fine as long as it maps to a user name. The use case may not be
> worth the bother, though.
In libxl's use case, it wou
These two patches
[PATCH 04/26] xentoolcore, _restrict_all: Introduce new library and
[PATCH 24/26] libxl: dm_restrict: Support uid range user
need fixes. See the commit messages.
I am not resending the unchanged patches.
I intend to push the whole series tomorrow.
Thanks,
Ian.
__
Anthony PERARD writes ("Re: [PATCH 1/8] xen: link against xentoolcore"):
> On Mon, Oct 09, 2017 at 05:28:08PM +0100, Ian Jackson wrote:
> > The xentoolcore library was just committed to xen.git#staging, so at
> > least this patch (or something like it) should go into qemu RSN.
>
> I don't think it
In practice, qemu opens a great many fds. Tracking them all down and
playing whack-a-mole is unattractive. It is also potentially fragile
in that future changes might accidentally undo our efforts.
Instead, we are going to teach all the Xen libraries how to register
their fds so that they can be
flight 114299 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114299/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
...to allow the calling domain to prevent translation of specified l1e
value.
Despite what the comment in public/xen.h might imply, specifying a
command value of MMU_NORMAL_PT_UPDATE will not simply update an l1e with
the specified value. Instead, mod_l1_entry() tests whether foreign_dom
has PG_tr
This patch adjusts the ioreq server code to use type-safe gfn_t values
where possible. No functional change.
Signed-off-by: Paul Durrant
Reviewed-by: Roger Pau Monné
Reviewed-by: Wei Liu
Acked-by: Jan Beulich
---
Cc: Andrew Cooper
---
xen/arch/x86/hvm/ioreq.c | 44 +++
On 10/10/2017 06:11 PM, Andrew Cooper wrote:
> On 10/10/17 18:01, George Dunlap wrote:
>> On 10/10/2017 05:59 PM, Andrew Cooper wrote:
>>> On 10/10/17 17:20, George Dunlap wrote:
At the moment, AFL reckons that for any given input, 87% of it is
completely irrelevant: that is, it can chang
Anthony PERARD writes ("Re: [PATCH 3/8] xen: defer call to xen_restrict until
after os_setup_post"):
> I'm tring to find out what does calling xen_restrict_all(0), when
> running an non-Xen guest. I think it would just lock(), then unlock()
> then there should not be any handle to restrict, and re
Signed-off-by: Ian Jackson
Acked-by: Wei Liu
---
v5: Use -runas :, as suggested on qemu-devel
by Markus Armbruster
v3: Use -runas ., as suggested on qemu-devel
by Markus Armbruster
squash! libxl: dm_restrict: Support uid range user
---
docs/man/xl.cfg.pod.5.in | 11 ++-
too
flight 114225 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114225/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 12 guest-start fail REGR. vs. 114034
test-amd64-amd64-xl-
George Dunlap writes ("[PATCH v3 09/12] fuzz/x86_emulate: Make input more
compact"):
> At the moment, AFL reckons that for any given input, 87% of it is
> completely irrelevant: that is, it can change it as much as it wants
> but have no impact on the result of the test; and yet it can't remove
>
George Dunlap writes ("[PATCH v3 03/12] fuzz/x86_emulate: Implement
input_read() and input_avail()"):
> Rather than open-coding the "read" from the input file.
>
> Signed-off-by: George Dunlap
Reviewed-by: Ian Jackson
___
Xen-devel mailing list
Xen-
George Dunlap writes ("[PATCH v3 01/12] fuzz/x86_emulate: Clear errors after
each iteration"):
> Once feof() returns true for a stream, it will continue to return true
> for that stream until clearerr() is called (or the stream is closed
> and re-opened).
>
> In llvm-clang-fast-mode, the same fil
Anthony PERARD writes ("Re: [Xen-devel] [PATCH 04/26] xentoolcore,
_restrict_all: Introduce new library and implementation"):
> On Mon, Oct 09, 2017 at 04:57:06PM +0100, Ian Jackson wrote:
> > +static pthread_mutex_t handles_lock = PTHREAD_MUTEX_INITIALIZER;
> > +static XENTOOLCORE_LIST_HEAD(, Xen
On 10/10/2017 05:59 PM, Andrew Cooper wrote:
> On 10/10/17 17:20, George Dunlap wrote:
>> At the moment, AFL reckons that for any given input, 87% of it is
>> completely irrelevant: that is, it can change it as much as it wants
>> but have no impact on the result of the test; and yet it can't remov
George Dunlap writes ("[PATCH v3 08/12] fuzz/x86_emulate: Move definitions into
a header"):
> Move fuzz-emul.c function prototypes into a header. Also share the
> definition of the input size (rather than hard-coding it in
> fuzz-emul.c).
>
> Signed-off-by: George Dunlap
Reviewed-by: Ian Jacks
Ross Lagerwall writes ("Re: [Xen-devel] [PATCH v2 0/*] xen: xen-domid-restrict
improvements"):
> If no one objects, I propose adding the following calls to
> libxendevicemodel (with underlying Xen implementations, of course) that
> would be usable after the xendevicemodel handle has been restric
A previous patch introduced a new HYPERVISOR_memory_op to acquire guest
resources for direct priv-mapping.
This patch adds new functionality into libxenforeignmemory to make use
of a new privcmd ioctl [1] that uses the new memory op to make such
resources available via mmap(2).
[1]
http://xenbit
This patch re-works much of the ioreq server initialization and teardown
code:
- The hvm_map/unmap_ioreq_gfn() functions are expanded to call through
to hvm_alloc/free_ioreq_gfn() rather than expecting them to be called
separately by outer functions.
- Several functions now test the validity o
On 10/10/2017 05:56 PM, Andrew Cooper wrote:
> On 10/10/17 17:20, George Dunlap wrote:
>> @@ -65,12 +68,15 @@ int main(int argc, char **argv)
>> #ifdef __AFL_HAVE_MANUAL_CONTROL
>> __AFL_INIT();
>>
>> -while ( __AFL_LOOP(1000) )
>> +for( count = 0; __AFL_LOOP(1000); )
>> +#else
>> +
By using a static inline stub in private.h for OS where this functionality
is not implemented, the various duplicate stubs in the OS-specific source
modules can be avoided.
Signed-off-by: Paul Durrant
Reviewed-by: Roger Pau Monné
Acked-by: Wei Liu
---
Cc: Ian Jackson
v4:
- Removed extraneous
A previous patch added support for priv-mapping guest resources directly
(rather than having to foreign-map, which requires P2M modification for
HVM guests).
This patch makes use of the new API to seed the guest grant table unless
the underlying infrastructure (i.e. privcmd) doesn't support it, in
This patch allows grant table frames to be mapped using the
XENMEM_acquire_resource memory op.
Signed-off-by: Paul Durrant
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
v10:
- Addressed
This series introduces support for direct mapping of guest resources.
The resources are:
- IOREQ server pages
- Grant tables
v10:
- Responded to comments from Jan.
v9:
- Change to patch #1 only.
v8:
- Re-ordered series and dropped two patches that have already been
committed.
v7:
- Fix
On 10/10/2017 05:20 PM, George Dunlap wrote:
> Once feof() returns true for a stream, it will continue to return true
> for that stream until clearerr() is called (or the stream is closed
> and re-opened).
>
> In llvm-clang-fast-mode, the same file descriptor is used for each
> iteration of the lo
A subsequent patch will remove the current implicit limitation on creation
of ioreq servers which is due to the allocation of gfns for the ioreq
structures and buffered ioreq ring.
It will therefore be necessary to introduce an explicit limit and, since
this limit should be small, it simplifies th
A subsequent patch will introduce a new scheme to allow an emulator to
map ioreq server pages directly from Xen rather than the guest P2M.
This patch lays the groundwork for that change by deferring mapping of
gfns until their values are requested by an emulator. To that end, the
pad field of the
... XENMEM_resource_ioreq_server
This patch adds support for a new resource type that can be mapped using
the XENMEM_acquire_resource memory op.
If an emulator makes use of this resource type then, instead of mapping
gfns, the IOREQ server will allocate pages from the heap. These pages
will never
On 10/10/17 11:43, Jan Beulich wrote:
> I failed to recognize the need to mirror the changes done by 7869e2bafe
> ("x86emul/fuzz: add rudimentary limit checking") into the earlier
> written but later committed 2fe43d333f ("x86emul: support remaining AVX
> insns"): Behavior here is the same as for m
This is in preparation for adding the option for a more "compact"
interpretation of the fuzzing data, in which we only change select
bits of the state.
Signed-off-by: George Dunlap
Acked-by: Jan Beulich
---
v3:
- Move DATA_OFFSET inside the structure
- Remove a stray blank line
v2: Port over p
Current stability numbers are not 100%. In order to help track this
down, add a --rerun option which will run the same input twice,
resetting the state between each run, and comparing the state
afterwards. If the state differs, call abort().
This allows AFL to help the process of tracking down w
Move fuzz-emul.c function prototypes into a header. Also share the
definition of the input size (rather than hard-coding it in
fuzz-emul.c).
Signed-off-by: George Dunlap
---
RFC: Worth trying to BUILD_BUG_ON(INPUT_SIZE < DATA_SIZE_FULL)?
v3:
- New in this version
CC: Ian Jackson
CC: Wei Liu
- Print the symbolic name rather than the number
- Explicitly state when data_read() fails due to EOI
Signed-off-by: George Dunlap
Reviewed-by: Wei Liu
Reviewed-by: Jan Beulich
---
Changes in v4:
- Make array 'static const char* const'
Changes in v2:
- Add spaces around '='
CC: Ian Jackson
CC
When generating coverage output, by default gcov generates output
filenames based only on the coverage file and the "leaf" source file,
not the full path. As a result, it uses the same name for
x86_emulate.c and x86_emulate/x86_emulate.c, generally overwriting the
second (which we actually are abo
...to generate a "normal" coverage-instrumented binary, suitable for
use with gcov or afl-cov.
This is slightly annoying because:
- Every object file needs to have been instrumented to work
effectively
- You generally want to have both an afl-instrumented binary and a
gcov-instrumented b
Rather than open-coding the "read" from the input file.
Signed-off-by: George Dunlap
---
v3:
- s/input_available/input_avail/;
- Constify argument to input_avail
- Fix off-by-one error in input_avail
- Return false / true rather than 0 / 1 in input_read
v2:
- Use less dread-ful names
- Return
At the moment, AFL reckons that for any given input, 87% of it is
completely irrelevant: that is, it can change it as much as it wants
but have no impact on the result of the test; and yet it can't remove
it.
This is largely because we interpret the blob handed to us as a large
struct, including C
Finding aggregate coverage for a set of test files means running each
afl-generated test case through the harness. At the moment, this is
done by re-executing afl-harness-cov with each input file. When a
large number of test cases have been generated, this can take a
significant amonut of time; a
Once feof() returns true for a stream, it will continue to return true
for that stream until clearerr() is called (or the stream is closed
and re-opened).
In llvm-clang-fast-mode, the same file descriptor is used for each
iteration of the loop, meaning that the "Input too large" check was
broken -
x86_emulate() operates not only on state passed to it in
cpu_user_regs, but also on state currently found on the cpu: namely,
the FPU and XMM registers. At the moment, we re-zero (and/or
re-initialize) cpu_user_regs on every invocation, but leave the
cpu-stored state alone. In "persistent mode",
AFL considers a testcase to be a useful addition not only if there are
tuples exercised by that testcase which were not exercised otherwise,
but also if the *number* of times an individual tuple is exercised
changes significantly; in particular, if the number of the highest
non-zero bit changes (i.
On 10/06/2017 12:56 PM, Jan Beulich wrote:
On 25.09.17 at 16:26, wrote:
>> @@ -597,6 +599,47 @@ static const struct x86_emulate_ops all_fuzzer_ops = {
>> };
>> #undef SET
>>
>> +static void _set_fpu_state(char *fxsave, bool store)
>> +{
>> +if ( cpu_has_fxsr )
>> +{
>> +st
On Mon, 9 Oct 2017, Julien Grall wrote:
> Hi all,
>
> This patch series contains clean-up for the ARM memory subsystem in
> preparation
> of reworking the page tables handling.
>
> For all changes, see in each patch.
The series is committed, thanks!
> Cheers,
>
> Julien Grall (10):
> xen/a
On 10/06/2017 02:19 PM, Paul Durrant wrote:
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
Ross Lagerwall
Sent: 06 October 2017 13:58
To: Ian Jackson ; qemu-de...@nongnu.org
Cc: Anthony Perard ; xen-
de...@lists.xenproject.org; Stefano Stabellini
On Mon, 9 Oct 2017, Julien Grall wrote:
> At the moment, PAGE_HYPERVISOR_* and MT_* have exactly the same value.
> In a follow-up patch the former will be extended to carry more
> information.
>
> It looks like the caller of set_fixmap are mixing the both. Stay
> consistent and only use PAGE_HYPER
On Mon, 9 Oct 2017, Julien Grall wrote:
> Currently, all the new mappings will be read-write non-executable. Allow the
> caller to use other permissions.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> Changes in v2:
> - Switch the runtime check to a BUG_ON(
On Mon, 9 Oct 2017, Julien Grall wrote:
> Currently, it is not possible to specify the permission of a new
> mapping. It would be necessary to use the function modify_xen_mappings
> with a different set of flags.
>
> Introduce a couple of new flags for the permissions (Non-eXecutable,
> Read-Only)
On Mon, 9 Oct 2017, Julien Grall wrote:
> This is based on the Linux ARMv8 naming scheme (see arch/arm64/mm/proc.S).
> Each
> type will contain "NORMAL" or "DEVICE" to make clear whether each attribute
> targets device or normal memory.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabe
On 10/09/2017 05:12 PM, Jan Beulich wrote:
On 09.10.17 at 17:36, wrote:
>> On 09/14/2017 04:12 PM, Jan Beulich wrote:
>>> @@ -7119,6 +7142,18 @@ x86_emulate(
>>> fic.insn_bytes = PFX_BYTES + 3;
>>> break;
>>>
>>> +case X86EMUL_OPC_VEX_66(0x0f38, 0x19): /* vbroadcastsd
flight 114289 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114289/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On 10/10/17 13:01, Alexandru Stefan ISAILA wrote:
>> I'd be fine taking care of all the comments while committing (and
>> then adding my R-b), provided you (and ideally also Andrew)
>> agree, and of course assuming Paul would ack the patch, plus
>> no-one else finds yet another problem which once a
Hi,
On 10/10/2017 21:07, Stefano Stabellini wrote:
CC'ing Jan and Andrew, just in case they disagree on this.
On Tue, 10 Oct 2017, Julien Grall wrote:
+unsigned long gicv3_its_make_hwdom_madt(const struct domain *d, void
*base_ptr)
+{
+unsigned int i;
+void *fw_its;
+struct acpi_ma
1 - 100 of 190 matches
Mail list logo