Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1110144pxv; Fri, 16 Jul 2021 01:41:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw4UMNBLvBOTVimTKyNKgELhLjUiJoXvZ36HTKxGVSVRb0kXHUfXpI3c5mDLYCrINYrJHAa X-Received: by 2002:a17:907:76da:: with SMTP id kf26mr10437529ejc.511.1626424861488; Fri, 16 Jul 2021 01:41:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626424861; cv=none; d=google.com; s=arc-20160816; b=azqg11axdad20KmkqR3ngw0D6CYUagVMUeIlY5zwfEvYaPXffIJgmcc6f//xIJQ961 uESxnXFE+FBPGbz63Yh27E5MKEYMV78HgP0Z9YaE9H6XgPtwPo2Kybl6PI3iNQPLQhsq 89MSriw4Lrh/oCrQguA6w1ou8froQCN6uOXbZBfxWVTlc7teFmv68E0cOB+An2e7vjFK JmFhgggLVQlEnsj4kNR9qvIGKdUBesB2IgduV/LA645nQ1CgvhMPcAaw+NPmW2bT3trF +Z3OUCl2PzvMJAChQF6I2KdDpPy5EnLq3ar31JvoEJGEK8ZQoNQtATjplTBlhRxWXQED B/Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=S2he1Xdb17edhJAXUXYuoBXFJacpAkpT40EqN1ogeP4=; b=SG3WTKkJ33sQeFORG5BZhnWKnwASv4pLr3RQMD0dnV0mdgq50+SJ+2QCHU9FsIP95q 35FHp8Xh01Si/bsJt6ixurFJWOSYJjKBVrwYSdPnPYW8i2Z/JsBGhw/2/s8Kj6Fv916h rYlxj4VWclQt0roNNUD7uLU1TQx1xPQcBXMwjRRKGA+wBuc72oP4N22C59M2TafdRPbr iBARRt5Mgr8C/2GcUCITvyf0vwpJzhlaU+EuMap+Kn37ms/3hmC+JzUgw2JDhP12ho+I IDB0T8gOYAuks/xWRuqIINuuLKDfpS6A99G5kSMta3YpD3jQmISkGK6DvNsdkJj5ZokN mx/g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t12si13044251edc.179.2021.07.16.01.40.38; Fri, 16 Jul 2021 01:41:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239274AbhGPIk1 (ORCPT + 99 others); Fri, 16 Jul 2021 04:40:27 -0400 Received: from mga09.intel.com ([134.134.136.24]:15698 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238706AbhGPIjm (ORCPT ); Fri, 16 Jul 2021 04:39:42 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10046"; a="210687361" X-IronPort-AV: E=Sophos;i="5.84,244,1620716400"; d="scan'208";a="210687361" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jul 2021 01:36:47 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.84,244,1620716400"; d="scan'208";a="460679939" Received: from michael-optiplex-9020.sh.intel.com ([10.239.159.182]) by orsmga008.jf.intel.com with ESMTP; 16 Jul 2021 01:36:44 -0700 From: Yang Weijiang To: pbonzini@redhat.com, jmattson@google.com, seanjc@google.com, vkuznets@redhat.com, wei.w.wang@intel.com, like.xu.linux@gmail.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Yang Weijiang Subject: [PATCH v6 12/12] KVM: x86/cpuid: Advise Arch LBR feature in CPUID Date: Fri, 16 Jul 2021 16:50:06 +0800 Message-Id: <1626425406-18582-13-git-send-email-weijiang.yang@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1626425406-18582-1-git-send-email-weijiang.yang@intel.com> References: <1626425406-18582-1-git-send-email-weijiang.yang@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add Arch LBR feature bit in CPU cap-mask to expose the feature. Currently only max LBR depth is available for guest, and it's consistent with host Arch LBR settings. Co-developed-by: Like Xu Signed-off-by: Like Xu Signed-off-by: Yang Weijiang --- arch/x86/kvm/cpuid.c | 33 ++++++++++++++++++++++++++++++++- 1 file changed, 32 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index d6e343809b25..9b80d265c4c4 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -202,6 +202,16 @@ static void kvm_vcpu_after_set_cpuid(struct kvm_vcpu *vcpu) best->ecx |= XFEATURE_MASK_FPSSE; } + best = kvm_find_cpuid_entry(vcpu, 0x1c, 0); + if (best) { + unsigned int eax, ebx, ecx, edx; + + /* Make sure guest only sees the supported arch lbr depth. */ + cpuid_count(0x1c, 0, &eax, &ebx, &ecx, &edx); + best->eax &= ~0xff; + best->eax |= BIT(fls(eax & 0xff) - 1); + } + kvm_update_pv_runtime(vcpu); vcpu->arch.maxphyaddr = cpuid_query_maxphyaddr(vcpu); @@ -490,7 +500,7 @@ void kvm_set_cpu_caps(void) F(AVX512_4VNNIW) | F(AVX512_4FMAPS) | F(SPEC_CTRL) | F(SPEC_CTRL_SSBD) | F(ARCH_CAPABILITIES) | F(INTEL_STIBP) | F(MD_CLEAR) | F(AVX512_VP2INTERSECT) | F(FSRM) | - F(SERIALIZE) | F(TSXLDTRK) | F(AVX512_FP16) + F(SERIALIZE) | F(TSXLDTRK) | F(AVX512_FP16) | F(ARCH_LBR) ); /* TSC_ADJUST and ARCH_CAPABILITIES are emulated in software. */ @@ -902,6 +912,27 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function) goto out; } break; + /* Architectural LBR */ + case 0x1c: { + u32 lbr_depth_mask = entry->eax & 0xff; + + if (!lbr_depth_mask || + !kvm_cpu_cap_has(X86_FEATURE_ARCH_LBR)) { + entry->eax = entry->ebx = entry->ecx = entry->edx = 0; + break; + } + /* + * KVM only exposes the maximum supported depth, which is the + * fixed value used on the host side. + * KVM doesn't allow VMM userspace to adjust LBR depth because + * guest LBR emulation depends on the configuration of host LBR + * driver. + */ + lbr_depth_mask = BIT((fls(lbr_depth_mask) - 1)); + entry->eax &= ~0xff; + entry->eax |= lbr_depth_mask; + break; + } case KVM_CPUID_SIGNATURE: { static const char signature[12] = "KVMKVMKVM\0\0"; const u32 *sigptr = (const u32 *)signature; -- 2.21.1