Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp775680imm; Fri, 29 Jun 2018 06:16:17 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIJQsm1ABG0rYDSguA64g7PwKkWLwIbxLcqw7bPosQhe49nc4ZuSTN4MgtGJVB246Hhz7SG X-Received: by 2002:a17:902:5602:: with SMTP id h2-v6mr15011921pli.314.1530278177686; Fri, 29 Jun 2018 06:16:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530278177; cv=none; d=google.com; s=arc-20160816; b=fHHqJbFOpbvZo2BA67wPpmssbXainEk4gFkAwLaI824lfpW5noEZnqDk/WjRl1LH5h Llf+9mAusBYgajKNglo7P9UhUcN3orIMsCUlxVW75laGNUAzScCg0jWltATCotBPp276 ozGzhPuT2/AGMi4bF1LMHM+oRy8PHMBRQ9oBCEgRp5HUzr7F4mRUGIGpLOgFE6HVqkpa 6RFI60iz5r4PPyKF6NBp9RYJ2MubR2s4cBaUynJr7nlLm2SG0RwvIqs66MfJL6Jpv26i 0Y56MzJbxzP9azM1W2ZdlAvvoRzJk7/JxHAcYHx+RfCCYyCsE7parM0PLCqI+QfVPq8j 7kNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:message-id:in-reply-to:date:references:subject:cc:to :from:arc-authentication-results; bh=buMLXeZjKwl3zFN8NI1ZQo1Jokhr3CzZIMzcuLjQVW8=; b=i02S3fqvzzTHmBrxrlK3Zw0khmFBpO1cplwcxzpDjVr9+l2sZu5aHZUiCiFQCESFd1 f5Z12iWtjLH/GRddBg0BJpXOb0ECITkNlvNgkFf3nTNFy2q9Hc//T7oDzNJenGM/7Cxa abgCifH149yg9CmVrAWCbQmqD9sHuHDv0UL6YNb1wrC3a/u5/c79oA7Wga8Y5nba0dAM 2eLOa8afTBYx/c1D4ifvwYvmKFsTaSplm6d/g1tO4hfdsRnUT6bSls0nAD37THZ0xyS0 ok72omTiUC13oK2bw22FFFIoW9kLnlUNgEcHtr7eme7CS+bw+KX9j7USRbL0fawrSUfK rkWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m18-v6si5384253pgg.693.2018.06.29.06.16.00; Fri, 29 Jun 2018 06:16:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935053AbeF2KKW (ORCPT + 99 others); Fri, 29 Jun 2018 06:10:22 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:53732 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751901AbeF2KKU (ORCPT ); Fri, 29 Jun 2018 06:10:20 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 4767D818F042; Fri, 29 Jun 2018 10:10:20 +0000 (UTC) Received: from vitty.brq.redhat.com.redhat.com (unknown [10.43.2.155]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 63B872156700; Fri, 29 Jun 2018 10:10:19 +0000 (UTC) From: Vitaly Kuznetsov To: Wanpeng Li Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Paolo Bonzini , Radim =?utf-8?B?S3LEjW3DocWZ?= Subject: Re: [PATCH 1/2] KVM: X86: Implement PV IPI in linux guest References: <1530265876-18136-1-git-send-email-wanpengli@tencent.com> <1530265876-18136-2-git-send-email-wanpengli@tencent.com> Date: Fri, 29 Jun 2018 12:10:18 +0200 In-Reply-To: <1530265876-18136-2-git-send-email-wanpengli@tencent.com> (Wanpeng Li's message of "Fri, 29 Jun 2018 17:51:15 +0800") Message-ID: <877emhewdx.fsf@vitty.brq.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Fri, 29 Jun 2018 10:10:20 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Fri, 29 Jun 2018 10:10:20 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'vkuznets@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Wanpeng Li writes: > From: Wanpeng Li > > Implement PV IPIs in guest kernel. > > Cc: Paolo Bonzini > Cc: Radim Krčmář > Cc: Vitaly Kuznetsov > Signed-off-by: Wanpeng Li > --- > arch/x86/include/uapi/asm/kvm_para.h | 1 + > arch/x86/kernel/kvm.c | 63 ++++++++++++++++++++++++++++++++++++ > 2 files changed, 64 insertions(+) > > diff --git a/arch/x86/include/uapi/asm/kvm_para.h b/arch/x86/include/uapi/asm/kvm_para.h > index 0ede697..19980ec 100644 > --- a/arch/x86/include/uapi/asm/kvm_para.h > +++ b/arch/x86/include/uapi/asm/kvm_para.h > @@ -28,6 +28,7 @@ > #define KVM_FEATURE_PV_UNHALT 7 > #define KVM_FEATURE_PV_TLB_FLUSH 9 > #define KVM_FEATURE_ASYNC_PF_VMEXIT 10 > +#define KVM_FEATURE_PV_SEND_IPI 11 > > #define KVM_HINTS_REALTIME 0 > > diff --git a/arch/x86/kernel/kvm.c b/arch/x86/kernel/kvm.c > index 5b2300b..b4f8dc3 100644 > --- a/arch/x86/kernel/kvm.c > +++ b/arch/x86/kernel/kvm.c > @@ -454,6 +454,57 @@ static void __init sev_map_percpu_data(void) > } > > #ifdef CONFIG_SMP > + > +static void __send_ipi_mask(const struct cpumask *mask, int vector) > +{ > + unsigned long flags, ipi_bitmap = 0; > + int cpu; > + > + local_irq_save(flags); > + > + for_each_cpu(cpu, mask) > + __set_bit(per_cpu(x86_cpu_to_apicid, cpu), &ipi_bitmap); We need a protection against per_cpu(x86_cpu_to_apicid, cpu) > here. > + kvm_hypercall2(KVM_HC_SEND_IPI, ipi_bitmap, vector); > + > + local_irq_restore(flags); > +} > + > +static void kvm_send_ipi_mask(const struct cpumask *mask, int vector) > +{ > + __send_ipi_mask(mask, vector); > +} > + > +static void kvm_send_ipi_mask_allbutself(const struct cpumask *mask, int vector) > +{ > + unsigned int this_cpu = smp_processor_id(); > + struct cpumask new_mask; > + const struct cpumask *local_mask; > + > + cpumask_copy(&new_mask, mask); > + cpumask_clear_cpu(this_cpu, &new_mask); > + local_mask = &new_mask; > + __send_ipi_mask(local_mask, vector); > +} > + > +static void kvm_send_ipi_allbutself(int vector) > +{ > + kvm_send_ipi_mask_allbutself(cpu_online_mask, vector); > +} > + > +static void kvm_send_ipi_all(int vector) > +{ > + __send_ipi_mask(cpu_online_mask, vector); > +} > + > +static void kvm_setup_pv_ipi(void) > +{ > + apic->send_IPI_mask = kvm_send_ipi_mask; > + apic->send_IPI_mask_allbutself = kvm_send_ipi_mask_allbutself; > + apic->send_IPI_allbutself = kvm_send_ipi_allbutself; > + apic->send_IPI_all = kvm_send_ipi_all; > + printk("KVM setup pv IPIs\n"); > +} > + > static void __init kvm_smp_prepare_cpus(unsigned int max_cpus) > { > native_smp_prepare_cpus(max_cpus); > @@ -624,12 +675,24 @@ static uint32_t __init kvm_detect(void) > return kvm_cpuid_base(); > } > > +static void __init kvm_apic_init(void) > +{ > + if (kvm_para_has_feature(KVM_FEATURE_PV_SEND_IPI)) > + kvm_setup_pv_ipi(); > +} > + > +static void __init kvm_init_platform(void) > +{ > + x86_platform.apic_post_init = kvm_apic_init; > +} > + > const __initconst struct hypervisor_x86 x86_hyper_kvm = { > .name = "KVM", > .detect = kvm_detect, > .type = X86_HYPER_KVM, > .init.guest_late_init = kvm_guest_init, > .init.x2apic_available = kvm_para_available, > + .init.init_platform = kvm_init_platform, > }; > > static __init int activate_jump_labels(void) -- Vitaly