[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC 7/8] xen/arm: Allow DOM0 to set the irq type when ACPI is inuse
On Tue, 7 Jun 2016, Julien Grall wrote: > The function route_irq_to_guest mandates the IRQ type, stored in > desc->arch.type, to be valid. However, in case of ACPI, these > information is not part of the static tables. Therefore Xen needs to > rely on DOM0 to provide a valid type based on the firmware tables. > > A new helper, irq_type_set_by_domain is provided to check whether a > domain is allowed to set the IRQ type. For now, only DOM0 is allowed to > configure it when ACPI is inuse. > > When the helper returns 1, the routing function will not check whether > the IRQ type is correctly set and configure the GIC. Instead, this will > be done when the domain will enable the interrupt. > > Note that irq_set_spi_type is not called because it validates the type > and does not allow it the domain to change the type after the first > write. It means that desc->arch.type will never be set, which is fine > because the field is only used to configure the type during the routing. > > Signed-off-by: Julien Grall <julien.grall@xxxxxxx> > > --- > > I am thinking to at least extend the behavior to DOM0 using DT. This > would make us resilient to a DT not providing the correct type without > having to workaround them in Xen. I agree with you. It is also better to have only one way of doing things rather than two. > Furthermore, it might be possible to let any domain configuring the IRQ > type (could be useful when passthrough an IRQ with ACPI). However, we would > need to consider any potential security impact beforehand. > --- > xen/arch/arm/gic.c | 5 +++-- > xen/arch/arm/irq.c | 14 +++++++++++++- > xen/arch/arm/vgic.c | 21 +++++++++++++++++++++ > xen/include/asm-arm/gic.h | 3 +++ > xen/include/asm-arm/irq.h | 6 ++++++ > 5 files changed, 46 insertions(+), 3 deletions(-) > > diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c > index 27cd177..80d93a8 100644 > --- a/xen/arch/arm/gic.c > +++ b/xen/arch/arm/gic.c > @@ -97,7 +97,7 @@ void gic_restore_state(struct vcpu *v) > } > > /* desc->irq needs to be disabled before calling this function */ > -static void gic_set_irq_type(struct irq_desc *desc, unsigned int type) > +void gic_set_irq_type(struct irq_desc *desc, unsigned int type) > { > /* > * IRQ must be disabled before configuring it (see 4.3.13 in ARM IHI > @@ -162,7 +162,8 @@ int gic_route_irq_to_guest(struct domain *d, unsigned int > virq, > desc->handler = gic_hw_ops->gic_guest_irq_type; > set_bit(_IRQ_GUEST, &desc->status); > > - gic_set_irq_type(desc, desc->arch.type); > + if ( !irq_type_set_by_domain(d) ) > + gic_set_irq_type(desc, desc->arch.type); > gic_set_irq_priority(desc, priority); > > p->desc = desc; > diff --git a/xen/arch/arm/irq.c b/xen/arch/arm/irq.c > index 2f8af72..b9d7749 100644 > --- a/xen/arch/arm/irq.c > +++ b/xen/arch/arm/irq.c > @@ -27,6 +27,7 @@ > > #include <asm/gic.h> > #include <asm/vgic.h> > +#include <asm/acpi.h> > > static unsigned int local_irqs_type[NR_LOCAL_IRQS]; > static DEFINE_SPINLOCK(local_irqs_type_lock); > @@ -395,6 +396,17 @@ bool_t is_assignable_irq(unsigned int irq) > } > > /* > + * When ACPI is inuse, only the hardware domain knows the interrupt > + * type. > + * > + * XXX: See whether it is possible to let any domain configure the type. > + */ > +bool_t irq_type_set_by_domain(const struct domain *d) > +{ > + return ((d == hardware_domain) && !acpi_disabled); > +} > + > +/* > * Route an IRQ to a specific guest. > * For now only SPIs are assignable to the guest. > */ > @@ -449,7 +461,7 @@ int route_irq_to_guest(struct domain *d, unsigned int > virq, > > spin_lock_irqsave(&desc->lock, flags); > > - if ( desc->arch.type == IRQ_TYPE_INVALID ) > + if ( desc->arch.type == IRQ_TYPE_INVALID && !irq_type_set_by_domain(d) ) > { > printk(XENLOG_G_ERR "IRQ %u has not been configured\n", irq); > retval = -EIO; > diff --git a/xen/arch/arm/vgic.c b/xen/arch/arm/vgic.c > index ee35683..3e1c572 100644 > --- a/xen/arch/arm/vgic.c > +++ b/xen/arch/arm/vgic.c > @@ -249,6 +249,24 @@ static int vgic_get_virq_priority(struct vcpu *v, > unsigned int virq) > return priority; > } > > +#define NR_CFG_PER_ICFGR 16 > +#define NR_BITS_PER_CFG (32U / NR_CFG_PER_ICFGR) > + > +/* The function should be called witht the rank lock taken. */ ^ with > +static int __vgic_get_virq_type(struct vcpu *v, unsigned int virq) > +{ > + struct vgic_irq_rank *rank = vgic_rank_irq(v, virq); > + uint8_t index = virq & INTERRUPT_RANK_MASK; > + uint32_t reg = rank->icfg[index / NR_CFG_PER_ICFGR]; > + uint8_t val; > + > + ASSERT(spin_is_locked(&rank->lock)); > + > + val = reg >> ((index % NR_CFG_PER_ICFGR) * NR_BITS_PER_CFG); > + > + return (val & 0x2) ? IRQ_TYPE_EDGE_RISING : IRQ_TYPE_LEVEL_HIGH; > +} I would stick to the function and definition we already had from "from Configure SPI interrupt type and route to Dom0 dynamically" by Shannon: #define VGIC_ICFG_MASK(intr) (1 << ((2 * ((intr) % 16)) + 1)) static inline unsigned int get_the_irq_type(struct vcpu *v, int n, int index) { struct vgic_irq_rank *vr = vgic_get_rank(v, n); uint32_t tr = vr->icfg[index >> 4]; if ( tr & VGIC_ICFG_MASK(index) ) return IRQ_TYPE_EDGE_BOTH; else return IRQ_TYPE_LEVEL_MASK; } > void vgic_migrate_irq(struct vcpu *old, struct vcpu *new, unsigned int irq) > { > unsigned long flags; > @@ -342,6 +360,7 @@ void vgic_enable_irqs(struct vcpu *v, uint32_t r, int n) > unsigned long flags; > int i = 0; > struct vcpu *v_target; > + struct domain *d = v->domain; > > while ( (i = find_next_bit(&mask, 32, i)) < 32 ) { > irq = i + (32 * n); > @@ -356,6 +375,8 @@ void vgic_enable_irqs(struct vcpu *v, uint32_t r, int n) > { > irq_set_affinity(p->desc, cpumask_of(v_target->processor)); > spin_lock_irqsave(&p->desc->lock, flags); > + if ( irq_type_set_by_domain(d) ) > + gic_set_irq_type(p->desc, __vgic_get_virq_type(v, irq)); > p->desc->handler->enable(p->desc); > spin_unlock_irqrestore(&p->desc->lock, flags); > } This is OK. But I am wondering if it wouldn't make sense to call gic_set_irq_type when the guest actually writes to the virtual icfg? > diff --git a/xen/include/asm-arm/gic.h b/xen/include/asm-arm/gic.h > index ddc45a8..44b9ef6 100644 > --- a/xen/include/asm-arm/gic.h > +++ b/xen/include/asm-arm/gic.h > @@ -222,6 +222,9 @@ enum gic_version { > > extern enum gic_version gic_hw_version(void); > > +/* Program the IRQ type into the GIC */ > +void gic_set_irq_type(struct irq_desc *desc, unsigned int type); > + > /* Program the GIC to route an interrupt */ > extern void gic_route_irq_to_xen(struct irq_desc *desc, const cpumask_t > *cpu_mask, > unsigned int priority); > diff --git a/xen/include/asm-arm/irq.h b/xen/include/asm-arm/irq.h > index 493773c..8f7a167 100644 > --- a/xen/include/asm-arm/irq.h > +++ b/xen/include/asm-arm/irq.h > @@ -58,6 +58,12 @@ int platform_get_irq(const struct dt_device_node *device, > int index); > > void irq_set_affinity(struct irq_desc *desc, const cpumask_t *cpu_mask); > > +/* > + * Use this helper in places that need to know whether the IRQ type is > + * set by the domain. > + */ > +bool_t irq_type_set_by_domain(const struct domain *d); > + > #endif /* _ASM_HW_IRQ_H */ > /* > * Local variables: > -- > 1.9.1 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |