[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH V5] x86/altp2m: Hypercall to set altp2m view visibility
On 03.03.2020 11:30, Jan Beulich wrote: > On 26.02.2020 14:18, Alexandru Stefan ISAILA wrote: >> @@ -4840,6 +4841,19 @@ static int do_altp2m_op( >> break; >> } >> >> + case HVMOP_altp2m_set_visibility: >> + { >> + uint16_t idx = a.u.set_visibility.altp2m_idx; > > Why a fixed width type (and even one inefficient to deal with)? > (One might even ask - why a local variable in the first place, > when it's used ... > >> + if ( a.u.set_visibility.pad ) >> + rc = -EINVAL; >> + else if ( !altp2m_active(d) ) >> + rc = -EOPNOTSUPP; >> + else >> + rc = p2m_set_altp2m_view_visibility(d, idx, >> + a.u.set_visibility.visible); > > ... just once here.) The function takes "unsigned int" in any > event. Sure, I can have this idx dropped and use the value in the structure. I had that in place to have line size smaller and the code easy to read. > >> @@ -3145,6 +3148,35 @@ int p2m_get_suppress_ve(struct domain *d, gfn_t gfn, >> bool *suppress_ve, >> >> return rc; >> } >> + >> +int p2m_set_altp2m_view_visibility(struct domain *d, unsigned int >> altp2m_idx, >> + uint8_t visible) >> +{ >> + altp2m_list_lock(d); >> + >> + /* >> + * Eptp index is correlated with altp2m index and should not exceed >> + * min(MAX_ALTP2M, MAX_EPTP). >> + */ >> + if ( altp2m_idx >= min(ARRAY_SIZE(d->arch.altp2m_p2m), MAX_EPTP) || >> + d->arch.altp2m_eptp[array_index_nospec(altp2m_idx, MAX_EPTP)] == >> + mfn_x(INVALID_MFN) ) >> + { >> + altp2m_list_unlock(d); > > I think it would be nice if this went the normal function exit path. > Would be pretty simple to arrange for by introducing a local variable > holding the function return value. > I had the return here so as not to have boundary issues if the altp2m_idx is wrong and then I have to manipulate altp2m_eptp[]. But sure, it can have a local rc var that is returned at the end of the function and drop this unlock just to use a single one before the return. Alex _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |