WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Re: [RFC][PATCH 08/10] x86: Don't ack_APIC_irq() if lapic is

To: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
Subject: [Xen-devel] Re: [RFC][PATCH 08/10] x86: Don't ack_APIC_irq() if lapic is disabled in GENERIC_INTERRUPT_VECTOR handler
From: Sheng Yang <sheng@xxxxxxxxxxxxxxx>
Date: Thu, 17 Sep 2009 11:54:18 +0800
Cc: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, Eddie Dong <eddie.dong@xxxxxxxxx>, linux-kernel@xxxxxxxxxxxxxxx, Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>, Keir Fraser <keir.fraser@xxxxxxxxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>
Delivery-date: Wed, 16 Sep 2009 20:54:46 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20090916093731.GG5094@lenovo>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: Intel Opensource Technology Center
References: <1253090551-7969-1-git-send-email-sheng@xxxxxxxxxxxxxxx> <20090916090306.GF5094@lenovo> <20090916093731.GG5094@lenovo>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: KMail/1.11.2 (Linux/2.6.28-15-generic; KDE/4.2.2; x86_64; ; )
On Wednesday 16 September 2009 17:37:31 Cyrill Gorcunov wrote:
> [Cyrill Gorcunov - Wed, Sep 16, 2009 at 01:03:06PM +0400]
>
> | [Cyrill Gorcunov - Wed, Sep 16, 2009 at 12:58:35PM +0400]
> | ...
> |
> | | Hi Sheng,
> | |
> | | is there was some problem with it? I'm asking you
> | | because if disable_apic=1 then any apic write/read
> | | operations become NOPs. So I don't see how it may
> | | hurt. But I could be missing something.
> | |
> | |   -- Cyrill
> |
> | Ah, I see -- it's due to your other patch...
> | Hmm this makes all "disable apic" idea less
> | general. And safety of ack_APIC_irq is now
> | under suspicious.

Um, probably. I've seen a ack_APIC_irq() in do_IRQ when handle_irq() fail. 
Seems the assumption that ack_APIC_irq() always safe is there. I will check if 
I can make it more elegant - maybe disable the warning in the Xen code...

> |
> |     -- Cyrill
>
> And how msi_compose_msg would work then?

As you guessed, Xen also use event channel to handle it for guest(for we 
called "passthrough devices"), the real interrupt delivered to the Xen, then 
delivered through event channel to the guest.
>
> Don't get me wrong please, I'm just trying to understand.
> Perhaps Xen specifics will handle it (I didn't read Xen
> internals) by substituting all this with own handler.
>
> Since comments are requested I thought I may ask? :)

Oh, never mind. Glad to see your comments. :)

-- 
regards
Yang, Sheng


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>