[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH 0/3] x86/hvm: PIRQ related cleanup and a fix


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Date: Thu, 3 Mar 2022 11:30:54 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mGede6jiblrepqQgzTK2pMH5xd5so27Xbwf7i1RSg7o=; b=F0gblp88+cqX1EQDib10Od3Egmn1Q9YluJT8+b+4MqyBSc+4Gv8yLvKZuEWeaUnaMoi01j+kPHjRw4MSKGr5noOZkzpTFl9bQjF9u3DcaqJGmEQJZApECR2sgU6NceFwk78ewcSvRi3uCQlsmrdJVs4hoiAkzoi29cq0DJ/fDWEqKvGlGrfSSnPDV7hUTRRC6NPTcc8eV7tJRnXxuQ017eErXU3PLeZRmp8cbPZQsHtNIycwofTyVUqvmTetWoJEU6rFe7PNt77G7NcSzLKUzotCSpQ9Z4zgTP1bFaqTwaCioiZ871ISio7Nl+e4xD5Mk/wHUG1nfykPcy1oeJYrpQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PI0VD1KwhMfC/8lT5nXQRvW0q9T9sQ8wuPPooLclMBLiwwGHRKjuorhTPw2o92kcXiT9XAQap6ouO29NFxdGMsAN9VOl7wOZy5D+UZzc2hT20cdK9hDsaMMfaPsQ0ken+NJWnwadJRyuRPHoy/N1SstijEqzYMyaoen3VVQ0ppldfTVNI8M4rLlem4DXlmi//Nbgi+Nx1Or28oy7Byql9/dUH55ketUkbF61asw0kHQ2r2j+PFE+Ve9IeEnzxqQFZTjZqVz36vtzQ3GCm28/jMhL8Njw9XEQnw8GJf+DtrlVlVhZK0T4pWYy3KrR0iGe01ZNo7QBX7MDmm3oJgQylQ==
  • Authentication-results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Roger Pau Monne <roger.pau@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Thu, 03 Mar 2022 10:31:19 +0000
  • Ironport-data: A9a23:FssWb6tfSfitXYAfObh+uUxt0efnVGheMUV32f8akzHdYApBsoF/q tZmKTyBPK7bMGT9ctEjbYqxpk5S6p/VmtFhHlZr+3xjRi8V+JbJXdiXEBz9bniYRiHhoOOLz Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV4 ouryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo Oihu6BcRi8uJIDyyOJAQiJdPAxVB4NA6aCdAn+w5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO pFGNGQ0NXwsZTVgMEYzVIARs9yYoWnadGYI826L/u0etj27IAtZj+G2bYu9lsaxbd5Ogk+Sq 2bC/mL4KhIXLtqSzXyC6H3ErvDLtTP2XsQVDrLQ3vx3hFyewEQDBRtQUkG0ydGph0j7V99BJ kg8/is1sbN05EGtVsP6XRCzvDiDpBF0c9haHvA+6QqN4rHJ+AvfDW8BJgOtc/R/6pVwH2Zzk AbUwZW5XlSDrYF5V1qa7Jqq/TXvKBMQAkIpXwECXBRfwN7s9dRbYg30cv5vF6u8j9vQED72w iyXoCVWu4j/nfLnxI3gowmZ3mvESozhC1dsu16JBj7NAhZROdb9D7FE/2Q3+hqpwGyxalCa9 EYJlMGFhAzlJcHczXfdKAnh8VzA2hpkDNE+qQM3d3XC3270k5JGQWy2yGskTKuOGpxZEQIFm GeJ5WtsCGZ7ZRNGl5NfbYOrENgNxqP9D9njXf28RoMQPsYrKFHbrXoxOBf4M4XRfK4Ey/tX1 XCzK5vEMJrnIf4/kGreqxk1i9fHORzSNUuMHMumnnxLIJKVZWKPSKdtDbd9RrtR0U9wmy2Mq 4w3H5LTk313CbSiCgGKod97BQ1bdhATWMGpw/G7g8bee2KK7kl6UKSPqV7gEqQ495loehDgp SnsChcFkwOk3RUq62yiMxheVV8mZr4mxVoTNi0wJ1e4nX8lZIek9qAEcJUrO7Ig8YReITRcF pHpp+3o7ixzdwn6
  • Ironport-hdrordr: A9a23:NfgrAK7QoW4d3fdejAPXwT6BI+orL9Y04lQ7vn2ZFiY7TiXIra yTdaoguCMc6AxxZJkh8erwXJVoJkmsj6KdgLNhRotKOTOJhILGFvAF0WKP+UyDJ8SczJ8j6U 4DSdkGNDSYNzET5qybkWqF+r4bsaW6GcuT9IDjJhlWPGRXg/YK1XYFNu/XKDwBeCB2Qb4CUL aM7MtOoDStPVwRc8SAH3EAG8zOvcfCmp7KaQMPQ0dP0njHsRqYrJrBVzSI1BYXVD1ChZ8k7G j+igT8ooGuqeuyxBPw33Laq75WhNzi4N1eA9HksLldFhzcziKTIKhxUbyLuz445Mmp9VYRid HJ5ywtOsxigkmhC12dkF/I4U3NwTwu43jtxRuzmn34u/H0Qzo8Fo5omZ9ZWgGx0TtsgPhMlI Zwm06JvZteCh3N2A7n4cLTah1snk2o5VI/jO8oiWBFW4d2Us4akWUmxjIbLH48JlO11Gh+e9 MeTf00pcwmOm9yVkqp8lWGm7eXLzQO9hTveDlxhiXa6UkUoJlD9Tpo+CUupAZ/yHsDceg12w 29CNURqFhvdL5jUUsvPpZ3fSOIYla9Mi4kdljiY2jaKA==
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hello,

First two patches are cleanup related to the usage of PIRQs from HVM
guests, and shouldn't result in any functional change.

Patch 3 allows the usage of PHYSDEVOP_{un,}map_pirq for HVM control
domains even when lacking support to route PIRQs over event channels.
This is done in order to allow setup of device interrupts assigned to
different guests for passthrough support. Note that using passthrough
from a PVH dom0 with vPCI in a safe way will at least require proper
locking around PCI devices, and likely other fixes.

Roger Pau Monne (3):
  evtchn/hvm: do not allow binding PIRQs unless supported
  hvm/irq: tighten check in hvm_domain_use_pirq
  hvm/pirq: allow control domains usage of PHYSDEVOP_{un,}map_pirq

 xen/arch/x86/hvm/hypercall.c | 7 +++++++
 xen/arch/x86/hvm/irq.c       | 2 +-
 xen/common/event_channel.c   | 2 +-
 3 files changed, 9 insertions(+), 2 deletions(-)

-- 
2.34.1




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.