Message ID | 20240520022002.1494056-1-tao1.su@linux.intel.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | KVM: x86: Advertise AVX10.1 CPUID to userspace | expand |
On Mon, May 20, 2024, Tao Su wrote: > @@ -1162,6 +1162,22 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function) > break; > } > break; > + case 0x24: { > + u8 avx10_version; > + u32 vector_support; > + > + if (!kvm_cpu_cap_has(X86_FEATURE_AVX10)) { > + entry->eax = entry->ebx = entry->ecx = entry->edx = 0; > + break; > + } > + avx10_version = min(entry->ebx & 0xff, 1); Taking the min() of '1' and anything else is pointless. Per the spec, the version can never be 0. CPUID.(EAX=24H, ECX=00H):EBX[bits 7:0] Reports the Intel AVX10 Converged Vector ISA version. Integer (≥ 1) And it's probably too late, but why on earth is there an AVX10 version number? Version numbers are _awful_ for virtualization; see the constant vPMU problems that arise from bundling things under a single version number.. Y'all carved out room for sub-leafs, i.e. there's a ton of room for "discrete feature bits", so why oh why is there a version number? > + vector_support = entry->ebx & GENMASK(18, 16); Please add proper defines somewhere, this this can be something like: /* EBX[7:0] hold the AVX10 version; KVM supports version '1'. */ entry->eax = 0; entry->ebx = (entry->ebx & AVX10_VECTOR_SIZES_MASK) | 1; entry->ecx = 0; entry->edx = 0; Or perhaps we should have feature bits for the vector sizes, because that's really what they are. Mixing feature bits in with a version number makes for painful code, but there's nothing KVM can do about that. With proper features, this then becomes something like: entry->eax = 0; cpuid_entry_override(entry, CPUID_24_0_EBX); /* EBX[7:0] hold the AVX10 version; KVM supports version '1'. */ entry->ebx |= 1; entry->ecx = 0; entry->edx = 0;
On Mon, May 20, 2024 at 07:43:50AM -0700, Sean Christopherson wrote: > On Mon, May 20, 2024, Tao Su wrote: > > @@ -1162,6 +1162,22 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function) > > break; > > } > > break; > > + case 0x24: { > > + u8 avx10_version; > > + u32 vector_support; > > + > > + if (!kvm_cpu_cap_has(X86_FEATURE_AVX10)) { > > + entry->eax = entry->ebx = entry->ecx = entry->edx = 0; > > + break; > > + } > > + avx10_version = min(entry->ebx & 0xff, 1); > > Taking the min() of '1' and anything else is pointless. Per the spec, the version > can never be 0. > > CPUID.(EAX=24H, ECX=00H):EBX[bits 7:0] Reports the Intel AVX10 Converged Vector ISA version. Integer (≥ 1) > > And it's probably too late, but why on earth is there an AVX10 version number? > Version numbers are _awful_ for virtualization; see the constant vPMU problems > that arise from bundling things under a single version number.. Y'all carved out > room for sub-leafs, i.e. there's a ton of room for "discrete feature bits", so > why oh why is there a version number? > Per the spec, AVX10 wants to reduce the number of CPUID feature flags required to be checked, which may simplify application development. Application only needs to check the version number that can know whether hardware supports an instruction. There's indeed a sub-leaf for enumerating discrete CPUID feature bits, but the sub-leaf is only in the rare case. AVX10.2 (version number == 2) is the initial and fully-featured version of AVX10, we may need to advertise AVX10.2 in the future. Is keeping min() more flexible to control the advertised version number? E.g. avx10_version = min(entry->ebx & 0xff, 2); can advertise AVX10.2 to userspace. > > + vector_support = entry->ebx & GENMASK(18, 16); > > Please add proper defines somewhere, this this can be something like: > > /* EBX[7:0] hold the AVX10 version; KVM supports version '1'. */ > entry->eax = 0; > entry->ebx = (entry->ebx & AVX10_VECTOR_SIZES_MASK) | 1; > entry->ecx = 0; > entry->edx = 0; > Yes, its readability will be better. > Or perhaps we should have feature bits for the vector sizes, because that's really > what they are. Mixing feature bits in with a version number makes for painful > code, but there's nothing KVM can do about that. With proper features, this then > becomes something like: > > entry->eax = 0; > cpuid_entry_override(entry, CPUID_24_0_EBX); > /* EBX[7:0] hold the AVX10 version; KVM supports version '1'. */ > entry->ebx |= 1; > entry->ecx = 0; > entry->edx = 0; Agree, I will introduce the feature bits for the vector sizes, thanks!
On Tue, May 21, 2024, Tao Su wrote: > On Mon, May 20, 2024 at 07:43:50AM -0700, Sean Christopherson wrote: > > On Mon, May 20, 2024, Tao Su wrote: > > > @@ -1162,6 +1162,22 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function) > > > break; > > > } > > > break; > > > + case 0x24: { > > > + u8 avx10_version; > > > + u32 vector_support; > > > + > > > + if (!kvm_cpu_cap_has(X86_FEATURE_AVX10)) { > > > + entry->eax = entry->ebx = entry->ecx = entry->edx = 0; > > > + break; > > > + } > > > + avx10_version = min(entry->ebx & 0xff, 1); > > > > Taking the min() of '1' and anything else is pointless. Per the spec, the version > > can never be 0. > > > > CPUID.(EAX=24H, ECX=00H):EBX[bits 7:0] Reports the Intel AVX10 Converged Vector ISA version. Integer (≥ 1) > > > > And it's probably too late, but why on earth is there an AVX10 version number? > > Version numbers are _awful_ for virtualization; see the constant vPMU problems > > that arise from bundling things under a single version number.. Y'all carved out > > room for sub-leafs, i.e. there's a ton of room for "discrete feature bits", so > > why oh why is there a version number? > > > > Per the spec, AVX10 wants to reduce the number of CPUID feature flags required > to be checked, which may simplify application development. Application only > needs to check the version number that can know whether hardware supports an > instruction. I get that, but it royally hoses virtualization. Bundling multiple features under a single flag is annoying, e.g. it makes it impossible to selectively advertise features, but I can appreciate that there are situations where having one feature but not another is nonsensical. Incrementing version numbers are a whole other level of bad though. E.g. if AVX10.2 has a feature that shouldn't be enumerated to guests for whatever reason, then KVM can't enumerate any "later" features either, because the only way to hide the problematic AVX10.2 feature is to set the version to AVX10.1 or lower. FWIW, unlike the PMU, which is a bit of a disaster due to version numbers, I don't expect AVX to be problematic in practice. E.g. most AVX features are just passed through and don't have virtualization controls. I just think it's a terrible tradeoff. E.g. if features really need to be bundled together, I don't see how application development is meaningfully more difficult if enumeration is done via a multi-purpose CPUID flag, versus a version number. > There's indeed a sub-leaf for enumerating discrete CPUID feature bits, but > the sub-leaf is only in the rare case. > > AVX10.2 (version number == 2) is the initial and fully-featured version of So what's AVX10.1? > AVX10, we may need to advertise AVX10.2 in the future. Is keeping min() more > flexible to control the advertised version number? E.g. > > avx10_version = min(entry->ebx & 0xff, 2); > > can advertise AVX10.2 to userspace. I'm not worried about flexibility at this point, as much as I'm worried about having sensible code. E.g. if we know AVX10.2 is coming (or already here?), why not set KVM's supported min version to 2 from the get-go?
On Tue, May 21, 2024 at 12:41:54PM -0700, Sean Christopherson wrote: > On Tue, May 21, 2024, Tao Su wrote: > > On Mon, May 20, 2024 at 07:43:50AM -0700, Sean Christopherson wrote: > > > On Mon, May 20, 2024, Tao Su wrote: > > > > @@ -1162,6 +1162,22 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function) > > > > break; > > > > } > > > > break; > > > > + case 0x24: { > > > > + u8 avx10_version; > > > > + u32 vector_support; > > > > + > > > > + if (!kvm_cpu_cap_has(X86_FEATURE_AVX10)) { > > > > + entry->eax = entry->ebx = entry->ecx = entry->edx = 0; > > > > + break; > > > > + } > > > > + avx10_version = min(entry->ebx & 0xff, 1); > > > > > > Taking the min() of '1' and anything else is pointless. Per the spec, the version > > > can never be 0. > > > > > > CPUID.(EAX=24H, ECX=00H):EBX[bits 7:0] Reports the Intel AVX10 Converged Vector ISA version. Integer (≥ 1) > > > > > > And it's probably too late, but why on earth is there an AVX10 version number? > > > Version numbers are _awful_ for virtualization; see the constant vPMU problems > > > that arise from bundling things under a single version number.. Y'all carved out > > > room for sub-leafs, i.e. there's a ton of room for "discrete feature bits", so > > > why oh why is there a version number? > > > > > > > Per the spec, AVX10 wants to reduce the number of CPUID feature flags required > > to be checked, which may simplify application development. Application only > > needs to check the version number that can know whether hardware supports an > > instruction. > > I get that, but it royally hoses virtualization. Bundling multiple features > under a single flag is annoying, e.g. it makes it impossible to selectively > advertise features, but I can appreciate that there are situations where having > one feature but not another is nonsensical. > > Incrementing version numbers are a whole other level of bad though. E.g. if > AVX10.2 has a feature that shouldn't be enumerated to guests for whatever reason, > then KVM can't enumerate any "later" features either, because the only way to hide > the problematic AVX10.2 feature is to set the version to AVX10.1 or lower. > I see, if a 'small part' of a version cannot be advertised, it will block the virtualization of all subsequent versions. If this special 'small part' is really introduced later, I believe this will belong to the rare case and be enumerated in the sub-leaf of CPUID leaf 24H. > FWIW, unlike the PMU, which is a bit of a disaster due to version numbers, I don't > expect AVX to be problematic in practice. E.g. most AVX features are just passed > through and don't have virtualization controls. Yes, I can’t agree more. > I just think it's a terrible > tradeoff. E.g. if features really need to be bundled together, I don't see how > application development is meaningfully more difficult if enumeration is done > via a multi-purpose CPUID flag, versus a version number. > For applications, it seems no significant advantage to the version number. Maybe applications can batch operations based on the version number and the supported vector length. > > There's indeed a sub-leaf for enumerating discrete CPUID feature bits, but > > the sub-leaf is only in the rare case. > > > > AVX10.2 (version number == 2) is the initial and fully-featured version of > > So what's AVX10.1? > AVX10.1 just adds the related CPUIDs for software pre-enabling, i.e. AVX10.1 has no VMX capability, Embedded rounding and Suppress All Exceptions (SAE) control, which will be introduced in AVX10.2. > > AVX10, we may need to advertise AVX10.2 in the future. Is keeping min() more > > flexible to control the advertised version number? E.g. > > > > avx10_version = min(entry->ebx & 0xff, 2); > > > > can advertise AVX10.2 to userspace. > > I'm not worried about flexibility at this point, as much as I'm worried about > having sensible code. E.g. if we know AVX10.2 is coming (or already here?), why > not set KVM's supported min version to 2 from the get-go? Per the spec, AVX10.2 will have a VMX capability, i.e. in the future, KVM may have to do something before advertising AVX10.2. But now there are CPUs that support AVX10.1, so AVX10.1 should to be advertised to guest firstly.
diff --git a/arch/x86/include/asm/cpuid.h b/arch/x86/include/asm/cpuid.h index 6b122a31da06..aa21c105eef1 100644 --- a/arch/x86/include/asm/cpuid.h +++ b/arch/x86/include/asm/cpuid.h @@ -179,6 +179,7 @@ static __always_inline bool cpuid_function_is_indexed(u32 function) case 0x1d: case 0x1e: case 0x1f: + case 0x24: case 0x8000001d: return true; } diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index f2f2be5d1141..ef9e3a4ed461 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -693,7 +693,7 @@ void kvm_set_cpu_caps(void) kvm_cpu_cap_init_kvm_defined(CPUID_7_1_EDX, F(AVX_VNNI_INT8) | F(AVX_NE_CONVERT) | F(PREFETCHITI) | - F(AMX_COMPLEX) + F(AMX_COMPLEX) | F(AVX10) ); kvm_cpu_cap_init_kvm_defined(CPUID_7_2_EDX, @@ -937,7 +937,7 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function) switch (function) { case 0: /* Limited to the highest leaf implemented in KVM. */ - entry->eax = min(entry->eax, 0x1fU); + entry->eax = min(entry->eax, 0x24U); break; case 1: cpuid_entry_override(entry, CPUID_1_EDX); @@ -1162,6 +1162,22 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function) break; } break; + case 0x24: { + u8 avx10_version; + u32 vector_support; + + if (!kvm_cpu_cap_has(X86_FEATURE_AVX10)) { + entry->eax = entry->ebx = entry->ecx = entry->edx = 0; + break; + } + avx10_version = min(entry->ebx & 0xff, 1); + vector_support = entry->ebx & GENMASK(18, 16); + entry->eax = 0; + entry->ebx = vector_support | avx10_version; + entry->ecx = 0; + entry->edx = 0; + break; + } case KVM_CPUID_SIGNATURE: { const u32 *sigptr = (const u32 *)KVM_SIGNATURE; entry->eax = KVM_CPUID_FEATURES; diff --git a/arch/x86/kvm/reverse_cpuid.h b/arch/x86/kvm/reverse_cpuid.h index 2f4e155080ba..695e1fb8d5bc 100644 --- a/arch/x86/kvm/reverse_cpuid.h +++ b/arch/x86/kvm/reverse_cpuid.h @@ -46,6 +46,7 @@ enum kvm_only_cpuid_leafs { #define X86_FEATURE_AVX_NE_CONVERT KVM_X86_FEATURE(CPUID_7_1_EDX, 5) #define X86_FEATURE_AMX_COMPLEX KVM_X86_FEATURE(CPUID_7_1_EDX, 8) #define X86_FEATURE_PREFETCHITI KVM_X86_FEATURE(CPUID_7_1_EDX, 14) +#define X86_FEATURE_AVX10 KVM_X86_FEATURE(CPUID_7_1_EDX, 19) /* Intel-defined sub-features, CPUID level 0x00000007:2 (EDX) */ #define X86_FEATURE_INTEL_PSFD KVM_X86_FEATURE(CPUID_7_2_EDX, 0)
Advertise AVX10.1 related CPUIDs, i.e. report AVX10 support bit via CPUID.(EAX=07H, ECX=01H):EDX[bit 19] and new CPUID leaf 0x24H so that guest OS and applications can query the AVX10.1 CPUIDs directly. Intel AVX10 represents the first major new vector ISA since the introduction of Intel AVX512, which will establish a common, converged vector instruction set across all Intel architectures[1]. AVX10.1 is an early version of AVX10, that enumerates the Intel AVX512 instruction set at 128, 256, and 512 bits which is enabled on Granite Rapids. I.e., AVX10.1 is only a new CPUID enumeration without any VMX controls. Advertising AVX10.1 is safe because kernel doesn't enable AVX10.1 which is on KVM-only leaf now, just the CPUID checking is changed when using AVX512 related instructions, e.g. if using one AVX512 instruction needs to check (AVX512 AND AVX512DQ), it can check ((AVX512 AND AVX512DQ) OR AVX10.1) after checking XCR0[7:5]. The versions of AVX10 are expected to be inclusive, e.g. version N+1 is a superset of version N, so just advertise AVX10.1 if it's supported in hardware. [1] https://cdrdv2.intel.com/v1/dl/getContent/784267 Signed-off-by: Tao Su <tao1.su@linux.intel.com> --- arch/x86/include/asm/cpuid.h | 1 + arch/x86/kvm/cpuid.c | 20 ++++++++++++++++++-- arch/x86/kvm/reverse_cpuid.h | 1 + 3 files changed, 20 insertions(+), 2 deletions(-) base-commit: eb6a9339efeb6f3d2b5c86fdf2382cdc293eca2c