...where there is more than one dereference inside a function.
This shortens the code and makes it more readable. No functional change.
Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
void viridian_apic_assist_set(const struct vcpu *v)
{
- HV_VP_ASSIST_PAGE *ptr = v->arch.hvm.viridian->vp_assist.ptr;
+ struct viridian_vcpu *vv = v->arch.hvm.viridian;
+ HV_VP_ASSIST_PAGE *ptr = vv->vp_assist.ptr;
if ( !ptr )
return;
* wrong and the VM will most likely hang so force a crash now
* to make the problem clear.
*/
- if ( v->arch.hvm.viridian->apic_assist_pending )
+ if ( vv->apic_assist_pending )
domain_crash(v->domain);
- v->arch.hvm.viridian->apic_assist_pending = true;
+ vv->apic_assist_pending = true;
ptr->ApicAssist.no_eoi = 1;
}
bool viridian_apic_assist_completed(const struct vcpu *v)
{
- HV_VP_ASSIST_PAGE *ptr = v->arch.hvm.viridian->vp_assist.ptr;
+ struct viridian_vcpu *vv = v->arch.hvm.viridian;
+ HV_VP_ASSIST_PAGE *ptr = vv->vp_assist.ptr;
if ( !ptr )
return false;
- if ( v->arch.hvm.viridian->apic_assist_pending &&
- !ptr->ApicAssist.no_eoi )
+ if ( vv->apic_assist_pending && !ptr->ApicAssist.no_eoi )
{
/* An EOI has been avoided */
- v->arch.hvm.viridian->apic_assist_pending = false;
+ vv->apic_assist_pending = false;
return true;
}
void viridian_apic_assist_clear(const struct vcpu *v)
{
- HV_VP_ASSIST_PAGE *ptr = v->arch.hvm.viridian->vp_assist.ptr;
+ struct viridian_vcpu *vv = v->arch.hvm.viridian;
+ HV_VP_ASSIST_PAGE *ptr = vv->vp_assist.ptr;
if ( !ptr )
return;
ptr->ApicAssist.no_eoi = 0;
- v->arch.hvm.viridian->apic_assist_pending = false;
+ vv->apic_assist_pending = false;
}
int viridian_synic_wrmsr(struct vcpu *v, uint32_t idx, uint64_t val)
{
+ struct viridian_vcpu *vv = v->arch.hvm.viridian;
+
switch ( idx )
{
case HV_X64_MSR_EOI:
case HV_X64_MSR_VP_ASSIST_PAGE:
/* release any previous mapping */
- viridian_unmap_guest_page(&v->arch.hvm.viridian->vp_assist);
- v->arch.hvm.viridian->vp_assist.msr.raw = val;
- viridian_dump_guest_page(v, "VP_ASSIST",
- &v->arch.hvm.viridian->vp_assist);
- if ( v->arch.hvm.viridian->vp_assist.msr.fields.enabled )
- viridian_map_guest_page(v, &v->arch.hvm.viridian->vp_assist);
+ viridian_unmap_guest_page(&vv->vp_assist);
+ vv->vp_assist.msr.raw = val;
+ viridian_dump_guest_page(v, "VP_ASSIST", &vv->vp_assist);
+ if ( vv->vp_assist.msr.fields.enabled )
+ viridian_map_guest_page(v, &vv->vp_assist);
break;
default:
void viridian_synic_save_vcpu_ctxt(const struct vcpu *v,
struct hvm_viridian_vcpu_context *ctxt)
{
- ctxt->apic_assist_pending = v->arch.hvm.viridian->apic_assist_pending;
- ctxt->vp_assist_msr = v->arch.hvm.viridian->vp_assist.msr.raw;
+ const struct viridian_vcpu *vv = v->arch.hvm.viridian;
+
+ ctxt->apic_assist_pending = vv->apic_assist_pending;
+ ctxt->vp_assist_msr = vv->vp_assist.msr.raw;
}
void viridian_synic_load_vcpu_ctxt(
struct vcpu *v, const struct hvm_viridian_vcpu_context *ctxt)
{
- v->arch.hvm.viridian->vp_assist.msr.raw = ctxt->vp_assist_msr;
- if ( v->arch.hvm.viridian->vp_assist.msr.fields.enabled )
- viridian_map_guest_page(v, &v->arch.hvm.viridian->vp_assist);
+ struct viridian_vcpu *vv = v->arch.hvm.viridian;
+
+ vv->vp_assist.msr.raw = ctxt->vp_assist_msr;
+ if ( vv->vp_assist.msr.fields.enabled )
+ viridian_map_guest_page(v, &vv->vp_assist);
- v->arch.hvm.viridian->apic_assist_pending = ctxt->apic_assist_pending;
+ vv->apic_assist_pending = ctxt->apic_assist_pending;
}
/*
int viridian_time_wrmsr(struct vcpu *v, uint32_t idx, uint64_t val)
{
struct domain *d = v->domain;
+ struct viridian_domain *vd = d->arch.hvm.viridian;
switch ( idx )
{
if ( !(viridian_feature_mask(d) & HVMPV_reference_tsc) )
return X86EMUL_EXCEPTION;
- d->arch.hvm.viridian->reference_tsc.raw = val;
+ vd->reference_tsc.raw = val;
dump_reference_tsc(d);
- if ( d->arch.hvm.viridian->reference_tsc.fields.enabled )
+ if ( vd->reference_tsc.fields.enabled )
update_reference_tsc(d, true);
break;
int viridian_time_rdmsr(const struct vcpu *v, uint32_t idx, uint64_t *val)
{
- struct domain *d = v->domain;
+ const struct domain *d = v->domain;
+ struct viridian_domain *vd = d->arch.hvm.viridian;
switch ( idx )
{
if ( !(viridian_feature_mask(d) & HVMPV_reference_tsc) )
return X86EMUL_EXCEPTION;
- *val = d->arch.hvm.viridian->reference_tsc.raw;
+ *val = vd->reference_tsc.raw;
break;
case HV_X64_MSR_TIME_REF_COUNT:
{
- struct viridian_time_ref_count *trc =
- &d->arch.hvm.viridian->time_ref_count;
+ struct viridian_time_ref_count *trc = &vd->time_ref_count;
if ( !(viridian_feature_mask(d) & HVMPV_time_ref_count) )
return X86EMUL_EXCEPTION;
void viridian_time_save_domain_ctxt(
const struct domain *d, struct hvm_viridian_domain_context *ctxt)
{
- ctxt->time_ref_count = d->arch.hvm.viridian->time_ref_count.val;
- ctxt->reference_tsc = d->arch.hvm.viridian->reference_tsc.raw;
+ const struct viridian_domain *vd = d->arch.hvm.viridian;
+
+ ctxt->time_ref_count = vd->time_ref_count.val;
+ ctxt->reference_tsc = vd->reference_tsc.raw;
}
void viridian_time_load_domain_ctxt(
struct domain *d, const struct hvm_viridian_domain_context *ctxt)
{
- d->arch.hvm.viridian->time_ref_count.val = ctxt->time_ref_count;
- d->arch.hvm.viridian->reference_tsc.raw = ctxt->reference_tsc;
+ struct viridian_domain *vd = d->arch.hvm.viridian;
+
+ vd->time_ref_count.val = ctxt->time_ref_count;
+ vd->reference_tsc.raw = ctxt->reference_tsc;
- if ( d->arch.hvm.viridian->reference_tsc.fields.enabled )
+ if ( vd->reference_tsc.fields.enabled )
update_reference_tsc(d, false);
}
uint32_t subleaf, struct cpuid_leaf *res)
{
const struct domain *d = v->domain;
+ const struct viridian_domain *vd = d->arch.hvm.viridian;
ASSERT(is_viridian_domain(d));
ASSERT(leaf >= 0x40000000 && leaf < 0x40000100);
* Hypervisor information, but only if the guest has set its
* own version number.
*/
- if ( d->arch.hvm.viridian->guest_os_id.raw == 0 )
+ if ( vd->guest_os_id.raw == 0 )
break;
res->a = viridian_build;
res->b = ((uint32_t)viridian_major << 16) | viridian_minor;
case 4:
/* Recommended hypercall usage. */
- if ( (d->arch.hvm.viridian->guest_os_id.raw == 0) ||
- (d->arch.hvm.viridian->guest_os_id.fields.os < 4) )
+ if ( vd->guest_os_id.raw == 0 || vd->guest_os_id.fields.os < 4 )
break;
res->a = CPUID4A_RELAX_TIMER_INT;
if ( viridian_feature_mask(d) & HVMPV_hcall_remote_tlb_flush )
int guest_wrmsr_viridian(struct vcpu *v, uint32_t idx, uint64_t val)
{
+ struct viridian_vcpu *vv = v->arch.hvm.viridian;
struct domain *d = v->domain;
+ struct viridian_domain *vd = d->arch.hvm.viridian;
ASSERT(is_viridian_domain(d));
switch ( idx )
{
case HV_X64_MSR_GUEST_OS_ID:
- d->arch.hvm.viridian->guest_os_id.raw = val;
+ vd->guest_os_id.raw = val;
dump_guest_os_id(d);
break;
case HV_X64_MSR_HYPERCALL:
- d->arch.hvm.viridian->hypercall_gpa.raw = val;
+ vd->hypercall_gpa.raw = val;
dump_hypercall(d);
- if ( d->arch.hvm.viridian->hypercall_gpa.fields.enabled )
+ if ( vd->hypercall_gpa.fields.enabled )
enable_hypercall_page(d);
break;
case HV_X64_MSR_CRASH_P3:
case HV_X64_MSR_CRASH_P4:
BUILD_BUG_ON(HV_X64_MSR_CRASH_P4 - HV_X64_MSR_CRASH_P0 >=
- ARRAY_SIZE(v->arch.hvm.viridian->crash_param));
+ ARRAY_SIZE(vv->crash_param));
idx -= HV_X64_MSR_CRASH_P0;
- v->arch.hvm.viridian->crash_param[idx] = val;
+ vv->crash_param[idx] = val;
break;
case HV_X64_MSR_CRASH_CTL:
spin_unlock(&d->shutdown_lock);
gprintk(XENLOG_WARNING, "VIRIDIAN CRASH: %lx %lx %lx %lx %lx\n",
- v->arch.hvm.viridian->crash_param[0],
- v->arch.hvm.viridian->crash_param[1],
- v->arch.hvm.viridian->crash_param[2],
- v->arch.hvm.viridian->crash_param[3],
- v->arch.hvm.viridian->crash_param[4]);
+ vv->crash_param[0], vv->crash_param[1], vv->crash_param[2],
+ vv->crash_param[3], vv->crash_param[4]);
break;
}
int guest_rdmsr_viridian(const struct vcpu *v, uint32_t idx, uint64_t *val)
{
- struct domain *d = v->domain;
+ const struct viridian_vcpu *vv = v->arch.hvm.viridian;
+ const struct domain *d = v->domain;
+ const struct viridian_domain *vd = d->arch.hvm.viridian;
ASSERT(is_viridian_domain(d));
switch ( idx )
{
case HV_X64_MSR_GUEST_OS_ID:
- *val = d->arch.hvm.viridian->guest_os_id.raw;
+ *val = vd->guest_os_id.raw;
break;
case HV_X64_MSR_HYPERCALL:
- *val = d->arch.hvm.viridian->hypercall_gpa.raw;
+ *val = vd->hypercall_gpa.raw;
break;
case HV_X64_MSR_VP_INDEX:
case HV_X64_MSR_CRASH_P3:
case HV_X64_MSR_CRASH_P4:
BUILD_BUG_ON(HV_X64_MSR_CRASH_P4 - HV_X64_MSR_CRASH_P0 >=
- ARRAY_SIZE(v->arch.hvm.viridian->crash_param));
+ ARRAY_SIZE(vv->crash_param));
idx -= HV_X64_MSR_CRASH_P0;
- *val = v->arch.hvm.viridian->crash_param[idx];
+ *val = vv->crash_param[idx];
break;
case HV_X64_MSR_CRASH_CTL:
hvm_domain_context_t *h)
{
const struct domain *d = v->domain;
+ const struct viridian_domain *vd = d->arch.hvm.viridian;
struct hvm_viridian_domain_context ctxt = {
- .hypercall_gpa = d->arch.hvm.viridian->hypercall_gpa.raw,
- .guest_os_id = d->arch.hvm.viridian->guest_os_id.raw,
+ .hypercall_gpa = vd->hypercall_gpa.raw,
+ .guest_os_id = vd->guest_os_id.raw,
};
if ( !is_viridian_domain(d) )
static int viridian_load_domain_ctxt(struct domain *d,
hvm_domain_context_t *h)
{
+ struct viridian_domain *vd = d->arch.hvm.viridian;
struct hvm_viridian_domain_context ctxt;
if ( hvm_load_entry_zeroextend(VIRIDIAN_DOMAIN, h, &ctxt) != 0 )
return -EINVAL;
- d->arch.hvm.viridian->hypercall_gpa.raw = ctxt.hypercall_gpa;
- d->arch.hvm.viridian->guest_os_id.raw = ctxt.guest_os_id;
+ vd->hypercall_gpa.raw = ctxt.hypercall_gpa;
+ vd->guest_os_id.raw = ctxt.guest_os_id;
viridian_time_load_domain_ctxt(d, &ctxt);