[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v9 53/58] i386/xen: Document Xen HVM emulation
From: |
David Woodhouse |
Subject: |
[PATCH v9 53/58] i386/xen: Document Xen HVM emulation |
Date: |
Sat, 28 Jan 2023 08:11:08 +0000 |
From: David Woodhouse <dwmw@amazon.co.uk>
Signed-off-by: David Woodhouse <dwmw2@amazon.co.uk>
---
docs/system/i386/xen.rst | 50 +++++++++++++++++++++++++++++++++++++
docs/system/target-i386.rst | 1 +
2 files changed, 51 insertions(+)
create mode 100644 docs/system/i386/xen.rst
diff --git a/docs/system/i386/xen.rst b/docs/system/i386/xen.rst
new file mode 100644
index 0000000000..71506eb5c4
--- /dev/null
+++ b/docs/system/i386/xen.rst
@@ -0,0 +1,50 @@
+Xen HVM guest support
+=====================
+
+
+Description
+-----------
+
+KVM has support for hosting Xen guests, intercepting Xen hypercalls and event
+channel (Xen PV interrupt) delivery. This allows guests which expect to be
+run under Xen to be hosted in QEMU under Linux/KVM instead.
+
+Setup
+-----
+
+Xen mode is enabled by setting the ``xen-version`` property of the KVM
+accelerator to a 32-bit value in the ``XENVER_version`` form, with the Xen
+major version in the top 16 bits and the minor version in the low 16 bits,
+for example for Xen 4.10:
+
+.. parsed-literal::
+
+ |qemu_system| --accel kvm,xen-version=0x4000a
+
+Additionally, virtual APIC support can be advertised to the guest through the
+``xen-vapic`` CPU flag:
+
+.. parsed-literal::
+
+ |qemu_system| --accel kvm,xen-version=0x4000a --cpu host,+xen_vapic
+
+When Xen support is enabled, QEMU changes hypervisor identification (CPUID
+0x40000000..0x4000000A) to Xen. The KVM identification and features are not
+advertised to a Xen guest. If Hyper-V is also enabled, the Xen identification
+moves to leaves 0x40000100..0x4000010A.
+
+The Xen platform device is enabled automatically for a Xen guest. This allows
+a guest to unplug all emulated devices, in order to use Xen PV block and
network
+drivers instead. Note that until the Xen PV device back ends are enabled to
work
+with Xen mode in QEMU, that is unlikely to cause significant joy. Linux guests
+can be dissuaded from this by adding 'xen_emul_unplug=never' on their command
+line, and it can also be noted that AHCI disk controllers are exempt from being
+unplugged, as are passthrough VFIO PCI devices.
+
+OS requirements
+---------------
+
+The minimal Xen support in the KVM accelerator requires the host to be running
+Linux v5.12 or newer. Later versions add optimisations: Linux v5.17 added
+acceleration of interrupt delivery via the Xen PIRQ mechanism, and Linux v5.19
+accelerated Xen PV timers and inter-processor interrupts (IPIs).
diff --git a/docs/system/target-i386.rst b/docs/system/target-i386.rst
index e64c013077..77c2f3b979 100644
--- a/docs/system/target-i386.rst
+++ b/docs/system/target-i386.rst
@@ -27,6 +27,7 @@ Architectural features
i386/cpu
i386/hyperv
+ i386/xen
i386/kvm-pv
i386/sgx
i386/amd-memory-encryption
--
2.39.0
- [PATCH v9 18/58] i386/xen: implement HYPERVISOR_hvm_op, (continued)
- [PATCH v9 18/58] i386/xen: implement HYPERVISOR_hvm_op, David Woodhouse, 2023/01/28
- [PATCH v9 49/58] hw/xen: Add backend implementation of interdomain event channel support, David Woodhouse, 2023/01/28
- [PATCH v9 17/58] i386/xen: implement XENMEM_add_to_physmap_batch, David Woodhouse, 2023/01/28
- [PATCH v9 35/58] hw/xen: Implement EVTCHNOP_bind_interdomain, David Woodhouse, 2023/01/28
- [PATCH v9 19/58] i386/xen: implement HYPERVISOR_vcpu_op, David Woodhouse, 2023/01/28
- [PATCH v9 54/58] i386/xen: Implement HYPERVISOR_physdev_op, David Woodhouse, 2023/01/28
- [PATCH v9 06/58] i386/hvm: Set Xen vCPU ID in KVM, David Woodhouse, 2023/01/28
- [PATCH v9 20/58] i386/xen: handle VCPUOP_register_vcpu_info, David Woodhouse, 2023/01/28
- [PATCH v9 31/58] hw/xen: Implement EVTCHNOP_bind_virq, David Woodhouse, 2023/01/28
- [PATCH v9 25/58] i386/xen: implement HVMOP_set_param, David Woodhouse, 2023/01/28
- [PATCH v9 53/58] i386/xen: Document Xen HVM emulation,
David Woodhouse <=
- [PATCH v9 56/58] hw/xen: Support GSI mapping to PIRQ, David Woodhouse, 2023/01/28
- [PATCH v9 38/58] i386/xen: add monitor commands to test event injection, David Woodhouse, 2023/01/28
- [PATCH v9 58/58] kvm/i386: Add xen-evtchn-max-pirq property, David Woodhouse, 2023/01/28
- [PATCH v9 15/58] i386/xen: manage and save/restore Xen guest long_mode setting, David Woodhouse, 2023/01/28
- [PATCH v9 39/58] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_GSI callback, David Woodhouse, 2023/01/28
- [PATCH v9 36/58] hw/xen: Implement EVTCHNOP_bind_vcpu, David Woodhouse, 2023/01/28
- [PATCH v9 10/58] i386/xen: implement HYPERVISOR_xen_version, David Woodhouse, 2023/01/28
- [PATCH v9 12/58] i386/xen: Implement SCHEDOP_poll and SCHEDOP_yield, David Woodhouse, 2023/01/28
- [PATCH v9 16/58] i386/xen: implement HYPERVISOR_memory_op, David Woodhouse, 2023/01/28