Re: [PATCH v11 00/20] VFIO support for platform and ARM AMBA devices

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This fix should work, in a more elegant way. Could you confirm ?

I'm sorry I don't have any means to reproduce the bug on my side ...

Thanks,
Baptiste

diff --git a/drivers/vfio/platform/vfio_platform_irq.c b/drivers/vfio/platform/vfio_platform_irq.c
index 6ade36b..f5f3de0 100644
--- a/drivers/vfio/platform/vfio_platform_irq.c
+++ b/drivers/vfio/platform/vfio_platform_irq.c
@@ -208,6 +208,7 @@ static int vfio_set_trigger(struct vfio_platform_device *vdev, int index,
 
        irq->trigger = trigger;
 
+       irq_set_status_flags(irq->hwirq, IRQ_NOAUTOEN);
        ret = request_irq(irq->hwirq, handler, 0, irq->name, irq);
        if (ret) {
                kfree(irq->name);
@@ -216,12 +217,8 @@ static int vfio_set_trigger(struct vfio_platform_device *vdev, int index,
                return ret;
        }
 
-       /* if the IRQ has been masked by the user before setting an eventfd,
-        * then we need to make sure it is properly disabled */
-       spin_lock_irqsave(&irq->lock, flags);
-       if (irq->masked)
-               disable_irq_nosync(irq->hwirq);
-       spin_unlock_irqrestore(&irq->lock, flags);
+       if (!irq->masked)
+               enable_irq(irq->hwirq);
 
        return 0;
 }

On Mon, Jan 19, 2015 at 7:09 PM, Eric Auger <eric.auger@xxxxxxxxxx> wrote:
Hi Baptiste,

yes it fixes the issue in my use case.

Best Regards

Eric

On 01/19/2015 06:00 PM, Baptiste Reynal wrote:
> Hi Eric,
>
> Thanks for taking time about this issue. I agree with you, there is a
> problem here. While I think on a better fix and to be sure the problem
> is here, may you try this patch and tell me if the problem is solved ?
> (This should work as the automasked_irq_handler doesn't do anything if
> the IRQ is masked).
>
> If you have a suggestion on a fix, you're welcome :)
>
> diff --git a/drivers/vfio/platform/vfio_platform_irq.c
> b/drivers/vfio/platform/vfio_platform_irq.c
> index 6ade36b..c9bac80 100644
> --- a/drivers/vfio/platform/vfio_platform_irq.c
> +++ b/drivers/vfio/platform/vfio_platform_irq.c
> @@ -184,6 +184,7 @@ static int vfio_set_trigger(struct
> vfio_platform_device *vdev, int index,
>         struct eventfd_ctx *trigger;
>         unsigned long flags;
>         int ret;
> +       bool masked;
>
>         if (irq->trigger) {
>                 free_irq(irq->hwirq, irq);
> @@ -208,6 +209,8 @@ static int vfio_set_trigger(struct
> vfio_platform_device *vdev, int index,
>
>         irq->trigger = trigger;
>
> +       masked = irq->masked;
> +
>         ret = request_irq(irq->hwirq, handler, 0, irq->name, irq);
>         if (ret) {
>                 kfree(irq->name);
> @@ -219,7 +222,7 @@ static int vfio_set_trigger(struct
> vfio_platform_device *vdev, int index,
>         /* if the IRQ has been masked by the user before setting an eventfd,
>          * then we need to make sure it is properly disabled */
>         spin_lock_irqsave(&irq->lock, flags);
> -       if (irq->masked)
> +       if (masked)
>                 disable_irq_nosync(irq->hwirq);
>         spin_unlock_irqrestore(&irq->lock, flags);
>
> On Mon, Jan 19, 2015 at 1:27 PM, Eric Auger <eric.auger@xxxxxxxxxx
> <mailto:eric.auger@xxxxxxxxxx>> wrote:
>
>     Hi Baptiste,
>
>     I think what happens on the second qemu run is:
>
>     an IRQ hits immediatly after request_irq
>     automasked handler sets masked = true
>     in vfio_set_trigger following condition becomes true
>             if (irq->masked)
>                     disable_irq_nosync(irq->hwirq);
>     IRQ is disabled twice, in handler and in vfio_set_trigger while there is
>     a single enable in resamplefd handler.
>     To me you should prevent from entering ISR between request_irq and
>     disable_irq.
>
>     It does not happen on the first run because no IRQ hit.
>
>     Please let me know if you share this understanding.
>
>     Best Regards
>
>     Eric
>
>     On 01/19/2015 11:17 AM, Eric Auger wrote:
>     > Hi Baptiste,
>     >
>     > sorry I was off on Friday. you're right I missed the masked field was
>     > reset on init. Nethertheless with current QEMU VFIO code, IRQ runs on
>     > the first run and not on the second one. I investigate on my side ...
>     >
>     > Best Regards
>     >
>     > Eric
>     >
>     >
>     >
>     >
>     > On 01/16/2015 02:25 PM, Baptiste Reynal wrote:
>     >> Hello Eric,
>     >>
>     >> I'm not sure I understand the issue here. I tried to reproduce
>     the bug
>     >> by triggering an interrupt without unmasking it, but the interrupt is
>     >> unmasked when the program access to the device (vfio_platform_open
>     >> reinit IRQs).
>     >>
>     >> May I have more details on the bug ?
>     >>
>     >> Thanks
>     >>
>     >> On Fri, Jan 9, 2015 at 12:33 PM, Antonios Motakis
>     >> <a.motakis@xxxxxxxxxxxxxxxxxxxxxx
>     <mailto:a.motakis@xxxxxxxxxxxxxxxxxxxxxx>
>     >> <mailto:a.motakis@xxxxxxxxxxxxxxxxxxxxxx
>     <mailto:a.motakis@xxxxxxxxxxxxxxxxxxxxxx>>> wrote:
>     >>
>     >>     On Fri, Jan 9, 2015 at 9:39 AM, Eric Auger
>     <eric.auger@xxxxxxxxxx <mailto:eric.auger@xxxxxxxxxx>
>     >>     <mailto:eric.auger@xxxxxxxxxx
>     <mailto:eric.auger@xxxxxxxxxx>>> wrote:
>     >>     > Hi Antonios,
>     >>     >
>     >>     > when moving to 3.19rc3 I observe a regression with my xgmac
>     use case
>     >>     > (real-time change?).
>     >>     >
>     >>     > I guess what happens is when I kill a first qemu session,
>     guest does not
>     >>     > have time to complete the virtual IRQ and the unmask is not
>     performed by
>     >>     > the virqfd handler. When starting a new QEMU session, the irqfd
>     >>     > signalling is put in place again but since the masked field
>     is set, the
>     >>     > IRQ is left unmasked (v11 modification in vfio_set_trigger).
>     >>     >
>     >>     > The problem is that we don't discriminate between user mask
>     action and
>     >>     > automasked handler action. In case the user did not mask, I
>     think we
>     >>     > should reset the masked field when doing the free_irq. What
>     do you think?
>     >>
>     >>     Hello Eric,
>     >>
>     >>     I agree, we should reset the masked field for future users.
>     >>
>     >>     Best regards
>     >>     Antonios
>     >>
>     >>     >
>     >>     > Best Regards
>     >>     >
>     >>     > Eric
>     >>     >
>     >>     > On 01/06/2015 11:48 AM, Antonios Motakis wrote:
>     >>     >> This patch series aims to implement VFIO support for platform
>     >>     devices that
>     >>     >> reside behind an IOMMU. Examples of such devices are devices
>     >>     behind an ARM
>     >>     >> SMMU, or behind a Samsung Exynos System MMU.
>     >>     >>
>     >>     >> The API used is based on the existing VFIO API that is
>     also used
>     >>     with PCI
>     >>     >> devices. Only devices that include a basic set of IRQs and
>     memory
>     >>     regions are
>     >>     >> targeted; devices with complex relationships with other
>     devices
>     >>     on a device
>     >>     >> tree are not taken into account at this stage.
>     >>     >>
>     >>     >> This patch series may be applied on the following
>     series/patches:
>     >>     >>  - [PATCH] driver core: amba: add device binding path
>     >>     'driver_override'
>     >>     >>  - [PATCH v3 0/6] vfio: type1: support for ARM SMMUS with
>     >>     VFIO_IOMMU_TYPE1
>     >>     >>
>     >>     >> A copy can be cloned from the branch vfio-platform-v11 at:
>     >>     >> git@xxxxxxxxxx:virtualopensystems/linux-kvm-arm.git
>     >>     >>
>     >>     >> Changes since v10:
>     >>     >>  - Check if interrupt is already masked when setting a new
>     trigger
>     >>     >>  - Fixed kasprintf with unchecked return value in VFIO
>     AMBA driver
>     >>     >> Changes since v9:
>     >>     >>  - Reworked the splitting of the patches that decouple virqfd
>     >>     from PCI
>     >>     >>  - Some styling issues and typos
>     >>     >>  - Removed superfluous includes
>     >>     >>  - AMBA devices are now named vfio-amba- suffixed by the AMBA
>     >>     device id
>     >>     >>  - Several other cleanups and fixes
>     >>     >> Changes since v8:
>     >>     >>  - Separate irq handler for edge and level triggered
>     interrupts
>     >>     >>  - Mutex based lock for VFIO fd open/release
>     >>     >>  - Fixed bug where the first region of a platform device
>     wasn't
>     >>     exposed
>     >>     >>  - Read only regions can be MMAPed only read only
>     >>     >>  - Code cleanups
>     >>     >> Changes since v7:
>     >>     >>  - Some initial placeholder functionality for PIO resources
>     >>     >>  - Cleaned up code for IRQ triggering, masking and unmasking
>     >>     >>  - Some functionality has been removed from this series and
>     >>     posted separately:
>     >>     >>    - VFIO_IOMMU_TYPE1 support for ARM SMMUs
>     >>     >>    - IOMMU NOEXEC patches
>     >>     >>    - driver_override functionality for AMBA devices
>     >>     >>  - Several fixes
>     >>     >> Changes since v6:
>     >>     >>  - Integrated support for AMBA devices
>     >>     >>  - Numerous cleanups and fixes
>     >>     >> Changes since v5:
>     >>     >>  - Full eventfd support for IRQ masking and unmasking.
>     >>     >>  - Changed IOMMU_EXEC to IOMMU_NOEXEC, along with related
>     flags
>     >>     in VFIO.
>     >>     >>  - Other fixes based on reviewer comments.
>     >>     >> Changes since v4:
>     >>     >>  - Use static offsets for each region in the VFIO device fd
>     >>     >>  - Include patch in the series for the ARM SMMU to expose
>     IOMMU_EXEC
>     >>     >>    availability via IOMMU_CAP_DMA_EXEC
>     >>     >>  - Rebased on VFIO multi domain support:
>     >>     >>    - IOMMU_EXEC is now available if at least one IOMMU in the
>     >>     container
>     >>     >>      supports it
>     >>     >>    - Expose IOMMU_EXEC if available via the capability
>     >>     VFIO_IOMMU_PROT_EXEC
>     >>     >>  - Some bug fixes
>     >>     >> Changes since v3:
>     >>     >>  - Use Kim Phillips' driver_probe_device()
>     >>     >> Changes since v2:
>     >>     >>  - Fixed Read/Write and MMAP on device regions
>     >>     >>  - Removed dependency on Device Tree
>     >>     >>  - Interrupts support
>     >>     >>  - Interrupt masking/unmasking
>     >>     >>  - Automask level sensitive interrupts
>     >>     >>  - Introduced VFIO_DMA_MAP_FLAG_EXEC
>     >>     >>  - Code clean ups
>     >>     >>
>     >>     >> Antonios Motakis (20):
>     >>     >>   vfio/platform: initial skeleton of VFIO support for platform
>     >>     devices
>     >>     >>   vfio: platform: probe to devices on the platform bus
>     >>     >>   vfio: platform: add the VFIO PLATFORM module to Kconfig
>     >>     >>   vfio: amba: VFIO support for AMBA devices
>     >>     >>   vfio: amba: add the VFIO for AMBA devices module to Kconfig
>     >>     >>   vfio/platform: return info for bound device
>     >>     >>   vfio/platform: return info for device memory mapped IO
>     regions
>     >>     >>   vfio/platform: read and write support for the device fd
>     >>     >>   vfio/platform: support MMAP of MMIO regions
>     >>     >>   vfio/platform: return IRQ info
>     >>     >>   vfio/platform: initial interrupts support code
>     >>     >>   vfio/platform: trigger an interrupt via eventfd
>     >>     >>   vfio/platform: support for level sensitive interrupts
>     >>     >>   vfio: add a vfio_ prefix to virqfd_enable and
>     virqfd_disable and
>     >>     >>     export
>     >>     >>   vfio: virqfd: rename vfio_pci_virqfd_init and
>     vfio_pci_virqfd_exit
>     >>     >>   vfio: add local lock for virqfd instead of depending on
>     VFIO PCI
>     >>     >>   vfio: pass an opaque pointer on virqfd initialization
>     >>     >>   vfio: move eventfd support code for VFIO_PCI to a
>     separate file
>     >>     >>   vfio: initialize the virqfd workqueue in VFIO generic code
>     >>     >>   vfio/platform: implement IRQ masking/unmasking via an
>     eventfd
>     >>     >>
>     >>     >>  drivers/vfio/Kconfig                          |   1 +
>     >>     >>  drivers/vfio/Makefile                         |   5 +-
>     >>     >>  drivers/vfio/pci/vfio_pci.c                   |   8 -
>     >>     >>  drivers/vfio/pci/vfio_pci_intrs.c             | 238
>     +-----------
>     >>     >>  drivers/vfio/pci/vfio_pci_private.h           |   3 -
>     >>     >>  drivers/vfio/platform/Kconfig                 |  19 +
>     >>     >>  drivers/vfio/platform/Makefile                |   8 +
>     >>     >>  drivers/vfio/platform/vfio_amba.c             | 115 ++++++
>     >>     >>  drivers/vfio/platform/vfio_platform.c         | 103 +++++
>     >>     >>  drivers/vfio/platform/vfio_platform_common.c  | 520
>     >>     ++++++++++++++++++++++++++
>     >>     >>  drivers/vfio/platform/vfio_platform_irq.c     | 340
>     >>     +++++++++++++++++
>     >>     >>  drivers/vfio/platform/vfio_platform_private.h |  82 ++++
>     >>     >>  drivers/vfio/vfio.c                           |   8 +
>     >>     >>  drivers/vfio/virqfd.c                         | 213
>     +++++++++++
>     >>     >>  include/linux/vfio.h                          |  27 ++
>     >>     >>  include/uapi/linux/vfio.h                     |   2 +
>     >>     >>  16 files changed, 1456 insertions(+), 236 deletions(-)
>     >>     >>  create mode 100644 drivers/vfio/platform/Kconfig
>     >>     >>  create mode 100644 drivers/vfio/platform/Makefile
>     >>     >>  create mode 100644 drivers/vfio/platform/vfio_amba.c
>     >>     >>  create mode 100644 drivers/vfio/platform/vfio_platform.c
>     >>     >>  create mode 100644
>     drivers/vfio/platform/vfio_platform_common.c
>     >>     >>  create mode 100644 drivers/vfio/platform/vfio_platform_irq.c
>     >>     >>  create mode 100644
>     drivers/vfio/platform/vfio_platform_private.h
>     >>     >>  create mode 100644 drivers/vfio/virqfd.c
>     >>     >>
>     >>     >
>     >>
>     >>
>     >
>
>


_______________________________________________
kvmarm mailing list
kvmarm@xxxxxxxxxxxxxxxxxxxxx
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm

[Index of Archives]     [Linux KVM]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux