From nobody Wed Apr 1 23:48:07 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1774872034; cv=pass; d=zohomail.com; s=zohoarc; b=g/WxaaO18TH/MvtPYC+4zG+ghvrI8K8/fOOGgcEu9mOdz3q++K322S7/hw+WNno/ZPABeByxwGYkf67sHhvzKFjtabzcz5vlcfH1Qccymx+wQ2YfITE6cNMnEt61Lah8a3uU9PxGg+BbmmsODb1ubL2o9Ltl9xbzOHMExCMri3g= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1774872034; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=v1iQlWpWUlX2W69fYSmCagQKGYvJZO6E1KFm/axIUUg=; b=Udt+YqPgwMgjUxsEXRo0VD3f2wlnbg9vz7fHz3sekWESu5gMA08YFG15GhREazKUqnYs//vXbv406uzANTiAQw74YzDaq5fzBK0OlhQAVeobHJEoObLUAPEa/+1SPnPqGrosiRJciSr6/wUXwS8PC5mugOSQb/rX4xaIP+nHZ38= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1774872034809179.04845201875378; Mon, 30 Mar 2026 05:00:34 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1267449.1556937 (Exim 4.92) (envelope-from ) id 1w7BHf-0000IC-CZ; Mon, 30 Mar 2026 11:59:55 +0000 Received: by outflank-mailman (output) from mailman id 1267449.1556937; Mon, 30 Mar 2026 11:59:55 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHf-0000Hm-6m; Mon, 30 Mar 2026 11:59:55 +0000 Received: by outflank-mailman (input) for mailman id 1267449; Mon, 30 Mar 2026 11:59:53 +0000 Received: from mx.expurgate.net ([195.190.135.10]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHc-0000F4-WF for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 11:59:53 +0000 Received: from mx.expurgate.net (helo=localhost) by mx.expurgate.net with esmtp id 1w7BHc-003QIn-8F for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 13:59:52 +0200 Received: from [10.42.69.9] (helo=localhost) by localhost with ESMTP (eXpurgate MTA 0.9.1) (envelope-from ) id 69ca65a8-2eae-0a2a0a5409dd-0a2a4509bac8-40 for ; Mon, 30 Mar 2026 13:59:52 +0200 Received: from [52.101.66.84] (helo=DUZPR83CU001.outbound.protection.outlook.com) by tlsNG-bad1c0.mxtls.expurgate.net with ESMTPS (eXpurgate 4.55.2) (envelope-from ) id 69ca65b7-e484-0a2a45090019-34654254c0bd-4 for ; Mon, 30 Mar 2026 13:59:52 +0200 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PA4PR03MB6847.eurprd03.prod.outlook.com (2603:10a6:102:eb::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.28; Mon, 30 Mar 2026 11:59:50 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%5]) with mapi id 15.20.9745.027; Mon, 30 Mar 2026 11:59:50 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" Authentication-Results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=epam.com header.i="@epam.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:x-ms-exchange-senderadcheck" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=IXKq9730CIG8FDs14n6+zIQP3QWBKuUeE9//gOy6VPERJ47vRa6VCMJ4fPuWbPXtCT3XHGIO2KHfvOMho2d8dXf1qHfbG8DmefpI8y0HCIE55Pjvc95n06AMPyy8TI8xxgGg89L/tiXimI307krVDafL2YeC5++G605zg6AWiMz7bbB7xgZtcihblLX+UZLNF6uJ/CdOoR1TaEXG73iKSqRI8kS9enclgKutv0sGOcdnSSFP/5UuUEy8GuGS+3DJ8juHOlW+zys5ra5KT8n8tZn7W+szyYu//ouyaob1agGQtIpk8C1bSZYk+vt8HAc7a5RSH3mIkth3CGLZYvXZlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=v1iQlWpWUlX2W69fYSmCagQKGYvJZO6E1KFm/axIUUg=; b=g8ov3+pshNY746ORxGglTCSQNSJXjM7mwsVFK9EUrb5p8EDd6919GA3u7P+ULvEaQm6uAv774O/fyP5DMTEzR/VTFT1lof3g9NxMdpbMftfNzAF+lysxqiuaZAGLLpYPt0RyKuBxRQvcwML5WrAt8TnSYYoxvwrrp/0tkn2kXX/LgwQ4eWFj0I4tNhn5cIpwDR0a7Nrb9VrDZh+sBFIkHbsnrACJuFUgw4DDQIQkvhAzNs8+NxkYEt01qcpGk+/Bt0Wwm1x2BVgswpMZ1VlKdg575TtV5H4kPluK9VkjZoEoW3y5a4Z6X7yy5WLE1JIcdEaOvMC5+Xt5YDdxuz/7mw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=v1iQlWpWUlX2W69fYSmCagQKGYvJZO6E1KFm/axIUUg=; b=DvL2aOqrRNw73RDbq7Q/Sx5ZJCzV33PWcpajV+fIi9Q6VzbzmKBggdkWlVvwVrCtsfYsvyL/Ekh6H3laI68IPxWeYVi6BWjmyfCxXFL6oeCI3kj6s2BYjVTV289Yx5JM14/gNkm0imJ5NXuPzjvQvJBaxvjFY3+0p1nM0fHOvsEqJ62FS2KOhqetEyR4YYYket9YqVEWfXD6KTIweFotVw6JssyDAnKWf2XXLfBGFa3J0z5R8AEMf4EP/O5lp0YH1khV37qcje3p60aay345F6Br0mX0amMYOVF5r8z3H6E6angVLAREJOrRUw63kwbF0hVvk+wEor3Q0iU+BqLmMg== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Mykyta Poturai , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk Subject: [PATCH v7 1/6] arm/irq: Keep track of irq affinities Thread-Topic: [PATCH v7 1/6] arm/irq: Keep track of irq affinities Thread-Index: AQHcwDy2nbDObKGCpEa2H43UsrK34Q== Date: Mon, 30 Mar 2026 11:59:50 +0000 Message-ID: <0ff697dc791aeb6c2a44db93b862ec381a1e7468.1774871881.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PA4PR03MB6847:EE_ x-ms-office365-filtering-correlation-id: be2a7249-5093-41c6-186a-08de8e53d8b2 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|376014|1800799024|56012099003|18002099003|22082099003|38070700021; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(1800799024)(56012099003)(18002099003)(22082099003)(38070700021);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?TuSvTM3f6ViM80kTjl/9Z+e29tfyMPyps358Ahtc7FnNYkwcqav+kcro3c?= =?iso-8859-1?Q?AgIZER/z1ALKyCTCfQINEBoRPE36CtD3FOxdkRFJKLnagHHKWqxyFJNIaP?= =?iso-8859-1?Q?9DacwkpS1Zg7+RfaxE2yEjM9oEwwCEV9BybTckx+SBF+EgkfJ8c7PThTsX?= =?iso-8859-1?Q?R5yMPldfPRLzkQ+RYsJEvIWP7aOzuAOoAf41R3Zhw4pGpMbf+5JrTj54uc?= =?iso-8859-1?Q?EiM/fxN4GZhuueJRfWJJNu9dueup+xMOWtP7IxqJuz18bNJ9gpzp6Ho7sa?= =?iso-8859-1?Q?HqJ/vxtyPpZL4jSP0c7sefkD4cQx03trFZx7D7242qQlgrButyow3iRXBU?= =?iso-8859-1?Q?+CAs7CpBhwgLCj40jka+xjk4w+aX4QMIDHPnB3eZQLYBdXuz7gvY8l49IQ?= =?iso-8859-1?Q?CAC4lXtW77+2025USmeXZheaNeTdlzzahjyyRbqsRF7pav9PFuqRVS1jKN?= =?iso-8859-1?Q?KMni4NCxMg/Iek+5CHnRuTzMgr3+eEuclNC8XntzjQrgZyRZ5JOk6Vu2y0?= =?iso-8859-1?Q?90/aBIgQ/ItgzdMFiz/ETw/MFUimS2gOO8Qxa3rYoxxtp9eySKhKaRhTdt?= =?iso-8859-1?Q?qUhOCJ4vOfSC96qoOBAl1o8HAsEkF1G0mpz47sBfhTvVdyjZezs/c0IxDS?= =?iso-8859-1?Q?NJXCOj196UrBVebNX8g0S+IKNN/6b/IYsUpEnNEPO+pnKOwWf7cf/jND17?= =?iso-8859-1?Q?PKw8aAua63VXYb+ZEJnsvBC7t8clr5aXItG9xZQKFAgY86np3bXTxkbsoA?= =?iso-8859-1?Q?SYrwLY4bN1sE52HdnJdW2QjE2Ikc929LMyp494Rdnsx2DGvFo2Yi+uQYe+?= =?iso-8859-1?Q?xqmBqv56kNfDmeMIcLfKZR1e0gJ9h6Wx/Sd//qLpv8j9YhbTWBOaWd8fR2?= =?iso-8859-1?Q?rZZ61EWLiSyv805IixHA0xoOEkI5Y0AghoQ6F7/j9FSRPEAdfX9426285w?= =?iso-8859-1?Q?n05JaP8CP8dfpY0rr6P3fosEQK2JxACZCfTuf6GAPnl2FxRCp/DVn/cMlN?= =?iso-8859-1?Q?czmVvAPqkv2kiwlARGVW1kMJQOcpJ3wdiUbDT/OVQEnzooC1Ct87zvpbwF?= =?iso-8859-1?Q?affhfLqn01PFxbKORiEBUYqwHVmHc0EZ0P2qr+4dDpIpliLL+pE0L8qgYF?= =?iso-8859-1?Q?umN4C94DEP73IdXY7wp+W29Z+QMJYyV24ztGAfXfCb6wPa6Uo1LUnI3fAf?= =?iso-8859-1?Q?wxTc5ne0aBxXLg5fAIY2/xPbBIAt3YmE3MS/JNaUbWJhumCxWl4yW+62IY?= =?iso-8859-1?Q?5JoMbKKBccDtpb/JHWtCmQ5JPdmKmf4RyDkx724NWh6ku2WNx5abEe2tox?= =?iso-8859-1?Q?AlqEu8zpjetaSnwpnCJY6GTgoGN/1N6gWE0rQ0LfAqRmOU90OZk3QeLdHJ?= =?iso-8859-1?Q?faWjpQ6DCqvac4l/0MRcxd8JcTcsUHvBI8cJNHYANMFPJgKbuO15eoQdaP?= =?iso-8859-1?Q?cX3w3eWzPhEPsqn+sTweKbsAkwUrJG2jiaQjBpdv0foTfpwy9Mu0ZzpzI4?= =?iso-8859-1?Q?S6oCCnc4psfe9kZcmU7NL10v9HMj3eYOw/3zmY+TLPKVNp5/gf0UcHXXP/?= =?iso-8859-1?Q?u2UBLaWhIfOG3LqWXYSlCv6q6cTy34aiDLVrU2WNL20eti4OstNkqT6pmS?= =?iso-8859-1?Q?jR2KKbFPy4ivyll2t20xteGcnc+w8YcUA6psT73QVLpVRaQOAMoV/aiYTj?= =?iso-8859-1?Q?p6NceTLZ+Sk7M//7crq9oS61CDz+F1lAZUnoqIZjUPD9lodUZ9BBjlOFel?= =?iso-8859-1?Q?qv+m+gWRIopca3IAKDISjfKlrlICsl8jsPc0Xw5joHwadIelMz75maFibs?= =?iso-8859-1?Q?/FkeU+YdUw5cK+WTr1pIgBYtCgTIfDw=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: be2a7249-5093-41c6-186a-08de8e53d8b2 X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Mar 2026 11:59:50.2131 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: WTQ6777rsV0tXglTjQKIm//O4hlULHrdbL8t16ASMvrV4G+rhd+2JhZL83A3bvIYUePA1C6olV28loJqq4O45g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR03MB6847 X-purgate-ID: tlsNG-bad1c0/1774871992-69D44A73-30B83DD5/0/0 X-purgate-type: clean X-purgate-size: 7495 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1774872036803158500 Content-Type: text/plain; charset="utf-8" Currently on Arm the desc->affinity mask of an irq is never updated, which makes it hard to know the actual affinity of an interrupt. Fix this by updating the field in irq_set_affinity. Changing desc->affinity requires desc->lock to be held, so add an assertion to ensure that callers of irq_set_affinity are doing so correctly. With desc->lock now being required for irq_set_affinity, add locking around calls to it where it was missing. Signed-off-by: Mykyta Poturai Reviewed-by: Bertrand Marquis --- v6->v7: * update commit message * fix possible locking on null desc * collect RBs v5->v6: * add missing locking around irq_set_affinity calls v4->v5: * add locking v3->v4: * patch introduced --- xen/arch/arm/gic-vgic.c | 2 ++ xen/arch/arm/irq.c | 9 +++++++-- xen/arch/arm/vgic.c | 14 ++++++++++++-- xen/arch/arm/vgic/vgic-mmio-v2.c | 11 +++++------ xen/arch/arm/vgic/vgic.c | 21 +++++++++++++-------- 5 files changed, 39 insertions(+), 18 deletions(-) diff --git a/xen/arch/arm/gic-vgic.c b/xen/arch/arm/gic-vgic.c index ea48c5375a..5253caf002 100644 --- a/xen/arch/arm/gic-vgic.c +++ b/xen/arch/arm/gic-vgic.c @@ -232,7 +232,9 @@ static void gic_update_one_lr(struct vcpu *v, int i) if ( test_bit(GIC_IRQ_GUEST_MIGRATING, &p->status) ) { struct vcpu *v_target =3D vgic_get_target_vcpu(v, irq); + spin_lock(&p->desc->lock); irq_set_affinity(p->desc, cpumask_of(v_target->processor)); + spin_unlock(&p->desc->lock); clear_bit(GIC_IRQ_GUEST_MIGRATING, &p->status); } } diff --git a/xen/arch/arm/irq.c b/xen/arch/arm/irq.c index 73e58a5108..7204bc2b68 100644 --- a/xen/arch/arm/irq.c +++ b/xen/arch/arm/irq.c @@ -216,10 +216,15 @@ static inline struct domain *irq_get_domain(struct ir= q_desc *desc) return irq_get_guest_info(desc)->d; } =20 +/* Must be called with desc->lock held */ void irq_set_affinity(struct irq_desc *desc, const cpumask_t *mask) { - if ( desc !=3D NULL ) - desc->handler->set_affinity(desc, mask); + if ( desc =3D=3D NULL ) + return; + + ASSERT(spin_is_locked(&desc->lock)); + cpumask_copy(desc->affinity, mask); + desc->handler->set_affinity(desc, mask); } =20 int request_irq(unsigned int irq, unsigned int irqflags, diff --git a/xen/arch/arm/vgic.c b/xen/arch/arm/vgic.c index 6647071ad4..c59f6873db 100644 --- a/xen/arch/arm/vgic.c +++ b/xen/arch/arm/vgic.c @@ -445,7 +445,9 @@ bool vgic_migrate_irq(struct vcpu *old, struct vcpu *ne= w, unsigned int irq) =20 if ( list_empty(&p->inflight) ) { + spin_lock(&p->desc->lock); irq_set_affinity(p->desc, cpumask_of(new->processor)); + spin_unlock(&p->desc->lock); spin_unlock_irqrestore(&old->arch.vgic.lock, flags); return true; } @@ -453,7 +455,9 @@ bool vgic_migrate_irq(struct vcpu *old, struct vcpu *ne= w, unsigned int irq) if ( !list_empty(&p->lr_queue) ) { vgic_remove_irq_from_queues(old, p); + spin_lock(&p->desc->lock); irq_set_affinity(p->desc, cpumask_of(new->processor)); + spin_unlock(&p->desc->lock); spin_unlock_irqrestore(&old->arch.vgic.lock, flags); vgic_inject_irq(new->domain, new, irq, true); return true; @@ -473,6 +477,7 @@ void arch_move_irqs(struct vcpu *v) struct domain *d =3D v->domain; struct pending_irq *p; struct vcpu *v_target; + unsigned long flags; int i; =20 /* @@ -494,7 +499,13 @@ void arch_move_irqs(struct vcpu *v) p =3D irq_to_pending(v_target, virq); =20 if ( v_target =3D=3D v && !test_bit(GIC_IRQ_GUEST_MIGRATING, &p->s= tatus) ) + { + if ( !p->desc ) + continue; + spin_lock_irqsave(&p->desc->lock, flags); irq_set_affinity(p->desc, cpu_mask); + spin_unlock_irqrestore(&p->desc->lock, flags); + } } } =20 @@ -574,8 +585,8 @@ void vgic_enable_irqs(struct vcpu *v, uint32_t r, unsig= ned int n) spin_unlock_irqrestore(&v_target->arch.vgic.lock, flags); if ( p->desc !=3D NULL ) { - irq_set_affinity(p->desc, cpumask_of(v_target->processor)); spin_lock_irqsave(&p->desc->lock, flags); + irq_set_affinity(p->desc, cpumask_of(v_target->processor)); /* * The irq cannot be a PPI, we only support delivery of SPIs * to guests. @@ -944,4 +955,3 @@ void vgic_check_inflight_irqs_pending(struct vcpu *v, u= nsigned int rank, uint32_ * indent-tabs-mode: nil * End: */ - diff --git a/xen/arch/arm/vgic/vgic-mmio-v2.c b/xen/arch/arm/vgic/vgic-mmio= -v2.c index b7c2d7ce99..fc04741ca1 100644 --- a/xen/arch/arm/vgic/vgic-mmio-v2.c +++ b/xen/arch/arm/vgic/vgic-mmio-v2.c @@ -159,24 +159,23 @@ static void vgic_mmio_write_target(struct vcpu *vcpu, for ( i =3D 0; i < len; i++ ) { struct vgic_irq *irq =3D vgic_get_irq(vcpu->domain, NULL, intid + = i); + struct irq_desc *desc =3D irq_to_desc(irq->hwintid); =20 - spin_lock_irqsave(&irq->irq_lock, flags); + spin_lock_irqsave(&desc->lock, flags); + spin_lock(&irq->irq_lock); =20 irq->targets =3D (val >> (i * 8)) & cpu_mask; if ( irq->targets ) { irq->target_vcpu =3D vcpu->domain->vcpu[ffs(irq->targets) - 1]; if ( irq->hw ) - { - struct irq_desc *desc =3D irq_to_desc(irq->hwintid); - irq_set_affinity(desc, cpumask_of(irq->target_vcpu->proces= sor)); - } } else irq->target_vcpu =3D NULL; =20 - spin_unlock_irqrestore(&irq->irq_lock, flags); + spin_unlock(&irq->irq_lock); + spin_unlock_irqrestore(&desc->lock, flags); vgic_put_irq(vcpu->domain, irq); } } diff --git a/xen/arch/arm/vgic/vgic.c b/xen/arch/arm/vgic/vgic.c index b2c0e1873a..1c44236c4f 100644 --- a/xen/arch/arm/vgic/vgic.c +++ b/xen/arch/arm/vgic/vgic.c @@ -812,22 +812,27 @@ void arch_move_irqs(struct vcpu *v) { struct vgic_irq *irq =3D vgic_get_irq(d, NULL, i + VGIC_NR_PRIVATE= _IRQS); unsigned long flags; + irq_desc_t *desc; =20 if ( !irq ) continue; =20 - spin_lock_irqsave(&irq->irq_lock, flags); - - /* Only hardware mapped vIRQs that are targeting this vCPU. */ - if ( irq->hw && irq->target_vcpu =3D=3D v) + if ( !irq->hw ) { - irq_desc_t *desc =3D irq_to_desc(irq->hwintid); + vgic_put_irq(d, irq); + continue; + } =20 + desc =3D irq_to_desc(irq->hwintid); + spin_lock_irqsave(&desc->lock, flags); + spin_lock(&irq->irq_lock); + + /* Only hardware mapped vIRQs that are targeting this vCPU. */ + if ( irq->target_vcpu =3D=3D v ) irq_set_affinity(desc, cpumask_of(v->processor)); - } =20 - spin_unlock_irqrestore(&irq->irq_lock, flags); - vgic_put_irq(d, irq); + spin_unlock(&irq->irq_lock); + spin_unlock_irqrestore(&desc->lock, flags); } } =20 --=20 2.51.2 From nobody Wed Apr 1 23:48:07 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1774872016; cv=pass; d=zohomail.com; s=zohoarc; b=Oyf4nSKA7qRFqrunWoYO41GMmGoDi9WO4hDK0i2C2EUy4+gwTRQZN3yvzTATvOQTB3UcmpPy7jDsVKnXnxPOJwhMpP3zpHsSNwaPYQw1bFy85Anxi+ROroi8L/fRdVQy0cs/TwVAVMzgCtvL/CSbv+oiNzeLA5wE6/kb+m6cpR8= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1774872016; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=YJF2GnvkUpeFC8MeYR5G0v/n9PCj1jBo1kZj44vU37Q=; b=DPXGEmNGbXasuXuKWQgPey8eAmhhSGclOn0bMt4OIeRNwB1qJoOzMFwhXKOKTjirOQvHdYOY32u/S3W8kzdBtC4Dq79vTzr+Yrb96rdybY0aGJO76KDXaToZwmrNwTRFqhE9A8RvIY4qpR9m3lQu8kiM0ovLvDjJuXy7nfmbXmo= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1774872016438623.1599137092974; Mon, 30 Mar 2026 05:00:16 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1267451.1556954 (Exim 4.92) (envelope-from ) id 1w7BHh-0000jj-0T; Mon, 30 Mar 2026 11:59:57 +0000 Received: by outflank-mailman (output) from mailman id 1267451.1556954; Mon, 30 Mar 2026 11:59:56 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHg-0000jV-Ri; Mon, 30 Mar 2026 11:59:56 +0000 Received: by outflank-mailman (input) for mailman id 1267451; Mon, 30 Mar 2026 11:59:55 +0000 Received: from mx.expurgate.net ([195.190.135.10]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHf-0000FG-40 for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 11:59:55 +0000 Received: from mx.expurgate.net (helo=localhost) by mx.expurgate.net with esmtp id 1w7BHe-003QIn-Fn for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 13:59:54 +0200 Received: from [10.42.69.9] (helo=localhost) by localhost with ESMTP (eXpurgate MTA 0.9.1) (envelope-from ) id 69ca65a8-2eae-0a2a0a5409dd-0a2a4509bac8-46 for ; Mon, 30 Mar 2026 13:59:54 +0200 Received: from [52.101.66.84] (helo=DUZPR83CU001.outbound.protection.outlook.com) by tlsNG-bad1c0.mxtls.expurgate.net with ESMTPS (eXpurgate 4.55.2) (envelope-from ) id 69ca65b7-e484-0a2a45090019-34654254c0bd-5 for ; Mon, 30 Mar 2026 13:59:52 +0200 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PA4PR03MB6847.eurprd03.prod.outlook.com (2603:10a6:102:eb::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.28; Mon, 30 Mar 2026 11:59:50 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%5]) with mapi id 15.20.9745.027; Mon, 30 Mar 2026 11:59:50 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" Authentication-Results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=epam.com header.i="@epam.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:x-ms-exchange-senderadcheck" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=oOoT7OjvRhZINl3Rio4Blw3tDvxWBgq7SOvoNTg8M+nEYLUK+0hgxOdC0egWpxedU6RQHGGLEAX2BpZZdQiA8MgvhQAm+V3wVmAnLw1mkJXOJ4W90NE9z3ktDNUOCmNvBF4Wzys6BzKUpVP9LW2qCf0+uJUmzeVgymk7in/r4epaFWy890Kym1DsdTNJ/krSvKIkDoWIGI0RNe29fbulvTs7zTITNsaW48E5lqphau5ZPbZB5mF0Hd2T+y1ijcxR3DQmSqmrmVLI7V5Ymv84S42R33HtpfFtW31Utlt8gKJJnEU/jLg0p1v5ppJhkjTMTbhtC+/UQBsq02yuxflQWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YJF2GnvkUpeFC8MeYR5G0v/n9PCj1jBo1kZj44vU37Q=; b=YK4cIBBROeQVCFM/a5tJvAAfI57fudjOZgzWlifA9VbZW7MQtOk3fGDBniJWtRLKIh6lSfW7xwsSjlULCCxGmaFszkdXfCn7wrqhM/S0nU5DyFH0HAmFwcHTK6YuluOZag1J2aQlIYtYCkIDB3XRazeil08XHlN37oI1wNqwZqOQiAnZJ/kM0wdZCXEdE9XB4JHKwUZEpRAi+3BWfxMwJxd7Yary7RJzZe6Zh2mfikT/0Zd+czef4riW/LagKrhQAsaUBA/8IuVlGhf//7cTcz3QRuVzuCNYy8PcpXTZ6Vm7ShPmFH1y6q1I3sCT03w2kH5gVdzqjuNl8WAud6l6Ig== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YJF2GnvkUpeFC8MeYR5G0v/n9PCj1jBo1kZj44vU37Q=; b=IqGWG1vVM4mWOYJcAN+gDfRMBvcOuAMm+y8yHabkuhxaW5w2Rl2i8uqxzZvIoq/Q5ZaKE+aOy+TlIKU45zGrc5SxdOM7hhw0oW8O8Khd1RLtYPQfjinqwIBnvj0RAnfVW3vSmwkwhz8x54MBe7TbjSISIWjcY3Gwkzn8gqLvITAjUbsbvkpREVHXA3tzWHNqae/pzIH0rWw6Fdb+t0v/05EmZDJeFfKpKqrkISgO+z61ujSsLZY7kede1GSApdp72hQnfCKGPKuhL/tm0ThSo7JN8/mBlrutvpFil6fjZzxu5fkSP9qC9OfHdacZw7sOWFUgJn6vdmJDlJfU8HfChw== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Mykyta Poturai , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk Subject: [PATCH v7 2/6] arm/irq: Migrate IRQs during CPU up/down operations Thread-Topic: [PATCH v7 2/6] arm/irq: Migrate IRQs during CPU up/down operations Thread-Index: AQHcwDy2Ii3JnaWGS0ukts0X6B0lGQ== Date: Mon, 30 Mar 2026 11:59:50 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PA4PR03MB6847:EE_ x-ms-office365-filtering-correlation-id: d1eb3613-99c9-44f8-54b5-08de8e53d8f6 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|376014|1800799024|56012099003|18002099003|22082099003|38070700021; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(1800799024)(56012099003)(18002099003)(22082099003)(38070700021);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?OmqmLzDTxAaNiOxTmjxr2pr4UYvLVQ3/PMa8Gxj2ILjq66m7+yV4CgUmoA?= =?iso-8859-1?Q?wCE/jt1W4E5DlS80vEd0bEGcEKYPKE8AyqddJxup2XhBVmpdP91zDPyN/F?= =?iso-8859-1?Q?s8S3IkgTzPwecsiTe0OutoBxqcs8WRvJbUxdrAgPfD53UwjDLapGPrBG9I?= =?iso-8859-1?Q?TI9acpprxTnoc1DwtjU5drGnOPOHv5GaM58OWcOvYZE5KVo9+ddpKwIvWa?= =?iso-8859-1?Q?lmmaYDQFmdYCDS1LFwtZGkDNquI/LM2qx56Gksghs+6ulvbcIUSfI8z6/R?= =?iso-8859-1?Q?9zWXqjsMufd7FdGoWN8nRbMlNVLjdP6mgO0UEnxHDtjj/Tzl8LP7JOatis?= =?iso-8859-1?Q?kFYXHfXYFqXC4kOB+uBtGqUfzh3VshBTzMFUG3SkDOtM6PuySzj7PocGEL?= =?iso-8859-1?Q?jdF9lFdfjTKIYd+YtaqNJ+1PF+yfY3++0CqJjItQPF8NBKINCjzrD6ZdhM?= =?iso-8859-1?Q?IRVRZqYoZEXRHjCVxbJEEm2eO786RdZQ4kwZvvmdnbURmfMKDtyPPKQBJ3?= =?iso-8859-1?Q?+NKUZpeWK1e+arSZAZuG1z2HudQ2qHqbLomWiCglxpTdmg+W2J+oi2DoLt?= =?iso-8859-1?Q?O45AbUljQAQvXcZJdjBU6FSmI2l1fcRrOrqNdIsy1oNniivryxqDgLdHoE?= =?iso-8859-1?Q?naPYT8NFY+FQWTt1o07kRUdTRHx8jc3/WG8lR0DhqjI1N3vZmjr0BkpQkf?= =?iso-8859-1?Q?7gQ99D4fcXElRmqW8cgU4HHxJMfK0+6gR1m1BuBWPzr6TG/p6CfhziUdEO?= =?iso-8859-1?Q?4lYTwCkchsy6boFkwFHGHjJc+3b5Y8J5AElCsbVPZ2LNUm/JGSBi/schcA?= =?iso-8859-1?Q?xJ33ZPj4gfeiFaPlu5AZyWexDWd9q8DMe/TDrlI9of2L1kdkI2R1S6Xeth?= =?iso-8859-1?Q?wPJA2pglAo53zPy0PyQgOtGAbYDL+IE/FHaLKNWNOegmWjGnzUwcWJiqoV?= =?iso-8859-1?Q?Uxlj7jYZdQLc0JwadaWihkQJl7ELyJMX73hx2ULfjgGH2IiiDls7iX2zVP?= =?iso-8859-1?Q?9RQrub3N7FslRt9Zg//FQQgYAD85heAGuf9SZqq31dbYP7W+cdmmePouKs?= =?iso-8859-1?Q?FZ8q450RHEHc2WMiRq77rcxdo5fatr0qSvYwYKTsaY5hO+UcM17iQWf47D?= =?iso-8859-1?Q?M3n3G+HfyhGKWyG4uEsb0d6j/As/t5ZbQICphaHVDFOCKYjci8A47OVk5s?= =?iso-8859-1?Q?g2dh2ueHTdsM+ic52RqGKdqlLryR8NARv8XpOVULMRrkxSJXADxUxjV4kO?= =?iso-8859-1?Q?3otBQkUEveM3a2ZYSs8RBdrL8oknRwMakyzXx+ci11TDREgGysbf/lrcks?= =?iso-8859-1?Q?1xGwkdaw/A/hPq6geEao9GzX1Wr7ESfLVEBwXaE1k7T+CkNwWY2rhAwYfa?= =?iso-8859-1?Q?vt9f0eEYlJ5DRr9aEw2lZFOGLobZThxX98dtostwOldRm/hPfx3+GOuxHX?= =?iso-8859-1?Q?EtTXdUTNm+xzxZTn/A21XPJjFms9mseMbmjBQyn5Q4j6p32a8Wq3RJi2HL?= =?iso-8859-1?Q?qPu1koN2+KGzoLmUhE3xcfUuuLGJoYYUyHXm1dWRRBdGtP73ooWkp5/Ltf?= =?iso-8859-1?Q?6dE4jdJR11ZNhV4ibg/BQrLEDiFM1oW4WU4I+b2sNfXcBmybuKHIdP5FiQ?= =?iso-8859-1?Q?xSf3xQDlrgT8jKdERbmJo/ab/32Lfwcc4//vSrWrBFUj/WhnpC+i/LBcVO?= =?iso-8859-1?Q?lduz7tB3VHY8t1dI3CNXsVvyYC89rNaNyOGITdLg0M06zqZYPlP9wMvHDt?= =?iso-8859-1?Q?A5TqgIxbynGMd6KvQqumKFEB18aAZJLAupQ2OiXmq2qh86k/pcacNfocxq?= =?iso-8859-1?Q?r8pYTXIOybHmaCxxg1CMsv0EsTCbvWA=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d1eb3613-99c9-44f8-54b5-08de8e53d8f6 X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Mar 2026 11:59:50.6311 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: MQzmndRzo+dw6rWASBUMvXBTAjVmk3OeIuQtiPBpowHDDSQfmkXNg6ZA2WR60VeWCku24WYFbcDIhoh8priDPQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR03MB6847 X-purgate-ID: tlsNG-bad1c0/1774871992-60CBBA73-8904E72D/0/0 X-purgate-type: clean X-purgate-size: 4772 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1774872018720154101 Content-Type: text/plain; charset="utf-8" Move IRQs from dying CPU to the online ones when a CPU is getting offlined. When onlining, rebalance all IRQs in a round-robin fashion. Guest-bound IRQs are already handled by scheduler in the process of moving vCPUs to active pCPUs, so we only need to handle IRQs used by Xen itself. Signed-off-by: Mykyta Poturai --- v6->v7: * replace ifdef with IS_ENABLED v5->v6: * don't do any balancing on boot * only do balancing when cpu hotplug is enabled v4->v5: * handle CPU onlining as well * more comments * fix crash when ESPI is disabled * don't assume CPU 0 is a boot CPU * use insigned int for irq number * remove assumption that all irqs a bound to CPU 0 by default from the commit message v3->v4: * patch introduced --- xen/arch/arm/include/asm/irq.h | 6 ++++ xen/arch/arm/irq.c | 59 ++++++++++++++++++++++++++++++++++ xen/arch/arm/smpboot.c | 7 ++++ 3 files changed, 72 insertions(+) diff --git a/xen/arch/arm/include/asm/irq.h b/xen/arch/arm/include/asm/irq.h index 09788dbfeb..3ed55e02c3 100644 --- a/xen/arch/arm/include/asm/irq.h +++ b/xen/arch/arm/include/asm/irq.h @@ -126,6 +126,12 @@ bool irq_type_set_by_domain(const struct domain *d); void irq_end_none(struct irq_desc *irq); #define irq_end_none irq_end_none =20 +#ifdef CONFIG_CPU_HOTPLUG +void rebalance_irqs(unsigned int from, bool up); +#else +static inline void rebalance_irqs(unsigned int from, bool up) {} +#endif + #endif /* _ASM_HW_IRQ_H */ /* * Local variables: diff --git a/xen/arch/arm/irq.c b/xen/arch/arm/irq.c index 7204bc2b68..447bee428e 100644 --- a/xen/arch/arm/irq.c +++ b/xen/arch/arm/irq.c @@ -158,6 +158,60 @@ static int init_local_irq_data(unsigned int cpu) return 0; } =20 +#ifdef CONFIG_CPU_HOTPLUG +static int cpu_next; + +static void balance_irq(int irq, unsigned int from, bool up) +{ + struct irq_desc *desc =3D irq_to_desc(irq); + unsigned long flags; + + ASSERT(!cpumask_empty(&cpu_online_map)); + + spin_lock_irqsave(&desc->lock, flags); + if ( likely(!desc->action) ) + goto out; + + if ( likely(test_bit(_IRQ_GUEST, &desc->status) || + test_bit(_IRQ_MOVE_PENDING, &desc->status)) ) + goto out; + + /* + * Setting affinity to a mask of multiple CPUs causes the GIC drivers = to + * select one CPU from that mask. If the dying CPU was included in the= IRQ's + * affinity mask, we cannot determine exactly which CPU the interrupt = is + * currently routed to, as GIC drivers lack a concrete get_affinity AP= I. So + * to be safe we must reroute it to a new, definitely online, CPU. In = the + * case of CPU going down, we move only the interrupt that could resid= e on + * it. Otherwise, we rearrange all interrupts in a round-robin fashion. + */ + if ( !up && !cpumask_test_cpu(from, desc->affinity) ) + goto out; + + cpu_next =3D cpumask_cycle(cpu_next, &cpu_online_map); + irq_set_affinity(desc, cpumask_of(cpu_next)); + +out: + spin_unlock_irqrestore(&desc->lock, flags); +} + +void rebalance_irqs(unsigned int from, bool up) +{ + int irq; + + if ( cpumask_empty(&cpu_online_map) ) + return; + + for ( irq =3D NR_LOCAL_IRQS; irq < NR_IRQS; irq++ ) + balance_irq(irq, from, up); + +#ifdef CONFIG_GICV3_ESPI + for ( irq =3D ESPI_BASE_INTID; irq < ESPI_MAX_INTID; irq++ ) + balance_irq(irq, from, up); +#endif +} +#endif /* CONFIG_CPU_HOTPLUG */ + static int cpu_callback(struct notifier_block *nfb, unsigned long action, void *hcpu) { @@ -172,6 +226,11 @@ static int cpu_callback(struct notifier_block *nfb, un= signed long action, printk(XENLOG_ERR "Unable to allocate local IRQ for CPU%u\n", cpu); break; + case CPU_ONLINE: + if ( IS_ENABLED(CONFIG_CPU_HOTPLUG) && + system_state >=3D SYS_STATE_active ) + rebalance_irqs(cpu, true); + break; } =20 return notifier_from_errno(rc); diff --git a/xen/arch/arm/smpboot.c b/xen/arch/arm/smpboot.c index 7f3cfa812e..7d877179c0 100644 --- a/xen/arch/arm/smpboot.c +++ b/xen/arch/arm/smpboot.c @@ -425,6 +425,13 @@ void __cpu_disable(void) =20 smp_mb(); =20 + /* + * Now that the interrupts are cleared and the CPU marked as offline, + * move interrupts out of it + */ + if ( IS_ENABLED(CONFIG_CPU_HOTPLUG) ) + rebalance_irqs(cpu, false); + /* Return to caller; eventually the IPI mechanism will unwind and the=20 * scheduler will drop to the idle loop, which will call stop_cpu(). */ } --=20 2.51.2 From nobody Wed Apr 1 23:48:07 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1774872024; cv=pass; d=zohomail.com; s=zohoarc; b=gMlkJpjc9Mtg7Eoa0Fj9EmCy/4ecoWgYKu2T6cJ37BUUXy93zjo41Ajbq+gAqedUCWwe9HnqKf4BuDOYWhXIF8Ux2u8efFqwIPErwDjHiEBioql8FU3xI63lrWN63x5OOWgkjdGN/J5ent+vZUbcn9TPeGT3yVM+lxOBtCSuvBs= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1774872024; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=0xTyO2upwSLUp4nTUcsf626YB6NY7IhNhJBAKKSZkKc=; b=X2M42zgl8SF+MiYL2bq/l2UNlHRKLEwz3IDKrYHGohtBc7nuZ45KkhMYo9utGO3Q3BOsxV9C6e9K7lkkqCxtAFjn0vBcVRzlcP3aDWkiJa7l46Xw5ZiUL71lz/T8Gi2NFW90QQb9nC+Xe6vJ+J719xVbGropZctExUw9y7wmbho= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1774872024434408.18646489183607; Mon, 30 Mar 2026 05:00:24 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1267450.1556949 (Exim 4.92) (envelope-from ) id 1w7BHg-0000gR-MB; Mon, 30 Mar 2026 11:59:56 +0000 Received: by outflank-mailman (output) from mailman id 1267450.1556949; Mon, 30 Mar 2026 11:59:56 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHg-0000gK-J0; Mon, 30 Mar 2026 11:59:56 +0000 Received: by outflank-mailman (input) for mailman id 1267450; Mon, 30 Mar 2026 11:59:55 +0000 Received: from mx.expurgate.net ([195.190.135.10]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHf-0000FF-0o for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 11:59:55 +0000 Received: from mx.expurgate.net (helo=localhost) by mx.expurgate.net with esmtp id 1w7BHe-00CdRq-Ck for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 13:59:54 +0200 Received: from [10.42.69.3] (helo=localhost) by localhost with ESMTP (eXpurgate MTA 0.9.1) (envelope-from ) id 69ca65af-bab6-0a2a0a5309dd-0a2a4503af12-36 for ; Mon, 30 Mar 2026 13:59:54 +0200 Received: from [52.101.70.120] (helo=AS8PR04CU009.outbound.protection.outlook.com) by tlsNG-33051d.mxtls.expurgate.net with ESMTPS (eXpurgate 4.55.2) (envelope-from ) id 69ca65ba-1947-0a2a45030019-346546784220-3 for ; Mon, 30 Mar 2026 13:59:54 +0200 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by GV1PR03MB8639.eurprd03.prod.outlook.com (2603:10a6:150:95::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.28; Mon, 30 Mar 2026 11:59:51 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%5]) with mapi id 15.20.9745.027; Mon, 30 Mar 2026 11:59:51 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" Authentication-Results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=epam.com header.i="@epam.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:x-ms-exchange-senderadcheck" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=AM50aZ4ISwxkt5YJBE1FQ86cgijEhTNV3pJgK42CHERX9trvYaFyIVHi/4SbO98/KYLIkCrTjmdBvPfWKQxDYX6cbJCqJXZ2Mtyd5L8pGp3B/vQMh50BMu/y7pDEOhovVPmZ9gAqRpjA7+jfT7EhDBqiKxyFUtArXofrZ+xsR6ozRh5qZ8+0R4DMgWC2uBU0BS7v7jEFChV7D1WQ1qvxvJ2BwLQqBaB4DcndJEjDPEPc4Rzpk20/1oQrKUxMkXU3nbIkOInKP/QDxTQ9zjVsQU1VXsMXYm9D7v1Z9yE4QN4TTH1i3hs0u7A9aIMKynpYoseNp2iTm2VGiVMVCx4bTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0xTyO2upwSLUp4nTUcsf626YB6NY7IhNhJBAKKSZkKc=; b=KFG3LU+rUONVXNued0k9UCdoiq2CIsT5qat1iiS5mPbdI1xhtZcuK9/x7xVKjrV/2QAPqr+6D+HZp2Bg7WuIjBe5mm6G1VjyGh0iJn4ZNOWWJOos/oMftQwlxy563GslH4s3qisi9iXl5l59JElihD1PDnRhAfZmIS5KUgw9S51ibW+dgPpkQVAqMeJVD2jLUv8kQkQemEIs3ltQpCsEe9c626GaomiyAxVawzMQVCq6u2kf2Ou1CRkq4DaP8FAtNQAhxlfc89/FSy9YgyLV9Z7ChzXxU4E3VweqQUWR0Jy9b1/cRerIE+mOlFnmKhfASxaexkTIsDX1EQn0UypfNw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0xTyO2upwSLUp4nTUcsf626YB6NY7IhNhJBAKKSZkKc=; b=PdOKF9ULXnmuQcAL7nTvTaTDbUg1NGfdsrE66Gbl0lXtfBeArg2EehwuntCsZkdNciZfTnWnDuvYLSWt4W/DKnatnI3mYk9XM/5Zj1bfEy9pHyBD7rMYw2SeqGMMxn9QkFOKtnhPMrTO0pXh6xs/8kGQB0jeEdzL2chJr1yG30qvte+dAL/rqJqsoQu+peXvYvaJwk+A78cxt3i8LUMwy3cyEJ6+MR5+7amyeS8LRNipHhRiUegr8fe+mgLVRJJWwbCkAqDoiV+WeJLrp9Ib1rEai+fiCl4s0DpkITTYh2s8ZV9aF+kTdMSZL+d6tlYWf1u/cyHpPYx1vVal80qAMA== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Mykyta Poturai , Jan Beulich , Andrew Cooper , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Anthony PERARD , Michal Orzel , Julien Grall , Stefano Stabellini Subject: [PATCH v7 3/6] Kconfig: Make cpu hotplug configurable Thread-Topic: [PATCH v7 3/6] Kconfig: Make cpu hotplug configurable Thread-Index: AQHcwDy29LsBHsG5wEG6AuodBSMA4Q== Date: Mon, 30 Mar 2026 11:59:51 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|GV1PR03MB8639:EE_ x-ms-office365-filtering-correlation-id: a4b55bc4-8d77-4b4c-be4c-08de8e53d956 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700021|22082099003|18002099003|56012099003; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700021)(22082099003)(18002099003)(56012099003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?y18DOCd6FB5TRyYlHfbH8ie1UWQg94USW+ZPCKL304nmDyvBGws4ozM1Uk?= =?iso-8859-1?Q?IgybyGc5SRrGFJ5E0G+Ac8KOIjUFxWzj0dVe6ZpdQbkJ8+dxuLzOONMhbi?= =?iso-8859-1?Q?l/FoFrYVrYb2/sQCSDtGQdpDzNeia7am0m5bHbnvvA6VyAZjrraL4Qltbw?= =?iso-8859-1?Q?Nl5e7uN+teM0S3VhhDVWDS4kMgwgothasCeMiK3BofxqKx8NwwHmJmga7q?= =?iso-8859-1?Q?rF8ahXDe//9c5WDfp/dSoPKVOOdlBfX5ltc6qM2wGEELoU826EpoOfbmwD?= =?iso-8859-1?Q?pDF2gldCHtu+w1jR/a9+uiEGYhGIv4p/kYyCUzquux+tHGjUzz633Zrzmr?= =?iso-8859-1?Q?ylm917NZj4Ay0+fMUIhKNNHXKtY08Mj1Z19lmtYM9kqFbycr1b6c0VEKSI?= =?iso-8859-1?Q?Aptetq4QiFRc5R6XX2hRAIz3uoRDeXFiBvKAzmUl+eaz9ZbzboRrdeLAuT?= =?iso-8859-1?Q?bHkO190dnJNC///97r/B0e6c68s2SUMCJmRAs4br8w2k/d8N9thxQbhPTI?= =?iso-8859-1?Q?dEnUtD3Lcd300ZnkGIvuO1eUiXB9MazYJeSWp1xLFPNoAdZDDylPqpMlf5?= =?iso-8859-1?Q?tr2wuE7L5fui1gPj3WYEERfUPl8YVDykcji4pfrWHYHLACPO4aesGtSXwj?= =?iso-8859-1?Q?Gvu6n2v0hh+jCoSqN17cRvohBUbvFVpdJLRMWJRJxW/36a9zu+qAIdaz2x?= =?iso-8859-1?Q?CEGMVRYpGrpNyCcZ3tteycFyVDci+kgBs/hf1XOzWiUayIPq1Mm3hVLO8u?= =?iso-8859-1?Q?aNnbuqmlEQtfTfNpuNNcPZAvzhdUSfUmNxE7R3oX2x+4fjGixNE5DtS3VO?= =?iso-8859-1?Q?t48G9t7uxMumIWJR8lkpY+xzgp213QuC1eyQXi12eZBbvtYF00XvUn8UO7?= =?iso-8859-1?Q?p/B6uFLVGKXQKrsUa8bqP2hiUHvjhXc5hb708ovcNhElI9gYTQxUvAfT7i?= =?iso-8859-1?Q?/HkxiVT1Gj2dSD+EVqScGY22mxEIRm9PeJzwxgZlPQRznmJYgjEJqe48Uo?= =?iso-8859-1?Q?lCK+Lng6J6vHb6k/8RU4yKXUXEtk+531xAG310afGGpgi9vS1pPgjuMXnG?= =?iso-8859-1?Q?LT8TI0Z0k/IOGiXMObijxJeCz2U5eoJJEECNPyHdK2KBqGhYrmypdl4fo7?= =?iso-8859-1?Q?YofcPL9zEM0DBRtUVE0yHGz90DL6mQiTnz/TnegazgmnKe8DjgZemO2RJS?= =?iso-8859-1?Q?njh46zMXmBpEWBOTOYlmLmhb5YdxRtsWUGcV6Ro/CGl3sMuB5U7oeZQoaA?= =?iso-8859-1?Q?jkDu5Tjizg8TP0wubCuZHvHOsF+xRYKVuGYD2S9K3tH5+K1EMjLD/SNsvc?= =?iso-8859-1?Q?zhP7Z4Fl08MAewFcYyXH1gZpGrV4jqjOBrbXy6qlagyo6j2SUgGMEJzGEr?= =?iso-8859-1?Q?nXVtfIvBleVnl95ThbHfL48igDgVhVLmTGaIZ0+xK3vv9sVnL71qlA0S4e?= =?iso-8859-1?Q?8OMn6A1ly3NXDXsrXACnboSzU4U//5Grkjft9TsWFWPvHguAm20ud+6U9B?= =?iso-8859-1?Q?OFVp8ukZFJa/z5Vtwv+0/L4taoJpCWlVvfmBlbP8RjCcEoAtBevF6wjScq?= =?iso-8859-1?Q?KT7XEHSJ98YJUrfgOFpO3sN43N44CbBTSXgkaagblDDzFFGTbUkVRUD/U+?= =?iso-8859-1?Q?TXveJJLAQqiqj0PhexnRT0qa8AqDm5/twAnChnRbNBwtmNdR0zhGS93G3Q?= =?iso-8859-1?Q?jdMbDyAAygmT25XiWuOQGTCcEKloLZhgtqOlLZlkoeufC7aBaS6DsX9zaM?= =?iso-8859-1?Q?O5zgHOnnLg8iF7ELQn9OFc5GDhQYws5pZZJK19EMY68XtgCZ0GZ+/2dWDK?= =?iso-8859-1?Q?I5GiudqolywFUa9bP1j4MfrHt8XRqRA=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a4b55bc4-8d77-4b4c-be4c-08de8e53d956 X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Mar 2026 11:59:51.2052 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: aLFBYyMAEBtiNhzqULvvMNchQZhws9v59nQEYmKH3lgW4klhP6fxvPKA9tOGgRpTU7/e3I0me338OE5DuUcqNw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR03MB8639 X-purgate-ID: tlsNG-33051d/1774871994-7748872C-DC4FCF76/0/0 X-purgate-type: clean X-purgate-size: 3464 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1774872026681154100 Content-Type: text/plain; charset="utf-8" For the purposes of certification, we want as little code as possible to be unconditionally compiled in. Make CPU hotplug and SMT operations configurable to ease the process. This will also help with introducing CPU hotplug on Arm, where it needs to be configurable. Signed-off-by: Mykyta Poturai --- v6->v7: * new patch --- xen/arch/x86/platform_hypercall.c | 12 ++++++++++++ xen/arch/x86/smp.c | 3 +++ xen/arch/x86/sysctl.c | 11 +++++++++++ xen/common/Kconfig | 8 ++++++++ 4 files changed, 34 insertions(+) diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hype= rcall.c index cd4f0ae5e5..e745151790 100644 --- a/xen/arch/x86/platform_hypercall.c +++ b/xen/arch/x86/platform_hypercall.c @@ -735,6 +735,12 @@ ret_t do_platform_op( { int cpu =3D op->u.cpu_ol.cpuid; =20 + if ( !IS_ENABLED(CONFIG_CPU_HOTPLUG) ) + { + ret =3D -EOPNOTSUPP; + break; + } + ret =3D xsm_resource_plug_core(XSM_HOOK); if ( ret ) break; @@ -761,6 +767,12 @@ ret_t do_platform_op( { int cpu =3D op->u.cpu_ol.cpuid; =20 + if ( !IS_ENABLED(CONFIG_CPU_HOTPLUG) ) + { + ret =3D -EOPNOTSUPP; + break; + } + ret =3D xsm_resource_unplug_core(XSM_HOOK); if ( ret ) break; diff --git a/xen/arch/x86/smp.c b/xen/arch/x86/smp.c index 7936294f5f..a49505fb57 100644 --- a/xen/arch/x86/smp.c +++ b/xen/arch/x86/smp.c @@ -418,6 +418,7 @@ void cf_check call_function_interrupt(void) smp_call_function_interrupt(); } =20 +#ifdef CONFIG_CPU_HOTPLUG long cf_check cpu_up_helper(void *data) { unsigned int cpu =3D (unsigned long)data; @@ -445,8 +446,10 @@ long cf_check cpu_down_helper(void *data) { int cpu =3D (unsigned long)data; int ret =3D cpu_down(cpu); + /* Have one more go on EBUSY. */ if ( ret =3D=3D -EBUSY ) ret =3D cpu_down(cpu); return ret; } +#endif diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c index 1b04947516..bdad44fef1 100644 --- a/xen/arch/x86/sysctl.c +++ b/xen/arch/x86/sysctl.c @@ -53,6 +53,11 @@ static long cf_check smt_up_down_helper(void *data) unsigned int cpu, sibling_mask =3D boot_cpu_data.x86_num_siblings - 1; int ret =3D 0; =20 + if ( !IS_ENABLED(CONFIG_CPU_HOTPLUG) ) + { + ASSERT_UNREACHABLE(); + return -EOPNOTSUPP; + } opt_smt =3D up; =20 for_each_present_cpu ( cpu ) @@ -121,6 +126,12 @@ long arch_do_sysctl( long (*fn)(void *data); void *hcpu; =20 + if ( !IS_ENABLED(CONFIG_CPU_HOTPLUG) ) + { + ret =3D -EOPNOTSUPP; + break; + } + switch ( op ) { case XEN_SYSCTL_CPU_HOTPLUG_ONLINE: diff --git a/xen/common/Kconfig b/xen/common/Kconfig index d7e79e752a..0e5b4738a8 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -637,6 +637,14 @@ config SYSTEM_SUSPEND =20 If unsure, say N. =20 +config CPU_HOTPLUG + bool "CPU online/offline support" + depends on X86 + default y + help + Enable support for bringing CPUs online and offline at runtime. On + X86 this is required for disabling SMT. + menu "Supported hypercall interfaces" visible if EXPERT =20 --=20 2.51.2 From nobody Wed Apr 1 23:48:07 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1774872019; cv=pass; d=zohomail.com; s=zohoarc; b=kzEvVc6KpQClzWilnpPp+9aMDkxxA2+lhDHABMjqozW11xeuuahGcagTbQ7wGmcjdtUw0FFD9q+qUptfKZ+t0a21PYe5O5Opp3V7yq8y23Mi7Fu5vVRfpyQgpJvrP2ZDGPrSlyzyz8oWFU3F0JWre9ng3yUvckWbp1+6nWEkeKs= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1774872019; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=E3iSLGPHqmeiKU0oUeQNqssLEt+HtM9f9hldHYWh/ZE=; b=CEjUqOYHquSBJ2KQRHgBASjdrFh745/aJjL0Ke0JvrkW7T+VqxlRZYjOmBsCxf4f2VJY2xvX5YF5o36dvuilB470wyBun50eojU9Kus+yUX4EavzyXN8Eu5mgnAs8p5Z09FIUFf5sDXSTHCbZvh1ZO17ZITtkesmAV4q3hc8NuY= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1774872019420337.4652711744317; Mon, 30 Mar 2026 05:00:19 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1267453.1556965 (Exim 4.92) (envelope-from ) id 1w7BHh-0000tg-IL; Mon, 30 Mar 2026 11:59:57 +0000 Received: by outflank-mailman (output) from mailman id 1267453.1556965; Mon, 30 Mar 2026 11:59:57 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHh-0000r9-DH; Mon, 30 Mar 2026 11:59:57 +0000 Received: by outflank-mailman (input) for mailman id 1267453; Mon, 30 Mar 2026 11:59:56 +0000 Received: from mx.expurgate.net ([195.190.135.10]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHf-0000Nt-Ox for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 11:59:55 +0000 Received: from mx.expurgate.net (helo=localhost) by mx.expurgate.net with esmtp id 1w7BHf-00CdRq-46 for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 13:59:55 +0200 Received: from [10.42.69.3] (helo=localhost) by localhost with ESMTP (eXpurgate MTA 0.9.1) (envelope-from ) id 69ca65af-bab6-0a2a0a5309dd-0a2a4503af12-46 for ; Mon, 30 Mar 2026 13:59:55 +0200 Received: from [52.101.70.120] (helo=AS8PR04CU009.outbound.protection.outlook.com) by tlsNG-33051d.mxtls.expurgate.net with ESMTPS (eXpurgate 4.55.2) (envelope-from ) id 69ca65ba-1947-0a2a45030019-346546784220-5 for ; Mon, 30 Mar 2026 13:59:54 +0200 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by GV1PR03MB8639.eurprd03.prod.outlook.com (2603:10a6:150:95::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.28; Mon, 30 Mar 2026 11:59:52 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%5]) with mapi id 15.20.9745.027; Mon, 30 Mar 2026 11:59:52 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" Authentication-Results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=epam.com header.i="@epam.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:x-ms-exchange-senderadcheck" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=b0y66QiZM3Ap3iVY09S89Mtp4XI57DXDVjOXnhOD8hvneScOY/z5YTBJr9nSp78W95reA6BiCzDcbbp6BgRLDJ1l4cWSg45AG77EHUuIrIn0cNm5KAMatjALP+oIowAdS0rgWxLo3wIksuga7nyC8Ng4xAqYMJy6xqSI4ofeOsvk6ooQyh/lbK47AL0j8FY+mASuOV2OQ96VkTgoP1zt+3xTFjhjEC/jIPHFS3O223rgtiQNqvYqzhNV2tpS2DmO+Dl9EnYdlIM6b3b2cQ+nsKZrS3tcEPnhlfdlNVEANPsx1WWRPBx+GWonZuWmclBNI6xP/zvVjcN6N/Ner9NIzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=E3iSLGPHqmeiKU0oUeQNqssLEt+HtM9f9hldHYWh/ZE=; b=hzch4FgvrxIqLQdoC2LSCfsrSyKComsehHgMloIhyOCD0e6hYfwEvAYRepoPv4G5tka8Wu5AQDy46xhuQbosK1C+tuZKyh4v5XBPORVeTXDc4o3K3oXcioydMnlBfUCiCyIBmYBnFnhBLyTQURKWwIg5aaH+3hj/G49g4Rsj0xAR+q+tWce03rCXkGYCuBsFHoNCr4RyJKq85t3Z0ida5F0FcjhO31USInhX2pfUK+5Tjo3x+0+z0PiwnyUGubCPSWezcxgNOfHnOdWiTjQYJZeDMHA23Cog/UZ1IQoXOy/l3xFsmR4u9dGh+1WuwG+jvH/AEzDV9MzvevJB7g3WPw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=E3iSLGPHqmeiKU0oUeQNqssLEt+HtM9f9hldHYWh/ZE=; b=HmS/CeHgsMMbd8zZAjwUZwClJeBYRIpwJ+4jCVIxQFLRpdFMYmUNhxPk8A9HAKxMkqYUCRIXOzAqxMisVQ3zSz9KjIzBVPtkjg0PuTFhuaI3Kl2r5OYJxUUrYTDAnA/zah6Dwc7Zlm9updCMUfBoz4c0KOdWhYcQWh5kHPlIHbRiGxfzTCeuYVEFWLUruaazg/xJ0tcCZsRhShESE8b3xQ1oQ7/mnP1UmXmR8s2r12Jy65xiWjdQdDg4zUblh9cCcDtXAqSi/yN3B8gK+8xNGCFYWdjXGDCSGeIBFpdwoZ9r1x4aeBXzlxRkq5cE2iL/x4aCTSrPDhoC+VzjpbG/qw== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Mykyta Poturai , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Jan Beulich , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Timothy Pearson , Alistair Francis , Connor Davis , Oleksii Kurochko , "Daniel P. Smith" Subject: [PATCH v7 4/6] arm/sysctl: Implement cpu hotplug ops Thread-Topic: [PATCH v7 4/6] arm/sysctl: Implement cpu hotplug ops Thread-Index: AQHcwDy3jsTaF4UzaEqMI3x4mLb6EQ== Date: Mon, 30 Mar 2026 11:59:51 +0000 Message-ID: <9ac96559ed00257f347bd61b1e074fc3f6ce8a32.1774871881.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|GV1PR03MB8639:EE_ x-ms-office365-filtering-correlation-id: 9b5cc244-782b-4fa6-1d85-08de8e53d9ca x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|7416014|376014|366016|1800799024|38070700021|22082099003|18002099003|56012099003; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(7416014)(376014)(366016)(1800799024)(38070700021)(22082099003)(18002099003)(56012099003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?s+GKFinJO2KzNzs7rr0ldjBrWLx2VNvqFkailmvAS90KHd19+3brLQFted?= =?iso-8859-1?Q?WlnlcbJVzj/G2rGUAtkvJdGwB/mVJaVNrkHYbEXABEhCpb365yCYVq6YQ8?= =?iso-8859-1?Q?AclKtAcuyh2vWIiAlQ7Me3MjNRSyScIWVDGkp5yZgDdQb+eyUnZj5rsdOI?= =?iso-8859-1?Q?/zUoted/Z8bikYS6iSA0xeOMkApwgkyJ2j7gYvk/09HTaUNgZKut5Polld?= =?iso-8859-1?Q?ExNOfBdpxROrFPJ62KTnxCOfC0dpbTlFBDuQGc4i4xw2o1UefnSoGQudZ3?= =?iso-8859-1?Q?WmeFV/92MUH2d/u8LOK7hhG9CYxUDHYCBCi5PqmiB23vfx3VbokqrD87iA?= =?iso-8859-1?Q?BlOQacbIz0r2VWH41smWVfGOKJV3tm41BMbRraGhSBjbJ4kooJ+wmjyNOe?= =?iso-8859-1?Q?EhWN5rsVdJ334YBoNnP3zJljpmjlhLqcMXe3PcYZWGf3B+mJIiZjB3qLkR?= =?iso-8859-1?Q?dPdiNGBNxq9Ij0abgbEVx2BhvVoxL9mfYkpUB8oPiF7if9VVcIE5qpYa6j?= =?iso-8859-1?Q?enRGQms3/8TpNYF9H6dt34VV5pmoPcg7LfEMjiHK2oxysTWQDWVA+zdC8Y?= =?iso-8859-1?Q?7lC6Dc8zQTPUFjULPis0jbSFUpPDNpvdxDFu0sPp+6yamXQsaIlz7ZdtH7?= =?iso-8859-1?Q?wnbX0GVcNkpVA2WpXL+4sTYpZePNcJWbBhpv/dkEWc9Dm6IPFmJsgG37pP?= =?iso-8859-1?Q?aYNnTjcC8o/i3tCNTLsmbkn3RdG406+JArDREeAiZRM9H9CaIUpGo82Cxe?= =?iso-8859-1?Q?x72XLGegrH9zofOEUsShArt4Wi31KRPQe40tdYlZvOHuIzysUG/t5CulPt?= =?iso-8859-1?Q?fwi/fkmQvJg4OZ3vDiM5CCBCpjr/mfCdgX7ulAzrc4xQxBt8yWA4UCgtTO?= =?iso-8859-1?Q?n/0CI/mFgvwjbbwblF5/lLYyzL3YX3oAQ9Z++Qtmj9czx9Ylh9kTLPr+FZ?= =?iso-8859-1?Q?op2NXSHrYx1TFxZBhfF6Op7ySqxOQADt5MfPCsrjRYvrKaB7te+Hf2KDdL?= =?iso-8859-1?Q?yRHIVoIbXL6IKAm6VZKlyclpypVo8B9AJZ0aCvkJfvxGmkWSVQJmlysuyv?= =?iso-8859-1?Q?8l5onsGZHuozb+MdO/qYW/kib2O77Msr8uv53JGelRVAjqD3SahwhdcGl9?= =?iso-8859-1?Q?XBg8PSaUvfuo8mg7UU+GSm2Jc5pwjFtrtI+X29xTkOM1xXVfnhFsinxM7m?= =?iso-8859-1?Q?ViPwOtcRbT2c4c0lqRqbS22sGENQWsymO3f37fm7ofXBVcH4rleYDylX0p?= =?iso-8859-1?Q?PDOlR2C5B09F6ADuelDy3OhgC0lF2RjtHI1AMK1itcJ3xfPX3/49It5ijj?= =?iso-8859-1?Q?U3xqcyUfyLPIjc99HezGWRAjtvIc5raoLX+iXxmBWrtx1nfwKxvy3s76bb?= =?iso-8859-1?Q?295QOZSBLuxGkZRRXf6TwjUdC3FWpzyj+EzWL+suIOUKXV9C1tiWa4sSCi?= =?iso-8859-1?Q?7Tfjhng/sKrUZLswP7chXfBLgDe4e/i2NveQRMrMRR+3isv26GxdmFzQjX?= =?iso-8859-1?Q?wuJSxgg5jYGrZcVA7X2zi/lJVD86MEmopJeEoIdN6ixeCBgjQhQDKkUXEP?= =?iso-8859-1?Q?s7N9LTi7a4330OIjWNnZ3nA6Smb/dvRoqYWwbTbLWh//WGWzU88Y6mF16P?= =?iso-8859-1?Q?NbpTmzJMapkcChZEdvYoqVrOg/kMsOV6dloFYgXa5jepeB0iFKhQac+iRE?= =?iso-8859-1?Q?Nf6p6J5Kraw486MbEJo1VJCx9j0+9ZjAJg1roqdPP7SKOD5ULEoxewfNkr?= =?iso-8859-1?Q?6wTL0inKRDliDbkkbJdWbcxWEZYPmIgAkltmsAN9+IckPB5eHOl4v8H7A9?= =?iso-8859-1?Q?/X+k3xeng4uhl5NmBF9FVS569el0UjM=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9b5cc244-782b-4fa6-1d85-08de8e53d9ca X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Mar 2026 11:59:51.6847 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: aqVUqB4LrCUeZfVqWuJjMdcPi2M9Kqbp20oQwQIizPoWYRAc7vcjWBl5SEnyHr6l9jKz+TIni9f00so3PyG4vA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR03MB8639 X-purgate-ID: tlsNG-33051d/1774871994-4885072C-57F18BA1/0/0 X-purgate-type: clean X-purgate-size: 10644 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1774872023225154100 Content-Type: text/plain; charset="utf-8" SMT-disable enforcement check is moved into a separate architecture-specific function. For now this operations only support Arm64. For proper Arm32 support, there needs to be a mechanism to free per-cpu page tables, allocated in init_domheap_mappings. Also, hotplug is not supported if ITS enabled, and partially supported FFA, or TEE is enabled, as they use non-static IRQ actions. Remove ifdef guards for x86 in flask, as cpu hotplug is now supported on more architectures. Signed-off-by: Mykyta Poturai --- v6->v7: * use IS_ENABLED istead of ifdef in more places * remove unneded variables * more explicit fallthrough in do_sysctl v5->v6: * fix style issues * rename arch_smt_cpu_disable -> arch_cpu_can_stay_online and invert the logic * use IS_ENABLED istead of ifdef * remove explicit list af arch-specific SYSCTL_CPU_HOTPLUG_* options from the common handler * fix flask issue v4->v5: * move handling to common code * rename config to CPU_HOTPUG * merge with "smp: Move cpu_up/down helpers to common code" v3->v4: * don't reimplement cpu_up/down helpers * add Kconfig option * fixup formatting v2->v3: * no changes v1->v2: * remove SMT ops * remove cpu =3D=3D 0 checks * add XSM hooks * only implement for 64bit Arm Signed-off-by: Mykyta Poturai --- xen/arch/arm/smp.c | 9 ++++++++ xen/arch/ppc/stubs.c | 4 ++++ xen/arch/riscv/stubs.c | 5 ++++ xen/arch/x86/include/asm/smp.h | 3 --- xen/arch/x86/smp.c | 36 +++-------------------------- xen/arch/x86/sysctl.c | 13 ++++------- xen/common/Kconfig | 6 ++--- xen/common/smp.c | 35 ++++++++++++++++++++++++++++ xen/common/sysctl.c | 42 ++++++++++++++++++++++++++++++++++ xen/include/xen/smp.h | 4 ++++ xen/xsm/flask/hooks.c | 2 -- 11 files changed, 109 insertions(+), 50 deletions(-) diff --git a/xen/arch/arm/smp.c b/xen/arch/arm/smp.c index b372472188..0ea64d2ee1 100644 --- a/xen/arch/arm/smp.c +++ b/xen/arch/arm/smp.c @@ -44,6 +44,15 @@ void smp_send_call_function_mask(const cpumask_t *mask) } } =20 +/* + * We currently don't support SMT on ARM so we don't need any special logi= c for + * CPU disabling + */ +inline bool arch_cpu_can_stay_online(unsigned int cpu) +{ + return true; +} + /* * Local variables: * mode: C diff --git a/xen/arch/ppc/stubs.c b/xen/arch/ppc/stubs.c index a333f06119..8f280ba080 100644 --- a/xen/arch/ppc/stubs.c +++ b/xen/arch/ppc/stubs.c @@ -101,6 +101,10 @@ void smp_send_call_function_mask(const cpumask_t *mask) BUG_ON("unimplemented"); } =20 +bool arch_cpu_can_stay_online(unsigned int cpu) +{ + BUG_ON("unimplemented"); +} /* irq.c */ =20 void irq_ack_none(struct irq_desc *desc) diff --git a/xen/arch/riscv/stubs.c b/xen/arch/riscv/stubs.c index daadff0138..7c3cda7bc5 100644 --- a/xen/arch/riscv/stubs.c +++ b/xen/arch/riscv/stubs.c @@ -70,6 +70,11 @@ void smp_send_call_function_mask(const cpumask_t *mask) BUG_ON("unimplemented"); } =20 +bool arch_cpu_can_stay_online(unsigned int cpu) +{ + BUG_ON("unimplemented"); +} + /* irq.c */ =20 void irq_ack_none(struct irq_desc *desc) diff --git a/xen/arch/x86/include/asm/smp.h b/xen/arch/x86/include/asm/smp.h index 3f16e62696..cb3e0fed19 100644 --- a/xen/arch/x86/include/asm/smp.h +++ b/xen/arch/x86/include/asm/smp.h @@ -50,9 +50,6 @@ int cpu_add(uint32_t apic_id, uint32_t acpi_id, uint32_t = pxm); =20 void __stop_this_cpu(void); =20 -long cf_check cpu_up_helper(void *data); -long cf_check cpu_down_helper(void *data); - long cf_check core_parking_helper(void *data); bool core_parking_remove(unsigned int cpu); uint32_t get_cur_idle_nums(void); diff --git a/xen/arch/x86/smp.c b/xen/arch/x86/smp.c index a49505fb57..b781e933f2 100644 --- a/xen/arch/x86/smp.c +++ b/xen/arch/x86/smp.c @@ -418,38 +418,8 @@ void cf_check call_function_interrupt(void) smp_call_function_interrupt(); } =20 -#ifdef CONFIG_CPU_HOTPLUG -long cf_check cpu_up_helper(void *data) +bool arch_cpu_can_stay_online(unsigned int cpu) { - unsigned int cpu =3D (unsigned long)data; - int ret =3D cpu_up(cpu); - - /* Have one more go on EBUSY. */ - if ( ret =3D=3D -EBUSY ) - ret =3D cpu_up(cpu); - - if ( !ret && !opt_smt && - cpu_data[cpu].compute_unit_id =3D=3D INVALID_CUID && - cpumask_weight(per_cpu(cpu_sibling_mask, cpu)) > 1 ) - { - ret =3D cpu_down_helper(data); - if ( ret ) - printk("Could not re-offline CPU%u (%d)\n", cpu, ret); - else - ret =3D -EPERM; - } - - return ret; -} - -long cf_check cpu_down_helper(void *data) -{ - int cpu =3D (unsigned long)data; - int ret =3D cpu_down(cpu); - - /* Have one more go on EBUSY. */ - if ( ret =3D=3D -EBUSY ) - ret =3D cpu_down(cpu); - return ret; + return opt_smt || cpu_data[cpu].compute_unit_id !=3D INVALID_CUID || + cpumask_weight(per_cpu(cpu_sibling_mask, cpu)) <=3D 1; } -#endif diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c index bdad44fef1..072726debc 100644 --- a/xen/arch/x86/sysctl.c +++ b/xen/arch/x86/sysctl.c @@ -120,7 +120,6 @@ long arch_do_sysctl( =20 case XEN_SYSCTL_cpu_hotplug: { - unsigned int cpu =3D sysctl->u.cpu_hotplug.cpu; unsigned int op =3D sysctl->u.cpu_hotplug.op; bool plug; long (*fn)(void *data); @@ -128,6 +127,7 @@ long arch_do_sysctl( =20 if ( !IS_ENABLED(CONFIG_CPU_HOTPLUG) ) { + ASSERT_UNREACHABLE(); ret =3D -EOPNOTSUPP; break; } @@ -135,15 +135,10 @@ long arch_do_sysctl( switch ( op ) { case XEN_SYSCTL_CPU_HOTPLUG_ONLINE: - plug =3D true; - fn =3D cpu_up_helper; - hcpu =3D _p(cpu); - break; - case XEN_SYSCTL_CPU_HOTPLUG_OFFLINE: - plug =3D false; - fn =3D cpu_down_helper; - hcpu =3D _p(cpu); + /* Handled by common code */ + ASSERT_UNREACHABLE(); + ret =3D -EOPNOTSUPP; break; =20 case XEN_SYSCTL_CPU_HOTPLUG_SMT_ENABLE: diff --git a/xen/common/Kconfig b/xen/common/Kconfig index 0e5b4738a8..9e26217404 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -638,9 +638,9 @@ config SYSTEM_SUSPEND If unsure, say N. =20 config CPU_HOTPLUG - bool "CPU online/offline support" - depends on X86 - default y + bool "CPU online/offline support" if EXPERT || X86 + depends on X86 || (ARM_64 && !HAS_ITS) + default y if X86 help Enable support for bringing CPUs online and offline at runtime. On X86 this is required for disabling SMT. diff --git a/xen/common/smp.c b/xen/common/smp.c index a011f541f1..e2bf82856e 100644 --- a/xen/common/smp.c +++ b/xen/common/smp.c @@ -16,6 +16,7 @@ * GNU General Public License for more details. */ =20 +#include #include #include #include @@ -104,6 +105,40 @@ void smp_call_function_interrupt(void) irq_exit(); } =20 +#ifdef CONFIG_CPU_HOTPLUG +long cf_check cpu_up_helper(void *data) +{ + unsigned int cpu =3D (unsigned long)data; + int ret =3D cpu_up(cpu); + + /* Have one more go on EBUSY. */ + if ( ret =3D=3D -EBUSY ) + ret =3D cpu_up(cpu); + + if ( !ret && !arch_cpu_can_stay_online(cpu) ) + { + ret =3D cpu_down_helper(data); + if ( ret ) + printk("Could not re-offline CPU%u (%d)\n", cpu, ret); + else + ret =3D -EPERM; + } + + return ret; +} + +long cf_check cpu_down_helper(void *data) +{ + unsigned int cpu =3D (unsigned long)data; + int ret =3D cpu_down(cpu); + + /* Have one more go on EBUSY. */ + if ( ret =3D=3D -EBUSY ) + ret =3D cpu_down(cpu); + return ret; +} +#endif /* CONFIG_CPU_HOTPLUG */ + /* * Local variables: * mode: C diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c index 5207664252..da95446039 100644 --- a/xen/common/sysctl.c +++ b/xen/common/sysctl.c @@ -483,6 +483,48 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_= sysctl) copyback =3D 1; break; =20 + case XEN_SYSCTL_cpu_hotplug: + { + unsigned int hp_op =3D op->u.cpu_hotplug.op; + bool plug; + long (*fn)(void *data); + void *hcpu =3D _p(op->u.cpu_hotplug.cpu); + + ret =3D -EOPNOTSUPP; + if ( !IS_ENABLED(CONFIG_CPU_HOTPLUG) ) + break; + + switch ( hp_op ) + { + case XEN_SYSCTL_CPU_HOTPLUG_ONLINE: + plug =3D true; + fn =3D cpu_up_helper; + break; + + case XEN_SYSCTL_CPU_HOTPLUG_OFFLINE: + plug =3D false; + fn =3D cpu_down_helper; + break; + + default: + fn =3D NULL; + break; + } + + if ( fn ) + { + ret =3D plug ? xsm_resource_plug_core(XSM_HOOK) + : xsm_resource_unplug_core(XSM_HOOK); + + if ( !ret ) + ret =3D continue_hypercall_on_cpu(0, fn, hcpu); + + break; + } + } + + /* Use the arch handler for cases not handled here */ + fallthrough; default: ret =3D arch_do_sysctl(op, u_sysctl); copyback =3D 0; diff --git a/xen/include/xen/smp.h b/xen/include/xen/smp.h index 2ca9ff1bfc..04530738c9 100644 --- a/xen/include/xen/smp.h +++ b/xen/include/xen/smp.h @@ -76,4 +76,8 @@ extern void *stack_base[NR_CPUS]; void initialize_cpu_data(unsigned int cpu); int setup_cpu_root_pgt(unsigned int cpu); =20 +bool arch_cpu_can_stay_online(unsigned int cpu); +long cf_check cpu_up_helper(void *data); +long cf_check cpu_down_helper(void *data); + #endif /* __XEN_SMP_H__ */ diff --git a/xen/xsm/flask/hooks.c b/xen/xsm/flask/hooks.c index b250b27065..01f9d50605 100644 --- a/xen/xsm/flask/hooks.c +++ b/xen/xsm/flask/hooks.c @@ -835,9 +835,7 @@ static int cf_check flask_sysctl(int cmd) case XEN_SYSCTL_getdomaininfolist: case XEN_SYSCTL_page_offline_op: case XEN_SYSCTL_scheduler_op: -#ifdef CONFIG_X86 case XEN_SYSCTL_cpu_hotplug: -#endif return 0; =20 case XEN_SYSCTL_tbuf_op: --=20 2.51.2 From nobody Wed Apr 1 23:48:07 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1774872023; cv=pass; d=zohomail.com; s=zohoarc; b=bPbV5SqXXxxKjyLuOu4RdGhLmtC8GUOHOfgkKT6Ose9eAJ68lGR3CrdNLfFq/uu0Dps3sztU448s318XdosvW3MZpovoE+1kr0yrCUZ2+oTtpcG7TZ6qUisgZNfJdG80dhi+FxnaVkRqDPKUUCiFO7ByeB4CsUjj0rWQQwbPfhU= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1774872023; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=UVva9UsjGtzKa4kTaxsRcqz3Xro518EwThLU9bHiHLQ=; b=niWPOm5wagso6c9eo9YtdE15f8NG5VgygoROSRdzXAKRCHMF3Ay3g+lzuJUuDYb4RaUUgI7q9x8ayq5NAlZHFlz03GezA9sbvzseOnFhP6gWU6JN3o1RJojwaF1FQIyBu21z91/d/sCN8b8gFawUAlxSM8CJMu3Nj+5i0Itx234= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1774872023200147.8904716420111; Mon, 30 Mar 2026 05:00:23 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1267452.1556959 (Exim 4.92) (envelope-from ) id 1w7BHh-0000pe-AF; Mon, 30 Mar 2026 11:59:57 +0000 Received: by outflank-mailman (output) from mailman id 1267452.1556959; Mon, 30 Mar 2026 11:59:57 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHh-0000oS-4E; Mon, 30 Mar 2026 11:59:57 +0000 Received: by outflank-mailman (input) for mailman id 1267452; Mon, 30 Mar 2026 11:59:55 +0000 Received: from mx.expurgate.net ([195.190.135.10]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHf-0000HC-Cl for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 11:59:55 +0000 Received: from mx.expurgate.net (helo=localhost) by mx.expurgate.net with esmtp id 1w7BHe-00CdRq-Oc for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 13:59:54 +0200 Received: from [10.42.69.3] (helo=localhost) by localhost with ESMTP (eXpurgate MTA 0.9.1) (envelope-from ) id 69ca65af-bab6-0a2a0a5309dd-0a2a4503af12-42 for ; Mon, 30 Mar 2026 13:59:54 +0200 Received: from [52.101.70.120] (helo=AS8PR04CU009.outbound.protection.outlook.com) by tlsNG-33051d.mxtls.expurgate.net with ESMTPS (eXpurgate 4.55.2) (envelope-from ) id 69ca65ba-1947-0a2a45030019-346546784220-4 for ; Mon, 30 Mar 2026 13:59:54 +0200 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by GV1PR03MB8639.eurprd03.prod.outlook.com (2603:10a6:150:95::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.28; Mon, 30 Mar 2026 11:59:52 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%5]) with mapi id 15.20.9745.027; Mon, 30 Mar 2026 11:59:52 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" Authentication-Results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=epam.com header.i="@epam.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:x-ms-exchange-senderadcheck" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=hIc499sFUw8lkh0bZ9WPSTPEF/tZbScmczs5jRBtBQXZYHpb7WPfRKFzqbDZ6JFmUsdT4sZshblvXnbsYza5WWt7XjlkUOAnElEAwGukPjwcYDjE4fdqMtWi4yaqCLkPHdF1cTOilVaeLebFUNM/WSMA/Y+T6vY/jygc8/Sj5uo+7P8Mvp6FZR6IDuDpMSjyBPTb9xpw0XW+u8Cxcw1B4XmOB6o7vLEjlwULV+uJFhN7DFOL5BxS4Vu9sRnuIFph4fjMM35kT0W1Xrj+cxplc3xeXCemheQPXMVn8iKs010r93Vi1BqmjrgfURrUEAer+tM35p17OzFk9xFp0PtqpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UVva9UsjGtzKa4kTaxsRcqz3Xro518EwThLU9bHiHLQ=; b=oaIwkaXabe6VckHHSaH6mrkZ2P6WFkYm2l8trGBDSaPOKEEVtOtoDKiJR/T/mdUvG9ELXvccr8fJHGs+pDesQd4QdSaq/0xYrUk6eRu/3ik4xyflHabrKF9X17ZVfcp8oIUzQF7Z9ZEvroprgzw2SWIo0NxFHpg981SYJ2Cp87QC0DJPrqSAACiI4JoLCRYJMda3yqclDe9inaWhGaVJ4OfEzI8VehtBkStJ6MbDYoPEkSKJdIVy0ioOXlKIEDJpt/R92A4AHLn7C1i2FTc6ltegXwFjk1+ei8pv3ZcHBYSFinc4lIbToydoZADOtHOzFJ4DNyD+Zs501/qxhh9TDg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UVva9UsjGtzKa4kTaxsRcqz3Xro518EwThLU9bHiHLQ=; b=VyiCBU3WxecZXxOV+u6HH58eb8bIXiu3ksJ5dhDx0qzUlr2TRdq6sjss2uo+MkKiHYfGbUmMmx/5aRyYC17aTLeZUqRCal7Yby7b3gmP+KXkjHiSpM2rVSbyJwSdYaGdY0vn2ZwklJlMTVK3olxFQ2qcy4zXzPP2YtPcWi0QLPGmy9zYMGrJU48ep5NTHZuwF/Lq/LLYN0hZP8i81RniNPFOd3iFU4wW72PNVGqcySNZb2MHNRdwZgw0bJB+C5nO1TCw9vJs2f9EtAdpaFJ5BYfdMImykK1XUdPUihV1Pgkga+icsHPWXtgMoqln/ufH+nMbUZJRG/TvvV561azzqw== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Mykyta Poturai , Anthony PERARD , Juergen Gross Subject: [PATCH v7 5/6] tools: Allow building xen-hptool without CONFIG_MIGRATE Thread-Topic: [PATCH v7 5/6] tools: Allow building xen-hptool without CONFIG_MIGRATE Thread-Index: AQHcwDy3LJnr4T20vUWAas874pXmiw== Date: Mon, 30 Mar 2026 11:59:52 +0000 Message-ID: <73db845e6617130966a565cdca6274db4cb46428.1774871881.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|GV1PR03MB8639:EE_ x-ms-office365-filtering-correlation-id: a55796dc-0cfa-40eb-83a6-08de8e53da0b x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700021|22082099003|18002099003|56012099003; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700021)(22082099003)(18002099003)(56012099003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?pkQu8vurc0ihZimgWYMKjGaHrjHwWPfG4ouLCLax5yHS2SdmMN/zFk8/7u?= =?iso-8859-1?Q?yQPMPPNNGgu8yEW34tKxEQ+sG1TmGZqz+WrDPdIUOhqkhQj2IRyQ6dImdN?= =?iso-8859-1?Q?PdyjHfqYEAFSRGcAgFemIKEQtMc111+7mVM9OYL47HNEpHXcKPlM6gdSzc?= =?iso-8859-1?Q?Mg09w+VVmVz/+DgeTiqjMztqe/MNnlSMiT6qtierHFfLb7gqd0bEqN6n6g?= =?iso-8859-1?Q?PQGQdvB9nLTg1rU+cZ1INe2qJXBt7/S3SOYz6/G7eubEoa8yGefep1/OPX?= =?iso-8859-1?Q?1U2Aom/hXQfQyK/cZP8FUdLrhwwOY0+Ok9DLte25aeOsfZ1/Kzrt/R/LH+?= =?iso-8859-1?Q?V7J/e8LcnVoZkRhvBUk1inaMqE76fOYTBZzMr6C5y2oEIXvjABHQHxqqMi?= =?iso-8859-1?Q?zOT+JufZdBtxZ6LrfxQ4EJculTQo+sx15gb95hm0btm18NIspYxBcLjcXS?= =?iso-8859-1?Q?65bap9uwuJVQ6vEXZW8dxDbwHKVOicy8E5O/A+GEx5HRXRqWUb6IOI4bJm?= =?iso-8859-1?Q?aPw6sdw/5EVl67PI3P5hXBqxsvzEaGN4apiYzqOJAZSMFgm4sVJmbkTAJu?= =?iso-8859-1?Q?+ML//r0c5G6YvDeHXIzkfKcDlCt4auSnaoYKhueQYo9brKtlBfib4uNjm6?= =?iso-8859-1?Q?cQMoxhJske+52VCLjyhUnpX+bJbXzmofL+relwWR715w8b+hgEdg6R/29t?= =?iso-8859-1?Q?LiDvpWdFR7ArDueMx5W/aSqfhtcK9LBK4w2CZu9BiYmK71eWJCdoyVMvkv?= =?iso-8859-1?Q?poE7MPKYJGin5fIVTPhmWnmekeWI2cv5Q6+1sSZtLQxAl0LJW64KBOqI5U?= =?iso-8859-1?Q?BIxK9+vF98utuu+z+D3FPMfKPbCsKJKCQQm1GdTea5+HGTCj6lfHLY9QzU?= =?iso-8859-1?Q?cVfpvtB63irfGhVUOGDWc48kr/xgDpB9EYSx6K2eCTV1IrtYtH9Gpds3DR?= =?iso-8859-1?Q?WpwY/R1EN+8y+9hKPDO4qzje7lz4pnDAFK2nlsCAWartSKZSx/HzOEE9bj?= =?iso-8859-1?Q?yONNljgcLy5EbBKL3h5bBOh6bNe6/bqen/fMmwmUoj0QLLzdfPQzo/sBdu?= =?iso-8859-1?Q?PUtQzSwp5+RJpb9YPP2AiuDcK3h7mHpCh9XIt+tIwGUulf+xdtM3Dmm4gC?= =?iso-8859-1?Q?Bort6sbHwNSA+8CW8C9a2BtqogvVHHArdmp6JKV0INN36uS46y60X3lmT6?= =?iso-8859-1?Q?t0FLUZ03w5v/KxwZwcwHJjErXrRKTmfhFfjYonYCrZRCub6zNTTnyXEr32?= =?iso-8859-1?Q?8by4kU1NVylBxMWy1SKtGU9P+sFJS/6M6p+jVn3ic8cSv2U60OSp3EUoEv?= =?iso-8859-1?Q?D7SJeskd3EcQAIlXrQ2tIgLrH9aPrRWWmetREm9Mefk4hDthhHOCJ4o3Yy?= =?iso-8859-1?Q?hMsv9RKyXE2xuLNOZciCVFu8v0BaWHbw93m3ansxOA0G/Xd9ba/n3R8EjE?= =?iso-8859-1?Q?3YxnSzsqTM8nmkBqcvcqJQcRUh6+6RqE3WygbCnquGJYd7cCHFepVOSmJi?= =?iso-8859-1?Q?4Kulvbvm0qLueZfEMFF36qsXMe61Qjf9gIOuX+Z3wMPJPThNaGtRLKv5T/?= =?iso-8859-1?Q?H2GuVq8ib1VIGuSA9mZ3iuod49kv45i41eRTlWhJ8zG9tgt5fun0LMIFRz?= =?iso-8859-1?Q?IE57cMDsO7lpBQvkceSChhpq5gRUUoU5UXKCVqoAazMQFmADA3LhjKul9W?= =?iso-8859-1?Q?dFtZS0yl2Ca7Fl1tyryr9KaZT4cGW+fmep9QVTpSFOJ0ysvn3PGLPQ3QHE?= =?iso-8859-1?Q?43wIInjjFf3tSEDE+2sEog0ejK392+jThApzCWAIEvgCbS6eRFCABe8XR3?= =?iso-8859-1?Q?lLTzEPyxyfWKx9AZe1W8ifY34xty618=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a55796dc-0cfa-40eb-83a6-08de8e53da0b X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Mar 2026 11:59:52.1375 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Ek5dL2mc6Wu9WnJ+VuYQVkSO0YEG4cqWg85oR1lNr/Tb+51h2r+RgBJDlMNc0pSI3jIdvWShUjf9m5nDplv4OA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR03MB8639 X-purgate-ID: tlsNG-33051d/1774871994-EAE8572C-4DE07EC7/0/0 X-purgate-type: clean X-purgate-size: 1989 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1774872024575158500 Content-Type: text/plain; charset="utf-8" With CPU hotplug sysctls implemented on Arm it becomes useful to have a tool for calling them. According to the commit history it seems that putting hptool under config MIGRATE was a measure to fix IA64 build. As IA64 is no longer supported it can now be brought back. So build it unconditionally. Signed-off-by: Mykyta Poturai --- v6->v7: * no changes v5->v6: * don't change order in Makefile v4->v5: * make hptool always build v3->v4: * no changes v2->v3: * no changes v1->v2: * switch to configure from legacy config --- tools/libs/guest/Makefile.common | 2 +- tools/misc/Makefile | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/libs/guest/Makefile.common b/tools/libs/guest/Makefile.c= ommon index b928a4a246..03dfcee7fa 100644 --- a/tools/libs/guest/Makefile.common +++ b/tools/libs/guest/Makefile.common @@ -7,6 +7,7 @@ OBJS-y +=3D xg_private.o OBJS-y +=3D xg_domain.o OBJS-y +=3D xg_suspend.o OBJS-y +=3D xg_resume.o +OBJS-y +=3D xg_offline_page.o ifeq ($(CONFIG_MIGRATE),y) OBJS-y +=3D xg_sr_common.o OBJS-$(CONFIG_X86) +=3D xg_sr_common_x86.o @@ -17,7 +18,6 @@ OBJS-$(CONFIG_X86) +=3D xg_sr_save_x86_pv.o OBJS-$(CONFIG_X86) +=3D xg_sr_save_x86_hvm.o OBJS-y +=3D xg_sr_restore.o OBJS-y +=3D xg_sr_save.o -OBJS-y +=3D xg_offline_page.o else OBJS-y +=3D xg_nomigrate.o endif diff --git a/tools/misc/Makefile b/tools/misc/Makefile index 6ee783f43e..5a206133f7 100644 --- a/tools/misc/Makefile +++ b/tools/misc/Makefile @@ -16,7 +16,7 @@ INSTALL_BIN +=3D xencov_split INSTALL_BIN +=3D $(INSTALL_BIN-y) =20 # Everything to be installed in regular sbin/ -INSTALL_SBIN-$(CONFIG_MIGRATE) +=3D xen-hptool +INSTALL_SBIN +=3D xen-hptool INSTALL_SBIN-$(CONFIG_X86) +=3D xen-hvmcrash INSTALL_SBIN-$(CONFIG_X86) +=3D xen-hvmctx INSTALL_SBIN-$(CONFIG_X86) +=3D xen-lowmemd --=20 2.51.2 From nobody Wed Apr 1 23:48:07 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1774872024; cv=pass; d=zohomail.com; s=zohoarc; b=HKWDslhdUeRwqZ9R5xl3M4dA7psNMXEJfYXSH5riTRmRAo3P7x/qIQgRLpQiydyUjXlI+KC8pzveJUjcrdyIxechvHVqBF3szdhFDlo9m2h2RsVH4OEZ+RP5VH6VfikU7YSZxHhG6H/JtYA41us+3LFiqnULjLx3MkS0ArxrIRQ= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1774872024; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=WTCqvktoss0PlPaY9Z2E3mkzRUXnUI9T8SLc0HonleM=; b=Lh1sOjBgtd5TFnQgnkiCpGgSovDXIf2Kc/zYDgTjPbkflBP075guDiqgIQz6iygzVOfmgPPBmigVq7GujS5F6w/kGsZKwF1/Ca3k5HkofM0KWzKENwhiD0QVkza4vNSeqORqv1qUPaUgO3QUg+EDY2wqHAfXn/3X9RN7QQt5SCs= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1774872024589269.21292018866757; Mon, 30 Mar 2026 05:00:24 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1267454.1556973 (Exim 4.92) (envelope-from ) id 1w7BHi-00015G-0c; Mon, 30 Mar 2026 11:59:58 +0000 Received: by outflank-mailman (output) from mailman id 1267454.1556973; Mon, 30 Mar 2026 11:59:57 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHh-00013v-RJ; Mon, 30 Mar 2026 11:59:57 +0000 Received: by outflank-mailman (input) for mailman id 1267454; Mon, 30 Mar 2026 11:59:56 +0000 Received: from mx.expurgate.net ([195.190.135.10]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w7BHg-0000WF-25 for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 11:59:56 +0000 Received: from mx.expurgate.net (helo=localhost) by mx.expurgate.net with esmtp id 1w7BHf-00CdRq-Db for xen-devel@lists.xenproject.org; Mon, 30 Mar 2026 13:59:55 +0200 Received: from [10.42.69.3] (helo=localhost) by localhost with ESMTP (eXpurgate MTA 0.9.1) (envelope-from ) id 69ca65af-bab6-0a2a0a5309dd-0a2a4503af12-48 for ; Mon, 30 Mar 2026 13:59:55 +0200 Received: from [52.101.70.120] (helo=AS8PR04CU009.outbound.protection.outlook.com) by tlsNG-33051d.mxtls.expurgate.net with ESMTPS (eXpurgate 4.55.2) (envelope-from ) id 69ca65ba-1947-0a2a45030019-346546784220-6 for ; Mon, 30 Mar 2026 13:59:55 +0200 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by GV1PR03MB8639.eurprd03.prod.outlook.com (2603:10a6:150:95::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.28; Mon, 30 Mar 2026 11:59:53 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%5]) with mapi id 15.20.9745.027; Mon, 30 Mar 2026 11:59:52 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" Authentication-Results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=epam.com header.i="@epam.