From: Farhan Ali <alifm@linux.ibm.com>
To: Cornelia Huck <cohuck@redhat.com>, Eric Farman <farman@linux.ibm.com>
Cc: Halil Pasic <pasic@linux.ibm.com>,
qemu-s390x@nongnu.org,
Alex Williamson <alex.williamson@redhat.com>,
qemu-devel@nongnu.org, Pierre Morel <pmorel@linux.ibm.com>
Subject: Re: [Qemu-devel] [PATCH v4 2/2] vfio-ccw: support async command subregion
Date: Tue, 21 May 2019 16:51:27 -0400 [thread overview]
Message-ID: <36b4a7c3-2ff2-b0a1-06b0-59e83a1ff9ce@linux.ibm.com> (raw)
In-Reply-To: <20190521183235.7c3d0b37.cohuck@redhat.com>
On 05/21/2019 12:32 PM, Cornelia Huck wrote:
> On Mon, 20 May 2019 12:29:56 -0400
> Eric Farman <farman@linux.ibm.com> wrote:
>
>> On 5/7/19 11:47 AM, Cornelia Huck wrote:
>>> A vfio-ccw device may provide an async command subregion for
>>> issuing halt/clear subchannel requests. If it is present, use
>>> it for sending halt/clear request to the device; if not, fall
>>> back to emulation (as done today).
>>>
>>> Signed-off-by: Cornelia Huck <cohuck@redhat.com>
>>> ---
>>> hw/s390x/css.c | 27 +++++++--
>>> hw/vfio/ccw.c | 110 +++++++++++++++++++++++++++++++++++-
>>> include/hw/s390x/s390-ccw.h | 3 +
>>> 3 files changed, 134 insertions(+), 6 deletions(-)
>>>
>
>>> +int vfio_ccw_handle_clear(SubchDev *sch)
>>> +{
>>> + S390CCWDevice *cdev = sch->driver_data;
>>> + VFIOCCWDevice *vcdev = DO_UPCAST(VFIOCCWDevice, cdev, cdev);
>>> + struct ccw_cmd_region *region = vcdev->async_cmd_region;
>>> + int ret;
>>> +
>>> + if (!vcdev->async_cmd_region) {
>>> + /* Async command region not available, fall back to emulation */
>>> + return -ENOSYS;
>>> + }
>>> +
>>> + memset(region, 0, sizeof(*region));
>>> + region->command = VFIO_CCW_ASYNC_CMD_CSCH;
>>
>> Considering the serialization you added on the kernel side, what happens
>> if another vcpu runs this code (or _halt) and clears the async region
>> before the kernel code gains control from the pwrite() call below?
>> Asked another way, there's nothing preventing us from issuing more than
>> one asynchronous command concurrently, so how do we make sure the
>> command gets to the kernel rather than "current command wins" ?
>
> This send me digging through the code, because if two threads can call
> this at the same time for passthrough, we'd also have the same problem
> for virtual.
>
> If I followed the code correctly, all I/O instruction interpretation is
> currently serialized via qemu_mutex_{lock,unlock}_iothread() (see
> target/s390x/kvm.c respectively target/s390x/misc_helper.c). This
> should mostly be enough to avoid stepping on each other's toes.
>
> Why mostly? I'm not sure yet whether we handling multiple requests for
> passthrough devices correctly yet (virtual should be fine.)
But don't virtual and passthrough device end up calling the same
ioinst_handle_* functions to interpret the I/O instructions?
As you mentioned all the ioinst_handle_* functions are called with the
qemu_mutex held. So I am confused as why virtual devices should be fine
and not passthrough? :)
>
> Start vs. (start|halt|clear) is fine, as the code checks whether
> something is already pending before poking the kernel interface.
> Likewise, halt vs. (start|halt|clear) is fine, as the code checks for
> halt or clear and start and halt use different regions. The problematic
> one is clear, as that's something that's always supposed to go through.
> Probably fine if clear should always "win", but I need to think some
> more about that.
>
>>
>> That possibly worrisome question aside, this seems generally fine.
>>
>>
>>> +
>>> +again:
>>> + ret = pwrite(vcdev->vdev.fd, region,
>>> + vcdev->async_cmd_region_size, vcdev->async_cmd_region_offset);
>>> + if (ret != vcdev->async_cmd_region_size) {
>>> + if (errno == EAGAIN) {
>>> + goto again;
>>> + }
>>> + error_report("vfio-ccw: write cmd region failed with errno=%d", errno);
>>> + ret = -errno;
>>> + } else {
>>> + ret = region->ret_code;
>>> + }
>>> + switch (ret) {
>>> + case 0:
>>> + case -ENODEV:
>>> + case -EACCES:
>>> + return 0;
>>> + case -EFAULT:
>>> + default:
>>> + sch_gen_unit_exception(sch);
>>> + css_inject_io_interrupt(sch);
>>> + return 0;
>>> + }
>>> +}
>
>
next prev parent reply other threads:[~2019-05-21 20:54 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-05-07 15:47 [Qemu-devel] [PATCH v4 0/2] vfio-ccw: support hsch/csch (QEMU part) Cornelia Huck
2019-05-07 15:47 ` [Qemu-devel] [PATCH v4 1/2] linux-headers: update Cornelia Huck
2019-05-07 15:47 ` [Qemu-devel] [PATCH v4 2/2] vfio-ccw: support async command subregion Cornelia Huck
2019-05-20 8:42 ` Cornelia Huck
2019-05-20 16:30 ` Eric Farman
2019-05-20 16:29 ` Eric Farman
2019-05-20 16:47 ` Cornelia Huck
2019-05-21 16:32 ` Cornelia Huck
2019-05-21 20:47 ` Eric Farman
2019-05-29 9:48 ` Cornelia Huck
2019-05-29 13:47 ` Eric Farman
2019-05-21 20:51 ` Farhan Ali [this message]
2019-05-22 10:13 ` Cornelia Huck
2019-05-21 20:50 ` Farhan Ali
2019-05-22 10:17 ` Cornelia Huck
2019-05-22 11:53 ` Farhan Ali
2019-05-29 13:47 ` Eric Farman
2019-05-31 12:42 ` Cornelia Huck
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=36b4a7c3-2ff2-b0a1-06b0-59e83a1ff9ce@linux.ibm.com \
--to=alifm@linux.ibm.com \
--cc=alex.williamson@redhat.com \
--cc=cohuck@redhat.com \
--cc=farman@linux.ibm.com \
--cc=pasic@linux.ibm.com \
--cc=pmorel@linux.ibm.com \
--cc=qemu-devel@nongnu.org \
--cc=qemu-s390x@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).