[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 00/21] x86: Trenchboot Secure Launch DRTM (Xen)


  • To: Sergii Dmytruk <sergii.dmytruk@xxxxxxxxx>
  • From: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
  • Date: Wed, 23 Apr 2025 22:11:35 +0200
  • Arc-authentication-results: i=1; bugseng.com; arc=none smtp.remote-ip=162.55.131.47
  • Arc-message-signature: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; c=relaxed/relaxed; t=1745439095; h=DKIM-Signature:MIME-Version:Date:From:To:Cc:Subject:In-Reply-To: References:Message-ID:X-Sender:Organization:Content-Type; bh=L9loRrq+/zmr5Tj4QYi5BXTX7lSXQSpxFITlsDioho8=; b=wShnSxSwa834xUrUsgmPRZpXM4ebU5zUbSCHF2MPF4zFWcfCRS/lJohC7IcWNQ/zAiJb v+9Z9x50zHX/RsmgnR6mLl0NLWZid6QANsaE+YBv7Vr3uchKl72ErncYDWnx8QGR1enl3 GPKLmW1M7yL1DWFI8PIDxb/ZwUp6POPkLQAPeREnPqQUJDCubGWElKUgh/EMlOQPM4nd3 +Xz0ihuDYMaWVjZeHgk0f6eLHaMFHiq3lc5D9t6+uI4oke0QpTQ6XPk5/maVYt0y9/UOt ISD9rEQhZh/nWJHNDWveuUDFuHLNUmWpNBas7uVo80YGjHv4U3bmokE+aSUI7lIeI4DIH xxmnupPwBfQ1V/igqvyI6zXzg3rRABtiHs7PNDb8nv+bSXRmDTUG0IwHF914bKrBNg5ar peYEvfqfCIo8JslHQae+vvIRpLIqmTuyeQxrymHcYCKCTkKQUiO+XUB1UH2R1Hd8V6a/U fzr8I+dpW4vP+DR9sCmSYyxhQL8dkfejbGwQYEKwieAeg5o1Alj9cUEqhXZb4hJxPy+Cs x3v9Xpe/zcNKtYJ3rk7vSqUNLVgvkszkVSJgzTgNR2v4bSDDi2oHzxfa7lbJ2ECtf6Ki1 KuecVJFxmIelJ7w823aaS3qpk9mIMO/j/WIaG8EKLGsGHvuCKIT8DO4MJUKl3O8=
  • Arc-seal: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; cv=none; t=1745439095; b=BHEVujIgnLSsONqx+f7G0CaT3ULQi/MeG8SRzwFEu8V9vRY9ud8zSfheh7GuoIwcfQNx 2GUk/AdZXzSq4AbwghjQ210GM72lV+Q8QcIx1mlLkUL+h4JhHcxZ2qPVn9f2m8sbVjaKI od4fdsRiWlXqdUfJTCgeKi0xoe+IxVDDt+AG1gy5bvIuR/s4BMSlQSNRKbf0XSxKtALAS VdaGEXoWNMC8iXX1ywVW4pHMGSFnWDmTkCIMoJNOKTzYl9rbbOYPl6ixrYzCy7C24lVo5 /FNowplpKV8ZcOZCPrDtsQgzPTX5Lt7Ty88rYgXjDfXbqxiUXGysWEt9nOWezli9DcikY UYfTjn81LUCvZB2gC3rBZrF/t9lwj95h5czeju+1WOygAIkof2xG3M4kYxYL164I0PAhV 9aLivgRMtR9RlrAcIgD65YKeJStvqmlRZzreCfoWmBmdxteYzSTuxp4wlUsGggb+HKmpm ymJp4sAtFAt1fkr2w8rDz3BbWE8FYwS/u3nI07igfIoRPDfXf1wtT1qKESnDEEmqvJLAM UUMTGB1rYRmVYSSSl4tx6ZpWLSrlqYti89vbLTp4SU4QjDbY62+QIPuNNc+2rzYzpUl5b TnEZw33VN2zrS8PY7AgyFQ+3/fFjCxWMucO9xOiZ9guHt2bJ1TfqLvU98c7TyW8=
  • Authentication-results: bugseng.com; arc=none smtp.remote-ip=162.55.131.47
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Lukasz Hawrylko <lukasz@xxxxxxxxxxx>, "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>, Mateusz Mówka <mateusz.mowka@xxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, trenchboot-devel@xxxxxxxxxxxxxxxx
  • Delivery-date: Wed, 23 Apr 2025 20:11:46 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 2025-04-23 20:45, Sergii Dmytruk wrote:
On Wed, Apr 23, 2025 at 02:38:37PM +0100, Andrew Cooper wrote:
On 22/04/2025 6:14 pm, Andrew Cooper wrote:
> I've stripped out the sha2 patch and fixed up to use the existing sha2,
> then kicked off some CI testing:
>
> https://gitlab.com/xen-project/hardware/xen-staging/-/pipelines/1780285393
> https://cirrus-ci.com/build/5452335868018688
>
> When the dust has settled, I'll talk you through the failures.

And here we go.  Interestingly, the FreeBSD testing was entirely happy,
and that is the rare way around.

For Gitlab, there are several areas.

First, for MISRA.  In the job logs, you want the "Browse current
reports:" link which will give you full details, but it's all pretty
simple stuff.

Thanks, but that link gives me a list of 5096 failures all over the code
base.  Is there any way to see a diff against master?


Hi,

yes, you can define selections of violations introduced on previously clean guidelines by clicking on the "ECLAIR" button on the upper right. See [1] which is the result of defining the "clean_added" selection shown in the attached screenshot. If you have other questions please let me know.

Thanks,
 Nicola

[1] https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ecdf/xen-project/hardware/xen-staging/ECLAIR_normal/andrew/tb-v1.1/ARM64/9791028027/PROJECT.ecd;/by_service.html#service&kind{"select":true,"selection":{"hiddenAreaKinds":[],"hiddenSubareaKinds":[],"show":true,"selector":{"enabled":true,"negated":false,"kind":1,"children":[{"enabled":true,"negated":false,"kind":0,"domain":"clean","inputs":[{"enabled":true,"text":"added"}]}]}}}

kbl-suspend-x86-64-gcc-debug is a real S3 test on KabyLake hardware,
which appears to have gone to sleep and never woken up.  (More likely,
crashed on wakeup before we got the console up).  The AlderLake
equivalent test seems to be happy, as well as the AMD ones.

Hm, not sure what that could be, but will try to reproduce/guess.

For the build issues, there are quite a few.

debian-12-x86_64-gcc-ibt is special, using an out-of-tree patch for
CET-IBT safety.  tl;dr function pointer callees need a cf_check
annotation.  But, all the failures here are from sha1, and from bits
which I don't think want to survive into the final form.

That stuff is gone and the build should succeed the next time.

Other common failures seem to be:

    # take image offset into account
    arch/x86/efi/fixmlehdr xen.efi 0x200000
    Failed to find MLE header in xen.efi
    arch/x86/Makefile:220: recipe for target 'xen.efi' failed
    make[3]: *** [xen.efi] Error 1

~Andrew

That seems to be the only reason behind the rest of build failures.
I was able to reproduce the failure in Fedora 37 docker.  Searching for
the header in 8KiB instead of 4KiB fixes it.  Looks like large default
alignment of some toolchains pushes `head.S` to 4 KiB offset.

--
Nicola Vetrini, B.Sc.
Software Engineer
BUGSENG (https://bugseng.com)
LinkedIn: https://www.linkedin.com/in/nicola-vetrini-a42471253

Attachment: Screenshot from 2025-04-23 22-09-16.png
Description: PNG image


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.