Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp264126ybg; Tue, 22 Oct 2019 20:16:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqznO9WLnjuIMmFGXCfssKMUTNH8RTi1JUYgBS8OJj34PZJKUiwRG4+7O/a3VEBygpgUCtEL X-Received: by 2002:a17:906:ff01:: with SMTP id zn1mr5645980ejb.327.1571800595668; Tue, 22 Oct 2019 20:16:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571800595; cv=none; d=google.com; s=arc-20160816; b=kdYT3hU0sU+PakL6xJO2gB6XmgJO45b80gZK4RN81m5H47Dz69UI7BpdHdCmGOCrB0 LPncQlgnCpzeXwgWFS8LVqXubyuN+IyEqEdHZz5NLVZ9N8jAf+eF51MM9BQb/VZZGGpq 6+uMEbMBzlFWC6ZcuZkcdfIz6+ISm+lMv2loxFlSfFDYRlIHCF3t8nS4Q0uuVlqeC+Yp ptKS+sgWlCmCA8HEYkyQXfuSNpcPXOU9OlQRAhLCm/++aKd109FbFE5LEdtxog01DtLT D3DrUW6NL9AB+sAMoQcPT9FD/jqqdhhmcuywE7ZSOEOlE63Y520y1w44L8ey1s3rFef2 uMjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=clKB4UKal/qh7k1d1S/V2vRdPowB4BKqOEWOmEb9wOM=; b=07gJt/NV8zKcVy3/+pPibcxS3ksBHaInxYIPWvklq4zkdAQKmMF+p0r3vCBpznsZrF R1+EgfQdvIXHppJn+UJzzkW/cQ995DQsWnX1u1uw72wGfc6xJPe8rqwgvNHmj8rehbSY yD3cIiCgGyRqm/31Mc0TIRvaPzETJxZXX6TC0YzcVVsmPvkK3WsrylFDQgYmEJs6BUq5 LAnAHELXh2Ohj/f+ddTZsJeisTSLZJ5lWOaEYMKmCZ+Y+ior9yz9Pt2UmE1Qyvm0Rouv xMi7xwRojU/X5CdQ108sl6Bbk76MJhh7+z8xado5VR9NtN5Yh4bSQUZZwDdIVBr5TBaP IoEw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l22si11647281ejr.149.2019.10.22.20.16.11; Tue, 22 Oct 2019 20:16:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732582AbfJWBRC (ORCPT + 99 others); Tue, 22 Oct 2019 21:17:02 -0400 Received: from mga04.intel.com ([192.55.52.120]:50268 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727851AbfJWBRC (ORCPT ); Tue, 22 Oct 2019 21:17:02 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Oct 2019 18:17:01 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.68,218,1569308400"; d="scan'208";a="372722536" Received: from unknown (HELO localhost) ([10.239.159.128]) by orsmga005.jf.intel.com with ESMTP; 22 Oct 2019 18:17:00 -0700 Date: Wed, 23 Oct 2019 09:19:51 +0800 From: Yang Weijiang To: Sean Christopherson Cc: Yang Weijiang , Jim Mattson , kvm list , LKML , Paolo Bonzini , "Michael S. Tsirkin" , Radim =?utf-8?B?S3LEjW3DocWZ?= Subject: Re: [PATCH v7 5/7] kvm: x86: Add CET CR4 bit and XSS support Message-ID: <20191023011951.GB27009@local-michael-cet-test> References: <20190927021927.23057-1-weijiang.yang@intel.com> <20190927021927.23057-6-weijiang.yang@intel.com> <20191017195642.GJ20903@linux.intel.com> <20191018015802.GD2286@local-michael-cet-test> <20191022201321.GN2343@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191022201321.GN2343@linux.intel.com> User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 22, 2019 at 01:13:21PM -0700, Sean Christopherson wrote: > On Fri, Oct 18, 2019 at 09:58:02AM +0800, Yang Weijiang wrote: > > On Thu, Oct 17, 2019 at 12:56:42PM -0700, Sean Christopherson wrote: > > > On Wed, Oct 02, 2019 at 12:05:23PM -0700, Jim Mattson wrote: > > > > > + u64 kvm_xss = kvm_supported_xss(); > > > > > + > > > > > + best->ebx = > > > > > + xstate_required_size(vcpu->arch.xcr0 | kvm_xss, true); > > > > > > > > Shouldn't this size be based on the *current* IA32_XSS value, rather > > > > than the supported IA32_XSS bits? (i.e. > > > > s/kvm_xss/vcpu->arch.ia32_xss/) > > > > > > Ya. > > > > > I'm not sure if I understand correctly, kvm_xss is what KVM supports, > > but arch.ia32_xss reflects what guest currently is using, shoudn't CPUID > > report what KVM supports instead of current status? > > Will CPUID match current IA32_XSS status if guest changes it runtime? > > Not in this case. Select CPUID output is dependent on current state as > opposed to being a constant defind by hardware. Per the SDM, EBX is: > > The size in bytes of the XSAVE area containing all states enabled by > XCRO | IA32_XSS > > Since KVM is emulating CPUID for the guest, XCR0 and IA32_XSS in this > context refers to the guest's current/actual XCR0/IA32_XSS values. The > purpose of this behavior is so that software can call CPUID to query the > actual amount of memory that is needed for XSAVE(S), as opposed to the > absolute max size that _might_ be needed. > > MONITOR/MWAIT is the other case that comes to mind where CPUID dynamically > reflects configured state, e.g. MWAIT is reported as unsupported if it's > disabled via IA32_MISC_ENABLE MSR. Yep, make sense, thank you for explanation.