From: Anthony PERARD <anthony.perard@citrix.com>
To: xen-devel@lists.xen.org
Cc: Anthony PERARD <anthony.perard@citrix.com>
Subject: [RFC PATCH v2 02/16] libxc: Load BIOS and ACPI table into guest memory
Date: Mon, 26 Oct 2015 16:03:03 +0000 [thread overview]
Message-ID: <1445875397-2846-3-git-send-email-anthony.perard@citrix.com> (raw)
In-Reply-To: <1445875397-2846-1-git-send-email-anthony.perard@citrix.com>
... and prepare a cmdline for hvmloader with the order of the modules.
Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
---
tools/libxc/include/xc_dom.h | 4 ++
tools/libxc/xc_dom_hvmloader.c | 44 +++++++++++++++++----
tools/libxc/xc_dom_x86.c | 90 ++++++++++++++++++++++++++++++++++++++++++
3 files changed, 130 insertions(+), 8 deletions(-)
diff --git a/tools/libxc/include/xc_dom.h b/tools/libxc/include/xc_dom.h
index 4939f76..c7003a4 100644
--- a/tools/libxc/include/xc_dom.h
+++ b/tools/libxc/include/xc_dom.h
@@ -203,6 +203,10 @@ struct xc_dom_image {
/* Extra SMBIOS structures passed to HVMLOADER */
struct xc_hvm_firmware_module smbios_module;
+
+ /* BIOS as module */
+ struct xc_hvm_firmware_module bios_module;
+ struct xc_hvm_firmware_module acpi_table_module;
};
/* --- pluggable kernel loader ------------------------------------- */
diff --git a/tools/libxc/xc_dom_hvmloader.c b/tools/libxc/xc_dom_hvmloader.c
index 79a3b99..3987ed8 100644
--- a/tools/libxc/xc_dom_hvmloader.c
+++ b/tools/libxc/xc_dom_hvmloader.c
@@ -129,6 +129,18 @@ static elf_errorstatus xc_dom_parse_hvm_kernel(struct xc_dom_image *dom)
return rc;
}
+static uint64_t module_init(struct xc_hvm_firmware_module *module,
+ uint64_t mstart)
+{
+#define MODULE_ALIGN 1UL << 7
+#define MKALIGN(x, a) (((uint64_t)(x) + (a) - 1) & ~(uint64_t)((a) - 1))
+ if ( module->length != 0 ) {
+ module->guest_addr_out = mstart;
+ return MKALIGN(module->length, MODULE_ALIGN);
+ } else
+ return 0;
+}
+
static int modules_init(struct xc_dom_image *dom,
uint64_t vend, struct elf_binary *elf,
uint64_t *mstart_out, uint64_t *mend_out)
@@ -136,33 +148,47 @@ static int modules_init(struct xc_dom_image *dom,
#define MODULE_ALIGN 1UL << 7
#define MB_ALIGN 1UL << 20
#define MKALIGN(x, a) (((uint64_t)(x) + (a) - 1) & ~(uint64_t)((a) - 1))
- uint64_t total_len = 0, offset1 = 0;
+ uint64_t total_len = 0, offset1 = 0, offset0;
+ uint64_t mstart;
- if ( dom->acpi_module.length == 0 && dom->smbios_module.length == 0 )
- return 0;
+ /* Want to place the modules 1Mb+change behind the loader image. */
+ mstart = MKALIGN(elf->pend, MB_ALIGN) + (MB_ALIGN);
/* Find the total length for the firmware modules with a reasonable large
* alignment size to align each the modules.
*/
- total_len = MKALIGN(dom->acpi_module.length, MODULE_ALIGN);
+ total_len += module_init(&dom->bios_module, mstart + total_len);
+ total_len += module_init(&dom->acpi_table_module, mstart + total_len);
+ offset0 = total_len;
+ total_len += MKALIGN(dom->acpi_module.length, MODULE_ALIGN);
offset1 = total_len;
total_len += MKALIGN(dom->smbios_module.length, MODULE_ALIGN);
- /* Want to place the modules 1Mb+change behind the loader image. */
- *mstart_out = MKALIGN(elf->pend, MB_ALIGN) + (MB_ALIGN);
+ if ( total_len == 0 )
+ return 0;
+
+ *mstart_out = mstart;
*mend_out = *mstart_out + total_len;
if ( *mend_out > vend )
return -1;
if ( dom->acpi_module.length != 0 )
- dom->acpi_module.guest_addr_out = *mstart_out;
+ dom->acpi_module.guest_addr_out = *mstart_out + offset0;
if ( dom->smbios_module.length != 0 )
dom->smbios_module.guest_addr_out = *mstart_out + offset1;
return 0;
}
+static void loadmodule(struct xc_hvm_firmware_module *module,
+ uint8_t *dest, uint64_t mstart)
+{
+ if ( module->length != 0 )
+ memcpy(dest + (module->guest_addr_out - mstart),
+ module->data, module->length);
+}
+
static int loadmodules(struct xc_dom_image *dom,
uint64_t mstart, uint64_t mend,
uint32_t domid)
@@ -201,9 +227,11 @@ static int loadmodules(struct xc_dom_image *dom,
memset(dest, 0, pages << PAGE_SHIFT);
/* Load modules into range */
+ loadmodule(&dom->bios_module, dest, mstart);
+ loadmodule(&dom->acpi_table_module, dest, mstart);
if ( dom->acpi_module.length != 0 )
{
- memcpy(dest,
+ memcpy(dest + (dom->acpi_module.guest_addr_out - mstart),
dom->acpi_module.data,
dom->acpi_module.length);
}
diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
index c3bb7a3..2444cc2 100644
--- a/tools/libxc/xc_dom_x86.c
+++ b/tools/libxc/xc_dom_x86.c
@@ -511,6 +511,27 @@ static void build_hvm_info(void *hvm_info_page, struct xc_dom_image *dom)
hvm_info->checksum = -sum;
}
+static void add_module_to_list(struct xc_hvm_firmware_module *module,
+ const char *name, char *cmdline, size_t n,
+ struct hvm_modlist_entry *modlist,
+ size_t modlist_size, int *module_nr)
+{
+ if ( module->length == 0 )
+ return;
+
+ /* assert(*module_nr < modlist_size); */
+
+ if ( *module_nr == 0 )
+ strcat(cmdline, "modules=");
+ else
+ strcat(cmdline, ",");
+ strcat(cmdline, name);
+
+ modlist[*module_nr].paddr = module->guest_addr_out;
+ modlist[*module_nr].size = module->length;
+ (*module_nr)++;
+}
+
static int alloc_magic_pages_hvm(struct xc_dom_image *dom)
{
unsigned long i;
@@ -627,6 +648,75 @@ static int alloc_magic_pages_hvm(struct xc_dom_image *dom)
}
else
{
+ struct xc_dom_seg seg;
+ struct hvm_start_info *start_info;
+ char *cmdline;
+ struct hvm_modlist_entry *modlist;
+ void *start_page;
+ size_t cmdline_size;
+ size_t start_info_size = sizeof(*start_info);
+
+ char cmdline_new[MAX_GUEST_CMDLINE];
+ int module_nr = 0;
+
+ struct hvm_modlist_entry modlist_building[4];
+
+ cmdline_new[0] = '\0';
+ add_module_to_list(&dom->bios_module, "bios",
+ cmdline_new, MAX_GUEST_CMDLINE,
+ modlist_building, ARRAY_SIZE(modlist_building),
+ &module_nr);
+ add_module_to_list(&dom->acpi_table_module, "acpi_table",
+ cmdline_new, MAX_GUEST_CMDLINE,
+ modlist_building, ARRAY_SIZE(modlist_building),
+ &module_nr);
+
+ start_info_size += sizeof(*modlist) * module_nr;
+ cmdline_size = ROUNDUP(strlen(cmdline_new) + 1, 8);
+ start_info_size += cmdline_size;
+
+ rc = xc_dom_alloc_segment(dom, &seg, "HVMlite start info", 0,
+ start_info_size);
+ if ( rc != 0 )
+ {
+ DOMPRINTF("Unable to reserve memory for the start info");
+ goto out;
+ }
+
+ start_page = xc_map_foreign_range(xch, domid, start_info_size,
+ PROT_READ | PROT_WRITE,
+ seg.pfn);
+ if ( start_page == NULL )
+ {
+ DOMPRINTF("Unable to map HVM start info page");
+ goto error_out;
+ }
+
+ start_info = start_page;
+ cmdline = start_page + sizeof(*start_info);
+ modlist = start_page + sizeof(*start_info) + cmdline_size;
+
+ if ( cmdline_size )
+ {
+ strncpy(cmdline, cmdline_new, MAX_GUEST_CMDLINE);
+ cmdline[MAX_GUEST_CMDLINE - 1] = '\0';
+ start_info->cmdline_paddr = (seg.pfn << PAGE_SHIFT) +
+ ((xen_pfn_t)cmdline - (xen_pfn_t)start_info);
+ }
+
+ start_info->nr_modules = module_nr;
+ if ( start_info->nr_modules != 0 ) {
+ memcpy(modlist, modlist_building, sizeof(*modlist) * module_nr);
+ start_info->modlist_paddr = (seg.pfn << PAGE_SHIFT) +
+ ((xen_pfn_t)modlist - (xen_pfn_t)start_info);
+ }
+
+ start_info->magic = HVM_START_MAGIC_VALUE;
+
+ munmap(start_page, start_info_size);
+
+ dom->start_info_pfn = seg.pfn;
+
/*
* Allocate and clear additional ioreq server pages. The default
* server will use the IOREQ and BUFIOREQ special pages above.
--
Anthony PERARD
next prev parent reply other threads:[~2015-10-26 16:03 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-10-26 16:03 [RFC PATCH v2 00/16] Load BIOS via toolstack instead of been embedded in hvmloader Anthony PERARD
2015-10-26 16:03 ` [RFC PATCH v2 01/16] hvmloader: Fix scratch_alloc to avoid overlaps Anthony PERARD
2015-11-03 17:38 ` Ian Campbell
2015-11-10 16:29 ` Jan Beulich
2015-10-26 16:03 ` Anthony PERARD [this message]
2015-11-03 17:45 ` [RFC PATCH v2 02/16] libxc: Load BIOS and ACPI table into guest memory Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 03/16] configure: #define SEABIOS_PATH and OVMF_PATH Anthony PERARD
2015-11-04 10:24 ` Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 04/16] firmware/makefile: install BIOS and ACPI blob Anthony PERARD
2015-11-04 10:35 ` Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 05/16] libxl: Load guest BIOS from file Anthony PERARD
2015-11-04 10:51 ` Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 06/16] libxl: Load guest ACPI table " Anthony PERARD
2015-11-04 10:57 ` Ian Campbell
2015-12-18 14:43 ` Anthony PERARD
2015-10-26 16:03 ` [RFC PATCH v2 07/16] hvmloader: Grab the hvmlite info page and parse the cmdline Anthony PERARD
2015-11-04 10:39 ` Andrew Cooper
2015-11-04 11:02 ` Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 08/16] hvmloader: Locate the BIOS blob Anthony PERARD
2015-11-04 11:05 ` Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 09/16] hvmloader: Load SeaBIOS from hvm_start_info modules Anthony PERARD
2015-11-04 11:11 ` Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 10/16] hvmloader: Load OVMF from modules Anthony PERARD
2015-11-04 11:15 ` Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 11/16] hvmloader: No BIOS ROM image allowed to be compiled in Anthony PERARD
2015-11-04 11:17 ` Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 12/16] hvmloader: Load ACPI tables from hvm_start_info module Anthony PERARD
2015-11-04 11:20 ` Ian Campbell
2015-10-26 16:03 ` [RFC PATCH v2 13/16] hvmloader/makefile: Compile out SeaBIOS and OVMF ROM blob Anthony PERARD
2015-10-26 16:03 ` [RFC PATCH v2 14/16] hvmloader: Always build-in SeaBIOS and OVMF loader Anthony PERARD
2015-10-26 16:03 ` [RFC PATCH v2 15/16] hvmloader: Compile out the qemu-xen ACPI tables Anthony PERARD
2015-10-26 16:03 ` [RFC PATCH v2 16/16] hvmloader: do not depend on SEABIOS_PATH or OVMF_PATH Anthony PERARD
2015-11-03 17:30 ` [RFC PATCH v2 00/16] Load BIOS via toolstack instead of been embedded in hvmloader Ian Campbell
2015-11-03 17:50 ` Anthony PERARD
2015-11-04 10:18 ` Ian Campbell
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1445875397-2846-3-git-send-email-anthony.perard@citrix.com \
--to=anthony.perard@citrix.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).