Re: [RFC v3 2/2] x86/xen: allow privcmd hypercalls to be preempted

2015-01-21 Thread Andy Lutomirski
On Wed, Jan 21, 2015 at 6:17 PM, Luis R. Rodriguez wrote: > From: "Luis R. Rodriguez" > > Xen has support for splitting heavy work work into a series > of hypercalls, called multicalls, and preempting them through > what Xen calls continuation [0]. Despite this though without > CONFIG_PREEMPT pre

Re: [RFC v3 1/2] x86/xen: add xen_is_preemptible_hypercall()

2015-01-21 Thread Andy Lutomirski
On Wed, Jan 21, 2015 at 6:17 PM, Luis R. Rodriguez wrote: > From: "Luis R. Rodriguez" > > On kernels with voluntary or no preemption we can run > into situations where a hypercall issued through userspace > will linger around as it addresses sub-operatiosn in kernel > context (multicalls). Such o

[RFC v3 2/2] x86/xen: allow privcmd hypercalls to be preempted

2015-01-21 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" Xen has support for splitting heavy work work into a series of hypercalls, called multicalls, and preempting them through what Xen calls continuation [0]. Despite this though without CONFIG_PREEMPT preemption won't happen, without preemption a system can become pretty us

[RFC v3 0/2] x86/xen: add xen hypercall preemption

2015-01-21 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" After my last respin Andy provided some ideas as how to skip IRQ context hacks for preemption, this v3 spin addresses that and a bit more. This is based on both Andrew Cooper's and David Vrabel's work, further modified based on ideas by Andy Lutomirski to avoid having t

[RFC v3 1/2] x86/xen: add xen_is_preemptible_hypercall()

2015-01-21 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" On kernels with voluntary or no preemption we can run into situations where a hypercall issued through userspace will linger around as it addresses sub-operatiosn in kernel context (multicalls). Such operations can trigger soft lockup detection. We want to address a way

Re: KVM: x86: workaround SuSE's 2.6.16 pvclock vs masterclock issue

2015-01-21 Thread Marcelo Tosatti
On Wed, Jan 21, 2015 at 06:00:37PM +0100, Radim Krčmář wrote: > 2015-01-21 12:16-0200, Marcelo Tosatti: > > On Wed, Jan 21, 2015 at 03:09:27PM +0100, Radim Krčmář wrote: > > > 2015-01-20 15:54-0200, Marcelo Tosatti: > > > > SuSE's 2.6.16 kernel fails to boot if the delta between tsc_timestamp > > >

Re: [PATCH v12 10/18] vfio/platform: trigger an interrupt via eventfd

2015-01-21 Thread Alex Williamson
On Wed, 2015-01-21 at 13:49 +0100, Baptiste Reynal wrote: > From: Antonios Motakis > > This patch allows to set an eventfd for a platform device's interrupt, > and also to trigger the interrupt eventfd from userspace for testing. > Level sensitive interrupts are marked as maskable and are handled

Re: [PATCH v12 12/18] vfio: add a vfio_ prefix to virqfd_enable and virqfd_disable and export

2015-01-21 Thread Alex Williamson
On Wed, 2015-01-21 at 13:50 +0100, Baptiste Reynal wrote: > From: Antonios Motakis > > We want to reuse virqfd functionality in multiple VFIO drivers; before > moving these functions to core VFIO, add the vfio_ prefix to the > virqfd_enable and virqfd_disable functions, and export them so they ca

Re: [v3 13/26] KVM: Define a new interface kvm_find_dest_vcpu() for VT-d PI

2015-01-21 Thread Radim Kr?má?
2015-01-20 23:04+0200, Nadav Amit: > Radim Kr?má? wrote: > > 2015-01-14 01:27+, Wu, Feng: > >>> the new > hardware even doesn't consider the TPR for lowest priority interrupts > >>> delivery. > >>> > >>> A bold move ... what hardware was the first to do so? > >> > >> I think it was star

[patch -rt 1/2] KVM: use simple waitqueue for vcpu->wq

2015-01-21 Thread Marcelo Tosatti
The problem: On -RT, an emulated LAPIC timer instances has the following path: 1) hard interrupt 2) ksoftirqd is scheduled 3) ksoftirqd wakes up vcpu thread 4) vcpu thread is scheduled This extra context switch introduces unnecessary latency in the LAPIC path for a KVM guest. The solution: Al

[patch -rt 0/2] use simple waitqueue for kvm vcpu waitqueue (v4)

2015-01-21 Thread Marcelo Tosatti
Against v3.14-rt branch of git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git The problem: On -RT, an emulated LAPIC timer instance has the following path: 1) hard interrupt 2) ksoftirqd is scheduled 3) ksoftirqd wakes up vcpu thread 4) vcpu thread is scheduled This extra cont

[patch -rt 2/2] KVM: lapic: mark LAPIC timer handler as irqsafe

2015-01-21 Thread Marcelo Tosatti
Since lapic timer handler only wakes up a simple waitqueue, it can be executed from hardirq context. Also handle the case where hrtimer_start_expires fails due to -ETIME, by injecting the interrupt to the guest immediately. Reduces average cyclictest latency by 3us. Signed-off-by: Marcelo Tosatt

[PATCH 0/3] arm/arm64: KVM: Add support for page aging

2015-01-21 Thread Marc Zyngier
So far, KVM/arm doesn't implement any support for page aging, leading to rather bad performance when the system is swapping. This short series implements the required hooks and fault handling to deal with pages being marked old/young. The three patches are fairly straightforward: - First patch ch

[PATCH 1/3] arm/arm64: KVM: Allow handle_hva_to_gpa to return a value

2015-01-21 Thread Marc Zyngier
So far, handle_hva_to_gpa was never required to return a value. As we prepare to age pages at Stage-2, we need to be able to return a value from the iterator (kvm_test_age_hva). Adapt the code to handle this situation. No semantic change. Signed-off-by: Marc Zyngier --- arch/arm/kvm/mmu.c | 23

[PATCH 2/3] arm/arm64: KVM: Implement Stage-2 page aging

2015-01-21 Thread Marc Zyngier
Until now, KVM/arm didn't care much for page aging (who was swapping anyway?), and simply provided empty hooks to the core KVM code. With server-type systems now being available, things are quite different. This patch implements very simple support for page aging, by clearing the Access flag in th

[PATCH 3/3] arm/arm64: KVM: Optimize handling of Access Flag faults

2015-01-21 Thread Marc Zyngier
Now that we have page aging in Stage-2, it becomes obvious that we're doing way too much work handling the fault. The page is not going anywhere (it is still mapped), the page tables are already allocated, and all we want is to flip a bit in the PMD or PTE. Also, we can avoid any form of TLB inval

[PATCH v3 3/3] arm/arm64: KVM: Use kernel mapping to perform invalidation on page fault

2015-01-21 Thread Marc Zyngier
When handling a fault in stage-2, we need to resync I$ and D$, just to be sure we don't leave any old cache line behind. That's very good, except that we do so using the *user* address. Under heavy load (swapping like crazy), we may end up in a situation where the page gets mapped in stage-2 while

[PATCH v3 1/3] arm/arm64: KVM: Use set/way op trapping to track the state of the caches

2015-01-21 Thread Marc Zyngier
Trying to emulate the behaviour of set/way cache ops is fairly pointless, as there are too many ways we can end-up missing stuff. Also, there is some system caches out there that simply ignore set/way operations. So instead of trying to implement them, let's convert it to VA ops, and use them as a

[PATCH v3 0/3] arm/arm64: KVM: Random selection of cache related fixes

2015-01-21 Thread Marc Zyngier
This small series fixes a number of issues that Christoffer and I have been trying to nail down for a while, having to do with the host dying under load (swapping), and also with the way we deal with caches in general (and with set/way operation in particular): - The first one changes the way we h

[PATCH v3 2/3] arm/arm64: KVM: Invalidate data cache on unmap

2015-01-21 Thread Marc Zyngier
Let's assume a guest has created an uncached mapping, and written to that page. Let's also assume that the host uses a cache-coherent IO subsystem. Let's finally assume that the host is under memory pressure and starts to swap things out. Before this "uncached" page is evicted, we need to make sur

Re: [PATCH v16 00/10] KVM/arm/arm64/x86: dirty page logging for ARMv7/8 (3.18.0-rc2)

2015-01-21 Thread Mario Smarduch
On 01/21/2015 03:08 AM, Christoffer Dall wrote: > On Thu, Jan 15, 2015 at 03:58:51PM -0800, Mario Smarduch wrote: >> Patch series adds support for armv7/8 dirty page logging. As we move >> towards generic dirty page logging interface we move some common code to >> generic layer shared by x86, armv7

Re: KVM: x86: workaround SuSE's 2.6.16 pvclock vs masterclock issue

2015-01-21 Thread Radim Krčmář
2015-01-21 12:16-0200, Marcelo Tosatti: > On Wed, Jan 21, 2015 at 03:09:27PM +0100, Radim Krčmář wrote: > > 2015-01-20 15:54-0200, Marcelo Tosatti: > > > SuSE's 2.6.16 kernel fails to boot if the delta between tsc_timestamp > > > and rdtsc is larger than a given threshold: > > [...] > > > Disable m

Re: [patch -rt 1/2] KVM: use simple waitqueue for vcpu->wq

2015-01-21 Thread Peter Zijlstra
On Tue, Jan 20, 2015 at 01:16:13PM -0500, Steven Rostedt wrote: > I'm actually wondering if we should just nuke the _interruptible() > version of swait. As it should only be all interruptible or all not > interruptible, that the swait_wake() should just do the wake up > regardless. In which case, s

Re: [PATCH] kvm: Fix CR3_PCID_INVD type on 32-bit

2015-01-21 Thread Paolo Bonzini
On 15/01/2015 09:44, Borislav Petkov wrote: > From: Borislav Petkov > > arch/x86/kvm/emulate.c: In function ‘check_cr_write’: > arch/x86/kvm/emulate.c:3552:4: warning: left shift count >= width of type > rsvd = CR3_L_MODE_RESERVED_BITS & ~CR3_PCID_INVD; > > happens because sizeof(UL) on 32

Re: KVM: x86: workaround SuSE's 2.6.16 pvclock vs masterclock issue

2015-01-21 Thread Marcelo Tosatti
On Wed, Jan 21, 2015 at 03:09:27PM +0100, Radim Krčmář wrote: > 2015-01-20 15:54-0200, Marcelo Tosatti: > > SuSE's 2.6.16 kernel fails to boot if the delta between tsc_timestamp > > and rdtsc is larger than a given threshold: > [...] > > Disable masterclock support (which increases said delta) in c

Re: KVM: x86: workaround SuSE's 2.6.16 pvclock vs masterclock issue

2015-01-21 Thread Radim Krčmář
2015-01-20 15:54-0200, Marcelo Tosatti: > SuSE's 2.6.16 kernel fails to boot if the delta between tsc_timestamp > and rdtsc is larger than a given threshold: [...] > Disable masterclock support (which increases said delta) in case the > boot vcpu does not use MSR_KVM_SYSTEM_TIME_NEW. Why do we car

[PATCH v12 11/18] vfio/platform: support for level sensitive interrupts

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis Level sensitive interrupts are exposed as maskable and automasked interrupts and are masked and disabled automatically when they fire. Signed-off-by: Antonios Motakis --- drivers/vfio/platform/vfio_platform_irq.c | 99 ++- drivers/vfio/platfor

[PATCH v12 15/18] vfio: pass an opaque pointer on virqfd initialization

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis VFIO_PCI passes the VFIO device structure *vdev via eventfd to the handler that implements masking/unmasking of IRQs via an eventfd. We can replace it in the virqfd infrastructure with an opaque type so we can make use of the mechanism from other VFIO bus drivers. Signed-o

[PATCH v12 13/18] vfio: virqfd: rename vfio_pci_virqfd_init and vfio_pci_virqfd_exit

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis The functions vfio_pci_virqfd_init and vfio_pci_virqfd_exit are not really PCI specific, since we plan to reuse the virqfd code with more VFIO drivers in addition to VFIO_PCI. Signed-off-by: Antonios Motakis --- drivers/vfio/pci/vfio_pci.c | 6 +++--- drivers/vfio/

[PATCH v12 03/18] vfio: platform: add the VFIO PLATFORM module to Kconfig

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis Enable building the VFIO PLATFORM driver that allows to use Linux platform devices with VFIO. Signed-off-by: Antonios Motakis --- drivers/vfio/Kconfig | 1 + drivers/vfio/Makefile | 1 + drivers/vfio/platform/Kconfig | 9 + drivers/vfio/platfo

[PATCH v12 09/18] vfio/platform: initial interrupts support code

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis This patch is a skeleton for the VFIO_DEVICE_SET_IRQS IOCTL, around which most IRQ functionality is implemented in VFIO. Signed-off-by: Antonios Motakis --- drivers/vfio/platform/vfio_platform_common.c | 52 +-- drivers/vfio/platform/vfio_platform_ir

[PATCH v12 07/18] vfio/platform: support MMAP of MMIO regions

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis Allow to memory map the MMIO regions of the device so userspace can directly access them. PIO regions are not being handled at this point. Signed-off-by: Antonios Motakis --- drivers/vfio/platform/vfio_platform_common.c | 65 1 file changed,

[PATCH v12 16/18] vfio: move eventfd support code for VFIO_PCI to a separate file

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis The virqfd functionality that is used by VFIO_PCI to implement interrupt masking and unmasking via an eventfd, is generic enough and can be reused by another driver. Move it to a separate file in order to allow the code to be shared. Signed-off-by: Antonios Motakis --- d

[PATCH v12 14/18] vfio: add local lock for virqfd instead of depending on VFIO PCI

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis The Virqfd code needs to keep accesses to any struct *virqfd safe, but this comes into play only when creating or destroying eventfds, so sharing the same spinlock with the VFIO bus driver is not necessary. Signed-off-by: Antonios Motakis --- drivers/vfio/pci/vfio_pci_in

[PATCH v12 17/18] vfio: initialize the virqfd workqueue in VFIO generic code

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis Now we have finally completely decoupled virqfd from VFIO_PCI. We can initialize it from the VFIO generic code, in order to safely use it from multiple independent VFIO bus drivers. Signed-off-by: Antonios Motakis --- drivers/vfio/Makefile | 4 +++- drivers/vfio/pc

[PATCH v12 12/18] vfio: add a vfio_ prefix to virqfd_enable and virqfd_disable and export

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis We want to reuse virqfd functionality in multiple VFIO drivers; before moving these functions to core VFIO, add the vfio_ prefix to the virqfd_enable and virqfd_disable functions, and export them so they can be used from other modules. Signed-off-by: Antonios Motakis ---

[PATCH v12 18/18] vfio/platform: implement IRQ masking/unmasking via an eventfd

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis With this patch the VFIO user will be able to set an eventfd that can be used in order to mask and unmask IRQs of platform devices. Signed-off-by: Antonios Motakis --- drivers/vfio/platform/vfio_platform_irq.c | 47 --- drivers/vfio/platform/v

[PATCH v12 06/18] vfio/platform: read and write support for the device fd

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis VFIO returns a file descriptor which we can use to manipulate the memory regions of the device. Usually, the user will mmap memory regions that are addressable on page boundaries, however for memory regions where this is not the case we cannot provide mmap functionality due

[PATCH v12 08/18] vfio/platform: return IRQ info

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis Return information for the interrupts exposed by the device. This patch extends VFIO_DEVICE_GET_INFO with the number of IRQs and enables VFIO_DEVICE_GET_IRQ_INFO. Signed-off-by: Antonios Motakis --- drivers/vfio/platform/Makefile| 2 +- drivers/vfio/plat

[PATCH v12 10/18] vfio/platform: trigger an interrupt via eventfd

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis This patch allows to set an eventfd for a platform device's interrupt, and also to trigger the interrupt eventfd from userspace for testing. Level sensitive interrupts are marked as maskable and are handled in a later patch. Edge triggered interrupts are not advertised as m

[PATCH v12 05/18] vfio/platform: return info for device memory mapped IO regions

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis This patch enables the IOCTLs VFIO_DEVICE_GET_REGION_INFO ioctl call, which allows the user to learn about the available MMIO resources of a device. Signed-off-by: Antonios Motakis --- drivers/vfio/platform/vfio_platform_common.c | 106 +- driver

[PATCH v12 02/18] vfio: platform: probe to devices on the platform bus

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis Driver to bind to Linux platform devices, and callbacks to discover their resources to be used by the main VFIO PLATFORM code. Signed-off-by: Antonios Motakis --- drivers/vfio/platform/vfio_platform.c | 103 ++ include/uapi/linux/vfio.h

[PATCH v12 04/18] vfio/platform: return info for bound device

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis A VFIO userspace driver will start by opening the VFIO device that corresponds to an IOMMU group, and will use the ioctl interface to get the basic device info, such as number of memory regions and interrupts, and their properties. This patch enables the VFIO_DEVICE_GET_INF

[PATCH v12 01/18] vfio/platform: initial skeleton of VFIO support for platform devices

2015-01-21 Thread Baptiste Reynal
From: Antonios Motakis This patch forms the common skeleton code for platform devices support with VFIO. This will include the core functionality of VFIO_PLATFORM, however binding to the device and discovering the device resources will be done with the help of a separate file where any Linux plat

Re: [PATCH v14 08/11] qspinlock, x86: Rename paravirt_ticketlocks_enabled

2015-01-21 Thread Raghavendra K T
On 01/21/2015 01:42 AM, Waiman Long wrote: This patch renames the paravirt_ticketlocks_enabled static key to a more generic paravirt_spinlocks_enabled name. Signed-off-by: Waiman Long Signed-off-by: Peter Zijlstra --- Reviewed-by: Raghavendra K T -- To unsubscribe from this list: send the l

Re: [PATCH v16 00/10] KVM/arm/arm64/x86: dirty page logging for ARMv7/8 (3.18.0-rc2)

2015-01-21 Thread Christoffer Dall
On Thu, Jan 15, 2015 at 03:58:51PM -0800, Mario Smarduch wrote: > Patch series adds support for armv7/8 dirty page logging. As we move > towards generic dirty page logging interface we move some common code to > generic layer shared by x86, armv7 and armv8. > > armv7/8 Dirty page logging implement

Re: [question] incremental backup a running vm

2015-01-21 Thread Paolo Bonzini
On 21/01/2015 11:32, Zhang Haoyu wrote: > Hi, > > Does drive_mirror support incremental backup a running vm? > Or other mechanism does? > > incremental backup a running vm requirements: > First time backup, all of the allocated data will be mirrored to destination, > then a copied bitmap will b

Re: [PATCH v2 5/5] KVM: nVMX: Enable nested posted interrupt processing.

2015-01-21 Thread Wincy Van
On Wed, Jan 21, 2015 at 4:49 PM, Zhang, Yang Z wrote: + if (vector == vmcs12->posted_intr_nv && + nested_cpu_has_posted_intr(vmcs12)) { + if (vcpu->mode == IN_GUEST_MODE) + apic->send_IPI_mask(get_cpu_mask(vcpu->cpu), + POSTED_INTR_

[question] incremental backup a running vm

2015-01-21 Thread Zhang Haoyu
Hi, Does drive_mirror support incremental backup a running vm? Or other mechanism does? incremental backup a running vm requirements: First time backup, all of the allocated data will be mirrored to destination, then a copied bitmap will be saved to a file, then the bitmap file will log dirty fo

Re: [Xen-devel] [PATCH v14 11/11] pvqspinlock, x86: Enable PV qspinlock for XEN

2015-01-21 Thread David Vrabel
On 20/01/15 20:12, Waiman Long wrote: > This patch adds the necessary XEN specific code to allow XEN to > support the CPU halting and kicking operations needed by the queue > spinlock PV code. Xen is a word, please don't capitalize it. > +void xen_lock_stats(int stat_types) > +{ > + if (stat_

Re: [PATCH 2/5] KVM: nVMX: Enable nested virtualize x2apic mode.

