Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2196072imm; Thu, 7 Jun 2018 06:57:52 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIHHtmHdfNAG4SyEAoHAjS+kbwgip7rzEEo7zk62tR8Y71g8ZovSGgCS35sv5EiHaP3LHXk X-Received: by 2002:a65:5546:: with SMTP id t6-v6mr1691289pgr.363.1528379871959; Thu, 07 Jun 2018 06:57:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528379871; cv=none; d=google.com; s=arc-20160816; b=ZHWPCqN5rg4GWmCXftmrfQUX+ZNku75vwgLNppJLzwOIH5AK5IUMCM+k0MoJhtqnsO KrMOFcfafUZSehCRxsCHdlvs0MR1pA7xNvFfdfRfUHlZnG90ay2PzIKndiHEw/kk9/ew iSf9M0vLXEdw6gSyeAXDIgYxN5QwKBMoVpt9hsvK8OEj1Cplq96afifeaLHF22yqbRfC ZBvPdb39Xehy7H1D3BlR/3UWQB3ZUSKm7h/maqk+EBOdobN6enO/LutfovHY9C5rsMqF 4GqIfvur4Tqy0Nou+r/20t9OY/eAY0GP6NMjwCCIvCN1YJGPLSm/U7echmlnaphIel5s mO2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=GFveHCvpWDC8oDY5oqMVjWjb+WnGLUSn5AMiq4ul9kI=; b=uhOxKnCID4bkt/QflMl1K5jNHw28OR8MDnHjjr6pjb227S+E/4P7NiYSO2w4kn/qBa RXUi2tfPpbfxdP4+nEn4hHaDT1aBEWu6lYOqOEFrqXaiq9Uw9zvyC1NL1AJxAYSHx229 lvlzRlMR45C6TGWHnt3TbW6Z6RcyS18g4il/FUjxn6zPjCdvqkP9/6N+0dGXcLzjipnK +Yh/sc3v2pRaCZppLjTdDJHj5H5STPZCvRZ21GIc/c/n6b/7kRy/TQp7vMVmI3nPWLWX cSc40HENC7h4Q0K92l7jwHOpe4sgIK+JuXEv0hdjPn4NgcZYJygxDaWHS30qvGVGsP7N Lliw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 31-v6si54097247plz.364.2018.06.07.06.57.37; Thu, 07 Jun 2018 06:57:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753714AbeFGN46 (ORCPT + 99 others); Thu, 7 Jun 2018 09:56:58 -0400 Received: from mga14.intel.com ([192.55.52.115]:14882 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753421AbeFGN44 (ORCPT ); Thu, 7 Jun 2018 09:56:56 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Jun 2018 06:56:56 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,486,1520924400"; d="scan'208";a="54811932" Received: from um.fi.intel.com (HELO um) ([10.237.72.212]) by fmsmga002.fm.intel.com with ESMTP; 07 Jun 2018 06:56:50 -0700 Received: from ash by um with local (Exim 4.91) (envelope-from ) id 1fQvPE-0004rJ-Ic; Thu, 07 Jun 2018 16:56:48 +0300 Date: Thu, 7 Jun 2018 16:56:48 +0300 From: Alexander Shishkin To: Luwei Kang Cc: kvm@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, chao.p.peng@linux.intel.com, thomas.lendacky@amd.com, bp@suse.de, Kan.liang@intel.com, Janakarajan.Natarajan@amd.com, dwmw@amazon.co.uk, linux-kernel@vger.kernel.org, alexander.shishkin@linux.intel.com, peterz@infradead.org, mathieu.poirier@linaro.org, kstewart@linuxfoundation.org, gregkh@linuxfoundation.org, pbonzini@redhat.com, rkrcmar@redhat.com, david@redhat.com, bsd@redhat.com, yu.c.zhang@linux.intel.com, joro@8bytes.org Subject: Re: [PATCH v9 09/12] KVM: x86: Introduce a function to initialize the PT configuration Message-ID: <20180607135648.mkciyfrd2wgvdxze@um.fi.intel.com> References: <1526964735-16566-1-git-send-email-luwei.kang@intel.com> <1526964735-16566-10-git-send-email-luwei.kang@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1526964735-16566-10-git-send-email-luwei.kang@intel.com> User-Agent: NeoMutt/20180323 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 22, 2018 at 12:52:12PM +0800, Luwei Kang wrote: > Initialize the Intel PT configuration when cpuid update. Is it the CPUID configuration? Is it the MSR configuration? Is it both? Kind of looks like both. Not sure what is the cpuid update, though. > Include cpuid inforamtion, rtit_ctl bit mask