Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp3660607ybd; Tue, 25 Jun 2019 06:27:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqxq9I0VWV5GBkiNQyWmXWYv1jhw/9a2AmeuW61njQegXpTPUKqad698bl/x91CKDdpjfh3j X-Received: by 2002:a63:d211:: with SMTP id a17mr38864307pgg.269.1561469276129; Tue, 25 Jun 2019 06:27:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561469276; cv=none; d=google.com; s=arc-20160816; b=Gogubo4bgk89q/eMEARJjHbckAuuHgkG0IjmBBfLobwQAM/vjWlmbaHnRtD/C1ZMTt jr/ofp5oonUuJnoM8GjRfaClI2wv6PPfKAVqFcAK0qY5TI01kh9cv2Gvm5i7/2G1vNP+ K6Dj+lbNWsGxTKGz7mKicBTwDZ4zfZfX0AEg1LX+d3Pgmcqn3MZxXKvV+F3Fn0BfBJxZ i8FziDNAi/Jr8zEBdaOL4ODjk2w8xQ/fweTiOkE6KviYe0H4xRmVJjhFbfkS3Zeh4sHZ WTm8xj3aU4sVpOZAtmuCfhzbvLuAYioeZRHnKmPSyqnwSVun5yG56g3bVX5v1jnN1Bxg Jwzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=xqZuiI9U3qY1Le9cd36jGwaFcdN6+jTRatH4yz354BU=; b=wwkzeo6hDwC6iSdx0AJNhyoMk+B+6J+JehI55tFjBmfInFVrhJuLJ4PEVOqf/WAQ+X i6z4ycVxthDwhAp28Y3AqxXOSgHlwJobhPA9z2IukOyzjQeljgbsFm5yFpBT6ckskeQw OspHBBU+uhJJ7ux8VrSMppz84eqA6ebOfmUsEbRRPGVjfvoW0jqdg0ELi1CBtOKw4bWm V1gPGbNXrz1PuuX6ZLni38/JT6reAgz/z8PosfV7GWQXR91Erid/JsPnSs/lPnQpH+K0 ZI/P1TNCc2tiTBK+Wf9LNQ48mBAUg3rnJxFmG05yhkm0pmRQRK6EvaEufOH1nH2VR74M r9rA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r34si1590876pgl.141.2019.06.25.06.27.40; Tue, 25 Jun 2019 06:27:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728032AbfFYMbH (ORCPT + 99 others); Tue, 25 Jun 2019 08:31:07 -0400 Received: from mx2.suse.de ([195.135.220.15]:46390 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726414AbfFYMbH (ORCPT ); Tue, 25 Jun 2019 08:31:07 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 41B9DAF86; Tue, 25 Jun 2019 12:31:06 +0000 (UTC) Subject: Re: [PATCH v2 5/7] x86/xen: nopv parameter support for HVM guest To: Zhenzhong Duan , linux-kernel@vger.kernel.org Cc: tglx@linutronix.de, mingo@kernel.org, bp@alien8.de, hpa@zytor.com, boris.ostrovsky@oracle.com, sstabellini@kernel.org, peterz@infradead.org, srinivas.eeda@oracle.com, Ingo Molnar , xen-devel@lists.xenproject.org References: <1561377779-28036-1-git-send-email-zhenzhong.duan@oracle.com> <1561377779-28036-6-git-send-email-zhenzhong.duan@oracle.com> From: Juergen Gross Message-ID: <99a28880-c2bf-e328-ee52-afc782af3b74@suse.com> Date: Tue, 25 Jun 2019 14:31:05 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <1561377779-28036-6-git-send-email-zhenzhong.duan@oracle.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 24.06.19 14:02, Zhenzhong Duan wrote: > PVH guest needs PV extentions to work, so nopv parameter is ignored > for PVH but not for HVM guest. > > In order for nopv parameter to take effect for HVM guest, we need to > distinguish between PVH and HVM guest early in hypervisor detection > code. By moving the detection of PVH in xen_platform_hvm(), > xen_pvh_domain() could be used for that purpose. > > Signed-off-by: Zhenzhong Duan > Cc: Boris Ostrovsky > Cc: Juergen Gross > Cc: Stefano Stabellini > Cc: Thomas Gleixner > Cc: Ingo Molnar > Cc: Borislav Petkov > Cc: xen-devel@lists.xenproject.org > --- > arch/x86/xen/enlighten_hvm.c | 18 ++++++++++++------ > 1 file changed, 12 insertions(+), 6 deletions(-) > > diff --git a/arch/x86/xen/enlighten_hvm.c b/arch/x86/xen/enlighten_hvm.c > index 7fcb4ea..26939e7 100644 > --- a/arch/x86/xen/enlighten_hvm.c > +++ b/arch/x86/xen/enlighten_hvm.c > @@ -25,6 +25,7 @@ > #include "mmu.h" > #include "smp.h" > > +extern bool nopv; > static unsigned long shared_info_pfn; > > void xen_hvm_init_shared_info(void) > @@ -226,20 +227,24 @@ static uint32_t __init xen_platform_hvm(void) > if (xen_pv_domain()) > return 0; > > +#ifdef CONFIG_XEN_PVH > + /* Test for PVH domain (PVH boot path taken overrides ACPI flags). */ > + if (!x86_platform.legacy.rtc && x86_platform.legacy.no_vga) > + xen_pvh = true; Sorry, this won't work, as ACPI tables are scanned only some time later. You can test for xen_pvh being true here (for the case where the guest has been booted via the Xen-PVH boot entry) and handle that case, but the case of a PVH guest started via the normal boot entry (like via grub2) and nopv specified is difficult. The only idea I have right now would be to use another struct hypervisor_x86 for that case which will only be used for Xen HVM/PVH _and_ nopv specified. It should be a copy of the bare metal variant, but a special guest_late_init member issuing a big fat warning in case PVH is being detected. Juergen