Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp8635182rwl; Tue, 10 Jan 2023 16:52:37 -0800 (PST) X-Google-Smtp-Source: AMrXdXur3h14qhFt7PnNZQC7fwC5KZgGmHCQzCJpiPX5fDm9L6mZ2nPNVmqA1Hh9TXn9+ADFs/np X-Received: by 2002:a62:36c6:0:b0:576:ddd4:6a02 with SMTP id d189-20020a6236c6000000b00576ddd46a02mr464094pfa.22.1673398357416; Tue, 10 Jan 2023 16:52:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673398357; cv=none; d=google.com; s=arc-20160816; b=Bd1YUCyN++GtmG3C606ESl6a/BFrl3L5mtdyKrOmObhCmkJir9BPzEc5ujI2L1SNcg 2cGMZq222eDSHr/TY++cAUo9ny66nQ0iNomo5bpj7negzywMiXqt/eQowzlnexA7WKg5 Sf3y+PVQ/W2alXfUrCIMhvdlDJbLJgUdu89fqt0f+9jqWHFH3szG0Ku3vhHdQXgYGSIx NjmnU5Zy0KMJ8VFLrjuXMtEDo8ZCNNBYNoBrnMuhvILmp6jT49B8Lx2eh2WvJtA1UTyb rjS4uD3+jWfIhSaxWeWKVXqpiiKiPpthtOsO5SoTxH/+6AP/oPF2CQJBsV4DpUPsQm1f Z93g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=Bel+XT/zLWd0POR6+G5xVjH82mkB2MdJkQdaPFECHUM=; b=aP6wJ/AcXTLSlm+W7gRJw8JfqZE+wU0hoZhyJbU9AgFa1xOMjKlmfRSvytIGGqTl4t QdvSNdpNllEIXxITixE9XnxqIiTZtxeCSTuIst/gMT/sxcEaa1h8/fBQVNyS3j0wH9nC H61ZkeFtu8X0SoyQn9iaxkn/OiBRXOldRif6XvYdnqqmInQbMQYYpswj1OJHmgLjPd7C rj4pb+Vt8LC0SgUgrxOMTdIN01tJ9iIUBi4ycp8GKOMaTXHodV9y4bfPEww6gqdMpHNu DuhDWLblthIA4f2PWKoUrEB37fEGyohuxOIyc3w7bMhwvITdwrhsSPlXdZpRO/0QaT6F c1Kw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=DvrbbMDu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j18-20020a056a00131200b005779f520683si12173973pfu.200.2023.01.10.16.52.29; Tue, 10 Jan 2023 16:52:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=DvrbbMDu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235792AbjAKAph (ORCPT + 55 others); Tue, 10 Jan 2023 19:45:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49202 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235760AbjAKApJ (ORCPT ); Tue, 10 Jan 2023 19:45:09 -0500 Received: from mail-pl1-x64a.google.com (mail-pl1-x64a.google.com [IPv6:2607:f8b0:4864:20::64a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 630165933A for ; Tue, 10 Jan 2023 16:45:07 -0800 (PST) Received: by mail-pl1-x64a.google.com with SMTP id s2-20020a170902ea0200b0019247629ee5so9455995plg.17 for ; Tue, 10 Jan 2023 16:45:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=Bel+XT/zLWd0POR6+G5xVjH82mkB2MdJkQdaPFECHUM=; b=DvrbbMDu518Tg86DXo5WokkRe1qtBzk0MnChbCJfqJatSYcshxXye1SEMGgzijl3Fq xWsu6JD7GhNl62+bPlf1fQ8yIcVSqe1FQsRCy+svbOW8SoeRUY3cOqKtLN9H/YRwdqq1 dh4xIsXZLAIpP7LXjVHN1ckBuLFM1Kd/ZeqammL5Q22nisCaKFFqxG8vTAqsJm8URjWb 27J6S3Mh3V0bweXTDzeeqoEWVn190lXVw7s/ojhnCbm4q3brG/4fxKdt+J7eMOt0oX+h C7GyXou/91q7TnDy4CLPEh43/KcY80DBKuyTd8bC/eRTAmDDlB+rWDayAWJVjRdwV0Fs 71Cw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Bel+XT/zLWd0POR6+G5xVjH82mkB2MdJkQdaPFECHUM=; b=4wdbp7g+yGatEUYQh0OJBXD2k94oxM1dR/2cly4bDwyMM2I+24nsKbF0FBMXShOfq0 KuS/KGHkbdhfka5GIq6+/s5rAZ8G83CO3eWlabaliOtQmua40nU5VXdOTvNSF7Z+YcUf lccXgUILeJsipd62/CHRRCUFLMDHwHK2paCrqgXxBEk4GFV9qCBf5/XAqcZfRF7XrdtS uA2kHOn0yqxot2rFjOMibG3l0pzrGdp1F2Y5AOkLdtBlTK1BGPaYPn8VVm5NHBsmi/+e aUsGUSHEbRx7rSj8yFOiNfwFdyYlPN0DQpKQe3ISgUPhmcYQIGBEyimA3RLGA605Ua74 3z+g== X-Gm-Message-State: AFqh2kqmx0WCmq8NkpROwQSycGSnOaKJ6hhE5EeiUybn+ukQ2vmNpktS 4VL8LPwBuQC1wtANKRl+ZJmMaEsQKk+P0Gia X-Received: from vannapurve2.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:41f8]) (user=vannapurve job=sendgmr) by 2002:a17:90b:1494:b0:225:eaa2:3f5d with SMTP id js20-20020a17090b149400b00225eaa23f5dmr25140pjb.2.1673397906623; Tue, 10 Jan 2023 16:45:06 -0800 (PST) Date: Wed, 11 Jan 2023 00:44:44 +0000 In-Reply-To: <20230111004445.416840-1-vannapurve@google.com> Mime-Version: 1.0 References: <20230111004445.416840-1-vannapurve@google.com> X-Mailer: git-send-email 2.39.0.314.g84b9a713c41-goog Message-ID: <20230111004445.416840-3-vannapurve@google.com> Subject: [V5 PATCH 2/3] KVM: selftests: x86: Cache host CPU vendor (AMD vs. Intel) From: Vishal Annapurve To: x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Cc: pbonzini@redhat.com, shuah@kernel.org, bgardon@google.com, seanjc@google.com, oupton@google.com, peterx@redhat.com, vkuznets@redhat.com, dmatlack@google.com, pgonda@google.com, andrew.jones@linux.dev, Vishal Annapurve Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Cache the host CPU vendor for userspace and share it with guest code. All the current callers of this_cpu* actually care about host cpu so they are updated to check host_cpu_is*. Suggested-by: Sean Christopherson Reviewed-by: David Matlack Signed-off-by: Vishal Annapurve --- .../selftests/kvm/include/x86_64/processor.h | 3 +++ tools/testing/selftests/kvm/lib/x86_64/processor.c | 14 ++++++++++++-- .../selftests/kvm/x86_64/fix_hypercall_test.c | 4 ++-- .../selftests/kvm/x86_64/mmio_warning_test.c | 2 +- .../selftests/kvm/x86_64/pmu_event_filter_test.c | 4 ++-- .../vmx_exception_with_invalid_guest_state.c | 2 +- 6 files changed, 21 insertions(+), 8 deletions(-) diff --git a/tools/testing/selftests/kvm/include/x86_64/processor.h b/tools/testing/selftests/kvm/include/x86_64/processor.h index fdb1af5ca611..c7885f72132a 100644 --- a/tools/testing/selftests/kvm/include/x86_64/processor.h +++ b/tools/testing/selftests/kvm/include/x86_64/processor.h @@ -19,6 +19,9 @@ #include "../kvm_util.h" +extern bool host_cpu_is_intel; +extern bool host_cpu_is_amd; + #define NMI_VECTOR 0x02 #define X86_EFLAGS_FIXED (1u << 1) diff --git a/tools/testing/selftests/kvm/lib/x86_64/processor.c b/tools/testing/selftests/kvm/lib/x86_64/processor.c index 7d1768543b91..84915bc7d689 100644 --- a/tools/testing/selftests/kvm/lib/x86_64/processor.c +++ b/tools/testing/selftests/kvm/lib/x86_64/processor.c @@ -19,6 +19,8 @@ #define MAX_NR_CPUID_ENTRIES 100 vm_vaddr_t exception_handlers; +bool host_cpu_is_amd; +bool host_cpu_is_intel; static void regs_dump(FILE *stream, struct kvm_regs *regs, uint8_t indent) { @@ -113,7 +115,7 @@ static void sregs_dump(FILE *stream, struct kvm_sregs *sregs, uint8_t indent) bool kvm_is_tdp_enabled(void) { - if (this_cpu_is_intel()) + if (host_cpu_is_intel) return get_kvm_intel_param_bool("ept"); else return get_kvm_amd_param_bool("npt"); @@ -555,6 +557,8 @@ static void vcpu_setup(struct kvm_vm *vm, struct kvm_vcpu *vcpu) void kvm_arch_vm_post_create(struct kvm_vm *vm) { vm_create_irqchip(vm); + sync_global_to_guest(vm, host_cpu_is_intel); + sync_global_to_guest(vm, host_cpu_is_amd); } struct kvm_vcpu *vm_arch_vcpu_add(struct kvm_vm *vm, uint32_t vcpu_id, @@ -1214,7 +1218,7 @@ unsigned long vm_compute_max_gfn(struct kvm_vm *vm) max_gfn = (1ULL << (vm->pa_bits - vm->page_shift)) - 1; /* Avoid reserved HyperTransport region on AMD processors. */ - if (!this_cpu_is_amd()) + if (!host_cpu_is_amd) return max_gfn; /* On parts with <40 physical address bits, the area is fully hidden */ @@ -1254,3 +1258,9 @@ bool vm_is_unrestricted_guest(struct kvm_vm *vm) return get_kvm_intel_param_bool("unrestricted_guest"); } + +void kvm_selftest_arch_init(void) +{ + host_cpu_is_intel = this_cpu_is_intel(); + host_cpu_is_amd = this_cpu_is_amd(); +} diff --git a/tools/testing/selftests/kvm/x86_64/fix_hypercall_test.c b/tools/testing/selftests/kvm/x86_64/fix_hypercall_test.c index 5489c9836ec8..0f728f05ea82 100644 --- a/tools/testing/selftests/kvm/x86_64/fix_hypercall_test.c +++ b/tools/testing/selftests/kvm/x86_64/fix_hypercall_test.c @@ -48,10 +48,10 @@ static void guest_main(void) const uint8_t *other_hypercall_insn; uint64_t ret; - if (this_cpu_is_intel()) { + if (host_cpu_is_intel) { native_hypercall_insn = vmx_vmcall; other_hypercall_insn = svm_vmmcall; - } else if (this_cpu_is_amd()) { + } else if (host_cpu_is_amd) { native_hypercall_insn = svm_vmmcall; other_hypercall_insn = vmx_vmcall; } else { diff --git a/tools/testing/selftests/kvm/x86_64/mmio_warning_test.c b/tools/testing/selftests/kvm/x86_64/mmio_warning_test.c index b0a2a0bae0f3..ce1ccc4c1503 100644 --- a/tools/testing/selftests/kvm/x86_64/mmio_warning_test.c +++ b/tools/testing/selftests/kvm/x86_64/mmio_warning_test.c @@ -93,7 +93,7 @@ int main(void) { int warnings_before, warnings_after; - TEST_REQUIRE(this_cpu_is_intel()); + TEST_REQUIRE(host_cpu_is_intel); TEST_REQUIRE(!vm_is_unrestricted_guest(NULL)); diff --git a/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c b/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c index c728822461b2..4dbb454e1760 100644 --- a/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c +++ b/tools/testing/selftests/kvm/x86_64/pmu_event_filter_test.c @@ -363,7 +363,7 @@ static void test_pmu_config_disable(void (*guest_code)(void)) */ static bool use_intel_pmu(void) { - return this_cpu_is_intel() && + return host_cpu_is_intel && kvm_cpu_property(X86_PROPERTY_PMU_VERSION) && kvm_cpu_property(X86_PROPERTY_PMU_NR_GP_COUNTERS) && kvm_pmu_has(X86_PMU_FEATURE_BRANCH_INSNS_RETIRED); @@ -397,7 +397,7 @@ static bool use_amd_pmu(void) uint32_t family = kvm_cpu_family(); uint32_t model = kvm_cpu_model(); - return this_cpu_is_amd() && + return host_cpu_is_amd && (is_zen1(family, model) || is_zen2(family, model) || is_zen3(family, model)); diff --git a/tools/testing/selftests/kvm/x86_64/vmx_exception_with_invalid_guest_state.c b/tools/testing/selftests/kvm/x86_64/vmx_exception_with_invalid_guest_state.c index 53e1ef2fc774..ccdfa5dc1a4d 100644 --- a/tools/testing/selftests/kvm/x86_64/vmx_exception_with_invalid_guest_state.c +++ b/tools/testing/selftests/kvm/x86_64/vmx_exception_with_invalid_guest_state.c @@ -111,7 +111,7 @@ int main(int argc, char *argv[]) struct kvm_vcpu *vcpu; struct kvm_vm *vm; - TEST_REQUIRE(this_cpu_is_intel()); + TEST_REQUIRE(host_cpu_is_intel); TEST_REQUIRE(!vm_is_unrestricted_guest(NULL)); vm = vm_create_with_one_vcpu(&vcpu, guest_code); -- 2.39.0.314.g84b9a713c41-goog