On 15/03/2022 09:33, Anup Patel wrote:
On Tue, Mar 15, 2022 at 12:18 PM Alistair Francis <alistai...@gmail.com> wrote:

On Sun, Mar 13, 2022 at 12:12 PM Ralf Ramsauer
<ralf.ramsa...@oth-regensburg.de> wrote:

Hi,

I'm trying to run Linux/QEMU+KVM inside an emulated
qemu-system-riscv64 VM (x86 host). On latest&greatest QEMU (1416688c53),
I run Linux inside QEMU. On host side:

qemu-system-riscv64 -nographic \
          -machine virt \
          -cpu 'rv64,h=true' \
          -smp 8 -m 8G \
          -bios $latest_opensbi \
          -kernel $latest_upstream_linux \
         […snip…]

Inside that machine, I boot Linux with KVM enabled:

[…]
[    0.228939] kvm [1]: hypervisor extension available
[    0.229000] kvm [1]: using Sv48x4 G-stage page table format
[    0.229033] kvm [1]: VMID 14 bits available
[…]

KVM seems to load correctly. Inside that machine, I compiled QEMU from
the same sources with the KVM accelerator enabled. When I try to start
QEMU with KVM enabled, I get

./qemu-system-riscv64 -nographic \
         -monitor none \
         -machine virt \
         -smp 1 -m 1G \
         -bios ./pc-bios/opensbi-riscv64-generic-fw_dynamic.bin \
         -serial stdio \
         -enable-kvm

The QEMU RISC-V KVM support is quite new so I haven't got a chance
to play with it.

Btw, the kernel's KVM selftests seem to run.


Nevertheless, we should not pass any firmware when using KVM
so can you try "-bios none" ?

I have no kernel specified in the guest, so I'd then expect to boot into an completely empty machine (besides the tiny startup stub in the MROM). However, I still get the exact same error as mentioned in my initial mail.

Again, without "-enable-kvm", everything works as expected (i.e., I don't see any output, because there's basically no guest code to execute).

Just out of curiosity: if you don't pass a bios to the machine, what would then the boot sequence be?

Thanks
  Ralf


Regards,
Anup


[ 4860.559194] kvm [9942]: VCPU exit error -95
[ 4860.584262] kvm [9942]: SEPC=0x0 SSTATUS=0x200004120 HSTATUS=0x2002001c0
[ 4860.586839] kvm [9942]: SCAUSE=0x14 STVAL=0x0 HTVAL=0x0 HTINST=0x0

on the ringbuffer, together with a register dump of qemu [1] on the
console. Needless to say, but without -enable-kvm, it works fine.

As far as I see that, SCAUSE=0x14 reports a 'Instruction Guest PF',
which would be kind of correct, if the guest's PC really tries to
execute at phys 0x0. DRAM of the 'virt' machine definition should start
at 0x80000000, where OpenSBI resides. So I wonder if an erroneous reset
PC might be the culprit…

Before digging deeper into that issue, I wanted to ask if Qemu/KVM
inside an emulated riscv64+H-extension is actually supported, or if this
is a known bug and has some ongoing work.

RISC-V KVM should work. I haven't had a chance to try it myself though.

I have CCed two people who hopefully can help.

Alistair


Thanks
    Ralf

[1]

   pc       0000000000000000
   mhartid  0000000000000000
   mstatus  0000000200000000
   mip      0000000000000000
   mie      0000000000000000
   mideleg  0000000000000000
   medeleg  0000000000000000
   mtvec    0000000000000000
   stvec    0000000000000000
   mepc     0000000000000000
   sepc     0000000000000000
   mcause   0000000000000000
   scause   0000000000000000
   mtval    0000000000000000
   stval    0000000000000000
   mscratch 0000000000000000
   sscratch 0000000000000000
   satp     0000000000000000
   x0/zero  0000000000000000 x1/ra    0000000000000000 x2/sp
0000000000000000 x3/gp    0000000000000000
   x4/tp    0000000000000000 x5/t0    0000000000000000 x6/t1
0000000000000000 x7/t2    0000000000000000
   x8/s0    0000000000000000 x9/s1    0000000000000000 x10/a0
0000000000000000 x11/a1   00000000bf000000
   x12/a2   0000000000000000 x13/a3   0000000000000000 x14/a4
0000000000000000 x15/a5   0000000000000000
   x16/a6   0000000000000000 x17/a7   0000000000000000 x18/s2
0000000000000000 x19/s3   0000000000000000
   x20/s4   0000000000000000 x21/s5   0000000000000000 x22/s6
0000000000000000 x23/s7   0000000000000000
   x24/s8   0000000000000000 x25/s9   0000000000000000 x26/s10
0000000000000000 x27/s11  0000000000000000
   x28/t3   0000000000000000 x29/t4   0000000000000000 x30/t5
0000000000000000 x31/t6   0000000000000000


Reply via email to