[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 0/6] MSI-INTx interrupt translation for HVM



On Tue, 2009-01-13 at 17:05 +0800, Shohei Fujiwara wrote:
> What I understand are the followings.
> 
>     - When guest gsi isn't shared, MSI-INTx interrupt translation works fine.
>     - When guest gsi is shared between passthrough device and emulated
>       device, MSI-INTx interrupt translation work, though guest OS
>       receives spurious interrupts.
>     - Sharing guest gsi among passthrough devices isn't supported.

Yes.

>     - There are some unsuitable devices for MSI-INTx interrupt translation.

I still don't know an example of such unsuitable devices. And to be
exact, it should be device/guest OS driver combination. The improper
function may be caused by the guest driver (e.g. not cleaning irq source
before issuing EOI)

> 
> 
> May I ask you any additional questions?
> 
> First, why can't we assign more than 8 devices?
> In the view of guest OS, assigned device is always single function
> device. This means assigned devices use only INTA. And Interrupt
> routing in hypervisor is shown as follows.

Well, I just checked the code, seems I'm using the stale knowledge.
The assigned devices didn't fix to INTA a few months ago, at that time,
it was 8, since (0:3.1) collided with (0:11.0).

It's now 32, and the situation is definitely much better.

> 
> From xen/include/asm-x86/hvm/irq.c:
>     #define hvm_pci_intx_gsi(dev, intx)  \
>         (((((dev)<<2) + ((dev)>>3) + (intx)) & 31) + 16)
> 
> I think sharing guest gsi among passthrough devices doesn't
> occur if assigned device is <= 32.
> 
> 
> Second, it is nice to create blacklist of unsuitable devices for MSI-INTx
> interrupt, isn't it? The reason is the problem seems device-specific problem.

This is reasonable, however, I don't know a real unsuitable at this
time. Isn't it better to add the blacklist when there is the real need?

What do you think?

Thanks,
Qing

> 
> Thanks,
> --
> Shohei Fujiwara
> 
> 

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.