[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC


  • To: Jane Malalane <Jane.Malalane@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 8 Mar 2022 15:41:36 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dRJbbw8RKZBUsizhXOee5Nq2pKGJMFK/bDcUUObziAw=; b=Q/GhT4/VQEyxtt/J3NTbODD5XuuU+Cj+uiKM+E7zI3rW5c4fxhr3IGWSP6TmTH66KlNgr8z7Gb6wEyi3si/YcM2/7Xp0sFSqsNDUahvZBS2lvhDnc8Ty7Tji3RgSYIJomxnQL+eS3YLYjCKOh0nCSNaBP98gVytv/Q9wG3OD8o++HXyP1xY3n/YXgoKwWXNP+SVGTZJRwbM0sQaxipW+wqpz3LMUG0OBm5t29AtFMJJDqvhAAFDhWZyF4nonhfQnbZjPDNYJnUzWLAbbv760nak43nnmkrI3Bp3R5bUfE6zmGbtbCY1c2L2+8RdaiSO5aBaBDCmcO1HhA8FOfNJPtw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=P0FrHZg8tmhoT1PXfF0Na8i+gH6HTA7MYs34R4Gcq4ra3nlbLaD6VA/bbTY7q/FSALXGnkcJb9dtSPVs/7Q9VuXtdmwQzY2KP+v9f+X447XnR9pbxKZvcy7JXQZjld17ixbk6O7eM1zPHIh68cgMyRMcKUYS0VSBuVh9/fRx5nBOnkXqXJPhtb0hbo+7GfmKqwzTK2DquZyT4NWVdqLJunlg9pEDdY7FS9akxhdocxI8cXLxD5xjqusaZPZTdtEd+Qh9Utp1J9Kbel+xwajk1acS+hBw7cQ7g1DfLeXE3aZhJmqb/3bKHKzSPoO0nFSp8/9zEel8Qe0EhFAcHMZObw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>, George Dunlap <George.Dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Christian Lindig <christian.lindig@xxxxxxxxxx>, David Scott <dave@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Delivery-date: Tue, 08 Mar 2022 14:41:48 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 08.03.2022 15:31, Jane Malalane wrote:
> On 08/03/2022 12:33, Roger Pau Monné wrote:
>> On Tue, Mar 08, 2022 at 01:24:23PM +0100, Jan Beulich wrote:
>>> On 08.03.2022 12:38, Roger Pau Monné wrote:
>>>> On Mon, Mar 07, 2022 at 03:06:09PM +0000, Jane Malalane wrote:
>>>>> @@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct 
>>>>> xen_domctl_createdomain *config)
>>>>>           }
>>>>>       }
>>>>>   
>>>>> -    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
>>>>> +    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
>>>>> +                                     XEN_X86_ASSISTED_XAPIC |
>>>>> +                                     XEN_X86_ASSISTED_X2APIC) )
>>>>>       {
>>>>>           dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
>>>>>                   config->arch.misc_flags);
>>>>>           return -EINVAL;
>>>>>       }
>>>>>   
>>>>> +    if ( (assisted_xapic || assisted_x2apic) && !hvm )
>>>>> +    {
>>>>> +        dprintk(XENLOG_INFO,
>>>>> +                "Interrupt Controller Virtualization not supported for 
>>>>> PV\n");
>>>>> +        return -EINVAL;
>>>>> +    }
>>>>> +
>>>>> +    if ( (assisted_xapic && !assisted_xapic_available) ||
>>>>> +         (assisted_x2apic && !assisted_x2apic_available) )
>>>>> +    {
>>>>> +        dprintk(XENLOG_INFO,
>>>>> +                "Hardware assisted x%sAPIC requested but not 
>>>>> available\n",
>>>>> +                assisted_xapic && !assisted_xapic_available ? "" : "2");
>>>>> +        return -EINVAL;
>>>>
>>>> I think for those two you could return -ENODEV if others agree.
>>>
>>> If by "two" you mean the xAPIC and x2APIC aspects here (and not e.g. this
>>> and the earlier if()), then I agree. I'm always in favor of using distinct
>>> error codes when possible and at least halfway sensible.
>>
>> I would be fine by using it for the !hvm if also. IMO it makes sense
>> as PV doesn't have an APIC 'device' at all, so ENODEV would seem
>> fitting. EINVAL is also fine as the caller shouldn't even attempt that
>> in the first place.
>>
>> So let's use it for the last if only.
> Wouldn't it make more sense to use -ENODEV particularly for the first? I 
> agree that -ENODEV should be reported in the first case because it 
> doesn't make sense to request acceleration of something that doesn't 
> exist and I should have put that. But having a look at the hap code 
> (since it resembles the second case), it returns -EINVAL when it is not 
> available, unless you deem this to be different or, in retrospective, 
> that the hap code should too have been coded to return -ENODEV.
> 
> if ( hap && !hvm_hap_supported() )
>      {
>          dprintk(XENLOG_INFO, "HAP requested but not available\n");
>          return -EINVAL;
>      }

This is just one of the examples where using -ENODEV as you suggest
would introduce an inconsistency. We use -EINVAL also for other
purely guest-type dependent checks.

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.