Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp457603ybi; Mon, 15 Jul 2019 23:59:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqy4vNdrBIYb6nm5tL8rlEM83N5Ayil056Gfp8qDJeCW0S43USSNNxM1m38aCtM7BcmKcHw7 X-Received: by 2002:a17:902:684f:: with SMTP id f15mr33372911pln.332.1563260359421; Mon, 15 Jul 2019 23:59:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563260359; cv=none; d=google.com; s=arc-20160816; b=R92bp2WQvcCAZ3ie6KtTYs017AisW6SOgyBjob7nX78yep+8T/z7JrgRlNShmdWVL9 0X2ouXm+zjq6hpxFBSaXM92bUIA+oaEeBuhhgwmZ8j5LIthkRS+Xjk6p+cxPaHvavo9n MNthSN07rgurGSCiK+x4iZo79Jc/SdRlzUhZR0ZLeT8JoE6IEcLDiMWBGEiNT80nd+an Ar8F9MjyrEZxV/iN+y+xQ17a34RsY5ZT4q7bc44IRpcgcptiqs5USj8EYbHwlOAUl3aA SwuLZrIlGONT4QBmdt2+9JQKfLUB9Msf5H9ki8KJPBwy+VQAVVaqqC2YOmVATN4Xe4pJ FMzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=U/upn56hy9Dk0YhKP96h0VeALBa6NXdHKvWtrw8oU0o=; b=tOzRbgTPU5nyjmJITL1AAqHr5zZyBivPn8cdFHxAc816t/bhtj3LtpkhDDfYMOpkwt xCU8TOpGDLp7rLKZ6MsF8rcAe1a0yQMufOUa7w4EbjNjcxrobl3iTpwkn28tS9zTZ2Q9 wB5/cFUgs0xQ6N9X18HQVhDjLG2tMQf9LuN4oWBvsTO/NoLZcjLXtxOcV0KOZW9hErqW hM3BU5R/YHOIZh5t+ayqaT/Sb3E68g7Aj4WobzXuoRNNWAXsf5VTHRG19BZQZ7ahCrFB JoDyPFhR33fDrOQc7nHCdcdBguCKI5O/0Bkgk8R4CxMrGIa1IGbph9I2HVU0nopVN/b+ iH2g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w10si17245435plq.403.2019.07.15.23.59.03; Mon, 15 Jul 2019 23:59:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729430AbfGPG6l (ORCPT + 99 others); Tue, 16 Jul 2019 02:58:41 -0400 Received: from mga12.intel.com ([192.55.52.136]:51761 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726603AbfGPG6l (ORCPT ); Tue, 16 Jul 2019 02:58:41 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 15 Jul 2019 23:58:41 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.63,496,1557212400"; d="scan'208";a="366116039" Received: from tao-optiplex-7060.sh.intel.com ([10.239.13.104]) by fmsmga005.fm.intel.com with ESMTP; 15 Jul 2019 23:58:38 -0700 From: Tao Xu To: pbonzini@redhat.com, rkrcmar@redhat.com, sean.j.christopherson@intel.com, corbet@lwn.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, fenghua.yu@intel.com, xiaoyao.li@linux.intel.com, jingqi.liu@intel.com, tao3.xu@intel.com Subject: [PATCH v8 0/3] KVM: x86: Enable user wait instructions Date: Tue, 16 Jul 2019 14:55:48 +0800 Message-Id: <20190716065551.27264-1-tao3.xu@intel.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org UMONITOR, UMWAIT and TPAUSE are a set of user wait instructions. UMONITOR arms address monitoring hardware using an address. A store to an address within the specified address range triggers the monitoring hardware to wake up the processor waiting in umwait. UMWAIT instructs the processor to enter an implementation-dependent optimized state while monitoring a range of addresses. The optimized state may be either a light-weight power/performance optimized state (c0.1 state) or an improved power/performance optimized state (c0.2 state). TPAUSE instructs the processor to enter an implementation-dependent optimized state c0.1 or c0.2 state and wake up when time-stamp counter reaches specified timeout. Availability of the user wait instructions is indicated by the presence of the CPUID feature flag WAITPKG CPUID.0x07.0x0:ECX[5]. The patches enable the umonitor, umwait and tpause features in KVM. Because umwait and tpause can put a (psysical) CPU into a power saving state, by default we dont't expose it to kvm and enable it only when guest CPUID has it. If the instruction causes a delay, the amount of time delayed is called here the physical delay. The physical delay is first computed by determining the virtual delay (the time to delay relative to the VM’s timestamp counter). The release document ref below link: Intel 64 and IA-32 Architectures Software Developer's Manual, https://software.intel.com/sites/default/files/\ managed/39/c5/325462-sdm-vol-1-2abcd-3abcd.pdf Changelog: v8: Add vmx_waitpkg_supported() helper (Sean) Add an accessor to expose umwait_control_cached (Sean) Set msr_ia32_umwait_control in vcpu_vmx u32 and raise #GP when [63:32] is set when rdmsr. (Sean) Introduce a common exit helper handle_unexpected_vmexit (Sean) v7: Add nested support for user wait instructions (Paolo) Use the test on vmx->secondary_exec_control to replace guest_cpuid_has (Paolo) v6: add check msr_info->host_initiated in get/set msr(Xiaoyao) restore the atomic_switch_umwait_control_msr()(Xiaoyao) Tao Xu (3): KVM: x86: Add support for user wait instructions KVM: vmx: Emulate MSR IA32_UMWAIT_CONTROL KVM: vmx: Introduce handle_unexpected_vmexit and handle WAITPKG vmexit arch/x86/include/asm/vmx.h | 1 + arch/x86/include/uapi/asm/vmx.h | 6 ++- arch/x86/kernel/cpu/umwait.c | 6 +++ arch/x86/kvm/cpuid.c | 2 +- arch/x86/kvm/vmx/capabilities.h | 6 +++ arch/x86/kvm/vmx/nested.c | 5 ++ arch/x86/kvm/vmx/vmx.c | 83 ++++++++++++++++++++++++++------- arch/x86/kvm/vmx/vmx.h | 9 ++++ arch/x86/kvm/x86.c | 1 + 9 files changed, 101 insertions(+), 18 deletions(-) -- 2.20.1