From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-20.2 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id F2072C64E90 for ; Tue, 1 Dec 2020 00:00:27 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 73551207F7 for ; Tue, 1 Dec 2020 00:00:27 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=citrix.com header.i=@citrix.com header.b="NhZO8mh9" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 73551207F7 Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=citrix.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from list by lists.xenproject.org with outflank-mailman.41530.74736 (Exim 4.92) (envelope-from ) id 1kjt5U-0002SR-HB; Tue, 01 Dec 2020 00:00:08 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 41530.74736; Tue, 01 Dec 2020 00:00:08 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kjt5U-0002Rl-Dc; Tue, 01 Dec 2020 00:00:08 +0000 Received: by outflank-mailman (input) for mailman id 41530; Tue, 01 Dec 2020 00:00:07 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kjt5S-0002OY-TW for xen-devel@lists.xenproject.org; Tue, 01 Dec 2020 00:00:06 +0000 Received: from esa3.hc3370-68.iphmx.com (unknown [216.71.145.155]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 096d6e64-5b30-4155-aa85-4458a9364139; Tue, 01 Dec 2020 00:00:05 +0000 (UTC) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 096d6e64-5b30-4155-aa85-4458a9364139 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1606780805; h=from:to:cc:subject:date:message-id:mime-version; bh=vNn3KP4WjXfpM6kbKGzfo/xBCJOMYjHp8/tp6Or9F/g=; b=NhZO8mh9zIwJsBQpqe//G7KWsB9puQss7x9grCN//TMGotWEFyuka0ml fpCB0jZ1qf5mUvNo9n/3yoH1xwTYtjt2eEp4vxn75HjwlJrTIA9Cd4XxU fZhbBFKyXCRiZqRDT+iisUH3lTAixcjgEw3kKRHWmBsYopRjbRkRPVAWZ w=; Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none IronPort-SDR: MU1q1OVfNhGAOCZ8vgWjDcDNyKxtTuhjZRCeMCqhSdbGBsEb+15fHdFnJqr4FqaXxl2gdjig/5 /o2v4nmXgA07JIYyR1sII3kO4VvHP5nW2xd8gnbV/r4gbvx96kgwDbvu8tARPZ3Gb6aGCN7KwE LVm0CHoUXxNimPHC+lpKMjLBENjDi1fx+2xwuDEZNBF1iuL4Cw8vuOFTccFqWyvkPCRezoXwsG kV8HhjGjTu51Lu/BvFmK66UeLPABPtHMcXZq/LY1TbSBACc31crIARIqZCIsCYSczNUQxZOYRI IgQ= X-SBRS: None X-MesageID: 32183726 X-Ironport-Server: esa3.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.78,382,1599537600"; d="scan'208";a="32183726" From: Igor Druzhinin To: CC: , , , , Igor Druzhinin Subject: [PATCH] x86/IRQ: bump max number of guests for a shared IRQ to 31 Date: Mon, 30 Nov 2020 23:59:37 +0000 Message-ID: <1606780777-30718-1-git-send-email-igor.druzhinin@citrix.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain Current limit of 7 is too restrictive for modern systems where one GSI could be shared by potentially many PCI INTx sources where each of them corresponds to a device passed through to its own guest. Some systems do not apply due dilligence in swizzling INTx links in case e.g. INTA is declared as interrupt pin for the majority of PCI devices behind a single router, resulting in overuse of a GSI. Signed-off-by: Igor Druzhinin --- If people think that would make sense - I can rework the array to a list of domain pointers to avoid the limit. --- xen/arch/x86/irq.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c index 8d1f9a9..194f660 100644 --- a/xen/arch/x86/irq.c +++ b/xen/arch/x86/irq.c @@ -1028,7 +1028,7 @@ int __init setup_irq(unsigned int irq, unsigned int irqflags, * HANDLING OF GUEST-BOUND PHYSICAL IRQS */ -#define IRQ_MAX_GUESTS 7 +#define IRQ_MAX_GUESTS 31 typedef struct { u8 nr_guests; u8 in_flight; -- 2.7.4