[Xen-devel] [xen-unstable-smoke test] 114318: regressions - FAIL

2017-10-10 Thread osstest service owner
flight 114318 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114318/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 7 xen-boot fail REGR. vs. 114299 Tests which

[Xen-devel] [linux-3.18 bisection] complete test-amd64-amd64-xl-pvh-intel

2017-10-10 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-xl-pvh-intel testid guest-start Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-traditio

[Xen-devel] [qemu-upstream-unstable test] 114273: regressions - FAIL

2017-10-10 Thread osstest service owner
flight 114273 qemu-upstream-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/114273/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 12 guest-start fail REGR. vs. 114029 test-amd

[Xen-devel] [xen-4.5-testing test] 114263: tolerable FAIL - PUSHED

2017-10-10 Thread osstest service owner
flight 114263 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/114263/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-qemuu-winxpsp3 16 guest-localmigrate/x10 fail in 114101 pass in 114263 test-amd64-amd64

Re: [Xen-devel] [PATCH v3 09/12] fuzz/x86_emulate: Make input more compact

2017-10-10 Thread George Dunlap
> On Oct 10, 2017, at 6:26 PM, Ian Jackson wrote: > > George Dunlap writes ("[PATCH v3 09/12] fuzz/x86_emulate: Make input more > compact"): >> At the moment, AFL reckons that for any given input, 87% of it is >> completely irrelevant: that is, it can change it as much as it wants >> but have n

[Xen-devel] [ovmf baseline-only test] 72226: all pass

2017-10-10 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72226 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72226/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3673214c6e0eb94de9e52221cca454a3ba5976ab baseline v

Re: [Xen-devel] [PATCH v3 07/12] fuzz/x86_emulate: Move all state into fuzz_state

2017-10-10 Thread Andrew Cooper
On 10/10/17 17:20, George Dunlap wrote: > This is in preparation for adding the option for a more "compact" > interpretation of the fuzzing data, in which we only change select > bits of the state. > > Signed-off-by: George Dunlap > Acked-by: Jan Beulich > --- > v3: > - Move DATA_OFFSET inside t

Re: [Xen-devel] [PATCH v3 10/12] fuzz/x86_emulate: Add --rerun option to try to track down instability

2017-10-10 Thread Andrew Cooper
On 10/10/17 17:20, George Dunlap wrote: > @@ -659,7 +667,10 @@ static void setup_state(struct x86_emulate_ctxt *ctxt) > { > /* Fuzz all of the state in one go */ > if ( !input_read(s, s, DATA_SIZE_FULL) ) > +{ > +printf("Input size too small\n"); >

[Xen-devel] [seabios baseline-only test] 72225: tolerable FAIL

2017-10-10 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72225 seabios real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72225/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-qemuu-nested-intel 17 debian-hvm-install/l1/l2 fail b

[Xen-devel] [PATCH v2] VT-d: use two 32-bit writes to update DMAR fault address registers

2017-10-10 Thread Haozhong Zhang
The 64-bit DMAR fault address is composed of two 32 bits registers DMAR_FEADDR_REG and DMAR_FEUADDR_REG. According to VT-d spec: "Software is expected to access 32-bit registers as aligned doublewords", a hypervisor should use two 32-bit writes to DMAR_FEADDR_REG and DMAR_FEUADDR_REG separately in

Re: [Xen-devel] [PATCH v9] x86/hvm: Implement hvmemul_write() using real mappings

2017-10-10 Thread Paul Durrant
> -Original Message- > From: Alexandru Isaila [mailto:aisa...@bitdefender.com] > Sent: 09 October 2017 11:56 > To: xen-devel@lists.xen.org > Cc: jbeul...@suse.com; Andrew Cooper ; > Paul Durrant ; Alexandru Isaila > > Subject: [PATCH v9] x86/hvm: Implement hvmemul_write() using real > mapp

Re: [Xen-devel] [PATCH v9 10/11] common: add a new mappable resource type: XENMEM_resource_grant_table

2017-10-10 Thread Paul Durrant
> -Original Message- > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan > Beulich > Sent: 10 October 2017 11:26 > To: Paul Durrant > Cc: Stefano Stabellini ; Wei Liu > ; KonradRzeszutek Wilk ; > George Dunlap ; Andrew Cooper > ; Ian Jackson ; Tim > (Xen.org) ; xen-

[Xen-devel] [linux-4.9 test] 114230: regressions - FAIL

2017-10-10 Thread osstest service owner
flight 114230 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/114230/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 12 guest-start fail REGR. vs. 114036 test-amd64-amd64-xl-p

Re: [Xen-devel] [PATCH v6 11/11] vpci/msix: add MSI-X handlers

2017-10-10 Thread Roger Pau Monné
On Wed, Oct 04, 2017 at 08:34:43AM +, Jan Beulich wrote: > >>> On 19.09.17 at 17:29, wrote: > > +const struct vpci_bar *bars; > > +struct vpci_msix *msix; > > +const struct vpci_msix_entry *entry; > > +unsigned int offset; > > + > > +*data = ~0ul; > > + > > +msix = vpci

Re: [Xen-devel] [PATCH v3 06/12] fuzz/x86_emulate: Take multiple test files for inputs

