From: "Chang S. Bae" <chang.seok.bae@intel.com>
To: Paolo Bonzini <pbonzini@redhat.com>, Dave Hansen <dave.hansen@intel.com>
Cc: <seanjc@google.com>, <kvm@vger.kernel.org>, <x86@kernel.org>,
<linux-kernel@vger.kernel.org>, <chao.gao@intel.com>
Subject: Re: [PATCH v4 06/21] x86/fpu: Ignore APX when copying from/to guest FPU
Date: Thu, 14 May 2026 19:04:08 -0700 [thread overview]
Message-ID: <ef605dbd-6594-4ddf-9274-c8ad9252f35a@intel.com> (raw)
In-Reply-To: <CABgObfZmFLDZPLEeLW5=yk8oyO8ibXr48JSVXaF7cKfz2SQw4A@mail.gmail.com>
On 5/14/2026 9:04 AM, Paolo Bonzini wrote:
>
> Separately, it's possible to avoid hardcoding APX by passing a mask
> argument to fpu_copy_uabi_to_guest_fpstate and
> fpu_copy_guest_fpstate_to_uabi. KVM can then pass
> ~(u64)XFEATURE_MASK_APX.
Yeah, that’s possible, though it also needs to ensure XSTATE_BV[APX] = 0
in the UABI buffer to avoid:
if (ustate->xsave.header.xfeatures & ~xcr0)
return -EINVAL;
V3 previously handled that on the KVM side. Then, V4 moved it to the
x86/fpu core to make the exclusion more explicit.
Another option would be simply leave the UABI XSTATE_BV untouched. But
then a few sub-optimal behavior remain:
* On UABI => kernel, APX state gets copied twice: one into VCPU regs[]
and again into guest fpstate. The latter 128B copy isn’t necessary.
* On kernel => UABI, the generic copier zeros the APX area even though
it will later be overwritten from regs[]
* On XRSTOR before VM enter, APX state restore becomes redundant since
the entry code reloads EGPRs from regs[] anyway.
That said, all of this happens on slow paths involving userspace
interactions. So unless avoiding these still keeps code clear enough,
this falls into mere optimization but with negligible practical benefit.
So perhaps patch7 could instead carry a note like:
/*
* Both functions copy APX state into each storage: VCPU regs[] and
* guest fpstate. This is redundant, but lies on a slow path with IOCTL
* handling already. Avoid additional tweaking of the generic copy
* function and userspace XSTATE_BV, in order to keep the flow
* straightforward.
*/
kvm_copy_uabi_to_vcpu_regs();
fpu_copy_uabi_to_guest_fpstate();
Thanks,
Chang
next prev parent reply other threads:[~2026-05-15 2:09 UTC|newest]
Thread overview: 30+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-05-12 1:14 [PATCH v4 00/21] KVM: x86: Enable APX for guests Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 01/21] KVM: VMX: Macrofy GPR swapping in __vmx_vcpu_run() Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 02/21] KVM: SVM: Macrofy GPR swapping in __svm_vcpu_run() Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 03/21] KVM: SEV: Macrofy GPR swapping in __svm_sev_es_vcpu_run() Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 04/21] KVM: x86: Extend VCPU registers for EGPRs Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 05/21] KVM: VMX: Save guest EGPRs in VCPU cache Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 06/21] x86/fpu: Ignore APX when copying from/to guest FPU Chang S. Bae
2026-05-13 17:42 ` Paolo Bonzini
2026-05-13 19:10 ` Dave Hansen
2026-05-14 16:04 ` Paolo Bonzini
2026-05-14 17:17 ` Dave Hansen
2026-05-14 17:33 ` Paolo Bonzini
2026-05-15 2:04 ` Chang S. Bae [this message]
2026-05-15 8:18 ` Paolo Bonzini
2026-05-12 1:14 ` [PATCH v4 07/21] KVM: x86: Support APX state for XSAVE ABI Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 08/21] KVM: VMX: Refactor VMX instruction information access Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 09/21] KVM: VMX: Refactor instruction information decoding Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 10/21] KVM: VMX: Refactor register index retrieval from exit qualification Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 11/21] KVM: VMX: Support instruction information extension Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 12/21] KVM: nVMX: Propagate the extended instruction info field Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 13/21] KVM: x86: Support EGPR accessing and tracking for emulator Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 14/21] KVM: x86: Handle EGPR index and REX2-incompatible opcodes Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 15/21] KVM: x86: Support REX2-prefixed opcode decode Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 16/21] KVM: x86: Reject EVEX-prefixed instructions Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 17/21] KVM: x86: Guard valid XCR0.APX settings Chang S. Bae
2026-05-12 1:14 ` [PATCH v4 18/21] KVM: x86: Expose APX foundation feature to guests Chang S. Bae
2026-05-12 1:15 ` [PATCH v4 19/21] KVM: x86: Expose APX sub-features " Chang S. Bae
2026-05-12 1:15 ` [PATCH v4 20/21] KVM: x86: selftests: Add APX state and ABI test Chang S. Bae
2026-05-12 1:15 ` [PATCH v4 21/21] KVM: x86: selftests: Add APX state handling and XCR0 sanity checks Chang S. Bae
2026-05-13 17:52 ` [PATCH v4 00/21] KVM: x86: Enable APX for guests Paolo Bonzini
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ef605dbd-6594-4ddf-9274-c8ad9252f35a@intel.com \
--to=chang.seok.bae@intel.com \
--cc=chao.gao@intel.com \
--cc=dave.hansen@intel.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=seanjc@google.com \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.