[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] x86/IRQ: prevent vector sharing within IO-APICs
# HG changeset patch # User Jan Beulich <jbeulich@xxxxxxxx> # Date 1321604484 -3600 # Node ID f29b5bd6e25fd78409baa5461914c67065f7579f # Parent 0d50e704834fb53c6c86b8b0badd19d88e73c4ed x86/IRQ: prevent vector sharing within IO-APICs Following the prevention of vector sharing for MSIs, this change enforces the same within IO-APICs: Pin based interrupts use the IO-APIC as their identifying device under the AMD IOMMU (and just like for MSIs, only the identifying device is used to remap interrupts here, with no regard to an interrupt's destination). Additionally, LAPIC initiated EOIs (for level triggered interrupts) too use only the vector for identifying which interrupts to end. While this generally causes no significant problem (at worst an interrupt would be re-raised without a new interrupt event actually having occurred), it still seems better to avoid the situation. For this second aspect, a distinction is being made between the traditional and the directed-EOI cases: In the former, vectors should not be shared throughout all IO-APICs in the system, while in the latter case only individual IO-APICs need to be contrained (or, if the firmware indicates so, sub- groups of them having the same GSI appear at multiple pins). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> --- diff -r 0d50e704834f -r f29b5bd6e25f xen/arch/x86/io_apic.c --- a/xen/arch/x86/io_apic.c Fri Nov 18 09:18:41 2011 +0100 +++ b/xen/arch/x86/io_apic.c Fri Nov 18 09:21:24 2011 +0100 @@ -69,6 +69,34 @@ #define ioapic_has_eoi_reg(apic) (mp_ioapics[(apic)].mpc_apicver >= 0x20) +static int apic_pin_2_gsi_irq(int apic, int pin); + +static vmask_t *__read_mostly vector_map[MAX_IO_APICS]; + +static void share_vector_maps(unsigned int src, unsigned int dst) +{ + unsigned int pin; + + if (vector_map[src] == vector_map[dst]) + return; + + bitmap_or(vector_map[src]->_bits, vector_map[src]->_bits, + vector_map[dst]->_bits, NR_VECTORS); + + for (pin = 0; pin < nr_ioapic_entries[dst]; ++pin) { + int irq = apic_pin_2_gsi_irq(dst, pin); + struct irq_desc *desc; + + if (irq < 0) + continue; + desc = irq_to_desc(irq); + if (desc->arch.used_vectors == vector_map[dst]) + desc->arch.used_vectors = vector_map[src]; + } + + vector_map[dst] = vector_map[src]; +} + /* * This is performance-critical, we want to do it O(1) * @@ -109,6 +137,7 @@ } entry->apic = apic; entry->pin = pin; + share_vector_maps(irq_2_pin[irq].apic, apic); } /* @@ -124,6 +153,7 @@ if (entry->apic == oldapic && entry->pin == oldpin) { entry->apic = newapic; entry->pin = newpin; + share_vector_maps(oldapic, newapic); } if (!entry->next) break; @@ -131,6 +161,16 @@ } } +vmask_t *io_apic_get_used_vector_map(unsigned int irq) +{ + struct irq_pin_list *entry = irq_2_pin + irq; + + if (entry->pin == -1) + return NULL; + + return vector_map[entry->apic]; +} + struct IO_APIC_route_entry **alloc_ioapic_entries(void) { int apic; @@ -1190,6 +1230,18 @@ for (i = irq_2_pin_free_entry = nr_irqs_gsi; i < PIN_MAP_SIZE; i++) irq_2_pin[i].next = i + 1; + if (directed_eoi_enabled) { + for (apic = 0; apic < nr_ioapics; apic++) { + vector_map[apic] = xzalloc(vmask_t); + BUG_ON(!vector_map[apic]); + } + } else { + vector_map[0] = xzalloc(vmask_t); + BUG_ON(!vector_map[0]); + for (apic = 1; apic < nr_ioapics; apic++) + vector_map[apic] = vector_map[0]; + } + for(apic = 0; apic < nr_ioapics; apic++) { int pin; /* See if any of the pins is in ExtINT mode */ @@ -2287,13 +2339,12 @@ } if ( desc->arch.vector <= 0 || desc->arch.vector > LAST_DYNAMIC_VECTOR ) { + add_pin_to_irq(irq, apic, pin); vector = assign_irq_vector(irq); if ( vector < 0 ) return vector; printk(XENLOG_INFO "allocated vector %02x for irq %d\n", vector, irq); - - add_pin_to_irq(irq, apic, pin); } spin_lock(&dom0->event_lock); ret = map_domain_pirq(dom0, pirq, irq, diff -r 0d50e704834f -r f29b5bd6e25f xen/arch/x86/irq.c --- a/xen/arch/x86/irq.c Fri Nov 18 09:18:41 2011 +0100 +++ b/xen/arch/x86/irq.c Fri Nov 18 09:21:24 2011 +0100 @@ -395,6 +395,11 @@ } } } + else if ( IO_APIC_IRQ(irq) && + opt_irq_vector_map != OPT_IRQ_VECTOR_MAP_NONE ) + { + ret = io_apic_get_used_vector_map(irq); + } return ret; } diff -r 0d50e704834f -r f29b5bd6e25f xen/include/asm-x86/irq.h --- a/xen/include/asm-x86/irq.h Fri Nov 18 09:18:41 2011 +0100 +++ b/xen/include/asm-x86/irq.h Fri Nov 18 09:21:24 2011 +0100 @@ -116,6 +116,7 @@ void setup_IO_APIC(void); void disable_IO_APIC(void); void setup_ioapic_dest(void); +vmask_t *io_apic_get_used_vector_map(unsigned int irq); extern unsigned int io_apic_irqs; _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |