From patchwork Tue Jan 12 04:17:27 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Igor Druzhinin X-Patchwork-Id: 12012333 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-19.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A5B5FC433E0 for ; Tue, 12 Jan 2021 04:18:12 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 4EFB722D05 for ; Tue, 12 Jan 2021 04:18:12 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4EFB722D05 Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=citrix.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from list by lists.xenproject.org with outflank-mailman.65467.116000 (Exim 4.92) (envelope-from ) id 1kzB83-00062Y-Nc; Tue, 12 Jan 2021 04:17:59 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 65467.116000; Tue, 12 Jan 2021 04:17:59 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kzB83-00062R-KP; Tue, 12 Jan 2021 04:17:59 +0000 Received: by outflank-mailman (input) for mailman id 65467; Tue, 12 Jan 2021 04:17:58 +0000 Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kzB82-000625-B6 for xen-devel@lists.xenproject.org; Tue, 12 Jan 2021 04:17:58 +0000 Received: from esa6.hc3370-68.iphmx.com (unknown [216.71.155.175]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id d131cd43-bdbc-4a38-bd31-13ad004bc64a; Tue, 12 Jan 2021 04:17:54 +0000 (UTC) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: d131cd43-bdbc-4a38-bd31-13ad004bc64a DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1610425074; h=from:to:cc:subject:date:message-id:mime-version; bh=oIj35uounZ+rhol3JJbZuCDY/ZxNEEE5xnBrab6NsUY=; b=E0PDIKq0htX1OGUT5jsfvTjbcNJ5+hpvgmXjgEnsVnK7GDJToJ4dGycK cR3WconI6rAektHuQ8BLPGNW4H4ieMoEQD/UEYCEL8rQbYMQ5RsfDbev6 kgaHrG5A+VULgR6hPKotRJ2m0Fqn51OpUJDbranBZ4gN9eTSao1pO/niA 0=; Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none IronPort-SDR: +rMQRbnFPeyg/Dqch+yN+E/DHjW1BoiIBNk1QAJmXhyWA3ACGkjTNI5QYOcb+OR5ow5osn3RlR mZunUJWG8FZR0qE971N/fHcbqoB+Sic5J8BfFWdLv9+BJjX6XAs+J7oIzLgZfM6BL6HLAWvaaL 8rDYZGvp14JJ1C0apB1wNAth/ZZmyVSZnvXxRFsS2N17S8B/szjBKYskIAf0KEBDBeD4m2bLaz grdTRvSw+RORxxd0J7DOlTbRHGIiXIllHwTdvVv+8xqa7wfDBJszEeAMWR6W75Nhl9qCUrIU3F 3rA= X-SBRS: 5.2 X-MesageID: 35099494 X-Ironport-Server: esa6.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.79,340,1602561600"; d="scan'208";a="35099494" From: Igor Druzhinin To: CC: , , , , , , , , , , Igor Druzhinin Subject: [PATCH v2 1/2] viridian: remove implicit limit of 64 VPs per partition Date: Tue, 12 Jan 2021 04:17:27 +0000 Message-ID: <1610425048-990-1-git-send-email-igor.druzhinin@citrix.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 TLFS 7.8.1 stipulates that "a virtual processor index must be less than the maximum number of virtual processors per partition" that "can be obtained through CPUID leaf 0x40000005". Furthermore, "Requirements for Implementing the Microsoft Hypervisor Interface" defines that starting from Windows Server 2012, which allowed more than 64 CPUs to be brought up, this leaf can now contain a value -1 basically assuming the hypervisor has no restriction while 0 (that we currently expose) means the default restriction is still present. Along with the previous changes exposing ExProcessorMasks this allows a recent Windows VM with Viridian extension enabled to have more than 64 vCPUs without going into BSOD in some cases. Since we didn't expose the leaf before and to keep CPUID data consistent for incoming streams from previous Xen versions - let's keep it behind an option. Signed-off-by: Igor Druzhinin Reviewed-by: Paul Durrant Acked-by: Anthony PERARD --- Changes in v2: - expose the option in libxl --- docs/man/xl.cfg.5.pod.in | 9 ++++++++- tools/include/libxl.h | 6 ++++++ tools/libs/light/libxl_types.idl | 1 + tools/libs/light/libxl_x86.c | 4 ++++ xen/arch/x86/hvm/viridian/viridian.c | 23 +++++++++++++++++++++++ xen/include/public/hvm/params.h | 7 ++++++- 6 files changed, 48 insertions(+), 2 deletions(-) diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in index c8e017f..3467eae 100644 --- a/docs/man/xl.cfg.5.pod.in +++ b/docs/man/xl.cfg.5.pod.in @@ -2260,11 +2260,18 @@ mask. Hence this enlightenment must be specified for guests with more than 64 vCPUs if B and/or B are also specified. +=item B + +This group when set indicates to a guest that the hypervisor does not +explicitly have any limits on the number of Virtual processors a guest +is allowed to bring up. It is strongly recommended to keep this enabled +for guests with more than 64 vCPUs. + =item B This is a special value that enables the default set of groups, which is currently the B, B, B, B, -B and B groups. +B, B and B groups. =item B diff --git a/tools/include/libxl.h b/tools/include/libxl.h index 3433c95..be1e288 100644 --- a/tools/include/libxl.h +++ b/tools/include/libxl.h @@ -452,6 +452,12 @@ #define LIBXL_HAVE_VIRIDIAN_EX_PROCESSOR_MASKS 1 /* + * LIBXL_HAVE_VIRIDIAN_NO_VP_LIMIT indicates that the 'no_vp_limit' value + * is present in the viridian enlightenment enumeration. + */ +#define LIBXL_HAVE_VIRIDIAN_NO_VP_LIMIT 1 + +/* * LIBXL_HAVE_DEVICE_PCI_LIST_FREE indicates that the * libxl_device_pci_list_free() function is defined. */ diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl index 0532473..8502b29 100644 --- a/tools/libs/light/libxl_types.idl +++ b/tools/libs/light/libxl_types.idl @@ -239,6 +239,7 @@ libxl_viridian_enlightenment = Enumeration("viridian_enlightenment", [ (8, "stimer"), (9, "hcall_ipi"), (10, "ex_processor_masks"), + (11, "no_vp_limit"), ]) libxl_hdtype = Enumeration("hdtype", [ diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c index 86d2729..5c4c194 100644 --- a/tools/libs/light/libxl_x86.c +++ b/tools/libs/light/libxl_x86.c @@ -309,6 +309,7 @@ static int hvm_set_viridian_features(libxl__gc *gc, uint32_t domid, libxl_bitmap_set(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_TIME_REF_COUNT); libxl_bitmap_set(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_APIC_ASSIST); libxl_bitmap_set(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_CRASH_CTL); + libxl_bitmap_set(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_NO_VP_LIMIT); } libxl_for_each_set_bit(v, info->u.hvm.viridian_enable) { @@ -369,6 +370,9 @@ static int hvm_set_viridian_features(libxl__gc *gc, uint32_t domid, if (libxl_bitmap_test(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_EX_PROCESSOR_MASKS)) mask |= HVMPV_ex_processor_masks; + if (libxl_bitmap_test(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_NO_VP_LIMIT)) + mask |= HVMPV_no_vp_limit; + if (mask != 0 && xc_hvm_param_set(CTX->xch, domid, diff --git a/xen/arch/x86/hvm/viridian/viridian.c b/xen/arch/x86/hvm/viridian/viridian.c index ed97804..ae1ea86 100644 --- a/xen/arch/x86/hvm/viridian/viridian.c +++ b/xen/arch/x86/hvm/viridian/viridian.c @@ -209,6 +209,29 @@ void cpuid_viridian_leaves(const struct vcpu *v, uint32_t leaf, res->b = viridian_spinlock_retry_count; break; + case 5: + /* + * From "Requirements for Implementing the Microsoft Hypervisor + * Interface": + * + * "On Windows operating systems versions through Windows Server + * 2008 R2, reporting the HV#1 hypervisor interface limits + * the Windows virtual machine to a maximum of 64 VPs, regardless of + * what is reported via CPUID.40000005.EAX. + * + * Starting with Windows Server 2012 and Windows 8, if + * CPUID.40000005.EAX containsa value of -1, Windows assumes that + * the hypervisor imposes no specific limit to the number of VPs. + * In this case, Windows Server 2012 guest VMs may use more than 64 + * VPs, up to the maximum supported number of processors applicable + * to the specific Windows version being used." + * + * For compatibility we hide it behind an option. + */ + if ( viridian_feature_mask(d) & HVMPV_no_vp_limit ) + res->a = -1; + break; + case 6: /* Detected and in use hardware features. */ if ( cpu_has_vmx_virtualize_apic_accesses ) diff --git a/xen/include/public/hvm/params.h b/xen/include/public/hvm/params.h index 3b0a0f4..805f4ca 100644 --- a/xen/include/public/hvm/params.h +++ b/xen/include/public/hvm/params.h @@ -168,6 +168,10 @@ #define _HVMPV_ex_processor_masks 10 #define HVMPV_ex_processor_masks (1 << _HVMPV_ex_processor_masks) +/* Allow more than 64 VPs */ +#define _HVMPV_no_vp_limit 11 +#define HVMPV_no_vp_limit (1 << _HVMPV_no_vp_limit) + #define HVMPV_feature_mask \ (HVMPV_base_freq | \ HVMPV_no_freq | \ @@ -179,7 +183,8 @@ HVMPV_synic | \ HVMPV_stimer | \ HVMPV_hcall_ipi | \ - HVMPV_ex_processor_masks) + HVMPV_ex_processor_masks | \ + HVMPV_no_vp_limit) #endif From patchwork Tue Jan 12 04:17:28 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Igor Druzhinin X-Patchwork-Id: 12012335 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-19.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 989C8C433E0 for ; Tue, 12 Jan 2021 04:18:15 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 5891422D05 for ; Tue, 12 Jan 2021 04:18:15 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 5891422D05 Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=citrix.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from list by lists.xenproject.org with outflank-mailman.65466.115989 (Exim 4.92) (envelope-from ) id 1kzB80-000613-BP; Tue, 12 Jan 2021 04:17:56 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 65466.115989; Tue, 12 Jan 2021 04:17:56 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kzB80-00060w-7m; Tue, 12 Jan 2021 04:17:56 +0000 Received: by outflank-mailman (input) for mailman id 65466; Tue, 12 Jan 2021 04:17:55 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kzB7z-00060r-By for xen-devel@lists.xenproject.org; Tue, 12 Jan 2021 04:17:55 +0000 Received: from esa6.hc3370-68.iphmx.com (unknown [216.71.155.175]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 481c3e61-bb27-479a-a0ed-24674c65fff9; Tue, 12 Jan 2021 04:17:53 +0000 (UTC) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 481c3e61-bb27-479a-a0ed-24674c65fff9 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1610425073; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version; bh=E4vcRqGLZxmNei2A6V4OkvPIrghH0yY+J4MwHSgiLlc=; b=M6KicNHCMDBLByNjiV1JQAvZhfcOFgYKNpnbmVHYjtSLd7dRYcvsrp2r j1moHGRE7xlL41Jt1SSDPS58jWCsQu7rw/7QTSZJbC9otUX6bTppvikJT vfVlemRZvKyNU40T4DhSMrRwo+w9AP1xsApVEkhfavBKowaOLdzeNCsgb Y=; Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none IronPort-SDR: GXGFgKzyC1H9wbrWn+bvRYR1nWQCy4t8ZJ521wLBKDsifG0YYQhbVxRZJLWB82XWNnlcdGs5dL XgXtFFk8qyXWFlQSRmLJm4MCBzyxEf74yTMJXqCKZAMJcTmQe1v64NUMOxPQCog1x1JvP6Oxrr z2OSVIYbotB8EZ0i/WPLdu232B6Q9Xtmk2zca8x6RvmLAO5E0URgPr7IhMAnkmqP/2vUwsiVGO qmagfvAlzJK15JrH3CzOtwHIVNqjm/u/3fmsAOaokgCgvx8N3fRMYa9TSTifl8028IH9B9F3bK g1A= X-SBRS: 5.2 X-MesageID: 35099490 X-Ironport-Server: esa6.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.79,340,1602561600"; d="scan'208";a="35099490" From: Igor Druzhinin To: CC: , , , , , , , , , , Igor Druzhinin Subject: [PATCH v2 2/2] viridian: allow vCPU hotplug for Windows VMs Date: Tue, 12 Jan 2021 04:17:28 +0000 Message-ID: <1610425048-990-2-git-send-email-igor.druzhinin@citrix.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1610425048-990-1-git-send-email-igor.druzhinin@citrix.com> References: <1610425048-990-1-git-send-email-igor.druzhinin@citrix.com> MIME-Version: 1.0 If Viridian extensions are enabled, Windows wouldn't currently allow a hotplugged vCPU to be brought up dynamically. We need to expose a special bit to let the guest know we allow it. Hide it behind an option to stay on the safe side regarding compatibility with existing guests but nevertheless set the option on by default. Signed-off-by: Igor Druzhinin Reviewed-by: Paul Durrant Acked-by: Anthony PERARD --- Changes on v2: - hide the bit under an option and expose it in libxl --- docs/man/xl.cfg.5.pod.in | 7 ++++++- tools/include/libxl.h | 6 ++++++ tools/libs/light/libxl_types.idl | 1 + tools/libs/light/libxl_x86.c | 4 ++++ xen/arch/x86/hvm/viridian/viridian.c | 5 ++++- xen/include/public/hvm/params.h | 7 ++++++- 6 files changed, 27 insertions(+), 3 deletions(-) diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in index 3467eae..7cdb859 100644 --- a/docs/man/xl.cfg.5.pod.in +++ b/docs/man/xl.cfg.5.pod.in @@ -2267,11 +2267,16 @@ explicitly have any limits on the number of Virtual processors a guest is allowed to bring up. It is strongly recommended to keep this enabled for guests with more than 64 vCPUs. +=item B + +This set enables dynamic changes to Virtual processor states in Windows +guests effectively allowing vCPU hotplug. + =item B This is a special value that enables the default set of groups, which is currently the B, B, B, B, -B, B and B groups. +B, B, B and B groups. =item B diff --git a/tools/include/libxl.h b/tools/include/libxl.h index be1e288..7c7c541 100644 --- a/tools/include/libxl.h +++ b/tools/include/libxl.h @@ -458,6 +458,12 @@ #define LIBXL_HAVE_VIRIDIAN_NO_VP_LIMIT 1 /* + * LIBXL_HAVE_VIRIDIAN_CPU_HOTPLUG indicates that the 'cpu_hotplug' value + * is present in the viridian enlightenment enumeration. + */ +#define LIBXL_HAVE_VIRIDIAN_CPU_HOTPLUG 1 + +/* * LIBXL_HAVE_DEVICE_PCI_LIST_FREE indicates that the * libxl_device_pci_list_free() function is defined. */ diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl index 8502b29..00a8e68 100644 --- a/tools/libs/light/libxl_types.idl +++ b/tools/libs/light/libxl_types.idl @@ -240,6 +240,7 @@ libxl_viridian_enlightenment = Enumeration("viridian_enlightenment", [ (9, "hcall_ipi"), (10, "ex_processor_masks"), (11, "no_vp_limit"), + (12, "cpu_hotplug"), ]) libxl_hdtype = Enumeration("hdtype", [ diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c index 5c4c194..91a9fc7 100644 --- a/tools/libs/light/libxl_x86.c +++ b/tools/libs/light/libxl_x86.c @@ -310,6 +310,7 @@ static int hvm_set_viridian_features(libxl__gc *gc, uint32_t domid, libxl_bitmap_set(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_APIC_ASSIST); libxl_bitmap_set(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_CRASH_CTL); libxl_bitmap_set(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_NO_VP_LIMIT); + libxl_bitmap_set(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_CPU_HOTPLUG); } libxl_for_each_set_bit(v, info->u.hvm.viridian_enable) { @@ -373,6 +374,9 @@ static int hvm_set_viridian_features(libxl__gc *gc, uint32_t domid, if (libxl_bitmap_test(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_NO_VP_LIMIT)) mask |= HVMPV_no_vp_limit; + if (libxl_bitmap_test(&enlightenments, LIBXL_VIRIDIAN_ENLIGHTENMENT_CPU_HOTPLUG)) + mask |= HVMPV_cpu_hotplug; + if (mask != 0 && xc_hvm_param_set(CTX->xch, domid, diff --git a/xen/arch/x86/hvm/viridian/viridian.c b/xen/arch/x86/hvm/viridian/viridian.c index ae1ea86..b906f7b 100644 --- a/xen/arch/x86/hvm/viridian/viridian.c +++ b/xen/arch/x86/hvm/viridian/viridian.c @@ -76,6 +76,7 @@ typedef union _HV_CRASH_CTL_REG_CONTENTS } HV_CRASH_CTL_REG_CONTENTS; /* Viridian CPUID leaf 3, Hypervisor Feature Indication */ +#define CPUID3D_CPU_DYNAMIC_PARTITIONING (1 << 3) #define CPUID3D_CRASH_MSRS (1 << 10) #define CPUID3D_SINT_POLLING (1 << 17) @@ -179,8 +180,10 @@ void cpuid_viridian_leaves(const struct vcpu *v, uint32_t leaf, res->a = u.lo; res->b = u.hi; + if ( viridian_feature_mask(d) & HVMPV_cpu_hotplug ) + res->d = CPUID3D_CPU_DYNAMIC_PARTITIONING; if ( viridian_feature_mask(d) & HVMPV_crash_ctl ) - res->d = CPUID3D_CRASH_MSRS; + res->d |= CPUID3D_CRASH_MSRS; if ( viridian_feature_mask(d) & HVMPV_synic ) res->d |= CPUID3D_SINT_POLLING; diff --git a/xen/include/public/hvm/params.h b/xen/include/public/hvm/params.h index 805f4ca..c9d6e70 100644 --- a/xen/include/public/hvm/params.h +++ b/xen/include/public/hvm/params.h @@ -172,6 +172,10 @@ #define _HVMPV_no_vp_limit 11 #define HVMPV_no_vp_limit (1 << _HVMPV_no_vp_limit) +/* Enable vCPU hotplug */ +#define _HVMPV_cpu_hotplug 12 +#define HVMPV_cpu_hotplug (1 << _HVMPV_cpu_hotplug) + #define HVMPV_feature_mask \ (HVMPV_base_freq | \ HVMPV_no_freq | \ @@ -184,7 +188,8 @@ HVMPV_stimer | \ HVMPV_hcall_ipi | \ HVMPV_ex_processor_masks | \ - HVMPV_no_vp_limit) + HVMPV_no_vp_limit | \ + HVMPV_cpu_hotplug) #endif