[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v2 0/2] Add support for MSI injection on Arm
- To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Mykyta Poturai <Mykyta_Poturai@xxxxxxxx>
- Date: Mon, 14 Apr 2025 09:51:15 +0000
- Accept-language: en-US
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fRDfnlb0oXS7KSaR6uIMes4AmHTLuKUy4A4Q7gmmSmY=; b=a+O+LnOis46oJ5ey05lKxti55d0j3vBzNt+mrGNp3YGSxZnUNXHMNyDhof5jTfvcbeqVrOKxXaZ9u8OpCTB21viNoQ7KAQFOS2ZEqQQ0LAPraGYJg9MP54KMm9229/mULjXS1GDNmPSMrEBXxtRpjsP36/hjJ9oki4Njcc5wBsf5IYH8iW11x4cBiGOoLsojclfNkzv6ONqmdsGAu1QU2soxGdaAkr9sdmfl0Ybifpw3cfg6Vx8PepGjxCmoyLzYpO6YoSiCF7JddtfxFUuk/a0sFq914XS5veIbmwFDt9peK3FcTK5UsI3YtabiLu8Uh/nHrrx6VwiynVyQiGRAkg==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wNJmw+NfrC6A3ho9PEa668JlI+pKOcrImiI/GflQNGacl7PV+KjzYPj3VDkrzpR6p+O4HdlL0FbEB8y/CLz3QEZzdXx1d1DL4dZmPMVUYh1xT/IIyLVhNJd+6ieebIUeLsQXZ4A46JKGdUx6ikLmXeLJtXQsH2IBsBa44NR0Chbcs8I6/xAVOoLPaEmSOgT0+m98qvLJg9DJR1Ffgh06Bgp1RuOYZw71BQ2uCm/3RZJyIoO9j1lio3lM+/ES3KVYi/JGZvmHBPInUHM4stor3lCjCawCyQSC5qoAnmsJOkhhXHp/kGlLA9EQeT9g5pNLEeoaUwQg7x5vI4dl05YAHQ==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
- Cc: Mykyta Poturai <Mykyta_Poturai@xxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
- Delivery-date: Mon, 14 Apr 2025 09:51:25 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
- Thread-index: AQHbrSLDj7RBwKKgz0m9mJin+yPd5g==
- Thread-topic: [PATCH v2 0/2] Add support for MSI injection on Arm
This series adds the base support for MSI injection on Arm. This is
needed to streamline virtio-pci interrupt triggering.
With this patches, MSIs can be triggered in guests by issuing the new
DM op, inject_msi2. This op is similar to inject_msi, but it allows
to specify the source id of the MSI.
We chose the approach of adding a new DM op instead of using the pad
field of inject_msi because we have no clear way of distinguishing
between set and unset pad fields. New implementations also adds flags
field to clearly specify if the SBDF is set.
Patches were tested on QEMU with QEMU virtio-pci backends, with
virtio-pci patches and patches for ITS support for DomUs applied.
Branch with all relevant Xen patches:
https://github.com/Deedone/xen/tree/4.20-dev%2Bvirtio
Branch with all relevant QEMU patches:
https://github.com/Deedone/qemu/tree/virtio-msi2
Mykyta Poturai (2):
arm: vgic: Add the ability to trigger MSIs from the Hypervisor
xen/dm: arm: Introduce inject_msi2 DM op
tools/include/xendevicemodel.h | 14 ++++++++++++++
tools/libs/devicemodel/core.c | 20 ++++++++++++++++++++
tools/libs/devicemodel/libxendevicemodel.map | 5 +++++
xen/arch/arm/dm.c | 17 +++++++++++++++++
xen/arch/arm/include/asm/vgic.h | 11 +++++++++++
xen/arch/arm/vgic-v3-its.c | 19 +++++++++++++++++++
xen/arch/x86/hvm/dm.c | 18 ++++++++++++++++++
xen/include/public/hvm/dm_op.h | 18 ++++++++++++++++++
8 files changed, 122 insertions(+)
--
2.34.1
|