[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v9 1/2] xen+tools: Report Interrupt Controller Virtualization capabilities on x86


  • To: Jane Malalane <jane.malalane@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Wed, 6 Apr 2022 14:56:42 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oLkZDsAwAZkFeGlkbrVjRJB9bEjwOf8d9cZYowO6s/0=; b=Bo+x6oxmSF3yoPBRhSqLBIgNU2LiHsNhTN53XnytulbSAh/rUaMkidq+lawnOqY076Vq9OLWF0UQKtfIttZPtIWQFQj66tttv01ZWuvKVL+3E1yBXdRyuNFLSS7BDN21cL+K6a3mWBUbKWqJu1xBjhdwCp17CRtcrQIVTTR/1EaPz2B5YbcUnXKe8AiXzIS+umDmSnKmeN+AW03J6eq10u9oDKKdrgT8USsrshi3A7QrMEyMRoskw3W65wQXzFBVjIWaULCb0EbBuA7S1ksPwci0gt2IGA2jMy6kfuubaQlOvq0T1jsDVKz8VCjqu6O6P2ybMu6scFcHxW0vzGZUlw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CTk9up4YJVFKwCqMWECxrYkoEfR/8hdF5/GBSqopwxegMNK0a4zbqZTjAKJ7xv3W+oFbuNkGiwCsKPDvWmpxrA7wMu4K6GfyoFXJkgECEmHbXVsJPGme20WcqAJw8A//ZLt3vk+/vdrM4bEdFrCIK8mVK+EvY5UDmKC5OberOw4rT0G5LkMWIhHoGX8dzcKkUj10oUX1hcmaeoGmX8DmK15XRRZY9CphR0y/3c2UcHJyLcXHX6Vtw+AnXcjMvOYNE2WrnA6K0emnZMgqIDlJkBz2qtxEEg51KJ+RRllGedEJuCTj/7vLXWmmpvCI6oPDrMKHWU8sOPyeneiS1ifBig==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Wei Liu <wl@xxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 06 Apr 2022 12:56:57 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 01.04.2022 12:47, Jane Malalane wrote:
> Add XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC and
> XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC to report accelerated xAPIC and
> x2APIC, on x86 hardware. This is so that xAPIC and x2APIC virtualization
> can subsequently be enabled on a per-domain basis.
> No such features are currently implemented on AMD hardware.
> 
> HW assisted xAPIC virtualization will be reported if HW, at the
> minimum, supports virtualize_apic_accesses as this feature alone means
> that an access to the APIC page will cause an APIC-access VM exit. An
> APIC-access VM exit provides a VMM with information about the access
> causing the VM exit, unlike a regular EPT fault, thus simplifying some
> internal handling.
> 
> HW assisted x2APIC virtualization will be reported if HW supports
> virtualize_x2apic_mode and, at least, either apic_reg_virt or
> virtual_intr_delivery. This also means that
> sysctl follows the conditionals in vmx_vlapic_msr_changed().
> 
> For that purpose, also add an arch-specific "capabilities" parameter
> to struct xen_sysctl_physinfo.
> 
> Note that this interface is intended to be compatible with AMD so that
> AVIC support can be introduced in a future patch. Unlike Intel that
> has multiple controls for APIC Virtualization, AMD has one global
> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
> control cannot be done on a common interface.
> 
> Suggested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> Signed-off-by: Jane Malalane <jane.malalane@xxxxxxxxxx>

Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> # hypervisor




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.