Received: by 10.223.185.116 with SMTP id b49csp1007272wrg; Sun, 11 Feb 2018 02:21:00 -0800 (PST) X-Google-Smtp-Source: AH8x226v1hHD9p5zw8oP+WrWtwXHz65OUd/E7TZJ+Kbr1fGOfWcSqmUFwsI+eEj9T3elBM73nyT0 X-Received: by 10.99.102.1 with SMTP id a1mr6785685pgc.452.1518344460848; Sun, 11 Feb 2018 02:21:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518344460; cv=none; d=google.com; s=arc-20160816; b=w0Q1Up0vjcssiDWHc0PMptbQ/TXw3WVxJRQMVz/eJ06z87iopmi70j53pV8iEy/YWF F0PRzs89p5+9DDO9gVMtG3IwEJRTtBEUPaHSfZcLDxw0FkX76nYe53h+Va6Oxcw/BdMe pAHb4CwHNwPv1t8PfJJsBe7Ttyu0tJ2TJlu6PUUq/x4ji7idT4GZfeihE5oBNrt5Edwt AsXKEj+BGGep/BuQYn1Mx6c/pBDQzrmjDd/yoHvwPNa43Dblu6bQXQ8MrG5GiGl0K92P aL60MVHyC/Rbrd6LIPs6TrEBG+vEGhoCX5WLC9LwVRmG5LfLh0q+MB9SvADMNs4HGK/q x8DQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=CibvHjbebf+Jx2eC0j8X3HGNtC8r/uE/x/UMJAV7z00=; b=r93PrUbjHJwFWJPJSrOovzflLJrbs7b9Gr6YWWBCYDwy+uFmKTEoUEWnKDiiaSKZNW fxS/VC1cb3rrg61dxmoPsxZ5ptRVdgLQsbbsC0XbB4RoHn4NCCLs4sQ6yklyFNS9jSkM hN+fn4Ux0kkpCsJapq06cJUxV75VexxJDSxfDgReYEPsGUFPKw6xoTpwiMzflLts9/+d 459FodKM/iLClNPleMlLdyHSp2uze7kyg0Rh8hpihYPGro6L2Lbf/62KodZ/UPGY7yUg RcLNrzsghA65GE5SuLLAJfjgr/5R2icyBOTSI0wFl+g37+alexHUtATeBolE0Cz1wodj XhWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=JZ8iO2jl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k69si614657pgc.618.2018.02.11.02.20.32; Sun, 11 Feb 2018 02:21:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=JZ8iO2jl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752826AbeBKKTb (ORCPT + 99 others); Sun, 11 Feb 2018 05:19:31 -0500 Received: from mail-wr0-f193.google.com ([209.85.128.193]:36521 "EHLO mail-wr0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752288AbeBKKT3 (ORCPT ); Sun, 11 Feb 2018 05:19:29 -0500 Received: by mail-wr0-f193.google.com with SMTP id y3so12348241wrh.3; Sun, 11 Feb 2018 02:19:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=CibvHjbebf+Jx2eC0j8X3HGNtC8r/uE/x/UMJAV7z00=; b=JZ8iO2jlDM6qeDxXLptUFXjhNUYYZ0XNRUgNhmEeansaxJrW9CK+JJzJlFHDbl8FYB m0SOgMqx3vA7AMWamRihjShrUSC0t3h7Fu09nAoJSuZpAvn7rlSVlvFxDpcaWWu7hsOy tlHx8j6Z270mHpPBZe+5j/TyCQnap6xD3BPpiucXd8S1pSmzjEnMFjQfOhx2QNgYJveO BTqUvlA1PfjlpiDSo7zbKeKi0IfBUoaH3ZZ4/X9j9eh4Our7AtLsJCsgmGUCzPbIBOUr +Jl1OafaADbDVRjXi0IbcmsTIiGwHNBK/s7PVG6bo3posAYcv2H6kAH2Zhe5MkQzVT3d Y7Qg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=CibvHjbebf+Jx2eC0j8X3HGNtC8r/uE/x/UMJAV7z00=; b=fjYCREG8o9YvnJj6WYDZ5IOZ4rOXfzCa0N+/O0x/hRYt2E9M4qS+2uH0NCRS05aTgk JHBzaGdF0XJUBIqvTe2ro6vcDr78x4wrDC7CpmMMn6Z2ha++uqBdGHgY1B+V7vcTosl6 MnzBgIy96oUCGeVqYoQnnS5MXGkhKC3WihJIaaLzLxRA6AeZr/qkql5S+G37jiznaLqe 3sdEIw0tqm8HO1AZ14x0tvX//kk9DLD3Y9K7zRgCved3hyh5w4ZY5kSixxVl2g69ByGY 5Rae+TyALnQkhaNC0hVh8tyLkezpB3lygngH1jylUB3yyjuJbr0Ss/Ys5PpuJazMCODf 1lHA== X-Gm-Message-State: APf1xPAiiGMhVr42IliFhWkdqua8IfCV878lMXIX4Sk32U7JBSlS12DK kpX5eN/WmRANYMhepdty10k= X-Received: by 10.223.148.37 with SMTP id 34mr6751969wrq.136.1518344368058; Sun, 11 Feb 2018 02:19:28 -0800 (PST) Received: from gmail.com (2E8B0CD5.catv.pool.telekom.hu. [46.139.12.213]) by smtp.gmail.com with ESMTPSA id p1sm5862960wra.90.2018.02.11.02.19.26 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Sun, 11 Feb 2018 02:19:27 -0800 (PST) Date: Sun, 11 Feb 2018 11:19:24 +0100 From: Ingo Molnar To: David Woodhouse Cc: tglx@linutronix.de, karahmed@amazon.de, sironi@amazon.de, x86@kernel.org, kvm@vger.kernel.org, torvalds@linux-foundation.org, pbonzini@redhat.com, linux-kernel@vger.kernel.org, bp@alien8.de, peterz@infradead.org, jmattson@google.com, rkrcmar@redhat.com, arjan.van.de.ven@intel.com, dave.hansen@intel.com Subject: Re: [PATCH v2 5/6] KVM/nVMX: Set the CPU_BASED_USE_MSR_BITMAPS if we have a valid L02 MSR bitmap Message-ID: <20180211101924.vztfslwqoh7km6q2@gmail.com> References: <1518305967-31356-1-git-send-email-dwmw@amazon.co.uk> <1518305967-31356-6-git-send-email-dwmw@amazon.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1518305967-31356-6-git-send-email-dwmw@amazon.co.uk> User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * David Woodhouse wrote: > From: KarimAllah Ahmed > > We either clear the CPU_BASED_USE_MSR_BITMAPS and end up intercepting all > MSR accesses or create a valid L02 MSR bitmap and use that. This decision > has to be made every time we evaluate whether we are going to generate the > L02 MSR bitmap. > > Before commit 086e7d4118cc ("KVM: VMX: Allow direct access to MSR_IA32_SPEC_CTRL") > this was probably OK since the decision was always identical. This is no > longer the case now since the MSR bitmap might actually change once we > decide to not intercept SPEC_CTRL and PRED_CMD. Note, I fixed the changelog to refer to the correct upstream SHA1, which is: d28b387fb74d: KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL Thanks, Ingo