On Wed, Oct 04, 2023 at 11:40:43PM +0700, Bui Quang Minh wrote:
> On 10/4/23 13:51, Michael S. Tsirkin wrote:
> > On Tue, Sep 26, 2023 at 11:23:53PM +0700, Bui Quang Minh wrote:
> > > On 9/26/23 23:06, Bui Quang Minh wrote:
> > > 
> > > > Version 8 changes,
> > > > - Patch 2, 4:
> > > >     + Rebase to master and resolve conflicts in these 2 patches
> > > 
> > > The conflicts when rebasing is due to the commit 9926cf34de5fa15da
> > > ("target/i386: Allow elision of kvm_enable_x2apic()"). AFAIK, this commit
> > > adds kvm_enabled() before kvm_enable_x2apic() in the and (&&) expression 
> > > so
> > > that when kvm_enabled() is known to be false at the compile time
> > > (CONFIG_KVM_IS_POSSIBLE is undefined), the compiler can omit the
> > > kvm_enable_x2apic() in the and expression.
> > > 
> > > In patch 2, I simply combine the change logic in patch 2 with logic in the
> > > commit 9926cf34de5fa15da.
> > > 
> > > In patch 4, the end result of version 8 is the same as version 7. I don't
> > > think we need to add the kvm_enabled() to make the expression become
> > > 
> > >   if (kvm_enabled() && kvm_irqchip_is_split() && !kvm_enable_x2apic())
> > > 
> > > Because when CONFIG_KVM_IS_POSSIBLE is undefined, kvm_irqchip_is_split() 
> > > is
> > > known to be false at the compile time too so just keep the expression as
> > > 
> > >   if (kvm_irqchip_is_split() && !kvm_enable_x2apic())
> > > 
> > > is enough.
> > > 
> > > > git range-diff feat/tcg-x2apic-v7~5..feat/tcg-x2apic-v7
> > > feat/tcg-x2apic-v8~5..feat/tcg-x2apic-v8
> > > 
> > > 1:  c1d197a230 = 1:  f6e3918e0f i386/tcg: implement x2APIC registers MSR
> > > access
> > > 2:  dd96cb0238 ! 2:  54d44a15b6 apic: add support for x2APIC mode
> > >      @@ Commit message
> > > 
> > >        ## hw/i386/x86.c ##
> > >       @@ hw/i386/x86.c: void x86_cpus_init(X86MachineState *x86ms, int
> > > default_cpu_version)
> > >      -      * Can we support APIC ID 255 or higher?
> > >      -      *
> > >      -      * Under Xen: yes.
> > >      --     * With userspace emulated lapic: no
> > >      -+     * With userspace emulated lapic: checked later in
> > > apic_common_set_id.
> > >      -      * With KVM's in-kernel lapic: only if X2APIC API is enabled.
> > >      +      * both in-kernel lapic and X2APIC userspace API.
> > >             */
> > >      -     if (x86ms->apic_id_limit > 255 && !xen_enabled() &&
> > >      +     if (x86ms->apic_id_limit > 255 && kvm_enabled() &&
> > >       -        (!kvm_irqchip_in_kernel() || !kvm_enable_x2apic())) {
> > >       +        kvm_irqchip_in_kernel() && !kvm_enable_x2apic()) {
> > >                error_report("current -smp configuration requires kernel "
> > > 3:  31a5c555a6 = 3:  eb080d1e2c apic, i386/tcg: add x2apic transitions
> > > 4:  d78b5c43b4 ! 4:  59f028f119 intel_iommu: allow Extended Interrupt Mode
> > > when using userspace APIC
> > >      @@ hw/i386/intel_iommu.c: static bool 
> > > vtd_decide_config(IntelIOMMUState
> > > *s, Error *
> > >       -            error_setg(errp, "eim=on requires
> > > accel=kvm,kernel-irqchip=split");
> > >       -            return false;
> > >       -        }
> > >      --        if (!kvm_enable_x2apic()) {
> > >      +-        if (kvm_enabled() && !kvm_enable_x2apic()) {
> > >       +        if (kvm_irqchip_is_split() && !kvm_enable_x2apic()) {
> > >                    error_setg(errp, "eim=on requires support on the KVM 
> > > side"
> > >                                     "(X2APIC_API, first shipped in 
> > > v4.7)");
> > > 5:  51f558035d = 5:  bc95c3cb60 amd_iommu: report x2APIC support to the
> > > operating system
> > > 
> > > As the change is minor and does not change the main logic, I keep the
> > > Reviewed-by and Acked-by tags.
> > > 
> > > Thank you,
> > > Quang Minh.
> > 
> > 
> > 
> > Causes some build failures:
> > 
> > https://gitlab.com/mstredhat/qemu/-/jobs/5216377483
> > /builds/mstredhat/qemu/build/../hw/intc/apic.c:1023: undefined reference to 
> > `raise_exception_ra'
> 
> raise_exception_ra is tcg specific so the builds are failed as tcg is
> disabled. I will remove the use of raise_exception_ra, the invalid register
> read just returns 0, invalid register write has no effect without raising
> the exception anymore. The APIC state invalid transition does not raise
> exception either, just don't change the APIC state. As a side effect, we
> fail some more KVM unit test of invalid APIC state transition, as they
> expect to catch exception in these cases. I think it's not a big problem.
> What's your opinion?
> 
> Thank you,
> Quang Minh.

Hmm.  I think this will have to be addressed somehow so people
and ci systems are not confused. Paolo any feedback?

-- 
MST


Reply via email to