[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v1 10/14] xen/riscv: implementation of aplic and imsic operations
On 4/17/25 8:25 AM, Jan Beulich wrote:
On 16.04.2025 21:05, Oleksii Kurochko wrote:On 4/15/25 2:46 PM, Jan Beulich wrote:On 08.04.2025 17:57, Oleksii Kurochko wrote:Introduce interrupt controller descriptor for host APLIC to describe the low-lovel hardare. It includes implementation of the following functions: - aplic_irq_startup() - aplic_irq_shutdown() - aplic_irq_enable() - aplic_irq_disable() - aplic_irq_ack() - aplic_host_irq_end() - aplic_set_irq_affinity() As APLIC is used in MSI mode it requires to enable/disable interrupts not only for APLIC but also for IMSIC. Thereby for the purpose of aplic_irq_{enable,disable}() it is introduced imsic_irq_{enable,disable)(). For the purpose of aplic_set_irq_affinity() aplic_get_cpu_from_mask() is introduced to get hart id. Also, introduce additional interrupt controller h/w operations and host_irq_type for APLIC: - aplic_host_irq_type - aplic_set_irq_priority() - aplic_set_irq_type()Yet these two functions nor the hooks they're used to populate are entirely unused here. Since they're also outside of the common IRQ handling machinery, it's unclear how one would sanely ack such a change.They will be called by intc_route_irq_to_xen() from setup_irq() during firt time the IRQ is setup.Perhaps move their introduction to there then? We don't do any Misra checking yet lon RISC-V, but imo it's still good practice to avoid introducing new violations, even if only temporarily. Okay, I will move their introduction to there. Btw, what is needed to add Misra checking for RISC-V? I started to think that, probably, it will make sense to do that from the start. --- a/xen/arch/riscv/aplic.c +++ b/xen/arch/riscv/aplic.c @@ -15,6 +15,7 @@ #include <xen/irq.h> #include <xen/mm.h> #include <xen/sections.h> +#include <xen/spinlock.h> #include <xen/types.h> #include <xen/vmap.h> @@ -110,9 +111,173 @@ static int __init aplic_init(void) return 0; } -static const struct intc_hw_operations __ro_after_init aplic_ops = { +static void aplic_set_irq_type(struct irq_desc *desc, unsigned int type) +{ + unsigned int irq = desc->irq - 1;Why this adjustment by 1 (and yet both items being named "irq")?Interrupt 0 isn't possible based on the spec: ``` Each of an APLIC’s interrupt sources has a fixed unique identity number in the range 1 to N, where N is the total number of sources at the APLIC. The number zero is not a valid interrupt identity number at an APLIC. The maximum number of interrupt sources an APLIC may support is 1023. ``` and interrupt 1 will correspond to bit 0 in sourcecfg[] register, interrupt 2 ->sourcecfg[1] and so on. And that is the reason why we need -1.Okay, fine. But what about the part of the question in parentheses? Sorry, missed to write that I'll change irq to irq_bit or something like that. + aplic.regs->sourcecfg[irq] = APLIC_SOURCECFG_SM_EDGE_FALL; + break; + case IRQ_TYPE_LEVEL_HIGH: + aplic.regs->sourcecfg[irq] = APLIC_SOURCECFG_SM_LEVEL_HIGH; + break; + case IRQ_TYPE_LEVEL_LOW: + aplic.regs->sourcecfg[irq] = APLIC_SOURCECFG_SM_LEVEL_LOW; + break; + default: + aplic.regs->sourcecfg[irq] = APLIC_SOURCECFG_SM_INACTIVE; + break;Is the default: label legitimate to be reached?From the spec: ``` 0 Inactive Inactive in this domain (and not delegated) 1 Detached Active, detached from the source wire 2–3 — Reserved 4 Edge1 Active, edge-sensitive; interrupt asserted on rising edge 5 Edge0 Active, edge-sensitive; interrupt asserted on falling edge 6 Level1 Active, level-sensitive; interrupt asserted when high 7 Level0 Active, level-sensitive; interrupt asserted when low ``` It seems to me like APLIC_SOURCECFG_SM_INACTIVE just covers cases (0-3) and inactive IRQ pretty safe to as a default value.I fear this doesn't answer my question, which is to a large part related to the Xen code, and only to some degree to the spec. From Xen code point of view, I am not sure if it legitimate or not. I've not any issue, at the moment, with such implementation, but to be on a safe side I'll implement default case as panic("..."). +static void aplic_set_irq_priority(struct irq_desc *desc, + unsigned int priority) +{ + /* No priority, do nothing */ +}Since the function dopes nothing, wouldn't it be better to omit it and have the (future) caller check for a NULL pointer ahead of making the (indirect) call? Same remark for other handlers (below) which also do nothing.I thought about that too, but it could be some cases when the stub is introduced with temporary BUG_ON("unimplemented") inside just to not miss to implement it when it will be necessary. If we will have only the caller check then we could miss to implement such stubs.I guess I don't understand the concern. for example, if we will have the following code: void some_caller(struct irq_desc *desc) { if ( desc->handler->set_affinity ) desc->handler->set_affinity(desc, cpu_mask); } Then we will skip the call of handler->set_affinity() (if it was just initialized with .set_affinity = NULL) without any notification. And it is fine specifically in this case as aplic_set_irq_priority() does nothing. But what about the cases if it is a function which will have some implementation in the future but doesn't have implementation for now. Then without notification that this function is unimplemented we could skip something what really matters. But I think that your initial comment was just about the function which basically does nothing. Am i right? +static void aplic_irq_enable(struct irq_desc *desc) +{ + unsigned long flags; + + /* + * TODO: Currently, APLIC is supported only with MSI interrupts. + * If APLIC without MSI interrupts is required in the future, + * this function will need to be updated accordingly. + */ + ASSERT(aplic.imsic_cfg->is_used);Such an extra field, used only for assertions, is pretty odd. Can't you use any of the other fields to achieve the same effect?in aplic_init() there is: /* check for associated imsic node */ rc = dt_property_read_u32(node, "msi-parent", &imsic_phandle); if ( !rc ) panic("%s: IDC mode not supported\n", node->full_name); So we will have panic() anyway if MSI mode isn't supported. As an option we can just drop the ASSERT.Since they serve primarily as a reminder where changes would need making, I'd prefer if they could be kept.Or introduce static variable in aplic.c `aplic_mode`, init it in aplic_init() and use it in ASSERT().This would then again be used solely for assertions, aiui? As said, I think it would be preferable if some already existing indicator could be used for this purpose. I think that not solely, for example, if IMSIC isn't available then we should skip the calls of imsic_irq_enable(), at least, and this variable could be used for that purpose. But I will double check if we have better indicator. At the moment, I don't think we have better, probably, except checking of aplic.regs->domaincfg if bit APLIC_DOMAINCFG_DM is set. + ASSERT(spin_is_locked(&desc->lock));If this lock (which is an IRQ-safe one) is necessarily held, ...+ spin_lock_irqsave(&aplic.lock, flags);... you can use just spin_lock() here.+ clear_bit(_IRQ_DISABLED, &desc->status);Why an atomic bitop when desc is locked? (And yes, I ought to raise the same question on Arm code also doing so.)I haven't thought about that. Likely non-atomic bitop could be used here.And then - does it need to be a bitop? Aiui that's what Arm uses, while x86 doesn't. And I see no reason to use other than plain C operators here. If Arm was switched, presumably all the redundant (and misnamed) _IRQ_* constants could go away, with just the IRQ_* ones left. The reason for a bitop in Arm is explained in this commit https://gitlab.com/xen-project/xen/-/commit/50d8fe8fcbab2440cfeeb65c4765868398652473 but all the places where plain C operators were changed to bitops are actually executed under I'm uncertain about this bit setting anyway - on x86 we would only fiddle with it for IRQs not in use, not while enabling/disabling one.What about this part? As I understand, based on Arm, code then Xen enables interrupts corresponding to devices assigned to dom0/domU before booting dom0/domU, resulting in the possibility of receiving an interrupt and not knowing what to do with it. So it is needed for enablement of IRQs when the guest requests it and not unconditionally at boot time. + spin_unlock_irqrestore(&aplic.lock, flags); +} + +static void aplic_irq_disable(struct irq_desc *desc) +{ + unsigned long flags; + + /* + * TODO: Currently, APLIC is supported only with MSI interrupts. + * If APLIC without MSI interrupts is required in the future, + * this function will need to be updated accordingly. + */ + ASSERT(aplic.imsic_cfg->is_used); + + ASSERT(spin_is_locked(&desc->lock)); + + spin_lock_irqsave(&aplic.lock, flags); + + set_bit(_IRQ_DISABLED, &desc->status); + + /* disable interrupt in APLIC */ + aplic.regs->clrienum = desc->irq; + + /* disable interrupt in IMSIC */ + imsic_irq_disable(desc->irq); + + spin_unlock_irqrestore(&aplic.lock, flags); +} + +static unsigned int aplic_irq_startup(struct irq_desc *desc) +{ + aplic_irq_enable(desc); + + return 0; +} + +static void aplic_irq_shutdown(struct irq_desc *desc) +{ + aplic_irq_disable(desc); +}You don't really need a separate hook function here, do you?With such implementation it is really not needed to have a hook so I will drop it.+static void aplic_irq_ack(struct irq_desc *desc) +{ + /* nothing to do */ +} + +static void aplic_host_irq_end(struct irq_desc *desc)What's the "host" in the identifier about?It was copied that from Arm and my understanding that it means Xen-related IRQ as they also have: ``` /* XXX different for level vs edge */ static hw_irq_controller gicv2_host_irq_type = { ... .end = gicv2_host_irq_end, ... }; static hw_irq_controller gicv2_guest_irq_type = { ... .end = gicv2_guest_irq_end, ... }; ```And you expect to end up with a similar distinction on RISC-V? There's nothing like that on x86, just to mention it. Yes, if one day support for guest interrupts without IMSIC support will be added for APLIC. (at the moment, we are planning only to have APLIC+IMSIC support as this way is hypervisor-aware) +static void aplic_set_irq_affinity(struct irq_desc *desc, const cpumask_t *mask) +{ + unsigned int cpu; + uint64_t group_index, base_ppn; + uint32_t hhxw, lhxw ,hhxs, value; + const struct imsic_config *imsic = aplic.imsic_cfg; + + /* + * TODO: Currently, APLIC is supported only with MSI interrupts. + * If APLIC without MSI interrupts is required in the future, + * this function will need to be updated accordingly. + */ + ASSERT(aplic.imsic_cfg->is_used);Use the local variable you have made yourself?What do you mean by local here?Just a few lines up you latch aplic.imsic_cfg into the local "imsic". Oh, sure, if *->is_used will still present in the next patch series then I'll re-use here "imsic". ~ Oleksii
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |