[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2 13/23] x86: provide stubs, declarations and macros in hvm.h



> -----Original Message-----
> From: Xen-devel [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxxx] On Behalf
> Of Wei Liu
> Sent: 26 August 2018 13:20
> To: xen-devel@xxxxxxxxxxxxxxxxxxxx
> Cc: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>; Wei Liu
> <wei.liu2@xxxxxxxxxx>; Jan Beulich <jbeulich@xxxxxxxx>
> Subject: [Xen-devel] [PATCH v2 13/23] x86: provide stubs, declarations and
> macros in hvm.h
> 
> Make sure hvm_enabled evaluate to false then provide necessary stubs,
> declarations and macros to make Xen build.
> 
> The is_viridian_domain macro can't be turned into an inline function
> easily,

Why? It's just an is_hvm_domain() and a feature check.

> so instead its caller is modified to avoid unused variable
> warning.
> 
> Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>
> ---
>  xen/arch/x86/traps.c          |   4 +-
>  xen/include/asm-x86/hvm/hvm.h | 149
> ++++++++++++++++++++++++++++++++++-
>  2 files changed, 148 insertions(+), 5 deletions(-)
> 
> diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
> index ddff346..27b9651 100644
> --- a/xen/arch/x86/traps.c
> +++ b/xen/arch/x86/traps.c
> @@ -771,9 +771,9 @@ static void do_trap(struct cpu_user_regs *regs)
>  /* Returns 0 if not handled, and non-0 for success. */
>  int rdmsr_hypervisor_regs(uint32_t idx, uint64_t *val)
>  {
> -    struct domain *d = current->domain;
>      /* Optionally shift out of the way of Viridian architectural MSRs. */
> -    uint32_t base = is_viridian_domain(d) ? 0x40000200 : 0x40000000;
> +    uint32_t base = is_viridian_domain(current->domain)
> +        ? 0x40000200 : 0x40000000;
> 

This is a bit ugly so it would be nice to keep it on a single line.

