[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 2/3] x86/viridian: drop virdian_sint_msr
Use hv_synic_sint in hyperv-tlfs.h instead. This requires adding the missing "polling" member to hv_synic_sint. No functional change. Signed-off-by: Wei Liu <liuwe@xxxxxxxxxxxxx> --- xen/arch/x86/hvm/viridian/synic.c | 20 ++++++++++---------- xen/include/asm-x86/guest/hyperv-tlfs.h | 3 ++- xen/include/asm-x86/hvm/viridian.h | 16 +--------------- 3 files changed, 13 insertions(+), 26 deletions(-) diff --git a/xen/arch/x86/hvm/viridian/synic.c b/xen/arch/x86/hvm/viridian/synic.c index 54c62f843f..94a2b88733 100644 --- a/xen/arch/x86/hvm/viridian/synic.c +++ b/xen/arch/x86/hvm/viridian/synic.c @@ -143,7 +143,7 @@ int viridian_synic_wrmsr(struct vcpu *v, uint32_t idx, uint64_t val) case HV_X64_MSR_SINT0 ... HV_X64_MSR_SINT15: { unsigned int sintx = idx - HV_X64_MSR_SINT0; - union viridian_sint_msr new, *vs = + union hv_synic_sint new, *vs = &array_access_nospec(vv->sint, sintx); uint8_t vector; @@ -151,7 +151,7 @@ int viridian_synic_wrmsr(struct vcpu *v, uint32_t idx, uint64_t val) return X86EMUL_EXCEPTION; /* Vectors must be in the range 0x10-0xff inclusive */ - new.raw = val; + new.as_uint64 = val; if ( new.vector < 0x10 ) return X86EMUL_EXCEPTION; @@ -256,13 +256,13 @@ int viridian_synic_rdmsr(const struct vcpu *v, uint32_t idx, uint64_t *val) case HV_X64_MSR_SINT0 ... HV_X64_MSR_SINT15: { unsigned int sintx = idx - HV_X64_MSR_SINT0; - const union viridian_sint_msr *vs = + const union hv_synic_sint *vs = &array_access_nospec(vv->sint, sintx); if ( !(viridian_feature_mask(d) & HVMPV_synic) ) return X86EMUL_EXCEPTION; - *val = vs->raw; + *val = vs->as_uint64; break; } @@ -284,7 +284,7 @@ int viridian_synic_vcpu_init(const struct vcpu *v) * initally masked. */ for ( i = 0; i < ARRAY_SIZE(vv->sint); i++ ) - vv->sint[i].mask = 1; + vv->sint[i].masked = 1; /* Initialize the mapping array with invalid values */ for ( i = 0; i < ARRAY_SIZE(vv->vector_to_sintx); i++ ) @@ -321,7 +321,7 @@ bool viridian_synic_deliver_timer_msg(struct vcpu *v, unsigned int sintx, uint64_t delivery) { struct viridian_vcpu *vv = v->arch.hvm.viridian; - const union viridian_sint_msr *vs = &vv->sint[sintx]; + const union hv_synic_sint *vs = &vv->sint[sintx]; struct hv_message *msg = vv->simp.ptr; struct { uint32_t TimerIndex; @@ -360,7 +360,7 @@ bool viridian_synic_deliver_timer_msg(struct vcpu *v, unsigned int sintx, BUILD_BUG_ON(sizeof(payload) > sizeof(msg->u.payload)); memcpy(msg->u.payload, &payload, sizeof(payload)); - if ( !vs->mask ) + if ( !vs->masked ) vlapic_set_irq(vcpu_vlapic(v), vs->vector, 0); return true; @@ -371,7 +371,7 @@ bool viridian_synic_is_auto_eoi_sint(const struct vcpu *v, { const struct viridian_vcpu *vv = v->arch.hvm.viridian; unsigned int sintx = vv->vector_to_sintx[vector]; - const union viridian_sint_msr *vs = + const union hv_synic_sint *vs = &array_access_nospec(vv->sint, sintx); if ( sintx >= ARRAY_SIZE(vv->sint) ) @@ -401,7 +401,7 @@ void viridian_synic_save_vcpu_ctxt(const struct vcpu *v, BUILD_BUG_ON(ARRAY_SIZE(vv->sint) != ARRAY_SIZE(ctxt->sint_msr)); for ( i = 0; i < ARRAY_SIZE(vv->sint); i++ ) - ctxt->sint_msr[i] = vv->sint[i].raw; + ctxt->sint_msr[i] = vv->sint[i].as_uint64; ctxt->simp_msr = vv->simp.msr.raw; @@ -430,7 +430,7 @@ void viridian_synic_load_vcpu_ctxt( { uint8_t vector; - vv->sint[i].raw = ctxt->sint_msr[i]; + vv->sint[i].as_uint64 = ctxt->sint_msr[i]; vector = vv->sint[i].vector; if ( vector < 0x10 ) diff --git a/xen/include/asm-x86/guest/hyperv-tlfs.h b/xen/include/asm-x86/guest/hyperv-tlfs.h index 4402854c80..fe9fb232d0 100644 --- a/xen/include/asm-x86/guest/hyperv-tlfs.h +++ b/xen/include/asm-x86/guest/hyperv-tlfs.h @@ -819,7 +819,8 @@ union hv_synic_sint { u64 reserved1:8; u64 masked:1; u64 auto_eoi:1; - u64 reserved2:46; + u64 polling:1; + u64 reserved2:45; } __packed; }; diff --git a/xen/include/asm-x86/hvm/viridian.h b/xen/include/asm-x86/hvm/viridian.h index cfbaede158..d694d83521 100644 --- a/xen/include/asm-x86/hvm/viridian.h +++ b/xen/include/asm-x86/hvm/viridian.h @@ -28,20 +28,6 @@ struct viridian_page void *ptr; }; -union viridian_sint_msr -{ - uint64_t raw; - struct - { - uint64_t vector:8; - uint64_t reserved_preserved1:8; - uint64_t mask:1; - uint64_t auto_eoi:1; - uint64_t polling:1; - uint64_t reserved_preserved2:45; - }; -}; - union viridian_stimer_config_msr { uint64_t raw; @@ -77,7 +63,7 @@ struct viridian_vcpu uint64_t scontrol; uint64_t siefp; struct viridian_page simp; - union viridian_sint_msr sint[16]; + union hv_synic_sint sint[16]; uint8_t vector_to_sintx[256]; struct viridian_stimer stimer[4]; unsigned int stimer_enabled; -- 2.20.1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |