Received: by 10.192.165.148 with SMTP id m20csp4530321imm; Tue, 24 Apr 2018 04:28:34 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+iQjtmcVf/nnpmAEO6Lg9vxwCOWPcF9XaYbwRtvdakeLKzV+ZxEARALYuylT6tjpvKZ1iX X-Received: by 2002:a17:902:6542:: with SMTP id d2-v6mr14475842pln.196.1524569314466; Tue, 24 Apr 2018 04:28:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524569314; cv=none; d=google.com; s=arc-20160816; b=WF16bgoO0R54TD41s2ZtHZMh/f6SiXG4zoent+jMwqhBokiVjM5cDfcLzseP8oxFss 2EqYjbQ41FLgrg7KiJPRk+3B5EsolrhwszJT1nrZPWPLv7FJqOimVKE1yeCjXA6lcCck PDOzZnfjnqHnf9Q5UHGqKWM3n2JYMscxmSwhSVcRG9mW3Te84na2DUVDFi80fggkqWbI oRGXmuoTdo2hhoStOuW76AkBqRtpjv+gHesihTeCzs3pHAE55rjwjCWz5V6SNhgqxToM D6GnTWaTKDVqblAdC644W21LO2jTD2cT6W7RQZvII5zN9E8+nTgb3JHyJxFGSXbhTXQ6 3bTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=bin1zCVMmvXy0ccjw64ocxHTVYxvhjZATjnPXQeH+eY=; b=Giiz2hSZTcqN1XQwIpUfxCRQD3uqmepjZtaHplK8yIkFmIeMBZ9GtzrZJaKX7QxSI8 vb4PPC2B7FY6RRhQgrawG/4xIkZ1kXw4fg6mVGR/q/Y19BWwIHqLOlxIERzIueHW9htc ViJDRj9uRFF2+sI89pkmoO1LHne14eBNcu0mE9rNMkcO7Y9VaDJPhNDWzD5fdxlKKzer PXrlap6IcG3ZINbOuRuap5YjMN0xJ6W+osTqjfSDEZ3GQ2fPSEHNWcVFR7zjMjW8eTIH 68CkcssvOrmymGkpiFWh2nePlEoYuqhSX46+BdjCnW7Kj8vwgecUalZW2tl5Jz16gvaO T++w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x19si11632965pgc.261.2018.04.24.04.28.20; Tue, 24 Apr 2018 04:28:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756958AbeDXJ7w (ORCPT + 99 others); Tue, 24 Apr 2018 05:59:52 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:33044 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1756874AbeDXJ7d (ORCPT ); Tue, 24 Apr 2018 05:59:33 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 6F35F406C794; Tue, 24 Apr 2018 09:59:32 +0000 (UTC) Received: from gondolin (dhcp-192-222.str.redhat.com [10.33.192.222]) by smtp.corp.redhat.com (Postfix) with ESMTP id 7378D2166BC6; Tue, 24 Apr 2018 09:59:31 +0000 (UTC) Date: Tue, 24 Apr 2018 11:59:29 +0200 From: Cornelia Huck To: Pierre Morel Cc: Dong Jia Shi , pasic@linux.vnet.ibm.com, linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: Re: [PATCH 01/10] vfio: ccw: Moving state change out of IRQ context Message-ID: <20180424115929.5b5e1ff0.cohuck@redhat.com> In-Reply-To: References: <1524149293-12658-1-git-send-email-pmorel@linux.vnet.ibm.com> <1524149293-12658-2-git-send-email-pmorel@linux.vnet.ibm.com> <20180424065442.GV12194@bjsdjshi@linux.vnet.ibm.com> Organization: Red Hat GmbH MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Tue, 24 Apr 2018 09:59:32 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Tue, 24 Apr 2018 09:59:32 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'cohuck@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 24 Apr 2018 10:40:56 +0200 Pierre Morel wrote: > On 24/04/2018 08:54, Dong Jia Shi wrote: > > * Pierre Morel [2018-04-19 16:48:04 +0200]: > > > > [...] > > > >> @@ -94,9 +83,15 @@ static void vfio_ccw_sch_io_todo(struct work_struct *work) > >> static void vfio_ccw_sch_irq(struct subchannel *sch) > >> { > >> struct vfio_ccw_private *private = dev_get_drvdata(&sch->dev); > >> + struct irb *irb = this_cpu_ptr(&cio_irb); > >> > >> inc_irq_stat(IRQIO_CIO); > >> - vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_INTERRUPT); > >> + memcpy(&private->irb, irb, sizeof(*irb)); > >> + > >> + WARN_ON(work_pending(&private->io_work)); > > Hmm, why do we need this? > > The current design insure that we have not two concurrent SSCH requests. > How ever I want here to track spurious interrupt. > If we implement cancel, halt or clear requests, we also may trigger (AFAIU) > a second interrupts depending on races between instructions, controller > and device. You won't get an interrupt for a successful cancel. If you do a halt/clear, you will make the subchannel halt/clear pending in addition to start pending and you'll only get one interrupt (if the I/O has progressed far enough, you won't be able to issue a hsch). The interesting case is: - guest does a ssch, we do a ssch on the device - the guest does a csch before it got the interrupt for the ssch - before we do the csch on the device, the subchannel is already status pending with completion of the ssch - after we issue the csch, we get a second interrupt (for the csch) I think we should present two interrupts to the guest in that case. Races between issuing ssch/hsch/csch and the subchannel becoming status pending happen on real hardware as well, we're just more likely to see them with the vfio layer in between. (I'm currently trying to recall what we're doing with unsolicited interrupts. These are fun wrt deferred cc 1; I'm not sure if there are cases where we want to present a deferred cc to the guest.) Also, doing a second ssch before we got final state for the first one is perfectly valid. Linux just does not do it, so I'm not sure if we should invest too much time there. > > We do not need it strongly. > > > > >> + queue_work(vfio_ccw_work_q, &private->io_work); > >> + if (private->completion) > >> + complete(private->completion); > >> } > >> > >> static int vfio_ccw_sch_probe(struct subchannel *sch) > > [...] > > >