From nobody Mon Jan 26 07:42:00 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1769005856; cv=pass; d=zohomail.com; s=zohoarc; b=QAxRbkI9mZH1eW9XMDLX+JkmsjYkmcwZvEf09YnKn7vr+z3+uTtuI+GkUI6BdYMabYWigsSraqwQlFT5nS5WsjZk31PChPL0KgFw4S5/yL9L1FnJybFA7W2vPgLE2SdLa/na1QErYv0nMH41x7v0l9WhANTA7YQ23gfC4YdrUhU= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769005856; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=tSKGe52NO3EUM355UnfiNliL5Anqp2e0DuhAflIiAW8=; b=LSQOxAoc1gPNsGkjU6gjP/oOnGXQ/+2qKIUVMzGXkDJIaoU0ZuVJ+F7sdTagicRNgRElfBh8BzW+aL9fi62/lPEBbiDWOQkyWdlIc4ytCcXPoZGx9CdvOHd84zmytqatUVKEp3O+94++5z++jg3BY20b8wE3MGPXt/HwAOl7xX0= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1769005856901480.0874589524477; Wed, 21 Jan 2026 06:30:56 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1209826.1521732 (Exim 4.92) (envelope-from ) id 1viZDu-000796-7m; Wed, 21 Jan 2026 14:30:18 +0000 Received: by outflank-mailman (output) from mailman id 1209826.1521732; Wed, 21 Jan 2026 14:30:18 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1viZDu-00078z-4I; Wed, 21 Jan 2026 14:30:18 +0000 Received: by outflank-mailman (input) for mailman id 1209826; Wed, 21 Jan 2026 14:30:16 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1viZDs-0006vP-6g for xen-devel@lists.xenproject.org; Wed, 21 Jan 2026 14:30:16 +0000 Received: from SN4PR2101CU001.outbound.protection.outlook.com (mail-southcentralusazlp170120001.outbound.protection.outlook.com [2a01:111:f403:c10d::1]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id b1a13f4b-f6d5-11f0-9ccf-f158ae23cfc8; Wed, 21 Jan 2026 15:30:12 +0100 (CET) Received: from MN2PR07CA0022.namprd07.prod.outlook.com (2603:10b6:208:1a0::32) by SA1PR12MB8142.namprd12.prod.outlook.com (2603:10b6:806:334::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.9; Wed, 21 Jan 2026 14:30:05 +0000 Received: from BL6PEPF0001AB78.namprd02.prod.outlook.com (2603:10b6:208:1a0:cafe::35) by MN2PR07CA0022.outlook.office365.com (2603:10b6:208:1a0::32) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.10 via Frontend Transport; Wed, 21 Jan 2026 14:29:59 +0000 Received: from satlexmb07.amd.com (165.204.84.17) by BL6PEPF0001AB78.mail.protection.outlook.com (10.167.242.171) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.4 via Frontend Transport; Wed, 21 Jan 2026 14:30:04 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Wed, 21 Jan 2026 08:29:57 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: b1a13f4b-f6d5-11f0-9ccf-f158ae23cfc8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=hqadDK1Qv0i2agxIOQ5NbOvyBjAM0pujouGtyzxwBHfOxiRILh8SroAiV5vN8H6jHkJ4dGaBubsLVXeuno8cx4HqqvxGZTqla637jxzUjiYkutXpiLrUlFQ07XqZKDGFInddjeoYbDMI34H6DnEJgaY+eF4AUMhGOF9CL7E2qC7X1iAm7e0ELxORgkee17EhRKSPKksqgUOWa7z+ydjI/Ff7YBrpg564SItrNwSJA+5PmUeVsvc+k7dVV92NW7TiUWm9WgyEwbZWA5WBb9SKeeSkOka1zvEH9CdxUrQbm/jBRTdUOecP97RhUs/XCVLvxrClQvRmdneoZk1pp4wCgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tSKGe52NO3EUM355UnfiNliL5Anqp2e0DuhAflIiAW8=; b=aUf6iVIatbqoh+H0ulQ/jPX4Ov+a+sJhXDMlDAFkLOIhJVDOyR8Rgh9Wvyrq8hKprknYKY1v+rDqwVXpOsj/knE6D8W4BF8mw8PQ0/sbL/O8/b4v6VzUuXzzknk7RkGi7JhTpT9TSsEk/0T6walLE/Lq2+B37ppGfnfyFmyLmOXitcPxW7+5Qdza2u1Sm0hsy/t4N1mNcEKfc0tQkY/y6kXW8RQY9zH0l2DLAqNMa15vKSkCg3GWlGd1M+2vcyE6B0So0m4Y82aQBK/PuYoc373TrOzSeZ7TgkMP+/mw2uFivum+j6mwOWMFhVhgn35aIsK7vgI0WvKfyJaGvJdimw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tSKGe52NO3EUM355UnfiNliL5Anqp2e0DuhAflIiAW8=; b=QwX3QIvGObIckLnyr9LOrG57tJCAismjObm+E+SVUi7kUEnTiYxLgx/d9snxpNPqgnh7I7Ksg5jI2sxUpJuWNfMNfKVkiCU+3tLAulG26KHIHkxj+lRGc5Sz7L7skkLuy66RsDbwTyI6n/00SOfFDWe2KdQRGEBB9Xptb17I+XU= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Jan Beulich , Andrew Cooper , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Jason Andryuk , Teddy Astie Subject: [PATCH v2 1/3] x86/svm: Add infrastructure for Bus Lock Threshold Date: Wed, 21 Jan 2026 15:28:53 +0100 Message-ID: <20260121142857.39069-2-alejandro.garciavallejo@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260121142857.39069-1-alejandro.garciavallejo@amd.com> References: <20260121142857.39069-1-alejandro.garciavallejo@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: satlexmb08.amd.com (10.181.42.217) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF0001AB78:EE_|SA1PR12MB8142:EE_ X-MS-Office365-Filtering-Correlation-Id: 90b5902e-1054-479b-2f9b-08de58f991ba X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|1800799024|36860700013|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?qBggbYLY9aFGdpPhZXTem2aQVRZxZ3V6sW2PNRAJJc6ZN8r2HudpMDg+TuVL?= =?us-ascii?Q?UxoMLrVF0sjR3E7O/OVocH5MdMSUAw60AazDiUtHrVenbc3R56rWBoRi0h7/?= =?us-ascii?Q?g1pIWKXVwg6i+wlahToLpkcJ+2ZGzBsa0isvWJ2ovDTJtwEcJNNfxLLN/W3n?= =?us-ascii?Q?36LuU/8+C53Yxqxw9s71NocBy4u7+EGPJ1ZVsieNwovW0Ej3HLyRbJUbx/dh?= =?us-ascii?Q?wDWiYgN/mfeYa/Aa9/OwX5V31ld+Yp8Fzzrf7q7YCcjmiD3ze75YilKsbz3O?= =?us-ascii?Q?+OHNIgKIZZWs3D83A6YwB/4LGa7Crps49UlvpH0Wzdr9sVoYnmIzWR22S7O1?= =?us-ascii?Q?M7EK/twE7g58w0IkN7K97Ky1jdUvalPV2of2pSZ7c7xp83pTPuHDeJuuLwC+?= =?us-ascii?Q?KQ/Qk6UK34+nvv018cRFf9I0SSE/TM4zURSbNN1aBjCqMY8PXfPsWVkW+WgX?= =?us-ascii?Q?83NgmsRfFEZbWYSOtjy9dumqXYxEGuQ1H+gs70wkCpf3i/AviqSfzGer4yB8?= =?us-ascii?Q?iz2w0ea2yjfdMYcVwEmJnnPJz7+OUjjSMSUbI9EfhdjT6SXfkng0+YbxFuRM?= =?us-ascii?Q?2Iyvh/PQNBjpv5aUfQuKI7XWkb7MTL7MA/VEss4X/7C1MMfOdkt2qI63Dszp?= =?us-ascii?Q?G2qmWSWkIuuvEid42RpDryINC5Cwhrsl7079RnHVNRPBB/Nbj4BayVXCQ/06?= =?us-ascii?Q?JwgKrwQuzO14wrB6dCfzrpRSFAnqyiysBzr1aECSTjP8IFQLq4mnyhPLjlj/?= =?us-ascii?Q?D1ag2BNe/1W697bpcKzDmfrzpS7MWWHu8IaKfmS9D8ho2sMvKu4nGyv7e7aF?= =?us-ascii?Q?Lep+0nV5uyXXXEdIdFWuZXHqH4peZlrjobmwO1jtCkGh+OIb+1I3MEGbAdiM?= =?us-ascii?Q?yNO0xGw1FTc/cm0nuv6jPmIc1s96VfBCHJA0FNwpiqo37dUsHw/WK7RyKpX9?= =?us-ascii?Q?Ax3pAgB3UmFfTS97A0aVeKPn6YemTohyxOCnxNRhA1ia9VB7OcMlyhM5Rwav?= =?us-ascii?Q?0C1IG1ahWiktzwiM18A6HhhxnkHJMMAuJGkALwlEmwncvane05vEnPsJ0RIO?= =?us-ascii?Q?yRL00Xm1voGJkX2W10gZplwuGzJFLNcEiIRPN16SxNM/bSFeP9YYSdLmLRsp?= =?us-ascii?Q?q0Nbm0zQgnstJ+aZTlW2/4BLNznFDLk0EpaQp7D5J2yt8xiUriwnOKF5uhLQ?= =?us-ascii?Q?YciqDjpbsPCKKF13tSyvC71JiyR96GeGfrT2CZNjCI2s3bkGYHcRlXZ7afb3?= =?us-ascii?Q?i+cYwXEFJn16TC/MhfTDJtv9D+fF3j0weJ3TuV8ToqifvdUbD7uZn+z0EPBl?= =?us-ascii?Q?0hGwSKBnePFtxSL32Hpe0zg1XTkbw9kknhUXYRX3T23oqWSpIJ8qAWeiBWVz?= =?us-ascii?Q?JTBHPv4DL1hJsmVaG0PhHKd6CDm7gaPUQlbenOZiBE2XEAusiETGumumWL4U?= =?us-ascii?Q?rT7WskF+n0krZ9pHdohREmo38xKkCo16uwlY7B6Mj3b+Z4MVdICaE0FnJzw8?= =?us-ascii?Q?9VpJP/yRX5e27P2M8faIg5SgglFUlQZhAkbFxIQ9IYiP8hrPm1sQ8EHYD+gn?= =?us-ascii?Q?M+BiVsoou38GvnhHEoKZa01YPuisXvf4VZvyeTXfaRHW4sVu6DTpANKPoAh7?= =?us-ascii?Q?+NIrccwKtkTS1mb+aqYIbzimKBEnSjzF9Su2AuHKz/arlwB1/bYruMsR6v4X?= =?us-ascii?Q?Hvj5ow=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(1800799024)(36860700013)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Jan 2026 14:30:04.7744 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 90b5902e-1054-479b-2f9b-08de58f991ba X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF0001AB78.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR12MB8142 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1769005859044158500 Content-Type: text/plain; charset="utf-8" Add missing scaffolding to enable BusLock Threshold. That is: * Add general_intercepts_3. * Add missing VMEXIT * Adjust NPF perf counter base to immediately after the buslock counter Signed-off-by: Alejandro Vallejo Reviewed-by: Teddy Astie --- v2: * s/general intercepts 2/general intercepts 3/ * removed _thresh suffix * added missing _svm_ infix in the SVM feature --- xen/arch/x86/hvm/svm/vmcb.h | 15 +++++++++++++-- xen/arch/x86/include/asm/hvm/svm.h | 2 ++ xen/arch/x86/include/asm/perfc_defn.h | 2 +- 3 files changed, 16 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/hvm/svm/vmcb.h b/xen/arch/x86/hvm/svm/vmcb.h index ba554a9644..231f9b1b06 100644 --- a/xen/arch/x86/hvm/svm/vmcb.h +++ b/xen/arch/x86/hvm/svm/vmcb.h @@ -65,6 +65,11 @@ enum GenericIntercept2bits GENERAL2_INTERCEPT_RDPRU =3D 1 << 14, }; =20 +/* general 3 intercepts */ +enum GenericIntercept3bits +{ + GENERAL3_INTERCEPT_BUS_LOCK_THRESH =3D 1 << 5, +}; =20 /* control register intercepts */ enum CRInterceptBits @@ -289,6 +294,7 @@ enum VMEXIT_EXITCODE VMEXIT_MWAIT_CONDITIONAL=3D 140, /* 0x8c */ VMEXIT_XSETBV =3D 141, /* 0x8d */ VMEXIT_RDPRU =3D 142, /* 0x8e */ + VMEXIT_BUS_LOCK =3D 165, /* 0xa5 */ /* Remember to also update VMEXIT_NPF_PERFC! */ VMEXIT_NPF =3D 1024, /* 0x400, nested paging fault */ /* Remember to also update SVM_PERF_EXIT_REASON_SIZE! */ @@ -405,7 +411,8 @@ struct vmcb_struct { u32 _exception_intercepts; /* offset 0x08 - cleanbit 0 */ u32 _general1_intercepts; /* offset 0x0C - cleanbit 0 */ u32 _general2_intercepts; /* offset 0x10 - cleanbit 0 */ - u32 res01[10]; + u32 _general3_intercepts; /* offset 0x14 - cleanbit 0 */ + u32 res01[9]; u16 _pause_filter_thresh; /* offset 0x3C - cleanbit 0 */ u16 _pause_filter_count; /* offset 0x3E - cleanbit 0 */ u64 _iopm_base_pa; /* offset 0x40 - cleanbit 1 */ @@ -489,7 +496,10 @@ struct vmcb_struct { u64 nextrip; /* offset 0xC8 */ u8 guest_ins_len; /* offset 0xD0 */ u8 guest_ins[15]; /* offset 0xD1 */ - u64 res10a[100]; /* offset 0xE0 pad to save area */ + u64 res10a[8]; /* offset 0xE0 */ + u16 bus_lock_thresh; /* offset 0x120 */ + u16 res10b[3]; /* offset 0x122 */ + u64 res10c[91]; /* offset 0x128 pad to save area */ =20 union { struct segment_register sreg[6]; @@ -583,6 +593,7 @@ VMCB_ACCESSORS(dr_intercepts, intercepts) VMCB_ACCESSORS(exception_intercepts, intercepts) VMCB_ACCESSORS(general1_intercepts, intercepts) VMCB_ACCESSORS(general2_intercepts, intercepts) +VMCB_ACCESSORS(general3_intercepts, intercepts) VMCB_ACCESSORS(pause_filter_count, intercepts) VMCB_ACCESSORS(pause_filter_thresh, intercepts) VMCB_ACCESSORS(tsc_offset, intercepts) diff --git a/xen/arch/x86/include/asm/hvm/svm.h b/xen/arch/x86/include/asm/= hvm/svm.h index a6d7e4aed3..15f0268be7 100644 --- a/xen/arch/x86/include/asm/hvm/svm.h +++ b/xen/arch/x86/include/asm/hvm/svm.h @@ -37,6 +37,7 @@ extern u32 svm_feature_flags; #define SVM_FEATURE_VGIF 16 /* Virtual GIF */ #define SVM_FEATURE_SSS 19 /* NPT Supervisor Shadow Stacks */ #define SVM_FEATURE_SPEC_CTRL 20 /* MSR_SPEC_CTRL virtualisation */ +#define SVM_FEATURE_BUS_LOCK 29 /* Bus Lock Threshold */ =20 static inline bool cpu_has_svm_feature(unsigned int feat) { @@ -56,6 +57,7 @@ static inline bool cpu_has_svm_feature(unsigned int feat) #define cpu_has_svm_vloadsave cpu_has_svm_feature(SVM_FEATURE_VLOADSAVE) #define cpu_has_svm_sss cpu_has_svm_feature(SVM_FEATURE_SSS) #define cpu_has_svm_spec_ctrl cpu_has_svm_feature(SVM_FEATURE_SPEC_CTRL) +#define cpu_has_svm_bus_lock cpu_has_svm_feature(SVM_FEATURE_BUS_LOCK) =20 #define MSR_INTERCEPT_NONE 0 #define MSR_INTERCEPT_READ 1 diff --git a/xen/arch/x86/include/asm/perfc_defn.h b/xen/arch/x86/include/a= sm/perfc_defn.h index d6127cb91e..ac7439b992 100644 --- a/xen/arch/x86/include/asm/perfc_defn.h +++ b/xen/arch/x86/include/asm/perfc_defn.h @@ -7,7 +7,7 @@ PERFCOUNTER_ARRAY(exceptions, "exceptions", 32) #ifdef CONFIG_HVM =20 #define VMX_PERF_EXIT_REASON_SIZE 76 -#define VMEXIT_NPF_PERFC 143 +#define VMEXIT_NPF_PERFC 166 #define SVM_PERF_EXIT_REASON_SIZE (VMEXIT_NPF_PERFC + 1) PERFCOUNTER_ARRAY(vmexits, "vmexits", MAX(VMX_PERF_EXIT_REASON_SIZE, SVM_PERF_EXIT_REASON_SIZE= )) --=20 2.43.0 From nobody Mon Jan 26 07:42:00 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1769005857; cv=pass; d=zohomail.com; s=zohoarc; b=f211E8ktorEbAuYiOqilg1lP/6s0hB1blGEGvsAayMD2LueefzciTEAJAmD5c0nQvwZp1Wv9I+YINK+3qM5lEIJ3+HDzDK0Ybe+LGtljCoLmnEVjTCY4bOXJeY+FBgm1bCXM6QpoCFkrD/xwB42vnshM/rrbN9o5u/BdowXAfzU= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769005857; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=UFUWMJIT5ILfQMVeeOtM43khGeImb8Dazel0lpTU+JI=; b=C5Zvf6jLb3EhbrVP/yJbFMW5MS3x4/a0OR23CsjN8H3aIEQuCktS2qvzea593+XcO1x9gfdT5R5YcLxhBtG2dqeevKqWZ9PU7/ddmHJ3hTDoCm6bBOXvOs4L0gydGRN+RPgqurf7A4NehRmGdrrUEESm6L/tYRfth6vNSzG1fjQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1769005857113946.9021381207983; Wed, 21 Jan 2026 06:30:57 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1209825.1521721 (Exim 4.92) (envelope-from ) id 1viZDs-0006vm-Vm; Wed, 21 Jan 2026 14:30:16 +0000 Received: by outflank-mailman (output) from mailman id 1209825.1521721; Wed, 21 Jan 2026 14:30:16 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1viZDs-0006vf-TB; Wed, 21 Jan 2026 14:30:16 +0000 Received: by outflank-mailman (input) for mailman id 1209825; Wed, 21 Jan 2026 14:30:16 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1viZDr-0006vP-Qe for xen-devel@lists.xenproject.org; Wed, 21 Jan 2026 14:30:15 +0000 Received: from SA9PR02CU001.outbound.protection.outlook.com (mail-southcentralusazlp170130001.outbound.protection.outlook.com [2a01:111:f403:c10c::1]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id b0cdb3ca-f6d5-11f0-9ccf-f158ae23cfc8; Wed, 21 Jan 2026 15:30:11 +0100 (CET) Received: from MN2PR07CA0017.namprd07.prod.outlook.com (2603:10b6:208:1a0::27) by CH3PR12MB7545.namprd12.prod.outlook.com (2603:10b6:610:146::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.9; Wed, 21 Jan 2026 14:30:05 +0000 Received: from BL6PEPF0001AB78.namprd02.prod.outlook.com (2603:10b6:208:1a0:cafe::ad) by MN2PR07CA0017.outlook.office365.com (2603:10b6:208:1a0::27) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.9 via Frontend Transport; Wed, 21 Jan 2026 14:30:03 +0000 Received: from satlexmb07.amd.com (165.204.84.17) by BL6PEPF0001AB78.mail.protection.outlook.com (10.167.242.171) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.4 via Frontend Transport; Wed, 21 Jan 2026 14:30:05 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Wed, 21 Jan 2026 08:29:59 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: b0cdb3ca-f6d5-11f0-9ccf-f158ae23cfc8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=QvLvv+FEqey4y586Ljw+gykamMZ9gw6N+/JGfh6GVBU7s9+aWlpfTDaA7+3xEdwWsn2DF54A40UwDKbWlDxI+zWdJTJoN3nZu9vPtLv5gi1AFqvlrhUeQPN6KSDaG0UM0HFGS972LU0eou95dA8FCwKq1w104Mib7y/Xsu+NyZL961FAL4Bw0Rtwmqxn5ik45f3mQ3K+hmEejOn9RUe9OfQMBdHaIxPdumXux6RWmdQpGXJeloPx4GKdxUs6NhGgDOtZIuimeOdPyr7YMdVc8Kd8ISZ14M9Qns5TPrgXV2nV5JqlGLMRZ2Z2K7NbWLWUuPMXmsXuP4LohxAb8iKAKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UFUWMJIT5ILfQMVeeOtM43khGeImb8Dazel0lpTU+JI=; b=PPSHd1rU910IYCDj95oR6HvpDL78hj7kZpTkyVtc5oYkmWBhL5TV168ujJ2F6iU4tq3aggu3KfxdxPlx6QSFHwqskrFFOys9rqGKVBEN6uAomzOf8OOLDhgW2sdI5XpEckLmSoer+GRBfH/I8/Sd6rVd3Txeof8nIPKaS3QyPgAWmDVLnFE2hSBGMQOj/UwSpBHPPxAIOK4e7/uyINhkJNsSC3yyFF+ARSev/mI8gQwrtiYyqsGLNXRRs7ORChMlwHzphgzGLLln4B3/Zl/ZIXI9Q2VSLzSK8NB2WSjkztTAZTJY0PsqZ/WheTLEldtRJO6JGKivtMszxLPN9+T+Hw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UFUWMJIT5ILfQMVeeOtM43khGeImb8Dazel0lpTU+JI=; b=W5tfzqibdDGkr3+zti6Sj+Pgi77hGPrae8n0idwiEaIvL1TmvNCqm8X37CUCV3hWS4JWWmlvGJA8hzhSXcOC9tovf6O7L8PsxoACZCUmKbY6zIXqiqEvTtgkqFN7pJcI214DFM/y90d0s7pQDiGXpRdz+MAyu85RTL41KmfptV4= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Jan Beulich , Andrew Cooper , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Jason Andryuk Subject: [PATCH v2 2/3] x86/svm: Intercept Bus Locks for HVM guests Date: Wed, 21 Jan 2026 15:28:54 +0100 Message-ID: <20260121142857.39069-3-alejandro.garciavallejo@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260121142857.39069-1-alejandro.garciavallejo@amd.com> References: <20260121142857.39069-1-alejandro.garciavallejo@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: satlexmb08.amd.com (10.181.42.217) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF0001AB78:EE_|CH3PR12MB7545:EE_ X-MS-Office365-Filtering-Correlation-Id: 2c03ed46-9e11-4612-ca8c-08de58f99228 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|82310400026|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?OkJlMPmvVlRd6iA0o4qTGp9Eco6j6T+UqYFQFtOHjT+8fHCs3NZMQyO3QNPS?= =?us-ascii?Q?SpyXRI5NT49an83+yi5LT29YmKhFmnNoh8q18oBCnCYUIMmMsLo9qYwr73Et?= =?us-ascii?Q?OK06AMazSUbkBgsZUohTYFmAkw1cXwOwLjXCC/sVcnx1Z1/g6WAr6/PjFNBR?= =?us-ascii?Q?FN23rxUt0NUKx+pMtwC0wO7m8djF3MkAKZbVwk1lrbJ0EhBQo3HYt2o2xfhG?= =?us-ascii?Q?ZFpn4NMZ4YKbq/tsIEu7bgEcweue3lwEM+NWCG37WkmTBI1fBfkYjoboNVQB?= =?us-ascii?Q?wKZBRqP92akkbwoTl2qLbql2vwdOY7zjGjnq/sooHvunX67yJtGdkka+UTcZ?= =?us-ascii?Q?md4qdv6Gs5CLG55RdeJ4qst06QlhDfVycOZVJTE66uD+y0rVqC3B44bBfkF7?= =?us-ascii?Q?Qnw90H46rrinadadKQdIrrIyumyXiIyepNh8AI9jmygGExlwC/rtpY6DT/7n?= =?us-ascii?Q?+VF8PEWVrKMMGccuucJ1cvYIATu8DoQMJLkrvlqRoN/704uw40MIwqFjehC6?= =?us-ascii?Q?ZJ54TBZmw6xWMM3lk9bVzDXXgr0ZY7SoXEc4wBRBbKj+/BfKriJ3aEPH2k8S?= =?us-ascii?Q?vyU4s3wJUb9j+IRhOrj7OY9J+D+88RYaXM4XLDiExgh/pIDlRx10KNlEKq9t?= =?us-ascii?Q?VxHr0VGPQVtTgCqY/34HNDc8lzdsfTc7c+uA0+C4E5f6Wsph4IzwOp0cBysJ?= =?us-ascii?Q?MV4pxYtONqfwjpXutDoNbKmv80rAJhLqP76VJbYKVz9/mW/gBf11mWcwmmLJ?= =?us-ascii?Q?P2DQOr16Eepfjv2lbWQ9/CVseu2QlNBboeJ7AtrclaHYlfoPmaIKEtsszBRp?= =?us-ascii?Q?vexPJoHr5YecIGMmxZyI0qnF/WLHyO35EFY1Z+zQGlqotDMIaqzJ47R0FbdZ?= =?us-ascii?Q?M8237oRyd6YetvQT3xUCaquSWq649i1zVFZj+AHDZEP2/xF+tAI9EB3ciL1U?= =?us-ascii?Q?FsjpaxgdAdULqGa1XasMJ7obV0sgHQSo7ee0Um+sa6DBFbSHohNpaIWKu6+7?= =?us-ascii?Q?nKU9CgQos3GLMR81o7PK81Kyu/3Wuc25GmSBLnE9jaVd9NOjEaba0kXUJhDV?= =?us-ascii?Q?z5N8YLHthAF7Ax5TGc4RXJEXDe2e2DN5OFElHjZNtlaIu9HMGK5D1j3L+VpO?= =?us-ascii?Q?NSAwH+PAXMGSwzyOqxnHlyjraxzbLpFyXexgHNvaavC20Nys+QcPgp3w8I39?= =?us-ascii?Q?2m9P/Jw8hq7OmZxFJn8Lbp9WSPhbq8Ewv2O/v1dJlMGWqxpv2Jt7jyabK5cn?= =?us-ascii?Q?OTUBK4Xl99hSHRupcCb5iYwylY6CqXpOtbbbO2UVyEpfs5cJ7CoxPoJF6SlU?= =?us-ascii?Q?fTGG3DRVWSkmtr1UkPeJBrKotx+l0oWFncqaaF2vr8MUs3RFd2evGBlNaod9?= =?us-ascii?Q?6ou2Rvk2liX/LmvxjJnLikuuM5+pZ/xPv7c/3Lo06Lm4efqdAHRV5gLjG/G/?= =?us-ascii?Q?0FEbVPfYWHA3ge1RerTITW91+esn5Y4mFfS8d22svrm3WLDoLxSBE9Dhxj6c?= =?us-ascii?Q?zqw6nVOeBjJDHrtLTT7inuXhNKSc8SWgCeBfHtQiat8RV0UcnrNzjTtU0sLr?= =?us-ascii?Q?lNJgI8rfmoIF8lZvP6h29HDfqZ1JYROFZtZwlexiNhpcs5CziCYjQb1nN8WY?= =?us-ascii?Q?Wvh2qgLz0BaOvgNuvt384G57gt0SqB9d5Gk5DbhhPautKMibLn/bLg0mZLLU?= =?us-ascii?Q?Tb5kBA=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(82310400026)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Jan 2026 14:30:05.4981 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 2c03ed46-9e11-4612-ca8c-08de58f99228 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF0001AB78.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR12MB7545 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1769005858789158500 Content-Type: text/plain; charset="utf-8" Configure the Bus Lock intercept when supported by the host. The VMCB counter is initialised to zero so it fires upon the first instruction that locks the bus. On the #VMEXIT handler that counter is set to 1 because it has fault behaviour and the offending instruction needs to re-execute. Signed-off-by: Alejandro Vallejo --- v2: * Moved the P() call to this patch. We don't want to print until the feature is fully supported. * Removed the initialisation of the counter to 1 in vmcb.c, so it's implicitly zero-initialised. --- xen/arch/x86/hvm/svm/svm.c | 6 ++++++ xen/arch/x86/hvm/svm/vmcb.c | 3 +++ xen/arch/x86/hvm/svm/vmcb.h | 4 ++-- 3 files changed, 11 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c index 5d23603fc1..abda5a9063 100644 --- a/xen/arch/x86/hvm/svm/svm.c +++ b/xen/arch/x86/hvm/svm/svm.c @@ -2524,6 +2524,7 @@ const struct hvm_function_table * __init start_svm(vo= id) P(cpu_has_tsc_ratio, "TSC Rate MSR"); P(cpu_has_svm_sss, "NPT Supervisor Shadow Stack"); P(cpu_has_svm_spec_ctrl, "MSR_SPEC_CTRL virtualisation"); + P(cpu_has_svm_bus_lock, "BusLock-Intercept Filter"); #undef P =20 if ( !printed ) @@ -3087,6 +3088,11 @@ void asmlinkage svm_vmexit_handler(void) break; } =20 + case VMEXIT_BUS_LOCK: + perfc_incr(buslock); + vmcb->bus_lock_count =3D 1; + break; + default: unexpected_exit_type: gprintk(XENLOG_ERR, "Unexpected vmexit: reason %#"PRIx64", " diff --git a/xen/arch/x86/hvm/svm/vmcb.c b/xen/arch/x86/hvm/svm/vmcb.c index cbee10d046..15223a693e 100644 --- a/xen/arch/x86/hvm/svm/vmcb.c +++ b/xen/arch/x86/hvm/svm/vmcb.c @@ -66,6 +66,9 @@ static int construct_vmcb(struct vcpu *v) GENERAL2_INTERCEPT_XSETBV | GENERAL2_INTERCEPT_ICEBP | GENERAL2_INTERCEPT_RDPRU; =20 + if ( cpu_has_svm_bus_lock ) + vmcb->_general3_intercepts |=3D GENERAL3_INTERCEPT_BUS_LOCK; + /* Intercept all debug-register writes. */ vmcb->_dr_intercepts =3D ~0u; =20 diff --git a/xen/arch/x86/hvm/svm/vmcb.h b/xen/arch/x86/hvm/svm/vmcb.h index 231f9b1b06..68cf5eaf0b 100644 --- a/xen/arch/x86/hvm/svm/vmcb.h +++ b/xen/arch/x86/hvm/svm/vmcb.h @@ -68,7 +68,7 @@ enum GenericIntercept2bits /* general 3 intercepts */ enum GenericIntercept3bits { - GENERAL3_INTERCEPT_BUS_LOCK_THRESH =3D 1 << 5, + GENERAL3_INTERCEPT_BUS_LOCK =3D 1 << 5, }; =20 /* control register intercepts */ @@ -497,7 +497,7 @@ struct vmcb_struct { u8 guest_ins_len; /* offset 0xD0 */ u8 guest_ins[15]; /* offset 0xD1 */ u64 res10a[8]; /* offset 0xE0 */ - u16 bus_lock_thresh; /* offset 0x120 */ + u16 bus_lock_count; /* offset 0x120 */ u16 res10b[3]; /* offset 0x122 */ u64 res10c[91]; /* offset 0x128 pad to save area */ =20 --=20 2.43.0 From nobody Mon Jan 26 07:42:00 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1769005857; cv=pass; d=zohomail.com; s=zohoarc; b=Q5pyzdXbSOFStEUJZY6hB6ZKXDgzNAgyrA+ndqZR/PlJV4QrbSOZpYOB5kFCoj8lLH7xylLR280Aw4LkzQRUIza7aW5Q1K4z6sUYa3IPtoJ/zQSkHxvGiDJ3wiIpVsECXeqVClGfZPLXt4qHy6DuWKhqrkCy6ECOd1RP5FDKOKs= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769005857; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=pQaQz/co1dWKOQJegRLRV/x0sT/NPpp7Wh/Pk2meZ2I=; b=GWU+kAL/T4WfdVIu6aFyvJeABaI6POjaz2oiB6UhqGYKhP0ZbxV2ixIyOSf4f2nKuds5QyZYij0apYZqUElS0BtmPEywWJAa/2Y0h26RSZBXbMxtQjhpapi+VlcuAtNT4NKcx8T5y5zZxvyt6cGM+cKiZ4nbSh/jtTKo1g8/Dao= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1769005857406934.8769707461604; Wed, 