Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp6504762ybl; Wed, 15 Jan 2020 05:51:29 -0800 (PST) X-Google-Smtp-Source: APXvYqxmKwzfFBf7o0HlW38YNQSO5emrtDQU58eJNwvmdPFjpnXpzATYTrZKPFWCr4BykmrDKkeD X-Received: by 2002:aca:cdca:: with SMTP id d193mr21346460oig.152.1579096289274; Wed, 15 Jan 2020 05:51:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579096289; cv=none; d=google.com; s=arc-20160816; b=M0CK/NwZJCxbjGiEWiegoeL8eJ3sB4qoMm0IA4lfP6hE9C+Mz5jXZevdIcByWaE951 kt+lYiOMwLds3tPRO6Fchl+u47mBR4YkIJK5k+1XdBPta1wTNRTnf5syVMVqEgxxTiWg vAZp9YEPh15TNc5IODDKEJ0iuteSO3YWhlpKR8tWedixebLQJ7lkHd1N5lglzRI1Q26N +CXu+7kyTto0B9cFU9gaPJ/MpIJvZLG0Fhu3UiIW5DRgnXxDHgQcpcYnEda0YtmAh8d1 4Vg4siWKW9Sboipf6PqFZ4cCd2/sR5b1TaRrTEPelpDmH1Bjb3zgXYwQ4NLM99malEDw 1isg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=ihm6gOiZK9qb6kqoS0CqHBfRtZAPZcNCmR5+9Pq6iDc=; b=C+seNXLT6QW0WT/7n47ska5f4v8t99ag10NS8NahRGPvK7Umhupb10h3TTeeKVu0rq arqWYkqPUFoy/Bv5xI4pMJxjmOfGHoVN/d8fweDvQEKr621C9kHpkYYqXuKhHfasqGPj 14lOisVPpEBSFTD6UZOTD2YnyGWH9UFwYj/KXw4U9caUHQOBkRJZL0XdHH83c5ZPYHpC Vk1VUHOsZe+SJrTqRVVgwtxr8j0G402fDXKUzWzKV3TPwM4q+rKKxoLS8SkxkJWGlS2N 6Xs3dOiIMyBt2oxELdGpujB4X1RDxNbocK1k7RqYuasFH73ngASkXdgNP2IMoXXDXm66 ERfg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p16si9707696oto.287.2020.01.15.05.51.16; Wed, 15 Jan 2020 05:51:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728921AbgAONuN (ORCPT + 99 others); Wed, 15 Jan 2020 08:50:13 -0500 Received: from szxga06-in.huawei.com ([45.249.212.32]:48788 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726085AbgAONuM (ORCPT ); Wed, 15 Jan 2020 08:50:12 -0500 Received: from DGGEMS413-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id E0AF1764F196C96C2BC7; Wed, 15 Jan 2020 21:50:10 +0800 (CST) Received: from [127.0.0.1] (10.173.222.27) by DGGEMS413-HUB.china.huawei.com (10.3.19.213) with Microsoft SMTP Server id 14.3.439.0; Wed, 15 Jan 2020 21:49:59 +0800 Subject: Re: [PATCH v3 29/32] KVM: arm64: GICv4.1: Allow SGIs to switch between HW and SW interrupts To: Marc Zyngier CC: Shaokun Zhang , , , Eric Auger , James Morse , Julien Thierry , Suzuki K Poulose , Thomas Gleixner , Jason Cooper , Lorenzo Pieralisi , Andrew Murray , Robert Richter , "Tangnianyao (ICT)" References: <20191224111055.11836-1-maz@kernel.org> <20191224111055.11836-30-maz@kernel.org> <6e24d53e-64d9-a682-6753-9e16155c7fde@huawei.com> From: Zenghui Yu Message-ID: <99ed8894-9d30-7dac-9826-abf95b9a5e80@huawei.com> Date: Wed, 15 Jan 2020 21:49:57 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.2.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Originating-IP: [10.173.222.27] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Marc, On 2020/1/15 21:32, Marc Zyngier wrote: > On 2020-01-15 03:49, Zenghui Yu wrote: >> Hi, >> >> On 2020/1/15 10:49, Shaokun Zhang wrote: >>> Hi Marc, [This is from Nianyao] >>> >>> On 2019/12/24 19:10, Marc Zyngier wrote: >>>> In order to let a guest buy in the new, active-less SGIs, we >>>> need to be able to switch between the two modes. >>>> >>>> Handle this by stopping all guest activity, transfer the state >>>> from one mode to the other, and resume the guest. >>>> >>>> Signed-off-by: Marc Zyngier >>>> --- >> >> [...] >> >>>> diff --git a/virt/kvm/arm/vgic/vgic-v4.c b/virt/kvm/arm/vgic/vgic-v4.c >>>> index c2fcde104ea2..063785fd2dc7 100644 >>>> --- a/virt/kvm/arm/vgic/vgic-v4.c >>>> +++ b/virt/kvm/arm/vgic/vgic-v4.c >>>> @@ -97,6 +97,102 @@ static irqreturn_t vgic_v4_doorbell_handler(int >>>> irq, void *info) >>>>       return IRQ_HANDLED; >>>>   } >>>>   +static void vgic_v4_sync_sgi_config(struct its_vpe *vpe, struct >>>> vgic_irq *irq) >>>> +{ >>>> +    vpe->sgi_config[irq->intid].enabled    = irq->enabled; >>>> +    vpe->sgi_config[irq->intid].group     = irq->group; >>>> +    vpe->sgi_config[irq->intid].priority    = irq->priority; >>>> +} >>>> + >>>> +static void vgic_v4_enable_vsgis(struct kvm_vcpu *vcpu) >>>> +{ >>>> +    struct its_vpe *vpe = &vcpu->arch.vgic_cpu.vgic_v3.its_vpe; >>>> +    int i; >>>> + >>>> +    /* >>>> +     * With GICv4.1, every virtual SGI can be directly injected. So >>>> +     * let's pretend that they are HW interrupts, tied to a host >>>> +     * IRQ. The SGI code will do its magic. >>>> +     */ >>>> +    for (i = 0; i < VGIC_NR_SGIS; i++) { >>>> +        struct vgic_irq *irq = vgic_get_irq(vcpu->kvm, vcpu, i); >>>> +        struct irq_desc *desc; >>>> +        int ret; >>>> + >>>> +        if (irq->hw) { >>>> +            vgic_put_irq(vcpu->kvm, irq); >>>> +            continue; >>>> +        } >>>> + >>>> +        irq->hw = true; >>>> +        irq->host_irq = irq_find_mapping(vpe->sgi_domain, i); >>> >>> I think we need to check whether irq_find_mapping returns 0. >>> >>>> +        vgic_v4_sync_sgi_config(vpe, irq); >>>> +        /* >>>> +         * SGIs are initialised as disabled. Enable them if >>>> +         * required by the rest of the VGIC init code. >>>> +         */ >>>> +        desc = irq_to_desc(irq->host_irq); >>>> +        ret = irq_domain_activate_irq(irq_desc_get_irq_data(desc), >>>> +                          false); >>> >>> If irq->host_irq is not valid , in irq_domain_activate_irq, it will >>> trigger NULL pointer >>> dereference in host kernel. >>> I meet a problem here. When hw support GIC4.1, and host kernel is >>> started with >>> kvm-arm.vgic_v4_enable=0, starting a virtual machine will trigger >>> NULL pointer >>> dereference in host. >> >> I think the thing is that we should _not_ try to configure vSGIs at all >> if kvm-arm.vgic_v4_enable=0 (which indicates we don't allow use of the >> GICv4 of direct injection). >> >> We currently set kvm_vgic_global_state.has_gicv4_1 to true if HW support >> GICv4.1, regardless whatever the gicv4_enable is (see patch#23 - >> vgic_v3_probe).  I think this is what actually needs fixing. > > Yes, my point exactly. I've pushed out a potential fix [1], and I'd be > grateful if you could let me know whether that fixes it for you. I haven't had the appropriate HW yet.. Nianyao or Shaokun can help to test it tomorrow, I think. > > Thanks, > >         M. > > [1] > https://git.kernel.org/pub/scm/linux/kernel/git/maz/arm-platforms.git/commit/?h=irq/gic-v4.1-devel&id=b82c2ee1d3fef66fb85793965c344260f618219d Anyway, this looks good to me. Thanks, Zenghui