From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
To: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Cc: "linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>
Subject: Re: [Xen-devel] [PATCH] xen/events: fix unmask_evtchn for PV on HVM guests
Date: Mon, 9 Jul 2012 10:19:15 -0400 [thread overview]
Message-ID: <20120709141915.GB9580@phenom.dumpdata.com> (raw)
In-Reply-To: <alpine.DEB.2.02.1206221722040.27860@kaball.uk.xensource.com>
On Fri, Jun 22, 2012 at 05:26:07PM +0100, Stefano Stabellini wrote:
> When unmask_evtchn is called, if we already have an event pending, we
> just set evtchn_pending_sel waiting for local_irq_enable to be called.
> That is because PV guests set the irq_enable pvops to
Can you point out where the PV guests do that please? Even just
including a snippet of code would be nice so that somebody
in the future has an idea of where it was/is.
> xen_irq_enable_direct that also handles pending events.
>
> However HVM guests (and ARM guests) do not change or do not have the
> irq_enable pvop, so evtchn_unmask cannot work properly for them.
Duh!
>
> Considering that having the pending_irq bit set when unmask_evtchn is
> called is not very common, and it is simpler to keep the
Unless you pin the guests on the vCPUS on which domain0 is not present..
> native_irq_enable implementation for HVM guests (and ARM guests), the
> best thing to do is just use the EVTCHNOP_unmask hypercall (Xen
> re-injects pending events in response).
And by re-injects you mean than the IOAPIC or (whatever it is on ARM)
is armed to show that there is a pending interrupt, right?
>
> Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
> ---
> drivers/xen/events.c | 7 +++++--
> 1 files changed, 5 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/xen/events.c b/drivers/xen/events.c
> index eae0d0b..0132505 100644
> --- a/drivers/xen/events.c
> +++ b/drivers/xen/events.c
> @@ -372,8 +372,11 @@ static void unmask_evtchn(int port)
>
> BUG_ON(!irqs_disabled());
>
> - /* Slow path (hypercall) if this is a non-local port. */
> - if (unlikely(cpu != cpu_from_evtchn(port))) {
> + /* Slow path (hypercall) if this is a non-local port or if this is
> + * an hvm domain and an event is pending (hvm domains don't have
> + * their own implementation of irq_enable). */
> + if (unlikely((cpu != cpu_from_evtchn(port)) ||
> + (xen_hvm_domain() && sync_test_bit(port, &s->evtchn_pending[0])))) {
> struct evtchn_unmask unmask = { .port = port };
We already have two seperate acks - for when there is an GMFN APIC bitmap and
when there is not. Can we also have to seperate unmask_evtchn then? And
just have the HVM and ARM just do a straightforward unmaks_evtchn while
the PV remains the same?
> (void)HYPERVISOR_event_channel_op(EVTCHNOP_unmask, &unmask);
> } else {
>
next prev parent reply other threads:[~2012-07-09 14:27 UTC|newest]
Thread overview: 48+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-06-22 16:13 [PATCH WIP 0/6] xen/arm: PV console support Stefano Stabellini
2012-06-22 16:13 ` Stefano Stabellini
2012-06-22 16:14 ` [PATCH WIP 1/6] xen/arm: fix the shared_info and vcpu_info structs Stefano Stabellini
2012-06-22 16:14 ` Stefano Stabellini
2012-06-22 16:14 ` [PATCH WIP 2/6] xen/arm: Introduce xen_guest_init Stefano Stabellini
2012-06-22 16:14 ` Stefano Stabellini
2012-07-09 14:45 ` [Xen-devel] " Konrad Rzeszutek Wilk
2012-07-09 15:08 ` David Vrabel
2012-07-09 15:08 ` David Vrabel
2012-07-12 11:49 ` Roger Pau Monne
2012-07-12 12:04 ` David Vrabel
2012-07-12 17:50 ` Stefano Stabellini
2012-07-12 18:00 ` Ian Campbell
2012-07-13 16:38 ` Stefano Stabellini
2012-06-22 16:14 ` [PATCH WIP 3/6] xen/arm: get privilege status Stefano Stabellini
2012-06-22 16:14 ` Stefano Stabellini
2012-07-09 14:41 ` [Xen-devel] " Konrad Rzeszutek Wilk
2012-07-12 17:43 ` Stefano Stabellini
2012-06-22 16:14 ` [PATCH WIP 4/6] xen/arm: implement hvm_op Stefano Stabellini
2012-06-22 16:14 ` Stefano Stabellini
2012-06-22 16:14 ` [PATCH WIP 5/6] xen: fix unmask_evtchn for HVM guests Stefano Stabellini
2012-06-22 16:14 ` Stefano Stabellini
2012-06-22 16:14 ` [PATCH WIP 6/6] xen/arm: enable evtchn irqs Stefano Stabellini
2012-06-22 16:14 ` Stefano Stabellini
2012-07-09 14:40 ` Konrad Rzeszutek Wilk
2012-07-13 17:14 ` Stefano Stabellini
2012-07-16 14:57 ` Konrad Rzeszutek Wilk
2012-07-18 16:51 ` Stefano Stabellini
2012-07-19 23:30 ` Konrad Rzeszutek Wilk
2012-07-20 11:09 ` Stefano Stabellini
2012-07-20 14:36 ` [Xen-devel] " Konrad Rzeszutek Wilk
2012-07-20 15:23 ` Stefano Stabellini
2012-07-25 18:43 ` Konrad Rzeszutek Wilk
2012-07-26 13:53 ` Stefano Stabellini
2012-06-22 16:26 ` [PATCH] xen/events: fix unmask_evtchn for PV on HVM guests Stefano Stabellini
2012-06-22 16:26 ` Stefano Stabellini
2012-07-09 14:19 ` Konrad Rzeszutek Wilk [this message]
2012-07-13 17:48 ` [Xen-devel] " Stefano Stabellini
2012-07-16 15:14 ` Konrad Rzeszutek Wilk
2012-07-18 18:17 ` Stefano Stabellini
2012-08-22 11:20 ` Stefano Stabellini
2012-08-22 14:03 ` Konrad Rzeszutek Wilk
2012-08-22 15:01 ` Stefano Stabellini
2012-07-09 14:41 ` [PATCH WIP 1/6] xen/arm: fix the shared_info and vcpu_info structs Konrad Rzeszutek Wilk
2012-07-13 16:48 ` Stefano Stabellini
2012-07-13 17:08 ` Ian Campbell
2012-07-16 14:57 ` Konrad Rzeszutek Wilk
2012-07-18 16:46 ` Stefano Stabellini
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20120709141915.GB9580@phenom.dumpdata.com \
--to=konrad.wilk@oracle.com \
--cc=linux-kernel@vger.kernel.org \
--cc=stefano.stabellini@eu.citrix.com \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.