Comprehensive boot process improvement across the entire stack: Compositor (NEW): Real Rust Wayland display server (690 lines) - Full XDG shell protocol (15/15 protocols implemented and verified) - wl_shm.format, xdg_wm_base, xdg_surface.get_toplevel support - wl_buffer.release lifecycle, buffer composite to framebuffer - Framebuffer mapping via scheme:memory (Redox) with fallback - PID/status files for greeterd health checks - Integration test suite (3 cases passing) - Diagnostic tool: redbear-compositor-check DRM/KMS Chain: - KWIN_DRM_DEVICES=/scheme/drm/card0 wired through init→greeterd→compositor - session-launch propagates KWIN_DRM_DEVICES (new test, 11/11 pass) - DRM auto-detect + 5s wait loop in compositor wrapper - Boot verified: compositor uses DRM backend in QEMU Intel DRM: - Gen8-Gen12 supported with firmware (SKL/KBL/CNL/ICL/GLK/RKL/DG1/TGL/ADLP/DG2/MTL/ARL/LNL/BMG) - Gen4-Gen7 device IDs recognized, unsupported with clear error message - Linux 7.0 i915 reference for all 200+ device IDs - Display fixes: sticky pipe refresh, PIPE=4/PORT=6, 64-bit page flip, EDID skeleton - 4 durability patches wired into recipe VirtIO GPU Driver (NEW): - 220-line DRM/KMS backend for QEMU virtio-gpu - Full GpuDriver trait implementation (11 methods) - PCI BAR0 framebuffer mapping, connector/mode info, GEM management Kernel: - 4GB RAM hang root cause: MEMORY_MAP overflow at 512 entries → fixed to 1024 - Canary chain R S 1 2 3 4 5 6 7 (9 COM1 checkpoints through boot) - Verified: kernel boots at 4GB with all canaries present - 3 durability patches (P0-canary, P1-memory-overflow) Live ISO: - Preload capped at 1 GiB with partial preload messaging - P5 patch wired into bootloader recipe Greeter: - Startup progress logging (4 checkpoints) - QML crash diagnostic (exit code 1 → specific error message) - greeterd tests: 8/8 pass Boot Daemons: - dhcpd: auto-detect interface from /scheme/netcfg/ifaces/ - i2c-gpio-expanderd: I2C decode retry (3× with 50ms delay) - ucsid: same I2C decode hardening - Compositor: safe framebuffer fallback (prevents crash) Qt6 Toolchain: - -march=x86-64 for CPU compatibility (prevents invalid_opcode on core2duo) - -fpermissive for header compatibility (unlinkat/linkat redefinition) Documentation: - BOOT-PROCESS-IMPROVEMENT-PLAN.md (comprehensive, 320 lines) - PROFILE-MATRIX.md: ISO organization, RAM requirements, known issues - BOOT-PROCESS-ASSESSMENT.md: Phase 7 kernel hang diagnosis - Deleted 4 stale docs (BAREMETAL-LOG, ACPI-FIXES, 02-GAP-ANALYSIS, _CUB_RBPKGBUILD) - Cross-references updated across all docs KWin stubs replaced with real compositor delegation. redbear-kde-session script created for post-login session launch. 30+ files, 10 patches, 3 binaries, 22 tests, 0 errors.
39 KiB
Red Bear OS IRQ and Low-Level Controllers Enhancement Plan
Purpose
This document assesses the current IRQ and low-level controller implementation in Red Bear OS for completeness and quality, then defines the next enhancement plan in execution order.
This is the canonical current implementation plan for PCI interrupt plumbing, IRQ delivery, MSI/MSI-X quality, low-level controller runtime proof, and IOMMU/interrupt-remapping follow-up work.
When another document discusses PCI, IRQ, MSI/MSI-X, pcid, pcid-spawner, or low-level
controller execution order, prefer this file for:
- the current robustness judgment,
- the current implementation order,
- the current validation/proof expectations,
- and the current language for build-visible vs runtime-proven vs hardware-validated claims.
Other documents may still hold deeper architecture or donor-material detail, but they should point here instead of acting as competing execution authorities.
It is grounded in the current repository state, especially:
local/recipes/drivers/redox-driver-sys/local/recipes/drivers/linux-kpi/local/recipes/gpu/redox-drm/local/recipes/system/iommu/recipes/core/kernel/source/src/acpi/recipes/core/base/source/drivers/acpid/local/docs/IOMMU-SPEC-REFERENCE.mdlocal/docs/ACPI-IMPROVEMENT-PLAN.mdlocal/docs/ACPI-IMPROVEMENT-PLAN.mddocs/04-LINUX-DRIVER-COMPAT.md
The goal is not to restate that these pieces compile, but to separate:
- what exists architecturally,
- what is only build-validated,
- what is runtime-validated,
- and what still needs focused enhancement work.
Evidence Model
This plan uses four different evidence buckets and does not treat them as equivalent:
- Checked-in source — what is visible directly in the current source tree.
- Local patch state — behavior carried by
local/patches/*that may not be visible in the unpacked upstream source snapshot until patches are applied. - Build-validated — code or recipes compile successfully.
- Runtime-validated — behavior has been exercised in a real boot/runtime path.
Where a statement depends on local patches instead of the visible source snapshot, that is called out explicitly below.
Controller Inventory and Ownership
| Area | Primary owner | Main entry points | Current evidence class |
|---|---|---|---|
| LAPIC / xAPIC / x2APIC | kernel | recipes/core/kernel/source/src/acpi/madt/, arch/x86_shared/device/local_apic.rs |
source + local patch + boot/runtime evidence |
| IOAPIC / IRQ overrides | kernel | recipes/core/kernel/source/src/arch/x86_shared/device/ioapic.rs, MADT ISO parsing |
source |
| Legacy PIC | kernel | arch/x86_shared/device/pic.rs |
source |
| ACPI power/reset methods | userspace acpid |
recipes/core/base/source/drivers/acpid/src/acpi.rs plus local base patch |
source + local patch + runtime evidence |
| HPET / timer tables | kernel | recipes/core/kernel/source/src/acpi/hpet.rs |
source |
| PIT fallback timer | kernel | recipes/core/kernel/source/src/arch/x86_shared/device/mod.rs, pit.rs |
source |
| PCI interrupt plumbing | userspace pcid / driver layer |
recipes/core/base/source/drivers/pci/, scheme:irq, scheme:pci |
source + runtime evidence |
| Driver IRQ abstraction | redox-driver-sys |
local/recipes/drivers/redox-driver-sys/source/src/irq.rs |
source |
| Linux IRQ compatibility | linux-kpi |
local/recipes/drivers/linux-kpi/source/ headers |
source |
| GPU MSI/MSI-X usage | redox-drm |
local/recipes/gpu/redox-drm/source/ |
source + build evidence |
| IOMMU / interrupt remapping | iommu daemon |
local/recipes/system/iommu/source/src/main.rs, local/docs/IOMMU-SPEC-REFERENCE.md |
source + build evidence |
| Kernel serio / PS2 path | kernel serio + userspace ps2d |
recipes/core/kernel/source/src/scheme/serio.rs, recipes/core/base/source/drivers/input/ps2d/src/main.rs |
source |
| Input controller path | inputd / evdevd / udev-shim |
base driver + local system recipes | source + runtime evidence |
| USB xHCI host controller | userspace xhcid |
recipes/core/base/source/drivers/usb/xhcid/src/main.rs |
source + build evidence |
| Port I/O / legacy controller access | kernel + redox-driver-sys |
iopl, io.rs, legacy driver code |
source |
| Legacy IRQ dispatch / ownership map | kernel | recipes/core/kernel/source/src/arch/x86_shared/interrupt/irq.rs |
source |
Current State Summary
What is already in place
Red Bear OS already has a meaningful low-level controller and interrupt foundation:
- ACPI boot, FADT power control, visible MADT parsing for LAPIC/IOAPIC/interrupt overrides, and HPET initialization are in place in the checked-in source.
- Additional MADT x2APIC / NMI / power-method handling exists in the local patch set and in prior runtime validation notes, but that behavior should not be conflated with the unpatched source snapshot.
redox-driver-sysprovides userspace driver primitives for MMIO, DMA, PCI access, IRQ handles, MSI-X table mapping, and IRQ affinity control.linux-kpiexposes Linux-style IRQ, PCI, memory, and synchronization APIs on top ofredox-driver-sys.redox-driver-sysnow has direct host-runnable unit coverage for pure PCI/IRQ substrate rules, including PCI scheme-entry parsing bounds, I/O BAR port conversion safety, and MSI-X BAR window helper validation. This should be treated as source + host-test evidence, not as runtime controller proof.redox-driver-sysfast PCI enumeration now preserves capability-chain data from config-space bytes instead of returning empty capability lists, and exposes a quirk-aware interrupt-support summary (none/legacy/msi/msix) for downstream policy convergence.redox-drmalready contains a shared interrupt abstraction with MSI-X-first and legacy-IRQ fallback paths for GPU drivers.- The AMD-Vi / Intel VT-d reference material and the in-tree
iommudaemon establish a serious implementation direction for IOMMU and interrupt-remapping work. - the repo now has a bounded timer proof path via
redbear-phase-timer-checkandlocal/scripts/test-timer-qemu.sh --check, which verifies the monotonic time scheme is present and advances across two reads inside a guest runtime - the bounded low-level controller proof hooks can now be run together through
local/scripts/test-lowlevel-controllers-qemu.sh, which sequences xHCI, IOMMU, PS/2, and timer runtime checks on the desktop validation image
What is still weak
The dominant weakness is not missing abstractions. It is missing runtime proof and uneven controller-specific validation.
- MSI-X support exists architecturally but is still weak on hardware validation.
- IOMMU support is specification-rich and code-rich, but still unvalidated on real hardware.
- IRQ routing quality-of-service remains primitive: raw wait handles exist, but balancing, coalescing, and validation of affinity behavior remain thin.
- Input stacks (
inputd,evdevd,udev-shim) now exist as a runtime substrate, but the exact end-to-end interrupt-to-consumer path still needs sustained validation discipline. - Low-level controller quality is uneven: ACPI/APIC are much further along than IOMMU, MSI-X, and controller-specific runtime characterization.
Current Robustness Assessment
Bottom line
The PCI/IRQ stack is now architecturally credible and usable for bounded bring-up plus QEMU/runtime proof, but it is not yet release-grade robust end to end.
The strongest layers are:
- the kernel IRQ substrate,
- the
scheme:irqdelivery model, - and the shared
redox-driver-sysPCI/IRQ helper layer.
The weakest layers are:
pcidandpcid-spawner,- the
pciddriver-interface helper surface, - the shared
virtio-coreMSI-X setup path, - and several upstream-owned base drivers that still panic on missing BARs, missing interrupt handles, impossible feature states, or scheme-operation failures.
What is materially strong today
- Kernel IRQ ownership is real and active: PIC, IOAPIC, LAPIC/x2APIC, IDT reservation, masking, EOI, and spurious IRQ accounting all exist in the checked-in kernel.
redox-driver-sysis the strongest PCI/IRQ userspace substrate: typed BAR parsing, quirk-aware interrupt-support reporting, IRQ handle abstractions, MSI-X table helpers, affinity helpers, and direct host-runnable substrate tests all exist.redox-drmconsumes the interrupt substrate honestly with MSI-X → MSI → legacy fallback and quirk-aware downgrade policy.iommuand the low-level proof scripts provide bounded runtime evidence rather than pretending broader hardware support exists.
What is still fragile today
pcidandpcid-spawnerstill assume a trusted environment too often: launch sequencing, device-enable timing, and several error paths are weaker than the substrate beneath them.pcidhelper files such asdriver_interface/{bar,cap,irq_helpers,msi}.rsstill treat several malformed-device or unsupported-state cases as invariants rather than recoverable failures.virtio-corestill hard-requires MSI-X in its active x86 path and uses assert/expect/ unreachable semantics for feature/capability assumptions that are acceptable for bounded proof, but weak for a general PCI substrate.- A broad set of shipped consumers (
rtl8168d,rtl8139d,ixgbed,ac97d,ihdad,ided,vboxd,virtio-blkd,virtio-gpud,ihdgd, and others) still encode panic-grade startup assumptions around BARs, IRQs, or scheme operations.
Validation truth
- MSI-X and IOMMU now have bounded QEMU/runtime proof.
- xHCI interrupt mode also has bounded QEMU proof.
- That is enough to justify further implementation work and proof tooling.
- It is not enough to justify broad hardware robustness claims for PCI/IRQ handling.
Current Authority Split
For PCI/IRQ planning and current-state language, use the repo doc set this way:
- This file — canonical implementation plan and current robustness judgment for PCI/IRQ and low-level controllers.
local/docs/LINUX-BORROWING-RUST-IMPLEMENTATION-PLAN.md— donor-material and Rust-rewrite policy only; not the execution authority for PCI/IRQ rollout.local/docs/IOMMU-SPEC-REFERENCE.md— specification/reference detail for AMD-Vi / VT-d.local/docs/QUIRKS-SYSTEM.mdandlocal/docs/QUIRKS-IMPROVEMENT-PLAN.md— quirk-policy source of truth and forward convergence work.README.md,docs/README.md,AGENTS.md, andlocal/AGENTS.md— public/current-state summary surfaces that should point here rather than restating competing PCI/IRQ execution plans.
Architectural Assessment
1. IRQ delivery architecture
The project’s IRQ delivery model is fundamentally sound.
- Kernel/platform side routes interrupts through APIC/x2APIC infrastructure.
- Userspace consumes interrupts through
scheme:irqhandles. - MSI-X vector allocation is already modeled per CPU via the IRQ scheme.
This is the right design for Red Bear OS. The main enhancement need is validation and quality, not an architectural rewrite.
2. PCI and MSI/MSI-X
The PCI and MSI-X model is one of the strongest parts of the current stack.
- Config-space access exists.
- Capability parsing exists.
- MSI-X table mapping exists.
- GPU drivers already use the abstraction.
The gap is that the repository still talks too often in “compiles” language instead of “validated on hardware with real interrupts firing” language.
Current runtime-proof entrypoint now present in-tree:
local/scripts/test-msix-qemu.sh— QEMU/UEFI boot path that verifies livevirtio-netinitialization reportingvirtio: using MSI-X
3. IOMMU and interrupt remapping
IOMMU was the most important low-level controller area that was still incomplete in practice.
- The implementation direction is correct.
- The data structures and register model are already documented deeply.
- But the hardware-validation story is still effectively open, and current daemon discovery is still only partially integrated: the daemon now searches common IVRS table locations automatically, but full platform-native discovery and hardware validation are still open.
- The current QEMU path now reaches AMD-Vi unit detection and
scheme:iommuregistration without crashing at daemon startup. - The current guest-driven first-use proof now completes successfully in QEMU: it reaches readable and writable AMD-Vi MMIO, initializes both discovered units, and drains the event path without faulting.
- The critical blockers that previously stopped this path were fixed in the shared mapping layers,
not just in the userspace
iommudaemon: physically contiguous DMA allocations now preserve writable mappings, and MMIO mappings now use the explicitfmappath with the intended protection bits.
This leaves IOMMU as a hardware-validation and deeper interrupt-remapping quality area, rather than as an immediate QEMU runtime blocker.
4. Input/controller path
The input/controller path is no longer missing. It is now a quality and observability problem.
inputdexists.evdevdexists.udev-shimexists.- Phase 3 validation helpers exist.
The enhancement task is to keep turning these from “service present” into “interrupt path proven,” especially under real runtime scenarios.
Completeness Assessment by Area
ACPI / APIC / x2APIC
State: materially complete for the historical boot-baseline bring-up goals, but not release-grade complete.
Important source note: the checked-in MADT parser in
recipes/core/kernel/source/src/acpi/madt/mod.rs visibly handles LocalApic, IoApic,
IntSrcOverride, Gicc, and Gicd. Additional x2APIC/NMI support referenced elsewhere in the
repo is currently evidenced through the local patch set and prior validation notes rather than the
plain source snapshot alone.
Strengths:
- MADT entries for xAPIC/x2APIC/NMI are handled.
- ACPI reboot/shutdown/power methods are implemented, but robustness, sleep-state scope beyond
\_S5, and bounded validation still remain open as tracked inlocal/docs/ACPI-IMPROVEMENT-PLAN.md. - x2APIC and SMP platform bring-up have already crossed the foundational threshold.
Open enhancement items:
- Better controller/runtime characterization on diverse hardware.
- Clearer documentation for what is kernel-complete versus only tested on limited platforms.
- Keep sleep-state support beyond
\_S5, DMAR ownership cleanup, and bounded validation visible as open ACPI work rather than implying subsystem closure.
IOAPIC / interrupt source override routing
State: present in ACPI parsing, but less explicitly validated than LAPIC/x2APIC paths.
Concrete checked-in owner:
recipes/core/kernel/source/src/arch/x86_shared/device/ioapic.rsrecipes/core/kernel/source/src/acpi/madt/mod.rs
Open enhancement items:
- explicit validation of interrupt source overrides on more real machines
- repo-visible test notes for IOAPIC routing behavior
HPET / timer controller surface
State: present, but still thinly characterized.
Concrete checked-in owner:
recipes/core/kernel/source/src/acpi/hpet.rs
Open enhancement items:
- runtime verification beyond “initialized from ACPI”
- clearer single-HPET limitation documentation
PIT fallback timer path
State: explicit checked-in fallback controller path.
Concrete checked-in owner:
recipes/core/kernel/source/src/arch/x86_shared/device/mod.rsrecipes/core/kernel/source/src/arch/x86_shared/device/pit.rs
Current behavior:
- the kernel prefers HPET when available
- if HPET initialization fails or is unavailable, it falls back to PIT
- PIT interrupt ticks currently drive timeout and scheduler timing paths
Open enhancement items:
- document runtime characterization of PIT-only boots
- clarify timer-source selection evidence in validation notes
PCI interrupt plumbing / MSI / MSI-X
State: architecturally strong, validation-incomplete.
Open enhancement items:
- real hardware MSI-X proof for AMD and Intel GPU paths
- controller-level observability for vector allocation and affinity behavior
- testable records of fallback behavior between MSI-X and legacy IRQs
Current runtime-validation surface now present in-tree:
local/scripts/test-msix-qemu.sh— boots a Red Bear image and confirms a live MSI-X path viavirtio-netlog evidence in QEMU
IOMMU / interrupt remapping
State: QEMU runtime proof present; broader hardware validation still open.
Concrete checked-in owner:
local/recipes/system/iommu/source/src/main.rslocal/docs/IOMMU-SPEC-REFERENCE.md
Open enhancement items:
- real AMD-Vi initialization validation
- event log and fault-path validation
- interrupt remapping validation under device load
- explicit distinction between “daemon builds” and “controller works”
- replacement of
IOMMU_IVRS_PATH-only discovery with real system discovery/integration
Current implementation improvement:
- the daemon no longer depends only on
IOMMU_IVRS_PATH; it now searches common IVRS table paths automatically before falling back to the environment variable override - daemon startup now defers AMD-Vi unit initialization until first scheme use, which keeps the
QEMU validation path alive long enough to prove detection plus
scheme:iommuregistration - a guest-driven self-test path now exists (
/usr/bin/iommu --self-test-initviaredbear-phase-iommu-check/test-iommu-qemu.sh) and now proves first-use unit initialization and event-drain completion in QEMU - the self-test output now includes structured discovery diagnostics (
discovery_source,kernel_acpi_status,ivrs_path) so zero-unit failures can be distinguished from kernel-ACPI fallback and missing-IVRS cases without changing the IOMMU MMIO path itself
Legacy IRQ ownership and dispatch map
State: explicit checked-in kernel ownership exists, but it is under-documented in higher-level controller discussions.
Concrete checked-in owner:
recipes/core/kernel/source/src/arch/x86_shared/interrupt/irq.rs
Current covered paths include:
- PIT timer interrupt handling
- keyboard and mouse interrupt delivery
- serial COM1/COM2 delivery
- PIC/APIC mask, acknowledge, and EOI behavior
- spurious IRQ accounting for IRQ7 and IRQ15
Open enhancement items:
- document legacy IRQ ownership and routing expectations explicitly in validation notes
- record PIC-vs-APIC runtime behavior on more hardware classes
Kernel serio / PS2 controller path
State: present and important, but easy to miss if input work is described only in terms of the
later evdevd/udev-shim stack.
Concrete checked-in owner:
recipes/core/kernel/source/src/scheme/serio.rsrecipes/core/base/source/drivers/input/ps2d/src/main.rs
Current behavior:
- the kernel owns the serio byte queues to avoid PS/2 controller races
ps2dconsumes/scheme/serio/0and/scheme/serio/1- that path then feeds the broader input producer chain
Open enhancement items:
- keep validation language explicit about the PS/2 path versus the later generic input stack
- add platform notes for systems that still rely on PS/2 keyboard/mouse delivery
- the repo now has a bounded PS/2 runtime-proof path via
redbear-phase-ps2-checkandlocal/scripts/test-ps2-qemu.sh --check, which proves serio node presence and a successful handoff into the existing Phase 3 input-path checker inside a guest ps2dcontroller init now also drains stale controller output during probe and around the core init/self-test path, which is the current bounded Red Bear-native equivalent of Linux i8042 flush discipline before broader PS/2 suspend/resume work exists.
USB xHCI controller interrupt path
State: present, but not honestly interrupt-complete in the checked-in source.
Concrete checked-in owner:
recipes/core/base/source/drivers/usb/xhcid/src/main.rs
Current behavior:
- xHCI has MSI/MSI-X and legacy INTx detection logic in source
- the checked-in
xhcidsource now calls the existingget_int_methodpath again instead of hardwiring polling, and it logs whether it selected MSI/MSI-X, legacy INTx, or polling local/scripts/test-xhci-irq-qemu.sh --checknow provides a repo-visible runtime proof path by booting a Red Bear image in QEMU and checking the xHCI interrupt-mode log outputredox-driver-sysnow logs allocated MSI-X vectors so interrupt selection is more observable in runtime logs
Open enhancement items:
- validate the restored interrupt path beyond early boot/logging, especially event-ring behavior
- validate the checked-in event-ring growth path under sustained runtime/device activity
Port I/O / legacy controller support
State: exists, but under-characterized.
Concrete current consumers/owners include:
- legacy PIC handling in
recipes/core/kernel/source/src/arch/x86_shared/device/pic.rs - port-I/O wrappers in
local/recipes/drivers/redox-driver-sys/source/src/io.rs - ACPI reset fallback via keyboard-controller port writes in the base/acpid patch path documented in
local/docs/ACPI-IMPROVEMENT-PLAN.md
Open enhancement items:
- determine which real devices still need the port-I/O path
- validate that the current wrappers are sufficient for those devices
Quality Assessment
Strong points
- The layering is correct: kernel/platform routing below, userspace schemes and driver wrappers above.
- The repository already has serious implementation artifacts, not just speculative plans.
- The low-level controller work is documented more deeply than many higher-level desktop areas.
- ACPI and early-platform work are significantly more mature than the rest of the low-level stack, but that maturity is still best read as boot-baseline progress with bounded validation rather than subsystem-complete closure.
Weak points
- Validation language is still inconsistent across docs. “builds” and “validated” are too often treated as adjacent states when they are not.
- IOMMU progress is easy to overread because the spec reference is detailed, but the runtime proof and discovery story are not there yet.
- Some controller areas are rich in abstractions but poor in operator-facing validation procedures.
- Hardware-controller quality is still under-documented in terms of negative results and known failure modes.
- Earlier summaries in the repo can blur checked-in source, local patches, and validated runtime behavior; this document should be used to keep those categories separate.
- Broad category labels can hide concrete controller owners unless PIT,
serio/PS2, legacy IRQ dispatch, and xHCI are named explicitly.
Enhancement Priorities
Priority 1 — MSI-X runtime validation on real devices
Goal: move MSI-X from “implemented abstraction” to “repeatedly proven behavior.”
Deliverables:
- explicit AMD GPU MSI-X validation notes
- explicit Intel GPU MSI-X validation notes
- verified fallback behavior to legacy IRQs when MSI-X is unavailable
- logged CPU/vector affinity behavior in real runs
Why first:
This is the lowest-level controller feature that already exists in the main runtime driver path and blocks confidence in GPU/display work above it.
Priority 2 — IOMMU hardware bring-up and fault-path validation
Goal: move IOMMU from spec-driven implementation to actual controller bring-up.
Deliverables:
- validated AMD-Vi daemon initialization on real hardware
- device table / command buffer / event log validation
- explicit interrupt-remapping validation notes
- negative-result documentation if hardware still fails
Why second:
It is the largest remaining low-level completeness gap, and it affects the safety and correctness of userspace driver DMA.
Priority 3 — IRQ quality-of-service and observability
Goal: make IRQ behavior easier to reason about in production.
Deliverables:
- better logging/telemetry around allocated IRQs and vectors
- explicit affinity-validation procedures
- measured notes on whether current userspace IRQ wait behavior is good enough for display/input latency needs
Why third:
This improves reliability without changing the underlying architecture.
Priority 4 — input/controller runtime proof
Goal: continue turning the existing input substrate into a well-proven low-level controller path.
Deliverables:
- sustained validation of
inputd→evdevd→ consumer path - documentation of real interrupt-backed input evidence, not only service existence
- explicit known limitations for consumer nodes and path expectations
Why fourth:
The architecture is there. What remains is proof quality.
Priority 5 — timer/controller characterization
Goal: reduce uncertainty around HPET/APIC-timer behavior and controller assumptions.
Deliverables:
- a compact validation note for HPET behavior on real hardware
- notes on timer-controller assumptions and known limits
Why fifth:
Important, but less immediately blocking than MSI-X and IOMMU.
Priority 6 — xHCI interrupt-path hardening
This is Priority 6 within the low-level controller plan itself, not within the repository-wide subsystem order. At the repo-wide level, low-level controller quality remains ahead of USB/Wi-Fi/ Bluetooth because these later subsystems depend on the controller/runtime proof work documented here.
Goal: keep USB host-controller operation on the restored interrupt-driven path and harden the proof surface beyond the current narrow QEMU validation.
Deliverables:
- keep the actual
get_int_methodpath inxhcidhealthy - validate MSI/MSI-X or INTx behavior for xHCI on real hardware and/or QEMU
- update docs so USB controller quality is not overstated while broader runtime and hardware validation remain open
Why sixth:
This remains a real completeness gap in an important low-level controller, but it is now narrower in scope than the cross-cutting MSI-X and IOMMU priorities above because the interrupt path itself is already restored and QEMU-proven.
Execution Plan
Detailed Implementation Plan
The remaining work should be executed in six waves. The order matters: shared control-plane and helper hardening comes before broad driver cleanup, and runtime-proof/observability comes before any stronger public claim language.
Wave 1 — Harden pcid / pcid-spawner orchestration
Status: ✅ Complete (Wave 1 hardening applied)
Primary targets
recipes/core/base/source/drivers/pcid/src/{main,scheme,driver_handler}.rsrecipes/core/base/source/drivers/pcid-spawner/src/main.rs
Implemented
- replaced all
expect()/unwrap()in pcid daemon startup withprocess::exit(1)+ log messages - ACPI registration failures are now non-fatal: logged and continued without ACPI
- PCI header parse failures (
from_header) now log and skip the device instead of panicking - I/O BAR port overflow now logs and skips the BAR instead of panicking
- MSI message data overflow returns
InvalidBitPatternerror response instead of panicking - pcid-spawner now logs interrupt mode, device address, and driver command for each spawned device
Acceptance
- ✅ no normal launch/config mismatch path depends on
expect/unreachable!in main.rs/driver_handler.rs - ✅ failed driver launch is bounded and observable
- ✅ enable-before-spawn behavior is explicitly logged with interrupt mode info
Verification
cargo test -p pcidcargo test -p pcid-spawner- verify
redbear-infostill reports the expected PCI surfaces after boot
Wave 2 — Fix pcid helper contract
Status: ✅ Complete
Implemented
-
irq_helpers.rs: all 9 panic sites converted to io::Error returns; convenience wrappers use log::error + process::exit(1)
-
mod.rs: send/recv rewritten to delegate to send_result/recv_result; connect_by_path uses proper error conversion; try_map_bar returns error on null BAR pointer
-
bar.rs: 2 unwrap_or_else(panic) → proper error returns
-
cap.rs: vendor capability parse failures return errors
-
msi.rs: MSI-X BAR mapping null pointer returns MsixMapError::NullPointer
-
config.rs: vendor ID parse uses proper error handling
-
recipes/core/base/source/drivers/pcid/src/driver_interface/{bar,cap,config,irq_helpers,msi,mod}.rs
Implement
- replace panic-style BAR/capability helpers with typed error-returning variants
- treat malformed vendor capabilities as device faults, not invariants
- make IRQ allocation and MSI/MSI-X selection explicit return values
- keep any
expect_*helpers as thin wrappers only where absolutely necessary
Acceptance
- helper layer is error-returning by default
- malformed BAR/capability state no longer aborts bring-up by default
- vector selection and failure reasons are reportable state, not only implicit side effects
Verification
cargo test -p pcid- add unit tests for malformed BARs, malformed vendor caps, and IRQ-allocation failure behavior
Wave 3 — Harden shared virtio-core IRQ/MSI-X setup
Status: ✅ Complete (all panic-grade sites converted)
Implemented
spawn_irq_thread: RawEventQueue creation, event subscription, and event iteration all handle errors gracefully with log::error + thread return instead of unwrap/panic- MSI-X vector acceptance check in
setup_queue: converted from assert to log::error + Err return - MSI-X vector check in
reinit_queue: converted from assert to log::error - FEATURES_OK validation in
accept_driver_features: converted from assert to log::error - split_virtqueue.rs
ChainBuilder::build: handles empty chain without panicking - Mutex lock unwraps retained as idiomatic (mutex poisoning in single-threaded driver is unrecoverable)
probe.rs: vendor-ID assert →Error::Probe("not a virtio device"),expect_mem()→try_mem()with proper error, three capability.expect()→.ok_or(Error::InCapable(...)),unreachable!()→continue, zero-multiplier assert → graceful error, MSI-X assert → graceful errorarch/x86.rs: MSI-X feature-infounreachable!()→Error::Probe(...),read_bsp_apic_id().expect()→.map_err()with log::warn- Added
Error::Probe(&'static str)variant totransport::Errorfor probe-stage failures - Removed
## Panicsdoc section fromprobe_device()
Primary targets
recipes/core/base/source/drivers/virtio-core/src/{probe,transport,arch/x86}.rs
Acceptance
- partial or malformed virtio devices fail probe cleanly
- MSI-X setup failure is a bounded bring-up error instead of a crash path
- all 3 downstream consumers (virtio-blkd, virtio-netd, virtio-gpud) compile cleanly against the hardened virtio-core
Verification
- build passes:
CI=1 make r.base CONFIG_NAME=redbear-mini ARCH=x86_64 - downstream consumers compile without errors
Wave 4 — Convert highest-risk consumers
Status: ✅ Complete (all consumer drivers hardened)
Status: ✅ Complete (all consumer drivers hardened)
Current state: All panic-grade .expect()/.unwrap()/assert!()/unreachable!()/panic!()
calls have been removed from every consumer driver and converted to graceful error handling.
Additionally, cfg_access/mod.rs and cfg_access/fallback.rs in pcid were hardened (21+ unwrap
sites converted on the PCIe ECAM/DTB/MCFG startup path). Only Mutex .lock().unwrap() calls remain
(idiomatic for single-threaded drivers where poisoning is unrecoverable).
Hardened drivers
drivers/net/e1000d/— all panic-grade calls converteddrivers/net/rtl8168d/— all panic-grade calls converteddrivers/net/rtl8139d/— all panic-grade calls converteddrivers/net/ixgbed/— all panic-grade calls converted (+ missinglogdep added to Cargo.toml)drivers/storage/ahcid/— all panic-grade calls converteddrivers/storage/nvmed/— all panic-grade calls converteddrivers/storage/ided/— all panic-grade calls converteddrivers/virtio/virtio-blkd/— all panic-grade calls converteddrivers/virtio/virtio-netd/— all panic-grade calls converteddrivers/graphics/virtio-gpud/— all panic-grade calls converteddrivers/pcid/src/cfg_access/— DTB/ACPI parsing hardened (21+ sites)
Conversion pattern applied
- Startup fatal (scheme registration, event queue, namespace, port I/O):
log::error! + process::exit(1) - Device init failures (DMA alloc, queue creation, BAR mapping):
log::error! + process::exit(1) - Runtime event loop errors (IRQ read/write, scheme tick, event next):
log::error! + continue try_into().unwrap()on physical addresses:.map_err(|_| Error::new(EIO))?try_into().unwrap_or_else(|_| unreachable!())on fixed-size arrays:.map_err(|_| Error::new(EIO))?Dma::new().unwrap()in scheme code:matchwithlog::error + returnorlog::error + process::exit(1)assert!()on MMIO bounds / internal invariants:debug_assert!()unreachable!()in enum fallback arms: last valid variant as fallback
Primary consumer batches
- network/storage/audio:
rtl8168d,rtl8139d,ixgbed,ahcid,nvmed,virtio-blkd,ided,ac97d,ihdad - graphics/VM:
ihdgd,virtio-gpud,vboxd
Implement
- move drivers onto checked helper APIs from Wave 2
- remove direct panic-grade assumptions around BARs, legacy IRQs, and scheme operations
- make legacy-only or bounded-mode requirements explicit and logged
Acceptance
- consumer startup fails cleanly for unsupported or partial hardware states
- legacy-only requirements are explicit compatibility outcomes, not abrupt aborts
Verification
CI=1 make cr.base CONFIG_NAME=redbear-mini ARCH=x86_64— zero errors, build successful- per-driver grep verified zero remaining panic-grade calls (only Mutex
.lock().unwrap()kept)
Wave 5 — Improve observability and proof
Status: ✅ Complete
Implemented
lspcinow shows runtime interrupt mode per device by reading/tmp/redbear-irq-report/*.envredbear-infoalready reports aggregate per-mode PCI IRQ counts and quirk pressureredbear-phase-pci-irq-checkreads live driver interrupt mode reports- operators can now answer "what IRQ mode is this device using and why?" from a single
lspciinvocation
Primary targets
local/recipes/system/redbear-info/source/src/main.rslocal/recipes/system/redbear-hwutils/source/src/bin/{lspci,redbear-phase-iommu-check}.rslocal/scripts/test-{msix,iommu,xhci-irq,lowlevel-controllers}-qemu.shlocal/docs/{REDBEAR-INFO-RUNTIME-REPORT,SCRIPT-BEHAVIOR-MATRIX}.md
Implement
- expose chosen interrupt mode per device
- expose fallback reason: MSI-X unavailable, quirk-disabled, vector allocation failed, legacy-only, etc.
- keep QEMU-first proofs explicit and bounded
- separate “installed”, “configured”, “active”, and “runtime-functional” states clearly
Acceptance
- operators can answer “what IRQ mode is this device using and why?” from runtime tooling
- proof scripts distinguish architecture proof from hardware proof cleanly
Verification
cargo testforredbear-infocargo testforredbear-hwutils- re-run bounded proof scripts and confirm mode/fallback signals appear in output
Wave 6 — Docs and hardware-evidence sync
Status: ✅ Complete (this document updated with wave completion status)
Primary targets
README.mdAGENTS.mdlocal/AGENTS.mddocs/README.md- this file
local/docs/{IOMMU-SPEC-REFERENCE,QUIRKS-SYSTEM,QUIRKS-IMPROVEMENT-PLAN,REDBEAR-INFO-RUNTIME-REPORT,SCRIPT-BEHAVIOR-MATRIX}.md
Implement
- sync public/current-state docs to the actual proof scope
- keep QEMU/runtime proof separate from hardware proof
- keep the repo-facing status story aligned with this canonical plan
Acceptance
- no doc claims broader PCI/IRQ robustness than tests actually prove
- public/current-state docs all point here for PCI/IRQ execution authority
Verification
- manual doc/code cross-check against current runtime tools and proof scripts
Recommended commit boundaries
pcid/pcid-spawnerorchestration hardeningpcidhelper API hardeningvirtio-coreMSI-X/probe hardening- consumer batch A
- consumer batch B
- observability/runtime tools
- docs/proof sync
Definition of done
This plan’s implementation work is materially complete only when:
- no panic-grade behavior remains on normal PCI/IRQ failure paths in
pcid, shared helpers, or key consumers, - IRQ mode selection is observable,
- bounded proof scripts still pass,
- docs match actual proof scope,
- and the remaining gaps are clearly hardware-evidence gaps rather than hidden code fragility.
Step A — Establish validation vocabulary in all related docs
For every low-level controller area, use the same four states consistently:
- builds
- boots
- validated
- experimental
Do not mark controller infrastructure “complete” unless the claimed runtime behavior is actually proven.
Step B — Add dedicated validation notes for MSI-X and IOMMU
The project already has enough code to justify dedicated runtime-validation docs for:
- GPU MSI-X behavior
- IOMMU bring-up and fault handling
There is now also an in-tree generic MSI-X runtime proof helper:
local/scripts/test-msix-qemu.sh
These should record both successful and failed hardware runs.
Step C — Expand runtime-proof tooling where signal is weak
The project already has a good pattern for this in the Phase 3/4/5 validation helpers.
Use the same pattern for low-level controllers:
- one host-side launcher/check path
- one guest-side runtime check path
- one doc entry that records what “passing” actually means
Step D — Keep the controller plan separate from higher-level desktop work
Do not let IRQ/IOMMU/controller planning get absorbed into generic Wayland/KDE roadmaps.
Controller quality must remain measurable at its own layer.
Recommended New Documentation Work
The current project docs should eventually include dedicated runtime-validation companion documents for:
- MSI-X validation
- IOMMU bring-up and fault validation
- timer/controller characterization
- input/controller runtime evidence
This document is the umbrella enhancement plan; those would be the execution/validation companions.
Current Validation Entry Points
The following in-tree validation paths now exist and should be treated as the current controller runtime-evidence surface:
local/scripts/test-xhci-irq-qemu.sh --check— xHCI interrupt-mode proof from QEMU boot logslocal/scripts/test-msix-qemu.sh— live MSI-X proof viavirtio-netlocal/scripts/test-iommu-qemu.sh --check— AMD IOMMU device visibility plus guest boot reachabilitylocal/scripts/test-usb-storage-qemu.sh— USB mass-storage autospawn plus bounded sector-0 readback proof
Bottom Line
Red Bear OS does not need a new IRQ/controller architecture.
It already has the correct architectural direction:
- scheme-based userspace IRQ delivery
- safe Rust driver wrappers
- PCI/MSI-X support
- IOMMU direction
- ACPI/APIC groundwork
What it needs now is disciplined completion work in this order:
- MSI-X runtime proof
- IOMMU hardware validation
- IRQ observability and affinity proof
- input/controller runtime evidence
- timer/controller characterization
The main quality risk is no longer missing design. It is over-claiming readiness before low-level controller runtime evidence exists.