Gregory Haskins wrote: > The VCPU executes synchronously w.r.t. userspace today, and therefore > interrupt injection is pretty straight forward. However, we will soon need > to be able to inject interrupts asynchronous to the execution of the VCPU > due to the introduction of SMP, paravirtualized drivers, and asynchronous > hypercalls. This patch adds support to the interrupt mechanism to force > a VCPU to VMEXIT when a new interrupt is pending. > > Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]> > --- > > drivers/kvm/kvm.h | 5 +++ > drivers/kvm/kvm_main.c | 74 > +++++++++++++++++++++++++++++++++++++++++++++++- > drivers/kvm/svm.c | 43 ++++++++++++++++++++++++++++ > drivers/kvm/vmx.c | 43 ++++++++++++++++++++++++++++ > 4 files changed, 164 insertions(+), 1 deletions(-) > > diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h > index d41d653..15c8bec 100644 > --- a/drivers/kvm/kvm.h > +++ b/drivers/kvm/kvm.h > @@ -321,6 +321,8 @@ void kvm_io_bus_register_dev(struct kvm_io_bus *bus, > > #define NR_IRQ_WORDS KVM_IRQ_BITMAP_SIZE(unsigned long) > > +#define KVM_SIGNAL_VIRTUAL_INTERRUPT 33 /* Hardcoded for now */ > + > /* > * structure for maintaining info for interrupting an executing VCPU > */ > @@ -329,6 +331,9 @@ struct kvm_vcpu_irq { > struct kvm_irqdevice dev; > int pending; > int deferred; > + struct task_struct *task; > + int signo; > + int guest_mode; > }; > > struct kvm_vcpu { > diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c > index 9aeb2f7..6acbd9b 100644 > --- a/drivers/kvm/kvm_main.c > +++ b/drivers/kvm/kvm_main.c > @@ -304,6 +304,10 @@ static struct kvm *kvm_create_vm(void) > memset(&vcpu->irq, 0, sizeof(vcpu->irq)); > spin_lock_init(&vcpu->irq.lock); > vcpu->irq.deferred = -1; > + /* > + * This should be settable by userspace someday > + */ > + vcpu->irq.signo = KVM_SIGNAL_VIRTUAL_INTERRUPT; >
This needs to be fixed prior to merging. Hopefully not by setting the signal number, bit by making the vcpu fd writable (userspace can attach a signal to the fd if it wishes). > > vcpu->cpu = -1; > vcpu->kvm = kvm; > @@ -366,13 +370,20 @@ static void free_pio_guest_pages(struct kvm_vcpu *vcpu) > > static void kvm_free_vcpu(struct kvm_vcpu *vcpu) > { > + unsigned long irqsave; > + > if (!vcpu->vmcs) > return; > > vcpu_load(vcpu); > kvm_mmu_destroy(vcpu); > vcpu_put(vcpu); > + > + spin_lock_irqsave(&vcpu->irq.lock, irqsave); > + vcpu->irq.task = NULL; > + spin_unlock_irqrestore(&vcpu->irq.lock, irqsave); > Can irq.task be non-NULL here at all? Also, we only free vcpus when we destroy the vm, and paravirt drivers would hopefully hold a ref to the vm, so there's nobody to race against here. > kvm_irqdevice_destructor(&vcpu->irq.dev); > > @@ -1868,6 +1880,10 @@ static int kvm_vcpu_ioctl_run(struct kvm_vcpu *vcpu, > struct kvm_run *kvm_run) > kvm_arch_ops->decache_regs(vcpu); > } > > + spin_lock_irqsave(&vcpu->irq.lock, irqsaved); > + vcpu->irq.task = current; > + spin_unlock_irqrestore(&vcpu->irq.lock, irqsaved); > + > Just assignment + __smp_wmb(). > +/* > * This function will be invoked whenever the vcpu->irq.dev raises its INTR > * line > */ > @@ -2318,10 +2348,52 @@ static void kvm_vcpu_intr(struct kvm_irqsink *this, > { > struct kvm_vcpu *vcpu = (struct kvm_vcpu*)this->private; > unsigned long flags; > + int direct_ipi = -1; > > spin_lock_irqsave(&vcpu->irq.lock, flags); > - __set_bit(pin, &vcpu->irq.pending); > + > + if (!test_bit(pin, &vcpu->irq.pending)) { > + /* > + * Record the change.. > + */ > + __set_bit(pin, &vcpu->irq.pending); > + > + /* > + * then wake up the vcpu (if necessary) > + */ > + if (vcpu->irq.task && (vcpu->irq.task != current)) { > + if (vcpu->irq.guest_mode) { > + /* > + * If we are in guest mode, we can optimize > + * the IPI by executing a function directly > + * on the owning processor. > + */ > + direct_ipi = task_cpu(vcpu->irq.task); > + BUG_ON(direct_ipi == smp_processor_id()); > + } else > + /* > + * otherwise, we must assume that we could be > + * blocked anywhere, including userspace. Send > + * a signal to give everyone a chance to get > + * notification > + */ > + send_sig(vcpu->irq.signo, vcpu->irq.task, 0); > + } > + } > + > spin_unlock_irqrestore(&vcpu->irq.lock, flags); > + > + if (direct_ipi != -1) { > + /* > + * Not sure if disabling preemption is needed. > + * The kick_process() code does this so I copied it > + */ > + preempt_disable(); > + smp_call_function_single(direct_ipi, > + kvm_vcpu_guest_intr, > + vcpu, 0, 0); > + preempt_enable(); > + } > I see why you must issue the IPI outside the spin_lock_irqsave(), but aren't you now opening a race? vcpu enters guest mode, irq on other cpu, irq sets direct_ipi to wakeup guest, releases lock, vcpu exits to userspace (or migrates to another cpu), ipi is issued but nobody cares. > /* > + * Signal that we have transitioned back to host mode > + */ > + spin_lock_irqsave(&vcpu->irq.lock, irq_flags); > + vcpu->irq.guest_mode = 0; > + spin_unlock_irqrestore(&vcpu->irq.lock, irq_flags); > + > Assign + __smp_wmb(). > + /* > + * Signal that we have transitioned back to host mode > + */ > + spin_lock_irqsave(&vcpu->irq.lock, irq_flags); > + vcpu->irq.guest_mode = 0; > + spin_unlock_irqrestore(&vcpu->irq.lock, irq_flags); > Again. -- error compiling committee.c: too many arguments to function ------------------------------------------------------------------------- This SF.net email is sponsored by DB2 Express Download DB2 Express C - the FREE version of DB2 express and take control of your XML. No limits. Just data. Click to get it now. http://sourceforge.net/powerbar/db2/ _______________________________________________ kvm-devel mailing list kvm-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/kvm-devel