From: Manali Shukla <manali.shukla@amd.com>
To: "Mi, Dapeng" <dapeng1.mi@linux.intel.com>, <kvm@vger.kernel.org>,
<linux-perf-users@vger.kernel.org>, <linux-doc@vger.kernel.org>
Cc: <seanjc@google.com>, <pbonzini@redhat.com>, <nikunj@amd.com>,
<bp@alien8.de>, <peterz@infradead.org>, <mingo@redhat.com>,
<mizhang@google.com>, <thomas.lendacky@amd.com>,
<ravi.bangoria@amd.com>, <Sandipan.Das@amd.com>
Subject: Re: [PATCH v1 04/11] KVM: x86: Add emulation support for Extented LVT registers
Date: Wed, 16 Jul 2025 15:40:13 +0530 [thread overview]
Message-ID: <afafc865-b42f-4a9d-82d7-a72de16bb47b@amd.com> (raw)
In-Reply-To: <3b37d820-12cd-4f33-b059-66e12693b779@linux.intel.com>
Hi Dapeng Mi,
Thanks for reviewing my patches.
On 7/15/2025 8:28 AM, Mi, Dapeng wrote:
>
> On 6/28/2025 12:25 AM, Manali Shukla wrote:
>> From: Santosh Shukla <santosh.shukla@amd.com>
>>
>> The local interrupts are extended to include more LVT registers in
>> order to allow additional interrupt sources, like Instruction Based
>> Sampling (IBS) and many more.
>>
>> Currently there are four additional LVT registers defined and they are
>> located at APIC offsets 400h-530h.
>>
>> AMD IBS driver is designed to use EXTLVT (Extended interrupt local
>> vector table) by default for driver initialization.
>>
>> Extended LVT registers are required to be emulated to initialize the
>> guest IBS driver successfully.
>>
>> Please refer to Section 16.4.5 in AMD Programmer's Manual Volume 2 at
>> https://bugzilla.kernel.org/attachment.cgi?id=306250 for more details
>> on Extended LVT.
>>
>> Signed-off-by: Santosh Shukla <santosh.shukla@amd.com>
>> Co-developed-by: Manali Shukla <manali.shukla@amd.com>
>> Signed-off-by: Manali Shukla <manali.shukla@amd.com>
>> ---
>> arch/x86/include/asm/apicdef.h | 17 +++++++++
>> arch/x86/kvm/cpuid.c | 6 +++
>> arch/x86/kvm/lapic.c | 69 +++++++++++++++++++++++++++++++++-
>> arch/x86/kvm/lapic.h | 1 +
>> arch/x86/kvm/svm/avic.c | 4 ++
>> arch/x86/kvm/svm/svm.c | 4 ++
>> 6 files changed, 99 insertions(+), 2 deletions(-)
>>
>> diff --git a/arch/x86/include/asm/apicdef.h b/arch/x86/include/asm/apicdef.h
>> index 094106b6a538..4c0f580578aa 100644
>> --- a/arch/x86/include/asm/apicdef.h
>> +++ b/arch/x86/include/asm/apicdef.h
>> @@ -146,6 +146,23 @@
>> #define APIC_EILVT_MSG_EXT 0x7
>> #define APIC_EILVT_MASKED (1 << 16)
>>
>> +/*
>> + * Initialize extended APIC registers to the default value when guest
>> + * is started and EXTAPIC feature is enabled on the guest.
>> + *
>> + * APIC_EFEAT is a read only Extended APIC feature register, whose
>> + * default value is 0x00040007. However, bits 0, 1, and 2 represent
>> + * features that are not currently emulated by KVM. Therefore, these
>> + * bits must be cleared during initialization. As a result, the
>> + * default value used for APIC_EFEAT in KVM is 0x00040000.
>> + *
>> + * APIC_ECTRL is a read-write Extended APIC control register, whose
>> + * default value is 0x0.
>> + */
>> +
>> +#define APIC_EFEAT_DEFAULT 0x00040000
>> +#define APIC_ECTRL_DEFAULT 0x0
>> +
>> #define APIC_BASE (fix_to_virt(FIX_APIC_BASE))
>> #define APIC_BASE_MSR 0x800
>> #define APIC_X2APIC_ID_MSR 0x802
>> diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c
>> index eb7be340138b..7270d22fbf31 100644
>> --- a/arch/x86/kvm/cpuid.c
>> +++ b/arch/x86/kvm/cpuid.c
>> @@ -458,6 +458,12 @@ void kvm_vcpu_after_set_cpuid(struct kvm_vcpu *vcpu)
>> /* Invoke the vendor callback only after the above state is updated. */
>> kvm_x86_call(vcpu_after_set_cpuid)(vcpu);
>>
>> + /*
>> + * Initialize extended LVT registers at guest startup to support delivery
>> + * of interrupts via the extended APIC space (offsets 0x400–0x530).
>> + */
>> + kvm_apic_init_eilvt_regs(vcpu);
>> +
>> /*
>> * Except for the MMU, which needs to do its thing any vendor specific
>> * adjustments to the reserved GPA bits.
>> diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
>> index 00ca2b0faa45..cffe44eb3f2b 100644
>> --- a/arch/x86/kvm/lapic.c
>> +++ b/arch/x86/kvm/lapic.c
>> @@ -1624,9 +1624,13 @@ static inline struct kvm_lapic *to_lapic(struct kvm_io_device *dev)
>> }
>>
>> #define APIC_REG_MASK(reg) (1ull << ((reg) >> 4))
>> +#define APIC_REG_EXT_MASK(reg) (1ull << (((reg) >> 4) - 0x40))
>
> It seems there is no difference on the MASK definition between
> APIC_REG_MASK() and APIC_REG_EXT_MASK(). Why not directly use the original
> APIC_REG_MASK()?
>
The Extended LVT registers range from 0x400 to 0x530. When using
APIC_REG_MASK(reg) with reg = 0x400 (as an example), the operation
results in a right shift of 64(0x40) bits, causing an overflow. This was
the actual reason of creating a new macro for extended APIC register space.
> BTW, If we indeed need to define this new macro, could we define the macro
> like blow?
>
> #define APIC_REG_EXT_MASK(reg) (1ull << (((reg) - 0x400) >> 4))
>
> It's more easily to understand.
>
I can define the macro in this way.
>
>> #define APIC_REGS_MASK(first, count) \
>> (APIC_REG_MASK(first) * ((1ull << (count)) - 1))
>>
>> +#define APIC_LAST_REG_OFFSET 0x3f0
>> +#define APIC_EXT_LAST_REG_OFFSET 0x530
>> +
>> u64 kvm_lapic_readable_reg_mask(struct kvm_lapic *apic)
>> {
>> /* Leave bits '0' for reserved and write-only registers. */
>> @@ -1668,6 +1672,8 @@ EXPORT_SYMBOL_GPL(kvm_lapic_readable_reg_mask);
>> static int kvm_lapic_reg_read(struct kvm_lapic *apic, u32 offset, int len,
>> void *data)
>> {
>> + u64 valid_reg_ext_mask = 0;
>> + unsigned int last_reg = APIC_LAST_REG_OFFSET;
>> unsigned char alignment = offset & 0xf;
>> u32 result;
>>
>> @@ -1677,13 +1683,44 @@ static int kvm_lapic_reg_read(struct kvm_lapic *apic, u32 offset, int len,
>> */
>> WARN_ON_ONCE(apic_x2apic_mode(apic) && offset == APIC_ICR);
>>
>> + /*
>> + * The local interrupts are extended to include LVT registers to allow
>> + * additional interrupt sources when the EXTAPIC feature bit is enabled.
>> + * The Extended Interrupt LVT registers are located at APIC offsets 400-530h.
>> + */
>> + if (guest_cpu_cap_has(apic->vcpu, X86_FEATURE_EXTAPIC)) {
>> + valid_reg_ext_mask =
>> + APIC_REG_EXT_MASK(APIC_EFEAT) |
>> + APIC_REG_EXT_MASK(APIC_ECTRL) |
>> + APIC_REG_EXT_MASK(APIC_EILVTn(0)) |
>> + APIC_REG_EXT_MASK(APIC_EILVTn(1)) |
>> + APIC_REG_EXT_MASK(APIC_EILVTn(2)) |
>> + APIC_REG_EXT_MASK(APIC_EILVTn(3));
>> + last_reg = APIC_EXT_LAST_REG_OFFSET;
>> + }
>
> Why not move this code piece into kvm_lapic_readable_reg_mask() and
> directly use APIC_REG_MASK() for these extended regs? Then we don't need to
> modify the below code.
>
>
next prev parent reply other threads:[~2025-07-16 10:10 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-06-27 16:25 [PATCH v1 00/11] Implement support for IBS virtualization Manali Shukla
2025-06-27 16:25 ` [PATCH v1 01/11] perf/amd/ibs: Fix race condition in IBS Manali Shukla
2025-06-27 16:25 ` [PATCH v1 02/11] KVM: Add KVM_GET_LAPIC_W_EXTAPIC and KVM_SET_LAPIC_W_EXTAPIC for extapic Manali Shukla
2025-07-15 2:21 ` Mi, Dapeng
2025-07-16 7:45 ` Manali Shukla
2025-06-27 16:25 ` [PATCH v1 03/11] x86/cpufeatures: Add CPUID feature bit for Extended LVT Manali Shukla
2025-06-27 16:25 ` [PATCH v1 04/11] KVM: x86: Add emulation support for Extented LVT registers Manali Shukla
2025-07-15 2:58 ` Mi, Dapeng
2025-07-16 10:10 ` Manali Shukla [this message]
2025-07-17 2:02 ` Mi, Dapeng
2025-08-01 9:33 ` Manali Shukla
2025-08-05 1:10 ` Mi, Dapeng
2025-06-27 16:25 ` [PATCH v1 05/11] x86/cpufeatures: Add CPUID feature bit for VIBS in SVM/SEV guests Manali Shukla
2025-06-27 16:25 ` [PATCH v1 06/11] KVM: x86/cpuid: Add a KVM-only leaf for IBS capabilities Manali Shukla
2025-06-27 16:25 ` [PATCH v1 07/11] KVM: x86: Extend CPUID range to include new leaf Manali Shukla
2025-06-27 16:25 ` [PATCH v1 08/11] KVM: SVM: Extend VMCB area for virtualized IBS registers Manali Shukla
2025-07-15 3:13 ` Mi, Dapeng
2025-07-16 7:40 ` Manali Shukla
2025-06-27 16:25 ` [PATCH v1 09/11] KVM: SVM: Add support for IBS Virtualization Manali Shukla
2025-06-27 16:25 ` [PATCH v1 10/11] perf/x86/amd: Enable VPMU passthrough capability for IBS PMU Manali Shukla
2025-06-27 16:25 ` [PATCH v1 11/11] perf/x86/amd: Remove exclude_guest check from perf_ibs_init() Manali Shukla
2025-07-14 11:51 ` [PATCH v1 00/11] Implement support for IBS virtualization Manali Shukla
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=afafc865-b42f-4a9d-82d7-a72de16bb47b@amd.com \
--to=manali.shukla@amd.com \
--cc=Sandipan.Das@amd.com \
--cc=bp@alien8.de \
--cc=dapeng1.mi@linux.intel.com \
--cc=kvm@vger.kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-perf-users@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=mizhang@google.com \
--cc=nikunj@amd.com \
--cc=pbonzini@redhat.com \
--cc=peterz@infradead.org \
--cc=ravi.bangoria@amd.com \
--cc=seanjc@google.com \
--cc=thomas.lendacky@amd.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).