[Xen-devel] [PATCH 0/4] multiboot2 protocol support

2017-01-13 Thread Doug Goldstein
This is a series based on v11 of Daniel Kiper's "x86: multiboot2 protocol support" series. It aims to collect up all the fixes and changes that Andrew Cooper, Jan Beulich and myself discovered in code review and testing on actual hardware. I've had problems with the relocation portion of the series

[Xen-devel] [PATCH 1/4] x86: add multiboot2 protocol support

2017-01-13 Thread Doug Goldstein
: Doug Goldstein --- v9 - suggestions/fixes: - use .L label instead of numeric one in multiboot2 data scanning loop; I hope that this change does not invalidate Jan's Reviewed-by (suggested by Jan Beulich). v8 - suggestions/fixes: - use sizeof(/) instead of sizeof() if

[Xen-devel] [PATCH 2/4] efi: build xen.gz with EFI code

2017-01-13 Thread Doug Goldstein
opy or other tool. This way we will have one Xen binary which can be loaded by three boot protocols: EFI native loader, multiboot (v1) and multiboot2. Signed-off-by: Daniel Kiper Acked-by: Jan Beulich Reviewed-by: Doug Goldstein --- v6 - suggestions/fixes: - improve efi_enable

[Xen-devel] [PATCH 4/4] x86: add multiboot2 protocol support for EFI platforms

2017-01-13 Thread Doug Goldstein
From: Daniel Kiper This way Xen can be loaded on EFI platforms using GRUB2 and other boot loaders which support multiboot2 protocol. Signed-off-by: Daniel Kiper Signed-off-by: Doug Goldstein Reviewed-by: Doug Goldstein --- Doug v1 - fix incorrect assembly (identified by Andrew Cooper

Re: [Xen-devel] [PATCH v11 00/13] x86: multiboot2 protocol support

2017-01-13 Thread Doug Goldstein
glues together. Hence my need for this series. It includes all the changes we've discussed in this thread. Hopefully it will help you out to post v12. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-12 Thread Doug Goldstein
On 1/12/17 6:04 PM, Daniel Kiper wrote: > On Thu, Jan 12, 2017 at 04:23:59PM -0600, Doug Goldstein wrote: >> On 1/12/17 2:28 PM, Daniel Kiper wrote: >>> On Thu, Jan 12, 2017 at 09:52:15AM -0600, Doug Goldstein wrote: >>>> On 1/12/17 6:50 AM, Daniel Kiper wrote: >&

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-12 Thread Doug Goldstein
On 1/12/17 6:04 PM, Daniel Kiper wrote: > On Thu, Jan 12, 2017 at 04:23:59PM -0600, Doug Goldstein wrote: >> On 1/12/17 2:28 PM, Daniel Kiper wrote: >>> On Thu, Jan 12, 2017 at 09:52:15AM -0600, Doug Goldstein wrote: >>>> On 1/12/17 6:50 AM, Daniel Kiper wrote: >&

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-12 Thread Doug Goldstein
On 1/12/17 2:28 PM, Daniel Kiper wrote: > On Thu, Jan 12, 2017 at 09:52:15AM -0600, Doug Goldstein wrote: >> On 1/12/17 6:50 AM, Daniel Kiper wrote: >>> On Wed, Jan 11, 2017 at 02:20:15PM -0600, Doug Goldstein wrote: >>>> On 1/11/17 1:47 PM, Daniel Kiper wrote: >&

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-12 Thread Doug Goldstein
On 1/12/17 3:45 PM, Daniel Kiper wrote: > On Thu, Jan 12, 2017 at 01:46:41PM -0600, Doug Goldstein wrote: >> On 1/12/17 1:30 PM, Daniel Kiper wrote: >>> On Thu, Jan 12, 2017 at 09:44:59AM -0600, Doug Goldstein wrote: >> >>> >>>> view there's

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-12 Thread Doug Goldstein
On 1/12/17 1:30 PM, Daniel Kiper wrote: > On Thu, Jan 12, 2017 at 09:44:59AM -0600, Doug Goldstein wrote: > >> view there's no reason for adding MB2 support for BIOS since it provides >> no advantage over MB1 when booting from the BIOS. Now MB2 solves a > > From you

Re: [Xen-devel] [PATCH v11 00/13] x86: multiboot2 protocol support

2017-01-12 Thread Doug Goldstein
2 module. There's no entry point advertised in the xen.efi case. I think we'd probably just leave off the MB2 header for xen.efi and leave that as a plain EFI loader case. -- Doug Goldstein signature.asc Description: OpenPGP digital signature __

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-12 Thread Doug Goldstein
On 1/12/17 6:50 AM, Daniel Kiper wrote: > On Wed, Jan 11, 2017 at 02:20:15PM -0600, Doug Goldstein wrote: >> On 1/11/17 1:47 PM, Daniel Kiper wrote: >>> On Tue, Jan 10, 2017 at 02:51:27PM -0600, Doug Goldstein wrote: >>>> On 1/9/17 7:37 PM, Doug Goldstein wrote: &g

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-12 Thread Doug Goldstein
to memory and set a few pointers in tags. With BIOS it requires me to build up the memory map into a MB2 structure. As far as it goes I've got iPXE booting MB2 EFI payloads just fine. The issues I've explained here happen when I use Grub or iPXE to boot Xen so its not implementation specific to my iPXE code. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-11 Thread Doug Goldstein
On 1/11/17 1:08 PM, Daniel Kiper wrote: > On Mon, Jan 09, 2017 at 07:37:59PM -0600, Doug Goldstein wrote: >> On 12/5/16 4:25 PM, Daniel Kiper wrote: > > >>> diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c >>> index 0a93e61..70ed836 100644 >>>

Re: [Xen-devel] [PATCH v11 11/13] x86: make Xen early boot code relocatable

2017-01-11 Thread Doug Goldstein
On 1/11/17 2:05 PM, Daniel Kiper wrote: > On Mon, Jan 09, 2017 at 08:05:01PM -0600, Doug Goldstein wrote: >> On 12/5/16 4:25 PM, Daniel Kiper wrote: > > [...] > >>> /* Save trampoline address for later use. */ >>> shl $4, %ec

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-11 Thread Doug Goldstein
On 1/11/17 1:47 PM, Daniel Kiper wrote: > On Tue, Jan 10, 2017 at 02:51:27PM -0600, Doug Goldstein wrote: >> On 1/9/17 7:37 PM, Doug Goldstein wrote: >>> On 12/5/16 4:25 PM, Daniel Kiper wrote: >> >>>> diff --git a/xen/arch/x86/efi/efi-boot.h b/xen/arch/x

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-11 Thread Doug Goldstein
On 1/11/17 1:08 PM, Daniel Kiper wrote: > On Mon, Jan 09, 2017 at 07:37:59PM -0600, Doug Goldstein wrote: >> On 12/5/16 4:25 PM, Daniel Kiper wrote: > > [...] > >>> diff --git a/xen/arch/x86/efi/efi-boot.h b/xen/arch/x86/efi/efi-boot.h >>> index 62c010e..dc857

[Xen-devel] [PATCH 2/??] memory allocation fix

2017-01-10 Thread Doug Goldstein
Signed-off-by: Doug Goldstein --- Daniel, Feel free to fold this in where it needs to go or break this up into a patch (or patches) part of your series. This is what it took for me to get it to boot on one of my Intel NUCs and to get into the dom0 kernel booting on my other machines. There&#

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-10 Thread Doug Goldstein
On 1/9/17 7:37 PM, Doug Goldstein wrote: > On 12/5/16 4:25 PM, Daniel Kiper wrote: >> diff --git a/xen/arch/x86/efi/efi-boot.h b/xen/arch/x86/efi/efi-boot.h >> index 62c010e..dc857d8 100644 >> --- a/xen/arch/x86/efi/efi-boot.h >> +++ b/xen/arch/x86/efi/efi-boot.h &g

Re: [Xen-devel] [PATCH v11 01/13] x86: add multiboot2 protocol support

2017-01-10 Thread Doug Goldstein
do line up for me. > > Also - please trim your quotes in replies. > > Jan > Well given that this is a new file and CODING_STYLE says spaces over tabs and to treat indent level as 4 spaces. That was what my assumption was. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v11 11/13] x86: make Xen early boot code relocatable

2017-01-09 Thread Doug Goldstein
-1006,7 +1005,8 @@ void __init noreturn __start_xen(unsigned long mbi_p) > { > unsigned int flags; > > -if ( !(l2e_get_flags(*pl2e) & _PAGE_PRESENT) ) > +if ( !(l2e_get_flags(*pl2e) & _PAGE_PRESENT) || > + (l2e_get_pfn(*pl2e) > PFN_DOWN(xen_phys_start)) ) > continue; > > if ( !using_2M_mapping() ) > @@ -1060,6 +1060,8 @@ void __init noreturn __start_xen(unsigned long mbi_p) > : "memory" ); > > bootstrap_map(NULL); > + > +printk("New Xen image base address: %#lx\n", xen_phys_start); > } > > /* Is the region suitable for relocating the multiboot modules? */ > diff --git a/xen/arch/x86/x86_64/asm-offsets.c > b/xen/arch/x86/x86_64/asm-offsets.c > index 2a22659..5d7a8e5 100644 > --- a/xen/arch/x86/x86_64/asm-offsets.c > +++ b/xen/arch/x86/x86_64/asm-offsets.c > @@ -179,5 +179,8 @@ void __dummy__(void) > OFFSET(MB2_efi64_ih, multiboot2_tag_efi64_ih_t, pointer); > BLANK(); > > +DEFINE(l2_identmap_sizeof, sizeof(l2_identmap)); > +BLANK(); > + > OFFSET(DOMAIN_vm_assist, struct domain, vm_assist); > } > diff --git a/xen/include/asm-x86/page.h b/xen/include/asm-x86/page.h > index af7d3e8..a54fdd1 100644 > --- a/xen/include/asm-x86/page.h > +++ b/xen/include/asm-x86/page.h > @@ -288,7 +288,7 @@ extern root_pgentry_t > idle_pg_table[ROOT_PAGETABLE_ENTRIES]; > extern l2_pgentry_t *compat_idle_pg_table_l2; > extern unsigned int m2p_compat_vstart; > extern l2_pgentry_t l2_xenmap[L2_PAGETABLE_ENTRIES], > -l2_bootmap[L2_PAGETABLE_ENTRIES]; > +l2_bootmap[4*L2_PAGETABLE_ENTRIES]; > extern l3_pgentry_t l3_bootmap[L3_PAGETABLE_ENTRIES]; > extern l2_pgentry_t l2_identmap[4*L2_PAGETABLE_ENTRIES]; > extern l1_pgentry_t l1_fixmap[L1_PAGETABLE_ENTRIES]; > -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-09 Thread Doug Goldstein
100644 > --- a/xen/arch/x86/x86_64/asm-offsets.c > +++ b/xen/arch/x86/x86_64/asm-offsets.c > @@ -175,6 +175,8 @@ void __dummy__(void) > OFFSET(MB2_tag_type, multiboot2_tag_t, type); > OFFSET(MB2_tag_size, multiboot2_tag_t, size); > OFFSET(MB2_mem_lower, multiboot2_tag_

Re: [Xen-devel] [PATCH v11 03/13] x86: allow EFI reboot method neither on EFI platforms...

2017-01-09 Thread Doug Goldstein
atives? "disallow EFI reboot method on EFI platforms without runtime services" -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v11 01/13] x86: add multiboot2 protocol support

2017-01-09 Thread Doug Goldstein
11 > +#define MULTIBOOT2_TAG_TYPE_EFI6412 > +#define MULTIBOOT2_TAG_TYPE_SMBIOS 13 > +#define MULTIBOOT2_TAG_TYPE_ACPI_OLD 14 > +#define MULTIBOOT2_TAG_TYPE_ACPI_NEW 15 > +#define MULTIBOOT2_TAG_

Re: [Xen-devel] [PATCH v2] get_maintainer.pl: Teach brace expansion

2017-01-09 Thread Doug Goldstein
xt > > The patch also get rid of the warnings, with recent perl: > Unescaped left brace in regex is deprecated, passed through in regex; marked > by <-- HERE in m/^docs/misc/kconfig{ <-- HERE ,-language}\.txt/ at > ./scripts/get_maintainer.pl line 731. > > Signed-off-by

Re: [Xen-devel] [PATCH] x86/mtrr: use stdbool instead of int + define

2017-01-05 Thread Doug Goldstein
en nice to get the stray blanks here and elsewhere > dropped, as the lines are being touched anyway. > > Jan > I can do that. I went minimal instead of cleanup. -- Doug Goldstein signature.asc Description: OpenPGP digital signature __

[Xen-devel] [PATCH] x86/mtrr: use stdbool instead of int + define

2017-01-05 Thread Doug Goldstein
Instead of using an int and providing a define for TRUE and FALSE, change the code to use stdbool that Xen provides. Signed-off-by: Doug Goldstein --- xen/arch/x86/cpu/mtrr/generic.c | 21 +++-- xen/arch/x86/cpu/mtrr/mtrr.h| 5 - 2 files changed, 11 insertions(+), 15

Re: [Xen-devel] [BUG] Xen-4.8.0 efi/buildid.o: file not recognized/Ambiguous

2017-01-05 Thread Doug Goldstein
x27;re saying they need to make changes to binutils. At this point I'm not able to compile Xen myself without local hackery. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 1/5] Remove hardcoded strict -Werror checking

2016-12-27 Thread Doug Goldstein
> Jan > That was for the hypervisor bits. Anything that relies on user space code and headers that will be provided by the distro should be able to build with -Werror. That's something all distros have to patch out and is downstream hostile to do since a different toolchain than what

Re: [Xen-devel] [xl restore and migrating problem - hardware compatibility]

2016-12-26 Thread Doug Goldstein
tches here: >>>>> https://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h >>>>> =r >>>>> efs/heads/tools-fix-zero-length-records >>>> FWIW, this is fixed in Gentoo now with xen-4.8.0-r1 or xen-4.7.1-r5 and newer. https://github.

Re: [Xen-devel] [PATCH v2 1/5] Remove hardcoded strict -Werror checking

2016-12-22 Thread Doug Goldstein
$(MAKE) -f $(BASEDIR)/tools/kconfig/Makefile.kconfig > ARCH=$(ARCH) SRCARCH=$(SRCARCH) HOSTCC="$(HOSTCC)" HOSTCXX="$(HOSTCXX)" > HOST_EXTRACFLAGS="$(APPEND_CFLAGS)" silentoldconfig > > # Allow people to just run `make` as before and not force them to > confi

Re: [Xen-devel] [PATCH v2 5/5] tools/blktap2/drivers: Remove non-existent sys/sysctl.h include

2016-12-22 Thread Doug Goldstein
include > -#include > #include > #include > > A bit late to the party but I also confirmed the header was unused. Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH] xsm: allow relevant permission during migrate and gpu-passthrough.

2016-12-22 Thread Doug Goldstein
On 12/20/16 3:37 AM, Anshul Makkar wrote: > On 20/12/2016 04:03, Doug Goldstein wrote: >> On 12/19/16 10:02 AM, Doug Goldstein wrote: >>> On 12/14/16 3:09 PM, Daniel De Graaf wrote: >>>> On 12/12/2016 09:00 AM, Anshul Makkar wrote: >>>>> Dur

Re: [Xen-devel] [PATCH v2 1/5] Remove hardcoded strict -Werror checking

2016-12-20 Thread Doug Goldstein
On 12/20/16 2:16 PM, Andrew Cooper wrote: > On 20/12/2016 20:06, Doug Goldstein wrote: >> On 12/20/16 1:46 PM, Alistair Francis wrote: >>> Signed-off-by: Alistair Francis >>> --- >>> Config.mk | 2 +- >>> tools/blktap2/dri

Re: [Xen-devel] [PATCH v2 1/5] Remove hardcoded strict -Werror checking

2016-12-20 Thread Doug Goldstein
AGS += $(CFLAGS_libxenevtchn) > CFLAGS += $(CFLAGS_libxenctrl) > LDLIBS += $(LDLIBS_libxenevtchn) > Can you pass -Wno-error in EXTRA_CFLAGS from 2/5? Wish I could take credit for the idea but it was all Andrew Cooper's. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 4/5] tools/blktap2: Fix missing header file

2016-12-20 Thread Doug Goldstein
E, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > */ > > +#include > + > /* > * Ensure all of data on socket comes through. f==read || f==vwrite > */ > Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digital signature _

Re: [Xen-devel] [PATCH v2 3/5] tools/blktap2/vhd: Remove unused struct stat stats

2016-12-20 Thread Doug Goldstein
@@ vhd_journal_create(vhd_journal_t *j, const char *file, > const char *jfile) > int i, err; > size_t size; > off_t off; > - struct stat stats; > > memset(j, 0, sizeof(vhd_journal_t)); > j->jfd = -1; > Reviewed-by: Doug

Re: [Xen-devel] [PATCH v2 2/5] config/StdGNU.mk: Allows users to pass in EXTRA_CFLAGS

2016-12-20 Thread Doug Goldstein
config/StdGNU.mk > @@ -35,6 +35,9 @@ UTIL_LIBS = -lutil > SONAME_LDFLAG = -soname > SHLIB_LDFLAGS = -shared > > +# Allow users to add extra CFLAGS > +CFLAGS += $(EXTRA_CFLAGS) > + > ifeq ($(lto),y) > CFLAGS += -flto > LDFLAGS-$(clang) += -plugin LLVMgol

Re: [Xen-devel] [PATCH 1/7] Remove hardcoded strict -Werror checking

2016-12-20 Thread Doug Goldstein
On 12/20/16 10:05 AM, Konrad Rzeszutek Wilk wrote: > On Mon, Dec 19, 2016 at 09:53:02PM -0600, Doug Goldstein wrote: >> On 12/17/16 9:51 AM, Konrad Rzeszutek Wilk wrote: >>> On Fri, Dec 16, 2016 at 02:56:01PM -0800, Alistair Francis wrote: >>>> Signed-off-by: Ali

Re: [Xen-devel] [PATCH] xsm: allow relevant permission during migrate and gpu-passthrough.

2016-12-19 Thread Doug Goldstein
On 12/19/16 10:02 AM, Doug Goldstein wrote: > On 12/14/16 3:09 PM, Daniel De Graaf wrote: >> On 12/12/2016 09:00 AM, Anshul Makkar wrote: >>> During guest migrate allow permission to prevent >>> spurious page faults. >>> Prevents these errors: >>> d73:

Re: [Xen-devel] [PATCH 5/7] tools/blktap2: Update sys/signal.h to signal.h

2016-12-19 Thread Doug Goldstein
recting incorrect #include to >>> [-Werror=cpp] >> >> And what is the 'newer build system' you speak off? > > Sorry I should have specified more there. > > It's GCC 5 that I am seeing the problem on. Same as the last patch. This i

Re: [Xen-devel] [PATCH 4/7] tools: Update sys/poll.h to poll.h

2016-12-19 Thread Doug Goldstein
GCC 5? 6? > > In this case it is GCC 5. > No. Its a libc thing. I wonder what libc you're using because glibc 2.24 still has it at sys/pool.h for me. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-d

Re: [Xen-devel] [PATCH 1/7] Remove hardcoded strict -Werror checking

2016-12-19 Thread Doug Goldstein
eir projects. However I know there's upstream interest to keep it. The compromise would probably be to get my rear in gear and get a wider range of distros testing with Travis CI / GitLab CI. -- Doug Goldstein signature.asc Description: OpenPGP digital signature _

Re: [Xen-devel] [PATCH] xsm: allow relevant permission during migrate and gpu-passthrough.

2016-12-19 Thread Doug Goldstein
:dom0_t >> tcontext=system_u:system_r:domU_t tclass=hvm >> >> Signed-off-by: Anshul Makkar > > Acked-by: Daniel De Graaf > Daniel, Should this be backported to 4.8? -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] tool stack tool chain dependencies (again)

2016-12-16 Thread Doug Goldstein
nstall the proper dependencies from their distro. The reason you're having an issue with iPXE is that it was bumped to a newer version to support GCC 6 and part of the modernizing work of iPXE was to remove old hacks for toolchains they no longer supported. I don't know of a single dist

Re: [Xen-devel] [PATCH v11 00/13] x86: multiboot2 protocol support

2016-12-16 Thread Doug Goldstein
9 material. > > If you are not interested in this patch series at all please > drop me a line and I will remove you from distribution list. > Feel free to add: Reviewed-by: Doug Goldstein I'm running this series (plus Andrew's fix in patch 7) in my 4.8 based versio

