From: Tamas K Lengyel <tamas@tklengyel.com>
To: Wei Liu <wei.liu2@citrix.com>
Cc: George Dunlap <george.dunlap@eu.citrix.com>,
Xen-devel <xen-devel@lists.xenproject.org>,
Razvan Cojocaru <rcojocaru@bitdefender.com>,
Jan Beulich <jbeulich@suse.com>,
Andrew Cooper <andrew.cooper3@citrix.com>
Subject: Re: [PATCH v4 4/7] x86/mm: put HVM only code under CONFIG_HVM
Date: Thu, 13 Sep 2018 10:50:45 -0600 [thread overview]
Message-ID: <CABfawh=XbVdQDdnqmRT1Xi1igb+ApAnm6jMS2GubucmjuJpdFw@mail.gmail.com> (raw)
In-Reply-To: <72552d1b145e82b94e2b7560b126d82803879d18.1536856592.git-series.wei.liu2@citrix.com>
On Thu, Sep 13, 2018 at 10:38 AM Wei Liu <wei.liu2@citrix.com> wrote:
>
> Going through the code, HAP, EPT, PoD and ALTP2M depend on HVM code.
> Put these components under CONFIG_HVM. This further requires putting
> one of the vm event under CONFIG_HVM.
>
> Altp2m requires a bit more attention because its code is embedded in
> generic x86 p2m code.
>
> Also make hap_enabled evaluate to false when !CONFIG_HVM. Make sure it
> evaluate its parameter to avoid unused variable warnings in its users.
>
> Also sort items in Makefile while at it.
>
> Signed-off-by: Wei Liu <wei.liu2@citrix.com>
> Acked-by: Jan Beulich <jbeulich@suse.com>
> ---
> v4: provide stub for p2m_altp2m_check
>
> Razvan's ack is dropped because of the change. An ack from altp2m
> maintainers is required.
> ---
> xen/arch/x86/mm/Makefile | 11 ++++++-----
> xen/arch/x86/mm/mem_access.c | 18 +++++++++++++++++-
> xen/arch/x86/mm/mem_sharing.c | 2 ++
> xen/arch/x86/mm/p2m.c | 23 ++++++++++++-----------
> xen/include/asm-x86/altp2m.h | 13 ++++++++++++-
> xen/include/asm-x86/domain.h | 2 +-
> xen/include/asm-x86/hvm/domain.h | 4 ++++
> xen/include/asm-x86/p2m.h | 8 +++++++-
> 8 files changed, 61 insertions(+), 20 deletions(-)
>
> diff --git a/xen/arch/x86/mm/Makefile b/xen/arch/x86/mm/Makefile
> index 3017119..171cc74 100644
> --- a/xen/arch/x86/mm/Makefile
> +++ b/xen/arch/x86/mm/Makefile
> @@ -1,15 +1,16 @@
> subdir-y += shadow
> -subdir-y += hap
> +subdir-$(CONFIG_HVM) += hap
>
> -obj-y += paging.o
> -obj-y += p2m.o p2m-pt.o p2m-ept.o p2m-pod.o
> -obj-y += altp2m.o
> +obj-$(CONFIG_HVM) += altp2m.o
> obj-y += guest_walk_2.o
> obj-y += guest_walk_3.o
> obj-y += guest_walk_4.o
> +obj-$(CONFIG_MEM_ACCESS) += mem_access.o
> obj-y += mem_paging.o
> obj-y += mem_sharing.o
> -obj-y += mem_access.o
> +obj-y += p2m.o p2m-pt.o
> +obj-$(CONFIG_HVM) += p2m-ept.o p2m-pod.o
> +obj-y += paging.o
>
> guest_walk_%.o: guest_walk.c Makefile
> $(CC) $(CFLAGS) -DGUEST_PAGING_LEVELS=$* -c $< -o $@
> diff --git a/xen/arch/x86/mm/mem_access.c b/xen/arch/x86/mm/mem_access.c
> index c980f17..6801841 100644
> --- a/xen/arch/x86/mm/mem_access.c
> +++ b/xen/arch/x86/mm/mem_access.c
> @@ -246,7 +246,6 @@ bool p2m_mem_access_check(paddr_t gpa, unsigned long gla,
> /* Return whether vCPU pause is required (aka. sync event) */
> return (p2ma != p2m_access_n2rwx);
> }
> -#endif
>
> int p2m_set_altp2m_mem_access(struct domain *d, struct p2m_domain *hp2m,
> struct p2m_domain *ap2m, p2m_access_t a,
> @@ -291,6 +290,7 @@ int p2m_set_altp2m_mem_access(struct domain *d, struct p2m_domain *hp2m,
> */
> return ap2m->set_entry(ap2m, gfn, mfn, PAGE_ORDER_4K, t, a, -1);
> }
> +#endif
>
> static int set_mem_access(struct domain *d, struct p2m_domain *p2m,
> struct p2m_domain *ap2m, p2m_access_t a,
> @@ -298,6 +298,7 @@ static int set_mem_access(struct domain *d, struct p2m_domain *p2m,
> {
> int rc = 0;
>
> +#ifdef CONFIG_HVM
> if ( ap2m )
> {
> rc = p2m_set_altp2m_mem_access(d, p2m, ap2m, a, gfn);
> @@ -306,6 +307,9 @@ static int set_mem_access(struct domain *d, struct p2m_domain *p2m,
> rc = 0;
> }
> else
> +#else
> + ASSERT(!ap2m);
> +#endif
> {
> mfn_t mfn;
> p2m_access_t _a;
> @@ -367,6 +371,7 @@ long p2m_set_mem_access(struct domain *d, gfn_t gfn, uint32_t nr,
> long rc = 0;
>
> /* altp2m view 0 is treated as the hostp2m */
> +#ifdef CONFIG_HVM
> if ( altp2m_idx )
> {
> if ( altp2m_idx >= MAX_ALTP2M ||
> @@ -375,6 +380,9 @@ long p2m_set_mem_access(struct domain *d, gfn_t gfn, uint32_t nr,
>
> ap2m = d->arch.altp2m_p2m[altp2m_idx];
> }
> +#else
> + ASSERT(!altp2m_idx);
> +#endif
>
> if ( !xenmem_access_to_p2m_access(p2m, access, &a) )
> return -EINVAL;
> @@ -422,6 +430,7 @@ long p2m_set_mem_access_multi(struct domain *d,
> long rc = 0;
>
> /* altp2m view 0 is treated as the hostp2m */
> +#ifdef CONFIG_HVM
> if ( altp2m_idx )
> {
> if ( altp2m_idx >= MAX_ALTP2M ||
> @@ -430,6 +439,9 @@ long p2m_set_mem_access_multi(struct domain *d,
>
> ap2m = d->arch.altp2m_p2m[altp2m_idx];
> }
> +#else
> + ASSERT(!altp2m_idx);
> +#endif
>
> p2m_lock(p2m);
> if ( ap2m )
> @@ -483,12 +495,15 @@ int p2m_get_mem_access(struct domain *d, gfn_t gfn, xenmem_access_t *access)
>
> void arch_p2m_set_access_required(struct domain *d, bool access_required)
> {
> +#ifdef CONFIG_HVM
> unsigned int i;
> +#endif
Perhaps this would look a little nicer with a minor restructure so
that there are no two ifdefs within this function..
>
> ASSERT(atomic_read(&d->pause_count));
>
> p2m_get_hostp2m(d)->access_required = access_required;
>
> +#ifdef CONFIG_HVM
> if ( !altp2m_active(d) )
.. by changing this is into if ( altp2m_active(d) ) and moving the
unsigned int i declaration afterwards. I understand however if you
want to keep this patch mechanical.
> return;
>
> @@ -499,6 +514,7 @@ void arch_p2m_set_access_required(struct domain *d, bool access_required)
> if ( p2m )
> p2m->access_required = access_required;
> }
> +#endif
> }
So with or without that change:
Acked-by: Tamas K Lengyel <tamas@tklengyel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2018-09-13 16:51 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-09-13 16:38 [PATCH v4 0/7] Make CONFIG_HVM work Wei Liu
2018-09-13 16:38 ` [PATCH v4 1/7] x86/p2m/pod: make it build with !CONFIG_HVM Wei Liu
2018-09-13 16:56 ` Tamas K Lengyel
2018-09-14 12:41 ` Jan Beulich
2018-09-21 16:01 ` Wei Liu
2018-09-13 16:38 ` [PATCH v4 2/7] x86: provide stubs, declarations and macros in hvm.h Wei Liu
2018-09-14 12:44 ` Jan Beulich
2018-09-13 16:38 ` [PATCH v4 3/7] x86/mm: put nested p2m code under CONFIG_HVM Wei Liu
2018-09-14 12:50 ` Jan Beulich
2018-09-21 15:45 ` Wei Liu
2018-09-13 16:38 ` [PATCH v4 4/7] x86/mm: put HVM only " Wei Liu
2018-09-13 16:50 ` Tamas K Lengyel [this message]
2018-09-21 15:50 ` Wei Liu
2018-09-13 16:38 ` [PATCH v4 5/7] x86/mm: put paging_update_nestedmode " Wei Liu
2018-09-13 16:38 ` [PATCH v4 6/7] xen: connect guest creation with CONFIG_HVM Wei Liu
2018-09-14 12:51 ` Jan Beulich
2018-09-13 16:38 ` [PATCH v4 7/7] x86: expose CONFIG_HVM Wei Liu
2018-09-14 12:55 ` Jan Beulich
2018-09-21 15:53 ` Wei Liu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CABfawh=XbVdQDdnqmRT1Xi1igb+ApAnm6jMS2GubucmjuJpdFw@mail.gmail.com' \
--to=tamas@tklengyel.com \
--cc=andrew.cooper3@citrix.com \
--cc=george.dunlap@eu.citrix.com \
--cc=jbeulich@suse.com \
--cc=rcojocaru@bitdefender.com \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).