Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp389782img; Tue, 26 Feb 2019 01:47:00 -0800 (PST) X-Google-Smtp-Source: AHgI3IZtBsocRDHwdp0StstWZ/GFuv2No2dTu3dq9UZoHKFq/NbMU3H7KTpmqX6Q61Vk4glHRee2 X-Received: by 2002:a63:2bd5:: with SMTP id r204mr23953800pgr.48.1551174420643; Tue, 26 Feb 2019 01:47:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551174420; cv=none; d=google.com; s=arc-20160816; b=lFZgu3V6KL/kEzWlWEO1UwkIlN9qhSL/kFbbUe9Bzr12dQmnkFLtxc2LDzQP8Pj87s zsg6aM+q2ZIi5xHvZvI4BqXHZFcXeVahgPYFhuaDRc6nqFUPAl+XGgjxlCn9eeX8orCN HTC/N0traVvFBrjhC9ZVhy7B54DEnbON0ZB5gSBgZzxDQv0CYgAA4i/IoLEh5AlIevA2 YgtSGjOwTthDRVJfF69cwIDQxO+XJ1WTXl0G7lMTcDsDYhGhpgS51c9BvgIjENedpxyv UD+4T7fwkNQPtEYCPQ/1qyqJPQfgHW67gIj6ziDXqALbqyeMwK7DYGdHqVIWbydKq8G4 b7ZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=4V177RKgQJhnXY8Yim60nAWkYSYwfdZMLvrfLaD837E=; b=warSjzecyzU2f6QNzZVzfx/5uH1QKeUdMPvKYJSJFDx+KssXEbOmVVuc2Mc42NFMVS 3JsZ+xIJ1STUFVgjm5NSoQeRG2q1wIOqXSmtQXETWuzedfq87YB7/VwEJV/60O4oC61t zxOFPe881A/PrvClXTK64AO6WDYknOsfCPSg/XmYY6SzCrCah4O9h0wCSt7P0cIbqP1U xPfy2mCnNatRfXrjvKF37DzXDIISsXMlTCEfaV1SMY1OjjJDYFLLkJPYIi3w1a0a+OdJ KNJt6L++ViPWRosT+6Gw/YgDlhM4ehjk0XXCpZeCKdAxkA0Xc+vAnV9nPYfAHjldi2nv DnBw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e17si12252652pfh.6.2019.02.26.01.46.45; Tue, 26 Feb 2019 01:47:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727646AbfBZJpD (ORCPT + 99 others); Tue, 26 Feb 2019 04:45:03 -0500 Received: from smtp.ctxuk.citrix.com ([185.25.65.24]:54896 "EHLO SMTP.EU.CITRIX.COM" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725941AbfBZJpD (ORCPT ); Tue, 26 Feb 2019 04:45:03 -0500 X-IronPort-AV: E=Sophos;i="5.58,415,1544486400"; d="scan'208";a="86451744" Date: Tue, 26 Feb 2019 10:44:59 +0100 From: Roger Pau =?utf-8?B?TW9ubsOp?= To: Andrew Cooper CC: Julien Grall , Oleksandr Andrushchenko , Boris Ostrovsky , Juergen Gross , Stefano Stabellini , "linux-kernel@vger.kernel.org" , Jan Beulich , xen-devel , Dave P Martin Subject: Re: [Xen-devel] xen/evtchn and forced threaded irq Message-ID: <20190226094459.33y2ygrjei3sf3gk@Air-de-Roger> References: <21214d47-9c68-e6bf-007a-4047cc2b02f9@oracle.com> <8f7445d7-fa50-f3e9-44f5-cc2aebd020f4@arm.com> <15bc52cb-82d8-4d2c-e5a8-c6ae8de90276@oracle.com> <5df8888a-4a29-fccd-bac2-a9c170244029@arm.com> <13a9616c-2d9a-f90b-3358-f2dcadbbb64d@gmail.com> <20190226091420.klgldhotiecezw6h@Air-de-Roger> <038b837c-63c0-afb7-ca7b-75f61af7518e@citrix.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <038b837c-63c0-afb7-ca7b-75f61af7518e@citrix.com> User-Agent: NeoMutt/20180716 X-ClientProxiedBy: AMSPEX02CAS02.citrite.net (10.69.22.113) To AMSPEX02CL02.citrite.net (10.69.22.126) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 26, 2019 at 09:30:07AM +0000, Andrew Cooper wrote: > On 26/02/2019 09:14, Roger Pau Monn? wrote: > > On Mon, Feb 25, 2019 at 01:55:42PM +0000, Julien Grall wrote: > >> Hi Oleksandr, > >> > >> On 25/02/2019 13:24, Oleksandr Andrushchenko wrote: > >>> On 2/22/19 3:33 PM, Julien Grall wrote: > >>>> Hi, > >>>> > >>>> On 22/02/2019 12:38, Oleksandr Andrushchenko wrote: > >>>>> On 2/20/19 10:46 PM, Julien Grall wrote: > >>>>>> Discussing with my team, a solution that came up would be to > >>>>>> introduce one atomic field per event to record the number of > >>>>>> event received. I will explore that solution tomorrow. > >>>>> How will this help if events have some payload? > >>>> What payload? The event channel does not carry any payload. It only > >>>> notify you that something happen. Then this is up to the user to > >>>> decide what to you with it. > >>> Sorry, I was probably not precise enough. I mean that an event might have > >>> associated payload in the ring buffer, for example [1]. So, counting events > >>> may help somehow, but the ring's data may still be lost > >> From my understanding of event channels are edge interrupts. By definition, > > IMO event channels are active high level interrupts. > > > > Let's take into account the following situation: you have an event > > channel masked and the event channel pending bit (akin to the line on > > bare metal) goes from low to high (0 -> 1), then you unmask the > > interrupt and you get an event injected. If it was an edge interrupt > > you wont get an event injected after unmasking, because you would > > have lost the edge. I think the problem here is that Linux treats > > event channels as edge interrupts, when they are actually level. > > Event channels are edge interrupts.? There are several very subtle bugs > to be had by software which treats them as line interrupts. > > Most critically, if you fail to ack them, rebind them to a new vcpu, and > reenable interrupts, you don't get a new interrupt notification.? This > was the source of a 4 month bug when XenServer was moving from > classic-xen to PVOps where using irqbalance would cause dom0 to > occasionally lose interrupts. I would argue that you need to mask them first, rebind to a new vcpu and unmask, and then you will get an interrupt notification, or this should be fixed in Xen to work as you expect: trigger an interrupt notification when moving an asserted event channel between CPUs. Is there any document that describes how such non trivial things (like moving between CPUs) work for event/level interrupts? Maybe I'm being obtuse, but from the example I gave above it's quite clear to me event channels don't get triggered based on edge changes, but rather on the line level. Thanks, Roger.