Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp2983073ybf; Mon, 2 Mar 2020 20:17:14 -0800 (PST) X-Google-Smtp-Source: ADFU+vvhkL1O8q6wJVewE9K5fs8EGg2PZeL95jcMqm5Gv+s+YuIQKHQazOp2BgkLPU01w+/VPgB6 X-Received: by 2002:a9d:4f0c:: with SMTP id d12mr1800745otl.150.1583209034633; Mon, 02 Mar 2020 20:17:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583209034; cv=none; d=google.com; s=arc-20160816; b=do4nWM9La+W8v/V+IQoFRBxbn5AMdxiCUtJWVPcMdas8xI1k0q2ESXAqwKSb07+WZC +mLjNaVhPwEMihMiEcjPhKFEP6oNjKQtdksp4h8ZXVbDET/uqymm8dBRa2cBzf2wbtkt 0WV91MOJ1VBvAmCjXafAIEGTJQKTSXTl/30I8R0YtiEbxnRJGrzYVsmNuGzYpH2rBWLm H8rB/yRNY/2mEQpICF9tcb7cPktwRNLWO69/dhX+Gq0DRP2KH6TJhL7yt1/vkT+2hl06 dTemt472xn67sL1ayX9bt1paxJJz7WkvEnqOKs5r4fHKB7Pp5t/UDquGyL1P8yAN8+0J o66A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=CL/f0Zy80Rsa8uMhweLnDzy/G4EGTXrI/5E6g108ml0=; b=dlrxzx0JqHVsadnjl3gmCF8HpHxxcx9uARuT9UGZ5EdJzmnpG6JPYrF8NUWOPM8X9z PbQ+ENgQOpP7Iyx8oG2YbsKhIg/ooSiaMDRJNPf1ju2kyh16NyDPP2VpdADHpxqrRD52 jUizI2cPKZdgi92OJPYDr4y4+2bx+anWELCtDomBhisef0MqhF3rRlZV5ez8WUUaizg5 TaI7uD0NkBBcRzRIttLIhU2aTTAvl3hO4dRCJd4GXHhTxQeVlNWS/3YtFT724erb/Ecy tKz5kcKTLqDIg3dy3xyalu2v/kizXd53+sbG0Qzlyr4OWlDlQd5PoLUpF8z/a65hVyLp 4kUA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l23si1390916otj.144.2020.03.02.20.17.02; Mon, 02 Mar 2020 20:17:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727409AbgCCEQl (ORCPT + 99 others); Mon, 2 Mar 2020 23:16:41 -0500 Received: from mga07.intel.com ([134.134.136.100]:38597 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726998AbgCCEQl (ORCPT ); Mon, 2 Mar 2020 23:16:41 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 02 Mar 2020 20:16:40 -0800 X-IronPort-AV: E=Sophos;i="5.70,510,1574150400"; d="scan'208";a="233468716" Received: from xiaoyaol-mobl.ccr.corp.intel.com (HELO [10.255.30.67]) ([10.255.30.67]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 02 Mar 2020 20:16:37 -0800 Subject: Re: [PATCH 1/6] KVM: x86: Fix tracing of CPUID.function when function is out-of-range To: Sean Christopherson Cc: Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Jan Kiszka References: <20200302195736.24777-1-sean.j.christopherson@intel.com> <20200302195736.24777-2-sean.j.christopherson@intel.com> <6b41fc5c-f7f4-b20d-cfb5-95bf13cc7534@intel.com> <20200303040851.GD27842@linux.intel.com> From: Xiaoyao Li Message-ID: Date: Tue, 3 Mar 2020 12:16:35 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <20200303040851.GD27842@linux.intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/3/2020 12:08 PM, Sean Christopherson wrote: > On Tue, Mar 03, 2020 at 10:50:03AM +0800, Xiaoyao Li wrote: >> On 3/3/2020 3:57 AM, Sean Christopherson wrote: >>> Rework kvm_cpuid() to query entry->function when adjusting the output >>> values so that the original function (in the aptly named "function") is >>> preserved for tracing. This fixes a bug where trace_kvm_cpuid() will >>> trace the max function for a range instead of the requested function if >>> the requested function is out-of-range and an entry for the max function >>> exists. >>> >>> Fixes: 43561123ab37 ("kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH") >>> Reported-by: Jan Kiszka >>> Cc: Jim Mattson >>> Cc: Xiaoyao Li >>> Signed-off-by: Sean Christopherson >>> --- >>> arch/x86/kvm/cpuid.c | 15 +++++++-------- >>> 1 file changed, 7 insertions(+), 8 deletions(-) >>> >>> diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c >>> index b1c469446b07..6be012937eba 100644 >>> --- a/arch/x86/kvm/cpuid.c >>> +++ b/arch/x86/kvm/cpuid.c >>> @@ -997,12 +997,12 @@ static bool cpuid_function_in_range(struct kvm_vcpu *vcpu, u32 function) >>> return max && function <= max->eax; >>> } >>> +/* Returns true if the requested leaf/function exists in guest CPUID. */ >>> bool kvm_cpuid(struct kvm_vcpu *vcpu, u32 *eax, u32 *ebx, >>> u32 *ecx, u32 *edx, bool check_limit) >>> { >>> - u32 function = *eax, index = *ecx; >>> + const u32 function = *eax, index = *ecx; >>> struct kvm_cpuid_entry2 *entry; >>> - struct kvm_cpuid_entry2 *max; >>> bool found; >>> entry = kvm_find_cpuid_entry(vcpu, function, index); >>> @@ -1015,18 +1015,17 @@ bool kvm_cpuid(struct kvm_vcpu *vcpu, u32 *eax, u32 *ebx, >>> */ >>> if (!entry && check_limit && !guest_cpuid_is_amd(vcpu) && >>> !cpuid_function_in_range(vcpu, function)) { >>> - max = kvm_find_cpuid_entry(vcpu, 0, 0); >>> - if (max) { >>> - function = max->eax; >>> - entry = kvm_find_cpuid_entry(vcpu, function, index); >>> - } >>> + entry = kvm_find_cpuid_entry(vcpu, 0, 0); >>> + if (entry) >>> + entry = kvm_find_cpuid_entry(vcpu, entry->eax, index); >> >> There is a problem. >> >> when queried leaf is out of range on Intel CPU, it returns the maximum basic >> leaf, and any dependence on input ECX (i.e., subleaf) value in the basic >> leaf is honored. As disclaimed in SDM of CPUID instruction. > > That's what the code above does. > >> The ECX should be honored if and only the leaf has a significant index. >> If the leaf doesn't has a significant index, it just ignores the EDX input > > s/EDX/ECX > >> in bare metal. >> >> So it should be something like: >> >> if (!entry && check_limit && !guest_cpuid_is_amd(vcpu) && >> !cpuid_function_in_range(vcpu, function)) { >> entry = kvm_find_cpuid_entry(vcpu, 0, 0); >> if (entry) { >> entry = kvm_find_cpuid_entry(vcpu, entry->eax, 0); >> if (entry && >> entry->flags & KVM_CPUID_FLAG_SIGNIFCANT_INDEX ) { > > This is unnecessary IMO. The only scenario where SIGNFICANT_INDEX is 0 > and cpuid_entry(entry->eax, 0) != cpuid_entry(entry->eax, index) is if > userspace created a cpuid entry for index>0 with SIGNFICANT_INDEX. I just forgot that is_matching_cpuid_entry() has taken SIGNIFICANT_INDEX into account. Please ignore my stupid noise. > a busted model, e.g. it'd be the SDM equivalent of an Intel CPU having > different output for CPUID.0x16.0 and CPUID.16.5 despite the SDM stating > that the CPUID.0x16 ignores the index. > > E.g. on my system with a max basic leaf of 0x16 > > $ cpuid -1 -r > CPU: > 0x00000000 0x00: eax=0x00000016 ebx=0x756e6547 ecx=0x6c65746e edx=0x49656e69 > ... > 0x00000016 0x00: eax=0x00000e74 ebx=0x0000125c ecx=0x00000064 edx=0x00000000 > > $ cpuid -1 -r -l 0x16 > CPU: > 0x00000016 0x00: eax=0x00000e74 ebx=0x0000125c ecx=0x00000064 edx=0x00000000 > ~ $ cpuid -1 -r -l 0x16 -s 4 > CPU: > 0x00000016 0x04: eax=0x00000e74 ebx=0x0000125c ecx=0x00000064 edx=0x00000000 > ~ $ cpuid -1 -r -l 0x16 -s 466 > CPU: > 0x00000016 0x1d2: eax=0x00000e74 ebx=0x0000125c ecx=0x00000064 edx=0x00000000 > > > If it returned anything else for CPUID.0x16.0x4 then it'd be a CPU bug. > Same thing here, it's a userspace bug if it creates a CPUID entry that > shouldn't exist. E.g. ignoring Intel's silly "max basic leaf" behavior > for the moment, if userspace created a entry for CPUID.0x0.N it would > break the Linux kernel's cpu_detect(), as it doesn't initialize ECX when > doing CPUID.0x0. > >> entry = kvm_find_cpuid_entry(vcpu, entry->eax, >> index); >> } >> } >> } >> >>> } >>> if (entry) { >>> *eax = entry->eax; >>> *ebx = entry->ebx; >>> *ecx = entry->ecx; >>> *edx = entry->edx; >>> - if (function == 7 && index == 0) { >>> + >>> + if (entry->function == 7 && index == 0) { >>> u64 data; >>> if (!__kvm_get_msr(vcpu, MSR_IA32_TSX_CTRL, &data, true) && >>> (data & TSX_CTRL_CPUID_CLEAR)) >>> >>