Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3568851ybz; Mon, 4 May 2020 05:39:42 -0700 (PDT) X-Google-Smtp-Source: APiQypItz3qOjdP1YtxXtx56niijlDSmHsNFxYlvhBO0xTZh52AhNCc6sfVs1Rzrd87V6cb/4pdF X-Received: by 2002:a17:906:1490:: with SMTP id x16mr13829052ejc.323.1588595982619; Mon, 04 May 2020 05:39:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588595982; cv=none; d=google.com; s=arc-20160816; b=HFMojLkUM6P4i1YR1N9E+bF955wdL/G744IiSprskRFesxkyTJb/BSLTzojDFwO4/s 8q9J1HF9YI2BIH3gvX2FBqPiG7MFEmRLJ5W20cEqp+qmdmhM/qbEESqYPi/Nq84b0FPf YTASS9lLiFTp2R1NZcIbmL4VSADv7EhCJXL2639TWc2ekehrU1IiSsM2YJVCzHYpiYV6 cUJPZgyehnM/wrMZzfUUL22Az1yE6MK4isqu0pEz5txq5Q2U4IlIYzzwrkTkB105/orz F+YgoUEubQHSXywS35pbUig+yAYE7E+PaR4hrE1cEAybLJMB+65HYJirQjD0b+gTwRvI 3N+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=IhMZKmodcmk+06K3VXjP9XK4LVnh0x6xj+7mnQK9NDg=; b=DQ62J3o1uSVvaFvkGwwPyX15E8TgXhH8aH5fI2qJjiJ+2fqbGflgaAye94/2NHBaLd zY3LaDjV74PVEjWWh2RD2KP9EGdgKilkjo+Umml2ZwU/iwYRHyKKOAQ3WR+rG1lAU5WG 02UqV7UzqtgBNeq/W0S0vq5n/8y0wUnBgjzwW39Md1hvQ3xefD4zrVBhxAXG0FZNkP7C /MkLBKk5/qli949x3dd5A8R9oBcb1s/kqifv0mbXrzwQ6FUETHc2EEYpuu1fMmdDMyTN jrBPvT2rqvQrYGIBWxpz+Vtjs6VCbZ5JkB3ccbH9Agun2w+7/iBvvUCDs1P/DjyLcfut c+SQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BAmO1aZs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ov7si6774269ejb.489.2020.05.04.05.39.20; Mon, 04 May 2020 05:39:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BAmO1aZs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728249AbgEDJZi (ORCPT + 99 others); Mon, 4 May 2020 05:25:38 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:26927 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726467AbgEDJZh (ORCPT ); Mon, 4 May 2020 05:25:37 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1588584335; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=IhMZKmodcmk+06K3VXjP9XK4LVnh0x6xj+7mnQK9NDg=; b=BAmO1aZsIph+L4mx5ymHp5QtrryaulRNeWXCeDBiZee/YyT3HNMn/tQG1XyhPgeWnd30Rs CQ1tBdGSI0QTrSMeV4iKu0S1cPX3TSChrPYeS/GC8+Jk68S/eID3ikSEOmIo42v+KgJOJg tT2rAlkKRf9we6wIS58OS2GZyOIwLF8= Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-191-fyJYbqcvMJ2RFwtDUg7E1g-1; Mon, 04 May 2020 05:25:34 -0400 X-MC-Unique: fyJYbqcvMJ2RFwtDUg7E1g-1 Received: by mail-wm1-f70.google.com with SMTP id d134so7096066wmd.0 for ; Mon, 04 May 2020 02:25:34 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=IhMZKmodcmk+06K3VXjP9XK4LVnh0x6xj+7mnQK9NDg=; b=A404+gv+Yu39wi7A6Cm0YyAVTBppWH/VOBBqxDKHdSa88bqAGsXaTIwo4NEWfdjTTa 5+Mpaiom+GfjCutQba0A27o5lTqxFnw8ReAcMd2Gtm8Vw3qikm4znPhkR5TzozRDAcji BSVWatH+U20fSzyPvKeOW99koSnUr6PxUf5o+0vO8wZTgB1VPtie7BX+62g4dfk0/oe7 jpKKHP+F3E6nCdFK7SObi+8Xcu7zF4wj+F4D/OKDXM3bTHlNA9ciNw5rJc7/bHFSz9qE JYGuM8kAfX8Ctl9svLO0NpfQT65m3k15zc26cF4mX/VJ+M6hUfZEvCY4Sx+iiZCi/UhI QEeA== X-Gm-Message-State: AGi0PuYsLA8hQLIGHEEbQW5vaYAI915YRuoQp6uuXbPfwPGyJxWfe4aH WLG92t5OR7l133tnJvK6orRZZfCAGZrBxxWy+p0BKKug5OQXCmuTGBL7fBsSl4nQlNNDfQdLKz+ xPgCYUEaJXua6BM44FnqRksd9 X-Received: by 2002:a1c:678a:: with SMTP id b132mr13997279wmc.107.1588584333114; Mon, 04 May 2020 02:25:33 -0700 (PDT) X-Received: by 2002:a1c:678a:: with SMTP id b132mr13997258wmc.107.1588584332889; Mon, 04 May 2020 02:25:32 -0700 (PDT) Received: from [192.168.178.58] ([151.20.132.175]) by smtp.gmail.com with ESMTPSA id a8sm5031002wrg.85.2020.05.04.02.25.32 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 04 May 2020 02:25:32 -0700 (PDT) Subject: Re: AVIC related warning in enable_irq_window To: Maxim Levitsky , Suravee Suthikulpanit , kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org References: <9ce7bb5c4fb8bcc4ac21103f7534a6edfcbe195d.camel@redhat.com> <758b27a8-74c0-087d-d90b-d95faee2f561@redhat.com> <159382e7fdf0f9b50d79e29554842289e92e1ed7.camel@redhat.com> From: Paolo Bonzini Message-ID: Date: Mon, 4 May 2020 11:25:31 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <159382e7fdf0f9b50d79e29554842289e92e1ed7.camel@redhat.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/05/20 11:13, Maxim Levitsky wrote: > On Mon, 2020-05-04 at 15:46 +0700, Suravee Suthikulpanit wrote: >> Paolo / Maxim, >> >> On 5/2/20 11:42 PM, Paolo Bonzini wrote: >>> On 02/05/20 15:58, Maxim Levitsky wrote: >>>> The AVIC is disabled by svm_toggle_avic_for_irq_window, which calls >>>> kvm_request_apicv_update, which broadcasts the KVM_REQ_APICV_UPDATE vcpu request, >>>> however it doesn't broadcast it to CPU on which now we are running, which seems OK, >>>> because the code that handles that broadcast runs on each VCPU entry, thus >>>> when this CPU will enter guest mode it will notice and disable the AVIC. >>>> >>>> However later in svm_enable_vintr, there is test 'WARN_ON(kvm_vcpu_apicv_active(&svm->vcpu));' >>>> which is still true on current CPU because of the above. >>> >>> Good point! We can just remove the WARN_ON I think. Can you send a patch? >> >> Instead, as an alternative to remove the WARN_ON(), would it be better to just explicitly >> calling kvm_vcpu_update_apicv(vcpu) to update the apicv_active flag right after >> kvm_request_apicv_update()? >> > This should work IMHO, other that the fact kvm_vcpu_update_apicv will be called again, > when this vcpu is entered since the KVM_REQ_APICV_UPDATE will still be pending on it. > It shoudn't be a problem, and we can even add a check to do nothing when it is called > while avic is already in target enable state. I thought about that but I think it's a bit confusing. If we want to keep the WARN_ON, Maxim can add an equivalent one to svm_vcpu_run, which is even better because the invariant is clearer. WARN_ON((vmcb->control.int_ctl & (AVIC_ENABLE_MASK | V_IRQ_MASK)) == (AVIC_ENABLE_MASK | V_IRQ_MASK)); Paolo