From patchwork Mon Mar 14 20:29:25 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Douglas Goldstein X-Patchwork-Id: 8583751 Return-Path: X-Original-To: patchwork-xen-devel@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 5EB029F294 for ; Mon, 14 Mar 2016 20:32:20 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 58E2D202A1 for ; Mon, 14 Mar 2016 20:32:19 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id F17C92034C for ; Mon, 14 Mar 2016 20:32:17 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xen.org with esmtp (Exim 4.84) (envelope-from ) id 1afZ7c-0008ID-4y; Mon, 14 Mar 2016 20:29:48 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.84) (envelope-from ) id 1afZ7b-0008H8-2z for xen-devel@lists.xen.org; Mon, 14 Mar 2016 20:29:47 +0000 Received: from [85.158.139.211] by server-9.bemta-5.messagelabs.com id DF/58-22144-A3F17E65; Mon, 14 Mar 2016 20:29:46 +0000 X-Env-Sender: cardoe@cardoe.com X-Msg-Ref: server-13.tower-206.messagelabs.com!1457987384!28675896!1 X-Originating-IP: [209.85.161.194] X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG X-StarScan-Received: X-StarScan-Version: 8.11; banners=-,-,- X-VirusChecked: Checked Received: (qmail 58621 invoked from network); 14 Mar 2016 20:29:45 -0000 Received: from mail-yw0-f194.google.com (HELO mail-yw0-f194.google.com) (209.85.161.194) by server-13.tower-206.messagelabs.com with AES128-GCM-SHA256 encrypted SMTP; 14 Mar 2016 20:29:45 -0000 Received: by mail-yw0-f194.google.com with SMTP id f6so12846826ywa.1 for ; Mon, 14 Mar 2016 13:29:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cardoe.com; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=yxgwn2VSRUAxOfAudR4j5TQivllcBHaiHy9pEJW0SKU=; b=NvcHShv5tvadM0ZlaT2k21YEvIuZsWX6M5f1Kp6y3vuvZ64F51U9bjRUnO6P4toJTy XedsdjA8/gxwtB0BAPWMkJYzBV25VwubBAtj7bJkN8LX9NLFAs9fq2EmkEolsLBbZYHA oRLsyOp7+D2HRVgmLlK3RkI3RUgt6l5iij3J4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=yxgwn2VSRUAxOfAudR4j5TQivllcBHaiHy9pEJW0SKU=; b=BoWksjVN9RroiViOZhv3pWaFGbzb/8F9jR/Aw4hVYg6dvQ2eTSQAy4cyEkjOBhuF+l wwjZIZi5CmrrOJqc9OJFQ7oRGuVk2t3eyx3A3SsKOgrisovWSNwMwZRmqsGaSPDvuWsp +aRQTbD4q/QQVKa3FyD74+ryQCR0svwDMB5cZNgc9mRIrbA+pdlJNFg04RZuMkeJSgcv NsiLaQKqjqOtJN45o7Vhn+a/+wjTQby13LkePaDN4fitRr62qMYEEb9t7jr0t1Yu+Dyh DujkfTi8wI1W0tfsTnxiX5sUoHWJqL5rafNya8H1YXK5rG5CP/wJgcmwKvkjQzzbq3pf 7fRQ== X-Gm-Message-State: AD7BkJKyHIJgEsyfDo868/XQu4FNBiVoDxedNpXIOdiWmiVzqhmNg5yVeuYZLwrWV5cBCw== X-Received: by 10.13.249.194 with SMTP id j185mr14827907ywf.66.1457987384543; Mon, 14 Mar 2016 13:29:44 -0700 (PDT) Received: from swanson.lan (c-68-46-196-185.hsd1.al.comcast.net. [68.46.196.185]) by smtp.gmail.com with ESMTPSA id v63sm15131124ywf.40.2016.03.14.13.29.43 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 14 Mar 2016 13:29:43 -0700 (PDT) From: Doug Goldstein To: xen-devel@lists.xen.org Date: Mon, 14 Mar 2016 15:29:25 -0500 Message-Id: <1457987365-866-6-git-send-email-cardoe@cardoe.com> X-Mailer: git-send-email 2.4.10 In-Reply-To: <1457987365-866-1-git-send-email-cardoe@cardoe.com> References: <1457987365-866-1-git-send-email-cardoe@cardoe.com> Cc: Keir Fraser , Doug Goldstein , Jan Beulich , Andrew Cooper Subject: [Xen-devel] [PATCH 5/5] tmem: allow tmem to be disabled with Kconfig X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Spam-Status: No, score=-0.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_BL_SPAMCOP_NET, T_DKIM_INVALID, UNPARSEABLE_RELAY autolearn=no version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Wrap the various tmem functions with the Kconfig generated CONFIG_TMEM option allowing users to build Xen without tmem support. Signed-off-by: Doug Goldstein --- CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper CC: Konrad Rzeszutek Wilk --- xen/arch/x86/hvm/hvm.c | 4 ++++ xen/arch/x86/x86_64/compat/entry.S | 4 ++++ xen/arch/x86/x86_64/entry.S | 4 ++++ xen/common/Kconfig | 11 +++++++++++ xen/common/Makefile | 7 ++++--- xen/include/xen/tmem.h | 26 ++++++++++++++++++++++++++ xen/include/xen/tmem_xen.h | 11 +++++++++++ 7 files changed, 64 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 255a1d6..e05a4d9 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -5311,6 +5311,10 @@ typedef unsigned long hvm_hypercall_t( #define compat_grant_table_op hvm_grant_table_op_compat32 #define do_arch_1 paging_domctl_continuation +#ifndef CONFIG_TMEM +#define do_tmem_op do_ni_hypercall +#endif + static const struct { hvm_hypercall_t *native; hvm_hypercall_t *compat; diff --git a/xen/arch/x86/x86_64/compat/entry.S b/xen/arch/x86/x86_64/compat/entry.S index 927439d..5218f8a 100644 --- a/xen/arch/x86/x86_64/compat/entry.S +++ b/xen/arch/x86/x86_64/compat/entry.S @@ -345,6 +345,10 @@ compat_crash_page_fault: #define compat_kexec_op do_ni_hypercall #endif +#ifndef CONFIG_TMEM +#define do_tmem_op do_ni_hypercall +#endif + #ifndef CONFIG_XENOPROF #define compat_xenoprof_op do_ni_hypercall #endif diff --git a/xen/arch/x86/x86_64/entry.S b/xen/arch/x86/x86_64/entry.S index dd7f114..cab9763 100644 --- a/xen/arch/x86/x86_64/entry.S +++ b/xen/arch/x86/x86_64/entry.S @@ -681,6 +681,10 @@ ENTRY(exception_table) #define do_kexec_op do_ni_hypercall #endif +#ifndef CONFIG_TMEM +#define do_tmem_op do_ni_hypercall +#endif + #ifndef CONFIG_XENOPROF #define do_xenoprof_op do_ni_hypercall #endif diff --git a/xen/common/Kconfig b/xen/common/Kconfig index 8fbc46d..24eb60b 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -87,6 +87,17 @@ config LATE_HWDOM If unsure, say N. +# Enables transactional memory support +config TMEM + bool "Transaction Memory Support" + default y + ---help--- + fill me out + +config TMEM_COMPAT + bool + default y if COMPAT && TMEM + # Adds support for Xenoprof config XENOPROF def_bool y diff --git a/xen/common/Makefile b/xen/common/Makefile index 82625a5..8a3c87a 100644 --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -49,8 +49,8 @@ obj-y += sysctl.o obj-y += tasklet.o obj-y += time.o obj-y += timer.o -obj-y += tmem.o -obj-y += tmem_xen.o +obj-$(CONFIG_TMEM) += tmem.o +obj-$(CONFIG_TMEM) += tmem_xen.o obj-y += trace.o obj-y += version.o obj-y += vm_event.o @@ -65,7 +65,8 @@ obj-bin-$(CONFIG_X86) += $(foreach n,decompress bunzip2 unxz unlzma unlzo unlz4 obj-$(perfc) += perfc.o obj-$(crash_debug) += gdbstub.o -obj-$(CONFIG_COMPAT) += $(addprefix compat/,domain.o kernel.o memory.o multicall.o tmem_xen.o xlat.o) +obj-$(CONFIG_COMPAT) += $(addprefix compat/,domain.o kernel.o memory.o multicall.o xlat.o) +obj-$(CONFIG_TMEM_COMPAT) += compat/tmem_xen.o subdir-$(CONFIG_X86) += hvm diff --git a/xen/include/xen/tmem.h b/xen/include/xen/tmem.h index 32a542a..414a14d 100644 --- a/xen/include/xen/tmem.h +++ b/xen/include/xen/tmem.h @@ -11,9 +11,35 @@ struct xen_sysctl_tmem_op; +#ifdef CONFIG_TMEM extern int tmem_control(struct xen_sysctl_tmem_op *op); extern void tmem_destroy(void *); extern void *tmem_relinquish_pages(unsigned int, unsigned int); extern unsigned long tmem_freeable_pages(void); +#else +static inline int +tmem_control(struct xen_sysctl_tmem_op *op) +{ + return -ENOSYS; +} + +static inline void +tmem_destroy(void *p) +{ + return; +} + +static inline void * +tmem_relinquish_pages(unsigned int x, unsigned int y) +{ + return NULL; +} + +static inline unsigned long +tmem_freeable_pages(void) +{ + return 0; +} +#endif /* CONFIG_TMEM */ #endif /* __XEN_TMEM_H__ */ diff --git a/xen/include/xen/tmem_xen.h b/xen/include/xen/tmem_xen.h index b95bde9..33f75e0 100644 --- a/xen/include/xen/tmem_xen.h +++ b/xen/include/xen/tmem_xen.h @@ -64,6 +64,7 @@ static inline bool_t tmem_shared_auth(void) return opt_tmem_shared_auth; } +#ifdef CONFIG_TMEM extern bool_t opt_tmem; static inline bool_t tmem_enabled(void) { @@ -74,6 +75,16 @@ static inline void tmem_disable(void) { opt_tmem = 0; } +#else +static inline bool_t tmem_enabled(void) +{ + return false; +} + +static inline void tmem_disable(void) +{ +} +#endif /* CONFIG_TMEM */ /* * Memory free page list management