diff options
author | Steve Rutherford <srutherford@google.com> | 2015-07-30 11:27:16 +0200 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2015-10-01 15:06:29 +0200 |
commit | 1c1a9ce973a7863dd46767226bce2a5f12d48bc6 (patch) | |
tree | c7234495a61db9dc9d26956853b7495f8910c581 /virt/kvm | |
parent | b053b2aef25d00773fa6762dcd4b7f5c9c42d171 (diff) | |
download | linux-stable-1c1a9ce973a7863dd46767226bce2a5f12d48bc6.tar.gz linux-stable-1c1a9ce973a7863dd46767226bce2a5f12d48bc6.tar.bz2 linux-stable-1c1a9ce973a7863dd46767226bce2a5f12d48bc6.zip |
KVM: x86: Add support for local interrupt requests from userspace
In order to enable userspace PIC support, the userspace PIC needs to
be able to inject local interrupts even when the APICs are in the
kernel.
KVM_INTERRUPT now supports sending local interrupts to an APIC when
APICs are in the kernel.
The ready_for_interrupt_request flag is now only set when the CPU/APIC
will immediately accept and inject an interrupt (i.e. APIC has not
masked the PIC).
When the PIC wishes to initiate an INTA cycle with, say, CPU0, it
kicks CPU0 out of the guest, and renedezvous with CPU0 once it arrives
in userspace.
When the CPU/APIC unmasks the PIC, a KVM_EXIT_IRQ_WINDOW_OPEN is
triggered, so that userspace has a chance to inject a PIC interrupt
if it had been pending.
Overall, this design can lead to a small number of spurious userspace
renedezvous. In particular, whenever the PIC transistions from low to
high while it is masked and whenever the PIC becomes unmasked while
it is low.
Note: this does not buffer more than one local interrupt in the
kernel, so the VMM needs to enter the guest in order to complete
interrupt injection before injecting an additional interrupt.
Compiles for x86.
Can pass the KVM Unit Tests.
Signed-off-by: Steve Rutherford <srutherford@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'virt/kvm')
0 files changed, 0 insertions, 0 deletions