|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4 04/12] xen/arm: support for guest SGI
On Fri, 2013-04-26 at 16:28 +0100, Stefano Stabellini wrote:
> Trap writes to GICD_SGIR, parse the requests, inject SGIs into the right
> guest vcpu.
>
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
>
> Changes in v4:
> - move the code to a separate function;
> - use gdprintk for debugging output;
> - make use of PRIregister;
> - replace the cpumask with a bitmask;
> - move the virtual_irq check outside the loop;
> - ignore non-existent target vcpus.
>
> Changes in v3:
> - make use of cpumask_from_bitmap.
> ---
> xen/arch/arm/vgic.c | 63
> ++++++++++++++++++++++++++++++++++++++++++---
> xen/include/asm-arm/gic.h | 9 ++++--
> 2 files changed, 65 insertions(+), 7 deletions(-)
>
> diff --git a/xen/arch/arm/vgic.c b/xen/arch/arm/vgic.c
> index b30da78..8d87609 100644
> --- a/xen/arch/arm/vgic.c
> +++ b/xen/arch/arm/vgic.c
> @@ -17,6 +17,7 @@
> * GNU General Public License for more details.
> */
>
> +#include <xen/bitops.h>
> #include <xen/config.h>
> #include <xen/lib.h>
> #include <xen/init.h>
> @@ -368,6 +369,61 @@ static void vgic_enable_irqs(struct vcpu *v, uint32_t r,
> int n)
> }
> }
>
> +static int vgic_to_sgi(struct vcpu *v, register_t sgir)
> +{
> + struct domain *d = v->domain;
> + int virtual_irq;
> + int filter;
> + int vcpuid;
> + struct vcpu *vt;
> + int i;
> + unsigned long vcpu_mask = 0;
> +
> + ASSERT(d->max_vcpus < 8*sizeof(vcpu_mask));
> +
> + filter = (sgir & GICD_SGI_TARGET_LIST_MASK);
> + virtual_irq = (sgir & GICD_SGI_INTID_MASK);
> +
> + switch ( filter )
> + {
> + case GICD_SGI_TARGET_LIST:
> + vcpu_mask = (sgir & GICD_SGI_TARGET_MASK) >>
> GICD_SGI_TARGET_SHIFT;
> + break;
> + case GICD_SGI_TARGET_OTHERS:
> + for ( i = 0; i < d->max_vcpus; i++ )
> + {
> + if ( i != current->vcpu_id && d->vcpu[i] != NULL )
> + set_bit(i, &vcpu_mask);
> + }
> + case GICD_SGI_TARGET_SELF:
> + set_bit(current->vcpu_id, &vcpu_mask);
> + break;
> + default:
> + gdprintk(XENLOG_WARNING, "vGICD: unhandled GICD_SGIR write
> %"PRIregister" with wrong TargetListFilter field\n",
> + sgir);
> + return 0;
> + }
> + if ( virtual_irq >= 16 )
> + {
> + gdprintk(XENLOG_WARNING, "vGICD: try to send SGI %d that is >= 16\n",
> + virtual_irq);
> + return 0;
> + }
It occurs to me that the only way this can happen is if we have decoded
the instruction incorrectly, because it's only 4 bits.
It can probably be an ASSERT/BUG_ON.
> +
> +
> + for_each_set_bit( vcpuid, &vcpu_mask, d->max_vcpus )
> + {
> + if ( vcpuid >= d->max_vcpus || (vt = d->vcpu[vcpuid]) == NULL )
Is d->vcpu[vcpuid] == NULL sufficient here? A vcpu which exists but has
not been PSCI'd up will pass this -- what do we do to them? Hopefully we
don't wake them up? Do we not want to check something like _VPF_down
too?
The same likely goes for the TARGET_OTHERS code too which builds the
mask, I'm not sure how this isn't racy against a cpu going down though.
(personally I dislike assignments inside if()s, but they are not
uncommon in the hypervisor code)
> + {
> + gdprintk(XENLOG_WARNING, "vGICD: GICD_SGIR write
> r=%"PRIregister" vcpu_mask=%lx, wrong CPUTargetList\n",
> + sgir, vcpu_mask);
> + continue;
> + }
> + vgic_vcpu_inject_irq(vt, virtual_irq, 1);
> + }
> + return 1;
> +}
> +
> static int vgic_distr_mmio_write(struct vcpu *v, mmio_info_t *info)
> {
> struct hsr_dabt dabt = info->dabt;
> @@ -498,10 +554,9 @@ static int vgic_distr_mmio_write(struct vcpu *v,
> mmio_info_t *info)
> goto write_ignore;
>
> case GICD_SGIR:
> - if ( dabt.size != 2 ) goto bad_width;
> - printk("vGICD: unhandled write %#"PRIregister" to ICFGR%d\n",
> - *r, gicd_reg - GICD_ICFGR);
> - return 0;
> + if ( dabt.size != 2 )
> + goto bad_width;
> + return vgic_to_sgi(v, *r);
>
> case GICD_CPENDSGIR ... GICD_CPENDSGIRN:
> if ( dabt.size != 0 && dabt.size != 2 ) goto bad_width;
> diff --git a/xen/include/asm-arm/gic.h b/xen/include/asm-arm/gic.h
> index 92711d5..061ebf4 100644
> --- a/xen/include/asm-arm/gic.h
> +++ b/xen/include/asm-arm/gic.h
> @@ -51,12 +51,15 @@
> #define GICD_SPENDSGIRN (0xF2C/4)
> #define GICD_ICPIDR2 (0xFE8/4)
>
> -#define GICD_SGI_TARGET_LIST (0UL<<24)
> -#define GICD_SGI_TARGET_OTHERS (1UL<<24)
> -#define GICD_SGI_TARGET_SELF (2UL<<24)
> +#define GICD_SGI_TARGET_LIST_SHIFT (24)
> +#define GICD_SGI_TARGET_LIST_MASK (0x3UL << GICD_SGI_TARGET_LIST_SHIFT)
Can you line the others up with these please, you are touching most of
them anyway.
> +#define GICD_SGI_TARGET_LIST (0UL<<GICD_SGI_TARGET_LIST_SHIFT)
> +#define GICD_SGI_TARGET_OTHERS (1UL<<GICD_SGI_TARGET_LIST_SHIFT)
> +#define GICD_SGI_TARGET_SELF (2UL<<GICD_SGI_TARGET_LIST_SHIFT)
> #define GICD_SGI_TARGET_SHIFT (16)
> #define GICD_SGI_TARGET_MASK (0xFFUL<<GICD_SGI_TARGET_SHIFT)
> #define GICD_SGI_GROUP1 (1UL<<15)
> +#define GICD_SGI_INTID_MASK (0xFUL)
>
> #define GICC_CTLR (0x0000/4)
> #define GICC_PMR (0x0004/4)
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |