From: eric.auger@redhat.com (Auger Eric)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v6 01/24] KVM: arm/arm64: Add ITS save/restore API documentation
Date: Thu, 4 May 2017 16:50:23 +0200 [thread overview]
Message-ID: <8acbd1b6-0fbe-a9d4-6495-b48e07ca9108@redhat.com> (raw)
In-Reply-To: <20170504132321.GN5923@cbox>
Hi,
On 04/05/2017 15:23, Christoffer Dall wrote:
> On Thu, May 04, 2017 at 01:44:21PM +0200, Eric Auger wrote:
>> Add description for how to access ITS registers and how to save/restore
>> ITS tables into/from memory.
>>
>> Signed-off-by: Eric Auger <eric.auger@redhat.com>
>>
>> ---
>> v5 -> v6:
>> - add restoration ordering
>> - 256B -> 256 Byte aligned
>> - DTE Size is number of bits for the EVENTID
>> - s/GITS_READR/GITS_CREADR
>>
>> v4 -> v5:
>> - take into account Christoffer's comments
>> - pending table save on GICV3 side now
>>
>> v3 -> v4:
>> - take into account Peter's comments:
>> - typos
>> - KVM_DEV_ARM_VGIC_GRP_ITS_TABLES kvm_device_attr = 0
>> - add a validity bit in DTE
>> - document all fields in CTE and ITE
>> - document ABI revision
>> - take into account Andre's comments:
>> - document restrictions about GITS_CREADR writing and GITS_IIDR
>> - document -EBUSY error if one or more VCPUS are runnning
>> - document 64b registers only can be accessed with 64b access
>> - itt_addr field matches bits [51:8] of the itt_addr
>>
>> v1 -> v2:
>> - DTE and ITE now are 8 bytes
>> - DTE and ITE now indexed by deviceid/eventid
>> - use ITE name instead of ITTE
>> - mentions ITT_addr matches bits [51:8] of the actual address
>> - mentions LE layout
>> ---
>> Documentation/virtual/kvm/devices/arm-vgic-its.txt | 117 +++++++++++++++++++++
>> 1 file changed, 117 insertions(+)
>>
>> diff --git a/Documentation/virtual/kvm/devices/arm-vgic-its.txt b/Documentation/virtual/kvm/devices/arm-vgic-its.txt
>> index 6081a5b..863c359 100644
>> --- a/Documentation/virtual/kvm/devices/arm-vgic-its.txt
>> +++ b/Documentation/virtual/kvm/devices/arm-vgic-its.txt
>> @@ -32,7 +32,124 @@ Groups:
>> KVM_DEV_ARM_VGIC_CTRL_INIT
>> request the initialization of the ITS, no additional parameter in
>> kvm_device_attr.addr.
>> +
>> + KVM_DEV_ARM_ITS_SAVE_TABLES
>> + save the ITS table data into guest RAM, at the location provisioned
>> + by the guest in corresponding registers/table entries.
>> +
>> + The layout of the tables in guest memory defines an ABI. The entries
>> + are laid out in little endian format as described in the last paragraph.
>> +
>> + KVM_DEV_ARM_ITS_RESTORE_TABLES
>> + restore the ITS tables from guest RAM to ITS internal structures.
>> +
>> + The GICV3 must be restored before the ITS and all ITS registers but
>> + the GITS_CTLR must be restored before restoring the ITS tables.
>> +
>> + The GITS_IIDR read-only register must also be restored before
>> + the table restore as the IIDR revision field encodes the ABI revision.
>
> the table restore? "before calling KVM_DEV_ARM_ITS_RESTORE_TABLES" ?
> (there's a potential confusion between calling this ioctl and simply
> restoring the memory containing the tables).
OK
>
>> +
>> + The expected ordering when restoring the GICv3/ITS is described in section
>> + "ITS Restoration Sequence".
>> +
>> Errors:
>> -ENXIO: ITS not properly configured as required prior to setting
>> this attribute
>> -ENOMEM: Memory shortage when allocating ITS internal data
>> + -EINVAL: Inconsistent restored data
>> + -EFAULT: Invalid guest ram access
>> + -EBUSY: One or more VCPUS are running
>> +
>> + KVM_DEV_ARM_VGIC_GRP_ITS_REGS
>> + Attributes:
>> + The attr field of kvm_device_attr encodes the offset of the
>> + ITS register, relative to the ITS control frame base address
>> + (ITS_base).
>> +
>> + kvm_device_attr.addr points to a __u64 value whatever the width
>> + of the addressed register (32/64 bits). 64 bit registers can only
>> + be accessed with full length.
>> +
>> + Writes to read-only registers are ignored by the kernel except for:
>> + - GITS_CREADR. It needs to be restored otherwise commands in the queue
>> + will be re-executed after restoring CWRITER. GITS_CREADR must be
>> + restored before restoring the GITS_CTLR which is likely to enable the
>> + ITS. Also it needs to be restored after GITS_CBASER since a write to
>> + GITS_CBASER resets GITS_CREADR.
>
> uber nit: s/needs to be/must be/g in all occurences above.
OK
>
>> + - GITS_IIDR. Its Revision field encodes the table layout ABI revision.
>
> s/Its/The/
OK. Argh, I meant its (~his) ;-)
> the revision of the table layout ABI.
>
>> + In the future we might implement direct injection of virtual LPIS.
>
> LPIs
OK
>
>> + This will require an upgrade of the table layout and an evolution of
>> + the ABI. GITS_IIDR must be restored before the table restoration.
>
> before calling KVM_DEV_ARM_ITS_RESTORE_TABLES.
OK
>
>> +
>> + For other registers, getting or setting a register has the same
>> + effect as reading/writing the register on real hardware.
>> + Errors:
>> + -ENXIO: Offset does not correspond to any supported register
>> + -EFAULT: Invalid user pointer for attr->addr
>> + -EINVAL: Offset is not 64-bit aligned
>> + -EBUSY: one or more VCPUS are running
>> +
>> + ITS Restoration Sequence:
>
> s/Restoration/restore/
OK
>
>> + -------------------------
>> +
>> +The following ordering must be followed when restoring the GIC and the ITS:
>> +a) restore all guest memory and create vcpus
>> +b) initialize the GIC and ITS (KVM_DEV_ARM_VGIC_CTRL_INIT)
>
> are these really coupled or can you do everything related to the gic
> first, and then everything related to the ITS afterwards?
no they aren't.
>
>> +c) provide GIC and ITS base addresses (KVM_DEV_ARM_VGIC_GRP_ADDR)
>
> same
no they aren't
>
>> +d) restore all redistributors
>> +e) restore the ITS in the following order:
>> + 1. Restore GITS_CBASER
>> + 2. Restore all other GITS_ registers, except GITS_CTLR!
>> + 3. Load the ITS table data (KVM_DEV_ARM_ITS_RESTORE_TABLES)
>> + 4. Restore GITS_CTLR
>> +f) start vcpus
>
> I would omit (f) from here.
In that case I think it would make sense to describe the restore
sequence for GICV3 RDIST in GICV3 device doc and not here. This would
alleviate this very description.
restoring RDIST regs require a previous GICV3 KVM_DEV_ARM_VGIC_CTRL_INIT
and KVM_DEV_ARM_VGIC_GRP_ADDR I think.
So description here would become
"
a) restore all guest memory and create vcpus
b) restore all redistributors
c) initialize the ITS and then provide its base address
(KVM_DEV_ARM_VGIC_CTRL_INIT, KVM_DEV_ARM_VGIC_GRP_ADDR)
c) restore the ITS in the following order:
1. Restore GITS_CBASER
2. Restore all other GITS_ registers, except GITS_CTLR!
3. Load the ITS table data (KVM_DEV_ARM_ITS_RESTORE_TABLES)
4. Restore GITS_CTLR
Then vcpus can be started.
"
What do you think?
>
>> +
>> + ITS Table ABI REV0:
>> + -------------------
>> +
>> + Revision 0 of the ABI only supports physical LPIs.
>> +
>> + The device table and ITT are indexed by the deviceid and eventid,
>> + respectively. The collection table is not indexed by collectionid:
>> + CTE are written in the table in the order of collection creation. All
>
> nit: CTEs
OK
>
>> + entries are 8 bytes.
>> +
>> + Device Table Entry (DTE):
>> +
>> + bits: | 63| 62 ... 49 | 48 ... 5 | 4 ... 0 |
>> + values: | V | next | ITT_addr | Size |
>> +
>> + where;
>> + - V indicates whether the entry is valid. If not, other fields
>> + are not meaningful.
>> + - next: equals to 0 if this entry is the last one; otherwise it
>> + corresponds to the deviceid offset to the next DTE, capped by
>> + 2^14 -1.
>> + - ITT_addr matches bits [51:8] of the ITT address (256 Byte aligned).
>> + - Size specifies the supported number of bits for the eventid,
>> + minus one
>> +
>> + Collection Table Entry (CTE):
>> +
>> + bits: | 63| 62 .. 52 | 51 ... 16 | 15 ... 0 |
>> + values: | V | RES0 | RDBase | ICID |
>> +
>> + where:
>> + - V indicates whether the entry is valid. If not, other fields are
>> + not meaningful.
>> + - RES0: reserved field with Should-Be-Zero-or-Preserved behavior.
>> + - RDBase is the PE number (GICR_TYPER.Processor_Number semantic),
>> + - ICID is the collection ID
>> +
>> + Interrupt Translation Entry (ITE):
>> +
>> + bits: | 63 ... 48 | 47 ... 16 | 15 ... 0 |
>> + values: | next | pINTID | ICID |
>> +
>> + where:
>> + - next: equals to 0 if this entry is the last one; otherwise it corresponds
>> + to the eventid offset to the next ITE capped by 2^16 -1.
>> + - pINTID is the physical LPI ID; if zero, it means the entry is not valid
>> + and other fields are not meaningful.
>> + - ICID is the collection ID
>> +
>> --
>> 2.5.5
>>
>
> The only outstanding issue here is the restore order part. I don't wont
> to specify a stronger order than absolutely necessary here.
see above
Thanks
Eric
>
> Otherwise this generally looks good.
>
> Thanks,
> -Christoffer
>
> _______________________________________________
> linux-arm-kernel mailing list
> linux-arm-kernel at lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
>
next prev parent reply other threads:[~2017-05-04 14:50 UTC|newest]
Thread overview: 72+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-05-04 11:44 [PATCH v6 00/24] vITS save/restore Eric Auger
2017-05-04 11:44 ` [PATCH v6 01/24] KVM: arm/arm64: Add ITS save/restore API documentation Eric Auger
2017-05-04 13:23 ` Christoffer Dall
2017-05-04 14:50 ` Auger Eric [this message]
2017-05-04 16:52 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 02/24] KVM: arm/arm64: Add GICV3 pending table save " Eric Auger
2017-05-04 13:24 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 03/24] KVM: arm/arm64: vgic-its: rename itte into ite Eric Auger
2017-05-04 11:44 ` [PATCH v6 04/24] arm/arm64: vgic: turn vgic_find_mmio_region into public Eric Auger
2017-05-04 11:44 ` [PATCH v6 05/24] KVM: arm64: vgic-its: KVM_DEV_ARM_VGIC_GRP_ITS_REGS group Eric Auger
2017-05-04 11:44 ` [PATCH v6 06/24] KVM: arm/arm64: vgic: expose (un)lock_all_vcpus Eric Auger
2017-05-04 11:44 ` [PATCH v6 07/24] KVM: arm64: vgic-its: Implement vgic_its_has_attr_regs and attr_regs_access Eric Auger
2017-05-04 14:04 ` Marc Zyngier
2017-05-04 15:03 ` Auger Eric
2017-05-04 16:48 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 08/24] KVM: arm64: vgic-its: Implement vgic_mmio_uaccess_write_its_creadr Eric Auger
2017-05-04 14:16 ` Marc Zyngier
2017-05-04 15:09 ` Auger Eric
2017-05-04 17:09 ` Christoffer Dall
2017-05-05 8:06 ` Auger Eric
2017-05-04 11:44 ` [PATCH v6 09/24] KVM: arm64: vgic-its: Introduce migration ABI infrastructure Eric Auger
2017-05-04 14:45 ` Marc Zyngier
2017-05-04 17:13 ` Christoffer Dall
2017-05-05 8:16 ` Auger Eric
2017-05-05 9:43 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 10/24] KVM: arm64: vgic-its: Implement vgic_mmio_uaccess_write_its_iidr Eric Auger
2017-05-04 15:39 ` Marc Zyngier
2017-05-04 17:14 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 11/24] KVM: arm64: vgic-its: Interpret MAPD Size field and check related errors Eric Auger
2017-05-05 9:44 ` Marc Zyngier
2017-05-04 11:44 ` [PATCH v6 12/24] KVM: arm64: vgic-its: Interpret MAPD ITT_addr field Eric Auger
2017-05-04 17:16 ` Christoffer Dall
2017-05-05 9:45 ` Marc Zyngier
2017-05-04 11:44 ` [PATCH v6 13/24] KVM: arm64: vgic-its: Check the device id matches TYPER DEVBITS range Eric Auger
2017-05-04 17:19 ` Christoffer Dall
2017-05-04 17:23 ` Marc Zyngier
2017-05-04 11:44 ` [PATCH v6 14/24] KVM: arm64: vgic-v3: vgic_v3_lpi_sync_pending_status Eric Auger
2017-05-05 8:11 ` Christoffer Dall
2017-05-05 9:45 ` Auger Eric
2017-05-05 9:59 ` Marc Zyngier
2017-05-05 10:10 ` Christoffer Dall
2017-05-05 10:35 ` Marc Zyngier
2017-05-05 14:20 ` Auger Eric
2017-05-05 14:50 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 15/24] KVM: arm64: vgic-its: Read config and pending bit in add_lpi() Eric Auger
2017-05-05 9:57 ` Christoffer Dall
2017-05-05 12:50 ` Marc Zyngier
2017-05-05 14:50 ` Auger Eric
2017-05-05 18:07 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 16/24] KVM: arm64: vgic-its: KVM_DEV_ARM_ITS_SAVE/RESTORE_TABLES Eric Auger
2017-05-05 11:55 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 17/24] KVM: arm64: vgic-its: vgic_its_alloc_ite/device Eric Auger
2017-05-05 12:04 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 18/24] KVM: arm64: vgic-its: Add infrastructure for table lookup Eric Auger
2017-05-05 12:16 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 19/24] KVM: arm64: vgic-its: Collection table save/restore Eric Auger
2017-05-05 12:28 ` Christoffer Dall
2017-05-05 14:28 ` Auger Eric
2017-05-05 14:43 ` Auger Eric
2017-05-04 11:44 ` [PATCH v6 20/24] KVM: arm64: vgic-its: vgic_its_check_id returns the entry's GPA Eric Auger
2017-05-04 11:44 ` [PATCH v6 21/24] KVM: arm64: vgic-its: Device table save/restore Eric Auger
2017-05-05 12:44 ` Christoffer Dall
2017-05-05 16:23 ` Auger Eric
2017-05-05 18:12 ` Christoffer Dall
2017-05-06 10:21 ` Auger Eric
2017-05-04 11:44 ` [PATCH v6 22/24] KVM: arm64: vgic-its: ITT save and restore Eric Auger
2017-05-05 14:50 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 23/24] KVM: arm64: vgic-its: Fix pending table sync Eric Auger
2017-05-05 14:54 ` Christoffer Dall
2017-05-04 11:44 ` [PATCH v6 24/24] KVM: arm64: vgic-v3: KVM_DEV_ARM_VGIC_SAVE_PENDING_TABLES Eric Auger
2017-05-05 9:24 ` Auger Eric
2017-05-05 14:56 ` Christoffer Dall
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=8acbd1b6-0fbe-a9d4-6495-b48e07ca9108@redhat.com \
--to=eric.auger@redhat.com \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).