From nobody Sun Nov 9 16:02:21 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1551159411227798.7822015599318; Mon, 25 Feb 2019 21:36:51 -0800 (PST) Received: from localhost ([127.0.0.1]:49662 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1gyVQ5-0004VT-8A for importer@patchew.org; Tue, 26 Feb 2019 00:36:45 -0500 Received: from eggs.gnu.org ([209.51.188.92]:58429) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1gyUlo-0005w7-8k for qemu-devel@nongnu.org; Mon, 25 Feb 2019 23:55:10 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1gyUln-0003EQ-7V for qemu-devel@nongnu.org; Mon, 25 Feb 2019 23:55:08 -0500 Received: from ozlabs.org ([203.11.71.1]:45665) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1gyUlc-0002uF-7O; Mon, 25 Feb 2019 23:54:59 -0500 Received: by ozlabs.org (Postfix, from userid 1007) id 447mfP4WJRz9sP3; Tue, 26 Feb 2019 15:53:15 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gibson.dropbear.id.au; s=201602; t=1551156797; bh=YN9TtBD8GhlgCIlL49Nk/GELvrpWj7yhRabmTEc8/u0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PBd3zNe19CS/VVLruATfx+qD/stJrFdA4PErgkb6ZErOZygcFLJ3lTih5v3E8sW4F a/E/8+5dyAttnxHl4wYGZgqvnuYME0xG5CsQOcgK4fMx6vFHX4mAkPT/PzUimvmNCC pIfDF7YBrRzHSL72dv9xUbI/T+P30xW7Zg2s/W7s= From: David Gibson To: peter.maydell@linaro.org Date: Tue, 26 Feb 2019 15:52:48 +1100 Message-Id: <20190226045304.25618-35-david@gibson.dropbear.id.au> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190226045304.25618-1-david@gibson.dropbear.id.au> References: <20190226045304.25618-1-david@gibson.dropbear.id.au> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 203.11.71.1 Subject: [Qemu-devel] [PULL 34/50] xics: Write source state to KVM at claim time X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: lvivier@redhat.com, gkurz@kaod.org, Greg Kurz , qemu-devel@nongnu.org, qemu-ppc@nongnu.org, clg@kaod.org, David Gibson Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Content-Type: text/plain; charset="utf-8" From: Greg Kurz The pseries machine only uses LSIs to support legacy PCI devices. Every PHB claims 4 LSIs at realize time. When using in-kernel XICS (or upcoming in-kernel XIVE), QEMU synchronizes the state of all irqs, including these LSIs, later on at machine reset. In order to support PHB hotplug, we need a way to tell KVM about the LSIs that doesn't require a machine reset. An easy way to do that is to always inform KVM when an interrupt is claimed, which really isn't a performance path. Signed-off-by: Greg Kurz Message-Id: <155059668360.1466090.5969630516627776426.stgit@bahia.lab.toulo= use-stg.fr.ibm.com> Reviewed-by: C=C3=A9dric Le Goater Signed-off-by: David Gibson --- hw/intc/xics.c | 4 +++ hw/intc/xics_kvm.c | 74 +++++++++++++++++++++++++------------------ include/hw/ppc/xics.h | 1 + 3 files changed, 48 insertions(+), 31 deletions(-) diff --git a/hw/intc/xics.c b/hw/intc/xics.c index 767fdeb829..af7dc709ab 100644 --- a/hw/intc/xics.c +++ b/hw/intc/xics.c @@ -758,6 +758,10 @@ void ics_set_irq_type(ICSState *ics, int srcno, bool l= si) =20 ics->irqs[srcno].flags |=3D lsi ? XICS_FLAGS_IRQ_LSI : XICS_FLAGS_IRQ_MSI; + + if (kvm_irqchip_in_kernel()) { + ics_set_kvm_state_one(ics, srcno); + } } =20 static void xics_register_types(void) diff --git a/hw/intc/xics_kvm.c b/hw/intc/xics_kvm.c index a00d0a7962..c6e1b630a4 100644 --- a/hw/intc/xics_kvm.c +++ b/hw/intc/xics_kvm.c @@ -213,45 +213,57 @@ void ics_synchronize_state(ICSState *ics) ics_get_kvm_state(ics); } =20 -int ics_set_kvm_state(ICSState *ics) +int ics_set_kvm_state_one(ICSState *ics, int srcno) { uint64_t state; - int i; Error *local_err =3D NULL; + ICSIRQState *irq =3D &ics->irqs[srcno]; + int ret; =20 - for (i =3D 0; i < ics->nr_irqs; i++) { - ICSIRQState *irq =3D &ics->irqs[i]; - int ret; - - state =3D irq->server; - state |=3D (uint64_t)(irq->saved_priority & KVM_XICS_PRIORITY_MASK) - << KVM_XICS_PRIORITY_SHIFT; - if (irq->priority !=3D irq->saved_priority) { - assert(irq->priority =3D=3D 0xff); - state |=3D KVM_XICS_MASKED; - } + state =3D irq->server; + state |=3D (uint64_t)(irq->saved_priority & KVM_XICS_PRIORITY_MASK) + << KVM_XICS_PRIORITY_SHIFT; + if (irq->priority !=3D irq->saved_priority) { + assert(irq->priority =3D=3D 0xff); + state |=3D KVM_XICS_MASKED; + } =20 - if (ics->irqs[i].flags & XICS_FLAGS_IRQ_LSI) { - state |=3D KVM_XICS_LEVEL_SENSITIVE; - if (irq->status & XICS_STATUS_ASSERTED) { - state |=3D KVM_XICS_PENDING; - } - } else { - if (irq->status & XICS_STATUS_MASKED_PENDING) { - state |=3D KVM_XICS_PENDING; - } + if (irq->flags & XICS_FLAGS_IRQ_LSI) { + state |=3D KVM_XICS_LEVEL_SENSITIVE; + if (irq->status & XICS_STATUS_ASSERTED) { + state |=3D KVM_XICS_PENDING; } - if (irq->status & XICS_STATUS_PRESENTED) { - state |=3D KVM_XICS_PRESENTED; - } - if (irq->status & XICS_STATUS_QUEUED) { - state |=3D KVM_XICS_QUEUED; + } else { + if (irq->status & XICS_STATUS_MASKED_PENDING) { + state |=3D KVM_XICS_PENDING; } + } + if (irq->status & XICS_STATUS_PRESENTED) { + state |=3D KVM_XICS_PRESENTED; + } + if (irq->status & XICS_STATUS_QUEUED) { + state |=3D KVM_XICS_QUEUED; + } + + ret =3D kvm_device_access(kernel_xics_fd, KVM_DEV_XICS_GRP_SOURCES, + srcno + ics->offset, &state, true, &local_err); + if (local_err) { + error_report_err(local_err); + return ret; + } + + return 0; +} + +int ics_set_kvm_state(ICSState *ics) +{ + int i; + + for (i =3D 0; i < ics->nr_irqs; i++) { + int ret; =20 - ret =3D kvm_device_access(kernel_xics_fd, KVM_DEV_XICS_GRP_SOURCES, - i + ics->offset, &state, true, &local_err); - if (local_err) { - error_report_err(local_err); + ret =3D ics_set_kvm_state_one(ics, i); + if (ret) { return ret; } } diff --git a/include/hw/ppc/xics.h b/include/hw/ppc/xics.h index d36bbe11ee..eb65ad7e43 100644 --- a/include/hw/ppc/xics.h +++ b/include/hw/ppc/xics.h @@ -195,6 +195,7 @@ void icp_synchronize_state(ICPState *icp); void icp_kvm_realize(DeviceState *dev, Error **errp); =20 void ics_get_kvm_state(ICSState *ics); +int ics_set_kvm_state_one(ICSState *ics, int srcno); int ics_set_kvm_state(ICSState *ics); void ics_synchronize_state(ICSState *ics); void ics_kvm_set_irq(ICSState *ics, int srcno, int val); --=20 2.20.1