|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] mem_access: switch to plain bool
On Mon, 11 Sep 2017, Wei Liu wrote:
> Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx>
Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>
> ---
> Cc: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
> Cc: Tamas K Lengyel <tamas@xxxxxxxxxxxxx>
> Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>
> Cc: Julien Grall <julien.grall@xxxxxxx>
> Cc: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
> Cc: Jan Beulich <jbeulich@xxxxxxxx>
> Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> ---
> xen/arch/arm/mem_access.c | 4 ++--
> xen/arch/x86/mm/mem_access.c | 16 ++++++++--------
> xen/include/asm-arm/mem_access.h | 8 ++++----
> xen/include/asm-x86/mem_access.h | 8 ++++----
> 4 files changed, 18 insertions(+), 18 deletions(-)
>
> diff --git a/xen/arch/arm/mem_access.c b/xen/arch/arm/mem_access.c
> index db9ad3f3c9..0f2cbb81d3 100644
> --- a/xen/arch/arm/mem_access.c
> +++ b/xen/arch/arm/mem_access.c
> @@ -219,10 +219,10 @@ err:
> return page;
> }
>
> -bool_t p2m_mem_access_check(paddr_t gpa, vaddr_t gla, const struct npfec
> npfec)
> +bool p2m_mem_access_check(paddr_t gpa, vaddr_t gla, const struct npfec npfec)
> {
> int rc;
> - bool_t violation;
> + bool violation;
> xenmem_access_t xma;
> vm_event_request_t *req;
> struct vcpu *v = current;
> diff --git a/xen/arch/x86/mm/mem_access.c b/xen/arch/x86/mm/mem_access.c
> index 414e38f998..9211fc0abe 100644
> --- a/xen/arch/x86/mm/mem_access.c
> +++ b/xen/arch/x86/mm/mem_access.c
> @@ -83,7 +83,7 @@ bool p2m_mem_access_emulate_check(struct vcpu *v,
> const vm_event_response_t *rsp)
> {
> xenmem_access_t access;
> - bool violation = 1;
> + bool violation = true;
> const struct vm_event_mem_access *data = &rsp->u.mem_access;
> struct domain *d = v->domain;
> struct p2m_domain *p2m = NULL;
> @@ -129,7 +129,7 @@ bool p2m_mem_access_emulate_check(struct vcpu *v,
> break;
>
> case XENMEM_access_rwx:
> - violation = 0;
> + violation = false;
> break;
> }
> }
> @@ -137,9 +137,9 @@ bool p2m_mem_access_emulate_check(struct vcpu *v,
> return violation;
> }
>
> -bool_t p2m_mem_access_check(paddr_t gpa, unsigned long gla,
> - struct npfec npfec,
> - vm_event_request_t **req_ptr)
> +bool p2m_mem_access_check(paddr_t gpa, unsigned long gla,
> + struct npfec npfec,
> + vm_event_request_t **req_ptr)
> {
> struct vcpu *v = current;
> unsigned long gfn = gpa >> PAGE_SHIFT;
> @@ -167,7 +167,7 @@ bool_t p2m_mem_access_check(paddr_t gpa, unsigned long
> gla,
> rc = p2m->set_entry(p2m, gfn, mfn, PAGE_ORDER_4K, p2mt,
> p2m_access_rw, -1);
> ASSERT(rc == 0);
> gfn_unlock(p2m, gfn, 0);
> - return 1;
> + return true;
> }
> else if ( p2ma == p2m_access_n2rwx )
> {
> @@ -188,7 +188,7 @@ bool_t p2m_mem_access_check(paddr_t gpa, unsigned long
> gla,
> "no vm_event listener VCPU %d, dom %d\n",
> v->vcpu_id, d->domain_id);
> domain_crash(v->domain);
> - return 0;
> + return false;
> }
> else
> {
> @@ -204,7 +204,7 @@ bool_t p2m_mem_access_check(paddr_t gpa, unsigned long
> gla,
> ASSERT(rc == 0);
> }
> gfn_unlock(p2m, gfn, 0);
> - return 1;
> + return true;
> }
> }
>
> diff --git a/xen/include/asm-arm/mem_access.h
> b/xen/include/asm-arm/mem_access.h
> index 3a155f84eb..1610635c5b 100644
> --- a/xen/include/asm-arm/mem_access.h
> +++ b/xen/include/asm-arm/mem_access.h
> @@ -22,20 +22,20 @@ bool p2m_mem_access_emulate_check(struct vcpu *v,
> const vm_event_response_t *rsp)
> {
> /* Not supported on ARM. */
> - return 0;
> + return false;
> }
>
> /* vm_event and mem_access are supported on any ARM guest */
> -static inline bool_t p2m_mem_access_sanity_check(struct domain *d)
> +static inline bool p2m_mem_access_sanity_check(struct domain *d)
> {
> - return 1;
> + return true;
> }
>
> /*
> * Send mem event based on the access. Boolean return value indicates if trap
> * needs to be injected into guest.
> */
> -bool_t p2m_mem_access_check(paddr_t gpa, vaddr_t gla, const struct npfec
> npfec);
> +bool p2m_mem_access_check(paddr_t gpa, vaddr_t gla, const struct npfec
> npfec);
>
> struct page_info*
> p2m_mem_access_check_and_get_page(vaddr_t gva, unsigned long flag,
> diff --git a/xen/include/asm-x86/mem_access.h
> b/xen/include/asm-x86/mem_access.h
> index 9f7b409b4e..4043c9fb4d 100644
> --- a/xen/include/asm-x86/mem_access.h
> +++ b/xen/include/asm-x86/mem_access.h
> @@ -34,9 +34,9 @@
> * ring. Once having released get_gfn* locks caller must also xfree the
> * request.
> */
> -bool_t p2m_mem_access_check(paddr_t gpa, unsigned long gla,
> - struct npfec npfec,
> - vm_event_request_t **req_ptr);
> +bool p2m_mem_access_check(paddr_t gpa, unsigned long gla,
> + struct npfec npfec,
> + vm_event_request_t **req_ptr);
>
> /* Check for emulation and mark vcpu for skipping one instruction
> * upon rescheduling if required. */
> @@ -44,7 +44,7 @@ bool p2m_mem_access_emulate_check(struct vcpu *v,
> const vm_event_response_t *rsp);
>
> /* Sanity check for mem_access hardware support */
> -static inline bool_t p2m_mem_access_sanity_check(struct domain *d)
> +static inline bool p2m_mem_access_sanity_check(struct domain *d)
> {
> return is_hvm_domain(d) && cpu_has_vmx && hap_enabled(d);
> }
> --
> 2.11.0
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |