From patchwork Wed Mar 21 16:31:56 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andre Przywara X-Patchwork-Id: 132223 Delivered-To: patch@linaro.org Received: by 10.46.84.29 with SMTP id i29csp2356153ljb; Wed, 21 Mar 2018 09:35:05 -0700 (PDT) X-Google-Smtp-Source: AG47ELtyWaqETHaAOx6NHBkqzA5Li/Gar4H3JoNHmnUF5gC0EQXeAHAYPpv09EtuVl/HTHnf7D46 X-Received: by 10.107.189.199 with SMTP id n190mr22707528iof.64.1521650104908; Wed, 21 Mar 2018 09:35:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521650104; cv=none; d=google.com; s=arc-20160816; b=tlHiAzHlSSwWKz9iAOeH3I4X6azT4J0+L53LdcEzkTNI8TVIXfO5uXzf3Dgg6pCGk3 ULI3x2EgTpLYG2zVTpxIUP0Ae3IMSlB74zgOkX8vn7xmK8myL0ZPZEnWfdQsNMwbVz0T 1RMHgI0M7i/J9IQK6lglSTGVkxbWm0Zsl4Obx3BLuo9cccKlMkAoGIfnUkNG8Ym7ptBJ +I80ZJP+n1aKkxbXgG6PW/Mdy1/vOTsUmeUrnanLGvYQtnlvwHk3Nr2ELm9vXPoExREj L0r3kZ0trNhAnw9HchFh5uaD7w43rO9YSGlmsr9HyLTueR/sWCr9Ohu8WWrh0WU6xI3A Ljgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:mime-version:cc :list-subscribe:list-help:list-post:list-unsubscribe:list-id :precedence:subject:message-id:date:to:from:dkim-signature :arc-authentication-results; bh=PUcg+NQi8CFHHc2+sYPZp+AupI064XfLEpuRubRQNyM=; b=LBIgKenF4Op1qKo3qogAygCj+cQbZAR8hY9RpeAzdm1ZkrJLcNvu5uUGGrkRiyjk0/ msLpart7XP4LQkupROYWOvCxXsrFtnyJoFW9l4Pp+JMb5t83P7BaiGkdFCiB4kV5qsku DVD7+YCSWfR/hxCZrbKR4+DzFXjt+iKoq5BYD8vkYZZYX4FXz7tSN6TTekIj/ZGG99cg slNr2SypdQ84Iwd7hgEuhaGrOb1jlWqY4DCME5E7AoGgwu3m6n5sqtsTF+QEQZBpRJEL /ofRlHyCbYORuUkmJSCD9n8qs1CFR4f9d2FVJB5AWpdL3hxDY9TUo77I52+oVmsedMW3 26dQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=DtO0hXCo; spf=pass (google.com: best guess record for domain of xen-devel-bounces@lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.xenproject.org (lists.xenproject.org. [192.237.175.120]) by mx.google.com with ESMTPS id g19si3318024iog.184.2018.03.21.09.35.04 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 21 Mar 2018 09:35:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of xen-devel-bounces@lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=DtO0hXCo; spf=pass (google.com: best guess record for domain of xen-devel-bounces@lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1eygfU-0001yW-Rn; Wed, 21 Mar 2018 16:32:52 +0000 Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1eygfT-0001y7-E5 for xen-devel@lists.xenproject.org; Wed, 21 Mar 2018 16:32:51 +0000 X-Inumbo-ID: 7538adac-2d25-11e8-9728-bc764e045a96 Received: from mail-wm0-x22f.google.com (unknown [2a00:1450:400c:c09::22f]) by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS id 7538adac-2d25-11e8-9728-bc764e045a96; Wed, 21 Mar 2018 17:32:34 +0100 (CET) Received: by mail-wm0-x22f.google.com with SMTP id l16so11001858wmh.3 for ; Wed, 21 Mar 2018 09:32:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=QaQIT30Kx7FZS3OaOneXFVhdXEajtGZStDN/pqj2cEI=; b=DtO0hXCodT4kies5dqmzhNBEYOON9ZYLggSFVTT6X+G1foQVlXJPi8BQeHtNIHfPo+ aQF7e7ntB+S0r86zwaqwsM9WscF/wlppn4FZXvb65i2nPVHw+7WdOrgfXat8gvhxMvu0 4/DlI4IXz0yuYPJ9JyO8VGywbd/s5GxIiD/RE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=QaQIT30Kx7FZS3OaOneXFVhdXEajtGZStDN/pqj2cEI=; b=Qj06hTY+ES7Jdi4j6bFKwlQn79hqRvh4ElK2CpNCwymM6aMLJx9X4YWkW00BAH1pB4 B8GJVa18ARBsopQqTGnrwOr7Xh/W7r7Igkoyw2gNWcyAp3xaeCVsKw2C0J1lt6E7hCvU qO7d8B5QFdrbK0/7uhAZICXM3f7czciRc03kQYBCuZg3Pf/C/z5XHc0Bdb+g67E0BWQ+ gxUYSc7glyCGLDuxv4AnqHCMBDR38ajLhFdwsT3opd4yYfergWdG2xrGYi6tU2MmE1XQ 7UeK2RPfemnok6j7YWkB2/HDShqjlfaOfbaBtYDtVSs+EnQTo7JqTp2K7R/9jLLIw+FS YZdg== X-Gm-Message-State: AElRT7Fr+1WZKK5qA3TmsiA5WPwOr4S8zqHMqETLD8AkxPhlKOK5pOS7 Qige7kVHuj/3s+qM1ut9FPOLrS96Yf0= X-Received: by 10.28.163.130 with SMTP id m124mr2726644wme.41.1521649967803; Wed, 21 Mar 2018 09:32:47 -0700 (PDT) Received: from e104803-lin.lan (mail.andrep.de. [217.160.17.100]) by smtp.gmail.com with ESMTPSA id n64sm4423724wmd.11.2018.03.21.09.32.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 21 Mar 2018 09:32:47 -0700 (PDT) From: Andre Przywara To: Julien Grall , Stefano Stabellini Date: Wed, 21 Mar 2018 16:31:56 +0000 Message-Id: <20180321163235.12529-1-andre.przywara@linaro.org> X-Mailer: git-send-email 2.14.1 Subject: [Xen-devel] [PATCH v3 00/39] New VGIC(-v2) implementation X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: xen-devel@lists.xenproject.org, Jan Beulich , Andrew Cooper MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" tl;dr: Coarse changelog below, individual patches have changelogs as well. Yet another update, the number of changes getting smaller again. Another round of patches have been merged already. Mostly smaller reworks now, as usual addressing the comments. Noticeable changes are the inclusion of the physical timer in our level IRQ update routine (patch 05/39) and the reworked _IRQ_INPROGRESS setting on tweaking the active or pending state (patch 03/39), along with some build system improvements. For a detailed list of changes see below, also each individual patch has its own changelog as well. Patches without Reviewed-by: or Acked-by: tags are: 02, 03, 05, 09, 11, 13, 14, 15, 18, 25, 34, 36, 38, 39 There are some things that have (still) not been covered yet: - struct VCPU still allocates two pages on ARM64 when using the new VGIC now. We could try to look if we can allocate some parts of struct vcpu instead of embedding sub-structures into it. - vGICv3 support is not implemented, but should be fairly straight-forward to add, as the design incorporated this already. Will look at this next. - There is a possible DOS vector on the VCPU ap_list, which holds pending vIRQs. A guest can make this list rather long, which forces the hypervisor to hold the list lock when iterating the list. This should be bounded by the number of emulated vIRQs though, and there are ideas how to mitigate this issue. Those fixes would be posted on top as fixes later. - There is no ITS support, though the VGIC code itself is more ready for that than the old VGIC ever was. However due to differences between the Xen and KVM architecture the ITS bits are not easy to port over to Xen. Cheers, Andre ===================== During development of the Dom0 ITS MSI support last year we realised that the existing GIC interrupt controller emulation has some shortcomings. After some tries to fix those in the existing code, it was agreed upon that the problems are fundamental and a new implementation based on the "new VGIC" in KVM is the best choice. This is this new VGIC implementation, based on the (heavily modified) KVM version. It lives in the xen/arch/arm/vgic/ directory and is written to be a compile time option, so people can choose whether to use the new VGIC or the existing implementation. This is just for a transitional period, the old VGIC is expected to be removed after confidence in the new implementation has grown. This series starts with some cleanup and refactoring patches for the existing VGIC/GIC code, this includes preparations to properly support level triggered interrupts. This is one of the biggest problems in the existing VGIC, which only correctly emulates edge triggered IRQs. This affects both arch code and some users like the timer and the event channel. Starting with patch 08 we plumb in the new VGIC then. This is done in a new directory, with all the files actually not wired into the build system until the very last patch. The idea is to split the series into reviewable chunks without resorting to nasty hacks to keep bisectability. The code was forked from Linux' virt/kvm/arm/vgic/, as of 4.14-rc7, plus some recent changes to improve support for level triggered and hardware mapped interrupts, which is what we use heavily in Dom0. The code was heavily adapted to fit into Xen, starting with using the Xen coding style and using Xen structure and variable names (struct domain instead of struct kvm, for instance). Where interfacing functions were similar enough, they were changed over to the existing Xen name and prototypes (for instance kvm_vgic_create() was renamed to domain_vgic_register()). As far as possible the code layout and split was re-used from KVM, so patches in Linux should be relatively easy to port into Xen. Due to the mentioned changes this can not be done easily in an automatic way, but it should be not too complicated to extract the gist of the patch and re-apply this to our code base. The actual VGIC code splits into several parts: - The core is the struct vgic_irq, which holds every information about a virtual IRQ, including a per-IRQ lock. Also there is on (ordered) per-VCPU list (ap_list), which links the interrupts to be considered by a VCPU. There are functions to deal with queuing and removing IRQs from those lists safely, obeying the locking order. (patches 08-12) - There are functions to push vIRQs on a VCPU list to the list registers, and handle their state changes. (patches 13-15) - The distributor MMIO emulation is using separate functions per register, also having read and write split. (patches 16-26) - There are functions to deal with Xen specialities. (patches 27-33) - The data structures and the wiring of the emulation into the hypervisor and the guests are done in vgic-init.c. (patches 34-37) - Finally patch 39 enables the build of the new VGIC. This requires to increase the size limit for struct vcpu in patch 38. Andre Changelog v2 ... v3: - removing already merged patches - prepending Julien's patch to fix a regression with some of the earlier merged preparatory patches - adding GIC_INVALID member to enum gic_version - reworking the arch timer IRQ update code - reworking the _IRQ_INPROGRESS setting - reworking list_sort build system inclusion - replace various occurences of 0/1 with false/true - clear _IRQ_INPROGRESS bit when retiring hardware mapped IRQ - fix target mask calculation in SGI injection - detect uninitialised VGIC in vgic_max_vcpus() - fix nr_spis ROUNDUP - reworking struct vcpu allocation checks - adding various ACKs and R-b's. Thanks to the reviewers! - extending and adding comments, whitespace fixes Changelog v1 ... v2: - add VCPU parameter to renamed gic_event_needs_delivery() - use vcpu_kick, using existing x86 prototype - include Julien's struct gic_lr rework series - extend setting of _IRQ_INPROGRESS when tweaking active/pending state - restrict level IRQ device handling to new VGIC - cleanup vgic.h - make vgic_inject_irq() and sync_{to,from}_lr() functions return void - add dropped code to properly handle - split off introduction of Linux' list_sort() into separate patch - fix handling of multiple-source-SGIs, as done in Linux recently - use KVM IIDR identifier, but use different variant for Xen - ASSERT that association between hardware and virtual IRQs do not change - print warning on every IRQ failing to set/clear active bit - avoid unneeded calls to vgic_sync_hardware_irq(), avoiding desc lock - fixup wrong number of SPIs (not a multiple of 32) - move vgic_v2_enable patch around - confine two 4K pages for struct vcpu to new VGIC and ARM64 - use separate Makefile for new VGIC - enhance Kconfig help text - many whitespace and indentation fixes - using more unsigned ints - adding and extending comments Changelog RFC ... v1: - observe review comments on GICv3 redistributor patches - implement physical-follows-virtual IRQ affinity - actually implement arch_move_irq() - move max_domain_vcpus() into vgic.c, to make it VGIC specific - improved many commit messages - add ACKs so far - added and extended many comments - use C99 data types (uint32_t) - use unsigned data types - use symbolic names for constants - white space fixes (indentation mostly) - adapt later patches to changes earlier in the series (renames etc.) - use 32 bit data types where sufficient - add helper functions as requested (for instance gicv2/3_peek/poke_irq) - use struct irq_desc * in interface of hardware facing functions - rename some existing Xen function names to be more readable - rename new header file from arm_vgic.h to new_vgic.h - drop code or variables dealing with unimplemented features (ITS, CPU i/f) - reorder struct vgic_irq and use bitfield to shrink data structure size - remove not needed functions (gic_clear_lrs(), save/restore_state()) - add ASSERTS as requested - add locking where missing (dump_vgic_info, read pending state, enabling GIC) - keep Linux coding style for list_sort.c - add set_pending_state() GIC abstraction function - factor out and use kick_vcpu() - use frame number instead of physical address - use existing LR accessor functions, drop GICH_ accesses from vgic-v2.c - skip already disabled/enabled IRQs and setting enabled state - use PRODUCT_ID_XEN - simplify and clarify on ACTIVE bit MMIO accesses - use interface for HCR bit changes - iterate over set CPU bits in SGI injection handler Andre Przywara (38): ARM: GIC: add GIC_INVALID to enum gic_version ARM: GIC: Allow tweaking the active and pending state of an IRQ ARM: GIC: Allow reading pending state of a hardware IRQ ARM: timer: Handle level triggered IRQs correctly ARM: evtchn: Handle level triggered IRQs correctly ARM: vPL011: Use the VGIC's level triggered IRQs handling if available ARM: new VGIC: Add data structure definitions ARM: new VGIC: Add accessor to new struct vgic_irq instance ARM: new VGIC: Implement virtual IRQ injection Add list_sort() routine from Linux ARM: new VGIC: Add IRQ sorting ARM: new VGIC: Add IRQ sync/flush framework ARM: new VGIC: Add GICv2 world switch backend ARM: new VGIC: Implement vgic_vcpu_pending_irq ARM: new VGIC: Add MMIO handling framework ARM: new VGIC: Add GICv2 MMIO handling framework ARM: new VGIC: Add CTLR, TYPER and IIDR handlers ARM: new VGIC: Add ENABLE registers handlers ARM: new VGIC: Add PENDING registers handlers ARM: new VGIC: Add ACTIVE registers handlers ARM: new VGIC: Add PRIORITY registers handlers ARM: new VGIC: Add CONFIG registers handlers ARM: new VGIC: Add TARGET registers handlers ARM: new VGIC: Add SGIR register handler ARM: new VGIC: Add SGIPENDR register handlers ARM: new VGIC: Handle hardware mapped IRQs ARM: new VGIC: Add event channel IRQ handling ARM: new VGIC: Handle virtual IRQ allocation/reservation ARM: new VGIC: Dump virtual IRQ info ARM: new VGIC: Provide system register emulation stub ARM: new VGIC: Implement arch_move_irqs() ARM: new VGIC: Add preliminary stub implementation ARM: new VGIC: vgic-init: register VGIC ARM: new VGIC: Add vgic_v2_enable ARM: new VGIC: vgic-init: implement vgic_init ARM: new VGIC: vgic-init: implement map_resources ARM: new VGIC: Allocate two pages for struct vcpu ARM: VGIC: wire new VGIC(-v2) files into Xen build system Julien Grall (1): xen/arm: gic: Read unconditionally the source from the LRs xen/arch/arm/Kconfig | 18 +- xen/arch/arm/Makefile | 5 +- xen/arch/arm/domain.c | 32 +- xen/arch/arm/gic-v2.c | 66 ++- xen/arch/arm/gic-v3.c | 64 ++- xen/arch/arm/traps.c | 12 + xen/arch/arm/vgic/Makefile | 5 + xen/arch/arm/vgic/vgic-init.c | 261 ++++++++++ xen/arch/arm/vgic/vgic-mmio-v2.c | 321 ++++++++++++ xen/arch/arm/vgic/vgic-mmio.c | 639 ++++++++++++++++++++++++ xen/arch/arm/vgic/vgic-mmio.h | 138 ++++++ xen/arch/arm/vgic/vgic-v2.c | 311 ++++++++++++ xen/arch/arm/vgic/vgic.c | 1001 ++++++++++++++++++++++++++++++++++++++ xen/arch/arm/vgic/vgic.h | 83 ++++ xen/arch/arm/vpl011.c | 4 + xen/arch/arm/vtimer.c | 49 ++ xen/common/Kconfig | 3 + xen/common/Makefile | 1 + xen/common/list_sort.c | 157 ++++++ xen/include/asm-arm/event.h | 1 + xen/include/asm-arm/gic.h | 36 ++ xen/include/asm-arm/new_vgic.h | 198 ++++++++ xen/include/asm-arm/vgic.h | 6 + xen/include/asm-arm/vtimer.h | 1 + xen/include/xen/list_sort.h | 11 + 25 files changed, 3405 insertions(+), 18 deletions(-) create mode 100644 xen/arch/arm/vgic/Makefile create mode 100644 xen/arch/arm/vgic/vgic-init.c create mode 100644 xen/arch/arm/vgic/vgic-mmio-v2.c create mode 100644 xen/arch/arm/vgic/vgic-mmio.c create mode 100644 xen/arch/arm/vgic/vgic-mmio.h create mode 100644 xen/arch/arm/vgic/vgic-v2.c create mode 100644 xen/arch/arm/vgic/vgic.c create mode 100644 xen/arch/arm/vgic/vgic.h create mode 100644 xen/common/list_sort.c create mode 100644 xen/include/asm-arm/new_vgic.h create mode 100644 xen/include/xen/list_sort.h