[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 04/10] xen/arm/irq: add handling for IRQs in the eSPI range


  • To: Julien Grall <julien@xxxxxxx>
  • From: Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Date: Thu, 21 Aug 2025 17:38:52 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=r291w6cZSx3+Y2+OZFA+Fj/rb2a2dooD1U0z0Tajzqw=; b=egEevF+Z8qhOYhMr9iIdaUVOL46b9aFc6iEk+v7iWAEz8c75hxZJu0ocx2nJrOVtRH1lgtiI3+RegkZmAEL2uVvbouOZRp+y6BYLiMpuRMbvDWMktmUX2H0DvbFcEtaYcQ2b/L5lZscK/3aLpE5iGCogMZrmW/QxRBrf7i2ECWc8SsSdasP8VqSk5BYbW/e2qKol9FcfMFBQHMaQ56bTHE1u9xx9TfAViwYq0XT9KK5c0Z31muWtaKNsSfCfrDjaHjPJ70Ih8rMPDjXgJZmEKjMie0pNnmtASVpU+iD2O7+G+67JdgeqMDcTaGhI2cXGDk63GGaT3FEPVsBaRebQIQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Dbd31zp35xCg9Ug88iyFhI2oAW70ZllAIjWWRmQgwmx8tXMU0gZiwEn+faQu4og9KKqOQUN0XFFQneikK6voRcws0wyW4pLXGPMLRXvuNJl1+p8mgAURDurg42D707N9wfvLU3t3fTMQOnMt2iBeeacIg8k61tqseJ6OoFP5D3LaR7rskU7nxZ0Q7WbGjemg8sJzNTeUTP0WXXBtshPJXMUDTYEjovoINEG/fErhaChMiHqOUj0pA3jtUZXtVFCGTTpJc9UvEgP78x1BmG1rQKcSNrBx49V7Mw8au7lZO5BnqzreidNTDY/+rcAqRYpvvGDYEIX1/PP4sih0el0SYA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
  • Cc: Leonid Komarianskyi <Leonid_Komarianskyi@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>
  • Delivery-date: Thu, 21 Aug 2025 17:39:10 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHcB5d7kgaRrTB4eUK2JDUmO9y7Hw==
  • Thread-topic: [PATCH v2 04/10] xen/arm/irq: add handling for IRQs in the eSPI range

Julien Grall <julien@xxxxxxx> writes:

> On 21/08/2025 17:59, Volodymyr Babchuk wrote:
>> Julien Grall <julien@xxxxxxx> writes:
>> 
>>> Hi,
>>>
>>> On 21/08/2025 16:59, Volodymyr Babchuk wrote:
>>>> Leonid Komarianskyi <Leonid_Komarianskyi@xxxxxxxx> writes:
>>>>
>>>>> Currently, Xen does not support eSPI interrupts, leading
>>>>> to a data abort when such interrupts are defined in the DTS.
>>>>>
>>>>> This patch introduces a separate array to initialize up to
>>>>> 1024 interrupt descriptors in the eSPI range and adds the
>>>>> necessary defines and helper function. These changes lay the
>>>>> groundwork for future implementation of full eSPI interrupt
>>>>> support. As this GICv3.1 feature is not required by all vendors,
>>>>> all changes are guarded by ifdefs, depending on the corresponding
>>>>> Kconfig option.
>>>> I don't think that it is a good idea to hide this feature under
>>>> Kconfig
>>>> option, as this will increase number of different build variants.
>>>> I believe that runtime check for GICD_TYPER.ESPI should be
>>>    sufficient,> but maintainers can correct me there.
>>>
>>> I haven't seen many board with ESPI available. So I think it would be
>>> better if this is under a Kconfig because not everyone may want to
>>> have the code.
>> Probably, we can expect more in the future...
>
> Well yes. But I was under the impression this the preferred
> approach. See the discussion about disabling 32-bit support on 64-bit:
>
> 20250723075835.3993182-1-grygorii_strashko@xxxxxxxx

Ah yes, safety certification. Welp, can't argue with that.

>
>>  Anyways, after reviewing
>> all patches in the series, I can see that code will be littered with
>> #ifdef CONFIG_GICV3_ESPI, which, probably, not a good thing.
>
> The solution is to provide wrappers to reduce the number of #ifdef. I
> haven't checked all the places.

Yes, I was also thinking about that, but I got an impression, that in
many cases it will be hard to provide such wrappers. Anyways, something
is needs to be done here.

[...]


>
>> As a bonus point, we can't leave this pointer
>> present even if CONFIG_GICV3_ESPI=n, which will simplify some code in
>> latter patches.
>
> Did you intend to say "We can leave" rather than "we can't leave"?

Correct

-- 
WBR, Volodymyr


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.