On Wed, Oct 04, 2023 at 11:40:43PM +0700, Bui Quang Minh wrote: > On 10/4/23 13:51, Michael S. Tsirkin wrote: > > On Tue, Sep 26, 2023 at 11:23:53PM +0700, Bui Quang Minh wrote: > > > On 9/26/23 23:06, Bui Quang Minh wrote: > > > > > > > Version 8 changes, > > > > - Patch 2, 4: > > > > + Rebase to master and resolve conflicts in these 2 patches > > > > > > The conflicts when rebasing is due to the commit 9926cf34de5fa15da > > > ("target/i386: Allow elision of kvm_enable_x2apic()"). AFAIK, this commit > > > adds kvm_enabled() before kvm_enable_x2apic() in the and (&&) expression > > > so > > > that when kvm_enabled() is known to be false at the compile time > > > (CONFIG_KVM_IS_POSSIBLE is undefined), the compiler can omit the > > > kvm_enable_x2apic() in the and expression. > > > > > > In patch 2, I simply combine the change logic in patch 2 with logic in the > > > commit 9926cf34de5fa15da. > > > > > > In patch 4, the end result of version 8 is the same as version 7. I don't > > > think we need to add the kvm_enabled() to make the expression become > > > > > > if (kvm_enabled() && kvm_irqchip_is_split() && !kvm_enable_x2apic()) > > > > > > Because when CONFIG_KVM_IS_POSSIBLE is undefined, kvm_irqchip_is_split() > > > is > > > known to be false at the compile time too so just keep the expression as > > > > > > if (kvm_irqchip_is_split() && !kvm_enable_x2apic()) > > > > > > is enough. > > > > > > > git range-diff feat/tcg-x2apic-v7~5..feat/tcg-x2apic-v7 > > > feat/tcg-x2apic-v8~5..feat/tcg-x2apic-v8 > > > > > > 1: c1d197a230 = 1: f6e3918e0f i386/tcg: implement x2APIC registers MSR > > > access > > > 2: dd96cb0238 ! 2: 54d44a15b6 apic: add support for x2APIC mode > > > @@ Commit message > > > > > > ## hw/i386/x86.c ## > > > @@ hw/i386/x86.c: void x86_cpus_init(X86MachineState *x86ms, int > > > default_cpu_version) > > > - * Can we support APIC ID 255 or higher? > > > - * > > > - * Under Xen: yes. > > > -- * With userspace emulated lapic: no > > > -+ * With userspace emulated lapic: checked later in > > > apic_common_set_id. > > > - * With KVM's in-kernel lapic: only if X2APIC API is enabled. > > > + * both in-kernel lapic and X2APIC userspace API. > > > */ > > > - if (x86ms->apic_id_limit > 255 && !xen_enabled() && > > > + if (x86ms->apic_id_limit > 255 && kvm_enabled() && > > > - (!kvm_irqchip_in_kernel() || !kvm_enable_x2apic())) { > > > + kvm_irqchip_in_kernel() && !kvm_enable_x2apic()) { > > > error_report("current -smp configuration requires kernel " > > > 3: 31a5c555a6 = 3: eb080d1e2c apic, i386/tcg: add x2apic transitions > > > 4: d78b5c43b4 ! 4: 59f028f119 intel_iommu: allow Extended Interrupt Mode > > > when using userspace APIC > > > @@ hw/i386/intel_iommu.c: static bool > > > vtd_decide_config(IntelIOMMUState > > > *s, Error * > > > - error_setg(errp, "eim=on requires > > > accel=kvm,kernel-irqchip=split"); > > > - return false; > > > - } > > > -- if (!kvm_enable_x2apic()) { > > > +- if (kvm_enabled() && !kvm_enable_x2apic()) { > > > + if (kvm_irqchip_is_split() && !kvm_enable_x2apic()) { > > > error_setg(errp, "eim=on requires support on the KVM > > > side" > > > "(X2APIC_API, first shipped in > > > v4.7)"); > > > 5: 51f558035d = 5: bc95c3cb60 amd_iommu: report x2APIC support to the > > > operating system > > > > > > As the change is minor and does not change the main logic, I keep the > > > Reviewed-by and Acked-by tags. > > > > > > Thank you, > > > Quang Minh. > > > > > > > > Causes some build failures: > > > > https://gitlab.com/mstredhat/qemu/-/jobs/5216377483 > > /builds/mstredhat/qemu/build/../hw/intc/apic.c:1023: undefined reference to > > `raise_exception_ra' > > raise_exception_ra is tcg specific so the builds are failed as tcg is > disabled. I will remove the use of raise_exception_ra, the invalid register > read just returns 0, invalid register write has no effect without raising > the exception anymore. The APIC state invalid transition does not raise > exception either, just don't change the APIC state. As a side effect, we > fail some more KVM unit test of invalid APIC state transition, as they > expect to catch exception in these cases. I think it's not a big problem. > What's your opinion? > > Thank you, > Quang Minh.
Hmm. I think this will have to be addressed somehow so people and ci systems are not confused. Paolo any feedback? -- MST