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:x-ms-exchange-senderadcheck" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=IduI0HwK2pki22wBNIS+VQjP1Z5r5ldzHiSj11SSZHJG+kn7ZMGuVOEAIaEEoNmG9VpOsbJLkgC4rnBP5u04xekKflE4xhnwg86TZw2QhyKIEaIESWfaBhbk/5YFIJrd695bUpuN1vNDk95+2eSleJP3hozryMAoQO8OqgC0FfemiHcm09FErdA89Jb+xJM8MSLvGZAdZvXpVLDdZp83kbn2Z3zIA99yzMVo9+4C9tb/XMuBkIgFeZsOUfLTeiwazF+FYGXgCRoexSPem4iIR4E2ggF4uGmn4rE6onkUsEDooYOyUBOpsJqa6uMRCaKd58dnaX+1dTFsTAim1oDHtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=WTCqvktoss0PlPaY9Z2E3mkzRUXnUI9T8SLc0HonleM=; b=WwQ/xLjfRLzJk5wHFZjvJrt3WuiRIS7hxEk7n7JkcZo5onmA5NUc+Zf/W5xj6fuOxRMbHVRz0PYDD2X0gBOFskd8av9JSk/1Utch0H37taXBNKeTnhzfNWH0u1aoBGoLqE7/3Jl19KcbxPrfKkOwNDHz9Lv2ww1OSGTt+EOd/pGA8/5Tq0lio9eVK08wdV8wboNLHOR6ESHZfCcQvIRDHnUoWYHxZXX12SXJWE1uRR8vUghHpHVWN/ThdWoNqWZkmlo91rOwhZkQUXVQemo5BbAT3dSSvo7IHujSGytg86c9F6fzAkxi9LSxU6kSKD0NdBKLeLgWxpzfxqnMxgIeag== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WTCqvktoss0PlPaY9Z2E3mkzRUXnUI9T8SLc0HonleM=; b=EpJOszXCnW5wHcID3ovYaGEpmMmxySUKTw8HYs100OAddwOm0vVs93pGqG+3Qe0omFcPD+gJS/kko1jOpmNWWnyXxM4Gcva53BVc16Xr4wwJ3MU9MhyxqzrfDfHzmJ25/IzuLjhJuIT/OWavslNCYkEjBJn97Xkv49489sRWI0ZnQCwQDVYR6hgR0yvZsI7j9SGJG+hAdGXThNVBhe0xKcfYkO5lNghkC1i/03CSde4e35237b6xb743oc/NzCfaNtg4RcZfWqiY2OQFFhTTPvkTTKwt8eO9MCBTXq5dPUzAg9es27yX+RRi5Wwv2pqZ+VCST1XdvocXSzTJffgwxA== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Mykyta Poturai , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini Subject: [PATCH v7 6/6] docs: Document CPU hotplug Thread-Topic: [PATCH v7 6/6] docs: Document CPU hotplug Thread-Index: AQHcwDy33hgEL/FPskqSHUwGNRQgfg== Date: Mon, 30 Mar 2026 11:59:52 +0000 Message-ID: <97ad7b68c5e42fc396b155ef1d0a69a738b28881.1774871881.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|GV1PR03MB8639:EE_ x-ms-office365-filtering-correlation-id: 7d63fa7e-606f-4695-e969-08de8e53da48 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700021|22082099003|18002099003|56012099003; x-microsoft-antispam-message-info: kGA23be0nnST3cqucJHVH9+CsH8s3Kx2o/JTDj7//F3QmkDRIunkIeZPL5HbrexhOAat0hk5kxLfYX0u594ckUtIBIiZjMApQnNWYKrWQ+W89bkXBggOZDUTZfN6GAvb2WZ6qvf/vz04shQQDtX9naLsMdXQcN1dlKTR9Utbk3QX5PwRRI5/TLDuiR/Tsn/QHsYRMyuLGjuzKh6qDoR3OeMbsN3lH7vVaR+tx6GMgjj4AB28dVjC0h9r83pEh/5lGP/DevaKX2mWtokkpPGQwRibAAMGuRgQRiOMB2Iz0cCw8L5JmetJfSATbBm1VTLQonvjFmvKx+bgyEViJNh2YnqQkuKdYgefnjndEqZIeFxCgCZ4Sx1qdEJqkAWI6nYnGMLAe7zAebWEhz5QaxbRr1bAJgBQte/1V9x5aPKHEvbA/JEvk62eU2M0kbxjYzyQWkHIeh0MeDOWegqAowkptVqXrrYxemsTfjaMWHv2hZs2rnrjYoBQh6Nf0L8SBlBzj4Z+Ce3igbLHsXQPhfa9KSpkuhusXxhnOGirCzp0j9nHh9XPEKFCQbokqM2gRmLTlQbWxVWYubgueGtAgtKrj0lSKbfNQu+tde+7Pr1HbTIpJvNNZe9yy6g1O5VT60bWOM5ycvNjXA9CKj7Q3jUHLyyrOHavBQYjN05khKdMZDpsU3iFcDgmZ/IPyQcA4Xz7uC1xJj/vnJH6uQQbtU4on/fpPLHLt56fYqF+tbX1mXe2WSPkjJ4yq6tOYpZCLcDvF0db/mzkWELuxwrJsBsNpcaKhzFvbOLs2C5fQVhohpw= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700021)(22082099003)(18002099003)(56012099003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?puMQJfbNdBBnX3hfCITSYda1IQsahj4yh+wZS4fGJcg0Tza+bZdHQ9Q0ka?= =?iso-8859-1?Q?3HRgorx6XJBhR/A/CEhZC3Nvd4LIaW7RoysVHp5qXBalPG5Vn553PsI4a0?= =?iso-8859-1?Q?7tzNWNe60ZqNJc5XelpI483ULyl/SgVbYRdk4IFyY3vLq6sM0HSdkeo9uv?= =?iso-8859-1?Q?v2dq1JZCiL6vXcBLOXcqT1QWaUeXx7PKczOlbzBXMV7/C0MDoW5mQpSri/?= =?iso-8859-1?Q?f9hQ1XVBjSas1ahz/K8kuVoUJzHMkxtKZ731hK8Nc/nw+S8T5a0fr+NcW5?= =?iso-8859-1?Q?eygKlE+cm8U2gueAq9UiKRzpfLLNJ2at+Ll0BXg7ssR912P8OHwE37GyPh?= =?iso-8859-1?Q?AMiy2yI1CTDVwY+TnKaD5au5dFAZZhvYL7IQ+pMPUsxnsTYKSYnMJtUksR?= =?iso-8859-1?Q?Mkb4KLybcxNJ5Zban5slfIr6qqXopuGGsNUomhORpifom/MzP7AhohBtiy?= =?iso-8859-1?Q?Kd312nvrbsMRnQxvfQGtsXNUuYMSY5SFw7qo04FVwzU+ErmumWyvZZwJIZ?= =?iso-8859-1?Q?JrtW/0OonpAao5J2HWYbjuPE9sSflJTkhgxXIiENVsvUDVYZI3eIA/JnPB?= =?iso-8859-1?Q?jy2iKExtyYE7+g9imXvJrnsngDVYBQnw2NWL0ya8apwcFZrDjqntCCyS3e?= =?iso-8859-1?Q?nUgLJHJJpjIBT4/y7MJZ+bs9AUGppvj29zGXuBFCZ6fpL7JKXY9sgxVifT?= =?iso-8859-1?Q?osWgYuInrCi+a8GkVXNdkMXgrR04Ymp3sAgvOdoyl37kPujpsQvJnpb6C1?= =?iso-8859-1?Q?kZEMC9fxVEigDgyKX94aJ1k+NA30lXpir6XLnVCGNRUFlLurgJjcU4Itk9?= =?iso-8859-1?Q?1WHPwSHBwCZncis8Lloc3MF+ZCRWOZGlloW3Maq9XL0yNZITuD2nhD/eLC?= =?iso-8859-1?Q?gkPympF4/Ow4tXbr1ReUTffuMI1yDuNUgEkMK+XbgB6pnISOBuZa66krTM?= =?iso-8859-1?Q?dd1rhVoLjMFloS9I36Vyi7KiNsNadhhQz4AUD+L9lVOxjUgk8AJw2yrPlo?= =?iso-8859-1?Q?Ky+SMyPQ+At53HJ0VvoEdBThi/byYsYeQ4OM8ChpCkIAvPgZbYTYbxkUM9?= =?iso-8859-1?Q?8tb4AsV9t+x8wljjZVTMLClldSUncXF0n66ADVDcyOY06hXYZPsKN3ONLS?= =?iso-8859-1?Q?h5/QWTO+SWimFv+uLtWU13rZk2/RWAx3ILNt5TEoTSy/YHAYTC3BrxuiSO?= =?iso-8859-1?Q?mhhydemWXfq61o4yDpZ7g7jQ4CwIPz3icVRjzlgifiL4sDWCdFABg1HcuQ?= =?iso-8859-1?Q?IwJPsEepDsgCGX/VrX94KQEz+PZ9C7knyOEle1Hlr7cRVKWf9ZpDfBUcHl?= =?iso-8859-1?Q?fc654XEojVAGkXCm3o7VJZeLPQ0+OUz394uHhKETXv3vW1Yqnj5v8LaIdD?= =?iso-8859-1?Q?jE6oZuD5yp++I69YohyjSDYAHmeom2lbyHuPL18MypDpArbqtXI13qhzJ5?= =?iso-8859-1?Q?tr2s1j/3JS0P070fV+Ai331tDhBpfYDidy6F7omIDIk9gNxprkRs0jI2bz?= =?iso-8859-1?Q?T5pXSmLy/OAmMqMIkzIEmRzuKtWok7zoqR85wWmNxZyOG1ZEWQLQ1wXLfu?= =?iso-8859-1?Q?4vI3keqlpDyUSOOnEO1WU99kG+wCmZWM6AtjVZLVPw4JAQGQApukn2tpc/?= =?iso-8859-1?Q?r7S4B9wZvs+nDC90ghZTxyn2dA/7UMbLJi86cNDgLGiEdcnXiSiiWcM9SF?= =?iso-8859-1?Q?Y12rj8IN/s8ao6uCZtPzTLCZx0F2YduGqC6HTDxK04KHqEf3bQw7MV6xbb?= =?iso-8859-1?Q?UrEmvksDQ94gmRz1A6YJxcM3dxQaA4wuIZQM/lM+xBPcDXp0r1VjWwTZLV?= =?iso-8859-1?Q?A+sAirtv4YgHmo8jY3AV0yhF3izfwRQ=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7d63fa7e-606f-4695-e969-08de8e53da48 X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Mar 2026 11:59:52.5644 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: LaJ5pDIxn4vYEks2N7zU6DRGieQYx2Gm2DNdgbH8wwjEzRoxMuiwuVwB37YfRl7aeq1rkmDHlJ7gFhxpRgGhKw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR03MB8639 X-purgate-ID: tlsNG-33051d/1774871995-4866F72C-2CA92510/0/0 X-purgate-type: clean X-purgate-size: 4305 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1774872026698154100 Content-Type: text/plain; charset="utf-8" Signed-off-by: Mykyta Poturai --- v6->v7: * add testing and limitations v5->v6: * no changes v4->v5: * s/supported/implemented/ * update SUPPORT.md v3->v4: * update configuration section v2->v3: * patch introduced --- SUPPORT.md | 1 + docs/misc/cpu-hotplug.txt | 97 +++++++++++++++++++++++++++++++++++++++ 2 files changed, 98 insertions(+) create mode 100644 docs/misc/cpu-hotplug.txt diff --git a/SUPPORT.md b/SUPPORT.md index d441bccf37..7b93ae69e7 100644 --- a/SUPPORT.md +++ b/SUPPORT.md @@ -52,6 +52,7 @@ For the Cortex A77 r0p0 - r1p0, see Errata 1508412. ### ACPI CPU Hotplug =20 Status, x86: Experimental + Status, Arm64: Experimental =20 ### Physical Memory =20 diff --git a/docs/misc/cpu-hotplug.txt b/docs/misc/cpu-hotplug.txt new file mode 100644 index 0000000000..09a2855873 --- /dev/null +++ b/docs/misc/cpu-hotplug.txt @@ -0,0 +1,97 @@ +CPU Hotplug +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +CPU hotplug is a feature that allows pCPU cores to be added to or removed = from a +running system without requiring a reboot. It is implemented on x86 and Ar= m64 +architectures. + +Implementation Details +---------------------- + +CPU hotplug is implemented through the `XEN_SYSCTL_CPU_HOTPLUG_*` sysctl c= alls. +The specific calls are: + +- `XEN_SYSCTL_CPU_HOTPLUG_ONLINE`: Brings a pCPU online +- `XEN_SYSCTL_CPU_HOTPLUG_OFFLINE`: Takes a pCPU offline +- `XEN_SYSCTL_CPU_HOTPLUG_SMT_ENABLE`: Enables SMT threads (x86 only) +- `XEN_SYSCTL_CPU_HOTPLUG_SMT_DISABLE`: Disables SMT threads (x86 only) + +All cores can be disabled, assuming hardware support, except for the boot = core. +Sysctl calls are routed to the boot core before doing any actual up/down +operations on other cores. + +If there are Xen-bound interrupts pinned to the pCPU being offlined, they = will +be automatically migrated to other online pCPUs. Interrupts used by guest +domains are handled by the scheduler when it reschedules the vCPUs to a ne= w, +online, pCPU. When a pCPU is being onlined, some Xen-bound interrupts will= get +redistributed to the newly onlined pCPU to prevent imbalance. + +If pCPU being offlined has some vCPUs pinned to it, they will be automatic= ally +unpinned and migrated to other online pCPUs. + +Limitations +----------- + +On Arm64 cpu hotplug is currently not compatible with ITS, due to an issue= s with +the redistributor assignment. + +On Arm64 there can be problems with FFA if secure FW support notification = ABI. + +Configuration +------------- + +The presence of the feature is controlled by CONFIG_CPU_HOTPLUG option. It= is +enabled by default on x86 architecture. On Arm64, the option is disabled by +default and marked as EXPERT. +xen-hptool userspace tool is built unconditionally. + +Usage +----- + +Disable core: + +$ xen-hptool cpu-offline 2 +Prepare to offline CPU 2 +(XEN) Removing cpu 2 from runqueue 0 +CPU 2 offlined successfully + +Enable core: + +$ xen-hptool cpu-online 2 +Prepare to online CPU 2 +(XEN) Bringing up CPU2 +(XEN) GICv3: CPU2: Found redistributor in region 0 @00000a004005c000 +(XEN) CPU2: Guest atomics will try 1 times before pausing the domain +(XEN) CPU 2 booted. +(XEN) Adding cpu 2 to runqueue 0 +CPU 2 onlined successfully + +Disabling a core with pinned vCPUs: + +$ xl vcpu-pin 0 3 3 3 +$ xl vcpu-pin 0 2 3 3 +$ xl vcpu-pin 0 1 3 3 +$ xl vcpu-pin 0 0 3 3 +$ xen-hptool cpu-offline 3 +Prepare to offline CPU 3 +(XEN) Breaking affinity for d0v0 +(XEN) Breaking affinity for d0v1 +(XEN) Breaking affinity for d0v2 +(XEN) Breaking affinity for d0v3 +(XEN) Removing cpu 3 from runqueue 0 +CPU 3 offlined successfully + +Testing +------- + +The CPU hotplug feature has been tested on both x86 and Arm64 QEMU setups = and on +R-Car Gen5 (Arm64) hardware. + +The tests included: +- Offlining and onlining cores with no pinned vCPUs +- Offlining cores with pinned vCPUs +- Offlining cores with Xen-bound interrupts +- Offlining all cores except the boot core +- Offlining the boot core (expected to fail) +- Enabling and disabling SMT threads (x86 only) +- Ofllining cores to which guests with passthrough devices are pinned --=20 2.51.2