[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2] VT-d PI: disable VT-d PI when APICv is disabled
From the context calling pi_desc_init(), we can conclude the current implementation of VT-d PI depends on CPU-side PI. If we disable APICv but enable VT-d PI explicitly in xen boot command line, we would get an assertion failure. This patch disables VT-d PI when APICv is disabled and adds some related description to docs. Signed-off-by: Chao Gao <chao.gao@xxxxxxxxx> --- v2: - add missing S-o-b - comments changes - change bool_t to bool and move 'opt_apicv_enabled' declaration to vmcs.h --- docs/misc/xen-command-line.markdown | 6 ++++-- xen/arch/x86/hvm/vmx/vmcs.c | 2 +- xen/drivers/passthrough/vtd/iommu.c | 5 ++++- xen/include/asm-x86/hvm/vmx/vmcs.h | 2 ++ 4 files changed, 11 insertions(+), 4 deletions(-) diff --git a/docs/misc/xen-command-line.markdown b/docs/misc/xen-command-line.markdown index 44d9985..a5c261d 100644 --- a/docs/misc/xen-command-line.markdown +++ b/docs/misc/xen-command-line.markdown @@ -173,7 +173,8 @@ to boot on systems with the following errata: Permit Xen to use APIC Virtualisation Extensions. This is an optimisation available as part of VT-x, and allows hardware to take care of the guests APIC -handling, rather than requiring emulation in Xen. +handling, rather than requiring emulation in Xen. IOMMU-side interrupt posting +relies on this extensions, see **iommu** parameter below. ### apic\_verbosity > `= verbose | debug` @@ -1001,7 +1002,8 @@ debug hypervisor only). > Default: `false` >> Control the use of interrupt posting, which depends on the availability of ->> interrupt remapping. +>> interrupt remapping and CPU-side interrupt posting, which in turn requires +>> **APIC Virtualization Extensions** above is not disabled. > `qinval` (VT-d) diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c index 8103b20..61c51de 100644 --- a/xen/arch/x86/hvm/vmx/vmcs.c +++ b/xen/arch/x86/hvm/vmx/vmcs.c @@ -47,7 +47,7 @@ boolean_param("vpid", opt_vpid_enabled); static bool_t __read_mostly opt_unrestricted_guest_enabled = 1; boolean_param("unrestricted_guest", opt_unrestricted_guest_enabled); -static bool_t __read_mostly opt_apicv_enabled = 1; +bool __read_mostly opt_apicv_enabled = true; boolean_param("apicv", opt_apicv_enabled); /* diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c index 19328f6..7cdb4e0 100644 --- a/xen/drivers/passthrough/vtd/iommu.c +++ b/xen/drivers/passthrough/vtd/iommu.c @@ -32,6 +32,7 @@ #include <xen/keyhandler.h> #include <asm/msi.h> #include <asm/irq.h> +#include <asm/hvm/vmx/vmcs.h> #include <asm/hvm/vmx/vmx.h> #include <asm/p2m.h> #include <mach_apic.h> @@ -2266,8 +2267,10 @@ int __init intel_vtd_setup(void) * We cannot use posted interrupt if X86_FEATURE_CX16 is * not supported, since we count on this feature to * atomically update 16-byte IRTE in posted format. + * VT-d PI implementation relies on APICv. Thus, disable + * VT-d PI when APICv is disabled. */ - if ( !cap_intr_post(iommu->cap) || !cpu_has_cx16 ) + if ( !cap_intr_post(iommu->cap) || !cpu_has_cx16 || !opt_apicv_enabled ) iommu_intpost = 0; if ( !vtd_ept_page_compatible(iommu) ) diff --git a/xen/include/asm-x86/hvm/vmx/vmcs.h b/xen/include/asm-x86/hvm/vmx/vmcs.h index 9507bd2..48ad045 100644 --- a/xen/include/asm-x86/hvm/vmx/vmcs.h +++ b/xen/include/asm-x86/hvm/vmx/vmcs.h @@ -21,6 +21,8 @@ #include <asm/hvm/io.h> #include <irq_vectors.h> +extern bool opt_apicv_enabled; + extern void vmcs_dump_vcpu(struct vcpu *v); extern void setup_vmcs_dump(void); extern int vmx_cpu_up_prepare(unsigned int cpu); -- 1.8.3.1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |