[Xen-devel] [linux-4.9 test] 114321: regressions - trouble: blocked/broken/fail/pass

2017-10-11 Thread osstest service owner
flight 114321 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/114321/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl broken test-armhf-armhf-xl-rtds

[Xen-devel] [xen-unstable-smoke test] 114393: regressions - FAIL

2017-10-11 Thread osstest service owner
flight 114393 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114393/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 114299 Tests which

Re: [Xen-devel] [PATCH v2 0/2] ARM: ACPI: IORT: Hide SMMU from hardware domain's IORT table

2017-10-11 Thread Manish Jaggi
On 10/6/2017 7:54 PM, Julien Grall wrote: Hello, On 04/10/17 06:22, Manish Jaggi wrote: On 10/4/2017 12:12 AM, Julien Grall wrote: On 25/09/17 05:22, Manish Jaggi wrote: On 9/22/2017 7:42 PM, Andre Przywara wrote: Hi Manish, On 11/09/17 22:33, mja...@caviumnetworks.com wrote: From: Manis

[Xen-devel] [qemu-upstream-unstable test] 114327: regressions - trouble: broken/fail/pass

2017-10-11 Thread osstest service owner
flight 114327 qemu-upstream-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/114327/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-cubietruck broken test-armhf-armhf-xl-vhd

Re: [Xen-devel] [PATCH v6 08/16] x86: implement set value flow for MBA

2017-10-11 Thread Yi Sun
On 17-10-11 07:38:52, Jan Beulich wrote: > >>> On 08.10.17 at 09:23, wrote: > > --- a/xen/arch/x86/psr.c > > +++ b/xen/arch/x86/psr.c > > @@ -138,6 +138,12 @@ static const struct feat_props { > > > > /* write_msr is used to write out feature MSR register. */ > > void (*write_msr)(unsig

[Xen-devel] [xen-unstable-smoke test] 114389: regressions - FAIL

2017-10-11 Thread osstest service owner
flight 114389 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114389/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 114299 Tests which

[Xen-devel] [linux-4.9 bisection] complete test-amd64-amd64-xl-pvh-amd

2017-10-11 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-xl-pvh-amd testid guest-start Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-traditiona

Re: [Xen-devel] [PATCH v5] x86: psr: support co-exist features' values setting

2017-10-11 Thread Yi Sun
Many thanks for the changes! The changes look good to me and pass the test. On 17-10-11 06:06:49, Jan Beulich wrote: > >>> On 11.10.17 at 09:20, wrote: > > --- a/xen/arch/x86/psr.c > > +++ b/xen/arch/x86/psr.c > > @@ -,25 +,43 @@ static unsigned int get_socket_cpu(unsigned int > > socket

[Xen-devel] [libvirt test] 114325: trouble: broken/pass

2017-10-11 Thread osstest service owner
flight 114325 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/114325/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-xsm broken test-armhf-armhf-libvirt-

[Xen-devel] [ovmf baseline-only test] 72229: all pass

2017-10-11 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72229 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72229/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf a63be426f8e327181dda369348eae2768439536b baseline v

[Xen-devel] [xen-unstable-smoke test] 114376: regressions - FAIL

2017-10-11 Thread osstest service owner
flight 114376 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114376/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 114299 Tests which

[Xen-devel] [xen-4.8-testing test] 114313: regressions - trouble: broken/fail/pass

2017-10-11 Thread osstest service owner
flight 114313 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/114313/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu broken test-armhf-armhf-xl-multivcpu 4 host

[Xen-devel] [ovmf test] 114319: all pass - PUSHED

2017-10-11 Thread osstest service owner
flight 114319 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/114319/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf a63be426f8e327181dda369348eae2768439536b baseline version: ovmf 3673214c6e0eb94de9e52

[Xen-devel] [xen-unstable-smoke test] 114371: regressions - FAIL

2017-10-11 Thread osstest service owner
flight 114371 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114371/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 114299 Tests which

[Xen-devel] [xen-4.9-testing test] 114312: regressions - trouble: blocked/broken/fail/pass

2017-10-11 Thread osstest service owner
flight 114312 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/114312/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl broken test-armhf-armhf-xl-multivcpu

Re: [Xen-devel] [PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization

2017-10-11 Thread Tom Lendacky
On 10/11/2017 3:30 PM, Thomas Garnier wrote: > Changes: > - patch v1: > - Simplify ftrace implementation. > - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. > - rfc v3: > - Use --emit-relocs instead of -pie to reduce dynamic relocation space on > mapped memory.

Re: [Xen-devel] [PATCH v8 07/11] arm: smccc: handle SMCs according to SMCCC

2017-10-11 Thread Stefano Stabellini
On Tue, 10 Oct 2017, Volodymyr Babchuk wrote: > SMCCC (SMC Call Convention) describes how to handle both HVCs and SMCs. > SMCCC states that both HVC and SMC are valid conduits to call to different > firmware functions. Thus, for example, PSCI calls can be made both by > SMC or HVC. Also SMCCC defin

[Xen-devel] [PATCH v1 23/27] x86/modules: Adapt module loading for PIE support

2017-10-11 Thread Thomas Garnier
Adapt module loading to support PIE relocations. Generate dynamic GOT if a symbol requires it but no entry exist in the kernel GOT. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- ar

[Xen-devel] [PATCH v1 19/27] x86: Support global stack cookie

2017-10-11 Thread Thomas Garnier
Add an off-by-default configuration option to use a global stack cookie instead of the default TLS. This configuration option will only be used with PIE binaries. For kernel stack cookie, the compiler uses the mcmodel=kernel to switch between the fs segment to gs segment. A PIE binary does not use

[Xen-devel] [PATCH v1 17/27] xen: Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change the assembly code to use the new _ASM_GET_PTR macro which get a symbol reference while being PIE compatible. Adapt the relocation tool to ignore 32-bit Xen code. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. S

[Xen-devel] [PATCH v1 25/27] x86/pie: Add option to build the kernel as PIE

2017-10-11 Thread Thomas Garnier
Add the CONFIG_X86_PIE option which builds the kernel as a Position Independent Executable (PIE). The kernel is currently build with the mcmodel=kernel option which forces it to stay on the top 2G of the virtual address space. With PIE, the kernel will be able to move below the current limit. The

[Xen-devel] [PATCH v1 27/27] x86/kaslr: Add option to extend KASLR range from 1GB to 3GB

2017-10-11 Thread Thomas Garnier
Add a new CONFIG_RANDOMIZE_BASE_LARGE option to benefit from PIE support. It increases the KASLR range from 1GB to 3GB. The new range stars at 0x just above the EFI memory region. This option is off by default. The boot code is adapted to create the appropriate page table spanning

[Xen-devel] [PATCH v1 26/27] x86/relocs: Add option to generate 64-bit relocations

2017-10-11 Thread Thomas Garnier
The x86 relocation tool generates a list of 32-bit signed integers. There was no need to use 64-bit integers because all addresses where above the 2G top of the memory. This change add a large-reloc option to generate 64-bit unsigned integers. It can be used when the kernel plan to go below the to

[Xen-devel] [PATCH v1 22/27] x86/modules: Add option to start module section after kernel

2017-10-11 Thread Thomas Garnier
Add an option so the module section is just after the mapped kernel. It will ensure position independent modules are always at the right distance from the kernel and do not require mcmodule=large. It also optimize the available size for modules by getting rid of the empty space on kernel randomizat

[Xen-devel] [PATCH v1 07/27] x86: pm-trace - Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change assembly to use the new _ASM_GET_PTR macro instead of _ASM_MOV for the assembly to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/include/asm/pm-t

[Xen-devel] [PATCH v1 11/27] x86/power/64: Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/power/hibernate_asm_

[Xen-devel] [PATCH v1 21/27] x86/mm/dump_pagetables: Fix address markers index on x86_64

2017-10-11 Thread Thomas Garnier
The address_markers_idx enum is not aligned with the table when EFI is enabled. Add an EFI_VA_END_NR entry in this case. Signed-off-by: Thomas Garnier --- arch/x86/mm/dump_pagetables.c | 7 +-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/arch/x86/mm/dump_pagetables.c b/arch

[Xen-devel] [PATCH v1 02/27] x86: Use symbol name on bug table for PIE support

2017-10-11 Thread Thomas Garnier
Replace the %c constraint with %P. The %c is incompatible with PIE because it implies an immediate value whereas %P reference a symbol. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier ---

[Xen-devel] [PATCH v1 05/27] x86: relocate_kernel - Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/kernel/relocate_kern

[Xen-devel] [PATCH v1 10/27] x86/boot/64: Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Early at boot, the kernel is mapped at a temporary address while preparing the page table. To know the changes needed for the page table with KASLR, the boot code calculate the difference betwe

[Xen-devel] [PATCH v1 24/27] x86/mm: Make the x86 GOT read-only

2017-10-11 Thread Thomas Garnier
The GOT is changed during early boot when relocations are applied. Make it read-only directly. This table exists only for PIE binary. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier ---

[Xen-devel] [PATCH v1 20/27] x86/ftrace: Adapt function tracing for PIE support

2017-10-11 Thread Thomas Garnier
When using -fPIE/PIC with function tracing, the compiler generates a call through the GOT (call *__fentry__@GOTPCREL). This instruction takes 6 bytes instead of 5 on the usual relative call. If PIE is enabled, replace the 6th byte of the GOT call by a 1-byte nop so ftrace can handle the previous 5

[Xen-devel] [PATCH v1 06/27] x86/entry/64: Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/entry/entry_64.S | 2

[Xen-devel] [PATCH v1 14/27] x86/percpu: Adapt percpu for PIE support

2017-10-11 Thread Thomas Garnier
Perpcu uses a clever design where the .percu ELF section has a virtual address of zero and the relocation code avoid relocating specific symbols. It makes the code simple and easily adaptable with or without SMP support. This design is incompatible with PIE because generated code always try to acc

[Xen-devel] [PATCH v1 18/27] kvm: Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. The new __ASM_GET_PTR_PRE macro is used to get the address of a symbol on both 32 and 64-bit with PIE support. Position Independent Executable (PIE) support will allow to extended the KASLR ran

[Xen-devel] [PATCH v1 13/27] x86/boot/64: Use _text in a global for PIE support

2017-10-11 Thread Thomas Garnier
By default PIE generated code create only relative references so _text points to the temporary virtual address. Instead use a global variable so the relocation is done as expected. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memo

[Xen-devel] [PATCH v1 16/27] x86/relocs: Handle PIE relocations

2017-10-11 Thread Thomas Garnier
Change the relocation tool to correctly handle relocations generated by -fPIE option: - Add relocation for each entry of the .got section given the linker does not generate R_X86_64_GLOB_DAT on a simple link. - Ignore R_X86_64_GOTPCREL and R_X86_64_PLT32. Signed-off-by: Thomas Garnier ---

[Xen-devel] [PATCH v1 15/27] compiler: Option to default to hidden symbols

2017-10-11 Thread Thomas Garnier
Provide an option to default visibility to hidden except for key symbols. This option is disabled by default and will be used by x86_64 PIE support to remove errors between compilation units. The default visibility is also enabled for external symbols that are compared as they maybe equals (start/

[Xen-devel] [PATCH v1 01/27] x86/crypto: Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/crypto/aes-x86_64-as

[Xen-devel] [PATCH v1 09/27] x86/acpi: Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/kernel/acpi/wakeup_6

[Xen-devel] [PATCH v1 08/27] x86/CPU: Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Use the new _ASM_GET_PTR macro instead of the 'mov $symbol, %dst' construct to not have an absolute reference. Position Independent Executable (PIE) support will allow to extended the KASLR ran

[Xen-devel] [PATCH v1 12/27] x86/paravirt: Adapt assembly for PIE support

2017-10-11 Thread Thomas Garnier
if PIE is enabled, switch the paravirt assembly constraints to be compatible. The %c/i constrains generate smaller code so is kept by default. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garni

[Xen-devel] [PATCH v1 04/27] x86: Add macro to get symbol address for PIE support

2017-10-11 Thread Thomas Garnier
Add a new _ASM_GET_PTR macro to fetch a symbol address. It will be used to replace "_ASM_MOV $, %dst" code construct that are not compatible with PIE. Signed-off-by: Thomas Garnier --- arch/x86/include/asm/asm.h | 13 + 1 file changed, 13 insertions(+) diff --git a/arch/x86/include/

[Xen-devel] [PATCH v1 03/27] x86: Use symbol name in jump table for PIE support

2017-10-11 Thread Thomas Garnier
Replace the %c constraint with %P. The %c is incompatible with PIE because it implies an immediate value whereas %P reference a symbol. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier ---

[Xen-devel] [PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization

2017-10-11 Thread Thomas Garnier
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start t

[Xen-devel] [xen-unstable-smoke test] 114365: regressions - trouble: blocked/broken/fail/pass

2017-10-11 Thread osstest service owner
flight 114365 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114365/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf broken build-armhf 4 hos

Re: [Xen-devel] [PATCH 3/3 v4] xenfb: Add [feature|request]-raw-pointer

2017-10-11 Thread Stefano Stabellini
On Wed, 11 Oct 2017, Anthony PERARD wrote: > On Tue, Oct 10, 2017 at 04:52:48PM -0700, Stefano Stabellini wrote: > > On Mon, 2 Oct 2017, Anthony PERARD wrote: > > > On Tue, Sep 26, 2017 at 02:43:39PM +, Owen Smith wrote: > > > > Writes "feature-raw-pointer" during init to indicate the backend >

[Xen-devel] [linux-3.18 test] 114304: regressions - trouble: broken/fail/pass

2017-10-11 Thread osstest service owner
flight 114304 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/114304/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-cubietruck broken test-amd64-amd64-xl-pvh-intel 12 guest-st

Re: [Xen-devel] [PATCH 27/27 v10] xen/arm: vpl011: Correct the logic for asserting/de-asserting SBSA UART TX interrupt

2017-10-11 Thread Dave Martin
On Wed, Oct 11, 2017 at 07:21:43PM +0530, Bhupinder Thakur wrote: > On 11 October 2017 at 15:38, Dave Martin wrote: > > On Wed, Oct 11, 2017 at 01:28:44PM +0530, Bhupinder Thakur wrote: > >> Hi Dave, > >> > >> On 26 September 2017 at 20:08, Dave Martin wrote: > >> > On Fri, Sep 22, 2017 at 01:53:

[Xen-devel] [RFC 0/4] TEE mediator framework + OP-TEE mediator

2017-10-11 Thread Volodymyr Babchuk
Hello all, I want to present TEE mediator, that was discussed earlier ([1]). I selected design with built-in mediators. This is easiest way, it removes many questions, it is easy to implement and maintain (at least I hope so). So, user can use Kconfig to build one or multiple mediators. During b

[Xen-devel] [RFC 3/4] arm: tee: add OP-TEE header files

2017-10-11 Thread Volodymyr Babchuk
This header files describe protocol between OP-TEE and OP-TEE client driver in Linux. They are needed for upcomient OP-TEE mediator, which is added in the next patch. Reason to add those headers in separate patch is to ease up review. Those files were taken from linux tree (drivers/tee/optee/) and

[Xen-devel] [RFC 2/4] arm: add generic TEE mediator framework

2017-10-11 Thread Volodymyr Babchuk
This patch adds basic framework for TEE mediators. Guests can't talk to TEE directly, we need some entity that will intercept request and decide what to do with them. "TEE mediaor" is a such entity. This is how it works: user can build XEN with multiple TEE mediators (see the next patches, where O

[Xen-devel] [RFC 4/4] arm: tee: add basic OP-TEE mediator

2017-10-11 Thread Volodymyr Babchuk
Add basic OP-TEE mediator as an example how TEE mediator framework works. Currently it support only calls from Dom0. Calls from other guests will be declined. It maps OP-TEE static shared memory region into Dom0 address space, so Dom0 is the only domain which can work with older versions of OP-TEE

[Xen-devel] [RFC 1/4] arm: add SMC wrapper that is compatible with SMCCC

2017-10-11 Thread Volodymyr Babchuk
Existing SMC wrapper call_smc() allows only 4 parameters and returns only one value. This is enough for existing use in PSCI code, but TEE mediator will need a call that is fully compatible with ARM SMCCC. This patch adds this call for both arm32 and arm64. There was similar patch by Edgar E. Igle

Re: [Xen-devel] [PATCHv2 for-4.10] xen/arm: guest_walk: Fix check again the IPS

2017-10-11 Thread Stefano Stabellini
On Wed, 11 Oct 2017, Sergej Proskurin wrote: > Hi Julien, > > On 10/11/2017 04:57 PM, Julien Grall wrote: > > > > > > On 11/10/17 15:51, Sergej Proskurin wrote: > >> Hi Julien, > > > > Hi, > > > >> On 10/11/2017 04:29 PM, Julien Grall wrote: > >>> The function get_ipa_output_size is check whet

Re: [Xen-devel] [PATCH for-4.10] xen/arm: mm: Rework MAIR* definitions to handle 32-bit compilation environment

2017-10-11 Thread Stefano Stabellini
On Wed, 11 Oct 2017, Julien Grall wrote: > Commit a0543df403 "xen/arm: page: Clean-up the definition of MAIRVAL" > combined the definition of MAIR0VAL and MAIR1VAL in MAIRVAL. Sadly, when > building in 32-bit environment, the assembler is unable to compute > 64-bit constant and will ignore the 32-b

[Xen-devel] [xen-unstable-smoke test] 114360: regressions - FAIL

2017-10-11 Thread osstest service owner
flight 114360 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114360/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 114299 test-armhf-a

[Xen-devel] [PATCH v4 3/5] xl: enable per-VCPU extratime flag for RTDS

2017-10-11 Thread Meng Xu
Change main_sched_rtds and related output functions to support per-VCPU extratime flag. Signed-off-by: Meng Xu Reviewed-by: Dario Faggioli Acked-by: Wei Liu --- Changes from v2 Validate the -e option input that can only be 0 or 1 Update docs/man/xl.pod.1.in Change EXTRATIME to Extratime Chang

Re: [Xen-devel] [PATCHv2 for-4.10] xen/arm: guest_walk: Fix check again the IPS

2017-10-11 Thread Sergej Proskurin
Hi Julien, On 10/11/2017 04:57 PM, Julien Grall wrote: > > > On 11/10/17 15:51, Sergej Proskurin wrote: >> Hi Julien, > > Hi, > >> On 10/11/2017 04:29 PM, Julien Grall wrote: >>> The function get_ipa_output_size is check whether the input size >>> configured by the guest is valid and will retu

[Xen-devel] [PATCH v4 0/5] Towards work-conserving RTDS

2017-10-11 Thread Meng Xu
This series of patches make RTDS scheduler work-conserving without breaking real-time guarantees. VCPUs with extratime flag set can get extra time from the unreserved system resource. System administrators can decide which VCPUs have extratime flag set. Example: Set the extratime bit of all VCPUs

[Xen-devel] [PATCH v4 2/5] libxl: enable per-VCPU extratime flag for RTDS

2017-10-11 Thread Meng Xu
Modify libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set functions to support per-VCPU extratime flag Signed-off-by: Meng Xu Reviewed-by: Dario Faggioli Acked-by: Wei Liu --- Changes from v2 1) Move extratime out of the section that is marked as depreciated in libxl_domain_sched_p

[Xen-devel] [PATCH v4 1/5] xen:rtds: towards work conserving RTDS

2017-10-11 Thread Meng Xu
Make RTDS scheduler work conserving without breaking the real-time guarantees. VCPU model: Each real-time VCPU is extended to have an extratime flag and a priority_level field. When a VCPU's budget is depleted in the current period, if it has extratime flag set, its priority_level will increase by

[Xen-devel] [PATCH v4 5/5] docs: enable per-VCPU extratime flag for RTDS

2017-10-11 Thread Meng Xu
Revise xl tool use case by adding -e option Remove work-conserving from TODO list Signed-off-by: Meng Xu Reviewed-by: Dario Faggioli Acked-by: Wei Liu --- No change from v2 Changes from v1 Revise rtds docs --- docs/features/sched_rtds.pandoc | 7 --- 1 file changed, 4 insertions(+), 3 de

[Xen-devel] [PATCH v4 4/5] xentrace: enable per-VCPU extratime flag for RTDS

2017-10-11 Thread Meng Xu
Change repl_budget event output for xentrace formats and xenalyze Signed-off-by: Meng Xu --- Changes from v3 Handle burn_budget event No changes from v2 Changes from v1 Add this changes from v1 --- tools/xentrace/formats| 4 ++-- tools/xentrace/xenalyze.c | 16 +++- 2 files c

[Xen-devel] [PATCH v4 12/12] fuzz/x86_emulate: Add an option to limit the number of instructions executed

2017-10-11 Thread George Dunlap
AFL considers a testcase to be a useful addition not only if there are tuples exercised by that testcase which were not exercised otherwise, but also if the *number* of times an individual tuple is exercised changes significantly; in particular, if the number of the highest non-zero bit changes (i.

[Xen-devel] [PATCH v4 11/12] fuzz/x86_emulate: Set and fuzz more CPU state

2017-10-11 Thread George Dunlap
x86_emulate() operates not only on state passed to it in cpu_user_regs, but also on state currently found on the cpu: namely, the FPU and XMM registers. At the moment, we re-zero (and/or re-initialize) cpu_user_regs on every invocation, but leave the cpu-stored state alone. In "persistent mode",

[Xen-devel] [PATCH v4 09/12] fuzz/x86_emulate: Make input more compact

2017-10-11 Thread George Dunlap
At the moment, AFL reckons that for any given input, 87% of it is completely irrelevant: that is, it can change it as much as it wants but have no impact on the result of the test; and yet it can't remove it. This is largely because we interpret the blob handed to us as a large struct, including C

[Xen-devel] [PATCH v4 02/12] fuzz/x86_emulate: Improve failure descriptions in x86_emulate harness

2017-10-11 Thread George Dunlap
- Print the symbolic name rather than the number - Explicitly state when data_read() fails due to EOI Signed-off-by: George Dunlap Reviewed-by: Wei Liu Reviewed-by: Jan Beulich --- Changes in v4: - Make array 'static const char* const' Changes in v2: - Add spaces around '=' CC: Ian Jackson CC

[Xen-devel] [PATCH v4 06/12] fuzz/x86_emulate: Take multiple test files for inputs

2017-10-11 Thread George Dunlap
Finding aggregate coverage for a set of test files means running each afl-generated test case through the harness. At the moment, this is done by re-executing afl-harness-cov with each input file. When a large number of test cases have been generated, this can take a significant amonut of time; a

[Xen-devel] [PATCH v4 04/12] fuzz/x86_emulate: Rename the file containing the wrapper code

2017-10-11 Thread George Dunlap
When generating coverage output, by default gcov generates output filenames based only on the coverage file and the "leaf" source file, not the full path. As a result, it uses the same name for x86_emulate.c and x86_emulate/x86_emulate.c, generally overwriting the second (which we actually are abo

[Xen-devel] [PATCH v4 05/12] fuzz/x86_emulate: Add 'afl-cov' target

2017-10-11 Thread George Dunlap
...to generate a "normal" coverage-instrumented binary, suitable for use with gcov or afl-cov. This is slightly annoying because: - Every object file needs to have been instrumented to work effectively - You generally want to have both an afl-instrumented binary and a gcov-instrumented b

[Xen-devel] [PATCH v4 10/12] fuzz/x86_emulate: Add --rerun option to try to track down instability

2017-10-11 Thread George Dunlap
Current stability numbers are not 100%. In order to help track this down, add a --rerun option which will run the same input twice, resetting the state between each run, and comparing the state afterwards. If the state differs, call abort(). This allows AFL to help the process of tracking down w

[Xen-devel] [PATCH v4 01/12] fuzz/x86_emulate: Clear errors in the officially sanctioned way

2017-10-11 Thread George Dunlap
Commit 849a1f10c9 was checked in inappropriately; review flagged up that clearerr() was too big a hammer, as it would clear both the EOF flag and stream errors. Stream errors shouldn't be cleared; we only want the EOF and other stream-related state reset. To do this, it is sufficient to fseek() t

[Xen-devel] [PATCH v4 08/12] fuzz/x86_emulate: Move all state into fuzz_state

2017-10-11 Thread George Dunlap
At the moment we copy data from the input into a struct named 'corpus', then read and write this state (so that it no longer resembles the corpus that we read from). Instead, move all "emulated cpu" state into fuzz_state, and explicitly state that we are expecting to change it. Get rid of 'input'

[Xen-devel] [PATCH v4 03/12] fuzz/x86_emulate: Implement input_read() and input_avail()

2017-10-11 Thread George Dunlap
Rather than open-coding the "read" from the input file. Signed-off-by: George Dunlap Acked-by: Andrew Cooper Reviewed-by: Ian Jackson --- v3: - s/input_available/input_avail/; - Constify argument to input_avail - Fix off-by-one error in input_avail - Return false / true rather than 0 / 1 in

[Xen-devel] [PATCH v4 07/12] fuzz/x86_emulate: Move definitions into a header

2017-10-11 Thread George Dunlap
Move fuzz-emul.c function prototypes into a header. Also share the definition of the input size (rather than hard-coding it in fuzz-emul.c). Signed-off-by: George Dunlap --- RFC: Worth trying to BUILD_BUG_ON(INPUT_SIZE < DATA_SIZE_FULL)? v4: - Move earlier in the queue. - Rebase over previous p

Re: [Xen-devel] How to prepare the COLO test environment

2017-10-11 Thread Zhang Chen
Hi, Yamamoto. The Xen COLO wiki has been updated, you can try it. https://wiki.xen.org/wiki/COLO_-_Coarse_Grain_Lock_Stepping Because the COLO proxy module and the block replication module share with KVM COLO, you can read related part from KVM COLO wiki maybe easier to understand COLO. Some deta

Re: [Xen-devel] [PATCH v3 4/5] xentrace: enable per-VCPU extratime flag for RTDS

2017-10-11 Thread Meng Xu
On Wed, Oct 11, 2017 at 6:57 AM, Dario Faggioli wrote: > On Tue, 2017-10-10 at 19:17 -0400, Meng Xu wrote: >> --- a/tools/xentrace/formats >> +++ b/tools/xentrace/formats >> @@ -75,7 +75,7 @@ >> 0x00022801 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) rtds:tickle[ >> cpu = %(1)d ] >> 0x00022802

Re: [Xen-devel] [PATCH v3 11/12] fuzz/x86_emulate: Set and fuzz more CPU state

2017-10-11 Thread George Dunlap
On 10/11/2017 10:31 AM, Jan Beulich wrote: On 10.10.17 at 18:20, wrote: >> --- a/tools/fuzz/x86_instruction_emulator/fuzz-emul.c >> +++ b/tools/fuzz/x86_instruction_emulator/fuzz-emul.c >> @@ -40,6 +40,8 @@ struct fuzz_state >> uint64_t msr[MSR_INDEX_MAX]; >> struct segment_register

[Xen-devel] [linux-linus test] 114297: tolerable FAIL - PUSHED

2017-10-11 Thread osstest service owner
flight 114297 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/114297/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail REGR. vs. 114175 Tests which did not succeed,

[Xen-devel] [PATCH v5] x86/altp2m: Added xc_altp2m_set_mem_access_multi()

2017-10-11 Thread Petre Pircalabu
From: Razvan Cojocaru For the default EPT view we have xc_set_mem_access_multi(), which is able to set an array of pages to an array of access rights with a single hypercall. However, this functionality was lacking for the altp2m subsystem, which could only set page restrictions for one page at a

Re: [Xen-devel] [PATCH for-4.10] xen: Fix XEN_DMOP_remote_shutdown return value

2017-10-11 Thread Andrew Cooper
On 11/10/17 16:41, Ross Lagerwall wrote: > Return 0 to indicate success rather than whatever rc was previously set > to (-EINVAL). > > Signed-off-by: Ross Lagerwall > --- > xen/arch/x86/hvm/dm.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/xen/arch/x86/hvm/dm.c b/xen/arch/x86/hvm/dm.c

Re: [Xen-devel] [PATCH for-4.10] common/gnttab: Improve logging message by including relevent domid

2017-10-11 Thread Julien Grall
Hi, On 10/10/17 21:24, Andrew Cooper wrote: Several logging messages cite "bad ref %#x", without identifying which domain the ref belongs to. Add a domain back-pointer to struct grant_table to improve the debugability. While editing the messages, clean up some others: * Remove extranious pu

Re: [Xen-devel] xl mem-set for domain 0 regression

2017-10-11 Thread Wei Liu
On Tue, Oct 10, 2017 at 04:03:32PM +0100, James Dingwall wrote: > Hi, > > We are migrating from xen 4.4 to xen 4.8. At the moment we boot our system > with a xen command line that includes "dom0_mem=8192m,min:1728m,max:8192m". > We have autoballoon of dom0 disabled in xl.conf and instead call xl

Re: [Xen-devel] [PATCH v3 10/12] fuzz/x86_emulate: Add --rerun option to try to track down instability

2017-10-11 Thread George Dunlap
On 10/10/2017 07:44 PM, Andrew Cooper wrote: > On 10/10/17 17:20, George Dunlap wrote: >> @@ -659,7 +667,10 @@ static void setup_state(struct x86_emulate_ctxt *ctxt) >> { >> /* Fuzz all of the state in one go */ >> if ( !input_read(s, s, DATA_SIZE_FULL) ) >> +{ >> +

Re: [Xen-devel] [PATCH for-4.10] xen: Fix XEN_DMOP_remote_shutdown return value

2017-10-11 Thread Ian Jackson
Andrew Cooper writes ("Re: [PATCH for-4.10] xen: Fix XEN_DMOP_remote_shutdown return value"): > On 11/10/17 16:41, Ross Lagerwall wrote: > > Return 0 to indicate success rather than whatever rc was previously set > > to (-EINVAL). > > > > Signed-off-by: Ross Lagerwall > > --- > > xen/arch/x86/hv

Re: [Xen-devel] [PATCH for-4.10] xen: Fix XEN_DMOP_remote_shutdown return value

2017-10-11 Thread Wei Liu
On Wed, Oct 11, 2017 at 04:41:57PM +0100, Ross Lagerwall wrote: > Return 0 to indicate success rather than whatever rc was previously set > to (-EINVAL). > > Signed-off-by: Ross Lagerwall Reviewed-by: Wei Liu ___ Xen-devel mailing list Xen-devel@list

Re: [Xen-devel] [PATCH for-4.10] xen: Fix XEN_DMOP_remote_shutdown return value

2017-10-11 Thread Jan Beulich
>>> On 11.10.17 at 17:41, wrote: > Return 0 to indicate success rather than whatever rc was previously set > to (-EINVAL). > > Signed-off-by: Ross Lagerwall Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.

Re: [Xen-devel] [PATCH 3/3 v4] xenfb: Add [feature|request]-raw-pointer

2017-10-11 Thread Anthony PERARD
On Tue, Oct 10, 2017 at 04:52:48PM -0700, Stefano Stabellini wrote: > On Mon, 2 Oct 2017, Anthony PERARD wrote: > > On Tue, Sep 26, 2017 at 02:43:39PM +, Owen Smith wrote: > > > Writes "feature-raw-pointer" during init to indicate the backend > > > can pass raw unscaled values for absolute axes

[Xen-devel] [PATCH for-4.10] xen: Fix XEN_DMOP_remote_shutdown return value

2017-10-11 Thread Ross Lagerwall
Return 0 to indicate success rather than whatever rc was previously set to (-EINVAL). Signed-off-by: Ross Lagerwall --- xen/arch/x86/hvm/dm.c | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/arch/x86/hvm/dm.c b/xen/arch/x86/hvm/dm.c index 82addea..32ade95 100644 --- a/xen/arch/x86/hvm/dm.

[Xen-devel] [xen-unstable-smoke test] 114354: regressions - FAIL

2017-10-11 Thread osstest service owner
flight 114354 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114354/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 114299 test-armhf-a

Re: [Xen-devel] [PATCH v10 04/11] public: xen.h: add definitions for UUID handling

2017-10-11 Thread Konrad Rzeszutek Wilk
On Wed, Oct 11, 2017 at 02:57:59PM +0300, Volodymyr Babchuk wrote: > Added type xen_uuid_t. This type represents UUID as an array of 16 > bytes in big endian format. > > Added macro XEN_DEFINE_UUID that constructs UUID in the usual way: > > XEN_DEFINE_UUID(0x00112233, 0x4455, 0x6677, 0x8899, >

Re: [Xen-devel] [PATCH v9 3/3] tools/libxc: use superpages during restore of HVM guest

2017-10-11 Thread Olaf Hering
On Wed, Oct 11, Olaf Hering wrote: > -#define MAX_BATCH_SIZE 1024 /* up to 1024 pages (4MB) at a time */ > +#define MAX_BATCH_SIZE SUPERPAGE_1GB_NR_PFNS /* up to 1GB at a time */ Actually the error is something else, I missed this in the debug output: xc: error: Failed to get types for pfn b

Re: [Xen-devel] [PATCHv2 for-4.10] xen/arm: guest_walk: Fix check again the IPS

2017-10-11 Thread Julien Grall
On 11/10/17 15:51, Sergej Proskurin wrote: Hi Julien, Hi, On 10/11/2017 04:29 PM, Julien Grall wrote: The function get_ipa_output_size is check whether the input size configured by the guest is valid and will return it. The check is done with the IPS already shifted against TCR_EL1_IPS_48

Re: [Xen-devel] [PATCHv2 for-4.10] xen/arm: guest_walk: Fix check again the IPS

2017-10-11 Thread Sergej Proskurin
Hi Julien, On 10/11/2017 04:29 PM, Julien Grall wrote: > The function get_ipa_output_size is check whether the input size > configured by the guest is valid and will return it. > > The check is done with the IPS already shifted against > TCR_EL1_IPS_48_BIT. However the constant has been defined w

Re: [Xen-devel] [PATCH for-4.10] common/gnttab: Improve logging message by including relevent domid

2017-10-11 Thread Andrew Cooper
On 11/10/17 11:03, Jan Beulich wrote: On 10.10.17 at 22:24, wrote: >> --- a/xen/common/grant_table.c >> +++ b/xen/common/grant_table.c >> @@ -76,6 +76,9 @@ struct grant_table { >> /* Mapping tracking table per vcpu. */ >> struct grant_mapping **maptrack; >> >> +/* Domain to wh

Re: [Xen-devel] [PATCH v3 07/12] fuzz/x86_emulate: Move all state into fuzz_state

2017-10-11 Thread George Dunlap
On 10/11/2017 12:30 PM, George Dunlap wrote: > On 10/10/2017 07:20 PM, Andrew Cooper wrote: >> On 10/10/17 17:20, George Dunlap wrote: >>> This is in preparation for adding the option for a more "compact" >>> interpretation of the fuzzing data, in which we only change select >>> bits of the state.

Re: [Xen-devel] [PATCH for-4.9 v2] x86: avoid #GP for PV guest MSR accesses

2017-10-11 Thread Andrew Cooper
On 09/10/17 11:07, Jan Beulich wrote: On 09.10.17 at 11:49, wrote: >> On 09/10/17 08:48, Jan Beulich wrote: >>> Halfway recent Linux kernels probe MISC_FEATURES_ENABLES on all CPUs, >>> leading to ugly recovered #GP fault messages with debug builds on older >>> systems. We can do better, so i

Re: [Xen-devel] [RFC] ARM: New (Xen) VGIC design document

2017-10-11 Thread Andre Przywara
Hi, On 11/10/17 15:33, Andre Przywara wrote: > Hi, > > (CC:ing some KVM/ARM folks involved in the VGIC) > > starting with the addition of the ITS support we were seeing more and > more issues with the current implementation of our ARM Generic Interrupt > Controller (GIC) emulation, the VGIC. > A

Re: [Xen-devel] [PATCH for-4.10] xen/arm: mm: Rework MAIR* definitions to handle 32-bit compilation environment

2017-10-11 Thread Andre Przywara
Hi, On 11/10/17 15:15, Julien Grall wrote: > Commit a0543df403 "xen/arm: page: Clean-up the definition of MAIRVAL" > combined the definition of MAIR0VAL and MAIR1VAL in MAIRVAL. Sadly, when > building in 32-bit environment, the assembler is unable to compute > 64-bit constant and will ignore the 3

  1   2   3   >