[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [RFC PATCH 1/8]: PVH: Basic and preparatory changes



It's good to see well split patches :)
But could you please send them inline next time?


>  arch/x86/include/asm/xen/interface.h |    3 +-
>  arch/x86/include/asm/xen/page.h      |    3 ++
>  arch/x86/xen/setup.c                 |   13 ++++++++--
>  arch/x86/xen/smp.c                   |   39 ++++++++++++++++++---------------
>  drivers/xen/cpu_hotplug.c            |    3 +-
>  include/xen/interface/xen.h          |    1 +
>  include/xen/xen.h                    |    4 +++
>  7 files changed, 43 insertions(+), 23 deletions(-)
> 
> diff --git a/arch/x86/include/asm/xen/interface.h 
> b/arch/x86/include/asm/xen/interface.h
> index cbf0c9d..1bd5e88 100644
> --- a/arch/x86/include/asm/xen/interface.h
> +++ b/arch/x86/include/asm/xen/interface.h
> @@ -136,7 +136,8 @@ struct vcpu_guest_context {
>      struct cpu_user_regs user_regs;         /* User-level CPU registers     
> */
>      struct trap_info trap_ctxt[256];        /* Virtual IDT                  
> */
>      unsigned long ldt_base, ldt_ents;       /* LDT (linear address, # ents) 
> */
> -    unsigned long gdt_frames[16], gdt_ents; /* GDT (machine frames, # ents) 
> */
> +    unsigned long gdt_frames[16], gdt_ents; /* GDT (machine frames, # ents).*
> +                                          * PV in HVM: it's GDTR addr/sz */
>      unsigned long kernel_ss, kernel_sp;     /* Virtual TSS (only SS1/SP1)   
> */
>      /* NB. User pagetable on x86/64 is placed in ctrlreg[1]. */
>      unsigned long ctrlreg[8];               /* CR0-CR7 (control registers)  
> */
> diff --git a/arch/x86/include/asm/xen/page.h b/arch/x86/include/asm/xen/page.h
> index 93971e8..d1cfb96 100644
> --- a/arch/x86/include/asm/xen/page.h
> +++ b/arch/x86/include/asm/xen/page.h
> @@ -158,6 +158,9 @@ static inline xpaddr_t machine_to_phys(xmaddr_t machine)
>  static inline unsigned long mfn_to_local_pfn(unsigned long mfn)
>  {
>       unsigned long pfn = mfn_to_pfn(mfn);
> +
> +     if (xen_feature(XENFEAT_auto_translated_physmap))
> +             return mfn;
>       if (get_phys_to_machine(pfn) != mfn)
>               return -1; /* force !pfn_valid() */
>       return pfn;
> diff --git a/arch/x86/xen/setup.c b/arch/x86/xen/setup.c
> index ead8557..936f21d 100644
> --- a/arch/x86/xen/setup.c
> +++ b/arch/x86/xen/setup.c
> @@ -500,10 +500,9 @@ void __cpuinit xen_enable_syscall(void)
>  #endif /* CONFIG_X86_64 */
>  }
>  
> -void __init xen_arch_setup(void)
> +/* Normal PV domain not running in HVM container */
> +static __init void inline xen_non_pvh_arch_setup(void)
>  {
> -     xen_panic_handler_init();
> -
>       HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_4gb_segments);
>       HYPERVISOR_vm_assist(VMASST_CMD_enable, 
> VMASST_TYPE_writable_pagetables);
>  
> @@ -517,6 +516,14 @@ void __init xen_arch_setup(void)
>  
>       xen_enable_sysenter();
>       xen_enable_syscall();
> +}
> +
> +void __init xen_arch_setup(void)
> +{
> +     xen_panic_handler_init();
> +
> +     if (!xen_pvh_domain())
> +             xen_non_pvh_arch_setup();
>  
>  #ifdef CONFIG_ACPI
>       if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
> diff --git a/arch/x86/xen/smp.c b/arch/x86/xen/smp.c
> index f58dca7..cdf269d 100644
> --- a/arch/x86/xen/smp.c
> +++ b/arch/x86/xen/smp.c
> @@ -300,8 +300,6 @@ cpu_initialize_context(unsigned int cpu, struct 
> task_struct *idle)
>       gdt = get_cpu_gdt_table(cpu);
>  
>       ctxt->flags = VGCF_IN_KERNEL;
> -     ctxt->user_regs.ds = __USER_DS;
> -     ctxt->user_regs.es = __USER_DS;
>       ctxt->user_regs.ss = __KERNEL_DS;
>  #ifdef CONFIG_X86_32
>       ctxt->user_regs.fs = __KERNEL_PERCPU;
> @@ -314,31 +312,36 @@ cpu_initialize_context(unsigned int cpu, struct 
> task_struct *idle)
>  
>       memset(&ctxt->fpu_ctxt, 0, sizeof(ctxt->fpu_ctxt));
>  
> -     xen_copy_trap_info(ctxt->trap_ctxt);
> +             ctxt->user_regs.ds = __USER_DS;
> +             ctxt->user_regs.es = __USER_DS;
>  
> -     ctxt->ldt_ents = 0;
> +             xen_copy_trap_info(ctxt->trap_ctxt);
>  
> -     BUG_ON((unsigned long)gdt & ~PAGE_MASK);
> +             ctxt->ldt_ents = 0;
>  
> -     gdt_mfn = arbitrary_virt_to_mfn(gdt);
> -     make_lowmem_page_readonly(gdt);
> -     make_lowmem_page_readonly(mfn_to_virt(gdt_mfn));
> +             BUG_ON((unsigned long)gdt & ~PAGE_MASK);
>  
> -     ctxt->gdt_frames[0] = gdt_mfn;
> -     ctxt->gdt_ents      = GDT_ENTRIES;
> +             gdt_mfn = arbitrary_virt_to_mfn(gdt);
> +             make_lowmem_page_readonly(gdt);
> +             make_lowmem_page_readonly(mfn_to_virt(gdt_mfn));
>  
> -     ctxt->user_regs.cs = __KERNEL_CS;
> -     ctxt->user_regs.esp = idle->thread.sp0 - sizeof(struct pt_regs);
> +             ctxt->gdt_frames[0] = gdt_mfn;
> +             ctxt->gdt_ents      = GDT_ENTRIES;
>  
> -     ctxt->kernel_ss = __KERNEL_DS;
> -     ctxt->kernel_sp = idle->thread.sp0;
> +             ctxt->kernel_ss = __KERNEL_DS;
> +             ctxt->kernel_sp = idle->thread.sp0;
>  
>  #ifdef CONFIG_X86_32
> -     ctxt->event_callback_cs     = __KERNEL_CS;
> -     ctxt->failsafe_callback_cs  = __KERNEL_CS;
> +             ctxt->event_callback_cs     = __KERNEL_CS;
> +             ctxt->failsafe_callback_cs  = __KERNEL_CS;
>  #endif
> -     ctxt->event_callback_eip    = (unsigned long)xen_hypervisor_callback;
> -     ctxt->failsafe_callback_eip = (unsigned long)xen_failsafe_callback;
> +             ctxt->event_callback_eip    =
> +                                     (unsigned long)xen_hypervisor_callback;
> +             ctxt->failsafe_callback_eip =
> +                                     (unsigned long)xen_failsafe_callback;
> +
> +     ctxt->user_regs.cs = __KERNEL_CS;
> +     ctxt->user_regs.esp = idle->thread.sp0 - sizeof(struct pt_regs);
>  
>       per_cpu(xen_cr3, cpu) = __pa(swapper_pg_dir);
>       ctxt->ctrlreg[3] = xen_pfn_to_cr3(virt_to_mfn(swapper_pg_dir));
> diff --git a/drivers/xen/cpu_hotplug.c b/drivers/xen/cpu_hotplug.c
> index 4dcfced..a797359 100644
> --- a/drivers/xen/cpu_hotplug.c
> +++ b/drivers/xen/cpu_hotplug.c
> @@ -100,7 +100,8 @@ static int __init setup_vcpu_hotplug_event(void)
>       static struct notifier_block xsn_cpu = {
>               .notifier_call = setup_cpu_watcher };
>  
> -     if (!xen_pv_domain())
> +     /* PVH TBD/FIXME: future work */
> +     if (!xen_pv_domain() || xen_pvh_domain())
>               return -ENODEV;
>  
>       register_xenstore_notifier(&xsn_cpu);

I don't think we should use or have xen_pvh_domain() in non-x86 files,
like anything under drivers/xen.
Isn't XENFEAT_auto_translated_physmap enough?


> diff --git a/include/xen/interface/xen.h b/include/xen/interface/xen.h
> index 0801468..1d5bc36 100644
> --- a/include/xen/interface/xen.h
> +++ b/include/xen/interface/xen.h
> @@ -493,6 +493,7 @@ struct dom0_vga_console_info {
>  /* These flags are passed in the 'flags' field of start_info_t. */
>  #define SIF_PRIVILEGED    (1<<0)  /* Is the domain privileged? */
>  #define SIF_INITDOMAIN    (1<<1)  /* Is this the initial control domain? */
> +#define SIF_IS_PVINHVM    (1<<4)  /* Is it a PV running in HVM container? */
>  #define SIF_PM_MASK       (0xFF<<8) /* reserve 1 byte for xen-pm options */
>  
>  typedef uint64_t cpumap_t;

I would avoid adding SIF_IS_PVINHVM, an x86 specific concept, into a
generic xen.h interface file. 


> diff --git a/include/xen/xen.h b/include/xen/xen.h
> index a164024..e823639 100644
> --- a/include/xen/xen.h
> +++ b/include/xen/xen.h
> @@ -18,6 +18,10 @@ extern enum xen_domain_type xen_domain_type;
>                                xen_domain_type == XEN_PV_DOMAIN)
>  #define xen_hvm_domain()     (xen_domain() &&                        \
>                                xen_domain_type == XEN_HVM_DOMAIN)
> +/* xen_pv_domain check is necessary as start_info ptr is null in HVM. Also,
> + * note, xen PVH domain shares lot of HVM code */
> +#define xen_pvh_domain()       (xen_pv_domain() &&                     \
> +                             (xen_start_info->flags & SIF_IS_PVINHVM))
 
Also here.

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.