  Paul

>      switch ( idx - base )
>      {
> diff --git a/xen/include/asm-x86/hvm/hvm.h b/xen/include/asm-
> x86/hvm/hvm.h
> index 9c73cbf..7820586 100644
> --- a/xen/include/asm-x86/hvm/hvm.h
> +++ b/xen/include/asm-x86/hvm/hvm.h
> @@ -235,7 +235,10 @@ struct hvm_function_table {
>  };
> 
>  extern struct hvm_function_table hvm_funcs;
> -extern bool_t hvm_enabled;
> +
> +#ifdef CONFIG_HVM
> +extern bool hvm_enabled;
> +
>  extern s8 hvm_port80_allowed;
> 
>  extern const struct hvm_function_table *start_svm(void);
> @@ -268,8 +271,8 @@ u64 hvm_get_guest_tsc_fixed(struct vcpu *v, u64
> at_tsc);
>  #define hvm_tsc_scaling_ratio(d) \
>      ((d)->arch.hvm_domain.tsc_scaling_ratio)
> 
> -u64 hvm_scale_tsc(const struct domain *d, u64 tsc);
> -u64 hvm_get_tsc_scaling_ratio(u32 gtsc_khz);
> +uint64_t hvm_scale_tsc(const struct domain *d, uint64_t tsc);
> +uint64_t hvm_get_tsc_scaling_ratio(uint32_t gtsc_khz);
> 
>  void hvm_init_guest_time(struct domain *d);
>  void hvm_set_guest_time(struct vcpu *v, u64 guest_time);
> @@ -675,6 +678,146 @@ unsigned long hvm_cr4_guest_valid_bits(const
> struct domain *d, bool restore);
>          d_->arch.hvm_domain.pi_ops.vcpu_block(v_);          \
>  })
> 
> +#else /* CONFIG_HVM */
> +
> +#define hvm_enabled false
> +
> +static inline int hvm_guest_x86_mode(struct vcpu *v)
> +{
> +    ASSERT_UNREACHABLE();
> +    return -1;
> +}
> +
> +static inline bool hvm_is_singlestep_supported(void)
> +{
> +    ASSERT_UNREACHABLE();
> +    return false;
> +}
> +
> +static inline int vmsi_deliver(
> +    struct domain *d, int vector,
> +    uint8_t dest, uint8_t dest_mode,
> +    uint8_t delivery_mode, uint8_t trig_mode)
> +{
> +    ASSERT_UNREACHABLE();
> +    return -EINVAL;
> +}
> +
> +static inline bool nhvm_vmcx_hap_enabled(struct vcpu *v)
> +{
> +    return false;
> +}
> +
> +static inline bool hvm_hap_supported(void)
> +{
> +    return false;
> +}
> +
> +static inline void hvm_set_info_guest(struct vcpu *v)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +
> +static inline void hvm_cpuid_policy_changed(struct vcpu *v)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +
> +static inline void hvm_flush_guest_tlbs(void)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +
> +static inline void hvm_invlpg(struct vcpu *v, unsigned long linear)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +
> +static inline int hvm_cpu_up(void)
> +{
> +    return 0;
> +}
> +
> +static inline void hvm_cpu_down(void)
> +{
> +}
> +
> +static inline unsigned long hvm_get_shadow_gs_base(struct vcpu *v)
> +{
> +    ASSERT_UNREACHABLE();
> +    return 0;
> +}
> +
> +static inline void hvm_set_tsc_offset(struct vcpu *v, uint64_t offset,
> +                                      uint64_t at_tsc)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +
> +static inline void hvm_update_host_cr3(struct vcpu *v)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +
> +static inline unsigned int hvm_get_cpl(struct vcpu *v)
> +{
> +    ASSERT_UNREACHABLE();
> +    return -1;
> +}
> +
> +static inline int hvm_event_pending(struct vcpu *v)
> +{
> +    return 0;
> +}
> +
> +static inline void hvm_inject_hw_exception(unsigned int vector, int
> errcode)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +
> +static inline void hvm_update_guest_cr3(struct vcpu *v, bool noflush)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +
> +#define hvm_long_mode_active(v) (false)
> +#define hvm_pae_enabled(v) (false)
> +#define hvm_get_guest_time(v) (0)
> +#define is_viridian_domain(d) (false)
> +#define has_viridian_time_ref_count(d) (false)
> +#define hvm_tsc_scaling_supported (false)
> +#define hap_has_1gb (false)
> +#define hap_has_2mb (false)
> +
> +#define hvm_paging_enabled(v) (false)
> +#define hvm_nx_enabled(v) (false)
> +#define hvm_wp_enabled(v) (false)
> +#define hvm_smap_enabled(v) (false)
> +#define hvm_smep_enabled(v) (false)
> +#define hvm_pku_enabled(v) (false)
> +
> +#define arch_vcpu_block(v) ((void)v)
> +
> +int hvm_vcpu_initialise(struct vcpu *v);
> +void hvm_vcpu_destroy(struct vcpu *v);
> +int hvm_domain_initialise(struct domain *d);
> +void hvm_domain_destroy(struct domain *d);
> +void hvm_domain_soft_reset(struct domain *d);
> +void hvm_domain_relinquish_resources(struct domain *d);
> +uint64_t hvm_scale_tsc(const struct domain *d, uint64_t tsc);
> +uint64_t hvm_get_tsc_scaling_ratio(uint32_t gtsc_khz);
> +
> +void hvm_get_segment_register(struct vcpu *v, enum x86_segment seg,
> +                              struct segment_register *reg);
> +
> +void hvm_set_rdtsc_exiting(struct domain *d, bool_t enable);
> +void hvm_toggle_singlestep(struct vcpu *v);
> +void hvm_mapped_guest_frames_mark_dirty(struct domain *);
> +void hvm_hypercall_page_initialise(struct domain *d,
> +                                   void *hypercall_page);
> +
> +#endif /* CONFIG_HVM */
> +
>  #endif /* __ASM_X86_HVM_HVM_H__ */
> 
>  /*
> --
> git-series 0.9.1
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxxx
> https://lists.xenproject.org/mailman/listinfo/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.