Received: by 2002:a05:7412:518d:b0:e2:908c:2ebd with SMTP id fn13csp433292rdb; Thu, 5 Oct 2023 10:00:00 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHoiT9Mne3PD1aVaYIg2X7rr5A3TF6w0CY5LVKyYnzk6P0ZcA+eoQwF9R7iBLmH/EXOXpbT X-Received: by 2002:a17:90a:4101:b0:26d:2b1d:1982 with SMTP id u1-20020a17090a410100b0026d2b1d1982mr5358576pjf.24.1696525199653; Thu, 05 Oct 2023 09:59:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696525199; cv=none; d=google.com; s=arc-20160816; b=icMYDtlOwhkkPLsjYoY1UFh8l6yxT2iB3quJbv+EcXWPkMxMCcJ4eN19yubzSM7z8A PTLPFyE3mpXl3kbAq4A00X3+F0A1L6oq3bEHFq/tz7zRMqoMcjqjVvx7IYVqBQFe/UaA /3PNQT9HVJosgn7wbKiYo60lYJZBKG6G1mOtwW6eFu7zZIx7Um9mBbiGhie17onfG/9g 2IXB+u4o7u1I1Egnr+ih145oLU2rWJG8kQqH7U01P4z+rTyqq16bU/YeK59ZoJmeZzoW h/KlnQECwtFHgKf+OfR24H9diYEPlSHgU+UMBfY3YSYnIS7O9nC1fdj5oztgZFNPHAc5 IMyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:to:from:subject:message-id :dkim-signature; bh=LZYBR2QbKq3NqPwbI1Wys9ihDkXFlFcq5Xf8xnR7rTY=; fh=wbfFfUz7ZHpuNw0DC8pyH3uqWxlu8Vm+JM9bVE4imzs=; b=F1OqcM5fxIb5UafD/MSOVWVxO1KeIqQSXJmrNuI6HCSDELW94mkxW/eVKCEI7yzgF2 hCVAIh1Fg8vY68ezIz+PITP/wfH4X+0mZOA1dTwV1D3WqmYW0zJ/PW5xPMuovL3/zz4P JQQyho/B2MzUD23wz4lSkS+Z32QJ/fI+lxwDsLw5mxBYkll11/RNMPmFga+5pIAEJITW T1qwcs12cSf27jmsAE9Te9mrBLknC0RC2qRl5+0ae+5wKwujZk7+OOXrX0OAjDLhWAq8 dJlBHhal5Lbi2j52GFUNpt9Pc9YmSIXQs3MCgbxwtJv4IHzCZ08PFwaIzTWHUugshzGk EkhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=RP7oiuM2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id c14-20020a17090abf0e00b00273ec8dfff8si274699pjs.80.2023.10.05.09.59.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Oct 2023 09:59:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=RP7oiuM2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id BC58F82589AE; Thu, 5 Oct 2023 09:59:55 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229699AbjJEQ5H (ORCPT + 99 others); Thu, 5 Oct 2023 12:57:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43440 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229668AbjJEQ4E (ORCPT ); Thu, 5 Oct 2023 12:56:04 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F03D35FCB for ; Thu, 5 Oct 2023 09:45:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1696524305; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=LZYBR2QbKq3NqPwbI1Wys9ihDkXFlFcq5Xf8xnR7rTY=; b=RP7oiuM2MEEvR/p8ljoe27dGJaWUkAwcNR22W4D5mZwTEVV2YAUAaEcz0LEloZqc+92HEq U9Oh/1+dWOp6fv3zG3bekn2wjvrT2J3sFpid3cpRAqOSSWvNmksefQUB5kdeTk/hn2MuiJ cSYgxX0/HGcIZkkmyhxSLX7CfEEIZyM= Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-607-738pc9IbPsGpqOG3R-nHng-1; Thu, 05 Oct 2023 12:45:04 -0400 X-MC-Unique: 738pc9IbPsGpqOG3R-nHng-1 Received: by mail-wm1-f72.google.com with SMTP id 5b1f17b1804b1-4030ae94fedso8855925e9.1 for ; Thu, 05 Oct 2023 09:45:04 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696524303; x=1697129103; h=content-transfer-encoding:mime-version:user-agent:references :in-reply-to:date:to:from:subject:message-id:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=LZYBR2QbKq3NqPwbI1Wys9ihDkXFlFcq5Xf8xnR7rTY=; b=UALYH0CrRAfGpeICz3Emw+4QwRygS4loa+tSdQyvJZ1kVAtNcS03unI6kvvXjWoQJ/ 3nREE8Blwt98s6qiOQzsQ6fmvHX3GFvj/VhTs7n+YmkOIbT6rvBHxJMCyrUVlWmagfar Ado9mZ2bJZ+/jKJzp3lx+WTrT3twBJNySpnqMBaHcZvfySok7qEyGDA04KN1x58phJwJ dCiFYcy70Twhl141g1YjuViMsgGQTGuKhHj0/bt1WHOaBHpvDAlRASJ0J/I3JkKhsLyI rfpI1Y1smtSNYHWjeWoJ584zGcfWnEYYzl9IRVx4HeRqGuerPvETohN3EZfwe/erpfBT UbYQ== X-Gm-Message-State: AOJu0YwFZHljK3lxuofH2Ri9jV6jI1B4xNrF6Mnb6xU+deCzdnlHEdzo Kin0WPsSfTu04/aMGrMu+VmxEw6Kh/VS/jORQ20AQ7IkZIr6ZvQr+5z14JPyhRQlCV+VZmgxd1O k9YK65uQqRFRu+M9o3qmzfQQu X-Received: by 2002:a7b:c84d:0:b0:401:b504:b6a0 with SMTP id c13-20020a7bc84d000000b00401b504b6a0mr4797714wml.3.1696524303346; Thu, 05 Oct 2023 09:45:03 -0700 (PDT) X-Received: by 2002:a7b:c84d:0:b0:401:b504:b6a0 with SMTP id c13-20020a7bc84d000000b00401b504b6a0mr4797690wml.3.1696524302947; Thu, 05 Oct 2023 09:45:02 -0700 (PDT) Received: from starship ([89.237.100.246]) by smtp.gmail.com with ESMTPSA id d16-20020adff850000000b003232d122dbfsm2157582wrq.66.2023.10.05.09.45.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Oct 2023 09:45:02 -0700 (PDT) Message-ID: Subject: Re: [PATCH v2] x86: KVM: Add feature flag for CPUID.80000021H:EAX[bit 1] From: Maxim Levitsky To: Jim Mattson , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Pawan Gupta , Jiaxi Chen , Kim Phillips , Paolo Bonzini , Sean Christopherson , "H. Peter Anvin" , x86@kernel.org, Dave Hansen , Borislav Petkov , Ingo Molnar , Thomas Gleixner Date: Thu, 05 Oct 2023 19:45:00 +0300 In-Reply-To: <20231005031237.1652871-1-jmattson@google.com> References: <20231005031237.1652871-1-jmattson@google.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Thu, 05 Oct 2023 09:59:55 -0700 (PDT) У ср, 2023-10-04 у 20:12 -0700, Jim Mattson пише: > Define an X86_FEATURE_* flag for CPUID.80000021H:EAX.[bit 1], and > advertise the feature to userspace via KVM_GET_SUPPORTED_CPUID. > > Per AMD's "Processor Programming Reference (PPR) for AMD Family 19h > Model 61h, Revision B1 Processors (56713-B1-PUB)," this CPUID bit > indicates that a WRMSR to MSR_FS_BASE, MSR_GS_BASE, or > MSR_KERNEL_GS_BASE is non-serializing. This is a change in previously > architected behavior. > > Effectively, this CPUID bit is a "defeature" bit, or a reverse > polarity feature bit. When this CPUID bit is clear, the feature > (serialization on WRMSR to any of these three MSRs) is available. When > this CPUID bit is set, the feature is not available. > > KVM_GET_SUPPORTED_CPUID must pass this bit through from the underlying > hardware, if it is set. Leaving the bit clear claims that WRMSR to > these three MSRs will be serializing in a guest running under > KVM. That isn't true. Though KVM could emulate the feature by > intercepting writes to the specified MSRs, it does not do so > today. The guest is allowed direct read/write access to these MSRs > without interception, so the innate hardware behavior is preserved > under KVM. > > Signed-off-by: Jim Mattson > --- > > v1 -> v2: Added justification for this change to the commit message, > tweaked the macro name and comment in cpufeatures.h for > improved clarity. > > arch/x86/include/asm/cpufeatures.h | 1 + > arch/x86/kvm/cpuid.c | 3 ++- > 2 files changed, 3 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/include/asm/cpufeatures.h b/arch/x86/include/asm/cpufeatures.h > index 58cb9495e40f..4af140cf5719 100644 > --- a/arch/x86/include/asm/cpufeatures.h > +++ b/arch/x86/include/asm/cpufeatures.h > @@ -443,6 +443,7 @@ > > /* AMD-defined Extended Feature 2 EAX, CPUID level 0x80000021 (EAX), word 20 */ > #define X86_FEATURE_NO_NESTED_DATA_BP (20*32+ 0) /* "" No Nested Data Breakpoints */ > +#define X86_FEATURE_WRMSR_XX_BASE_NS (20*32+ 1) /* "" WRMSR to {FS,GS,KERNEL_GS}_BASE is non-serializing */ > #define X86_FEATURE_LFENCE_RDTSC (20*32+ 2) /* "" LFENCE always serializing / synchronizes RDTSC */ > #define X86_FEATURE_NULL_SEL_CLR_BASE (20*32+ 6) /* "" Null Selector Clears Base */ > #define X86_FEATURE_AUTOIBRS (20*32+ 8) /* "" Automatic IBRS */ > diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c > index 0544e30b4946..93241b33e36f 100644 > --- a/arch/x86/kvm/cpuid.c > +++ b/arch/x86/kvm/cpuid.c > @@ -761,7 +761,8 @@ void kvm_set_cpu_caps(void) > > kvm_cpu_cap_mask(CPUID_8000_0021_EAX, > F(NO_NESTED_DATA_BP) | F(LFENCE_RDTSC) | 0 /* SmmPgCfgLock */ | > - F(NULL_SEL_CLR_BASE) | F(AUTOIBRS) | 0 /* PrefetchCtlMsr */ > + F(NULL_SEL_CLR_BASE) | F(AUTOIBRS) | 0 /* PrefetchCtlMsr */ | > + F(WRMSR_XX_BASE_NS) > ); > > if (cpu_feature_enabled(X86_FEATURE_SRSO_NO)) Reviewed-by: Maxim Levitsky Best regards, Maxim Levitsky