qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-devel] Xen: enabling emulated MSI injection


From: Jan Kiszka
Subject: Re: [Qemu-devel] Xen: enabling emulated MSI injection
Date: Thu, 26 May 2011 09:41:02 +0200
User-agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); de; rv:1.8.1.12) Gecko/20080226 SUSE/2.0.0.12-1.1 Thunderbird/2.0.0.12 Mnenhy/0.7.5.666

On 2011-05-26 09:35, Wei Liu wrote:
> On Thu, May 26, 2011 at 3:21 PM, Jan Kiszka <address@hidden> wrote:
>> A cleaner way of hooking into this would be registering on the MSI MMIO
>> target region (replacing the APIC). That would give you MSI support as well.
>>
>> However, KVM has much more complex requirements for MSI handling when
>> using the in-kernel irqchip. That's because we need to support, e.g.,
>> eventfd-based MSI injection in the hypervisor without looping over QEMU,
>> ie. we need to translate a binary event into a MSI address/data tuple.
>> This is currently solved a bit too pragmatic in our qemu-kvm tree -
>> not mergeable to upstream. So I started working out a better plan,
>> partly based on ideas Avi provided.
>>
>> One element in this concept will be a hook into the MSI delivery path,
>> both for events triggered by msi/msix_notify as well as those raised by
>> weird DMA (to be architecturally correct). See below for a snapshot
>> (depends on other patches). That will obsolete any open-coded hooking
>> like this here.
>>
>> If Xen support is urging, I could try to break out the relevant bits a
>> bit earlier. Otherwise I would prefer to postpone the topic by a few
>> weeks until we are done with evaluating the concept against KVM's
>> requirements so that we can find a truly generic solution.
>>
>> Jan
>>
>>
>> ------8<-------
>>
>> diff --git a/hw/apic.c b/hw/apic.c
>> index a45b57f..7447d91 100644
>> --- a/hw/apic.c
>> +++ b/hw/apic.c
>> @@ -19,6 +19,7 @@
>>  #include "hw.h"
>>  #include "apic.h"
>>  #include "ioapic.h"
>> +#include "msi.h"
>>  #include "qemu-timer.h"
>>  #include "host-utils.h"
>>  #include "sysbus.h"
>> @@ -795,7 +796,7 @@ static uint32_t apic_mem_readl(void *opaque, 
>> target_phys_addr_t addr)
>>     return val;
>>  }
>>
>> -static void apic_send_msi(target_phys_addr_t addr, uint32_t data)
>> +void apic_deliver_msi(uint64_t addr, uint32_t data)
>>  {
>>     uint8_t dest = (addr & MSI_ADDR_DEST_ID_MASK) >> MSI_ADDR_DEST_ID_SHIFT;
>>     uint8_t vector = (data & MSI_DATA_VECTOR_MASK) >> MSI_DATA_VECTOR_SHIFT;
>> @@ -817,7 +818,9 @@ static void apic_mem_writel(void *opaque, 
>> target_phys_addr_t addr, uint32_t val)
>>          * APIC is connected directly to the CPU.
>>          * Mapping them on the global bus happens to work because
>>          * MSI registers are reserved in APIC MMIO and vice versa. */
>> -        apic_send_msi(addr, val);
>> +        MSIMessage msg = { .address = addr, .data = val };
>> +
>> +        msi_deliver(&msg);
>>         return;
>>     }
>>
>> diff --git a/hw/apic.h b/hw/apic.h
>> index c857d52..d0971ae 100644
>> --- a/hw/apic.h
>> +++ b/hw/apic.h
>> @@ -20,6 +20,7 @@ void cpu_set_apic_tpr(DeviceState *s, uint8_t val);
>>  uint8_t cpu_get_apic_tpr(DeviceState *s);
>>  void apic_init_reset(DeviceState *s);
>>  void apic_sipi(DeviceState *s);
>> +void apic_deliver_msi(uint64_t addr, uint32_t data);
>>
>>  /* pc.c */
>>  int cpu_is_bsp(CPUState *env);
>> diff --git a/hw/msi.c b/hw/msi.c
>> index e111ceb..b88dcc4 100644
>> --- a/hw/msi.c
>> +++ b/hw/msi.c
>> @@ -37,6 +37,14 @@
>>
>>  #define PCI_MSI_VECTORS_MAX     32
>>
>> +static void msi_unsupported(MSIMessage *msg)
>> +{
>> +    /* If we get here, the board failed to register a delivery handler. */
>> +    abort();
>> +}
>> +
>> +void (*msi_deliver)(MSIMessage *msg) = msi_unsupported;
>> +
>>  /* If we get rid of cap allocator, we won't need this. */
>>  static inline uint8_t msi_cap_sizeof(uint16_t flags)
>>  {
>> @@ -361,7 +369,7 @@ void msi_notify(PCIDevice *dev, unsigned int vector)
>>                    "notify vector 0x%x"
>>                    " address: 0x%"PRIx64" data: 0x%"PRIx32"\n",
>>                    vector, msg.address, msg.data);
>> -    stl_phys(msg.address, msg.data);
>> +    msi_deliver(&msg);
>>  }
>>
>>  /* call this function after updating configs by pci_default_write_config(). 
>> */
>> diff --git a/hw/msi.h b/hw/msi.h
>> index 7a0e76f..ba76eca 100644
>> --- a/hw/msi.h
>> +++ b/hw/msi.h
>> @@ -44,4 +44,6 @@ static inline bool msi_present(const PCIDevice *dev)
>>     return dev->cap_present & QEMU_PCI_CAP_MSI;
>>  }
>>
>> +extern void (*msi_deliver)(MSIMessage *msg);
>> +
>>  #endif /* QEMU_MSI_H */
>> diff --git a/hw/msix.c b/hw/msix.c
>> index 6e55422..d893f88 100644
>> --- a/hw/msix.c
>> +++ b/hw/msix.c
>> @@ -514,7 +514,7 @@ void msix_notify(PCIDevice *dev, unsigned vector)
>>
>>     msix_message_from_vector(dev, vector, &msg);
>>
>> -    stl_phys(msg.address, msg.data);
>> +    msi_deliver(&msg);
>>  }
>>
>>  void msix_reset(PCIDevice *dev)
>> diff --git a/hw/pc.c b/hw/pc.c
>> index 73398eb..f88ef03 100644
>> --- a/hw/pc.c
>> +++ b/hw/pc.c
>> @@ -24,6 +24,7 @@
>>  #include "hw.h"
>>  #include "pc.h"
>>  #include "apic.h"
>> +#include "msi.h"
>>  #include "fdc.h"
>>  #include "ide.h"
>>  #include "pci.h"
>> @@ -102,6 +103,15 @@ void isa_irq_handler(void *opaque, int n, int level)
>>         qemu_set_irq(isa->ioapic[n], level);
>>  };
>>
>> +static void pc_msi_deliver(MSIMessage *msg)
>> +{
>> +    if ((msg->address & 0xfff00000) == MSI_ADDR_BASE) {
>> +        apic_deliver_msi(msg->address, msg->data);
>> +    } else {
>> +        stl_phys(msg->address, msg->data);
>> +    }
>> +}
>> +
>>  static void ioport80_write(void *opaque, uint32_t addr, uint32_t data)
>>  {
>>  }
>> @@ -889,6 +899,7 @@ static DeviceState *apic_init(void *env, uint8_t apic_id)
>>            on the global memory bus. */
>>         /* XXX: what if the base changes? */
>>         sysbus_mmio_map(d, 0, MSI_ADDR_BASE);
>> +        msi_deliver = pc_msi_deliver;
>>         apic_mapped = 1;
>>     }
>>
>> --
>> 1.7.1
>>
>> --
>> Siemens AG, Corporate Technology, CT T DE IT 1
>> Corporate Competence Center Embedded Linux
>>
> 
> Hmm... This patch is just part of GSoC project Virtio on Xen. AFAICS,
> this is not so urgent.

Ah, I see. The Xen hypervisor part is actually new as well.

> 
> I would prefer a cleaner way. A standalone function that doesn't
> belong to any QEMU subsystem annoys me. And the hooking looks ugly.
> 
> Thanks for your patch, I think we can wait for a better design and
> cleaner solution for both Xen and KVM.

Perfect.

Jan

-- 
Siemens AG, Corporate Technology, CT T DE IT 1
Corporate Competence Center Embedded Linux



reply via email to

[Prev in Thread] Current Thread [Next in Thread]