and the number of > address ranges. > > Signed-off-by: Luwei Kang > --- > arch/x86/kvm/vmx.c | 70 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 70 insertions(+) > > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index 11fb90a..952ddf4 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -10411,6 +10411,72 @@ static void nested_vmx_cr_fixed1_bits_update(struct kvm_vcpu *vcpu) > #undef cr4_fixed1_update > } > > +static void update_intel_pt_cfg(struct kvm_vcpu *vcpu) > +{ > + struct vcpu_vmx *vmx = to_vmx(vcpu); > + struct kvm_cpuid_entry2 *best = NULL; > + int i; > + > + for (i = 0; i < PT_CPUID_LEAVES; i++) { > + best = kvm_find_cpuid_entry(vcpu, 0x14, i); > + if (!best) > + return; > + vmx->pt_desc.caps[CPUID_EAX + i*PT_CPUID_REGS_NUM] = best->eax; > + vmx->pt_desc.caps[CPUID_EBX + i*PT_CPUID_REGS_NUM] = best->ebx; > + vmx->pt_desc.caps[CPUID_ECX + i*PT_CPUID_REGS_NUM] = best->ecx; > + vmx->pt_desc.caps[CPUID_EDX + i*PT_CPUID_REGS_NUM] = best->edx; > + } > + > + /* Get the number of configurable Address Ranges for filtering */ > + vmx->pt_desc.addr_range = pt_cap_decode(vmx->pt_desc.caps, > + PT_CAP_num_address_ranges); > + > + /* Initialize and clear the no dependency bits */ > + vmx->pt_desc.ctl_bitmask = ~0ULL; This looks redundant, doesn't it? > + vmx->pt_desc.ctl_bitmask = ~(RTIT_CTL_TRACEEN | RTIT_CTL_OS | > + RTIT_CTL_USR | RTIT_CTL_TSC_EN | RTIT_CTL_DISRETC); > + > + /* If CPUID.(EAX=14H,ECX=0):EBX[0]=1 CR3Filter can be set */ This comment makes it less clear than it would have been otherwise. > + if (pt_cap_decode(vmx->pt_desc.caps, PT_CAP_cr3_filtering)) > + vmx->pt_desc.ctl_bitmask &= ~RTIT_CTL_CR3EN; > + > + /* > + * If CPUID.(EAX=14H,ECX=0):EBX[1]=1 CYCEn, CycThresh and > + * PSBFreq can be set > + */ > + if (pt_cap_decode(vmx->pt_desc.caps, PT_CAP_psb_cyc)) > + vmx->pt_desc.ctl_bitmask &= ~(RTIT_CTL_CYCLEACC | > + RTIT_CTL_CYC_THRESH | RTIT_CTL_PSB_FREQ); > + > + /* > + * If CPUID.(EAX=14H,ECX=0):EBX[3]=1 MTCEn BranchEn and > + * MTCFreq can be set > + */ > + if (pt_cap_decode(vmx->pt_desc.caps, PT_CAP_mtc)) > + vmx->pt_desc.ctl_bitmask &= ~(RTIT_CTL_MTC_EN | > + RTIT_CTL_BRANCH_EN | RTIT_CTL_MTC_RANGE); > + > + /* If CPUID.(EAX=14H,ECX=0):EBX[4]=1 FUPonPTW and PTWEn can be set */ > + if (pt_cap_decode(vmx->pt_desc.caps, PT_CAP_ptwrite)) > + vmx->pt_desc.ctl_bitmask &= ~(RTIT_CTL_FUP_ON_PTW | > + RTIT_CTL_PTW_EN); > + > + /* If CPUID.(EAX=14H,ECX=0):EBX[5]=1 PwrEvEn can be set */ > + if (pt_cap_decode(vmx->pt_desc.caps, PT_CAP_power_event_trace)) > + vmx->pt_desc.ctl_bitmask &= ~RTIT_CTL_PWR_EVT_EN; > + > + /* If CPUID.(EAX=14H,ECX=0):ECX[0]=1 ToPA can be set */ > + if (pt_cap_decode(vmx->pt_desc.caps, PT_CAP_topa_output)) > + vmx->pt_desc.ctl_bitmask &= ~RTIT_CTL_TOPA; If you want to be thorough, there's also PT_CAP_single_range_output, which tells us if RTIT_CTL_TOPA can be *unset*. Otherwise it's required. > + /* If CPUID.(EAX=14H,ECX=0):ECX[3]=1 FabircEn can be set */ > + if (pt_cap_decode(vmx->pt_desc.caps, PT_CAP_output_subsys)) > + vmx->pt_desc.ctl_bitmask &= ~RTIT_CTL_FABRIC_EN; Are we sure we want to virtualize this and that it's safe? > + > + /* unmask address range configure area */ > + for (i = 0; i < vmx->pt_desc.addr_range; i++) > + vmx->pt_desc.ctl_bitmask &= ~(0xf << (32 + i * 4)); So, the ctl_bitmask is all the bits that are not allowed? Regards, -- Alex