Re: [PATCH v2] KVM: x86: Advertise AVX10.1 CPUID to userspace

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Aug 16, 2024 at 07:51:48AM -0700, Sean Christopherson wrote:
> On Mon, Jun 03, 2024, Tao Su wrote:
> > Advertise AVX10.1 related CPUIDs, i.e. report AVX10 support bit via
> > CPUID.(EAX=07H, ECX=01H):EDX[bit 19] and new CPUID leaf 0x24H so that
> > guest OS and applications can query the AVX10.1 CPUIDs directly. Intel
> > AVX10 represents the first major new vector ISA since the introduction of
> > Intel AVX512, which will establish a common, converged vector instruction
> > set across all Intel architectures[1].
> > 
> > AVX10.1 is an early version of AVX10, that enumerates the Intel AVX512
> > instruction set at 128, 256, and 512 bits which is enabled on
> > Granite Rapids. I.e., AVX10.1 is only a new CPUID enumeration with no
> > VMX capability, Embedded rounding and Suppress All Exceptions (SAE),
> > which will be introduced in AVX10.2.
> >
> > Advertising AVX10.1 is safe because kernel doesn't enable AVX10.1 which is
> 
> I thought there is nothing to enable for AVX10.1?  I.e. it's purely a new way to
> enumerate support, thus there will never be anything for the kernel to enable.
> 

Yes, AVX10.1 is just a new enumeration way.

> > on KVM-only leaf now, just the CPUID checking is changed when using AVX512
> > related instructions, e.g. if using one AVX512 instruction needs to check
> > (AVX512 AND AVX512DQ), it can check ((AVX512 AND AVX512DQ) OR AVX10.1)
> > after checking XCR0[7:5].
> > 
> > The versions of AVX10 are expected to be inclusive, e.g. version N+1 is
> > a superset of version N. Per the spec, the version can never be 0, just
> > advertise AVX10.1 if it's supported in hardware.
> 
> I think it's also worth calling out that advertising AVX10_{128,256,512} needs
> to land in the same patch (this patch) as AVX10 (and thus AVX10.1), because
> otherwise KVM would advertise an impossible CPU model, e.g. with AVX512 but not
> AVX10.1/512, which per "Feature Differences Between Intel® AVX-512 and Intel® AVX10"
> should be impossible.
> 

Indeed, that's the reason why I only used one patch, will do in v3, thanks!

> > As more and more AVX related CPUIDs are added (it would have resulted in
> > around 40-50 CPUID flags when developing AVX10), the versioning approach
> > is introduced. But incrementing version numbers are bad for virtualization.
> > E.g. if AVX10.2 has a feature that shouldn't be enumerated to guests for
> > whatever reason, then KVM can't enumerate any "later" features either,
> > because the only way to hide the problematic AVX10.2 feature is to set the
> > version to AVX10.1 or lower[2]. But most AVX features are just passed
> > through and don’t have virtualization controls, so AVX10 should not be
> > problematic in practice.
> > 
> > [1] https://cdrdv2.intel.com/v1/dl/getContent/784267
> > [2] https://lore.kernel.org/all/Zkz5Ak0PQlAN8DxK@xxxxxxxxxx/
> > 
> > Signed-off-by: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
> > ---
> > Changelog:
> > v1 -> v2:
> >  - Directly advertise version 1 because version can never be 0.
> >  - Add and advertise feature bits for the supported vector sizes.
> > 
> > v1: https://lore.kernel.org/all/20240520022002.1494056-1-tao1.su@xxxxxxxxxxxxxxx/
> > ---
> >  arch/x86/include/asm/cpuid.h |  1 +
> >  arch/x86/kvm/cpuid.c         | 21 +++++++++++++++++++--
> >  arch/x86/kvm/reverse_cpuid.h |  8 ++++++++
> >  3 files changed, 28 insertions(+), 2 deletions(-)
> > 
> > diff --git a/arch/x86/include/asm/cpuid.h b/arch/x86/include/asm/cpuid.h
> > index 6b122a31da06..aa21c105eef1 100644
> > --- a/arch/x86/include/asm/cpuid.h
> > +++ b/arch/x86/include/asm/cpuid.h
> > @@ -179,6 +179,7 @@ static __always_inline bool cpuid_function_is_indexed(u32 function)
> >  	case 0x1d:
> >  	case 0x1e:
> >  	case 0x1f:
> > +	case 0x24:
> >  	case 0x8000001d:
> >  		return true;
> >  	}
> > diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c
> > index f2f2be5d1141..6717a5b7d9cd 100644
> > --- a/arch/x86/kvm/cpuid.c
> > +++ b/arch/x86/kvm/cpuid.c
> > @@ -693,7 +693,7 @@ void kvm_set_cpu_caps(void)
> >  
> >  	kvm_cpu_cap_init_kvm_defined(CPUID_7_1_EDX,
> >  		F(AVX_VNNI_INT8) | F(AVX_NE_CONVERT) | F(PREFETCHITI) |
> > -		F(AMX_COMPLEX)
> > +		F(AMX_COMPLEX) | F(AVX10)
> >  	);
> >  
> >  	kvm_cpu_cap_init_kvm_defined(CPUID_7_2_EDX,
> > @@ -709,6 +709,10 @@ void kvm_set_cpu_caps(void)
> >  		SF(SGX1) | SF(SGX2) | SF(SGX_EDECCSSA)
> >  	);
> >  
> > +	kvm_cpu_cap_init_kvm_defined(CPUID_24_0_EBX,
> > +		F(AVX10_128) | F(AVX10_256) | F(AVX10_512)
> > +	);
> > +
> >  	kvm_cpu_cap_mask(CPUID_8000_0001_ECX,
> >  		F(LAHF_LM) | F(CMP_LEGACY) | 0 /*SVM*/ | 0 /* ExtApicSpace */ |
> >  		F(CR8_LEGACY) | F(ABM) | F(SSE4A) | F(MISALIGNSSE) |
> > @@ -937,7 +941,7 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function)
> >  	switch (function) {
> >  	case 0:
> >  		/* Limited to the highest leaf implemented in KVM. */
> > -		entry->eax = min(entry->eax, 0x1fU);
> > +		entry->eax = min(entry->eax, 0x24U);
> >  		break;
> >  	case 1:
> >  		cpuid_entry_override(entry, CPUID_1_EDX);
> > @@ -1162,6 +1166,19 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function)
> >  			break;
> >  		}
> >  		break;
> > +	case 0x24: {
> 
> No need for the curly braces on the case.  But, my suggestion below will change
> that ;-)
> 

I got it :-)

> > +		if (!kvm_cpu_cap_has(X86_FEATURE_AVX10)) {
> > +			entry->eax = entry->ebx = entry->ecx = entry->edx = 0;
> > +			break;
> > +		}
> > +		entry->eax = 0;
> > +		cpuid_entry_override(entry, CPUID_24_0_EBX);
> > +		/* EBX[7:0] hold the AVX10 version; KVM supports version '1'. */
> > +		entry->ebx |= 1;
> 
> Ah, rather than hardcode this to '1', I think we should do:
> 
> 		u8 avx10_version;
> 
> 		if (!kvm_cpu_cap_has(X86_FEATURE_AVX10)) {
> 			entry->eax = entry->ebx = entry->ecx = entry->edx = 0;
> 			break;
> 		}
> 
> 		/*
> 		 * The AVX10 version is encoded in EBX[7:0].  Note, the version
> 		 * is guaranteed to be >=1 if AVX10 is supported.  Note #2, the
> 		 * version needs to be captured before overriding EBX features!
> 		 */
> 		avx10_version = min_t(u8, entry->ebx & 0xff, 1);
> 
> 		cpuid_entry_override(entry, CPUID_24_0_EBX);
> 		entry->ebx |= avx10_version;
> 
> I.e. use the same approach as limiting the max leaf, which does:
> 
> 		entry->eax = min(entry->eax, 0x1fU);
> 
> Unless I'm misunderstanding how all of this is expected to play out, we're going
> to need the min_t() code for AVX10.2 anyways, might as well implement it now.

Yes, that's better for the upcoming AVX10.2, thanks for the suggestions!





[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux