[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v4] x86/io-apic: fix directed EOI when using AMD-Vi interrupt remapping
On Thu, Oct 31, 2024 at 09:57:13AM +0100, Roger Pau Monne wrote: > When using AMD-Vi interrupt remapping the vector field in the IO-APIC RTE is > repurposed to contain part of the offset into the remapping table. Previous > to > 2ca9fbd739b8 Xen had logic so that the offset into the interrupt remapping > table would match the vector. Such logic was mandatory for end of interrupt > to > work, since the vector field (even when not containing a vector) is used by > the > IO-APIC to find for which pin the EOI must be performed. > > A simple solution wold be to read the IO-APIC RTE each time an EOI is to be > performed, so the raw value of the vector field can be obtained. However > that's likely to perform poorly. Instead introduce a cache to store the > EOI handles when using interrupt remapping, so that the IO-APIC driver can > translate pins into EOI handles without having to read the IO-APIC RTE entry. > Note that to simplify the logic such cache is used unconditionally when > interrupt remapping is enabled, even if strictly it would only be required > for AMD-Vi. > > Reported-by: Willi Junga <xenproject@xxxxxx> > Suggested-by: David Woodhouse <dwmw@xxxxxxxxxxxx> > Fixes: 2ca9fbd739b8 ('AMD IOMMU: allocate IRTE entries instead of using a > static mapping') > Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Very lightly, but Tested-by: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx> with this patch, touchpad works on Framework AMD, _without_ ioapic_ack=new option. > --- > Changes since v3: > - Remove the usage of a sentinel value (again). > - Allocate an initialize the cache in enable_IO_APIC(). > - Fix MISRA compliance. > - Use xvmalloc. > > Changes since v2: > - Restore sentinel value. > > Changes since v1: > - s/apic_pin_eoi/io_apic_pin_eoi/. > - Expand comment about io_apic_pin_eoi usage and layout. > - Use uint8_t instead of unsigned int as array type. > - Do not use a sentinel value. > --- > xen/arch/x86/io_apic.c | 76 +++++++++++++++++++++++++++++++++++++++--- > 1 file changed, 71 insertions(+), 5 deletions(-) > > diff --git a/xen/arch/x86/io_apic.c b/xen/arch/x86/io_apic.c > index e40d2f7dbd75..4e5ee2b890a0 100644 > --- a/xen/arch/x86/io_apic.c > +++ b/xen/arch/x86/io_apic.c > @@ -29,6 +29,7 @@ > #include <xen/acpi.h> > #include <xen/keyhandler.h> > #include <xen/softirq.h> > +#include <xen/xvmalloc.h> > > #include <asm/hpet.h> > #include <asm/mc146818rtc.h> > @@ -71,6 +72,24 @@ static int apic_pin_2_gsi_irq(int apic, int pin); > > static vmask_t *__read_mostly vector_map[MAX_IO_APICS]; > > +/* > + * Store the EOI handle when using interrupt remapping. > + * > + * If using AMD-Vi interrupt remapping the IO-APIC redirection entry remapped > + * format repurposes the vector field to store the offset into the Interrupt > + * Remap table. This breaks directed EOI, as the CPU vector no longer > matches > + * the contents of the RTE vector field. Add a translation cache so that > + * directed EOI uses the value in the RTE vector field when interrupt > remapping > + * is enabled. > + * > + * Intel VT-d Xen code still stores the CPU vector in the RTE vector field > when > + * using the remapped format, but use the translation cache uniformly in > order > + * to avoid extra logic to differentiate between VT-d and AMD-Vi. > + * > + * The matrix is accessed as [#io-apic][#pin]. > + */ > +static uint8_t **io_apic_pin_eoi; > + > static void share_vector_maps(unsigned int src, unsigned int dst) > { > unsigned int pin; > @@ -273,6 +292,17 @@ void __ioapic_write_entry( > { > __io_apic_write(apic, 0x11 + 2 * pin, eu.w2); > __io_apic_write(apic, 0x10 + 2 * pin, eu.w1); > + /* > + * Might be called before io_apic_pin_eoi is allocated. Entry will > be > + * initialized to the RTE value once the cache is allocated. > + * > + * The vector field is only cached for raw RTE writes when using IR. > + * In that case the vector field might have been repurposed to store > + * something different than the CPU vector, and hence need to be > cached > + * for performing EOI. > + */ > + if ( io_apic_pin_eoi ) > + io_apic_pin_eoi[apic][pin] = e.vector; > } > else > iommu_update_ire_from_apic(apic, pin, e.raw); > @@ -288,18 +318,36 @@ static void ioapic_write_entry( > spin_unlock_irqrestore(&ioapic_lock, flags); > } > > -/* EOI an IO-APIC entry. Vector may be -1, indicating that it should be > +/* > + * EOI an IO-APIC entry. Vector may be -1, indicating that it should be > * worked out using the pin. This function expects that the ioapic_lock is > * being held, and interrupts are disabled (or there is a good reason not > * to), and that if both pin and vector are passed, that they refer to the > - * same redirection entry in the IO-APIC. */ > + * same redirection entry in the IO-APIC. > + * > + * If using Interrupt Remapping the vector is always ignored because the RTE > + * remapping format might have repurposed the vector field and a cached value > + * of the EOI handle to use is obtained based on the provided apic and pin > + * values. > + */ > static void __io_apic_eoi(unsigned int apic, unsigned int vector, unsigned > int pin) > { > /* Prefer the use of the EOI register if available */ > if ( ioapic_has_eoi_reg(apic) ) > { > - /* If vector is unknown, read it from the IO-APIC */ > - if ( vector == IRQ_VECTOR_UNASSIGNED ) > + if ( io_apic_pin_eoi ) > + /* > + * If the EOI handle is cached use it. When using AMD-Vi IR the > CPU > + * vector no longer matches the vector field in the RTE, because > + * the RTE remapping format repurposes the field. > + * > + * The value in the RTE vector field must always be used to > signal > + * which RTE to EOI, hence use the cached value which always > + * mirrors the contents of the raw RTE vector field. > + */ > + vector = io_apic_pin_eoi[apic][pin]; > + else if ( vector == IRQ_VECTOR_UNASSIGNED ) > + /* If vector is unknown, read it from the IO-APIC */ > vector = __ioapic_read_entry(apic, pin, true).vector; > > *(IO_APIC_BASE(apic)+16) = vector; > @@ -1317,12 +1365,30 @@ void __init enable_IO_APIC(void) > vector_map[apic] = vector_map[0]; > } > > + if ( iommu_intremap != iommu_intremap_off ) > + { > + io_apic_pin_eoi = xvmalloc_array(typeof(*io_apic_pin_eoi), > nr_ioapics); > + BUG_ON(!io_apic_pin_eoi); > + } > + > for(apic = 0; apic < nr_ioapics; apic++) { > int pin; > - /* See if any of the pins is in ExtINT mode */ > + > + if ( io_apic_pin_eoi ) > + { > + io_apic_pin_eoi[apic] = xvmalloc_array(typeof(**io_apic_pin_eoi), > + nr_ioapic_entries[apic]); > + BUG_ON(!io_apic_pin_eoi[apic]); > + } > + > + /* See if any of the pins is in ExtINT mode and cache EOI handle */ > for (pin = 0; pin < nr_ioapic_entries[apic]; pin++) { > struct IO_APIC_route_entry entry = ioapic_read_entry(apic, pin, > false); > > + if ( io_apic_pin_eoi ) > + io_apic_pin_eoi[apic][pin] = > + ioapic_read_entry(apic, pin, true).vector; > + > /* If the interrupt line is enabled and in ExtInt mode > * I have found the pin where the i8259 is connected. > */ > -- > 2.46.0 > > -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab Attachment:
signature.asc
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |