Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp501294pxv; Fri, 9 Jul 2021 02:53:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzJiGA8I03p3nxiK8viJW3h6D9YwuoxHs33voT58ZY8FQ3s50V2BDMmsXEMPjXcbHumi7ft X-Received: by 2002:a17:906:c142:: with SMTP id dp2mr36371908ejc.355.1625824425481; Fri, 09 Jul 2021 02:53:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625824425; cv=none; d=google.com; s=arc-20160816; b=l5SNc0nUhpmyBB76Dq3Mppqt4O75OWzojs3+EiV/weTqo3nj+9pAttkpg5ObOgf/Ou GDdywSAIIvRLwLtLwrZiobjc4DUjtkyTieIeGX7rIbBByoGYxLa+L5R13dco6mlsK+rm bwLJtMTFXkTUn0+e1QYZvEHZukRcdDIUickUboPXZ7ZOUBNvcURHev6xGyH2aMgTZtlh 05qdHr7TfymAn7ZrLupjYrw6A0VFGt4YrgZJIOMVozSpMk2zVhuCnGfRU79NpW0YdGtY vWacbKfd+eA8Z43MM4hlENk5CB4Kr3FTB7W7pEitGiQFy3xj4CwBRUKgTchgLDUPFaru kXdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=x+0caHybOBqAZzu/GxvANIo+64Qb13S+R5G02gTkOWc=; b=lbsVRoR0UAQLS1TTz2HSn2RiaEsBGkLVgT9TsODF0bX8qeYvdCiUky0nx1H4ppPTVC O9T5bvtkLweEVsutCjxOm+jq+J398deQQxxWj+ajeULEBoN9YPjrXsw7EGo+n/Xv3zn/ EVsIVbjCsEdzwUkI8LXvwXrpx8SbzDDQ2sRDnhGt5v2JV75T2Tvs0Trugj6WUyhJxLcF hd2GnGeB8hdxCn7VZIUQBEDH3csSbP721FcUbk/rHrU8vTZ6AvC/awRglbJPUkfVXC8J UoT3ID1icRlbmxrqhWzeql38L4ug4EH06yagUD9/hoy0klL+Y5UcEYJAHbxRxeHiGLEr EDbA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n1si6554551edf.131.2021.07.09.02.53.22; Fri, 09 Jul 2021 02:53:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232183AbhGIJyI (ORCPT + 99 others); Fri, 9 Jul 2021 05:54:08 -0400 Received: from mga05.intel.com ([192.55.52.43]:54438 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232154AbhGIJyH (ORCPT ); Fri, 9 Jul 2021 05:54:07 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10039"; a="295316517" X-IronPort-AV: E=Sophos;i="5.84,226,1620716400"; d="scan'208";a="295316517" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Jul 2021 02:51:24 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.84,226,1620716400"; d="scan'208";a="498856326" Received: from michael-optiplex-9020.sh.intel.com ([10.239.159.182]) by fmsmga002.fm.intel.com with ESMTP; 09 Jul 2021 02:51:21 -0700 From: Yang Weijiang To: pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, jmattson@google.com, wei.w.wang@intel.com, like.xu.linux@gmail.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Yang Weijiang Subject: [PATCH v5 08/13] KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS Date: Fri, 9 Jul 2021 18:05:06 +0800 Message-Id: <1625825111-6604-9-git-send-email-weijiang.yang@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1625825111-6604-1-git-send-email-weijiang.yang@intel.com> References: <1625825111-6604-1-git-send-email-weijiang.yang@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Updated CPUID.0xD.0x1, which reports the current required storage size of all features enabled via XCR0 | XSS, when the guest's XSS is modified. Note, KVM does not yet support any XSS based features, i.e. supported_xss is guaranteed to be zero at this time. Co-developed-by: Zhang Yi Z Signed-off-by: Zhang Yi Z Signed-off-by: Yang Weijiang Message-Id: <20210203113421.5759-3-weijiang.yang@intel.com> Signed-off-by: Paolo Bonzini --- arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/cpuid.c | 21 ++++++++++++++++++--- arch/x86/kvm/x86.c | 7 +++++-- 3 files changed, 24 insertions(+), 5 deletions(-) diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h index 9c7ced0e3171..a98b15cefc6b 100644 --- a/arch/x86/include/asm/kvm_host.h +++ b/arch/x86/include/asm/kvm_host.h @@ -651,6 +651,7 @@ struct kvm_vcpu_arch { u64 xcr0; u64 guest_supported_xcr0; + u64 guest_supported_xss; struct kvm_pio_request pio; void *pio_data; diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index b4da665bb892..d6e343809b25 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -131,9 +131,24 @@ void kvm_update_cpuid_runtime(struct kvm_vcpu *vcpu) best->ebx = xstate_required_size(vcpu->arch.xcr0, false); best = kvm_find_cpuid_entry(vcpu, 0xD, 1); - if (best && (cpuid_entry_has(best, X86_FEATURE_XSAVES) || - cpuid_entry_has(best, X86_FEATURE_XSAVEC))) - best->ebx = xstate_required_size(vcpu->arch.xcr0, true); + if (best) { + if (cpuid_entry_has(best, X86_FEATURE_XSAVES) || + cpuid_entry_has(best, X86_FEATURE_XSAVEC)) { + u64 xstate = vcpu->arch.xcr0 | vcpu->arch.ia32_xss; + + best->ebx = xstate_required_size(xstate, true); + } + + if (!cpuid_entry_has(best, X86_FEATURE_XSAVES)) { + best->ecx = 0; + best->edx = 0; + } + vcpu->arch.guest_supported_xss = + (((u64)best->edx << 32) | best->ecx) & supported_xss; + + } else { + vcpu->arch.guest_supported_xss = 0; + } best = kvm_find_cpuid_entry(vcpu, KVM_CPUID_FEATURES, 0); if (kvm_hlt_in_guest(vcpu->kvm) && best && diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index b586a45fce2b..5f2e13c9f507 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -3265,9 +3265,12 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) * IA32_XSS[bit 8]. Guests have to use RDMSR/WRMSR rather than * XSAVES/XRSTORS to save/restore PT MSRs. */ - if (data & ~supported_xss) + if (data & ~vcpu->arch.guest_supported_xss) return 1; - vcpu->arch.ia32_xss = data; + if (vcpu->arch.ia32_xss != data) { + vcpu->arch.ia32_xss = data; + kvm_update_cpuid_runtime(vcpu); + } break; case MSR_SMI_COUNT: if (!msr_info->host_initiated) -- 2.21.1