Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1542090yba; Thu, 25 Apr 2019 01:20:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqyWtZHhYpHMqmYeMktf1svsHMVyUVSXpp13LRRGvCzGlOmSjyBsXKPVmFdc+ZJTd55nSUAU X-Received: by 2002:a63:82c6:: with SMTP id w189mr15438683pgd.444.1556180404491; Thu, 25 Apr 2019 01:20:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556180404; cv=none; d=google.com; s=arc-20160816; b=UDJ6D7GBN86xnF7DC184Elnoi/Qy8hKhwKHApG/nsGK3ij31i9UOa2iSfX4Us8CTDA ERSRpwTiz3dfSqRxEXXiZfClk02uUILuFuAIEHRM88PlWyf7+hUZ55i2Uy23FHbi7wrg lDYyJ/ux7wckBdcV//+jAzlAzM8MOqC44ea1gd9ttC3w+f4p9bRaHUq1l/e89AOvJ2c0 ayu0JHJ71P2lnLb1T+X9lpuKrBJk9Z/SUOTpU3qpfAZzyUeLtajrXnfBcCQY4YLqPNDG qVEhtqff6FJxB7r/2swyRotFep3bFTguX9Fm4vQTlbXP0CXbjNJB4x3d1BL2BGOLUJT3 yFIA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:from:references:cc:to:subject; bh=44+vG99wdFt+wAp8Nn6ADhGtAs4PpHu3dFLY09pqqIM=; b=ZQTmTFLZn7b39Ls2J3qtU/DY9UGPw4Fx8LSu8p65LHjM6jcrEdrRe9pidsBx+3hrUW WsqOpZh+j0GpjRIVDD4Qp/od0lpgn3DD+DTkpHff/+MvymgaUGKv0ieBfWdHT1JZikNv UI2vCHcylQjEbd0px2r3x7RCouWORhx/ABJpHa/imMpQaq+0UEngaxHHx1HqQhH+j4ZP /5WQfGK36i5EMZrwQmWKZTOmjdcgYgsSip6zcEFc8/uUgzQwEi/2pWBmfTh46a3v8J74 6TRPjq4WmvELj/xySuK04k7HlmsE1n7cQST2vIJ44fIMl7xekDvfcdjOaNAMgdOkWQoo c8kw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 7si20253119pgn.419.2019.04.25.01.19.49; Thu, 25 Apr 2019 01:20:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729374AbfDYGCn (ORCPT + 99 others); Thu, 25 Apr 2019 02:02:43 -0400 Received: from mga05.intel.com ([192.55.52.43]:23355 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727099AbfDYGCn (ORCPT ); Thu, 25 Apr 2019 02:02:43 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Apr 2019 23:02:42 -0700 X-IronPort-AV: E=Sophos;i="5.60,392,1549958400"; d="scan'208";a="137261928" Received: from likexu-mobl1.ccr.corp.intel.com (HELO [10.239.196.186]) ([10.239.196.186]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/AES128-SHA; 24 Apr 2019 23:02:41 -0700 Subject: Re: [PATCH] KVM: x86: Add Intel CPUID.1F cpuid emulation support To: Xiaoyao Li , Sean Christopherson Cc: kvm@vger.kernel.org, Paolo Bonzini , Thomas Gleixner , Len Brown , linux-kernel@vger.kernel.org References: <1555915234-2536-1-git-send-email-like.xu@linux.intel.com> <20190424143238.GB18442@linux.intel.com> From: Like Xu Organization: Intel OTC Message-ID: <30857e40-05b6-0f4c-d07c-919de08c90ac@linux.intel.com> Date: Thu, 25 Apr 2019 14:02:39 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/4/25 12:18, Xiaoyao Li wrote: > On Thu, 2019-04-25 at 10:58 +0800, Like Xu wrote: >> On 2019/4/24 22:32, Sean Christopherson wrote: >>> Now that I understand how min() works... >>> >>> On Mon, Apr 22, 2019 at 02:40:34PM +0800, Like Xu wrote: >>>> Expose Intel V2 Extended Topology Enumeration Leaf to guest only when >>>> host system has multiple software-visible die within each package. >>>> >>>> Signed-off-by: Like Xu >>>> --- >>>> arch/x86/kvm/cpuid.c | 13 +++++++++++++ >>>> 1 file changed, 13 insertions(+) >>>> >>>> diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c >>>> index fd39516..9fc14f2 100644 >>>> --- a/arch/x86/kvm/cpuid.c >>>> +++ b/arch/x86/kvm/cpuid.c >>>> @@ -65,6 +65,16 @@ u64 kvm_supported_xcr0(void) >>>> return xcr0; >>>> } >>>> >>>> +/* We need to check if the host cpu has multi-chip packaging technology. >>>> */ >>>> +static bool kvm_supported_intel_mcp(void) >>>> +{ >>>> + u32 eax, ignored; >>>> + >>>> + cpuid_count(0x1f, 0, &eax, &ignored, &ignored, &ignored); >>> >>> This is broken because of how CPUID works for unsupported input leafs: >>> >>> If a value entered for CPUID.EAX is higher than the maximum input value >>> for basic or extended function for that processor then the data for the >>> highest basic information leaf is returned. >>> >>> For example, my system with a max basic leaf of 0x16 returns 0x00000e74 >>> for CPUID.1F.EAX. >> >> You're right and the cpuid.1f.eax check is unreliable after I checked a >> few machines. >> >>> >>>> + >>>> + return boot_cpu_data.x86_vendor == X86_VENDOR_INTEL && (eax != 0); >>> >>> Checking 'eax != 0' is broken as it will be '0' when SMT is disabled. ecx >>> is the obvious choice since bits 15:8 are guaranteed to be non-zero when >>> the leaf is valid. >> >> I agree with this and ecx[15:8] makes sense. >> >>> >>> I think we can skip the vendor check. AFAIK, CPUID.1F isn't used by AMD, >>> and since AMD and Intel try to maintain a semblance of CPUID compatibility >>> it seems more likely that AMD/Hygon would implement CPUID.1F as-is rather >>> than repurpose it to mean something else entirely. >> >> If it's true, let's skip the vendor check. >> >> // I have to mention that AMD already has MCP CPUs. >> >>> >>>> +} >>>> + >>>> #define F(x) bit(X86_FEATURE_##x) >>>> >>>> int kvm_update_cpuid(struct kvm_vcpu *vcpu) >>>> @@ -426,6 +436,7 @@ static inline int __do_cpuid_ent(struct >>>> kvm_cpuid_entry2 *entry, u32 function, >>>> switch (function) { >>>> case 0: >>>> entry->eax = min(entry->eax, (u32)(f_intel_pt ? 0x14 : >>>> 0xd)); >>>> + entry->eax = kvm_supported_intel_mcp() ? 0x1f : entry->eax; >>> >>> If we put everything together, I think the code can be reduced to: >>> >>> /* comment about multi-chip leaf... */ >>> if (entry->eax >= 0x1f && cpuid_ecx(0x1f)) >>> entry->eax = 0x1f; >>> else >>> entry->eax = min(entry->eax, >>> (u32)(f_intel_pt ? 0x14 : 0xd)); >> >> Based on: >> >> ECX Bits 07 - 00: Level number. Same value in ECX input. >> Bits 15 - 08: Level type. >> Bits 31 - 16: Reserved. >> >> how about using an increasing order: >> >> entry->eax = min(entry->eax, (u32)(f_intel_pt ? 0x14 : 0xd)); >> >> // ... more checks when eax is between 0x14 and 0x1f if any >> >> /* Check if the host cpu has multi-chip packaging technology.*/ >> if (((cpuid_ecx(0x1f) >> 8) & 0xff) != 0) >> entry->eax = 0x1f; > > As Sean pointed out, you cannot rely on the output of cpuid.1f to indicate the > existence of leaf 1f. If maximum basic leaf supported is smaller than 1f, the > data returned by cpuid_ecx(0x1f) is the actual highest basic information leaf of > the hardware. I don't think so. > So using "entry->eax >= 0x1f" from cpuid.0H is and only is the right way to > check the existence of leaf 1f. > > We can simply use (cpuid_ecx(0x1f) & 0x0000ff00) to avoid the unnecessory > shifting operation. I borrowed this "unnecessory" shifting operation from host check_extended_topology_leaf() and we may do better on this. > Besides, the problem of simply using cpuid_exc(0x1f) in Sean's codes is that we > cannot assmue the reserved bits 31:16 of ECX is always 0 for the future > generation. It's true cause the statement in public spec is not "Reserved = 0" but "Bits 31 - 16: Reserved". > > In my opinion, Sean's codes is OK and much simple and clear. If the host cpuid.0.eax is greater than 0x1f but actually it doesn't have multi-chip packaging technology and we may want to expose entry->eax to some value smaller than 0x1f but greater than 0x14, much effort needs to apply on Sean's code. My improvement is good to overwrite cpuid.0.eax in future usage from the perspective of kvm feature setting not just from value check. > All need to do is using (cpuid_ecx(0x1f) & 0x0000ff00) to verify the leaf.1f is > valid. > > Thanks, > -Xiaoyao >> // ... more checks when eax greater than 0x1f if any >> >> are we OK with it? >> >>>> break; >>>> case 1: >>>> entry->edx &= kvm_cpuid_1_edx_x86_features; >>>> @@ -544,6 +555,8 @@ static inline int __do_cpuid_ent(struct >>>> kvm_cpuid_entry2 *entry, u32 function, >>>> entry->edx = edx.full; >>>> break; >>>> } >>>> + /* function 0x1f has additional index. */ >>>> + case 0x1f: >>>> /* function 0xb has additional index. */ >>>> case 0xb: { >>>> int i, level_type; >>>> -- >>>> 1.8.3.1 >>>> >> >> > >