From mboxrd@z Thu Jan 1 00:00:00 1970 From: Radim =?utf-8?B?S3LEjW3DocWZ?= Subject: Re: [PATCH v2 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change Date: Fri, 9 Mar 2018 16:45:16 +0100 Message-ID: <20180309154516.GA21100@flask> References: <20180301141514.3482-1-vkuznets@redhat.com> <20180301141514.3482-3-vkuznets@redhat.com> <20180308210804.GN12290@flask> <87muzhe0ls.fsf@vitty.brq.redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org, Paolo Bonzini , "K. Y. Srinivasan" , "Michael Kelley (EOSG)" , Roman Kagan , "Denis V . Lunev" To: Vitaly Kuznetsov Return-path: Content-Disposition: inline In-Reply-To: <87muzhe0ls.fsf@vitty.brq.redhat.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: kvm.vger.kernel.org 2018-03-09 16:21+0100, Vitaly Kuznetsov: > Radim Krčmář writes: > > This looks like it solves the problem when we get two SINTs with the > > same vector back-to-back , but shouldn't these bits really be cleared on > > EOI (either auto or manual)? > > Hmm, > > I was trying to address the following issue: guest programs SynIC's > SINTx with some vector but later re-programs it with a different > one. Without the patch synic->vec_bitmap and synic->auto_eoi_bitmap keep > stale data. If there's no concurrent interrupt than we're safe, but what > happens if there is one... > > kvm_hv_synic_send_eoi() already goes through all SINTx but we already > updated vector so it won't find any. We could've added something like > 'old_vector' but what if the request with this vector came _after_ we > re-programed SynIC (and, so, it wasn't meant to be serviced by SynIC?)? I now read that TLFS puts the responsitiblity on guest OS when toggling auto-EOI, so let's assume that the OS is to blame for disabling/changing vectors with pending interrupts as well. Applied all, thanks.