[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[XEN][PATCH 2/3] x86/hvm: vmx: account for SHADOW_PAGING when use hvm_shadow_handle_cd()


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
  • Date: Wed, 29 Oct 2025 23:54:57 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=CW854e/emRIA+lob0OlKUhQFAX79JYtdj6gRsLxNMYM=; b=M1Ueg5+ruUW/WOyQAIWLZbo4dZefVJQHrCSknxl8m0d1O1vdgAoelQWAky19mT/Bz1FfZFVGK06tRxataThlTN4RK4A+SUUu7ZEcDwP/NtcH2VMl4lxuATKlXz+k6+naSKzhLSqS0q1eyF6jT6Q6hcnc7eWoTlKDMwvTpny4HSbWzODEYcJDXN/kE6UbrsnMPuPLwKBlBL8oFXKS3J4g2E4SHoJAECvNdefIbbWpkLgJmW9rRifeFJFh4wq2KeUqGXmYbHpKFRnBisR2MKQ2VIzraF0H9lc/GwgZuxr9QEx4YR8ruQDi0BxGO9oNLtZIODyLNHmx3H6CQzPahJFWHg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=DcxCSQfGO8gg9C1NU8/p35k35tD+1JgSu48U6Ts+/ie7kjynb5PAMX+tMPZGxi91f7zc8zGHRZoCV/zrZRm+4ANDlG3uX5h5OIAzgKTXSQE1YUMyqCSEE08t8pgb3oXae1cx18BItUcxInM06hkmfW38Dt1570Qw4fTaFA2uC3QzU612S3WJ8ld3nwJ+souv7Zkt2jAiQza/DOdqbEzjGpqIVBLmo01tAkLBz+rwxlq9cV3nQI+jpYklwwjtnE2SYiJeyCSOrQlnaT4hbC+fBWi5t3SHXC3bMi/+zBHjTTwt/vFxoH8GbzxjkI7ha3QtvHYMfqw/ihBGMn8uHh4QZg==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
  • Cc: Grygorii Strashko <grygorii_strashko@xxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Jason Andryuk <jason.andryuk@xxxxxxx>, Teddy Astie <teddy.astie@xxxxxxxxxx>
  • Delivery-date: Wed, 29 Oct 2025 23:55:08 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHcSS9urzbDquX9/E6h94nu5/XwxA==
  • Thread-topic: [XEN][PATCH 2/3] x86/hvm: vmx: account for SHADOW_PAGING when use hvm_shadow_handle_cd()

From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>

The hvm_shadow_handle_cd() can be used only with SHADOW_PAGING=y,
so guard hvm_shadow_handle_cd() call with IS_ENABLED(CONFIG_SHADOW_PAGING).

bloat-o-meter
 add/remove: 0/0 grow/shrink: 0/1 up/down: 0/-290 (-290)

Signed-off-by: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
---
 xen/arch/x86/hvm/vmx/vmx.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index a7ee0519957a..05b394840e59 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -1506,7 +1506,7 @@ static int cf_check vmx_get_guest_pat(struct vcpu *v, u64 
*gpat)
 
 static void cf_check vmx_handle_cd(struct vcpu *v, unsigned long value)
 {
-    if ( !paging_mode_hap(v->domain) )
+    if ( IS_ENABLED(CONFIG_SHADOW_PAGING) && !paging_mode_hap(v->domain) )
     {
         /*
          * For shadow, 'load IA32_PAT' VM-entry control is 0, so it cannot
-- 
2.34.1



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.