[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v17 05/10] x86: dynamically attach/detach CMT service for a guest
On 29/09/14 11:40, Chao Peng wrote: > Add hypervisor side support for dynamically attach and detach > Cache Monitoring Technology(CMT) services for a certain guest. > > When attach CMT service for a guest, system will allocate an > RMID for it. When detach or guest is shutdown, the RMID will be > recycled for future use. > > Signed-off-by: Dongxiao Xu <dongxiao.xu@xxxxxxxxx> > Signed-off-by: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx> > Acked-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> > --- > xen/arch/x86/domain.c | 3 +++ > xen/arch/x86/domctl.c | 29 ++++++++++++++++++++++++++ > xen/arch/x86/psr.c | 46 > ++++++++++++++++++++++++++++++++++++++++++ > xen/include/asm-x86/domain.h | 2 ++ > xen/include/asm-x86/psr.h | 10 +++++++++ > xen/include/public/domctl.h | 12 +++++++++++ > 6 files changed, 102 insertions(+) > > diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c > index 7b1dfe6..3cfd8f4 100644 > --- a/xen/arch/x86/domain.c > +++ b/xen/arch/x86/domain.c > @@ -60,6 +60,7 @@ > #include <xen/numa.h> > #include <xen/iommu.h> > #include <compat/vcpu.h> > +#include <asm/psr.h> > > DEFINE_PER_CPU(struct vcpu *, curr_vcpu); > DEFINE_PER_CPU(unsigned long, cr4); > @@ -647,6 +648,8 @@ void arch_domain_destroy(struct domain *d) > > free_xenheap_page(d->shared_info); > cleanup_domain_irq_mapping(d); > + > + psr_free_rmid(d); > } > > unsigned long pv_guest_cr4_fixup(const struct vcpu *v, unsigned long > guest_cr4) > diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c > index 7a5de43..6ed480a 100644 > --- a/xen/arch/x86/domctl.c > +++ b/xen/arch/x86/domctl.c > @@ -35,6 +35,7 @@ > #include <asm/mem_sharing.h> > #include <asm/xstate.h> > #include <asm/debugger.h> > +#include <asm/psr.h> > > static int gdbsx_guest_mem_io( > domid_t domid, struct xen_domctl_gdbsx_memio *iop) > @@ -1319,6 +1320,34 @@ long arch_do_domctl( > } > break; > > + case XEN_DOMCTL_psr_cmt_op: > + if ( !psr_cmt_enabled() ) > + { > + ret = -ENODEV; > + break; > + } > + > + switch ( domctl->u.psr_cmt_op.cmd ) > + { > + case XEN_DOMCTL_PSR_CMT_OP_ATTACH: > + ret = psr_alloc_rmid(d); > + break; > + case XEN_DOMCTL_PSR_CMT_OP_DETACH: > + if ( d->arch.psr_rmid > 0 ) > + psr_free_rmid(d); > + else > + ret = -ENOENT; > + break; > + case XEN_DOMCTL_PSR_CMT_OP_QUERY_RMID: > + domctl->u.psr_cmt_op.data = d->arch.psr_rmid; > + copyback = 1; > + break; > + default: > + ret = -ENOSYS; > + break; > + } > + break; > + > default: > ret = iommu_do_domctl(domctl, d, u_domctl); > break; > diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c > index a4cbc0a..4b4a4cf 100644 > --- a/xen/arch/x86/psr.c > +++ b/xen/arch/x86/psr.c > @@ -15,6 +15,7 @@ > */ > #include <xen/init.h> > #include <xen/cpu.h> > +#include <xen/sched.h> > #include <asm/psr.h> > > #define PSR_CMT (1<<0) > @@ -103,6 +104,51 @@ static int __init init_psr(void) > } > __initcall(init_psr); > > +/* Called with domain lock held, no psr specific lock needed */ > +int psr_alloc_rmid(struct domain *d) > +{ > + unsigned int rmid; > + > + ASSERT(psr_cmt_enabled()); > + > + if ( d->arch.psr_rmid > 0 ) > + return -EEXIST; > + > + for ( rmid = 1; rmid <= psr_cmt->rmid_max; rmid++ ) > + { > + if ( psr_cmt->rmid_to_dom[rmid] != DOMID_INVALID ) > + continue; > + > + psr_cmt->rmid_to_dom[rmid] = d->domain_id; > + break; > + } > + > + /* No RMID available, assign RMID=0 by default. */ > + if ( rmid > psr_cmt->rmid_max ) > + { > + d->arch.psr_rmid = 0; > + return -EUSERS; > + } > + > + d->arch.psr_rmid = rmid; > + > + return 0; > +} > + > +/* Called with domain lock held, no psr specific lock needed */ > +void psr_free_rmid(struct domain *d) > +{ > + unsigned int rmid; > + > + rmid = d->arch.psr_rmid; > + /* We do not free system reserved "RMID=0". */ > + if ( rmid == 0 ) > + return; > + > + psr_cmt->rmid_to_dom[rmid] = DOMID_INVALID; > + d->arch.psr_rmid = 0; > +} > + > /* > * Local variables: > * mode: C > diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h > index 7abe1b3..2be1d1e 100644 > --- a/xen/include/asm-x86/domain.h > +++ b/xen/include/asm-x86/domain.h > @@ -314,6 +314,8 @@ struct arch_domain > /* Shared page for notifying that explicit PIRQ EOI is required. */ > unsigned long *pirq_eoi_map; > unsigned long pirq_eoi_map_mfn; > + > + unsigned int psr_rmid; /* RMID assigned to the domain for CMT */ > } __cacheline_aligned; > > #define has_arch_pdevs(d) (!list_empty(&(d)->arch.pdev_list)) > diff --git a/xen/include/asm-x86/psr.h b/xen/include/asm-x86/psr.h > index 8a3803c..98cfa6d 100644 > --- a/xen/include/asm-x86/psr.h > +++ b/xen/include/asm-x86/psr.h > @@ -16,6 +16,8 @@ > #ifndef __ASM_PSR_H__ > #define __ASM_PSR_H__ > > +#include <xen/types.h> > + > /* Resource Type Enumeration */ > #define PSR_RESOURCE_TYPE_L3 0x2 > > @@ -38,6 +40,14 @@ struct psr_cmt { > > extern struct psr_cmt *psr_cmt; > > +static inline bool_t psr_cmt_enabled(void) > +{ > + return !!psr_cmt; > +} > + > +int psr_alloc_rmid(struct domain *d); > +void psr_free_rmid(struct domain *d); > + > #endif /* __ASM_PSR_H__ */ > > /* > diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h > index cfa39b3..59220ed 100644 > --- a/xen/include/public/domctl.h > +++ b/xen/include/public/domctl.h > @@ -965,6 +965,16 @@ struct xen_domctl_vnuma { > typedef struct xen_domctl_vnuma xen_domctl_vnuma_t; > DEFINE_XEN_GUEST_HANDLE(xen_domctl_vnuma_t); > > +struct xen_domctl_psr_cmt_op { > +#define XEN_DOMCTL_PSR_CMT_OP_DETACH 0 > +#define XEN_DOMCTL_PSR_CMT_OP_ATTACH 1 > +#define XEN_DOMCTL_PSR_CMT_OP_QUERY_RMID 2 > + uint32_t cmd; > + uint32_t data; > +}; > +typedef struct xen_domctl_psr_cmt_op xen_domctl_psr_cmt_op_t; > +DEFINE_XEN_GUEST_HANDLE(xen_domctl_psr_cmt_op_t); > + > struct xen_domctl { > uint32_t cmd; > #define XEN_DOMCTL_createdomain 1 > @@ -1038,6 +1048,7 @@ struct xen_domctl { > #define XEN_DOMCTL_get_vcpu_msrs 72 > #define XEN_DOMCTL_set_vcpu_msrs 73 > #define XEN_DOMCTL_setvnumainfo 74 > +#define XEN_DOMCTL_psr_cmt_op 75 > #define XEN_DOMCTL_gdbsx_guestmemio 1000 > #define XEN_DOMCTL_gdbsx_pausevcpu 1001 > #define XEN_DOMCTL_gdbsx_unpausevcpu 1002 > @@ -1099,6 +1110,7 @@ struct xen_domctl { > struct xen_domctl_gdbsx_pauseunp_vcpu gdbsx_pauseunp_vcpu; > struct xen_domctl_gdbsx_domstatus gdbsx_domstatus; > struct xen_domctl_vnuma vnuma; > + struct xen_domctl_psr_cmt_op psr_cmt_op; > uint8_t pad[128]; > } u; > }; _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |