[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v5] xen/arm: trap guest WFI
On Wed, 10 Apr 2013, Ian Campbell wrote: > > diff --git a/xen/include/asm-arm/event.h b/xen/include/asm-arm/event.h > > index 10f58af..99a2b13 100644 > > --- a/xen/include/asm-arm/event.h > > +++ b/xen/include/asm-arm/event.h > > @@ -1,27 +1,55 @@ > > #ifndef __ASM_EVENT_H__ > > #define __ASM_EVENT_H__ > > > > +#include <asm/gic.h> > > +#include <asm/domain.h> > > + > > void vcpu_kick(struct vcpu *v); > > void vcpu_mark_events_pending(struct vcpu *v); > > > > -static inline int local_events_need_delivery(void) > > +static inline int _local_events_need_delivery(int check_masked) > > { > > - /* TODO > > - * return (vcpu_info(v, evtchn_upcall_pending) && > > - !vcpu_info(v, evtchn_upcall_mask)); */ > > + struct pending_irq *p = irq_to_pending(current, > > VGIC_IRQ_EVTCHN_CALLBACK); > > + struct cpu_user_regs *regs = guest_cpu_user_regs(); > > + > > + /* guest IRQs are masked */ > > + if ( check_masked && (regs->cpsr & PSR_IRQ_MASK) ) > > return 0; > > + > > + /* XXX: if the first interrupt has already been delivered, we should > > XXX usually means "TODO", whereas this is just a normal comment I think? It is something that we should implement at some point, that's why it is marked as XXX or TODO. > > + * check whether any higher priority interrupts are in the > > + * lr_pending queue or in the LR registers and return 1 only in that > > + * case. > > + * In practice the guest interrupt handler should run with > > + * interrupts disabled so this shouldn't be a problem in the general > > + * case. > > + */ > > + if ( gic_events_need_delivery() ) > > + return 1; > > + > > + if ( vcpu_info(current, evtchn_upcall_pending) && > > + !vcpu_info(current, evtchn_upcall_mask) && > > + list_empty(&p->inflight) ) > > + return 1; > > + > > + return 0; > > +} > > + > > +static inline int local_events_need_delivery(void) > > +{ > > + return _local_events_need_delivery(1); > > } > > > > int local_event_delivery_is_enabled(void); > > > > static inline void local_event_delivery_disable(void) > > { > > - /* TODO current->vcpu_info->evtchn_upcall_mask = 1; */ > > + current->vcpu_info->evtchn_upcall_mask = 1; > > You use vcpu_info in the above, I think you should use it here too for > consistency. OK. > However a bigger concern is that Xen on ARM doesn't really use > evtchn_upcall_mask on the guest side, so I'm not sure the hypervisor > should use it internally either. Good point. > I don't see any callers of this disable function outside of arch/x86. I should just remove the function then. > > } > > > > static inline void local_event_delivery_enable(void) > > This one is called from do_block in common code but if the guest never > sets this then it seems a bit pointless. Perhaps this should be > manipulating CPSR_I instead? I think it's fine to keep it as it is because in the future a guest on ARM might decide to use it and I think it's an interface that we should support. Clearing CPSR_I might be the right thing to do in response to a SCHEDOP_block hypercall, but it is not something we can do in the WFI trap. Given that the SCHEDOP_block hypercall is never called and there is no reason to call it thanks to the existance of WFI, I say we should keep local_event_delivery_enable as it is in this patch. Also PV on HVM x86 guests have the same issue and at the moment they don't clear the interrupt flag in local_event_delivery_enable either. Maybe we should find a way to return an error if a guest calls SCHEDOP_block on ARM? _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |