[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [Draft F] Xen on ARM vITS Handling
On 16/06/15 16:10, Ian Campbell wrote: >>> >>>>>> This could happen when the device is not quiescent. We had this issue on >>>>>> the vexpress at boot time when the network card was trying to send an >>>>>> interrupt before DOM0 is setup. >>>>> >>>>> I don't fully understand the issue you are trying to describe, but do >>>>> you want to propose a change to the spec? >>>> >>>> I actually don't know how to modify it. So it's an open question. >>> >>> For SPI too, or just for LPI? >> >> Only LPI. > > How is it fixed for SPI? We queue the SPI but don't inject it (gic_raise_guest_irq) to the guest. The injection will be done when the guest enable the IRQ. We can't use it for LPIs as the mapping vLPI -> pLPI may not yet exists. >>>> vgic_vcpu_inject_irq doesn't queue the interrupt if a VCPU is down. I >>>> think this is because the state of the VCPU wouldn't be correct. >>>> >>>> The process would be something like: >>>> >>>> - Creation of the domain >>>> => All vCPUs are down >>>> >>>> - Device is assigned to the guest >>>> => Enable physical LPIs >>>> >>>> * physical LPI is received * >>>> => Will be ignored and not EOIed (VCPU0 is down) >>>> => The LPI will never fired again during the guest life >>>> >>>> - Domain is started by the toolstack >>>> => VCPU0 is online >>> >>> Is it sufficient to queue interrupts even for VCPUs which are down? How >>> does the lack of a vITT entry when this interrupt occurred affect this? >> >> Well, in this case we don't know on which vLPI we have to inject it. But >> as said above, I guess we don't care if we ensure that the device can't >> send an event (by ensuring that the device doesn't know the >> GITS_TRANSLATER address is). > > Yes, I think that works. > > I'm not sure where to spell that out though. We want to find a way to avoid the PCI device to send an event. I see multiple possibility to do it: 1) Mask the event MSI-X allow to mask a specific event. There is a similar feature for MSI but it's optional. 2) Compose the MSI message only when the vLPI is enabled. That require Xen/PCI-back to delay the write in the config space. None of this solution satisfy me. But I don't have much knowledge on how PCI-passthrough works on Xen. Regards, -- Julien Grall _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |