From: cdall@linaro.org (Christoffer Dall)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v6 01/24] KVM: arm/arm64: Add ITS save/restore API documentation
Date: Thu, 4 May 2017 15:23:21 +0200 [thread overview]
Message-ID: <20170504132321.GN5923@cbox> (raw)
In-Reply-To: <1493898284-29504-2-git-send-email-eric.auger@redhat.com>
On Thu, May 04, 2017 at 01:44:21PM +0200, Eric Auger wrote:
> Add description for how to access ITS registers and how to save/restore
> ITS tables into/from memory.
>
> Signed-off-by: Eric Auger <eric.auger@redhat.com>
>
> ---
> v5 -> v6:
> - add restoration ordering
> - 256B -> 256 Byte aligned
> - DTE Size is number of bits for the EVENTID
> - s/GITS_READR/GITS_CREADR
>
> v4 -> v5:
> - take into account Christoffer's comments
> - pending table save on GICV3 side now
>
> v3 -> v4:
> - take into account Peter's comments:
> - typos
> - KVM_DEV_ARM_VGIC_GRP_ITS_TABLES kvm_device_attr = 0
> - add a validity bit in DTE
> - document all fields in CTE and ITE
> - document ABI revision
> - take into account Andre's comments:
> - document restrictions about GITS_CREADR writing and GITS_IIDR
> - document -EBUSY error if one or more VCPUS are runnning
> - document 64b registers only can be accessed with 64b access
> - itt_addr field matches bits [51:8] of the itt_addr
>
> v1 -> v2:
> - DTE and ITE now are 8 bytes
> - DTE and ITE now indexed by deviceid/eventid
> - use ITE name instead of ITTE
> - mentions ITT_addr matches bits [51:8] of the actual address
> - mentions LE layout
> ---
> Documentation/virtual/kvm/devices/arm-vgic-its.txt | 117 +++++++++++++++++++++
> 1 file changed, 117 insertions(+)
>
> diff --git a/Documentation/virtual/kvm/devices/arm-vgic-its.txt b/Documentation/virtual/kvm/devices/arm-vgic-its.txt
> index 6081a5b..863c359 100644
> --- a/Documentation/virtual/kvm/devices/arm-vgic-its.txt
> +++ b/Documentation/virtual/kvm/devices/arm-vgic-its.txt
> @@ -32,7 +32,124 @@ Groups:
> KVM_DEV_ARM_VGIC_CTRL_INIT
> request the initialization of the ITS, no additional parameter in
> kvm_device_attr.addr.
> +
> + KVM_DEV_ARM_ITS_SAVE_TABLES
> + save the ITS table data into guest RAM, at the location provisioned
> + by the guest in corresponding registers/table entries.
> +
> + The layout of the tables in guest memory defines an ABI. The entries
> + are laid out in little endian format as described in the last paragraph.
> +
> + KVM_DEV_ARM_ITS_RESTORE_TABLES
> + restore the ITS tables from guest RAM to ITS internal structures.
> +
> + The GICV3 must be restored before the ITS and all ITS registers but
> + the GITS_CTLR must be restored before restoring the ITS tables.
> +
> + The GITS_IIDR read-only register must also be restored before
> + the table restore as the IIDR revision field encodes the ABI revision.
the table restore? "before calling KVM_DEV_ARM_ITS_RESTORE_TABLES" ?
(there's a potential confusion between calling this ioctl and simply
restoring the memory containing the tables).
> +
> + The expected ordering when restoring the GICv3/ITS is described in section
> + "ITS Restoration Sequence".
> +
> Errors:
> -ENXIO: ITS not properly configured as required prior to setting
> this attribute
> -ENOMEM: Memory shortage when allocating ITS internal data
> + -EINVAL: Inconsistent restored data
> + -EFAULT: Invalid guest ram access
> + -EBUSY: One or more VCPUS are running
> +
> + KVM_DEV_ARM_VGIC_GRP_ITS_REGS
> + Attributes:
> + The attr field of kvm_device_attr encodes the offset of the
> + ITS register, relative to the ITS control frame base address
> + (ITS_base).
> +
> + kvm_device_attr.addr points to a __u64 value whatever the width
> + of the addressed register (32/64 bits). 64 bit registers can only
> + be accessed with full length.
> +
> + Writes to read-only registers are ignored by the kernel except for:
> + - GITS_CREADR. It needs to be restored otherwise commands in the queue
> + will be re-executed after restoring CWRITER. GITS_CREADR must be
> + restored before restoring the GITS_CTLR which is likely to enable the
> + ITS. Also it needs to be restored after GITS_CBASER since a write to
> + GITS_CBASER resets GITS_CREADR.
uber nit: s/needs to be/must be/g in all occurences above.
> + - GITS_IIDR. Its Revision field encodes the table layout ABI revision.
s/Its/The/
the revision of the table layout ABI.
> + In the future we might implement direct injection of virtual LPIS.
LPIs
> + This will require an upgrade of the table layout and an evolution of
> + the ABI. GITS_IIDR must be restored before the table restoration.
before calling KVM_DEV_ARM_ITS_RESTORE_TABLES.
> +
> + For other registers, getting or setting a register has the same
> + effect as reading/writing the register on real hardware.
> + Errors:
> + -ENXIO: Offset does not correspond to any supported register
> + -EFAULT: Invalid user pointer for attr->addr
> + -EINVAL: Offset is not 64-bit aligned
> + -EBUSY: one or more VCPUS are running
> +
> + ITS Restoration Sequence:
s/Restoration/restore/
> + -------------------------
> +
> +The following ordering must be followed when restoring the GIC and the ITS:
> +a) restore all guest memory and create vcpus
> +b) initialize the GIC and ITS (KVM_DEV_ARM_VGIC_CTRL_INIT)
are these really coupled or can you do everything related to the gic
first, and then everything related to the ITS afterwards?
> +c) provide GIC and ITS base addresses (KVM_DEV_ARM_VGIC_GRP_ADDR)
same
> +d) restore all redistributors
> +e) restore the ITS in the following order:
> + 1. Restore GITS_CBASER
> + 2. Restore all other GITS_ registers, except GITS_CTLR!
> + 3. Load the ITS table data (KVM_DEV_ARM_ITS_RESTORE_TABLES)
> + 4. Restore GITS_CTLR
> +f) start vcpus
I would omit (f) from here.
> +
> + ITS Table ABI REV0:
> + -------------------
> +
> + Revision 0 of the ABI only supports physical LPIs.
> +
> + The device table and ITT are indexed by the deviceid and eventid,
> + respectively. The collection table is not indexed by collectionid:
> + CTE are written in the table in the order of collection creation. All
nit: CTEs
> + entries are 8 bytes.
> +
> + Device Table Entry (DTE):
> +
> + bits: | 63| 62 ... 49 | 48 ... 5 | 4 ... 0 |
> + values: | V | next | ITT_addr | Size |
> +
> + where;
> + - V indicates whether the entry is valid. If not, other fields
> + are not meaningful.
> + - next: equals to 0 if this entry is the last one; otherwise it
> + corresponds to the deviceid offset to the next DTE, capped by
> + 2^14 -1.
> + - ITT_addr matches bits [51:8] of the ITT address (256 Byte aligned).
> + - Size specifies the supported number of bits for the eventid,
> + minus one
> +
> + Collection Table Entry (CTE):
> +
> + bits: | 63| 62 .. 52 | 51 ... 16 | 15 ... 0 |
> + values: | V | RES0 | RDBase | ICID |
> +
> + where:
> + - V indicates whether the entry is valid. If not, other fields are
> + not meaningful.
> + - RES0: reserved field with Should-Be-Zero-or-Preserved behavior.
> + - RDBase is the PE number (GICR_TYPER.Processor_Number semantic),
> + - ICID is the collection ID
> +
> + Interrupt Translation Entry (ITE):
> +
> + bits: | 63 ... 48 | 47 ... 16 | 15 ... 0 |
> + values: | next | pINTID | ICID |
> +
> + where:
> + - next: equals to 0 if this entry is the last one; otherwise it corresponds
> + to the eventid offset to the next ITE capped by 2^16 -1.
> + - pINTID is the physical LPI ID; if zero, it means the entry is not valid
> + and other fields are not meaningful.
> + - ICID is the collection ID
> +
> --
> 2.5.5
>
The only outstanding issue here is the restore order part. I don't wont
to specify a stronger order than absolutely necessary here.
Otherwise this generally looks good.
Thanks,
-Christoffer
next prev parent reply other threads:[~2017-05-04 13:23 UTC|newest]
Thread overview: 72+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-05-04 11:44 [PATCH v6 00/24] vITS save/restore Eric Auger
2017-05-04 11:44 ` [PATCH v6 01/24] KVM: arm/arm64: Add ITS save/restore API documentation Eric Auger
2017-05-04 13:23 ` Christoffer Dall [this message]
2017-05-04 14:50 ` Auger Eric
2017-05-04 16:52 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 02/24] KVM: arm/arm64: Add GICV3 pending table save " Eric Auger
2017-05-04 13:24 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 03/24] KVM: arm/arm64: vgic-its: rename itte into ite Eric Auger
2017-05-04 11:44 ` [PATCH v6 04/24] arm/arm64: vgic: turn vgic_find_mmio_region into public Eric Auger
2017-05-04 11:44 ` [PATCH v6 05/24] KVM: arm64: vgic-its: KVM_DEV_ARM_VGIC_GRP_ITS_REGS group Eric Auger
2017-05-04 11:44 ` [PATCH v6 06/24] KVM: arm/arm64: vgic: expose (un)lock_all_vcpus Eric Auger
2017-05-04 11:44 ` [PATCH v6 07/24] KVM: arm64: vgic-its: Implement vgic_its_has_attr_regs and attr_regs_access Eric Auger
2017-05-04 14:04 ` Marc Zyngier
2017-05-04 15:03 ` Auger Eric
2017-05-04 16:48 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 08/24] KVM: arm64: vgic-its: Implement vgic_mmio_uaccess_write_its_creadr Eric Auger
2017-05-04 14:16 ` Marc Zyngier
2017-05-04 15:09 ` Auger Eric
2017-05-04 17:09 ` Christoffer Dall
2017-05-05 8:06 ` Auger Eric
2017-05-04 11:44 ` [PATCH v6 09/24] KVM: arm64: vgic-its: Introduce migration ABI infrastructure Eric Auger
2017-05-04 14:45 ` Marc Zyngier
2017-05-04 17:13 ` Christoffer Dall
2017-05-05 8:16 ` Auger Eric
2017-05-05 9:43 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 10/24] KVM: arm64: vgic-its: Implement vgic_mmio_uaccess_write_its_iidr Eric Auger
2017-05-04 15:39 ` Marc Zyngier
2017-05-04 17:14 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 11/24] KVM: arm64: vgic-its: Interpret MAPD Size field and check related errors Eric Auger
2017-05-05 9:44 ` Marc Zyngier
2017-05-04 11:44 ` [PATCH v6 12/24] KVM: arm64: vgic-its: Interpret MAPD ITT_addr field Eric Auger
2017-05-04 17:16 ` Christoffer Dall
2017-05-05 9:45 ` Marc Zyngier
2017-05-04 11:44 ` [PATCH v6 13/24] KVM: arm64: vgic-its: Check the device id matches TYPER DEVBITS range Eric Auger
2017-05-04 17:19 ` Christoffer Dall
2017-05-04 17:23 ` Marc Zyngier
2017-05-04 11:44 ` [PATCH v6 14/24] KVM: arm64: vgic-v3: vgic_v3_lpi_sync_pending_status Eric Auger
2017-05-05 8:11 ` Christoffer Dall
2017-05-05 9:45 ` Auger Eric
2017-05-05 9:59 ` Marc Zyngier
2017-05-05 10:10 ` Christoffer Dall
2017-05-05 10:35 ` Marc Zyngier
2017-05-05 14:20 ` Auger Eric
2017-05-05 14:50 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 15/24] KVM: arm64: vgic-its: Read config and pending bit in add_lpi() Eric Auger
2017-05-05 9:57 ` Christoffer Dall
2017-05-05 12:50 ` Marc Zyngier
2017-05-05 14:50 ` Auger Eric
2017-05-05 18:07 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 16/24] KVM: arm64: vgic-its: KVM_DEV_ARM_ITS_SAVE/RESTORE_TABLES Eric Auger
2017-05-05 11:55 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 17/24] KVM: arm64: vgic-its: vgic_its_alloc_ite/device Eric Auger
2017-05-05 12:04 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 18/24] KVM: arm64: vgic-its: Add infrastructure for table lookup Eric Auger
2017-05-05 12:16 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 19/24] KVM: arm64: vgic-its: Collection table save/restore Eric Auger
2017-05-05 12:28 ` Christoffer Dall
2017-05-05 14:28 ` Auger Eric
2017-05-05 14:43 ` Auger Eric
2017-05-04 11:44 ` [PATCH v6 20/24] KVM: arm64: vgic-its: vgic_its_check_id returns the entry's GPA Eric Auger
2017-05-04 11:44 ` [PATCH v6 21/24] KVM: arm64: vgic-its: Device table save/restore Eric Auger
2017-05-05 12:44 ` Christoffer Dall
2017-05-05 16:23 ` Auger Eric
2017-05-05 18:12 ` Christoffer Dall
2017-05-06 10:21 ` Auger Eric
2017-05-04 11:44 ` [PATCH v6 22/24] KVM: arm64: vgic-its: ITT save and restore Eric Auger
2017-05-05 14:50 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 23/24] KVM: arm64: vgic-its: Fix pending table sync Eric Auger
2017-05-05 14:54 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 24/24] KVM: arm64: vgic-v3: KVM_DEV_ARM_VGIC_SAVE_PENDING_TABLES Eric Auger
2017-05-05 9:24 ` Auger Eric
2017-05-05 14:56 ` Christoffer Dall
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170504132321.GN5923@cbox \
--to=cdall@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).