[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v5 05/13] x86: add COS information for each domain
On 17/04/15 15:33, Chao Peng wrote: > In Xen's implementation, the CAT enforcement granularity is per domain. > Due to the length of CBM and the number of COS may be socket-different, > each domain has COS ID for each socket. The domain get COS=0 by default > and at runtime its COS is then allocated dynamically when user specifies > a CBM for the domain. > > Signed-off-by: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx> > Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> > --- > xen/arch/x86/domain.c | 6 +++++- > xen/arch/x86/psr.c | 42 ++++++++++++++++++++++++++++++++++++++++++ > xen/include/asm-x86/domain.h | 5 ++++- > xen/include/asm-x86/psr.h | 3 +++ > 4 files changed, 54 insertions(+), 2 deletions(-) > > diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c > index c26c732..a0b5e25 100644 > --- a/xen/arch/x86/domain.c > +++ b/xen/arch/x86/domain.c > @@ -617,6 +617,9 @@ int arch_domain_create(struct domain *d, unsigned int > domcr_flags, > /* 64-bit PV guest by default. */ > d->arch.is_32bit_pv = d->arch.has_32bit_shinfo = 0; > > + if ( (rc = psr_domain_init(d)) != 0 ) > + goto fail; > + > /* initialize default tsc behavior in case tools don't */ > tsc_set_info(d, TSC_MODE_DEFAULT, 0UL, 0, 0); > spin_lock_init(&d->arch.vtsc_lock); > @@ -635,6 +638,7 @@ int arch_domain_create(struct domain *d, unsigned int > domcr_flags, > free_perdomain_mappings(d); > if ( is_pv_domain(d) ) > free_xenheap_page(d->arch.pv_domain.gdt_ldt_l1tab); > + psr_domain_free(d); > return rc; > } > > @@ -658,7 +662,7 @@ void arch_domain_destroy(struct domain *d) > free_xenheap_page(d->shared_info); > cleanup_domain_irq_mapping(d); > > - psr_free_rmid(d); > + psr_domain_free(d); > } > > void arch_domain_shutdown(struct domain *d) > diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c > index 11e44c4..592d610 100644 > --- a/xen/arch/x86/psr.c > +++ b/xen/arch/x86/psr.c > @@ -215,6 +215,48 @@ void psr_ctxt_switch_to(struct domain *d) > } > } > > +/* Called with domain lock held, no psr specific lock needed */ > +static void psr_free_cos(struct domain *d) > +{ > + unsigned int socket; > + unsigned int cos; > + > + if( !d->arch.psr_cos_ids ) > + return; > + > + for ( socket = 0; socket < nr_sockets; socket++ ) > + { > + if ( !cat_socket_info[socket].enabled ) > + continue; > + > + if ( (cos = d->arch.psr_cos_ids[socket]) == 0 ) > + continue; > + > + cat_socket_info[socket].cos_to_cbm[cos].ref--; This must be done with the spinlock held. ~Andrew > + } > + > + xfree(d->arch.psr_cos_ids); > + d->arch.psr_cos_ids = NULL; > +} > + > +int psr_domain_init(struct domain *d) > +{ > + if ( cat_socket_info ) > + { > + d->arch.psr_cos_ids = xzalloc_array(unsigned int, nr_sockets); > + if ( !d->arch.psr_cos_ids ) > + return -ENOMEM; > + } > + > + return 0; > +} > + > +void psr_domain_free(struct domain *d) > +{ > + psr_free_rmid(d); > + psr_free_cos(d); > +} > + > static void cat_cpu_init(void) > { > unsigned int eax, ebx, ecx, edx; > diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h > index e5102cc..324011d 100644 > --- a/xen/include/asm-x86/domain.h > +++ b/xen/include/asm-x86/domain.h > @@ -333,7 +333,10 @@ struct arch_domain > struct e820entry *e820; > unsigned int nr_e820; > > - unsigned int psr_rmid; /* RMID assigned to the domain for CMT */ > + /* RMID assigned to the domain for CMT */ > + unsigned int psr_rmid; > + /* COS assigned to the domain for each socket */ > + unsigned int *psr_cos_ids; > > /* Shared page for notifying that explicit PIRQ EOI is required. */ > unsigned long *pirq_eoi_map; > diff --git a/xen/include/asm-x86/psr.h b/xen/include/asm-x86/psr.h > index 3bc5496..45392bf 100644 > --- a/xen/include/asm-x86/psr.h > +++ b/xen/include/asm-x86/psr.h > @@ -52,6 +52,9 @@ void psr_free_rmid(struct domain *d); > > void psr_ctxt_switch_to(struct domain *d); > > +int psr_domain_init(struct domain *d); > +void psr_domain_free(struct domain *d); > + > #endif /* __ASM_PSR_H__ */ > > /* _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |