From nobody Fri Sep 12 02:05:28 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1676418247; cv=none; d=zohomail.com; s=zohoarc; b=gGEiWjpKQacv52YpNZZ7zznxz006S1jkhFmHxr9EbwMDXQKAiFYiIP9zA2LRiG8A8CdThCyA84rW5mFse8nhbOtsupOf1RzHErV3tGxWy3NSbMvVQsIg4qaDV1XLrEOj9TZKL/qZ9Z4qWx2XuW2R36CdtG+tvNLNe4XaUPetnr8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1676418247; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=Z40VkkwrmUyIeMTtJumJ0ZZ+MxtCwdlfdOTgvqHiqrQ=; b=JORCHNhBGer3HplW2hO9uKgSEn1hzBkAxXbrwqVTIrc1XIpHiOMn+4iYM5QjGr+DPLRtfeuWYEsmW7qd3gcreyU7KhvgdIUHoyZfQXOXF1aCNRq4Cx57Zi0nPJKzWgjK2mlOuD6xmBu/UTfp68a6PB/yE2lFYe297s5wrBw2whA= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1676418247948477.6162745337459; Tue, 14 Feb 2023 15:44:07 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1pS4xa-0005JN-5o; Tue, 14 Feb 2023 18:43:42 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1pS4xX-0005IU-Tm for qemu-devel@nongnu.org; Tue, 14 Feb 2023 18:43:39 -0500 Received: from ams.source.kernel.org ([2604:1380:4601:e00::1]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1pS4xV-0003kL-Vl for qemu-devel@nongnu.org; Tue, 14 Feb 2023 18:43:39 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id B7ADDB81F65; Tue, 14 Feb 2023 23:43:36 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9A999C4339C; Tue, 14 Feb 2023 23:43:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1676418215; bh=5GTiFvLhRRfUKC0J3OLKtptMqNJZ2Qh9y/l3bmnCVvw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=k4vRxuQTHxsbbJ+jvsH6HqhiZlyxy3PsvQWdFasnl8XsZBoVeoOFGmonEOaR0S7Za +h9+HU78BXN1Kf7VVyEmI5C5iCv+jBPVgw/G1bN2V9qQUolpCx3GFsfMhmh7+y8NW6 o5Toe/GRk1aaEs86rG6c8mfpvAyk6NiBqMlOFDjVP/p6JrKNKAKEo+5Jn09OqOE434 Up8Ec2nJ6ASNSrymQTqLCPKAgYdz1Q9l5JIxzHP7zAZYI99Vu6dTZAN9bmbTHhBYww JpV2cxoKwft+UUcXJ7chSwiMqPfl3trmTk5NH+p4ATw46T3Z7UpY3B+l/QG04BvCcW Mkg1PZNVX+7fg== From: Stefano Stabellini To: peter.maydell@linaro.org Cc: sstabellini@kernel.org, qemu-devel@nongnu.org, Stefano Stabellini , Vikram Garhwal , Paul Durrant , =?UTF-8?q?Alex=20Benn=C3=A9e?= Subject: [PULL v2 03/10] hw/i386/xen/xen-hvm: move x86-specific fields out of XenIOState Date: Tue, 14 Feb 2023 15:43:23 -0800 Message-Id: <20230214234330.2107879-3-sstabellini@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2604:1380:4601:e00::1; envelope-from=sstabellini@kernel.org; helo=ams.source.kernel.org X-Spam_score_int: -43 X-Spam_score: -4.4 X-Spam_bar: ---- X-Spam_report: (-4.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @kernel.org) X-ZM-MESSAGEID: 1676418250096100006 From: Stefano Stabellini In preparation to moving most of xen-hvm code to an arch-neutral location, = move: - shared_vmport_page - log_for_dirtybit - dirty_bitmap - suspend - wakeup out of XenIOState struct as these are only used on x86, especially the ones related to dirty logging. Updated XenIOState can be used for both aarch64 and x86. Also, remove free_phys_offset as it was unused. Signed-off-by: Stefano Stabellini Signed-off-by: Vikram Garhwal Reviewed-by: Paul Durrant Reviewed-by: Alex Benn=C3=A9e --- hw/i386/xen/xen-hvm.c | 58 ++++++++++++++++++++----------------------- 1 file changed, 27 insertions(+), 31 deletions(-) diff --git a/hw/i386/xen/xen-hvm.c b/hw/i386/xen/xen-hvm.c index 1fba0e0ae1..06c446e7be 100644 --- a/hw/i386/xen/xen-hvm.c +++ b/hw/i386/xen/xen-hvm.c @@ -73,6 +73,7 @@ struct shared_vmport_iopage { }; typedef struct shared_vmport_iopage shared_vmport_iopage_t; #endif +static shared_vmport_iopage_t *shared_vmport_page; =20 static inline uint32_t xen_vcpu_eport(shared_iopage_t *shared_page, int i) { @@ -95,6 +96,11 @@ typedef struct XenPhysmap { } XenPhysmap; =20 static QLIST_HEAD(, XenPhysmap) xen_physmap; +static const XenPhysmap *log_for_dirtybit; +/* Buffer used by xen_sync_dirty_bitmap */ +static unsigned long *dirty_bitmap; +static Notifier suspend; +static Notifier wakeup; =20 typedef struct XenPciDevice { PCIDevice *pci_dev; @@ -105,7 +111,6 @@ typedef struct XenPciDevice { typedef struct XenIOState { ioservid_t ioservid; shared_iopage_t *shared_page; - shared_vmport_iopage_t *shared_vmport_page; buffered_iopage_t *buffered_io_page; xenforeignmemory_resource_handle *fres; QEMUTimer *buffered_io_timer; @@ -125,14 +130,8 @@ typedef struct XenIOState { MemoryListener io_listener; QLIST_HEAD(, XenPciDevice) dev_list; DeviceListener device_listener; - hwaddr free_phys_offset; - const XenPhysmap *log_for_dirtybit; - /* Buffer used by xen_sync_dirty_bitmap */ - unsigned long *dirty_bitmap; =20 Notifier exit; - Notifier suspend; - Notifier wakeup; } XenIOState; =20 /* Xen specific function for piix pci */ @@ -462,10 +461,10 @@ static int xen_remove_from_physmap(XenIOState *state, } =20 QLIST_REMOVE(physmap, list); - if (state->log_for_dirtybit =3D=3D physmap) { - state->log_for_dirtybit =3D NULL; - g_free(state->dirty_bitmap); - state->dirty_bitmap =3D NULL; + if (log_for_dirtybit =3D=3D physmap) { + log_for_dirtybit =3D NULL; + g_free(dirty_bitmap); + dirty_bitmap =3D NULL; } g_free(physmap); =20 @@ -626,16 +625,16 @@ static void xen_sync_dirty_bitmap(XenIOState *state, return; } =20 - if (state->log_for_dirtybit =3D=3D NULL) { - state->log_for_dirtybit =3D physmap; - state->dirty_bitmap =3D g_new(unsigned long, bitmap_size); - } else if (state->log_for_dirtybit !=3D physmap) { + if (log_for_dirtybit =3D=3D NULL) { + log_for_dirtybit =3D physmap; + dirty_bitmap =3D g_new(unsigned long, bitmap_size); + } else if (log_for_dirtybit !=3D physmap) { /* Only one range for dirty bitmap can be tracked. */ return; } =20 rc =3D xen_track_dirty_vram(xen_domid, start_addr >> TARGET_PAGE_BITS, - npages, state->dirty_bitmap); + npages, dirty_bitmap); if (rc < 0) { #ifndef ENODATA #define ENODATA ENOENT @@ -650,7 +649,7 @@ static void xen_sync_dirty_bitmap(XenIOState *state, } =20 for (i =3D 0; i < bitmap_size; i++) { - unsigned long map =3D state->dirty_bitmap[i]; + unsigned long map =3D dirty_bitmap[i]; while (map !=3D 0) { j =3D ctzl(map); map &=3D ~(1ul << j); @@ -676,12 +675,10 @@ static void xen_log_start(MemoryListener *listener, static void xen_log_stop(MemoryListener *listener, MemoryRegionSection *se= ction, int old, int new) { - XenIOState *state =3D container_of(listener, XenIOState, memory_listen= er); - if (old & ~new & (1 << DIRTY_MEMORY_VGA)) { - state->log_for_dirtybit =3D NULL; - g_free(state->dirty_bitmap); - state->dirty_bitmap =3D NULL; + log_for_dirtybit =3D NULL; + g_free(dirty_bitmap); + dirty_bitmap =3D NULL; /* Disable dirty bit tracking */ xen_track_dirty_vram(xen_domid, 0, 0, NULL); } @@ -1021,9 +1018,9 @@ static void handle_vmport_ioreq(XenIOState *state, io= req_t *req) { vmware_regs_t *vmport_regs; =20 - assert(state->shared_vmport_page); + assert(shared_vmport_page); vmport_regs =3D - &state->shared_vmport_page->vcpu_vmport_regs[state->send_vcpu]; + &shared_vmport_page->vcpu_vmport_regs[state->send_vcpu]; QEMU_BUILD_BUG_ON(sizeof(*req) < sizeof(*vmport_regs)); =20 current_cpu =3D state->cpu_by_vcpu_id[state->send_vcpu]; @@ -1468,7 +1465,6 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRegi= on **ram_memory) =20 state->memory_listener =3D xen_memory_listener; memory_listener_register(&state->memory_listener, &address_space_memor= y); - state->log_for_dirtybit =3D NULL; =20 state->io_listener =3D xen_io_listener; memory_listener_register(&state->io_listener, &address_space_io); @@ -1489,19 +1485,19 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRe= gion **ram_memory) QLIST_INIT(&xen_physmap); xen_read_physmap(state); =20 - state->suspend.notify =3D xen_suspend_notifier; - qemu_register_suspend_notifier(&state->suspend); + suspend.notify =3D xen_suspend_notifier; + qemu_register_suspend_notifier(&suspend); =20 - state->wakeup.notify =3D xen_wakeup_notifier; - qemu_register_wakeup_notifier(&state->wakeup); + wakeup.notify =3D xen_wakeup_notifier; + qemu_register_wakeup_notifier(&wakeup); =20 rc =3D xen_get_vmport_regs_pfn(xen_xc, xen_domid, &ioreq_pfn); if (!rc) { DPRINTF("shared vmport page at pfn %lx\n", ioreq_pfn); - state->shared_vmport_page =3D + shared_vmport_page =3D xenforeignmemory_map(xen_fmem, xen_domid, PROT_READ|PROT_WRITE, 1, &ioreq_pfn, NULL); - if (state->shared_vmport_page =3D=3D NULL) { + if (shared_vmport_page =3D=3D NULL) { error_report("map shared vmport IO page returned error %d hand= le=3D%p", errno, xen_xc); goto err; --=20 2.25.1