2017-10-10 Thread Andrew Cooper
On 10/10/17 17:58, George Dunlap wrote: > On 10/10/2017 05:56 PM, Andrew Cooper wrote: >> On 10/10/17 17:20, George Dunlap wrote: >>> @@ -65,12 +68,15 @@ int main(int argc, char **argv) >>> #ifdef __AFL_HAVE_MANUAL_CONTROL >>> __AFL_INIT(); >>> >>> -while ( __AFL_LOOP(1000) ) >>> +f

Re: [Xen-devel] [PATCH v3 09/12] fuzz/x86_emulate: Make input more compact

2017-10-10 Thread Andrew Cooper
On 10/10/17 18:13, George Dunlap wrote: > On 10/10/2017 06:11 PM, Andrew Cooper wrote: >> On 10/10/17 18:01, George Dunlap wrote: >>> On 10/10/2017 05:59 PM, Andrew Cooper wrote: On 10/10/17 17:20, George Dunlap wrote: > At the moment, AFL reckons that for any given input, 87% of it is >>>

Re: [Xen-devel] [PATCH v3 05/12] fuzz/x86_emulate: Add 'afl-cov' target

2017-10-10 Thread Andrew Cooper
On 10/10/17 17:20, George Dunlap wrote: > ...to generate a "normal" coverage-instrumented binary, suitable for > use with gcov or afl-cov. > > This is slightly annoying because: > > - Every object file needs to have been instrumented to work >effectively > > - You generally want to have both

Re: [Xen-devel] [PATCH v3 09/12] fuzz/x86_emulate: Make input more compact

2017-10-10 Thread Andrew Cooper
On 10/10/17 18:01, George Dunlap wrote: > On 10/10/2017 05:59 PM, Andrew Cooper wrote: >> On 10/10/17 17:20, George Dunlap wrote: >>> At the moment, AFL reckons that for any given input, 87% of it is >>> completely irrelevant: that is, it can change it as much as it wants >>> but have no impact on

Re: [Xen-devel] [PATCH v3 09/12] fuzz/x86_emulate: Make input more compact

2017-10-10 Thread Andrew Cooper
On 10/10/17 17:20, George Dunlap wrote: > At the moment, AFL reckons that for any given input, 87% of it is > completely irrelevant: that is, it can change it as much as it wants > but have no impact on the result of the test; and yet it can't remove > it. > > This is largely because we interpret t

Re: [Xen-devel] [PATCH v3 03/12] fuzz/x86_emulate: Implement input_read() and input_avail()

2017-10-10 Thread Andrew Cooper
On 10/10/17 17:20, George Dunlap wrote: > Rather than open-coding the "read" from the input file. > > Signed-off-by: George Dunlap Acked-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v3 06/12] fuzz/x86_emulate: Take multiple test files for inputs

2017-10-10 Thread Andrew Cooper
On 10/10/17 17:20, George Dunlap wrote: > @@ -65,12 +68,15 @@ int main(int argc, char **argv) > #ifdef __AFL_HAVE_MANUAL_CONTROL > __AFL_INIT(); > > -while ( __AFL_LOOP(1000) ) > +for( count = 0; __AFL_LOOP(1000); ) > +#else > +for( count = 0; count < max; count++ ) > #endif >

Re: [Xen-devel] [PATCH v3 01/12] fuzz/x86_emulate: Clear errors after each iteration

2017-10-10 Thread Andrew Cooper
On 10/10/17 17:47, George Dunlap wrote: > On 10/10/2017 05:20 PM, George Dunlap wrote: >> Once feof() returns true for a stream, it will continue to return true >> for that stream until clearerr() is called (or the stream is closed >> and re-opened). >> >> In llvm-clang-fast-mode, the same file des

[Xen-devel] [PATCH v4] x86: psr: support co-exist features' values setting

2017-10-10 Thread Yi Sun
The whole value array is transferred into 'do_write_psr_msrs'. Then, we can write all features values on the cos id into MSRs. Because multiple features may co-exist, we need handle all features to write values of them into a COS register with new COS ID. E.g: 1. L3 CAT and L2 CAT co-exist. 2. Dom

[Xen-devel] [ovmf test] 114270: all pass - PUSHED

2017-10-10 Thread osstest service owner
flight 114270 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/114270/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3673214c6e0eb94de9e52221cca454a3ba5976ab baseline version: ovmf 728d74973c9262b6c7b7e

[Xen-devel] [xen-unstable-smoke test] 114308: regressions - FAIL

2017-10-10 Thread osstest service owner
flight 114308 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114308/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 7 xen-boot fail REGR. vs. 114299 Tests which

Re: [Xen-devel] [PATCH v9 05/11] x86/mm: add HYPERVISOR_memory_op to acquire guest resources

2017-10-10 Thread Paul Durrant
> -Original Message- > From: Paul Durrant > Sent: 10 October 2017 15:10 > To: 'Jan Beulich' > Cc: Andrew Cooper ; Wei Liu > ; George Dunlap ; Ian > Jackson ; Stefano Stabellini > ; xen-de...@lists.xenproject.org; Konrad Rzeszutek > Wilk ; Tim (Xen.org) > Subject: RE: [PATCH v9 05/11] x86/

[Xen-devel] [xen-unstable baseline-only test] 72224: regressions - trouble: blocked/broken/fail/pass

2017-10-10 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72224 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72224/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-raw 15 guest-start/deb

Re: [Xen-devel] [PATCH v9 06/11] x86/hvm/ioreq: add a new mappable resource type...

2017-10-10 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 09 October 2017 16:21 > To: Paul Durrant > Cc: Andrew Cooper ; Ian Jackson > ; Stefano Stabellini ; xen- > de...@lists.xenproject.org; Konrad Rzeszutek Wilk > ; Tim (Xen.org) > Subject: Re: [PATCH v9 06/11] x86/hv

Re: [Xen-devel] [PATCH] ARM: sunxi: support more Allwinner SoCs

2017-10-10 Thread Stefano Stabellini
On Sat, 7 Oct 2017, Andre Przywara wrote: > So far we only supported the Allwinner A20 SoC. Add support for most > of the other virtualization capable Allwinner SoCs by: > - supporting the watchdog in newer (sun8i) SoCs > - getting the watchdog address from DT > - adding compatible strings for othe

Re: [Xen-devel] [PATCH v3 09/12] fuzz/x86_emulate: Make input more compact

2017-10-10 Thread George Dunlap
> On Oct 10, 2017, at 6:31 PM, Andrew Cooper wrote: > > On 10/10/17 18:13, George Dunlap wrote: >> On 10/10/2017 06:11 PM, Andrew Cooper wrote: >>> On 10/10/17 18:01, George Dunlap wrote: On 10/10/2017 05:59 PM, Andrew Cooper wrote: > On 10/10/17 17:20, George Dunlap wrote: >> At th

Re: [Xen-devel] [PATCH v9 05/11] x86/mm: add HYPERVISOR_memory_op to acquire guest resources

2017-10-10 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 09 October 2017 15:23 > To: Paul Durrant > Cc: Andrew Cooper ; Wei Liu > ; George Dunlap ; Ian > Jackson ; Stefano Stabellini > ; xen-de...@lists.xenproject.org; Konrad Rzeszutek > Wilk ; Tim (Xen.org) > Subject:

Re: [Xen-devel] [PATCH v3] xen/ns16550: Fix ISR lockup on Allwinner uart

2017-10-10 Thread Stefano Stabellini
On Wed, 4 Oct 2017, Awais Masood wrote: > This patch fixes an ISR lockup seen on Allwinner uart > > On Allwinner H5, serial driver goes into an infinite loop > when interrupts are enabled. The reason is a residual > "busy detect" interrupt. Since the condition UART_IIR_NOINT > will not be true unl

[Xen-devel] [linux-4.9 bisection] complete test-amd64-amd64-xl-pvh-intel

2017-10-10 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-xl-pvh-intel testid guest-start Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-traditio

Re: [Xen-devel] [PATCH v2 0/6] Allow setting up shared memory areas between VMs from xl config files

2017-10-10 Thread Stefano Stabellini
On Sun, 27 Aug 2017, Zhongze Liu wrote: > This series implements the new xl config entry proposed in [1]. Users can use > the new config entry to statically setup shared memory areas among VMs that > don't have grant table support so that they could communicate with each other > through the static

Re: [Xen-devel] [PATCH 3/3 v4] xenfb: Add [feature|request]-raw-pointer

2017-10-10 Thread Stefano Stabellini
On Mon, 2 Oct 2017, Anthony PERARD wrote: > On Tue, Sep 26, 2017 at 02:43:39PM +, Owen Smith wrote: > > Writes "feature-raw-pointer" during init to indicate the backend > > can pass raw unscaled values for absolute axes to the frontend. > > Frontends set "request-raw-pointer" to indicate the ba

Re: [Xen-devel] [PATCH FOR-4.10] xen/arm: guest_walk: Fix check again the IPS

2017-10-10 Thread Stefano Stabellini
On Tue, 10 Oct 2017, Julien Grall wrote: > The function get_ipa_output_size is check whether the input size > configured by the guest is valid and will return it. > > The check is done with the IPS already shifted against > TCR_EL1_IPS_48_BIT. However the constant has been defined with the > shift

Re: [Xen-devel] [PATCH v9 05/11] x86/mm: add HYPERVISOR_memory_op to acquire guest resources

2017-10-10 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 09 October 2017 14:06 > To: Paul Durrant > Cc: Andrew Cooper ; Wei Liu > ; George Dunlap ; Ian > Jackson ; Stefano Stabellini > ; xen-de...@lists.xenproject.org; Konrad Rzeszutek > Wilk ; Tim (Xen.org) > Subject:

Re: [Xen-devel] [PATCH v9 04/11] public: xen.h: add definitions for UUID handling

2017-10-10 Thread Stefano Stabellini
On Tue, 10 Oct 2017, Volodymyr Babchuk wrote: > Added type xen_uuid_t. This type represents UUID as an array of 16 > bytes in big endian format. > > Added macro XEN_DEFINE_UUID that constructs UUID in the usual way: > > XEN_DEFINE_UUID(0x00112233, 0x4455, 0x6677, 0x8899, > 0xaa, 0x

[Xen-devel] [PATCH v3 1/5] xen:rtds: towards work conserving RTDS

2017-10-10 Thread Meng Xu
Make RTDS scheduler work conserving without breaking the real-time guarantees. VCPU model: Each real-time VCPU is extended to have an extratime flag and a priority_level field. When a VCPU's budget is depleted in the current period, if it has extratime flag set, its priority_level will increase by

[Xen-devel] [PATCH v3 0/5] Towards work-conserving RTDS

2017-10-10 Thread Meng Xu
This series of patches make RTDS scheduler work-conserving without breaking real-time guarantees. VCPUs with extratime flag set can get extra time from the unreserved system resource. System administrators can decide which VCPUs have extratime flag set. Example: Set the extratime bit of all VCPUs

[Xen-devel] [PATCH v3 3/5] xl: enable per-VCPU extratime flag for RTDS

2017-10-10 Thread Meng Xu
Change main_sched_rtds and related output functions to support per-VCPU extratime flag. Signed-off-by: Meng Xu --- Changes from v2 Validate the -e option input that can only be 0 or 1 Update docs/man/xl.pod.1.in Change EXTRATIME to Extratime Changes from v1 No change because we agree on using -

[Xen-devel] [PATCH v3 5/5] docs: enable per-VCPU extratime flag for RTDS

2017-10-10 Thread Meng Xu
Revise xl tool use case by adding -e option Remove work-conserving from TODO list Signed-off-by: Meng Xu --- No change from v2 Changes from v1 Revise rtds docs --- docs/features/sched_rtds.pandoc | 7 --- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/docs/features/sched_rtd

[Xen-devel] [PATCH v3 2/5] libxl: enable per-VCPU extratime flag for RTDS

2017-10-10 Thread Meng Xu
Modify libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set functions to support per-VCPU extratime flag Signed-off-by: Meng Xu --- Changes from v2 1) Move extratime out of the section that is marked as depreciated in libxl_domain_sched_params. 2) Set vcpu extratime in sched_rtds_vcpu_

[Xen-devel] [PATCH v3 4/5] xentrace: enable per-VCPU extratime flag for RTDS

2017-10-10 Thread Meng Xu
Change repl_budget event output for xentrace formats and xenalyze Signed-off-by: Meng Xu --- No changes from v2 Changes from v1 Add this changes from v1 --- tools/xentrace/formats| 2 +- tools/xentrace/xenalyze.c | 8 +--- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/

[Xen-devel] [PATCH for-4.10] common/gnttab: Improve logging message by including relevent domid

2017-10-10 Thread Andrew Cooper
Several logging messages cite "bad ref %#x", without identifying which domain the ref belongs to. Add a domain back-pointer to struct grant_table to improve the debugability. While editing the messages, clean up some others: * Remove extranious punctuation * Use d%d rather than Dom%d * Remove

Re: [Xen-devel] [dpdk-dev] Can xenvirt pmd work in xen guest (aka DomU) without xen-vhost in Dom0 ?

2017-10-10 Thread Stephen Hemminger
On Mon, 9 Oct 2017 00:13:47 +0800 "Tan, Jianfeng" wrote: > Hi, > > > On 10/8/2017 12:54 PM, Bill Bonaparte wrote: > > Thanks Jianfeng for taking time to reply. > > > > please allow me to briefly explain why I want to run dpdk on xen. > > our system is based on dpdk, which means we use dpdk as p

[Xen-devel] [PATCH v10 05/11] x86/mm: add HYPERVISOR_memory_op to acquire guest resources

2017-10-10 Thread Paul Durrant
Certain memory resources associated with a guest are not necessarily present in the guest P2M. This patch adds the boilerplate for new memory op to allow such a resource to be priv-mapped directly, by either a PV or HVM tools domain. NOTE: Whilst the new op is not intrinsicly specific to the x86

Re: [Xen-devel] [Qemu-devel] [PATCH 7/8] os-posix: Provide new -runasid option

2017-10-10 Thread Ian Jackson
Markus Armbruster writes ("Re: [Qemu-devel] [PATCH 7/8] os-posix: Provide new -runasid option"): > Actually, a numeric UID without group name or ID could be made to work > just fine as long as it maps to a user name. The use case may not be > worth the bother, though. In libxl's use case, it wou

[Xen-devel] [PATCH v5 00/26 (PARTIAL POSTING)] qemu restrict final fixes

2017-10-10 Thread Ian Jackson
These two patches [PATCH 04/26] xentoolcore, _restrict_all: Introduce new library and [PATCH 24/26] libxl: dm_restrict: Support uid range user need fixes. See the commit messages. I am not resending the unchanged patches. I intend to push the whole series tomorrow. Thanks, Ian. __

Re: [Xen-devel] [PATCH 1/8] xen: link against xentoolcore

2017-10-10 Thread Ian Jackson
Anthony PERARD writes ("Re: [PATCH 1/8] xen: link against xentoolcore"): > On Mon, Oct 09, 2017 at 05:28:08PM +0100, Ian Jackson wrote: > > The xentoolcore library was just committed to xen.git#staging, so at > > least this patch (or something like it) should go into qemu RSN. > > I don't think it

[Xen-devel] [PATCH 04/26] xentoolcore, _restrict_all: Introduce new library and implementation

2017-10-10 Thread Ian Jackson
In practice, qemu opens a great many fds. Tracking them all down and playing whack-a-mole is unattractive. It is also potentially fragile in that future changes might accidentally undo our efforts. Instead, we are going to teach all the Xen libraries how to register their fds so that they can be

[Xen-devel] [xen-unstable-smoke test] 114299: tolerable all pass - PUSHED

2017-10-10 Thread osstest service owner
flight 114299 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114299/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-armhf-armhf-xl 1

[Xen-devel] [PATCH v10 07/11] x86/mm: add an extra command to HYPERVISOR_mmu_update...

2017-10-10 Thread Paul Durrant
...to allow the calling domain to prevent translation of specified l1e value. Despite what the comment in public/xen.h might imply, specifying a command value of MMU_NORMAL_PT_UPDATE will not simply update an l1e with the specified value. Instead, mod_l1_entry() tests whether foreign_dom has PG_tr

[Xen-devel] [PATCH v10 03/11] x86/hvm/ioreq: use gfn_t in struct hvm_ioreq_page

2017-10-10 Thread Paul Durrant
This patch adjusts the ioreq server code to use type-safe gfn_t values where possible. No functional change. Signed-off-by: Paul Durrant Reviewed-by: Roger Pau Monné Reviewed-by: Wei Liu Acked-by: Jan Beulich --- Cc: Andrew Cooper --- xen/arch/x86/hvm/ioreq.c | 44 +++

Re: [Xen-devel] [PATCH v3 09/12] fuzz/x86_emulate: Make input more compact

2017-10-10 Thread George Dunlap
On 10/10/2017 06:11 PM, Andrew Cooper wrote: > On 10/10/17 18:01, George Dunlap wrote: >> On 10/10/2017 05:59 PM, Andrew Cooper wrote: >>> On 10/10/17 17:20, George Dunlap wrote: At the moment, AFL reckons that for any given input, 87% of it is completely irrelevant: that is, it can chang

Re: [Xen-devel] [PATCH 3/8] xen: defer call to xen_restrict until after os_setup_post

2017-10-10 Thread Ian Jackson
Anthony PERARD writes ("Re: [PATCH 3/8] xen: defer call to xen_restrict until after os_setup_post"): > I'm tring to find out what does calling xen_restrict_all(0), when > running an non-Xen guest. I think it would just lock(), then unlock() > then there should not be any handle to restrict, and re

[Xen-devel] [PATCH 24/26] libxl: dm_restrict: Support uid range user

2017-10-10 Thread Ian Jackson
Signed-off-by: Ian Jackson Acked-by: Wei Liu --- v5: Use -runas :, as suggested on qemu-devel by Markus Armbruster v3: Use -runas ., as suggested on qemu-devel by Markus Armbruster squash! libxl: dm_restrict: Support uid range user --- docs/man/xl.cfg.pod.5.in | 11 ++- too

[Xen-devel] [linux-3.18 test] 114225: regressions - FAIL

2017-10-10 Thread osstest service owner
flight 114225 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/114225/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 12 guest-start fail REGR. vs. 114034 test-amd64-amd64-xl-

Re: [Xen-devel] [PATCH v3 09/12] fuzz/x86_emulate: Make input more compact

2017-10-10 Thread Ian Jackson
George Dunlap writes ("[PATCH v3 09/12] fuzz/x86_emulate: Make input more compact"): > At the moment, AFL reckons that for any given input, 87% of it is > completely irrelevant: that is, it can change it as much as it wants > but have no impact on the result of the test; and yet it can't remove >

Re: [Xen-devel] [PATCH v3 03/12] fuzz/x86_emulate: Implement input_read() and input_avail()

2017-10-10 Thread Ian Jackson
George Dunlap writes ("[PATCH v3 03/12] fuzz/x86_emulate: Implement input_read() and input_avail()"): > Rather than open-coding the "read" from the input file. > > Signed-off-by: George Dunlap Reviewed-by: Ian Jackson ___ Xen-devel mailing list Xen-

Re: [Xen-devel] [PATCH v3 01/12] fuzz/x86_emulate: Clear errors after each iteration

2017-10-10 Thread Ian Jackson
George Dunlap writes ("[PATCH v3 01/12] fuzz/x86_emulate: Clear errors after each iteration"): > Once feof() returns true for a stream, it will continue to return true > for that stream until clearerr() is called (or the stream is closed > and re-opened). > > In llvm-clang-fast-mode, the same fil

Re: [Xen-devel] [PATCH 04/26] xentoolcore, _restrict_all: Introduce new library and implementation

2017-10-10 Thread Ian Jackson
Anthony PERARD writes ("Re: [Xen-devel] [PATCH 04/26] xentoolcore, _restrict_all: Introduce new library and implementation"): > On Mon, Oct 09, 2017 at 04:57:06PM +0100, Ian Jackson wrote: > > +static pthread_mutex_t handles_lock = PTHREAD_MUTEX_INITIALIZER; > > +static XENTOOLCORE_LIST_HEAD(, Xen

Re: [Xen-devel] [PATCH v3 09/12] fuzz/x86_emulate: Make input more compact

2017-10-10 Thread George Dunlap
On 10/10/2017 05:59 PM, Andrew Cooper wrote: > On 10/10/17 17:20, George Dunlap wrote: >> At the moment, AFL reckons that for any given input, 87% of it is >> completely irrelevant: that is, it can change it as much as it wants >> but have no impact on the result of the test; and yet it can't remov

Re: [Xen-devel] [PATCH v3 08/12] fuzz/x86_emulate: Move definitions into a header

2017-10-10 Thread Ian Jackson
George Dunlap writes ("[PATCH v3 08/12] fuzz/x86_emulate: Move definitions into a header"): > Move fuzz-emul.c function prototypes into a header. Also share the > definition of the input size (rather than hard-coding it in > fuzz-emul.c). > > Signed-off-by: George Dunlap Reviewed-by: Ian Jacks

Re: [Xen-devel] [PATCH v2 0/*] xen: xen-domid-restrict improvements

2017-10-10 Thread Ian Jackson
Ross Lagerwall writes ("Re: [Xen-devel] [PATCH v2 0/*] xen: xen-domid-restrict improvements"): > If no one objects, I propose adding the following calls to > libxendevicemodel (with underlying Xen implementations, of course) that > would be usable after the xendevicemodel handle has been restric

[Xen-devel] [PATCH v10 08/11] tools/libxenforeignmemory: add support for resource mapping

2017-10-10 Thread Paul Durrant
A previous patch introduced a new HYPERVISOR_memory_op to acquire guest resources for direct priv-mapping. This patch adds new functionality into libxenforeignmemory to make use of a new privcmd ioctl [1] that uses the new memory op to make such resources available via mmap(2). [1] http://xenbit

[Xen-devel] [PATCH v10 02/11] x86/hvm/ioreq: simplify code and use consistent naming

2017-10-10 Thread Paul Durrant
This patch re-works much of the ioreq server initialization and teardown code: - The hvm_map/unmap_ioreq_gfn() functions are expanded to call through to hvm_alloc/free_ioreq_gfn() rather than expecting them to be called separately by outer functions. - Several functions now test the validity o

Re: [Xen-devel] [PATCH v3 06/12] fuzz/x86_emulate: Take multiple test files for inputs

2017-10-10 Thread George Dunlap
On 10/10/2017 05:56 PM, Andrew Cooper wrote: > On 10/10/17 17:20, George Dunlap wrote: >> @@ -65,12 +68,15 @@ int main(int argc, char **argv) >> #ifdef __AFL_HAVE_MANUAL_CONTROL >> __AFL_INIT(); >> >> -while ( __AFL_LOOP(1000) ) >> +for( count = 0; __AFL_LOOP(1000); ) >> +#else >> +

[Xen-devel] [PATCH v10 09/11] tools/libxenforeignmemory: reduce xenforeignmemory_restrict code footprint

2017-10-10 Thread Paul Durrant
By using a static inline stub in private.h for OS where this functionality is not implemented, the various duplicate stubs in the OS-specific source modules can be avoided. Signed-off-by: Paul Durrant Reviewed-by: Roger Pau Monné Acked-by: Wei Liu --- Cc: Ian Jackson v4: - Removed extraneous

[Xen-devel] [PATCH v10 11/11] tools/libxenctrl: use new xenforeignmemory API to seed grant table

2017-10-10 Thread Paul Durrant
A previous patch added support for priv-mapping guest resources directly (rather than having to foreign-map, which requires P2M modification for HVM guests). This patch makes use of the new API to seed the guest grant table unless the underlying infrastructure (i.e. privcmd) doesn't support it, in

[Xen-devel] [PATCH v10 10/11] common: add a new mappable resource type: XENMEM_resource_grant_table

2017-10-10 Thread Paul Durrant
This patch allows grant table frames to be mapped using the XENMEM_acquire_resource memory op. Signed-off-by: Paul Durrant --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan Cc: Wei Liu v10: - Addressed

[Xen-devel] [PATCH v10 00/11] x86: guest resource mapping

2017-10-10 Thread Paul Durrant
This series introduces support for direct mapping of guest resources. The resources are: - IOREQ server pages - Grant tables v10: - Responded to comments from Jan. v9: - Change to patch #1 only. v8: - Re-ordered series and dropped two patches that have already been committed. v7: - Fix

Re: [Xen-devel] [PATCH v3 01/12] fuzz/x86_emulate: Clear errors after each iteration

2017-10-10 Thread George Dunlap
On 10/10/2017 05:20 PM, George Dunlap wrote: > Once feof() returns true for a stream, it will continue to return true > for that stream until clearerr() is called (or the stream is closed > and re-opened). > > In llvm-clang-fast-mode, the same file descriptor is used for each > iteration of the lo

[Xen-devel] [PATCH v10 01/11] x86/hvm/ioreq: maintain an array of ioreq servers rather than a list

2017-10-10 Thread Paul Durrant
A subsequent patch will remove the current implicit limitation on creation of ioreq servers which is due to the allocation of gfns for the ioreq structures and buffered ioreq ring. It will therefore be necessary to introduce an explicit limit and, since this limit should be small, it simplifies th

[Xen-devel] [PATCH v10 04/11] x86/hvm/ioreq: defer mapping gfns until they are actually requsted

2017-10-10 Thread Paul Durrant
A subsequent patch will introduce a new scheme to allow an emulator to map ioreq server pages directly from Xen rather than the guest P2M. This patch lays the groundwork for that change by deferring mapping of gfns until their values are requested by an emulator. To that end, the pad field of the

[Xen-devel] [PATCH v10 06/11] x86/hvm/ioreq: add a new mappable resource type...

