Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp7580980imu; Tue, 22 Jan 2019 08:12:38 -0800 (PST) X-Google-Smtp-Source: ALg8bN6ZGGfkllWz6j4zf2veDjrhL1Ym6b8TWzaTygHXShHTd0msiOCDcqWeWXT5Ra4Fe1dyOZos X-Received: by 2002:a63:184a:: with SMTP id 10mr32088995pgy.81.1548173558650; Tue, 22 Jan 2019 08:12:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548173558; cv=none; d=google.com; s=arc-20160816; b=gaihC3YgaKPf//uWnUzO/IVdyl/IOBuSMv05Tq0Oj25DjjCJBs+O7MNH9AelSW9ymp 8MYCzc9w6LmlSFUuEjZmctXiFo0GQPOliebueT+qK4orQEL1j7Q2B3er2kna53dpwjQv zNCPV5zRZrgd+b/kh3YILa4Ldm98OAvNZPVvUEvpHlEEFsdOG186MNlLZTb+4BBPWi+o hH/uChd5zSdoviUUFavFUuBR1zIxyvwmYvxY4jP0MxrqdQfSRkdZZ3Bp3wuihTbql5F5 H2AAETIE3BrA+yjhNb91hrOXKKaW3xZe1h2XClsSI6ZXP1HzwqKcN5p3pmmf/3gxxYLC h39g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:organization:user-agent :references:in-reply-to:subject:cc:to:from:message-id:date; bh=MlHkIiK2M8jlAc3qU5N6vDB1Tvn9whkM1PHRA0Orf5c=; b=ZzLbYg3Kbs5ZU9/rvxdNN6SMfQBPty1TDHUXNcR7f0QCu03P1q76FBSKde7kOOY+NJ M4ppohYjM67YnJzgN+F/VogyVI40+P5QG+0ric0S5SxPjNLKOxQpRlQxs7EB2inQH/Yc fCpxZfoBZPygOqYQAvd5vvEizBCnphfM+gwDZ0aR5uPK15ldUmJHJUQ+vFOB+RI8IHSo /EMlto98pn1doovCx27o8uBNEQCU5FmSRUVgfx1pIadADrNrKy7n5Wiq3v32xva6cZX5 XnHZ4BAaaPdA0VDcAWDFTjBdIebC44zx+gx6S04QjdFR8KPitfEU5KS7tQtm0/CJ7ory 1i0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i1si11833339pgs.417.2019.01.22.08.12.22; Tue, 22 Jan 2019 08:12:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729090AbfAVQLD (ORCPT + 99 others); Tue, 22 Jan 2019 11:11:03 -0500 Received: from foss.arm.com ([217.140.101.70]:56714 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728669AbfAVQLD (ORCPT ); Tue, 22 Jan 2019 11:11:03 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9C808A78; Tue, 22 Jan 2019 08:11:02 -0800 (PST) Received: from big-swifty.misterjones.org (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 22FD73F6A8; Tue, 22 Jan 2019 08:11:00 -0800 (PST) Date: Tue, 22 Jan 2019 16:10:58 +0000 Message-ID: <86zhrs8ygd.wl-marc.zyngier@arm.com> From: Marc Zyngier To: Heyi Guo Cc: , Thomas Gleixner , Jason Cooper , Subject: Re: [RFC] irq-gic-v3-its: fix occasional VLPI drop In-Reply-To: References: <1548071508-11846-1-git-send-email-guoheyi@huawei.com> <86fttl9fxh.wl-marc.zyngier@arm.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL/10.8 EasyPG/1.0.0 Emacs/25.1 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) Organization: ARM Ltd MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 22 Jan 2019 12:44:18 +0000, Heyi Guo wrote: > > Hi Marc, > > Thanks for your feedback. Please see my comments below. > > > On 2019/1/22 17:53, Marc Zyngier wrote: > > Hi Heyi, > > > > On Mon, 21 Jan 2019 11:51:48 +0000, > > Heyi Guo wrote: > >> Every VLPI will temporarily be mapped to the first CPU in system > >> (normally CPU0) and then moved to the real scheduled CPU later. There > >> is a time window so a VLPI may be sent to CPU0 instead of the real > >> scheduled vCPU, in a multi-CPU virtual machine. However, CPU0 may have > >> not been scheduled as a virtual CPU after system boots up, so the > >> value of GICR_VPROPBASER still be the reset value. According to GIC > >> spec, the reset value of IDbits in GICR_VPROPBASER is architecturally > >> UNKNOWN, and the GIC will behave as if all virtual LPIs are out of > >> range if it is less than 0b1101. On our platform the GICR will simply > >> drop the incoming VLPI, which results in interrupt missing in Guest. > > OK, it took me some time to page this horror back in. So let's see if > > I can sum-up the issue correctly: > > Sorry for not explaining the whole thing clearly... > No worries, that's mostly for me to make sure I understood the issue correctly. I've paged out the GICv4 driver a while ago, and it takes some effort to reload it. ;-) > > > > - When a VM gets created, all the vPEs are mapped to CPU0's > > redistributor. > > Not exactly on VM geting created, but when the passthru PCI device > driver in Guest tries to enable MSI interrupts. The specific code is > in its_map_vm(). What I meant is that as far as the GIC is concerned, that's equivalent to a VM creation. its_map_vm() is what makes the GIC aware of it. > > > > - If a device starts emitting VLPIs targeting a vPE that has not run > > yet, these VLPIs are forwarded to CPU0's redistributor. > > > > - If CPU0 has itself never run any vPE, its GICR_PROPBASER is not > > initialised, meaning that the IDbits field may contain a value that > > makes the redistributor drop the interrupt on the floor. > Yes. > > > > Is that a correct assessment of the issue you're seeing? If so, I > > think you have a very good point here, and this looks like a hole in > > the driver. > > > > Comments below: > > > >> As no code will clear GICR_VPROPBASER at runtime, we can safely > >> initialize the IDbits field at boot time for each CPU to get rid of > >> this issue. > >> > >> Signed-off-by: Heyi Guo > >> Signed-off-by: Heyi Guo > >> --- > >> drivers/irqchip/irq-gic-v3-its.c | 14 ++++++++++++++ > >> 1 file changed, 14 insertions(+) > >> > >> diff --git a/drivers/irqchip/irq-gic-v3-its.c b/drivers/irqchip/irq-gic-v3-its.c > >> index db20e99..6116215 100644 > >> --- a/drivers/irqchip/irq-gic-v3-its.c > >> +++ b/drivers/irqchip/irq-gic-v3-its.c > >> @@ -2144,6 +2144,20 @@ static void its_cpu_init_lpis(void) > >> val |= GICR_CTLR_ENABLE_LPIS; > >> writel_relaxed(val, rbase + GICR_CTLR); > >> + /* > >> + * Temporary workaround for vlpi drop on Hi1620. > > Why is this specific to this implementation? Isn't this an issue that > > affects every GICv4 implementations? > This was an internal patch and I forgot to modify the comment before > sending out, either not 100% sure that it is the common behavior of > GICv4 to drop VLPI if IDbits is not correctly configured. I can > change it in V2. Dropping VLPIs that are out of range is the expected behaviour. > > > > >> + * IDbits must be set before any VLPI is sent to this CPU, or else the > >> + * VLPI will be considered as out of range and dropped. > >> + */ > >> + if (gic_rdists->has_vlpis) { > >> + void __iomem *vlpi_base = gic_data_rdist_vlpi_base(); > >> + > >> + val = (LPI_NRBITS - 1) & GICR_VPROPBASER_IDBITS_MASK; > >> + pr_info("GICv4: CPU%d: Init IDbits to 0x%llx for GICR_VPROPBASER\n", > >> + smp_processor_id(), val); > > I don't think this pr_info is useful to a normal user, as it is only > > debug information. I'm actually minded to demote a bunch of the GICv3 > > prints to pr_debug. > OK. > >> + gits_write_vpropbaser(val, vlpi_base + GICR_VPROPBASER); > >> + } > >> + > > I think we need to clear GICR_VPENDBASER.Valid too (you can probably > > reuse part of its_vpe_deschedule for that), so that we don't get into > > a bizarre situation where CPU0's redistributor has some ancient > > programming left in, and could start corrupting memory. > I can do that for safety. But is it possible of corrupting memory? > Even if GICR_VPENDBASER.Valid==1, I don't think it is possible that > GICR_VPENDBASER.Physical_Address equals to VPT_addr, so kernel > should consider vPE is not sheculed on CPU0 and only memory pointed > by VPT_addr will be modified. Please let me know if I'm wrong :) Well, we must still make sure that no VLPI will be propagated to memory before KVM actually run a vcpu on this CPU. And yes, this is for safety, we'd be very unlucky if that happened. But still, it is theoretically possible > > > >> /* Make sure the GIC has seen the above */ > >> dsb(sy); > >> out: > >> -- > >> 1.8.3.1 > >> > > Can you please respin this quickly with the above changes? > Sure. Cool, thanks. M. -- Jazz is not dead, it just smell funny.