[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3a0c2542-2aa7-464b-8a09-e09e570c88da@linux.intel.com>
Date: Fri, 12 Apr 2024 14:17:38 +0800
From: "Zhang, Xiong Y" <xiong.y.zhang@...ux.intel.com>
To: Sean Christopherson <seanjc@...gle.com>
Cc: pbonzini@...hat.com, peterz@...radead.org, mizhang@...gle.com,
kan.liang@...el.com, zhenyuw@...ux.intel.com, dapeng1.mi@...ux.intel.com,
jmattson@...gle.com, kvm@...r.kernel.org, linux-perf-users@...r.kernel.org,
linux-kernel@...r.kernel.org, zhiyuan.lv@...el.com, eranian@...gle.com,
irogers@...gle.com, samantha.alt@...el.com, like.xu.linux@...il.com,
chao.gao@...el.com, Xiong Zhang <xiong.y.zhang@...el.com>
Subject: Re: [RFC PATCH 07/41] perf/x86: Add interface to reflect virtual
LVTPC_MASK bit onto HW
On 4/12/2024 3:21 AM, Sean Christopherson wrote:
> On Fri, Jan 26, 2024, Xiong Zhang wrote:
>> From: Xiong Zhang <xiong.y.zhang@...el.com>
>>
>> When guest clear LVTPC_MASK bit in guest PMI handler at PMU passthrough
>> mode, this bit should be reflected onto HW, otherwise HW couldn't generate
>> PMI again during VM running until it is cleared.
>
> This fixes a bug in the previous patch, i.e. this should not be a standalone
> patch.
>
>>
>> This commit set HW LVTPC_MASK bit at PMU vecctor switching to KVM PMI
>> vector.
>>
>> Signed-off-by: Xiong Zhang <xiong.y.zhang@...el.com>
>> Signed-off-by: Mingwei Zhang <mizhang@...gle.com>
>> ---
>> arch/x86/events/core.c | 9 +++++++--
>> arch/x86/include/asm/perf_event.h | 2 +-
>> arch/x86/kvm/lapic.h | 1 -
>> 3 files changed, 8 insertions(+), 4 deletions(-)
>>
>> diff --git a/arch/x86/events/core.c b/arch/x86/events/core.c
>> index 3f87894d8c8e..ece042cfb470 100644
>> --- a/arch/x86/events/core.c
>> +++ b/arch/x86/events/core.c
>> @@ -709,13 +709,18 @@ void perf_guest_switch_to_host_pmi_vector(void)
>> }
>> EXPORT_SYMBOL_GPL(perf_guest_switch_to_host_pmi_vector);
>>
>> -void perf_guest_switch_to_kvm_pmi_vector(void)
>> +void perf_guest_switch_to_kvm_pmi_vector(bool mask)
>> {
>> lockdep_assert_irqs_disabled();
>>
>> - apic_write(APIC_LVTPC, APIC_DM_FIXED | KVM_VPMU_VECTOR);
>> + if (mask)
>> + apic_write(APIC_LVTPC, APIC_DM_FIXED | KVM_VPMU_VECTOR |
>> + APIC_LVT_MASKED);
>> + else
>> + apic_write(APIC_LVTPC, APIC_DM_FIXED | KVM_VPMU_VECTOR);
>> }
>
> Or more simply:
>
> void perf_guest_enter(u32 guest_lvtpc)
> {
> ...
>
> apic_write(APIC_LVTPC, APIC_DM_FIXED | KVM_VPMU_VECTOR |
> (guest_lvtpc & APIC_LVT_MASKED));
> }
>
> and then on the KVM side:
>
> perf_guest_enter(kvm_lapic_get_reg(vcpu->arch.apic, APIC_LVTPC));
>
> because an in-kernel APIC should be a hard requirement for the mediated PMU.
> this is simpler and we will follow this.
thanks
Powered by blists - more mailing lists