Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp4638661pxb; Sat, 12 Feb 2022 12:24:46 -0800 (PST) X-Google-Smtp-Source: ABdhPJxTrzE3H35me/qaIy5DL4TdU5Fs0404+1HPVHEcEsLm+V6V9O0hqOHQ1OFHruyPpwKVvQ0d X-Received: by 2002:a05:6a00:1396:: with SMTP id t22mr7415621pfg.26.1644697486135; Sat, 12 Feb 2022 12:24:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644697486; cv=none; d=google.com; s=arc-20160816; b=j6wIr5lthhg39VbsuZkmm1w+1qcQNGg5OTKkgZJ24atUkLlZDuKpZmeqJxj7fyry/o gWVEtxg4qiCi4D/HO9+opguBdzMBAsxCQHYi7Uc2uVK+b69LFcSFkwT/B2O/64qKPagz rToVjOgToH5i0/Xcrg47mRn8Mdyxp9F58HB9pax+jTezTKuoQt/9aenPNUklKXB5bNHf FGLa/+Kq32rEQLz0mcieaD4X2Qi37CiL0VHD2LHh5dP5wrXr7aIZi+IVxxujatVIRjJH F084H7g7kKqAO7YBii/herCy7KbtCjID6uqAllPBZtaP1Lrb58m9bmV0yeMJIO0VTLu+ ajcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=knbguSrX3xagYUpZD20aO/zcWDU1J9IHxC/2QTmVdh0=; b=vzB0lIcJFwq6n1A1Vw1DRSgDWoygOiK41aqACHxz7Ik4FCur0v1Jo7UmJ6ryPS1iW3 rwfrLn7Obu9RqVuhdtPQfCM+fD5HHEry6dzdBGp+YxiIQKw7R5c63FIOTEntafCBjxLf FQY+sOchgw2/3XiwIq5gkPaemALGBvFbCHue3OH7qZNVZa89i1j0SfyGnwKNqa0aExRx 1EPBHIaiVVJf+woEGQFWtL7BeL1XRHbv9sKW/nw6FQ2vgJ3LNPabKkNZMzKuDRm6Vn/u acZ2cWRu+n/9bxvgJi/m1noYZ0/n5Wk6Jh2i7p7UCQ/QxpUZ9oskRI//EZqspMp0mmbM jk+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=QTnl6Tja; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m8si3405911pgk.43.2022.02.12.12.24.24; Sat, 12 Feb 2022 12:24:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=QTnl6Tja; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232742AbiBLIjY (ORCPT + 99 others); Sat, 12 Feb 2022 03:39:24 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:52096 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232712AbiBLIjX (ORCPT ); Sat, 12 Feb 2022 03:39:23 -0500 Received: from mail-oo1-xc36.google.com (mail-oo1-xc36.google.com [IPv6:2607:f8b0:4864:20::c36]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 213DE26137 for ; Sat, 12 Feb 2022 00:39:20 -0800 (PST) Received: by mail-oo1-xc36.google.com with SMTP id o128-20020a4a4486000000b003181707ed40so13077991ooa.11 for ; Sat, 12 Feb 2022 00:39:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=knbguSrX3xagYUpZD20aO/zcWDU1J9IHxC/2QTmVdh0=; b=QTnl6TjaqYf1gXjMYo2qS5Xy0BQjvXfZTfbKa9AmzM0Amqr3YLk2VXin504ONCvS4c D71CiHvHMQkMBc4NFA40dBjG6HaiGxlTqyD0jgv9VsVSErXQX2ezpCgwzAb1d/O+TQlR tN0M7EElLBsyjeEJCaLZoqBQhJ/hthGxULgvKNce6noV8UYJe24ndI4FMdxlV/NLqxUM yxgiPwY7bWqL2Jfinf0P4erYgY1JUON6gMKKtJYqcb22eoYuoHgtRWijmu0lwVTz5r4m bQRNMj0TI4O2OWCtLkj1bAqtcLZaLDMaIThdAKUvgWYh9rdv/P5EehSVP9yJSC4wb/U/ 3Lwg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=knbguSrX3xagYUpZD20aO/zcWDU1J9IHxC/2QTmVdh0=; b=pwCUaW5M7Pk78EBTO7fMpiMtl66XZYn2pAWPK8Ehd990Vr/vvPD8PewFyH3zS7/LDE iFww+jTvzWqRm/GfTokMKO6vs7iIONm+ptViDUU2Vp5aWnbxmkrR4jhtvRZg6S9Xbfzn 1qBgI+SeYnWshONLP1X27c9oJDuthpLjNVdr3QT4njQlhsjXjMLsBj7IpyUsdVhmhzq1 u38kYckhYxy7s17MVnQfyLSQPfTes1fs8fCGtPWfstCN1/rg8RoiqxuwltoUta2ChcAe DBus0V6PqDc5tZiKTrhhTOOxFMHmVbQNrBxsPKvNg/KROB0sUWcGBcnX8aPQW0xuxxqK jj+A== X-Gm-Message-State: AOAM530XeD7T5lhbef+Lo+HI3edltIx02UtzyzCrk40WSf8gTKtr5M1L 5L07YcymDOhfZWj8wGf6OqSIh6vfjX5SRlslsBmZiA== X-Received: by 2002:a05:6870:f812:: with SMTP id fr18mr1245704oab.129.1644655159211; Sat, 12 Feb 2022 00:39:19 -0800 (PST) MIME-Version: 1.0 References: <20211118130320.95997-1-likexu@tencent.com> In-Reply-To: <20211118130320.95997-1-likexu@tencent.com> From: Jim Mattson Date: Sat, 12 Feb 2022 00:39:08 -0800 Message-ID: Subject: Re: [PATCH] KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln register To: Like Xu Cc: Paolo Bonzini , Joerg Roedel , Kim Phillips , Maxim Levitsky , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 18, 2021 at 5:03 AM Like Xu wrote: > > From: Like Xu > > If we run the following perf command in an AMD Milan guest: > > perf stat \ > -e cpu/event=0x1d0/ \ > -e cpu/event=0x1c7/ \ > -e cpu/umask=0x1f,event=0x18e/ \ > -e cpu/umask=0x7,event=0x18e/ \ > -e cpu/umask=0x18,event=0x18e/ \ > ./workload > > dmesg will report a #GP warning from an unchecked MSR access > error on MSR_F15H_PERF_CTLx. > > This is because according to APM (Revision: 4.03) Figure 13-7, > the bits [35:32] of AMD PerfEvtSeln register is a part of the > event select encoding, which extends the EVENT_SELECT field > from 8 bits to 12 bits. > > Opportunistically update pmu->reserved_bits for reserved bit 19. > > Reported-by: Jim Mattson > Fixes: ca724305a2b0 ("KVM: x86/vPMU: Implement AMD vPMU code for KVM") > Signed-off-by: Like Xu > --- > arch/x86/kvm/svm/pmu.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/x86/kvm/svm/pmu.c b/arch/x86/kvm/svm/pmu.c > index 871c426ec389..b4095dfeeee6 100644 > --- a/arch/x86/kvm/svm/pmu.c > +++ b/arch/x86/kvm/svm/pmu.c > @@ -281,7 +281,7 @@ static void amd_pmu_refresh(struct kvm_vcpu *vcpu) > pmu->nr_arch_gp_counters = AMD64_NUM_COUNTERS; > > pmu->counter_bitmask[KVM_PMC_GP] = ((u64)1 << 48) - 1; > - pmu->reserved_bits = 0xffffffff00200000ull; > + pmu->reserved_bits = 0xfffffff000280000ull; Bits 40 and 41 are guest mode and host mode. They cannot be reserved if the guest supports nested SVM. > pmu->version = 1; > /* not applicable to AMD; but clean them to prevent any fall out */ > pmu->counter_bitmask[KVM_PMC_FIXED] = 0; > -- > 2.33.1 >