Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3617078ybi; Sun, 14 Jul 2019 18:29:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqzs4ivfwmXPpatPtvlS++SoMmSG92wt2tqPFlNf0e3kmatibp54n/nFH8/0XwdJFo5UMp/O X-Received: by 2002:a63:e5a:: with SMTP id 26mr23349865pgo.3.1563154177470; Sun, 14 Jul 2019 18:29:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563154177; cv=none; d=google.com; s=arc-20160816; b=GwvQagEeEjKnd1xaxR1zN1J1qWs4EyR3ZgcjfiW9O7f06pyRSRxX+Rj+Xpid5brIsD pS38cumIQk+gmIgc1Q04Hn8bQK2s2PknzwMO3RWcWdTp1Y0h66H1sDRqu0BLXHtAwyAV AVqP80wNLXrthKEWJ16MIlEBwG1dghPDDMfBgEWL8Ij97GSrtdzvQld7IYtHSJSpuOwC Q3VXAI9fQmEC4lzVXP2S36Y46FyVlqQHpaHpTCeR5wKI8cZaLNUP3j944NwXdYwaprlX cE397nivPkyFV+vMtqa+0rtjvdR7Qer945q5FYdmKp+4JKOZFtILdVbgbDeWrtHfewfM iCgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=J0uuieNJWIEqFucVVL6HHob/1V+xJ9X3pNwzM9VDJZ0=; b=ebHMF75/6oaS7TljgKKk6jzV4nhv88WBMTIRTPbrkXHevsRQPAEymPmh9a4lmyPTgQ MwNZ25s+NcNd3nklm11jPs+foTdzTnUGO8L3ffLv9x8smrH97V7YQCV4T0O7ud+L0vxg JeFWESgmlpkzoFGqTlGY574ELFntO12beO1u9/ysTUvai6nNaerc8lTwEbJt08/jXkR/ NxJO5bwpyFfCc/WwEQ0svBwDv6mH3e6KKiXP5FKUbZfQjeyG7us4HkP/6pU00hftikCN Q/PAV7CfXHbds3m7QBhfp+xBqcIQoEAueGr5flORYU7XG2X2a6q0SEKvfVTituL6mAF1 DMyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=i8NhfdRW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d39si8759677pla.371.2019.07.14.18.29.17; Sun, 14 Jul 2019 18:29:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=i8NhfdRW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729014AbfGOB2z (ORCPT + 99 others); Sun, 14 Jul 2019 21:28:55 -0400 Received: from mail-pg1-f195.google.com ([209.85.215.195]:39735 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727006AbfGOB2y (ORCPT ); Sun, 14 Jul 2019 21:28:54 -0400 Received: by mail-pg1-f195.google.com with SMTP id u17so6899652pgi.6; Sun, 14 Jul 2019 18:28:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=J0uuieNJWIEqFucVVL6HHob/1V+xJ9X3pNwzM9VDJZ0=; b=i8NhfdRWTkmqEfZfCzU6oPHv7PGnVKfRg+X/b4xOt2S5SqMQ29UUIxVI2TlfpZu76f vOMoGM8eRo5AZgdPp1J8r7HMj+Ge6VoyzIGyVqiLtccwhIPCJtjH3W22rdKgjWO05S1I 6T4XK6CF/169lYtJ41je6yOzqDUa7h/d2x5ZXm5s3J1Cimo6rI0gqMUFMdQ4A4CjH9PH fD3f404sOpFSlsFAw8Zy16LwPNz0YiT6YEDkvLqggQWB4gV5G7imDyKMkEqArivlODTP myfYxTKqPpkNZJPpbxYBKSW7rj7EZwTGw3oA0F6AzUBMzL6XYWKsEwYEDYUjlom36WEz Ic0w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=J0uuieNJWIEqFucVVL6HHob/1V+xJ9X3pNwzM9VDJZ0=; b=epmZ7ifMZkqDnVEAACgqjajXxSJ+o7nI8qSui8svCaP3xutXRVJ6dSgSI+Lar85YP7 wFsIHnzyVpNXFV7Xxf34t9GrWF8dEo4ydj7PvQnqQrZgN22mfIT5Udi4u1AjB1STcB0d OYyZ7/IVoksMFjDCREeirYrKy/PO3kgfYBxVZ1QilQKQ44+7DtTCF4+5fA6nJhYfCvWA nyrfkozFzxSEriClLflkoCh/Zht6XhAX/SLo5TMsZPgPnIMCP1LBerCfkPAmguA32ch7 +8eoIhzon7Ltl6XQYajjcuPNExS1rga8PYVslQNLcgRxZ5JGM1KeuJ0g7IoE1g4E8eqh V/Vw== X-Gm-Message-State: APjAAAVZH6NnUGC6uttueW5m0Qv1YbNt6cJMzhrlmgwdoVKxDOk1qGzi aWuDuarRosbJJjxyzDQB734pBB2Za98= X-Received: by 2002:a17:90a:2247:: with SMTP id c65mr25371401pje.24.1563154133835; Sun, 14 Jul 2019 18:28:53 -0700 (PDT) Received: from localhost.localdomain ([203.205.141.123]) by smtp.googlemail.com with ESMTPSA id o14sm15386915pjp.29.2019.07.14.18.28.51 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sun, 14 Jul 2019 18:28:53 -0700 (PDT) From: Wanpeng Li X-Google-Original-From: Wanpeng Li To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Eduardo Habkost Subject: [PATCH RESEND] i386/kvm: support guest access CORE cstate Date: Mon, 15 Jul 2019 09:28:44 +0800 Message-Id: <1563154124-18579-1-git-send-email-wanpengli@tencent.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Wanpeng Li Allow guest reads CORE cstate when exposing host CPU power management capabilities to the guest. PKG cstate is restricted to avoid a guest to get the whole package information in multi-tenant scenario. Cc: Eduardo Habkost Cc: Paolo Bonzini Cc: Radim Krčmář Signed-off-by: Wanpeng Li --- linux-headers/linux/kvm.h | 4 +++- target/i386/kvm.c | 3 ++- 2 files changed, 5 insertions(+), 2 deletions(-) diff --git a/linux-headers/linux/kvm.h b/linux-headers/linux/kvm.h index b53ee59..d648fde 100644 --- a/linux-headers/linux/kvm.h +++ b/linux-headers/linux/kvm.h @@ -696,9 +696,11 @@ struct kvm_ioeventfd { #define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0) #define KVM_X86_DISABLE_EXITS_HLT (1 << 1) #define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2) +#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3) #define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \ KVM_X86_DISABLE_EXITS_HLT | \ - KVM_X86_DISABLE_EXITS_PAUSE) + KVM_X86_DISABLE_EXITS_PAUSE | \ + KVM_X86_DISABLE_EXITS_CSTATE) /* for KVM_ENABLE_CAP */ struct kvm_enable_cap { diff --git a/target/i386/kvm.c b/target/i386/kvm.c index 3b29ce5..49a0cc1 100644 --- a/target/i386/kvm.c +++ b/target/i386/kvm.c @@ -1645,7 +1645,8 @@ int kvm_arch_init(MachineState *ms, KVMState *s) if (disable_exits) { disable_exits &= (KVM_X86_DISABLE_EXITS_MWAIT | KVM_X86_DISABLE_EXITS_HLT | - KVM_X86_DISABLE_EXITS_PAUSE); + KVM_X86_DISABLE_EXITS_PAUSE | + KVM_X86_DISABLE_EXITS_CSTATE); } ret = kvm_vm_enable_cap(s, KVM_CAP_X86_DISABLE_EXITS, 0, -- 2.7.4