[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH v4 7/8] tools/xl: enable NS16550-compatible UART emulator for PVH (x86)
From: Denis Mukhin <dmukhin@xxxxxxxx> Enable virtual NS16550 for PVH domains in xl. {map,unmap}_domain_emuirq_pirq() infrastructure is modified by adding new type of interrupt resources 'IRQ_EMU' which means 'emulated device IRQ' (similarly to IRQ_MSI_EMU). This is necessary to for IOAPIC emulation code to skip IRQ->PIRQ mapping (vioapic_hwdom_map_gsi()) when guest OS unmasks vIOAPIC pin corresponding to virtual device's IRQ. Also, hvm_gsi_eoi() is modified to trigger assertion in hvm_gsi_deassert() path for ISA IRQs. Signed-off-by: Denis Mukhin <dmukhin@xxxxxxxx> --- Changes since v3: - new patch --- tools/libs/light/libxl_x86.c | 2 +- xen/arch/x86/domain.c | 2 ++ xen/arch/x86/hvm/vioapic.c | 10 ++++++++++ xen/arch/x86/include/asm/irq.h | 1 + xen/common/emul/vuart/vuart-ns16550.c | 27 +++++++++++++++++++++++++-- xen/drivers/passthrough/x86/hvm.c | 9 ++++----- 6 files changed, 43 insertions(+), 8 deletions(-) diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c index 0f039ca65a88..a40647c06cb9 100644 --- a/tools/libs/light/libxl_x86.c +++ b/tools/libs/light/libxl_x86.c @@ -54,7 +54,7 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc, break; case LIBXL_DOMAIN_TYPE_PVH: config->arch.emulation_flags = XEN_X86_EMU_LAPIC; - libxl__arch_domain_vuart_unsupported(gc, d_config, config); + libxl__arch_domain_vuart_enable(gc, d_config, config); break; case LIBXL_DOMAIN_TYPE_PV: config->arch.emulation_flags = 0; diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c index 6a010a509a60..39b0c0b199b9 100644 --- a/xen/arch/x86/domain.c +++ b/xen/arch/x86/domain.c @@ -769,12 +769,14 @@ static bool emulation_flags_ok(const struct domain *d, uint32_t emflags) { .caps = CAP_HVM | CAP_HWDOM, .min = X86_EMU_LAPIC | X86_EMU_IOAPIC | X86_EMU_VPCI, + .opt = X86_EMU_NS16550, }, /* PVH domU */ { .caps = CAP_HVM | CAP_DOMU, .min = X86_EMU_LAPIC, + .opt = X86_EMU_NS16550, }, /* HVM domU */ diff --git a/xen/arch/x86/hvm/vioapic.c b/xen/arch/x86/hvm/vioapic.c index 7c725f9e471f..86fe3aa4a201 100644 --- a/xen/arch/x86/hvm/vioapic.c +++ b/xen/arch/x86/hvm/vioapic.c @@ -177,6 +177,16 @@ static int vioapic_hwdom_map_gsi(unsigned int gsi, unsigned int trig, ASSERT(is_hardware_domain(currd)); + /* + * Interrupt is claimed by one of the platform virtual devices (e.g. + * NS16550); do nothing. + */ + read_lock(&currd->event_lock); + ret = domain_pirq_to_emuirq(currd, gsi); + read_unlock(&currd->event_lock); + if ( ret != IRQ_UNBOUND ) + return 0; + /* Interrupt has been unmasked, bind it now. */ ret = mp_register_gsi(gsi, trig, pol); if ( ret == -EEXIST ) diff --git a/xen/arch/x86/include/asm/irq.h b/xen/arch/x86/include/asm/irq.h index 8c81f66434a8..731d2bbbb1b4 100644 --- a/xen/arch/x86/include/asm/irq.h +++ b/xen/arch/x86/include/asm/irq.h @@ -221,6 +221,7 @@ void cleanup_domain_irq_mapping(struct domain *d); #define IRQ_UNBOUND (-1) #define IRQ_PT (-2) #define IRQ_MSI_EMU (-3) +#define IRQ_EMU (-4) bool cpu_has_pending_apic_eoi(void); diff --git a/xen/common/emul/vuart/vuart-ns16550.c b/xen/common/emul/vuart/vuart-ns16550.c index 48bbf58264fe..9ec9aed2c594 100644 --- a/xen/common/emul/vuart/vuart-ns16550.c +++ b/xen/common/emul/vuart/vuart-ns16550.c @@ -355,7 +355,9 @@ static void ns16550_irq_assert(const struct vuart_ns16550 *vdev) struct domain *d = vdev->owner; int vector; - if ( has_vpic(d) ) /* HVM */ + if ( has_vioapic(d) && !has_vpic(d) ) /* PVH */ + vector = hvm_ioapic_assert(d, vdev->irq, false); + else if ( has_vpic(d) ) /* HVM */ vector = hvm_isa_irq_assert(d, vdev->irq, vioapic_get_vector); else ASSERT_UNREACHABLE(); @@ -367,7 +369,9 @@ static void ns16550_irq_deassert(const struct vuart_ns16550 *vdev) { struct domain *d = vdev->owner; - if ( has_vpic(d) ) /* HVM */ + if ( has_vioapic(d) && !has_vpic(d) ) /* PVH */ + hvm_ioapic_deassert(d, vdev->irq); + else if ( has_vpic(d) ) /* HVM */ hvm_isa_irq_deassert(d, vdev->irq); else ASSERT_UNREACHABLE(); @@ -889,6 +893,17 @@ static int cf_check ns16550_init(struct domain *d, return rc; } + /* Claim virtual IRQ */ + write_lock(&d->event_lock); + rc = map_domain_emuirq_pirq(d, r->addr, IRQ_EMU); + write_unlock(&d->event_lock); + if ( rc ) + { + pr_err("%s: virtual IRQ#%"PRIu64": cannot claim: %d\n", + desc->name, r->addr, rc); + return rc; + } + vdev->irq = r->addr; } else @@ -919,12 +934,20 @@ static int cf_check ns16550_init(struct domain *d, static void cf_check ns16550_deinit(struct domain *d) { struct vuart_ns16550 *vdev = d->arch.hvm.vuart; + int rc; if ( !vdev ) return; spin_lock(&vdev->lock); + rc = unmap_domain_pirq_emuirq(vdev->owner, vdev->irq); + if ( rc ) + { + pr_err("%s: virtual IRQ#%d: cannot unclaim: %d\n", + vdev->name, vdev->irq, rc); + } + ns16550_fifo_tx_flush(vdev); spin_unlock(&vdev->lock); diff --git a/xen/drivers/passthrough/x86/hvm.c b/xen/drivers/passthrough/x86/hvm.c index a2ca7e0e570c..22905cd86f95 100644 --- a/xen/drivers/passthrough/x86/hvm.c +++ b/xen/drivers/passthrough/x86/hvm.c @@ -924,12 +924,11 @@ static void hvm_gsi_eoi(struct domain *d, unsigned int gsi) { struct pirq *pirq = pirq_info(d, gsi); - /* Check if GSI is actually mapped. */ - if ( !pirq_dpci(pirq) ) - return; - hvm_gsi_deassert(d, gsi); - hvm_pirq_eoi(pirq); + + /* Check if GSI is actually mapped. */ + if ( pirq_dpci(pirq) ) + hvm_pirq_eoi(pirq); } static int cf_check _hvm_dpci_isairq_eoi( -- 2.34.1
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |