From patchwork Thu Mar 16 11:20:23 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andre Przywara X-Patchwork-Id: 9627963 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 1F81E6048C for ; Thu, 16 Mar 2017 11:21:02 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 137CF285B5 for ; Thu, 16 Mar 2017 11:21:02 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 083A828604; Thu, 16 Mar 2017 11:21:02 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 89485285B5 for ; Thu, 16 Mar 2017 11:21:01 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1coTR7-0008BV-S8; Thu, 16 Mar 2017 11:19:17 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1coTR6-00088U-Oi for xen-devel@lists.xenproject.org; Thu, 16 Mar 2017 11:19:16 +0000 Received: from [85.158.139.211] by server-12.bemta-5.messagelabs.com id 79/A3-31403-4B47AC85; Thu, 16 Mar 2017 11:19:16 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrGLMWRWlGSWpSXmKPExsVysyfVTXdzyak Igw1PFCy+b5nM5MDocfjDFZYAxijWzLyk/IoE1oz7jyayFCwxqli/rIO5gfGMWhcjF4eQwGZG iY8bXzNBOMsZJe5M/sPaxcjJwSagK7Hj5mtmEFtEIFRizs9HYDazQKXExQ/72UBsYQFLie1Td gA1c3CwCKhKdG0JAQnzCthIHFozkQXElhCQk2g4fx+slRMo3nFyD1irkIC1xOejn9knMHIvYG RYxahRnFpUllqka2ipl1SUmZ5RkpuYmaNraGCql5taXJyYnpqTmFSsl5yfu4kR6N96BgbGHYy P+v0OMUpyMCmJ8mqZn4oQ4kvKT6nMSCzOiC8qzUktPsQow8GhJMFbXQyUEyxKTU+tSMvMAQYa TFqCg0dJhLcAJM1bXJCYW5yZDpE6xagoJc5rA5IQAElklObBtcGC+xKjrJQwLyMDA4MQT0FqU W5mCar8K0ZxDkYlYd5vIFN4MvNK4Ka/AlrMBLT47YcTIItLEhFSUg2Mec9Sb95JnPabZzPX1f ANDeqsbXdlvSeX3ZudWdC6MXp2S4+52aYPZpelzjZn+qtlGEmEF9XY+OuseBzzbdru1SkszLL Sen+b1hSLnzxrnDgx0HvPnx1Lj7GX1bQVc01/z2FrsKWLO0WRrTVDM02y7qhrhPovfbbE106W Dtttl95sTTwWXKLEUpyRaKjFXFScCABJGuNuaQIAAA== X-Env-Sender: andre.przywara@arm.com X-Msg-Ref: server-10.tower-206.messagelabs.com!1489663154!72639750!1 X-Originating-IP: [217.140.101.70] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.2.3; banners=-,-,- X-VirusChecked: Checked Received: (qmail 19186 invoked from network); 16 Mar 2017 11:19:15 -0000 Received: from foss.arm.com (HELO foss.arm.com) (217.140.101.70) by server-10.tower-206.messagelabs.com with SMTP; 16 Mar 2017 11:19:15 -0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 96AC513D5; Thu, 16 Mar 2017 04:19:14 -0700 (PDT) Received: from e104803-lin.lan (unknown [10.1.207.46]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 920943F5C9; Thu, 16 Mar 2017 04:19:13 -0700 (PDT) From: Andre Przywara To: Stefano Stabellini , Julien Grall Date: Thu, 16 Mar 2017 11:20:23 +0000 Message-Id: <20170316112030.20419-21-andre.przywara@arm.com> X-Mailer: git-send-email 2.9.0 In-Reply-To: <20170316112030.20419-1-andre.przywara@arm.com> References: <20170316112030.20419-1-andre.przywara@arm.com> Cc: xen-devel@lists.xenproject.org, Shanker Donthineni , Vijay Kilari Subject: [Xen-devel] [PATCH v2 20/27] ARM: vITS: handle MAPTI command X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP The MAPTI commands associates a DeviceID/EventID pair with a LPI/CPU pair and actually instantiates LPI interrupts. We connect the already allocated host LPI to this virtual LPI, so that any triggering IRQ on the host can be quickly forwarded to a guest. Signed-off-by: Andre Przywara --- xen/arch/arm/gic-v3-its.c | 63 ++++++++++++++++++++++++++++++++++++++++ xen/arch/arm/gic-v3-lpi.c | 18 ++++++++++++ xen/arch/arm/vgic-v3-its.c | 27 +++++++++++++++-- xen/include/asm-arm/gic_v3_its.h | 6 ++++ 4 files changed, 112 insertions(+), 2 deletions(-) diff --git a/xen/arch/arm/gic-v3-its.c b/xen/arch/arm/gic-v3-its.c index 5a2dbec..e2fcf50 100644 --- a/xen/arch/arm/gic-v3-its.c +++ b/xen/arch/arm/gic-v3-its.c @@ -724,6 +724,69 @@ restart: spin_unlock(&d->arch.vgic.its_devices_lock); } +/* + * Translates an event for a given guest device ID into the associated host + * LPI number. This can be used to look up the mapped guest LPI. + */ +static uint32_t translate_event(struct domain *d, paddr_t doorbell, + uint32_t devid, uint32_t eventid) +{ + struct rb_node *node; + struct its_devices *dev; + uint32_t host_lpi = 0; + int cmp; + + spin_lock(&d->arch.vgic.its_devices_lock); + node = d->arch.vgic.its_devices.rb_node; + while (node) + { + dev = rb_entry(node, struct its_devices, rbnode); + cmp = compare_its_guest_devices(dev, doorbell, devid); + + if ( !cmp ) + { + if ( eventid >= dev->eventids ) + goto out; + + host_lpi = dev->host_lpis[eventid / LPI_BLOCK] + + (eventid % LPI_BLOCK); + if ( !is_lpi(host_lpi) ) + host_lpi = 0; + goto out; + } + + if ( cmp > 0 ) + node = node->rb_left; + else + node = node->rb_right; + } + +out: + spin_unlock(&d->arch.vgic.its_devices_lock); + + return host_lpi; +} + +/* + * Connects the event ID for an already assigned device to the given VCPU/vLPI + * pair. The corresponding physical LPI is already mapped on the host side + * (when assigning the physical device to the guest), so we just connect the + * target VCPU/vLPI pair to that interrupt to inject it properly if it fires. + */ +int gicv3_assign_guest_event(struct domain *d, paddr_t doorbell_address, + uint32_t devid, uint32_t eventid, + struct vcpu *v, uint32_t virt_lpi) +{ + uint32_t host_lpi = translate_event(d, doorbell_address, devid, eventid); + + if ( !host_lpi ) + return -ENOENT; + + gicv3_lpi_update_host_entry(host_lpi, d->domain_id, v->vcpu_id, virt_lpi); + + return 0; +} + /* Scan the DT for any ITS nodes and create a list of host ITSes out of it. */ void gicv3_its_dt_init(const struct dt_device_node *node) { diff --git a/xen/arch/arm/gic-v3-lpi.c b/xen/arch/arm/gic-v3-lpi.c index 994698e..c110ec9 100644 --- a/xen/arch/arm/gic-v3-lpi.c +++ b/xen/arch/arm/gic-v3-lpi.c @@ -153,6 +153,24 @@ void do_LPI(unsigned int lpi) vgic_vcpu_inject_irq(vcpu, hlpi.virt_lpi); } +int gicv3_lpi_update_host_entry(uint32_t host_lpi, int domain_id, + unsigned int vcpu_id, uint32_t virt_lpi) +{ + union host_lpi *hlpip, hlpi; + + host_lpi -= LPI_OFFSET; + + hlpip = &lpi_data.host_lpis[host_lpi / HOST_LPIS_PER_PAGE][host_lpi % HOST_LPIS_PER_PAGE]; + + hlpi.virt_lpi = virt_lpi; + hlpi.dom_id = domain_id; + hlpi.vcpu_id = vcpu_id; + + write_u64_atomic(&hlpip->data, hlpi.data); + + return 0; +} + static int gicv3_lpi_allocate_pendtable(uint64_t *reg) { uint64_t val; diff --git a/xen/arch/arm/vgic-v3-its.c b/xen/arch/arm/vgic-v3-its.c index c26d5d4..600ff69 100644 --- a/xen/arch/arm/vgic-v3-its.c +++ b/xen/arch/arm/vgic-v3-its.c @@ -167,8 +167,8 @@ static bool read_itte(struct virt_its *its, uint32_t devid, uint32_t evid, } #define SKIP_LPI_UPDATE 1 -bool write_itte(struct virt_its *its, uint32_t devid, uint32_t evid, - uint32_t collid, uint32_t vlpi, struct vcpu **vcpu) +static bool write_itte(struct virt_its *its, uint32_t devid, uint32_t evid, + uint32_t collid, uint32_t vlpi, struct vcpu **vcpu) { struct vits_itte *itte; @@ -332,6 +332,25 @@ static int its_handle_mapd(struct virt_its *its, uint64_t *cmdptr) return 0; } +static int its_handle_mapti(struct virt_its *its, uint64_t *cmdptr) +{ + uint32_t devid = its_cmd_get_deviceid(cmdptr); + uint32_t eventid = its_cmd_get_id(cmdptr); + uint32_t intid = its_cmd_get_physical_id(cmdptr); + int collid = its_cmd_get_collection(cmdptr); + struct vcpu *vcpu; + + if ( its_cmd_get_command(cmdptr) == GITS_CMD_MAPI ) + intid = eventid; + + if ( !write_itte(its, devid, eventid, collid, intid, &vcpu) ) + return -1; + + gicv3_assign_guest_event(its->d, its->doorbell_address, devid, eventid, vcpu, intid); + + return 0; +} + #define ITS_CMD_BUFFER_SIZE(baser) ((((baser) & 0xff) + 1) << 12) static int vgic_its_handle_cmds(struct domain *d, struct virt_its *its, @@ -364,6 +383,10 @@ static int vgic_its_handle_cmds(struct domain *d, struct virt_its *its, case GITS_CMD_MAPD: its_handle_mapd(its, cmdptr); break; + case GITS_CMD_MAPI: + case GITS_CMD_MAPTI: + its_handle_mapti(its, cmdptr); + break; case GITS_CMD_SYNC: /* We handle ITS commands synchronously, so we ignore SYNC. */ break; diff --git a/xen/include/asm-arm/gic_v3_its.h b/xen/include/asm-arm/gic_v3_its.h index 2387972..1ea00e9 100644 --- a/xen/include/asm-arm/gic_v3_its.h +++ b/xen/include/asm-arm/gic_v3_its.h @@ -163,6 +163,12 @@ int gicv3_allocate_host_lpi_block(struct host_its *its, struct domain *d, uint32_t host_devid, uint32_t eventid); int gicv3_free_host_lpi_block(struct host_its *its, uint32_t lpi); +int gicv3_assign_guest_event(struct domain *d, paddr_t doorbell, + uint32_t devid, uint32_t eventid, + struct vcpu *v, uint32_t virt_lpi); +int gicv3_lpi_update_host_entry(uint32_t host_lpi, int domain_id, + unsigned int vcpu_id, uint32_t virt_lpi); + #else static LIST_HEAD(host_its_list);