From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paolo Bonzini Subject: Re: [PATCH v2 3/3] KVM: nVMX: Fix nested APICv Secondary CPU Controls when apicv disabled Date: Fri, 24 Nov 2017 00:57:20 +0100 Message-ID: <98a4137b-fa4e-5a6c-d503-bfd31c6cae8d@redhat.com> References: <20171122102340.7110-1-arbel.moshe@oracle.com> <20171122102340.7110-4-arbel.moshe@oracle.com> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Cc: =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , kvm list , Wanpeng Li , Idan Brown , Liran Alon , Krish Sadhukhan To: Jim Mattson , Arbel Moshe Return-path: Received: from mail-wr0-f195.google.com ([209.85.128.195]:46386 "EHLO mail-wr0-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753333AbdKWX5X (ORCPT ); Thu, 23 Nov 2017 18:57:23 -0500 Received: by mail-wr0-f195.google.com with SMTP id r2so12427806wra.13 for ; Thu, 23 Nov 2017 15:57:23 -0800 (PST) In-Reply-To: Content-Language: en-US Sender: kvm-owner@vger.kernel.org List-ID: On 22/11/2017 18:56, Jim Mattson wrote: > I don't > believe that L1 has to have lapic_in_kernel() for L0 to use the APICv > features of the hardware when running L2. Without lapic_in_kernel() the guest doesn't have the X2APIC CPUID bit and x2APIC MSRs (at least on upstream KVM, don't know if Google's userspace MSR patches can do it). Therefore it makes no sense to allow the "virtualize APIC accesses" control for L1, as the control implies the availability of the MSRs. > I'm also not sure that > Hyper-V SynIC activation for L1 has any bearing on whether or not L0 > can use the APICv features of the hardware when running L2. I agree with this. Paolo