Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp6641747ybl; Mon, 23 Dec 2019 09:10:40 -0800 (PST) X-Google-Smtp-Source: APXvYqwwEj5VW65qnCOmkcGm7aiue2N6DW3mu798ZnwIJLWJQMgyW3PF+6dw0Dqt9NqH72QOS4SA X-Received: by 2002:aca:c646:: with SMTP id w67mr3350oif.171.1577121039955; Mon, 23 Dec 2019 09:10:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577121039; cv=none; d=google.com; s=arc-20160816; b=ku5Z1t4XpaVjaqYM0gr7uZeBaO19urislw/STOL0O3wwKy0tm3jqgGGQJD6KsWLIX1 y8fjpN/x7GBR5NxQCKVlhEW9BvcSx+ffZrjua8BKRtG8p/bM/FWcbcAry96nCSrSDjag IpVF/G2fD1XtVCZwFsnA8X34OuCafxOWSh/odIzy0EFZdqKnO3NRfUY8/tD48J8l8evV 38BW3Hdb8IhpiPboPKw8zqOVmwXqDty8DTlTWZI6anFjKIfnsHoreeFOLyn/jIbA/eia zuQ4vsS3D2ccUI0ClPSoMcKz8Wl3boyCy9GQZy0F8C7ea8XEpqMK2zs7J3IXCM4bxozB JDtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=EdGWVlIuDUVd73iaM6l6M5W4eKbIMhKZ4IFEX++PL4k=; b=hYbgExIy/B3Wgfcg8ATp6r6RzkLME9wC3TDlc3T1n7cWyaes6yo1wLnZie6ZIGvUHf APhjrC4zPqEpBNdVGnUtrz06YwkcNHdrLZ95eTc8IR2jewNEBYGbq/iNXrLEFuFH9tfi ujmL7sytta7YOv+FlLV3bE5DNNVMtrsi+MwBW7Uitjm9X+zgyk262w1W3FKQ0QLf12yJ yM3I72loKqv7xkIOfleHrleWTimpK+PYInrKA6/2pmuvIFq9uQXsHLNnhP2b3e3GP2C5 XBN1MSxi63pkXmH5sF3HMto9z0viQsOMapCt/q+fpbTLnLoRA2DpFiA1YLcBmlDrWADL 6glQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PCmUkhYf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 5si784511oil.188.2019.12.23.09.10.27; Mon, 23 Dec 2019 09:10:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PCmUkhYf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726821AbfLWRJ3 (ORCPT + 99 others); Mon, 23 Dec 2019 12:09:29 -0500 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:48161 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726718AbfLWRJ3 (ORCPT ); Mon, 23 Dec 2019 12:09:29 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1577120967; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=EdGWVlIuDUVd73iaM6l6M5W4eKbIMhKZ4IFEX++PL4k=; b=PCmUkhYfq8P4P4nIIYZjUt+dvmvFeJdVq6QL6NLIOQB5KVI9YB7p/l0+iw1s4hSL9rcgOR 42n5jCh84Spbqd0i/7UANz00RWtHUxyDNtkg8HB93SrS1tbeANxFOwMo+GBTaWWVZVsaAP JJwWGV95wtpPa3LetGw/nnD/L807soc= Received: from mail-wr1-f71.google.com (mail-wr1-f71.google.com [209.85.221.71]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-337-Mr-KwgBDMiKudJaWd8o_Xg-1; Mon, 23 Dec 2019 12:09:26 -0500 X-MC-Unique: Mr-KwgBDMiKudJaWd8o_Xg-1 Received: by mail-wr1-f71.google.com with SMTP id k18so7216965wrw.9 for ; Mon, 23 Dec 2019 09:09:26 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=EdGWVlIuDUVd73iaM6l6M5W4eKbIMhKZ4IFEX++PL4k=; b=lqWwofJYBgIRIY3uiC8nxxgrf10FDjzvfIcCkZdWQU2M1bsQMG88wJFeb4J3rli0+d W44tb4t70K1mzwuel3lfb0H20HRt0erk4/AuNZ6ZoTNvdU2/I2ucMrjsIb0JYDnXXKzE IyqZ1uHQ1Q3fOHH6K/ngGmHnUvbGu8KcSbGieCRTjkB+FUW2V0g/FcvzORupZlJO7bjA fv138l7iycCrEDwRBftbPJNwSpfBiDJVJTfL4Y3vPUfq+8k7LvTMG3SEti/CxiqI4mxd pC4cPxwtfuqqtgryyvan6DWMw6XMcSIuQOJCP6nQ0V8EgdU5d/MfI+E2VZuJ5cAaA7gc eEng== X-Gm-Message-State: APjAAAXtHrgx8ckcq/j+93oDfbK+rR3k4WrommWHQ6EsriQ20OAXflI5 9Wmr0uCGaLNsg/Bw2MsRMppjHbKb/9oHznTfDcOmPwIq/mEUXGaIXFQcsFlCbdxUelf19cj75iw ZOq28oZuNQp6HRtjzILWjP2I8 X-Received: by 2002:adf:e6d2:: with SMTP id y18mr32226457wrm.262.1577120965617; Mon, 23 Dec 2019 09:09:25 -0800 (PST) X-Received: by 2002:adf:e6d2:: with SMTP id y18mr32226438wrm.262.1577120965441; Mon, 23 Dec 2019 09:09:25 -0800 (PST) Received: from ?IPv6:2001:b07:6468:f312:ac09:bce1:1c26:264c? ([2001:b07:6468:f312:ac09:bce1:1c26:264c]) by smtp.gmail.com with ESMTPSA id p18sm52547wmg.4.2019.12.23.09.09.23 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 23 Dec 2019 09:09:24 -0800 (PST) Subject: Re: [RESEND RFC 0/2] Paravirtualized Control Register pinning To: Liran Alon , John Andersen Cc: tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, x86@kernel.org, hpa@zytor.com, sean.j.christopherson@intel.com, vkuznets@redhat.com, wanpengli@tencent.com, jmattson@google.com, joro@8bytes.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org References: <20191220192701.23415-1-john.s.andersen@intel.com> <1EBCD42E-9109-47A1-B959-6363A509D48D@oracle.com> From: Paolo Bonzini Message-ID: <15b57d6b-0f46-01f5-1f75-b9b55db0611a@redhat.com> Date: Mon, 23 Dec 2019 18:09:30 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1 MIME-Version: 1.0 In-Reply-To: <1EBCD42E-9109-47A1-B959-6363A509D48D@oracle.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 23/12/19 15:48, Liran Alon wrote: >> Should userspace expose the CR pining CPUID feature bit, it must zero CR >> pinned MSRs on reboot. If it does not, it runs the risk of having the >> guest enable pinning and subsequently cause general protection faults on >> next boot due to early boot code setting control registers to values >> which do not contain the pinned bits. > > Why reset CR pinned MSRs by userspace instead of KVM INIT handling? Most MSRs are not reset by INIT, are they? Paolo