Re: [Xen-devel] [PATCH RFC] tools/xenlight: Create xenlight Makefile

2016-12-15 Thread Doug Goldstein
ally get around to making Rust bindings for Xen, I have no plan to include them in the tree but instead publish them at crates.io so that they work like every other Rust package. -- Doug Goldstein signature.asc Description: OpenPGP digital signature _

Re: [Xen-devel] [PATCH 2/2] Travis-ci: specify KCONFIG_ALLCONFIG for randconfig

2016-12-05 Thread Doug Goldstein
On 12/5/16 10:45 AM, Wei Liu wrote: > The file provided contains symbols that must be set to certain values. > This then prevents random build breakage in travis due to > known-incompatible symbol selections. > > Signed-off-by: Wei Liu > --- > Cc: Doug Goldstein > ---

Re: [Xen-devel] [PATCH 1/2] Kconfig: introduce allrandom.config

2016-12-05 Thread Doug Goldstein
t; new file mode 100644 > index 000..e49e7d6 > --- /dev/null > +++ b/xen/tools/kconfig/allrandom.config > @@ -0,0 +1 @@ > +CONFIG_GCOV_FORMAT_AUTODETECT=y > Thank you for doing this Wei. I do agree with Andrew about the explicit comment. Reviewed-by: Doug Goldstein -- Doug

Re: [Xen-devel] [Outreachy]Code Standards Checking using clang-format

2016-09-27 Thread Doug Goldstein
get started with contributing but I've CC'd Wei and I'm hoping he's got some ideas. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH] x86: add a user configurable Kconfig option for the VGA

2016-09-13 Thread Doug Goldstein
gt; break; > } > +#endif Not sure if the else case should be something like: printk("Video information: None\n"); I'll leave it up to others to concur or disagree but if people disagree then: Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH] fix EFI part of "symbols: Generate an xen-sym.map"

2016-09-09 Thread Doug Goldstein
ased projects when I'm on travel and only have my Mac with me. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [MINIOS PATCH] Add travis.yml and travis-build script

2016-09-06 Thread Doug Goldstein
On 9/5/16 9:43 AM, Wei Liu wrote: > Signed-off-by: Wei Liu > --- > See: > https://travis-ci.org/liuw/mini-os/builds/157653746 > > Cc: Samuel Thibault > Cc: Juergen Gross > Cc: Doug Goldstein > > IRC notification is not yet set up. > > Doug, can we mirror

Re: [Xen-devel] Test Meetup at Developer Summit

2016-09-06 Thread Doug Goldstein
On 9/5/16 6:19 AM, Lars Kurth wrote: > == Attendees == > Lars Kurth > George Dunlap > Doug Goldstein > Andrew Cooper > Paul Durrant > > There were a few others, which I may have missed I know Jonathan Creekmore was involved as well. > > I tried to transcribe fr

Re: [Xen-devel] [PATCH v5 06/16] x86/boot/reloc: create generic alloc and copy functions

2016-09-06 Thread Doug Goldstein
uot; the project and use that space to push your branches. It's free (as in beer) hosting for any long series and you can enable https://travis-ci.org to do some basic build tests on patch series before you mail them out. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 4/4] xen: add a gcov Kconfig option

2016-08-30 Thread Doug Goldstein
ee below). Thanks for doing this Wei. I agree with Jan's reviews. You can toss my Reviewed-by: Doug Goldstein on there if you'd like as well. -- Doug ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] Regression between Xen 4.6.0 and 4.7.0, Direct kernel boot on a qemu-xen and seabios HVM guest doesn't work anymore.

2016-08-25 Thread Doug Goldstein
ne. Can you include the logs from xl dmesg around that time frame as well? Just wondering how much RAM you're domain is defined with as well? -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v8 05/13] libxl: Load guest BIOS from file

2016-08-23 Thread Doug Goldstein
ially work around the issue. I know you and Anthony have gone through 8 revisions but please consider changing this. I'm sorry for not speaking up sooner. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCHv3 0/2] libfs, xenfs: replace /proc/xen/xenbus with a symlink

2016-08-22 Thread Doug Goldstein
kernel release go out the door where the default behavior with Xen 4.6 and earlier is to deadlock domUs. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 1/2] xen/Kconfig: Drop redundant comments from Kconfig files

2016-08-22 Thread Doug Goldstein
On 8/19/16 11:54 AM, Andrew Cooper wrote: > Most of the comments are duplicated from the help text, and those without help > provide no useful additional input. > > Signed-off-by: Andrew Cooper > --- > CC: Doug Goldstein > CC: Jan Beulich > CC: Stefano Stabellini >

Re: [Xen-devel] [PATCH 2/2] xen/Kconfig: Misc tweaks

2016-08-19 Thread Doug Goldstein
not need to load a policy to get sane behavior from an >> + bootloader does not need to load a policy to get sane behaviour from >> an > > Isn't the original spelling valid in American English? > > Jan > Yes. An American English speaker wrote it originally a

Re: [Xen-devel] [PATCHv2] x86: Add a tboot Kconfig option

2016-08-18 Thread Doug Goldstein
the functionality. Currently, the only user is tboot. > > Signed-off-by: Derek Straka > --- Reviewed-by: Doug Goldstein > > +config CRYPTO > + bool > + default n > + If a v3 happens (or the committer wants to change it) this can be "def_bo

Re: [Xen-devel] [PATCH 2/9] x86/mtrr: drop mtrr_if indirection

2016-08-17 Thread Doug Goldstein
rr_if && mtrr_if->vendor == X86_VENDOR_##vnd) >> -#define use_intel() (mtrr_if && mtrr_if->use_intel_if == 1) >> +#define is_cpu(vnd) (X86_VENDOR_INTEL == X86_VENDOR_##vnd) >> +#define use_intel() (1) > > Is the latter really useful to keep then? Would you like me to squash patch 4 into this or make a note in the commit message that further clean ups are coming? -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 1/9] x86/mtrr: prefix fns with mtrr and drop static

2016-08-17 Thread Doug Goldstein
gt; I've added: Future changes will directly call these functions instead of using the indirect call through the ops structure. Does that work? -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

[Xen-devel] [PATCH 8/9] x86/mtrr: drop unused func prototypes and struct

2016-08-16 Thread Doug Goldstein
These weren't used so drop them. Signed-off-by: Doug Goldstein --- xen/arch/x86/cpu/mtrr/mtrr.h | 15 --- 1 file changed, 15 deletions(-) diff --git a/xen/arch/x86/cpu/mtrr/mtrr.h b/xen/arch/x86/cpu/mtrr/mtrr.h index 9405cbc..1a3b1e5 100644 --- a/xen/arch/x86/cpu/mtrr/mtrr.h

[Xen-devel] [PATCH 5/9] x86/mtrr: drop unused is_cpu() macro

2016-08-16 Thread Doug Goldstein
is_cpu() evaluated to Intel always so just drop it entirely. Signed-off-by: Doug Goldstein --- xen/arch/x86/cpu/mtrr/generic.c | 2 +- xen/arch/x86/cpu/mtrr/mtrr.h| 2 -- 2 files changed, 1 insertion(+), 3 deletions(-) diff --git a/xen/arch/x86/cpu/mtrr/generic.c b/xen/arch/x86/cpu/mtrr

[Xen-devel] [PATCH 6/9] x86/mtrr: drop unused mtrr_ops struct

2016-08-16 Thread Doug Goldstein
There are no users of the mtrr_ops struct or any of the callers on it so drop those. Signed-off-by: Doug Goldstein --- xen/arch/x86/cpu/mtrr/generic.c | 12 xen/arch/x86/cpu/mtrr/mtrr.h| 23 --- 2 files changed, 35 deletions(-) diff --git a/xen/arch/x86/cpu

[Xen-devel] [PATCH 2/9] x86/mtrr: drop mtrr_if indirection

2016-08-16 Thread Doug Goldstein
implementation due to Intel having a value of 0. The use_intel() macro was always true in the generic implementation case as well. Removed some extraneous whitespace at the same time. Signed-off-by: Doug Goldstein --- xen/arch/x86/cpu/mtrr/generic.c | 2 +- xen/arch/x86/cpu/mtrr/main.c | 47

[Xen-devel] [PATCH 4/9] x86/mtrr: drop unnecessary use_intel() macro

2016-08-16 Thread Doug Goldstein
The use_intel() macro always evaluates to true so don't bother using it. Signed-off-by: Doug Goldstein --- xen/arch/x86/cpu/mtrr/main.c | 21 - xen/arch/x86/cpu/mtrr/mtrr.h | 1 - 2 files changed, 4 insertions(+), 18 deletions(-) diff --git a/xen/arch/x86/cpu/mtrr/mai

[Xen-devel] [PATCH 7/9] x86/mtrr: drop unused positive_have_wrcomb()

2016-08-16 Thread Doug Goldstein
Unused function, gone. Signed-off-by: Doug Goldstein --- xen/arch/x86/cpu/mtrr/generic.c | 5 - xen/arch/x86/cpu/mtrr/mtrr.h| 2 -- 2 files changed, 7 deletions(-) diff --git a/xen/arch/x86/cpu/mtrr/generic.c b/xen/arch/x86/cpu/mtrr/generic.c index 1d67035..012aca4 100644 --- a/xen

[Xen-devel] [PATCH 1/9] x86/mtrr: prefix fns with mtrr and drop static

2016-08-16 Thread Doug Goldstein
For the functions that make up the interface to the MTRR code, drop the static keyword and prefix them all with mtrr for improved clarity when they're called outside this file. This also required adjusting or providing function prototypes to make them callable. Signed-off-by: Doug Gold

[Xen-devel] [PATCH 9/9] x86/mtrr: use stdbool instead of int + define

2016-08-16 Thread Doug Goldstein
Instead of using an int and providing a define for TRUE and FALSE, change the code to use stdbool that Xen provides. Signed-off-by: Doug Goldstein --- xen/arch/x86/cpu/mtrr/generic.c | 21 +++-- xen/arch/x86/cpu/mtrr/mtrr.h| 5 - 2 files changed, 11 insertions(+), 15

[Xen-devel] [PATCH 3/9] x86/mtrr: drop have_wrcomb() wrapper

2016-08-16 Thread Doug Goldstein
The only call was always to the generic implementation. Signed-off-by: Doug Goldstein --- xen/arch/x86/cpu/mtrr/main.c | 8 +--- 1 file changed, 1 insertion(+), 7 deletions(-) diff --git a/xen/arch/x86/cpu/mtrr/main.c b/xen/arch/x86/cpu/mtrr/main.c index ff908ad..5dd1f5d 100644 --- a/xen

[Xen-devel] [PATCH 0/9] x86/mtrr: basic cleanups

2016-08-16 Thread Doug Goldstein
. Doug Goldstein (9): x86/mtrr: prefix fns with mtrr and drop static x86/mtrr: drop mtrr_if indirection x86/mtrr: drop have_wrcomb() wrapper x86/mtrr: drop unnecessary use_intel() macro x86/mtrr: drop unused is_cpu() macro x86/mtrr: drop unused mtrr_ops struct x86/mtrr: drop unused

Re: [Xen-devel] [PATCH XTF] Correct the usage of $(DESTDIR) and $(prefix)

2016-07-20 Thread Doug Goldstein
range $(DESTDIR) > and $(prefix) to match expectation. > > Reported-by:Wei Liu > Signed-off-by: Andrew Cooper Reviewed-by: Doug Goldstein The conclusion in the commit message is correct. The supplied patch conforms to that. -- Doug Goldstein signature.asc Description

Re: [Xen-devel] [PATCH] XSM-docs: Flask operates on domain types and not on individual domain. Updated the documentation to reflect this.

2016-07-19 Thread Doug Goldstein
migrate_t is a domain that must be created via the nomigrate_t_building > + - nomigrate_t is a domain type that must be created via the > nomigrate_t_building > type, and whose memory cannot be read by dom0 once created "A domain labeled with nomigeate_t is a domain that" > > HV

Re: [Xen-devel] [PATCH] travis: Add checkpolicy to the list of packages

2016-07-15 Thread Doug Goldstein
ndyhhp/xen/jobs/144989065 > > Signed-off-by: Andrew Cooper Acked-by: Doug Goldstein (with the change to the commit message in the reply) -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing lis

Re: [Xen-devel] making xenstore domain easy configurable

2016-06-28 Thread Doug Goldstein
he Xen tools over their /proc/xen/ counterparts in an attempt to prevent people from being bitten by that. One of the patches made it into 4.6 and the other didn't make it in until 4.7. -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] making xenstore domain easy configurable

2016-06-28 Thread Doug Goldstein
sockets are > less overhead than the shared memory ring, as no hypercalls are > involved. There is also the unfortunate problem that one of the two > linux devices for xenstored *still* causes deadlocks when used; a > problem which is unresolved from Linux 3.14. Since Xen 4.7 the broken devices won't be used by default. I understand that the socket interface is faster and less overhead but I guess my question is how much data is sent over this interface? Does it really matter the small performance difference to justify having two different methods and not trimming the code base down to one method? -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] making xenstore domain easy configurable

2016-06-27 Thread Doug Goldstein
socket"? > > ~Andrew How about we take this the other way? Let's go away from using the socket and always go through kernel interface. I understand that its faster to use sockets than using the interface but does this performance difference really affect an actual runni

Re: [Xen-devel] [PATCH 13/17 v3] xen: move FLASK entry under XSM in Kconfig

2016-06-24 Thread Doug Goldstein
n to disable FLASK under EXPERT. > > Signed-off-by: Daniel De Graaf Thanks for the update Daniel. Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mailing list Xen-devel@

Re: [Xen-devel] Binary compatibility report for Xen base libraries

2016-06-24 Thread Doug Goldstein
had mentioned your tools in the #xen-devel channel. And I had talked about utilizing them as part of the Travis build process with the goal of making this data available. Thank you for doing this. Do you have any advice for us if it would be positive to do some sort of check on a per-commit basis or

Re: [Xen-devel] [PATCH v4 3/3] xen: make available hvm_fep to non-debug build as well

2016-06-23 Thread Doug Goldstein
k Xen as tainted when this feature is used. > > Add a kconfig option under x86 to configure hvm_fep. > > Signed-off-by: Wei Liu Otherwise the change looks good. Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digital signature

Re: [Xen-devel] [PATCH 13/17] xen: move FLASK entry under XSM in Kconfig

2016-06-20 Thread Doug Goldstein
On 6/20/16 10:28 AM, Jan Beulich wrote: >>>> On 20.06.16 at 17:11, wrote: >> On 06/20/2016 10:46 AM, Doug Goldstein wrote: >>> On 6/20/16 9:04 AM, Daniel De Graaf wrote: >>>> Since enabling XSM is required to enable FLASK, place the option for >>>&g

Re: [Xen-devel] [PATCH 10/17] flask: remove xen_flask_userlist operation

2016-06-20 Thread Doug Goldstein
On 6/20/16 10:07 AM, Daniel De Graaf wrote: > On 06/20/2016 10:35 AM, Doug Goldstein wrote: >> On 6/20/16 9:04 AM, Daniel De Graaf wrote: >>> This operation has no known users, and is primarily useful when an MLS >>> policy is in use (which has never been shipped with

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-20 Thread Doug Goldstein
the primary > location for installing and configuring the policy. > > Signed-off-by: Daniel De Graaf > Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digital signature _

Re: [Xen-devel] [PATCH 10/17] flask: remove xen_flask_userlist operation

2016-06-20 Thread Doug Goldstein
licy), so an application that needs it could > compute the results without needing to involve the hypervisor. > So if I read this language correctly. Removing this does not affect someone being able to build a MLS policy at a later date right? -- Doug Goldstein signature.asc Descriptio

Re: [Xen-devel] [PATCH 16/17] xen: Make FLASK_AVC_STATS kconfig option visible

2016-06-20 Thread Doug Goldstein
On 6/20/16 9:04 AM, Daniel De Graaf wrote: > Signed-off-by: Daniel De Graaf Reviewed-by: Doug Goldstein > --- > xen/common/Kconfig | 7 ++- > 1 file changed, 6 insertions(+), 1 deletion(-) > > diff --git a/xen/common/Kconfig b/xen/common/Kconfig > index 6a51fd5..8

Re: [Xen-devel] [PATCH 15/17] xsm: clean up unregistration

2016-06-20 Thread Doug Goldstein
On 6/20/16 9:04 AM, Daniel De Graaf wrote: > The only possible value of original_ops was &dummy_xsm_ops, and > unregister_xsm was never used. > > Signed-off-by: Daniel De Graaf > Reviewed-by: Andrew Cooper > Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Doug Goldstei

Re: [Xen-devel] [PATCH 14/17] xsm: annotate setup functions with __init

2016-06-20 Thread Doug Goldstein
On 6/20/16 9:04 AM, Daniel De Graaf wrote: > These functions were only called from __init functions. > > Signed-off-by: Daniel De Graaf > Reviewed-by: Andrew Cooper Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digit

Re: [Xen-devel] [PATCH 13/17] xen: move FLASK entry under XSM in Kconfig

2016-06-20 Thread Doug Goldstein
Ok. Here's the real review. I think you want the prompt to be optional if EXPERT is enabled then I think you need to use "prompt" instead of "bool". You've already got this set to a bool with the "def_bool" line. -- Doug Goldstein signature.asc Description

Re: [Xen-devel] [PATCH 13/17] xen: move FLASK entry under XSM in Kconfig

2016-06-20 Thread Doug Goldstein
On 6/20/16 9:41 AM, Doug Goldstein wrote: > On 6/20/16 9:04 AM, Daniel De Graaf wrote: >> Since enabling XSM is required to enable FLASK, place the option for >> FLASK below the one for XSM. In addition, since it does not make sense >> to enable XSM without any XSM provid

Re: [Xen-devel] [PATCH 13/17] xen: move FLASK entry under XSM in Kconfig

2016-06-20 Thread Doug Goldstein
- > - If unsure, say N. > - > > +config FLASK > + def_bool y > + bool "FLux Advanced Security Kernel support" if EXPERT = "y" Why did FLASK become dependent on EXPERT? It wasn't previously. -- Doug Goldstein signature.asc D

Re: [Xen-devel] [PATCH 12/17] xen/xsm: remove .xsm_initcall.init section

2016-06-20 Thread Doug Goldstein
he future, a switching mechanism will be needed > regardless, and that can be placed in xsm_core.c. > > Signed-off-by: Daniel De Graaf Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ X

Re: [Xen-devel] [PATCH 11/17] flask: improve unknown permission handling

2016-06-20 Thread Doug Goldstein
not handled by the existing > hooks only if the policy was compiled with "checkpolicy -U allow". In > previous releases, this bit did nothing, and the default remains to deny > the unknown operations. > > Signed-off-by: Daniel De Graaf Reviewed-by: Doug Goldstein --

Re: [Xen-devel] [PATCH 09/17] flask: remove unused AVC callback functions

2016-06-20 Thread Doug Goldstein
On 6/20/16 9:04 AM, Daniel De Graaf wrote: > These callbacks are not used in Xen. > > Signed-off-by: Daniel De Graaf Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digital signature ___ Xen-devel mai

Re: [Xen-devel] [PATCH 08/17] flask: remove unused secondary context in ocontext

2016-06-20 Thread Doug Goldstein
On 6/20/16 9:04 AM, Daniel De Graaf wrote: > This field was originally used in Linux for a default message code for > network interfaces. It has never been used in Xen, so remove it. > > Signed-off-by: Daniel De Graaf Reviewed-by: Doug Goldstein -- Doug Goldstein s

Re: [Xen-devel] [PATCH 07/17] flask: unify {get, set}vcpucontext permissions

2016-06-20 Thread Doug Goldstein
one type of CPU register and also need to be > prohibited from accessing another type. > > Signed-off-by: Daniel De Graaf > Reviewed-by: Konrad Rzeszutek Wilk I'm a: Reviewed-by: Doug Goldstein But I'd like to see Andrew Cooper's R-b or comments as well. -- Doug

Re: [Xen-devel] [PATCH 00/15] XSM/FLASK updates for 4.8

2016-06-19 Thread Doug Goldstein
es will make it easier/better for me) and give it a full on test Monday morning if there is any concerns. The other patches in the series can mostly get my R-b as well. I do have some of the same comments / concerns that have already been brought up so I'll go through and add my R-b to the clean p

Re: [Xen-devel] [PATCH 06/15] flask/policy: remove unused example

2016-06-19 Thread Doug Goldstein
On 6/9/16 9:47 AM, Daniel De Graaf wrote: > The access vectors defined here have never been used by xenstore. > > Signed-off-by: Daniel De Graaf Reviewed-by: Doug Goldstein -- Doug Goldstein signature.asc Description: OpenPGP digital

<    1   2   3   4   5   6   7   8   9   10   >