|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Is: PVH + ARM new hypercalls. Was: Re: [PATCH]: PVH: specify xen features strings cleany for PVH
On Mon, 28 Jan 2013 11:26:08 -0500
Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx> wrote:
> On Fri, Jan 25, 2013 at 10:43:41AM +0000, Ian Campbell wrote:
> > On Fri, 2013-01-25 at 10:27 +0000, Jan Beulich wrote:
>
> #define PHYSDEVOP_map_iomem 30
> struct physdev_map_iomem {
> /* IN */
> uint64_t first_gfn;
> uint64_t first_mfn;
> uint32_t nr_mfns;
> uint32_t add_mapping; /* 1 == add mapping; 0 == unmap */
>
> };
Since the new recommendation is to map transparently, we don't need
this anymore. I'll submit an incremental patch to you Konrad.
> and the modification to one:
>
> commit 50c0b3df91be7a440b50ee7d74fd2042bca173fd
> Author: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
> Date: Mon Oct 22 11:37:57 2012 -0400
>
> xen/pvh: Extend vcpu_guest_context, p2m, event, and XenBus.
>
> Make gdt_frames[]/gdt_ents into a union with {gdtaddr, gdtsz},
> as PVH only needs to send down gdtaddr and gdtsz in the
> vcpu_guest_context structure..
>
> For interrupts, PVH uses native_irq_ops so we can skip most of the
> PV ones. In the future we can support the pirq_eoi_map..
> Also VCPU hotplug is currently not available for PVH.
>
> For events (and IRQs) we follow what PVHVM does - so use callback
> vector. Lastly, for XenBus we use the same logic that is used in
> the PVHVM case.
>
> Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
> Signed-off-by: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
> [v2: Rebased it]
> [v3: Move 64-bit ifdef and based on Stefan add extra comments.]
> [v4: Rebased it once more]
> Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
>
> diff --git a/arch/x86/include/asm/xen/interface.h
> b/arch/x86/include/asm/xen/interface.h index fd9cb76..20e738a 100644
> --- a/arch/x86/include/asm/xen/interface.h
> +++ b/arch/x86/include/asm/xen/interface.h
> @@ -145,7 +145,16 @@ struct vcpu_guest_context {
> struct cpu_user_regs user_regs; /* User-level CPU
> registers */ struct trap_info trap_ctxt[256]; /* Virtual
> IDT */ unsigned long ldt_base, ldt_ents; /*
> LDT (linear address, # ents) */
> - unsigned long gdt_frames[16], gdt_ents; /* GDT (machine frames,
> # ents) */
> + union {
> + struct {
> + /* PV: GDT (machine frames, # ents).*/
> + unsigned long gdt_frames[16], gdt_ents;
> + } pv;
> + struct {
> + /* PVH: GDTR addr and size */
> + unsigned long gdtaddr, gdtsz;
> + } pvh;
> + } u;
> unsigned long kernel_ss, kernel_sp; /* Virtual TSS (only
On xen side I added the ifdef:
#if __XEN_INTERFACE_VERSION__ < 0x00040300
unsigned long gdt_frames[16], gdt_ents; /* GDT (machine frames, # ents) */
#else
union {
struct {
/* GDT (machine frames, # ents) */
unsigned long gdt_frames[16], gdt_ents;
} pv;
struct {
/* PVH: GDTR addr and size */
unsigned long gdtaddr, gdtsz;
} pvh;
} u;
#endif
but it doesn't matter on linux side, so up to you.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |