[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] [PATCH] make HVM PIC emulation code SMP-safe
For
the PIC I/O access, do we need lock protect? But for IRQ generation, i.e.
cpu_get_interrupt, how about following for simplicity (not
tested)?
diff -r
1e3977e029fd xen/arch/x86/hvm/hvm.c
--- a/xen/arch/x86/hvm/hvm.c Mon May 08 19:21:41 2006 +0100 +++ b/xen/arch/x86/hvm/hvm.c Tue May 16 13:18:04 2006 +0800 @@ -248,7 +248,7 @@ int cpu_get_interrupt(struct vcpu *v, in return intno; } /* read the irq from the PIC */ - if ( (intno = cpu_get_pic_interrupt(v, type)) != -1 ) + if ( v->vcpu_id == 0 && (intno = cpu_get_pic_interrupt(v, type)) != -1 ) return intno; return -1;
From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Dong, Eddie Sent: 2006年5月16日 9:58 To: Dave Lively; xen-devel@xxxxxxxxxxxxxxxxxxx Subject: RE: [Xen-devel] [PATCH] make HVM PIC emulation code SMP-safe Dave:
I think we'd better to make sure
cpu_get_interrupt be called only in VP0 too, but IOAPIC code may need
sonsolidation for SMP safe. hvm_pic_assist is safe as it is only happen in
VP0.
When switching from PIC to APIC in SMP, the guest
will disable PIC when IOAPIC/APIC is enabled.
thx,eddie From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Dave Lively Sent: 2006年5月16日 8:29 To: xen-devel@xxxxxxxxxxxxxxxxxxx Subject: Re: [Xen-devel] [PATCH] make HVM PIC emulation code SMP-safe On 5/15/06, David
Lively <
dlively@xxxxxxxxxxxxxxx> wrote:
The current PIC emulation code for HVM (fully-virtualized) guests _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |