From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
To: "Roger Pau Monné" <roger.pau@citrix.com>,
"Maran Wilson" <maran.wilson@oracle.com>
Cc: anthony.perard@citrix.com, wei.liu2@citrix.com,
ian.jackson@eu.citrix.com, Jonathan.Ludlam@eu.citrix.com,
xen-devel@lists.xen.org
Subject: Re: [PATCH v4 4/4] libxc: Pass e820 map to HVM/PVH guests via hvm_start_info
Date: Wed, 21 Mar 2018 09:37:09 -0400 [thread overview]
Message-ID: <7473f125-6b4f-a93f-0f58-1b9084bea015@oracle.com> (raw)
In-Reply-To: <20180321100716.4ghjkrdvg6dbzqwv@MacBook-Pro-de-Roger.local>
On 03/21/2018 06:07 AM, Roger Pau Monné wrote:
> On Tue, Mar 20, 2018 at 09:50:52AM -0700, Maran Wilson wrote:
>> From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
>>
>> Signed-off-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
>> Signed-off-by: Maran Wilson <maran.wilson@oracle.com>
>> ---
>> tools/libxc/xc_dom_x86.c | 29 ++++++++++++++++++++++++++++-
>> 1 file changed, 28 insertions(+), 1 deletion(-)
>>
>> diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
>> index 0b65dab..b2d8403 100644
>> --- a/tools/libxc/xc_dom_x86.c
>> +++ b/tools/libxc/xc_dom_x86.c
>> @@ -35,6 +35,8 @@
>> #include <xen/arch-x86/hvm/start_info.h>
>> #include <xen/io/protocols.h>
>>
>> +#include <xen-tools/libs.h>
>> +
>> #include "xg_private.h"
>> #include "xc_dom.h"
>> #include "xenctrl.h"
>> @@ -640,6 +642,8 @@ static int alloc_magic_pages_hvm(struct xc_dom_image *dom)
>> dom->cmdline_size = ROUNDUP(strlen(dom->cmdline) + 1, 8);
>> start_info_size += dom->cmdline_size;
>> }
>> +
>> + start_info_size += dom->e820_entries * sizeof(*(dom->e820));
> This is not correct because sizeof(struct e820entry) != sizeof(struct
> hvm_modlist_entry) AFAICT. This should instead be sizeof(struct
> hvm_modlist_entry).
The area for modlist is calculated above:
start_info_size +=
sizeof(struct hvm_modlist_entry) * HVMLOADER_MODULE_MAX_COUNT;
(What I should do though is move this from under 'if (
!dom->device_model )', now that we are providing this data to both HVM
and PVH guests.
>
>> }
>> else
>> {
>> @@ -1666,8 +1670,9 @@ static int bootlate_hvm(struct xc_dom_image *dom)
>> uint32_t domid = dom->guest_domid;
>> xc_interface *xch = dom->xch;
>> struct hvm_start_info *start_info;
>> - size_t start_info_size;
>> + size_t start_info_size, modsize;
>> struct hvm_modlist_entry *modlist;
>> + struct hvm_memmap_table_entry *memmap;
>> unsigned int i;
>>
>> start_info_size = sizeof(*start_info) + dom->cmdline_size;
>> @@ -1731,7 +1736,29 @@ static int bootlate_hvm(struct xc_dom_image *dom)
>> ((uintptr_t)modlist - (uintptr_t)start_info);
>> }
>>
>> + /*
>> + * Check a couple of XEN_HVM_MEMMAP_TYPEs to verify consistency with
>> + * their corresponding e820 numerical values.
>> + */
>> + BUILD_BUG_ON(XEN_HVM_MEMMAP_TYPE_RAM != E820_RAM);
>> + BUILD_BUG_ON(XEN_HVM_MEMMAP_TYPE_ACPI != E820_ACPI);
>> +
>> + modsize = HVMLOADER_MODULE_MAX_COUNT *
>> + (sizeof(*modlist) + HVMLOADER_MODULE_CMDLINE_SIZE);
> Hm, I'm not sure this is fully correct, but I think there are previous
> issues in this area.
>
> The mapped area (start_info) is of size sizeof(*start_info) +
> dom->cmdline_size + sizeof(struct hvm_modlist_entry) *
> dom->num_modules. Yet here you seem to assume num_modules ==
> HVMLOADER_MODULE_MAX_COUNT?
Yes, see my response above. We've already allocated the segment to
accommodate HVMLOADER_MODULE_MAX_COUNT entries. Which may indeed be an
overkill.
>
> Also the initial space calculation doesn't seem to take
> HVMLOADER_MODULE_CMDLINE_SIZE into account at all.
modlist's offset is calculated with commandline's size in mind:
modlist = (void*)(start_info + 1) + dom->cmdline_size;
>
> And cmdline_paddr seems to be set to point to garbage if cmdline is not
> set.
Isn't the hvm_start_info set to zero when allocated?
-boris
>
> Or am I missing something?
>
> Adding Jonathan Ludlam and Anthony PERARD who are the ones that added
> this code.
>
> Thanks, Roger.
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2018-03-21 13:37 UTC|newest]
Thread overview: 44+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-03-15 21:33 [PATCH v3 0/4] x86/PVHv2: Add memory map pointer to hvm_start_info struct Maran Wilson
2018-03-15 21:33 ` [PATCH v3 1/4] " Maran Wilson
2018-03-16 11:02 ` Jan Beulich
2018-03-16 11:11 ` Roger Pau Monné
2018-03-16 11:29 ` Jan Beulich
2018-03-16 11:37 ` Roger Pau Monné
2018-03-16 11:48 ` Jan Beulich
2018-03-16 11:58 ` Roger Pau Monné
2018-03-16 12:05 ` Juergen Gross
2018-03-16 12:25 ` Jan Beulich
2018-03-16 17:00 ` Maran Wilson
2018-03-16 17:59 ` Roger Pau Monné
2018-03-20 16:05 ` Konrad Rzeszutek Wilk
2018-03-15 21:35 ` [PATCH v3 2/4] libxl: Move libxl__arch_domain_construct_memmap() earlier Maran Wilson
2018-03-16 18:12 ` Roger Pau Monné
2018-03-16 18:34 ` Boris Ostrovsky
2018-03-15 21:35 ` [PATCH v3 3/4] libxl: Store PVH guest's e820 map in xc_dom_image Maran Wilson
2018-03-16 18:20 ` Roger Pau Monné
2018-03-16 18:44 ` Boris Ostrovsky
2018-03-15 21:35 ` [PATCH v3 4/4] libxc: Pass e820 map to PVH guest via hvm_start_info Maran Wilson
2018-03-16 18:29 ` Roger Pau Monné
2018-03-21 16:00 ` Wei Liu
2018-03-20 16:48 ` [PATCH v4 0/4] x86/PVHv2: Add memory map pointer to hvm_start_info struct Maran Wilson
2018-03-20 16:48 ` [PATCH v4 1/4] " Maran Wilson
2018-03-20 17:03 ` Jan Beulich
2018-03-21 9:28 ` Roger Pau Monné
2018-03-21 9:40 ` Juergen Gross
2018-03-21 16:46 ` Maran Wilson
2018-03-21 16:48 ` Juergen Gross
2018-03-21 16:58 ` Roger Pau Monné
2018-03-20 16:50 ` [PATCH v4 2/4] libxl/x86: Build e820 map earlier for HVM/PVH guests Maran Wilson
2018-03-21 9:37 ` Roger Pau Monné
2018-03-21 17:49 ` Wei Liu
2018-03-21 17:56 ` Boris Ostrovsky
2018-03-20 16:50 ` [PATCH v4 3/4] libxl: Store e820 map in xc_dom_image Maran Wilson
2018-03-21 9:42 ` Roger Pau Monné
2018-03-21 13:26 ` Boris Ostrovsky
2018-03-20 16:50 ` [PATCH v4 4/4] libxc: Pass e820 map to HVM/PVH guests via hvm_start_info Maran Wilson
2018-03-21 10:07 ` Roger Pau Monné
2018-03-21 13:37 ` Boris Ostrovsky [this message]
2018-03-21 14:18 ` Roger Pau Monné
2018-03-21 17:53 ` Boris Ostrovsky
2018-03-22 9:15 ` Roger Pau Monné
2018-03-28 11:05 ` Wei Liu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7473f125-6b4f-a93f-0f58-1b9084bea015@oracle.com \
--to=boris.ostrovsky@oracle.com \
--cc=Jonathan.Ludlam@eu.citrix.com \
--cc=anthony.perard@citrix.com \
--cc=ian.jackson@eu.citrix.com \
--cc=maran.wilson@oracle.com \
--cc=roger.pau@citrix.com \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).