Received: by 10.223.164.202 with SMTP id h10csp1522378wrb; Wed, 8 Nov 2017 05:40:02 -0800 (PST) X-Google-Smtp-Source: ABhQp+TrFwGskTay8lxhoL3vyOUwy03H40RY27Vg2EG24XicWE2kzFBSAz+Hnm50URTOyr07nCYy X-Received: by 10.99.121.69 with SMTP id u66mr511859pgc.193.1510148402255; Wed, 08 Nov 2017 05:40:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1510148402; cv=none; d=google.com; s=arc-20160816; b=yTOU1Zpd304ODtVYG1BvanjeRVEcoPbThUVdoHgnRmyPAhYXW+e2gcTbkMQ0sIcxcr 1Fsf/dMZfczhYmMD7sy70+AwkiI1VQ2ufToTTnd7ZYDsv4kMkroFGIxyZPs4+77YUu/y bFVEI2hE6SEAvQcP638TagiI6EK3qvLWkJYHjA+ap3nxHK3jml1p1ehDFcjtzTdDgNW2 TLa+/HGd8rZMRwlawkvkqUKprAqdFXjR6QadE0HCEW4zqZQl2RVdpY6ZMz3VS8E3nB+A 2h/5cAogFHcjVDPNTFBJIfVPfZAqTFRlm8sV1UURMqpyZor7sIJ3kM3RE536MhIas/4H EwRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject:arc-authentication-results; bh=pVL/Lv2MsmWqAN//LkSabEk8lpR6lGtrnj39SLJfMlg=; b=cyJkHCSKjkIU+NrF1Q2e35xgTdYacBRYljOZc97sYsOq/+fjclakBfVTl96wc2Daqi DNYROH6kzlfnXhCiLnE2H0grHLE1InydVcNkCHc5/briFJmfD07tiyAB3JjBLg/pPsQQ HYU0DxR05knwhRgUpm236xpefPNQc3iD4UGhOExv46kNouBEf2ZduOEcrN+V5km1BEIJ +adwFsKeUgPyT5zYaIxySbMhzOJVT319rmmefTyTvhM+XfI0hysMjiE5vde7j5mSSSDk zrsM6QMmDeSKmc2kvHlgcMMrIHZw2xKtJJaI3d/VupHCh9GQBLj6cu8d6Lz/AVEXjYfW eDVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j13si3803906pgf.700.2017.11.08.05.39.50; Wed, 08 Nov 2017 05:40:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752703AbdKHNhR (ORCPT + 82 others); Wed, 8 Nov 2017 08:37:17 -0500 Received: from userp1040.oracle.com ([156.151.31.81]:24118 "EHLO userp1040.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752589AbdKHNhO (ORCPT ); Wed, 8 Nov 2017 08:37:14 -0500 Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by userp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id vA8DaJoM015503 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 8 Nov 2017 13:36:19 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id vA8DaIIG032133 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 8 Nov 2017 13:36:18 GMT Received: from abhmp0002.oracle.com (abhmp0002.oracle.com [141.146.116.8]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id vA8DaHlP019729; Wed, 8 Nov 2017 13:36:17 GMT Received: from dhcp-burlington7-2nd-B-east-10-152-55-162.usdhcp.oraclecorp.com (/10.152.32.65) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 08 Nov 2017 05:36:17 -0800 Subject: Re: [PATCH 0/3] x86/xen: support booting PVH guest via standard boot path To: Juergen Gross , linux-kernel@vger.kernel.org, x86@kernel.org, kvm@vger.kernel.org, xen-devel@lists.xenproject.org References: <20171108090739.26491-1-jgross@suse.com> Cc: tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, pbonzini@redhat.com, rkrcmar@redhat.com, rjw@rjwysocki.net, len.brown@intel.com, pavel@ucw.cz From: Boris Ostrovsky Message-ID: <875b3992-c797-b109-6eb2-819e52811eca@oracle.com> Date: Wed, 8 Nov 2017 08:37:47 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <20171108090739.26491-1-jgross@suse.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-Source-IP: aserv0022.oracle.com [141.146.126.234] Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/08/2017 04:07 AM, Juergen Gross wrote: > Booting a Xen PVH guest requires a special boot entry as it is > mandatory to setup some Xen-specific interfaces rather early. When grub > or OVMF are used as boot loaders, however, those will fill the boot > parameters in zeropage and there is no longer a need to do something > PVH specific in the early boot path. > > This patch series adds support for that scenario by identifying PVH > environment and doing the required init steps via Xen hooks instead of > using a dedicated boot entry. > > The dedicated entry is still needed for support of Dom0 running in PVH > mode as in this case there is no grub or OVMF involved for filling in > the boot parameters. We are going to continue supporting direct boot of unprivileged guests too so this entry point will be needed not for dom0 only. -boris > > Juergen Gross (3): > x86/acpi: add test for ACPI_FADT_NO_VGA > x86: add guest_late_init hook to hypervisor_x86 structure > x86/xen: use guest_late_init to detect Xen PVH guest > > arch/x86/include/asm/hypervisor.h | 11 +++++++++++ > arch/x86/include/asm/kvm_para.h | 2 -- > arch/x86/include/asm/x86_init.h | 1 + > arch/x86/kernel/acpi/boot.c | 5 +++++ > arch/x86/kernel/kvm.c | 3 ++- > arch/x86/kernel/setup.c | 2 +- > arch/x86/xen/enlighten_hvm.c | 24 ++++++++++++++++++++++-- > arch/x86/xen/enlighten_pvh.c | 9 --------- > 8 files changed, 42 insertions(+), 15 deletions(-) > From 1583488333263511437@xxx Wed Nov 08 09:09:13 +0000 2017 X-GM-THRID: 1583488333263511437 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread