Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp584037imm; Fri, 8 Jun 2018 01:42:05 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIXvvG8oIXG2IV6x9Y3+qleOYdyAu1v2FhliK3+a0LCZHtJ3QjxupAXF6YoG7Yrsh1LteXZ X-Received: by 2002:a62:f248:: with SMTP id y8-v6mr5095080pfl.217.1528447325517; Fri, 08 Jun 2018 01:42:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528447325; cv=none; d=google.com; s=arc-20160816; b=P6pIT6R8VphDr+tcqs2983x3c65FlWvfAK0H6k8W8ZMr8Ttf8o8es984GQfoFO8YBI Z/pS+hfScfECO74iJE6mUblTDZ64rVyLoZVrIZd4JoonLjaR8rPiIhLsobk5NB8p920C y82HBEjt++SQc3t2FjHuED5L1IAkF/wZIA61YzPUp6+/55AvBSWirIcYsvRc8iAk3+KB eKVMhUfdXaWJ7jAzXLHokKUg+sFqOwS99YvKN9yt9Cr4UZVsaZBs9ZlLBR+eIItYB+Bz WZ8JuHBDVSYBQyzumRE1RyR5pUx+xjuOVxhrmMH2uJrlZmEY6dD4Y6UT6VCcd1n7NtO/ ic+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:arc-authentication-results; bh=zvRgplo4qk2rdLfmyorvD97UaVNMqdHhCEFHGSSbx+8=; b=gV/+Yv53Lp9PQnHb8FBiD1qEMx/PFSHrmlRJDDL1MYsVWO0fDxPuKSz9T/4mRQzW29 Zz3PesU4NMo7gXo5KHK2zlz4WLpbMn0YfWTdswr5+LLyh0drMH298wROl7kYnwKSu8Jw YQoCN7v3nr3AAyanoBRZ9RxBb08TJtEkyEZti5kczKyMZF6PXzEcxIAHU4T/DaEdLQs+ za14jgIrh8YftHi10OCZMR/zNwf94tibWe5PxQ0Fp0C5XyQAjgbhqhqCHrmJOj/TarDV KYQTld23nDnLX2lAgO/EOdALGlqfLPumOqY/2pnHUFsIoo9K7c+77s3w3Ty7OgNiGl2k Zd0w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bd3-v6si13351476plb.171.2018.06.08.01.41.51; Fri, 08 Jun 2018 01:42:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752853AbeFHIlH (ORCPT + 99 others); Fri, 8 Jun 2018 04:41:07 -0400 Received: from smtp03.citrix.com ([162.221.156.55]:30799 "EHLO SMTP03.CITRIX.COM" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751504AbeFHIlF (ORCPT ); Fri, 8 Jun 2018 04:41:05 -0400 X-IronPort-AV: E=Sophos;i="5.49,490,1520899200"; d="scan'208";a="56728908" From: Roger Pau Monne To: CC: Roger Pau Monne , Boris Ostrovsky , Juergen Gross , Stefano Stabellini , Subject: [PATCH v3] xen: share start flags between PV and PVH Date: Fri, 8 Jun 2018 10:40:38 +0200 Message-ID: <20180608084038.19344-1-roger.pau@citrix.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Use a global variable to store the start flags for both PV and PVH. This allows the xen_initial_domain macro to work properly on PVH. Note that ARM is also switched to use the new variable. Signed-off-by: Boris Ostrovsky Signed-off-by: Roger Pau Monné --- Cc: Boris Ostrovsky Cc: Juergen Gross Cc: Stefano Stabellini Cc: xen-devel@lists.xenproject.org --- Changes since v2: - Declare xen_start_flags outside of the XEN_DOM0 guard and include types.h. Changes since v1: - Switch ARM to also use the new xen_start_flags. --- arch/arm/xen/enlighten.c | 7 ++++--- arch/x86/xen/enlighten.c | 7 +++++++ arch/x86/xen/enlighten_pv.c | 1 + arch/x86/xen/enlighten_pvh.c | 1 + include/xen/xen.h | 6 +++++- 5 files changed, 18 insertions(+), 4 deletions(-) diff --git a/arch/arm/xen/enlighten.c b/arch/arm/xen/enlighten.c index ba7f4c8f5c3e..a99d5edf7bdf 100644 --- a/arch/arm/xen/enlighten.c +++ b/arch/arm/xen/enlighten.c @@ -59,6 +59,9 @@ struct xen_memory_region xen_extra_mem[XEN_EXTRA_MEM_MAX_REGIONS] __initdata; static __read_mostly unsigned int xen_events_irq; +uint32_t xen_start_flags; +EXPORT_SYMBOL(xen_start_flags); + int xen_remap_domain_gfn_array(struct vm_area_struct *vma, unsigned long addr, xen_pfn_t *gfn, int nr, @@ -282,9 +285,7 @@ void __init xen_early_init(void) xen_setup_features(); if (xen_feature(XENFEAT_dom0)) - xen_start_info->flags |= SIF_INITDOMAIN|SIF_PRIVILEGED; - else - xen_start_info->flags &= ~(SIF_INITDOMAIN|SIF_PRIVILEGED); + xen_start_flags |= SIF_INITDOMAIN|SIF_PRIVILEGED; if (!console_set_on_cmdline && !xen_initial_domain()) add_preferred_console("hvc", 0, NULL); diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c index c9081c6671f0..3b5318505c69 100644 --- a/arch/x86/xen/enlighten.c +++ b/arch/x86/xen/enlighten.c @@ -64,6 +64,13 @@ struct shared_info xen_dummy_shared_info; __read_mostly int xen_have_vector_callback; EXPORT_SYMBOL_GPL(xen_have_vector_callback); +/* + * NB: needs to live in .data because it's used by xen_prepare_pvh which runs + * before clearing the bss. + */ +uint32_t xen_start_flags __attribute__((section(".data"))) = 0; +EXPORT_SYMBOL(xen_start_flags); + /* * Point at some empty memory to start with. We map the real shared_info * page as soon as fixmap is up and running. diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c index 357969a3697c..8d4e2e1ae60b 100644 --- a/arch/x86/xen/enlighten_pv.c +++ b/arch/x86/xen/enlighten_pv.c @@ -1203,6 +1203,7 @@ asmlinkage __visible void __init xen_start_kernel(void) return; xen_domain_type = XEN_PV_DOMAIN; + xen_start_flags = xen_start_info->flags; xen_setup_features(); diff --git a/arch/x86/xen/enlighten_pvh.c b/arch/x86/xen/enlighten_pvh.c index aa1c6a6831a9..c85d1a88f476 100644 --- a/arch/x86/xen/enlighten_pvh.c +++ b/arch/x86/xen/enlighten_pvh.c @@ -97,6 +97,7 @@ void __init xen_prepare_pvh(void) } xen_pvh = 1; + xen_start_flags = pvh_start_info.flags; msr = cpuid_ebx(xen_cpuid_base() + 2); pfn = __pa(hypercall_page); diff --git a/include/xen/xen.h b/include/xen/xen.h index 9d4340c907d1..1e1d9bd0bd37 100644 --- a/include/xen/xen.h +++ b/include/xen/xen.h @@ -25,12 +25,16 @@ extern bool xen_pvh; #define xen_hvm_domain() (xen_domain_type == XEN_HVM_DOMAIN) #define xen_pvh_domain() (xen_pvh) +#include + +extern uint32_t xen_start_flags; + #ifdef CONFIG_XEN_DOM0 #include #include #define xen_initial_domain() (xen_domain() && \ - xen_start_info && xen_start_info->flags & SIF_INITDOMAIN) + (xen_start_flags & SIF_INITDOMAIN)) #else /* !CONFIG_XEN_DOM0 */ #define xen_initial_domain() (0) #endif /* CONFIG_XEN_DOM0 */ -- 2.17.1