* [Qemu-devel] [PATCH-RFC 0/3] qemu: memory barriers in virtio
@ 2009-12-08 16:18 Michael S. Tsirkin
2009-12-22 11:26 ` [Qemu-devel] " Michael S. Tsirkin
[not found] ` <200912231704.19449.rusty@rustcorp.com.au>
0 siblings, 2 replies; 8+ messages in thread
From: Michael S. Tsirkin @ 2009-12-08 16:18 UTC (permalink / raw)
To: qemu-devel, Anthony Liguori, Paul Brook
The following fixes a class of long-standing bugs in qemu:
when kvm is enabled, guest might access device structures
in memory while they are updated by qemu on another CPU.
In this scenario, memory barriers are necessary to prevent
host CPU from reordering memory accesses, which might confuse
the guest.
This patch only fixes virtio, but other emulated devices
might have a similar bug. They'll need to be discovered
and addressed case by case.
This is still under test ... meanwhile: any early feedback/flames?
--
MST
Michael S. Tsirkin (3):
qemu: add barriers.h header
virtio: use a real wmb
virtio: add missing barriers
hw/barriers.h | 131 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++
hw/virtio.c | 18 ++++----
2 files changed, 139 insertions(+), 10 deletions(-)
create mode 100644 hw/barriers.h
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Qemu-devel] Re: [PATCH-RFC 0/3] qemu: memory barriers in virtio
2009-12-08 16:18 [Qemu-devel] [PATCH-RFC 0/3] qemu: memory barriers in virtio Michael S. Tsirkin
@ 2009-12-22 11:26 ` Michael S. Tsirkin
2009-12-22 14:51 ` Anthony Liguori
[not found] ` <200912231704.19449.rusty@rustcorp.com.au>
1 sibling, 1 reply; 8+ messages in thread
From: Michael S. Tsirkin @ 2009-12-22 11:26 UTC (permalink / raw)
To: qemu-devel, Anthony Liguori, Paul Brook
On Tue, Dec 08, 2009 at 06:18:18PM +0200, Michael S. Tsirkin wrote:
> The following fixes a class of long-standing bugs in qemu:
> when kvm is enabled, guest might access device structures
> in memory while they are updated by qemu on another CPU.
> In this scenario, memory barriers are necessary to prevent
> host CPU from reordering memory accesses, which might confuse
> the guest.
>
> This patch only fixes virtio, but other emulated devices
> might have a similar bug. They'll need to be discovered
> and addressed case by case.
>
> This is still under test ... meanwhile: any early feedback/flames?
>
Any comments on this one?
The patch works fine in my testing, and even though
it did not fix a crash that I hoped it will fix,
it seems required for correctness... Right?
> Michael S. Tsirkin (3):
> qemu: add barriers.h header
> virtio: use a real wmb
> virtio: add missing barriers
>
> hw/barriers.h | 131 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++
> hw/virtio.c | 18 ++++----
> 2 files changed, 139 insertions(+), 10 deletions(-)
> create mode 100644 hw/barriers.h
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Qemu-devel] Re: [PATCH-RFC 0/3] qemu: memory barriers in virtio
2009-12-22 11:26 ` [Qemu-devel] " Michael S. Tsirkin
@ 2009-12-22 14:51 ` Anthony Liguori
2009-12-22 16:25 ` Paul Brook
0 siblings, 1 reply; 8+ messages in thread
From: Anthony Liguori @ 2009-12-22 14:51 UTC (permalink / raw)
To: Michael S. Tsirkin; +Cc: Rusty Russell, qemu-devel, Paul Brook
On 12/22/2009 05:26 AM, Michael S. Tsirkin wrote:
> On Tue, Dec 08, 2009 at 06:18:18PM +0200, Michael S. Tsirkin wrote:
>
>> The following fixes a class of long-standing bugs in qemu:
>> when kvm is enabled, guest might access device structures
>> in memory while they are updated by qemu on another CPU.
>> In this scenario, memory barriers are necessary to prevent
>> host CPU from reordering memory accesses, which might confuse
>> the guest.
>>
>> This patch only fixes virtio, but other emulated devices
>> might have a similar bug. They'll need to be discovered
>> and addressed case by case.
>>
>> This is still under test ... meanwhile: any early feedback/flames?
>>
>>
> Any comments on this one?
> The patch works fine in my testing, and even though
> it did not fix a crash that I hoped it will fix,
> it seems required for correctness... Right?
>
It's definitely better than what we have. Rusty mentioned something to
me a bit ago about the barriers for virtio in the kernel needing some
work. I've been meaning to ask him about it in the context of this patch.
Rusty, am I remembering correctly or have I been sipping too much
eggnog? :-)
Regards,
Anthony Liguori
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Qemu-devel] Re: [PATCH-RFC 0/3] qemu: memory barriers in virtio
2009-12-22 14:51 ` Anthony Liguori
@ 2009-12-22 16:25 ` Paul Brook
2009-12-22 16:34 ` Michael S. Tsirkin
2009-12-22 17:28 ` Avi Kivity
0 siblings, 2 replies; 8+ messages in thread
From: Paul Brook @ 2009-12-22 16:25 UTC (permalink / raw)
To: Anthony Liguori; +Cc: Rusty Russell, qemu-devel, Michael S. Tsirkin
On Tuesday 22 December 2009, Anthony Liguori wrote:
> On 12/22/2009 05:26 AM, Michael S. Tsirkin wrote:
> > On Tue, Dec 08, 2009 at 06:18:18PM +0200, Michael S. Tsirkin wrote:
> >> The following fixes a class of long-standing bugs in qemu:
> >> when kvm is enabled, guest might access device structures
> >> in memory while they are updated by qemu on another CPU.
> >> In this scenario, memory barriers are necessary to prevent
> >> host CPU from reordering memory accesses, which might confuse
> >> the guest.
> >>
> >> This patch only fixes virtio, but other emulated devices
> >> might have a similar bug. They'll need to be discovered
> >> and addressed case by case.
Real devices generally aren't cache coherent, so I'd expect problems to be
rare. I guess theoretically you may need barriers around the MMIO/IO port
handlers, though in practice the KVM context switch probably provides this
anyway.
> >> This is still under test ... meanwhile: any early feedback/flames?
> >
> > Any comments on this one?
> > The patch works fine in my testing, and even though
> > it did not fix a crash that I hoped it will fix,
> > it seems required for correctness... Right?
>
> It's definitely better than what we have. Rusty mentioned something to
> me a bit ago about the barriers for virtio in the kernel needing some
> work. I've been meaning to ask him about it in the context of this patch.
Given this is supposed to be portable code, I wonder if we should have atomic
ordered memory accessors instead.
Paul
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Qemu-devel] Re: [PATCH-RFC 0/3] qemu: memory barriers in virtio
2009-12-22 16:25 ` Paul Brook
@ 2009-12-22 16:34 ` Michael S. Tsirkin
2009-12-22 22:58 ` Paul Brook
2009-12-22 17:28 ` Avi Kivity
1 sibling, 1 reply; 8+ messages in thread
From: Michael S. Tsirkin @ 2009-12-22 16:34 UTC (permalink / raw)
To: Paul Brook; +Cc: Rusty Russell, qemu-devel
On Tue, Dec 22, 2009 at 04:25:32PM +0000, Paul Brook wrote:
> On Tuesday 22 December 2009, Anthony Liguori wrote:
> > On 12/22/2009 05:26 AM, Michael S. Tsirkin wrote:
> > > On Tue, Dec 08, 2009 at 06:18:18PM +0200, Michael S. Tsirkin wrote:
> > >> The following fixes a class of long-standing bugs in qemu:
> > >> when kvm is enabled, guest might access device structures
> > >> in memory while they are updated by qemu on another CPU.
> > >> In this scenario, memory barriers are necessary to prevent
> > >> host CPU from reordering memory accesses, which might confuse
> > >> the guest.
> > >>
> > >> This patch only fixes virtio, but other emulated devices
> > >> might have a similar bug. They'll need to be discovered
> > >> and addressed case by case.
>
> Real devices generally aren't cache coherent, so I'd expect problems to be
> rare. I guess theoretically you may need barriers around the MMIO/IO port
> handlers, though in practice the KVM context switch probably provides this
> anyway.
>
> > >> This is still under test ... meanwhile: any early feedback/flames?
> > >
> > > Any comments on this one?
> > > The patch works fine in my testing, and even though
> > > it did not fix a crash that I hoped it will fix,
> > > it seems required for correctness... Right?
> >
> > It's definitely better than what we have. Rusty mentioned something to
> > me a bit ago about the barriers for virtio in the kernel needing some
> > work. I've been meaning to ask him about it in the context of this patch.
>
> Given this is supposed to be portable code, I wonder if we should have atomic
> ordered memory accessors instead.
>
> Paul
Could you clarify please?
The infiniband bits I used as base are very portable,
I know they build on a ton of platforms. I just stripped
a couple of infiniband specific assumptions from there.
Do you suggest we use __sync_synchronize?
Unfortunately this is broken or slow on many platforms.
I do use it when it seems safe or when we see a platform
we don't know about.
--
MST
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Qemu-devel] Re: [PATCH-RFC 0/3] qemu: memory barriers in virtio
2009-12-22 16:34 ` Michael S. Tsirkin
@ 2009-12-22 22:58 ` Paul Brook
0 siblings, 0 replies; 8+ messages in thread
From: Paul Brook @ 2009-12-22 22:58 UTC (permalink / raw)
To: Michael S. Tsirkin; +Cc: Rusty Russell, qemu-devel
> > Given this is supposed to be portable code, I wonder if we should have
> > atomic ordered memory accessors instead.
> >
> > Paul
>
> Could you clarify please?
>
> The infiniband bits I used as base are very portable,
> I know they build on a ton of platforms. I just stripped
> a couple of infiniband specific assumptions from there.
>
> Do you suggest we use __sync_synchronize?
> Unfortunately this is broken or slow on many platforms.
> I do use it when it seems safe or when we see a platform
> we don't know about.
I mean have a single function that does both the atomic load/store and the
memory barrier. Instead of:
stw_phys(addr, val)
barrier();
We do:
stw_phys_barrier(addr, val).
This avoids issues in the future (multithreaded TCG) where atomic memory
accesses may be nontrivial.
Paul
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Qemu-devel] Re: [PATCH-RFC 0/3] qemu: memory barriers in virtio
2009-12-22 16:25 ` Paul Brook
2009-12-22 16:34 ` Michael S. Tsirkin
@ 2009-12-22 17:28 ` Avi Kivity
1 sibling, 0 replies; 8+ messages in thread
From: Avi Kivity @ 2009-12-22 17:28 UTC (permalink / raw)
To: Paul Brook; +Cc: Rusty Russell, qemu-devel, Michael S. Tsirkin
On 12/22/2009 06:25 PM, Paul Brook wrote:
> On Tuesday 22 December 2009, Anthony Liguori wrote:
>
>> On 12/22/2009 05:26 AM, Michael S. Tsirkin wrote:
>>
>>> On Tue, Dec 08, 2009 at 06:18:18PM +0200, Michael S. Tsirkin wrote:
>>>
>>>> The following fixes a class of long-standing bugs in qemu:
>>>> when kvm is enabled, guest might access device structures
>>>> in memory while they are updated by qemu on another CPU.
>>>> In this scenario, memory barriers are necessary to prevent
>>>> host CPU from reordering memory accesses, which might confuse
>>>> the guest.
>>>>
>>>> This patch only fixes virtio, but other emulated devices
>>>> might have a similar bug. They'll need to be discovered
>>>> and addressed case by case.
>>>>
> Real devices generally aren't cache coherent, so I'd expect problems to be
> rare. I guess theoretically you may need barriers around the MMIO/IO port
> handlers, though in practice the KVM context switch probably provides this
> anyway.
>
We're not guaranteed to have a context switch. One thread can update
the ring while another consumes it.
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 8+ messages in thread
[parent not found: <200912231704.19449.rusty@rustcorp.com.au>]
end of thread, other threads:[~2010-01-04 2:24 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-12-08 16:18 [Qemu-devel] [PATCH-RFC 0/3] qemu: memory barriers in virtio Michael S. Tsirkin
2009-12-22 11:26 ` [Qemu-devel] " Michael S. Tsirkin
2009-12-22 14:51 ` Anthony Liguori
2009-12-22 16:25 ` Paul Brook
2009-12-22 16:34 ` Michael S. Tsirkin
2009-12-22 22:58 ` Paul Brook
2009-12-22 17:28 ` Avi Kivity
[not found] ` <200912231704.19449.rusty@rustcorp.com.au>
[not found] ` <20091223163600.GD6588@redhat.com>
2010-01-04 2:07 ` Rusty Russell
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).