[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v8 21/27] ARM: vITS: handle MOVI command
Hi, On 12/04/17 17:59, Julien Grall wrote: > Hi Andre, > > On 12/04/17 01:44, Andre Przywara wrote: >> The MOVI command moves the interrupt affinity from one redistributor >> (read: VCPU) to another. >> For now migration of "live" LPIs is not yet implemented, but we store >> the changed affinity in the host LPI structure and in our virtual ITTE. >> >> Signed-off-by: Andre Przywara <andre.przywara@xxxxxxx> >> --- >> xen/arch/arm/gic-v3-its.c | 24 +++++++++++++++++ >> xen/arch/arm/gic-v3-lpi.c | 15 +++++++++++ >> xen/arch/arm/vgic-v3-its.c | 57 >> ++++++++++++++++++++++++++++++++++++++++ >> xen/include/asm-arm/gic_v3_its.h | 4 +++ >> 4 files changed, 100 insertions(+) >> >> diff --git a/xen/arch/arm/gic-v3-its.c b/xen/arch/arm/gic-v3-its.c >> index fa1f2d5..1a08d43 100644 >> --- a/xen/arch/arm/gic-v3-its.c >> +++ b/xen/arch/arm/gic-v3-its.c >> @@ -895,6 +895,30 @@ struct pending_irq >> *gicv3_assign_guest_event(struct domain *d, >> return pirq; >> } >> >> +/* Changes the target VCPU for a given host LPI assigned to a domain. */ >> +int gicv3_lpi_change_vcpu(struct domain *d, paddr_t vdoorbell, >> + uint32_t vdevid, uint32_t veventid, >> + unsigned int vcpu_id) >> +{ >> + uint32_t host_lpi; >> + struct its_device *dev; >> + >> + spin_lock(&d->arch.vgic.its_devices_lock); >> + dev = get_its_device(d, vdoorbell, vdevid); >> + if ( dev ) >> + host_lpi = get_host_lpi(dev, veventid); >> + else >> + host_lpi = 0; >> + spin_unlock(&d->arch.vgic.its_devices_lock); >> + >> + if ( !host_lpi ) >> + return -ENOENT; >> + >> + gicv3_lpi_update_host_vcpuid(host_lpi, vcpu_id); > > In v5, Stefano suggested to add a TODO here: > > TODO: we do not change physical irq affinity, in response to a virtual > movi command. In other words, the physical LPI will still be delivered > to the same pcpu. > > He was already suggested to print a warning (with gdprintk). I added a TODO, but don't think a warning is a good idea. There is no *requirement* to move the physical affinity along with the virtual one, so printing a warning for something we know will happen seems a bit odd. Cheers, Andre. > I see none of them, where are they? > >> + >> + return 0; >> +} >> + >> /* Scan the DT for any ITS nodes and create a list of host ITSes out >> of it. */ >> void gicv3_its_dt_init(const struct dt_device_node *node) >> { >> diff --git a/xen/arch/arm/gic-v3-lpi.c b/xen/arch/arm/gic-v3-lpi.c >> index d427539..6af5ad9 100644 >> --- a/xen/arch/arm/gic-v3-lpi.c >> +++ b/xen/arch/arm/gic-v3-lpi.c >> @@ -225,6 +225,21 @@ void gicv3_lpi_update_host_entry(uint32_t >> host_lpi, int domain_id, >> write_u64_atomic(&hlpip->data, hlpi.data); >> } >> >> +int gicv3_lpi_update_host_vcpuid(uint32_t host_lpi, unsigned int >> vcpu_id) >> +{ >> + union host_lpi *hlpip; >> + >> + ASSERT(host_lpi >= LPI_OFFSET); >> + >> + host_lpi -= LPI_OFFSET; >> + >> + hlpip = &lpi_data.host_lpis[host_lpi / >> HOST_LPIS_PER_PAGE][host_lpi % HOST_LPIS_PER_PAGE]; >> + >> + write_u16_atomic(&hlpip->vcpu_id, vcpu_id); >> + >> + return 0; >> +} >> + >> static int gicv3_lpi_allocate_pendtable(uint64_t *reg) >> { >> uint64_t val; >> diff --git a/xen/arch/arm/vgic-v3-its.c b/xen/arch/arm/vgic-v3-its.c >> index 0765810..be9de08 100644 >> --- a/xen/arch/arm/vgic-v3-its.c >> +++ b/xen/arch/arm/vgic-v3-its.c >> @@ -647,6 +647,57 @@ out_remove_mapping: >> return ret; >> } >> >> +static int its_handle_movi(struct virt_its *its, uint64_t *cmdptr) >> +{ >> + uint32_t devid = its_cmd_get_deviceid(cmdptr); >> + uint32_t eventid = its_cmd_get_id(cmdptr); >> + int collid = its_cmd_get_collection(cmdptr); > > why collid is signed? From the spec, this should be uint16_t. > >> + unsigned long flags; >> + struct pending_irq *p; >> + struct vcpu *ovcpu, *nvcpu; >> + uint32_t vlpi; >> + int ret = -1; >> + >> + spin_lock(&its->its_lock); >> + /* Check for a mapped LPI and get the LPI number. */ >> + if ( !read_itte_locked(its, devid, eventid, &ovcpu, &vlpi) ) >> + goto out_unlock; >> + >> + if ( vlpi == INVALID_LPI ) >> + { >> + spin_unlock(&its->its_lock); >> + return -1; >> + } >> + >> + /* Check the new collection ID and get the new VCPU pointer */ >> + nvcpu = get_vcpu_from_collection(its, collid); >> + if ( !nvcpu ) >> + goto out_unlock; >> + >> + spin_lock_irqsave(&ovcpu->arch.vgic.lock, flags); >> + >> + /* Update our cached vcpu_id in the pending_irq. */ >> + p = its->d->arch.vgic.handler->lpi_to_pending(its->d, vlpi); > > So the table could be crafted by the guest before enable the LPI in > order to show a valid LPI. This would lead to returning NULL here as it > is not mapped. And crash Xen. > >> + p->lpi_vcpu_id = nvcpu->vcpu_id; >> + >> + /* Now store the new collection in the translation table. */ >> + if ( !write_itte_locked(its, devid, eventid, collid, vlpi, &nvcpu) ) >> + goto out_unlock; >> + >> + spin_unlock_irqrestore(&ovcpu->arch.vgic.lock, flags); >> + spin_unlock(&its->its_lock); >> + >> + /* TODO: lookup currently-in-guest virtual IRQs and migrate them? */ >> + >> + return gicv3_lpi_change_vcpu(its->d, its->doorbell_address, >> + devid, eventid, nvcpu->vcpu_id); >> + >> +out_unlock: >> + spin_unlock(&its->its_lock); >> + >> + return ret; >> +} >> + >> #define ITS_CMD_BUFFER_SIZE(baser) ((((baser) & 0xff) + 1) << 12) >> #define ITS_CMD_OFFSET(reg) ((reg) & GENMASK(19, 5)) >> >> @@ -692,6 +743,12 @@ static int vgic_its_handle_cmds(struct domain *d, >> struct virt_its *its) >> case GITS_CMD_MAPTI: >> ret = its_handle_mapti(its, command); >> break; >> + case GITS_CMD_MOVALL: >> + gdprintk(XENLOG_G_INFO, "ITS: ignoring MOVALL command\n"); > > Again, I'd like some explanation in the commit message why MOVALL is not > implemented and a TODO in the code. > >> + break; >> + case GITS_CMD_MOVI: >> + ret = its_handle_movi(its, command); >> + break; >> case GITS_CMD_SYNC: >> /* We handle ITS commands synchronously, so we ignore >> SYNC. */ >> break; >> diff --git a/xen/include/asm-arm/gic_v3_its.h >> b/xen/include/asm-arm/gic_v3_its.h >> index 7b16aeb..ee69e9b 100644 >> --- a/xen/include/asm-arm/gic_v3_its.h >> +++ b/xen/include/asm-arm/gic_v3_its.h >> @@ -175,8 +175,12 @@ int gicv3_remove_guest_event(struct domain *d, >> paddr_t vdoorbell_address, >> struct pending_irq *gicv3_assign_guest_event(struct domain *d, >> paddr_t doorbell, >> uint32_t devid, uint32_t >> eventid, >> struct vcpu *v, uint32_t >> virt_lpi); >> +int gicv3_lpi_change_vcpu(struct domain *d, paddr_t doorbell, >> + uint32_t devid, uint32_t eventid, >> + unsigned int vcpu_id); >> void gicv3_lpi_update_host_entry(uint32_t host_lpi, int domain_id, >> unsigned int vcpu_id, uint32_t >> virt_lpi); >> +int gicv3_lpi_update_host_vcpuid(uint32_t host_lpi, unsigned int >> vcpu_id); >> >> #else >> >> > > Cheers, > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |