Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1687140yba; Thu, 4 Apr 2019 16:20:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqz4FVERTZH1ker3mSd8qq5WH0B79+FST/fN+hnjSw9kxSe9YV5i4dxqqxbzdLPMV6AyncXG X-Received: by 2002:a62:26c1:: with SMTP id m184mr8966214pfm.102.1554420000591; Thu, 04 Apr 2019 16:20:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554420000; cv=none; d=google.com; s=arc-20160816; b=cYBdknUzo2yJ05BHOcHOuPs0i2hzSDXfPLTemwXmNGPP2uqo1p7vX5UWcOKzaLbJXP mZwvEJ2DI68CDVBDLil7kx20AqOpjzfD0JV1wrgCj53pjSvBsVr93jUXwmWmGusc28Qq 1pIdaMLrohYXAiCviGgfRQAm1Ml0GtFXwvNEoYQsiV1zJRXotr9RHZQ3pbPJUUDb+SQ8 TKG6+tBtatVhPsL2T6PlEGZpBZOTKoB93IVM4YOoMNX3UenVxHUDaNrVnsvUVVir4g+B M3xSDo1xav3WDKiiqxkKfsyGzYLJlvb8XOHNIKBD1WdZMWgqc2o2anhULNBHDfCZuyFd FcbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=2GgDrjtiQ0peNwQqCBvZRfFFbeBhkn1Ml6cuIlf5ZJI=; b=ycNIfXLkw85M8nymJgzMrP/Hn1DK8XteD8d5ny0SLAV49Dggvlf8MZODZ+XYDs9y/k hWZyJIn0oUeU2C5Z+8Cp+rDAU8nhiYzAjCaS12kEjNJj8qR1BbnsUawhztY070scIShk ClLDLfUwSeWV5q3qmos4I8gTCrB9za8TqbgEGvq9bHwzTGq/jmDul4U9+snxhfRMYtjb jAjkeUETXRhglC75k4aYC5usxyrdwrn8lAtewfVRqXJGlGdBljH9cNzoZP5zuI6v8dEF 1jRgSmqbFTJs3JXojuQLE4PRy03vjys+Dh2c71wRyZOw6Ppx2aBd38JYlXyDotJLPgjg 7csQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j65si17550199pge.48.2019.04.04.16.19.44; Thu, 04 Apr 2019 16:20:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730371AbfDDWG5 (ORCPT + 99 others); Thu, 4 Apr 2019 18:06:57 -0400 Received: from mx1.redhat.com ([209.132.183.28]:40300 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727263AbfDDWG5 (ORCPT ); Thu, 4 Apr 2019 18:06:57 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id EC6C230842B1; Thu, 4 Apr 2019 22:06:56 +0000 (UTC) Received: from flask (ovpn-204-248.brq.redhat.com [10.40.204.248]) by smtp.corp.redhat.com (Postfix) with SMTP id 6444160BF7; Thu, 4 Apr 2019 22:06:53 +0000 (UTC) Received: by flask (sSMTP sendmail emulation); Fri, 05 Apr 2019 00:06:53 +0200 Date: Fri, 5 Apr 2019 00:06:53 +0200 From: "rkrcmar@redhat.com" To: "Suthikulpanit, Suravee" Cc: "linux-kernel@vger.kernel.org" , "kvm@vger.kernel.org" , "joro@8bytes.org" , "pbonzini@redhat.com" Subject: Re: [PATCH 0/6] KVM/x86: Add workaround to support ExtINT with AVIC Message-ID: <20190404220652.GA317@flask> References: <20190322115702.10166-1-suravee.suthikulpanit@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190322115702.10166-1-suravee.suthikulpanit@amd.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.40]); Thu, 04 Apr 2019 22:06:57 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 2019-03-22 11:57+0000, Suthikulpanit, Suravee: > This series is one of the prerequisites for supporting AMD AVIC with > in-kernel irqchip (kernel_irqchip=on). > > Since AVIC does not support ExtINT interrupt, which is required during > the booting phase of Windows and FreeBSD VMs (e.g. PIT -> PIC -> ExtInt). > This results in VM hang in the boot loader with kernel_irqchip=on mode. > > This series provides workaround by temporary deactivate AVIC and fallback > to use legacy interrupt injection (w/ vINTR and interrupt window). > Then re-activate AVIC once the intrrupts are handled. Hm, another idea. It is possible to inject the ExtInt in APICv, but if interrupt injection is currently disabled, we need to wait until the interrupt window opens, which can't be done with int_* controls n. Wouldn't intercepting IRET/STGI/IF writes be enough to eventually reach the point where we can do event_inj? Thanks.