Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1663169ybp; Wed, 9 Oct 2019 18:29:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqxbOSr0I53ANG0+RyKGmO6a0zXgI8R+zPX96oQpI8TbBRmvca5wyTmxmXgsIU91misSV78c X-Received: by 2002:aa7:d3d3:: with SMTP id o19mr5579712edr.230.1570670955578; Wed, 09 Oct 2019 18:29:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570670955; cv=none; d=google.com; s=arc-20160816; b=Dd3XiuMBJhN1260h23Kf862osPmKMdKYufX/j23PrDBpVklacb9+pBFrdVxsuC+WaI XH5KEmKC0EbWvp7d9x5ou3pQ1v79rZSyCXWR8Wq/ubBb+vML1XiX/BtfGefcDQGRox8u kfNIVJesoPQn+Sfg+eRRjgFGo43WiUz+3M09+GzHy0cJNbfuBzyJ2/GpUUzwrnDJkrrZ VPuYKpWjnxhRUV8LwkeN8KA+CgFKauKnXqgW5rQkH4gTWLFDjmxD6gCkUugIzEwKjUEk Hdtquz1yPA7ZUVSFs5nNOS55GRJww5JAvomo7k8frFOSuWJ0I3RuurlaagFslsVgRn1/ +0vA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=tMyfyg2etpCWTLSTu5lYQsqpTolC5VbuqxNeDmgiu3M=; b=futaBy61RzzFA5/TuYwKO1LwjDwxzw7OHBMbkjIMQRbbmiQEts8PjxAiPgH6CYIhao wYbhQRhphNWJPfG4/cGpXYfxWrnmds6U0BuRkDAAGEZYapZmrP4fjMkctod0tzqduFX1 eaWa2g5UF0Yq3z6ZBj4GmcbJmWid5BI3aeanfOCMjdmkFgjtvxnI3jVzKexEy6AyLJq/ dLoKvFKt7FpvuYJfBS8T6MdEGzQRxkjjEzLuadOmkNRlfGOdTt9kt0+fNdZRpiPTS78a yv7bKr95cvdlg9fIcmzUCdif3FTv9Mbq/v6uOVRNclhjewWkx7FasoM6Dn0PiryCLwds NGhg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f21si2225054ejc.159.2019.10.09.18.28.52; Wed, 09 Oct 2019 18:29:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732545AbfJJB2j (ORCPT + 99 others); Wed, 9 Oct 2019 21:28:39 -0400 Received: from mga17.intel.com ([192.55.52.151]:10466 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731553AbfJJB2j (ORCPT ); Wed, 9 Oct 2019 21:28:39 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga107.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 09 Oct 2019 18:28:33 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.67,278,1566889200"; d="scan'208";a="205932962" Received: from local-michael-cet-test.sh.intel.com (HELO localhost) ([10.239.159.128]) by orsmga002.jf.intel.com with ESMTP; 09 Oct 2019 18:28:31 -0700 Date: Thu, 10 Oct 2019 09:30:27 +0800 From: Yang Weijiang To: Jim Mattson Cc: Yang Weijiang , kvm list , LKML , Paolo Bonzini , Sean Christopherson , "Michael S. Tsirkin" , Radim =?utf-8?B?S3LEjW3DocWZ?= Subject: Re: [PATCH v7 4/7] KVM: VMX: Load Guest CET via VMCS when CET is enabled in Guest Message-ID: <20191010013027.GA1196@local-michael-cet-test.sh.intel.com> References: <20190927021927.23057-1-weijiang.yang@intel.com> <20190927021927.23057-5-weijiang.yang@intel.com> <20191009064339.GC27851@local-michael-cet-test> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 09, 2019 at 04:08:50PM -0700, Jim Mattson wrote: > On Tue, Oct 8, 2019 at 11:41 PM Yang Weijiang wrote: > > > > On Wed, Oct 02, 2019 at 11:54:26AM -0700, Jim Mattson wrote: > > > On Thu, Sep 26, 2019 at 7:17 PM Yang Weijiang wrote: > > > > + if (cet_on) > > > > + vmcs_set_bits(VM_ENTRY_CONTROLS, > > > > + VM_ENTRY_LOAD_GUEST_CET_STATE); > > > > > > Have we ensured that this VM-entry control is supported on the platform? > > > > > If all the checks pass, is it enought to ensure the control bit supported? > > I don't think so. The only way to check to see if a VM-entry control > is supported is to check the relevant VMX capability MSR. > It's a bit odd, there's no relevant CET bit in VMX cap. MSR, so I have to check like this. > BTW, what about the corresponding VM-exit control? The kernel supervisor mode CET is not implemented yet, so I don't load host CET states on VM-exit, in future, I'll add it.