|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v1 2/2] arch/arm: time: Add support for parsing interrupts by names
Hi Michal,
> On 9 Mar 2023, at 13:42, Michal Orzel <michal.orzel@xxxxxxx> wrote:
>
> Hi Bertrand,
>
> On 09/03/2023 13:19, Bertrand Marquis wrote:
>>
>>
>> Hi Michal,
>>
>>> On 9 Mar 2023, at 12:35, Michal Orzel <michal.orzel@xxxxxxx> wrote:
>>>
>>>
>>>
>>> On 09/03/2023 11:39, Bertrand Marquis wrote:
>>>>
>>>>
>>>> Hi Michal,
>>>>
>>>>> On 9 Mar 2023, at 11:05, Michal Orzel <michal.orzel@xxxxxxx> wrote:
>>>>>
>>>>>
>>>>>
>>>>> On 09/03/2023 09:02, Bertrand Marquis wrote:
>>>>>>
>>>>>>
>>>>>> Hi Stefano,
>>>>>>
>>>>>>> On 7 Mar 2023, at 22:02, Stefano Stabellini <sstabellini@xxxxxxxxxx>
>>>>>>> wrote:
>>>>>>>
>>>>>>> On Tue, 7 Mar 2023, Bertrand Marquis wrote:
>>>>>>>>> On 7 Mar 2023, at 11:09, Andrei Cherechesu (OSS)
>>>>>>>>> <andrei.cherechesu@xxxxxxxxxxx> wrote:
>>>>>>>>>
>>>>>>>>> From: Andrei Cherechesu <andrei.cherechesu@xxxxxxx>
>>>>>>>>>
>>>>>>>>> Added support for parsing the ARM generic timer interrupts DT
>>>>>>>>> node by the "interrupt-names" property, if it is available.
>>>>>>>>>
>>>>>>>>> If not available, the usual parsing based on the expected
>>>>>>>>> IRQ order is performed.
>>>>>>>>>
>>>>>>>>> Also added the "hyp-virt" PPI to the timer PPI list, even
>>>>>>>>> though it's currently not in use. If the "hyp-virt" PPI is
>>>>>>>>> not found, the hypervisor won't panic.
>>>>>>>>>
>>>>>>>>> Signed-off-by: Andrei Cherechesu <andrei.cherechesu@xxxxxxx>
>>>>>>>>> ---
>>>>>>>>> xen/arch/arm/include/asm/time.h | 3 ++-
>>>>>>>>> xen/arch/arm/time.c | 26 ++++++++++++++++++++++----
>>>>>>>>> 2 files changed, 24 insertions(+), 5 deletions(-)
>>>>>>>>>
>>>>>>>>> diff --git a/xen/arch/arm/include/asm/time.h
>>>>>>>>> b/xen/arch/arm/include/asm/time.h
>>>>>>>>> index 4b401c1110..49ad8c1a6d 100644
>>>>>>>>> --- a/xen/arch/arm/include/asm/time.h
>>>>>>>>> +++ b/xen/arch/arm/include/asm/time.h
>>>>>>>>> @@ -82,7 +82,8 @@ enum timer_ppi
>>>>>>>>> TIMER_PHYS_NONSECURE_PPI = 1,
>>>>>>>>> TIMER_VIRT_PPI = 2,
>>>>>>>>> TIMER_HYP_PPI = 3,
>>>>>>>>> - MAX_TIMER_PPI = 4,
>>>>>>>>> + TIMER_HYP_VIRT_PPI = 4,
>>>>>>>>> + MAX_TIMER_PPI = 5,
>>>>>>>>> };
>>>>>>>>>
>>>>>>>>> /*
>>>>>>>>> diff --git a/xen/arch/arm/time.c b/xen/arch/arm/time.c
>>>>>>>>> index 433d7be909..794da646d6 100644
>>>>>>>>> --- a/xen/arch/arm/time.c
>>>>>>>>> +++ b/xen/arch/arm/time.c
>>>>>>>>> @@ -38,6 +38,14 @@ uint32_t __read_mostly timer_dt_clock_frequency;
>>>>>>>>>
>>>>>>>>> static unsigned int timer_irq[MAX_TIMER_PPI];
>>>>>>>>>
>>>>>>>>> +static const char *timer_irq_names[MAX_TIMER_PPI] = {
>>>>>>>>> + [TIMER_PHYS_SECURE_PPI] = "sec-phys",
>>>>>>>>> + [TIMER_PHYS_NONSECURE_PPI] = "phys",
>>>>>>>>> + [TIMER_VIRT_PPI] = "virt",
>>>>>>>>> + [TIMER_HYP_PPI] = "hyp-phys",
>>>>>>>>> + [TIMER_HYP_VIRT_PPI] = "hyp-virt",
>>>>>>>>> +};
>>>>>>>>> +
>>>>>>>>
>>>>>>>> I would need some reference or a pointer to some doc to check those.
>>>>>>>>
>>>>>>>>> unsigned int timer_get_irq(enum timer_ppi ppi)
>>>>>>>>> {
>>>>>>>>> ASSERT(ppi >= TIMER_PHYS_SECURE_PPI && ppi < MAX_TIMER_PPI);
>>>>>>>>> @@ -149,15 +157,25 @@ static void __init init_dt_xen_time(void)
>>>>>>>>> {
>>>>>>>>> int res;
>>>>>>>>> unsigned int i;
>>>>>>>>> + bool has_names;
>>>>>>>>> +
>>>>>>>>> + has_names = dt_property_read_bool(timer, "interrupt-names");
>>>>>>>>>
>>>>>>>>> /* Retrieve all IRQs for the timer */
>>>>>>>>> for ( i = TIMER_PHYS_SECURE_PPI; i < MAX_TIMER_PPI; i++ )
>>>>>>>>> {
>>>>>>>>> - res = platform_get_irq(timer, i);
>>>>>>>>> -
>>>>>>>>> - if ( res < 0 )
>>>>>>>>> + if ( has_names )
>>>>>>>>> + res = platform_get_irq_byname(timer, timer_irq_names[i]);
>>>>>>>>> + else
>>>>>>>>> + res = platform_get_irq(timer, i);
>>>>>>>>> +
>>>>>>>>> + if ( res > 0 )
>>>>>>>>
>>>>>>>> The behaviour of the code is changed here compared to the current
>>>>>>>> version as res = 0 will now generate a panic.
>>>>>>>>
>>>>>>>> Some device tree might not specify an interrupt number and just put
>>>>>>>> 0 and Xen will now panic on those systems.
>>>>>>>> As I have no idea if such systems exists and the behaviour is modified
>>>>>>>> you should justify this and mention it in the commit message or keep
>>>>>>>> the old behaviour and let 0 go through without a panic.
>>>>>>>>
>>>>>>>> @stefano, julien any idea here ? should just keep the old behaviour ?
>>>>>>>
>>>>>>> platform_get_irq returns 0 if the irq is 0. The irq cannot be 0 because
>>>>>>> 0 is reserved for SGIs, not PPIs. So I think it is OK to consider 0 an
>>>>>>> error.
>>>>>>
>>>>>> Problem here is that a DTB might not specify all interrupts and just put
>>>>>> 0 for the one not used (or not available for example if you have no
>>>>>> secure
>>>>>> world).
>>>>> Xen requires presence of EL3,EL2 and on such system, at least the
>>>>> following timers needs to be there
>>>>> according to Arm ARM:
>>>>> - EL3 phys (if EL3 is there)
>>>>
>>>> This might be needed by EL3 but not by Xen.
>>> Xen requires system with EL3 and if there is EL3, both Arm spec and dt
>>> bindings requires sec-phys timer to be there.
>>> So it would be very strange to see a fake interrupt with IRQ being 0. But
>>> if we relly want to only care about
>>> what Xen needs, then we could live with that (although it is difficult for
>>> me to find justification for 0 there).
>>> Device trees are created per system and if system has EL3, then why forcing
>>> 0 to be listed for sec-phys timer?
>>>
>>
>> Let's see that on the other angle: why should Xen check stuff that it does
>> not need ?
> Because apart from what it needs or not, there is a matter of a failure in
> Xen.
> Xen exposes timer IRQs to dom0 as they were taken from dtb and allowing 0 for
> any of the timer IRQ would result
> in a Xen failure when reserving such IRQ. Xen presets SGI IRQs, meaning bits
> 0:15 in allocated_irqs bitmap are set.
> This is why when calling vgic_reserve_virq and passing SGI always results in
> calling a BUG().
>
> So we have two options:
> - panic earlier with a meaningful message when IRQ is 0
> - let Xen continue and reach BUG which would be not that obvious for people
> using but not knowing Xen
So you are saying that in the current state 0 would be ignored during scan and
create a bug later.
If this is the case than definitely we should panic earlier with a proper
message I agree.
Regards
Bertrand
>
> I think first option is always better.
>
> ~Michal
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |