[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v10 1/2] xen+tools: Report Interrupt Controller Virtualization capabilities on x86


  • To: Jane Malalane <Jane.Malalane@xxxxxxxxxx>
  • From: George Dunlap <George.Dunlap@xxxxxxxxxx>
  • Date: Thu, 7 Jul 2022 15:04:09 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=AJwQoERK+bfaDkMb10H+k1Khi6cTZR3AJZfP05UEqEE=; b=oGIkJhF5jIEHePR66RPWn/SyzDSSZmwTrHQ4R9RgPv6JuFt4r6bae9IjrvHXfG+VY17jsCkCC0RYxrg0xJ9EG+wfxsavuXZmvfqhtAQZ0TLeq8JOKeg0vcaVZmrJqIIi4304klroJnb/0HvyIJxIvKQ+y6gRs5kNubXTqMFkijEnmelTOuvDBl6h8LuFmqPsj55eH9p+rv1218DXnwFT1bHBBKnYApTIsXEOva6S7KE9fF7YxRYtRlhkdAXnEEbLQUYp21G7/TXN2udhjb7vewfZ4uwi1gvpnxPMPvWEL27qhY8Lfii/f5ql6kLNOpBIK9CYZfmGBlq8pTs5a3gjVw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LxuHEakBIrZPHwB06uHBG0RsNEMogCaIODJ5b+RVKJBx5yXCOJEhBKUhuu1uvl0XlQiVA9dbX2jnGTXBmu+IhAZQQd2xOduMJZPrQKBvPcPx0QyR7yPF5iuywIqC3mWiFHpXGzC70v+O1MahKvIgAZdXUJm/3v+l0zB5405hqTauG9FythUyYaHXTlG8I+YmXSFYCLpgYN8D/SxxfBAB2LqBXJIWIN1Vp+Nj5bJgM+7P5+69QBnmVKYmjRkBF4i6NqHLCyqVkEElF0VpKMO+LUx5Z+LLFRELJqB2OdOwZVPUND8vdEDF3Artne2pimIXhWyxqZNJTcjQ2TSS4qrnrw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Delivery-date: Thu, 07 Jul 2022 15:04:24 +0000
  • Ironport-data: A9a23:DWyXiqjLjT1OjTZBFOJB8kouX161ZxAKZh0ujC45NGQN5FlGYwSy9 lOraxnFY6jUMyawOYxoOc7lxf41ycLVyd9lQANtqCs3E3sQ95PJD9rAJE2uNC/MIJacRU9u5 p1BM9DKdZ4/FiCN+EihOOjr8iF22azWGbD1A+WYZHwZqWOIMMsEoUsLd7kR3t446TTAPz6wh D/SnyH+EAKv0G4rbT8eu/7S9Boxsaz752tH4wQ1PK9F5gGHzyVIXc4Tfa2/ESD1E9JedgKYq 0cv710bEkfxpUpF5gaNy+6jGqEyaueOe1DI0BK6YoD66vR4jnVaPp0TabxNMy+7tx3Tx4ork IoV6sTqIesUFvakdNo1AkEw/x5WZcWqyJefSZRomZXOp6FuWyKEL8RGVCnaD6VBkgpEKTgmG cgjACIMdni+a9eem9pXfAXOavMLd6EHNKtH0p1pIKqw4fwOGfgvSI2SjTNUMatZammj0p8ya uJAAQeDYigsbDVJCAYcMcwfnt6jrTrlVQZVqFaSuaoetj27IAxZiNABMfLzU/nSH4B5ux3do WjLuWPkHhsdKdqTjyKf9W6hjfPOmiW9X58OELq/9bhhh1j7Km47UUVKEwfk56TnzBLgMz5cA xV8Fi4GgqU17kOmCPXgWRmxuFaPvwIGWsoWGOo/gO2I4vWJul/EXTZfJtJHQNcdlZAEQxst7 A6inuvKL2Ztl7LEQG3Io994qhv3Y0D5N1QqdSICCAcI/dTniIUylQ7UCMZuFravid/4Ei22x CqFxAAhg50DgMhN0L+0lXjFjCirvYPhVRMu60PcWWfNxgFzaZOhZoeowUPG9vsGJ4GcJnGDo XwFls62/O0IS5aXm0SlW/4RFbuk4/KENjz0glN1GZQlsTO39BaLQ4dU5z1vIVZzBewNczTpf Uz7tBtY4dlYO37CRaV6eZ6rAsImi63pD834V+v8Z8BLJJN2cWev/jxoI0iZ3GnvkU0luaA5J ZqfN82rCB4yCql5zTzwW+YU15cqwDwzwSXYQpWT8vi8+b+XZXrQRbJeNlKLNro99Pnc/FuT9 MtDPcyXzRkZSPf5fiTc7Y8UKxYNMGQ/Apf17cdQc4ZvPzZbJY3oMNeJqZtJRmCvt/4P/gsU1 hlRgnNl9Wc=
  • Ironport-hdrordr: A9a23:nWbIf65hs6NfY65+PwPXwWSBI+orL9Y04lQ7vn2ZFiY5TiXIra qTdaogviMc0AxhI03Jmbi7Scq9qADnhORICOgqTPqftWzd1FdAQ7sSircKrweAJ8S6zJ8k6U 4CSdkzNDSTNykdsS+S2mDRfLgdKZu8gdmVbIzlvhVQpHRRGsVdBnBCe2Om+yNNJDVuNN4cLt 6x98BHrz2vdTA8dcKgHEQIWODFupniiI/mSQRuPW9o1CC+yReTrJLqGRmR2RkTFxlVx605zG TDmwvloo2+rvCAzAPG3WO71eUWpDKh8KoCOCW/sLlWFtzesHfsWG2nYczHgNkBmpDt1L/tqq iKn/5vBbU015qbRBDJnfKk4Xid7N9p0Q6s9bbQuwqcneXpAD09EMZPnoRfb1/Q7Fchpsh11O ZR03uerIc/N2KJoM1T3am7a/n7/nDE3kbKvNRj+UC3a7FuIYN5vMga5gdYAZ0AFCX15MQuF/ RvFtjV4LJTfUmBZ37Us2FzyJj0N05DVCuuUwwHoIiYwjJWlHd2ww8Rw9EehG4J8NY4R4Nf7+ rJP6x0nPVFT9MQb6h6GOAdKPHHQVDlUFbJKiafMF7nHKYINzbErIP2+qw84KWwdJkB3PIJ6e P8uZNjxBoPkm7VeL2zNcdwg2HwqU2GLEfQ49Ab4YRlsbvhQ7euOTGfSTkV4r6dn8k=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHYTyjM9+S75qV8UU+hKsd4jxf1861zh0sA
  • Thread-topic: [PATCH v10 1/2] xen+tools: Report Interrupt Controller Virtualization capabilities on x86



On 13 Apr 2022, at 12:21, Jane Malalane <Jane.Malalane@xxxxxxxxxx> wrote:

Add XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC and
XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC to report accelerated xAPIC and
x2APIC, on x86 hardware. This is so that xAPIC and x2APIC virtualization
can subsequently be enabled on a per-domain basis.
No such features are currently implemented on AMD hardware.

HW assisted xAPIC virtualization will be reported if HW, at the
minimum, supports virtualize_apic_accesses as this feature alone means
that an access to the APIC page will cause an APIC-access VM exit. An
APIC-access VM exit provides a VMM with information about the access
causing the VM exit, unlike a regular EPT fault, thus simplifying some
internal handling.

HW assisted x2APIC virtualization will be reported if HW supports
virtualize_x2apic_mode and, at least, either apic_reg_virt or
virtual_intr_delivery. This also means that
sysctl follows the conditionals in vmx_vlapic_msr_changed().

For that purpose, also add an arch-specific "capabilities" parameter
to struct xen_sysctl_physinfo.

Note that this interface is intended to be compatible with AMD so that
AVIC support can be introduced in a future patch. Unlike Intel that
has multiple controls for APIC Virtualization, AMD has one global
'AVIC Enable' control bit, so fine-graining of APIC virtualization
control cannot be done on a common interface.

Suggested-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Signed-off-by: Jane Malalane <jane.malalane@xxxxxxxxxx>
Reviewed-by: "Roger Pau Monné" <roger.pau@xxxxxxxxxx>

Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx>

Sorry for the delay

Attachment: signature.asc
Description: Message signed with OpenPGP


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.