[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2] xen/pci: Refactor PCI MSI interrupts related code
Hi All, > On 15 Apr 2021, at 2:31 pm, Julien Grall <julien@xxxxxxx> wrote: > > Hi Roger, > > On 15/04/2021 14:26, Roger Pau Monné wrote: >> On Wed, Apr 14, 2021 at 09:49:37AM +0100, Julien Grall wrote: >>> Hi Roger, >>> >>> On 14/04/2021 09:05, Roger Pau Monné wrote: >>>> On Tue, Apr 13, 2021 at 06:12:10PM +0100, Julien Grall wrote: >>>>> Hi Roger, >>>>> >>>>> On 12/04/2021 11:49, Roger Pau Monné wrote: >>>>>> On Fri, Apr 09, 2021 at 05:00:41PM +0100, Rahul Singh wrote: >>>>>>> diff --git a/xen/drivers/passthrough/pci.c >>>>>>> b/xen/drivers/passthrough/pci.c >>>>>>> index 705137f8be..1b473502a1 100644 >>>>>>> --- a/xen/drivers/passthrough/pci.c >>>>>>> +++ b/xen/drivers/passthrough/pci.c >>>>>>> @@ -1303,12 +1279,15 @@ static int __init setup_dump_pcidevs(void) >>>>>>> } >>>>>>> __initcall(setup_dump_pcidevs); >>>>>>> + >>>>>>> +#ifdef CONFIG_PCI_MSI_INTERCEPT >>>>>>> int iommu_update_ire_from_msi( >>>>>>> struct msi_desc *msi_desc, struct msi_msg *msg) >>>>>>> { >>>>>>> return iommu_intremap >>>>>>> ? iommu_call(&iommu_ops, update_ire_from_msi, msi_desc, >>>>>>> msg) : 0; >>>>>>> } >>>>>>> +#endif >>>>>> >>>>>> This is not exactly related to MSI intercepts, the IOMMU interrupt >>>>>> remapping table will also be used for interrupt entries for devices >>>>>> being used by Xen directly, where no intercept is required. >>>>> >>>>> On Arm, this is not tie to the IOMMU. Instead, this handled is a separate >>>>> MSI controller (such as the ITS). >>>>> >>>>>> >>>>>> And then you also want to gate the hook from iommu_ops itself with >>>>>> CONFIG_PCI_MSI_INTERCEPT, if we want to got this route. >>>>> >>>>> >>>>> All the callers are in the x86 code. So how about moving the function in >>>>> an >>>>> x86 specific file? >>>> >>>> Yes, that seems fine. Just place it in asm-x86/iommu.h. I wonder why >>>> update_ire_from_msi wasn't moved when the rest of the x86 specific >>>> functions where moved there. >>> >>> I am guessing it is because the function was protected by CONFIG_HAS_PCI >>> rather than CONFIG_X86. So it was deferred until another arch enables >>> CONFIG_HAS_PCI (it is easier to know what code should be moved). >>> >>>> Was there an aim to use that in other >>>> arches? >>> >>> In the future we may need to use MSIs in Xen (IIRC some SMMUs only support >>> MSI interrupt). >> Then I think some of the bits that are moved from >> xen/drivers/passthrough/pci.c (alloc_pci_msi, free_pci_msi and >> dump_pci_msi) need to be protected by a Kconfig option different than >> CONFIG_PCI_MSI_INTERCEPT, as those are not related to MSI interception, >> but to MSI handling in general (ie: Xen devices using MSI need >> those). > > Well... x86-specific devices yes. We don't know in what form MSI will be > added on for other arch-specific devices. > > The same with the msi_list and msix fields of pci_dev, those >> are not only used for MSI interception. >> Or at least might be worth mentioning that the functions will be >> needed for Xen to be able to use MSI interrupts itself, even if not >> for interception purposes. > > My preference would be to comment in the commit message (although, there is > no promise they will ever get re-used). We can then modify the #ifdef once we > introduce any use. > Thanks you everyone for reviewing the code. I will summarise what I have understood from all the comments and what I will be doing for the next version of the patch. Please let me know your view on this. 1. Create a separate non-arch specific file "msi-intercept.c" for the below newly introduced function and compile that file if CONFIG_PCI_MSI_INTERCEPT is enabled.CONFIG_PCI_MSI_INTERCEPT will be enabled for x86 by default. Also Mention in the commit message that these function will be needed for Xen to support MSI interrupt within XEN. pdev_msi_initi(..) pdev_msi_deiniti(..) pdev_dump_msi(..), pdev_msix_assign(..) 2. Create separate patch for iommu_update_ire_from_msi() related code. There are two suggestion please help me which one to choose. - Move the iommu_update_ire_from_msi() function to asm-x86/iommu.h and also move the hook from iommu_ops under CONFIG_X86. - Implement a more generic function "arch_register_msi()"). This could call iommu_update_ire_from_msi() on x86 and the ITS related code once implemented on Arm. Introduce the new Kconfig CONFIG_HAS_IOMMU_INTERRUPT_REMAP for this option. 3. As per the discussion I will gate the struct vpci_msi {..} and struct vpci_msix{..} using CONFIG_PCI_MSI_INTERCEPT so that they will not will be accessible on ARM. Regards, Rahul > Cheers, > > -- > Julien Grall
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |