[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 7/9] xen/x86: hook up xen_banner() also for PVH


  • To: Juergen Gross <jgross@xxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Thu, 23 Sep 2021 17:31:57 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=9kXcq69D0bXdw3pbsqlftrpFQJqP372BXXSOWoCFpws=; b=G3X6L+wGTWRXPIn9J2uT2xsjoujoDFJwbeQZw2E2tTHCkjjY4M3m24Ph4o72EnKX5zaGXHKi2aRljbV00PAtG1tkMBEzs6QsW7WlyAfPSkrarAkNJVZskxgveawTC12Qs7yrZPcjhKQwaYAlDPdXALvnQDha7BA7bNDDJ/y1b2YckvQyFRw9gNlRb5nMDV4mlGTcxHsYijKcmI2x1y0Zd+Oo1GbqTP3phiokMLLbKXhnoqjRcUjc/R4VZmP11tykLZ2BUqAOG3Gg5C8ySjkqfQKt9LLnFOiK6/z3sBfWAx7qqjcVy2tpZj1hUXAOSEOQbe+xrj+NCN9ovC/JKjBJwg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NJyMLl9S4u2ce2KlGq/i+WrRjis1fO+Ebw3fJtmyMLNfRMgd55uc2Np/KNSIYqZZIILSNIgaNt2PMuZTC4m1QPN4N4SLVipPxudOT3XSnHgXT2eHs/jJE9DB+zHtC2EYvMGyM/5zRy9VfUDjOWYq+IPwPSX84ZfflgvAXhreQOfTiw8KyJyUwINBObapOfYUnEmXAl5Nhyu8/ITavzaitFJTF3X01OpdfhCUu8bd4ERuFN9EqSDftMdu0TNCyCEXCf4pNT1xu2G/7VfXY+bHVAPxezOKO2lIU2bbBY4d2HnUP+kKz7aGhXjavu/Qxwcw5MacsJmPfSdsVEaWdXrp0A==
  • Authentication-results: oracle.com; dkim=none (message not signed) header.d=none;oracle.com; dmarc=none action=none header.from=suse.com;
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, lkml <linux-kernel@xxxxxxxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  • Delivery-date: Thu, 23 Sep 2021 15:32:10 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 23.09.2021 17:25, Juergen Gross wrote:
> On 23.09.21 17:19, Jan Beulich wrote:
>> On 23.09.2021 17:15, Juergen Gross wrote:
>>> On 23.09.21 17:10, Jan Beulich wrote:
>>>> On 23.09.2021 16:59, Juergen Gross wrote:
>>>>> On 07.09.21 12:11, Jan Beulich wrote:
>>>>>> This was effectively lost while dropping PVHv1 code. Move the function
>>>>>> and arrange for it to be called the same way as done in PV mode. Clearly
>>>>>> this then needs re-introducing the XENFEAT_mmu_pt_update_preserve_ad
>>>>>> check that was recently removed, as that's a PV-only feature.
>>>>>>
>>>>>> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
>>>>>>
>>>>>> --- a/arch/x86/xen/enlighten.c
>>>>>> +++ b/arch/x86/xen/enlighten.c
>>>>>> @@ -261,6 +261,18 @@ int xen_vcpu_setup(int cpu)
>>>>>>          return ((per_cpu(xen_vcpu, cpu) == NULL) ? -ENODEV : 0);
>>>>>>     }
>>>>>>     
>>>>>> +void __init xen_banner(void)
>>>>>> +{
>>>>>> +        unsigned version = HYPERVISOR_xen_version(XENVER_version, NULL);
>>>>>> +        struct xen_extraversion extra;
>>>>>
>>>>> Please add a blank line here.
>>>>
>>>> Oops.
>>>>
>>>>>> +        HYPERVISOR_xen_version(XENVER_extraversion, &extra);
>>>>>> +
>>>>>> +        pr_info("Booting paravirtualized kernel on %s\n", pv_info.name);
>>>>>
>>>>> Is this correct? I don't think the kernel needs to be paravirtualized
>>>>> with PVH (at least not to the same extend as for PV).
>>>>
>>>> What else do you suggest the message to say? Simply drop
>>>> "paravirtualized"? To some extent it is applicable imo, further
>>>> qualified by pv_info.name. And that's how it apparently was with
>>>> PVHv1.
>>>
>>> The string could be selected depending on CONFIG_XEN_PV.
>>
>> Hmm, now I'm confused: Doesn't this setting control whether the kernel
>> can run in PV mode? If so, that functionality being present should have
>> no effect on the functionality of the kernel when running in PVH mode.
>> So what you suggest would end up in misleading information imo.
> 
> Hmm, yes, I mixed "paravirtualized" with "capable to run
> paravirtualized".
> 
> So the string should depend on xen_pv_domain().

But that's already expressed by pv_info.name then being "Xen PV".

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.