From: Greg Kurz <gkurz@linux.vnet.ibm.com>
To: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Jason Wang <jasowang@redhat.com>,
Nikunj A Dadhania <nikunj@linux.vnet.ibm.com>,
qemu-devel@nongnu.org, Anthony Liguori <aliguori@amazon.com>
Subject: Re: [Qemu-devel] [PATCH] virtio-pci: fix migration for pci bus master
Date: Mon, 13 Oct 2014 18:07:44 +0200 [thread overview]
Message-ID: <20141013180744.067bea1d@bahia.local> (raw)
In-Reply-To: <20141013110954.GA2377@redhat.com>
On Mon, 13 Oct 2014 14:09:54 +0300
"Michael S. Tsirkin" <mst@redhat.com> wrote:
> On Mon, Oct 13, 2014 at 10:49:41AM +0200, Greg Kurz wrote:
> > On Mon, 6 Oct 2014 20:25:04 +0300
> > "Michael S. Tsirkin" <mst@redhat.com> wrote:
> > > [...]
> > >
> > > BTW I reverted that patch, and to fix migration, I'm thinking
> > > about applying the following patch on top of master.
> > >
> >
> > Michael,
> >
> > I could force the migration issue with a rhel65 guest thanks to the
> > following patch, applied to hw/virtio/virtio-pci.c in QEMU v2.1.
> >
> > @@ -271,6 +272,16 @@ static void virtio_ioport_write(void *opaque, uint32_t addr, uint32_t val)
> > VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus);
> > hwaddr pa;
> >
> > + if ((vdev->status == (VIRTIO_CONFIG_S_ACKNOWLEDGE | VIRTIO_CONFIG_S_DRIVER))
> > + && (!(proxy->pci_dev.config[PCI_COMMAND] & PCI_COMMAND_MASTER))
> > + && getenv("MIG_BUG"))
> > + {
> > + fprintf(stderr, "\n\n\n\tMIGRATE !\n\n\n");
> > + qmp_migrate(getenv("MIG_BUG"), false, false, false, false, false,
> > + false, NULL);
> > + unsetenv("MIG_BUG");
> > + }
> > +
> > switch (addr) {
> > case VIRTIO_PCI_GUEST_FEATURES:
> > /* Guest does not negotiate properly? We have to assume nothing. */
> >
> >
> > Indeed, the destination QEMU master hangs because bus master isn't set.
> >
> > > Would appreciate testing cross-version migration (2.1 to master)
> > > with this patch applied.
> > >
> >
> > I had first to to enable the property for pseries of course. I could then
> > migrate QEMU v2.1 to QEMU master and back to QEMU v2.1, in the window
> > where we have DRIVER enabled and MASTER disabled, without experiencing
> > the hang.
> >
> > Your fix works as expected (just a remark below).
> >
> > >
> > >
> > > diff --git a/hw/virtio/virtio-pci.h b/hw/virtio/virtio-pci.h
> > > index 1cea157..8873b6d 100644
> > > --- a/hw/virtio/virtio-pci.h
> > > +++ b/hw/virtio/virtio-pci.h
> > > @@ -53,6 +53,11 @@ typedef struct VirtioBusClass VirtioPCIBusClass;
> > > #define VIRTIO_PCI_BUS_CLASS(klass) \
> > > OBJECT_CLASS_CHECK(VirtioPCIBusClass, klass, TYPE_VIRTIO_PCI_BUS)
> > >
> > > +/* Need to activate work-arounds for buggy guests at vmstate load. */
> > > +#define VIRTIO_PCI_FLAG_BUS_MASTER_BUG_MIGRATION_BIT 0
> > > +#define VIRTIO_PCI_FLAG_BUS_MASTER_BUG_MIGRATION \
> > > + (1 << VIRTIO_PCI_FLAG_BUS_MASTER_BUG_MIGRATION_BIT)
> > > +
> > > /* Performance improves when virtqueue kick processing is decoupled from the
> > > * vcpu thread using ioeventfd for some devices. */
> > > #define VIRTIO_PCI_FLAG_USE_IOEVENTFD_BIT 1
> > > diff --git a/include/hw/i386/pc.h b/include/hw/i386/pc.h
> > > index bae023a..e07b6c4 100644
> > > --- a/include/hw/i386/pc.h
> > > +++ b/include/hw/i386/pc.h
> > > @@ -312,6 +312,11 @@ bool e820_get_entry(int, uint32_t, uint64_t *, uint64_t *);
> > > .driver = "intel-hda",\
> > > .property = "old_msi_addr",\
> > > .value = "on",\
> > > + },\
> > > + {\
> > > + .driver = "virtio-pci",\
> > > + .property = "virtio-pci-bus-master-bug-migration",\
> > > + .value = "on",\
> > > }
> > >
> > > #define PC_COMPAT_2_0 \
> >
> > FWIW, the issue does not occur with intel targets, at least not
> > in my test case (booting rhel6 on a virtio-blk disk).
>
> This will reproduce with rhel5 though.
>
> > I see bus
> > master is set early (bios ?) and never unset...
>
> IIUC if you don't boot from device, it won't be set,
> and will not be set with older guests.
>
Not sure to follow... you mean that if I boot from memory ? Like,
passing -kernel and friends to QEMU ?
> > If you decide to apply for intel anyway, shouldn't the enablement be
> > in a separate patch ?
> >
> > Will you resend or would you like me to do it, along with the pseries
> > enablement part ? In this case, I would need your SoB for the present
> > patch.
> >
> > Thanks.
> >
> > --
> > Greg
> >
> > > diff --git a/hw/virtio/virtio-pci.c b/hw/virtio/virtio-pci.c
> > > index a827cd4..a499a3c 100644
> > > --- a/hw/virtio/virtio-pci.c
> > > +++ b/hw/virtio/virtio-pci.c
> > > @@ -86,9 +86,6 @@
> > > * 12 is historical, and due to x86 page size. */
> > > #define VIRTIO_PCI_QUEUE_ADDR_SHIFT 12
> > >
> > > -/* Flags track per-device state like workarounds for quirks in older guests. */
> > > -#define VIRTIO_PCI_FLAG_BUS_MASTER_BUG (1 << 0)
> > > -
> > > static void virtio_pci_bus_new(VirtioBusState *bus, size_t bus_size,
> > > VirtIOPCIProxy *dev);
> > >
> > > @@ -323,14 +320,6 @@ static void virtio_ioport_write(void *opaque, uint32_t addr, uint32_t val)
> > > proxy->pci_dev.config[PCI_COMMAND] |
> > > PCI_COMMAND_MASTER, 1);
> > > }
> > > -
> > > - /* Linux before 2.6.34 sets the device as OK without enabling
> > > - the PCI device bus master bit. In this case we need to disable
> > > - some safety checks. */
> > > - if ((val & VIRTIO_CONFIG_S_DRIVER_OK) &&
> > > - !(proxy->pci_dev.config[PCI_COMMAND] & PCI_COMMAND_MASTER)) {
> > > - proxy->flags |= VIRTIO_PCI_FLAG_BUS_MASTER_BUG;
> > > - }
> > > break;
> > > case VIRTIO_MSI_CONFIG_VECTOR:
> > > msix_vector_unuse(&proxy->pci_dev, vdev->config_vector);
> > > @@ -483,8 +472,7 @@ static void virtio_write_config(PCIDevice *pci_dev, uint32_t address,
> > > pci_default_write_config(pci_dev, address, val, len);
> > >
> > > if (range_covers_byte(address, len, PCI_COMMAND) &&
> > > - !(pci_dev->config[PCI_COMMAND] & PCI_COMMAND_MASTER) &&
> > > - !(proxy->flags & VIRTIO_PCI_FLAG_BUS_MASTER_BUG)) {
> > > + !(pci_dev->config[PCI_COMMAND] & PCI_COMMAND_MASTER)) {
> > > virtio_pci_stop_ioeventfd(proxy);
> > > virtio_set_status(vdev, vdev->status & ~VIRTIO_CONFIG_S_DRIVER_OK);
> > > }
> > > @@ -895,11 +883,15 @@ static void virtio_pci_vmstate_change(DeviceState *d, bool running)
> > > VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus);
> > >
> > > if (running) {
> > > - /* Try to find out if the guest has bus master disabled, but is
> > > - in ready state. Then we have a buggy guest OS. */
> > > - if ((vdev->status & VIRTIO_CONFIG_S_DRIVER_OK) &&
> > > + /* Old QEMU versions did not set bus master enable on status write.
> > > + * Detect DRIVER set and enable it.
> > > + */
> > > + if ((proxy->flags & VIRTIO_PCI_FLAG_BUS_MASTER_BUG_MIGRATION) &&
> > > + (vdev->status & VIRTIO_CONFIG_S_DRIVER) &&
> > > !(proxy->pci_dev.config[PCI_COMMAND] & PCI_COMMAND_MASTER)) {
> > > - proxy->flags |= VIRTIO_PCI_FLAG_BUS_MASTER_BUG;
> > > + pci_default_write_config(&proxy->pci_dev, PCI_COMMAND,
> > > + proxy->pci_dev.config[PCI_COMMAND] |
> > > + PCI_COMMAND_MASTER, 1);
> > > }
> > > virtio_pci_start_ioeventfd(proxy);
> > > } else {
> > > @@ -1040,10 +1032,11 @@ static void virtio_pci_reset(DeviceState *qdev)
> > > virtio_pci_stop_ioeventfd(proxy);
> > > virtio_bus_reset(bus);
> > > msix_unuse_all_vectors(&proxy->pci_dev);
> > > - proxy->flags &= ~VIRTIO_PCI_FLAG_BUS_MASTER_BUG;
> > > }
> > >
> > > static Property virtio_pci_properties[] = {
> > > + DEFINE_PROP_BIT("virtio-pci-bus-master-bug-migration", VirtIOPCIProxy, flags,
> > > + VIRTIO_PCI_FLAG_BUS_MASTER_BUG_MIGRATION_BIT, false),
> > > DEFINE_VIRTIO_COMMON_FEATURES(VirtIOPCIProxy, host_features),
> > > DEFINE_PROP_END_OF_LIST(),
> > > };
> > >
>
prev parent reply other threads:[~2014-10-13 16:08 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-09-14 18:30 [Qemu-devel] [PATCH] virtio-pci: fix migration for pci bus master Michael S. Tsirkin
2014-09-17 17:21 ` Greg Kurz
2014-09-17 17:39 ` Michael S. Tsirkin
2014-10-06 14:51 ` Greg Kurz
2014-10-06 16:26 ` Michael S. Tsirkin
2014-10-06 16:46 ` Greg Kurz
2014-10-06 17:25 ` Michael S. Tsirkin
2014-10-13 8:49 ` Greg Kurz
2014-10-13 9:01 ` Michael S. Tsirkin
2014-10-13 10:42 ` Greg Kurz
2014-10-13 12:29 ` Alexander Graf
2014-10-13 12:40 ` Michael S. Tsirkin
2014-10-13 11:09 ` Michael S. Tsirkin
2014-10-13 16:07 ` Greg Kurz [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20141013180744.067bea1d@bahia.local \
--to=gkurz@linux.vnet.ibm.com \
--cc=aliguori@amazon.com \
--cc=jasowang@redhat.com \
--cc=mst@redhat.com \
--cc=nikunj@linux.vnet.ibm.com \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).