Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Step:15-SP4
xen.32200
5ff71655-x86-dpci-EOI-regardless-of-masking.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 5ff71655-x86-dpci-EOI-regardless-of-masking.patch of Package xen.32200
# Commit eb298f32fac5ac362eef30a66a9c9c42724d4ce6 # Date 2021-01-07 15:10:29 +0100 # Author Roger Pau Monné <roger.pau@citrix.com> # Committer Jan Beulich <jbeulich@suse.com> x86/dpci: EOI interrupt regardless of its masking status Modify hvm_pirq_eoi to always EOI the interrupt if required, instead of not doing such EOI if the interrupt is routed through the vIO-APIC and the entry is masked at the time the EOI is performed. Further unmask of the vIO-APIC pin won't EOI the interrupt, and thus the guest OS has to wait for the timeout to expire and the automatic EOI to be performed. This allows to simplify the helpers and drop the vioapic_redir_entry parameter from all of them. Fixes: ccfe4e08455 ('Intel vt-d specific changes in arch/x86/hvm/vmx/vtd.') Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Reviewed-by: Jan Beulich <jbeulich@suse.com> --- a/xen/arch/x86/hvm/vioapic.c +++ b/xen/arch/x86/hvm/vioapic.c @@ -539,7 +539,7 @@ void vioapic_update_EOI(struct domain *d if ( iommu_enabled ) { spin_unlock(&d->arch.hvm.irq_lock); - hvm_dpci_eoi(d, vioapic->base_gsi + pin, ent); + hvm_dpci_eoi(d, vioapic->base_gsi + pin); spin_lock(&d->arch.hvm.irq_lock); } --- a/xen/arch/x86/hvm/vpic.c +++ b/xen/arch/x86/hvm/vpic.c @@ -261,8 +261,7 @@ static void vpic_ioport_write( vpic_update_int_output(vpic); vpic_unlock(vpic); hvm_dpci_eoi(current->domain, - hvm_isa_irq_to_gsi((addr >> 7) ? (irq|8) : irq), - NULL); + hvm_isa_irq_to_gsi((addr >> 7) ? (irq | 8) : irq)); return; /* bail immediately */ case 6: /* Set Priority */ vpic->priority_add = (val + 1) & 7; --- a/xen/drivers/passthrough/io.c +++ b/xen/drivers/passthrough/io.c @@ -944,8 +944,7 @@ static void hvm_dirq_assist(struct domai spin_unlock(&d->event_lock); } -static void hvm_pirq_eoi(struct pirq *pirq, - const union vioapic_redir_entry *ent) +static void hvm_pirq_eoi(struct pirq *pirq) { struct hvm_pirq_dpci *pirq_dpci; @@ -962,7 +961,6 @@ static void hvm_pirq_eoi(struct pirq *pi * since interrupt is still not EOIed */ if ( --pirq_dpci->pending || - (ent && ent->fields.mask) || !pt_irq_need_timer(pirq_dpci->flags) ) return; @@ -971,19 +969,17 @@ static void hvm_pirq_eoi(struct pirq *pi } static void __hvm_dpci_eoi(struct domain *d, - const struct hvm_girq_dpci_mapping *girq, - const union vioapic_redir_entry *ent) + const struct hvm_girq_dpci_mapping *girq) { struct pirq *pirq = pirq_info(d, girq->machine_gsi); if ( !hvm_domain_use_pirq(d, pirq) ) hvm_pci_intx_deassert(d, girq->device, girq->intx); - hvm_pirq_eoi(pirq, ent); + hvm_pirq_eoi(pirq); } -static void hvm_gsi_eoi(struct domain *d, unsigned int gsi, - const union vioapic_redir_entry *ent) +static void hvm_gsi_eoi(struct domain *d, unsigned int gsi) { struct pirq *pirq = pirq_info(d, gsi); @@ -992,11 +988,10 @@ static void hvm_gsi_eoi(struct domain *d return; hvm_gsi_deassert(d, gsi); - hvm_pirq_eoi(pirq, ent); + hvm_pirq_eoi(pirq); } -void hvm_dpci_eoi(struct domain *d, unsigned int guest_gsi, - const union vioapic_redir_entry *ent) +void hvm_dpci_eoi(struct domain *d, unsigned int guest_gsi) { const struct hvm_irq_dpci *hvm_irq_dpci; const struct hvm_girq_dpci_mapping *girq; @@ -1007,7 +1002,7 @@ void hvm_dpci_eoi(struct domain *d, unsi if ( is_hardware_domain(d) ) { spin_lock(&d->event_lock); - hvm_gsi_eoi(d, guest_gsi, ent); + hvm_gsi_eoi(d, guest_gsi); goto unlock; } @@ -1024,7 +1019,7 @@ void hvm_dpci_eoi(struct domain *d, unsi goto unlock; list_for_each_entry ( girq, &hvm_irq_dpci->girq[guest_gsi], list ) - __hvm_dpci_eoi(d, girq, ent); + __hvm_dpci_eoi(d, girq); unlock: spin_unlock(&d->event_lock); --- a/xen/include/asm-x86/hvm/io.h +++ b/xen/include/asm-x86/hvm/io.h @@ -122,8 +122,7 @@ bool handle_mmio_with_translation(unsign struct npfec); bool handle_pio(uint16_t port, unsigned int size, int dir); void hvm_interrupt_post(struct vcpu *v, int vector, int type); -void hvm_dpci_eoi(struct domain *d, unsigned int guest_irq, - const union vioapic_redir_entry *ent); +void hvm_dpci_eoi(struct domain *d, unsigned int guest_irq); void msix_write_completion(struct vcpu *); #ifdef CONFIG_HVM
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor