Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp30590yba; Wed, 8 May 2019 15:44:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqzlm1DCKpji/1GNq58kgmKaO3CLyGxoVCmaRGtaGOltHzRM1wfzGzhG1Ts5DLso7rOisAPB X-Received: by 2002:a63:6fcf:: with SMTP id k198mr890985pgc.158.1557355480247; Wed, 08 May 2019 15:44:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557355480; cv=none; d=google.com; s=arc-20160816; b=tj/mFYaKpXDJstzJvzhIwlgpzeR3nbUJRkMuiZmAZLK04+khKEoVqxND12SzKE+t90 JmGyXTySj+nQ7UDo1pRYMc/82r34OzwAHQkyFbolT1wjqEa9uZqYD4XxeLyhgELoSMv8 DpCL3PEwcGjqLv79LItbAU+CDn3TGoY5J/4CmxGcPzIRgtI6y+lTtXFDZFRKKPkQap4+ 8IuGdAfBV9yanO4TXwbt1f0pFppKRdjz638ceBmssbFswX5fshyatODv25Zu9r6B8ZbH 8fz3CcD48PdKKPt0lJcC07IzV2M5T6AaggQBRfp/4swFujRHlO+IeOn+hxF1XuTQ+BNY DFiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:openpgp:from:references:cc:to:subject:dkim-signature; bh=cc3iF2rKFnOXjc//hOXLvQ08PQaVcNXzHDybdjruEbQ=; b=hOnCwAmz3VXQhM255YgPRHBV+h75aL6eyIsrJOlW8phdev2CApQyb8NUUiO4u44IOI XIVL2ZUe1OOW+XUgofcv/DTFWRqnyJ4wL4tk1HmkcFRSOP8knsEjf88gPxKkam20uI0v +36wex8KdpiQSjfNvxVDb6QOc4I6uvx6peRxEfXNMFhRX+6PI7RFOazfBwNhb8VNXHVl Bvp8CgvCAS/wRNz6zxM3zKXNxNgeAdZyepthvvha/7zgr4g6W+cgBNAfi1OfZ9dy2aIA T7nq0DmyE3ARE01MyO0FIjR+oXD7Mja9ze+AgsCYut0gGZlDEzGY0+dQMTkFlJ8MB9SS 2rmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=dwVJVYB4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 67si106516pfg.177.2019.05.08.15.44.23; Wed, 08 May 2019 15:44:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=dwVJVYB4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728841AbfEHW1d (ORCPT + 99 others); Wed, 8 May 2019 18:27:33 -0400 Received: from smtp-fw-6002.amazon.com ([52.95.49.90]:13602 "EHLO smtp-fw-6002.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726700AbfEHW1c (ORCPT ); Wed, 8 May 2019 18:27:32 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209; t=1557354452; x=1588890452; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=cc3iF2rKFnOXjc//hOXLvQ08PQaVcNXzHDybdjruEbQ=; b=dwVJVYB4/449toBO4fYzfpHwFCpDog9nF1ky9sew4PXZmaBjR0Qu5btV guvRgUcPGoTXL6qKD1Hyfk0hyoYt2UbTI1brF3zGFJ1HHvpljIzaInZ/t P5+IYWMlFSQkSWI55EI+MgJkMXVb6+/3oyFJa57+AL6wnLHZl8y/+HVMb M=; X-IronPort-AV: E=Sophos;i="5.60,447,1549929600"; d="scan'208";a="401390028" Received: from iad6-co-svc-p1-lb1-vlan3.amazon.com (HELO email-inbound-relay-2c-87a10be6.us-west-2.amazon.com) ([10.124.125.6]) by smtp-border-fw-out-6002.iad6.amazon.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 08 May 2019 22:27:29 +0000 Received: from u7588a65da6b65f.ant.amazon.com (pdx2-ws-svc-lb17-vlan3.amazon.com [10.247.140.70]) by email-inbound-relay-2c-87a10be6.us-west-2.amazon.com (8.14.7/8.14.7) with ESMTP id x48MRR58051082 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Wed, 8 May 2019 22:27:28 GMT Received: from u7588a65da6b65f.ant.amazon.com (localhost [127.0.0.1]) by u7588a65da6b65f.ant.amazon.com (8.15.2/8.15.2/Debian-3) with ESMTP id x48MRPM6012270; Thu, 9 May 2019 00:27:25 +0200 Subject: Re: [PATCH 4/6] kvm: lapic: Add apicv activate/deactivate helper function To: "Suthikulpanit, Suravee" , "linux-kernel@vger.kernel.org" , "kvm@vger.kernel.org" Cc: "joro@8bytes.org" , "pbonzini@redhat.com" , "rkrcmar@redhat.com" References: <20190322115702.10166-1-suravee.suthikulpanit@amd.com> <20190322115702.10166-5-suravee.suthikulpanit@amd.com> From: =?UTF-8?Q?Jan_H=2e_Sch=c3=b6nherr?= Openpgp: preference=signencrypt Message-ID: <813c8c15-af74-6d77-4a30-2e0ee4b05006@amazon.de> Date: Thu, 9 May 2019 00:27:25 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <20190322115702.10166-5-suravee.suthikulpanit@amd.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 22/03/2019 12.57, Suthikulpanit, Suravee wrote: > Introduce a helper function for setting lapic parameters when > activate/deactivate apicv. > > Signed-off-by: Suravee Suthikulpanit > --- > arch/x86/kvm/lapic.c | 23 ++++++++++++++++++----- > arch/x86/kvm/lapic.h | 1 + > 2 files changed, 19 insertions(+), 5 deletions(-) > > diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c > index 95295cf81283..9c5cd1a98928 100644 > --- a/arch/x86/kvm/lapic.c > +++ b/arch/x86/kvm/lapic.c > @@ -2126,6 +2126,22 @@ void kvm_lapic_set_base(struct kvm_vcpu *vcpu, u64 value) > > } > > +void kvm_apic_update_apicv(struct kvm_vcpu *vcpu) > +{ > + struct kvm_lapic *apic = vcpu->arch.apic; > + bool active = vcpu->arch.apicv_active; > + > + if (active) { > + /* irr_pending is always true when apicv is activated. */ > + apic->irr_pending = true; > + apic->isr_count = 1; > + } else { > + apic->irr_pending = !!count_vectors(apic->regs + APIC_IRR); What about: apic->irr_pending = apic_search_irr(apic) != -1; instead? (more in line with the logic in apic_clear_irr()) Related to this, I wonder if we need to ensure to execute kvm_x86_ops->sync_pir_to_irr() just before apicv_active transitions from true to false, so that we don't miss an interrupt and irr_pending is set correctly in this function (on Intel at least). Hmm... there seems to be other stuff as well, that depends on vcpu->arch.apicv_active, which is not updated on a transition. For example: posted interrupts, CR8 intercept, and a potential asymmetry via avic_vcpu_load()/avic_vcpu_put() because the bottom half of just one of the two functions may be skipped... Do these need to be handled in some way? Regards Jan > + apic->isr_count = count_vectors(apic->regs + APIC_ISR); > + } > +} > +EXPORT_SYMBOL(kvm_apic_update_apicv); > + > void kvm_lapic_reset(struct kvm_vcpu *vcpu, bool init_event) > { > struct kvm_lapic *apic = vcpu->arch.apic; > @@ -2170,8 +2186,7 @@ void kvm_lapic_reset(struct kvm_vcpu *vcpu, bool init_event) > kvm_lapic_set_reg(apic, APIC_ISR + 0x10 * i, 0); > kvm_lapic_set_reg(apic, APIC_TMR + 0x10 * i, 0); > } > - apic->irr_pending = vcpu->arch.apicv_active; > - apic->isr_count = vcpu->arch.apicv_active ? 1 : 0; > + kvm_apic_update_apicv(vcpu); > apic->highest_isr_cache = -1; > update_divide_count(apic); > atomic_set(&apic->lapic_timer.pending, 0); > @@ -2433,9 +2448,7 @@ int kvm_apic_set_state(struct kvm_vcpu *vcpu, struct kvm_lapic_state *s) > apic_manage_nmi_watchdog(apic, kvm_lapic_get_reg(apic, APIC_LVT0)); > update_divide_count(apic); > start_apic_timer(apic); > - apic->irr_pending = true; > - apic->isr_count = vcpu->arch.apicv_active ? > - 1 : count_vectors(apic->regs + APIC_ISR); > + kvm_apic_update_apicv(vcpu); > apic->highest_isr_cache = -1; > if (vcpu->arch.apicv_active) { > kvm_x86_ops->apicv_post_state_restore(vcpu); > diff --git a/arch/x86/kvm/lapic.h b/arch/x86/kvm/lapic.h > index ff6ef9c3d760..b657605cfec0 100644 > --- a/arch/x86/kvm/lapic.h > +++ b/arch/x86/kvm/lapic.h > @@ -88,6 +88,7 @@ void kvm_apic_update_ppr(struct kvm_vcpu *vcpu); > int kvm_apic_set_irq(struct kvm_vcpu *vcpu, struct kvm_lapic_irq *irq, > struct dest_map *dest_map); > int kvm_apic_local_deliver(struct kvm_lapic *apic, int lvt_type); > +void kvm_apic_update_apicv(struct kvm_vcpu *vcpu); > > bool kvm_irq_delivery_to_apic_fast(struct kvm *kvm, struct kvm_lapic *src, > struct kvm_lapic_irq *irq, int *r, struct dest_map *dest_map); >