Subversion Repositories HelenOS

Rev

Rev 2307 | Only display areas with differences | Regard whitespace | Details | Blame | Last modification | View Log | RSS feed

Rev 2307 Rev 2456
1
/*
1
/*
2
 * Copyright (c) 2006 Jakub Jermar
2
 * Copyright (c) 2006 Jakub Jermar
3
 * All rights reserved.
3
 * All rights reserved.
4
 *
4
 *
5
 * Redistribution and use in source and binary forms, with or without
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
6
 * modification, are permitted provided that the following conditions
7
 * are met:
7
 * are met:
8
 *
8
 *
9
 * - Redistributions of source code must retain the above copyright
9
 * - Redistributions of source code must retain the above copyright
10
 *   notice, this list of conditions and the following disclaimer.
10
 *   notice, this list of conditions and the following disclaimer.
11
 * - Redistributions in binary form must reproduce the above copyright
11
 * - Redistributions in binary form must reproduce the above copyright
12
 *   notice, this list of conditions and the following disclaimer in the
12
 *   notice, this list of conditions and the following disclaimer in the
13
 *   documentation and/or other materials provided with the distribution.
13
 *   documentation and/or other materials provided with the distribution.
14
 * - The name of the author may not be used to endorse or promote products
14
 * - The name of the author may not be used to endorse or promote products
15
 *   derived from this software without specific prior written permission.
15
 *   derived from this software without specific prior written permission.
16
 *
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
 */
27
 */
28
 
28
 
29
/** @addtogroup genericddi
29
/** @addtogroup genericddi
30
 * @{
30
 * @{
31
 */
31
 */
32
/**
32
/**
33
 * @file
33
 * @file
34
 * @brief   IRQ dispatcher.
34
 * @brief   IRQ dispatcher.
35
 *
35
 *
36
 * This file provides means of connecting IRQs with particular
36
 * This file provides means of connecting IRQs with particular
37
 * devices and logic for dispatching interrupts to IRQ handlers
37
 * devices and logic for dispatching interrupts to IRQ handlers
38
 * defined by those devices.
38
 * defined by those devices.
39
 *
39
 *
40
 * This code is designed to support:
40
 * This code is designed to support:
41
 * - multiple devices sharing single IRQ
41
 * - multiple devices sharing single IRQ
42
 * - multiple IRQs per signle device
42
 * - multiple IRQs per signle device
43
 *
43
 *
44
 *
44
 *
45
 * Note about architectures.
45
 * Note about architectures.
46
 *
46
 *
47
 * Some architectures has the term IRQ well defined. Examples
47
 * Some architectures has the term IRQ well defined. Examples
48
 * of such architectures include amd64, ia32 and mips32. Some
48
 * of such architectures include amd64, ia32 and mips32. Some
49
 * other architectures, such as sparc64, don't use the term
49
 * other architectures, such as sparc64, don't use the term
50
 * at all. In those cases, we boldly step forward and define what
50
 * at all. In those cases, we boldly step forward and define what
51
 * an IRQ is.
51
 * an IRQ is.
52
 *
52
 *
53
 * The implementation is generic enough and still allows the
53
 * The implementation is generic enough and still allows the
54
 * architectures to use the hardware layout effectively.
54
 * architectures to use the hardware layout effectively.
55
 * For instance, on amd64 and ia32, where there is only 16
55
 * For instance, on amd64 and ia32, where there is only 16
56
 * IRQs, the irq_hash_table can be optimized to a one-dimensional
56
 * IRQs, the irq_hash_table can be optimized to a one-dimensional
57
 * array. Next, when it is known that the IRQ numbers (aka INR's)
57
 * array. Next, when it is known that the IRQ numbers (aka INR's)
58
 * are unique, the claim functions can always return IRQ_ACCEPT.
58
 * are unique, the claim functions can always return IRQ_ACCEPT.
59
 *
59
 *
60
 *
60
 *
61
 * Note about the irq_hash_table.
61
 * Note about the irq_hash_table.
62
 *
62
 *
63
 * The hash table is configured to use two keys: inr and devno.
63
 * The hash table is configured to use two keys: inr and devno.
64
 * However, the hash index is computed only from inr. Moreover,
64
 * However, the hash index is computed only from inr. Moreover,
65
 * if devno is -1, the match is based on the return value of
65
 * if devno is -1, the match is based on the return value of
66
 * the claim() function instead of on devno.
66
 * the claim() function instead of on devno.
67
 */
67
 */
68
 
68
 
69
#include <ddi/irq.h>
69
#include <ddi/irq.h>
70
#include <adt/hash_table.h>
70
#include <adt/hash_table.h>
71
#include <arch/types.h>
71
#include <arch/types.h>
72
#include <synch/spinlock.h>
72
#include <synch/spinlock.h>
73
#include <arch.h>
73
#include <arch.h>
-
 
74
#include <synch/rcu.h>
-
 
75
 
74
 
76
 
75
#define KEY_INR     0
77
#define KEY_INR     0
76
#define KEY_DEVNO   1
78
#define KEY_DEVNO   1
77
 
79
 
78
/**
80
/**
79
 * Spinlock protecting the hash table.
81
 * Spinlock protecting the hash table.
80
 * This lock must be taken only when interrupts are disabled.
82
 * This lock must be taken only when interrupts are disabled.
81
 */
83
 */
82
SPINLOCK_INITIALIZE(irq_hash_table_lock);
84
SPINLOCK_INITIALIZE(irq_hash_table_lock);
83
static hash_table_t irq_hash_table;
85
static hash_table_t irq_hash_table;
84
 
86
 
85
/**
87
/**
86
 * Hash table operations for cases when we know that
88
 * Hash table operations for cases when we know that
87
 * there will be collisions between different keys.
89
 * there will be collisions between different keys.
88
 */
90
 */
89
static index_t irq_ht_hash(unative_t *key);
91
static index_t irq_ht_hash(unative_t *key);
90
static bool irq_ht_compare(unative_t *key, count_t keys, link_t *item);
92
static bool irq_ht_compare(unative_t *key, count_t keys, link_t *item);
91
 
93
 
92
static hash_table_operations_t irq_ht_ops = {
94
static hash_table_operations_t irq_ht_ops = {
93
    .hash = irq_ht_hash,
95
    .hash = irq_ht_hash,
94
    .compare = irq_ht_compare,
96
    .compare = irq_ht_compare,
95
    .remove_callback = NULL     /* not used */
97
    .remove_callback = NULL     /* not used */
96
};
98
};
97
 
99
 
98
/**
100
/**
99
 * Hash table operations for cases when we know that
101
 * Hash table operations for cases when we know that
100
 * there will be no collisions between different keys.
102
 * there will be no collisions between different keys.
101
 * However, there might be still collisions among
103
 * However, there might be still collisions among
102
 * elements with single key (sharing of one IRQ).
104
 * elements with single key (sharing of one IRQ).
103
 */
105
 */
104
static index_t irq_lin_hash(unative_t *key);
106
static index_t irq_lin_hash(unative_t *key);
105
static bool irq_lin_compare(unative_t *key, count_t keys, link_t *item);
107
static bool irq_lin_compare(unative_t *key, count_t keys, link_t *item);
106
 
108
 
107
static hash_table_operations_t irq_lin_ops = {
109
static hash_table_operations_t irq_lin_ops = {
108
    .hash = irq_lin_hash,
110
    .hash = irq_lin_hash,
109
    .compare = irq_lin_compare,
111
    .compare = irq_lin_compare,
110
    .remove_callback = NULL     /* not used */
112
    .remove_callback = NULL     /* not used */
111
};
113
};
112
 
114
 
113
/** Initialize IRQ subsystem.
115
/** Initialize IRQ subsystem.
114
 *
116
 *
115
 * @param inrs Numbers of unique IRQ numbers or INRs.
117
 * @param inrs Numbers of unique IRQ numbers or INRs.
116
 * @param chains Number of chains in the hash table.
118
 * @param chains Number of chains in the hash table.
117
 */
119
 */
118
void irq_init(count_t inrs, count_t chains)
120
void irq_init(count_t inrs, count_t chains)
119
{
121
{
120
    /*
122
    /*
121
     * Be smart about the choice of the hash table operations.
123
     * Be smart about the choice of the hash table operations.
122
     * In cases in which inrs equals the requested number of
124
     * In cases in which inrs equals the requested number of
123
     * chains (i.e. where there is no collision between
125
     * chains (i.e. where there is no collision between
124
     * different keys), we can use optimized set of operations.
126
     * different keys), we can use optimized set of operations.
125
     */
127
     */
126
    if (inrs == chains)
128
    if (inrs == chains)
127
        hash_table_create(&irq_hash_table, chains, 2, &irq_lin_ops);
129
        hash_table_create(&irq_hash_table, chains, 2, &irq_lin_ops);
128
    else
130
    else
129
        hash_table_create(&irq_hash_table, chains, 2, &irq_ht_ops);
131
        hash_table_create(&irq_hash_table, chains, 2, &irq_ht_ops);
130
}
132
}
131
 
133
 
132
/** Initialize one IRQ structure.
134
/** Initialize one IRQ structure.
133
 *
135
 *
134
 * @param irq Pointer to the IRQ structure to be initialized.
136
 * @param irq Pointer to the IRQ structure to be initialized.
135
 *
137
 *
136
 */
138
 */
137
void irq_initialize(irq_t *irq)
139
void irq_initialize(irq_t *irq)
138
{
140
{
139
    link_initialize(&irq->link);
141
    link_initialize(&irq->link);
140
    spinlock_initialize(&irq->lock, "irq.lock");
142
    spinlock_initialize(&irq->lock, "irq.lock");
141
    irq->preack = false;
143
    irq->preack = false;
142
    irq->inr = -1;
144
    irq->inr = -1;
143
    irq->devno = -1;
145
    irq->devno = -1;
144
    irq->trigger = (irq_trigger_t) 0;
146
    irq->trigger = (irq_trigger_t) 0;
145
    irq->claim = NULL;
147
    irq->claim = NULL;
146
    irq->handler = NULL;
148
    irq->handler = NULL;
147
    irq->arg = NULL;
149
    irq->arg = NULL;
-
 
150
    irq->notif_cfg = malloc(sizeof(ipc_notif_cfg_t), 0);
148
    irq->notif_cfg.notify = false;
151
    irq->notif_cfg->notify = false;
149
    irq->notif_cfg.answerbox = NULL;
152
    irq->notif_cfg->answerbox = NULL;
150
    irq->notif_cfg.code = NULL;
153
    irq->notif_cfg->code = NULL;
151
    irq->notif_cfg.method = 0;
154
    irq->notif_cfg->method = 0;
152
    irq->notif_cfg.counter = 0;
155
    irq->notif_cfg->counter = 0;
153
    link_initialize(&irq->notif_cfg.link);
156
    link_initialize(&irq->notif_cfg->link);
154
}
157
}
155
 
158
 
156
/** Register IRQ for device.
159
/** Register IRQ for device.
157
 *
160
 *
158
 * The irq structure must be filled with information
161
 * The irq structure must be filled with information
159
 * about the interrupt source and with the claim()
162
 * about the interrupt source and with the claim()
160
 * function pointer and irq_handler() function pointer.
163
 * function pointer and irq_handler() function pointer.
161
 *
164
 *
162
 * @param irq IRQ structure belonging to a device.
165
 * @param irq IRQ structure belonging to a device.
163
 */
166
 */
164
void irq_register(irq_t *irq)
167
void irq_register(irq_t *irq)
165
{
168
{
166
    ipl_t ipl;
169
    ipl_t ipl;
167
    unative_t key[] = {
170
    unative_t key[] = {
168
        (unative_t) irq->inr,
171
        (unative_t) irq->inr,
169
        (unative_t) irq->devno
172
        (unative_t) irq->devno
170
    };
173
    };
171
   
174
   
172
    ipl = interrupts_disable();
175
    ipl = interrupts_disable();
173
    spinlock_lock(&irq_hash_table_lock);
176
    spinlock_lock(&irq_hash_table_lock);
174
    hash_table_insert(&irq_hash_table, key, &irq->link);
177
    hash_table_insert(&irq_hash_table, key, &irq->link);
175
    spinlock_unlock(&irq_hash_table_lock);
178
    spinlock_unlock(&irq_hash_table_lock);
176
    interrupts_restore(ipl);
179
    interrupts_restore(ipl);
177
}
180
}
178
 
181
 
179
/** Dispatch the IRQ.
182
/** Dispatch the IRQ.
180
 *
183
 *
181
 * We assume this function is only called from interrupt
184
 * We assume this function is only called from interrupt
182
 * context (i.e. that interrupts are disabled prior to
185
 * context (i.e. that interrupts are disabled prior to
183
 * this call).
186
 * this call).
184
 *
187
 *
185
 * This function attempts to lookup a fitting IRQ
188
 * This function attempts to lookup a fitting IRQ
186
 * structure. In case of success, return with interrupts
189
 * structure. In case of success, return with interrupts
187
 * disabled and holding the respective structure.
190
 * disabled and holding the respective structure.
188
 *
191
 *
189
 * @param inr Interrupt number (aka inr or irq).
192
 * @param inr Interrupt number (aka inr or irq).
190
 *
193
 *
191
 * @return IRQ structure of the respective device or NULL.
194
 * @return IRQ structure of the respective device or NULL.
192
 */
195
 */
193
irq_t *irq_dispatch_and_lock(inr_t inr)
196
irq_t *irq_dispatch_and_lock(inr_t inr)
194
{
197
{
195
    link_t *lnk;
198
    link_t *lnk;
196
    unative_t key[] = {
199
    unative_t key[] = {
197
        (unative_t) inr,
200
        (unative_t) inr,
198
        (unative_t) -1      /* search will use claim() instead of devno */
201
        (unative_t) -1      /* search will use claim() instead of devno */
199
    };
202
    };
200
   
203
   
201
    spinlock_lock(&irq_hash_table_lock);
204
    spinlock_lock(&irq_hash_table_lock);
202
 
205
 
203
    lnk = hash_table_find(&irq_hash_table, key);
206
    lnk = hash_table_find(&irq_hash_table, key);
204
    if (lnk) {
207
    if (lnk) {
205
        irq_t *irq;
208
        irq_t *irq;
206
       
209
       
207
        irq = hash_table_get_instance(lnk, irq_t, link);
210
        irq = hash_table_get_instance(lnk, irq_t, link);
208
 
211
 
209
        spinlock_unlock(&irq_hash_table_lock);
212
        spinlock_unlock(&irq_hash_table_lock);
210
        return irq;
213
        return irq;
211
    }
214
    }
212
   
215
   
213
    spinlock_unlock(&irq_hash_table_lock);
216
    spinlock_unlock(&irq_hash_table_lock);
214
 
217
 
215
    return NULL;   
218
    return NULL;   
216
}
219
}
217
 
220
 
218
/** Find the IRQ structure corresponding to inr and devno.
221
/** Find the IRQ structure corresponding to inr and devno.
219
 *
222
 *
220
 * This functions attempts to lookup the IRQ structure
223
 * This functions attempts to lookup the IRQ structure
221
 * corresponding to its arguments. On success, this
224
 * corresponding to its arguments. On success, this
222
 * function returns with interrups disabled, holding
225
 * function returns with interrups disabled, holding
223
 * the lock of the respective IRQ structure.
226
 * the lock of the respective IRQ structure.
224
 *
227
 *
225
 * This function assumes interrupts are already disabled.
228
 * This function assumes interrupts are already disabled.
226
 *
229
 *
227
 * @param inr INR being looked up.
230
 * @param inr INR being looked up.
228
 * @param devno Devno being looked up.
231
 * @param devno Devno being looked up.
229
 *
232
 *
230
 * @return Locked IRQ structure on success or NULL on failure.
233
 * @return Locked IRQ structure on success or NULL on failure.
231
 */
234
 */
232
irq_t *irq_find_and_lock(inr_t inr, devno_t devno)
235
irq_t *irq_find_and_lock(inr_t inr, devno_t devno)
233
{
236
{
234
    link_t *lnk;
237
    link_t *lnk;
235
    unative_t keys[] = {
238
    unative_t keys[] = {
236
        (unative_t) inr,
239
        (unative_t) inr,
237
        (unative_t) devno
240
        (unative_t) devno
238
    };
241
    };
239
   
242
   
240
    spinlock_lock(&irq_hash_table_lock);
243
    spinlock_lock(&irq_hash_table_lock);
241
 
244
 
242
    lnk = hash_table_find(&irq_hash_table, keys);
245
    lnk = hash_table_find(&irq_hash_table, keys);
243
    if (lnk) {
246
    if (lnk) {
244
        irq_t *irq;
247
        irq_t *irq;
245
       
248
       
246
        irq = hash_table_get_instance(lnk, irq_t, link);
249
        irq = hash_table_get_instance(lnk, irq_t, link);
247
 
250
 
248
        spinlock_unlock(&irq_hash_table_lock);
251
        spinlock_unlock(&irq_hash_table_lock);
249
        return irq;
252
        return irq;
250
    }
253
    }
251
   
254
   
252
    spinlock_unlock(&irq_hash_table_lock);
255
    spinlock_unlock(&irq_hash_table_lock);
253
 
256
 
254
    return NULL;   
257
    return NULL;   
255
}
258
}
256
 
259
 
257
/** Compute hash index for the key.
260
/** Compute hash index for the key.
258
 *
261
 *
259
 * This function computes hash index into
262
 * This function computes hash index into
260
 * the IRQ hash table for which there
263
 * the IRQ hash table for which there
261
 * can be collisions between different
264
 * can be collisions between different
262
 * INRs.
265
 * INRs.
263
 *
266
 *
264
 * The devno is not used to compute the hash.
267
 * The devno is not used to compute the hash.
265
 *
268
 *
266
 * @param key The first of the keys is inr and the second is devno or -1.
269
 * @param key The first of the keys is inr and the second is devno or -1.
267
 *
270
 *
268
 * @return Index into the hash table.
271
 * @return Index into the hash table.
269
 */
272
 */
270
index_t irq_ht_hash(unative_t key[])
273
index_t irq_ht_hash(unative_t key[])
271
{
274
{
272
    inr_t inr = (inr_t) key[KEY_INR];
275
    inr_t inr = (inr_t) key[KEY_INR];
273
    return inr % irq_hash_table.entries;
276
    return inr % irq_hash_table.entries;
274
}
277
}
275
 
278
 
276
/** Compare hash table element with a key.
279
/** Compare hash table element with a key.
277
 *
280
 *
278
 * There are two things to note about this function.
281
 * There are two things to note about this function.
279
 * First, it is used for the more complex architecture setup
282
 * First, it is used for the more complex architecture setup
280
 * in which there are way too many interrupt numbers (i.e. inr's)
283
 * in which there are way too many interrupt numbers (i.e. inr's)
281
 * to arrange the hash table so that collisions occur only
284
 * to arrange the hash table so that collisions occur only
282
 * among same inrs of different devnos. So the explicit check
285
 * among same inrs of different devnos. So the explicit check
283
 * for inr match must be done.
286
 * for inr match must be done.
284
 * Second, if devno is -1, the second key (i.e. devno) is not
287
 * Second, if devno is -1, the second key (i.e. devno) is not
285
 * used for the match and the result of the claim() function
288
 * used for the match and the result of the claim() function
286
 * is used instead.
289
 * is used instead.
287
 *
290
 *
288
 * This function assumes interrupts are already disabled.
291
 * This function assumes interrupts are already disabled.
289
 *
292
 *
290
 * @param key Keys (i.e. inr and devno).
293
 * @param key Keys (i.e. inr and devno).
291
 * @param keys This is 2.
294
 * @param keys This is 2.
292
 * @param item The item to compare the key with.
295
 * @param item The item to compare the key with.
293
 *
296
 *
294
 * @return True on match or false otherwise.
297
 * @return True on match or false otherwise.
295
 */
298
 */
296
bool irq_ht_compare(unative_t key[], count_t keys, link_t *item)
299
bool irq_ht_compare(unative_t key[], count_t keys, link_t *item)
297
{
300
{
298
    irq_t *irq = hash_table_get_instance(item, irq_t, link);
301
    irq_t *irq = hash_table_get_instance(item, irq_t, link);
299
    inr_t inr = (inr_t) key[KEY_INR];
302
    inr_t inr = (inr_t) key[KEY_INR];
300
    devno_t devno = (devno_t) key[KEY_DEVNO];
303
    devno_t devno = (devno_t) key[KEY_DEVNO];
301
 
304
 
302
    bool rv;
305
    bool rv;
303
   
306
   
304
    spinlock_lock(&irq->lock);
307
    spinlock_lock(&irq->lock);
305
    if (devno == -1) {
308
    if (devno == -1) {
306
        /* Invoked by irq_dispatch_and_lock(). */
309
        /* Invoked by irq_dispatch_and_lock(). */
307
        rv = ((irq->inr == inr) && (irq->claim() == IRQ_ACCEPT));
310
        rv = ((irq->inr == inr) && (irq->claim() == IRQ_ACCEPT));
308
    } else {
311
    } else {
309
        /* Invoked by irq_find_and_lock(). */
312
        /* Invoked by irq_find_and_lock(). */
310
        rv = ((irq->inr == inr) && (irq->devno == devno));
313
        rv = ((irq->inr == inr) && (irq->devno == devno));
311
    }
314
    }
312
   
315
   
313
    /* unlock only on non-match */
316
    /* unlock only on non-match */
314
    if (!rv)
317
    if (!rv)
315
        spinlock_unlock(&irq->lock);
318
        spinlock_unlock(&irq->lock);
316
 
319
 
317
    return rv;
320
    return rv;
318
}
321
}
319
 
322
 
320
/** Compute hash index for the key.
323
/** Compute hash index for the key.
321
 *
324
 *
322
 * This function computes hash index into
325
 * This function computes hash index into
323
 * the IRQ hash table for which there
326
 * the IRQ hash table for which there
324
 * are no collisions between different
327
 * are no collisions between different
325
 * INRs.
328
 * INRs.
326
 *
329
 *
327
 * @param key The first of the keys is inr and the second is devno or -1.
330
 * @param key The first of the keys is inr and the second is devno or -1.
328
 *
331
 *
329
 * @return Index into the hash table.
332
 * @return Index into the hash table.
330
 */
333
 */
331
index_t irq_lin_hash(unative_t key[])
334
index_t irq_lin_hash(unative_t key[])
332
{
335
{
333
    inr_t inr = (inr_t) key[KEY_INR];
336
    inr_t inr = (inr_t) key[KEY_INR];
334
    return inr;
337
    return inr;
335
}
338
}
336
 
339
 
337
/** Compare hash table element with a key.
340
/** Compare hash table element with a key.
338
 *
341
 *
339
 * There are two things to note about this function.
342
 * There are two things to note about this function.
340
 * First, it is used for the less complex architecture setup
343
 * First, it is used for the less complex architecture setup
341
 * in which there are not too many interrupt numbers (i.e. inr's)
344
 * in which there are not too many interrupt numbers (i.e. inr's)
342
 * to arrange the hash table so that collisions occur only
345
 * to arrange the hash table so that collisions occur only
343
 * among same inrs of different devnos. So the explicit check
346
 * among same inrs of different devnos. So the explicit check
344
 * for inr match is not done.
347
 * for inr match is not done.
345
 * Second, if devno is -1, the second key (i.e. devno) is not
348
 * Second, if devno is -1, the second key (i.e. devno) is not
346
 * used for the match and the result of the claim() function
349
 * used for the match and the result of the claim() function
347
 * is used instead.
350
 * is used instead.
348
 *
351
 *
349
 * This function assumes interrupts are already disabled.
352
 * This function assumes interrupts are already disabled.
350
 *
353
 *
351
 * @param key Keys (i.e. inr and devno).
354
 * @param key Keys (i.e. inr and devno).
352
 * @param keys This is 2.
355
 * @param keys This is 2.
353
 * @param item The item to compare the key with.
356
 * @param item The item to compare the key with.
354
 *
357
 *
355
 * @return True on match or false otherwise.
358
 * @return True on match or false otherwise.
356
 */
359
 */
357
bool irq_lin_compare(unative_t key[], count_t keys, link_t *item)
360
bool irq_lin_compare(unative_t key[], count_t keys, link_t *item)
358
{
361
{
359
    irq_t *irq = list_get_instance(item, irq_t, link);
362
    irq_t *irq = list_get_instance(item, irq_t, link);
360
    devno_t devno = (devno_t) key[KEY_DEVNO];
363
    devno_t devno = (devno_t) key[KEY_DEVNO];
361
    bool rv;
364
    bool rv;
362
   
365
   
363
    spinlock_lock(&irq->lock);
366
    spinlock_lock(&irq->lock);
364
    if (devno == -1) {
367
    if (devno == -1) {
365
        /* Invoked by irq_dispatch_and_lock() */
368
        /* Invoked by irq_dispatch_and_lock() */
366
        rv = (irq->claim() == IRQ_ACCEPT);
369
        rv = (irq->claim() == IRQ_ACCEPT);
367
    } else {
370
    } else {
368
        /* Invoked by irq_find_and_lock() */
371
        /* Invoked by irq_find_and_lock() */
369
        rv = (irq->devno == devno);
372
        rv = (irq->devno == devno);
370
    }
373
    }
371
   
374
   
372
    /* unlock only on non-match */
375
    /* unlock only on non-match */
373
    if (!rv)
376
    if (!rv)
374
        spinlock_unlock(&irq->lock);
377
        spinlock_unlock(&irq->lock);
375
   
378
   
376
    return rv;
379
    return rv;
377
}
380
}
378
 
381
 
379
/** @}
382
/** @}
380
 */
383
 */
381
 
384