From: David Vrabel <david.vrabel@citrix.com>
To: Juergen Gross <jgross@suse.com>, <linux-kernel@vger.kernel.org>,
<xen-devel@lists.xensource.com>, <konrad.wilk@oracle.com>,
<boris.ostrovsky@oracle.com>, <jbeulich@suse.com>
Subject: Re: [PATCH 2/3] xen: eliminate scalability issues from initrd handling
Date: Thu, 4 Sep 2014 13:52:15 +0100 [thread overview]
Message-ID: <5408607F.6020108@citrix.com> (raw)
In-Reply-To: <1409834326-29287-3-git-send-email-jgross@suse.com>
On 04/09/14 13:38, Juergen Gross wrote:
> Size restrictions native kernels wouldn't have resulted from the initrd
> getting mapped into the initial mapping. The kernel doesn't really need
> the initrd to be mapped, so use infrastructure available in Xen to avoid
> the mapping and hence the restriction.
[...]
> --- a/arch/x86/xen/enlighten.c
> +++ b/arch/x86/xen/enlighten.c
[...]
> @@ -1667,10 +1668,20 @@ asmlinkage __visible void __init xen_start_kernel(void)
> new_cpu_data.x86_capability[0] = cpuid_edx(1);
> #endif
>
> + if (xen_start_info->mod_start)
> + initrd_start = __pa(xen_start_info->mod_start);
> +#ifdef CONFIG_BLK_DEV_INITRD
> +#ifdef CONFIG_X86_32
> + BUG_ON(xen_start_info->flags & SIF_MOD_START_PFN);
> +#else
> + if (xen_start_info->flags & SIF_MOD_START_PFN)
> + initrd_start = PFN_PHYS(xen_start_info->mod_start);
> +#endif
> +#endif
Remove these unnecessary #ifdefs and the BUG_ON(). We can trust Xen to
not set SIF_MOD_START_PFN if we haven't asked for it.
> --- a/arch/x86/xen/xen-head.S
> +++ b/arch/x86/xen/xen-head.S
> @@ -124,6 +124,9 @@ NEXT_HYPERCALL(arch_6)
> ELFNOTE(Xen, XEN_ELFNOTE_L1_MFN_VALID,
> .quad _PAGE_PRESENT; .quad _PAGE_PRESENT)
> ELFNOTE(Xen, XEN_ELFNOTE_SUSPEND_CANCEL, .long 1)
> +#ifdef CONFIG_X86_64
> + ELFNOTE(Xen, XEN_ELFNOTE_MOD_START_PFN, .long 1)
> +#endif
Why X86_64 only? If there's a good reason the commit message needs to
explain why.
David
WARNING: multiple messages have this Message-ID (diff)
From: David Vrabel <david.vrabel@citrix.com>
To: Juergen Gross <jgross@suse.com>,
linux-kernel@vger.kernel.org, xen-devel@lists.xensource.com,
konrad.wilk@oracle.com, boris.ostrovsky@oracle.com,
jbeulich@suse.com
Subject: Re: [PATCH 2/3] xen: eliminate scalability issues from initrd handling
Date: Thu, 4 Sep 2014 13:52:15 +0100 [thread overview]
Message-ID: <5408607F.6020108@citrix.com> (raw)
In-Reply-To: <1409834326-29287-3-git-send-email-jgross@suse.com>
On 04/09/14 13:38, Juergen Gross wrote:
> Size restrictions native kernels wouldn't have resulted from the initrd
> getting mapped into the initial mapping. The kernel doesn't really need
> the initrd to be mapped, so use infrastructure available in Xen to avoid
> the mapping and hence the restriction.
[...]
> --- a/arch/x86/xen/enlighten.c
> +++ b/arch/x86/xen/enlighten.c
[...]
> @@ -1667,10 +1668,20 @@ asmlinkage __visible void __init xen_start_kernel(void)
> new_cpu_data.x86_capability[0] = cpuid_edx(1);
> #endif
>
> + if (xen_start_info->mod_start)
> + initrd_start = __pa(xen_start_info->mod_start);
> +#ifdef CONFIG_BLK_DEV_INITRD
> +#ifdef CONFIG_X86_32
> + BUG_ON(xen_start_info->flags & SIF_MOD_START_PFN);
> +#else
> + if (xen_start_info->flags & SIF_MOD_START_PFN)
> + initrd_start = PFN_PHYS(xen_start_info->mod_start);
> +#endif
> +#endif
Remove these unnecessary #ifdefs and the BUG_ON(). We can trust Xen to
not set SIF_MOD_START_PFN if we haven't asked for it.
> --- a/arch/x86/xen/xen-head.S
> +++ b/arch/x86/xen/xen-head.S
> @@ -124,6 +124,9 @@ NEXT_HYPERCALL(arch_6)
> ELFNOTE(Xen, XEN_ELFNOTE_L1_MFN_VALID,
> .quad _PAGE_PRESENT; .quad _PAGE_PRESENT)
> ELFNOTE(Xen, XEN_ELFNOTE_SUSPEND_CANCEL, .long 1)
> +#ifdef CONFIG_X86_64
> + ELFNOTE(Xen, XEN_ELFNOTE_MOD_START_PFN, .long 1)
> +#endif
Why X86_64 only? If there's a good reason the commit message needs to
explain why.
David
next prev parent reply other threads:[~2014-09-04 12:52 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-09-04 12:38 [PATCH 0/3] xen: remove memory limits from pv-domains Juergen Gross
2014-09-04 12:38 ` [PATCH 1/3] xen: sync some headers with xen tree Juergen Gross
2014-09-04 12:52 ` Jan Beulich
2014-09-04 12:52 ` Jan Beulich
2014-09-05 8:06 ` Juergen Gross
2014-09-04 12:38 ` [PATCH 2/3] xen: eliminate scalability issues from initrd handling Juergen Gross
2014-09-04 12:52 ` David Vrabel [this message]
2014-09-04 12:52 ` David Vrabel
2014-09-04 14:29 ` Jan Beulich
2014-09-04 14:29 ` Jan Beulich
2014-09-04 14:53 ` [Xen-devel] " David Vrabel
2014-09-04 14:53 ` David Vrabel
2014-09-05 8:04 ` Juergen Gross
2014-09-04 12:38 ` [PATCH 3/3] xen: eliminate scalability issues from initial mapping setup Juergen Gross
2014-09-04 12:59 ` David Vrabel
2014-09-04 12:59 ` David Vrabel
2014-09-04 13:02 ` [Xen-devel] " Andrew Cooper
2014-09-04 13:02 ` Andrew Cooper
2014-09-04 14:31 ` Jan Beulich
2014-09-04 14:31 ` Jan Beulich
2014-09-04 14:43 ` Andrew Cooper
2014-09-04 14:43 ` Andrew Cooper
2014-09-05 7:55 ` Juergen Gross
2014-09-05 9:05 ` Andrew Cooper
2014-09-05 9:05 ` Andrew Cooper
2014-09-05 9:44 ` Juergen Gross
2014-09-04 15:13 ` David Vrabel
2014-09-04 15:13 ` David Vrabel
2014-09-05 8:03 ` Juergen Gross
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5408607F.6020108@citrix.com \
--to=david.vrabel@citrix.com \
--cc=boris.ostrovsky@oracle.com \
--cc=jbeulich@suse.com \
--cc=jgross@suse.com \
--cc=konrad.wilk@oracle.com \
--cc=linux-kernel@vger.kernel.org \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.