]> xenbits.xensource.com Git - people/vhanquez/xen.git/commitdiff
xen: __hvm_pci_intx_assert should check for gsis remapped onto pirqs
authorStefano Stabellini <stefano.stabellini@eu.citrix.com>
Wed, 31 Aug 2011 14:32:47 +0000 (15:32 +0100)
committerStefano Stabellini <stefano.stabellini@eu.citrix.com>
Wed, 31 Aug 2011 14:32:47 +0000 (15:32 +0100)
If the isa irq corresponding to a particular gsi is disabled while the
gsi is enabled, __hvm_pci_intx_assert will always inject the gsi
through the violapic, even if the gsi has been remapped onto a pirq.
This patch makes sure that even in this case we inject the
notification appropriately.

Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
xen-unstable changeset:   23807:2297b90a6a7b
xen-unstable date:        Wed Aug 31 15:23:34 2011 +0100

xen/arch/x86/hvm/irq.c

index f560e392e6b6e9f1e2ad2ce72b16e2d3ff672df0..acc9197f42cec795dd667a763cf737bc795780d5 100644 (file)
@@ -28,7 +28,7 @@
 #include <asm/hvm/support.h>
 
 /* Must be called with hvm_domain->irq_lock hold */
-static void assert_irq(struct domain *d, unsigned ioapic_gsi, unsigned pic_irq)
+static void assert_gsi(struct domain *d, unsigned ioapic_gsi)
 {
     int pirq = domain_emuirq_to_pirq(d, ioapic_gsi);
     if ( hvm_domain_use_pirq(d, pirq) )
@@ -37,6 +37,11 @@ static void assert_irq(struct domain *d, unsigned ioapic_gsi, unsigned pic_irq)
         return;
     }
     vioapic_irq_positive_edge(d, ioapic_gsi);
+}
+
+static void assert_irq(struct domain *d, unsigned ioapic_gsi, unsigned pic_irq)
+{
+    assert_gsi(d, ioapic_gsi);
     vpic_irq_positive_edge(d, pic_irq);
 }
 
@@ -61,7 +66,7 @@ static void __hvm_pci_intx_assert(
 
     gsi = hvm_pci_intx_gsi(device, intx);
     if ( hvm_irq->gsi_assert_count[gsi]++ == 0 )
-        vioapic_irq_positive_edge(d, gsi);
+        assert_gsi(d, gsi);
 
     link    = hvm_pci_intx_link(device, intx);
     isa_irq = hvm_irq->pci_link.route[link];