From patchwork Wed Jun 10 11:51:01 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: =?utf-8?q?Roger_Pau_Monn=C3=A9?= X-Patchwork-Id: 11597591 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id BD7DC14B7 for ; Wed, 10 Jun 2020 11:52:02 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id A1E282074B for ; Wed, 10 Jun 2020 11:52:02 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org A1E282074B Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=citrix.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1jizGV-000899-TQ; Wed, 10 Jun 2020 11:51:31 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1jizGV-000894-6y for xen-devel@lists.xenproject.org; Wed, 10 Jun 2020 11:51:31 +0000 X-Inumbo-ID: b9087e7c-ab10-11ea-bb8b-bc764e2007e4 Received: from esa5.hc3370-68.iphmx.com (unknown [216.71.155.168]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id b9087e7c-ab10-11ea-bb8b-bc764e2007e4; Wed, 10 Jun 2020 11:51:30 +0000 (UTC) Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none IronPort-SDR: zyLzOg9ydrdn0dJqs8dyKEpfPc+S21qCZ+0o6D50510o/5EcECpCCGeXcha8dPI4Y3E+hpBWHK jBGoC+3wrl7kFcWmdRSICWTgQGEEsbMYXgvIqVnpa+gRRJ4XZVf0Ip+ag+l/MH4r70+QtUIcAM fhpmP67Xr6NjOovJgPv2aa95VyOxlwRzJ34JGPxBzTDNvtz+weOb/GXSzQCmH1D1wPXfe3TOM8 CSWWP448HRBWbfVtk3dBlBRbP9XMjwkwk1pWl8K/qP3piyqvKVtT/5Xbc668tQc7JzDuoK9Sh1 z6I= X-SBRS: 2.7 X-MesageID: 19915504 X-Ironport-Server: esa5.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.73,495,1583211600"; d="scan'208";a="19915504" From: Roger Pau Monne To: Subject: [PATCH for-4.14 0/2] x86/passthrough: fixes for PVH dom0 edge triggered interrupts Date: Wed, 10 Jun 2020 13:51:01 +0200 Message-ID: <20200610115103.7592-1-roger.pau@citrix.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Andrew Cooper , Roger Pau Monne , Wei Liu , Jan Beulich , paul@xen.org Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" Hello, Small series with two bugfixes to correctly handle edge triggered interrupts on PVH dom0. for-4.14 reasoning: fixes are isolated to PVH dom0 specific passthrough code (IDENTITY_GSI kind of bindings), and hence shouldn't affect passthrough to HVM domUs. Without these fixes the RTC timer won't work correctly on a PVH dom0 because it's edge triggered (GSI 8). Roger Pau Monne (2): x86/passthrough: do not assert edge triggered GSIs for PVH dom0 x86/passthrough: introduce a flag for GSIs not requiring an EOI or unmask xen/arch/x86/hvm/irq.c | 13 ++++++++----- xen/drivers/passthrough/io.c | 14 +++++++++++++- xen/include/asm-x86/hvm/irq.h | 2 ++ 3 files changed, 23 insertions(+), 6 deletions(-)