Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1468690pxu; Tue, 24 Nov 2020 00:31:17 -0800 (PST) X-Google-Smtp-Source: ABdhPJyTqePqabyj0N1aK1tHVLtbhvMgQqpAjeoCIybqWrmy7gOY2jRneBS1IPnJ9A68/ZtrplUi X-Received: by 2002:a17:907:38a:: with SMTP id ss10mr3273680ejb.118.1606206676675; Tue, 24 Nov 2020 00:31:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606206676; cv=none; d=google.com; s=arc-20160816; b=DUAnQlLw8Z8rWh1O4RdMNIe/xBGImHke1hHMbewMbP+xRoFCZzhIEh5VXT8c04ivLP 9p6xhzfLIi2GaK2UyaU3bpRSss7XxtUB9ybPlWLbgFStKU3j/AQrWGoMYDXLV47Z7iKc 35SsAUiCEpqiWSaF1hRwMapE9Z8kdjtfqI2Hf/E5NPeTmOqhMvxrmLywunrC5kaUH01O jdAGLiclawSKOZ7JN4ZIxrbzCu3lfvrW0ji6AW7ZaS3wJ5MACMpiRgnaNjqjYC/L0E27 n0OQ8Q7o295X3upr2fdxaQHzFY2lwL069U2d5+CeMzRp/EsZdXjRTH4h+m/0hIqzO8yZ POzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:user-agent:references:in-reply-to :subject:cc:to:from:date:content-transfer-encoding:mime-version :dkim-signature; bh=mT0OwvFi6ens+6Skg9JLPlGPpglIenYFzCgujiQRtB8=; b=h8j5pKFsvW6mItRfEUV/1hoSpRBtcHVqXTyr+7NvQG9KrjMCpHIDAEp3cVeabv4UCY AqEWU6Fo0SZxypalTVrt4dy9X/owK3VhBetCGZ4FutiRmeFMtqY983PI3h4IOgEdrQtX 6GC3KdQQ74NQMqfdhH0ne61LMw3xejIfzhkKQkmSYYXZe55vgrRKYLHuJI2cFVR2Ktul Bx3rGvTB6mviduZpelPnjOXFrRmrfksiRGMKQ199tX99j13pNQXJCam2gqDI1lTmwS+7 4HNrmas3M6+gLO8FpVA7TVLT/3KgA/qgGl59h/IneYcTuBfnUqFHfP3xmYgCng1EEQVj ktNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DzSuDDeB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g10si8276311ejz.308.2020.11.24.00.30.52; Tue, 24 Nov 2020 00:31:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DzSuDDeB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730526AbgKXI07 (ORCPT + 99 others); Tue, 24 Nov 2020 03:26:59 -0500 Received: from mail.kernel.org ([198.145.29.99]:52632 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730500AbgKXI07 (ORCPT ); Tue, 24 Nov 2020 03:26:59 -0500 Received: from disco-boy.misterjones.org (disco-boy.misterjones.org [51.254.78.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 293F220870; Tue, 24 Nov 2020 08:26:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1606206418; bh=YCvAHBNcK4JrFhb6WFO3tG22p20ZWh3it7ak5hEvG2I=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=DzSuDDeBaz/h0qW7OiRtKhYC5Y7L3qQx5larBizrKvm42cruk2f03ei1/RN4SR/Wr VSq9y/dhO+f009B8o9oyOsJQZerIHcfaAvtZjq1hE5/nGqXOA5oGkdNmfMyTUC0dNJ eR9lbz+Lh/m3jdkMri6N7jXDJshrGda3DKeHP0pM= Received: from disco-boy.misterjones.org ([51.254.78.96] helo=www.loen.fr) by disco-boy.misterjones.org with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94) (envelope-from ) id 1khTf5-00DBXE-Ui; Tue, 24 Nov 2020 08:26:56 +0000 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Date: Tue, 24 Nov 2020 08:26:55 +0000 From: Marc Zyngier To: Shenming Lu Cc: James Morse , Julien Thierry , Suzuki K Poulose , Eric Auger , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Christoffer Dall , Alex Williamson , Kirti Wankhede , Cornelia Huck , Neo Jia , wanghaibin.wang@huawei.com, yuzenghui@huawei.com Subject: Re: [RFC PATCH v1 2/4] KVM: arm64: GICv4.1: Try to save hw pending state in save_pending_tables In-Reply-To: <90f04f50-c1ba-55b2-0f93-1e755b40b487@huawei.com> References: <20201123065410.1915-1-lushenming@huawei.com> <20201123065410.1915-3-lushenming@huawei.com> <90f04f50-c1ba-55b2-0f93-1e755b40b487@huawei.com> User-Agent: Roundcube Webmail/1.4.9 Message-ID: <4e2b87897485e38e251c447b9ad70eb6@kernel.org> X-Sender: maz@kernel.org X-SA-Exim-Connect-IP: 51.254.78.96 X-SA-Exim-Rcpt-To: lushenming@huawei.com, james.morse@arm.com, julien.thierry.kdev@gmail.com, suzuki.poulose@arm.com, eric.auger@redhat.com, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, christoffer.dall@arm.com, alex.williamson@redhat.com, kwankhede@nvidia.com, cohuck@redhat.com, cjia@nvidia.com, wanghaibin.wang@huawei.com, yuzenghui@huawei.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020-11-24 07:40, Shenming Lu wrote: > On 2020/11/23 17:18, Marc Zyngier wrote: >> On 2020-11-23 06:54, Shenming Lu wrote: >>> After pausing all vCPUs and devices capable of interrupting, in order >>         ^^^^^^^^^^^^^^^^^ >> See my comment below about this. >> >>> to save the information of all interrupts, besides flushing the >>> pending >>> states in kvm’s vgic, we also try to flush the states of VLPIs in the >>> virtual pending tables into guest RAM, but we need to have GICv4.1 >>> and >>> safely unmap the vPEs first. >>> >>> Signed-off-by: Shenming Lu >>> --- >>>  arch/arm64/kvm/vgic/vgic-v3.c | 62 >>> +++++++++++++++++++++++++++++++---- >>>  1 file changed, 56 insertions(+), 6 deletions(-) >>> >>> diff --git a/arch/arm64/kvm/vgic/vgic-v3.c >>> b/arch/arm64/kvm/vgic/vgic-v3.c >>> index 9cdf39a94a63..e1b3aa4b2b12 100644 >>> --- a/arch/arm64/kvm/vgic/vgic-v3.c >>> +++ b/arch/arm64/kvm/vgic/vgic-v3.c >>> @@ -1,6 +1,8 @@ >>>  // SPDX-License-Identifier: GPL-2.0-only >>> >>>  #include >>> +#include >>> +#include >>>  #include >>>  #include >>>  #include >>> @@ -356,6 +358,39 @@ int vgic_v3_lpi_sync_pending_status(struct kvm >>> *kvm, struct vgic_irq *irq) >>>      return 0; >>>  } >>> >>> +/* >>> + * With GICv4.1, we can get the VLPI's pending state after unmapping >>> + * the vPE. The deactivation of the doorbell interrupt will trigger >>> + * the unmapping of the associated vPE. >>> + */ >>> +static void get_vlpi_state_pre(struct vgic_dist *dist) >>> +{ >>> +    struct irq_desc *desc; >>> +    int i; >>> + >>> +    if (!kvm_vgic_global_state.has_gicv4_1) >>> +        return; >>> + >>> +    for (i = 0; i < dist->its_vm.nr_vpes; i++) { >>> +        desc = irq_to_desc(dist->its_vm.vpes[i]->irq); >>> +        irq_domain_deactivate_irq(irq_desc_get_irq_data(desc)); >>> +    } >>> +} >>> + >>> +static void get_vlpi_state_post(struct vgic_dist *dist) >> >> nit: the naming feels a bit... odd. Pre/post what? > > My understanding is that the unmapping is a preparation for > get_vlpi_state... > Maybe just call it unmap/map_all_vpes? Yes, much better. [...] >>> +        if (irq->hw) { >>> +            WARN_RATELIMIT(irq_get_irqchip_state(irq->host_irq, >>> +                        IRQCHIP_STATE_PENDING, &is_pending), >>> +                       "IRQ %d", irq->host_irq); >> >> Isn't this going to warn like mad on a GICv4.0 system where this, by >> definition, >> will generate an error? > > As we have returned an error in save_its_tables if hw && !has_gicv4_1, > we don't > have to warn this here? Are you referring to the check in vgic_its_save_itt() that occurs in patch 4? Fair enough, though I think the use of irq_get_irqchip_state() isn't quite what we want, as per my comments on patch #1. >> >>> +        } >>> + >>> +        if (stored == is_pending) >>>              continue; >>> >>> -        if (irq->pending_latch) >>> +        if (is_pending) >>>              val |= 1 << bit_nr; >>>          else >>>              val &= ~(1 << bit_nr); >>> >>>          ret = kvm_write_guest_lock(kvm, ptr, &val, 1); >>>          if (ret) >>> -            return ret; >>> +            goto out; >>>      } >>> -    return 0; >>> + >>> +out: >>> +    get_vlpi_state_post(dist); >> >> This bit worries me: you have unmapped the VPEs, so any interrupt that >> has been >> generated during that phase is now forever lost (the GIC doesn't have >> ownership >> of the pending tables). > > In my opinion, during this phase, the devices capable of interrupting > should have already been paused (prevent from sending interrupts), > such as VFIO migration protocol has already realized it. Is that a hard guarantee? Pausing devices *may* be possible for a limited set of endpoints, but I'm not sure that is universally possible to restart them and expect a consistent state (you have just dropped a bunch of network packets on the floor...). >> Do you really expect the VM to be restartable from that point? I don't >> see how >> this is possible. >> > > If the migration has encountered an error, the src VM might be > restarted, so we have to map the vPEs back. As I said above, I doubt it is universally possible to do so, but after all, this probably isn't worse that restarting on the target... M. -- Jazz is not dead. It just smells funny...