2015-01-21 Thread Paolo Bonzini
On 21/01/2015 11:16, Wincy Van wrote: > On Wed, Jan 21, 2015 at 4:35 PM, Zhang, Yang Z wrote: >> Wincy Van wrote on 2015-01-16: >>> When L2 is using x2apic, we can use virtualize x2apic mode to gain higher >>> performance. >>> >>> This patch also introduces nested_vmx_check_apicv_controls for th

Re: [PATCH 1/5] KVM: nVMX: Make nested control MSRs per-cpu.

2015-01-21 Thread Paolo Bonzini
On 21/01/2015 10:23, Wincy Van wrote: > Yes, moving that msrs looks a bit ugly, but the irqchip_in_kernel is > per-VM, not a global > setting, there would be different settings of kernel_irqchip between VMs. > If we use irqchip_in_kernel to check it and set different value of the > ctl msrs, I th

Re: [PATCH 2/5] KVM: nVMX: Enable nested virtualize x2apic mode.

2015-01-21 Thread Wincy Van
On Wed, Jan 21, 2015 at 4:35 PM, Zhang, Yang Z wrote: > Wincy Van wrote on 2015-01-16: >> When L2 is using x2apic, we can use virtualize x2apic mode to gain higher >> performance. >> >> This patch also introduces nested_vmx_check_apicv_controls for the nested >> apicv patches. >> >> Signed-off-by:

Re: [PATCH 1/5] KVM: nVMX: Make nested control MSRs per-cpu.

2015-01-21 Thread Wincy Van
On Wed, Jan 21, 2015 at 4:18 PM, Zhang, Yang Z wrote: > Wincy Van wrote on 2015-01-16: >> To enable nested apicv support, we need per-cpu vmx control MSRs: >> 1. If in-kernel irqchip is enabled, we can enable nested >> posted interrupt, we should set posted intr bit in the >> nested_vm

RE: [PATCH v2 5/5] KVM: nVMX: Enable nested posted interrupt processing.

2015-01-21 Thread Zhang, Yang Z
Wincy Van wrote on 2015-01-21: > On Wed, Jan 21, 2015 at 4:07 PM, Zhang, Yang Z > wrote: >>> + if (vector == vmcs12->posted_intr_nv && + >>> nested_cpu_has_posted_intr(vmcs12)) { + if (vcpu->mode >>> == IN_GUEST_MODE) + apic->send_IPI_mask(get_cpu_mask(vcpu->cpu), +

Re: [PATCH v2 5/5] KVM: nVMX: Enable nested posted interrupt processing.

2015-01-21 Thread Wincy Van
On Wed, Jan 21, 2015 at 4:07 PM, Zhang, Yang Z wrote: >> + if (vector == vmcs12->posted_intr_nv && >> + nested_cpu_has_posted_intr(vmcs12)) { >> + if (vcpu->mode == IN_GUEST_MODE) >> + apic->send_IPI_mask(get_cpu_mask(vcpu->cpu), >> +

RE: [PATCH 2/5] KVM: nVMX: Enable nested virtualize x2apic mode.

2015-01-21 Thread Zhang, Yang Z
Wincy Van wrote on 2015-01-16: > When L2 is using x2apic, we can use virtualize x2apic mode to gain higher > performance. > > This patch also introduces nested_vmx_check_apicv_controls for the nested > apicv patches. > > Signed-off-by: Wincy Van To enable x2apic, should you to consider the beha

RE: [PATCH 1/5] KVM: nVMX: Make nested control MSRs per-cpu.

2015-01-21 Thread Zhang, Yang Z
Wincy Van wrote on 2015-01-16: > To enable nested apicv support, we need per-cpu vmx control MSRs: > 1. If in-kernel irqchip is enabled, we can enable nested > posted interrupt, we should set posted intr bit in the > nested_vmx_pinbased_ctls_high. 2. If in-kernel irqchip is disabled, >

RE: [PATCH v2 5/5] KVM: nVMX: Enable nested posted interrupt processing.

2015-01-21 Thread Zhang, Yang Z
Wincy Van wrote on 2015-01-20: > If vcpu has a interrupt in vmx non-root mode, we will kick that vcpu > to inject interrupt timely. With posted interrupt processing, the kick > intr is not needed, and interrupts are fully taken care of by hardware. > > In nested vmx, this feature avoids much more