From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3F3F6C27C53 for ; Wed, 16 Aug 2023 21:54:38 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346687AbjHPVyG (ORCPT ); Wed, 16 Aug 2023 17:54:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44064 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346678AbjHPVxf (ORCPT ); Wed, 16 Aug 2023 17:53:35 -0400 Received: from mail-yw1-x114a.google.com (mail-yw1-x114a.google.com [IPv6:2607:f8b0:4864:20::114a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C83182716 for ; Wed, 16 Aug 2023 14:53:33 -0700 (PDT) Received: by mail-yw1-x114a.google.com with SMTP id 00721157ae682-583c49018c6so88924357b3.0 for ; Wed, 16 Aug 2023 14:53:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1692222813; x=1692827613; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=5U/ye/HLLHU/JJfiRkVc60C30cItgmeRYpMYP9FcKiM=; b=PWKIkyBQUmD6JPUwrnxbzNd/8go2kuU6pqHijYG6MCKbS9kxanLME/QPzswYYRp4Va WoUU6LxZ914BeCpkNYWlb+cvhi3jLBPQKu1t3sDe6WOzE2HQspYB65pEcFCznl+c1mPs fO9uXz3YD1XBECwkDUz2fn6669jnR+3PObslQ1IYmj1cdnShetOhqL3bhPjmz8vdQoFF 91b6xWQXOXFioytRPTeMWM55Png+68nEIeEGxz56vStWZUOkG0+E4/w+5qoqo8nSHopv 6N006dtsCweGdCw7Ot56OdHWsfE8zfsKhZ+OYDvh6bth827Dw6EByt9TbhXBcSnrTz9k xYvg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1692222813; x=1692827613; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=5U/ye/HLLHU/JJfiRkVc60C30cItgmeRYpMYP9FcKiM=; b=aRVwd+wPiZDpXnHPqQUpvNjjYfENu+ChUFLAZBHXKwOQwfgej5J+UPnh4l/vLp17qq 6aNmRvrwGHmnrEchUgf0AEOKBvJW9jITAe/unFSJbjidf+gDOCrDe6KznCYFzkkSgXHG r93I+ml8+zsvFBQcLexUHfw9KtCVGDFnl+ZLkIVxK85/FPTEic/C5tXV11UEDmF4BNj5 UjPbnNpWI+HAdVlDOOcu8dwu637Cjd4P/Yj8cN+FYAr4ohbZgemrDzsJyvoXjv2Iuw7v gUkIKM2enF438f6uZ6yXu87uCwYFrwKlTw7ZXexltlvdHi7xvU2/MtRgAqzscxZP0KvN gwFw== X-Gm-Message-State: AOJu0Yzn8So4dj5/QnqEwA0gFjvT6pkP0hFNy9kCMH3ZabrlyT7SXLSb lBeQ5cy5S6LVBXuEANZdfqbz3w4eqNg= X-Google-Smtp-Source: AGHT+IGQotSeqquzPZzglE1yO40ugG8Roq/D5aKi1TxCw/8m7cn22zOorE24QGwVCCegSkXo40u2q2Wy9yM= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a81:ae52:0:b0:58c:8c9f:c05a with SMTP id g18-20020a81ae52000000b0058c8c9fc05amr40828ywk.9.1692222813109; Wed, 16 Aug 2023 14:53:33 -0700 (PDT) Date: Wed, 16 Aug 2023 14:53:31 -0700 In-Reply-To: <20230719144131.29052-10-binbin.wu@linux.intel.com> Mime-Version: 1.0 References: <20230719144131.29052-1-binbin.wu@linux.intel.com> <20230719144131.29052-10-binbin.wu@linux.intel.com> Message-ID: Subject: Re: [PATCH v10 9/9] KVM: x86: Expose LAM feature to userspace VMM From: Sean Christopherson To: Binbin Wu Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, pbonzini@redhat.com, chao.gao@intel.com, kai.huang@intel.com, David.Laight@aculab.com, robert.hu@linux.intel.com, guang.zeng@intel.com Content-Type: text/plain; charset="us-ascii" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org s/Expose/Advertise And I would add an "enable" in there somehwere, because to Kai's point earlier in the series about kvm_cpu_cap_has(), the guest can't actually use LAM until this patch. Sometimes we do just say "Advertise", but typically only for features where there's not virtualization support, e.g. AVX instructions where the guest can use them irrespective of what KVM says it supports. This? KVM: x86: Advertise and enable LAM (user and supervisor) On Wed, Jul 19, 2023, Binbin Wu wrote: > From: Robert Hoo > > LAM feature is enumerated by CPUID.7.1:EAX.LAM[bit 26]. > Expose the feature to userspace as the final step after the following > supports: > - CR4.LAM_SUP virtualization > - CR3.LAM_U48 and CR3.LAM_U57 virtualization > - Check and untag 64-bit linear address when LAM applies in instruction > emulations and VMExit handlers. > > Exposing SGX LAM support is not supported yet. SGX LAM support is enumerated > in SGX's own CPUID and there's no hard requirement that it must be supported > when LAM is reported in CPUID leaf 0x7. > > Signed-off-by: Robert Hoo > Signed-off-by: Binbin Wu > Reviewed-by: Jingqi Liu > Reviewed-by: Chao Gao > Reviewed-by: Kai Huang > Tested-by: Xuelian Guo > --- > arch/x86/kvm/cpuid.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c > index 7ebf3ce1bb5f..21d525b01d45 100644 > --- a/arch/x86/kvm/cpuid.c > +++ b/arch/x86/kvm/cpuid.c > @@ -645,7 +645,7 @@ void kvm_set_cpu_caps(void) > kvm_cpu_cap_mask(CPUID_7_1_EAX, > F(AVX_VNNI) | F(AVX512_BF16) | F(CMPCCXADD) | > F(FZRM) | F(FSRS) | F(FSRC) | > - F(AMX_FP16) | F(AVX_IFMA) > + F(AMX_FP16) | F(AVX_IFMA) | F(LAM) > ); > > kvm_cpu_cap_init_kvm_defined(CPUID_7_1_EDX, > -- > 2.25.1 >