From: Auger Eric <eric.auger@redhat.com>
To: Shannon Zhao <zhaoshenglong@huawei.com>, qemu-arm@nongnu.org
Cc: peter.maydell@linaro.org, qemu-stable@nongnu.org,
qemu-devel@nongnu.org, shannon.zhaosl@gmail.com
Subject: Re: [Qemu-devel] [PATCH v5 2/2] arm_gicv3_kvm: kvm_dist_get/put: skip the registers banked by GICR
Date: Thu, 31 May 2018 13:32:52 +0200 [thread overview]
Message-ID: <590c8365-3a31-88b7-2cfb-23f9ecfa5916@redhat.com> (raw)
In-Reply-To: <1527736557-11084-3-git-send-email-zhaoshenglong@huawei.com>
Hi,
On 05/31/2018 05:15 AM, Shannon Zhao wrote:
> While we skip the GIC_INTERNAL irqs, we don't change the register offset
> accordingly. This will overlap the GICR registers value and leave the
> last GIC_INTERNAL irq's registers out of update.
>
> Fix this by skipping the registers banked by GICR.
>
> Also for migration compatibility if the migration source (old version
> qemu) doesn't send gicd_no_migration_shift_bug = 1 to destination, then
> we shift the data of PPI to get the right data for SPI.
>
> Fixes: 367b9f527becdd20ddf116e17a3c0c2bbc486920
> Cc: qemu-stable@nongnu.org
> Signed-off-by: Shannon Zhao <zhaoshenglong@huawei.com>
> ---
> hw/intc/arm_gicv3_common.c | 79 ++++++++++++++++++++++++++++++++++++++
> hw/intc/arm_gicv3_kvm.c | 38 ++++++++++++++++++
> include/hw/intc/arm_gicv3_common.h | 1 +
> 3 files changed, 118 insertions(+)
>
> diff --git a/hw/intc/arm_gicv3_common.c b/hw/intc/arm_gicv3_common.c
> index 7b54d52..68211a2 100644
> --- a/hw/intc/arm_gicv3_common.c
> +++ b/hw/intc/arm_gicv3_common.c
> @@ -27,6 +27,7 @@
> #include "hw/intc/arm_gicv3_common.h"
> #include "gicv3_internal.h"
> #include "hw/arm/linux-boot-if.h"
> +#include "sysemu/kvm.h"
>
> static int gicv3_pre_save(void *opaque)
> {
> @@ -141,6 +142,79 @@ static const VMStateDescription vmstate_gicv3_cpu = {
> }
> };
>
> +static int gicv3_gicd_no_migration_shift_bug_pre_load(void *opaque)
> +{
> + GICv3State *cs = opaque;
> +
> + /*
> + * The gicd_no_migration_shift_bug flag is used for migration compatibilty
nit: compatibility
> + * for old version QEMU which may have the GICD bmp shift bug under KVM mode.
> + * Strictly, what we want to know is whether the migration source is using
> + * KVM. Since we don't have any way to determine that, we look at whether the
> + * destination is using KVM; this is close enough because for the older QEMU
> + * versions with this bug KVM -> TCG migration didn't work anyway. If the
> + * source is a newer QEMU without this bug it will transmit the migration
> + * subsection which sets the flag to true; otherwise it will remain set to
> + * the value we select here.
> + */
> + if (kvm_enabled()) {
> + cs->gicd_no_migration_shift_bug = false;
> + }
> +
> + return 0;
> +}
> +
> +static int gicv3_gicd_no_migration_shift_bug_post_load(void *opaque,
> + int version_id)
> +{
> + GICv3State *cs = opaque;
> +
> + if (cs->gicd_no_migration_shift_bug) {
> + return 0;
> + }
> +
> + /* Older versions of QEMU had a bug in the handling of state save/restore
> + * to the KVM GICv3: they got the offset in the bitmap arrays wrong,
> + * so that instead of the data for external interrupts 32 and up
> + * starting at bit position 32 in the bitmap, it started at bit
> + * position 64. If we're receiving data from a QEMU with that bug,
> + * we must move the data down into the right place.
> + */
> + memmove(cs->group, (uint8_t *)cs->group + GIC_INTERNAL / 8,
> + sizeof(cs->group) - GIC_INTERNAL / 8);
> + memmove(cs->grpmod, (uint8_t *)cs->grpmod + GIC_INTERNAL / 8,
> + sizeof(cs->grpmod) - GIC_INTERNAL / 8);
> + memmove(cs->enabled, (uint8_t *)cs->enabled + GIC_INTERNAL / 8,
> + sizeof(cs->enabled) - GIC_INTERNAL / 8);
> + memmove(cs->pending, (uint8_t *)cs->pending + GIC_INTERNAL / 8,
> + sizeof(cs->pending) - GIC_INTERNAL / 8);
> + memmove(cs->active, (uint8_t *)cs->active + GIC_INTERNAL / 8,
> + sizeof(cs->active) - GIC_INTERNAL / 8);
> + memmove(cs->edge_trigger, (uint8_t *)cs->edge_trigger + GIC_INTERNAL / 8,
> + sizeof(cs->edge_trigger) - GIC_INTERNAL / 8);
> +
> + /*
> + * While this new version QEMU doesn't have this kind of bug as we fix it,
> + * so it's need to set the flag to true to indicate that and it's neccessary
nit: it needs, necessary
> + * for next migration to work from this new version QEMU.
> + */
> + cs->gicd_no_migration_shift_bug = true;
> +
> + return 0;
> +}
> +
> +const VMStateDescription vmstate_gicv3_gicd_no_migration_shift_bug = {
> + .name = "arm_gicv3/gicd_no_migration_shift_bug",
> + .version_id = 1,
> + .minimum_version_id = 1,
> + .pre_load = gicv3_gicd_no_migration_shift_bug_pre_load,
> + .post_load = gicv3_gicd_no_migration_shift_bug_post_load,
> + .fields = (VMStateField[]) {
> + VMSTATE_BOOL(gicd_no_migration_shift_bug, GICv3State),
> + VMSTATE_END_OF_LIST()
> + }
> +};
> +
> static const VMStateDescription vmstate_gicv3 = {
> .name = "arm_gicv3",
> .version_id = 1,
> @@ -165,6 +239,10 @@ static const VMStateDescription vmstate_gicv3 = {
> VMSTATE_STRUCT_VARRAY_POINTER_UINT32(cpu, GICv3State, num_cpu,
> vmstate_gicv3_cpu, GICv3CPUState),
> VMSTATE_END_OF_LIST()
> + },
> + .subsections = (const VMStateDescription * []) {
> + &vmstate_gicv3_gicd_no_migration_shift_bug,
> + NULL
> }
> };
>
> @@ -364,6 +442,7 @@ static void arm_gicv3_common_reset(DeviceState *dev)
> gicv3_gicd_group_set(s, i);
> }
> }
> + s->gicd_no_migration_shift_bug = true;
> }
>
> static void arm_gic_common_linux_init(ARMLinuxBootIf *obj,
> diff --git a/hw/intc/arm_gicv3_kvm.c b/hw/intc/arm_gicv3_kvm.c
> index 147e691..001d82b 100644
> --- a/hw/intc/arm_gicv3_kvm.c
> +++ b/hw/intc/arm_gicv3_kvm.c
> @@ -178,6 +178,14 @@ static void kvm_dist_get_edge_trigger(GICv3State *s, uint32_t offset,
> uint32_t reg;
> int irq;
>
> + /* For the KVM GICv3, affinity routing is always enabled, and the first 2
> + * GICD_ICFGR<n> registers are always RAZ/WI. The corresponding
> + * functionality is replaced by GICR_ICFGR<n>. It doesn't need to sync
> + * them. So it should increase the offset to skip GIC_INTERNAL irqs.
> + * This matches the for_each_dist_irq_reg() macro which also skips the
> + * first GIC_INTERNAL irqs.
> + */
> + offset += (GIC_INTERNAL * 2) / 8;
> for_each_dist_irq_reg(irq, s->num_irq, 2) {
> kvm_gicd_access(s, offset, ®, false);
> reg = half_unshuffle32(reg >> 1);
> @@ -195,6 +203,14 @@ static void kvm_dist_put_edge_trigger(GICv3State *s, uint32_t offset,
> uint32_t reg;
> int irq;
>
> + /* For the KVM GICv3, affinity routing is always enabled, and the first 2
> + * GICD_ICFGR<n> registers are always RAZ/WI. The corresponding
> + * functionality is replaced by GICR_ICFGR<n>. It doesn't need to sync
> + * them. So it should increase the offset to skip GIC_INTERNAL irqs.
> + * This matches the for_each_dist_irq_reg() macro which also skips the
> + * first GIC_INTERNAL irqs.
> + */
> + offset += (GIC_INTERNAL * 2) / 8;
> for_each_dist_irq_reg(irq, s->num_irq, 2) {
> reg = *gic_bmp_ptr32(bmp, irq);
> if (irq % 32 != 0) {
> @@ -236,6 +252,15 @@ static void kvm_dist_getbmp(GICv3State *s, uint32_t offset, uint32_t *bmp)
> uint32_t reg;
> int irq;
>
> + /* For the KVM GICv3, affinity routing is always enabled, and the
> + * GICD_IGROUPR0/GICD_IGRPMODR0/GICD_ISENABLER0/GICD_ISPENDR0/
> + * GICD_ISACTIVER0 registers are always RAZ/WI. The corresponding
> + * functionality is replaced by the GICR registers. It doesn't need to sync
> + * them. So it should increase the offset to skip GIC_INTERNAL irqs.
> + * This matches the for_each_dist_irq_reg() macro which also skips the
> + * first GIC_INTERNAL irqs.
> + */
> + offset += (GIC_INTERNAL * 1) / 8;
> for_each_dist_irq_reg(irq, s->num_irq, 1) {
> kvm_gicd_access(s, offset, ®, false);
> *gic_bmp_ptr32(bmp, irq) = reg;
> @@ -249,6 +274,19 @@ static void kvm_dist_putbmp(GICv3State *s, uint32_t offset,
> uint32_t reg;
> int irq;
>
> + /* For the KVM GICv3, affinity routing is always enabled, and the
> + * GICD_IGROUPR0/GICD_IGRPMODR0/GICD_ISENABLER0/GICD_ISPENDR0/
> + * GICD_ISACTIVER0 registers are always RAZ/WI. The corresponding
> + * functionality is replaced by the GICR registers. It doesn't need to sync
> + * them. So it should increase the offset to skip GIC_INTERNAL irqs.
> + * This matches the for_each_dist_irq_reg() macro which also skips the
> + * first GIC_INTERNAL irqs.
> + */
> + offset += (GIC_INTERNAL * 1) / 8;
> + if (clroffset != 0) {
> + clroffset += (1 * sizeof(uint32_t));
> + }
> +
> for_each_dist_irq_reg(irq, s->num_irq, 1) {
> /* If this bitmap is a set/clear register pair, first write to the
> * clear-reg to clear all bits before using the set-reg to write
> diff --git a/include/hw/intc/arm_gicv3_common.h b/include/hw/intc/arm_gicv3_common.h
> index bccdfe1..d75b49d 100644
> --- a/include/hw/intc/arm_gicv3_common.h
> +++ b/include/hw/intc/arm_gicv3_common.h
> @@ -217,6 +217,7 @@ struct GICv3State {
> uint32_t revision;
> bool security_extn;
> bool irq_reset_nonsecure;
> + bool gicd_no_migration_shift_bug;
>
> int dev_fd; /* kvm device fd if backed by kvm vgic support */
> Error *migration_blocker;
>
Reviewed-by: Eric Auger <eric.auger@redhat.com>
Thanks
Eric
next prev parent reply other threads:[~2018-05-31 11:33 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-31 3:15 [Qemu-devel] [PATCH v5 0/2] Fix ARM KVM GICv3 get/put data shift bug Shannon Zhao
2018-05-31 3:15 ` [Qemu-devel] [PATCH v5 1/2] arm_gicv3_kvm: kvm_dist_get/put_priority: skip the registers banked by GICR_IPRIORITYR Shannon Zhao
2018-05-31 11:01 ` Auger Eric
2018-06-11 8:32 ` Shannon Zhao
2018-06-11 13:08 ` Peter Maydell
2018-05-31 3:15 ` [Qemu-devel] [PATCH v5 2/2] arm_gicv3_kvm: kvm_dist_get/put: skip the registers banked by GICR Shannon Zhao
2018-05-31 11:32 ` Auger Eric [this message]
2018-05-31 13:50 ` Peter Maydell
2018-05-31 14:36 ` Shannon Zhao
2018-05-31 14:56 ` Peter Maydell
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=590c8365-3a31-88b7-2cfb-23f9ecfa5916@redhat.com \
--to=eric.auger@redhat.com \
--cc=peter.maydell@linaro.org \
--cc=qemu-arm@nongnu.org \
--cc=qemu-devel@nongnu.org \
--cc=qemu-stable@nongnu.org \
--cc=shannon.zhaosl@gmail.com \
--cc=zhaoshenglong@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).