{"id":2198170,"url":"http://patchwork.ozlabs.org/api/1.0/patches/2198170/?format=json","project":{"id":14,"url":"http://patchwork.ozlabs.org/api/1.0/projects/14/?format=json","name":"QEMU Development","link_name":"qemu-devel","list_id":"qemu-devel.nongnu.org","list_email":"qemu-devel@nongnu.org","web_url":"","scm_url":"","webscm_url":""},"msgid":"<20260219054207.471303-9-manali.shukla@amd.com>","date":"2026-02-19T05:42:07","name":"[v1,8/8] DO NOT MERGE: Temporary EXTAPIC UAPI definitions","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"23479ffa49fa28ff6e1dac27911dbab1aa28dedf","submitter":{"id":90099,"url":"http://patchwork.ozlabs.org/api/1.0/people/90099/?format=json","name":"Manali Shukla","email":"manali.shukla@amd.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20260219054207.471303-9-manali.shukla@amd.com/mbox/","series":[{"id":492683,"url":"http://patchwork.ozlabs.org/api/1.0/series/492683/?format=json","date":"2026-02-19T05:42:03","name":"i386/kvm: Add support for extended APIC register space","version":1,"mbox":"http://patchwork.ozlabs.org/series/492683/mbox/"}],"check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2198170/checks/","tags":{},"headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256\n header.s=selector1 header.b=f9SIQ+Qy;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fGw044t3hz1xpY\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 20 Feb 2026 00:56:20 +1100 (AEDT)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vt4Vi-0007UK-8Z; Thu, 19 Feb 2026 08:56:09 -0500","from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <Manali.Shukla@amd.com>)\n id 1vswpQ-0006OT-Qc\n for qemu-devel@nongnu.org; Thu, 19 Feb 2026 00:43:56 -0500","from mail-westusazlp170120002.outbound.protection.outlook.com\n ([2a01:111:f403:c001::2] helo=SJ2PR03CU001.outbound.protection.outlook.com)\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <Manali.Shukla@amd.com>)\n id 1vswpP-00083D-5f\n for qemu-devel@nongnu.org; Thu, 19 Feb 2026 00:43:56 -0500","from SJ0PR13CA0024.namprd13.prod.outlook.com (2603:10b6:a03:2c0::29)\n by BL3PR12MB6475.namprd12.prod.outlook.com (2603:10b6:208:3bb::22)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9632.13; Thu, 19 Feb\n 2026 05:43:49 +0000","from SJ1PEPF00001CDC.namprd05.prod.outlook.com\n (2603:10b6:a03:2c0:cafe::7f) by SJ0PR13CA0024.outlook.office365.com\n (2603:10b6:a03:2c0::29) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9632.14 via Frontend Transport; Thu,\n 19 Feb 2026 05:43:29 +0000","from satlexmb07.amd.com (165.204.84.17) by\n SJ1PEPF00001CDC.mail.protection.outlook.com (10.167.242.4) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9632.12 via Frontend Transport; Thu, 19 Feb 2026 05:43:48 +0000","from brahmaputra.amd.com (10.180.168.240) by satlexmb07.amd.com\n (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Wed, 18 Feb\n 2026 23:43:44 -0600"],"ARC-Seal":"i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=CmrMzobq2pgR5dBC5c34z6sQg/aMDp5HmJB1UdRku6Fj5dE2lKTWj2ddgb7Ei3Fb3DgjJJhVn/8cB/1EVLkF/BzaAaj81DMRavYTnYXWBKAqy/DVSP7ahu3vq8ENO0ZRZSzRrrIHLxPYC8cL1/ShI376RE9N2feI8mQ4vQBi5eLLWCMoBJMsgYM0y4kIK4WHz/UfNOhbDNP8cb/Uxx5GkhLQJn51tgPFiUSye7FKSt+Cm4SSyLSrtaqsbCnsyj7khu6W5qXRBZI/zsiDQfhLUMGMh3ogznNRVFeg2IDJDfvzmZoGjpldKx4Qmy+lmP9GZ4uecQd4McB16o+JtTZ4kg==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=Cq6sDYQ2bIU8naegtNI56GdYdfjY25ij4bdD+f4fNMU=;\n b=aSGroVKuZGajddkJ5yYv5stAFtmsJW0vLSo75FA0vvTb0tK45VqPjMS9tx9jgD2eXX1U76FkVuZ2p4Sd4yEnt2aIo9iMpaCFvio2Lx7ZzbqCR/UtkUiZjXmue9eF2P+TKvCZ579WQVFIysiUQQpfnOSwROFKb+m1qgGq9Ilazy/WzVJn2E5Ztdht129efrTkbb8ehDM50reLX0jXz1NBcj2HNNjWfWUCZulf+XHejIpoBOJyIlVWIAa2lVhgw5UWUpw7CxCdOKaseMGx0XWRRW+ewqBGBqF74LvQ72E050RATo9ESkWcllPzPeUU4F3WuRW14WPmXLwRBi9RYMdSZA==","ARC-Authentication-Results":"i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 165.204.84.17) smtp.rcpttodomain=nongnu.org smtp.mailfrom=amd.com; dmarc=pass\n (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com;\n dkim=none (message not signed); arc=none (0)","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=Cq6sDYQ2bIU8naegtNI56GdYdfjY25ij4bdD+f4fNMU=;\n b=f9SIQ+QywXq2qKRuhcm5Uh+8RqNqJdPWa1IG0t3sQcvHHGioJmHUnKmC809ScNd0U40Uygq1g9e5FeAUWvwQJ4G+pYQaYgQlBk//Zjc6HCtUY9n4OfzCFUQMjgdemmSTzaWMpz46ieNGPDXnlxwdmm9i5Gnrg1hbzkdNxBLplP4=","X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 165.204.84.17)\n smtp.mailfrom=amd.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=amd.com;","Received-SPF":["Pass (protection.outlook.com: domain of amd.com designates\n 165.204.84.17 as permitted sender) receiver=protection.outlook.com;\n client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C","permerror client-ip=2a01:111:f403:c001::2;\n envelope-from=Manali.Shukla@amd.com;\n helo=SJ2PR03CU001.outbound.protection.outlook.com"],"From":"Manali Shukla <manali.shukla@amd.com>","To":"<qemu-devel@nongnu.org>","CC":"Cornelia Huck <cohuck@redhat.com>, Eduardo Habkost <eduardo@habkost.net>,\n <kvm@vger.kernel.org>, Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,\n \"Marcelo Tosatti\" <mtosatti@redhat.com>, \"Michael S . Tsirkin\"\n <mst@redhat.com>, \"Paolo Bonzini\" <pbonzini@redhat.com>, Sean Christopherson\n <seanjc@google.com>, Richard Henderson <richard.henderson@linaro.org>, Naveen\n N Rao <naveen@kernel.org>, Nikunj Dadhaniya <nikunj@amd.com>,\n <manali.shukla@amd.com>","Subject":"[PATCH v1 8/8] DO NOT MERGE: Temporary EXTAPIC UAPI definitions","Date":"Thu, 19 Feb 2026 05:42:07 +0000","Message-ID":"<20260219054207.471303-9-manali.shukla@amd.com>","X-Mailer":"git-send-email 2.43.0","In-Reply-To":"<20260219054207.471303-1-manali.shukla@amd.com>","References":"<20260219054207.471303-1-manali.shukla@amd.com>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Content-Type":"text/plain","X-Originating-IP":"[10.180.168.240]","X-ClientProxiedBy":"satlexmb08.amd.com (10.181.42.217) To satlexmb07.amd.com\n (10.181.42.216)","X-EOPAttributedMessage":"0","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"SJ1PEPF00001CDC:EE_|BL3PR12MB6475:EE_","X-MS-Office365-Filtering-Correlation-Id":"0977c157-300b-4775-dcb7-08de6f79daf3","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|7416014|376014|36860700013|82310400026|1800799024|13003099007;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:satlexmb07.amd.com; PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(7416014)(376014)(36860700013)(82310400026)(1800799024)(13003099007);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n By/YQNO+/ZKS1qVeVR0LRWvIE0CGWqs/dLrfGio85Hc3iEL4bfBlzeZzNSgytQU5QB5PB8zeUBYcNmI321Zu2GUQ35kURZgeDjOqBEGMCEaTFCNzxu9B6USpJbXiAnWEHYG+iW3+GmDs1bpfrXMcStkfyt6OJ9YAvM74ICE9wVpdQCnpKBmNPWPi/m1WoXGTSYUK1Lfw82fJpF3L9KnCVuzP98/5zuZsC2bIiasWcXEemh57vQShBjqwXQsNSKau6j/VmuOgWLAJtKvI0yM+SGPCq+veOpgXp4mEo81ndanGjTlHyS/MbUyEyrPYgaUXhImKafbwNlwf98kY8jUb21wWVlrmwob1Ja1svc0FpFh5cj/cOqcb5XP1dlOlAbfmUwPI8z3humR2MGfQqFWUrMY3TSAthUhsEF2Qq4SZ+lK40Mqi7Q/7FOIEHlNu05vt","X-OriginatorOrg":"amd.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"19 Feb 2026 05:43:48.7069 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 0977c157-300b-4775-dcb7-08de6f79daf3","X-MS-Exchange-CrossTenant-Id":"3dd8961f-e488-4e60-8e11-a82d994e183d","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17];\n Helo=[satlexmb07.amd.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n SJ1PEPF00001CDC.namprd05.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"BL3PR12MB6475","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.043,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no","X-Spam_action":"no action","X-Mailman-Approved-At":"Thu, 19 Feb 2026 08:55:36 -0500","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"},"content":"This patch adds the minimal UAPI definitions required for extended\nLAPIC support. These definitions will be imported via the standard\nscripts/update-linux-headers.sh process once the kernel patches are\nmerged.\n\nThis patch is provided only for testing and review purposes and\nshould NOT be merged.\n\nKernel patches: https://lore.kernel.org/kvm/...\n\nSigned-off-by: Manali Shukla <manali.shukla@amd.com>\n\n---\nNOT-FOR-MERGE\n---\n---\n linux-headers/asm-x86/kvm.h | 7 +++++++\n linux-headers/linux/kvm.h   | 7 +++++++\n 2 files changed, 14 insertions(+)","diff":"diff --git a/linux-headers/asm-x86/kvm.h b/linux-headers/asm-x86/kvm.h\nindex f0c1a730d9..04d1a1a527 100644\n--- a/linux-headers/asm-x86/kvm.h\n+++ b/linux-headers/asm-x86/kvm.h\n@@ -124,6 +124,13 @@ struct kvm_lapic_state {\n \tchar regs[KVM_APIC_REG_SIZE];\n };\n \n+\n+/* for KVM_GET_LAPIC2 and KVM_SET_LAPIC2 */\n+#define KVM_APIC_EXT_REG_SIZE 0x1000\n+struct kvm_lapic_state2 {\n+\tchar regs[KVM_APIC_EXT_REG_SIZE];\n+};\n+\n struct kvm_segment {\n \t__u64 base;\n \t__u32 limit;\ndiff --git a/linux-headers/linux/kvm.h b/linux-headers/linux/kvm.h\nindex 32c5885a3c..4e67281e99 100644\n--- a/linux-headers/linux/kvm.h\n+++ b/linux-headers/linux/kvm.h\n@@ -637,6 +637,10 @@ struct kvm_ioeventfd {\n #define KVM_X86_DISABLE_EXITS_PAUSE          (1 << 2)\n #define KVM_X86_DISABLE_EXITS_CSTATE         (1 << 3)\n \n+#define KVM_X86_NR_EXTLVT_DEFAULT\t\t4\n+#define KVM_LAPIC2_DEFAULT\t\t\t(1 << 0)\n+#define KVM_LAPIC2_AMD_DEFAULT\t\t\t(1 << 1)\n+\n /* for KVM_ENABLE_CAP */\n struct kvm_enable_cap {\n \t/* in */\n@@ -952,6 +956,7 @@ struct kvm_enable_cap {\n #define KVM_CAP_ARM_EL2 240\n #define KVM_CAP_ARM_EL2_E2H0 241\n #define KVM_CAP_RISCV_MP_STATE_RESET 242\n+#define KVM_CAP_LAPIC2 247\n \n struct kvm_irq_routing_irqchip {\n \t__u32 irqchip;\n@@ -1308,6 +1313,8 @@ struct kvm_vfio_spapr_tce {\n #define KVM_SET_FPU               _IOW(KVMIO,  0x8d, struct kvm_fpu)\n #define KVM_GET_LAPIC             _IOR(KVMIO,  0x8e, struct kvm_lapic_state)\n #define KVM_SET_LAPIC             _IOW(KVMIO,  0x8f, struct kvm_lapic_state)\n+#define KVM_GET_LAPIC2            _IOR(KVMIO,  0x8e, struct kvm_lapic_state2)\n+#define KVM_SET_LAPIC2            _IOW(KVMIO,  0x8f, struct kvm_lapic_state2)\n #define KVM_SET_CPUID2            _IOW(KVMIO,  0x90, struct kvm_cpuid2)\n #define KVM_GET_CPUID2            _IOWR(KVMIO, 0x91, struct kvm_cpuid2)\n /* Available with KVM_CAP_VAPIC */\n","prefixes":["v1","8/8"]}