Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp1289816ybg; Fri, 18 Oct 2019 15:17:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqx3YMAVcziMOBjw+H+CfCcJd3qqdzh6R3IoaS1d+xtmPkioAGA5n+Yc4dcR6cvUZTeQuULp X-Received: by 2002:a17:906:6d82:: with SMTP id h2mr10920571ejt.127.1571437073375; Fri, 18 Oct 2019 15:17:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571437073; cv=none; d=google.com; s=arc-20160816; b=ykOTLwjIA/gEZgOwKANnRu4B2PJLwAFCqZNeBNAfsmr6ZWAPx/1y9yhzd3kSmLw/wL BF5qXSmkq9gF+eGHGSfM1YtrgC5AUQ6mx7t2154TF4KLkDam+enb01chk71iJhbibPcO GCDiSt79ZW7RXWipFY33GnIfoiwIQq/e0loPQAtk4esThkVxZ6DLcolAirl4BOa/Ec+6 ina1TLfd7yhAZyAi9ts1ucnTEx9HEz0m1tRgzeUZioBbg2poR2p6ie16gBXJ/K9fkyQS efOVW4C73padAj+Hb1UgSRSqeSrfrN8KdXgjwo4FnG+y7ndF9G5wFjuzvdAxyqMFud7x Bflw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=DG/owyvzzaghIMw3pMpQZDBkhdFVPW+ma4yMUdbvhmY=; b=fiw9JAN8cq7nDD4IW2HSmCGLB82XAL1K1RCiGHO1Ow+L1cLZhSAuwhWKk+Eq+yV6SY MoqwnueNQVSMGHbKrbJbjS0+2ntUR5G7z6MPoo/6ZdtU+cz19WuZB2R/nurOYB6mJEjS zFt3t1wk7DVhPqEAd9uGgrM8jR6qCEMTtrofJ1EEG0V9ANx4sOfuakzM7N1VT4N+l2Y/ mowEmZf/Fq3PBbMgpLZsKGK2zyh0H1U1RyC5jcMnzb0NCoTLKKmmt4BnjqNlBMytsmfx ++BFjEKByShHnnR35C2Aoa+sF+OmALmGqZgWSgQHVa8Gta/5DTb2wUPRGr2kGrbXOvga kyvw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g50si5012675edb.47.2019.10.18.15.17.30; Fri, 18 Oct 2019 15:17:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2394467AbfJQT6N (ORCPT + 99 others); Thu, 17 Oct 2019 15:58:13 -0400 Received: from mga02.intel.com ([134.134.136.20]:34082 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727383AbfJQT6N (ORCPT ); Thu, 17 Oct 2019 15:58:13 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Oct 2019 12:58:12 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.67,308,1566889200"; d="scan'208";a="202488054" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.41]) by FMSMGA003.fm.intel.com with ESMTP; 17 Oct 2019 12:58:11 -0700 Date: Thu, 17 Oct 2019 12:58:11 -0700 From: Sean Christopherson To: Jim Mattson Cc: Yang Weijiang , kvm list , LKML , Paolo Bonzini , "Michael S. Tsirkin" , Radim =?utf-8?B?S3LEjW3DocWZ?= Subject: Re: [PATCH v7 7/7] KVM: x86: Add user-space access interface for CET MSRs Message-ID: <20191017195811.GK20903@linux.intel.com> References: <20190927021927.23057-1-weijiang.yang@intel.com> <20190927021927.23057-8-weijiang.yang@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 02, 2019 at 01:57:50PM -0700, Jim Mattson wrote: > On Thu, Sep 26, 2019 at 7:17 PM Yang Weijiang wrote: > > > > There're two different places storing Guest CET states, the states > > managed with XSAVES/XRSTORS, as restored/saved > > in previous patch, can be read/write directly from/to the MSRs. > > For those stored in VMCS fields, they're access via vmcs_read/ > > vmcs_write. > > > > Signed-off-by: Yang Weijiang > > --- > > arch/x86/kvm/vmx/vmx.c | 83 ++++++++++++++++++++++++++++++++++++++++++ > > 1 file changed, 83 insertions(+) > > > > diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c > > index 44913e4ab558..5265db7cd2af 100644 > > --- a/arch/x86/kvm/vmx/vmx.c > > +++ b/arch/x86/kvm/vmx/vmx.c > > @@ -1671,6 +1671,49 @@ static int vmx_get_msr_feature(struct kvm_msr_entry *msr) > > return 0; > > } > > > > +static int check_cet_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) > > I'd suggest changing return type to bool, since you are essentially > returning true or false. I'd also be more explicit in the name, e.g. is_valid_cet_msr().