[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] x86/Xen: tidy xen-head.S


  • To: Juergen Gross <jgross@xxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Wed, 15 Feb 2023 13:42:48 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GzgKugyULcfMWfiFKQIeuCMTvQaR8HlUPhzFny/tWps=; b=l87SvHgOa6HOMVjyCd6zhLuJFno22wOT515Nh93R1hnSshn6xQ24LeE6gGjYVgrB+ZlEarB7zkUgy/x1pWsUfbfleykZzEwHoJ5qmmcsM2p7hsl+hKZEoSFbYdQrrK8ts7HDzU0Wx9SdcCobUP1fvtRthhG59A2dwUURShxCIUjIPU7CoWRC+ljvUGdz3/lN/ln0qyhwQxWGHfLeKtYc/bW/sRQBPLnkRcFCth58diTVUtPRIY96XG7kzNBdWpuRFEGB3xYk+Y1kKGn+8sIcOHPPapte+x8vrhkkFS6ZraBHXinDfpoxWFibMk1DXyylXi1UyMKXoE+qMQdRR6BWRw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Dsh7bksM21W7LCtR0Q5EpITxuZzzSXQFeZOkpQLfi/Pm8TGiHtfjfM/ySQWq918X72rG+hMrdhwW40royOsBF5OINWSadzr9L3/aan1YQtPK5qO45LLA86QukU8VuHRt2oBT4BAhL8btksOmiLXwm7QONm2cLnXg1uqcVNlCdMBDVvR5DtSpQVSncBFBer4LN7NwlvhD0ibYmTw+OF2U/YSpjt0K7J/EuLs4K9dJnIRXdMvihAkAzPcQ1/32vXU+0ZNu3XhSPijCw9DO/R7V1Pxzh3x+I25+GVK1H8LA3CM7tkq5fj1rK4/rwFacrqyzEqI6zyT462dRKR4uC72b7Q==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>, the arch/x86 maintainers <x86@xxxxxxxxxx>, Thomas Gleixner <tglx@xxxxxxxxxxxxx>, Ingo Molnar <mingo@xxxxxxxxxx>, Borislav Petkov <bp@xxxxxxxxx>, Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 15 Feb 2023 12:43:14 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 15.02.2023 13:05, Juergen Gross wrote:
> On 15.02.23 12:33, Jan Beulich wrote:
>> First of all drop 32-bit leftovers, including the inclusion of the file
>> from head_32.S.
> 
> I don't see why we would want to drop 32-bit HVM and PVH support.

HVM doesn't use this, does it? But yes, the PVH aspect as well as ...

>> --- a/arch/x86/kernel/head_32.S
>> +++ b/arch/x86/kernel/head_32.S
>> @@ -524,8 +524,6 @@ __INITRODATA
>>   int_msg:
>>      .asciz "Unknown interrupt or fault at: %p %p %p\n"
>>   
>> -#include "../../x86/xen/xen-head.S"
>> -
> 
> This is wrong for non-PV cases.

... this and ...

>> --- a/arch/x86/xen/xen-head.S
>> +++ b/arch/x86/xen/xen-head.S
>> @@ -83,27 +83,33 @@ SYM_CODE_END(asm_cpu_bringup_and_idle)
>>      ELFNOTE(Xen, XEN_ELFNOTE_GUEST_OS,       .asciz "linux")
>>      ELFNOTE(Xen, XEN_ELFNOTE_GUEST_VERSION,  .asciz "2.6")
>>      ELFNOTE(Xen, XEN_ELFNOTE_XEN_VERSION,    .asciz "xen-3.0")
>> -#ifdef CONFIG_X86_32
>> -    ELFNOTE(Xen, XEN_ELFNOTE_VIRT_BASE,      _ASM_PTR __PAGE_OFFSET)
>> -#else
>>      ELFNOTE(Xen, XEN_ELFNOTE_VIRT_BASE,      _ASM_PTR __START_KERNEL_map)
> 
> This will be wrong for 32-bit guests now. I'm not sure the value is really
> used in Xen for non-PV guests, though.
> 
>>      /* Map the p2m table to a 512GB-aligned user address. */
>>      ELFNOTE(Xen, XEN_ELFNOTE_INIT_P2M,       .quad (PUD_SIZE * 
>> PTRS_PER_PUD))
> 
> Move this under the CONFIG_PV umbrella?

... these occurred to me over lunch (and I was hoping to be able to point
out my mistake before getting feedback). I'll check whether VIRT_BASE can
also be moved into the PV-only section.

>> -#endif
>>   #ifdef CONFIG_XEN_PV
>>      ELFNOTE(Xen, XEN_ELFNOTE_ENTRY,          _ASM_PTR startup_xen)
>> +    ELFNOTE(Xen, XEN_ELFNOTE_FEATURES,       .ascii "!writable_page_tables")
>> +    ELFNOTE(Xen, XEN_ELFNOTE_PAE_MODE,       .asciz "yes")
>> +    ELFNOTE(Xen, XEN_ELFNOTE_L1_MFN_VALID,
>> +            .quad _PAGE_PRESENT; .quad _PAGE_PRESENT)
>> +# define FEATURES_PV (1 << XENFEAT_writable_page_tables)
>> +#else
>> +# define FEATURES_PV 0
>> +#endif
>> +#ifdef CONFIG_XEN_PVH
>> +# define FEATURES_PVH (1 << XENFEAT_linux_rsdp_unrestricted)
>> +#else
>> +# define FEATURES_PVH 0
>> +#endif
>> +#ifdef CONFIG_XEN_DOM0
>> +# define FEATURES_DOM0 (1 << XENFEAT_dom0)
>> +#else
>> +# define FEATURES_DOM0 0
>>   #endif
>>      ELFNOTE(Xen, XEN_ELFNOTE_HYPERCALL_PAGE, _ASM_PTR hypercall_page)
>> -    ELFNOTE(Xen, XEN_ELFNOTE_FEATURES,
>> -            .ascii "!writable_page_tables|pae_pgdir_above_4gb")
>>      ELFNOTE(Xen, XEN_ELFNOTE_SUPPORTED_FEATURES,
>> -            .long (1 << XENFEAT_writable_page_tables) |       \
>> -                  (1 << XENFEAT_dom0) |                       \
>> -                  (1 << XENFEAT_linux_rsdp_unrestricted))
>> -    ELFNOTE(Xen, XEN_ELFNOTE_PAE_MODE,       .asciz "yes")
>> +            .long FEATURES_PV | FEATURES_PVH | FEATURES_DOM0)
>>      ELFNOTE(Xen, XEN_ELFNOTE_LOADER,         .asciz "generic")
>> -    ELFNOTE(Xen, XEN_ELFNOTE_L1_MFN_VALID,
>> -            .quad _PAGE_PRESENT; .quad _PAGE_PRESENT)
>>      ELFNOTE(Xen, XEN_ELFNOTE_SUSPEND_CANCEL, .long 1)
>>      ELFNOTE(Xen, XEN_ELFNOTE_MOD_START_PFN,  .long 1)
>>      ELFNOTE(Xen, XEN_ELFNOTE_HV_START_LOW,   _ASM_PTR 
>> __HYPERVISOR_VIRT_START)
> 
> Are XEN_ELFNOTE_MOD_START_PFN and XEN_ELFNOTE_HV_START_LOW really relevant
> for the non-PV case? I don't think so (in theory XEN_ELFNOTE_MOD_START_PFN
> could be used, but the main reason for its introduction was PV guests IIRC).

I wasn't sufficiently certain for MOD_START_PFN, so I'd prefer to leave it
untouched for now. HV_START_LOW might be 32-bit PV only really; I'll check
and then maybe drop (or move).

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.