[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 7/9] arm: vgic: fix race between evtchn upcall and evtchnop_send
On Wed, 6 Mar 2013, Ian Campbell wrote: > From: Ian Campbell <ian.campbell@xxxxxxxxxx> > > On ARM the evtchn upcall is done by using a local PPI interrupt. However the > guest will clear the evtchn_upcall_pending bit before it EOIs that PPI (which > happens late). This means vgic_vcpu_inject_irq (called via > vcpu_mark_events_pending) sees the PPI as in flight and ends up not > reinjecting > it, if this happens after the guest has finished its event channel processing > loop but before the EOI then we have lost the upcall. > > We therefore also need to call gic_restore_pending_irqs on the exit to guest > path in order to pickup any newly inject IRQ and propagate it into a free LR. You forgot to mention that on exit to guest, before calling gic_restore_pending_irqs, we check whether we need to reinject the PPI. Aside from this, the patch is fine. > This doesn't currently support bumping a lower priority interrupt out of the > LRs in order to inject a new higher priority interrupt. We don't yet implement > interrupt prioritisation (and guests don't use it either) so this will do for > now. > > Since gic_restore_pending_irqs is now called in the return to guest path it is > called with interrupts disabled and accordinly must use the irqsave/irqrestore > spinlock primitives. > > Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx> > --- > xen/arch/arm/gic.c | 9 +++++++-- > 1 file changed, 7 insertions(+), 2 deletions(-) > > diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c > index 6592562..59e007a 100644 > --- a/xen/arch/arm/gic.c > +++ b/xen/arch/arm/gic.c > @@ -556,17 +556,18 @@ static void gic_restore_pending_irqs(struct vcpu *v) > { > int i; > struct pending_irq *p, *t; > + unsigned long flags; > > list_for_each_entry_safe ( p, t, &v->arch.vgic.lr_pending, lr_queue ) > { > i = find_first_zero_bit(&this_cpu(lr_mask), nr_lrs); > if ( i >= nr_lrs ) return; > > - spin_lock_irq(&gic.lock); > + spin_lock_irqsave(&gic.lock, flags); > gic_set_lr(i, p->irq, GICH_LR_PENDING, p->priority); > list_del_init(&p->lr_queue); > set_bit(i, &this_cpu(lr_mask)); > - spin_unlock_irq(&gic.lock); > + spin_unlock_irqrestore(&gic.lock, flags); > } > > } > @@ -589,6 +590,10 @@ static void gic_inject_irq_stop(void) > > void gic_inject(void) > { > + if ( vcpu_info(current, evtchn_upcall_pending) ) > + vgic_vcpu_inject_irq(current, VGIC_IRQ_EVTCHN_CALLBACK, 1); > + > + gic_restore_pending_irqs(current); > if (!this_cpu(lr_mask)) > gic_inject_irq_stop(); > else > -- > 1.7.10.4 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |