From: Paul Durrant <paul.durrant@citrix.com>
To: xen-devel@lists.xenproject.org
Cc: Paul Durrant <paul.durrant@citrix.com>, Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v7 8/8] x86/hvm: serialize trap injecting producer and consumer
Date: Mon, 23 Jan 2017 13:59:49 +0000 [thread overview]
Message-ID: <1485179989-1763-9-git-send-email-paul.durrant@citrix.com> (raw)
In-Reply-To: <1485179989-1763-1-git-send-email-paul.durrant@citrix.com>
Since injection works on a remote vCPU, and since there's no
enforcement of the subject vCPU being paused, there's a potential race
between the producing and consuming sides. Fix this by leveraging the
vector field as synchronization variable.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
[re-based]
Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
v6:
- Adjust naming as required by previous patch.
v3:
- Re-re-re-based after more changes.
v2:
- Re-re-based after Andrew's recent changes.
---
xen/arch/x86/hvm/dm.c | 5 ++++-
xen/arch/x86/hvm/hvm.c | 10 ++++++----
xen/include/asm-x86/hvm/hvm.h | 3 +++
3 files changed, 13 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/hvm/dm.c b/xen/arch/x86/hvm/dm.c
index ba88766..60cd602 100644
--- a/xen/arch/x86/hvm/dm.c
+++ b/xen/arch/x86/hvm/dm.c
@@ -245,13 +245,16 @@ static int inject_event(struct domain *d,
if ( data->vcpuid >= d->max_vcpus || !(v = d->vcpu[data->vcpuid]) )
return -EINVAL;
- if ( v->arch.hvm_vcpu.inject_event.vector != -1 )
+ if ( cmpxchg(&v->arch.hvm_vcpu.inject_event.vector,
+ HVM_EVENT_VECTOR_UNSET, HVM_EVENT_VECTOR_UPDATING) !=
+ HVM_EVENT_VECTOR_UNSET )
return -EBUSY;
v->arch.hvm_vcpu.inject_event.type = data->type;
v->arch.hvm_vcpu.inject_event.insn_len = data->insn_len;
v->arch.hvm_vcpu.inject_event.error_code = data->error_code;
v->arch.hvm_vcpu.inject_event.cr2 = data->cr2;
+ smp_wmb();
v->arch.hvm_vcpu.inject_event.vector = data->vector;
return 0;
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index dc8af05..0ff81d7 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -538,13 +538,15 @@ void hvm_do_resume(struct vcpu *v)
}
}
- /* Inject pending hw/sw trap */
- if ( v->arch.hvm_vcpu.inject_event.vector != -1 )
+ /* Inject pending hw/sw event */
+ if ( v->arch.hvm_vcpu.inject_event.vector >= 0 )
{
+ smp_rmb();
+
if ( !hvm_event_pending(v) )
hvm_inject_event(&v->arch.hvm_vcpu.inject_event);
- v->arch.hvm_vcpu.inject_event.vector = -1;
+ v->arch.hvm_vcpu.inject_event.vector = HVM_EVENT_VECTOR_UNSET;
}
if ( unlikely(v->arch.vm_event) && v->arch.monitor.next_interrupt_enabled )
@@ -1515,7 +1517,7 @@ int hvm_vcpu_initialise(struct vcpu *v)
(void(*)(unsigned long))hvm_assert_evtchn_irq,
(unsigned long)v);
- v->arch.hvm_vcpu.inject_event.vector = -1;
+ v->arch.hvm_vcpu.inject_event.vector = HVM_EVENT_VECTOR_UNSET;
if ( is_pvh_domain(d) )
{
diff --git a/xen/include/asm-x86/hvm/hvm.h b/xen/include/asm-x86/hvm/hvm.h
index 04e67fe..f88ff2e 100644
--- a/xen/include/asm-x86/hvm/hvm.h
+++ b/xen/include/asm-x86/hvm/hvm.h
@@ -77,6 +77,9 @@ enum hvm_intblk {
#define HVM_HAP_SUPERPAGE_2MB 0x00000001
#define HVM_HAP_SUPERPAGE_1GB 0x00000002
+#define HVM_EVENT_VECTOR_UNSET (-1)
+#define HVM_EVENT_VECTOR_UPDATING (-2)
+
/*
* The hardware virtual machine (HVM) interface abstracts away from the
* x86/x86_64 CPU virtualization assist specifics. Currently this interface
--
2.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
prev parent reply other threads:[~2017-01-23 13:59 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-01-23 13:59 [PATCH v7 0/8] New hypercall for device models Paul Durrant
2017-01-23 13:59 ` [PATCH v7 1/8] public / x86: Introduce __HYPERCALL_dm_op Paul Durrant
2017-01-24 9:59 ` Jan Beulich
2017-01-24 10:19 ` Paul Durrant
2017-01-24 10:55 ` Jan Beulich
2017-01-24 11:02 ` Paul Durrant
2017-01-23 13:59 ` [PATCH v7 2/8] dm_op: convert HVMOP_*ioreq_server* Paul Durrant
2017-01-23 13:59 ` [PATCH v7 3/8] dm_op: convert HVMOP_track_dirty_vram Paul Durrant
2017-01-23 13:59 ` [PATCH v7 4/8] dm_op: convert HVMOP_set_pci_intx_level, HVMOP_set_isa_irq_level, and Paul Durrant
2017-01-23 13:59 ` [PATCH v7 5/8] dm_op: convert HVMOP_modified_memory Paul Durrant
2017-01-23 13:59 ` [PATCH v7 6/8] dm_op: convert HVMOP_set_mem_type Paul Durrant
2017-01-23 13:59 ` [PATCH v7 7/8] dm_op: convert HVMOP_inject_trap and HVMOP_inject_msi Paul Durrant
2017-01-23 13:59 ` Paul Durrant [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1485179989-1763-9-git-send-email-paul.durrant@citrix.com \
--to=paul.durrant@citrix.com \
--cc=jbeulich@suse.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).