The present application is related to the following copending patent applications, which are assigned to the assignee hereof, filed on even date herewith, and incorporated herein by reference in their entireties:
1. Technical Field
The present invention relates in general to data processing, and in particular, to input/output (I/O) in a data processing system.
2. Description of the Related Art
A data processing system may include multiple processing elements and multiple input/output adapters (IOAs) to support connections to communication networks, storage devices and/or storage networks, and peripheral devices. In such data processing systems, the hardware resources of the data processing system may be logically partitioned into multiple, non-intersecting sets of resources, each controlled by a respective one of multiple possibly heterogeneous operating system instances. The operating systems concurrently execute on this common hardware platform in their respective logical partitions (LPARs) under the control of system firmware, which is referred to as a virtual machine monitor (VMM) or hypervisor. Thus, the hypervisor allocates each LPAR a non-intersecting subset of the resources of the data processing system, and each operating system instance in turn directly controls its distinct set of allocable resources, such as regions of system memory and IOAs.
In any environment including multiple IOAs, it is desirable to isolate IOAs so that each IOA can only obtain access to the resources allocated to it. Isolating IOAs promotes reliability, availability and serviceability of the data processing system, and is especially important in environments supporting hardware virtualization (or logical partitioning), so that IOAs can be individually allocated to different logical partitions (LPARs) and so that any IOA errors be isolated to the particular partition to which the IOA is allocated. For example, for Peripheral Component Interconnect (PCI) buses, if an IOA in one LPAR activates the System Error (SERR) signal, the system must make the SERR signal visible to all other LPARs absent some additional control. Making I/O errors visible across LPAR boundaries requirement is, of course, contrary to the definition and intent of logical partitioning.
One solution that addresses the partitioning problem with PCI errors is to require assignment of all IOAs connected to one PCI Host Bridge (PHB) to the same LPAR partition. However, this restriction mandates a high resource granularity for IOAs that is not very useful or flexible. Ideally, IOAs should be allocable to different LPARs regardless of the PHB to which the IOA is connected. Alternative solutions include the use of specially designed bridge chips external to the PHBs as described in U.S. Pat. No. 6,643,727 or incorporating additional logic and data structures to enforce partitioning between IOAs in differing LPARs within PHBs as described in U.S. Pat. No. 7,398,427.
As also appreciated by the present disclosure, it would be desirable to reduce the size of data structures within PHBs utilized in handling routine messages, such as DMA messages, interrupt messages, and I/O error message.
In at least one embodiment, a data processing system includes a processor core, a system memory, coupled to the processor core, that includes an interrupt data structure including a plurality of entries each associated with a respective one of a plurality of interrupts. An input/output (I/O) subsystem including at least one I/O host bridge and a plurality of partitionable endpoints (PEs) each having an associated PE number. The I/O host bridge, responsive to receiving a message signaled interrupt (MSI) including at least a message address, determines from the message address a system memory address of a particular entry among the plurality of entries in the interrupt data structure, accesses the particular entry, and, based upon contents of the particular entry, validates authorization of an interrupt source to issue the MSI and presents an interrupt associated with the particular entry for service.
With reference now to the figures, and in particular with reference to
In the depicted embodiment, each processor 102 is preferably realized as a single integrated circuit chip having a substrate in which semiconductor circuitry is fabricated as is known in the art. As shown, processor 102 includes a plurality of processor cores 110 that process data through the execution and/or processing of program code, which may include, for example, software and/or firmware and associated data, if any. Processor 102 further includes cache memory 112 providing one or more levels of relatively low latency temporary storage for instructions and data retrieved from lower levels of the data storage hierarchy. In addition, processor 102 includes an integrated memory controller 114 that controls access to an associated one of off-chip system memories 116.
Each processor 102 further includes a fabric interface (FIF) by which processor 102 communicates with system fabric 104, as well as one or more (and preferably multiple) host bridges supporting input/output communication with various input/output adapters (IOAs) 130. In the depicted embodiment, all of the host bridges are implemented as Peripheral Component Interconnect (PCI) host bridges (PHBs) 120, but in other embodiments the host bridges may implement one or more additional or alternative I/O bus standards.
PHBs 120a, 120k, 120m and 120v provide interfaces to PCI local buses 122a, 122k, 122m and 122v, respectively, to which IOAs 130, such as network adapters, storage device controllers, peripheral adapters, etc., may be directly connected or indirectly coupled. For example, PCI IOA 130a is coupled to PCI local bus 122a optionally through an I/O fabric 124a, which may comprise one or more switches and/or bridges. In a similar manner, PCI IOAs 130k and 130l are coupled to PCI local bus 122k optionally through an I/O fabric 124k, PCI IOA 130m is coupled to PCI local bus 122m optionally through I/O fabric 124m, and PCI IOAs 130v and 130w, which may comprise, for example, a display adapter and hard disk adapter, are coupled to PCI local bus 122v optionally through I/O fabric 124v.
Data processing system 100 further includes a service processor 140 that manages the boot process of data processing system 100 and thereafter monitors and reports on the performance of and error conditions detected in data processing system 100. Service processor 140 is coupled to system fabric 104 and is supported by a local memory 142, which may include volatile (e.g., dynamic random access memory (DRAM)) and non-volatile memory (e.g., non-volatile random access memory (NVRAM) or static random access memory (SRAM)). Service processor 140 is further coupled to a mailbox interface 144 through which service processor 140 communicates I/O operations with PCI bus 122a.
Those of ordinary skill in the art will appreciate that the architecture and components of a data processing system can vary between embodiments. For example, other devices and interconnects may alternatively or additionally be used. Accordingly, the exemplary data processing system 100 given in
Referring now to
Data processing system 200 has a collection of partitioned hardware 202, including processors 102a-102n, system memories 116a-116n and IOAs 130a-130w. Partitioned hardware 202 may of course include additional unillustrated components, such as additional volatile or nonvolatile storage devices, ports, bridges, switches, etc. The hardware components comprising partitioned hardware 202 (or portions thereof) can be assigned to various ones of logical partitions (LPARs) 210a-210p in data processing system 200 by system firmware 204, also referred to herein as a virtual machine monitor (VMM) or hypervisor. System firmware 204 supports the simultaneous execution of multiple independent operating system instances by virtualizing the partitioned hardware of data processing system 200.
In addition to the hardware resources allocated by system firmware 204, each of LPARs 210a-210p includes a respective one of multiple concurrently executed operating system instances 212a-212p. In various embodiments, operating system instances 212a-212p, which may include, for example, instances of Linux™, AIX™ and/or Windows™, may be homogeneous or heterogeneous. Each LPAR 210 may further include unillustrated application programs, as well as a respective instance of partition firmware 214, which may be implemented, for example, with a combination of initial boot strap code, IEEE-1275 Standard Open Firmware, and runtime abstraction software (RTAS). When LPARs 210a-210p are instantiated, a copy of boot strap code is loaded onto partitions 210a-210p by system firmware 204. Thereafter, system firmware 204 transfers control to the boot strap code, which in turn loads the open firmware and RTAS. The processor(s) 102 assigned to each LPAR 210 then execute the partition firmware 214 of that LPAR 210 to bring up the LPAR 210 and initiate execution of the OS instance 212.
In the logically partitioned environment depicted in
In a logical partitioned environment such as that depicted in
To support such isolation between the resources of different LPARs 210, the I/O subsystem of a data processing system is subdivided into multiple partitionable endpoints. A “partitionable endpoint” or “PE” is defined herein as any component or subcomponent of an I/O subsystem that can be allocated to an LPAR independently of any other component or subcomponent of the I/O subsystem. For example, some PEs may comprise a plurality of IOAs and/or I/O fabric components that function together and, thus, should be allocated as a unit to a single LPAR. Another PE, however, may comprise a portion of a single IOA, for example, a separately configurable and separately assignable port of a multi-port IOA. In general, a PE will be identified by its function rather than by its structure.
Referring now to
In the depicted embodiment, I/O subsystem 300 includes a PHB 120 coupled to a plurality of IOAs 302a-302g through an I/O fabric 124. I/O fabric 124 in turn includes switches 310a, 310b. PCI-Express (PCI-E) buses 320, 322, 324 and 326, PCI bridges 312a and 312b, and secondary buses 340, 342, 344 and 346.
As further shown in
In I/O subsystem 300, the respective state of each PE, referred to herein as the partitionable endpoint state, is maintained in the associated PHB 120. Thus, for example, PHB 120 of I/O subsystem 300 includes partitionable endpoint state registers 360a-360d, which correspond to and indicate the states of PEs 350a-350d, respectively.
System firmware 204 assigns each PE one or more domain numbers (or requester IDs (RIDs)) that associate its component(s) with that PE. In an exemplary embodiment, the domain number (i.e., RID) assigned each PE comprises a plurality of fields that can further be used to differentiate between I/O components in the PE. For example, these fields may include:
As will be appreciated, the domain number (or RID) supports the division of I/O resources down to the lowest level of functionality. For example, the domain number allows separate functions of a multiple function IOA to be differentiated. In data processing systems that do not require such a fine granularity, the domain number can be defined by the Bus field alone, allowing differentiation between the PEs connected to the same PHB, or by the Bus field together with either the Dev field or the Func field to permit differentiation between IOAs of a PE or differentiation between functions of an IOA in a PE that contains a multiple function LOA. The sparseness of the domain number space consisting of the Bus, Bus/Dev, or Bus/Dev/Func fields makes it desirable in many cases to condense the domain number space defined by these fields to something less sparse for internal usage by the PHB 120.
Among the isolation functionalities included in PHB 120 of
In order to achieve error handling in accordance with these criteria, each PHB preferably provides isolation functionality that identifies a particular error domain for an I/O configuration operation. In a preferred embodiment, the configuration operation error domain capability is enabled by implementing a configuration PE number field in a register of the PHB, which field can be set by the system firmware. In addition, in a preferred embodiment, each PHB determines one or more PE numbers affected by an I/O message and routes the I/O message to only software specific to controlling those PE(s).
In addition to providing effective isolation functionality, it is also desirable to reduce the size of data structures within PHBs utilized in handling routine messages, such as DMA messages, interrupt messages (i.e., message signaled interrupts (MSIs)), and I/O error messages, particularly in embodiments in which PHBs are integrated into a common integrated circuit chip with the processor. Accordingly, as discussed further herein below, the footprint of data structures implemented within PHBs can be reduced by an improved determination of the PE(s) affected by I/O messages, such as DMA, interrupt messages and I/O error messages.
Referring now to
PHB 120 further includes a memory-mapped Force I/O Transaction Register (FITR) 404 that is coupled to receive memory mapped I/O (MMIO) messages from software or firmware executing on processor cores 110. FITR 404, which preferably employs the same bit layout as IOTB 402, thus allows software or firmware to inject an I/O transaction into the stream of I/O transactions just as if the I/O transaction had been generated by one of PEs 350. For example, firmware or software may inject an interrupt into the I/O operation flow so that the PHB will queue up the interrupt and update the interrupt state in the same manner as if an I/O device presented that same interrupt. Alternatively, the software or firmware may want to have PHB 120 re-queue an interrupt that the software or firmware cannot process at the current time. Similarly, the software or firmware may want to use PHB 120 to manage writing or reading data to or from system memory 116, such that the memory access operation uses the hardware of PHB 120 in the same way as if a DMA transaction was received from an I/O device. Injection of a DMA transaction in the manner could be useful, for example, in testing the DMA handling capabilities of PHB 120.
FITR 404 and IOTB 402 are each coupled to an input of a two-input multiplexer (mux) 406, which selects among the I/O transactions presented by FITR 404 and IOTB 402 for processing, for example, utilizing a round robin or other prioritization methodology as in known in the art. Multiplexer 406 passes an I/O transaction selected for processing to decode logic 410, which decodes the I/O transaction and presents the I/O transaction to the appropriate state machine of PHB 120 for handling.
In the depicted embodiment, PHB 120 includes a DMA state machine 420 having an associated DMA state 422, an error state machine 430 having an associated error state 432, and an interrupt state machine 440 having an associated interrupt state 442. In response to decoding an I/O transaction, decode logic 410 invokes the appropriate one of state machines 420, 430 and 440, which in turn performs the appropriate operation and updates its associated state 422, 432, or 442, as appropriate. As shown, in servicing I/O transactions, DMA state machine 420 transmits DMA commands to the relevant IMCs 114, while error state machine 430 and interrupt state machine 440 communicate errors and interrupts, respectively, to software and/or firmware 204 or 214 executing on processor cores 110.
With reference now to
The illustrated process begins at block 500 and then proceeds to block 502, which depicts firmware or software determining to inject an I/O transaction into the I/O transaction flow of a PHB 120. The firmware or software builds the image of the I/O transaction to be written into FITR 404 at block 504, and at block 506, issues one or more MMIO Store operations to store the image of the I/O transaction into FITR 404. The process thereafter terminates at block 508.
Referring now to
PHB 120 additionally determines at block 616 whether or not there are any more I/O transactions to be processed, either in FITR 404 or the IOTB 402. If so, the process returns to block 604, which has been described. If not, the process depicted in
Referring now to
PHB 700 validates RIDs of Direct Memory Access (DMA) requests and translates RIDs to particular PEs by reference to TVT 702. As shown, PHB 700 receives a Direct Memory Access (DMA) packet including a RID 710 (which comprises a bus number, a device number and a function number) and a DMA address 712. Several bits of DMA address 712 form a TVE index (TVEI) 717 into TVT 702 that selects a particular TVE 704 for access. Once the TVE 704 is selected, the content of PE# field 732 is read out to determine the current state of the PE. In addition, the content of RID and RID Validate Control field 730 is compared with incoming RID 710 as shown at block 720. If RID 710 does not match the RID specified in field 730, PHB 700 does not permit the requested DMA operation to be performed. As indicated at block 722, PHB 700 also truncates the low order n bits of DMA address 712 (where 2″ is the I/O page size specified by I/O page size field 736 of the selected TVE 704) and compares the remaining DMA address bits below TVEI 717 with TCE table size field 737 of the selected TVE 704. If DMA address 712 specifies an address past the end of the relevant TCE table, PHB 700 disallows the DMA operation. If, on the other hand, the validations shown at block 720 and 722 are successful, PHB 700 performs the requested DMA operation utilizing the DMA address-to-real address translation contained in the in-memory TCE table for the PE, which is pointed to by the contents of TCE start address field 738.
It should be noted that the conventional TVE 704 depicted in
With reference now to
In the arrangement shown in
The operation of PHB 120 in servicing a DMA request will now be described with reference to
Following block 906, the process of
A similar technique for providing isolation between PEs while minimizing the size of data structures in PHBs 120 is also applicable to the isolation of I/O error messages, as discussed further below with reference to
With reference first to
In the prior art, PHB 700 receives a PCIe error message 1004 together with a RID 710 identifying which I/O component is the source of PCIe error message 1004. In response, PHB 700 utilizes RID 710 to perform a CAM access to PELT 1000 to identify a matching PELE 1002 containing a matching RID in its RID and RID Validate Control field 1010. PHB 700 then processes the PCIe error message for each PE specified by the PELV field 1012 of the matching PELE 1002.
Referring now to
Consequently, in the arrangement shown in
The operation of PHB 120 in handling an I/O error message will now be described with additional reference to the high level logical flowchart provided in
Next, at block 1208, PHB 120 (e.g., error state machine 430) determines which PEs are affected by the I/O error by examining which bit or bits are set in the PELV field 1104 of the selected PELE 1102 in PELT 1100. In response to the determination of the affected PE(s), error state machine 430 in PHB 120 signals the I/O error as appropriate to only the error handling software or firmware (e.g., device driver software of one or more OSs 212) responsible for handling errors for the affected PE(s) (block 1210). The error handing process then completes at block 1212.
With reference now to
Each MVE 1312 in MVT 1310 contains a number of fields, which as indicated in
PHB 700 additionally utilizes the low order bits of DMA data 1302 as an eXternal interrupt Vector Entry (XIVE) index to select an XIVE 1322 in an eXternal Interrupt Vector Table (XIVT) 1320 in PHB 700. The selected XIVE 1320 contains interrupt information and state, as well as the PE number that is allowed to access the interrupt represented by the XIVE 1322. As indicated at block 1330, PHB 700 validates the PE number obtained from the selected XIVE 1322 and the selected MVE 1322, and if the two PE numbers do not match, the MSI is ignored. However, if PHB 700 successfully validates the PE#, PHB 700 presents the interrupt information to the system based on the state information in the selected XIVE 1322.
The conventional structures and MSI handling techniques employed by PHB 700 have the disadvantage of implementing a 16-bit RID and associated RID control bits in each MVE 1312, thus requiring considerable die area for MVT 1310. In addition, PHB 700 is required to internally track the entire state of each interrupt, including clearing of that state when the interrupt is signaled by the system as complete.
Referring now to
As with the DMA and I/O error messages described above, PHB 120 employs RID 710 as a direct index to select an RTE 802 of RTT 800, either from RTT 800 itself or from RTC 804 (if implemented). The selected RTE 802 has a single field containing the PE# associated with RID 710 of the incoming MSI. It should be noted by comparison to the prior art MVE 1312 shown in
Interrupt state machine 440 includes combinational logic that performs a logical OR (as shown at reference numeral 1404) or adds portions of the DMA address 1400 and DMA data 1402 to obtain a MSI scalar. For example, in the illustrated embodiment, logical OR 1404 combines the 4 lowest order bits (i.e., bits 3:0) of DMA data 1402 with bits 8:4 of DMA address 1400 to obtain a five-bit MSI scalar. As further shown in
The selected IVE 1412 contains interrupt information and state for the MSI, as well as the PE# allowed to access the MSI represented by the selected IVE 1412. Specifically, as shown in
Still referring to
Because a MST is simply a DMA packet with a particular address, an interrupt source may produce an interrupt vector that is not valid (e.g., that accesses another PE's interrupt). Accordingly, interrupt state machine 440 provides interrupt isolation between PEs by validating that the interrupt source is authorized to access the IVE 1412 and to issue the associated interrupt. To perform this validation, interrupt state machine 440 additionally includes a comparator 1440 that receives and compares the PE# specified by the selected RTE 802 and the PE# specified by PE number field 1428 of the selected IVE 1412. If comparator 1440 detects a match, interrupt state machine 440 presents the interrupt packet to the interrupt presentation layer of data processing system 100 based upon the state information contained in the selected IVE 1412, as discussed further below. If comparator 1440 does not detect a match, interrupt state machine 440 ignores the MSI.
It should be appreciated that the interrupt presentation layer may not be able to accept an interrupt packet presented to it and may consequently reject the interrupt. Accordingly, the interrupt source layer, comprising system memory 116, PHB 120 and interrupt state machine 440, supports queuing and re-presentation of rejected interrupts. In particular, system memory 116 includes a reject bit array (RBA) 1450 identifying rejected interrupts. PHB 120 identifies the physical address of RBA 1450 in system memory 116 in a RBA BAR 1452. PHB 120 additionally includes a reject represent timer (RRT) 1454 and reject represent counter (RRC) 1456 used to control the re-presentation of rejected interrupts as discussed further below with reference to
With reference now to
PHB 120 additionally determines at block 1504 whether or not the PE identified by the PE number obtained from the selected RTE 802 is in the Stopped State by reference to the PE state register 360 of the PE. If PHB 120 determines that the relevant PE is in the Stopped State, PHB 120 ignores the MSI, as indicated at block 1506. Thereafter, the process passes through page connector E, and processing of the MSI terminates at block 1560. If, however, PHB 120 determines at block 1504 that the relevant PE is not in the Stopped State, then decode logic 410 invokes handling of the MSI by interrupt state machine 440 at block 1510.
Block 1510 depicts interrupt state machine 440 determining whether or not the DMA address 1400 specified by the MSI is aligned on an IVE boundary, that is, if the appropriate number of low-order address bits are zeroes. If interrupt state machine 440 determines that the DMA address 1400 is not properly aligned, interrupt state machine 440 places the relevant PE into the Stopped State by setting the appropriate PE state register 360, as shown at block 1512. The process then proceeds to block 1506 and following blocks, which have been described.
Returning to block 1510, if interrupt state machine 440 determines that the DMA address 1400 of the MSI is properly aligned, then interrupt state machine 440 logically combines (e.g., adds or performs a logical OR) the mid-order bits of DMA address 1400 (e.g., bits 19:4) and the low-order bits of DMA data 1402 (e.g., bits 3:0) to form IVE offset 1406 (block 1520). Interrupt state machine 440 then determines at block 1522 whether or not IVT offset 1406 is greater than the length of IVT 1410 specified by IVT length register 1409. If so, then an error is detected, and the process proceeds to block 1512 and following blocks, which have been described.
If interrupt state machine 440 determines at block 1522 that IVE offset 1406 does not exceed the length of IVT 1410 specified by IVT length register 1409, then processing proceeds to block 1524. Block 1524 depicts logical OR 1408 of interrupt state machine 440 logically combining IVE offset 1406 with the base system memory address specified by IVT BAR 1414 to obtain the real address of an IVE 1412, which is then read from system memory 116 by interrupt state machine 440.
Comparator 1440 of interrupt state machine 440 then checks at block 1526 whether or not the PE# in the selected IVE 1412 matches the PE# read from the RTE 802 selected by RID 710. If comparator 1440 does not detect a match, an interrupt isolation error is detected, and the process passes to block 1512 and following blocks, which have been described. If, however, comparator 1440 validates the PE# at block 1526, interrupt state machine 440 handles the MSI in accordance with the states of the P field 1424 and Q field 1426 of the selected IVE 1412, as indicated at block 1530-1534. Specifically, if the P field 1424 and Q field 1426 have values of 00, 01, 10 or 11, processing proceeds to
If P field 1424 and Q field 1426 have values of 00, then following page connector A, interrupt state machine 440 of PHB 120 checks whether or not priority field 1420 is set to 0xFF to designate that the interrupt is disabled. If priority field 1420 is set to indicate that the interrupt is disabled, interrupt state machine 440 set Q field 1426 of IVE 1412 to 1, indicating that an interrupt from the interrupt source corresponding to IVE 1412 is awaiting processing if interrupt processing is enabled (block 1544). Thereafter, processing of the MSI by PHB 120 ends at block 1560.
Returning to block 1540, if interrupt state machine 440 determines that priority field 1420 is set to indicate that the interrupt is enabled (i.e., has a value other than 0xFF), interrupt state machine 440 set P field 1424 of IVE 1412 to 1 (block 1542). In addition, interrupt state machine 440 presents to the interrupt presentation layer an interrupt packet including the priority field 1420 and server number field 1422 from the selected IVE 1412 and an interrupt source number 1407 comprising bits 19:4 of EVE offset 1406. Thereafter, interrupt processing by PHB 120 ends at block 1560.
If P field 1424 and Q field 1426 have values of 01 or 11, then following page connector B or page connector D, interrupt state machine 440 of PHB 120 drops the interrupt because a previous interrupt from the same interrupt source is already queued, as indicated by Q field 1426 (block 1550). Interrupt processing by PHB 120 thereafter ends at block 1560.
If P field 1424 and Q field 1426 have values of 10, then following page connector C, interrupt state machine 440 sets Q field 1426 to 1 in IVE 1412 to indicate the queuing of the interrupt for processing by the interrupt presentation layer. Thereafter, interrupt processing by PHB 120 ends at block 1560.
Referring now to
If P field 1424 and Q field 1426 have values of 00, processing proceeds from page connector F to block 1620 of
If P field 1424 and Q field 1426 have values of 01, software or firmware understands that an interrupt is queued (as indicated by Q field 1426 being set to 1), but no interrupt has yet been presented (as indicated by P field 1424 having a value of 0). Consequently, the process proceeds from page connector G to block 1622, which depicts software or firmware resetting Q field 1426 to 0 in the selected IVE 1412 and queuing the interrupt for processing with the interrupt source number 1407 received from the interrupt presentation layer. The process shown in
If P field 1424 and Q field 1426 have values of 10, then following page connector H, software or firmware resets P field 1424 to 0 in the selected IVE 1412 and queues an interrupt for processing with the interrupt source number 1407 received from the interrupt presentation layer (block 1624). In addition, the software or firmware issues an MMIO Load targeted to a register in PHB 120, which causes the pending write to the Q field 1426 for the specified interrupt source number 1407 to complete prior to the Load returning the data for the targeted register (block 1626). (A pending write to Q field 1426 would indicate that another interrupt from the same interrupt source had been received while a previous interrupt from that interrupt source is being processed.) The software or firmware also issues a Load instruction at block 1628 to obtain the IVE 1412 for the specified interrupt source number 1407 (block 1628). If Q field 1426 has not yet been reset to 0, then the software or firmware processing of the interrupt proceeds through page connector G to block 1622, which has been described. If, however, Q field 1626 has been reset to 0 to indicate that the interrupt has already been queued, then processing of the interrupt ends at block 1650.
If P field 1424 and Q field 1426 have values of 11, then software or firmware recognizes that multiple instances of the same interrupt have occurred and that it is permissible to ignore the duplicates. Therefore, following page connector I, the software or firmware resets P field 1424 to 0 at block 1640. The process then passes through page connector G to block 1622, which has been described.
With reference now to
The illustrated process begins at 1700 in response to receipt by PHB 120 receiving a rejected interrupt from the interrupt presentation layer, for example, in FITR 404. At block 1702, interrupt state machine 440 of PHB 120 records the rejected interrupt by indexing into Reject Bit Array (RBA) 1450 with the interrupt source number 1407 of the rejected interrupt and setting the bit at that location to a 1. Interrupt state machine 440 also determines at block 1704 if the Reject Represent Counter (RRC) 1456 has a count value of 0. If not, the process proceeds to block 1708, which is described below. However, in response to a determination at block 1704 that RRC 1456 has a count value of 0, interrupt state machine 440 initializes RRC 1456 by placing the value present in Reject Represent Timer (RRT) 1454 into RRC 1456. Thereafter, interrupt state machine 440 decrements RRC 1456 (block 1708) and tests to determine if RRC 1456 has reached a count value of 0 (block 1710). If not, meaning that insufficient time has elapse to re-present the rejected interrupt, the process returns to block 1708, which has been described.
Returning to block 1710, in response to a determination that RRC 1456 has reached a count value of 0, meaning that it is time to re-present a previously rejected interrupt, the process proceeds to block 1712. Block 1712 illustrates interrupt state machine 440 of PHB 120 scanning RBA 1450 beginning at the base address identified by RBA BAR 1452 to identify a bit set to 1, which indicates that an interrupt from the interrupt source represented by that bit has been rejected. At block 1714, interrupt state machine 440 resets the bit detected at block 1712 to 0 and uses the index of that bit as an interrupt source number to access the IVE 1412 associated with the interrupt source. Next, interrupt state machine 440 determines at block 1716 if priority field 1420 in the relevant IVE 1412 indicates that the interrupt is disabled (e.g., has a value 0xFF). If so, interrupt state machine 440 sets Q field 1426 in IVE 1412 to a 1 (block 1720), and the process passes to block 1722, which is described below.
Returning to block 1716, if interrupt state machine 440 determines at block 1716 that priority field 1420 does not indicate that the interrupt is disabled, then interrupt state machine 440 sends the interrupt to the interrupt presentation layer using priority field 1420 and server number field 1422 from IVE 1412, as well as bits 19:4 of IVE offset 1406 as interrupt source number 1407. At block 1722, interrupt state machine 440 determines if all bits in RBA 1450 have been scanned, and thus, all rejected interrupts have been processed. If not, the process depicted in
As has been described, in one embodiment, a data processing system includes a processor core, a system memory including a first data structure including a plurality of entries mapping requester identifiers (IDs) to partitionable endpoint (PE) numbers, and an input/output (I/O) subsystem including a plurality of PEs each having an associated PE number, where each of the plurality of PEs including one or more requesters each having a respective requester ID. An I/O host bridge, responsive to receiving an I/O message including a requester ID and an address, determines a PE number by reference to a first entry from the first data structure, and responsive to determining the PE number, accesses a second entry of the second data structure utilizing the PE number as an index and validates the address by reference to the accessed entry in the second data structure. The I/O host bridge, responsive to successful validation, provides a service indicated by the I/O message.
In another embodiment, a data processing system includes a processor core, a system memory including a first data structure including entries mapping requester identifiers (IDs) to partitionable endpoint (PE) numbers and a second data structure, and an input/output (I/O) subsystem including an I/O bridge and a plurality of PEs each including one or more requesters each having a respective requester ID. The I/O host bridge, responsive to receiving an I/O message including a requester ID, determines a PE number by reference to a first entry from the first data structure, and responsive to determining the PE number, accesses a second entry of the second data structure utilizing the PE number as an index, where the second entry indicating one or more of the plurality of PEs affected by the message. The I/O host bridge services the I/O message with reference to each of the plurality of PEs indicated by the second entry.
In another embodiment, firmware and/or software is permitted to inject I/O messages, such as DMA messages and interrupt messages, into an I/O host bridge as if the injected interrupts were received from the I/O subsystem.
In another embodiment, a data processing system includes a processor core, a system memory, coupled to the processor core, that includes an interrupt data structure including a plurality of entries each associated with a respective one of a plurality of interrupts. An input/output (I/O) subsystem including at least one. I/O host bridge and a plurality of partitionable endpoints (PEs) each having an associated PE number. The I/O host bridge, responsive to receiving a message signaled interrupt (MSI) including at least a message address, determines from the message address a system memory address of a particular entry among the plurality of entries in the interrupt data structure, accesses the particular entry, and, based upon contents of the particular entry, validates authorization of an interrupt source to issue the MSI and presents an interrupt associated with the particular entry for service.
The foregoing description has been presented for purposes of illustration and elaboration, and is not intended to be exhaustive or limited to the structures and processes disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. Various embodiments were chosen and described in order to best explain the principles of operation, the practical application, and to enable others of ordinary skill in the art to understand and apply the disclosed teachings in various embodiments with any modifications suitable for the particular use contemplated.
While the present invention has been particularly shown as described with reference to one or more preferred embodiments, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention. For example, while the present invention has been described in the context of a fully functioning data processing system, those of ordinary skill in the art will appreciate that the processes of the present invention are capable of being distributed in the form of a computer program product including a computer readable storage medium having program code stored therein. Examples of computer readable storage media include hard disk drives, RAM or other volatile memory, non-volatile memory, and optical storage media.
Number | Name | Date | Kind |
---|---|---|---|
5701495 | Arndt et al. | Dec 1997 | A |
5905898 | Qureshi et al. | May 1999 | A |
5974486 | Siddappa | Oct 1999 | A |
5974538 | Wilmot, II | Oct 1999 | A |
6108739 | James et al. | Aug 2000 | A |
6263393 | Funaya et al. | Jul 2001 | B1 |
6279065 | Chin et al. | Aug 2001 | B1 |
6330631 | Crosland | Dec 2001 | B1 |
6405276 | Chen et al. | Jun 2002 | B1 |
6510479 | Hao | Jan 2003 | B1 |
6611891 | Hewitt et al. | Aug 2003 | B1 |
6618782 | Gulick et al. | Sep 2003 | B1 |
6629162 | Arndt et al. | Sep 2003 | B1 |
6643727 | Arndt et al. | Nov 2003 | B1 |
6647453 | Dunvan et al. | Nov 2003 | B1 |
6941398 | Lai et al. | Sep 2005 | B2 |
6983339 | Rabe et al. | Jan 2006 | B1 |
7136954 | Check et al. | Nov 2006 | B2 |
7293129 | Johnsen et al. | Nov 2007 | B2 |
7315911 | Davies et al. | Jan 2008 | B2 |
7398427 | Arndt et al. | Jul 2008 | B2 |
7571273 | Boyd et al. | Aug 2009 | B2 |
7574536 | Johnsen et al. | Aug 2009 | B2 |
7581033 | Ebersole et al. | Aug 2009 | B2 |
7613847 | Kjos et al. | Nov 2009 | B2 |
7660933 | Wang | Feb 2010 | B2 |
8200875 | Kanaya | Jun 2012 | B2 |
20030097514 | Ennis et al. | May 2003 | A1 |
20030123461 | Riley | Jul 2003 | A1 |
20040073738 | Kessler et al. | Apr 2004 | A1 |
20050041637 | Bialkowski et al. | Feb 2005 | A1 |
20050289250 | Mulla et al. | Dec 2005 | A1 |
20060010276 | Arndt et al. | Jan 2006 | A1 |
20060010277 | Arndt et al. | Jan 2006 | A1 |
20060179195 | Sharma et al. | Aug 2006 | A1 |
20060195623 | Arndt et al. | Aug 2006 | A1 |
20060242332 | Johnsen et al. | Oct 2006 | A1 |
20060282603 | Onufryk et al. | Dec 2006 | A1 |
20070136554 | Biran et al. | Jun 2007 | A1 |
20080005383 | Bender et al. | Jan 2008 | A1 |
20080091855 | Moertl et al. | Apr 2008 | A1 |
20080126617 | Brownlow et al. | May 2008 | A1 |
20080126648 | Brownlow et al. | May 2008 | A1 |
20080168186 | Gregg | Jul 2008 | A1 |
20080228932 | Monette et al. | Sep 2008 | A1 |
20090106475 | Arndt et al. | Apr 2009 | A1 |
20090144462 | Arndt et al. | Jun 2009 | A1 |
20090144508 | Freimuth et al. | Jun 2009 | A1 |
20100103865 | Ulupinar et al. | Apr 2010 | A1 |
20100238927 | Jain et al. | Sep 2010 | A1 |
20110153893 | Foong et al. | Jun 2011 | A1 |
20120036304 | Lais et al. | Feb 2012 | A1 |
20120140686 | Wen | Jun 2012 | A1 |
Number | Date | Country |
---|---|---|
871129 | Oct 1998 | EP |
09073436 | Mar 1997 | JP |
11232213 | Aug 1999 | JP |
2002014878 | Jan 2002 | JP |
2002269029 | Sep 2002 | JP |
2004030161 | Jan 2004 | JP |
9941671 | Aug 1999 | WO |
Entry |
---|
Aono et al., “The AzusA 16-Way Itanium Server,” NEC, pp. 1-7; 0272-1732 2000 IEEE. |
Huang et al., “Ally: OS-Transparent Packet Inspection Using Sequestered Cores,” pp. 1-8; Second Workshop on I/O Virtualization (WIOV '10), Mar. 13, 2010, Pittsburgh, PA. |
Fraser et al., “Safe Hardware Access with the Xen Virtual Machine Monitor,” pp. 1-10; Intel Research—University of Cambridge Computer Laboratory, J J Thomson Avenue, Cambridge, UL. |
Raj et al., “Scalable I/O Virtualization via Self-Virtualizing Devices,” pp. 1-20; CERCS, College of Computing, Georgia Institute of Technology, Atlanta, GA and IBM T.J. Watson Research Lab, Yorktown, NY. |
Nilsson et al., “Android Virtualization,” pp. 1-39; Columbia University, May 13, 2009. |
Krause et al., “I/O Virtualization and Sharing,” (slides) pp. 1-56; PCI Express, 2006, PCI-SIG. |
The Price of Safety: Evaluating IOMMU Performance. Ben-Yehuda et al., Jun. 2007. |
IOMMU, <http://en.wikipedia.org/wiki/IOMMU>, retrieved Aug. 3, 2012. |
“PCI Local Bus Technical Summary”, TechFest, 1999, retrieved from the internet on Sep. 19, 2012 at <http://www/techfest.com/hardware/bus/pci.htm>. |
U.S. Appl. No. 12/850,040 entitled “Injection of I/O Messages”; Final office action dated Sep. 24, 2012. |
U.S. Appl. No. 12/849,980 entitled “Determination Via an Indexed Structure of One or More Partitionable Endpoints Affected by an I/O Message”; Non-final office action dated Aug. 22, 2012. |
U.S. Appl. No. 13/447,818 entitled “Injection of I/O Messages”; Final office action dated Sep. 28, 2012. |
U.S. Appl. No. 13/447,818 entitled “Injection of I/O Messages”; Non-final office action dated Jun. 13, 2012. |
U.S. Appl. No. 12/849,958 entitled “Determination of One or More Partitionable Endpoints Affected by an I/O Message”; Non-final office action dated Aug. 22, 2012. |
U.S. Appl. No. 13/447,691 entitled “Determination of One or More Partitionable Endpoints Affected by an I/O Message”; Non-final office action dated Aug. 15, 2012. |
U.S. Appl. No. 12/850,040 entitled “Injection of I/O Messages”; Notice of Allowance dated Jan. 22, 2013. |
U.S. Appl. No. 13/447,818 entitled “Injection of I/O Messages”; Notice of Allowance dated Jan. 22, 2013. |
U.S. Appl. No. 12/849,980 entitled “Determination Via an Indexed Structure of One or More Partitionable Endpoints Affected by an I/O Message”; Final office action dated Jan. 8, 2013. |
U.S. Appl. No. 13/447,691 entitled “Determination of One or More Partitionable Endpoints Affected by an I/O Message”; Final office action dated Jan. 8, 2013. |
U.S. Appl. No. 12/849,958 entitled “Determination of One or More Partitionable Endpoints Affected by an I/O Message”; Final office action dated Jan. 8, 2013. |
“IEEE Standard for High Performance Serial Bus Bridges,” IEEE Std 1394, Jan. 2004, pp. 0—1-161, 2005. (58 pg.). |
“NN84014259: Flow Control Techniqu for Local Networks of Interconnected Token Rings”, Jan. 1, 1984, IBM, IBM Technical Disclosure Bulletin, vol. 26, Issue 8, pp. 4259-4262. |
Chaggoya-Garzon, Alexandre; Rousseau, Frederic; Petrot, Frederic; “Multi-Device Driver Synthesis Flow for Heterogeneous Hierarchical Systems,” Digital System Design (DSD), 2012 15th Euromicro Conference on, pp. 389-396, Sep. 5-8, 2012. |
Ben-Yehuda et al.; “The Price of Safety: Evaluating IOMMU Performance.” Jun. 2007, pp. 9-20. |
IOMMU, <http://en.wikipedia.org/wiki/IOMMU>, retrieved Aug. 3, 2012. (3 pp.). |
U.S. Appl. No. 12/850,040 entitled Injection of I/O Messages; Non-Final Office Action dated Jun. 12, 2012. |
U.S. Appl. No. 12/849,925 entitled “Selection of a Domain of a Configuration Access ”; Non-Final Office Action dated Nov. 10, 2011. |
U.S. Appl. No. 12/849,925 entitled “Selection of a Domain of a Configuration Access”; Notice of Allowance dated Apr. 30, 2012. |
Number | Date | Country | |
---|---|---|---|
20120036298 A1 | Feb 2012 | US |