Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1267300ybn; Wed, 25 Sep 2019 15:20:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqxQfzAtwNSXSqnhzt8tdw3OpiP8eVTzG+VI9Bgd9KzGkToh7pDNqtOK+m4oBVgkGkcvJkxm X-Received: by 2002:a50:c351:: with SMTP id q17mr279738edb.123.1569450004696; Wed, 25 Sep 2019 15:20:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569450004; cv=none; d=google.com; s=arc-20160816; b=i7z1HHoNHWNgP9/JusoaBIcdw9Ayvu7fU0UHndLDS5GAJjbZAbWqWINeYA7/y2PlkL 4rT21dBse96sMNplukloSGrme/nL3uDiIyJiLsapLmu7Q0fRRE9MTqJOvDU16TqMBOv6 HlhNkQ+iSOvbok92FvhgHkfQL7bxP2oSZi0rygdLBFWirbZPXFfA3MKPjYeEKFMgmN6H Ma4mLmV1f98brs4TYrAp4d3M3ZGxlXfu+l0kPshMngikcc92qgopwBRSSzDlDGdbElsw kQAqBXkM5lpwpxXnE7AA9XcuSl7fRoN27RWGx2zLqBln7032GXP4h/VBAp+/kzLCPI6w 4Zzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=a0W7LBspAZtin5Cb5Z5vuWXW03qGES5yrDlPS8xd+00=; b=dMBCRsI4HmdOl9fKJzCEBHcu6NdlDq6aJJw3+aM2JXkQJXotpjNiBi3USOeG9Ow5JX sZS/BLvm0xdc+rjUy88BOyXj9IM4/H1jzpeWwYSyr7K2XDl+7Ra5XKo2Mv+w3C6nhjD+ hKeL7hUt2fbCzYUtbUbvS5F5+wblZ+n+8YYCksFGsKxRJ/8MV8B3qr2gyA/neeiYlK9D BmDX/u0Vqn+yHkq8YNGvMl5JP4eho1LwpZXNlpparKnuRAZOqAwtSebHLYa6LeQT1t7n qVy0rxQi7RuYbqQ67iXThbvfND1gAAMq5cqIHwqvKB/8uqDPkfA1t3USxaXydr77DjqT 1XGA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id oy5si105604ejb.170.2019.09.25.15.19.40; Wed, 25 Sep 2019 15:20:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733074AbfIWS20 (ORCPT + 99 others); Mon, 23 Sep 2019 14:28:26 -0400 Received: from foss.arm.com ([217.140.110.172]:47244 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2502415AbfIWS2Z (ORCPT ); Mon, 23 Sep 2019 14:28:25 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C4FF22A6B; Mon, 23 Sep 2019 11:28:24 -0700 (PDT) Received: from big-swifty.lan (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C7A1C3F694; Mon, 23 Sep 2019 11:28:21 -0700 (PDT) From: Marc Zyngier To: kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org Cc: Eric Auger , James Morse , Julien Thierry , Suzuki K Poulose , Thomas Gleixner , Jason Cooper , Lorenzo Pieralisi , Andrew Murray Subject: [PATCH 32/35] KVM: arm64: GICv4.1: Let doorbells be auto-enabled Date: Mon, 23 Sep 2019 19:26:03 +0100 Message-Id: <20190923182606.32100-33-maz@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190923182606.32100-1-maz@kernel.org> References: <20190923182606.32100-1-maz@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As GICv4.1 understands the life cycle of doorbells (instead of just randomly firing them at the most inconvenient time), just enable them at irq_request time, and be done with it. Signed-off-by: Marc Zyngier --- virt/kvm/arm/vgic/vgic-v4.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/virt/kvm/arm/vgic/vgic-v4.c b/virt/kvm/arm/vgic/vgic-v4.c index 50f84f4ce903..e61c7a149515 100644 --- a/virt/kvm/arm/vgic/vgic-v4.c +++ b/virt/kvm/arm/vgic/vgic-v4.c @@ -141,6 +141,7 @@ int vgic_v4_init(struct kvm *kvm) kvm_for_each_vcpu(i, vcpu, kvm) { int irq = dist->its_vm.vpes[i]->irq; + unsigned long irq_flags = DB_IRQ_FLAGS; /* * Don't automatically enable the doorbell, as we're @@ -148,8 +149,14 @@ int vgic_v4_init(struct kvm *kvm) * blocked. Also disable the lazy disabling, as the * doorbell could kick us out of the guest too * early... + * + * On GICv4.1, the doorbell is managed in HW and must + * be left enabled. */ - irq_set_status_flags(irq, DB_IRQ_FLAGS); + if (kvm_vgic_global_state.has_gicv4_1) + irq_flags &= ~IRQ_NOAUTOEN; + irq_set_status_flags(irq, irq_flags); + ret = request_irq(irq, vgic_v4_doorbell_handler, 0, "vcpu", vcpu); if (ret) { -- 2.20.1