[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [RFC] xen/arm: Suspend to RAM Support in Xen for ARM



On Wed, 9 Aug 2017, Mirela Simonovic wrote:
> This document contains our draft proposal for implementing "suspend to RAM"
> support for ARM in Xen, as discussed during the last Xen ARM community call.
> It covers the basic suspend to RAM mechanism based on ARM PSCI standard,
> that would allow individual guests and Xen itself to suspend.
> 
> We would appreciate your feedback.
> 
> Signed-off-by: Mirela Simonovic <mirela.simonovic@xxxxxxxxxx>

I am really sorry, for the very late reply. This email fell through the
cracks. In general, if I forget about an email, please send a follow up
to help me remember :-) Do you have an more up-to-date proposal or is
this still the latest?

From an high level, it looks good, only one minor comment: don't call it
"hotplug" because usually in the Xen community hotplug means adding more
vcpus or removing vcpus at runtime (removing entirely, not suspending).

But the approach looks good to me.


> ---
>  docs/misc/arm/suspend-to-ram.txt | 210 
> +++++++++++++++++++++++++++++++++++++++
>  1 file changed, 210 insertions(+)
>  create mode 100644 docs/misc/arm/suspend-to-ram.txt
> 
> diff --git a/docs/misc/arm/suspend-to-ram.txt 
> b/docs/misc/arm/suspend-to-ram.txt
> new file mode 100644
> index 0000000000..ec8080fc64
> --- /dev/null
> +++ b/docs/misc/arm/suspend-to-ram.txt
> @@ -0,0 +1,210 @@
> +% Suspend to RAM Support in Xen for ARM
> +% Revision 1.0
> +
> +========
> +Overview
> +========
> +
> +Suspend to RAM (in the following text 'suspend') for ARM in Xen should be
> +coordinated using ARM PSCI standard [1].
> +
> +EL1/2 should suspend in the following order:
> +1) Unprivileged guests (DomUs) suspend
> +2) Privileged guest (Dom0) suspends
> +3) Xen suspends
> +
> +Since this proposal is focused on implementing PSCI-based suspend mechanisms 
> in
> +Xen, communication with or among the guests is not covered by this document.
> +The order of suspending the guests is assumed to be guaranteed by the 
> software
> +running in EL1.
> +
> +-----------------
> +Suspending Guests
> +-----------------
> +
> +Suspend procedure for a guest consists of the following:
> +1) Suspending devices
> +2) Suspending non-boot CPUs
> +3) System suspend, performed by the boot CPU
> +
> +Each guest should suspend the devices it owns. Suspending of devices is not
> +covered by this document. The document covers only mechanisms for suspending
> +non-boot CPUs, as well as the system suspend.
> +
> +Guests should suspend their non-boot vCPUs using the hotplug mechanism.
> +Virtual CPUs should be put offline using the already implemented PSCI 
> vCPU_OFF
> +call (prefix 'v' is added to distinguish PSCI calls made by guests to Xen, 
> which
> +affect virtual machines; as opposed to PSCI calls made by Xen to the EL3, 
> which
> +can affect power state of the physical machine).
> +
> +After suspending its non-boot vCPUs a guest should finalize the suspend by
> +making the vSYSTEM_SUSPEND PSCI call. The resume address is specified by the
> +guest via the vSYSTEM_SUSPEND entry_point_address argument. The 
> vSYSTEM_SUSPEND
> +call is currently not implemented in Xen.
> +
> +It is expected that a guest leaves enabled all interrupts that should wake it
> +up. Other interrupts should be disabled by the guest prior to calling
> +vSYSTEM_SUSPEND.
> +
> +After an unprivileged guest suspends, Xen will not suspend. Xen would suspend
> +only after the Dom0 completes the system suspend.
> +
> +--------------
> +Suspending Xen
> +--------------
> +
> +Xen should start suspending itself upon receiving the vSYSTEM_SUSPEND call
> +from the last running guest (Dom0). At that moment all physical CPUs are 
> still
> +online (taking offline a vCPU or suspending a VM does not affect physical 
> CPUs).
> +Xen shall now put offline the non-boot pCPUs by making the CPU_OFF PSCI call
> +to EL3. The CPU_OFF PSCI function is currently not implemented in Xen.
> +
> +After putting offline the non-boot cores Xen must save the context and 
> finalize
> +suspend by invoking SYSTEM_SUSPEND PSCI call, which is passed to EL3.
> +The resume point of Xen is specified by the entry_point_address argument of 
> the
> +SYSTEM_SUSPEND call. The SYSTEM_SUSPEND function and context saving is not
> +implemented in Xen for ARM today.
> +
> +------------
> +Resuming Xen
> +------------
> +
> +Xen must be resumed prior to any software running in EL1. Starting from the
> +resume point, Xen should restore the context and resume Dom0. Dom0 shall 
> always
> +be resumed whenever Xen resumes.
> +The whole Xen resume flow for the ARM architecture has to be implemented.
> +
> +---------------
> +Resuming Guests
> +---------------
> +
> +Resume of the privileged guest (Dom0) is always following the Xen resume.
> +
> +An unprivileged guest shall resume once a device it owns triggers a wake-up
> +interrupt, regardless of whether Xen was suspended when the wake-up interrupt
> +was triggered. If Xen was suspended, it is assumed that Dom0 will be running
> +before the DomU guest starts to resume. The synchronization mechanism to
> +enforce the assumed condition is TBD.
> +
> +If the ARM's GIC was powered down after the ARM subsystem suspended, it is
> +assumed that Xen needs to restore the GIC interface for a VM prior to handing
> +over control to the guest. However, the guest should restore its own context
> +upon entering the resume point (out of scope of this document).
> +
> +=======================
> +Implementation Proposal
> +=======================
> +
> +--------
> +Overview
> +--------
> +
> +In order to enable the suspend/resume of VMs and Xen itself, the following 
> PSCI
> +calls have to be implemented and integrated in Xen:
> +1) vSYSTEM_SUSPEND
> +2) CPU_OFF
> +3) SYSTEM_SUSPEND
> +
> +In addition, the following have to be implemented:
> +* Save/restore of EL2 context
> +* Save/restore of GIC configuration for each VM
> +
> +Implementation details are provided in the sections below. Function names and
> +paths used below are consistent within the document but may not always match 
> the
> +names used in future implementation. Existing functions and paths are named 
> as
> +in Xen source tree.
> +
> +Note: The proposal is still incomplete and shall be refined in future 
> revisions.
> +Specific issues that are not addressed are marked as "TBD".
> +
> +-------------------------------------
> +Suspend/Resume Implementation Details
> +-------------------------------------
> +
> +PSCI Implementation and Integration
> +-----------------------------------
> +vSYSTEM_SUSPEND
> +---------------
> +vSYSTEM_SUSPEND shall be implemented in
> +* do_psci_system_suspend() in arch/arm/vpsci.c
> +
> +The implementation shall include the following steps:
> +* Block the current vCPU
> +* If the hardware domain made the call trigger Xen suspend, i.e.
> +  call machine_suspend() which will be implemented in arch/arm/suspend.c
> + (similar as the machine_restart() is implemented in arch/arm/shutdown.c)
> +
> +The function do_psci_system_suspend() shall be called from
> +* do_trap_psci() in arch/arm/traps.c
> +
> +CPU_OFF (physical CPUs)
> +-----------------------
> +The CPU_OFF function shall be implemented in
> +* call_psci_cpu_off() in arch/arm/psci.c
> +
> +The implementation shall consist just of making the SMC call to EL3.
> +
> +This function needs to be called when Xen generic code disables non-boot 
> CPUs,
> +which is done by
> +* disable_nonboot_cpus() in common/cpu.c
> +This function calls architecture specific
> +* __cpu_die() implemented in arch/arm/smpboot.c
> +The call_psci_cpu_off() shall be invoked when the respective CPU dies. To 
> make
> +that happen, the
> +* arch_cpu_die() would be implemented in arch/arm/arm64/smpboot.c
> +and called from __cpu_die().
> +Finally the call_psci_cpu_off() shall be invoked from arch_cpu_die().
> +
> +Such a control flow would be similar to the already existing flow for 
> enabling
> +non-boot CPUs, which looks like this:
> +enable_nonboot_cpus() -> cpu_up() -> __cpu_up() -> arch_cpu_up() ->
> +call_psci_cpu_on()
> +
> +SYSTEM_SUSPEND (physical)
> +-------------------------
> +The SYSTEM_SUSPEND function shall be implemented in
> +* call_psci_system_suspend() in arch/arm/psci.c
> +
> +The implementation shall consist just of making the SMC call to EL3. The
> +entry_point_address argument of the SMC call needs to be an ARM architecture
> +resume address. The call_psci_system_suspend() function does not return.
> +
> +The function needs to be called from machine_suspend() to finalize the 
> suspend
> +procedure.
> +
> +------------------
> +Additional Changes
> +------------------
> +
> +Suspend Flow
> +------------
> +The suspend procedure shall be implemented in
> +* machine_suspend() in arch/arm/suspend.c
> +
> +The implementation shall include the following steps:
> +* Set the system_state variable to SYS_STATE_suspend
> +* Freeze domains by calling domain_pause() for each domain (we assume this 
> needs
> +  to be done)
> +* Disable non-boot CPUs by calling disable_nonboot_cpus()
> +* Save ARM specific context
> +
> +Resume Flow
> +------------
> +The resume procedure shall be implemented in
> +* machine_resume() in arch/arm/suspend.c
> +
> +The machine_resume() implementation shall include the following steps:
> +* Restore ARM specific context
> +* Enable non-boot CPUs by calling enable_nonboot_cpus()
> +* Thaw domains by calling domain_unpause() for each domain (we assume this 
> needs
> +  to be done)
> +* Set the system_state variable to SYS_STATE_resume
> +* TBD: how to resume Dom0, i.e. how to hand over control to Dom0?
> +
> +==========
> +References
> +==========
> +
> +[1] Power State Coordination Interface (ARM):
> +http://infocenter.arm.com/help/topic/com.arm.doc.den0022d/Power_State_Coordination_Interface_PDD_v1_1_DEN0022D.pdf
> +
> -- 
> 2.13.0
> 
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> https://lists.xen.org/xen-devel
> 

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.