[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2] x86/hvm: Clean up the rest of bool_t from vm_event



Any changes required for this to go in?

Regards,
Alex

On 29.10.2018 17:53, Alexandru Stefan ISAILA wrote:
> Signed-off-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx>
> Acked-by: Tamas K Lengyel <tamas@xxxxxxxxxxxxx>
> Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
> 
> ---
> Changes since V1:
>       - Made style corrections suggested by Jan.
> ---
>   xen/arch/x86/hvm/hvm.c            | 3 ++-
>   xen/arch/x86/mm/mem_sharing.c     | 2 +-
>   xen/arch/x86/mm/p2m.c             | 5 ++---
>   xen/common/memory.c               | 2 +-
>   xen/common/vm_event.c             | 4 ++--
>   xen/include/asm-x86/mem_sharing.h | 2 +-
>   xen/include/xen/vm_event.h        | 8 ++++----
>   7 files changed, 13 insertions(+), 13 deletions(-)
> 
> diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
> index a140e60c9c..a8566fb87c 100644
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -1905,7 +1905,8 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned 
> long gla,
>       if ( sharing_enomem )
>       {
>           int rv;
> -        if ( (rv = mem_sharing_notify_enomem(currd, gfn, 1)) < 0 )
> +
> +        if ( (rv = mem_sharing_notify_enomem(currd, gfn, true)) < 0 )
>           {
>               gdprintk(XENLOG_ERR, "Domain %hu attempt to unshare "
>                        "gfn %lx, ENOMEM and no helper (rc %d)\n",
> diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
> index 1dab2c8cc3..be09c8871a 100644
> --- a/xen/arch/x86/mm/mem_sharing.c
> +++ b/xen/arch/x86/mm/mem_sharing.c
> @@ -546,7 +546,7 @@ static int audit(void)
>   }
>   
>   int mem_sharing_notify_enomem(struct domain *d, unsigned long gfn,
> -                                bool_t allow_sleep)
> +                              bool allow_sleep)
>   {
>       struct vcpu *v = current;
>       int rc;
> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
> index a00a3c1bff..4bdc5e34e0 100644
> --- a/xen/arch/x86/mm/p2m.c
> +++ b/xen/arch/x86/mm/p2m.c
> @@ -448,7 +448,7 @@ mfn_t __get_gfn_type_access(struct p2m_domain *p2m, 
> unsigned long gfn_l,
>           /* Try to unshare. If we fail, communicate ENOMEM without
>            * sleeping. */
>           if ( mem_sharing_unshare_page(p2m->domain, gfn_l, 0) < 0 )
> -            (void)mem_sharing_notify_enomem(p2m->domain, gfn_l, 0);
> +            mem_sharing_notify_enomem(p2m->domain, gfn_l, false);
>           mfn = p2m->get_entry(p2m, gfn, t, a, q, page_order, NULL);
>       }
>   
> @@ -839,8 +839,7 @@ guest_physmap_add_entry(struct domain *d, gfn_t gfn, 
> mfn_t mfn,
>                    * Foreign domains are okay to place an event as they
>                    * won't go to sleep. */
>                   (void)mem_sharing_notify_enomem(p2m->domain,
> -                                                gfn_x(gfn_add(gfn, i)),
> -                                                0);
> +                                                gfn_x(gfn_add(gfn, i)), 
> false);
>                   return rc;
>               }
>               omfn = p2m->get_entry(p2m, gfn_add(gfn, i),
> diff --git a/xen/common/memory.c b/xen/common/memory.c
> index 987395fbb3..b68efd4d9f 100644
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -356,7 +356,7 @@ int guest_remove_page(struct domain *d, unsigned long 
> gmfn)
>           rc = mem_sharing_unshare_page(d, gmfn, 0);
>           if ( rc )
>           {
> -            (void)mem_sharing_notify_enomem(d, gmfn, 0);
> +            mem_sharing_notify_enomem(d, gmfn, false);
>               goto out_put_gfn;
>           }
>           /* Maybe the mfn changed */
> diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c
> index 6ffd18a448..26cfa2c605 100644
> --- a/xen/common/vm_event.c
> +++ b/xen/common/vm_event.c
> @@ -496,7 +496,7 @@ static int vm_event_wait_slot(struct vm_event_domain *ved)
>       return rc;
>   }
>   
> -bool_t vm_event_check_ring(struct vm_event_domain *ved)
> +bool vm_event_check_ring(struct vm_event_domain *ved)
>   {
>       return (ved && ved->ring_page);
>   }
> @@ -514,7 +514,7 @@ bool_t vm_event_check_ring(struct vm_event_domain *ved)
>    *
>    */
>   int __vm_event_claim_slot(struct domain *d, struct vm_event_domain *ved,
> -                          bool_t allow_sleep)
> +                          bool allow_sleep)
>   {
>       if ( !vm_event_check_ring(ved) )
>           return -EOPNOTSUPP;
> diff --git a/xen/include/asm-x86/mem_sharing.h 
> b/xen/include/asm-x86/mem_sharing.h
> index 91908924df..0e77b7d935 100644
> --- a/xen/include/asm-x86/mem_sharing.h
> +++ b/xen/include/asm-x86/mem_sharing.h
> @@ -84,7 +84,7 @@ static inline int mem_sharing_unshare_page(struct domain *d,
>    * then it's the same as a foreign domain.
>    */
>   int mem_sharing_notify_enomem(struct domain *d, unsigned long gfn,
> -                                bool_t allow_sleep);
> +                              bool allow_sleep);
>   int mem_sharing_memop(XEN_GUEST_HANDLE_PARAM(xen_mem_sharing_op_t) arg);
>   int mem_sharing_domctl(struct domain *d,
>                          struct xen_domctl_mem_sharing_op *mec);
> diff --git a/xen/include/xen/vm_event.h b/xen/include/xen/vm_event.h
> index 2ff6e1c333..5302ee55c1 100644
> --- a/xen/include/xen/vm_event.h
> +++ b/xen/include/xen/vm_event.h
> @@ -30,7 +30,7 @@
>   void vm_event_cleanup(struct domain *d);
>   
>   /* Returns whether a ring has been set up */
> -bool_t vm_event_check_ring(struct vm_event_domain *ved);
> +bool vm_event_check_ring(struct vm_event_domain *ved);
>   
>   /* Returns 0 on success, -ENOSYS if there is no ring, -EBUSY if there is no
>    * available space and the caller is a foreign domain. If the guest itself
> @@ -46,17 +46,17 @@ bool_t vm_event_check_ring(struct vm_event_domain *ved);
>    * succeed.
>    */
>   int __vm_event_claim_slot(struct domain *d, struct vm_event_domain *ved,
> -                          bool_t allow_sleep);
> +                          bool allow_sleep);
>   static inline int vm_event_claim_slot(struct domain *d,
>                                         struct vm_event_domain *ved)
>   {
> -    return __vm_event_claim_slot(d, ved, 1);
> +    return __vm_event_claim_slot(d, ved, true);
>   }
>   
>   static inline int vm_event_claim_slot_nosleep(struct domain *d,
>                                                 struct vm_event_domain *ved)
>   {
> -    return __vm_event_claim_slot(d, ved, 0);
> +    return __vm_event_claim_slot(d, ved, false);
>   }
>   
>   void vm_event_cancel_slot(struct domain *d, struct vm_event_domain *ved);
> 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.