Re: [Qemu-devel] KVM: Windows 64-bit troubles with user space irqchip

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2011-02-02 17:29, Gleb Natapov wrote:
> On Wed, Feb 02, 2011 at 04:52:11PM +0100, Jan Kiszka wrote:
>> On 2011-02-02 16:46, Gleb Natapov wrote:
>>> On Wed, Feb 02, 2011 at 04:35:25PM +0100, Jan Kiszka wrote:
>>>> On 2011-02-02 16:09, Avi Kivity wrote:
>>>>> On 02/02/2011 04:52 PM, Jan Kiszka wrote:
>>>>>> On 2011-02-02 15:43, Jan Kiszka wrote:
>>>>>>>  On 2011-02-02 15:35, Avi Kivity wrote:
>>>>>>>>  On 02/02/2011 04:30 PM, Jan Kiszka wrote:
>>>>>>>>>  On 2011-02-02 14:05, Avi Kivity wrote:
>>>>>>>>>>   On 02/02/2011 02:50 PM, Jan Kiszka wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>    Opps, -smp 1. With -smp 2 it boot almost completely and then hangs.
>>>>>>>>>>>
>>>>>>>>>>>   Ah, good (or not good). With Windows 2003 Server, I actually get a Blue
>>>>>>>>>>>   Screen (Stop 0x000000b8).
>>>>>>>>>>
>>>>>>>>>>   Userspace APIC is broken since it may run with an outdated cr8, does
>>>>>>>>>>   reverting 27a4f7976d5 help?
>>>>>>>>>
>>>>>>>>>  Can you elaborate on what is broken? The way hw/apic.c maintains the
>>>>>>>>>  tpr? Would it make sense to compare this against the in-kernel model? Or
>>>>>>>>>  do you mean something else?
>>>>>>>>
>>>>>>>>  The problem, IIRC, was that we look up the TPR but it may already have
>>>>>>>>  been changed by the running vcpu.  Not 100% sure.
>>>>>>>>
>>>>>>>>  If that is indeed the problem then the fix would be to process the APIC
>>>>>>>>  in vcpu context (which is what the kernel does - we set a bit in the IRR
>>>>>>>>  and all further processing is synchronous).
>>>>>>>
>>>>>>>  You mean: user space changes the tpr value while the vcpu is in KVM_RUN,
>>>>>>>  then we return from the kernel and overwrite the tpr in the apic with
>>>>>>>  the vcpu's view, right?
>>>>>>
>>>>>> Hmm, probably rather that there is a discrepancy between tpr and irr.
>>>>>> The latter is changed asynchronously /wrt to the vcpu, the former /wrt
>>>>>> the user space device model.
>>>>>
>>>>> And yet, both are synchronized via qemu_mutex.  So we're still missing 
>>>>> something in this picture.
>>>>>
>>>>>> Run apic_set_irq on the vcpu?
>>>>>
>>>>> static void apic_set_irq(APICState *s, int vector_num, int trigger_mode)
>>>>> {
>>>>>      apic_irq_delivered += !get_bit(s->irr, vector_num);
>>>>>
>>>>>      trace_apic_set_irq(apic_irq_delivered);
>>>>>
>>>>>      set_bit(s->irr, vector_num);
>>>>>
>>>>> This is even more async with kernel irqchip
>>>>>
>>>>>      if (trigger_mode)
>>>>>          set_bit(s->tmr, vector_num);
>>>>>      else
>>>>>          reset_bit(s->tmr, vector_num);
>>>>>
>>>>> This is protected by qemu_mutex
>>>>>
>>>>>      apic_update_irq(s);
>>>>>
>>>>> This will be run the next time the vcpu exits, via apic_get_interrupt().
>>>>
>>>> The decision to pend an IRQ (and potentially kick the vcpu) takes place
>>>> immediately in acip_update_irq. And it is based on current irr as well
>>>> as tpr. But we update again when user space returns with a new value.
>>>>
>>>>>
>>>>> }
>>>>>
>>>>> Did you check whether reverting that commit helps?
>>>>>
>>>>
>>>> Just did so, and I can no longer reproduce the problem. Hmm...
>>>>
>>> If there is no problem in the logic of this commit (and I do not see
>>> one yet) then we somewhere miss kicking vcpu when interrupt, that should be
>>> handled, arrives?
>>
>> I'm not yet confident about the logic of the kernel patch: mov to cr8 is
>> serializing. If the guest raises the tpr and then signals this with a
>> succeeding, non vm-exiting instruction to the other vcpus, one of those
>> could inject an interrupt with a higher priority than the previous tpr,
>> but a lower one than current tpr. QEMU user space would accept this
>> interrupt - and would likely surprise the guest. Do I miss something?
>>
> Injection happens by vcpu thread on cpu entry:
> run->request_interrupt_window = kvm_arch_try_push_interrupts(env);
> and tpr is synced on vcpu exit, so I do not yet see how what you describe
> above may happen since during injection vcpu should see correct tpr.

Hmm, maybe this is the key: Once we call into apic_get_interrupt
(because CPU_INTERRUPT_HARD was set as described above) and we find a
pending irq below the tpr, we inject a spurious vector instead.

Jan

-- 
Siemens AG, Corporate Technology, CT T DE IT 1
Corporate Competence Center Embedded Linux
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux