diff options
| author | Sheng Yang <sheng@linux.intel.com> | 2008-10-15 08:15:06 -0400 |
|---|---|---|
| committer | Avi Kivity <avi@redhat.com> | 2008-10-28 08:21:34 -0400 |
| commit | 5550af4df179e52753d3a43a788a113ad8cd95cd (patch) | |
| tree | f19274a4f7e345e70e7da713f44c1dcccdb134e8 | |
| parent | 6ad9f15c94822c3f067a7d443f3b414e08b34460 (diff) | |
KVM: Fix guest shared interrupt with in-kernel irqchip
Every call of kvm_set_irq() should offer an irq_source_id, which is
allocated by kvm_request_irq_source_id(). Based on irq_source_id, we
identify the irq source and implement logical OR for shared level
interrupts.
The allocated irq_source_id can be freed by kvm_free_irq_source_id().
Currently, we support at most sizeof(unsigned long) different irq sources.
[Amit: - rebase to kvm.git HEAD
- move definition of KVM_USERSPACE_IRQ_SOURCE_ID to common file
- move kvm_request_irq_source_id to the update_irq ioctl]
[Xiantao: - Add kvm/ia64 stuff and make it work for kvm/ia64 guests]
Signed-off-by: Sheng Yang <sheng@linux.intel.com>
Signed-off-by: Amit Shah <amit.shah@redhat.com>
Signed-off-by: Xiantao Zhang <xiantao.zhang@intel.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
| -rw-r--r-- | arch/ia64/include/asm/kvm_host.h | 3 | ||||
| -rw-r--r-- | arch/ia64/kvm/kvm-ia64.c | 8 | ||||
| -rw-r--r-- | arch/x86/include/asm/kvm_host.h | 3 | ||||
| -rw-r--r-- | arch/x86/kvm/i8254.c | 11 | ||||
| -rw-r--r-- | arch/x86/kvm/i8254.h | 1 | ||||
| -rw-r--r-- | arch/x86/kvm/x86.c | 6 | ||||
| -rw-r--r-- | include/linux/kvm_host.h | 7 | ||||
| -rw-r--r-- | virt/kvm/irq_comm.c | 42 | ||||
| -rw-r--r-- | virt/kvm/kvm_main.c | 12 |
9 files changed, 79 insertions, 14 deletions
diff --git a/arch/ia64/include/asm/kvm_host.h b/arch/ia64/include/asm/kvm_host.h index 85db124d37f6..04c0b88f7b3a 100644 --- a/arch/ia64/include/asm/kvm_host.h +++ b/arch/ia64/include/asm/kvm_host.h | |||
| @@ -417,6 +417,9 @@ struct kvm_arch { | |||
| 417 | struct list_head assigned_dev_head; | 417 | struct list_head assigned_dev_head; |
| 418 | struct dmar_domain *intel_iommu_domain; | 418 | struct dmar_domain *intel_iommu_domain; |
| 419 | struct hlist_head irq_ack_notifier_list; | 419 | struct hlist_head irq_ack_notifier_list; |
| 420 | |||
| 421 | unsigned long irq_sources_bitmap; | ||
| 422 | unsigned long irq_states[KVM_IOAPIC_NUM_PINS]; | ||
| 420 | }; | 423 | }; |
| 421 | 424 | ||
| 422 | union cpuid3_t { | 425 | union cpuid3_t { |
diff --git a/arch/ia64/kvm/kvm-ia64.c b/arch/ia64/kvm/kvm-ia64.c index a312c9e9b9ef..8a2b13ff0aff 100644 --- a/arch/ia64/kvm/kvm-ia64.c +++ b/arch/ia64/kvm/kvm-ia64.c | |||
| @@ -778,6 +778,9 @@ static void kvm_init_vm(struct kvm *kvm) | |||
| 778 | kvm_build_io_pmt(kvm); | 778 | kvm_build_io_pmt(kvm); |
| 779 | 779 | ||
| 780 | INIT_LIST_HEAD(&kvm->arch.assigned_dev_head); | 780 | INIT_LIST_HEAD(&kvm->arch.assigned_dev_head); |
| 781 | |||
| 782 | /* Reserve bit 0 of irq_sources_bitmap for userspace irq source */ | ||
| 783 | set_bit(KVM_USERSPACE_IRQ_SOURCE_ID, &kvm->arch.irq_sources_bitmap); | ||
| 781 | } | 784 | } |
| 782 | 785 | ||
| 783 | struct kvm *kvm_arch_create_vm(void) | 786 | struct kvm *kvm_arch_create_vm(void) |
| @@ -941,9 +944,8 @@ long kvm_arch_vm_ioctl(struct file *filp, | |||
| 941 | goto out; | 944 | goto out; |
| 942 | if (irqchip_in_kernel(kvm)) { | 945 | if (irqchip_in_kernel(kvm)) { |
| 943 | mutex_lock(&kvm->lock); | 946 | mutex_lock(&kvm->lock); |
| 944 | kvm_ioapic_set_irq(kvm->arch.vioapic, | 947 | kvm_set_irq(kvm, KVM_USERSPACE_IRQ_SOURCE_ID, |
| 945 | irq_event.irq, | 948 | irq_event.irq, irq_event.level); |
| 946 | irq_event.level); | ||
| 947 | mutex_unlock(&kvm->lock); | 949 | mutex_unlock(&kvm->lock); |
| 948 | r = 0; | 950 | r = 0; |
| 949 | } | 951 | } |
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h index 65679d006337..8346be87cfa1 100644 --- a/arch/x86/include/asm/kvm_host.h +++ b/arch/x86/include/asm/kvm_host.h | |||
| @@ -364,6 +364,9 @@ struct kvm_arch{ | |||
| 364 | 364 | ||
| 365 | struct page *ept_identity_pagetable; | 365 | struct page *ept_identity_pagetable; |
| 366 | bool ept_identity_pagetable_done; | 366 | bool ept_identity_pagetable_done; |
| 367 | |||
| 368 | unsigned long irq_sources_bitmap; | ||
| 369 | unsigned long irq_states[KVM_IOAPIC_NUM_PINS]; | ||
| 367 | }; | 370 | }; |
| 368 | 371 | ||
| 369 | struct kvm_vm_stat { | 372 | struct kvm_vm_stat { |
diff --git a/arch/x86/kvm/i8254.c b/arch/x86/kvm/i8254.c index 11c6725fb798..8772dc946823 100644 --- a/arch/x86/kvm/i8254.c +++ b/arch/x86/kvm/i8254.c | |||
| @@ -545,6 +545,12 @@ struct kvm_pit *kvm_create_pit(struct kvm *kvm) | |||
| 545 | if (!pit) | 545 | if (!pit) |
| 546 | return NULL; | 546 | return NULL; |
| 547 | 547 | ||
| 548 | mutex_lock(&kvm->lock); | ||
| 549 | pit->irq_source_id = kvm_request_irq_source_id(kvm); | ||
| 550 | mutex_unlock(&kvm->lock); | ||
| 551 | if (pit->irq_source_id < 0) | ||
| 552 | return NULL; | ||
| 553 | |||
| 548 | mutex_init(&pit->pit_state.lock); | 554 | mutex_init(&pit->pit_state.lock); |
| 549 | mutex_lock(&pit->pit_state.lock); | 555 | mutex_lock(&pit->pit_state.lock); |
| 550 | spin_lock_init(&pit->pit_state.inject_lock); | 556 | spin_lock_init(&pit->pit_state.inject_lock); |
| @@ -587,6 +593,7 @@ void kvm_free_pit(struct kvm *kvm) | |||
| 587 | mutex_lock(&kvm->arch.vpit->pit_state.lock); | 593 | mutex_lock(&kvm->arch.vpit->pit_state.lock); |
| 588 | timer = &kvm->arch.vpit->pit_state.pit_timer.timer; | 594 | timer = &kvm->arch.vpit->pit_state.pit_timer.timer; |
| 589 | hrtimer_cancel(timer); | 595 | hrtimer_cancel(timer); |
| 596 | kvm_free_irq_source_id(kvm, kvm->arch.vpit->irq_source_id); | ||
| 590 | mutex_unlock(&kvm->arch.vpit->pit_state.lock); | 597 | mutex_unlock(&kvm->arch.vpit->pit_state.lock); |
| 591 | kfree(kvm->arch.vpit); | 598 | kfree(kvm->arch.vpit); |
| 592 | } | 599 | } |
| @@ -595,8 +602,8 @@ void kvm_free_pit(struct kvm *kvm) | |||
| 595 | static void __inject_pit_timer_intr(struct kvm *kvm) | 602 | static void __inject_pit_timer_intr(struct kvm *kvm) |
| 596 | { | 603 | { |
| 597 | mutex_lock(&kvm->lock); | 604 | mutex_lock(&kvm->lock); |
| 598 | kvm_set_irq(kvm, 0, 1); | 605 | kvm_set_irq(kvm, kvm->arch.vpit->irq_source_id, 0, 1); |
| 599 | kvm_set_irq(kvm, 0, 0); | 606 | kvm_set_irq(kvm, kvm->arch.vpit->irq_source_id, 0, 0); |
| 600 | mutex_unlock(&kvm->lock); | 607 | mutex_unlock(&kvm->lock); |
| 601 | } | 608 | } |
| 602 | 609 | ||
diff --git a/arch/x86/kvm/i8254.h b/arch/x86/kvm/i8254.h index e436d4983aa1..4178022b97aa 100644 --- a/arch/x86/kvm/i8254.h +++ b/arch/x86/kvm/i8254.h | |||
| @@ -44,6 +44,7 @@ struct kvm_pit { | |||
| 44 | struct kvm_io_device speaker_dev; | 44 | struct kvm_io_device speaker_dev; |
| 45 | struct kvm *kvm; | 45 | struct kvm *kvm; |
| 46 | struct kvm_kpit_state pit_state; | 46 | struct kvm_kpit_state pit_state; |
| 47 | int irq_source_id; | ||
| 47 | }; | 48 | }; |
| 48 | 49 | ||
| 49 | #define KVM_PIT_BASE_ADDRESS 0x40 | 50 | #define KVM_PIT_BASE_ADDRESS 0x40 |
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 4f0677d1eae8..f1f8ff2f1fa2 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c | |||
| @@ -1742,7 +1742,8 @@ long kvm_arch_vm_ioctl(struct file *filp, | |||
| 1742 | goto out; | 1742 | goto out; |
| 1743 | if (irqchip_in_kernel(kvm)) { | 1743 | if (irqchip_in_kernel(kvm)) { |
| 1744 | mutex_lock(&kvm->lock); | 1744 | mutex_lock(&kvm->lock); |
| 1745 | kvm_set_irq(kvm, irq_event.irq, irq_event.level); | 1745 | kvm_set_irq(kvm, KVM_USERSPACE_IRQ_SOURCE_ID, |
| 1746 | irq_event.irq, irq_event.level); | ||
| 1746 | mutex_unlock(&kvm->lock); | 1747 | mutex_unlock(&kvm->lock); |
| 1747 | r = 0; | 1748 | r = 0; |
| 1748 | } | 1749 | } |
| @@ -4013,6 +4014,9 @@ struct kvm *kvm_arch_create_vm(void) | |||
| 4013 | INIT_LIST_HEAD(&kvm->arch.active_mmu_pages); | 4014 | INIT_LIST_HEAD(&kvm->arch.active_mmu_pages); |
| 4014 | INIT_LIST_HEAD(&kvm->arch.assigned_dev_head); | 4015 | INIT_LIST_HEAD(&kvm->arch.assigned_dev_head); |
| 4015 | 4016 | ||
| 4017 | /* Reserve bit 0 of irq_sources_bitmap for userspace irq source */ | ||
| 4018 | set_bit(KVM_USERSPACE_IRQ_SOURCE_ID, &kvm->arch.irq_sources_bitmap); | ||
| 4019 | |||
| 4016 | return kvm; | 4020 | return kvm; |
| 4017 | } | 4021 | } |
| 4018 | 4022 | ||
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index 3833c48fae3a..bb92be2153bc 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h | |||
| @@ -37,6 +37,8 @@ | |||
| 37 | #define KVM_REQ_UNHALT 6 | 37 | #define KVM_REQ_UNHALT 6 |
| 38 | #define KVM_REQ_MMU_SYNC 7 | 38 | #define KVM_REQ_MMU_SYNC 7 |
| 39 | 39 | ||
| 40 | #define KVM_USERSPACE_IRQ_SOURCE_ID 0 | ||
| 41 | |||
| 40 | struct kvm_vcpu; | 42 | struct kvm_vcpu; |
| 41 | extern struct kmem_cache *kvm_vcpu_cache; | 43 | extern struct kmem_cache *kvm_vcpu_cache; |
| 42 | 44 | ||
| @@ -306,15 +308,18 @@ struct kvm_assigned_dev_kernel { | |||
| 306 | int host_irq; | 308 | int host_irq; |
| 307 | int guest_irq; | 309 | int guest_irq; |
| 308 | int irq_requested; | 310 | int irq_requested; |
| 311 | int irq_source_id; | ||
| 309 | struct pci_dev *dev; | 312 | struct pci_dev *dev; |
| 310 | struct kvm *kvm; | 313 | struct kvm *kvm; |
| 311 | }; | 314 | }; |
| 312 | void kvm_set_irq(struct kvm *kvm, int irq, int level); | 315 | void kvm_set_irq(struct kvm *kvm, int irq_source_id, int irq, int level); |
| 313 | void kvm_notify_acked_irq(struct kvm *kvm, unsigned gsi); | 316 | void kvm_notify_acked_irq(struct kvm *kvm, unsigned gsi); |
| 314 | void kvm_register_irq_ack_notifier(struct kvm *kvm, | 317 | void kvm_register_irq_ack_notifier(struct kvm *kvm, |
| 315 | struct kvm_irq_ack_notifier *kian); | 318 | struct kvm_irq_ack_notifier *kian); |
| 316 | void kvm_unregister_irq_ack_notifier(struct kvm *kvm, | 319 | void kvm_unregister_irq_ack_notifier(struct kvm *kvm, |
| 317 | struct kvm_irq_ack_notifier *kian); | 320 | struct kvm_irq_ack_notifier *kian); |
| 321 | int kvm_request_irq_source_id(struct kvm *kvm); | ||
| 322 | void kvm_free_irq_source_id(struct kvm *kvm, int irq_source_id); | ||
| 318 | 323 | ||
| 319 | #ifdef CONFIG_DMAR | 324 | #ifdef CONFIG_DMAR |
| 320 | int kvm_iommu_map_pages(struct kvm *kvm, gfn_t base_gfn, | 325 | int kvm_iommu_map_pages(struct kvm *kvm, gfn_t base_gfn, |
diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c index d0169f5e6047..55ad76ee2d09 100644 --- a/virt/kvm/irq_comm.c +++ b/virt/kvm/irq_comm.c | |||
| @@ -25,15 +25,23 @@ | |||
| 25 | #include "ioapic.h" | 25 | #include "ioapic.h" |
| 26 | 26 | ||
| 27 | /* This should be called with the kvm->lock mutex held */ | 27 | /* This should be called with the kvm->lock mutex held */ |
| 28 | void kvm_set_irq(struct kvm *kvm, int irq, int level) | 28 | void kvm_set_irq(struct kvm *kvm, int irq_source_id, int irq, int level) |
| 29 | { | 29 | { |
| 30 | unsigned long *irq_state = (unsigned long *)&kvm->arch.irq_states[irq]; | ||
| 31 | |||
| 32 | /* Logical OR for level trig interrupt */ | ||
| 33 | if (level) | ||
| 34 | set_bit(irq_source_id, irq_state); | ||
| 35 | else | ||
| 36 | clear_bit(irq_source_id, irq_state); | ||
| 37 | |||
| 30 | /* Not possible to detect if the guest uses the PIC or the | 38 | /* Not possible to detect if the guest uses the PIC or the |
| 31 | * IOAPIC. So set the bit in both. The guest will ignore | 39 | * IOAPIC. So set the bit in both. The guest will ignore |
| 32 | * writes to the unused one. | 40 | * writes to the unused one. |
| 33 | */ | 41 | */ |
| 34 | kvm_ioapic_set_irq(kvm->arch.vioapic, irq, level); | 42 | kvm_ioapic_set_irq(kvm->arch.vioapic, irq, !!(*irq_state)); |
| 35 | #ifdef CONFIG_X86 | 43 | #ifdef CONFIG_X86 |
| 36 | kvm_pic_set_irq(pic_irqchip(kvm), irq, level); | 44 | kvm_pic_set_irq(pic_irqchip(kvm), irq, !!(*irq_state)); |
| 37 | #endif | 45 | #endif |
| 38 | } | 46 | } |
| 39 | 47 | ||
| @@ -58,3 +66,31 @@ void kvm_unregister_irq_ack_notifier(struct kvm *kvm, | |||
| 58 | { | 66 | { |
| 59 | hlist_del(&kian->link); | 67 | hlist_del(&kian->link); |
| 60 | } | 68 | } |
| 69 | |||
| 70 | /* The caller must hold kvm->lock mutex */ | ||
| 71 | int kvm_request_irq_source_id(struct kvm *kvm) | ||
| 72 | { | ||
| 73 | unsigned long *bitmap = &kvm->arch.irq_sources_bitmap; | ||
| 74 | int irq_source_id = find_first_zero_bit(bitmap, | ||
| 75 | sizeof(kvm->arch.irq_sources_bitmap)); | ||
| 76 | if (irq_source_id >= sizeof(kvm->arch.irq_sources_bitmap)) { | ||
| 77 | printk(KERN_WARNING "kvm: exhaust allocatable IRQ sources!\n"); | ||
| 78 | irq_source_id = -EFAULT; | ||
| 79 | } else | ||
| 80 | set_bit(irq_source_id, bitmap); | ||
| 81 | return irq_source_id; | ||
| 82 | } | ||
| 83 | |||
| 84 | void kvm_free_irq_source_id(struct kvm *kvm, int irq_source_id) | ||
| 85 | { | ||
| 86 | int i; | ||
| 87 | |||
| 88 | if (irq_source_id <= 0 || | ||
| 89 | irq_source_id >= sizeof(kvm->arch.irq_sources_bitmap)) { | ||
| 90 | printk(KERN_ERR "kvm: IRQ source ID out of range!\n"); | ||
| 91 | return; | ||
| 92 | } | ||
| 93 | for (i = 0; i < KVM_IOAPIC_NUM_PINS; i++) | ||
| 94 | clear_bit(irq_source_id, &kvm->arch.irq_states[i]); | ||
| 95 | clear_bit(irq_source_id, &kvm->arch.irq_sources_bitmap); | ||
| 96 | } | ||
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index cf0ab8ed3845..a87f45edfae8 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c | |||
| @@ -105,14 +105,12 @@ static void kvm_assigned_dev_interrupt_work_handler(struct work_struct *work) | |||
| 105 | */ | 105 | */ |
| 106 | mutex_lock(&assigned_dev->kvm->lock); | 106 | mutex_lock(&assigned_dev->kvm->lock); |
| 107 | kvm_set_irq(assigned_dev->kvm, | 107 | kvm_set_irq(assigned_dev->kvm, |
| 108 | assigned_dev->irq_source_id, | ||
| 108 | assigned_dev->guest_irq, 1); | 109 | assigned_dev->guest_irq, 1); |
| 109 | mutex_unlock(&assigned_dev->kvm->lock); | 110 | mutex_unlock(&assigned_dev->kvm->lock); |
| 110 | kvm_put_kvm(assigned_dev->kvm); | 111 | kvm_put_kvm(assigned_dev->kvm); |
| 111 | } | 112 | } |
| 112 | 113 | ||
| 113 | /* FIXME: Implement the OR logic needed to make shared interrupts on | ||
| 114 | * this line behave properly | ||
| 115 | */ | ||
| 116 | static irqreturn_t kvm_assigned_dev_intr(int irq, void *dev_id) | 114 | static irqreturn_t kvm_assigned_dev_intr(int irq, void *dev_id) |
| 117 | { | 115 | { |
| 118 | struct kvm_assigned_dev_kernel *assigned_dev = | 116 | struct kvm_assigned_dev_kernel *assigned_dev = |
| @@ -134,7 +132,7 @@ static void kvm_assigned_dev_ack_irq(struct kvm_irq_ack_notifier *kian) | |||
| 134 | 132 | ||
| 135 | dev = container_of(kian, struct kvm_assigned_dev_kernel, | 133 | dev = container_of(kian, struct kvm_assigned_dev_kernel, |
| 136 | ack_notifier); | 134 | ack_notifier); |
| 137 | kvm_set_irq(dev->kvm, dev->guest_irq, 0); | 135 | kvm_set_irq(dev->kvm, dev->irq_source_id, dev->guest_irq, 0); |
| 138 | enable_irq(dev->host_irq); | 136 | enable_irq(dev->host_irq); |
| 139 | } | 137 | } |
| 140 | 138 | ||
| @@ -146,6 +144,7 @@ static void kvm_free_assigned_device(struct kvm *kvm, | |||
| 146 | free_irq(assigned_dev->host_irq, (void *)assigned_dev); | 144 | free_irq(assigned_dev->host_irq, (void *)assigned_dev); |
| 147 | 145 | ||
| 148 | kvm_unregister_irq_ack_notifier(kvm, &assigned_dev->ack_notifier); | 146 | kvm_unregister_irq_ack_notifier(kvm, &assigned_dev->ack_notifier); |
| 147 | kvm_free_irq_source_id(kvm, assigned_dev->irq_source_id); | ||
| 149 | 148 | ||
| 150 | if (cancel_work_sync(&assigned_dev->interrupt_work)) | 149 | if (cancel_work_sync(&assigned_dev->interrupt_work)) |
| 151 | /* We had pending work. That means we will have to take | 150 | /* We had pending work. That means we will have to take |
| @@ -215,6 +214,11 @@ static int kvm_vm_ioctl_assign_irq(struct kvm *kvm, | |||
| 215 | match->ack_notifier.gsi = assigned_irq->guest_irq; | 214 | match->ack_notifier.gsi = assigned_irq->guest_irq; |
| 216 | match->ack_notifier.irq_acked = kvm_assigned_dev_ack_irq; | 215 | match->ack_notifier.irq_acked = kvm_assigned_dev_ack_irq; |
| 217 | kvm_register_irq_ack_notifier(kvm, &match->ack_notifier); | 216 | kvm_register_irq_ack_notifier(kvm, &match->ack_notifier); |
| 217 | r = kvm_request_irq_source_id(kvm); | ||
| 218 | if (r < 0) | ||
| 219 | goto out_release; | ||
| 220 | else | ||
| 221 | match->irq_source_id = r; | ||
| 218 | 222 | ||
| 219 | /* Even though this is PCI, we don't want to use shared | 223 | /* Even though this is PCI, we don't want to use shared |
| 220 | * interrupts. Sharing host devices with guest-assigned devices | 224 | * interrupts. Sharing host devices with guest-assigned devices |
