From: Oleksii Kurochko <oleksii.kurochko@gmail.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: "Romain Caritey" <Romain.Caritey@microchip.com>,
"Alistair Francis" <alistair.francis@wdc.com>,
"Connor Davis" <connojdavis@gmail.com>,
"Andrew Cooper" <andrew.cooper3@citrix.com>,
"Anthony PERARD" <anthony.perard@vates.tech>,
"Michal Orzel" <michal.orzel@amd.com>,
"Julien Grall" <julien@xen.org>,
"Roger Pau Monné" <roger.pau@citrix.com>,
"Stefano Stabellini" <sstabellini@kernel.org>,
xen-devel@lists.xenproject.org
Subject: Re: [PATCH v1 13/27] xen/riscv: add basic VGEIN management for AIA guests
Date: Mon, 20 Apr 2026 09:52:27 +0200 [thread overview]
Message-ID: <b00858a5-c989-482a-bce0-af82eca17e31@gmail.com> (raw)
In-Reply-To: <718fe598-884c-4723-938f-7f783445771f@suse.com>
On 4/17/26 4:07 PM, Jan Beulich wrote:
> On 17.04.2026 13:34, Oleksii Kurochko wrote:
>> On 4/16/26 2:21 PM, Jan Beulich wrote:
>>> On 13.04.2026 16:42, Oleksii Kurochko wrote:
>>>> On 4/2/26 12:03 PM, Jan Beulich wrote:
>>>>> On 10.03.2026 18:08, Oleksii Kurochko wrote:
>>>>>> @@ -14,12 +27,109 @@ bool aia_available(void)
>>>>>> return is_aia_available;
>>>>>> }
>>>>>>
>>>>>> +int __init vgein_init(unsigned int cpu)
>>>>>
>>>>> If this needs invoking once per CPU being brought up, it can't be __init.
>>>>
>>>> Yes, it is going to be called inside the secondary CPU bring-up function.
>>>>
>>>> __init sections are removed much later, after all CPUs are brought up,
>>>> so it looks like that at the moment when secondary CPUs are being
>>>> brought up, __init still exists and can be called.
>>>
>>> No. And I said so before. See XEN_SYSCTL_cpu_hotplug (and ignore it having
>>> "hotplug" in the name, but merely consider that you can take CPUs offline
>>> at runtime, and later bring them online again).
>>
>> Thanks, now it makes sense to drop __init.
>>
>>>>> Also - static?
>>>>
>>>> It isn't static because it will be called inside the secondary CPU
>>>> bring-up function.
>>>
>>> As it doesn't need calling from the outside for the boot CPU, it's not
>>> obvious why it would need calling from the outside for secondary ones.
>>
>> I think I am confused here by what do you mean by "calling from the
>> outside".
>
> As in "from another translation unit".
>
>> It should be called during boot or secondary CPU initialization (if AIA
>> is used), right?
>> Then considering that VGEIN-related stuff is connected to AIA then
>> vgein_init() is expected to live in aia.c and considering that it wants
>> to be called by secondary CPU boot code it can't be static.
>
> Putting my question differently: Why is there a difference here between
> boot CPU and secondary CPUs. My (general) expectation would be that either
> the function wants calling from outside of aia.c in all cases, or it could
> be static (now and later).
Generally, if update prototype of aia_init() to receive cpuid argument
then it will be enough to make vgein_init() static and then all others
will call aia_init(). The only reason why I tried to have vgein_init()
non-static is that in the case of secondary CPU there is no need to call
second time anything (at least, now) from aia_init() or re-init
is_aia_usable variable.
But I can agree that probably it would be better to make vgein_init()
static now and then use aia_init() everywhere it is needed just for the
case that if something new will be added what should be called for boot
and secondary CPU won't be missed to call properly. And I think it is
fine just re-init is_aia_usable without any additional synchronization.
As an option I could check at the start if is_aia_usable is initialized
by checking if it is true and if it is then just call vgein_init() for
that cpuid.
Would it be better?
>
>>>>>> +{
>>>>>> + struct vgein_bmp *vgein = &per_cpu(vgein_bmp, cpu);
>>>>>> +
>>>>>> + csr_write(CSR_HGEIE, -1UL);
>>>>>> + vgein->geilen = flsl(csr_read(CSR_HGEIE));
>>>>>> + csr_write(CSR_HGEIE, 0);
>>>>>> + if ( vgein->geilen )
>>>>>> + vgein->geilen--;
>>>>>
>>>>> I don't understand this. The "len" in "geilen" stands for "length", I suppose,
>>>>> i.e. the number of bits. Hmm, the spec itself is inconsistent: "The number of
>>>>> bits implemented in hgeip and hgeie for guest external interrupts is UNSPECIFIED
>>>>> and may be zero. This number is known as GEILEN." This may or may not include
>>>>> bit 0 (which is implemented, but r/o zero). Then saying "Hence, if GEILEN is
>>>>> nonzero, bits GEILEN:1 shall be writable in ..." suggests 0 isn't included, but
>>>>> that's not unambiguous.
>>>>
>>>> But they explicitly wrote that: The least-significant bits are
>>>> implemented first, apart from bit 0. So bit 0 is explicitly excluded.
>>>
>>> Fine, but not including it in anything named *LEN feels - as said - ambiguous.
>>
>> Agree, it is. I just tried to follow the spec naming here. But I am okay
>> to rename it to max_gein, for example.
>
> Perhaps better stick to spec naming, but consider adding a clarifying comment.
I will add then above geilen field in vgein_bmp struct the comment:
The least-significant bits are implemented first, apart from bit 0
>
>>>>>> + /*
>>>>>> + * All vCPU guest interrupt files are used and we don't support a case
>>>>>> + * when number of vCPU on 1 pCPU is bigger then geilen.
>>>>>> + */
>>>>>
>>>>> This wants checking in vgein_init() then. CPUs (beyond the boot one)
>>>>> violating this should not be brought online.
>>>>
>>>> It'll be nice. But we can't know how many vCPUs will be ran on pCPU when
>>>> vgein_init() is executed.
>>>
>>> I don't understand: How does it matter how many vCPU-s will exist later on
>>> (and will run wherever)?
>>
>> IIUC, you want to check what is mentioned in the comment in vcpu_init().
>> The comment says that it is checking that number of vCPU on one pCPU
>> isn't bigger then geilen. To check that we have to know an amount of
>> vCPU potentially will be ran on pCPU.
>
> Well, not quite. I don't understand at all why the number of vCPU-s in
> a system would be limited by any pCPU property. I don't think we have
> any such constraint on x86, for example.
Then I will just drop this comment and correspondent ASSERT() and just
return vgein_id in the case when there is no available h/w VGEINs to
mark that h/w should use s/w guest interrupt files:
if ( vgein_id > vgein->geilen )
vgein_id = 0;
else
__set_bit(vgein_id, bmp);
~ Oleksii
next prev parent reply other threads:[~2026-04-20 7:52 UTC|newest]
Thread overview: 123+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-10 17:08 [PATCH v1 00/27] [RISC-V] Introduce enablemenant of dom0less Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 01/27] xen/riscv: Implement ARCH_PAGING_MEMPOOL Oleksii Kurochko
2026-03-11 8:18 ` Jan Beulich
2026-04-09 10:31 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 02/27] xen/riscv: Implement construct_domain() Oleksii Kurochko
2026-03-24 9:37 ` Jan Beulich
2026-04-09 11:26 ` Oleksii Kurochko
2026-04-09 12:58 ` Jan Beulich
2026-04-09 13:39 ` Oleksii Kurochko
2026-04-09 14:01 ` Oleksii Kurochko
2026-04-14 6:26 ` Julien Grall
2026-03-10 17:08 ` [PATCH v1 03/27] xen/riscv: implement prerequisites for domain_create() Oleksii Kurochko
2026-04-01 12:57 ` Jan Beulich
2026-04-09 11:55 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 04/27] xen/riscv: rework G-stage mode handling Oleksii Kurochko
2026-04-01 13:19 ` Jan Beulich
2026-04-07 10:47 ` Oleksii Kurochko
2026-04-07 13:43 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 05/27] xen/riscv: introduce guest riscv,isa string Oleksii Kurochko
2026-04-01 13:49 ` Jan Beulich
2026-04-10 10:24 ` Oleksii Kurochko
2026-04-10 10:50 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 06/27] xen/riscv: implement make_cpus_node() Oleksii Kurochko
2026-04-01 14:11 ` Jan Beulich
2026-04-10 11:19 ` Oleksii Kurochko
2026-04-10 12:02 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 07/27] xen/riscv: implement make_timer_node() Oleksii Kurochko
2026-04-01 14:24 ` Jan Beulich
2026-04-10 11:54 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 08/27] xen/riscv: implement make_arch_nodes() Oleksii Kurochko
2026-04-01 14:29 ` Jan Beulich
2026-04-10 13:32 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 09/27] xen/riscv: implement make_intc_domU_node() Oleksii Kurochko
2026-04-01 14:38 ` Jan Beulich
2026-04-10 14:00 ` Oleksii Kurochko
2026-04-10 14:23 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 10/27] xen/riscv: generate IMSIC DT node for guest domains Oleksii Kurochko
2026-04-01 15:05 ` Jan Beulich
2026-04-10 15:40 ` Oleksii Kurochko
2026-04-16 11:42 ` Jan Beulich
2026-04-17 8:10 ` Oleksii Kurochko
2026-04-17 13:50 ` Jan Beulich
2026-04-17 14:01 ` Oleksii Kurochko
2026-04-17 14:10 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 11/27] xen/riscv: create APLIC " Oleksii Kurochko
2026-04-01 15:16 ` Jan Beulich
2026-04-13 8:43 ` Oleksii Kurochko
2026-04-13 8:48 ` Oleksii Kurochko
2026-04-16 11:49 ` Jan Beulich
2026-04-17 9:01 ` Oleksii Kurochko
2026-04-17 13:53 ` Jan Beulich
2026-04-17 14:27 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 12/27] xen/riscv: introduce aia_init() and aia_available() Oleksii Kurochko
2026-04-02 9:00 ` Jan Beulich
2026-04-13 9:32 ` Oleksii Kurochko
2026-04-16 12:06 ` Jan Beulich
2026-04-17 9:37 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 13/27] xen/riscv: add basic VGEIN management for AIA guests Oleksii Kurochko
2026-04-02 10:03 ` Jan Beulich
2026-04-13 14:42 ` Oleksii Kurochko
2026-04-16 12:21 ` Jan Beulich
2026-04-17 11:34 ` Oleksii Kurochko
2026-04-17 14:07 ` Jan Beulich
2026-04-20 7:52 ` Oleksii Kurochko [this message]
2026-03-10 17:08 ` [PATCH v1 14/27] xen/riscv: introduce per-vCPU IMSIC state Oleksii Kurochko
2026-04-02 11:31 ` Jan Beulich
2026-04-14 9:22 ` Oleksii Kurochko
2026-04-16 12:31 ` Jan Beulich
2026-04-16 12:31 ` Jan Beulich
2026-04-17 13:47 ` Oleksii Kurochko
2026-04-20 8:29 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 15/27] xen/riscv: add very early virtual APLIC (vAPLIC) initialization support Oleksii Kurochko
2026-04-02 11:58 ` Jan Beulich
2026-04-14 10:27 ` Oleksii Kurochko
2026-04-16 12:42 ` Jan Beulich
2026-04-20 10:25 ` Oleksii Kurochko
2026-04-20 10:47 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 16/27] xen/riscv: implement IRQ mapping for device passthrough Oleksii Kurochko
2026-04-02 12:22 ` Jan Beulich
2026-04-14 11:29 ` Oleksii Kurochko
2026-04-16 12:51 ` Jan Beulich
2026-04-20 11:39 ` Oleksii Kurochko
2026-04-20 13:45 ` Jan Beulich
2026-04-20 14:34 ` Oleksii Kurochko
2026-04-20 15:21 ` Jan Beulich
2026-04-20 15:31 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 17/27] xen/riscv: add missing APLIC register offsets, masks to asm/aplic.h Oleksii Kurochko
2026-04-02 12:51 ` Jan Beulich
2026-04-14 11:42 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 18/27] xen/riscv: add vaplic access check Oleksii Kurochko
2026-04-02 13:10 ` Jan Beulich
2026-04-14 11:45 ` Oleksii Kurochko
2026-04-15 7:35 ` Oleksii Kurochko
2026-04-16 13:01 ` Jan Beulich
2026-04-20 11:53 ` Oleksii Kurochko
2026-04-20 12:03 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 19/27] xen/riscv: emulate guest writes to virtual APLIC MMIO Oleksii Kurochko
2026-04-02 14:18 ` Jan Beulich
2026-04-14 16:04 ` Oleksii Kurochko
2026-04-16 13:19 ` Jan Beulich
2026-04-20 15:02 ` Oleksii Kurochko
2026-04-20 15:27 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 20/27] xen/riscv: emulate guest reads from " Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 21/27] xen/riscv: introduce (de)initialization helpers for vINTC Oleksii Kurochko
2026-04-02 14:58 ` Jan Beulich
2026-04-15 7:50 ` Oleksii Kurochko
2026-04-16 13:23 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 22/27] xen/riscv: implement init_intc_phandle() Oleksii Kurochko
2026-04-02 15:00 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 23/27] xen/riscv: call do_initcalls() in start_xen() Oleksii Kurochko
2026-04-02 15:01 ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 24/27] xen/riscv: init rcu Oleksii Kurochko
2026-04-02 15:03 ` Jan Beulich
2026-04-14 11:50 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 25/27] xen/riscv: setup system domains Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 26/27] xen/riscv: provide init_vuart() Oleksii Kurochko
2026-04-07 13:52 ` Jan Beulich
2026-03-10 17:09 ` [PATCH v1 27/27] xen/riscv: add initial dom0less infrastructure support Oleksii Kurochko
2026-04-07 14:11 ` Jan Beulich
2026-04-15 10:00 ` Oleksii Kurochko
2026-04-16 14:13 ` Jan Beulich
2026-04-15 10:28 ` Oleksii Kurochko
2026-04-16 14:15 ` Jan Beulich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=b00858a5-c989-482a-bce0-af82eca17e31@gmail.com \
--to=oleksii.kurochko@gmail.com \
--cc=Romain.Caritey@microchip.com \
--cc=alistair.francis@wdc.com \
--cc=andrew.cooper3@citrix.com \
--cc=anthony.perard@vates.tech \
--cc=connojdavis@gmail.com \
--cc=jbeulich@suse.com \
--cc=julien@xen.org \
--cc=michal.orzel@amd.com \
--cc=roger.pau@citrix.com \
--cc=sstabellini@kernel.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.