[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] x86/pv: Inline domain_set_alloc_bitsize() into it's single caller


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
  • Date: Tue, 9 Dec 2025 21:21:34 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=03oTRy/dkZDah/ZFEIu4TRnRO5tGIu7nOfhtozrDRAQ=; b=LcNjZq56Qclrc2PylkkaoLz2sHZg5Mt/s76AhKWy3Ypoc6A5/6EFzzV+pcV2UAjZfma9YX2sAku9AB5A3qHmkUJy/SN2HiQoT+ru0WiX/QP+iu58s4nhKIl2ZIB+ojz98oly8dNrhfBHJBX1K89SrnPAsHN+KlahBIRorFnxPtEcKwFnJBugmPm3zqpNRsAxOxsfadRHMPQfAxyRPrLMYwlxFJwrkZWAVodZqnXemtz/nc0lNPzitKzzVtV7lrSA1a54Gx1lY4WIe1oFRKRaK3NkEWK5JWaQdpH8UjMapQGVH9/oift7N0W2xmANK9rp29Fqmyu6iG3YC/Ul81dLxw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=G2foqDLb9AE6ayX2pIl4l0+PV3twC/cOl6sgfiLGmWq0H+GzTXabiOmEoIR3LZp2rwgrgYopFt1ZL7AXNzaoZNZ+dtpBtBkv11niNlIXbHIWDsjFr24Qfd6JubhahLiwosBRpjHxLBYZsspt4SkXEHVjcOzskyIpGs+FHB2WRG73Qcgaa5+V8TfQ6l1xfOWnEhHgVmGkQyMYN7fUkAkh7YGIkvDPB2RHxQiVwSkEeWoBYfJbjYLs+LvaAcE3HFCbfU3O4dkojVdWE7BDABa2S9MZLwrAlf4FTo0uZM5EUq7/k7UxEDvm/EhE2xZqOiGKaWh5JI3OP/VSpX70TpowuA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
  • Cc: Jan Beulich <JBeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Tue, 09 Dec 2025 19:21:42 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi Andrew,

On 09.12.25 20:07, Andrew Cooper wrote:
Prior to commit 02e78311cdc6 ("x86/domctl: Make XEN_DOMCTL_set_address_size
singleshot") (Xen 4.9, 2016), it was possible for domains to switch to being
compat, and back again.  Since then however, becoming compat is a singleton
action that can't be undone.

 From the context it's clear to see the is_pv_32bit_domain() check is
redundant, and from the singleton nature being the only place setting
physaddr_bitsize, there's no need to check it for being 0.

No functional change.

Co-developed-by: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
---
CC: Jan Beulich <JBeulich@xxxxxxxx>
CC: Roger Pau Monné <roger.pau@xxxxxxxxxx>
CC: Grygorii Strashko <grygorii_strashko@xxxxxxxx>

Split out of series to simplify things.

bloat-o-meter reports:

   add/remove: 0/1 grow/shrink: 1/0 up/down: 25/-96 (-71)
   Function                                     old     new   delta
   switch_compat                                447     472     +25
   domain_set_alloc_bitsize                      96       -     -96

which will mostly be the LFENCEs embedded in is_pv_32bit_domain().

Thank you for doing this.
Not sure if it's needed, any way.
Reviewed-by: Grygorii Strashko <grygorii_strashko@xxxxxxxx>

---
  xen/arch/x86/include/asm/mm.h |  1 -
  xen/arch/x86/pv/domain.c      |  6 +++++-
  xen/arch/x86/x86_64/mm.c      | 13 -------------
  3 files changed, 5 insertions(+), 15 deletions(-)

diff --git a/xen/arch/x86/include/asm/mm.h b/xen/arch/x86/include/asm/mm.h
index 17ca6666a34e..9438f5ea0119 100644
--- a/xen/arch/x86/include/asm/mm.h
+++ b/xen/arch/x86/include/asm/mm.h
@@ -619,7 +619,6 @@ void __iomem *ioremap_wc(paddr_t pa, size_t len);
extern int memory_add(unsigned long spfn, unsigned long epfn, unsigned int pxm); -void domain_set_alloc_bitsize(struct domain *d);
  unsigned int domain_clamp_alloc_bitsize(struct domain *d, unsigned int bits);
  #define domain_clamp_alloc_bitsize(d, bits) domain_clamp_alloc_bitsize(d, 
bits)
diff --git a/xen/arch/x86/pv/domain.c b/xen/arch/x86/pv/domain.c
index 9c4785c187dd..11db6a6d8396 100644
--- a/xen/arch/x86/pv/domain.c
+++ b/xen/arch/x86/pv/domain.c
@@ -254,7 +254,11 @@ int switch_compat(struct domain *d)
              goto undo_and_fail;
      }
- domain_set_alloc_bitsize(d);
+    if ( MACH2PHYS_COMPAT_NR_ENTRIES(d) < max_page )
+        d->arch.physaddr_bitsize =
+            /* 2^n entries can be contained in guest's p2m mapping space */
+            fls(MACH2PHYS_COMPAT_NR_ENTRIES(d)) - 1 + PAGE_SHIFT;
+
      recalculate_cpuid_policy(d);
d->arch.x87_fip_width = 4;
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index d4e6a9c0a2e0..42fd4fe4e9b5 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@ -1119,19 +1119,6 @@ int handle_memadd_fault(unsigned long addr, struct 
cpu_user_regs *regs)
      return ret;
  }
-void domain_set_alloc_bitsize(struct domain *d)
-{
-    if ( !is_pv_32bit_domain(d) ||
-         (MACH2PHYS_COMPAT_NR_ENTRIES(d) >= max_page) ||
-         d->arch.physaddr_bitsize > 0 )
-        return;
-    d->arch.physaddr_bitsize =
-        /* 2^n entries can be contained in guest's p2m mapping space */
-        fls(MACH2PHYS_COMPAT_NR_ENTRIES(d)) - 1
-        /* 2^n pages -> 2^(n+PAGE_SHIFT) bits */
-        + PAGE_SHIFT;
-}
-
  unsigned int domain_clamp_alloc_bitsize(struct domain *d, unsigned int bits)
  {
      if ( (d == NULL) || (d->arch.physaddr_bitsize == 0) )

--
Best regards,
-grygorii




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.