Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751878AbdH1SS6 (ORCPT ); Mon, 28 Aug 2017 14:18:58 -0400 Received: from mail-wm0-f47.google.com ([74.125.82.47]:37664 "EHLO mail-wm0-f47.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751854AbdH1SSy (ORCPT ); Mon, 28 Aug 2017 14:18:54 -0400 Date: Mon, 28 Aug 2017 20:18:50 +0200 From: Christoffer Dall To: Marc Zyngier Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, Christoffer Dall , Thomas Gleixner , Jason Cooper , Eric Auger , Shanker Donthineni , Mark Rutland , Shameerali Kolothum Thodi , Andrew Jones Subject: Re: [PATCH v3 51/59] KVM: arm/arm64: GICv4: Add doorbell interrupt handling Message-ID: <20170828181850.GL24649@cbox> References: <20170731172637.29355-1-marc.zyngier@arm.com> <20170731172637.29355-52-marc.zyngier@arm.com> <8a35ee18-85a5-168b-b3d2-b9f51390b475@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8a35ee18-85a5-168b-b3d2-b9f51390b475@arm.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2942 Lines: 79 On Fri, Aug 04, 2017 at 08:44:04AM +0100, Marc Zyngier wrote: > On 31/07/17 18:26, Marc Zyngier wrote: > > When a vPE is not running, a VLPI being made pending results in a > > doorbell interrupt being delivered. Let's handle this interrupt > > and update the pending_last flag that indicates that VLPIs are > > pending. The corresponding vcpu is also kicked into action. > > > > Signed-off-by: Marc Zyngier > > --- > > virt/kvm/arm/vgic/vgic-v4.c | 34 ++++++++++++++++++++++++++++++++++ > > 1 file changed, 34 insertions(+) > > > > diff --git a/virt/kvm/arm/vgic/vgic-v4.c b/virt/kvm/arm/vgic/vgic-v4.c > > index 534d3051a078..6af3cde6d7d4 100644 > > --- a/virt/kvm/arm/vgic/vgic-v4.c > > +++ b/virt/kvm/arm/vgic/vgic-v4.c > > @@ -21,6 +21,19 @@ > > > > #include "vgic.h" > > > > +static irqreturn_t vgic_v4_doorbell_handler(int irq, void *info) > > +{ > > + struct kvm_vcpu *vcpu = info; > > + > > + if (!kvm_vgic_vcpu_pending_irq(vcpu)) { > > + vcpu->arch.vgic_cpu.vgic_v3.its_vpe.pending_last = true; > > + kvm_make_request(KVM_REQ_IRQ_PENDING, vcpu); > > + kvm_vcpu_kick(vcpu); > > + } > > This code is so obviously broken that I completely overlooked it. > > If we have take a doorbell interrupt, then it means nothing was > otherwise pending (because we'd have been kicked out of the blocking > state, and will have masked the doorbell). So checking for pending > interrupts is pointless. > > Furthermore, calling kvm_vgic_vcpu_pending_irq() takes the ap_list > lock. If we take a doorbell interrupt while injecting a virtual > interrupt (from userspace, for example) on the same CPU, we end-up > in deadlock land. This would be solved by Christoffer's latest > crop of timer patches, but there is no point getting there the first > place. > > The patchlet below solves it: > > diff --git a/virt/kvm/arm/vgic/vgic-v4.c b/virt/kvm/arm/vgic/vgic-v4.c > index 15feb1151797..48e4d6ebeaa8 100644 > --- a/virt/kvm/arm/vgic/vgic-v4.c > +++ b/virt/kvm/arm/vgic/vgic-v4.c > @@ -94,11 +94,9 @@ static irqreturn_t vgic_v4_doorbell_handler(int irq, void *info) > { > struct kvm_vcpu *vcpu = info; > > - if (!kvm_vgic_vcpu_pending_irq(vcpu)) { > - vcpu->arch.vgic_cpu.vgic_v3.its_vpe.pending_last = true; > - kvm_make_request(KVM_REQ_IRQ_PENDING, vcpu); > - kvm_vcpu_kick(vcpu); > - } > + vcpu->arch.vgic_cpu.vgic_v3.its_vpe.pending_last = true; > + kvm_make_request(KVM_REQ_IRQ_PENDING, vcpu); > + kvm_vcpu_kick(vcpu); I don't think you need the request and kick, because if you're getting this doorbell, doesn't that also mean that the VCPU is not running in the guest and you simply need to make sure the VCPU thread gets scheduled again, so you could call kvm_vcpu_wake_up() instead. Unless the request is there to ensure proper memory barriers around setting pending_last? In that case, is the read barrier taken care of by prepare_to_swait in kvm_vcpu_block()? Drew? Thanks, -Christoffer