[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 02/17] arm64: vgic-v3: Add ICV_BPR1_EL1 handler
On 27/03/18 12:15, Manish Jaggi wrote: > > > On 03/27/2018 04:41 PM, Marc Zyngier wrote: >> On 27/03/18 12:07, Manish Jaggi wrote: >>> >>> On 03/27/2018 04:35 PM, Marc Zyngier wrote: >>>> On 27/03/18 11:56, Manish Jaggi wrote: >>>>> On 03/27/2018 04:15 PM, Marc Zyngier wrote: >>>>>> On 27/03/18 11:35, Manish Jaggi wrote: >>>>>>> On 03/27/2018 04:00 PM, Marc Zyngier wrote: >>>>>>>> On 27/03/18 10:07, Manish Jaggi wrote: >>>>>>>>> This patch is ported to xen from linux commit >>>>>>>>> d70c7b31a60f2458f35c226131f2a01a7a98b6cf >>>>>>>>> KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler >>>>>>>>> >>>>>>>>> Add a handler for reading/writing the guest's view of the ICC_BPR1_EL1 >>>>>>>>> register, which is located in the ICH_VMCR_EL2.BPR1 field. >>>>>>>>> >>>>>>>>> Signed-off-by: Manish Jaggi <manish.jaggi@xxxxxxxxxx> >>>>>>>>> --- >>>>>>>>> xen/arch/arm/arm64/vgic-v3-sr.c | 70 >>>>>>>>> +++++++++++++++++++++++++++++++++++++ >>>>>>>>> xen/include/asm-arm/arm64/sysregs.h | 1 + >>>>>>>>> xen/include/asm-arm/gic_v3_defs.h | 6 ++++ >>>>>>>>> 3 files changed, 77 insertions(+) >>>>>>>>> >>>>>>>>> diff --git a/xen/arch/arm/arm64/vgic-v3-sr.c >>>>>>>>> b/xen/arch/arm/arm64/vgic-v3-sr.c >>>>>>>>> index 39ab1ed6ca..ed4254acf9 100644 >>>>>>>>> --- a/xen/arch/arm/arm64/vgic-v3-sr.c >>>>>>>>> +++ b/xen/arch/arm/arm64/vgic-v3-sr.c >>>>>>>>> @@ -18,10 +18,76 @@ >>>>>>>>> */ >>>>>>>>> >>>>>>>>> #include <asm/current.h> >>>>>>>>> +#include <asm/gic_v3_defs.h> >>>>>>>>> #include <asm/regs.h> >>>>>>>>> #include <asm/system.h> >>>>>>>>> #include <asm/traps.h> >>>>>>>>> >>>>>>>>> +#define vtr_to_nr_pre_bits(v) ((((uint32_t)(v) >> 26) & 7) + 1) >>>>>>>>> + >>>>>>>>> +static int vgic_v3_bpr_min(void) >>>>>>>>> +{ >>>>>>>>> + /* See Pseudocode for VPriorityGroup */ >>>>>>>>> + return 8 - vtr_to_nr_pre_bits(READ_SYSREG32(ICH_VTR_EL2)); >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> +static unsigned int vgic_v3_get_bpr0(uint32_t vmcr) >>>>>>>>> +{ >>>>>>>>> + return (vmcr & ICH_VMCR_BPR0_MASK) >> ICH_VMCR_BPR0_SHIFT; >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> +static unsigned int vgic_v3_get_bpr1(uint32_t vmcr) >>>>>>>>> +{ >>>>>>>>> + unsigned int bpr; >>>>>>>>> + >>>>>>>>> + if ( vmcr & ICH_VMCR_CBPR_MASK ) >>>>>>>>> + { >>>>>>>>> + bpr = vgic_v3_get_bpr0(vmcr); >>>>>>>>> + if ( bpr < 7 ) >>>>>>>>> + bpr++; >>>>>>>>> + } >>>>>>>>> + else >>>>>>>>> + bpr = (vmcr & ICH_VMCR_BPR1_MASK) >> ICH_VMCR_BPR1_SHIFT; >>>>>>>>> + >>>>>>>>> + return bpr; >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> +static void vgic_v3_read_bpr1(struct cpu_user_regs *regs, int regidx) >>>>>>>>> +{ >>>>>>>>> + uint32_t vmcr = READ_SYSREG32(ICH_VMCR_EL2); >>>>>>>>> + >>>>>>>>> + set_user_reg(regs, regidx, vgic_v3_get_bpr1(vmcr)); >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> +static void vgic_v3_write_bpr1(struct cpu_user_regs *regs, int >>>>>>>>> regidx) >>>>>>>>> +{ >>>>>>>>> + register_t val = get_user_reg(regs, regidx); >>>>>>>>> + uint8_t bpr_min = vgic_v3_bpr_min(); >>>>>>>>> + uint32_t vmcr = READ_SYSREG32(ICH_VMCR_EL2); >>>>>>>>> + >>>>>>>>> + if ( vmcr & ICH_VMCR_CBPR_MASK ) >>>>>>>>> + return; >>>>>>>>> + >>>>>>>>> + /* Enforce BPR limiting */ >>>>>>>>> + if ( val < bpr_min ) >>>>>>>>> + val = bpr_min; >>>>>>>>> + >>>>>>>>> + val <<= ICH_VMCR_BPR1_SHIFT; >>>>>>>>> + val &= ICH_VMCR_BPR1_MASK; >>>>>>>>> + vmcr &= ~ICH_VMCR_BPR1_MASK; >>>>>>>>> + vmcr |= val; >>>>>>>>> + >>>>>>>>> + WRITE_SYSREG32(vmcr, ICH_VMCR_EL2); >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> +static void vreg_emulate_bpr1(struct cpu_user_regs *regs, const >>>>>>>>> union hsr hsr) >>>>>>>>> +{ >>>>>>>>> + if ( hsr.sysreg.read ) >>>>>>>>> + vgic_v3_read_bpr1(regs, hsr.sysreg.reg); >>>>>>>>> + else >>>>>>>>> + vgic_v3_write_bpr1(regs, hsr.sysreg.reg); >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> /* >>>>>>>>> * returns true if the register is emulated. >>>>>>>>> */ >>>>>>>>> @@ -40,6 +106,10 @@ bool vgic_v3_handle_cpuif_access(struct >>>>>>>>> cpu_user_regs *regs) >>>>>>>>> >>>>>>>>> switch ( hsr.bits & HSR_SYSREG_REGS_MASK ) >>>>>>>>> { >>>>>>>>> + case HSR_SYSREG_ICC_BPR1_EL1: >>>>>>>>> + vreg_emulate_bpr1(regs, hsr); >>>>>>>>> + break; >>>>>>>> What is the rational for indirecting through a function and moving the >>>>>>>> reading of VMCR to the leaf functions? I appreciate that this doesn't >>>>>>>> change much, but since this is a port of existing code, it will make >>>>>>>> more complex the port of potential fixes. >>>>>>> I used xen template of handling sysreg traps >>>>>>> If you see the file xen/arch/arm/arm64/sysreg.c >>>>>>> a handle_XXX function is used throughout... >>>>>> Sure, but this is not sysreg.c. This is a separate file for a reason >>>>>> (i.e. it is imported code). Anyway, that's for the Xen maintainers to >>>>>> decide. >>>>>> >>>>>> More importantly, my other question still stand: most trap functions do >>>>>> require VMCR as an input. Why moving it to the leaf functions? >>>>> Same reason, I was keeping the interface same of all handle_XXX functions >>>>> handle_XXX(regs, hsr, ...) >>>>> >>>>> Do you want me to change both to match with your patch or it is ok? >>>> My preference would be to keep the code as initially written, as you're >>>> pointlessly changing the flow. Again, that's for the maintainers to >>>> comment, but you should at the very least indicate that change in the >>>> commit log. >>> I did in the cover letter >> which, crucially, doesn't end-up in the commit. Oh well. > I am working on to address the two points, will send v3 later today. > - will remove emulate functions > - and pass vmcr as a param. > > Will it be possible to review the remaining part of the code, so that I > can address > other comments in v3 as well. I suggest you wait until some other folks have a chance to properly review the series. You only posted the stuff this morning, give them a chance. A week between two versions is probably the right timing. M. -- Jazz is not dead. It just smells funny... _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |