From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: [PATCH 0/3] Nonatomic interrupt injection Date: Tue, 20 Jul 2010 15:13:30 +0300 Message-ID: <1279628013-29181-1-git-send-email-avi@redhat.com> To: kvm@vger.kernel.org Return-path: Received: from mx1.redhat.com ([209.132.183.28]:4617 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754470Ab0GTMNf (ORCPT ); Tue, 20 Jul 2010 08:13:35 -0400 Received: from int-mx02.intmail.prod.int.phx2.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) by mx1.redhat.com (8.13.8/8.13.8) with ESMTP id o6KCDYk4001329 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for ; Tue, 20 Jul 2010 08:13:35 -0400 Received: from cleopatra.tlv.redhat.com (cleopatra.tlv.redhat.com [10.35.255.11]) by int-mx02.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id o6KCDYT6003649 for ; Tue, 20 Jul 2010 08:13:34 -0400 Sender: kvm-owner@vger.kernel.org List-ID: This patchset changes interrupt injection to be done from normal process context instead of interrupts disabled context. This is useful for real mode interrupt injection on Intel without the current hacks (injecting as a software interrupt of a vm86 task), reducing latencies, and later, for allowing nested virtualization code to use kvm_read_guest()/kvm_write_guest() instead of kmap() to access the guest vmcb/vmcs. Seems to survive a hack that cancels every 16th entry, after injection has already taken place. TODO: svm support, more complicated due to debug and nsvm handling Avi Kivity (3): KVM: VMX: Split up vmx_complete_interrupts() KVM: VMX: Parameterize vmx_complete_interrupts() for both exit and entry KVM: Non-atomic interrupt injection arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/vmx.c | 64 +++++++++++++++++++++++++++++--------- arch/x86/kvm/x86.c | 27 ++++++++-------- 3 files changed, 64 insertions(+), 28 deletions(-)