RE: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
Hello! > I also have an implementation of GSI routing on ARM, basically a rebase > of my old/first implementation of irqfd > (https://patches.linaro.org/32261/) based on irqchip gsi routing & qemu > part (https://lists.gnu.org/archive/html/qemu-devel/2014-07/msg01090.html). I took a glance at it, and looks like it's already obsolete. We already have a convention of GSI number == SPI number. Kind of hardcoded default routing table which cannot be changed. It is used at least by GICv2m emulation. I think we should maintain backwards compatibility with it. I thought about something like: a) GSI < 8192 - correspond to SPIs and cannot be re-routed. b) GSI >= 8192 - correspond to MSI and need to be routed before use. During routing setup we could use either GSI with offset (starting from 8192), or raw number (starting from 0). In case of raw number we would have some complex structure of GSI field in KVM_CAP_IRQFD ioctl, similar to KVM_IRQ_LINE. Something like: bits: | 31 ... 24 | 23 ... 0 | field: | irq_type | irq_id | irq_type[0]: irq_id = SPI irq_type[3]: irq_id = GSI number routed to MSI Consequently, we have to implement only KVM_IRQ_ROUTING_MSI type and completely ignore KVM_IRQ_ROUTING_IRQCHIP. I hope i am clear enough... Kind regards, Pavel Fedin Expert Engineer Samsung Electronics Research center Russia -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
On 06/17/2015 01:46 PM, Pavel Fedin wrote: > Hello! > >> Yes, I am about to get a v2 ready, but mostly with some fixes. If you >> want to work on top of it, I can push a WIP branch to my repo. > > Thank you but no need to hurry up. I am busy with other things too. And, > anyway, i work on top of my own branch here. > >> As Marc mentioned before, this whole irqfd story does not go together >> well with KVM and the ITS architecture, > > It actually does with GSI routing (see > http://www.spinics.net/lists/kvm/msg117475.html, approach 2). Hi Pavel, I also have an implementation of GSI routing on ARM, basically a rebase of my old/first implementation of irqfd (https://patches.linaro.org/32261/) based on irqchip gsi routing & qemu part (https://lists.gnu.org/archive/html/qemu-devel/2014-07/msg01090.html). I will repost today as a base of discussion for evolutions. Best Regards Eric > >> so that needs some more >> investigation (which I am planning to do in the next days). > > Ok. > > Kind regards, > Pavel Fedin > Expert Engineer > Samsung Electronics Research center Russia > > -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
RE: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
Hello! > Yes, I am about to get a v2 ready, but mostly with some fixes. If you > want to work on top of it, I can push a WIP branch to my repo. Thank you but no need to hurry up. I am busy with other things too. And, anyway, i work on top of my own branch here. > As Marc mentioned before, this whole irqfd story does not go together > well with KVM and the ITS architecture, It actually does with GSI routing (see http://www.spinics.net/lists/kvm/msg117475.html, approach 2). > so that needs some more > investigation (which I am planning to do in the next days). Ok. Kind regards, Pavel Fedin Expert Engineer Samsung Electronics Research center Russia -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
Здравствуй Pavel, On 06/17/2015 10:21 AM, Pavel Fedin wrote: > PING! > The discussion has suddenly stopped... What is our status? Is ITS v2 patch > being > developed, or what? Yes, I am about to get a v2 ready, but mostly with some fixes. If you want to work on top of it, I can push a WIP branch to my repo. As Marc mentioned before, this whole irqfd story does not go together well with KVM and the ITS architecture, so that needs some more investigation (which I am planning to do in the next days). Cheers, Andre. And do we have some conclusion on irqfd ? > > Kind regards, > Pavel Fedin > Expert Engineer > Samsung Electronics Research center Russia > > >> -Original Message- >> From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf >> Of Pavel >> Fedin >> Sent: Wednesday, June 10, 2015 6:30 PM >> To: 'Eric Auger'; 'Marc Zyngier'; 'Andre Przywara'; >> christoffer.d...@linaro.org >> Cc: kvm...@lists.cs.columbia.edu; linux-arm-ker...@lists.infradead.org; > kvm@vger.kernel.org >> Subject: RE: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: >> KVM: GICv3 ITS >> emulation) >> >> Hi! >> >>> indeed in newly added qemu kvm-all.c kvm_arch_msi_data_to_gsi we could >>> call a new ioctl that translates the data + deviceid? into an LPI and >>> program irqfd with that LPI. This is done once when setting irqfd up. >>> This also means extending irqfd support to lpi injection, gsi being the >>> LPI index if gsi >= 8192. in that case we continue using >>> kvm_gsi_direct_mapping and gsi still is an IRQ index. >> >> This is exactly what i have done in my kernel + qemu. I have added a new >> KVM capability >> and then in qemu i do this: >> --- cut --- >> if (kvm_gsi_kernel_mapping()) { >> struct kvm_msi msi; >> >> msi.address_lo = (uint32_t)msg.address; >> msi.address_hi = msg.address >> 32; >> msi.data = le32_to_cpu(msg.data); >> memset(msi.pad, 0, sizeof(msi.pad)); >> >> if (dev) { >> msi.devid = (pci_bus_num(dev->bus) << 8) | dev->devfn; >> msi.flags = KVM_MSI_VALID_DEVID; >> } else { >> msi.devid = 0; >> msi.flags = 0; >> } >> >> return kvm_vm_ioctl(s, KVM_TRANSLATE_MSI, &msi); >> } >> --- cut --- >> KVM_TRANSLATE_MSI returns an LPI number. This seemed to be the simplest and >> fastest > thing >> to do. >> If someone is interested, i could prepare an RFC patch series for this, >> which would > apply >> on top of Andre's ITS implementation. >> >> Kind regards, >> Pavel Fedin >> Expert Engineer >> Samsung Electronics Research center Russia >> >> >> -- >> To unsubscribe from this list: send the line "unsubscribe kvm" in >> the body of a message to majord...@vger.kernel.org >> More majordomo info at http://vger.kernel.org/majordomo-info.html > -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
RE: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
Hello! > Hmmm. You may not have noticed it, but we're actually all are quite busy > at the moment (hint, we're at -rc8, and the next merge window is about > to open). Ok ok, i do not mind of course. :) Just i expected at least some, quick reply. It's like talking to a person while he/she suddenly starts ignoring you and turns away without any ACK/NAK. I simply do not know what is wrong. > This feels just wrong. The LPI number is under complete control of the > guest, and can be changed at any time. You can never rely on it to be > stable. Heh... Then i'm afraid the only option is the second one: GSI routing. It would allow to associate an irqfd with MSI bunch (data + address + devID) as it is. I'm also currently busy with some strange vhost-net performance issues, so i'll make another RFC later, after i redo my implementation using routing. Kind regards, Pavel Fedin Expert Engineer Samsung Electronics Research center Russia -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
On 17/06/15 10:21, Pavel Fedin wrote: > PING! > The discussion has suddenly stopped... What is our status? Is ITS v2 patch > being > developed, or what? And do we have some conclusion on irqfd ? Hmmm. You may not have noticed it, but we're actually all are quite busy at the moment (hint, we're at -rc8, and the next merge window is about to open). As for the state of the ITS, it is still in review, and I expect Andre will post an updated series after the merge window. As for your irqfd proposal, see below: > Kind regards, > Pavel Fedin > Expert Engineer > Samsung Electronics Research center Russia > > >> -Original Message- >> From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf >> Of Pavel >> Fedin >> Sent: Wednesday, June 10, 2015 6:30 PM >> To: 'Eric Auger'; 'Marc Zyngier'; 'Andre Przywara'; >> christoffer.d...@linaro.org >> Cc: kvm...@lists.cs.columbia.edu; linux-arm-ker...@lists.infradead.org; > kvm@vger.kernel.org >> Subject: RE: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: >> KVM: GICv3 ITS >> emulation) >> >> Hi! >> >>> indeed in newly added qemu kvm-all.c kvm_arch_msi_data_to_gsi we could >>> call a new ioctl that translates the data + deviceid? into an LPI and >>> program irqfd with that LPI. This is done once when setting irqfd up. >>> This also means extending irqfd support to lpi injection, gsi being the >>> LPI index if gsi >= 8192. in that case we continue using >>> kvm_gsi_direct_mapping and gsi still is an IRQ index. >> >> This is exactly what i have done in my kernel + qemu. I have added a new >> KVM capability >> and then in qemu i do this: >> --- cut --- >> if (kvm_gsi_kernel_mapping()) { >> struct kvm_msi msi; >> >> msi.address_lo = (uint32_t)msg.address; >> msi.address_hi = msg.address >> 32; >> msi.data = le32_to_cpu(msg.data); >> memset(msi.pad, 0, sizeof(msi.pad)); >> >> if (dev) { >> msi.devid = (pci_bus_num(dev->bus) << 8) | dev->devfn; >> msi.flags = KVM_MSI_VALID_DEVID; >> } else { >> msi.devid = 0; >> msi.flags = 0; >> } >> >> return kvm_vm_ioctl(s, KVM_TRANSLATE_MSI, &msi); >> } >> --- cut --- >> KVM_TRANSLATE_MSI returns an LPI number. This seemed to be the simplest and >> fastest > thing >> to do. >> If someone is interested, i could prepare an RFC patch series for this, >> which would > apply >> on top of Andre's ITS implementation. This feels just wrong. The LPI number is under complete control of the guest, and can be changed at any time. You can never rely on it to be stable. Thanks, M. -- Jazz is not dead. It just smells funny... -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
RE: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
PING! The discussion has suddenly stopped... What is our status? Is ITS v2 patch being developed, or what? And do we have some conclusion on irqfd ? Kind regards, Pavel Fedin Expert Engineer Samsung Electronics Research center Russia > -Original Message- > From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf > Of Pavel > Fedin > Sent: Wednesday, June 10, 2015 6:30 PM > To: 'Eric Auger'; 'Marc Zyngier'; 'Andre Przywara'; > christoffer.d...@linaro.org > Cc: kvm...@lists.cs.columbia.edu; linux-arm-ker...@lists.infradead.org; kvm@vger.kernel.org > Subject: RE: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: > GICv3 ITS > emulation) > > Hi! > > > indeed in newly added qemu kvm-all.c kvm_arch_msi_data_to_gsi we could > > call a new ioctl that translates the data + deviceid? into an LPI and > > program irqfd with that LPI. This is done once when setting irqfd up. > > This also means extending irqfd support to lpi injection, gsi being the > > LPI index if gsi >= 8192. in that case we continue using > > kvm_gsi_direct_mapping and gsi still is an IRQ index. > > This is exactly what i have done in my kernel + qemu. I have added a new KVM > capability > and then in qemu i do this: > --- cut --- > if (kvm_gsi_kernel_mapping()) { > struct kvm_msi msi; > > msi.address_lo = (uint32_t)msg.address; > msi.address_hi = msg.address >> 32; > msi.data = le32_to_cpu(msg.data); > memset(msi.pad, 0, sizeof(msi.pad)); > > if (dev) { > msi.devid = (pci_bus_num(dev->bus) << 8) | dev->devfn; > msi.flags = KVM_MSI_VALID_DEVID; > } else { > msi.devid = 0; > msi.flags = 0; > } > > return kvm_vm_ioctl(s, KVM_TRANSLATE_MSI, &msi); > } > --- cut --- > KVM_TRANSLATE_MSI returns an LPI number. This seemed to be the simplest and > fastest thing > to do. > If someone is interested, i could prepare an RFC patch series for this, > which would apply > on top of Andre's ITS implementation. > > Kind regards, > Pavel Fedin > Expert Engineer > Samsung Electronics Research center Russia > > > -- > To unsubscribe from this list: send the line "unsubscribe kvm" in > the body of a message to majord...@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
RE: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
Hello! > KVM GSI routing, even if only used for MSI routing then mandates to > build entries for non MSI IRQs, using irqchip routing entries. Then you > draw the irqchip.c kvm_irq_routing_table > chip[KVM_NR_IRQCHIPS][KVM_IRQCHIP_NUM_PINS] static allocation issue. Sorry for this add-on, needed time to look at the code. Actually, if we don't use this code at all, and implement our own kvm_set_irq_routing() and kvm_free_irq_routing(), we don't have to bother about all these limitations. The simplest thing to do there would be to store GSI number in struct its_itte. In this case raising an MSI by GSI would not differ from what i currently do. Kind regards, Pavel Fedin Expert Engineer Samsung Electronics Research center Russia -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
RE: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
Hi! > indeed in newly added qemu kvm-all.c kvm_arch_msi_data_to_gsi we could > call a new ioctl that translates the data + deviceid? into an LPI and > program irqfd with that LPI. This is done once when setting irqfd up. > This also means extending irqfd support to lpi injection, gsi being the > LPI index if gsi >= 8192. in that case we continue using > kvm_gsi_direct_mapping and gsi still is an IRQ index. This is exactly what i have done in my kernel + qemu. I have added a new KVM capability and then in qemu i do this: --- cut --- if (kvm_gsi_kernel_mapping()) { struct kvm_msi msi; msi.address_lo = (uint32_t)msg.address; msi.address_hi = msg.address >> 32; msi.data = le32_to_cpu(msg.data); memset(msi.pad, 0, sizeof(msi.pad)); if (dev) { msi.devid = (pci_bus_num(dev->bus) << 8) | dev->devfn; msi.flags = KVM_MSI_VALID_DEVID; } else { msi.devid = 0; msi.flags = 0; } return kvm_vm_ioctl(s, KVM_TRANSLATE_MSI, &msi); } --- cut --- KVM_TRANSLATE_MSI returns an LPI number. This seemed to be the simplest and fastest thing to do. If someone is interested, i could prepare an RFC patch series for this, which would apply on top of Andre's ITS implementation. Kind regards, Pavel Fedin Expert Engineer Samsung Electronics Research center Russia -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
Hi, On 06/10/2015 10:31 AM, Pavel Fedin wrote: > Hello guys! > >> Currently on ARM, irqfd supports routing an host eventfd towards a >> virtual SPI: >> eventfd -> vSPI = gsi+32 >> parameters of irqfd are the eventfd and the gsi. > > Yes, but this works only with GICv2m, because it actually turns MSI data > into SPI number. > ITS works in a completely different way. > >> 2) now we have virtual msi injection, we could use msi routing to inject >> virtual LPI's. But is it what you need for your qemu integration? > > Actually this is what i wanted to discuss here... > I have studied a little bit IRQ routing mechanism... And it comes to a > question what is > 'GSI'. As far as i could understand, on x86 GSI is a completely virtual > entity, which can > be tied either to irqchip's pin (physical IRQ) or MSI event. There is totally > no > correspondence between GSI numbers and guest IRQ numbers. GSIs are just > allocated by the > userspace starting from 0 and on. Is my understanding correct? Well I think as long as you use irqchip routing, gsi is not random. When looking at arch/x86/kvm/irq_comm.c and in kvm_set_routing_entry you can see there is an offset applied on the gsi and irqchip/pin depending on type of irqchip (pic_master, pic_slave, ioapic). originally done by BIOS? This is the default routing. Now in qemu the irqchip routing entries are built by kvm_irqchip_add_irq_route in hw/intc/openpic_kvm.c, hw/i386/kvm/ioapic.c, ... and then committed. When looking at MSI routing and qemu integration, in case kvm_gsi_direct_mapping is NOT used, kvm_irqchp_get_virq indeed finds out a gsi belonging to the gsi range and not mapped with irqchip entries. if kvm_gsi_direct_mapping is used, an irqchip mapped gsi is used instead. At least this is my understanding > On ARM, i see, completely different approach is used. For KVM_IRQ_LINE ioctl > GSI is > actually a raw GIC IRQ number plus some extra bits for target and type. For > KVM_IRQFD with > GICv2m GSI is actually SPI number (starting from zero, so that IRQ = GSI + > 32). > First of all, i would say that we already have an inconsistence in ARM API. > The same > thing called GSI has two different meanings for different functions. well that's true. This avoided to have ARM archi specific adaptations for VFIO and MMIO VHOST-NET proto at that time. Now with the MSI advent, those adaptations becomes needed anyway. Also we concluded it was not meaningful to inject PPIs. gsi irqfd argument directly matches the IRQ number found in guest device tree. > I think it would be a bad idea to introduce a third, separate meaning for > MSIs. However, > this is what we could do: > > Approach 1: GICv2m way. > We could add one more IOCTL which would decode MSI data into IRQ (in our > case it's LPI) > number. What it would return is LPI - 32, to keep in line with existing > convention. > Pros: does not bring any more inconsistence into KVM API. > Cons: requires adding one more IOCTL and one more MSI handling mechanism. > Isn't there too > many of them already? indeed in newly added qemu kvm-all.c kvm_arch_msi_data_to_gsi we could call a new ioctl that translates the data + deviceid? into an LPI and program irqfd with that LPI. This is done once when setting irqfd up. This also means extending irqfd support to lpi injection, gsi being the LPI index if gsi >= 8192. in that case we continue using kvm_gsi_direct_mapping and gsi still is an IRQ index. > > Approach 2: IRQ routing. > We could implement MSI routing using virtual GSI numbers. In order to stay > compatible > with what we have, we could say that GSI numbers below 8192 are SPI GSIs, and > everything > starting from 8192 is MSI. I think the gsi can be considered as an index: 0 - 1020: SPI index >= 8192: LPI index Then we could use KVM_SET_GSI_ROUTING ioctl to assign these > GSIs to actual MSIs which then will go full-cycle through ITS. > Pros: Does not introduce any new APIs. > Cons: > - Introduces third meaning for GSI on ARM. > - Slower than approach 1 because in that case every interrupt is > pre-translated while > here we engage ITS every time. KVM GSI routing, even if only used for MSI routing then mandates to build entries for non MSI IRQs, using irqchip routing entries. Then you draw the irqchip.c kvm_irq_routing_table chip[KVM_NR_IRQCHIPS][KVM_IRQCHIP_NUM_PINS] static allocation issue. I guess this code would need to be revisited to accomodate large space and variable pin number of GIC. Hope it helps Best Regards Eric > > Personally i have already tried approach 1 and i can say that it works. > There is no > problem with target specification because current ITS code stores everything > in a single > bunch so that i anyway have to locate a particular ITTE corresponding to an > LPI and get > collection ID from there. However, yes, i agree, this approach has the same > performance > drawback as my suggested approach 2. > > Any thoughts / ideas ? > > Kind regards, > Pav
IRQFD support with GICv3 ITS (WAS: RE: [PATCH 00/13] arm64: KVM: GICv3 ITS emulation)
Hello guys! > Currently on ARM, irqfd supports routing an host eventfd towards a > virtual SPI: > eventfd -> vSPI = gsi+32 > parameters of irqfd are the eventfd and the gsi. Yes, but this works only with GICv2m, because it actually turns MSI data into SPI number. ITS works in a completely different way. > 2) now we have virtual msi injection, we could use msi routing to inject > virtual LPI's. But is it what you need for your qemu integration? Actually this is what i wanted to discuss here... I have studied a little bit IRQ routing mechanism... And it comes to a question what is 'GSI'. As far as i could understand, on x86 GSI is a completely virtual entity, which can be tied either to irqchip's pin (physical IRQ) or MSI event. There is totally no correspondence between GSI numbers and guest IRQ numbers. GSIs are just allocated by the userspace starting from 0 and on. Is my understanding correct? On ARM, i see, completely different approach is used. For KVM_IRQ_LINE ioctl GSI is actually a raw GIC IRQ number plus some extra bits for target and type. For KVM_IRQFD with GICv2m GSI is actually SPI number (starting from zero, so that IRQ = GSI + 32). First of all, i would say that we already have an inconsistence in ARM API. The same thing called GSI has two different meanings for different functions. I think it would be a bad idea to introduce a third, separate meaning for MSIs. However, this is what we could do: Approach 1: GICv2m way. We could add one more IOCTL which would decode MSI data into IRQ (in our case it's LPI) number. What it would return is LPI - 32, to keep in line with existing convention. Pros: does not bring any more inconsistence into KVM API. Cons: requires adding one more IOCTL and one more MSI handling mechanism. Isn't there too many of them already? Approach 2: IRQ routing. We could implement MSI routing using virtual GSI numbers. In order to stay compatible with what we have, we could say that GSI numbers below 8192 are SPI GSIs, and everything starting from 8192 is MSI. Then we could use KVM_SET_GSI_ROUTING ioctl to assign these GSIs to actual MSIs which then will go full-cycle through ITS. Pros: Does not introduce any new APIs. Cons: - Introduces third meaning for GSI on ARM. - Slower than approach 1 because in that case every interrupt is pre-translated while here we engage ITS every time. Personally i have already tried approach 1 and i can say that it works. There is no problem with target specification because current ITS code stores everything in a single bunch so that i anyway have to locate a particular ITTE corresponding to an LPI and get collection ID from there. However, yes, i agree, this approach has the same performance drawback as my suggested approach 2. Any thoughts / ideas ? Kind regards, Pavel Fedin Expert Engineer Samsung Electronics Research center Russia -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html