[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v5 01/14] libxc: Rework extra module initialisation



On Fri, Jul 08, 2016 at 11:52:08AM +0100, Anthony PERARD wrote:
> On Thu, Jul 07, 2016 at 03:55:23PM +0100, Wei Liu wrote:
> > On Wed, Jun 22, 2016 at 06:15:32PM +0100, Anthony PERARD wrote:
> > > This patch use xc_dom_alloc_segment() to allocate the memory space for the
> > > ACPI modules and the SMBIOS modules. This is to replace the arbitrary
> > > placement of 1MB (+ extra for MB alignement) after the hvmloader image.
> > > 
> > > This patch can help if one add extra ACPI table and hvmloader contain
> > > OVMF (OVMF is a 2MB binary), as in that case the extra ACPI table could
> > > easily be loaded past the address 4MB, but hvmloader use a range of
> > > memory from 4MB to 10MB to perform tests and in the process, clears the
> > > memory, before loading the modules.
> > > 
> > > Signed-off-by: Anthony PERARD <anthony.perard@xxxxxxxxxx>
> > > ---
> > > Changes in V5:
> > > - rewrite patch description
> > > 
> > > Changes in V4:
> > > - check that guest_addr_out have a reasonable value.
> > > 
> > > New patch in V3.
> > > ---
> > >  tools/libxc/xc_dom_hvmloader.c | 131 
> > > ++++++++++++-----------------------------
> > >  1 file changed, 38 insertions(+), 93 deletions(-)
> > > 
> > > diff --git a/tools/libxc/xc_dom_hvmloader.c 
> > > b/tools/libxc/xc_dom_hvmloader.c
> > > index 330d5e8..da8b995 100644
> > > --- a/tools/libxc/xc_dom_hvmloader.c
> > > +++ b/tools/libxc/xc_dom_hvmloader.c
> > > @@ -129,98 +129,52 @@ static elf_errorstatus 
> > > xc_dom_parse_hvm_kernel(struct xc_dom_image *dom)
> > >      return rc;
> > >  }
> > >  
> > > -static int modules_init(struct xc_dom_image *dom,
> > > -                        uint64_t vend, struct elf_binary *elf,
> > > -                        uint64_t *mstart_out, uint64_t *mend_out)
> > > +static int module_init_one(struct xc_dom_image *dom,
> > > +                           struct xc_hvm_firmware_module *module,
> > > +                           char *name)
> > >  {
> > > -#define MODULE_ALIGN 1UL << 7
> > > -#define MB_ALIGN     1UL << 20
> > > -#define MKALIGN(x, a) (((uint64_t)(x) + (a) - 1) & ~(uint64_t)((a) - 1))
> > > -    uint64_t total_len = 0, offset1 = 0;
> > > +    struct xc_dom_seg seg;
> > > +    void *dest;
> > >  
> > > -    if ( dom->acpi_module.length == 0 && dom->smbios_module.length == 0 )
> > > -        return 0;
> > > -
> > > -    /* Find the total length for the firmware modules with a reasonable 
> > > large
> > > -     * alignment size to align each the modules.
> > > -     */
> > > -    total_len = MKALIGN(dom->acpi_module.length, MODULE_ALIGN);
> > > -    offset1 = total_len;
> > > -    total_len += MKALIGN(dom->smbios_module.length, MODULE_ALIGN);
> > > -
> > > -    /* Want to place the modules 1Mb+change behind the loader image. */
> > > -    *mstart_out = MKALIGN(elf->pend, MB_ALIGN) + (MB_ALIGN);
> > > -    *mend_out = *mstart_out + total_len;
> > > -
> > > -    if ( *mend_out > vend )
> > > -        return -1;
> > > -
> > > -    if ( dom->acpi_module.length != 0 )
> > > -        dom->acpi_module.guest_addr_out = *mstart_out;
> > > -    if ( dom->smbios_module.length != 0 )
> > > -        dom->smbios_module.guest_addr_out = *mstart_out + offset1;
> > > +    if ( module->length )
> > > +    {
> > > +        if ( xc_dom_alloc_segment(dom, &seg, name, 0, module->length) )
> > > +            goto err;
> > > +        dest = xc_dom_seg_to_ptr(dom, &seg);
> > > +        if ( dest == NULL )
> > > +        {
> > > +            DOMPRINTF("%s: xc_dom_seg_to_ptr(dom, &seg) => NULL",
> > > +                      __FUNCTION__);
> > > +            goto err;
> > > +        }
> > > +        memcpy(dest, module->data, module->length);
> > > +        module->guest_addr_out = seg.vstart;
> > > +        if ( module->guest_addr_out > UINT32_MAX ||
> > > +             module->guest_addr_out + module->length > UINT32_MAX )
> > > +        {
> > > +            DOMPRINTF("%s: Module %s would be loaded abrove 4GB",
> > > +                      __FUNCTION__, name);
> > > +            goto err;
> > > +        }
> > 
> > One question:
> > 
> > Can this check also account for MMIO hole below 4G? Maybe use
> > dom->mmio_size?
> 
> Yes, I guess I can check against dom->mmio_start. Should I also check
> that mmio_start have reasonable value? (<4G, and not 0x0) Or is
> mmio_start is already supposed to have a good value?
> 

mmio_start should already have a sane value here -- or at least I hope
so. The sanity of mmio_start should be checked where it is assigned.

Wei.

> > Other than this, this patch looks good.
> 
> Thanks,
> 
> -- 
> Anthony PERARD

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.