Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp163779pxb; Tue, 24 Aug 2021 23:36:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzcxI4y9kgmy+PEH+86dg5/D+n8NsrVCEvp3XjEcs9VfGPz19UMDfsp5vbcSqutcym3oif3 X-Received: by 2002:a05:6e02:148c:: with SMTP id n12mr3966342ilk.36.1629873391837; Tue, 24 Aug 2021 23:36:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629873391; cv=none; d=google.com; s=arc-20160816; b=GcbsBTtczhGR8949r6xX6fYzp4ardk4sOoj+UKb6RpZVX5DkeBcY6VGjsbWxYZwhxZ 1jJUjFTJy80O1GAhOP9tkhWtcv43xUs+urRtc5jzMa2UhRHBV9SsRdYdGviYHa/wI++E fHKfGCWt2cw0mtPdFQ5l6+wxLXeuWTSgWVB6xoVb8fD5n+3CpyZQTUA0azlauoh2N5iy 5tt34NHhiD8+BBoKzQp4lvkpPYEUNLIOTGVaKc0FcwuP1xNYgpzArsLyufTo7ep66V1M /XIzhapjlP7/fk8DN8mTdc7M7u+7NNEeWb83pMBW6BZyQYMM+YH8nseClplQkr5CKqJo dwKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=GN/3chy0WVuWPWm5OehlecLdNMFgDPsoSZ51TJW9zoE=; b=U8o3tPXo3l5so1EtDTOxVtcImb6tCdNMYc/xe4T2UbGM//UFgSm01yr0bfh3P67Rqd IXVxLqA4Q/K04WN75D701Co9AHeT5Kv6DN1NkrZ4cTVOnSp5vyF6kbai1UAwe/SCsGJs R8XuSO9AUtbCAleXd/pw1nqadtD+S5WVlf4SZHuTwdWLDIFgIxuz18N6pZZEYnmMPnJD yiG9Hu+Zn+PChH6Rq6sg9QN58kqoGqd+fxSa+Tqp3aiD44oVK2RxfxLETaaLaKjheGlD 1z0BcU508wa1BreImzMsIpESi3qoeyT+uyr+by3mSFvlTMxDggUcJmHTz1wwHN2Po2na buHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j4si18772029ilc.2.2021.08.24.23.36.19; Tue, 24 Aug 2021 23:36:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239052AbhHYGe2 (ORCPT + 99 others); Wed, 25 Aug 2021 02:34:28 -0400 Received: from mga18.intel.com ([134.134.136.126]:56256 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238416AbhHYGe1 (ORCPT ); Wed, 25 Aug 2021 02:34:27 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10086"; a="204595160" X-IronPort-AV: E=Sophos;i="5.84,349,1620716400"; d="scan'208";a="204595160" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Aug 2021 23:33:41 -0700 X-IronPort-AV: E=Sophos;i="5.84,349,1620716400"; d="scan'208";a="527098758" Received: from xiaoyaol-mobl.ccr.corp.intel.com (HELO [10.239.13.122]) ([10.239.13.122]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Aug 2021 23:33:38 -0700 Subject: Re: [PATCH 3/5] KVM: VMX: RTIT_CTL_BRANCH_EN has no dependency on other CPUID bit To: Like Xu Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Paolo Bonzini , "Alexander Shishkin (hwtracing + intel_th + stm + R:perf)" References: <20210824110743.531127-1-xiaoyao.li@intel.com> <20210824110743.531127-4-xiaoyao.li@intel.com> <711265db-f634-36ac-40d2-c09cea825df6@gmail.com> <6dddf3c0-fa8f-f70c-bd5d-b43c7140ed9a@gmail.com> From: Xiaoyao Li Message-ID: Date: Wed, 25 Aug 2021 14:33:25 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Firefox/78.0 Thunderbird/78.13.0 MIME-Version: 1.0 In-Reply-To: <6dddf3c0-fa8f-f70c-bd5d-b43c7140ed9a@gmail.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/25/2021 2:08 PM, Like Xu wrote: > On 25/8/2021 12:19 pm, Xiaoyao Li wrote: >> On 8/25/2021 11:30 AM, Like Xu wrote: >>> +Alexander >>> >>> On 24/8/2021 7:07 pm, Xiaoyao Li wrote: >>>> Per Intel SDM, RTIT_CTL_BRANCH_EN bit has no dependency on any CPUID >>>> leaf 0x14. >>>> >>>> Signed-off-by: Xiaoyao Li >>>> --- >>>>   arch/x86/kvm/vmx/vmx.c | 8 ++++---- >>>>   1 file changed, 4 insertions(+), 4 deletions(-) >>>> >>>> diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c >>>> index 7ed96c460661..4a70a6d2f442 100644 >>>> --- a/arch/x86/kvm/vmx/vmx.c >>>> +++ b/arch/x86/kvm/vmx/vmx.c >>>> @@ -7116,7 +7116,8 @@ static void update_intel_pt_cfg(struct >>>> kvm_vcpu *vcpu) >>>>       /* Initialize and clear the no dependency bits */ >>>>       vmx->pt_desc.ctl_bitmask = ~(RTIT_CTL_TRACEEN | RTIT_CTL_OS | >>>> -            RTIT_CTL_USR | RTIT_CTL_TSC_EN | RTIT_CTL_DISRETC); >>>> +            RTIT_CTL_USR | RTIT_CTL_TSC_EN | RTIT_CTL_DISRETC | >>>> +            RTIT_CTL_BRANCH_EN); >>>>       /* >>>>        * If CPUID.(EAX=14H,ECX=0):EBX[0]=1 CR3Filter can be set >>>> otherwise >>>> @@ -7134,12 +7135,11 @@ static void update_intel_pt_cfg(struct >>>> kvm_vcpu *vcpu) >>>>                   RTIT_CTL_CYC_THRESH | RTIT_CTL_PSB_FREQ); >>>>       /* >>>> -     * If CPUID.(EAX=14H,ECX=0):EBX[3]=1 MTCEn BranchEn and >>>> -     * MTCFreq can be set >>>> +     * If CPUID.(EAX=14H,ECX=0):EBX[3]=1 MTCEn and MTCFreq can be set >>> >>> If CPUID.(EAX=14H,ECX=0):EBX[3]=1, >>> >>>      "indicates support of MTC timing packet and suppression of >>> COFI-based packets." >> >> I think it's a mistake of SDM in CPUID instruction. >> >> If you read 31.3.1, table 31-11 of SDM 325462-075US, >> >> It just says CPUID(0x14, 0):EBX[3]: MTC supprted. >> It doesn't talk anything about COFI packets suppression. >> >> Further as below. >> >>> Per 31.2.5.4 Branch Enable (BranchEn), >>> >>>      "If BranchEn is not set, then relevant COFI packets (TNT, TIP*, >>> FUP, MODE.*) are suppressed." >>> >>> I think if the COFI capability is suppressed, the software can't set >>> the BranchEn bit, right ? >> >> Based on your understanding, isn't it that >> >> 1. if CPUID.(EAX=14H,ECX=0):EBX[3]=0, it doesn't support "suppression >> of COFI-based packets". >> 2. if it doesn't support "suppression of COFI-based packets", then it >> doens't support "If BranchEn is not set, then relevant COFI packets >> (TNT, TIP*, FUP, MODE.*) are suppressed", i.e. BranchEn must be 1. > > That's it. > >> >> Anyway, I think it's just a mistake on CPUID instruction document of SDM. > > Is this an ambiguity rather than a mistake ? > >> >> CPUD.(EAX=14H,ECX=0):EBX[3] should only indicates the MTC support. > > Please do not make assertions that you do not confirm with hw. > >> >> BranchEn should be always supported if PT is available. Per "31.2.7.2 > > Check d35869ba348d3f1ff3e6d8214fe0f674bb0e404e. This commit shows BranchEn is supported on BDW, and must be enabled on BDW. This doesn't conflict the description above that BranchEn should be always supported. >> IA32_RTIT_CTL MSR" on SDM: >> When BranchEn is 1, it enables COFI-based packets. >> When BranchEn is 0, it disables COFI-based packtes. i.e., COFI packets >> are suppressed. >> >>>>        */ >>>>       if (intel_pt_validate_cap(vmx->pt_desc.caps, PT_CAP_mtc)) >>>>           vmx->pt_desc.ctl_bitmask &= ~(RTIT_CTL_MTC_EN | >>>> -                RTIT_CTL_BRANCH_EN | RTIT_CTL_MTC_RANGE); >>>> +                          RTIT_CTL_MTC_RANGE); >>>>       /* If CPUID.(EAX=14H,ECX=0):EBX[4]=1 FUPonPTW and PTWEn can be >>>> set */ >>>>       if (intel_pt_validate_cap(vmx->pt_desc.caps, PT_CAP_ptwrite)) >>>> >>