From patchwork Mon Jan 31 18:06:38 2011 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jan Kiszka X-Patchwork-Id: 81192 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.gnu.org (lists.gnu.org [199.232.76.165]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by ozlabs.org (Postfix) with ESMTPS id AAC5CB70EA for ; Tue, 1 Feb 2011 05:07:52 +1100 (EST) Received: from localhost ([127.0.0.1]:52738 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1PjyA7-0003Rp-Or for incoming@patchwork.ozlabs.org; Mon, 31 Jan 2011 13:07:39 -0500 Received: from [140.186.70.92] (port=59600 helo=eggs.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1Pjy9E-0003RY-7q for qemu-devel@nongnu.org; Mon, 31 Jan 2011 13:06:45 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Pjy9D-0004O8-5h for qemu-devel@nongnu.org; Mon, 31 Jan 2011 13:06:44 -0500 Received: from thoth.sbs.de ([192.35.17.2]:24940) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Pjy9C-0004Nw-MC for qemu-devel@nongnu.org; Mon, 31 Jan 2011 13:06:43 -0500 Received: from mail1.siemens.de (localhost [127.0.0.1]) by thoth.sbs.de (8.12.11.20060308/8.12.11) with ESMTP id p0VI6dhM030065; Mon, 31 Jan 2011 19:06:39 +0100 Received: from mchn199C.mchp.siemens.de ([139.25.109.49]) by mail1.siemens.de (8.13.6/8.13.6) with ESMTP id p0VI6c25003415; Mon, 31 Jan 2011 19:06:38 +0100 Message-ID: <4D46FA2E.9020501@siemens.com> Date: Mon, 31 Jan 2011 19:06:38 +0100 From: Jan Kiszka User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); de; rv:1.8.1.12) Gecko/20080226 SUSE/2.0.0.12-1.1 Thunderbird/2.0.0.12 Mnenhy/0.7.5.666 MIME-Version: 1.0 To: Gleb Natapov , Avi Kivity , Marcelo Tosatti References: <8db93a26b3cbb67e309d05600811dd6a37b34433.1296133797.git.jan.kiszka@siemens.com> <4D468A24.4080800@redhat.com> <4D469ED6.9050805@siemens.com> <4D46B369.3050404@siemens.com> <4D46D7F2.3040502@siemens.com> <20110131163858.GA18827@redhat.com> <4D46E634.30109@siemens.com> <20110131165027.GB18827@redhat.com> <4D46E8BD.50301@siemens.com> <20110131165626.GC18827@redhat.com> In-Reply-To: <20110131165626.GC18827@redhat.com> X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.4-2.6 X-Received-From: 192.35.17.2 Cc: "qemu-devel@nongnu.org" , "kvm@vger.kernel.org" Subject: [Qemu-devel] [PATCH v2 17&18/22] kvm: Unconditionally reenter kernel after IO exits X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org On 2011-01-31 17:56, Gleb Natapov wrote: >>>>>>> The only thing we miss by moving process_irqchip_events is a self-INIT >>>>>>> of an AP - if such thing exists in real life. In that case, the AP would >>>>>>> cause a reset of itself, followed by a transition to HALT state. >>>>>> >>>>>> I checked again with the Intel spec, and a self-INIT is invalid (at >>>>>> least when specified via shorthand). So I'm under the impression now >>>>>> that we can safely ignore this case and leave the patch as is. >>>>>> >>>>>> Any different views? >>>>>> >>>>> IIRC if you don't use shorthand you can send INIT to self. >>>> >>>> We didn't care so far (in qemu-kvm), do you think we should? >>>> >>> Doesn't kernel lapic emulation support this? >> >> See the my other mail: It supports it, but it apparently doesn't expects >> this to happen. >> > I saw it, but I do not understand why do we print this message. May be > it was used for debugging in early stages of KVM development. > OK, lets' try to handle this in user space as well. The following patch replaces both 17 & 18 from my original series as we can no longer split things up. Jan --------8<-------- KVM requires to reenter the kernel after IO exits in order to complete instruction emulation. Failing to do so will leave the kernel state inconsistently behind. To ensure that we will get back ASAP, we issue a self-signal that will cause KVM_RUN to return once the pending operations are completed. We can move kvm_arch_process_irqchip_events out of the inner VCPU loop. The only state that mattered at its old place was a pending INIT request. Catch it in kvm_arch_pre_run and also trigger a self-signal to process the request on next kvm_cpu_exec. This patch also fixes the missing exit_request check in kvm_cpu_exec in the CONFIG_IOTHREAD case. Signed-off-by: Jan Kiszka CC: Gleb Natapov --- kvm-all.c | 31 +++++++++++++++++-------------- target-i386/kvm.c | 5 +++++ 2 files changed, 22 insertions(+), 14 deletions(-) diff --git a/kvm-all.c b/kvm-all.c index 5bfa8c0..d961697 100644 --- a/kvm-all.c +++ b/kvm-all.c @@ -199,7 +199,6 @@ int kvm_pit_in_kernel(void) return kvm_state->pit_in_kernel; } - int kvm_init_vcpu(CPUState *env) { KVMState *s = kvm_state; @@ -892,29 +891,33 @@ int kvm_cpu_exec(CPUState *env) DPRINTF("kvm_cpu_exec()\n"); - do { -#ifndef CONFIG_IOTHREAD - if (env->exit_request) { - DPRINTF("interrupt exit requested\n"); - ret = 0; - break; - } -#endif - - if (kvm_arch_process_irqchip_events(env)) { - ret = 0; - break; - } + if (kvm_arch_process_irqchip_events(env)) { + env->exit_request = 0; + env->exception_index = EXCP_HLT; + return 0; + } + do { if (env->kvm_vcpu_dirty) { kvm_arch_put_registers(env, KVM_PUT_RUNTIME_STATE); env->kvm_vcpu_dirty = 0; } kvm_arch_pre_run(env, run); + if (env->exit_request) { + DPRINTF("interrupt exit requested\n"); + /* + * KVM requires us to reenter the kernel after IO exits to complete + * instruction emulation. This self-signal will ensure that we + * leave ASAP again. + */ + qemu_cpu_kick_self(); + } cpu_single_env = NULL; qemu_mutex_unlock_iothread(); + ret = kvm_vcpu_ioctl(env, KVM_RUN, 0); + qemu_mutex_lock_iothread(); cpu_single_env = env; kvm_arch_post_run(env, run); diff --git a/target-i386/kvm.c b/target-i386/kvm.c index 9df8ff8..8a87244 100644 --- a/target-i386/kvm.c +++ b/target-i386/kvm.c @@ -1426,6 +1426,11 @@ int kvm_arch_get_registers(CPUState *env) int kvm_arch_pre_run(CPUState *env, struct kvm_run *run) { + /* Force the VCPU out of its inner loop to process the INIT request */ + if (env->interrupt_request & CPU_INTERRUPT_INIT) { + env->exit_request = 1; + } + /* Inject NMI */ if (env->interrupt_request & CPU_INTERRUPT_NMI) { env->interrupt_request &= ~CPU_INTERRUPT_NMI;