[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v1 3/4] arm/sysctl: Implement cpu hotplug ops


  • To: Julien Grall <julien@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Mykyta Poturai <Mykyta_Poturai@xxxxxxxx>
  • Date: Tue, 23 Sep 2025 13:37:49 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2xODpB8sHvEl/yb200BnZDDp3n6ihKEeBe5isyzfX0s=; b=pbY8Voeppg3IPRXtUEHKnZfCrB8PYk/W+2N9V36P6rjk79ra1MsY51GKOjLDXUMJrjaCr8K6/8Lnx4eiL868le30BfyU9E8bi0qMuKCZy0AShDWDxafTJH0MBH1ufqClAxkcjdAaVXUT9WLt5SneuxXeCFOMqR4lXqlpT1dJjBfWmCFMGWndWzikulNXb55Ad168NoGy9Ydjdd0U6TSRoYF/LaG+cN8Y5276sj/NQm8wK0xF2uUNskX/QZ3UHpRL6MnIh+pLlkilSWJQM0QdH8GPj97yFiaH5J7Y3PEJN4xNT6aINng3QHsrzxbsmTy8ofsa3r51Aj2WJhUvRIFxQw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=c8E7FtGdj+kUmYNXDFZ2KuRcXT66gY/vc0Cb9hc6xmgOnerPBx6URFQ8RN8MlLjZD0alebGxi3ISOp3/4VlJ7SVCc/WUbGl5RtZ4UMfy8m9gxaiQ2D3suVnhnsBWTcPgjXtG6BufIg1ZcTNa6mKjzSd6qPcYg9dMaMLx2lb/emwcHT8IavZk+9YnYM5hiTQRjad3HQyRctw3+DwLXezDEpb/WP20SZswj+PuinNINKMUq8/4XFuM2Emv1DNWuznwmPXrPNTv9JoxCWT8oMEmYgg9sneLieriEauZljFASb9gde+T6Dxge3qY6ROA5R3HfnJbN79IkRn6Xub/ljGtkA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Tue, 23 Sep 2025 13:38:04 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHcKJYTkGTrKHgw3E6UlX6hg7Or+LSY8SMAgAfcMoA=
  • Thread-topic: [PATCH v1 3/4] arm/sysctl: Implement cpu hotplug ops

On 18.09.25 16:35, Julien Grall wrote:
> Hi Mykyta,
> 
> On 18/09/2025 13:16, Mykyta Poturai wrote:
>> Implement XEN_SYSCTL_CPU_HOTPLUG_* calls to allow for enabling/disabling
>> CPU cores in runtime.
>>
>> Signed-off-by: Mykyta Poturai <mykyta_poturai@xxxxxxxx>
>> ---
>>   xen/arch/arm/sysctl.c | 67 +++++++++++++++++++++++++++++++++++++++++++
>>   1 file changed, 67 insertions(+)
>>
>> diff --git a/xen/arch/arm/sysctl.c b/xen/arch/arm/sysctl.c
>> index 32cab4feff..ca8fb550fd 100644
>> --- a/xen/arch/arm/sysctl.c
>> +++ b/xen/arch/arm/sysctl.c
>> @@ -12,6 +12,7 @@
>>   #include <xen/dt-overlay.h>
>>   #include <xen/errno.h>
>>   #include <xen/hypercall.h>
>> +#include <xen/cpu.h>
>>   #include <asm/arm64/sve.h>
>>   #include <public/sysctl.h>
>> @@ -23,6 +24,68 @@ void arch_do_physinfo(struct xen_sysctl_physinfo *pi)
>>                                          
>> XEN_SYSCTL_PHYSCAP_ARM_SVE_MASK);
>>   }
>> +static long cpu_up_helper(void *data)
>> +{
>> +    unsigned long cpu = (unsigned long) data;
>> +    return cpu_up(cpu);
>> +}
>> +
>> +static long cpu_down_helper(void *data)
>> +{
>> +    unsigned long cpu = (unsigned long) data;
>> +    return cpu_down(cpu);
>> +}
>> +
>> +static long smt_up_down_helper(void *data)
> 
> Looking at the code, you will effectively disable all the CPUs but CPU0. 
> But I don't understand why. From the name is goal seems to be disable 
> SMT threading.
>

Sorry I have slightly misunderstood the x86 implementation/reasoning of 
this ops. I will drop them in V2.

>> +{
>> +    bool up = (bool) data;
>> +    unsigned int cpu;
>> +    int ret;
>> +
>> +    for_each_present_cpu ( cpu )
>> +    {
>> +        if ( cpu == 0 )
>> +            continue;
>> +
>> +        if ( up )
>> +            ret = cpu_up(cpu);
>> +        else
>> +            ret = cpu_down(cpu);
>> +
> 
> Regardless what I wrote above, you likely want to handle preemption.
> 
>> +        if ( ret )
>> +            return ret;
>  > +    }
>> +
>> +    return 0;
>> +}
>> +
>> +static long cpu_hotplug_sysctl(struct xen_sysctl_cpu_hotplug *hotplug)
>> +{
>> +    bool up;
>> +
>> +    switch (hotplug->op) {
>> +        case XEN_SYSCTL_CPU_HOTPLUG_ONLINE:
>> +            if ( hotplug->cpu == 0 )
> 
> I can't find a similar check on x86. Do you have any pointer?

Jan correctly mentioned that CPU0 can't be disabled so this is a short 
circuit for clarity.

> 
>> +                return -EINVAL;
> 
> On x86, they seem to check for XSM permission before continuing. Can you 
> explain why this is not necessary? Same questions applies below.

I will add XSM checks thanks for pointing this out.

> 
>> +            return continue_hypercall_on_cpu(0, cpu_up_helper, 
>> _p(hotplug->cpu));
>> +
>> +        case XEN_SYSCTL_CPU_HOTPLUG_OFFLINE:
>> +            if ( hotplug->cpu == 0 )
>> +                return -EINVAL;
>> +            return continue_hypercall_on_cpu(0, cpu_down_helper, 
>> _p(hotplug->cpu));
>> +
>> +        case XEN_SYSCTL_CPU_HOTPLUG_SMT_ENABLE:
>> +        case XEN_SYSCTL_CPU_HOTPLUG_SMT_DISABLE:
> 
> Why are we implementing those helpers on Arm?
> 
>> +            if ( CONFIG_NR_CPUS <= 1 )
>> +                return 0;
>> +            up = hotplug->op == XEN_SYSCTL_CPU_HOTPLUG_SMT_ENABLE;
>> +            return continue_hypercall_on_cpu(0, smt_up_down_helper, 
>> _p(up));
>> +
>> +        default:
>> +            return -EINVAL;
>> +    }
>> +}
>> +
>>   long arch_do_sysctl(struct xen_sysctl *sysctl,
>>                       XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
>>   {
>> @@ -34,6 +97,10 @@ long arch_do_sysctl(struct xen_sysctl *sysctl,
>>           ret = dt_overlay_sysctl(&sysctl->u.dt_overlay);
>>           break;
>> +    case XEN_SYSCTL_cpu_hotplug:
> 
> This will also enable CPU hotplug on 32-bit Arm. Is this what you 
> intended? (I see patch #4 only mention 64-bit Arm).

It wasn't intended. I will additionally check if it works on arm32 end 
explicitly specify it.

> 
>> +        ret = cpu_hotplug_sysctl(&sysctl->u.cpu_hotplug);
>> +        break;
>> +
>>       default:
>>           ret = -ENOSYS;
>>           break;
> 
> Cheers,
> 

-- 
Mykyta

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.