[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] x86/HVM: don't mark evtchn upcall vector as pending when vLAPIC is disabled


  • To: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Mon, 21 Nov 2022 12:14:50 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=uu95olh0a1stZdTCzdFwRikBa491MDOhLph4j6+HwDA=; b=hm1ELtZAvDCq3YEMdihPyOLgSmQ7oFZPxZjybXBo3okwXT0XFBPoXf387HqdIBoYzUKJC1tp8NM/moVFrMOftjoYlLpJPD3MoH8dswsPPm3B/HEWdmNtcdyWH8JRssQpBkB8y4aQK0EJC5yYKUBPGSHb9BR0aVuMC49kOxw6GDl8a6X0IsKu+aEkoQeKLbaEBB5t73q1W+KiGa94xGZpj1WAKTe/OttBT37KQbPJ64GqYxBgT5loVTfjUaln5K2i8OertoTBIuU4VaR78PzP2PMxooQWkVTB2HTa1vDi7w8Oe8PVzJ+TcJLRXMawWQXmVASMExb4HOTZPq1rsT4o6w==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MXubM4kpG2yWFsCnZKUYZ7mNVWjtZXY9wE3/mxW47cKKGuNy7wfgb7eGNIWgmbDLuFvOkLMMR/WMna1zz1N5xh08jB8Oxf9jjxQFSNzh89LYljvxJxOeHoFgMhqz9dZyWD7CWe3GBnUHpTI9fE2s8rtq2nSuBj1aaBeOaGb3hjun3clSBtJcqTWQTwv9g1RWAG6bQdE2xGyWOhAzThC3HLJL1oewrsb7dC6KrWG6uzOPtNNYyMbhxDYXUtejdm/3mdMJH52u88H0uBPPmagCAiRXPWlt3qDqDIZ+MfHwTQwjMeAIFucfkITLQWQBO0hwR4D7dOd+rrWM4VRHjCiQPw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Paul Durrant <paul@xxxxxxx>
  • Delivery-date: Mon, 21 Nov 2022 11:14:55 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 21.11.2022 11:53, Roger Pau Monné wrote:
> On Mon, Nov 21, 2022 at 09:33:53AM +0100, Jan Beulich wrote:
>> On 18.11.2022 15:26, Roger Pau Monné wrote:
>>> Maybe best to add an ASSERT in vlapic_set_irq() to be sure the lapic is
>>> enabled, as other callers already check this before trying to inject?
>>
>> Perhaps, yes (once we've fixed paths where the check is presently
>> missing).
> 
> Another option would be to unconditionally return 0 for IRR and ISR
> reads when the LAPIC is disabled, that would avoid having to force the
> event channel injection when the LAPIC is enabled, but there could be
> more than just the event channel vector queued in that way which would
> be against the spec.

Pre-existing set IRR bits remain set when moving into disabled mode. If
we faked zeros for reads, we'd violate the spec and undermine Linux'es
checking of the bits.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.