From nobody Sat May 4 20:01:33 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org ARC-Seal: i=1; a=rsa-sha256; t=1597314976; cv=none; d=zohomail.com; s=zohoarc; b=FjuC3BiY2zuFPTj8v6NFAtebmlE6QmzA8IYZ/FRELG3+BouRRwCfnGgdxKVRbTnzz/IE5AoXAS7dEEb8mPKIlF9hCZUTXGHY9+yG5W87h1BeMJcQI1ynn6vvg8/aZNv/6Py4NoSTqCnpCx0br6ZQpcbPWjYwqjtCUOx2B9+Op1g= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1597314976; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=50p6OzRTuSBM3up5x9LmYqhFMZcT1lwZSCCGTtAVrnE=; b=Ca6C38sNgqrOkJ3GixMkEQwG372ORdqFio7iYqOqRQs9p2BWQTLsyZ9OhWKoRP9xKm9MhNg/R/QZTMqRN1U+ZDzlLRa+FAirP+4wCSY+YW8igWlxVBiqHB2FsGvdtYJ5BRyMFkb15bL92Y4aIuNkgNsAfW51cBxvAF7CmOeu7Hc= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1597314976346697.8453416768083; Thu, 13 Aug 2020 03:36:16 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1k6AaU-0002xV-EZ; Thu, 13 Aug 2020 10:35:58 +0000 Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1k6AaT-0002ws-Nf for xen-devel@lists.xenproject.org; Thu, 13 Aug 2020 10:35:57 +0000 Received: from mail.xenproject.org (unknown [104.130.215.37]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id c3cfa848-05c5-40c3-abe2-b574304f0c53; Thu, 13 Aug 2020 10:35:56 +0000 (UTC) Received: from xenbits.xenproject.org ([104.239.192.120]) by mail.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1k6AaR-0006Ya-Im; Thu, 13 Aug 2020 10:35:55 +0000 Received: from host86-143-223-30.range86-143.btcentralplus.com ([86.143.223.30] helo=u2f063a87eabd5f.home) by xenbits.xenproject.org with esmtpsa (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1k6AaR-0007eh-82; Thu, 13 Aug 2020 10:35:55 +0000 X-Inumbo-ID: c3cfa848-05c5-40c3-abe2-b574304f0c53 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org; s=20200302mail; h=Content-Transfer-Encoding:Content-Type:MIME-Version: Message-Id:Date:Subject:Cc:To:From; bh=50p6OzRTuSBM3up5x9LmYqhFMZcT1lwZSCCGTtAVrnE=; b=UP5R6mtuJrHCD9Cb6JEMHA7efh kB1l28EJQmsOtIC7PwGylPLR+UG0ppVUTF/Cxov9WTLVx+uwIPSKBJ6TQIDpLHS/bmYctxq9dibe/ quLjmQYooKGludhElRuZpnUuFatXXJR7i4pjGyXBiPBW7nLPD31wOFS2GuZPmqXuYifM=; From: Paul Durrant To: xen-devel@lists.xenproject.org Cc: Paul Durrant , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Wei Liu , Jan Beulich , Andrew Cooper Subject: [PATCH v2] x86 / viridian: remove the viridian_vcpu msg_pending bit mask Date: Thu, 13 Aug 2020 11:35:53 +0100 Message-Id: <20200813103553.29177-1-paul@xen.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: pass (identity @xen.org) From: Paul Durrant The mask does not actually serve a useful purpose as we only use the SynIC for timer messages. Dropping the mask means that the EOM MSR handler essentially becomes a no-op. This means we can avoid setting 'message_pendi= ng' for timer messages and hence avoid a VMEXIT for the EOM. Signed-off-by: Paul Durrant Reviewed-by: "Roger Pau Monn=C3=A9" Acked-by: Wei Liu --- Cc: Wei Liu Cc: Jan Beulich Cc: Andrew Cooper v2: - Clean up now extraneous comment noticed by Roger This should hopefully simplify Roger's "x86/vlapic: implement EOI callbacks" series a little. --- xen/arch/x86/hvm/viridian/synic.c | 24 +----------------------- xen/arch/x86/hvm/vlapic.c | 4 ---- xen/include/asm-x86/hvm/viridian.h | 2 -- 3 files changed, 1 insertion(+), 29 deletions(-) diff --git a/xen/arch/x86/hvm/viridian/synic.c b/xen/arch/x86/hvm/viridian/= synic.c index 94a2b88733..22e2df27e5 100644 --- a/xen/arch/x86/hvm/viridian/synic.c +++ b/xen/arch/x86/hvm/viridian/synic.c @@ -137,7 +137,6 @@ int viridian_synic_wrmsr(struct vcpu *v, uint32_t idx, = uint64_t val) if ( !