[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC


  • To: Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • From: Jane Malalane <Jane.Malalane@xxxxxxxxxx>
  • Date: Thu, 10 Feb 2022 16:44:13 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jnAPNwQQMyD9COZq7rihczUEKGyFhk3h5JAkxSS0Za4=; b=RT1rHm+1IuoGroVDwObZkBv4vMf1zIVwCWFNXnr185j9Z/3E7dKMyKVdpKWWKgjbaLL/nrLtpKQoqjWsIKfFp0R0B3K8CvFA3dO2yfpu9Vhwv1cHlPVX4affM5Gl5k5xFC2LrJYx4fetWjRF48aLU9gsYZrNCCOJxI1d7/+z0SYmZriq7Ad7gwmXoPN1PYZbyFQqoWHyOZLK0swS0MkV6d0d1+V+M9upKoX3n0jruySC9yzS0Ljo2y2quZijifB17ariTL2LG1XeCgrtrJhoszCzIhHLgwtuTmJYZLnZfAicc9rxyXoZ+GP+NGA7WQVV9NdnHXOSHahiolvmWcHIfg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RK6wEUzNKPwO7/AD10QqV7BPeS6CbwGF1bV0GOfL1mWNlnXKa9BvqNJiPT4mmrKA0FabfBdu1VZAkCuWCXWFSeGZxOoE4MtwB+OxtzctkHY6AAlARNRr6+vbyget9DPTeg5AoTeJsE5Uw430EDqV8a7jfrik6jsnTBhmtYoM3gRbWsbtQkUtPz9KKPpsXhb+R2A883PnndwFSyijDuKvQv+7vDYJKZ7hhur+8WNqFPswUmIAT1LoW3kEc7xbgLkZUoXIxZPQMObefOxI2zEGzspqnCq2oy1zHvrbm+3mihRk0ZYc1GCUQQfninyLxPk0S1L8Udq5jcVY1FSwxFi4RA==
  • Authentication-results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, "Anthony Perard" <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, "Andrew Cooper" <Andrew.Cooper3@xxxxxxxxxx>, George Dunlap <George.Dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "Christian Lindig" <christian.lindig@xxxxxxxxxx>, David Scott <dave@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Thu, 10 Feb 2022 16:44:29 +0000
  • Ironport-data: A9a23:kOiid6pgx+yaYXPGnVa6ciQKESVeBmJcYxIvgKrLsJaIsI4StFCzt garIBnSP/7fNjH9e48lYNyy8U5T6p/dmoVlTAE6qysyFiIW85uZCYyVIHmrMnLJJKUvbq7GA +byyDXkBJppJpMJjk71atANlZT4vE2xbuKU5NTsY0idfic5Dndx4f5fs7Rh2NQw24HhW1nlV e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9 DlCnbKMQyI1eaDoouE6XhxBFHBTZ4lK27CSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKEWvHwm6DjdBPIvR53rSKTW/95Imjw3g6iiGN6AP JpEM2QxNXwsZTVBHGcXCLUbnt2Yg1rcdyNirVbNmq8otj27IAtZj+G2bYu9lsaxbd5Ogk+Sq 2bC/mL4KhIXLtqSzXyC6H3Eru3SmSL2XqoCGbv+8eRl6HWtwWgUBAwTREGMi/CzgU6jWPpSM 0URvCEpqMAa+EW1Q/HnUha/oXrCuQQTM/JPF8Uq5QfLzbDbiy6JC25BQjNfZdgOsM4tWSdsx lKPh8nuBzFkrPuSU3313rWeoC62OCMVBXQffiJCRgwAi/Hhr5s0lQnnVct4Hei+ididJN3r6 2nU9m5k3exV1JNVkfXglbzav96yjrb1RCspoQjzZGeC4wZgY9+IPaikyleOuJ6sM72lZlWGu XEFne2X4+YPEYyBmUSxfQkdIF26z63baWOB2DaDC7Fkrm3woCD7Iei89RkjfB8BDyoSRdP+j KY/Uyt17YQbAnalZLQfj2mZW5VzlviI+TgIu5npgjtyjnpZKVfvEMJGPxf4M4XRfK4EyvhX1 XCzK5jEMJriIf47pAdavs9EuVPR+ggwxHnIWbfwxAm93LyVaRa9EOlZbAfVNLhht/Pb8W05F uqz0ePRkn2zt8WkPEHqHXM7dwhWfRDX+7iqwyCoSgJzClU/QzxwYxMg6bggZ5Zkj8xoehTgp RmAtrtj4AOn3xXvcFzSAlg6Me+Hdcsv/BoTYH13VX71iidLXGpaxPpGH3fBVeJ8r7ILID8dZ 6RtRvhs9dwRFmqZq25AMfEQbuVKLXyWuO5HBAL8CBAXdJ98XQ3ZvNjiewrk7i4VCSSr88A5p tWdOsnzG/LvnixuU5TbbuyB1VS0sSRPke5+RRKQcNJSZF/t4M5hLCmo1q07JMQFKBPiwDqG1 lnJXUdE9LeV+4JlosPUga2krpuyF7csFERtAGSGv629MjPX/zT/zNYYAvqIZz3USEj95L6mO bdO1/j5PfBexARKvoNwHqxF16U749ez9bZWwh49RCfAbkixC6MmKX6DhJEduqpIz75fmA23R kPQpYUKZeTXYJvoSQdDKhAkY+KP0eAvtgPTtfllcl/n4CJX/aacVRkANRe7lyEAfqB+N5kow Ll9tZdOuRC/kBcjLv2PkjtQqzaXNnUFXqgq6sMaDYvshlZ5w11Oe8WBWCr/4ZXJYNRQKEg6Z DSTgfOa1bhbw0PDdVs1FGTMgrUB1chf5kgSwQ9QPUmNl/rEmuQzjU9Y/jkARwhIyglKjrBoM W9xOkwpfaiD8l+EXiSYs7xAz+2ZOCCkxw==
  • Ironport-hdrordr: A9a23:A3HMX6m+NAvlpqcq3i4RoEEn1/TpDfODimdD5ihNYBxZY6Wkfp +V8sjzhCWatN9OYh0dcIi7SdW9qXO1z+8Q3WGIVY3SEjUOy1HYU72KirGSggEIeheOudK1sJ 0AT0EQMqyJMbEXt7eZ3OD8Kadc/DDlytHpuQ699QYXcegCUcgJhG0Vanf5LqQ1fng9OXNQLu vH2iMtnUvGRZ1jVLXDOpBzZZmkmzSkruOCXTc2QzocrCWehzKh77D3VzKC2A0Fbj9JybA+tU DYjg3Q/MyYwrKG4y6Z81WWw4VdmdPnxNcGLteLkNIpJjLljRvtTJh9WoeFoCs+rIiUmRQXeZ j30lId1vZImjTsl1KO0F3QMs7boW8TAkrZuBulaL3Y0JTErXwBepF8bMliA2XkAgIbzaBBOe Rwrj+kXtNsfGP9tTW46N7SWx5wkE2o5XIkjO4IlnRaFZATcblLsOUkjQlo+bo7bWrHAbocYa JT5QDnlYJrWELfa2qcsnhkwdSqUHh2FhCaQlIassjQ1zRNhnh2w0YR2cRaxx47hd4AYogB4/ 6BPrVjlblIQMNTZaVhBP0ZSc/yDmDWWxrDPG+bPFyiHqAaPHDGrYLx/dwOlayXUY1NyIF3lI XKUVteu2J3c0XyCdeW1JkO6RzJSHXVZ0Wl9iif3ekOhlTRfsuYDcSzciFYryL7mYRtPiTyYY fHBK5r
  • Ironport-sdr: Tyvxnc8Bq5saz9L51uqLhndi0e9jT8Ll3euU3pa6NKQ4xjQw9vx1rIRJWCa0wc1ZuNKAKq3wuo MhypfAJrz2LfDM+tr6iK9r3IhvQgVUNZ0Tr/60AXsOgml+vTWv6EuLpaSy3obQCblFTv2/aPSl GzHKdKeC0hy3JNeB9wzJ7b9lYZOa5sGZKGHlYzbICDC+tm69UZT5Ptz1c7X9a6ME4y6EIGE8Yy J6hUdPk0diDBnuFfJRh1zGKCFzHjlU6Ea8H76aRD7gfW4Tc0UwLxXBRiMhpz6qflPfJd/5u/FE tMeccYntJoaaZS9KMNjYrscS
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHYHE+bJUKmznundkO+jjEyYTnVA6yMk94AgABuRQA=
  • Thread-topic: [PATCH v2 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC

On 10/02/2022 10:09, Roger Pau Monné wrote:
> On Mon, Feb 07, 2022 at 06:21:01PM +0000, Jane Malalane wrote:
>> Introduce a new per-domain creation x86 specific flag to
>> select whether hardware assisted virtualization should be used for
>> x{2}APIC.
>>
>> A per-domain option is added to xl in order to select the usage of
>> x{2}APIC hardware assisted vitualization, as well as a global
>> configuration option.
>>
>> Having all APIC interaction exit to Xen for emulation is slow and can
>> induce much overhead. Hardware can speed up x{2}APIC by running APIC
>> read/write accesses without taking a VM exit.
>>
>> Being able to disable x{2}APIC hardware assisted vitualization can be
>> useful for testing and debugging purposes.
> 
> Might be worth adding a note to the commit log in order to note that
> vmx_install_vlapic_mapping doesn't require modifications regardless of
> whether the guest has virtualize_apic_accesses enabled or not.
> 
> Setting the APIC_ACCESS_ADDR VMCS field is fine even if
> virtualize_apic_accesses is not enabled for the guest: as long as the
> feature is supported by the CPU the field will exist.
Oh right. Will add these two points.

Thanks,

Jane.

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.