Re: Linux mask_msi_irq() question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Aug 23, 2010 at 08:59:25PM -0700, Kanoj Sarcar wrote:
...
> I did go over the specs some, two points of reference:
> 
> a. PCIE base spec rev 3.0 version .71 released May 25, 2010:
> section 2.4.1 table D2a ensures posted write (such as msix
> write issued by device) does not pass read completion issued
> by device (such as read-completion for MSIX entry mask).
> 
> b. MSIX ECN comments (section 6.8): "An MSI-X vector is
> masked when its associated MSI-X Table entry Mask bit or the
> MSI-X Function Mask bit is set. While a vector is masked,
> the function is prohibited from sending the associated message,
> and the function must set the associated Pending bit whenever
> the function would otherwise send the message."
> 
> Given these two, roughly the host action of "write entry mask";
> "read entry mask" _should_ apparently provide a interrupt barrier.

Yes, it will make sure one can mask MSI and not drop the MSI signal.
I don't believe it provides any sort of barrier. In flight MSIs
still need to be dealt with on the host side.

> 
> But if you wanted to play the devil's advocate, in the
> comment b. above, "While a vector is masked" is not clearly
> defined; IE if the host does a pio write to mask, then
> reads back the mask (which is to a certain extent orthogonal
> to device noticing and acting on the mask change), does MSIX
> spec actually require the device to provide an interrupt
> barrier?

Is the mask exposed via IO Port space? I don't think so.
So I don't think there is a 'PIO vs MMIO' race possible here.

> Like you mention, there are already chipset issues
> anyway.
> 
> Also, what happens if the flushing read is deleted? Since
> this is being invoked on every MSIX reception on host (at
> least on x86[_64]), it is rather a costly operation. IE, if
> the read is removed, and an interrupt does creep in, what are
> the problems? Kernel panic, NMI etc? IE does some piece of
> kernel code (irq rebalance etc) actually rely on the barrier?

Kernel could panic if the interrupt handler is invoked when it
shouldn't be.  e.g. data structures have been deallocated and
pointers to those structures set to NULL. I'm doubtful this would
cause an NMI/MCA unless some DMA or MMIO state was changed as a
result of the interrupt (which is actually more likely than
I originally thought).

I suspect any code that mucks with interrupt state would also depend
on the interrupt not triggering at that moment.

cheers,
grant
--
To unsubscribe from this list: send the line "unsubscribe linux-pci" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [DMA Engine]     [Linux Coverity]     [Linux USB]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [Greybus]

  Powered by Linux