2017-10-10 Thread Paul Durrant
... XENMEM_resource_ioreq_server This patch adds support for a new resource type that can be mapped using the XENMEM_acquire_resource memory op. If an emulator makes use of this resource type then, instead of mapping gfns, the IOREQ server will allocate pages from the heap. These pages will never

Re: [Xen-devel] [PATCH] x86emul: handle address wrapping for VMASKMOVP{S, D}

2017-10-10 Thread Andrew Cooper
On 10/10/17 11:43, Jan Beulich wrote: > I failed to recognize the need to mirror the changes done by 7869e2bafe > ("x86emul/fuzz: add rudimentary limit checking") into the earlier > written but later committed 2fe43d333f ("x86emul: support remaining AVX > insns"): Behavior here is the same as for m

[Xen-devel] [PATCH v3 07/12] fuzz/x86_emulate: Move all state into fuzz_state

2017-10-10 Thread George Dunlap
This is in preparation for adding the option for a more "compact" interpretation of the fuzzing data, in which we only change select bits of the state. Signed-off-by: George Dunlap Acked-by: Jan Beulich --- v3: - Move DATA_OFFSET inside the structure - Remove a stray blank line v2: Port over p

[Xen-devel] [PATCH v3 10/12] fuzz/x86_emulate: Add --rerun option to try to track down instability

2017-10-10 Thread George Dunlap
Current stability numbers are not 100%. In order to help track this down, add a --rerun option which will run the same input twice, resetting the state between each run, and comparing the state afterwards. If the state differs, call abort(). This allows AFL to help the process of tracking down w

[Xen-devel] [PATCH v3 08/12] fuzz/x86_emulate: Move definitions into a header

2017-10-10 Thread George Dunlap
Move fuzz-emul.c function prototypes into a header. Also share the definition of the input size (rather than hard-coding it in fuzz-emul.c). Signed-off-by: George Dunlap --- RFC: Worth trying to BUILD_BUG_ON(INPUT_SIZE < DATA_SIZE_FULL)? v3: - New in this version CC: Ian Jackson CC: Wei Liu

[Xen-devel] [PATCH v3 02/12] fuzz/x86_emulate: Improve failure descriptions in x86_emulate harness

2017-10-10 Thread George Dunlap
- Print the symbolic name rather than the number - Explicitly state when data_read() fails due to EOI Signed-off-by: George Dunlap Reviewed-by: Wei Liu Reviewed-by: Jan Beulich --- Changes in v4: - Make array 'static const char* const' Changes in v2: - Add spaces around '=' CC: Ian Jackson CC

[Xen-devel] [PATCH v3 04/12] fuzz/x86_emulate: Rename the file containing the wrapper code

2017-10-10 Thread George Dunlap
When generating coverage output, by default gcov generates output filenames based only on the coverage file and the "leaf" source file, not the full path. As a result, it uses the same name for x86_emulate.c and x86_emulate/x86_emulate.c, generally overwriting the second (which we actually are abo

[Xen-devel] [PATCH v3 05/12] fuzz/x86_emulate: Add 'afl-cov' target

2017-10-10 Thread George Dunlap
...to generate a "normal" coverage-instrumented binary, suitable for use with gcov or afl-cov. This is slightly annoying because: - Every object file needs to have been instrumented to work effectively - You generally want to have both an afl-instrumented binary and a gcov-instrumented b

[Xen-devel] [PATCH v3 03/12] fuzz/x86_emulate: Implement input_read() and input_avail()

2017-10-10 Thread George Dunlap
Rather than open-coding the "read" from the input file. Signed-off-by: George Dunlap --- v3: - s/input_available/input_avail/; - Constify argument to input_avail - Fix off-by-one error in input_avail - Return false / true rather than 0 / 1 in input_read v2: - Use less dread-ful names - Return

[Xen-devel] [PATCH v3 09/12] fuzz/x86_emulate: Make input more compact

2017-10-10 Thread George Dunlap
At the moment, AFL reckons that for any given input, 87% of it is completely irrelevant: that is, it can change it as much as it wants but have no impact on the result of the test; and yet it can't remove it. This is largely because we interpret the blob handed to us as a large struct, including C

[Xen-devel] [PATCH v3 06/12] fuzz/x86_emulate: Take multiple test files for inputs

2017-10-10 Thread George Dunlap
Finding aggregate coverage for a set of test files means running each afl-generated test case through the harness. At the moment, this is done by re-executing afl-harness-cov with each input file. When a large number of test cases have been generated, this can take a significant amonut of time; a

[Xen-devel] [PATCH v3 01/12] fuzz/x86_emulate: Clear errors after each iteration

2017-10-10 Thread George Dunlap
Once feof() returns true for a stream, it will continue to return true for that stream until clearerr() is called (or the stream is closed and re-opened). In llvm-clang-fast-mode, the same file descriptor is used for each iteration of the loop, meaning that the "Input too large" check was broken -

[Xen-devel] [PATCH v3 11/12] fuzz/x86_emulate: Set and fuzz more CPU state

2017-10-10 Thread George Dunlap
x86_emulate() operates not only on state passed to it in cpu_user_regs, but also on state currently found on the cpu: namely, the FPU and XMM registers. At the moment, we re-zero (and/or re-initialize) cpu_user_regs on every invocation, but leave the cpu-stored state alone. In "persistent mode",

[Xen-devel] [PATCH v3 12/12] fuzz/x86_emulate: Add an option to limit the number of instructions executed

2017-10-10 Thread George Dunlap
AFL considers a testcase to be a useful addition not only if there are tuples exercised by that testcase which were not exercised otherwise, but also if the *number* of times an individual tuple is exercised changes significantly; in particular, if the number of the highest non-zero bit changes (i.

Re: [Xen-devel] [PATCH v2 12/13] fuzz/x86_emulate: Set and fuzz more CPU state

2017-10-10 Thread George Dunlap
On 10/06/2017 12:56 PM, Jan Beulich wrote: On 25.09.17 at 16:26, wrote: >> @@ -597,6 +599,47 @@ static const struct x86_emulate_ops all_fuzzer_ops = { >> }; >> #undef SET >> >> +static void _set_fpu_state(char *fxsave, bool store) >> +{ >> +if ( cpu_has_fxsr ) >> +{ >> +st

Re: [Xen-devel] [PATCH v4 00/10] xen/arm: Memory subsystem clean-up

2017-10-10 Thread Stefano Stabellini
On Mon, 9 Oct 2017, Julien Grall wrote: > Hi all, > > This patch series contains clean-up for the ARM memory subsystem in > preparation > of reworking the page tables handling. > > For all changes, see in each patch. The series is committed, thanks! > Cheers, > > Julien Grall (10): > xen/a

Re: [Xen-devel] [PATCH v2 0/*] xen: xen-domid-restrict improvements

2017-10-10 Thread Ross Lagerwall
On 10/06/2017 02:19 PM, Paul Durrant wrote: -Original Message- From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Ross Lagerwall Sent: 06 October 2017 13:58 To: Ian Jackson ; qemu-de...@nongnu.org Cc: Anthony Perard ; xen- de...@lists.xenproject.org; Stefano Stabellini

Re: [Xen-devel] [PATCH v4 06/10] xen/arm: mm: Use PAGE_HYPERVISOR_* instead of MT_* when calling set_fixmap

2017-10-10 Thread Stefano Stabellini
On Mon, 9 Oct 2017, Julien Grall wrote: > At the moment, PAGE_HYPERVISOR_* and MT_* have exactly the same value. > In a follow-up patch the former will be extended to carry more > information. > > It looks like the caller of set_fixmap are mixing the both. Stay > consistent and only use PAGE_HYPER

Re: [Xen-devel] [PATCH v4 09/10] xen/arm: mm: Handle permission flags when adding a new mapping

2017-10-10 Thread Stefano Stabellini
On Mon, 9 Oct 2017, Julien Grall wrote: > Currently, all the new mappings will be read-write non-executable. Allow the > caller to use other permissions. > > Signed-off-by: Julien Grall Reviewed-by: Stefano Stabellini > --- > Changes in v2: > - Switch the runtime check to a BUG_ON(

Re: [Xen-devel] [PATCH v4 08/10] xen/arm: mm: Embed permission in the flags

2017-10-10 Thread Stefano Stabellini
On Mon, 9 Oct 2017, Julien Grall wrote: > Currently, it is not possible to specify the permission of a new > mapping. It would be necessary to use the function modify_xen_mappings > with a different set of flags. > > Introduce a couple of new flags for the permissions (Non-eXecutable, > Read-Only)

Re: [Xen-devel] [PATCH v4 01/10] xen/arm: page: Use ARMv8 naming to improve readability

2017-10-10 Thread Stefano Stabellini
On Mon, 9 Oct 2017, Julien Grall wrote: > This is based on the Linux ARMv8 naming scheme (see arch/arm64/mm/proc.S). > Each > type will contain "NORMAL" or "DEVICE" to make clear whether each attribute > targets device or normal memory. > > Signed-off-by: Julien Grall Reviewed-by: Stefano Stabe

Re: [Xen-devel] [PATCH v2 01/17] x86emul: support remaining AVX insns

2017-10-10 Thread George Dunlap
On 10/09/2017 05:12 PM, Jan Beulich wrote: On 09.10.17 at 17:36, wrote: >> On 09/14/2017 04:12 PM, Jan Beulich wrote: >>> @@ -7119,6 +7142,18 @@ x86_emulate( >>> fic.insn_bytes = PFX_BYTES + 3; >>> break; >>> >>> +case X86EMUL_OPC_VEX_66(0x0f38, 0x19): /* vbroadcastsd

[Xen-devel] [xen-unstable-smoke test] 114289: tolerable all pass - PUSHED

2017-10-10 Thread osstest service owner
flight 114289 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114289/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [Xen-devel] [PATCH v9] x86/hvm: Implement hvmemul_write() using real mappings

2017-10-10 Thread Andrew Cooper
On 10/10/17 13:01, Alexandru Stefan ISAILA wrote: >> I'd be fine taking care of all the comments while committing (and >> then adding my R-b), provided you (and ideally also Andrew) >> agree, and of course assuming Paul would ack the patch, plus >> no-one else finds yet another problem which once a

Re: [Xen-devel] [PATCH v6 5/5] ARM: ITS: Expose ITS in the MADT table

2017-10-10 Thread Julien Grall
Hi, On 10/10/2017 21:07, Stefano Stabellini wrote: CC'ing Jan and Andrew, just in case they disagree on this. On Tue, 10 Oct 2017, Julien Grall wrote: +unsigned long gicv3_its_make_hwdom_madt(const struct domain *d, void *base_ptr) +{ +unsigned int i; +void *fw_its; +struct acpi_ma

  1   2   >