|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v7 29/32] libxc/xen: introduce a start info structure for HVMlite guests
El 05/10/15 a les 12.36, Andrew Cooper ha escrit:
> On 02/10/15 16:49, Roger Pau Monne wrote:
>> This structure contains the physical address of the command line, as well as
>> the physical address of the list of loaded modules. The physical address of
>> this structure is passed to the guest at boot time in the %ebx register.
>>
>> Signed-off-by: Roger Pau Monnà <roger.pau@xxxxxxxxxx>
>> Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
>> Cc: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
>> Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
>> Cc: Wei Liu <wei.liu2@xxxxxxxxxx>
>> Cc: Jan Beulich <jbeulich@xxxxxxxx>
>> Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>> ---
>> Changes since v6:
>> - Add a check to make sure the start info data is placed below 4GB.
>> - Make sure byte addresses are treated as uintptr_t.
>> - Fix single-line comment.
>>
>> Changes since v5:
>> - Change some of the calculations performed to get the total size of the
>> start_info region.
>> - Replace the mention of HVMlite in a comment with PVH.
>> - Don't use 64bit integers in hvm_modlist_entry.
>> ---
>> tools/libxc/xc_dom_x86.c | 68
>> +++++++++++++++++++++++++++++++++++++++++++++++-
>> xen/include/public/xen.h | 17 ++++++++++++
>> 2 files changed, 84 insertions(+), 1 deletion(-)
>>
>> diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
>> index 85b8288..20a39b7 100644
>> --- a/tools/libxc/xc_dom_x86.c
>> +++ b/tools/libxc/xc_dom_x86.c
>> @@ -561,7 +561,70 @@ static int alloc_magic_pages_hvm(struct xc_dom_image
>> *dom)
>> xc_hvm_param_set(xch, domid, HVM_PARAM_SHARING_RING_PFN,
>> special_pfn(SPECIALPAGE_SHARING));
>>
>> - if ( dom->device_model )
>> + if ( !dom->device_model )
>> + {
>> + struct xc_dom_seg seg;
>> + struct hvm_start_info *start_info;
>> + char *cmdline;
>> + struct hvm_modlist_entry *modlist;
>> + void *start_page;
>> + size_t cmdline_size = 0;
>> + size_t start_info_size = sizeof(*start_info);
>> +
>> + if ( dom->cmdline )
>> + {
>> + cmdline_size = ROUNDUP(strlen(dom->cmdline) + 1, 8);
>> + start_info_size += cmdline_size;
>> +
>> + }
>> + if ( dom->ramdisk_blob )
>> + start_info_size += sizeof(*modlist); /* Limited to one module.
>> */
>> +
>> + rc = xc_dom_alloc_segment(dom, &seg, "HVMlite start info", 0,
>> + start_info_size);
>> + if ( rc != 0 )
>> + {
>> + DOMPRINTF("Unable to reserve memory for the start info");
>> + goto out;
>> + }
>> +
>> + start_page = xc_map_foreign_range(xch, domid, start_info_size,
>> + PROT_READ | PROT_WRITE,
>> + seg.pfn);
>> + if ( start_page == NULL )
>> + {
>> + DOMPRINTF("Unable to map HVM start info page");
>> + goto error_out;
>> + }
>> +
>> + start_info = start_page;
>
> You should clear start_info here for sanity sake. There is nothing
> which requires the mapped memory to be clear.
AFAICT xc_dom_alloc_segment already clears the allocated memory.
>
>> + cmdline = start_page + sizeof(*start_info);
>> + modlist = start_page + sizeof(*start_info) + cmdline_size;
>> +
>> + if ( dom->cmdline )
>> + {
>> + strncpy(cmdline, dom->cmdline, MAX_GUEST_CMDLINE);
>> + cmdline[MAX_GUEST_CMDLINE - 1] = '\0';
>> + start_info->cmdline_paddr = (seg.pfn << PAGE_SHIFT) +
>> + ((uintptr_t)cmdline -
>> (uintptr_t)start_info);
>> + }
>> +
>> + if ( dom->ramdisk_blob )
>> + {
>> + modlist[0].paddr = dom->ramdisk_seg.vstart -
>> dom->parms.virt_base;
>> + modlist[0].size = dom->ramdisk_seg.vend -
>> dom->ramdisk_seg.vstart;
>> + start_info->modlist_paddr = (seg.pfn << PAGE_SHIFT) +
>> + ((uintptr_t)modlist -
>> (uintptr_t)start_info);
>> + start_info->nr_modules = 1;
>> + }
>> +
>> + start_info->magic = HVM_START_MAGIC_VALUE;
>> +
>> + munmap(start_page, start_info_size);
>> +
>> + dom->start_info_pfn = seg.pfn;
>> + }
>> + else
>> {
>> /*
>> * Allocate and clear additional ioreq server pages. The default
>> @@ -915,6 +978,9 @@ static int vcpu_hvm(struct xc_dom_image *dom)
>> /* Set the IP. */
>> bsp_ctx.cpu.rip = dom->parms.phys_entry;
>>
>> + if ( dom->start_info_pfn )
>> + bsp_ctx.cpu.rbx = dom->start_info_pfn << PAGE_SHIFT;
>> +
>> /* Set the end descriptor. */
>> bsp_ctx.end_d.typecode = HVM_SAVE_CODE(END);
>> bsp_ctx.end_d.instance = 0;
>> diff --git a/xen/include/public/xen.h b/xen/include/public/xen.h
>> index ff5547e..709e12c 100644
>> --- a/xen/include/public/xen.h
>> +++ b/xen/include/public/xen.h
>> @@ -784,6 +784,23 @@ struct start_info {
>> };
>> typedef struct start_info start_info_t;
>>
>> +/* Start of day structure passed to PVH guests in %ebx. */
>> +struct hvm_start_info {
>> +#define HVM_START_MAGIC_VALUE 0x336ec578
>> + uint32_t magic; /* Contains the magic value 0x336ec578
>> */
>> + /* ("xEn3" with the 0x80 bit of the "E"
>> set).*/
>> + uint32_t flags; /* SIF_xxx flags.
>> */
>> + uint32_t cmdline_paddr; /* Physical address of the command line.
>> */
>> + uint32_t nr_modules; /* Number of modules passed to the kernel.
>> */
>> + uint32_t modlist_paddr; /* Physical address of an array of
>> */
>> + /* hvm_modlist_entry.
>> */
>
> We should state that nothing will be loaded at 0, so a paddr of 0 means
> "not present".
Will add it to the next version, thanks for the review.
> Otherwise,
>
> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |