From: Wei Chen <Wei.Chen@arm.com>
To: xen-devel@lists.xen.org
Cc: sstabellini@kernel.org, wei.chen@arm.com, steve.capper@arm.com,
Kaly.Xin@arm.com, julien.grall@arm.com, nd@arm.com
Subject: [PATCH v4 08/19] xen/arm: Introduce a initcall to update cpu_hwcaps by serror_op
Date: Wed, 5 Apr 2017 17:09:10 +0800 [thread overview]
Message-ID: <1491383361-22886-9-git-send-email-Wei.Chen@arm.com> (raw)
In-Reply-To: <1491383361-22886-1-git-send-email-Wei.Chen@arm.com>
In the later patches of this series, we want to use the alternative
patching framework to avoid synchronizing serror_op in every entries
and exits. So we define a new cpu feature "SKIP_SYNCHRONIZE_SERROR_ENTRY_EXIT"
for serror_op. When serror_op is not equal to SERROR_DIVERSE, this
feature will be set to cpu_hwcaps.
Currently, the default serror_op is SERROR_DIVERSE, if we want to
change the serror_op value we have to place the serror parameter
in command line. It seems no problem to update cpu_hwcaps directly
in the serror parameter parsing function.
While the default option will be diverse today, this may change in the
future. So we introduce this initcall to guarantee the cpu_hwcaps can be
updated no matter the serror parameter is placed in the command line
or not.
Signed-off-by: Wei Chen <Wei.Chen@arm.com>
Acked-by: Julien Grall <julien.grall@arm.com>
Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
---
v3->v4:
Rename SKIP_CHECK_PENDING_VSERROR to SKIP_SYNCHRONIZE_SERROR_ENTRY_EXIT
in code an commit message.
---
xen/arch/arm/traps.c | 9 +++++++++
xen/include/asm-arm/cpufeature.h | 3 ++-
2 files changed, 11 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 41955af..1e130fb 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -162,6 +162,15 @@ static void __init parse_serrors_behavior(const char *str)
}
custom_param("serrors", parse_serrors_behavior);
+static int __init update_serrors_cpu_caps(void)
+{
+ if ( serrors_op != SERRORS_DIVERSE )
+ cpus_set_cap(SKIP_SYNCHRONIZE_SERROR_ENTRY_EXIT);
+
+ return 0;
+}
+__initcall(update_serrors_cpu_caps);
+
void init_traps(void)
{
/* Setup Hyp vector base */
diff --git a/xen/include/asm-arm/cpufeature.h b/xen/include/asm-arm/cpufeature.h
index c0a25ae..9eb72e1 100644
--- a/xen/include/asm-arm/cpufeature.h
+++ b/xen/include/asm-arm/cpufeature.h
@@ -40,8 +40,9 @@
#define ARM32_WORKAROUND_766422 2
#define ARM64_WORKAROUND_834220 3
#define LIVEPATCH_FEATURE 4
+#define SKIP_SYNCHRONIZE_SERROR_ENTRY_EXIT 5
-#define ARM_NCAPS 5
+#define ARM_NCAPS 6
#ifndef __ASSEMBLY__
--
2.7.4
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next prev parent reply other threads:[~2017-04-05 9:09 UTC|newest]
Thread overview: 27+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-04-05 9:09 [PATCH v4 00/19] Provide a command line option to choose how to handle SErrors Wei Chen
2017-04-05 9:09 ` [PATCH v4 01/19] xen/arm: Save ESR_EL2 to avoid using mismatched value in syndrome check Wei Chen
2017-04-05 9:09 ` [PATCH v4 02/19] xen/arm: Introduce a helper to get default HCR_EL2 flags Wei Chen
2017-04-05 9:09 ` [PATCH v4 03/19] xen/arm: Set and restore HCR_EL2 register for each vCPU separately Wei Chen
2017-04-05 9:09 ` [PATCH v4 04/19] xen/arm: Avoid setting/clearing HCR_RW at every context switch Wei Chen
2017-04-05 9:09 ` [PATCH v4 05/19] xen/arm: Save HCR_EL2 when a guest took the SError Wei Chen
2017-04-05 9:09 ` [PATCH v4 06/19] xen/arm: Introduce a virtual abort injection helper Wei Chen
2017-04-05 9:09 ` [PATCH v4 07/19] xen/arm: Introduce a command line parameter for SErrors/Aborts Wei Chen
2017-04-05 9:09 ` Wei Chen [this message]
2017-04-05 9:09 ` [PATCH v4 09/19] xen/arm64: Use alternative to skip the check of pending serrors Wei Chen
2017-04-05 9:09 ` [PATCH v4 10/19] xen/arm32: " Wei Chen
2017-04-05 9:09 ` [PATCH v4 11/19] xen/arm: Move macro VABORT_GEN_BY_GUEST to common header Wei Chen
2017-04-05 9:09 ` [PATCH v4 12/19] xen/arm: Introduce new helpers to handle guest/hyp SErrors Wei Chen
2017-04-05 9:09 ` [PATCH v4 13/19] xen/arm: Replace do_trap_guest_serror with new helpers Wei Chen
2017-04-05 9:09 ` [PATCH v4 14/19] xen/arm: Unmask the Abort/SError bit in the exception entries Wei Chen
2017-04-05 9:09 ` [PATCH v4 15/19] xen/arm: Introduce a helper to check local abort is enabled Wei Chen
2017-04-05 11:14 ` Julien Grall
2017-04-05 9:09 ` [PATCH v4 16/19] xen/arm: Introduce a macro to synchronize SError Wei Chen
2017-04-05 11:15 ` Julien Grall
2017-04-05 9:09 ` [PATCH v4 17/19] xen/arm: Isolate the SError between the context switch of 2 vCPUs Wei Chen
2017-04-05 9:09 ` [PATCH v4 18/19] xen/arm: Prevent slipping hypervisor SError to guest Wei Chen
2017-04-05 11:17 ` Julien Grall
2017-04-05 9:09 ` [PATCH v4 19/19] xen/arm: Handle guest external abort as guest SError Wei Chen
2017-04-05 19:18 ` [PATCH v4 00/19] Provide a command line option to choose how to handle SErrors Stefano Stabellini
2017-04-06 4:52 ` Wei Chen
2017-04-07 15:37 ` Julien Grall
2017-04-07 23:20 ` Stefano Stabellini
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1491383361-22886-9-git-send-email-Wei.Chen@arm.com \
--to=wei.chen@arm.com \
--cc=Kaly.Xin@arm.com \
--cc=julien.grall@arm.com \
--cc=nd@arm.com \
--cc=sstabellini@kernel.org \
--cc=steve.capper@arm.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).