From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
Cc: "Andrew Cooper" <andrew.cooper3@citrix.com>,
"Jan Beulich" <JBeulich@suse.com>,
"Roger Pau Monné" <roger.pau@citrix.com>, "Wei Liu" <wl@xen.org>
Subject: [PATCH] libx86: Introduce x86_cpu_policy_calculate_compatible() with MSR_ARCH_CAPS handling
Date: Tue, 4 May 2021 22:31:20 +0100 [thread overview]
Message-ID: <20210504213120.4179-1-andrew.cooper3@citrix.com> (raw)
Just as with x86_cpu_policies_are_compatible(), make a start on this function
with some token handling.
Add levelling support for MSR_ARCH_CAPS, because RSBA has interesting
properties, and introduce test_calculate_compatible_success() to the unit
tests, covering various cases where the arch_caps CPUID bit falls out, and
with RSBA accumulating rather than intersecting across the two.
Extend x86_cpu_policies_are_compatible() with a check for MSR_ARCH_CAPS, which
was arguably missing from c/s e32605b07ef "x86: Begin to introduce support for
MSR_ARCH_CAPS".
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
---
tools/include/xen-tools/libs.h | 5 ++
tools/tests/cpu-policy/test-cpu-policy.c | 150 +++++++++++++++++++++++++++++++
xen/include/xen/lib/x86/cpu-policy.h | 22 +++++
xen/lib/x86/policy.c | 47 ++++++++++
4 files changed, 224 insertions(+)
diff --git a/tools/include/xen-tools/libs.h b/tools/include/xen-tools/libs.h
index a16e0c3807..4de10efdea 100644
--- a/tools/include/xen-tools/libs.h
+++ b/tools/include/xen-tools/libs.h
@@ -63,4 +63,9 @@
#define ROUNDUP(_x,_w) (((unsigned long)(_x)+(1UL<<(_w))-1) & ~((1UL<<(_w))-1))
#endif
+#ifndef _AC
+#define __AC(X, Y) (X ## Y)
+#define _AC(X, Y) __AC(X, Y)
+#endif
+
#endif /* __XEN_TOOLS_LIBS__ */
diff --git a/tools/tests/cpu-policy/test-cpu-policy.c b/tools/tests/cpu-policy/test-cpu-policy.c
index 75973298df..455b4fe3c0 100644
--- a/tools/tests/cpu-policy/test-cpu-policy.c
+++ b/tools/tests/cpu-policy/test-cpu-policy.c
@@ -775,6 +775,154 @@ static void test_is_compatible_failure(void)
}
}
+static void test_calculate_compatible_success(void)
+{
+ static struct test {
+ const char *name;
+ struct {
+ struct cpuid_policy p;
+ struct msr_policy m;
+ } a, b, out;
+ } tests[] = {
+ {
+ "arch_caps, b short max_leaf",
+ .a = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ .m.arch_caps.rdcl_no = true,
+ },
+ .b = {
+ .p.basic.max_leaf = 6,
+ .p.feat.arch_caps = true,
+ .m.arch_caps.rdcl_no = true,
+ },
+ .out = {
+ .p.basic.max_leaf = 6,
+ },
+ },
+ {
+ "arch_caps, b feat missing",
+ .a = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ .m.arch_caps.rdcl_no = true,
+ },
+ .b = {
+ .p.basic.max_leaf = 7,
+ .m.arch_caps.rdcl_no = true,
+ },
+ .out = {
+ .p.basic.max_leaf = 7,
+ },
+ },
+ {
+ "arch_caps, b rdcl_no missing",
+ .a = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ .m.arch_caps.rdcl_no = true,
+ },
+ .b = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ },
+ .out = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ },
+ },
+ {
+ "arch_caps, rdcl_no ok",
+ .a = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ .m.arch_caps.rdcl_no = true,
