Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2873806pxv; Mon, 12 Jul 2021 04:07:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxmUdBmbxdTnTaWPRttImoD4wda2C5jmefROQUXYpMTGHFTCABltmvLZq3/+WHOA+hW4NwM X-Received: by 2002:a92:6805:: with SMTP id d5mr19762151ilc.286.1626088065862; Mon, 12 Jul 2021 04:07:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626088065; cv=none; d=google.com; s=arc-20160816; b=UJKzg/jErcS52LPRg3AlQspAie02dfeg5tMShyDqSR3RZ6aNdwpGhiG6t6oy91XZhc 8xNt2F/8gPVoNSB2XfNisTzK2p94s532tNYAj1YSx5pva/KMkSJK+nkI5nF/++0pJ3mj q5K6D/G5YavMS8nzR4yQ/kytbtrojXLb9W/JVabQWkCaYcMd5/qez8dZ1H1YtwmnXh37 T3SfplNgujnh0fcsRumA/c4vZvmRaU0QkKStNAeby2h6qzR7R2/8xrSbQ9WKRDAeLTBO wwDS8LHln3V5n65Q0ExwFZFTJEuBTOTC2cJr29NLl2EXJtWREle8kY7KdJx9eFFr4ZIp IOzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:subject:from :references:cc:to:dkim-signature; bh=UfspUjTnY0iCrcR2F7FJcbEXjfsubIXat9EqyG3E3Zg=; b=XE45w4PZyXCPQtr043cCYDFpnSpf9IGE3XCkzCFKoktG+RFMk+IZv2AsWO1Ojc6ZJR Z5MDwTt5uosi/iy8YJsTMb/aCEmyZhJ5HBfKXQDnsSVWfaruqlwc0SR+JvhwPMw/xeDg CgrZGMZtEZbuHL7oR4mMZo+mGssQ5VWuVbzp9CTzeKW9wrLMgxbN7R0BtPWRAcI5xrS7 Hh6kB7nx2iFUFwdUDwxCFGVd32zesytgOruljC+e8krd0cEE+lJeDcMPqlSo7VcMSrfz l9BdMhA+h5gxD5Kq7x6ZtbCpmERuGjFF+Q6ZHiyLQWLNGEEqQtDwJSQqZ0Pjw69Bi/ZC jbqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=RxsWPlMN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s11si19771755jat.44.2021.07.12.04.07.18; Mon, 12 Jul 2021 04:07:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=RxsWPlMN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230526AbhGLKWH (ORCPT + 99 others); Mon, 12 Jul 2021 06:22:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54572 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230426AbhGLKWG (ORCPT ); Mon, 12 Jul 2021 06:22:06 -0400 Received: from mail-pf1-x429.google.com (mail-pf1-x429.google.com [IPv6:2607:f8b0:4864:20::429]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6A9C2C0613DD; Mon, 12 Jul 2021 03:19:18 -0700 (PDT) Received: by mail-pf1-x429.google.com with SMTP id b12so15928232pfv.6; Mon, 12 Jul 2021 03:19:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=to:cc:references:from:subject:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=UfspUjTnY0iCrcR2F7FJcbEXjfsubIXat9EqyG3E3Zg=; b=RxsWPlMNjdk5njDwBPLsA8luqUwRfTEJwlOmsWuLwy8cETyU9+IohNYjhGORLTEL4J 5H3CpoPqnL7odx3di2RYBwjy+RY4naZRSPb18d2UJ24N5zYsmnnxEzBzXR5oOv5C+c9c UJhpz1ja+s+kro1WYKDVsqc2D7vInRQJULf8/9rFvCVC1nOSeO2gVt/B3jJYdJzC1a6z +pkz0TT236mOyCOUXEHjT12VU5hu3uatPy/vtATbXalxLCikzVs1qdCSueY0Y+WVopWP GseO26CgaXlcG+WiPcwU5ES1m6X+HOq3yNJONVYbFygKiF/8ZVgnRrT14+ZU4IVPWPKZ I+fA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:cc:references:from:subject:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=UfspUjTnY0iCrcR2F7FJcbEXjfsubIXat9EqyG3E3Zg=; b=QKCZZzaVyye0fjsnBeMgiLQ8rQz/dvef6zEcFd+4W7llPeXG30cuSeP/u0hh85ETvK cXQA48j2UoI4aL995W8BKHWKOg3kDxkifKEYUcGPv3JhTDoiOVdq6SWxw9zKUlEUoLS9 