Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp5809334ybl; Tue, 27 Aug 2019 09:56:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqwkIXGgdkdo9XHVTnERU+wkfKFqYzcelEwUYbE/muI5asOxr74s+6MTvZHNLTeGPcU3t5/8 X-Received: by 2002:a17:902:690b:: with SMTP id j11mr13441348plk.35.1566924985985; Tue, 27 Aug 2019 09:56:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566924985; cv=none; d=google.com; s=arc-20160816; b=gernQuIePFBYB+h0FI0yx+5Z2AHhMPWXNj0yypSXZZWmuKZEjd9TakecvALIJ3uPu5 qCaxgPeQ7c/tx8G4AfWsSYEtIr0qzTVB4z1T2hxfhkY7gwMxrjmtd3cakxilj/Nskqaa /gCw4QhHrfRuH7FCmSXHzsAVrp5WrkbP34X2uJcZPXXCKWHyvWL+1soH0+Ps2Ibnytxa ioPumoj55Uf0lB8xHUrI9jDA5DPzihOTUfiD+7cN1DQJy7bXZ85G/oth1gacXG/bcz5L qJae2LFgDyDQmpqMCJSDquWMmhSaIu/7guh54qubjZNw85/NNqwvt4urRWNg2dslbZkp +sGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=BOHjP5tc+yZEVIg0MRWpIDqFx5JGItaQGHN16Joy+r0=; b=X1HO937gJ8m/x+apQUY9cm5TCZ18L+4xgUy6/RIod2TxWrLMjDrBIDHHGW4zQZOUoN ZvE6J482Ei5vp5V5bnmXx8o/KJhUaQpgz2LYBfnkQ4NWmDVn7vwtZ6u4fNNW6eNkb7PS MD5dEf9Ob2AQdLOEPf8nEoWzg/muY5KzYwR4sHq429WiT67RQgXAHxloFoJ7LP8KA4zw Ut1qxyeQPGSbRbFigNwO1oL0+wS8eEVJqKWegG9XiQ30tDpaECNzqWhUG+pOzshRkuuH Q0l40gatSf31zYCiklSvdL0cbw6tSUiNRLJkJZG5VJzydQxzZIEUTw8GANu0pGrZfwcI uD0A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=LImm1Tiu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k3si12764898pgs.223.2019.08.27.09.56.10; Tue, 27 Aug 2019 09:56:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=LImm1Tiu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730394AbfH0Qyy (ORCPT + 99 others); Tue, 27 Aug 2019 12:54:54 -0400 Received: from mail-io1-f67.google.com ([209.85.166.67]:40194 "EHLO mail-io1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730335AbfH0Qyw (ORCPT ); Tue, 27 Aug 2019 12:54:52 -0400 Received: by mail-io1-f67.google.com with SMTP id t6so47934852ios.7 for ; Tue, 27 Aug 2019 09:54:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=BOHjP5tc+yZEVIg0MRWpIDqFx5JGItaQGHN16Joy+r0=; b=LImm1TiukFBu1ne3V7tPK2lDYmzuj4dXh0BahpqBrLhOmjWkDLnm/+5PTe3ynD9tjH 3XO3s77urhRAkPCJvyFYH2S/cMFGJGwZxjg2ayfTkmUG2Rivg5KffODDoQFNRXU80j8t d5cfVGq6PNQlHoymLKxlyBXEg+XYcR3YSqC5V4orbtB0uLss5o3lShya2h7UKi8EhK20 a6Ie04+q1CTmYyMfDZ/9+cduzuB9Jtw56n677JSg5QmeYjrvThjfFgjahv2w/php93wL ROP+Q6EXNx+KrJf+TpmFmxO2HF+ENHmNFMQv0LMoCbbLTeEfuQXe8TVXTWsyVx9fwNkD b6bA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=BOHjP5tc+yZEVIg0MRWpIDqFx5JGItaQGHN16Joy+r0=; b=cwGgEC9KtbynyFDb0sA6XkdrJ2YgBOd36laXcaPklOmFFIMd7C12ak/4RBQF+fGzos 37cuYu9z9rUI7f0YMH2CqdCOShrv0Pq0jzP/wz4Cl07YTzCNIi0tccZehmPqAlFFTxrc kCRSaorW5AFbMn0PiYnvlSmRWRqw6j0z18bi2g5jcRo9Fns8BDd71TcmcY03KMTxe6iU vJwtITJTVwQATZixZcGzR5rWYPMUF+pD1Dl1Yg5sTpEZtXTl7lqsWV8e6AZ1V7DjyOjG rC+2pF3c28Cikp2BIkU6QNGe0WTm0Xhkuzchf0qj+xUx5dS1dHYi2SQ5/kSGG4Fs66Oo LfxA== X-Gm-Message-State: APjAAAVw/1gdvX/pkxRpceeKkM8BRpXYWo8vhJUk8l2XIgzMkotY2QXt 1QQL2UoLbI/UJp266SGsiL8MUdIV4FslvgJyeyMn6w== X-Received: by 2002:a6b:6a15:: with SMTP id x21mr23262943iog.40.1566924890982; Tue, 27 Aug 2019 09:54:50 -0700 (PDT) MIME-Version: 1.0 References: <20190827160404.14098-1-vkuznets@redhat.com> <20190827160404.14098-4-vkuznets@redhat.com> In-Reply-To: <20190827160404.14098-4-vkuznets@redhat.com> From: Jim Mattson Date: Tue, 27 Aug 2019 09:54:39 -0700 Message-ID: Subject: Re: [PATCH 3/3] KVM: x86: announce KVM_CAP_HYPERV_ENLIGHTENED_VMCS support only when it is available To: Vitaly Kuznetsov Cc: kvm list , LKML , Paolo Bonzini , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Joerg Roedel , Sean Christopherson , Roman Kagan Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Aug 27, 2019 at 9:04 AM Vitaly Kuznetsov wrote: > > It was discovered that after commit 65efa61dc0d5 ("selftests: kvm: provide > common function to enable eVMCS") hyperv_cpuid selftest is failing on AMD. > The reason is that the commit changed _vcpu_ioctl() to vcpu_ioctl() in the > test and this one can't fail. > > Instead of fixing the test is seems to make more sense to not announce > KVM_CAP_HYPERV_ENLIGHTENED_VMCS support if it is definitely missing > (on svm and in case kvm_intel.nested=0). > > Signed-off-by: Vitaly Kuznetsov > --- > arch/x86/kvm/x86.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index d1cd0fcff9e7..ef2e8b138300 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -3106,7 +3106,6 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) > case KVM_CAP_HYPERV_EVENTFD: > case KVM_CAP_HYPERV_TLBFLUSH: > case KVM_CAP_HYPERV_SEND_IPI: > - case KVM_CAP_HYPERV_ENLIGHTENED_VMCS: > case KVM_CAP_HYPERV_CPUID: > case KVM_CAP_PCI_SEGMENT: > case KVM_CAP_DEBUGREGS: > @@ -3183,6 +3182,8 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) > r = kvm_x86_ops->get_nested_state ? > kvm_x86_ops->get_nested_state(NULL, NULL, 0) : 0; > break; > + case KVM_CAP_HYPERV_ENLIGHTENED_VMCS: > + r = kvm_x86_ops->nested_enable_evmcs != NULL; You should probably have an explicit break here, in case someone later adds another case below. > default: > break; > } > -- > 2.20.1 >