+ },
+ .b = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ .m.arch_caps.rdcl_no = true,
+ },
+ .out = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ .m.arch_caps.rdcl_no = true,
+ },
+ },
+ {
+ "arch_caps, rsba accum",
+ .a = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ .m.arch_caps.rsba = true,
+ },
+ .b = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ },
+ .out = {
+ .p.basic.max_leaf = 7,
+ .p.feat.arch_caps = true,
+ .m.arch_caps.rsba = true,
+ },
+ },
+ };
+ struct cpu_policy_errors no_errors = INIT_CPU_POLICY_ERRORS;
+
+ printf("Testing calculate compatibility success:\n");
+
+ for ( size_t i = 0; i < ARRAY_SIZE(tests); ++i )
+ {
+ struct test *t = &tests[i];
+ struct cpuid_policy *p = malloc(sizeof(struct cpuid_policy));
+ struct msr_policy *m = malloc(sizeof(struct msr_policy));
+ struct cpu_policy a = {
+ &t->a.p,
+ &t->a.m,
+ }, b = {
+ &t->b.p,
+ &t->b.m,
+ }, out = {
+ p,
+ m,
+ };
+ struct cpu_policy_errors e;
+ int res;
+
+ if ( !p || !m )
+ err(1, "%s() malloc failure", __func__);
+
+ res = x86_cpu_policy_calculate_compatible(&a, &b, &out, &e);
+
+ /* Check the expected error output. */
+ if ( res != 0 || memcmp(&no_errors, &e, sizeof(no_errors)) )
+ {
+ fail(" Test '%s' expected no errors\n"
+ " got res %d { leaf %08x, subleaf %08x, msr %08x }\n",
+ t->name, res, e.leaf, e.subleaf, e.msr);
+ goto test_done;
+ }
+
+ if ( memcmp(&t->out.p, p, sizeof(*p)) )
+ {
+ fail(" Test '%s' resulting CPUID policy not as expected\n",
+ t->name);
+ goto test_done;
+ }
+
+ if ( memcmp(&t->out.m, m, sizeof(*m)) )
+ {
+ fail(" Test '%s' resulting MSR policy not as expected\n",
+ t->name);
+ goto test_done;
+ }
+
+ test_done:
+ free(p);
+ free(m);
+ }
+}
+
int main(int argc, char **argv)
{
printf("CPU Policy unit tests\n");
@@ -793,6 +941,8 @@ int main(int argc, char **argv)
test_is_compatible_success();
test_is_compatible_failure();
+ test_calculate_compatible_success();
+
if ( nr_failures )
printf("Done: %u failures\n", nr_failures);
else
diff --git a/xen/include/xen/lib/x86/cpu-policy.h b/xen/include/xen/lib/x86/cpu-policy.h
index 5a2c4c7b2d..0422a15557 100644
--- a/xen/include/xen/lib/x86/cpu-policy.h
+++ b/xen/include/xen/lib/x86/cpu-policy.h
@@ -37,6 +37,28 @@ int x86_cpu_policies_are_compatible(const struct cpu_policy *host,
const struct cpu_policy *guest,
struct cpu_policy_errors *err);
+/*
+ * Given two policies, calculate one which is compatible with each.
+ *
+ * i.e. Given host @a and host @b, calculate what to give a VM so it can live
+ * migrate between the two.
+ *
+ * @param a A cpu_policy.
+ * @param b Another cpu_policy.
+ * @param out A policy compatible with @a and @b.
+ * @param err Optional hint for error diagnostics.
+ * @returns -errno
+ *
+ * For typical usage, @a and @b should be system policies of the same type
+ * (i.e. PV/HVM default/max) from different hosts. In the case that an
+ * incompatibility is detected, the optional err pointer may identify the
+ * problematic leaf/subleaf and/or MSR.
+ */
+int x86_cpu_policy_calculate_compatible(const struct cpu_policy *a,
+ const struct cpu_policy *b,
+ struct cpu_policy *out,
+ struct cpu_policy_errors *err);
+
#endif /* !XEN_LIB_X86_POLICIES_H */
/*
diff --git a/xen/lib/x86/policy.c b/xen/lib/x86/policy.c
index f6cea4e2f9..06039e8aa8 100644
--- a/xen/lib/x86/policy.c
+++ b/xen/lib/x86/policy.c
@@ -29,6 +29,9 @@ int x86_cpu_policies_are_compatible(const struct cpu_policy *host,
if ( ~host->msr->platform_info.raw & guest->msr->platform_info.raw )
FAIL_MSR(MSR_INTEL_PLATFORM_INFO);
+ if ( ~host->msr->arch_caps.raw & guest->msr->arch_caps.raw )
+ FAIL_MSR(MSR_ARCH_CAPABILITIES);
+
#undef FAIL_MSR
#undef FAIL_CPUID
#undef NA
@@ -43,6 +46,50 @@ int x86_cpu_policies_are_compatible(const struct cpu_policy *host,
return ret;
}
+int x86_cpu_policy_calculate_compatible(const struct cpu_policy *a,
+ const struct cpu_policy *b,
+ struct cpu_policy *out,
+ struct cpu_policy_errors *err)
+{
+ const struct cpuid_policy *ap = a->cpuid, *bp = b->cpuid;
+ const struct msr_policy *am = a->msr, *bm = b->msr;
+ struct cpuid_policy *cp = out->cpuid;
+ struct msr_policy *mp = out->msr;
+
+ memset(cp, 0, sizeof(*cp));
+ memset(mp, 0, sizeof(*mp));
+
+ cp->basic.max_leaf = min(ap->basic.max_leaf, bp->basic.max_leaf);
+
+ if ( cp->basic.max_leaf >= 7 )
+ {
+ cp->feat.max_subleaf = min(ap->feat.max_subleaf, bp->feat.max_subleaf);
+
+ cp->feat.raw[0].b = ap->feat.raw[0].b & bp->feat.raw[0].b;
+ cp->feat.raw[0].c = ap->feat.raw[0].c & bp->feat.raw[0].c;
+ cp->feat.raw[0].d = ap->feat.raw[0].d & bp->feat.raw[0].d;
+ }
+
+ /* TODO: Far more. */
+
+ mp->platform_info.raw = am->platform_info.raw & bm->platform_info.raw;
+
+ if ( cp->feat.arch_caps )
+ {
+ /*
+ * RSBA means "RSB Alternative", i.e. RSB stuffing not necesserily
+ * safe. It needs to accumulate rather than intersect across a
+ * resource pool.
+ */
+#define POL_MASK ARCH_CAPS_RSBA
+ mp->arch_caps.raw = ((am->arch_caps.raw ^ POL_MASK) &
+ (bm->arch_caps.raw ^ POL_MASK)) ^ POL_MASK;
+#undef POL_MASK
+ }
+
+ return 0;
+}
+
/*
* Local variables:
* mode: C
--
2.11.0
next reply other threads:[~2021-05-04 21:32 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-05-04 21:31 Andrew Cooper [this message]
2021-05-05 6:39 ` [PATCH] libx86: Introduce x86_cpu_policy_calculate_compatible() with MSR_ARCH_CAPS handling Jan Beulich
2021-05-05 12:15 ` Andrew Cooper
2021-05-05 12:32 ` Jan Beulich
2021-05-05 10:04 ` Roger Pau Monné
2021-05-05 12:37 ` Andrew Cooper
2021-05-05 13:02 ` Roger Pau Monné
2021-05-05 14:29 ` Andrew Cooper
2021-05-05 14:48 ` Jan Beulich
2021-05-05 14:50 ` Andrew Cooper
2021-05-05 15:00 ` Jan Beulich
2021-05-05 15:18 ` Andrew Cooper
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210504213120.4179-1-andrew.cooper3@citrix.com \
--to=andrew.cooper3@citrix.com \
--cc=JBeulich@suse.com \
--cc=roger.pau@citrix.com \
--cc=wl@xen.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).