From: andre.przywara@arm.com (Andre Przywara) To: linux-arm-kernel@lists.infradead.org Subject: [PATCH 12/13] KVM: arm64: implement MSI injection in ITS emulation Date: Mon, 6 Jul 2015 17:46:37 +0100 [thread overview] Message-ID: <559AB0ED.1090405@arm.com> (raw) In-Reply-To: <5579C8AA.8010903@linaro.org> Hi Eric, .... >> diff --git a/virt/kvm/arm/its-emul.c b/virt/kvm/arm/its-emul.c >> index 574cf05..35e886c 100644 >> --- a/virt/kvm/arm/its-emul.c >> +++ b/virt/kvm/arm/its-emul.c >> @@ -340,6 +340,55 @@ static bool handle_mmio_gits_idregs(struct kvm_vcpu *vcpu, >> } >> >> /* >> + * Translates an incoming MSI request into the redistributor (=VCPU) and >> + * the associated LPI number. Sets the LPI pending bit and also marks the >> + * VCPU as having a pending interrupt. >> + */ >> +int vits_inject_msi(struct kvm *kvm, struct kvm_msi *msi) >> +{ >> + struct vgic_dist *dist = &kvm->arch.vgic; >> + struct vgic_its *its = &dist->its; >> + struct its_itte *itte; >> + int cpuid; >> + bool inject = false; >> + int ret = 0; >> + >> + if (!vgic_has_its(kvm)) >> + return -ENODEV; >> + >> + if (!(msi->flags & KVM_MSI_VALID_DEVID)) >> + return -EINVAL; >> + >> + spin_lock(&its->lock); >> + >> + if (!its->enabled || !dist->lpis_enabled) { >> + ret = -EAGAIN; >> + goto out_unlock; >> + } >> + >> + itte = find_itte(kvm, msi->devid, msi->data); >> + /* Triggering an unmapped IRQ gets silently dropped. */ >> + if (!itte || !itte->collection) >> + goto out_unlock; >> + >> + cpuid = itte->collection->target_addr; >> + set_bit(cpuid, itte->pending); > so now the internal state is different from the pending state in ext > memory. I don't really understand where the ext mem is used? This is expected, as the ITS is allowed to cache the state. In a hardware ITS implementation the external memory is used to provide actual storage for the ITS, something we do not need for the emulation, as we have cheaper (host) memory for that. The only thing we have to model though is that the guest may use the external storage to take a snapshot of the current state, but it may only do so after having flushed the ITS "cache", which means we synchronize our internal data structures to that "external" memory. >> + inject = itte->enabled; >> + >> +out_unlock: >> + spin_unlock(&its->lock); >> + >> + if (inject) { >> + spin_lock(&dist->lock); >> + set_bit(cpuid, dist->irq_pending_on_cpu); > isn't it atomic op? It is, but that's not what the lock protects. It's there to avoid stepping on someone else's toes, who might deal with the ITS data structures at the same time and would not expect a value to change in the middle (think about code iterating over dist->irq_pending_on_cpu). Cheers, Andre.
WARNING: multiple messages have this Message-ID (diff)
From: Andre Przywara <andre.przywara@arm.com> To: Eric Auger <eric.auger@linaro.org> Cc: Marc Zyngier <Marc.Zyngier@arm.com>, "kvm@vger.kernel.org" <kvm@vger.kernel.org>, "kvmarm@lists.cs.columbia.edu" <kvmarm@lists.cs.columbia.edu>, "linux-arm-kernel@lists.infradead.org" <linux-arm-kernel@lists.infradead.org> Subject: Re: [PATCH 12/13] KVM: arm64: implement MSI injection in ITS emulation Date: Mon, 6 Jul 2015 17:46:37 +0100 [thread overview] Message-ID: <559AB0ED.1090405@arm.com> (raw) In-Reply-To: <5579C8AA.8010903@linaro.org> Hi Eric, .... >> diff --git a/virt/kvm/arm/its-emul.c b/virt/kvm/arm/its-emul.c >> index 574cf05..35e886c 100644 >> --- a/virt/kvm/arm/its-emul.c >> +++ b/virt/kvm/arm/its-emul.c >> @@ -340,6 +340,55 @@ static bool handle_mmio_gits_idregs(struct kvm_vcpu *vcpu, >> } >> >> /* >> + * Translates an incoming MSI request into the redistributor (=VCPU) and >> + * the associated LPI number. Sets the LPI pending bit and also marks the >> + * VCPU as having a pending interrupt. >> + */ >> +int vits_inject_msi(struct kvm *kvm, struct kvm_msi *msi) >> +{ >> + struct vgic_dist *dist = &kvm->arch.vgic; >> + struct vgic_its *its = &dist->its; >> + struct its_itte *itte; >> + int cpuid; >> + bool inject = false; >> + int ret = 0; >> + >> + if (!vgic_has_its(kvm)) >> + return -ENODEV; >> + >> + if (!(msi->flags & KVM_MSI_VALID_DEVID)) >> + return -EINVAL; >> + >> + spin_lock(&its->lock); >> + >> + if (!its->enabled || !dist->lpis_enabled) { >> + ret = -EAGAIN; >> + goto out_unlock; >> + } >> + >> + itte = find_itte(kvm, msi->devid, msi->data); >> + /* Triggering an unmapped IRQ gets silently dropped. */ >> + if (!itte || !itte->collection) >> + goto out_unlock; >> + >> + cpuid = itte->collection->target_addr; >> + set_bit(cpuid, itte->pending); > so now the internal state is different from the pending state in ext > memory. I don't really understand where the ext mem is used? This is expected, as the ITS is allowed to cache the state. In a hardware ITS implementation the external memory is used to provide actual storage for the ITS, something we do not need for the emulation, as we have cheaper (host) memory for that. The only thing we have to model though is that the guest may use the external storage to take a snapshot of the current state, but it may only do so after having flushed the ITS "cache", which means we synchronize our internal data structures to that "external" memory. >> + inject = itte->enabled; >> + >> +out_unlock: >> + spin_unlock(&its->lock); >> + >> + if (inject) { >> + spin_lock(&dist->lock); >> + set_bit(cpuid, dist->irq_pending_on_cpu); > isn't it atomic op? It is, but that's not what the lock protects. It's there to avoid stepping on someone else's toes, who might deal with the ITS data structures at the same time and would not expect a value to change in the middle (think about code iterating over dist->irq_pending_on_cpu). Cheers, Andre.
next prev parent reply other threads:[~2015-07-06 16:46 UTC|newest] Thread overview: 104+ messages / expand[flat|nested] mbox.gz Atom feed top 2015-05-29 9:53 [PATCH 00/13] arm64: KVM: GICv3 ITS emulation Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-05-29 9:53 ` [PATCH 01/13] KVM: arm/arm64: VGIC: don't track used LRs in the distributor Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-12 17:23 ` Eric Auger 2015-05-29 9:53 ` [PATCH 02/13] KVM: extend struct kvm_msi to hold a 32-bit device ID Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-09 8:49 ` Eric Auger 2015-06-09 8:49 ` Eric Auger 2015-06-28 19:12 ` Christoffer Dall 2015-06-28 19:12 ` Christoffer Dall 2015-06-29 14:53 ` Andre Przywara 2015-06-29 14:53 ` Andre Przywara 2015-06-29 15:02 ` Christoffer Dall 2015-06-29 15:02 ` Christoffer Dall 2015-05-29 9:53 ` [PATCH 03/13] KVM: arm/arm64: add emulation model specific destroy function Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-09 8:51 ` Eric Auger 2015-06-09 8:51 ` Eric Auger 2015-06-28 19:14 ` Christoffer Dall 2015-06-28 19:14 ` Christoffer Dall 2015-05-29 9:53 ` [PATCH 04/13] KVM: arm64: Introduce new MMIO region for the ITS base address Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-09 8:52 ` Eric Auger 2015-06-09 8:52 ` Eric Auger 2015-06-11 15:12 ` Andre Przywara 2015-06-11 15:12 ` Andre Przywara 2015-05-29 9:53 ` [PATCH 05/13] KVM: arm64: handle ITS related GICv3 redistributor registers Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-09 8:52 ` Eric Auger 2015-06-09 8:52 ` Eric Auger 2015-06-12 17:03 ` Andre Przywara 2015-06-12 17:03 ` Andre Przywara 2015-05-29 9:53 ` [PATCH 06/13] KVM: arm64: introduce ITS emulation file with stub functions Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-09 9:23 ` Eric Auger 2015-06-09 9:23 ` Eric Auger 2015-05-29 9:53 ` [PATCH 07/13] KVM: arm64: implement basic ITS register handlers Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-09 13:34 ` Eric Auger 2015-06-09 13:34 ` Eric Auger 2015-06-28 19:36 ` Christoffer Dall 2015-06-28 19:36 ` Christoffer Dall 2015-05-29 9:53 ` [PATCH 08/13] KVM: arm64: add data structures to model ITS interrupt translation Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-09 15:59 ` Eric Auger 2015-06-09 15:59 ` Eric Auger 2015-05-29 9:53 ` [PATCH 09/13] KVM: arm64: handle pending bit for LPIs in ITS emulation Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-09 15:59 ` Eric Auger 2015-06-09 15:59 ` Eric Auger 2015-06-11 15:46 ` Andre Przywara 2015-06-11 15:46 ` Andre Przywara 2015-06-11 16:01 ` Marc Zyngier 2015-06-11 16:01 ` Marc Zyngier 2015-06-11 18:24 ` Eric Auger 2015-06-11 18:24 ` Eric Auger 2015-05-29 9:53 ` [PATCH 10/13] KVM: arm64: sync LPI properties and status between guest and KVM Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-11 17:44 ` Eric Auger 2015-06-11 17:44 ` Eric Auger 2015-06-28 19:33 ` Christoffer Dall 2015-06-28 19:33 ` Christoffer Dall 2015-05-29 9:53 ` [PATCH 11/13] KVM: arm64: implement ITS command queue command handlers Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-12 15:28 ` Eric Auger 2015-06-12 15:28 ` Eric Auger 2015-06-28 19:41 ` Christoffer Dall 2015-06-28 19:41 ` Christoffer Dall 2015-07-03 15:57 ` Andre Przywara 2015-07-03 15:57 ` Andre Przywara 2015-07-03 21:01 ` Christoffer Dall 2015-07-03 21:01 ` Christoffer Dall 2015-05-29 9:53 ` [PATCH 12/13] KVM: arm64: implement MSI injection in ITS emulation Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-11 17:43 ` Eric Auger 2015-06-11 17:43 ` Eric Auger 2015-07-06 16:46 ` Andre Przywara [this message] 2015-07-06 16:46 ` Andre Przywara 2015-07-07 8:13 ` Christoffer Dall 2015-07-07 8:13 ` Christoffer Dall 2015-05-29 9:53 ` [PATCH 13/13] KVM: arm64: enable ITS emulation as a virtual MSI controller Andre Przywara 2015-05-29 9:53 ` Andre Przywara 2015-06-12 16:05 ` Eric Auger 2015-06-12 16:05 ` Eric Auger 2015-06-18 8:43 ` Eric Auger 2015-06-18 8:43 ` Eric Auger 2015-06-18 14:22 ` Andre Przywara 2015-06-18 14:22 ` Andre Przywara 2015-06-18 15:03 ` Pavel Fedin 2015-06-18 15:03 ` Pavel Fedin 2015-06-18 19:20 ` Andre Przywara 2015-06-18 19:20 ` Andre Przywara 2015-06-08 6:53 ` [PATCH 00/13] arm64: KVM: GICv3 ITS emulation Pavel Fedin 2015-06-08 6:53 ` Pavel Fedin 2015-06-08 8:23 ` Marc Zyngier 2015-06-08 8:23 ` Marc Zyngier 2015-06-08 10:54 ` Pavel Fedin 2015-06-08 10:54 ` Pavel Fedin 2015-06-08 17:13 ` Marc Zyngier 2015-06-08 17:13 ` Marc Zyngier 2015-06-09 8:12 ` Eric Auger 2015-06-09 8:12 ` Eric Auger 2015-06-10 12:18 ` Pavel Fedin
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=559AB0ED.1090405@arm.com \ --to=andre.przywara@arm.com \ --cc=linux-arm-kernel@lists.infradead.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.