[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v4 02/11] xen/dom0less: rename kernel_zimage_probe() to kernel_image_probe()


  • To: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx>
  • From: Luca Fancellu <Luca.Fancellu@xxxxxxx>
  • Date: Wed, 29 Apr 2026 10:59:42 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 4.158.2.129) smtp.rcpttodomain=gmail.com smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oWl6hUn8dnN4r97Jn4cC62/WM9wERjsWrVDmFzDmdB0=; b=uVY2VR1R5JFStgdqHFTXUC6Je41valN+H6uRGr8u+Pu9kHFWepTYG9+IgPDBAOjBeEzM4Okl6t5/VRmVNg8yG5HWj6E17Q/p/HAbFKpCcUC9AGN1oosPsKb832dGJ9dQPdPh3xuRLfLM1zUKjNU6dqepbU8WA6hh2nB/kl3DcEf8HgzFhAFPdj0Atl8xCZSn7lo7G0OuX59wtD7pvgpicJJ2EwPZtTrMpDNylzWIWa85QVJq+6rcG8t+2NLZDgQoY7H59d4Q9x6IXYvOyZpc2RQS1eUB6ZUIAg7AHTXHbnil0L4uHartEGV8wXVIldOvfW8vOzxwdCinQJoopwMr3A==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oWl6hUn8dnN4r97Jn4cC62/WM9wERjsWrVDmFzDmdB0=; b=uDsBfMqKd6jLqTJLYGkgyz/SjfisqKniHMkQcwGxhIvT59uIEN07l1NtGCL3QmngrUGnb75KOSqHM3Rjf+mQXDOSe1m83eewSQ9fOruReXEPB+eJk5fJPCSwbqRJaP2XCiYJ47NSFLeyncf0MENuUL+D2kdSukmI9MTBbPKp3I9UtfU3zufcpPapf3xjh8K7g952LJaxryS+Rn96jk0DcNbrfjW+exyp3aGLRnFyB/XgKPMAPEvBjhQUxTdvBFPeTpHoCRT4KBx/vHFzq2R5mIWoJUypJiCZwbksYL5WUJuUw6OxxCyHWeS1KcKyapMK6ohc2vp9+Z5hV7l65T77TA==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=EnGThWMZ2JKhXiegrYtDlDOEywv1Dzio+DpIkCvrf0M4o+Y32R/XkWW2vnhB2100vK+FNmJpp8k1W3umNdHS5KkmV/uYcbPaB1xtztPWiipYWE2SPOzDw+S82eGG0Q5L+UnIqI9Qi7KO7SpW7q7Y0On67LNv0tU3K2tCQWCzoyyQvSepxleqAsukutidBfPJtrpUyvEV7sQoQFhLSdKEOMg3O7tccVMKjetJBm51jZhZo0cKPCnVnu6YdmuwVXBi1AFatway+rrNbwshJXHjrS88e2DESEcftObhUfSq1X+tuF2RZv2woPgpelvw0kYYDPGNKDjDrP17p8NDPqEB5g==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=eFKc5TkqqWUqM0znAOznmtuVE8tze9XCzRk0///YQXjD6GK+7NvBxhtRQgOm40/2VUYzNRGYQc7sU2MrOMBGV1F4//iqRzkXy6LNOllRCoISUUxPh1MxnenpthqxfBpRnQyL5tF/+2wA59jHBAYaJsVw1pw7Tt2zDQm5bNJlP2RxTc25LFrBbnkQx5cWZxCniafDHKxeL4wM3I4TplWyjsheGbrU4ZaII4bUc+jGlHR131fz6Up7b5EYx7GP5O1gkDfIgXObY+STft1GRNPXrKP+3eHwT3za5He2VFAcyYvLJnu5skkFHBHWmkmm5vHi0d5KB+CyL8hF08bnfmjhZA==
  • Authentication-results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=arm.com header.i="@arm.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck"; dkim=pass header.s=selector1 header.d=arm.com header.i="@arm.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck"
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Romain Caritey <Romain.Caritey@xxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Wed, 29 Apr 2026 11:01:25 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Thread-index: AQHc1xwVOtsB2tnchEy3Q2x22NSmlrX14DKA
  • Thread-topic: [PATCH v4 02/11] xen/dom0less: rename kernel_zimage_probe() to kernel_image_probe()

Hi Oleksii,

> 
> diff --git a/xen/arch/arm/kernel.c b/xen/arch/arm/kernel.c
> index 9395b5af8745..a5554714cd7b 100644
> --- a/xen/arch/arm/kernel.c
> +++ b/xen/arch/arm/kernel.c
> @@ -101,8 +101,8 @@ static paddr_t __init kernel_zimage_place(struct 
> kernel_info *info)
>     paddr_t load_addr;
> 
> #ifdef CONFIG_HAS_DOMAIN_TYPE
> -    if ( (info->type == DOMAIN_64BIT) && (info->zimage.start == 0) )
> -        return mem->bank[0].start + info->zimage.text_offset;
> +    if ( (info->type == DOMAIN_64BIT) && (info->image.start == 0) )
> +        return mem->bank[0].start + info->image.text_offset;
> #endif
> 
>     /*
> @@ -111,19 +111,19 @@ static paddr_t __init kernel_zimage_place(struct 
> kernel_info *info)
>      * and above 32MiB. Load it as high as possible within these
>      * constraints, while also avoiding the DTB.
>      */
> -    if ( info->zimage.start == 0 )
> +    if ( info->image.start == 0 )
>     {
>         paddr_t load_end;
> 
>         load_end = mem->bank[0].start + mem->bank[0].size;
>         load_end = MIN(mem->bank[0].start + MB(128), load_end);
> 
> -        load_addr = load_end - info->zimage.len;
> +        load_addr = load_end - info->image.len;
>         /* Align to 2MB */
>         load_addr &= ~((2 << 20) - 1);
>     }
>     else
> -        load_addr = info->zimage.start;
> +        load_addr = info->image.start;
> 
>     return load_addr;
> }
> @@ -131,8 +131,8 @@ static paddr_t __init kernel_zimage_place(struct 
> kernel_info *info)
> static void __init kernel_zimage_load(struct kernel_info *info)
> {
>     paddr_t load_addr = kernel_zimage_place(info);
> -    paddr_t paddr = info->zimage.kernel_addr;
> -    paddr_t len = info->zimage.len;
> +    paddr_t paddr = info->image.kernel_addr;
> +    paddr_t len = info->image.len;
>     void *kernel;
>     int rc;
> 
> @@ -215,7 +215,7 @@ int __init kernel_uimage_probe(struct kernel_info *info,
>         return -EOPNOTSUPP;
>     }
> 
> -    info->zimage.start = be32_to_cpu(uimage.load);
> +    info->image.start = be32_to_cpu(uimage.load);
>     info->entry = be32_to_cpu(uimage.ep);
> 
>     /*
> @@ -224,20 +224,20 @@ int __init kernel_uimage_probe(struct kernel_info *info,
>      * independent image. That means Xen is free to load such an image at
>      * any valid address.
>      */
> -    if ( info->zimage.start == 0 )
> +    if ( info->image.start == 0 )
>         printk(XENLOG_INFO
>                "No load address provided. Xen will decide where to load 
> it.\n");
>     else
>         printk(XENLOG_INFO
>                "Provided load address: %"PRIpaddr" and entry address: 
> %"PRIpaddr"\n",
> -               info->zimage.start, info->entry);
> +               info->image.start, info->entry);
> 
>     /*
>      * If the image supports position independent execution, then user cannot
>      * provide an entry point as Xen will load such an image at any 
> appropriate
>      * memory address. Thus, we need to return error.
>      */
> -    if ( (info->zimage.start == 0) && (info->entry != 0) )
> +    if ( (info->image.start == 0) && (info->entry != 0) )
>     {
>         printk(XENLOG_ERR
>                "Entry point cannot be non zero for PIE image.\n");
> @@ -257,13 +257,13 @@ int __init kernel_uimage_probe(struct kernel_info *info,
>         if ( rc )
>             return rc;
> 
> -        info->zimage.kernel_addr = mod->start;
> -        info->zimage.len = mod->size;
> +        info->image.kernel_addr = mod->start;
> +        info->image.len = mod->size;
>     }
>     else
>     {
> -        info->zimage.kernel_addr = addr + sizeof(uimage);
> -        info->zimage.len = len;
> +        info->image.kernel_addr = addr + sizeof(uimage);
> +        info->image.len = len;
>     }
> 
>     info->load = kernel_zimage_load;
> @@ -289,7 +289,7 @@ int __init kernel_uimage_probe(struct kernel_info *info,
>      * Thus, Xen uses uimage.load attribute to determine the load address and
>      * zimage.text_offset is ignored.

Should we update the comment as well?

Also in here:
https://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/include/xen/fdt-kernel.h;h=4d0467bb396a9cf317954fd511469e7f56d67844;hb=refs/heads/staging#l111

Cheers,
Luca




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.