[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v9 21/28] ARM: vITS: handle MAPTI command
Hi, On 23/05/17 00:39, Stefano Stabellini wrote: > On Thu, 11 May 2017, Andre Przywara wrote: >> @@ -556,6 +583,93 @@ static int its_handle_mapd(struct virt_its *its, >> uint64_t *cmdptr) >> return ret; >> } >> >> +static int its_handle_mapti(struct virt_its *its, uint64_t *cmdptr) >> +{ >> + uint32_t devid = its_cmd_get_deviceid(cmdptr); >> + uint32_t eventid = its_cmd_get_id(cmdptr); >> + uint32_t intid = its_cmd_get_physical_id(cmdptr), _intid; >> + uint16_t collid = its_cmd_get_collection(cmdptr); >> + struct pending_irq *pirq; >> + struct vcpu *vcpu = NULL; >> + int ret = -1; > > I think we need to check the eventid to be valid, don't we? Yes, but this will be done below as part of write_itte_locked(), in fact already read_itte_locked(). Shall I add a comment about this? Cheers, Andre >> + if ( its_cmd_get_command(cmdptr) == GITS_CMD_MAPI ) >> + intid = eventid; >> + >> + spin_lock(&its->its_lock); >> + /* >> + * Check whether there is a valid existing mapping. If yes, behavior is >> + * unpredictable, we choose to ignore this command here. >> + * This makes sure we start with a pristine pending_irq below. >> + */ >> + if ( read_itte_locked(its, devid, eventid, &vcpu, &_intid) && >> + _intid != INVALID_LPI ) >> + { >> + spin_unlock(&its->its_lock); >> + return -1; >> + } >> + >> + /* Enter the mapping in our virtual ITS tables. */ >> + if ( !write_itte_locked(its, devid, eventid, collid, intid, &vcpu) ) >> + { >> + spin_unlock(&its->its_lock); >> + return -1; >> + } >> + >> + spin_unlock(&its->its_lock); >> + >> + /* >> + * Connect this virtual LPI to the corresponding host LPI, which is >> + * determined by the same device ID and event ID on the host side. >> + * This returns us the corresponding, still unused pending_irq. >> + */ >> + pirq = gicv3_assign_guest_event(its->d, its->doorbell_address, >> + devid, eventid, vcpu, intid); >> + if ( !pirq ) >> + goto out_remove_mapping; >> + >> + vgic_init_pending_irq(pirq, intid); >> + >> + /* >> + * Now read the guest's property table to initialize our cached state. >> + * It can't fire at this time, because it is not known to the host yet. >> + * We don't need the VGIC VCPU lock here, because the pending_irq isn't >> + * in the radix tree yet. >> + */ >> + ret = update_lpi_property(its->d, pirq); >> + if ( ret ) >> + goto out_remove_host_entry; >> + >> + pirq->lpi_vcpu_id = vcpu->vcpu_id; >> + /* >> + * Mark this LPI as new, so any older (now unmapped) LPI in any LR >> + * can be easily recognised as such. >> + */ >> + set_bit(GIC_IRQ_GUEST_PRISTINE_LPI, &pirq->status); >> + >> + /* >> + * Now insert the pending_irq into the domain's LPI tree, so that >> + * it becomes live. >> + */ >> + write_lock(&its->d->arch.vgic.pend_lpi_tree_lock); >> + ret = radix_tree_insert(&its->d->arch.vgic.pend_lpi_tree, intid, pirq); >> + write_unlock(&its->d->arch.vgic.pend_lpi_tree_lock); >> + >> + if ( !ret ) >> + return 0; >> + >> +out_remove_host_entry: >> + gicv3_remove_guest_event(its->d, its->doorbell_address, devid, eventid); >> + >> +out_remove_mapping: >> + spin_lock(&its->its_lock); >> + write_itte_locked(its, devid, eventid, >> + UNMAPPED_COLLECTION, INVALID_LPI, NULL); >> + spin_unlock(&its->its_lock); >> + >> + return ret; >> +} _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |