Re: [PATCH] enable x2APIC without interrupt remapping under KVM

2009-07-19 Thread Ingo Molnar

* Gleb Natapov g...@redhat.com wrote:

 + if (!ret) {
 + /* IR is required if there is APIC ID  255 even when running
 +  * under KVM
 + */

Eeek.

 + if (x2apic_preenabled) {
 + panic(x2apic enabled by bios. But IR enabling failed.
 +Check that CONFIG_X86_X2APIC and CONFIG_INTR_REMAP are
 +enabled.);

We dont want to break such messages mid-line, it makes it hard to 
git-grep for them. Also, the '. But' looks weird.

Ingo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] enable x2APIC without interrupt remapping under KVM

2009-07-19 Thread Gleb Natapov
On Sun, Jul 19, 2009 at 06:27:35PM +0200, Ingo Molnar wrote:
 
 * Gleb Natapov g...@redhat.com wrote:
 
  +   if (!ret) {
  +   /* IR is required if there is APIC ID  255 even when running
  +* under KVM
  +   */
 
 Eeek.
 
  +   if (x2apic_preenabled) {
  +   panic(x2apic enabled by bios. But IR enabling failed.
  +  Check that CONFIG_X86_X2APIC and CONFIG_INTR_REMAP are
  +  enabled.);
 
 We dont want to break such messages mid-line, it makes it hard to 
 git-grep for them. Also, the '. But' looks weird.

So what should I do? Make really long line?

--
Gleb.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] enable x2APIC without interrupt remapping under KVM

2009-07-19 Thread Ingo Molnar

* Gleb Natapov g...@redhat.com wrote:

 On Sun, Jul 19, 2009 at 06:27:35PM +0200, Ingo Molnar wrote:
  
  * Gleb Natapov g...@redhat.com wrote:
  
   + if (!ret) {
   + /* IR is required if there is APIC ID  255 even when running
   +  * under KVM
   + */
  
  Eeek.
  
   + if (x2apic_preenabled) {
   + panic(x2apic enabled by bios. But IR enabling failed.
   +Check that CONFIG_X86_X2APIC and CONFIG_INTR_REMAP are
   +enabled.);
  
  We dont want to break such messages mid-line, it makes it hard to 
  git-grep for them. Also, the '. But' looks weird.
 
 So what should I do? Make really long line?

i'd suggest short ones generally, like:

x2apic: enabled by BIOS but kernel init failed.

also, referring to whether the config are enabled is a bit lame - we 
are in the kernel so we should know whether they are enabled.

Ingo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] enable x2APIC without interrupt remapping under KVM

2009-07-18 Thread Ingo Molnar

i've only got some small stylistic gripes:

 +void __init enable_IR_x2apic(void)
 +{
 + unsigned long flags;
 + struct IO_APIC_route_entry **ioapic_entries = NULL;
 + int ret, x2apic_enabled = 0;
 +
   ioapic_entries = alloc_ioapic_entries();
   if (!ioapic_entries) {
 - pr_info(Allocate ioapic_entries failed: %d\n, ret);
 - goto end;
 + pr_info(Allocate ioapic_entries failed\n);
 + goto out;

That's probably a fatal condition so perhaps a WARN() or pr_err() 
would be more appropriate.

 + ret = enable_IR();
 + if (!ret) {
 + /* IR is required if x2apic is enabled by BIOS even
 +  * when running in kvm since this indicates present
 +  * of APIC ID  255 */

please use the customary (multi-line) comment style:

  /*
   * Comment .
   * .. goes here.
   */

specified in Documentation/CodingStyle.

 + if (max_physical_apicid  255 || !kvm_para_available())
 + goto nox2apic;
 + /* without IR all CPUs can be addressed by IOAPIC/MSI
 +  * only in physical mode */

ditto.

 + x2apic_phys = 1;
 + }
  
 - pr_info(Enabled Interrupt-remapping\n);
 + x2apic_enabled = 1;
  
   if (x2apic_supported()  !x2apic_mode) {
   x2apic_mode = 1;
 @@ -1414,41 +1437,30 @@ void __init enable_IR_x2apic(void)
   pr_info(Enabled x2apic\n);
   }
  
 -end_restore:
 - if (ret)
 - /*
 -  * IR enabling failed
 -  */
 +nox2apic:
 + if (!ret) /* IR enabling failed */
   restore_IO_APIC_setup(ioapic_entries);
 -
   unmask_8259A();
   local_irq_restore(flags);
  
 -end:
 +out:
   if (ioapic_entries)
   free_ioapic_entries(ioapic_entries);
  
 - if (!ret)
 + if (x2apic_enabled)
   return;
  
 -ir_failed:
 - if (x2apic_preenabled)
 + if (x2apic_preenabled) {
 +#ifdef CONFIG_INTR_REMAP
   panic(x2apic enabled by bios. But IR enabling failed);
 - else if (cpu_has_x2apic)
 - pr_info(Not enabling x2apic,Intr-remapping\n);
  #else
 - if (!cpu_has_x2apic)
 - return;
 -
 - if (x2apic_preenabled)
   panic(x2apic enabled prior OS handover,
 -enable CONFIG_X86_X2APIC, CONFIG_INTR_REMAP);
 +  enable CONFIG_X86_X2APIC, CONFIG_INTR_REMAP);
  #endif

can this #ifdef be avoided?

 -
 - return;
 + } else if (cpu_has_x2apic)
 + pr_info(Not enabling x2apic,Intr-remapping\n);

please put a space after commas.

Thanks,

Ingo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] enable x2APIC without interrupt remapping under KVM

2009-07-10 Thread Ingo Molnar

* Gleb Natapov g...@redhat.com wrote:

 KVM would like to provide x2APIC interface to a guest without emulating
 interrupt remapping device. The reason KVM prefers guest to use x2APIC
 is that x2APIC interface is better virtualizable and provides better
 performance than mmio xAPIC interface:
 
 - msr exits are faster than mmio (no page table walk, emulation)
 - no need to read back ICR to look at the busy bit
 - one 64 bit ICR write instead of two 32 bit writes
 - shared code with the Hyper-V paravirt interface
 
 Included patch changes x2APIC enabling logic to enable it even if IR
 initialization failed, but kernel runs under KVM and no apic id is
 greater than 255 (if there is one spec requires BIOS to move to x2apic
 mode before starting an OS).
 
 Signed-off-by: Gleb Natapov g...@redhat.com
 Acked-by: Suresh Siddha suresh.b.sid...@intel.com
 ---
 
 This is the same as v5 only rebased on x86 tree (a74d2cea).

Looks good.

Small detail: please run the patch through scripts/checkpatch.pl and 
fix the complaints it has - all 3 details it points out seem like 
valid complaints to me (at a quick glance) that should be fixed.

Thanks,

Ingo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] enable x2APIC without interrupt remapping under KVM

2009-06-29 Thread Sheng Yang
On Sunday 28 June 2009 20:51:14 Gleb Natapov wrote:
  KVM would like to provide x2APIC interface to a guest without emulating
  interrupt remapping device. The reason KVM prefers guest to use x2APIC
  is that x2APIC interface is better virtualizable and provides better
  performance than mmio xAPIC interface:
 
  - msr exits are faster than mmio (no page table walk, emulation)
  - no need to read back ICR to look at the busy bit
  - one 64 bit ICR write instead of two 32 bit writes
  - shared code with the Hyper-V paravirt interface
 
  Included patch changes x2APIC enabling logic to enable it even if IR
  initialization failed, but kernel runs under KVM and no apic id is
  greater than 255 (if there is one spec requires BIOS to move to x2apic
  mode before starting an OS).
 
[Resend, sorry for html noise...]

Add Suresh here. And some comments and unclear points below.

 Signed-off-by: Gleb Natapov g...@redhat.com
  diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
  index d1430ef..7438c5c 100644
  --- a/arch/x86/Kconfig
  +++ b/arch/x86/Kconfig
  @@ -260,7 +260,7 @@ config SMP
 
  config X86_X2APIC
  bool Support x2apic
  - depends on X86_LOCAL_APIC  X86_64  INTR_REMAP
  + depends on X86_LOCAL_APIC  X86_64
  ---help---
  This enables x2apic support on CPUs that have this feature.
 

We may need to note x2apic won't work without interrupt remapping or as a 
guest in KVM here?
 
  diff --git a/arch/x86/kernel/apic/apic.c b/arch/x86/kernel/apic/apic.c
  index 8c7c042..48a63b6 100644
  --- a/arch/x86/kernel/apic/apic.c
  +++ b/arch/x86/kernel/apic/apic.c
  @@ -49,6 +49,7 @@
  #include asm/mtrr.h
  #include asm/smp.h
  #include asm/mce.h
  +#include asm/kvm_para.h
 
  unsigned int num_processors;
 
  @@ -1363,11 +1364,10 @@ void enable_x2apic(void)
  }
  #endif /* CONFIG_X86_X2APIC */
 
  -void __init enable_IR_x2apic(void)
  +int __init enable_IR(void)
  {
  #ifdef CONFIG_INTR_REMAP
  int ret;
  - unsigned long flags;
  struct IO_APIC_route_entry **ioapic_entries = NULL;
 
  ret = dmar_table_init();
  @@ -1381,11 +1381,10 @@ void __init enable_IR_x2apic(void)
  goto ir_failed;
  }
 
  -
  if (!x2apic_preenabled  skip_ioapic_setup) {
  pr_info(Skipped enabling intr-remap because of skipping 
  io-apic setup\n);
  - return;
  + goto ir_failed;
  }
 
  ioapic_entries = alloc_ioapic_entries();
  @@ -1400,22 +1399,14 @@ void __init enable_IR_x2apic(void)
  goto end;
  }
 
  - local_irq_save(flags);
  mask_IO_APIC_setup(ioapic_entries);
  - mask_8259A();
 
  ret = enable_intr_remapping(x2apic_supported());
  if (ret)
  goto end_restore;
  -

Unrelated...

 pr_info(Enabled Interrupt-remapping\n);
 
  - if (x2apic_supported()  !x2apic_mode) {
  - x2apic_mode = 1;
  - enable_x2apic();
  - pr_info(Enabled x2apic\n);
  - }
  -
  + return 1;
  end_restore:
  if (ret)
  /*
  @@ -1423,30 +1414,50 @@ end_restore:
  */
  restore_IO_APIC_setup(ioapic_entries);
 
  - unmask_8259A();
  - local_irq_restore(flags);
  -
  end:
  if (ioapic_entries)
  free_ioapic_entries(ioapic_entries);
 
  - if (!ret)
  - return;
  -
  ir_failed:
  - if (x2apic_preenabled)
  +#endif
  + return 0;
  +}
  +
  +void __init enable_IR_x2apic(void)
  +{
  + unsigned long flags;
  +
  + local_irq_save(flags);
  + mask_8259A();
  +
  + /* IR is required if x2apic is enabled by BIOS even when running in kvm
  + * since this indicates present of APIC ID  255 */
  + if (!enable_IR()  (x2apic_preenabled || !kvm_para_available()))
  + goto nox2apic;
  +

Not quite understand the comment here. Could you explain why since this 
indicates present of APIC ID  255? In another word, why enable_IR() needed 
for KVM even it would be fail at dmar_table_init()?
 
Another question is, we supposed KVM would use physical mode of x2apic, for 
IOAPIC and MSI won't support APIC ID  255. But seems not, or I miss 
something?

-- 
regards
Yang, Sheng
 

 + if (x2apic_supported()  !x2apic_mode) {
  + x2apic_mode = 1;
  + enable_x2apic();
  + pr_info(Enabled x2apic\n);
  + }
  +
  + unmask_8259A();
  + local_irq_restore(flags);
  + return;
  +
  +nox2apic:
  + unmask_8259A();
  + local_irq_restore(flags);
  +
  + if (x2apic_preenabled) {
  +#ifdef CONFIG_INTR_REMAP
  panic(x2apic enabled by bios. But IR enabling failed);
  - else if (cpu_has_x2apic)
  - pr_info(Not enabling x2apic,Intr-remapping\n);
  #else
  - if (!cpu_has_x2apic)
  - return;
  -
  - if (x2apic_preenabled)
  panic(x2apic enabled prior OS handover,
   enable CONFIG_X86_X2APIC, CONFIG_INTR_REMAP);
  #endif
  -
  + } else if (cpu_has_x2apic)
  + pr_info(Not enabling x2apic,Intr-remapping\n);
  return;
  }
 
  --
  Gleb.
  --
  To unsubscribe from this list: send the line unsubscribe kvm in
  the body of a message to majord...@vger.kernel.org
  More majordomo info at http://vger.kernel.org/majordomo-info.html
 

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] enable x2APIC without interrupt remapping under KVM

2009-06-29 Thread Gleb Natapov
On Mon, Jun 29, 2009 at 03:49:45PM +0800, Sheng Yang wrote:
  Signed-off-by: Gleb Natapov g...@redhat.com
  diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
  index d1430ef..7438c5c 100644
  --- a/arch/x86/Kconfig
  +++ b/arch/x86/Kconfig
  @@ -260,7 +260,7 @@ config SMP
 
   config X86_X2APIC
  bool Support x2apic
  -   depends on X86_LOCAL_APIC  X86_64  INTR_REMAP
  +   depends on X86_LOCAL_APIC  X86_64
  ---help---
This enables x2apic support on CPUs that have this feature.
 
 We may need to note x2apic won't work without interrupt remapping or as a 
 guest in KVM here?
Will add help text to say this.

 
  diff --git a/arch/x86/kernel/apic/apic.c b/arch/x86/kernel/apic/apic.c
  index 8c7c042..48a63b6 100644
  --- a/arch/x86/kernel/apic/apic.c
  +++ b/arch/x86/kernel/apic/apic.c
  @@ -49,6 +49,7 @@
   #include asm/mtrr.h
   #include asm/smp.h
   #include asm/mce.h
  +#include asm/kvm_para.h
 
   unsigned int num_processors;
 
  @@ -1363,11 +1364,10 @@ void enable_x2apic(void)
   }
   #endif /* CONFIG_X86_X2APIC */
 
  -void __init enable_IR_x2apic(void)
  +int __init enable_IR(void)
   {
   #ifdef CONFIG_INTR_REMAP
  int ret;
  -   unsigned long flags;
  struct IO_APIC_route_entry **ioapic_entries = NULL;
 
  ret = dmar_table_init();
  @@ -1381,11 +1381,10 @@ void __init enable_IR_x2apic(void)
  goto ir_failed;
  }
 
  -
  if (!x2apic_preenabled  skip_ioapic_setup) {
  pr_info(Skipped enabling intr-remap because of skipping 
  io-apic setup\n);
  -   return;
  +   goto ir_failed;
  }
 
  ioapic_entries = alloc_ioapic_entries();
  @@ -1400,22 +1399,14 @@ void __init enable_IR_x2apic(void)
  goto end;
  }
 
  -   local_irq_save(flags);
  mask_IO_APIC_setup(ioapic_entries);
  -   mask_8259A();
 
  ret = enable_intr_remapping(x2apic_supported());
  if (ret)
  goto end_restore;
  -
 
 Unrelated...
 
  pr_info(Enabled Interrupt-remapping\n);
 
  -   if (x2apic_supported()  !x2apic_mode) {
  -   x2apic_mode = 1;
  -   enable_x2apic();
  -   pr_info(Enabled x2apic\n);
  -   }
  -
  +   return 1;
   end_restore:
  if (ret)
  /*
  @@ -1423,30 +1414,50 @@ end_restore:
   */
  restore_IO_APIC_setup(ioapic_entries);
 
  -   unmask_8259A();
  -   local_irq_restore(flags);
  -
   end:
  if (ioapic_entries)
  free_ioapic_entries(ioapic_entries);
 
  -   if (!ret)
  -   return;
  -
   ir_failed:
  -   if (x2apic_preenabled)
  +#endif
  +   return 0;
  +}
  +
  +void __init enable_IR_x2apic(void)
  +{
  +   unsigned long flags;
  +
  +   local_irq_save(flags);
  +   mask_8259A();
  +
  +   /* IR is required if x2apic is enabled by BIOS even when running in kvm
  +* since this indicates present of APIC ID  255 */
  +   if (!enable_IR()  (x2apic_preenabled || !kvm_para_available()))
  +   goto nox2apic;
  +
 
 Not quite understand the comment here. Could you explain why since this 
 indicates present of APIC ID  255? In another word, why enable_IR() needed 
 for KVM even it would be fail at dmar_table_init()?
 
The x2APIC doc says:

  The default will be for the BIOS to pass the control to the OS with the
  local x2APICs in xAPIC mode if all x2APIC IDs reported by CPUID.0BH:EDX
  are less than 255, and in x2APIC mode if there are any logical processor
  reporting its x2APIC ID at 255 or greater.

So x2apic_preenabled will be true if there is an APIC ID greater then 255
and in this case we don't want to allow x2APIC use without IR even in KVM
for the reason you mention: IOAPIC and MSI will not be able to address
all CPUs. The reason to try to enable IR first is so that when KVM will
want to support more then 255 CPUs it will be possible to implement IR
device and use existing kernel without additional changes.

 Another question is, we supposed KVM would use physical mode of x2apic, for 
 IOAPIC and MSI won't support APIC ID  255. But seems not, or I miss 
 something?
 
Good point. The patch should be fixed to require physical mode for x2apic.
 
--
Gleb.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html