|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3 04/13] xen/arm: support for guest SGI
On Wed, 2013-04-24 at 20:07 +0100, Stefano Stabellini wrote:
> Trap writes to GICD_SGIR, parse the requests, inject SGIs into the right
> guest vcpu.
>
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
>
> Changes in v3:
> - make use of cpumask_from_bitmap.
> ---
> xen/arch/arm/vgic.c | 55 ++++++++++++++++++++++++++++++++++++++++----
> xen/include/asm-arm/gic.h | 3 ++
> 2 files changed, 53 insertions(+), 5 deletions(-)
>
> diff --git a/xen/arch/arm/vgic.c b/xen/arch/arm/vgic.c
> index b30da78..8912aab 100644
> --- a/xen/arch/arm/vgic.c
> +++ b/xen/arch/arm/vgic.c
> @@ -370,6 +370,7 @@ static void vgic_enable_irqs(struct vcpu *v, uint32_t r,
> int n)
>
> static int vgic_distr_mmio_write(struct vcpu *v, mmio_info_t *info)
> {
> + struct domain *d = v->domain;
> struct hsr_dabt dabt = info->dabt;
> struct cpu_user_regs *regs = guest_cpu_user_regs();
> register_t *r = select_user_reg(regs, dabt.reg);
> @@ -498,11 +499,55 @@ static int vgic_distr_mmio_write(struct vcpu *v,
> mmio_info_t *info)
> goto write_ignore;
>
> case GICD_SGIR:
> - if ( dabt.size != 2 ) goto bad_width;
> - printk("vGICD: unhandled write %#"PRIregister" to ICFGR%d\n",
> - *r, gicd_reg - GICD_ICFGR);
> - return 0;
> -
> + {
There seems to be enough meat here to be worth a separate function e.g.
vgic_to_sgi(*r); only the dabt.size check need remain.
> + cpumask_t vcpu_mask;
> + int virtual_irq;
> + int filter;
> + int vcpuid;
> + struct vcpu *vt;
> + int i;
> + unsigned long bits;
> +
> + if ( dabt.size != 2 ) goto bad_width;
> +
> + filter = (*r & GICD_SGI_TARGET_LIST_MASK);
> + virtual_irq = (*r & GICD_SGI_INTID_MASK);
> +
> + cpumask_clear(&vcpu_mask);
> + switch ( filter )
> + {
> + case GICD_SGI_TARGET_LIST:
> + bits = (*r & GICD_SGI_TARGET_MASK) >>
> GICD_SGI_TARGET_SHIFT;
> + vcpu_mask = cpumask_from_bitmap(&bits, 8);
> + break;
> + case GICD_SGI_TARGET_OTHERS:
> + for ( i = 0; i < d->max_vcpus; i++ )
> + {
> + if ( i != current->vcpu_id && d->vcpu[i] != NULL )
> + cpumask_set_cpu(i, &vcpu_mask);
> + }
> + case GICD_SGI_TARGET_SELF:
> + vcpu_mask = *cpumask_of(current->vcpu_id);
> + break;
> + default:
> + printk("vGICD: unhandled GICD_SGIR write %x with wrong
> TargetListFilter field\n", *r);
We've not been very good at this sort of thing, but this guest
triggerable print should be gdprintk. Likewise the one below.
> + return 0;
> + }
> +
> + for_each_cpu( vcpuid, &vcpu_mask )
> + {
> + if ( vcpuid >= d->max_vcpus || (vt = d->vcpu[vcpuid]) ==
> NULL ||
> + virtual_irq >= 16 )
This virtual_irq check could be outside the loop I think.
Is it actually illegal (UNDEFINED etc) to send an SGI to a non-existent
processor? Actually not even undefined, just one which hasn't been
PSCI'd yet. Perhaps this could be silently ignored?
> + {
> + printk("vGICD: GICD_SGIR write r=%x vcpu_mask=%lx, wrong
> CPUTargetList\n",
> + *r, *cpumask_bits(&vcpu_mask));
> + return 0;
> + }
> + vgic_vcpu_inject_irq(vt, virtual_irq, 1);
> + }
> + return 1;
> + }
> +
> case GICD_CPENDSGIR ... GICD_CPENDSGIRN:
> if ( dabt.size != 0 && dabt.size != 2 ) goto bad_width;
> printk("vGICD: unhandled %s write %#"PRIregister" to ICPENDSGIR%d\n",
> diff --git a/xen/include/asm-arm/gic.h b/xen/include/asm-arm/gic.h
> index 92711d5..4f2c8b8 100644
> --- a/xen/include/asm-arm/gic.h
> +++ b/xen/include/asm-arm/gic.h
> @@ -51,12 +51,15 @@
> #define GICD_SPENDSGIRN (0xF2C/4)
> #define GICD_ICPIDR2 (0xFE8/4)
>
> +#define GICD_SGI_TARGET_LIST_SHIFT (24)
> +#define GICD_SGI_TARGET_LIST_MASK (0x3UL << GICD_SGI_TARGET_LIST_SHIFT)
> #define GICD_SGI_TARGET_LIST (0UL<<24)
> #define GICD_SGI_TARGET_OTHERS (1UL<<24)
> #define GICD_SGI_TARGET_SELF (2UL<<24)
These hardcoded 24s should become GICD_SGI_TARGET_LIST_SHIFT since
you've gone to the trouble of defining it.
> #define GICD_SGI_TARGET_SHIFT (16)
> #define GICD_SGI_TARGET_MASK (0xFFUL<<GICD_SGI_TARGET_SHIFT)
> #define GICD_SGI_GROUP1 (1UL<<15)
> +#define GICD_SGI_INTID_MASK (0xFUL)
>
> #define GICC_CTLR (0x0000/4)
> #define GICC_PMR (0x0004/4)
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |