Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp705938ybi; Wed, 19 Jun 2019 06:34:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqyB7tByW5jOwf1JNDHFghCTH8UFI++JXwJrSb4ByEod4HaUiajcHgjm8i53yniqCgj1h0xS X-Received: by 2002:a62:fb18:: with SMTP id x24mr124934178pfm.76.1560951250827; Wed, 19 Jun 2019 06:34:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560951250; cv=none; d=google.com; s=arc-20160816; b=K9ogLxgVncxHJwPp/OWAsX2h49L8A02nz5RK6Nns2V4Rv3ZZCxjIJTRuy3470axhV+ orBQKEjKgUHwYSZSVl9MXWP0G1vnUNf4O3l8zIwDyeJA2HrD4v/x2MpwTNkeIpbLQv6/ 6GnxPVVHZC4H2E46XkCrU7LErgt27tWjsth1LgpEvuz4Mvd+3Cdj8YozK/TdgG0rEXvo T1A9c+1D31N1PES1tUSqE43esQQmbMYdff3QBwCotPTRZbP9oOe2uVxa1pCoHX6pTvdc XQWcg/Hm905a8dYBbV3qTWCaHhBRabgZjhUhr3OAktqAyCDnfrD+GW7y4PioZGDCNAdj ft3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=Z+qTA2A3zlj13tpMztKFQShQ1+bGXNGQN19JhMYxo8U=; b=kTj+7h8bJu7wjJLVOpP6iKKGV1dHe3M/PXSTOGDNRq98CxVjI+8uoLvDpOa7prIF29 M9/WVtrAroc87vcHArBdXHHExdGK6DgMss0kA36yhL0msikorY3lBxTNaP9qK5D0rTmK zQoue8onwVRv+44Tx0/SHC4N8IZG6CykeJJCPH1cXJ4OZed9+MSb0fzPeZ+3ofHXkoKR 2GXwgceX6utYvmXqs+30wYEUaKGzxqH4lOTA9acbGRr3P2mDyT1JgRfj86x0iSAZz9eb HJaPMzjoMtMF9cm7JrwCheZwXwKN8hlXEu8YMQRmo27tC0LIyElhiK8hxrXpJwRPRq0u LPrg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k28si3126823pgl.14.2019.06.19.06.33.54; Wed, 19 Jun 2019 06:34:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731171AbfFSNdC (ORCPT + 99 others); Wed, 19 Jun 2019 09:33:02 -0400 Received: from mga05.intel.com ([192.55.52.43]:23391 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729287AbfFSNdC (ORCPT ); Wed, 19 Jun 2019 09:33:02 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Jun 2019 06:33:01 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.63,392,1557212400"; d="scan'208";a="311356409" Received: from dli18-mobl.ccr.corp.intel.com (HELO [10.255.29.252]) ([10.255.29.252]) by orsmga004.jf.intel.com with ESMTP; 19 Jun 2019 06:32:57 -0700 Subject: Re: [PATCH v4 1/3] KVM: x86: add support for user wait instructions To: Xiaoyao Li , pbonzini@redhat.com, rkrcmar@redhat.com, corbet@lwn.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, sean.j.christopherson@intel.com Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, fenghua.yu@intel.com, jingqi.liu@intel.com References: <20190619060945.14104-1-tao3.xu@intel.com> <20190619060945.14104-2-tao3.xu@intel.com> <7f6bc0fa-abcd-ce0a-19a0-a5767d094181@linux.intel.com> <10820bce-69fa-4cee-f95b-5a8de20388d1@intel.com> From: Tao Xu Message-ID: <6b2abf36-2b2f-d721-ae9d-bd2b26785eba@intel.com> Date: Wed, 19 Jun 2019 21:32:55 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/19/2019 3:16 PM, Xiaoyao Li wrote: > On 6/19/2019 3:01 PM, Tao Xu wrote: >> On 6/19/2019 2:23 PM, Xiaoyao Li wrote: >>> >>> >>> On 6/19/2019 2:09 PM, Tao Xu wrote: >>>> UMONITOR, UMWAIT and TPAUSE are a set of user wait instructions. >>>> This patch adds support for user wait instructions in KVM. Availability >>>> of the user wait instructions is indicated by the presence of the CPUID >>>> feature flag WAITPKG CPUID.0x07.0x0:ECX[5]. User wait instructions may >>>> be executed at any privilege level, and use IA32_UMWAIT_CONTROL MSR to >>>> set the maximum time. >>>> >>>> The behavior of user wait instructions in VMX non-root operation is >>>> determined first by the setting of the "enable user wait and pause" >>>> secondary processor-based VM-execution control bit 26. >>>>     If the VM-execution control is 0, UMONITOR/UMWAIT/TPAUSE cause >>>> an invalid-opcode exception (#UD). >>>>     If the VM-execution control is 1, treatment is based on the >>>> setting of the “RDTSC exiting” VM-execution control. Because KVM never >>>> enables RDTSC exiting, if the instruction causes a delay, the amount of >>>> time delayed is called here the physical delay. The physical delay is >>>> first computed by determining the virtual delay. If >>>> IA32_UMWAIT_CONTROL[31:2] is zero, the virtual delay is the value in >>>> EDX:EAX minus the value that RDTSC would return; if >>>> IA32_UMWAIT_CONTROL[31:2] is not zero, the virtual delay is the minimum >>>> of that difference and AND(IA32_UMWAIT_CONTROL,FFFFFFFCH). >>>> >>>> Because umwait and tpause can put a (psysical) CPU into a power saving >>>> state, by default we dont't expose it to kvm and enable it only when >>>> guest CPUID has it. >>>> >>>> Detailed information about user wait instructions can be found in the >>>> latest Intel 64 and IA-32 Architectures Software Developer's Manual. >>>> >>>> Co-developed-by: Jingqi Liu >>>> Signed-off-by: Jingqi Liu >>>> Signed-off-by: Tao Xu >>>> --- >>>> >>>> no changes in v4. >>>> --- >>>>   arch/x86/include/asm/vmx.h      | 1 + >>>>   arch/x86/kvm/cpuid.c            | 2 +- >>>>   arch/x86/kvm/vmx/capabilities.h | 6 ++++++ >>>>   arch/x86/kvm/vmx/vmx.c          | 4 ++++ >>>>   4 files changed, 12 insertions(+), 1 deletion(-) >>>> >>>> diff --git a/arch/x86/include/asm/vmx.h b/arch/x86/include/asm/vmx.h >>>> index a39136b0d509..8f00882664d3 100644 >>>> --- a/arch/x86/include/asm/vmx.h >>>> +++ b/arch/x86/include/asm/vmx.h >>>> @@ -69,6 +69,7 @@ >>>>   #define SECONDARY_EXEC_PT_USE_GPA        0x01000000 >>>>   #define SECONDARY_EXEC_MODE_BASED_EPT_EXEC    0x00400000 >>>>   #define SECONDARY_EXEC_TSC_SCALING              0x02000000 >>>> +#define SECONDARY_EXEC_ENABLE_USR_WAIT_PAUSE    0x04000000 >>>>   #define PIN_BASED_EXT_INTR_MASK                 0x00000001 >>>>   #define PIN_BASED_NMI_EXITING                   0x00000008 >>>> diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c >>>> index e18a9f9f65b5..48bd851a6ae5 100644 >>>> --- a/arch/x86/kvm/cpuid.c >>>> +++ b/arch/x86/kvm/cpuid.c >>>> @@ -405,7 +405,7 @@ static inline int __do_cpuid_ent(struct >>>> kvm_cpuid_entry2 *entry, u32 function, >>>>           F(AVX512VBMI) | F(LA57) | F(PKU) | 0 /*OSPKE*/ | >>>>           F(AVX512_VPOPCNTDQ) | F(UMIP) | F(AVX512_VBMI2) | F(GFNI) | >>>>           F(VAES) | F(VPCLMULQDQ) | F(AVX512_VNNI) | F(AVX512_BITALG) | >>>> -        F(CLDEMOTE) | F(MOVDIRI) | F(MOVDIR64B); >>>> +        F(CLDEMOTE) | F(MOVDIRI) | F(MOVDIR64B) | 0 /*WAITPKG*/; >>>>       /* cpuid 7.0.edx*/ >>>>       const u32 kvm_cpuid_7_0_edx_x86_features = >>>> diff --git a/arch/x86/kvm/vmx/capabilities.h >>>> b/arch/x86/kvm/vmx/capabilities.h >>>> index d6664ee3d127..fd77e17651b4 100644 >>>> --- a/arch/x86/kvm/vmx/capabilities.h >>>> +++ b/arch/x86/kvm/vmx/capabilities.h >>>> @@ -253,6 +253,12 @@ static inline bool cpu_has_vmx_tsc_scaling(void) >>>>           SECONDARY_EXEC_TSC_SCALING; >>>>   } >>>> +static inline bool vmx_waitpkg_supported(void) >>>> +{ >>>> +    return vmcs_config.cpu_based_2nd_exec_ctrl & >>>> +        SECONDARY_EXEC_ENABLE_USR_WAIT_PAUSE; >>> >>> Shouldn't it be >>>      return vmx->secondary_exec_control & >>>                  SECONDARY_EXEC_ENABLE_USR_WAIT_PAUSE;   ? >> >> vmx->secondary_exec_control is another way to get >> SECONDARY_EXEC_CONTROL but it need to add vmx as input. Use >> vmcs_config.cpu_based_2nd_exec_ctrl   is easy expand to use in other >> place. >> > > This patch want to enable waitpkg for guest only when > guest_cpuid_has(vcpu, X86_FEATURE_WAITPKG), and it only updates > vmx->secondary_exec_control based on guest's cpuid when setup vcpu. But > vmcs_config remains unchanged.  So using vmcs_config there is wrong. > Xiaoyao, you are right. And MSR_IA32_XSS has the same logic. I will fix my patch. And we may need to submit a fix patch for MSR_IA32_XSS.