Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp239259pxb; Wed, 25 Aug 2021 02:00:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw/PCU9CsFSjrkxWNUo1Q0poqq2CZAIRdlh3xKMPkjF/iwbDVExt7vv/wb3mu+hZX3J1VsE X-Received: by 2002:a92:c56b:: with SMTP id b11mr11065508ilj.225.1629882008258; Wed, 25 Aug 2021 02:00:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629882008; cv=none; d=google.com; s=arc-20160816; b=Jw1QSmByLnz6rvUpyD4D9HvyKLB1jrALm0i/pfDNoWTcnRRQUzwGIiZnn3OCIDZuQv cxM09hFmU8zOUXb4wCTr40T1wsIlegMgbMqyJnNct/zhcG30FB6vdx/uTfdYsJrYB6UW BVhmpU7zNmNau1r6j9caBrMjHjnbqRQCzsZUbOp6Pw+eeOVJTtzDGVxE5acTlwDMTdq8 JGtqqbPTBKYgJbIsZWeO8Aer7nsl89reNDLWCJVgclhn9QarZd/IdgY0M1w9EJO5vk8z FAHec0af1wh0b2W1IlzKi8Bgu2vcIF6EnLExbZXc2ZfdfPvFAPha1rUEQNCN2rvwjv3G ecnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=Kn7XU/AURyGEJLWCjD8gRqKDcCpETGyBfnbWx6sQma0=; b=DYymYQwR03kwClL5geimg1nCBVnlOVlSgZIqeARn+5lda23QnUhvG9xEPIP2v1MkFX z06ea7QNirc5Cijn08mLOalAlRf28BboQd4kDryLnWdcE2si4xETMVs/xsJCfDYug8lU fu0O+xcvNWdwAsWxQVtT7onyInGpANNe7IYzEpxT2d2YCVMtFd9iPIwIq8gBaXWtcFBA b6onM4myUAB5GZUmHNTaWlwVTSBa23Ua/42NPKeRS7VCz+fv7z9GG4Rj4x2GPH89sVu0 DEEuxYpsZKLrSVD6nkzdvYhwZrohhwKPUEKI51PkGZjUWxhq69cpiCeET56AM3Ju58RD /HDg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c1si19177594ilj.76.2021.08.25.01.59.48; Wed, 25 Aug 2021 02:00:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238020AbhHYI7A (ORCPT + 99 others); Wed, 25 Aug 2021 04:59:00 -0400 Received: from mga09.intel.com ([134.134.136.24]:15922 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235904AbhHYI67 (ORCPT ); Wed, 25 Aug 2021 04:58:59 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10086"; a="217487336" X-IronPort-AV: E=Sophos;i="5.84,350,1620716400"; d="scan'208";a="217487336" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Aug 2021 01:58:13 -0700 X-IronPort-AV: E=Sophos;i="5.84,350,1620716400"; d="scan'208";a="527140854" Received: from xiaoyaol-mobl.ccr.corp.intel.com (HELO [10.239.13.122]) ([10.239.13.122]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Aug 2021 01:58:11 -0700 Subject: Re: [PATCH 3/5] KVM: VMX: RTIT_CTL_BRANCH_EN has no dependency on other CPUID bit To: Like Xu Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Paolo Bonzini , "Alexander Shishkin (hwtracing + intel_th + stm + R:perf)" References: <20210824110743.531127-1-xiaoyao.li@intel.com> <20210824110743.531127-4-xiaoyao.li@intel.com> <711265db-f634-36ac-40d2-c09cea825df6@gmail.com> <6dddf3c0-fa8f-f70c-bd5d-b43c7140ed9a@gmail.com> <26103eda-806a-516d-096f-c9e85552286a@gmail.com> From: Xiaoyao Li Message-ID: Date: Wed, 25 Aug 2021 16:58:09 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Firefox/78.0 Thunderbird/78.13.0 MIME-Version: 1.0 In-Reply-To: <26103eda-806a-516d-096f-c9e85552286a@gmail.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/25/2021 4:14 PM, Like Xu wrote: > On 25/8/2021 2:33 pm, Xiaoyao Li wrote: >> On 8/25/2021 2:08 PM, Like Xu wrote: >>> On 25/8/2021 12:19 pm, Xiaoyao Li wrote: >>>> On 8/25/2021 11:30 AM, Like Xu wrote: >>>>> +Alexander >>>>> >>>>> On 24/8/2021 7:07 pm, Xiaoyao Li wrote: >>>>>> Per Intel SDM, RTIT_CTL_BRANCH_EN bit has no dependency on any CPUID >>>>>> leaf 0x14. >>>>>> >>>>>> Signed-off-by: Xiaoyao Li >>>>>> --- >>>>>>   arch/x86/kvm/vmx/vmx.c | 8 ++++---- >>>>>>   1 file changed, 4 insertions(+), 4 deletions(-) >>>>>> >>>>>> diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c >>>>>> index 7ed96c460661..4a70a6d2f442 100644 >>>>>> --- a/arch/x86/kvm/vmx/vmx.c >>>>>> +++ b/arch/x86/kvm/vmx/vmx.c >>>>>> @@ -7116,7 +7116,8 @@ static void update_intel_pt_cfg(struct >>>>>> kvm_vcpu *vcpu) >>>>>>       /* Initialize and clear the no dependency bits */ >>>>>>       vmx->pt_desc.ctl_bitmask = ~(RTIT_CTL_TRACEEN | RTIT_CTL_OS | >>>>>> -            RTIT_CTL_USR | RTIT_CTL_TSC_EN | RTIT_CTL_DISRETC); >>>>>> +            RTIT_CTL_USR | RTIT_CTL_TSC_EN | RTIT_CTL_DISRETC | >>>>>> +            RTIT_CTL_BRANCH_EN); >>>>>>       /* >>>>>>        * If CPUID.(EAX=14H,ECX=0):EBX[0]=1 CR3Filter can be set >>>>>> otherwise >>>>>> @@ -7134,12 +7135,11 @@ static void update_intel_pt_cfg(struct >>>>>> kvm_vcpu *vcpu) >>>>>>                   RTIT_CTL_CYC_THRESH | RTIT_CTL_PSB_FREQ); >>>>>>       /* >>>>>> -     * If CPUID.(EAX=14H,ECX=0):EBX[3]=1 MTCEn BranchEn and >>>>>> -     * MTCFreq can be set >>>>>> +     * If CPUID.(EAX=14H,ECX=0):EBX[3]=1 MTCEn and MTCFreq can be >>>>>> set >>>>> >>>>> If CPUID.(EAX=14H,ECX=0):EBX[3]=1, >>>>> >>>>>      "indicates support of MTC timing packet and suppression of >>>>> COFI-based packets." >>>> >>>> I think it's a mistake of SDM in CPUID instruction. >>>> >>>> If you read 31.3.1, table 31-11 of SDM 325462-075US, >>>> >>>> It just says CPUID(0x14, 0):EBX[3]: MTC supprted. >>>> It doesn't talk anything about COFI packets suppression. >>>> >>>> Further as below. >>>> >>>>> Per 31.2.5.4 Branch Enable (BranchEn), >>>>> >>>>>      "If BranchEn is not set, then relevant COFI packets (TNT, >>>>> TIP*, FUP, MODE.*) are suppressed." >>>>> >>>>> I think if the COFI capability is suppressed, the software can't >>>>> set the BranchEn bit, right ? >>>> >>>> Based on your understanding, isn't it that >>>> >>>> 1. if CPUID.(EAX=14H,ECX=0):EBX[3]=0, it doesn't support >>>> "suppression of COFI-based packets". >>>> 2. if it doesn't support "suppression of COFI-based packets", then >>>> it doens't support "If BranchEn is not set, then relevant COFI >>>> packets (TNT, TIP*, FUP, MODE.*) are suppressed", i.e. BranchEn must >>>> be 1. >>> >>> That's it. >>> >>>> >>>> Anyway, I think it's just a mistake on CPUID instruction document of >>>> SDM. >>> >>> Is this an ambiguity rather than a mistake ? >>> >>>> >>>> CPUD.(EAX=14H,ECX=0):EBX[3] should only indicates the MTC support. >>> >>> Please do not make assertions that you do not confirm with hw. >>> >>>> >>>> BranchEn should be always supported if PT is available. Per "31.2.7.2 >>> >>> Check d35869ba348d3f1ff3e6d8214fe0f674bb0e404e. >> >> This commit shows BranchEn is supported on BDW, and must be enabled on >> BDW. This doesn't conflict the description above that BranchEn should >> be always supported. > > Per Vol. 4 Table 2-34. Additional MSRs Common to Processors Based the > Broadwell Microarchitectures, the BranchEn bit 13 is: > >     "Reserved; writing 0 will #GP if also setting TraceEn" > > on the Intel® Core™ M Processors. > > My point is that we, especially software developers from hardware vendors, > should really focus on real hardware and fix real problems. Isn't this patch fixing real problem? Without it, it forbids guest to enable BranchEn if PT_MTC_cap not exposed to guest.