[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC PATCH 17/19] xen/arm: its: Support ITS interrupt handling
On Mon, 2 Mar 2015, vijay.kilari@xxxxxxxxx wrote: > From: Vijaya Kumar K <Vijaya.Kumar@xxxxxxxxxxxxxxxxxx> > > Add support for handling ITS(LPI) interrupts. > The LPI interrupts are handled by physical ITS > driver. > > nested LPI interrupt handling is not tested and > enabled. > > Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@xxxxxxxxxxxxxxxxxx> > --- > xen/arch/arm/gic-v3-its.c | 31 +++++++++++++++++++++++++++++++ > xen/arch/arm/gic-v3.c | 8 ++++++-- > xen/arch/arm/gic.c | 38 ++++++++++++++++++++++++++++++++++++-- > xen/arch/arm/irq.c | 10 +++++++--- > xen/arch/arm/vgic-v3-its.c | 10 ++++++++++ > xen/arch/arm/vgic.c | 14 ++++++++++---- > xen/include/asm-arm/gic.h | 3 +++ > xen/include/asm-arm/irq.h | 1 + > 8 files changed, 104 insertions(+), 11 deletions(-) > > diff --git a/xen/arch/arm/gic-v3-its.c b/xen/arch/arm/gic-v3-its.c > index b2c3320..7adbee4 100644 > --- a/xen/arch/arm/gic-v3-its.c > +++ b/xen/arch/arm/gic-v3-its.c > @@ -344,6 +344,37 @@ static const struct gic_its_hw_operations gic_its_ops = { > .gic_guest_lpi_type = &gic_guest_its_type, > }; > > +void its_handle_lpi(uint32_t irqnr, struct cpu_user_regs *regs) > +{ > + struct domain *d; > + struct irq_desc *desc = irq_to_desc(irqnr); > + > + irq_enter(); > + spin_lock(&desc->lock); > + > + if ( !desc->action ) > + { > + printk("UNKNOWN LPI without handler\n"); > + goto err; > + } > + > + if ( desc->status & IRQ_GUEST ) > + { > + d = irq_get_domain(desc); > + > + desc->handler->end(desc); > + > + desc->status |= IRQ_INPROGRESS; > + desc->arch.eoi_cpu = smp_processor_id(); > + > + /* XXX: inject irq into all guest vcpus */ > + vgic_vcpu_inject_irq(d->vcpu[0], irqnr); > + } Does it really need a separate handler? It seems to me that LPIs could just be handled from do_IRQ like the rest. Also the comment is wrong in this case. > +err: > + spin_unlock(&desc->lock); > + irq_exit(); > +} > + > static u64 its_cmd_ptr_to_offset(struct its_node *its, > struct its_cmd_block *ptr) > { > diff --git a/xen/arch/arm/gic-v3.c b/xen/arch/arm/gic-v3.c > index 02e71dd..b654535 100644 > --- a/xen/arch/arm/gic-v3.c > +++ b/xen/arch/arm/gic-v3.c > @@ -848,9 +848,13 @@ static void gicv3_update_lr(int lr, const struct > pending_irq *p, > > val = (((uint64_t)state & 0x3) << GICH_LR_STATE_SHIFT) | grp; > val |= ((uint64_t)p->priority & 0xff) << GICH_LR_PRIORITY_SHIFT; > - val |= ((uint64_t)p->irq & GICH_LR_VIRTUAL_MASK) << > GICH_LR_VIRTUAL_SHIFT; > > - if ( p->desc != NULL ) > + if ( is_lpi(p->irq) ) > + val |= ((uint64_t)p->desc->virq & GICH_LR_VIRTUAL_MASK) << > GICH_LR_VIRTUAL_SHIFT; > + else > + val |= ((uint64_t)p->irq & GICH_LR_VIRTUAL_MASK) << > GICH_LR_VIRTUAL_SHIFT; desc->virq should contain the right value for all interrupts, not just lpis, so you should be able to do: val |= ((uint64_t)p->desc-virq & GICH_LR_VIRTUAL_MASK) << GICH_LR_VIRTUAL_SHIFT; in all cases. > + if ( p->desc != NULL && !(is_lpi(p->irq)) ) > val |= GICH_LR_HW | (((uint64_t)p->desc->irq & GICH_LR_PHYSICAL_MASK) > << GICH_LR_PHYSICAL_SHIFT); > > diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c > index fb77387..c4d352a 100644 > --- a/xen/arch/arm/gic.c > +++ b/xen/arch/arm/gic.c > @@ -34,6 +34,7 @@ > #include <asm/io.h> > #include <asm/gic.h> > #include <asm/vgic.h> > +#include <asm/gic-its.h> > > static void gic_restore_pending_irqs(struct vcpu *v); > > @@ -134,6 +135,21 @@ void gic_route_irq_to_xen(struct irq_desc *desc, const > cpumask_t *cpu_mask, > gic_set_irq_properties(desc, cpu_mask, priority); > } > > +void gic_route_lpi_to_guest(struct domain *d, struct irq_desc *desc, > + const cpumask_t *cpu_mask, unsigned int priority) > +{ > + struct pending_irq *p; > + ASSERT(spin_is_locked(&desc->lock)); > + > + desc->handler = gic_its_hw_ops->gic_guest_lpi_type; > + set_bit(_IRQ_GUEST, &desc->status); > + > + > + /* TODO: do not assume delivery to vcpu0 */ > + p = irq_to_pending(d->vcpu[0], desc->irq); > + p->desc = desc; > +} > + > /* Program the GIC to route an interrupt to a guest > * - desc.lock must be held > */ > @@ -341,20 +357,33 @@ static void gic_update_one_lr(struct vcpu *v, int i) > struct pending_irq *p; > int irq; > struct gic_lr lr_val; > + uint32_t pirq; > > ASSERT(spin_is_locked(&v->arch.vgic.lock)); > ASSERT(!local_irq_is_enabled()); > > gic_hw_ops->read_lr(i, &lr_val); > irq = lr_val.virq; > - p = irq_to_pending(v, irq); > + > + if ( is_lpi(irq) ) > + { > + // Fetch corresponding plpi for vlpi > + if ( vgic_its_get_pid(v, irq, &pirq) ) > + BUG(); > + p = irq_to_pending(v, pirq); > + irq = pirq; > + } > + else > + { > + p = irq_to_pending(v, irq); Shouldn't p->desc->irq return the pirq for LPIs too? If it doesn't, it should :-) I would like to see a more generic handling of virq != physical irq. This is not specific to LPIs but to any scenario where the physical irq differs from the virtual irq. > + } > if ( lr_val.state & GICH_LR_ACTIVE ) > { > set_bit(GIC_IRQ_GUEST_ACTIVE, &p->status); > if ( test_bit(GIC_IRQ_GUEST_ENABLED, &p->status) && > test_and_clear_bit(GIC_IRQ_GUEST_QUEUED, &p->status) ) > { > - if ( p->desc == NULL ) > + if ( p->desc == NULL || is_lpi(irq) ) I thought that LPIs cannot be ACTIVE. If so, it is probably a mistake to set an LPI GICH_LR_ACTIVE in the LR register. > { > lr_val.state |= GICH_LR_PENDING; > gic_hw_ops->write_lr(i, &lr_val); > @@ -580,6 +609,11 @@ void gic_interrupt(struct cpu_user_regs *regs, int > is_fiq) > do { > /* Reading IRQ will ACK it */ > irq = gic_hw_ops->read_irq(); > + if ( is_lpi(irq) ) { > + // TODO: Enable irqs? > + its_handle_lpi(irq, regs); > + continue; > + } > > if ( likely(irq >= 16 && irq < 1021) ) > { > diff --git a/xen/arch/arm/irq.c b/xen/arch/arm/irq.c > index 13583b4..52371be 100644 > --- a/xen/arch/arm/irq.c > +++ b/xen/arch/arm/irq.c > @@ -276,7 +276,7 @@ void __cpuinit init_secondary_IRQ(void) > BUG_ON(init_local_irq_data() < 0); > } > > -static inline struct domain *irq_get_domain(struct irq_desc *desc) > +struct domain *irq_get_domain(struct irq_desc *desc) > { > ASSERT(spin_is_locked(&desc->lock)); > > @@ -603,9 +603,13 @@ int route_irq_to_guest(struct domain *d, unsigned int > irq, > retval = __setup_irq(desc, 0, action); > if ( retval ) > goto out; > + if ( irq >= NR_LOCAL_IRQS && irq < NR_IRQS) > + gic_route_irq_to_guest(d, desc, cpumask_of(smp_processor_id()), > + GIC_PRI_IRQ); > + else > + gic_route_lpi_to_guest(d, desc, cpumask_of(smp_processor_id()), > + GIC_PRI_IRQ); > > - gic_route_irq_to_guest(d, desc, cpumask_of(smp_processor_id()), > - GIC_PRI_IRQ); > spin_unlock_irqrestore(&desc->lock, flags); > return 0; > > diff --git a/xen/arch/arm/vgic-v3-its.c b/xen/arch/arm/vgic-v3-its.c > index e7e587e..51b9614 100644 > --- a/xen/arch/arm/vgic-v3-its.c > +++ b/xen/arch/arm/vgic-v3-its.c > @@ -1022,6 +1022,16 @@ int vgic_its_get_pid(struct vcpu *v, uint32_t vid, > uint32_t *pid) > return 1; > } > > +uint8_t vgic_its_get_priority(struct vcpu *v, uint32_t pid) > +{ > + uint8_t priority; > + > + priority = readb_relaxed(v->domain->arch.vits->lpi_prop_page + pid); > + priority &= 0xfc; > + > + return priority; > +} So it looks like we do handle priorities for LPIs, good! This doesn't look like ITS specific, so we should move it vgic-v3.c > static int vgic_v3_gits_lpi_mmio_read(struct vcpu *v, mmio_info_t *info) > { > uint32_t offset; > diff --git a/xen/arch/arm/vgic.c b/xen/arch/arm/vgic.c > index 3bf9ef3..5571856 100644 > --- a/xen/arch/arm/vgic.c > +++ b/xen/arch/arm/vgic.c > @@ -389,14 +389,20 @@ void vgic_clear_pending_irqs(struct vcpu *v) > void vgic_vcpu_inject_irq(struct vcpu *v, unsigned int irq) > { > uint8_t priority; > - struct vgic_irq_rank *rank = vgic_rank_irq(v, irq); > + struct vgic_irq_rank *rank; > struct pending_irq *iter, *n = irq_to_pending(v, irq); > unsigned long flags; > bool_t running; > > - vgic_lock_rank(v, rank, flags); > - priority = v->domain->arch.vgic.handler->get_irq_priority(v, irq); > - vgic_unlock_rank(v, rank, flags); > + if ( irq < NR_GIC_LPI ) > + { > + rank = vgic_rank_irq(v, irq); > + vgic_lock_rank(v, rank, flags); > + priority = v->domain->arch.vgic.handler->get_irq_priority(v, irq); > + vgic_unlock_rank(v, rank, flags); > + } > + else > + priority = vgic_its_get_priority(v, irq); I think that the handler should be set correctly for LPIs so that priority = v->domain->arch.vgic.handler->get_irq_priority(v, irq); works for them too without changes. > spin_lock_irqsave(&v->arch.vgic.lock, flags); > > diff --git a/xen/include/asm-arm/gic.h b/xen/include/asm-arm/gic.h > index 6f2237f..075f488 100644 > --- a/xen/include/asm-arm/gic.h > +++ b/xen/include/asm-arm/gic.h > @@ -220,6 +220,7 @@ enum gic_version { > > extern enum gic_version gic_hw_version(void); > extern void gic_eoi_irq(struct irq_desc *desc); > +extern void its_handle_lpi(uint32_t irqnr, struct cpu_user_regs *regs); > /* Program the GIC to route an interrupt */ > extern void gic_route_irq_to_xen(struct irq_desc *desc, const cpumask_t > *cpu_mask, > unsigned int priority); > @@ -356,6 +357,8 @@ void register_gic_ops(const struct gic_hw_operations > *ops); > void register_gic_its_ops(const struct gic_its_hw_operations *ops); > int gic_make_node(const struct domain *d,const struct dt_device_node *node, > void *fdt); > +void gic_route_lpi_to_guest(struct domain *d, struct irq_desc *desc, > + const cpumask_t *cpu_mask, unsigned int > priority); > > #endif /* __ASSEMBLY__ */ > #endif > diff --git a/xen/include/asm-arm/irq.h b/xen/include/asm-arm/irq.h > index 1159a6d..19246f9 100644 > --- a/xen/include/asm-arm/irq.h > +++ b/xen/include/asm-arm/irq.h > @@ -51,6 +51,7 @@ int irq_set_spi_type(unsigned int spi, unsigned int type); > int irq_set_desc_data(unsigned int irq, void *d); > void *irq_get_desc_data(struct irq_desc *d); > int platform_get_irq(const struct dt_device_node *device, int index); > +struct domain *irq_get_domain(struct irq_desc *desc); > > void irq_set_affinity(struct irq_desc *desc, const cpumask_t *cpu_mask); > > -- > 1.7.9.5 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |