Received: by 10.223.185.116 with SMTP id b49csp6662330wrg; Wed, 28 Feb 2018 13:15:37 -0800 (PST) X-Google-Smtp-Source: AH8x226jR6GLIb2G4DioazrWDg7U0/zKU81ZPxsrab7MqTBBLJ5ouAH/9xUUkJ59t073AFndaG5W X-Received: by 10.101.70.65 with SMTP id k1mr15522065pgr.61.1519852537653; Wed, 28 Feb 2018 13:15:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519852537; cv=none; d=google.com; s=arc-20160816; b=v6YRck/mIaZHc2Q7ua6pYkT3g2RPY3RhXYKwzp+SwQpL+2F8IvWs4TzSBIWjS5Tk2N Bg4Qa1wyf/XNyJqGKOdswJx8oZ0RYnEBjmS7A7zUKR/BjMdDAZstmnhzxlS33+uljY1X IHbc/01FcrUngNwJiNuQOYA9L16xrIsQ+WSK1x6YYH3mJXRo4QvOyN15PbHUPfNwSZ0S 7fOUGBusGKO5cMS5HH+IYBxtIpPKimppMJCj9jKiInLlD+zHOgYw0dKOz5U2Az+yCIHO +VA/4gnoRGghd4mI5vGwDIl1hvJCwrma+Zoj3ynYk8CCx3lZtbfel+Woh1be7+fepysv Gbxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=GiZ1PXhkub+3g2eF13X9X8PXPKQlggkdadreOtU3vSw=; b=aSqXKZDYyNazCzlXxAVj9WoejWlb+yZLflOZiEf717+iV6gmtCOSFY2sosYNk2FFxb NV95UvKPsA2Ri6kDp295Wn76d6qNPvHb7d+KagwALgfpfTjKm765QuXLkxs+hyrl7Ow+ 3+KG1VV76yiwAA0Zl3YvGdR37U/qhua3Eb/EF07SUNVSSw6dt4I1JjNRIkzpIPdc/SKP wGa1xz7fiwk1cMzBY9qtbT6do8GF/c2Zw4T83OEdBJRhFS/O2GyC5k/v/kiR/z/Efiol 0NOaVto39yLDnRSYF2vl6+S+v/dWxXFqls2BZqqRfE3s5Rg5L3R17urJXDBsObSYluQ3 qb1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=XrgLDNEn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y22si1778948pff.348.2018.02.28.13.15.22; Wed, 28 Feb 2018 13:15:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=XrgLDNEn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934960AbeB1VOX (ORCPT + 99 others); Wed, 28 Feb 2018 16:14:23 -0500 Received: from aserp2120.oracle.com ([141.146.126.78]:43444 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934951AbeB1VOT (ORCPT ); Wed, 28 Feb 2018 16:14:19 -0500 Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w1SLC4A2066964; Wed, 28 Feb 2018 21:12:41 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=date : from : to : cc : subject : message-id : references : mime-version : content-type : in-reply-to; s=corp-2017-10-26; bh=GiZ1PXhkub+3g2eF13X9X8PXPKQlggkdadreOtU3vSw=; b=XrgLDNEnm5qHWQPClgcBpnFyQAWMaMTvSh2ckgQA5K3UL7f4pyw0g4zqpREWcrbRjWac 9joCm23fF+Wl7kbvRsV5bx7RObWcAtw4xLOEFZSbub626RZ2wvepegjJG9Or9xnY/iWd gpvYCT1B1h9bYoHHwsAj1zPBtDHxwhDGj3LHwjsIop7F1Fim5rbrlrmYY+jbtaIC9it8 MmkKOsgrpo9CZPppXGuYeozefFBSk8t8riNer8yWYq2kglb44DN+cKVr8FrGEr6GW0Ax 1As/ryABTiKhi5uWzWbJagCOOoWUyoiw2W16cfgK2nzKp7HhSs8yRvKju5Xo6+i+zzut 0A== Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by aserp2120.oracle.com with ESMTP id 2ge3ycg24c-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 28 Feb 2018 21:12:41 +0000 Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w1SL7eSI016624 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 28 Feb 2018 21:07:40 GMT Received: from abhmp0007.oracle.com (abhmp0007.oracle.com [141.146.116.13]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w1SL7bpa030462; Wed, 28 Feb 2018 21:07:37 GMT Received: from char.us.oracle.com (/10.137.176.158) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 28 Feb 2018 13:07:36 -0800 Received: by char.us.oracle.com (Postfix, from userid 1000) id BA1086A09F7; Wed, 28 Feb 2018 16:07:34 -0500 (EST) Date: Wed, 28 Feb 2018 16:07:34 -0500 From: Konrad Rzeszutek Wilk To: Maran Wilson Cc: pbonzini@redhat.com, jgross@suse.com, boris.ostrovsky@oracle.com, roger.pau@citrix.com, andrew.cooper3@citrix.com, hch@infradead.org, JBeulich@suse.com, x86@kernel.org, xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, thomas.lendacky@amd.com, dave.hansen@linux.intel.com, rkrcmar@redhat.com, gregkh@linuxfoundation.org, mchehab@kernel.org, hpa@zytor.com, linus.walleij@linaro.org, mingo@redhat.com, rdunlap@infradead.org, luto@kernel.org, jpoimboe@redhat.com, tglx@linutronix.de, bp@suse.de, davem@davemloft.net, kirill.shutemov@linux.intel.com Subject: Re: [Xen-devel] [RFC PATCH v4 1/7] xen/pvh: Split CONFIG_XEN_PVH into CONFIG_PVH and CONFIG_XEN_PVH Message-ID: <20180228210734.GJ11576@char.us.oracle.com> References: <1519842483-8887-1-git-send-email-maran.wilson@oracle.com> <1519842483-8887-2-git-send-email-maran.wilson@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1519842483-8887-2-git-send-email-maran.wilson@oracle.com> User-Agent: Mutt/1.8.3 (2017-05-23) X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8818 signatures=668682 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1802280257 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 28, 2018 at 10:27:57AM -0800, Maran Wilson wrote: > In order to pave the way for hypervisors other then Xen to use the PVH > entry point for VMs, we need to factor the PVH entry code into Xen specific > and hypervisor agnostic components. The first step in doing that, is to > create a new config option for PVH entry that can be enabled > independently from CONFIG_XEN. > > Signed-off-by: Maran Wilson > --- > arch/x86/Kconfig | 8 ++++++++ > arch/x86/kernel/head_64.S | 4 ++-- > arch/x86/xen/Kconfig | 3 ++- > 3 files changed, 12 insertions(+), 3 deletions(-) > > diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig > index eb7f43f23521..fa7cd0305125 100644 > --- a/arch/x86/Kconfig > +++ b/arch/x86/Kconfig > @@ -791,6 +791,14 @@ config KVM_GUEST > underlying device model, the host provides the guest with > timing infrastructure such as time of day, and system time > > +config PVH > + bool "Support for running PVH guests" > + depends on KVM_GUEST || XEN > + def_bool n > + ---help--- > + This option enables the PVH entry point for guest virtual machines > + as specified in the x86/HVM direct boot ABI. > + > config KVM_DEBUG_FS > bool "Enable debug information for KVM Guests in debugfs" > depends on KVM_GUEST && DEBUG_FS > diff --git a/arch/x86/kernel/head_64.S b/arch/x86/kernel/head_64.S > index 0f545b3cf926..fc9f678c6413 100644 > --- a/arch/x86/kernel/head_64.S > +++ b/arch/x86/kernel/head_64.S > @@ -41,7 +41,7 @@ > > #define pud_index(x) (((x) >> PUD_SHIFT) & (PTRS_PER_PUD-1)) > > -#if defined(CONFIG_XEN_PV) || defined(CONFIG_XEN_PVH) > +#if defined(CONFIG_XEN_PV) || defined(CONFIG_PVH) > PGD_PAGE_OFFSET = pgd_index(__PAGE_OFFSET_BASE) > PGD_START_KERNEL = pgd_index(__START_KERNEL_map) > #endif > @@ -387,7 +387,7 @@ NEXT_PAGE(early_dynamic_pgts) > > .data > > -#if defined(CONFIG_XEN_PV) || defined(CONFIG_XEN_PVH) > +#if defined(CONFIG_XEN_PV) || defined(CONFIG_PVH) > NEXT_PGD_PAGE(init_top_pgt) > .quad level3_ident_pgt - __START_KERNEL_map + _KERNPG_TABLE_NOENC > .org init_top_pgt + PGD_PAGE_OFFSET*8, 0 > diff --git a/arch/x86/xen/Kconfig b/arch/x86/xen/Kconfig > index f605825a04ab..021c8591c3c0 100644 > --- a/arch/x86/xen/Kconfig > +++ b/arch/x86/xen/Kconfig > @@ -77,8 +77,9 @@ config XEN_DEBUG_FS > Enabling this option may incur a significant performance overhead. > > config XEN_PVH > - bool "Support for running as a PVH guest" > + bool "Support for running as a Xen PVH guest" > depends on XEN && XEN_PVHVM && ACPI > # Pre-built page tables are not ready to handle 5-level paging. > depends on !X86_5LEVEL Not specific to this patch, but why is this there? PVH is not using PV so there should be no problems with 5 level paging. Juergen, thoughts? > + select PVH > def_bool n > -- > 2.16.1 > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xenproject.org > https://lists.xenproject.org/mailman/listinfo/xen-devel