virt/irqcon.rs
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.
//! Types related to supporting an interrupt controller.
pub use x86defs::apic::DeliveryMode;
use hvdef::HvInterruptType;
use hvdef::Vtl;
use inspect::Inspect;
use parking_lot::Mutex;
use std::fmt::Debug;
use std::sync::Arc;
use vm_topology::processor::VpIndex;
use vmcore::line_interrupt::LineSetTarget;
use x86defs::msi::MsiAddress;
use x86defs::msi::MsiData;
/// Trait for an interrupt controller that can deliver MSIs from an IO-APIC.
///
/// This is used to map line interrupts, which may be level triggered. Some
/// hypervisors (notably KVM) will not generate EOI exits for a
/// level-triggered interrupt request unless the request has been registered
/// as a route on one of the IO-APIC IRQs.
pub trait IoApicRouting: Send + Sync {
/// Sets the associated interrupt request for the given irq.
fn set_irq_route(&self, irq: u8, request: Option<MsiRequest>);
/// Asserts the given irq, using the route established by `set_irq_route`.
fn assert_irq(&self, irq: u8);
}
/// Trait for controlling interrupt states on a GICv3 interrupt controller.
pub trait ControlGic: Send + Sync {
/// Sets the assertion state of a GICv3 SPI.
fn set_spi_irq(&self, irq_id: u32, high: bool);
}
// The number of IRQ lines for the interrupt controller.
pub const IRQ_LINES: usize = 24;
/// An message-signaled interrupt request.
#[derive(Debug, Copy, Clone, Inspect)]
pub struct MsiRequest {
/// The MSI address.
#[inspect(hex)]
pub address: u64,
/// The data payload.
#[inspect(hex)]
pub data: u32,
}
impl MsiRequest {
/// Creates a new MSI request for an x86 system.
pub fn new_x86(
mode: DeliveryMode,
destination: u32,
is_logical_destination: bool,
vector: u8,
is_level_triggered: bool,
) -> Self {
let address = MsiAddress::new()
.with_address(x86defs::msi::MSI_ADDRESS)
.with_redirection_hint(mode == DeliveryMode::LOWEST_PRIORITY)
.with_virt_destination(destination as u16)
.with_destination_mode_logical(is_logical_destination);
let data = MsiData::new()
.with_vector(vector)
.with_delivery_mode(mode.0 & 0x7)
.with_assert(is_level_triggered)
.with_trigger_mode_level(is_level_triggered);
Self {
address: u32::from(address).into(),
data: data.into(),
}
}
/// Interprets the MSI address and data as an x86 MSI request.
pub fn as_x86(&self) -> (MsiAddress, MsiData) {
(
MsiAddress::from(self.address as u32),
MsiData::from(self.data),
)
}
/// Constructs an interrupt control for sending this interrupt request to a
/// Microsoft hypervisor.
///
/// Note that this may produce an invalid interrupt control that the
/// hypervisor will reject.
pub fn hv_x86_interrupt_control(&self) -> hvdef::HvInterruptControl {
let (address, data) = self.as_x86();
let ty = match DeliveryMode(data.delivery_mode()) {
DeliveryMode::FIXED => HvInterruptType::HvX64InterruptTypeFixed,
DeliveryMode::LOWEST_PRIORITY => HvInterruptType::HvX64InterruptTypeLowestPriority,
DeliveryMode::SMI => HvInterruptType::HvX64InterruptTypeSmi,
DeliveryMode::REMOTE_READ => HvInterruptType::HvX64InterruptTypeRemoteRead,
DeliveryMode::NMI => HvInterruptType::HvX64InterruptTypeNmi,
DeliveryMode::INIT => HvInterruptType::HvX64InterruptTypeInit,
DeliveryMode::SIPI => HvInterruptType::HvX64InterruptTypeSipi,
// Use an invalid interrupt type to force the hypervisor to reject
// this. Since other combinations of interrupt parameters are
// invalid and we are deferring that validation to the hypervisor,
// there is no reason to special case this one and add a failure
// path from this function.
_ => HvInterruptType(!0),
};
hvdef::HvInterruptControl::new()
.with_interrupt_type(ty)
.with_x86_level_triggered(data.trigger_mode_level())
.with_x86_logical_destination_mode(address.destination_mode_logical())
}
}
/// A set of IRQ routes.
///
/// This is used to implement [`IoApicRouting`] when the backing hypervisor does
/// not require such routes internally.
#[derive(Debug, Inspect)]
pub struct IrqRoutes {
#[inspect(
with = "|x| inspect::adhoc(|req| inspect::iter_by_index(x.lock().iter()).inspect(req))"
)]
routes: Mutex<Vec<Option<MsiRequest>>>,
}
impl Default for IrqRoutes {
fn default() -> Self {
Self::new()
}
}
impl IrqRoutes {
pub fn new() -> Self {
let routes = vec![None; IRQ_LINES];
Self {
routes: Mutex::new(routes),
}
}
/// Sets the associated interrupt request for the given irq.
pub fn set_irq_route(&self, irq: u8, request: Option<MsiRequest>) {
self.routes.lock()[irq as usize] = request;
}
/// Asserts the given irq, using the route established by `set_irq_route`.
///
/// Calls `assert` to deliver the interrupt.
pub fn assert_irq(&self, irq: u8, assert: impl FnOnce(MsiRequest)) {
let request = self.routes.lock()[irq as usize];
match request {
Some(request) => {
assert(request);
}
None => {
tracelimit::warn_ratelimited!(irq, "irq for masked interrupt");
}
}
}
}
/// A [`LineSetTarget`] implementation that raises APIC local interrupt lines.
pub struct ApicLintLineTarget<T> {
partition: Arc<T>,
vtl: Vtl,
}
impl<T: crate::X86Partition> ApicLintLineTarget<T> {
/// Creates a new APIC LINT line set target.
pub fn new(partition: Arc<T>, vtl: Vtl) -> Self {
Self { partition, vtl }
}
}
impl<T: crate::X86Partition> LineSetTarget for ApicLintLineTarget<T> {
fn set_irq(&self, vector: u32, high: bool) {
if !high {
return;
}
let vp_index = VpIndex::new(vector / 2);
let lint = vector % 2;
self.partition.pulse_lint(vp_index, self.vtl, lint as u8);
}
}