[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN PATCH v1 01/15] x86: introduce AMD-V and Intel VT-x Kconfig options


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Sergiy Kibrik <sergiy_kibrik@xxxxxxxx>
  • Date: Fri, 19 Apr 2024 13:20:25 +0300
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=02/HFPOq031eEhL8VgnnjPiz2m+5PSS3FjnT36FmFyc=; b=SlO8lmT8fdyJpvFa0DrFAKAGiAlZ9r0PqRj6PV48ph+9ZSo8PZJ/1u7+LguBqC0w9qsvThTQ0W7oJ+e883xq3Y7kUkg3CiBasvBVyYDPzoKYoC2VJs0nCKu4WCku1OTx9d87NLHEIDVyHw/8I1J6Dyl7wS81BYzSnFhcgckKw9FHNbhW8Kky34w75PFJsubqBicj+llMK1GPkh2tXR/lswE0SRex/PloOB4KoSYSk+LqjPCtpTLGDrzJR1Lowl0iomtTf0nuw/9NP/9tMXnumI3cqeN1V+SXNOgAx53nIPesZ2dhSyDG0ncAyYU/6ou1iF8/LJQ+qetf5csSTc893w==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gsxZYNM2jqXbOremGt6mJpQzgxyyOibNbNnpuQpD/Cw7oe8rrhmPNNA0QYS+PwU+qNPhqy7/vxGD+WkWJH9tQBGgOV7Onc9RLc4IVwmekWHUI805i7Pqx4qQCxVCt1qjD29EEaOxs6QCnOoBv0iRhXpcn2++eH3r7hm0gMa6nPI14kxsri/ESlXCtXY+AznG06g7HA4DQnCVYpOq4XcF8fPe8Q3TuveCJb3j9fdLUFh0iKuzZKUqjj0sS55ktcA64au72VAOjVpdVvWzQvqykVZ6lDEMsOTqXrxCaK64PygzIHjt9dSbhtTYnVD/kR4PqMzOL4jjxvUcV3B0FmqkFw==
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Xenia Ragiadakou <xenia.ragiadakou@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Fri, 19 Apr 2024 10:20:46 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

18.04.24 14:16, Jan Beulich:
On 16.04.2024 08:20, Sergiy Kibrik wrote:
From: Xenia Ragiadakou <burzalodowa@xxxxxxxxx>

Introduce two new Kconfig options, SVM and VMX, to allow code
specific to each virtualization technology to be separated and, when not
required, stripped.
CONFIG_SVM will be used to enable virtual machine extensions on platforms that
implement the AMD Virtualization Technology (AMD-V).
CONFIG_VMX will be used to enable virtual machine extensions on platforms that
implement the Intel Virtualization Technology (Intel VT-x).

Both features depend on HVM support.

Since, at this point, disabling any of them would cause Xen to not compile,
the options are enabled by default if HVM and are not selectable by the user.

No functional change intended.

Signed-off-by: Xenia Ragiadakou <burzalodowa@xxxxxxxxx>
Signed-off-by: Sergiy Kibrik <Sergiy_Kibrik@xxxxxxxx>

In the subject tag you say v1, but I think this is a re-post? In which
case and with it having been a long time since then it would be even
more so important that a proper revision log is present in each individual
patch.


well, this patch isn't plain resend, it does have changes since rfc version (actually all of them do, hence V1 tag). Anyway, individual change log per patch would make things easier a bit, I agree.

--- a/xen/arch/x86/Kconfig
+++ b/xen/arch/x86/Kconfig
@@ -120,6 +120,12 @@ config HVM
If unsure, say Y. +config SVM
+       def_bool y if HVM
+
+config VMX
+       def_bool y if HVM

It was probably me to have requested this form, but meanwhile I've learned
(on the Linux side) that newer kconfig is capable to dealing with

config SVM
        def_bool HVM

config VMX
        def_bool HVM

quite fine (i.e. no longer leaving around useless "# CONFIG_... is not set"
when (in this case) HVM=n. Please double check with the kconfig we use
whether that's the case there, too, and simplify if so.


seems to work, thanks for pointing this out

--- a/xen/arch/x86/mm/Makefile
+++ b/xen/arch/x86/mm/Makefile
@@ -10,6 +10,7 @@ obj-$(CONFIG_MEM_SHARING) += mem_sharing.o
  obj-$(CONFIG_HVM) += nested.o
  obj-$(CONFIG_HVM) += p2m.o
  obj-y += p2m-basic.o
-obj-$(CONFIG_HVM) += p2m-ept.o p2m-pod.o p2m-pt.o
+obj-$(CONFIG_HVM) += p2m-pod.o p2m-pt.o
+obj-$(CONFIG_VMX) += p2m-ept.o

Please can these be kept in alphabetical order?


yes, sure

  -Sergiy



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.