lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <49F58A8C.7090808@novell.com>
Date:	Mon, 27 Apr 2009 06:35:56 -0400
From:	Gregory Haskins <ghaskins@...ell.com>
To:	Avi Kivity <avi@...hat.com>
CC:	kvm@...r.kernel.org, linux-kernel@...r.kernel.org,
	davidel@...ilserver.org
Subject: Re: [KVM PATCH v2 2/2] kvm: add support for irqfd via	eventfd-notification
 interface

Avi Kivity wrote:
> Gregory Haskins wrote:
>> This allows an eventfd to be registered as an irq source with a
>> guest.  Any
>> signaling operation on the eventfd (via userspace or kernel) will inject
>> the registered GSI at the next available window.
>>
>>  
>> +struct kvm_irqfd {
>> +    __u32 fd;
>> +    __u32 gsi;
>> +};
>> +
>>   
>
> I think it's better to have ioctl create and return the fd.  This way
> we aren't tied to eventfd (though it makes a lot of sense to use it).

I dont mind either way, but I am not sure it buys us much as the one
driving the fd would need to understand if the interface is
eventfd-esque or something else anyway.  Let me know if you still want
to see this changed.

>
> Also, please add a flags field and some padding so we can extend it
> later.
>

Good idea.  Will do.

>> +
>> +#include <linux/kvm_host.h>
>> +#include <linux/eventfd.h>
>> +#include <linux/workqueue.h>
>> +#include <linux/wait.h>
>> +#include <linux/poll.h>
>> +#include <linux/file.h>
>> +#include <linux/list.h>
>> +
>> +struct _irqfd {
>> +    struct kvm               *kvm;
>> +    int                       gsi;
>> +    struct file              *file;
>> +    struct list_head          list;
>> +    poll_table                pt;
>> +    wait_queue_head_t        *wqh;
>> +    wait_queue_t              wait;
>> +    struct work_struct        work;
>> +};
>> +
>> +static void
>> +irqfd_inject(struct work_struct *work)
>> +{
>> +    struct _irqfd *irqfd = container_of(work, struct _irqfd, work);
>> +    struct kvm *kvm = irqfd->kvm;
>> +
>> +    mutex_lock(&kvm->lock);
>> +    kvm_set_irq(kvm, kvm->irqfd.src, irqfd->gsi, 1);
>>   
>
> Need to lower the irq too (though irqfd only supports edge triggered
> interrupts).
>
Should I just do back-to-back 1+0 inside the same lock?

>> +    mutex_unlock(&kvm->lock);
>> +}
>> +
>> +static int
>> +irqfd_wakeup(wait_queue_t *wait, unsigned mode, int sync, void *key)
>> +{
>> +    struct _irqfd *irqfd = container_of(wait, struct _irqfd, wait);
>> +
>> +    /*
>> +     * The eventfd calls its wake_up with interrupts disabled,
>> +     * so we need to defer the IRQ injection until later since we need
>> +     * to acquire the kvm->lock to do so.
>> +     */
>> +    schedule_work(&irqfd->work);
>> +
>> +    return 0;
>> +}
>>   
>
> One day we'll have lockless injection and we'll want to drop this.  I
> guess if we create the fd ourselves we can make it work, but I don't
> see how we can do this with eventfd.
>

Hmm...this is a good point.  There probably is no way to use eventfd
"off the shelf" in a way that doesn't cause this callback to be in a
critical section.  Should we just worry about switching away from
eventfd when this occurs, or should I implement a custom anon-fd now?


>> +int
>> +kvm_irqfd_assign(struct kvm *kvm, int fd, int gsi)
>> +{
>> +    struct _irqfd *irqfd;
>> +    struct file *file;
>> +    int ret;
>> +
>> +    irqfd = kzalloc(sizeof(*irqfd), GFP_KERNEL);
>> +    if (!irqfd)
>> +        return -ENOMEM;
>> +
>> +    irqfd->kvm = kvm;
>> +    irqfd->gsi = gsi;
>> +    INIT_LIST_HEAD(&irqfd->list);
>> +    init_waitqueue_func_entry(&irqfd->wait, irqfd_wakeup);
>> +    init_poll_funcptr(&irqfd->pt, irqfd_ptable_queue_proc);
>> +    INIT_WORK(&irqfd->work, irqfd_inject);
>> +
>> +    file = eventfd_fget(fd);
>> +    if (IS_ERR(file)) {
>> +        ret = PTR_ERR(file);
>> +        goto fail;
>> +    }
>> +
>> +    ret = file->f_op->poll(file, &irqfd->pt);
>> +    /* do we need to look for errors in ret? */
>>   
>
> Do we?

Probably.  Will fix in v3.

>
>> +
>> +    irqfd->file = file;
>> +
>> +    mutex_lock(&kvm->lock);
>> +    if (kvm->irqfd.src == -1) {
>> +        ret = kvm_request_irq_source_id(kvm);
>> +        BUG_ON(ret < 0);
>>   
>
> I think you can reuse the userspace irq source (since it's just
> another way for userspace to inject an interrupt).  It isn't really
> needed since the irq source stuff is only needed to support level
> triggered interrupts.
>
Ack, will do.

Thanks Avi,
-Greg




Download attachment "signature.asc" of type "application/pgp-signature" (267 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