[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3 04/13] xen/arm: support for guest SGI
On Wed, 2013-04-24 at 20:07 +0100, Stefano Stabellini wrote: > Trap writes to GICD_SGIR, parse the requests, inject SGIs into the right > guest vcpu. > > Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> > > Changes in v3: > - make use of cpumask_from_bitmap. > --- > xen/arch/arm/vgic.c | 55 ++++++++++++++++++++++++++++++++++++++++---- > xen/include/asm-arm/gic.h | 3 ++ > 2 files changed, 53 insertions(+), 5 deletions(-) > > diff --git a/xen/arch/arm/vgic.c b/xen/arch/arm/vgic.c > index b30da78..8912aab 100644 > --- a/xen/arch/arm/vgic.c > +++ b/xen/arch/arm/vgic.c > @@ -370,6 +370,7 @@ static void vgic_enable_irqs(struct vcpu *v, uint32_t r, > int n) > > static int vgic_distr_mmio_write(struct vcpu *v, mmio_info_t *info) > { > + struct domain *d = v->domain; > struct hsr_dabt dabt = info->dabt; > struct cpu_user_regs *regs = guest_cpu_user_regs(); > register_t *r = select_user_reg(regs, dabt.reg); > @@ -498,11 +499,55 @@ static int vgic_distr_mmio_write(struct vcpu *v, > mmio_info_t *info) > goto write_ignore; > > case GICD_SGIR: > - if ( dabt.size != 2 ) goto bad_width; > - printk("vGICD: unhandled write %#"PRIregister" to ICFGR%d\n", > - *r, gicd_reg - GICD_ICFGR); > - return 0; > - > + { There seems to be enough meat here to be worth a separate function e.g. vgic_to_sgi(*r); only the dabt.size check need remain. > + cpumask_t vcpu_mask; > + int virtual_irq; > + int filter; > + int vcpuid; > + struct vcpu *vt; > + int i; > + unsigned long bits; > + > + if ( dabt.size != 2 ) goto bad_width; > + > + filter = (*r & GICD_SGI_TARGET_LIST_MASK); > + virtual_irq = (*r & GICD_SGI_INTID_MASK); > + > + cpumask_clear(&vcpu_mask); > + switch ( filter ) > + { > + case GICD_SGI_TARGET_LIST: > + bits = (*r & GICD_SGI_TARGET_MASK) >> > GICD_SGI_TARGET_SHIFT; > + vcpu_mask = cpumask_from_bitmap(&bits, 8); > + break; > + case GICD_SGI_TARGET_OTHERS: > + for ( i = 0; i < d->max_vcpus; i++ ) > + { > + if ( i != current->vcpu_id && d->vcpu[i] != NULL ) > + cpumask_set_cpu(i, &vcpu_mask); > + } > + case GICD_SGI_TARGET_SELF: > + vcpu_mask = *cpumask_of(current->vcpu_id); > + break; > + default: > + printk("vGICD: unhandled GICD_SGIR write %x with wrong > TargetListFilter field\n", *r); We've not been very good at this sort of thing, but this guest triggerable print should be gdprintk. Likewise the one below. > + return 0; > + } > + > + for_each_cpu( vcpuid, &vcpu_mask ) > + { > + if ( vcpuid >= d->max_vcpus || (vt = d->vcpu[vcpuid]) == > NULL || > + virtual_irq >= 16 ) This virtual_irq check could be outside the loop I think. Is it actually illegal (UNDEFINED etc) to send an SGI to a non-existent processor? Actually not even undefined, just one which hasn't been PSCI'd yet. Perhaps this could be silently ignored? > + { > + printk("vGICD: GICD_SGIR write r=%x vcpu_mask=%lx, wrong > CPUTargetList\n", > + *r, *cpumask_bits(&vcpu_mask)); > + return 0; > + } > + vgic_vcpu_inject_irq(vt, virtual_irq, 1); > + } > + return 1; > + } > + > case GICD_CPENDSGIR ... GICD_CPENDSGIRN: > if ( dabt.size != 0 && dabt.size != 2 ) goto bad_width; > printk("vGICD: unhandled %s write %#"PRIregister" to ICPENDSGIR%d\n", > diff --git a/xen/include/asm-arm/gic.h b/xen/include/asm-arm/gic.h > index 92711d5..4f2c8b8 100644 > --- a/xen/include/asm-arm/gic.h > +++ b/xen/include/asm-arm/gic.h > @@ -51,12 +51,15 @@ > #define GICD_SPENDSGIRN (0xF2C/4) > #define GICD_ICPIDR2 (0xFE8/4) > > +#define GICD_SGI_TARGET_LIST_SHIFT (24) > +#define GICD_SGI_TARGET_LIST_MASK (0x3UL << GICD_SGI_TARGET_LIST_SHIFT) > #define GICD_SGI_TARGET_LIST (0UL<<24) > #define GICD_SGI_TARGET_OTHERS (1UL<<24) > #define GICD_SGI_TARGET_SELF (2UL<<24) These hardcoded 24s should become GICD_SGI_TARGET_LIST_SHIFT since you've gone to the trouble of defining it. > #define GICD_SGI_TARGET_SHIFT (16) > #define GICD_SGI_TARGET_MASK (0xFFUL<<GICD_SGI_TARGET_SHIFT) > #define GICD_SGI_GROUP1 (1UL<<15) > +#define GICD_SGI_INTID_MASK (0xFUL) > > #define GICC_CTLR (0x0000/4) > #define GICC_PMR (0x0004/4) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |