Re: [PATCH v4] KVM: x86: Add x2APIC "features" to control EOI broadcast suppression
From: David Woodhouse
Date: Thu Dec 11 2025 - 19:01:38 EST
On Thu, 2025-12-11 at 10:59 +0000, Khushit Shah wrote:
>
> +Modern VMMs should either enable KVM_X2APIC_ENABLE_SUPPRESS_EOI_BROADCAST or
> +KVM_X2APIC_DISABLE_SUPPRESS_EOI_BROADCAST. If not, legacy quirky behavior will
> +be used by KVM, which is to advertise support for Suppress EOI Broadcasts but
> +not actually suppressing EOI broadcasts.
"which is to... not actually suppressing EOI broadcasts."
I think you want s/suppressing/suppress/ there.
> +
> +Currently, both KVM_X2APIC_ENABLE_SUPPRESS_EOI_BROADCAST and
I don't much like the word 'both' at the start of the sentence. It sent
my brain down a language-recognition path which thought it was about
setting both bits at the same time, and may lead to misunderstandings
or just slower parsing of the sentence.
> +KVM_X2APIC_DISABLE_SUPPRESS_EOI_BROADCAST must only be set when in split IRQCHIP
> +mode. Otherwise, the ioctl will fail with an EINVAL error.
Hm, I don't like that much. For a start, DISABLE should be fine with
the in-kernel IRQCHIP right now (and is the only behaviour that truly
makes sense right now).
And my intent was that the in-kernel I/O APIC patch gets included as
*part* of this series, otherwise we're making a semantic change to the
ENABLE behaviour later.
Also... how does userspace discover the availability of these flags?
(And if you don't include the I/O APIC patch as part of this series, we
also need to understand how userspace will later discover that ENABLE
can be applied to the in-kernel irqchip too.)
Attachment:
smime.p7s
Description: S/MIME cryptographic signature