|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH RFC 09/10] passthrough/intel: put some code under CONFIG_HVM
The code which references code under arch/x86/hvm/ is surrounded by
CONFIG_HVM now.
The basic idea is that in !CONFIG_HVM && CONFIG_PV case we still want
to retain the host side IOMMU code so that PV guests can use it if
necessary.
Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>
---
Cc: Kevin Tian <kevin.tian@xxxxxxxxx>
---
xen/drivers/passthrough/x86/vtd/iommu.c | 15 ++++++++++++++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/passthrough/x86/vtd/iommu.c
b/xen/drivers/passthrough/x86/vtd/iommu.c
index 1d161fe149..c27e63dfc1 100644
--- a/xen/drivers/passthrough/x86/vtd/iommu.c
+++ b/xen/drivers/passthrough/x86/vtd/iommu.c
@@ -32,7 +32,6 @@
#include <xen/keyhandler.h>
#include <asm/msi.h>
#include <asm/irq.h>
-#include <asm/hvm/vmx/vmx.h>
#include <asm/p2m.h>
#include <mach_apic.h>
#include "iommu.h"
@@ -41,6 +40,10 @@
#include "vtd.h"
#include "../../ats.h"
+#ifdef CONFIG_HVM
+#include <asm/hvm/vmx/vmx.h>
+#endif
+
struct mapped_rmrr {
struct list_head list;
u64 base, end;
@@ -1873,6 +1876,7 @@ int iommu_pte_flush(struct domain *d, u64 gfn, u64 *pte,
return rc;
}
+#ifdef CONFIG_HVM
static int __init vtd_ept_page_compatible(struct iommu *iommu)
{
u64 ept_cap, vtd_cap = iommu->cap;
@@ -1885,6 +1889,7 @@ static int __init vtd_ept_page_compatible(struct iommu
*iommu)
return (ept_has_2mb(ept_cap) && opt_hap_2mb) == cap_sps_2mb(vtd_cap) &&
(ept_has_1gb(ept_cap) && opt_hap_1gb) == cap_sps_1gb(vtd_cap);
}
+#endif
/*
* set VT-d page table directory to EPT table if allowed
@@ -2280,7 +2285,9 @@ int __init intel_vtd_setup(void)
if ( !cap_intr_post(iommu->cap) || !cpu_has_cx16 )
iommu_intpost = 0;
+#ifdef CONFIG_HVM
if ( !vtd_ept_page_compatible(iommu) )
+#endif
iommu_hap_pt_share = 0;
ret = iommu_set_interrupt(drhd);
@@ -2376,14 +2383,18 @@ static int reassign_device_ownership(
if ( ret )
return ret;
+#ifdef CONFIG_HVM
if ( !has_arch_pdevs(target) )
vmx_pi_hooks_assign(target);
+#endif
ret = domain_context_mapping(target, devfn, pdev);
if ( ret )
{
+#ifdef CONFIG_HVM
if ( !has_arch_pdevs(target) )
vmx_pi_hooks_deassign(target);
+#endif
return ret;
}
@@ -2394,8 +2405,10 @@ static int reassign_device_ownership(
pdev->domain = target;
}
+#ifdef CONFIG_HVM
if ( !has_arch_pdevs(source) )
vmx_pi_hooks_deassign(source);
+#endif
return ret;
}
--
2.11.0
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |