3143ae25cb
- kvm-accel-kvm-check-for-KVM_CAP_READONLY_MEM-on-VM.patch [RHEL-58928] - kvm-hw-s390x-ipl-Provide-more-memory-to-the-s390-ccw.img.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Use-the-libc-from-SLOF-and-remove-s.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Link-the-netboot-code-into-the-main.patch [RHEL-58153] - kvm-redhat-Remove-the-s390-netboot.img-from-the-spec-fil.patch [RHEL-58153] - kvm-hw-s390x-Remove-the-possibility-to-load-the-s390-net.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Merge-netboot.mak-into-the-main-Mak.patch [RHEL-58153] - kvm-docs-system-s390x-bootdevices-Update-the-documentati.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Remove-panics-from-ISO-IPL-path.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Remove-panics-from-ECKD-IPL-path.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Remove-panics-from-SCSI-IPL-path.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Remove-panics-from-DASD-IPL-path.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Remove-panics-from-Netboot-IPL-path.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Enable-failed-IPL-to-return-after-e.patch [RHEL-58153] - kvm-include-hw-s390x-Add-include-files-for-common-IPL-st.patch [RHEL-58153] - kvm-s390x-Add-individual-loadparm-assignment-to-CCW-devi.patch [RHEL-58153] - kvm-hw-s390x-Build-an-IPLB-for-each-boot-device.patch [RHEL-58153] - kvm-s390x-Rebuild-IPLB-for-SCSI-device-directly-from-DIA.patch [RHEL-58153] - kvm-pc-bios-s390x-Enable-multi-device-boot-loop.patch [RHEL-58153] - kvm-docs-system-Update-documentation-for-s390x-IPL.patch [RHEL-58153] - kvm-tests-qtest-Add-s390x-boot-order-tests-to-cdrom-test.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Clarify-alignment-is-in-bytes.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Don-t-generate-TEXTRELs.patch [RHEL-58153] - kvm-pc-bios-s390-ccw-Introduce-EXTRA_LDFLAGS.patch [RHEL-58153] - kvm-vnc-fix-crash-when-no-console-attached.patch [RHEL-50529] - kvm-vfio-migration-Report-only-stop-copy-size-in-vfio_st.patch [RHEL-64308] - kvm-vfio-migration-Change-trace-formats-from-hex-to-deci.patch [RHEL-64308] - kvm-kvm-Allow-kvm_arch_get-put_registers-to-accept-Error.patch [RHEL-20574] - kvm-target-i386-kvm-Report-which-action-failed-in-kvm_ar.patch [RHEL-20574] - kvm-target-i386-cpu-set-correct-supported-XCR0-features-.patch [RHEL-30315 RHEL-45110] - kvm-target-i386-do-not-rely-on-ExtSaveArea-for-accelerat.patch [RHEL-30315 RHEL-45110] - kvm-target-i386-return-bool-from-x86_cpu_filter_features.patch [RHEL-30315 RHEL-45110] - kvm-target-i386-add-AVX10-feature-and-AVX10-version-prop.patch [RHEL-30315 RHEL-45110] - kvm-target-i386-add-CPUID.24-features-for-AVX10.patch [RHEL-30315 RHEL-45110] - kvm-target-i386-Add-feature-dependencies-for-AVX10.patch [RHEL-30315 RHEL-45110] - kvm-target-i386-Add-AVX512-state-when-AVX10-is-supported.patch [RHEL-30315 RHEL-45110] - kvm-target-i386-Introduce-GraniteRapids-v2-model.patch [RHEL-30315 RHEL-45110] - kvm-target-i386-add-sha512-sm3-sm4-feature-bits.patch [RHEL-30315 RHEL-45110] - Resolves: RHEL-58928 (Boot SNP guests failed with qemu-kvm: kvm_set_user_memory_region) - Resolves: RHEL-58153 ([IBM 10.0 FEAT] KVM: Full boot order support - qemu part) - Resolves: RHEL-50529 (Qemu-kvm crashed if no display device setting and switching display by remote-viewer) - Resolves: RHEL-64308 (High threshold value observed in vGPU live migration) - Resolves: RHEL-20574 (Fail migration properly when put cpu register fails) - Resolves: RHEL-30315 ([Intel 10.0 FEAT] [GNR] Virt-QEMU: Add AVX10.1 instruction support) - Resolves: RHEL-45110 ([Intel 10.0 FEAT] [CWF][DMR] Virt-QEMU: Advertise new instructions SHA2-512NI, SM3, and SM4)
118 lines
4.0 KiB
Diff
118 lines
4.0 KiB
Diff
From 6df46774aa41872a706f1a535d5c547a8ef73556 Mon Sep 17 00:00:00 2001
|
|
From: Paolo Bonzini <pbonzini@redhat.com>
|
|
Date: Thu, 31 Oct 2024 16:52:27 +0800
|
|
Subject: [PATCH 31/38] target/i386: do not rely on ExtSaveArea for
|
|
accelerator-supported XCR0 bits
|
|
|
|
RH-Author: Paolo Bonzini <pbonzini@redhat.com>
|
|
RH-MergeRequest: 280: Add support for the AVX10.1, SHA512, SM3 and SM4 instruction sets
|
|
RH-Jira: RHEL-30315 RHEL-45110
|
|
RH-Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
|
RH-Acked-by: Miroslav Rezanina <mrezanin@redhat.com>
|
|
RH-Commit: [2/9] 70d54c2101fd1d30a891a414a8c50566c2ddef67 (bonzini/rhel-qemu-kvm)
|
|
|
|
Right now, QEMU is using the "feature" and "bits" fields of ExtSaveArea
|
|
to query the accelerator for the support status of extended save areas.
|
|
This is a problem for AVX10, which attaches two feature bits (AVX512F
|
|
and AVX10) to the same extended save states.
|
|
|
|
To keep the AVX10 hacks to the minimum, limit usage of esa->features
|
|
and esa->bits. Instead, just query the accelerator for the 0xD leaf.
|
|
Do it in common code and clear esa->size if an extended save state is
|
|
unsupported.
|
|
|
|
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
Reviewed-by: Zhao Liu <zhao1.liu@intel.com>
|
|
Link: https://lore.kernel.org/r/20241031085233.425388-3-tao1.su@linux.intel.com
|
|
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
(cherry picked from commit b888c7807049cc044d10d70139cb945202fb7cd2)
|
|
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
---
|
|
target/i386/cpu.c | 33 +++++++++++++++++++++++++++++++--
|
|
target/i386/kvm/kvm-cpu.c | 4 ----
|
|
2 files changed, 31 insertions(+), 6 deletions(-)
|
|
|
|
diff --git a/target/i386/cpu.c b/target/i386/cpu.c
|
|
index dbdab0f821..d23f15e99a 100644
|
|
--- a/target/i386/cpu.c
|
|
+++ b/target/i386/cpu.c
|
|
@@ -7086,6 +7086,15 @@ static void x86_cpu_set_sgxlepubkeyhash(CPUX86State *env)
|
|
#endif
|
|
}
|
|
|
|
+static bool cpuid_has_xsave_feature(CPUX86State *env, const ExtSaveArea *esa)
|
|
+{
|
|
+ if (!esa->size) {
|
|
+ return false;
|
|
+ }
|
|
+
|
|
+ return (env->features[esa->feature] & esa->bits);
|
|
+}
|
|
+
|
|
static void x86_cpu_reset_hold(Object *obj, ResetType type)
|
|
{
|
|
CPUState *cs = CPU(obj);
|
|
@@ -7194,7 +7203,7 @@ static void x86_cpu_reset_hold(Object *obj, ResetType type)
|
|
if (!((1 << i) & CPUID_XSTATE_XCR0_MASK)) {
|
|
continue;
|
|
}
|
|
- if (env->features[esa->feature] & esa->bits) {
|
|
+ if (cpuid_has_xsave_feature(env, esa)) {
|
|
xcr0 |= 1ull << i;
|
|
}
|
|
}
|
|
@@ -7332,7 +7341,7 @@ static void x86_cpu_enable_xsave_components(X86CPU *cpu)
|
|
mask = 0;
|
|
for (i = 0; i < ARRAY_SIZE(x86_ext_save_areas); i++) {
|
|
const ExtSaveArea *esa = &x86_ext_save_areas[i];
|
|
- if (env->features[esa->feature] & esa->bits) {
|
|
+ if (cpuid_has_xsave_feature(env, esa)) {
|
|
mask |= (1ULL << i);
|
|
}
|
|
}
|
|
@@ -8003,6 +8012,26 @@ static void x86_cpu_register_feature_bit_props(X86CPUClass *xcc,
|
|
|
|
static void x86_cpu_post_initfn(Object *obj)
|
|
{
|
|
+ static bool first = true;
|
|
+ uint64_t supported_xcr0;
|
|
+ int i;
|
|
+
|
|
+ if (first) {
|
|
+ first = false;
|
|
+
|
|
+ supported_xcr0 =
|
|
+ ((uint64_t) x86_cpu_get_supported_feature_word(NULL, FEAT_XSAVE_XCR0_HI) << 32) |
|
|
+ x86_cpu_get_supported_feature_word(NULL, FEAT_XSAVE_XCR0_LO);
|
|
+
|
|
+ for (i = XSTATE_SSE_BIT + 1; i < XSAVE_STATE_AREA_COUNT; i++) {
|
|
+ ExtSaveArea *esa = &x86_ext_save_areas[i];
|
|
+
|
|
+ if (!(supported_xcr0 & (1 << i))) {
|
|
+ esa->size = 0;
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+
|
|
accel_cpu_instance_init(CPU(obj));
|
|
}
|
|
|
|
diff --git a/target/i386/kvm/kvm-cpu.c b/target/i386/kvm/kvm-cpu.c
|
|
index 684e731cbc..961b87e98e 100644
|
|
--- a/target/i386/kvm/kvm-cpu.c
|
|
+++ b/target/i386/kvm/kvm-cpu.c
|
|
@@ -143,10 +143,6 @@ static void kvm_cpu_xsave_init(void)
|
|
if (!esa->size) {
|
|
continue;
|
|
}
|
|
- if ((x86_cpu_get_supported_feature_word(NULL, esa->feature) & esa->bits)
|
|
- != esa->bits) {
|
|
- continue;
|
|
- }
|
|
host_cpuid(0xd, i, &eax, &ebx, &ecx, &edx);
|
|
if (eax != 0) {
|
|
assert(esa->size == eax);
|
|
--
|
|
2.39.3
|
|
|