Hi Eric,
Thanks for taking time about this issue. I agree with you, there is a problem here. While I think on a better fix and to be sure the problem is here, may you try this patch and tell me if the problem is solved ? (This should work as the automasked_irq_handler doesn't do anything if the IRQ is masked).If you have a suggestion on a fix, you're welcome :)
diff --git a/drivers/vfio/platform/vfio_platform_irq.c b/drivers/vfio/platform/vfio_platform_irq.c
index 6ade36b..c9bac80 100644
--- a/drivers/vfio/platform/vfio_platform_irq.c
+++ b/drivers/vfio/platform/vfio_platform_irq.c
@@ -184,6 +184,7 @@ static int vfio_set_trigger(struct vfio_platform_device *vdev, int index,
struct eventfd_ctx *trigger;
unsigned long flags;
int ret;
+ bool masked;
if (irq->trigger) {
free_irq(irq->hwirq, irq);
@@ -208,6 +209,8 @@ static int vfio_set_trigger(struct vfio_platform_device *vdev, int index,
irq->trigger = trigger;
+ masked = irq->masked;
+
ret = request_irq(irq->hwirq, handler, 0, irq->name, irq);
if (ret) {
kfree(irq->name);
@@ -219,7 +222,7 @@ static int vfio_set_trigger(struct vfio_platform_device *vdev, int index,
/* if the IRQ has been masked by the user before setting an eventfd,
* then we need to make sure it is properly disabled */
spin_lock_irqsave(&irq->lock, flags);
- if (irq->masked)
+ if (masked)
disable_irq_nosync(irq->hwirq);
spin_unlock_irqrestore(&irq->lock, flags);
On Mon, Jan 19, 2015 at 1:27 PM, Eric Auger <eric.auger@xxxxxxxxxx> wrote:
Hi Baptiste,
I think what happens on the second qemu run is:
an IRQ hits immediatly after request_irq
automasked handler sets masked = true
in vfio_set_trigger following condition becomes true
if (irq->masked)
disable_irq_nosync(irq->hwirq);
IRQ is disabled twice, in handler and in vfio_set_trigger while there is
a single enable in resamplefd handler.
To me you should prevent from entering ISR between request_irq and
disable_irq.
It does not happen on the first run because no IRQ hit.
Please let me know if you share this understanding.
Best Regards
Eric
On 01/19/2015 11:17 AM, Eric Auger wrote:
> Hi Baptiste,
>
> sorry I was off on Friday. you're right I missed the masked field was
> reset on init. Nethertheless with current QEMU VFIO code, IRQ runs on
> the first run and not on the second one. I investigate on my side ...
>
> Best Regards
>
> Eric
>
>
>
>
> On 01/16/2015 02:25 PM, Baptiste Reynal wrote:
>> Hello Eric,
>>
>> I'm not sure I understand the issue here. I tried to reproduce the bug
>> by triggering an interrupt without unmasking it, but the interrupt is
>> unmasked when the program access to the device (vfio_platform_open
>> reinit IRQs).
>>
>> May I have more details on the bug ?
>>
>> Thanks
>>
>> On Fri, Jan 9, 2015 at 12:33 PM, Antonios Motakis
>> <a.motakis@xxxxxxxxxxxxxxxxxxxxxx
>> <mailto:a.motakis@xxxxxxxxxxxxxxxxxxxxxx>> wrote:
>>
>> On Fri, Jan 9, 2015 at 9:39 AM, Eric Auger <eric.auger@xxxxxxxxxx
>> <mailto:eric.auger@xxxxxxxxxx>> wrote:
>> > Hi Antonios,
>> >
>> > when moving to 3.19rc3 I observe a regression with my xgmac use case
>> > (real-time change?).
>> >
>> > I guess what happens is when I kill a first qemu session, guest does not
>> > have time to complete the virtual IRQ and the unmask is not performed by
>> > the virqfd handler. When starting a new QEMU session, the irqfd
>> > signalling is put in place again but since the masked field is set, the
>> > IRQ is left unmasked (v11 modification in vfio_set_trigger).
>> >
>> > The problem is that we don't discriminate between user mask action and
>> > automasked handler action. In case the user did not mask, I think we
>> > should reset the masked field when doing the free_irq. What do you think?
>>
>> Hello Eric,
>>
>> I agree, we should reset the masked field for future users.
>>
>> Best regards
>> Antonios
>>
>> >
>> > Best Regards
>> >
>> > Eric
>> >
>> > On 01/06/2015 11:48 AM, Antonios Motakis wrote:
>> >> This patch series aims to implement VFIO support for platform
>> devices that
>> >> reside behind an IOMMU. Examples of such devices are devices
>> behind an ARM
>> >> SMMU, or behind a Samsung Exynos System MMU.
>> >>
>> >> The API used is based on the existing VFIO API that is also used
>> with PCI
>> >> devices. Only devices that include a basic set of IRQs and memory
>> regions are
>> >> targeted; devices with complex relationships with other devices
>> on a device
>> >> tree are not taken into account at this stage.
>> >>
>> >> This patch series may be applied on the following series/patches:
>> >> - [PATCH] driver core: amba: add device binding path
>> 'driver_override'
>> >> - [PATCH v3 0/6] vfio: type1: support for ARM SMMUS with
>> VFIO_IOMMU_TYPE1
>> >>
>> >> A copy can be cloned from the branch vfio-platform-v11 at:
>> >> git@xxxxxxxxxx:virtualopensystems/linux-kvm-arm.git
>> >>
>> >> Changes since v10:
>> >> - Check if interrupt is already masked when setting a new trigger
>> >> - Fixed kasprintf with unchecked return value in VFIO AMBA driver
>> >> Changes since v9:
>> >> - Reworked the splitting of the patches that decouple virqfd
>> from PCI
>> >> - Some styling issues and typos
>> >> - Removed superfluous includes
>> >> - AMBA devices are now named vfio-amba- suffixed by the AMBA
>> device id
>> >> - Several other cleanups and fixes
>> >> Changes since v8:
>> >> - Separate irq handler for edge and level triggered interrupts
>> >> - Mutex based lock for VFIO fd open/release
>> >> - Fixed bug where the first region of a platform device wasn't
>> exposed
>> >> - Read only regions can be MMAPed only read only
>> >> - Code cleanups
>> >> Changes since v7:
>> >> - Some initial placeholder functionality for PIO resources
>> >> - Cleaned up code for IRQ triggering, masking and unmasking
>> >> - Some functionality has been removed from this series and
>> posted separately:
>> >> - VFIO_IOMMU_TYPE1 support for ARM SMMUs
>> >> - IOMMU NOEXEC patches
>> >> - driver_override functionality for AMBA devices
>> >> - Several fixes
>> >> Changes since v6:
>> >> - Integrated support for AMBA devices
>> >> - Numerous cleanups and fixes
>> >> Changes since v5:
>> >> - Full eventfd support for IRQ masking and unmasking.
>> >> - Changed IOMMU_EXEC to IOMMU_NOEXEC, along with related flags
>> in VFIO.
>> >> - Other fixes based on reviewer comments.
>> >> Changes since v4:
>> >> - Use static offsets for each region in the VFIO device fd
>> >> - Include patch in the series for the ARM SMMU to expose IOMMU_EXEC
>> >> availability via IOMMU_CAP_DMA_EXEC
>> >> - Rebased on VFIO multi domain support:
>> >> - IOMMU_EXEC is now available if at least one IOMMU in the
>> container
>> >> supports it
>> >> - Expose IOMMU_EXEC if available via the capability
>> VFIO_IOMMU_PROT_EXEC
>> >> - Some bug fixes
>> >> Changes since v3:
>> >> - Use Kim Phillips' driver_probe_device()
>> >> Changes since v2:
>> >> - Fixed Read/Write and MMAP on device regions
>> >> - Removed dependency on Device Tree
>> >> - Interrupts support
>> >> - Interrupt masking/unmasking
>> >> - Automask level sensitive interrupts
>> >> - Introduced VFIO_DMA_MAP_FLAG_EXEC
>> >> - Code clean ups
>> >>
>> >> Antonios Motakis (20):
>> >> vfio/platform: initial skeleton of VFIO support for platform
>> devices
>> >> vfio: platform: probe to devices on the platform bus
>> >> vfio: platform: add the VFIO PLATFORM module to Kconfig
>> >> vfio: amba: VFIO support for AMBA devices
>> >> vfio: amba: add the VFIO for AMBA devices module to Kconfig
>> >> vfio/platform: return info for bound device
>> >> vfio/platform: return info for device memory mapped IO regions
>> >> vfio/platform: read and write support for the device fd
>> >> vfio/platform: support MMAP of MMIO regions
>> >> vfio/platform: return IRQ info
>> >> vfio/platform: initial interrupts support code
>> >> vfio/platform: trigger an interrupt via eventfd
>> >> vfio/platform: support for level sensitive interrupts
>> >> vfio: add a vfio_ prefix to virqfd_enable and virqfd_disable and
>> >> export
>> >> vfio: virqfd: rename vfio_pci_virqfd_init and vfio_pci_virqfd_exit
>> >> vfio: add local lock for virqfd instead of depending on VFIO PCI
>> >> vfio: pass an opaque pointer on virqfd initialization
>> >> vfio: move eventfd support code for VFIO_PCI to a separate file
>> >> vfio: initialize the virqfd workqueue in VFIO generic code
>> >> vfio/platform: implement IRQ masking/unmasking via an eventfd
>> >>
>> >> drivers/vfio/Kconfig | 1 +
>> >> drivers/vfio/Makefile | 5 +-
>> >> drivers/vfio/pci/vfio_pci.c | 8 -
>> >> drivers/vfio/pci/vfio_pci_intrs.c | 238 +-----------
>> >> drivers/vfio/pci/vfio_pci_private.h | 3 -
>> >> drivers/vfio/platform/Kconfig | 19 +
>> >> drivers/vfio/platform/Makefile | 8 +
>> >> drivers/vfio/platform/vfio_amba.c | 115 ++++++
>> >> drivers/vfio/platform/vfio_platform.c | 103 +++++
>> >> drivers/vfio/platform/vfio_platform_common.c | 520
>> ++++++++++++++++++++++++++
>> >> drivers/vfio/platform/vfio_platform_irq.c | 340
>> +++++++++++++++++
>> >> drivers/vfio/platform/vfio_platform_private.h | 82 ++++
>> >> drivers/vfio/vfio.c | 8 +
>> >> drivers/vfio/virqfd.c | 213 +++++++++++
>> >> include/linux/vfio.h | 27 ++
>> >> include/uapi/linux/vfio.h | 2 +
>> >> 16 files changed, 1456 insertions(+), 236 deletions(-)
>> >> create mode 100644 drivers/vfio/platform/Kconfig
>> >> create mode 100644 drivers/vfio/platform/Makefile
>> >> create mode 100644 drivers/vfio/platform/vfio_amba.c
>> >> create mode 100644 drivers/vfio/platform/vfio_platform.c
>> >> create mode 100644 drivers/vfio/platform/vfio_platform_common.c
>> >> create mode 100644 drivers/vfio/platform/vfio_platform_irq.c
>> >> create mode 100644 drivers/vfio/platform/vfio_platform_private.h
>> >> create mode 100644 drivers/vfio/virqfd.c
>> >>
>> >
>>
>>
>
_______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm