Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1926692ybi; Thu, 20 Jun 2019 06:19:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqy0tRER4Ca/x022yVDHVnKZrur6qS57XrWedbrh4KMFi0VzVox0Or4UOM7HUPmgTnR2AQhs X-Received: by 2002:a65:5c88:: with SMTP id a8mr12598449pgt.388.1561036746096; Thu, 20 Jun 2019 06:19:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561036746; cv=none; d=google.com; s=arc-20160816; b=Uk+jLg09Akv7XLDKs4e5Sxp4zH/pYOagVurqadi+pMgjeyGaombBwElukV7d+ZH4Vc JneWC/AHktXP5ZgxqUW0wPPdnsVuFMyuDPLBqDyc6O6WBsTsXHEQonNgkFKC9iwO6Ngt Aj7J80ZWNr6JwawXzHMrL2SKuH9WDO8kYQ8u75AXB0FKn/8jQsAXoOMUQI6x9/OPmy/E 1zs9603/4Qmh5joNiYmqLHzFqxwkaubYOpX3DIfB0K77UDLkO3KyBA+HzHGb3hexCE/9 PhAhcUHxhOMy1WCj/sYZQUjz2tqy3MiPj3qhE5DRiIMC5jMHr8oVDNc521Hp4InwsA0t 8rjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id; bh=Kb31oMticcjKQ4JeHc3vGFLCbf3u9ZEEXWNrqOUM4Lg=; b=K4jHQE3pVB43wme1J3Z0eAGwLHg3EahkGIvCkFU2SAZdOF9CQZxmThqmKVJu1U6gb0 nsDs51XhdCQjR+GoJYAx5EYjSpP5Hgn4SEHTlqw8NlP3ZLQ9GR+Zjbd11M1H+1eNp7Yt skwamHjUVJX/Ol7W33RTmquCGz+6i6rHjFIS+a/HVFXqH6iWelzEYkYKa50xXIt4629B +zAlLBPUtcc+2XggwGQYef9RnG+E4QzR/Z34rGRCbfQFYuLO1s7wNALwYcJkMXBnrkac IrE54P5L2w5w3yoEVRQRtTZlP7EPsdCUSiLOPjtcObgN0IKYENGr+wyplcvjowdgGs/B xZqw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f9si19847599pfd.110.2019.06.20.06.18.48; Thu, 20 Jun 2019 06:19:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732078AbfFTNSp (ORCPT + 99 others); Thu, 20 Jun 2019 09:18:45 -0400 Received: from mga02.intel.com ([134.134.136.20]:33490 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731975AbfFTNSo (ORCPT ); Thu, 20 Jun 2019 09:18:44 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Jun 2019 06:18:44 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.63,396,1557212400"; d="scan'208";a="243621598" Received: from lxy-dell.sh.intel.com ([10.239.159.145]) by orsmga001.jf.intel.com with ESMTP; 20 Jun 2019 06:18:41 -0700 Message-ID: <1e95bac4daa3dcc1d8896a23e430e78f06a9d19d.camel@linux.intel.com> Subject: Re: [PATCH v5 1/3] KVM: x86: add support for user wait instructions From: Xiaoyao Li To: Tao Xu , pbonzini@redhat.com, rkrcmar@redhat.com, corbet@lwn.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, sean.j.christopherson@intel.com Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, fenghua.yu@intel.com, jingqi.liu@intel.com Date: Thu, 20 Jun 2019 21:13:43 +0800 In-Reply-To: <20190620084620.17974-2-tao3.xu@intel.com> References: <20190620084620.17974-1-tao3.xu@intel.com> <20190620084620.17974-2-tao3.xu@intel.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5 (3.28.5-2.el7) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2019-06-20 at 16:46 +0800, Tao Xu wrote: > UMONITOR, UMWAIT and TPAUSE are a set of user wait instructions. > This patch adds support for user wait instructions in KVM. Availability > of the user wait instructions is indicated by the presence of the CPUID > feature flag WAITPKG CPUID.0x07.0x0:ECX[5]. User wait instructions may > be executed at any privilege level, and use IA32_UMWAIT_CONTROL MSR to > set the maximum time. > > The behavior of user wait instructions in VMX non-root operation is > determined first by the setting of the "enable user wait and pause" > secondary processor-based VM-execution control bit 26. > If the VM-execution control is 0, UMONITOR/UMWAIT/TPAUSE cause > an invalid-opcode exception (#UD). > If the VM-execution control is 1, treatment is based on the > setting of the “RDTSC exiting” VM-execution control. Because KVM never > enables RDTSC exiting, if the instruction causes a delay, the amount of > time delayed is called here the physical delay. The physical delay is > first computed by determining the virtual delay. If > IA32_UMWAIT_CONTROL[31:2] is zero, the virtual delay is the value in > EDX:EAX minus the value that RDTSC would return; if > IA32_UMWAIT_CONTROL[31:2] is not zero, the virtual delay is the minimum > of that difference and AND(IA32_UMWAIT_CONTROL,FFFFFFFCH). > > Because umwait and tpause can put a (psysical) CPU into a power saving > state, by default we dont't expose it to kvm and enable it only when > guest CPUID has it. > > Detailed information about user wait instructions can be found in the > latest Intel 64 and IA-32 Architectures Software Developer's Manual. > > Co-developed-by: Jingqi Liu > Signed-off-by: Jingqi Liu > Signed-off-by: Tao Xu Reviewed-by: Xiaoyao Li > --- > > Changes in v5: > remove vmx_waitpkg_supported() and use > guest_cpuid_has(vcpu, X86_FEATURE_WAITPKG) directly (Xiaoyao) > --- > arch/x86/include/asm/vmx.h | 1 + > arch/x86/kvm/cpuid.c | 2 +- > arch/x86/kvm/vmx/vmx.c | 4 ++++ > 3 files changed, 6 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/include/asm/vmx.h b/arch/x86/include/asm/vmx.h > index a39136b0d509..8f00882664d3 100644 > --- a/arch/x86/include/asm/vmx.h > +++ b/arch/x86/include/asm/vmx.h > @@ -69,6 +69,7 @@ > #define SECONDARY_EXEC_PT_USE_GPA 0x01000000 > #define SECONDARY_EXEC_MODE_BASED_EPT_EXEC 0x00400000 > #define SECONDARY_EXEC_TSC_SCALING 0x02000000 > +#define SECONDARY_EXEC_ENABLE_USR_WAIT_PAUSE 0x04000000 > > #define PIN_BASED_EXT_INTR_MASK 0x00000001 > #define PIN_BASED_NMI_EXITING 0x00000008 > diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c > index e18a9f9f65b5..48bd851a6ae5 100644 > --- a/arch/x86/kvm/cpuid.c > +++ b/arch/x86/kvm/cpuid.c > @@ -405,7 +405,7 @@ static inline int __do_cpuid_ent(struct kvm_cpuid_entry2 > *entry, u32 function, > F(AVX512VBMI) | F(LA57) | F(PKU) | 0 /*OSPKE*/ | > F(AVX512_VPOPCNTDQ) | F(UMIP) | F(AVX512_VBMI2) | F(GFNI) | > F(VAES) | F(VPCLMULQDQ) | F(AVX512_VNNI) | F(AVX512_BITALG) | > - F(CLDEMOTE) | F(MOVDIRI) | F(MOVDIR64B); > + F(CLDEMOTE) | F(MOVDIRI) | F(MOVDIR64B) | 0 /*WAITPKG*/; > > /* cpuid 7.0.edx*/ > const u32 kvm_cpuid_7_0_edx_x86_features = > diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c > index b93e36ddee5e..b35bfac30a34 100644 > --- a/arch/x86/kvm/vmx/vmx.c > +++ b/arch/x86/kvm/vmx/vmx.c > @@ -2250,6 +2250,7 @@ static __init int setup_vmcs_config(struct vmcs_config > *vmcs_conf, > SECONDARY_EXEC_RDRAND_EXITING | > SECONDARY_EXEC_ENABLE_PML | > SECONDARY_EXEC_TSC_SCALING | > + SECONDARY_EXEC_ENABLE_USR_WAIT_PAUSE | > SECONDARY_EXEC_PT_USE_GPA | > SECONDARY_EXEC_PT_CONCEAL_VMX | > SECONDARY_EXEC_ENABLE_VMFUNC | > @@ -3987,6 +3988,9 @@ static void vmx_compute_secondary_exec_control(struct > vcpu_vmx *vmx) > } > } > > + if (!guest_cpuid_has(vcpu, X86_FEATURE_WAITPKG)) > + exec_control &= ~SECONDARY_EXEC_ENABLE_USR_WAIT_PAUSE; > + > vmx->secondary_exec_control = exec_control; > } >