[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] x86/IO-APIC: don't create pIRQ mapping from masked RTE



On 21/08/15 09:41, Jan Beulich wrote:
> While moving our XenoLinux patches to 4.2-rc I noticed bogus "already
> mapped" messages resulting from Linux (legitimately) writing RTEs with
> only the mask bit set. Clearly we shouldn't even attempt to create a
> pIRQ <-> IRQ mapping from such RTEs.

Oops.  Agreed.

>
> In the course of this I also found that the respective message isn't
> really useful without also printing the pre-existing mapping. And I
> noticed that map_domain_pirq() allowed IRQ0 to get through, despite us
> never allowing and domain to control that interrupt.

s/and/a/ ? (I can't quite parse the original statement)

Also, doesn't irq_access_permitted() catch the irq0 case?

>
> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> with one suggestion

>
> --- a/xen/arch/x86/io_apic.c
> +++ b/xen/arch/x86/io_apic.c
> @@ -2371,9 +2371,14 @@ int ioapic_guest_write(unsigned long phy
>       * pirq and irq mapping. Where the GSI is greater than 256, we assume
>       * that dom0 pirq == irq.
>       */
> -    pirq = (irq >= 256) ? irq : rte.vector;
> -    if ( (pirq < 0) || (pirq >= hardware_domain->nr_pirqs) )
> -        return -EINVAL;
> +    if ( !rte.mask )
> +    {
> +        pirq = (irq >= 256) ? irq : rte.vector;
> +        if ( pirq >= hardware_domain->nr_pirqs )
> +            return -EINVAL;
> +    }
> +    else
> +        pirq = -1;
>      
>      if ( desc->action )
>      {
> @@ -2408,12 +2413,15 @@ int ioapic_guest_write(unsigned long phy
>  
>          printk(XENLOG_INFO "allocated vector %02x for irq %d\n", ret, irq);
>      }
> -    spin_lock(&hardware_domain->event_lock);
> -    ret = map_domain_pirq(hardware_domain, pirq, irq,
> -            MAP_PIRQ_TYPE_GSI, NULL);
> -    spin_unlock(&hardware_domain->event_lock);
> -    if ( ret < 0 )
> -        return ret;
> +    if ( pirq >= 0 )
> +    {
> +        spin_lock(&hardware_domain->event_lock);
> +        ret = map_domain_pirq(hardware_domain, pirq, irq,
> +                              MAP_PIRQ_TYPE_GSI, NULL);
> +        spin_unlock(&hardware_domain->event_lock);
> +        if ( ret < 0 )
> +            return ret;
> +    }
>  
>      spin_lock_irqsave(&ioapic_lock, flags);
>      /* Set the correct irq-handling type. */
> --- a/xen/arch/x86/irq.c
> +++ b/xen/arch/x86/irq.c
> @@ -1906,7 +1906,7 @@ int map_domain_pirq(
>      if ( !irq_access_permitted(current->domain, irq))
>          return -EPERM;
>  

I would be tempted to put a comment here stating that irq0 is definitely
a xen-reserved irq.  Otherwise, it is odd to have the mismatch between
pirq and irq.

~Andrew

> -    if ( pirq < 0 || pirq >= d->nr_pirqs || irq < 0 || irq >= nr_irqs )
> +    if ( pirq < 0 || pirq >= d->nr_pirqs || irq <= 0 || irq >= nr_irqs )
>      {
>          dprintk(XENLOG_G_ERR, "dom%d: invalid pirq %d or irq %d\n",
>                  d->domain_id, pirq, irq);
> @@ -1919,8 +1919,9 @@ int map_domain_pirq(
>      if ( (old_irq > 0 && (old_irq != irq) ) ||
>           (old_pirq && (old_pirq != pirq)) )
>      {
> -        dprintk(XENLOG_G_WARNING, "dom%d: pirq %d or irq %d already 
> mapped\n",
> -                d->domain_id, pirq, irq);
> +        dprintk(XENLOG_G_WARNING,
> +                "dom%d: pirq %d or irq %d already mapped (%d,%d)\n",
> +                d->domain_id, pirq, irq, old_pirq, old_irq);
>          return 0;
>      }
>  
>
>
>


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.