* [PATCH 1/2] qemu-kvm: msix table update thinko fix
[not found] <cover.1248273529.git.mst@redhat.com>
@ 2009-07-22 14:41 ` Michael S. Tsirkin
2009-07-22 20:18 ` Marcelo Tosatti
2009-07-22 14:41 ` [PATCH 2/2] qemu-kvm: broken MSI routing work-around Michael S. Tsirkin
1 sibling, 1 reply; 7+ messages in thread
From: Michael S. Tsirkin @ 2009-07-22 14:41 UTC (permalink / raw)
To: kvm, avi, gleb
When updating msi irq routing entries, we should memcpy the new entry
over the old one. Current code gets it wrong, and only works because
it's uncommon for guests to change MSI tables.
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
---
qemu-kvm.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 60e5eac..cebaa65 100644
--- a/qemu-kvm.c
+++ b/qemu-kvm.c
@@ -1552,7 +1552,7 @@ int kvm_update_routing_entry(kvm_context_t kvm,
if (e->u.msi.address_lo == entry->u.msi.address_lo &&
e->u.msi.address_hi == entry->u.msi.address_hi &&
e->u.msi.data == entry->u.msi.data) {
- memcpy(&e->u.msi, &entry->u.msi, sizeof e->u.msi);
+ memcpy(&e->u.msi, &newentry->u.msi, sizeof e->u.msi);
return 0;
}
break;
--
1.6.2.5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH 2/2] qemu-kvm: broken MSI routing work-around
[not found] <cover.1248273529.git.mst@redhat.com>
2009-07-22 14:41 ` [PATCH 1/2] qemu-kvm: msix table update thinko fix Michael S. Tsirkin
@ 2009-07-22 14:41 ` Michael S. Tsirkin
2009-07-23 19:59 ` Marcelo Tosatti
1 sibling, 1 reply; 7+ messages in thread
From: Michael S. Tsirkin @ 2009-07-22 14:41 UTC (permalink / raw)
To: kvm, avi, gleb
Kernels up to 2.6.31 have a bug: MSI entries where looked at when irq
is acked, address_lo was interpreted as irqchip, and
address_hi as pin. If that matches a real interrupt this prevents
ack notifier from being processed.
Since these kernels ignore the value for address_hi when delivering
MSI, work around this by setting a value that never matches an
interrupt pin number.
Pointers to relevant kernel code, for reference: in kernel v2.6.31-rc3:
kvm_notify_acked_irq - fails to check irq type,
kvm_set_msi - ignored address_hi in message
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
---
qemu-kvm.c | 32 ++++++++++++++++++++++++++++++--
1 files changed, 30 insertions(+), 2 deletions(-)
diff --git a/qemu-kvm.c b/qemu-kvm.c
index cebaa65..ec6d583 100644
--- a/qemu-kvm.c
+++ b/qemu-kvm.c
@@ -38,6 +38,32 @@
#error libkvm: userspace and kernel version mismatch
#endif
+#ifdef KVM_CAP_IRQ_ROUTING
+/* Broken MSI routing work-around:
+ * Kernels up to 2.6.31 have a bug: MSI entries where looked at when irq
+ * is acked, address_lo was interpreted as irqchip, and
+ * address_hi as pin. If that matches a real interrupt this prevents
+ * ack notifier from being processed.
+ *
+ * Since these kernels ignore the value for address_hi when delivering
+ * MSI, work around this by setting a value that never matches an
+ * interrupt pin number.
+ */
+#define KVM_BROKEN_MSI_ROUTING 1
+static inline
+void kvm_broken_msi_fix(struct kvm_irq_routing_entry *entry)
+{
+ if (entry->type == KVM_IRQ_ROUTING_MSI) {
+ entry->u.msi.address_hi = 0xffffffff;
+ }
+}
+static inline
+unsigned kvm_broken_msi_address_hi(struct kvm_irq_routing_entry *entry)
+{
+ return 0xffffffff;
+}
+#endif
+
int kvm_allowed = 1;
int kvm_irqchip = 1;
int kvm_pit = 1;
@@ -1433,6 +1459,7 @@ int kvm_add_routing_entry(kvm_context_t kvm,
new->type = entry->type;
new->flags = entry->flags;
new->u = entry->u;
+ kvm_broken_msi_fix(new);
set_gsi(kvm, entry->gsi);
@@ -1489,7 +1516,7 @@ int kvm_del_routing_entry(kvm_context_t kvm,
if (e->u.msi.address_lo ==
entry->u.msi.address_lo
&& e->u.msi.address_hi ==
- entry->u.msi.address_hi
+ kvm_broken_msi_address_hi(entry)
&& e->u.msi.data == entry->u.msi.data) {
p = &kvm->irq_routes->
entries[--kvm->irq_routes->nr];
@@ -1550,9 +1577,10 @@ int kvm_update_routing_entry(kvm_context_t kvm,
break;
case KVM_IRQ_ROUTING_MSI:
if (e->u.msi.address_lo == entry->u.msi.address_lo &&
- e->u.msi.address_hi == entry->u.msi.address_hi &&
+ e->u.msi.address_hi == kvm_broken_msi_address_hi(entry) &&
e->u.msi.data == entry->u.msi.data) {
memcpy(&e->u.msi, &newentry->u.msi, sizeof e->u.msi);
+ kvm_broken_msi_fix(e);
return 0;
}
break;
--
1.6.2.5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* Re: [PATCH 1/2] qemu-kvm: msix table update thinko fix
2009-07-22 14:41 ` [PATCH 1/2] qemu-kvm: msix table update thinko fix Michael S. Tsirkin
@ 2009-07-22 20:18 ` Marcelo Tosatti
2009-07-23 8:53 ` Michael S. Tsirkin
0 siblings, 1 reply; 7+ messages in thread
From: Marcelo Tosatti @ 2009-07-22 20:18 UTC (permalink / raw)
To: Michael S. Tsirkin; +Cc: kvm, avi, gleb
On Wed, Jul 22, 2009 at 05:41:13PM +0300, Michael S. Tsirkin wrote:
> over the old one. Current code gets it wrong, and only works because
> it's uncommon for guests to change MSI tables.
>
> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
> ---
> qemu-kvm.c | 2 +-
> 1 files changed, 1 insertions(+), 1 deletions(-)
>
> diff --git a/qemu-kvm.c b/qemu-kvm.c
> index 60e5eac..cebaa65 100644
> --- a/qemu-kvm.c
> +++ b/qemu-kvm.c
> @@ -1552,7 +1552,7 @@ int kvm_update_routing_entry(kvm_context_t kvm,
> if (e->u.msi.address_lo == entry->u.msi.address_lo &&
> e->u.msi.address_hi == entry->u.msi.address_hi &&
> e->u.msi.data == entry->u.msi.data) {
> - memcpy(&e->u.msi, &entry->u.msi, sizeof e->u.msi);
> + memcpy(&e->u.msi, &newentry->u.msi, sizeof e->u.msi);
> return 0;
> }
> break;
Non-msi case seems to suffer from the same problem?
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH 1/2] qemu-kvm: msix table update thinko fix
2009-07-22 20:18 ` Marcelo Tosatti
@ 2009-07-23 8:53 ` Michael S. Tsirkin
0 siblings, 0 replies; 7+ messages in thread
From: Michael S. Tsirkin @ 2009-07-23 8:53 UTC (permalink / raw)
To: Marcelo Tosatti; +Cc: kvm, avi, gleb
On Wed, Jul 22, 2009 at 05:18:49PM -0300, Marcelo Tosatti wrote:
>
> On Wed, Jul 22, 2009 at 05:41:13PM +0300, Michael S. Tsirkin wrote:
> > over the old one. Current code gets it wrong, and only works because
> > it's uncommon for guests to change MSI tables.
>
> Non-msi case seems to suffer from the same problem?
Correct of course. Sent out v2 which fixes non-msi as well.
Thanks!
--
MST
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH 2/2] qemu-kvm: broken MSI routing work-around
2009-07-22 14:41 ` [PATCH 2/2] qemu-kvm: broken MSI routing work-around Michael S. Tsirkin
@ 2009-07-23 19:59 ` Marcelo Tosatti
2009-07-23 20:19 ` Michael S. Tsirkin
0 siblings, 1 reply; 7+ messages in thread
From: Marcelo Tosatti @ 2009-07-23 19:59 UTC (permalink / raw)
To: Michael S. Tsirkin; +Cc: kvm, avi, gleb
On Wed, Jul 22, 2009 at 05:41:22PM +0300, Michael S. Tsirkin wrote:
> Kernels up to 2.6.31 have a bug: MSI entries where looked at when irq
> is acked, address_lo was interpreted as irqchip, and
> address_hi as pin. If that matches a real interrupt this prevents
> ack notifier from being processed.
>
> Since these kernels ignore the value for address_hi when delivering
> MSI, work around this by setting a value that never matches an
> interrupt pin number.
>
> Pointers to relevant kernel code, for reference: in kernel v2.6.31-rc3:
> kvm_notify_acked_irq - fails to check irq type,
> kvm_set_msi - ignored address_hi in message
Ugh, its still broken AFAICS? If so, what is the plan to fix it?
Also, you'd never want to use address_hi for something, in the
future?
> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
> ---
> qemu-kvm.c | 32 ++++++++++++++++++++++++++++++--
> 1 files changed, 30 insertions(+), 2 deletions(-)
>
> diff --git a/qemu-kvm.c b/qemu-kvm.c
> index cebaa65..ec6d583 100644
> --- a/qemu-kvm.c
> +++ b/qemu-kvm.c
> @@ -38,6 +38,32 @@
> #error libkvm: userspace and kernel version mismatch
> #endif
>
> +#ifdef KVM_CAP_IRQ_ROUTING
> +/* Broken MSI routing work-around:
> + * Kernels up to 2.6.31 have a bug: MSI entries where looked at when irq
> + * is acked, address_lo was interpreted as irqchip, and
> + * address_hi as pin. If that matches a real interrupt this prevents
> + * ack notifier from being processed.
> + *
> + * Since these kernels ignore the value for address_hi when delivering
> + * MSI, work around this by setting a value that never matches an
> + * interrupt pin number.
> + */
> +#define KVM_BROKEN_MSI_ROUTING 1
> +static inline
> +void kvm_broken_msi_fix(struct kvm_irq_routing_entry *entry)
> +{
> + if (entry->type == KVM_IRQ_ROUTING_MSI) {
> + entry->u.msi.address_hi = 0xffffffff;
> + }
> +}
> +static inline
> +unsigned kvm_broken_msi_address_hi(struct kvm_irq_routing_entry *entry)
> +{
> + return 0xffffffff;
> +}
> +#endif
> +
> int kvm_allowed = 1;
> int kvm_irqchip = 1;
> int kvm_pit = 1;
> @@ -1433,6 +1459,7 @@ int kvm_add_routing_entry(kvm_context_t kvm,
> new->type = entry->type;
> new->flags = entry->flags;
> new->u = entry->u;
> + kvm_broken_msi_fix(new);
>
> set_gsi(kvm, entry->gsi);
>
> @@ -1489,7 +1516,7 @@ int kvm_del_routing_entry(kvm_context_t kvm,
> if (e->u.msi.address_lo ==
> entry->u.msi.address_lo
> && e->u.msi.address_hi ==
> - entry->u.msi.address_hi
> + kvm_broken_msi_address_hi(entry)
> && e->u.msi.data == entry->u.msi.data) {
> p = &kvm->irq_routes->
> entries[--kvm->irq_routes->nr];
> @@ -1550,9 +1577,10 @@ int kvm_update_routing_entry(kvm_context_t kvm,
> break;
> case KVM_IRQ_ROUTING_MSI:
> if (e->u.msi.address_lo == entry->u.msi.address_lo &&
> - e->u.msi.address_hi == entry->u.msi.address_hi &&
> + e->u.msi.address_hi == kvm_broken_msi_address_hi(entry) &&
> e->u.msi.data == entry->u.msi.data) {
> memcpy(&e->u.msi, &newentry->u.msi, sizeof e->u.msi);
> + kvm_broken_msi_fix(e);
> return 0;
> }
> break;
> --
> 1.6.2.5
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH 2/2] qemu-kvm: broken MSI routing work-around
2009-07-23 19:59 ` Marcelo Tosatti
@ 2009-07-23 20:19 ` Michael S. Tsirkin
2009-07-24 3:58 ` Gleb Natapov
0 siblings, 1 reply; 7+ messages in thread
From: Michael S. Tsirkin @ 2009-07-23 20:19 UTC (permalink / raw)
To: Marcelo Tosatti; +Cc: kvm, avi, gleb
On Thu, Jul 23, 2009 at 04:59:38PM -0300, Marcelo Tosatti wrote:
> On Wed, Jul 22, 2009 at 05:41:22PM +0300, Michael S. Tsirkin wrote:
> > Kernels up to 2.6.31 have a bug: MSI entries where looked at when irq
> > is acked, address_lo was interpreted as irqchip, and
> > address_hi as pin. If that matches a real interrupt this prevents
> > ack notifier from being processed.
> >
> > Since these kernels ignore the value for address_hi when delivering
> > MSI, work around this by setting a value that never matches an
> > interrupt pin number.
> >
> > Pointers to relevant kernel code, for reference: in kernel v2.6.31-rc3:
> > kvm_notify_acked_irq - fails to check irq type,
> > kvm_set_msi - ignored address_hi in message
>
> Ugh, its still broken AFAICS? If so, what is the plan to fix it?
>
I'd like Avi's input on that.
One can imagine multiple ways to fix this in kernel. One possible way
proposed by Gleb recently is switching to a new send_msi ioctl.
If we do it this way, we can just keep the old interface as broken.
> Also, you'd never want to use address_hi for something, in the
> future?
AFAIK apic always has 0 in address_hi. Maybe x2apic is different, we can
deactivate the workaround in userspace if we ever enable x2apic.
> > Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
> > ---
> > qemu-kvm.c | 32 ++++++++++++++++++++++++++++++--
> > 1 files changed, 30 insertions(+), 2 deletions(-)
> >
> > diff --git a/qemu-kvm.c b/qemu-kvm.c
> > index cebaa65..ec6d583 100644
> > --- a/qemu-kvm.c
> > +++ b/qemu-kvm.c
> > @@ -38,6 +38,32 @@
> > #error libkvm: userspace and kernel version mismatch
> > #endif
> >
> > +#ifdef KVM_CAP_IRQ_ROUTING
> > +/* Broken MSI routing work-around:
> > + * Kernels up to 2.6.31 have a bug: MSI entries where looked at when irq
> > + * is acked, address_lo was interpreted as irqchip, and
> > + * address_hi as pin. If that matches a real interrupt this prevents
> > + * ack notifier from being processed.
> > + *
> > + * Since these kernels ignore the value for address_hi when delivering
> > + * MSI, work around this by setting a value that never matches an
> > + * interrupt pin number.
> > + */
> > +#define KVM_BROKEN_MSI_ROUTING 1
> > +static inline
> > +void kvm_broken_msi_fix(struct kvm_irq_routing_entry *entry)
> > +{
> > + if (entry->type == KVM_IRQ_ROUTING_MSI) {
> > + entry->u.msi.address_hi = 0xffffffff;
> > + }
> > +}
> > +static inline
> > +unsigned kvm_broken_msi_address_hi(struct kvm_irq_routing_entry *entry)
> > +{
> > + return 0xffffffff;
> > +}
> > +#endif
> > +
> > int kvm_allowed = 1;
> > int kvm_irqchip = 1;
> > int kvm_pit = 1;
> > @@ -1433,6 +1459,7 @@ int kvm_add_routing_entry(kvm_context_t kvm,
> > new->type = entry->type;
> > new->flags = entry->flags;
> > new->u = entry->u;
> > + kvm_broken_msi_fix(new);
> >
> > set_gsi(kvm, entry->gsi);
> >
> > @@ -1489,7 +1516,7 @@ int kvm_del_routing_entry(kvm_context_t kvm,
> > if (e->u.msi.address_lo ==
> > entry->u.msi.address_lo
> > && e->u.msi.address_hi ==
> > - entry->u.msi.address_hi
> > + kvm_broken_msi_address_hi(entry)
> > && e->u.msi.data == entry->u.msi.data) {
> > p = &kvm->irq_routes->
> > entries[--kvm->irq_routes->nr];
> > @@ -1550,9 +1577,10 @@ int kvm_update_routing_entry(kvm_context_t kvm,
> > break;
> > case KVM_IRQ_ROUTING_MSI:
> > if (e->u.msi.address_lo == entry->u.msi.address_lo &&
> > - e->u.msi.address_hi == entry->u.msi.address_hi &&
> > + e->u.msi.address_hi == kvm_broken_msi_address_hi(entry) &&
> > e->u.msi.data == entry->u.msi.data) {
> > memcpy(&e->u.msi, &newentry->u.msi, sizeof e->u.msi);
> > + kvm_broken_msi_fix(e);
> > return 0;
> > }
> > break;
> > --
> > 1.6.2.5
> > --
> > To unsubscribe from this list: send the line "unsubscribe kvm" in
> > the body of a message to majordomo@vger.kernel.org
> > More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH 2/2] qemu-kvm: broken MSI routing work-around
2009-07-23 20:19 ` Michael S. Tsirkin
@ 2009-07-24 3:58 ` Gleb Natapov
0 siblings, 0 replies; 7+ messages in thread
From: Gleb Natapov @ 2009-07-24 3:58 UTC (permalink / raw)
To: Michael S. Tsirkin; +Cc: Marcelo Tosatti, kvm, avi
On Thu, Jul 23, 2009 at 11:19:05PM +0300, Michael S. Tsirkin wrote:
> On Thu, Jul 23, 2009 at 04:59:38PM -0300, Marcelo Tosatti wrote:
> > On Wed, Jul 22, 2009 at 05:41:22PM +0300, Michael S. Tsirkin wrote:
> > > Kernels up to 2.6.31 have a bug: MSI entries where looked at when irq
> > > is acked, address_lo was interpreted as irqchip, and
> > > address_hi as pin. If that matches a real interrupt this prevents
> > > ack notifier from being processed.
> > >
> > > Since these kernels ignore the value for address_hi when delivering
> > > MSI, work around this by setting a value that never matches an
> > > interrupt pin number.
> > >
> > > Pointers to relevant kernel code, for reference: in kernel v2.6.31-rc3:
> > > kvm_notify_acked_irq - fails to check irq type,
> > > kvm_set_msi - ignored address_hi in message
> >
> > Ugh, its still broken AFAICS? If so, what is the plan to fix it?
> >
>
> I'd like Avi's input on that.
> One can imagine multiple ways to fix this in kernel. One possible way
> proposed by Gleb recently is switching to a new send_msi ioctl.
> If we do it this way, we can just keep the old interface as broken.
>
> > Also, you'd never want to use address_hi for something, in the
> > future?
>
> AFAIK apic always has 0 in address_hi. Maybe x2apic is different, we can
> deactivate the workaround in userspace if we ever enable x2apic.
>
x2apic doesn't use address_hi either without interrupt remapping.
> > > Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
> > > ---
> > > qemu-kvm.c | 32 ++++++++++++++++++++++++++++++--
> > > 1 files changed, 30 insertions(+), 2 deletions(-)
> > >
> > > diff --git a/qemu-kvm.c b/qemu-kvm.c
> > > index cebaa65..ec6d583 100644
> > > --- a/qemu-kvm.c
> > > +++ b/qemu-kvm.c
> > > @@ -38,6 +38,32 @@
> > > #error libkvm: userspace and kernel version mismatch
> > > #endif
> > >
> > > +#ifdef KVM_CAP_IRQ_ROUTING
> > > +/* Broken MSI routing work-around:
> > > + * Kernels up to 2.6.31 have a bug: MSI entries where looked at when irq
> > > + * is acked, address_lo was interpreted as irqchip, and
> > > + * address_hi as pin. If that matches a real interrupt this prevents
> > > + * ack notifier from being processed.
> > > + *
> > > + * Since these kernels ignore the value for address_hi when delivering
> > > + * MSI, work around this by setting a value that never matches an
> > > + * interrupt pin number.
> > > + */
> > > +#define KVM_BROKEN_MSI_ROUTING 1
> > > +static inline
> > > +void kvm_broken_msi_fix(struct kvm_irq_routing_entry *entry)
> > > +{
> > > + if (entry->type == KVM_IRQ_ROUTING_MSI) {
> > > + entry->u.msi.address_hi = 0xffffffff;
> > > + }
> > > +}
> > > +static inline
> > > +unsigned kvm_broken_msi_address_hi(struct kvm_irq_routing_entry *entry)
> > > +{
> > > + return 0xffffffff;
> > > +}
> > > +#endif
> > > +
> > > int kvm_allowed = 1;
> > > int kvm_irqchip = 1;
> > > int kvm_pit = 1;
> > > @@ -1433,6 +1459,7 @@ int kvm_add_routing_entry(kvm_context_t kvm,
> > > new->type = entry->type;
> > > new->flags = entry->flags;
> > > new->u = entry->u;
> > > + kvm_broken_msi_fix(new);
> > >
> > > set_gsi(kvm, entry->gsi);
> > >
> > > @@ -1489,7 +1516,7 @@ int kvm_del_routing_entry(kvm_context_t kvm,
> > > if (e->u.msi.address_lo ==
> > > entry->u.msi.address_lo
> > > && e->u.msi.address_hi ==
> > > - entry->u.msi.address_hi
> > > + kvm_broken_msi_address_hi(entry)
> > > && e->u.msi.data == entry->u.msi.data) {
> > > p = &kvm->irq_routes->
> > > entries[--kvm->irq_routes->nr];
> > > @@ -1550,9 +1577,10 @@ int kvm_update_routing_entry(kvm_context_t kvm,
> > > break;
> > > case KVM_IRQ_ROUTING_MSI:
> > > if (e->u.msi.address_lo == entry->u.msi.address_lo &&
> > > - e->u.msi.address_hi == entry->u.msi.address_hi &&
> > > + e->u.msi.address_hi == kvm_broken_msi_address_hi(entry) &&
> > > e->u.msi.data == entry->u.msi.data) {
> > > memcpy(&e->u.msi, &newentry->u.msi, sizeof e->u.msi);
> > > + kvm_broken_msi_fix(e);
> > > return 0;
> > > }
> > > break;
> > > --
> > > 1.6.2.5
> > > --
> > > To unsubscribe from this list: send the line "unsubscribe kvm" in
> > > the body of a message to majordomo@vger.kernel.org
> > > More majordomo info at http://vger.kernel.org/majordomo-info.html
--
Gleb.
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2009-07-24 3:58 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <cover.1248273529.git.mst@redhat.com>
2009-07-22 14:41 ` [PATCH 1/2] qemu-kvm: msix table update thinko fix Michael S. Tsirkin
2009-07-22 20:18 ` Marcelo Tosatti
2009-07-23 8:53 ` Michael S. Tsirkin
2009-07-22 14:41 ` [PATCH 2/2] qemu-kvm: broken MSI routing work-around Michael S. Tsirkin
2009-07-23 19:59 ` Marcelo Tosatti
2009-07-23 20:19 ` Michael S. Tsirkin
2009-07-24 3:58 ` Gleb Natapov
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).