[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC


  • To: Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • From: Jane Malalane <Jane.Malalane@xxxxxxxxxx>
  • Date: Tue, 8 Mar 2022 15:44:18 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+MZNC1mBNJULrr9PRmhLctn7ElkC1szBjzc9mYPcQDo=; b=cWKin29UIuxcEOOjWwrlleoXHxHNNiNq1Uzlqw/4AEQdv7FRhKrOkgtVpA/ZUo6QipwbwUmzXW0s5ihj8hwpeR67E4E/KmwpFmPjUdyjyWugT1JojL6alSWcAjfMihsAFVPOKTrodvf9ARD/DKHm1udQQL7tVGydt8xC9s2AVK7lcAI/Jr5qi+2bGcAQVbeY5UrerUBqYo1/EdKO/ivFkREkW46nQAaf2tQ3YNic298UjQmBBJ4sZDVPOBA91W3xh+ly3XygGwRKtJoPBkgX1einpNtTus1VPMAFRst8jr/cr7z+zewc+BzCIMR0mkgBlmAYwSKNfJiTnOpJH3tzug==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ocrOZ4uPzTcC6T2KjNX3WmYte5ednIPRnXDn9ItTUaxYo4Q7PmwLhYbnY5b4yAVa6bHhY7GOHQUSyza80wl3O+9kPxUPymuyDxYDIQ8TvWtpJYh7zwpYcVz7EK+439h/FLqu/0jVVkK/WQOKon/I0ewwP7Cvx9xjhSrshXglG8SR+Vxx9x1+zQPwKfYLnBebYH7PxbYg72Ct8cCwVLCwyEkz8HtkH8e0+bxeldqActHzWAd5NtT0yfFwvc4QKepi6Homfzi9izPZUr1XNVTZsDXhmqLwgEvyS4guqmonH5xpzWczz+lXhOLe0f5DUjW3w1Jw8atIkLiQYTw0E+2OxQ==
  • Authentication-results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, "Anthony Perard" <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, "Andrew Cooper" <Andrew.Cooper3@xxxxxxxxxx>, George Dunlap <George.Dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "Christian Lindig" <christian.lindig@xxxxxxxxxx>, David Scott <dave@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Tue, 08 Mar 2022 15:44:32 +0000
  • Ironport-data: A9a23:xUQnSa2yUvj6bVyt4/bD5Stxkn2cJEfYwER7XKvMYLTBsI5bp2EOm zBLWW3TafqONmbyct52PYvn8E5VusTUz4JmTQpppC1hF35El5HIVI+TRqvS04J+DSFhoGZPt Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0YDja++wk YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx /1jk6aITkAOG5GS285NaDppTgFXerZJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr KJCbmpXN1ba2rzwkOnTpupE36zPKOHJNYUS/FRpyTjdBPAraZvCX7/L9ZlT2zJYasVmQ6uBP pdINGAHgBLoPw0TBFsdBdUHoPqupSfiK2Nkin2Eqv9ii4TU5FMoi+W8WDbPQfSRXtlclEuco mPA/kz6DwscOdjZziCKmlqum+vOkCXTSI8UUrqi+ZZCvlqXwWACDQwMYnGyq/K5l02WVspWL gof/S9GhaQ76kGDVNT2WBy85nmesXY0RN54A+A8rgaXxcL88wufQ2QJUDNFQNgnr9MtAywn0 EeTmNHkDiApt6eaIVqf/LqJqTK5OQAOMHQPIyQDSGMt4db5p5oopgnSVdslG6mw5uAZAhmpn WrM9nJnwexO04hbjM1X4GwrnRqCgKLxSUkSwzmJHUj11SBIOa6MIJenvA2zAel7EK6VSVyIv X4hkseY7fwTAZzlqBFhUNnhD5nyua/bbWS0bUpHWsB4qm/zoyLLkZV4vWkmTHqFJProbtMAj KX7nQpKrKFeM3KxBUOcS9LgUp96pUQM+DmMaxw1UjasSsUpHONk1Hs3DaJ144wLuBJ0+U3YE c3HGftA9V5AVcxaIMOeHo/xK4MDyCEk3n/0Tpvm1Rmh2rf2TCfLFelbbwvTNblpsfjsTODpH zB3bZDiJ/J3CrGWX8Uq2dRLcQBiwYYTX/gaVPC7hsbce1E7SQnN+tfawK87epwNokimvrygw 51JYWcBkACXrSSecW2iMyk/AJuyDccXhS9qZkQEYAf3s0XPlK7ytc/zgbNsJuJ5nAGipNYpJ 8Q4lzKoXqwfGm6Zqm5GMfEQbuVKLXyWuO5HBAL8CBAXdJ98XQ3ZvNjiewrk7i4VCSSr88A5p tWdOsnzGPLvmywK4B7qVc+S
  • Ironport-hdrordr: A9a23:ZTrRfKBduowdOXnlHegFsceALOsnbusQ8zAXPh9KJyC9I/b2qy nxppgmPEfP+UossHFJo6HlBEEZKUmsuqKdkrNhQotKOzOW9ldATbsSobcKpgeAJ8SQzJ8k6U 4NSdkdNDS0NykGsS+Y2nj4Lz9D+qj9zEnAv463pB0BLXAIV0gj1XYCNu/yKDwseOAsP+tfKH Po3Ls/m9PWQwVwUi3UPAhhY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC j4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv6/VXEO0aOSAWQR4Z 3xSiQbToNOArTqDyeISC7WqkzdOfAVmibfIBGj8CPeSIfCNUwH4oJ69PNkm13imhAdVZhHod J29nPcuJxNARzamiPho9DOShFxj0Kx5WEviOgJkhVkIMAjgZJq3MUiFXluYd899ePBmfQaOf grCNuZ6OddcFucYXyctm5zwMa0VnB2GhudWEANtsGczjATxRlCvgYl7d1amm1F+IM2SpFC6e iBOqN0lKtWRstTaa5mHu8OTca+F2SISxPRN2CZJ0jhCcg8Sjjwgo+y5K9w6PCheZQOwpd3kJ PdUElAvWp3YE7qAd3m5uw8zvkMehTLYd3A8LAt23EigMyOeFPCC1z3dGwT
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHYMjUEaMoAwzVpzE69n4F8Ciyydqy1XcmAgABEiAA=
  • Thread-topic: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC

On 08/03/2022 11:38, Roger Pau Monné wrote:
> On Mon, Mar 07, 2022 at 03:06:09PM +0000, Jane Malalane wrote:
>> Introduce a new per-domain creation x86 specific flag to
>> select whether hardware assisted virtualization should be used for
>> x{2}APIC.
>>
>> A per-domain option is added to xl in order to select the usage of
>> x{2}APIC hardware assisted virtualization, as well as a global
>> configuration option.
>>
>> Having all APIC interaction exit to Xen for emulation is slow and can
>> induce much overhead. Hardware can speed up x{2}APIC by decoding the
>> APIC access and providing a VM exit with a more specific exit reason
>> than a regular EPT fault or by altogether avoiding a VM exit.
>>
>> On the other hand, being able to disable x{2}APIC hardware assisted
>> virtualization can be useful for testing and debugging purposes.
>>
>> Note: vmx_install_vlapic_mapping doesn't require modifications
>> regardless of whether the guest has "Virtualize APIC accesses" enabled
>> or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
>> as virtualize_apic_accesses is supported by the CPU.
>>
>> Suggested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>> Signed-off-by: Jane Malalane <jane.malalane@xxxxxxxxxx>
>> ---
>> CC: Wei Liu <wl@xxxxxxx>
>> CC: Anthony PERARD <anthony.perard@xxxxxxxxxx>
>> CC: Juergen Gross <jgross@xxxxxxxx>
>> CC: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>> CC: George Dunlap <george.dunlap@xxxxxxxxxx>
>> CC: Jan Beulich <jbeulich@xxxxxxxx>
>> CC: Julien Grall <julien@xxxxxxx>
>> CC: Stefano Stabellini <sstabellini@xxxxxxxxxx>
>> CC: Christian Lindig <christian.lindig@xxxxxxxxxx>
>> CC: David Scott <dave@xxxxxxxxxx>
>> CC: Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
>> CC: "Roger Pau Monné" <roger.pau@xxxxxxxxxx>
>>
>> v5:
>> * Revert v4 changes in vmx_vlapic_msr_changed(), preserving the use of
>>    the has_assisted_x{2}apic macros
>> * Following changes in assisted_x{2}apic_available definitions in
>>    patch 1, retighten conditionals for setting
>>    XEN_HVM_CPUID_APIC_ACCESS_VIRT and XEN_HVM_CPUID_X2APIC_VIRT in
>>    cpuid_hypervisor_leaves()
>>
>> v4:
>>   * Add has_assisted_x{2}apic macros and use them where appropriate
>>   * Replace CPU checks with per-domain assisted_x{2}apic control
>>     options in vmx_vlapic_msr_changed() and cpuid_hypervisor_leaves(),
>>     following edits to assisted_x{2}apic_available definitions in
>>     patch 1
>>     Note: new assisted_x{2}apic_available definitions make later
>>     cpu_has_vmx_apic_reg_virt and cpu_has_vmx_virtual_intr_delivery
>>     checks redundant in vmx_vlapic_msr_changed()
>>
>> v3:
>>   * Change info in xl.cfg to better express reality and fix
>>     capitalization of x{2}apic
>>   * Move "physinfo" variable definition to the beggining of
>>     libxl__domain_build_info_setdefault()
>>   * Reposition brackets in if statement to match libxl coding style
>>   * Shorten logic in libxl__arch_domain_build_info_setdefault()
>>   * Correct dprintk message in arch_sanitise_domain_config()
>>   * Make appropriate changes in vmx_vlapic_msr_changed() and
>>     cpuid_hypervisor_leaves() for amended "assisted_x2apic" bit
>>   * Remove unneeded parantheses
>>
>> v2:
>>   * Add a LIBXL_HAVE_ASSISTED_APIC macro
>>   * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
>>   * Add a return statement in now "int"
>>     libxl__arch_domain_build_info_setdefault()
>>   * Preserve libxl__arch_domain_build_info_setdefault 's location in
>>     libxl_create.c
>>   * Correct x{2}apic default setting logic in
>>     libxl__arch_domain_prepare_config()
>>   * Correct logic for parsing assisted_x{2}apic host/guest options in
>>     xl_parse.c and initialize them to -1 in xl.c
>>   * Use guest options directly in vmx_vlapic_msr_changed
>>   * Fix indentation of bool assisted_x{2}apic in struct hvm_domain
>>   * Add a change in xenctrl_stubs.c to pass xenctrl ABI checks
>> ---
>>   docs/man/xl.cfg.5.pod.in                | 19 +++++++++++++++++++
>>   docs/man/xl.conf.5.pod.in               | 12 ++++++++++++
>>   tools/golang/xenlight/helpers.gen.go    | 12 ++++++++++++
>>   tools/golang/xenlight/types.gen.go      |  2 ++
>>   tools/include/libxl.h                   |  7 +++++++
>>   tools/libs/light/libxl_arch.h           |  5 +++--
>>   tools/libs/light/libxl_arm.c            |  7 +++++--
>>   tools/libs/light/libxl_create.c         | 22 +++++++++++++---------
>>   tools/libs/light/libxl_types.idl        |  2 ++
>>   tools/libs/light/libxl_x86.c            | 28 ++++++++++++++++++++++++++--
>>   tools/ocaml/libs/xc/xenctrl.ml          |  2 ++
>>   tools/ocaml/libs/xc/xenctrl.mli         |  2 ++
>>   tools/ocaml/libs/xc/xenctrl_stubs.c     |  2 +-
>>   tools/xl/xl.c                           |  8 ++++++++
>>   tools/xl/xl.h                           |  2 ++
>>   tools/xl/xl_parse.c                     | 16 ++++++++++++++++
>>   xen/arch/x86/domain.c                   | 28 +++++++++++++++++++++++++++-
>>   xen/arch/x86/hvm/vmx/vmcs.c             |  4 ++++
>>   xen/arch/x86/hvm/vmx/vmx.c              | 13 ++++---------
>>   xen/arch/x86/include/asm/hvm/domain.h   |  6 ++++++
>>   xen/arch/x86/include/asm/hvm/vmx/vmcs.h |  3 +++
>>   xen/arch/x86/traps.c                    |  9 +++++----
>>   xen/include/public/arch-x86/xen.h       |  2 ++
>>   23 files changed, 183 insertions(+), 30 deletions(-)
>>
>> diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
>> index b98d161398..dcca564a23 100644
>> --- a/docs/man/xl.cfg.5.pod.in
>> +++ b/docs/man/xl.cfg.5.pod.in
>> @@ -1862,6 +1862,25 @@ firmware tables when using certain older guest 
>> Operating
>>   Systems. These tables have been superseded by newer constructs within
>>   the ACPI tables.
>>   
>> +=item B<assisted_xapic=BOOLEAN>
>> +
>> +B<(x86 only)> Enables or disables hardware assisted virtualization for
>> +xAPIC. With this option enabled, a memory-mapped APIC access will be
>> +decoded by hardware and either issue a more specific VM exit than just
>> +an EPT fault, or altogether avoid a VM exit. Notice full
>> +virtualization for xAPIC can only be achieved if hardware supports
>> +“APIC-register virtualization” and “virtual-interrupt delivery”.
> 
> You shouldn't mention “APIC-register virtualization” or
> “virtual-interrupt delivery”, as those are Intel specific options. I
> would just remove that sentence (same below).
> 
>> The
>> +default is settable via L<xl.conf(5)>.
>> +
>> +=item B<assisted_x2apic=BOOLEAN>
>> +
>> +B<(x86 only)> Enables or disables hardware assisted virtualization for
>> +x2APIC. With this option enabled, an MSR-Based APIC access will
>> +either issue a VM exit or altogether avoid one.
> 
> "With this option enabled, certain accesses to MSR APIC registers will
> avoid a VM exit into the hypervisor."
> 
>> Notice full
>> +virtualization for x2APIC can only be achieved if hardware supports
>> +“APIC-register virtualization” and “virtual-interrupt delivery”. The
>> +default is settable via L<xl.conf(5)>.
>> +
>>   =item B<nx=BOOLEAN>
>>   
>>   B<(x86 only)> Hides or exposes the No-eXecute capability. This allows a 
>> guest
>> diff --git a/docs/man/xl.conf.5.pod.in b/docs/man/xl.conf.5.pod.in
>> index df20c08137..95d136d1ea 100644
>> --- a/docs/man/xl.conf.5.pod.in
>> +++ b/docs/man/xl.conf.5.pod.in
>> @@ -107,6 +107,18 @@ Sets the default value for the C<max_grant_version> 
>> domain config value.
>>   
>>   Default: maximum grant version supported by the hypervisor.
>>   
>> +=item B<assisted_xapic=BOOLEAN>
>> +
>> +If enabled, domains will use xAPIC hardware assisted virtualization by 
>> default.
>> +
>> +Default: enabled if supported.
>> +
>> +=item B<assisted_x2apic=BOOLEAN>
>> +
>> +If enabled, domains will use x2APIC hardware assisted virtualization by 
>> default.
>> +
>> +Default: enabled if supported.
>> +
>>   =item B<vif.default.script="PATH">
>>   
>>   Configures the default hotplug script used by virtual network devices.
>> diff --git a/tools/golang/xenlight/helpers.gen.go 
>> b/tools/golang/xenlight/helpers.gen.go
>> index dd4e6c9f14..dece545ee0 100644
>> --- a/tools/golang/xenlight/helpers.gen.go
>> +++ b/tools/golang/xenlight/helpers.gen.go
>> @@ -1120,6 +1120,12 @@ x.ArchArm.Vuart = VuartType(xc.arch_arm.vuart)
>>   if err := x.ArchX86.MsrRelaxed.fromC(&xc.arch_x86.msr_relaxed);err != nil {
>>   return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
>>   }
>> +if err := x.ArchX86.AssistedXapic.fromC(&xc.arch_x86.assisted_xapic);err != 
>> nil {
>> +return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
>> +}
>> +if err := x.ArchX86.AssistedX2Apic.fromC(&xc.arch_x86.assisted_x2apic);err 
>> != nil {
>> +return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
>> +}
>>   x.Altp2M = Altp2MMode(xc.altp2m)
>>   x.VmtraceBufKb = int(xc.vmtrace_buf_kb)
>>   if err := x.Vpmu.fromC(&xc.vpmu);err != nil {
>> @@ -1605,6 +1611,12 @@ xc.arch_arm.vuart = 
>> C.libxl_vuart_type(x.ArchArm.Vuart)
>>   if err := x.ArchX86.MsrRelaxed.toC(&xc.arch_x86.msr_relaxed); err != nil {
>>   return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
>>   }
>> +if err := x.ArchX86.AssistedXapic.toC(&xc.arch_x86.assisted_xapic); err != 
>> nil {
>> +return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
>> +}
>> +if err := x.ArchX86.AssistedX2Apic.toC(&xc.arch_x86.assisted_x2apic); err 
>> != nil {
>> +return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
>> +}
>>   xc.altp2m = C.libxl_altp2m_mode(x.Altp2M)
>>   xc.vmtrace_buf_kb = C.int(x.VmtraceBufKb)
>>   if err := x.Vpmu.toC(&xc.vpmu); err != nil {
>> diff --git a/tools/golang/xenlight/types.gen.go 
>> b/tools/golang/xenlight/types.gen.go
>> index 87be46c745..253c9ad93d 100644
>> --- a/tools/golang/xenlight/types.gen.go
>> +++ b/tools/golang/xenlight/types.gen.go
>> @@ -520,6 +520,8 @@ Vuart VuartType
>>   }
>>   ArchX86 struct {
>>   MsrRelaxed Defbool
>> +AssistedXapic Defbool
>> +AssistedX2Apic Defbool
>>   }
>>   Altp2M Altp2MMode
>>   VmtraceBufKb int
>> diff --git a/tools/include/libxl.h b/tools/include/libxl.h
>> index 94e6355822..cdcccd6d01 100644
>> --- a/tools/include/libxl.h
>> +++ b/tools/include/libxl.h
>> @@ -535,6 +535,13 @@
>>   #define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
>>   
>>   /*
>> + * LIBXL_HAVE_ASSISTED_APIC indicates that libxl_domain_build_info has
>> + * assisted_xapic and assisted_x2apic fields for enabling hardware
>> + * assisted virtualization for x{2}apic per domain.
>> + */
>> +#define LIBXL_HAVE_ASSISTED_APIC 1
>> +
>> +/*
>>    * libxl ABI compatibility
>>    *
>>    * The only guarantee which libxl makes regarding ABI compatibility
>> diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
>> index 207ceac6a1..03b89929e6 100644
>> --- a/tools/libs/light/libxl_arch.h
>> +++ b/tools/libs/light/libxl_arch.h
>> @@ -71,8 +71,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc 
>> *gc,
>>                                                  libxl_domain_create_info 
>> *c_info);
>>   
>>   _hidden
>> -void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
>> -                                              libxl_domain_build_info 
>> *b_info);
>> +int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
>> +                                             libxl_domain_build_info 
>> *b_info,
>> +                                             const libxl_physinfo 
>> *physinfo);
>>   
>>   _hidden
>>   int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
>> diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
>> index 39fdca1b49..ba5b8f433f 100644
>> --- a/tools/libs/light/libxl_arm.c
>> +++ b/tools/libs/light/libxl_arm.c
>> @@ -1384,8 +1384,9 @@ void 
>> libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
>>       }
>>   }
>>   
>> -void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
>> -                                              libxl_domain_build_info 
>> *b_info)
>> +int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
>> +                                             libxl_domain_build_info 
>> *b_info,
>> +                                             const libxl_physinfo *physinfo)
>>   {
>>       /* ACPI is disabled by default */
>>       libxl_defbool_setdefault(&b_info->acpi, false);
>> @@ -1399,6 +1400,8 @@ void 
>> libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
>>       memset(&b_info->u, '\0', sizeof(b_info->u));
>>       b_info->type = LIBXL_DOMAIN_TYPE_INVALID;
>>       libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH);
>> +
>> +    return 0;
>>   }
>>   
>>   int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
>> diff --git a/tools/libs/light/libxl_create.c 
>> b/tools/libs/light/libxl_create.c
>> index 15ed021f41..88d08d7277 100644
>> --- a/tools/libs/light/libxl_create.c
>> +++ b/tools/libs/light/libxl_create.c
>> @@ -75,6 +75,7 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
>>                                           libxl_domain_build_info *b_info)
>>   {
>>       int i, rc;
>> +    libxl_physinfo info;
>>   
>>       if (b_info->type != LIBXL_DOMAIN_TYPE_HVM &&
>>           b_info->type != LIBXL_DOMAIN_TYPE_PV &&
>> @@ -264,7 +265,18 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
>>       if (!b_info->event_channels)
>>           b_info->event_channels = 1023;
>>   
>> -    libxl__arch_domain_build_info_setdefault(gc, b_info);
>> +    rc = libxl_get_physinfo(CTX, &info);
>> +    if (rc) {
>> +        LOG(ERROR, "failed to get hypervisor info");
>> +        return rc;
>> +    }
>> +
>> +    rc = libxl__arch_domain_build_info_setdefault(gc, b_info, &info);
>> +    if (rc) {
>> +        LOG(ERROR, "unable to set domain arch build info defaults");
>> +        return rc;
>> +    }
>> +
>>       libxl_defbool_setdefault(&b_info->dm_restrict, false);
>>   
>>       if (b_info->iommu_memkb == LIBXL_MEMKB_DEFAULT)
>> @@ -457,14 +469,6 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
>>       }
>>   
>>       if (b_info->max_grant_version == LIBXL_MAX_GRANT_DEFAULT) {
>> -        libxl_physinfo info;
>> -
>> -        rc = libxl_get_physinfo(CTX, &info);
>> -        if (rc) {
>> -            LOG(ERROR, "failed to get hypervisor info");
>> -            return rc;
>> -        }
>> -
>>           if (info.cap_gnttab_v2)
>>               b_info->max_grant_version = 2;
>>           else if (info.cap_gnttab_v1)
>> diff --git a/tools/libs/light/libxl_types.idl 
>> b/tools/libs/light/libxl_types.idl
>> index 42ac6c357b..db5eb0a0b3 100644
>> --- a/tools/libs/light/libxl_types.idl
>> +++ b/tools/libs/light/libxl_types.idl
>> @@ -648,6 +648,8 @@ libxl_domain_build_info = Struct("domain_build_info",[
>>                                  ("vuart", libxl_vuart_type),
>>                                 ])),
>>       ("arch_x86", Struct(None, [("msr_relaxed", libxl_defbool),
>> +                               ("assisted_xapic", libxl_defbool),
>> +                               ("assisted_x2apic", libxl_defbool),
>>                                 ])),
>>       # Alternate p2m is not bound to any architecture or guest type, as it 
>> is
>>       # supported by x86 HVM and ARM support is planned.
>> diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
>> index e0a06ecfe3..c377d13b19 100644
>> --- a/tools/libs/light/libxl_x86.c
>> +++ b/tools/libs/light/libxl_x86.c
>> @@ -23,6 +23,14 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
>>       if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed))
>>           config->arch.misc_flags |= XEN_X86_MSR_RELAXED;
>>   
>> +    if (d_config->c_info.type != LIBXL_DOMAIN_TYPE_PV)
>> +    {
>> +        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_xapic))
>> +            config->arch.misc_flags |= XEN_X86_ASSISTED_XAPIC;
>> +
>> +        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_x2apic))
>> +            config->arch.misc_flags |= XEN_X86_ASSISTED_X2APIC;
>> +    }
>>       return 0;
>>   }
>>   
>> @@ -819,11 +827,27 @@ void 
>> libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
>>   {
>>   }
>>   
>> -void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
>> -                                              libxl_domain_build_info 
>> *b_info)
>> +int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
>> +                                             libxl_domain_build_info 
>> *b_info,
>> +                                             const libxl_physinfo *physinfo)
>>   {
>>       libxl_defbool_setdefault(&b_info->acpi, true);
>>       libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false);
>> +
>> +    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
>> +        libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
>> +                             physinfo->cap_assisted_xapic);
>> +        libxl_defbool_setdefault(&b_info->arch_x86.assisted_x2apic,
>> +                             physinfo->cap_assisted_x2apic);
>> +    }
>> +
> 
> Extra newline? 'else if' should be one space after the closing
> bracket.
> 
>> +    else if (!libxl_defbool_is_default(b_info->arch_x86.assisted_xapic) ||
>> +             !libxl_defbool_is_default(b_info->arch_x86.assisted_x2apic)) {
>> +        LOG(ERROR, "Interrupt Controller Virtualization not supported for 
>> PV");
>> +        return ERROR_INVAL;
>> +    }
>> +
>> +    return 0;
>>   }
>>   
>>   int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
>> diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
>> index 21783d3622..672a11ceb6 100644
>> --- a/tools/ocaml/libs/xc/xenctrl.ml
>> +++ b/tools/ocaml/libs/xc/xenctrl.ml
>> @@ -50,6 +50,8 @@ type x86_arch_emulation_flags =
>>   
>>   type x86_arch_misc_flags =
>>      | X86_MSR_RELAXED
>> +    | X86_ASSISTED_XAPIC
>> +    | X86_ASSISTED_X2APIC
>>   
>>   type xen_x86_arch_domainconfig =
>>   {
>> diff --git a/tools/ocaml/libs/xc/xenctrl.mli 
>> b/tools/ocaml/libs/xc/xenctrl.mli
>> index af6ba3d1a0..f9a6aa3a0f 100644
>> --- a/tools/ocaml/libs/xc/xenctrl.mli
>> +++ b/tools/ocaml/libs/xc/xenctrl.mli
>> @@ -44,6 +44,8 @@ type x86_arch_emulation_flags =
>>   
>>   type x86_arch_misc_flags =
>>     | X86_MSR_RELAXED
>> +  | X86_ASSISTED_XAPIC
>> +  | X86_ASSISTED_X2APIC
>>   
>>   type xen_x86_arch_domainconfig = {
>>     emulation_flags: x86_arch_emulation_flags list;
>> diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c 
>> b/tools/ocaml/libs/xc/xenctrl_stubs.c
>> index e0d49b18d2..ecfc7125d5 100644
>> --- a/tools/ocaml/libs/xc/xenctrl_stubs.c
>> +++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
>> @@ -239,7 +239,7 @@ CAMLprim value stub_xc_domain_create(value xch, value 
>> wanted_domid, value config
>>   
>>              cfg.arch.misc_flags = ocaml_list_to_c_bitmap
>>                      /* ! x86_arch_misc_flags X86_ none */
>> -                    /* ! XEN_X86_ XEN_X86_MSR_RELAXED all */
>> +                    /* ! XEN_X86_ XEN_X86_ASSISTED_X2APIC max */
>>                      (VAL_MISC_FLAGS);
>>   
>>   #undef VAL_MISC_FLAGS
>> diff --git a/tools/xl/xl.c b/tools/xl/xl.c
>> index 2d1ec18ea3..31eb223309 100644
>> --- a/tools/xl/xl.c
>> +++ b/tools/xl/xl.c
>> @@ -57,6 +57,8 @@ int max_grant_frames = -1;
>>   int max_maptrack_frames = -1;
>>   int max_grant_version = LIBXL_MAX_GRANT_DEFAULT;
>>   libxl_domid domid_policy = INVALID_DOMID;
>> +int assisted_xapic = -1;
>> +int assisted_x2apic = -1;
>>   
>>   xentoollog_level minmsglevel = minmsglevel_default;
>>   
>> @@ -201,6 +203,12 @@ static void parse_global_config(const char *configfile,
>>       if (!xlu_cfg_get_long (config, "claim_mode", &l, 0))
>>           claim_mode = l;
>>   
>> +    if (!xlu_cfg_get_long (config, "assisted_xapic", &l, 0))
>> +        assisted_xapic = l;
>> +
>> +    if (!xlu_cfg_get_long (config, "assisted_x2apic", &l, 0))
>> +        assisted_x2apic = l;
>> +
>>       xlu_cfg_replace_string (config, "remus.default.netbufscript",
>>           &default_remus_netbufscript, 0);
>>       xlu_cfg_replace_string (config, "colo.default.proxyscript",
>> diff --git a/tools/xl/xl.h b/tools/xl/xl.h
>> index c5c4bedbdd..528deb3feb 100644
>> --- a/tools/xl/xl.h
>> +++ b/tools/xl/xl.h
>> @@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
>>   extern libxl_bitmap global_hvm_affinity_mask;
>>   extern libxl_bitmap global_pv_affinity_mask;
>>   extern libxl_domid domid_policy;
>> +extern int assisted_xapic;
>> +extern int assisted_x2apic;
>>   
>>   enum output_format {
>>       OUTPUT_FORMAT_JSON,
>> diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
>> index 117fcdcb2b..0ab9b145fe 100644
>> --- a/tools/xl/xl_parse.c
>> +++ b/tools/xl/xl_parse.c
>> @@ -1681,6 +1681,22 @@ void parse_config_data(const char *config_source,
>>           xlu_cfg_get_defbool(config, "vpt_align", &b_info->u.hvm.vpt_align, 
>> 0);
>>           xlu_cfg_get_defbool(config, "apic", &b_info->apic, 0);
>>   
>> +        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
>> +        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if 
>> present */
>> +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, 
>> assisted_xapic);
>> +        else if (!e)
>> +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
>> +        else
>> +            exit(1);
>> +
>> +        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
>> +        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if 
>> present */
>> +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, 
>> assisted_x2apic);
>> +        else if (!e)
>> +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
>> +        else
>> +            exit(1);
>> +
>>           switch (xlu_cfg_get_list(config, "viridian",
>>                                    &viridian, &num_viridian, 1))
>>           {
>> diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
>> index a5048ed654..bcca0dc900 100644
>> --- a/xen/arch/x86/domain.c
>> +++ b/xen/arch/x86/domain.c
>> @@ -619,6 +619,8 @@ int arch_sanitise_domain_config(struct 
>> xen_domctl_createdomain *config)
>>       bool hvm = config->flags & XEN_DOMCTL_CDF_hvm;
>>       bool hap = config->flags & XEN_DOMCTL_CDF_hap;
>>       bool nested_virt = config->flags & XEN_DOMCTL_CDF_nested_virt;
>> +    bool assisted_xapic = config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
>> +    bool assisted_x2apic = config->arch.misc_flags & 
>> XEN_X86_ASSISTED_X2APIC;
>>       unsigned int max_vcpus;
>>   
>>       if ( hvm ? !hvm_enabled : !IS_ENABLED(CONFIG_PV) )
>> @@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct 
>> xen_domctl_createdomain *config)
>>           }
>>       }
>>   
>> -    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
>> +    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
>> +                                     XEN_X86_ASSISTED_XAPIC |
>> +                                     XEN_X86_ASSISTED_X2APIC) )
>>       {
>>           dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
>>                   config->arch.misc_flags);
>>           return -EINVAL;
>>       }
>>   
>> +    if ( (assisted_xapic || assisted_x2apic) && !hvm )
>> +    {
>> +        dprintk(XENLOG_INFO,
>> +                "Interrupt Controller Virtualization not supported for 
>> PV\n");
>> +        return -EINVAL;
>> +    }
>> +
>> +    if ( (assisted_xapic && !assisted_xapic_available) ||
>> +         (assisted_x2apic && !assisted_x2apic_available) )
>> +    {
>> +        dprintk(XENLOG_INFO,
>> +                "Hardware assisted x%sAPIC requested but not available\n",
>> +                assisted_xapic && !assisted_xapic_available ? "" : "2");
>> +        return -EINVAL;
> 
> I think for those two you could return -ENODEV if others agree.
> 
>> +    }
>> +
>>       return 0;
>>   }
>>   
>> @@ -864,6 +884,12 @@ int arch_domain_create(struct domain *d,
>>   
>>       d->arch.msr_relaxed = config->arch.misc_flags & XEN_X86_MSR_RELAXED;
>>   
>> +    d->arch.hvm.assisted_xapic =
>> +        config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
>> +
>> +    d->arch.hvm.assisted_x2apic =
>> +        config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
>> +
>>       return 0;
>>   
>>    fail:
>> diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
>> index 06831099ed..e4503a02a7 100644
>> --- a/xen/arch/x86/hvm/vmx/vmcs.c
>> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
>> @@ -1157,6 +1157,10 @@ static int construct_vmcs(struct vcpu *v)
>>           __vmwrite(PLE_WINDOW, ple_window);
>>       }
>>   
>> +    if ( !has_assisted_xapic(v->domain) )
>> +        v->arch.hvm.vmx.secondary_exec_control &=
>> +            ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
>> +
>>       if ( cpu_has_vmx_secondary_exec_control )
>>           __vmwrite(SECONDARY_VM_EXEC_CONTROL,
>>                     v->arch.hvm.vmx.secondary_exec_control);
>> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
>> index c075370f64..949ddd684c 100644
>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>> +++ b/xen/arch/x86/hvm/vmx/vmx.c
>> @@ -3344,16 +3344,11 @@ static void vmx_install_vlapic_mapping(struct vcpu 
>> *v)
>>   
>>   void vmx_vlapic_msr_changed(struct vcpu *v)
>>   {
>> -    int virtualize_x2apic_mode;
>>       struct vlapic *vlapic = vcpu_vlapic(v);
>>       unsigned int msr;
>>   
>> -    virtualize_x2apic_mode = ( (cpu_has_vmx_apic_reg_virt ||
>> -                                cpu_has_vmx_virtual_intr_delivery) &&
>> -                               cpu_has_vmx_virtualize_x2apic_mode );
>> -
>> -    if ( !cpu_has_vmx_virtualize_apic_accesses &&
>> -         !virtualize_x2apic_mode )
>> +    if ( !has_assisted_xapic(v->domain) &&
>> +         !has_assisted_x2apic(v->domain) )
>>           return;
>>   
>>       vmx_vmcs_enter(v);
>> @@ -3363,7 +3358,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
>>       if ( !vlapic_hw_disabled(vlapic) &&
>>            (vlapic_base_address(vlapic) == APIC_DEFAULT_PHYS_BASE) )
>>       {
>> -        if ( virtualize_x2apic_mode && vlapic_x2apic_mode(vlapic) )
>> +        if ( has_assisted_x2apic(v->domain) && vlapic_x2apic_mode(vlapic) )
>>           {
>>               v->arch.hvm.vmx.secondary_exec_control |=
>>                   SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE;
>> @@ -3384,7 +3379,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
>>                   vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
>>               }
>>           }
>> -        else
>> +        else if ( has_assisted_xapic(v->domain) )
>>               v->arch.hvm.vmx.secondary_exec_control |=
>>                   SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
>>       }
>> diff --git a/xen/arch/x86/include/asm/hvm/domain.h 
>> b/xen/arch/x86/include/asm/hvm/domain.h
>> index 698455444e..92bf53483c 100644
>> --- a/xen/arch/x86/include/asm/hvm/domain.h
>> +++ b/xen/arch/x86/include/asm/hvm/domain.h
>> @@ -117,6 +117,12 @@ struct hvm_domain {
>>   
>>       bool                   is_s3_suspended;
>>   
>> +    /* xAPIC hardware assisted virtualization. */
>> +    bool                   assisted_xapic;
>> +
>> +    /* x2APIC hardware assisted virtualization. */
>> +    bool                   assisted_x2apic;
>> +
>>       /* hypervisor intercepted msix table */
>>       struct list_head       msixtbl_list;
>>   
>> diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h 
>> b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
>> index 9119aa8536..5b7d662ed7 100644
>> --- a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
>> +++ b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
>> @@ -220,6 +220,9 @@ void vmx_vmcs_reload(struct vcpu *v);
>>   #define CPU_BASED_ACTIVATE_SECONDARY_CONTROLS 0x80000000
>>   extern u32 vmx_cpu_based_exec_control;
>>   
>> +#define has_assisted_xapic(d)   ((d)->arch.hvm.assisted_xapic)
>> +#define has_assisted_x2apic(d)  ((d)->arch.hvm.assisted_x2apic)
> 
> Those macros should not be in an Intel specific header,
> arch/x86/include/asm/hvm/domain.h is likely a better place.

Actually do you think hvm.h could be better?

diff --git a/xen/arch/x86/include/asm/hvm/hvm.h 
b/xen/arch/x86/include/asm/hvm/hvm.h
index 5b7ec0cf69..65a978f670 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -373,6 +373,12 @@ int hvm_get_param(struct domain *d, uint32_t index, 
uint64_t *value);
  #define hvm_tsc_scaling_ratio(d) \
      ((d)->arch.hvm.tsc_scaling_ratio)

+#define has_assisted_xapic(d) \
+    ((d)->arch.hvm.assisted_xapic)
+
+#define has_assisted_x2apic(d) \
+    ((d)->arch.hvm.assisted_x2apic)
+
  #define hvm_get_guest_time(v) hvm_get_guest_time_fixed(v, 0)

  #define hvm_paging_enabled(v) \

Thank you,

Jane.

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.