From patchwork Fri Feb 12 03:08:26 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Konrad Rzeszutek Wilk X-Patchwork-Id: 8287391 Return-Path: X-Original-To: patchwork-xen-devel@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id B78D59F859 for ; Fri, 12 Feb 2016 03:11:58 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id CECD9203AC for ; Fri, 12 Feb 2016 03:11:57 +0000 (UTC) Received: from lists.xen.org (lists.xenproject.org [50.57.142.19]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id C223220351 for ; Fri, 12 Feb 2016 03:11:56 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xen.org) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1aU46A-0006Wp-EO; Fri, 12 Feb 2016 03:08:46 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1aU469-0006Wc-AS for xen-devel@lists.xenproject.org; Fri, 12 Feb 2016 03:08:45 +0000 Received: from [85.158.139.211] by server-13.bemta-5.messagelabs.com id 81/34-09478-CBC4DB65; Fri, 12 Feb 2016 03:08:44 +0000 X-Env-Sender: konrad.wilk@oracle.com X-Msg-Ref: server-14.tower-206.messagelabs.com!1455246522!21547856!1 X-Originating-IP: [156.151.31.81] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogMTU2LjE1MS4zMS44MSA9PiAyODgzMzk=\n X-StarScan-Received: X-StarScan-Version: 7.35.1; banners=-,-,- X-VirusChecked: Checked Received: (qmail 3576 invoked from network); 12 Feb 2016 03:08:43 -0000 Received: from userp1040.oracle.com (HELO userp1040.oracle.com) (156.151.31.81) by server-14.tower-206.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 12 Feb 2016 03:08:43 -0000 Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id u1C38d5O010927 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 12 Feb 2016 03:08:40 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by aserv0021.oracle.com (8.13.8/8.13.8) with ESMTP id u1C38dIs027635 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Fri, 12 Feb 2016 03:08:39 GMT Received: from abhmp0004.oracle.com (abhmp0004.oracle.com [141.146.116.10]) by aserv0122.oracle.com (8.13.8/8.13.8) with ESMTP id u1C38cW1031433; Fri, 12 Feb 2016 03:08:38 GMT Received: from localhost.localdomain.com (/209.6.196.81) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 11 Feb 2016 19:08:38 -0800 From: Konrad Rzeszutek Wilk To: ian.campbell@citrix.com, ian.jackson@eu.citrix.com, jbeulich@suse.com, xen-devel@lists.xenproject.org Date: Thu, 11 Feb 2016 22:08:26 -0500 Message-Id: <1455246507-5589-5-git-send-email-konrad.wilk@oracle.com> X-Mailer: git-send-email 2.4.3 In-Reply-To: <1455246507-5589-1-git-send-email-konrad.wilk@oracle.com> References: <1455246507-5589-1-git-send-email-konrad.wilk@oracle.com> X-Source-IP: aserv0021.oracle.com [141.146.126.233] Cc: Konrad Rzeszutek Wilk Subject: [Xen-devel] [PATCH v3 4/5] mkelf32: Remove the 32-bit hypervisor support. X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.13 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP We do not compile 32-bit hypervisor anymore so the code for the ELFCLASS32 is effectively dead. Signed-off-by: Konrad Rzeszutek Wilk --- xen/arch/x86/boot/mkelf32.c | 88 +++++++++++++++------------------------------ 1 file changed, 28 insertions(+), 60 deletions(-) diff --git a/xen/arch/x86/boot/mkelf32.c b/xen/arch/x86/boot/mkelf32.c index b369222..993a7ee 100644 --- a/xen/arch/x86/boot/mkelf32.c +++ b/xen/arch/x86/boot/mkelf32.c @@ -3,7 +3,7 @@ * * Usage: elf-prefix * - * Converts an Elf32 or Elf64 executable binary into a simple Elf32 + * Converts an Elf64 executable binary into a simple Elf32 * image comprising a single chunk to be loaded at . */ @@ -235,7 +235,6 @@ int main(int argc, char **argv) int bytes, todo, i; Elf32_Ehdr in32_ehdr; - Elf32_Phdr in32_phdr; Elf64_Ehdr in64_ehdr; Elf64_Phdr in64_phdr; @@ -271,70 +270,39 @@ int main(int argc, char **argv) big_endian = (*(u16 *)in32_ehdr.e_ident == ((ELFMAG0 << 8) | ELFMAG1)); endianadjust_ehdr32(&in32_ehdr); - switch ( in32_ehdr.e_ident[EI_CLASS] ) + if ( in32_ehdr.e_ident[EI_CLASS] != ELFCLASS64 ) { - case ELFCLASS32: - if ( in32_ehdr.e_phentsize != sizeof(in32_phdr) ) - { - fprintf(stderr, "Bad program header size (%d != %d).\n", - (int)in32_ehdr.e_phentsize, (int)sizeof(in32_phdr)); - return 1; - } - - if ( in32_ehdr.e_phnum != 1 ) - { - fprintf(stderr, "Expect precisely 1 program header; found %d.\n", - (int)in32_ehdr.e_phnum); - return 1; - } - - (void)lseek(infd, in32_ehdr.e_phoff, SEEK_SET); - do_read(infd, &in32_phdr, sizeof(in32_phdr)); - endianadjust_phdr32(&in32_phdr); - - (void)lseek(infd, in32_phdr.p_offset, SEEK_SET); - dat_siz = (u32)in32_phdr.p_filesz; - - /* Do not use p_memsz: it does not include BSS alignment padding. */ - /*mem_siz = (u32)in32_phdr.p_memsz;*/ - mem_siz = (u32)(final_exec_addr - in32_phdr.p_vaddr); - break; - - case ELFCLASS64: - (void)lseek(infd, 0, SEEK_SET); - do_read(infd, &in64_ehdr, sizeof(in64_ehdr)); - endianadjust_ehdr64(&in64_ehdr); - - if ( in64_ehdr.e_phentsize != sizeof(in64_phdr) ) - { - fprintf(stderr, "Bad program header size (%d != %d).\n", - (int)in64_ehdr.e_phentsize, (int)sizeof(in64_phdr)); - return 1; - } + fprintf(stderr, "Bad program header class - we only do 64-bit!.\n"); + return 1; + } + (void)lseek(infd, 0, SEEK_SET); + do_read(infd, &in64_ehdr, sizeof(in64_ehdr)); + endianadjust_ehdr64(&in64_ehdr); - if ( in64_ehdr.e_phnum != 1 ) - { - fprintf(stderr, "Expect precisly 1 program header; found %d.\n", - (int)in64_ehdr.e_phnum); - return 1; - } + if ( in64_ehdr.e_phentsize != sizeof(in64_phdr) ) + { + fprintf(stderr, "Bad program header size (%d != %d).\n", + (int)in64_ehdr.e_phentsize, (int)sizeof(in64_phdr)); + return 1; + } - (void)lseek(infd, in64_ehdr.e_phoff, SEEK_SET); - do_read(infd, &in64_phdr, sizeof(in64_phdr)); - endianadjust_phdr64(&in64_phdr); + if ( in64_ehdr.e_phnum != 1 ) + { + fprintf(stderr, "Expect precisly 1 program header; found %d.\n", + (int)in64_ehdr.e_phnum); + return 1; + } - (void)lseek(infd, in64_phdr.p_offset, SEEK_SET); - dat_siz = (u32)in64_phdr.p_filesz; + (void)lseek(infd, in64_ehdr.e_phoff, SEEK_SET); + do_read(infd, &in64_phdr, sizeof(in64_phdr)); + endianadjust_phdr64(&in64_phdr); - /* Do not use p_memsz: it does not include BSS alignment padding. */ - /*mem_siz = (u32)in64_phdr.p_memsz;*/ - mem_siz = (u32)(final_exec_addr - in64_phdr.p_vaddr); - break; + (void)lseek(infd, in64_phdr.p_offset, SEEK_SET); + dat_siz = (u32)in64_phdr.p_filesz; - default: - fprintf(stderr, "Input image must be a 32- or 64-bit Elf image.\n"); - return 1; - } + /* Do not use p_memsz: it does not include BSS alignment padding. */ + /*mem_siz = (u32)in64_phdr.p_memsz;*/ + mem_siz = (u32)(final_exec_addr - in64_phdr.p_vaddr); /* * End the image on a page boundary. This gets round alignment bugs