21 Jan 2026 06:30:57 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1209828.1521747 (Exim 4.92) (envelope-from ) id 1viZDv-0007Nv-0c; Wed, 21 Jan 2026 14:30:19 +0000 Received: by outflank-mailman (output) from mailman id 1209828.1521747; Wed, 21 Jan 2026 14:30:18 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1viZDu-0007KQ-Pu; Wed, 21 Jan 2026 14:30:18 +0000 Received: by outflank-mailman (input) for mailman id 1209828; Wed, 21 Jan 2026 14:30:17 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1viZDt-0006vP-GP for xen-devel@lists.xenproject.org; Wed, 21 Jan 2026 14:30:17 +0000 Received: from SA9PR02CU001.outbound.protection.outlook.com (mail-southcentralusazlp170130001.outbound.protection.outlook.com [2a01:111:f403:c10c::1]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id b3667767-f6d5-11f0-9ccf-f158ae23cfc8; Wed, 21 Jan 2026 15:30:15 +0100 (CET) Received: from MN2PR07CA0010.namprd07.prod.outlook.com (2603:10b6:208:1a0::20) by CH1PR12MB9720.namprd12.prod.outlook.com (2603:10b6:610:2b2::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.10; Wed, 21 Jan 2026 14:30:09 +0000 Received: from BL6PEPF0001AB78.namprd02.prod.outlook.com (2603:10b6:208:1a0:cafe::4) by MN2PR07CA0010.outlook.office365.com (2603:10b6:208:1a0::20) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9499.7 via Frontend Transport; Wed, 21 Jan 2026 14:30:07 +0000 Received: from satlexmb07.amd.com (165.204.84.17) by BL6PEPF0001AB78.mail.protection.outlook.com (10.167.242.171) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.4 via Frontend Transport; Wed, 21 Jan 2026 14:30:07 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Wed, 21 Jan 2026 08:30:01 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: b3667767-f6d5-11f0-9ccf-f158ae23cfc8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=esOxIYS2LiIhmNk6ZshNwIWIxf2PphzNLZHbgLkU+kteLXNfdX7lB71+ajvS1ftfl+aqmQWpduIjMUZuNOAYflqY6PmX7zc/04SyYdojAJ7zSYaMd3ymo4rImXEjSdBNH45LEuTmyjHbOOKiBsBQ8fTTLVE5Rl3MuMbxFgN/yHaV9rzmdS8gmCc39UvewnsDuCFpNFH9H1QSAYHjkMsJ1XCqsDRIaTJnwWaKZ0bQnMU8BY4Ig/SiDmWSzpRyNZFwzS0yMCCxZYqUImif+cPHkZsgM5B9388d9fdvFml8QvcW1ZDS2Ihi1owqzdD8KaNjbIwPHuKocy/i/uXmYHQItA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=pQaQz/co1dWKOQJegRLRV/x0sT/NPpp7Wh/Pk2meZ2I=; b=BiiWPQivei4D0Ht/IIJxMqJ00zd3mGw7QhOnGsm9Fqj9d5Y6Rsyk8/beynKXynnPFjlE8kKMoREVjz3bjfAhrT8RhWLP4JpE4LpedJZ93113hfR0dsNNQvCmC3oq6mFcS8tx9ILjjCO+f/7sqkOE5szKG9NeXm3FCSlRwDKznqlcyMFcfEcVOOKXP7mdIQxo6qUe+Xd/UKwpIHEJ2a16LB9cWFe3UUetwBKlwvSKB3681oXGiJN2+n8X5APFq6FqQX2tGxDaDeH3S4j7AFkbuLfDW6irxXWUBDzOgGMAt6bjSvWMrqjiw19ZJL9TClApzLPYBx+I7I3sPNMS7abaOw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pQaQz/co1dWKOQJegRLRV/x0sT/NPpp7Wh/Pk2meZ2I=; b=rh1Iqpqa75jTYWNy8BTUJRXpAxOmcE9vNlNECjFyxatHQn6kbK+sEk2uH2UDYFk0PmpM+xv7AdTqp1aKztD63yCviTNoNJJgdlWWVXB+Faj8ages+pEmF887+iZE4h+yIED5Hl/1lAt42gAHxeHW3VSVEbN3Rg0aTvvsqeY5iVc= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Oleksii Kurochko , Community Manager Subject: [PATCH v2 3/3] CHANGELOG: Note the new SVM bus-lock intercept Date: Wed, 21 Jan 2026 15:28:55 +0100 Message-ID: <20260121142857.39069-4-alejandro.garciavallejo@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260121142857.39069-1-alejandro.garciavallejo@amd.com> References: <20260121142857.39069-1-alejandro.garciavallejo@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: satlexmb08.amd.com (10.181.42.217) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF0001AB78:EE_|CH1PR12MB9720:EE_ X-MS-Office365-Filtering-Correlation-Id: 3aa9d2c2-f45d-4d29-0c31-08de58f9937d X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|82310400026|36860700013|1800799024|13003099007; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?pfZrC5XgLexW+KXFhPAjKP4OQf9+o3GsPLVurtuPDyzt5pdHTRtXt/24DMTa?= =?us-ascii?Q?YfsG1lbmlLwcQiRDROFCry3IpXQg7m192HFt4tkwkEtAfozlYGBSaHqy1Yt0?= =?us-ascii?Q?EoeF7uBma0dq1/BfmfVbp/1cXrIpb5KOiNumkDOhKqRBC+ZaYtb4Cb9hPIMf?= =?us-ascii?Q?1xW5gYEX9rYZiWzI3w35aMenmHw/D6owCk7LR32LMSB5YJt0UJt5TsjU0o3W?= =?us-ascii?Q?xgHHL7ewnYr7sFWl6agBI2mYdztF4jlImk+N37eOqJYVxt1bXcJh3AZBSBVQ?= =?us-ascii?Q?ShcqiBD4pBmCfT1tJMD/v8JRW3xJEK+KJfgslyviTaN8BrJhOWRfV9uImzvv?= =?us-ascii?Q?fsCbZ+qIOIV7gADLUp33stWufJkvaK/sSyTT8OVhjHdNh68SkY4Whq7nrf5N?= =?us-ascii?Q?E7DtoDTF17DX52DOgWtcPXCJkWr60AR3qW6RNGpjhpnN18hXYzw0DB2hgxWS?= =?us-ascii?Q?oH53PIyFfjdOIcMBbUxv33/ZAAf7REHKiduNi1JUc7/6sUyZJJp/i4O8WebL?= =?us-ascii?Q?L8ZKRVzv8EBdzo61ZXG2inXe+D5MxXHCnS0Z/AEf2wSNNp7ST1EQngdxJyxg?= =?us-ascii?Q?cVhjoUP9LSTJoFuZBtCbpBAGZgGI8RkTEeIMZwevuNiPTeR6kGrBeBN76/46?= =?us-ascii?Q?tSpeHtGZA/pzFqTLNzkoqRqkAoQdNX910DJCVym5SCYeYe3/Z9NU5eNYyU9m?= =?us-ascii?Q?nnPI4BcFrFuWA+AoJuXbAIhuWU0g/RGuMWz05S/9OHPlxBFYFTQ1iNL1Lv0t?= =?us-ascii?Q?EIbvN1aF+gtljPDMgs33I0Wer7fz1dIAuWcjPjLsJm/MNHsY04/rMABAejwk?= =?us-ascii?Q?ndgUZYoHbSwFVaxQOVDk6v9yLriyin9kfcESzcUKaT+P6003TnyleFaffC5y?= =?us-ascii?Q?b1/N8++IntRG6lB3+PbQLay3l+q/KQ4b7r/caWEdg87pBuOQtNuLYbNvBwur?= =?us-ascii?Q?JP/oq8Ng3yW52rDOr8iL4tOg1QB6StNee1MlATXAygiJH14n3cip0ce3uJ/D?= =?us-ascii?Q?oXXBXtb2KFhaIlXfVAF8b8NjnVWPQGIaUe+cc4BEJiHuUO2lYYbWQIDB/poW?= =?us-ascii?Q?6SnEyOJgg43NI7OTFxrqDYdbGNNmm74pEWHmnbWWHRTFhk8vKJs/AlHAk6pO?= =?us-ascii?Q?/W66Q1yKAezqTjJEfE0sHUZkrGn6DWRjy0kNjz1c2Uq1jxEGIkUERJWxVqpw?= =?us-ascii?Q?IeE9Hc0np54lqCMpiIEcOleMWwklGhqExpWGbFZaMs91fNWZE++fBbKRsm7z?= =?us-ascii?Q?YqckoDDppKEnKvufEE5BwFBdqbOLNlYF5Mmf/AdhG2gTcQqQtA+PexN6tzub?= =?us-ascii?Q?e09mYYpMGfLLKJGAAkYHXmcNa2yh/EY0+1YchZ3vU6C0rtSwhHg5EXHloHwW?= =?us-ascii?Q?nncRkfVspi2b7+03K4p6PVK/tZSIIfQoTAIHZk21gmK1/HNOM3ml52Zf4hCh?= =?us-ascii?Q?sJZMIyjbh0LJsrjxclJMIW+WOk2v7zJBMS7HRcRRJ5l6THNZze49Xtki5YHj?= =?us-ascii?Q?6vYcGsi2mFUnwWa/scrq74HYVOa/l7zD48Hv3tlRcvu+ZE6/7zTyxN6jlq16?= =?us-ascii?Q?ZUKTWP+3zUGVlMVmqAA6uxr6U2seZnNyjTdzAPBcSZfnGwr51Xn2pvHae8SG?= =?us-ascii?Q?RA=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(376014)(82310400026)(36860700013)(1800799024)(13003099007);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Jan 2026 14:30:07.7300 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3aa9d2c2-f45d-4d29-0c31-08de58f9937d X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF0001AB78.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH1PR12MB9720 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1769005858794154100 Content-Type: text/plain; charset="utf-8" Signed-off-by: Alejandro Vallejo --- CHANGELOG.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 53d92a2597..07c1745f22 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -9,6 +9,9 @@ The format is based on [Keep a Changelog](https://keepachan= gelog.com/en/1.0.0/) ### Changed =20 ### Added + - On x86: + - AMD bus-lock detect, used by Xen to mitigate (by rate-limiting) the + system wide impact of an HVM guest misusing atomic instructions. =20 ### Removed - On x86: --=20 2.43.0