K0rQenL7msRnSh3+/cbZKthntNizP88fHzKoxY0Vue/c5lSFPaXR5Mi29d4oMD5zi0KX sozPuVZL3I827yONBuGzJ7V9cJX4X4uabb4Y4VSvvA1Atp9N67QlfHPNZY1aWdv5ARD+ y9+HNG2ubxNQVWJN2QL1zStqARHnE3NeFMqMd3e3s2wB9gURHO/iN0aaPLZga/CtfJ9R eAKQ== X-Gm-Message-State: AOAM5319XVHVbBH5hxRzNonjK1gkDt3wSqQWmC3bEPXJON8zADHNiMp5 7MkVZdF+yof8KX12z7oU0eQ= X-Received: by 2002:a63:d347:: with SMTP id u7mr53156742pgi.434.1626085157913; Mon, 12 Jul 2021 03:19:17 -0700 (PDT) Received: from Likes-MacBook-Pro.local ([103.7.29.32]) by smtp.gmail.com with ESMTPSA id h9sm17583552pgi.43.2021.07.12.03.19.15 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 12 Jul 2021 03:19:17 -0700 (PDT) To: Yang Weijiang , Jim Mattson Cc: pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, wei.w.wang@intel.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, "kan.liang@linux.intel.com" References: <1625825111-6604-1-git-send-email-weijiang.yang@intel.com> <1625825111-6604-7-git-send-email-weijiang.yang@intel.com> <20210712095305.GE12162@intel.com> From: Like Xu Subject: Re: [PATCH v5 06/13] KVM: x86/vmx: Save/Restore host MSR_ARCH_LBR_CTL state Message-ID: Date: Mon, 12 Jul 2021 18:19:10 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <20210712095305.GE12162@intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/7/2021 5:53 pm, Yang Weijiang wrote: > On Fri, Jul 09, 2021 at 04:41:30PM -0700, Jim Mattson wrote: >> On Fri, Jul 9, 2021 at 3:54 PM Jim Mattson wrote: >>> >>> On Fri, Jul 9, 2021 at 2:51 AM Yang Weijiang wrote: >>>> >>>> If host is using MSR_ARCH_LBR_CTL then save it before vm-entry >>>> and reload it after vm-exit. >>> >>> I don't see anything being done here "before VM-entry" or "after >>> VM-exit." This code seems to be invoked on vcpu_load and vcpu_put. >>> >>> In any case, I don't see why this one MSR is special. It seems that if >>> the host is using the architectural LBR MSRs, then *all* of the host >>> architectural LBR MSRs have to be saved on vcpu_load and restored on >>> vcpu_put. Shouldn't kvm_load_guest_fpu() and kvm_put_guest_fpu() do >>> that via the calls to kvm_save_current_fpu(vcpu->arch.user_fpu) and >>> restore_fpregs_from_fpstate(&vcpu->arch.user_fpu->state)? >> >> It does seem like there is something special about IA32_LBR_DEPTH, though... >> >> Section 7.3.1 of the IntelĀ® Architecture Instruction Set Extensions >> and Future Features Programming Reference >> says, "IA32_LBR_DEPTH is saved by XSAVES, but it is not written by >> XRSTORS in any circumstance." It seems like that would require some >> special handling if the host depth and the guest depth do not match. > In our vPMU design, guest depth is alway kept the same as that of host, > so this won't be a problem. But I'll double check the code again, thanks! KVM only exposes the host's depth value to the user space so the guest can only use the same depth as the host. A further reason is that the host perf driver currently does not support different threads using different depths.