Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp501734pxv; Fri, 9 Jul 2021 02:54:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzJcBRJB3ZD5MYnuByj6x6vTUSkA3Isn+0HykZ8q+Jd+jkvuTX24quYVDD0fOdH8in4L4MV X-Received: by 2002:a05:6402:40c3:: with SMTP id z3mr43688874edb.375.1625824464745; Fri, 09 Jul 2021 02:54:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625824464; cv=none; d=google.com; s=arc-20160816; b=fptW2TURrbl7Nwn5FL34GI8BCxUoiilnmuVUwOxRBxB/N0YYtK+y1LskHqn4b7RWsr XC+Jip/E3HJmtoFsTOE+KGobORcD502BmeSqnJGGt5/ofNjZCnUT4/UvUNOOpILyqSxB cb34CthJy0iuWfp48KzQMhY9bHuh6NVr5QhWrge9QufM2g2J0EhvmW1NqpMd/I44ZGGX 2zuUliEfiusQNC86UrqmgQnXYRI0ib7JSKLj/dvI1nqowu5wnW+0aolFRstYq3NuuBTd HhgmjnlE03Sha806La0FqMlZU4WLoRGlwsEghmn9uz6mEmjxYhmKoyl4/IgHF+WHnnOe bb3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=PY2qvCp59F4A9mOuJvFqwhmz6rkBKFl8NxqU+WpKu28=; b=DuMvY9eS72crawfcXQlofDAIBpOY2n41VnRWr5MNv/EjIJjWzz44BUcuk7CILWdmmZ 5jEt51mJk5pHg6gQfCaotKo3mng3Kw7wrUSnSgLIIm0RgClnELvOIcotV1MrPe5uMtY/ mbJJzlYZXMToyS6NGNsOq7lRM6i43sxCUnwH2Yh3Q+ZkfAP0MvM2qYV9BH7OAAW3/bhl ywBKtqerC5dSplxJkS3O97/7aDKB15nnvqzwz6PEJTHDKgyjFNM/eo1qGhfTsGcOXeKC nuNaHmx6O5ZWD9kGyunp6gt05rnRM2KTk/OmTd6L2zvUgAckFyjyf2E0+kD9dzwEhWo6 QgrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gc10si3160567ejc.14.2021.07.09.02.54.02; Fri, 09 Jul 2021 02:54:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232235AbhGIJyU (ORCPT + 99 others); Fri, 9 Jul 2021 05:54:20 -0400 Received: from mga05.intel.com ([192.55.52.43]:54438 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232225AbhGIJyS (ORCPT ); Fri, 9 Jul 2021 05:54:18 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10039"; a="295316534" X-IronPort-AV: E=Sophos;i="5.84,226,1620716400"; d="scan'208";a="295316534" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Jul 2021 02:51:35 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.84,226,1620716400"; d="scan'208";a="498856386" Received: from michael-optiplex-9020.sh.intel.com ([10.239.159.182]) by fmsmga002.fm.intel.com with ESMTP; 09 Jul 2021 02:51:33 -0700 From: Yang Weijiang To: pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, jmattson@google.com, wei.w.wang@intel.com, like.xu.linux@gmail.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Yang Weijiang Subject: [PATCH v5 13/13] KVM: x86/cpuid: Advise Arch LBR feature in CPUID Date: Fri, 9 Jul 2021 18:05:11 +0800 Message-Id: <1625825111-6604-14-git-send-email-weijiang.yang@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1625825111-6604-1-git-send-email-weijiang.yang@intel.com> References: <1625825111-6604-1-git-send-email-weijiang.yang@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add Arch LBR feature bit in CPU cap-mask to expose the feature. Currently only max LBR depth is available for guest, and it's consistent with host Arch LBR settings. Co-developed-by: Like Xu Signed-off-by: Like Xu Signed-off-by: Yang Weijiang --- arch/x86/kvm/cpuid.c | 23 ++++++++++++++++++++++- 1 file changed, 22 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index d6e343809b25..b51bfeaccea3 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -490,7 +490,7 @@ void kvm_set_cpu_caps(void) F(AVX512_4VNNIW) | F(AVX512_4FMAPS) | F(SPEC_CTRL) | F(SPEC_CTRL_SSBD) | F(ARCH_CAPABILITIES) | F(INTEL_STIBP) | F(MD_CLEAR) | F(AVX512_VP2INTERSECT) | F(FSRM) | - F(SERIALIZE) | F(TSXLDTRK) | F(AVX512_FP16) + F(SERIALIZE) | F(TSXLDTRK) | F(AVX512_FP16) | F(ARCH_LBR) ); /* TSC_ADJUST and ARCH_CAPABILITIES are emulated in software. */ @@ -902,6 +902,27 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function) goto out; } break; + /* Architectural LBR */ + case 0x1c: { + u64 lbr_depth_mask = entry->eax & 0xff; + + if (!lbr_depth_mask || + !kvm_cpu_cap_has(X86_FEATURE_ARCH_LBR)) { + entry->eax = entry->ebx = entry->ecx = entry->edx = 0; + break; + } + /* + * KVM only exposes the maximum supported depth, which is the + * fixed value used on the host side. + * KVM doesn't allow VMM userspace to adjust LBR depth because + * guest LBR emulation depends on the configuration of host LBR + * driver. + */ + lbr_depth_mask = 1UL << (fls(lbr_depth_mask) - 1); + entry->eax &= ~0xff; + entry->eax |= lbr_depth_mask; + break; + } case KVM_CPUID_SIGNATURE: { static const char signature[12] = "KVMKVMKVM\0\0"; const u32 *sigptr = (const u32 *)signature; -- 2.21.1