On Tue, Feb 26, 2013 at 08:34:16PM +0800, Yang Zhang wrote: > From: Yang Zhang <yang.z.zhang@xxxxxxxxx> > > In the platform which supporing virtual interrupt delivery feature, > hardware will clear vIRR atomatically when target vcpu is running. > So software should not modify vIRR when target vcpu is running. This > patch will record the virtual interrupt into posted_irr when delivering > virtual interrupt to guest. And then sync posted_irr into vIRR in target > vcpu context. > > The patch to enable Posted Interrupt has the similar logic. Since we are > still discussing it, so split this part from Posted Interrupt patch to > fix the virtual interrupt delivery issue. > What the point of having this over posted interrupt patches considering that PI patches do this and more? > Signed-off-by: Yang Zhang <yang.z.zhang@xxxxxxxxx> > --- > arch/x86/kvm/lapic.c | 39 ++++++++++++++++++++++++++++++++++++++- > arch/x86/kvm/lapic.h | 3 +++ > arch/x86/kvm/vmx.c | 3 ++- > 3 files changed, 43 insertions(+), 2 deletions(-) > > diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c > index 02b51dd..98bc37e 100644 > --- a/arch/x86/kvm/lapic.c > +++ b/arch/x86/kvm/lapic.c > @@ -357,6 +357,11 @@ static u8 count_vectors(void *bitmap) > return count; > } > > +static inline bool apic_test_irr(int vec, struct kvm_lapic *apic) > +{ > + return apic_test_vector(vec, apic->regs + APIC_IRR); > +} > + > static inline int apic_test_and_set_irr(int vec, struct kvm_lapic *apic) > { > apic->irr_pending = true; > @@ -368,6 +373,26 @@ static inline int apic_search_irr(struct kvm_lapic *apic) > return find_highest_vector(apic->regs + APIC_IRR); > } > > +static inline void kvm_apic_update_irr(struct kvm_lapic *apic) > +{ > + int index; > + > + if (!kvm_x86_ops->vm_has_apicv(apic->vcpu->kvm)) > + return; > + > + if (apic->posted_irr_changed) { > + spin_lock(&apic->posted_irr_lock); > + for_each_set_bit(index, > + (unsigned long *)(&apic->posted_irr_changed), 8) { > + *((u32 *)(apic->regs + APIC_IRR + index * 0x10)) |= > + apic->posted_irr[index]; > + apic->posted_irr[index] = 0; > + } > + apic->posted_irr_changed = 0; > + spin_unlock(&apic->posted_irr_lock); > + } > +} > + > static inline int apic_find_highest_irr(struct kvm_lapic *apic) > { > int result; > @@ -379,6 +404,7 @@ static inline int apic_find_highest_irr(struct kvm_lapic *apic) > if (!apic->irr_pending) > return -1; > > + kvm_apic_update_irr(apic); > result = apic_search_irr(apic); > ASSERT(result == -1 || result >= 16); > > @@ -700,7 +726,17 @@ static int __apic_accept_irq(struct kvm_lapic *apic, int delivery_mode, > } else > apic_clear_vector(vector, apic->regs + APIC_TMR); > > - result = !apic_test_and_set_irr(vector, apic); > + if (kvm_x86_ops->vm_has_apicv(vcpu->kvm)) { > + spin_lock(&apic->posted_irr_lock); > + if (!apic_test_irr(vector, apic)) > + result = !test_and_set_bit(vector, > + (unsigned long *)apic->posted_irr); > + if (result) > + apic->posted_irr_changed |= 1 << (vector >> 5); > + spin_unlock(&apic->posted_irr_lock); > + } else { > + result = !apic_test_and_set_irr(vector, apic); > + } > trace_kvm_apic_accept_irq(vcpu->vcpu_id, delivery_mode, > trig_mode, vector, !result); > if (!result) { > @@ -1567,6 +1603,7 @@ int kvm_create_lapic(struct kvm_vcpu *vcpu) > static_key_slow_inc(&apic_sw_disabled.key); /* sw disabled at reset */ > kvm_lapic_reset(vcpu); > kvm_iodevice_init(&apic->dev, &apic_mmio_ops); > + spin_lock_init(&apic->posted_irr_lock); > > return 0; > nomem_free_apic: > diff --git a/arch/x86/kvm/lapic.h b/arch/x86/kvm/lapic.h > index 1676d34..38bebc8 100644 > --- a/arch/x86/kvm/lapic.h > +++ b/arch/x86/kvm/lapic.h > @@ -20,6 +20,9 @@ struct kvm_lapic { > u32 divide_count; > struct kvm_vcpu *vcpu; > bool irr_pending; > + u32 posted_irr[8]; > + u8 posted_irr_changed; > + spinlock_t posted_irr_lock; > /* Number of bits set in ISR. */ > s16 isr_count; > /* The highest vector set in ISR; if -1 - invalid, must scan ISR. */ > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index c1b3041..c8e6036 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -84,7 +84,8 @@ module_param(vmm_exclusive, bool, S_IRUGO); > static bool __read_mostly fasteoi = 1; > module_param(fasteoi, bool, S_IRUGO); > > -static bool __read_mostly enable_apicv_reg_vid; > +static bool __read_mostly enable_apicv_reg_vid = 1; > +module_param(enable_apicv_reg_vid, bool, S_IRUGO); > > /* > * If nested=1, nested virtualization is supported, i.e., guests may use > -- > 1.7.1 -- Gleb. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html