(viridian_feature_mask(d) & HVMPV_synic) ) return X86EMUL_EXCEPTION; =20 - vv->msg_pending =3D 0; break; =20 case HV_X64_MSR_SINT0 ... HV_X64_MSR_SINT15: @@ -168,9 +167,6 @@ int viridian_synic_wrmsr(struct vcpu *v, uint32_t idx, = uint64_t val) printk(XENLOG_G_INFO "%pv: VIRIDIAN SINT%u: vector: %x\n", v, sint= x, vector); =20 - if ( new.polling ) - __clear_bit(sintx, &vv->msg_pending); - *vs =3D new; break; } @@ -334,9 +330,6 @@ bool viridian_synic_deliver_timer_msg(struct vcpu *v, u= nsigned int sintx, .DeliveryTime =3D delivery, }; =20 - if ( test_bit(sintx, &vv->msg_pending) ) - return false; - /* * To avoid using an atomic test-and-set, and barrier before calling * vlapic_set_irq(), this function must be called in context of the @@ -346,12 +339,9 @@ bool viridian_synic_deliver_timer_msg(struct vcpu *v, = unsigned int sintx, =20 msg +=3D sintx; =20 + /* There is no need to set message_pending as we do not require an EOM= */ if ( msg->header.message_type !=3D HVMSG_NONE ) - { - msg->header.message_flags.msg_pending =3D 1; - __set_bit(sintx, &vv->msg_pending); return false; - } =20 msg->header.message_type =3D HVMSG_TIMER_EXPIRED; msg->header.message_flags.msg_pending =3D 0; @@ -380,18 +370,6 @@ bool viridian_synic_is_auto_eoi_sint(const struct vcpu= *v, return vs->auto_eoi; } =20 -void viridian_synic_ack_sint(const struct vcpu *v, unsigned int vector) -{ - struct viridian_vcpu *vv =3D v->arch.hvm.viridian; - unsigned int sintx =3D vv->vector_to_sintx[vector]; - - ASSERT(v =3D=3D current); - - if ( sintx < ARRAY_SIZE(vv->sint) ) - __clear_bit(array_index_nospec(sintx, ARRAY_SIZE(vv->sint)), - &vv->msg_pending); -} - void viridian_synic_save_vcpu_ctxt(const struct vcpu *v, struct hvm_viridian_vcpu_context *ctxt) { diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arch/x86/hvm/vlapic.c index 7b5c633033..4e3861eb7d 100644 --- a/xen/arch/x86/hvm/vlapic.c +++ b/xen/arch/x86/hvm/vlapic.c @@ -462,12 +462,8 @@ void vlapic_handle_EOI(struct vlapic *vlapic, u8 vecto= r) struct vcpu *v =3D vlapic_vcpu(vlapic); struct domain *d =3D v->domain; =20 - /* All synic SINTx vectors are edge triggered */ - if ( vlapic_test_vector(vector, &vlapic->regs->data[APIC_TMR]) ) vioapic_update_EOI(d, vector); - else if ( has_viridian_synic(d) ) - viridian_synic_ack_sint(v, vector); =20 hvm_dpci_msi_eoi(d, vector); } diff --git a/xen/include/asm-x86/hvm/viridian.h b/xen/include/asm-x86/hvm/v= iridian.h index 844e56b38f..cbf77d9c76 100644 --- a/xen/include/asm-x86/hvm/viridian.h +++ b/xen/include/asm-x86/hvm/viridian.h @@ -31,7 +31,6 @@ struct viridian_vcpu struct viridian_page vp_assist; bool apic_assist_pending; bool polled; - unsigned int msg_pending; uint64_t scontrol; uint64_t siefp; struct viridian_page simp; @@ -89,7 +88,6 @@ void viridian_apic_assist_clear(const struct vcpu *v); void viridian_synic_poll(struct vcpu *v); bool viridian_synic_is_auto_eoi_sint(const struct vcpu *v, unsigned int vector); -void viridian_synic_ack_sint(const struct vcpu *v, unsigned int vector); =20 #endif /* __ASM_X86_HVM_VIRIDIAN_H__ */ =20 --=20 2.20.1