|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v1 0/2] xen/arm: maintenance_interrupt SMP fix
According to DT it is a level irq (DT_IRQ_TYPE_LEVEL_HIGH)
On Thu, Jan 30, 2014 at 3:24 PM, Stefano Stabellini
<stefano.stabellini@xxxxxxxxxxxxx> wrote:
> Is it a level or an edge irq?
>
> On Wed, 29 Jan 2014, Julien Grall wrote:
>> Hi,
>>
>> It's weird, physical IRQ should not be injected twice ...
>> Were you able to print the IRQ number?
>>
>> In any case, you are using the old version of the interrupt patch series.
>> Your new error may come of race condition in this code.
>>
>> Can you try to use a newest version?
>>
>> On 29 Jan 2014 18:40, "Oleksandr Tyshchenko"
>> <oleksandr.tyshchenko@xxxxxxxxxxxxxxx> wrote:
>> > Right, that's why changing it to cpumask_of(0) shouldn't make any
>> > difference for xen-unstable (it should make things clearer, if
>> nothing
>> > else) but it should fix things for Oleksandr.
>>
>> Unfortunately, it is not enough for stable work.
>>
>> I was tried to use cpumask_of(smp_processor_id()) instead of
>> cpumask_of(0) in
>> gic_route_irq_to_guest(). And as result, I don't see our situation
>> which cause to deadlock in on_selected_cpus function (expected).
>> But, hypervisor sometimes hangs somewhere else (I have not identified
>> yet where this is happening) or I sometimes see traps, like that:
>> ("WARN_ON(p->desc != NULL)" in maintenance_interrupt() leads to them)
>>
>> (XEN) CPU1: Unexpected Trap: Undefined Instruction
>> (XEN) ----[ Xen-4.4-unstable arm32 debug=y Not tainted ]----
>> (XEN) CPU: 1
>> (XEN) PC: 00242c1c __warn+0x20/0x28
>> (XEN) CPSR: 200001da MODE:Hypervisor
>> (XEN) R0: 0026770c R1: 00000001 R2: 3fd2fd00 R3: 00000fff
>> (XEN) R4: 00406100 R5: 40020ee0 R6: 00000000 R7: 4bfdf000
>> (XEN) R8: 00000001 R9: 4bfd7ed0 R10:00000001 R11:4bfd7ebc
>> R12:00000002
>> (XEN) HYP: SP: 4bfd7eb4 LR: 00242c1c
>> (XEN)
>> (XEN) VTCR_EL2: 80002558
>> (XEN) VTTBR_EL2: 00020000dec6a000
>> (XEN)
>> (XEN) SCTLR_EL2: 30cd187f
>> (XEN) HCR_EL2: 00000000000028b5
>> (XEN) TTBR0_EL2: 00000000d2014000
>> (XEN)
>> (XEN) ESR_EL2: 00000000
>> (XEN) HPFAR_EL2: 0000000000482110
>> (XEN) HDFAR: fa211190
>> (XEN) HIFAR: 00000000
>> (XEN)
>> (XEN) Xen stack trace from sp=4bfd7eb4:
>> (XEN) 0026431c 4bfd7efc 00247a54 00000024 002e6608 002e6608
>> 00000097 00000001
>> (XEN) 00000000 4bfd7f54 40017000 40005f60 40017014 4bfd7f58
>> 00000019 00000000
>> (XEN) 40005f60 4bfd7f24 00248e60 00000009 00000019 00404000
>> 4bfd7f58 00000000
>> (XEN) 00405000 000045f0 002e7694 4bfd7f4c 00248978 c0079a90
>> 00000097 00000097
>> (XEN) 00000000 fa212000 ea80c900 00000001 c05b8a60 4bfd7f54
>> 0024f4b8 4bfd7f58
>> (XEN) 00251830 ea80c950 00000000 00000001 c0079a90 00000097
>> 00000097 00000000
>> (XEN) fa212000 ea80c900 00000001 c05b8a60 00000000 e9879e3c
>> ffffffff b6efbca3
>> (XEN) c03b29fc 60000193 9fffffe7 b6c0bbf0 c0607500 c03b3140
>> e9879eb8 c007680c
>> (XEN) c060750c c03b32c0 c0607518 c03b3360 00000000 00000000
>> 00000000 00000000
>> (XEN) 00000000 00000000 3ff6bebf a0000113 800b0193 800b0093
>> 40000193 00000000
>> (XEN) ffeffbfe fedeefff fffd5ffe
>> (XEN) Xen call trace:
>> (XEN) [<00242c1c>] __warn+0x20/0x28 (PC)
>> (XEN) [<00242c1c>] __warn+0x20/0x28 (LR)
>> (XEN) [<00247a54>] maintenance_interrupt+0xfc/0x2f4
>> (XEN) [<00248e60>] do_IRQ+0x138/0x198
>> (XEN) [<00248978>] gic_interrupt+0x58/0xc0
>> (XEN) [<0024f4b8>] do_trap_irq+0x10/0x14
>> (XEN) [<00251830>] return_from_trap+0/0x4
>> (XEN)
>>
>> Also I am posting maintenance_interrupt() from my tree:
>>
>> static void maintenance_interrupt(int irq, void *dev_id, struct
>> cpu_user_regs *regs)
>> {
>> int i = 0, virq, pirq;
>> uint32_t lr;
>> struct vcpu *v = current;
>> uint64_t eisr = GICH[GICH_EISR0] | (((uint64_t) GICH[GICH_EISR1])
>> << 32);
>>
>> while ((i = find_next_bit((const long unsigned int *) &eisr,
>> 64, i)) < 64) {
>> struct pending_irq *p, *n;
>> int cpu, eoi;
>>
>> cpu = -1;
>> eoi = 0;
>>
>> spin_lock_irq(&gic.lock);
>> lr = GICH[GICH_LR + i];
>> virq = lr & GICH_LR_VIRTUAL_MASK;
>>
>> p = irq_to_pending(v, virq);
>> if ( p->desc != NULL ) {
>> p->desc->status &= ~IRQ_INPROGRESS;
>> /* Assume only one pcpu needs to EOI the irq */
>> cpu = p->desc->arch.eoi_cpu;
>> eoi = 1;
>> pirq = p->desc->irq;
>> }
>> if ( !atomic_dec_and_test(&p->inflight_cnt) )
>> {
>> /* Physical IRQ can't be reinject */
>> WARN_ON(p->desc != NULL);
>> gic_set_lr(i, p->irq, GICH_LR_PENDING, p->priority);
>> spin_unlock_irq(&gic.lock);
>> i++;
>> continue;
>> }
>>
>> GICH[GICH_LR + i] = 0;
>> clear_bit(i, &this_cpu(lr_mask));
>>
>> if ( !list_empty(&v->arch.vgic.lr_pending) ) {
>> n = list_entry(v->arch.vgic.lr_pending.next, typeof(*n),
>> lr_queue);
>> gic_set_lr(i, n->irq, GICH_LR_PENDING, n->priority);
>> list_del_init(&n->lr_queue);
>> set_bit(i, &this_cpu(lr_mask));
>> } else {
>> gic_inject_irq_stop();
>> }
>> spin_unlock_irq(&gic.lock);
>>
>> spin_lock_irq(&v->arch.vgic.lock);
>> list_del_init(&p->inflight);
>> spin_unlock_irq(&v->arch.vgic.lock);
>>
>> if ( eoi ) {
>> /* this is not racy because we can't receive another irq
>> of the
>> * same type until we EOI it. */
>> if ( cpu == smp_processor_id() )
>> gic_irq_eoi((void*)(uintptr_t)pirq);
>> else
>> on_selected_cpus(cpumask_of(cpu),
>> gic_irq_eoi, (void*)(uintptr_t)pirq,
>> 0);
>> }
>>
>> i++;
>> }
>> }
>>
>>
>> Oleksandr Tyshchenko | Embedded Developer
>> GlobalLogic
>>
>>
>>
--
Name | Title
GlobalLogic
P +x.xxx.xxx.xxxx M +x.xxx.xxx.xxxx S skype
www.globallogic.com
http://www.globallogic.com/email_disclaimer.txt
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |