Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp7143935ybl; Wed, 15 Jan 2020 16:28:55 -0800 (PST) X-Google-Smtp-Source: APXvYqzks/hLR/iYZQydw7ykfVUFOz88voEqJEh6RRBVJCoqkNRaKpYaSCC2c2CgCn/BzCty57rF X-Received: by 2002:a54:4085:: with SMTP id i5mr2155655oii.17.1579134535048; Wed, 15 Jan 2020 16:28:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579134535; cv=none; d=google.com; s=arc-20160816; b=GzyirOrZKOi7VlwL5OuNh26GUve1pBBuhOpZUuwylyPY+6kbBwQxCcPc6TRwIjTC/h JlQ1IezOV77jtAKLLjOlpqyLdRuTiC0/rb+hvMtJ7KLcljULsrqYGegK5F174UWk+oDO 53s0bi7zBtjb7AY2zgmNobtQF4PK4lPuafUzGorRURYSisstDCfI0OiXDlVAAfT2mGtX 9Wvbu4Jywf5fQkC5nsNttdmsSbdC6V5ll/SfOj7TvCDzf4WEf9NTVVRmGbKta+m9Iqlf 5qb49XuqJh86eD71Zlb/4+2WQwzSzzDoByQRTMFpTLiWbEB9dYv2Jbt6wFbuH/rRQBea UmJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=g2WEJKpjMG7tkA0fjuX42/NYCbfIXaMs0bV49rzjfjc=; b=k7NjNMgRtoUIXvFQAsiCzsQIS8rcJkdeWK0yrBrqP1eYfG1Z3/zfwFRCfyiCcT5XeM 99YOaDSHfsWhLRHuanhSvq6LGJKJOZmlQe4Kg5iAdL8KEVAE7Ri+lXzXxGDYnughC2yj lwBo3MyeXo2VIE76S8npnC17iB+r5wdg8UN0Kpzy6G5EnQypWkm37JISQL5igZVedUaY hiTHEcvny/JWQofyBQYM8YdXc2MwMtFL8OXydlP5QlIZKzdHipdA84ICAzFyyFXXuRpA t5T6Sr47ZcwNLT0qku/RvG2OCX6F4PbErTnjYNP/xQbnBk8ZoXmG6R3mVJLgWuorg6zi 8GhA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w5si12209517otq.238.2020.01.15.16.28.42; Wed, 15 Jan 2020 16:28:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731076AbgAOX1k (ORCPT + 99 others); Wed, 15 Jan 2020 18:27:40 -0500 Received: from mga07.intel.com ([134.134.136.100]:6617 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726513AbgAOX1j (ORCPT ); Wed, 15 Jan 2020 18:27:39 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 15 Jan 2020 15:27:39 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,323,1574150400"; d="scan'208";a="225762705" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.202]) by orsmga003.jf.intel.com with ESMTP; 15 Jan 2020 15:27:39 -0800 Date: Wed, 15 Jan 2020 15:27:38 -0800 From: Sean Christopherson To: Vitaly Kuznetsov Cc: kvm@vger.kernel.org, Paolo Bonzini , Jim Mattson , linux-kernel@vger.kernel.org, Liran Alon , Roman Kagan Subject: Re: [PATCH RFC 2/3] x86/kvm/hyper-v: move VMX controls sanitization out of nested_enable_evmcs() Message-ID: <20200115232738.GB18268@linux.intel.com> References: <20200115171014.56405-1-vkuznets@redhat.com> <20200115171014.56405-3-vkuznets@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200115171014.56405-3-vkuznets@redhat.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 15, 2020 at 06:10:13PM +0100, Vitaly Kuznetsov wrote: > With fine grained VMX feature enablement QEMU>=4.2 tries to do KVM_SET_MSRS > with default (matching CPU model) values and in case eVMCS is also enabled, > fails. As in, Qemu is blindly throwing values at KVM and complains on failure? That seems like a Qemu bug, especially since Qemu needs to explicitly do KVM_CAP_HYPERV_ENLIGHTENED_VMCS to enable eVMCS.