On 10/10/2018 14:47, Thomas Gleixner wrote:
On Wed, 10 Oct 2018, David Woodhouse wrote:
On Wed, 2018-10-10 at 14:30 +0200, Thomas Gleixner wrote:
On Wed, 10 Oct 2018, David Woodhouse wrote:
On Mon, 2018-10-01 at 09:16 +0200, Juergen Gross wrote:
/* If irq pending already clear it and return. */
/* Guard against reentry. */
local_irq_save(flags);
/* If irq pending already clear it. */ if (xen_test_irq_pending(irq)) { xen_clear_irq_pending(irq);
return;
} else if (READ_ONCE(*byte) == val) {
/* Block until irq becomes pending (or a spurious wakeup) */
xen_poll_irq(irq); }
Does this still allow other IRQs to wake it from xen_poll_irq()?
In the case where process-context code is spinning for a lock without disabling interrupts, we *should* allow interrupts to occur still... does this?
Yes. Look at it like idle HLT or WFI. You have to disable interrupt before checking the condition and then the hardware or in this case the hypervisor has to bring you back when an interrupt is raised.
If that would not work then the check would be racy, because the interrupt could hit and be handled after the check and before going into HLT/WFI/hypercall and then the thing is out until the next interrupt comes along, which might be never.
Right, but in this case we're calling into the hypervisor to poll for one *specific* IRQ. Everything you say is true for that specific IRQ.
My question is what happens to *other* IRQs. We want them, but are they masked? I'm staring at the Xen do_poll() code and haven't quite worked that out...
Ah, sorry. That of course has to come back like HLT/WFI for any interrupt, but I have no idea what the Xen HV is doing there.
The Xen HV is doing it right. It is blocking the vcpu in do_poll() and any interrupt will unblock it.
Juergen