Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp4251502imw; Tue, 12 Jul 2022 04:55:07 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uw8BoGupHo31BxozuxLt+C7NM9Ma4efuxze9zANyqH/SZBoUEm1rVlyNqQNwLMfvjmMVcK X-Received: by 2002:a17:906:8470:b0:72b:5088:be5f with SMTP id hx16-20020a170906847000b0072b5088be5fmr11355803ejc.459.1657626907018; Tue, 12 Jul 2022 04:55:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657626907; cv=none; d=google.com; s=arc-20160816; b=qsgzfF2M6hM32vzOVaY1kA+bsXww5uWTA/e24uMMY6rjv3l/EfEU64yIbAtrYe8pEX l5O9keOvk+pFJNZgdzdLnfAZB27vQ3YSxhaq8XtXjUcfRaysjDKMUstEihuCY8gpYgRg VcWRrnVlGBmZgvJdPlTFnYVZa+t135Rd0tI9mTe7tcoF6ka/7Ijv0VMe8AAW5aS6is7/ NRb6fM6S9uJN0gyECOKqJEkLMLs8N0R860Bi9ZgQ/PIToNWhUwPR2xK8d71tc+io3krX QS7lfbza5BhpyEsHBu281eLtLyZp+zeS0yXCrETknyjfo1NJtdW3gEpBy3EDe2BpdGln lhHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=lJt34wYL23qHhqMiKTsYFaw21Mxmb1U5E0uo3Jh2TRY=; b=ZpIM2ETgEW2Ga3iGC1vbZrHRWtm9eu+hu7FCa3tsd0sPSs2wMV1FmEUL1cjetFqPMg xNLtFyOgnX05c/773GN0KC5TD0F+woR8tX3N5rJyerFZMVKPsm/IYKPyl7X2lPR/l2ti nW4Z8MxGYZcvzQgVfALt5SePUS0QT9Sj+GTKWjdM4Y7tP51a9OGEd0k4ZG/i7fOCAq7h 8LuApBkiGwatJZ/bWzJPeg8geWdAfcUBf0OBcOQ6YuRCm3ahsQ7hZq+KEXFd9vr8e7XV CcpStUBODXVetXJYISkd9ypgEuc5lsC+4nTTK99JRT4eSjkViaXzyM0rivpy7F6rfoN+ wASA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PWI3AIs9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q11-20020aa7da8b000000b0043a0f0772d4si12889954eds.262.2022.07.12.04.54.42; Tue, 12 Jul 2022 04:55:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PWI3AIs9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232851AbiGLLwi (ORCPT + 99 others); Tue, 12 Jul 2022 07:52:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34856 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232070AbiGLLwT (ORCPT ); Tue, 12 Jul 2022 07:52:19 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A7710B4BF5 for ; Tue, 12 Jul 2022 04:51:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1657626711; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=lJt34wYL23qHhqMiKTsYFaw21Mxmb1U5E0uo3Jh2TRY=; b=PWI3AIs91Dis6NRs5bp2yN0LK7nYsUOSyyuJqzmIqfp6gsVqum5wGIwoGzFwfCI4+Z44KM 28uFFDRENlpiq6CJZAb5dI3Zjby3KxbLNiBsjRR3QP+WTgHbFqshmoiYyLkrvj2xZbD+wQ 6nSozBscvB2HskYNF88iOKOKox6K8bg= Received: from mail-qv1-f69.google.com (mail-qv1-f69.google.com [209.85.219.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-573-0Jai_srWORKP6iF4qvM0eQ-1; Tue, 12 Jul 2022 07:51:50 -0400 X-MC-Unique: 0Jai_srWORKP6iF4qvM0eQ-1 Received: by mail-qv1-f69.google.com with SMTP id lb15-20020a056214318f00b00473726845c8so1643247qvb.8 for ; Tue, 12 Jul 2022 04:51:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:user-agent:mime-version:content-transfer-encoding; bh=lJt34wYL23qHhqMiKTsYFaw21Mxmb1U5E0uo3Jh2TRY=; b=RWtkZH/lD/Bs1mV9nEyCYw8tnuPEFmjk8wWwTbbp64ckWm+FL2F3x0tmL/OMvTIOkN AbAhzRnhIWkpNB3mD2hCJUHOBALW2Crvzce0CiZQFq/T3DRw7EW+Ar/1kcr6Jgwpe4S0 E8oY9nY088ceEbkqTK6on7RZvkObdMq3UyOQfe4l1EGizi2quvBfeyWHjbnOTNxKsuhp Gi99CSKrwCorrHtNUooJzWYtHje6RQgIICXhkn49keiJRj+4p0blJhtZvtOmbEMqKW19 AJYGz87qeDH/7RiUzsrDLkXDqebl7NXCXDzZc9i0iRdtGFYW6lIK5XyQVk1zfDJJ1fHO o5DQ== X-Gm-Message-State: AJIora8xyQNu9RllyIEzYrkjFYyJKJgmgBMZxY5v5OrigWN6i/TVDrSR VP+WjjRj6Wuw1PT+o0Qim2Si5kg6iE6pMaSq9+/sSg0ZLiAMF3byFlMGzQPHF/9HrkgV/4CYUqv NyTLpUcfqRjLfOy4/Y3o5rgu8 X-Received: by 2002:ac8:580f:0:b0:31d:403e:9dd2 with SMTP id g15-20020ac8580f000000b0031d403e9dd2mr17810841qtg.245.1657626709034; Tue, 12 Jul 2022 04:51:49 -0700 (PDT) X-Received: by 2002:ac8:580f:0:b0:31d:403e:9dd2 with SMTP id g15-20020ac8580f000000b0031d403e9dd2mr17810830qtg.245.1657626708795; Tue, 12 Jul 2022 04:51:48 -0700 (PDT) Received: from [10.35.4.238] (bzq-82-81-161-50.red.bezeqint.net. [82.81.161.50]) by smtp.gmail.com with ESMTPSA id k143-20020a37a195000000b006b1fe4a103dsm8666859qke.51.2022.07.12.04.51.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Jul 2022 04:51:48 -0700 (PDT) Message-ID: <26e7784ff4ee91a8d41d217dcb5f3e0e0ce6e470.camel@redhat.com> Subject: Re: [PATCH v3 06/25] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf From: Maxim Levitsky To: Vitaly Kuznetsov , kvm@vger.kernel.org, Paolo Bonzini , Sean Christopherson Cc: Anirudh Rayabharam , Wanpeng Li , Jim Mattson , linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 12 Jul 2022 14:51:44 +0300 In-Reply-To: <20220708144223.610080-7-vkuznets@redhat.com> References: <20220708144223.610080-1-vkuznets@redhat.com> <20220708144223.610080-7-vkuznets@redhat.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.40.4 (3.40.4-5.fc34) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-3.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2022-07-08 at 16:42 +0200, Vitaly Kuznetsov wrote: > KVM has to check guest visible HYPERV_CPUID_NESTED_FEATURES.EBX CPUID > leaf to know with Enlightened VMCS definition to use (original or 2022 > update). Cache the leaf along with other Hyper-V CPUID feature leaves > to make the check quick. > > Signed-off-by: Vitaly Kuznetsov > --- > arch/x86/include/asm/kvm_host.h | 2 ++ > arch/x86/kvm/hyperv.c | 9 +++++++++ > 2 files changed, 11 insertions(+) > > diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h > index de5a149d0971..077ec9cf3169 100644 > --- a/arch/x86/include/asm/kvm_host.h > +++ b/arch/x86/include/asm/kvm_host.h > @@ -616,6 +616,8 @@ struct kvm_vcpu_hv { > u32 enlightenments_eax; /* HYPERV_CPUID_ENLIGHTMENT_INFO.EAX */ > u32 enlightenments_ebx; /* HYPERV_CPUID_ENLIGHTMENT_INFO.EBX */ > u32 syndbg_cap_eax; /* HYPERV_CPUID_SYNDBG_PLATFORM_CAPABILITIES.EAX */ > + u32 nested_eax; /* HYPERV_CPUID_NESTED_FEATURES.EAX */ > + u32 nested_ebx; /* HYPERV_CPUID_NESTED_FEATURES.EBX */ > } cpuid_cache; > }; > > diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c > index e08189211d9a..b666902da4d9 100644 > --- a/arch/x86/kvm/hyperv.c > +++ b/arch/x86/kvm/hyperv.c > @@ -2030,6 +2030,15 @@ void kvm_hv_set_cpuid(struct kvm_vcpu *vcpu) > hv_vcpu->cpuid_cache.syndbg_cap_eax = entry->eax; > else > hv_vcpu->cpuid_cache.syndbg_cap_eax = 0; > + > + entry = kvm_find_cpuid_entry(vcpu, HYPERV_CPUID_NESTED_FEATURES, 0); > + if (entry) { > + hv_vcpu->cpuid_cache.nested_eax = entry->eax; > + hv_vcpu->cpuid_cache.nested_ebx = entry->ebx; > + } else { > + hv_vcpu->cpuid_cache.nested_eax = 0; > + hv_vcpu->cpuid_cache.nested_ebx = 0; > + } > } > > int kvm_hv_set_enforce_cpuid(struct kvm_vcpu *vcpu, bool enforce) Small Nitpick: If I understand correctly, the kvm_find_cpuid_entry can fail if the userspace didn't provide the cpuid entry. Since the code that deals with failback is now repeated 3 times, how about some wrapper function that will return all zeros for a non present cpuid entry? That can be done later of course, so Reviewed-by: Maxim Levitsky Best regards, Maxim Levitsky