Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3230642ybi; Thu, 18 Jul 2019 23:34:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqzlLXmEZv10MUUcsBIaEaofdxxsSHRZOcp/GuojRIw6qFrMFwfAGmqihOMb/isACX9DZKGd X-Received: by 2002:a65:64c6:: with SMTP id t6mr53214204pgv.323.1563518042059; Thu, 18 Jul 2019 23:34:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563518042; cv=none; d=google.com; s=arc-20160816; b=Nm7t9KVHKxhhjekgpgJNchJXSzwXQK/AtxpPVmMgtKU/pE4YgyaVPP276sISIh/pDD 0VGvozJjBu1SCdKeKg6D+Hvs7FOLb28LJfmZC+Vkx90v+pt/7dnKkSgzZ7M1wU0feJ8P I7jPhS8DRZl4AAyFrMCmRrASd+J3/gxO2XD0QAWqkuXfTpSG3POEjoflAZ7cExclqAyq 9oqDFS4YEXHe5FTXv5sdKBKwAm01GAzmHb8ifwwsdd5kK1yi/kR/OxV9q06b3ykvfzqw Z+vYfts4bI2DMGfkEpfL7HfGFBetdyboyWZGLpXgbjWrFP0Fa2cov5zBrTmA3fSEwTGo VO1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=bFwHYKsIDNGP5K3FeqNCSzlPHKOGwGVEFJcnYOZRBqQ=; b=pEqb7N3Onnb8cltgPJc1YPwCNuv8cePgW5ZRaP6JqF3MsHA3xr21IwViPDXbLMrt0X S/zibsYAf2/FgO/Xxx/OXbGENgkaiuwaqrJv0GyUj3VvkmKLBx0bPaVbJExNZdj7euQr DYghitTkOmwmzibn3BifMSAsPnEBPdzcaHJEI/IwnHG3BwjQrd0mfmROn2Krdu2ZzJyc ISkBiOqQu203R8BWe6CAyxwhY8wSUfkXtQABZI39oqlloSl96f++LTmer0Aah8Mw40ZN hUieX5zNavjdgwlBDxxhFTMKubFXJKL0xhiHcxNLQ+NMw1XFxPLNz/Kj8ACS3cvDUHMO nbtw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h33si694288pje.95.2019.07.18.23.33.46; Thu, 18 Jul 2019 23:34:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726720AbfGSGbl (ORCPT + 99 others); Fri, 19 Jul 2019 02:31:41 -0400 Received: from mga03.intel.com ([134.134.136.65]:8305 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725616AbfGSGbk (ORCPT ); Fri, 19 Jul 2019 02:31:40 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Jul 2019 23:31:40 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,281,1559545200"; d="scan'208";a="168469654" Received: from txu2-mobl.ccr.corp.intel.com (HELO [10.239.198.19]) ([10.239.198.19]) by fmsmga008.fm.intel.com with ESMTP; 18 Jul 2019 23:31:37 -0700 Subject: Re: [PATCH v8 0/3] KVM: x86: Enable user wait instructions To: pbonzini@redhat.com, rkrcmar@redhat.com, sean.j.christopherson@intel.com, corbet@lwn.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, fenghua.yu@intel.com, xiaoyao.li@linux.intel.com, jingqi.liu@intel.com References: <20190716065551.27264-1-tao3.xu@intel.com> From: Tao Xu Message-ID: Date: Fri, 19 Jul 2019 14:31:37 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190716065551.27264-1-tao3.xu@intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Ping for comments :) On 7/16/2019 2:55 PM, Tao Xu wrote: > UMONITOR, UMWAIT and TPAUSE are a set of user wait instructions. > > UMONITOR arms address monitoring hardware using an address. A store > to an address within the specified address range triggers the > monitoring hardware to wake up the processor waiting in umwait. > > UMWAIT instructs the processor to enter an implementation-dependent > optimized state while monitoring a range of addresses. The optimized > state may be either a light-weight power/performance optimized state > (c0.1 state) or an improved power/performance optimized state > (c0.2 state). > > TPAUSE instructs the processor to enter an implementation-dependent > optimized state c0.1 or c0.2 state and wake up when time-stamp counter > reaches specified timeout. > > Availability of the user wait instructions is indicated by the presence > of the CPUID feature flag WAITPKG CPUID.0x07.0x0:ECX[5]. > > The patches enable the umonitor, umwait and tpause features in KVM. > Because umwait and tpause can put a (psysical) CPU into a power saving > state, by default we dont't expose it to kvm and enable it only when > guest CPUID has it. If the instruction causes a delay, the amount > of time delayed is called here the physical delay. The physical delay is > first computed by determining the virtual delay (the time to delay > relative to the VM’s timestamp counter). > > The release document ref below link: > Intel 64 and IA-32 Architectures Software Developer's Manual, > https://software.intel.com/sites/default/files/\ > managed/39/c5/325462-sdm-vol-1-2abcd-3abcd.pdf > > Changelog: > v8: > Add vmx_waitpkg_supported() helper (Sean) > Add an accessor to expose umwait_control_cached (Sean) > Set msr_ia32_umwait_control in vcpu_vmx u32 and raise #GP when > [63:32] is set when rdmsr. (Sean) > Introduce a common exit helper handle_unexpected_vmexit (Sean) > v7: > Add nested support for user wait instructions (Paolo) > Use the test on vmx->secondary_exec_control to replace > guest_cpuid_has (Paolo) > v6: > add check msr_info->host_initiated in get/set msr(Xiaoyao) > restore the atomic_switch_umwait_control_msr()(Xiaoyao) > > Tao Xu (3): > KVM: x86: Add support for user wait instructions > KVM: vmx: Emulate MSR IA32_UMWAIT_CONTROL > KVM: vmx: Introduce handle_unexpected_vmexit and handle WAITPKG vmexit > > arch/x86/include/asm/vmx.h | 1 + > arch/x86/include/uapi/asm/vmx.h | 6 ++- > arch/x86/kernel/cpu/umwait.c | 6 +++ > arch/x86/kvm/cpuid.c | 2 +- > arch/x86/kvm/vmx/capabilities.h | 6 +++ > arch/x86/kvm/vmx/nested.c | 5 ++ > arch/x86/kvm/vmx/vmx.c | 83 ++++++++++++++++++++++++++------- > arch/x86/kvm/vmx/vmx.h | 9 ++++ > arch/x86/kvm/x86.c | 1 + > 9 files changed, 101 insertions(+), 18 deletions(-) >