From nobody Mon Feb 9 09:09:16 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=citrix.com ARC-Seal: i=1; a=rsa-sha256; t=1585131611; cv=none; d=zohomail.com; s=zohoarc; b=O98UPOxFY5W+LBZoO3Z51OK7+uIV+dFXWxp2bt9j58GuL7OoP9/i30lbVGxudGpECN7J9KTn0WmJPMdeU7KKxfUNYPIrFfYfiSz6zJ3amwbg+3vCfLwmb2d+Tz1F4tbuZeWyqVEiXpBue5UswzAFeXs2iFWPcQX2D+fWhzxaWis= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1585131611; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=EZrdwNn9NUuZD+zkrNVEBFz1c47NXYgwyVNbRE7bb4Y=; b=FDogqf8IlZkIsM9jzJzMyzFt4fpxU7fHfTqibDDc4pBg0ud23wMTEnHFtf/sC6UpFPI56haqaCDwfYJhahaLEVvaRqCYHb8ZHF123dpBdHvfW6kyAOakyT3PfoH19vWRPcTgm0FruONNjuTAxyWzb89boXbOA9q+MOqGWYPpxi0= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1585131611208568.6919332634446; Wed, 25 Mar 2020 03:20:11 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1jH38S-0001Do-HF; Wed, 25 Mar 2020 10:19:44 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1jH38R-0001Ch-Gt for xen-devel@lists.xenproject.org; Wed, 25 Mar 2020 10:19:43 +0000 Received: from esa5.hc3370-68.iphmx.com (unknown [216.71.155.168]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 216384f6-6e82-11ea-a6c1-bc764e2007e4; Wed, 25 Mar 2020 10:19:37 +0000 (UTC) X-Inumbo-ID: 216384f6-6e82-11ea-a6c1-bc764e2007e4 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1585131577; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=z/xEhW0aEfRsm+03v7+aRFxfGwQG1ImR13kmJO0HdxI=; b=iDR2EnbNUrroGnGmnBhAsCaXsiOs42k9+FxLok9PdSIOvkW3NlgRoaXd +sUcLGJvWaehRL9oCdd3W6Zwp5YSMwUHpFLs63f9OJ9xE9uX9Ma0qjklt dbr5kqwzDLpvc5AakPIZH/KFptFVoKPgM6wbCWGl1fGGMhxFUzwZceakG s=; Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=roger.pau@citrix.com; spf=Pass smtp.mailfrom=roger.pau@citrix.com; spf=None smtp.helo=postmaster@mail.citrix.com Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: None (esa5.hc3370-68.iphmx.com: no sender authenticity information available from domain of roger.pau@citrix.com) identity=pra; client-ip=162.221.158.21; receiver=esa5.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="roger.pau@citrix.com"; x-conformance=sidf_compatible Received-SPF: Pass (esa5.hc3370-68.iphmx.com: domain of roger.pau@citrix.com designates 162.221.158.21 as permitted sender) identity=mailfrom; client-ip=162.221.158.21; receiver=esa5.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="roger.pau@citrix.com"; x-conformance=sidf_compatible; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:209.167.231.154 ip4:178.63.86.133 ip4:195.66.111.40/30 ip4:85.115.9.32/28 ip4:199.102.83.4 ip4:192.28.146.160 ip4:192.28.146.107 ip4:216.52.6.88 ip4:216.52.6.188 ip4:162.221.158.21 ip4:162.221.156.83 ip4:168.245.78.127 ~all" Received-SPF: None (esa5.hc3370-68.iphmx.com: no sender authenticity information available from domain of postmaster@mail.citrix.com) identity=helo; client-ip=162.221.158.21; receiver=esa5.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="postmaster@mail.citrix.com"; x-conformance=sidf_compatible IronPort-SDR: dLOpcjX8YA5t7HoZatAR2I69unop2MuriRg4leFI1Wb3oA1AA7uUi3wT61KP7JevhvkLhiaSWZ 55JXmlg+DI9P0XxWeCmpbRqntB8rdugqjSlCzbizHiJLFpmtmihSV9jvFpmNkrHEKljBhFCJCu OAXMLHHCOoUslIU1RlrTDDPqPPTkI10yIEzhovIQDXvq5cv829ttESQlbxeRYmXsEcWbeWdvC/ 9rOOohpRYk9nHxxt3l6uYOj2QBxzaqNQf4LaNAhznMw13KE1vXj77zyskIAVhqZC934ESSIxoC en0= X-SBRS: 2.7 X-MesageID: 14930585 X-Ironport-Server: esa5.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.72,304,1580792400"; d="scan'208";a="14930585" From: Roger Pau Monne To: Date: Wed, 25 Mar 2020 11:19:09 +0100 Message-ID: <20200325101910.29168-4-roger.pau@citrix.com> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200325101910.29168-1-roger.pau@citrix.com> References: <20200325101910.29168-1-roger.pau@citrix.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Subject: [Xen-devel] [PATCH v2 3/4] x86/nvmx: split updating RVI from SVI in nvmx_update_apicv X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Kevin Tian , Jun Nakajima , Wei Liu , Andrew Cooper , Jan Beulich , Roger Pau Monne Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Updating SVI is required when an interrupt has been injected using the Ack on exit VMEXIT feature, so that the in service interrupt in the GUEST_INTR_STATUS matches the vector that is signaled in VM_EXIT_INTR_INFO. Updating RVI however is not tied to the Ack on exit feature, as it signals the next vector to be injected, and hence should always be updated to the next pending vector, regardless of whether Ack on exit is enabled. Signed-off-by: Roger Pau Monn=C3=A9 --- xen/arch/x86/hvm/vmx/vvmx.c | 22 +++++++++++++++++----- 1 file changed, 17 insertions(+), 5 deletions(-) diff --git a/xen/arch/x86/hvm/vmx/vvmx.c b/xen/arch/x86/hvm/vmx/vvmx.c index 1753005c91..8431c912a1 100644 --- a/xen/arch/x86/hvm/vmx/vvmx.c +++ b/xen/arch/x86/hvm/vmx/vvmx.c @@ -1384,26 +1384,38 @@ static void nvmx_update_apicv(struct vcpu *v) struct nestedvmx *nvmx =3D &vcpu_2_nvmx(v); unsigned long reason =3D get_vvmcs(v, VM_EXIT_REASON); unsigned long intr_info =3D get_vvmcs(v, VM_EXIT_INTR_INFO); + int rvi; =20 if ( reason =3D=3D EXIT_REASON_EXTERNAL_INTERRUPT && nvmx->intr.source =3D=3D hvm_intsrc_lapic && (intr_info & INTR_INFO_VALID_MASK) ) { uint16_t status; - uint32_t rvi, ppr; - uint32_t vector =3D intr_info & 0xff; + uint32_t ppr; + unsigned int vector =3D intr_info & INTR_INFO_VECTOR_MASK; struct vlapic *vlapic =3D vcpu_vlapic(v); =20 + /* + * Update SVI to record the currently in service interrupt that's + * signaled in EXIT_INTR_INFO. + */ vlapic_ack_pending_irq(v, vector, 1); =20 ppr =3D vlapic_set_ppr(vlapic); WARN_ON((ppr & 0xf0) !=3D (vector & 0xf0)); =20 status =3D vector << VMX_GUEST_INTR_STATUS_SVI_OFFSET; - rvi =3D vlapic_has_pending_irq(v); - if ( rvi !=3D -1 ) - status |=3D rvi & VMX_GUEST_INTR_STATUS_SUBFIELD_BITMASK; + __vmwrite(GUEST_INTR_STATUS, status); + } + + rvi =3D vlapic_has_pending_irq(v); + if ( rvi !=3D -1 ) + { + unsigned long status; =20 + __vmread(GUEST_INTR_STATUS, &status); + status &=3D ~VMX_GUEST_INTR_STATUS_SUBFIELD_BITMASK; + status |=3D rvi & VMX_GUEST_INTR_STATUS_SUBFIELD_BITMASK; __vmwrite(GUEST_INTR_STATUS, status); } } --=20 2.26.0