Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2272573ybk; Mon, 11 May 2020 16:53:57 -0700 (PDT) X-Google-Smtp-Source: APiQypKujSKyKETfyYip0gvOnTHCjgfhvDV11MdDpJvZKt4uH+7uXQI+XcGuXnxFXLd1nJ0Nvq+x X-Received: by 2002:a05:6402:1215:: with SMTP id c21mr16267447edw.128.1589241237502; Mon, 11 May 2020 16:53:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589241237; cv=none; d=google.com; s=arc-20160816; b=fcPuXLa7ao9DUnECGprmdPNNtuhdToV9k4YK6YuGcHwGmupOgZ0+m2/XnVf8D8xb28 ZZQTkhnlX45XKmpqBEvQj/77PzKD7Arslr2fDDiAOCE/lTqbGRh4nFyoIKka2O8w7S4E faSfzd1jL/y4r/4RDst+dNS/xWGzRMUQY/pcAlZPoFVUkRK2O2vmDegf12ZReE3zBSa2 7NRoWeD43/xiqhabIMinf4fG6FGtT40q0nbLKprbbqNiwKqL/rVLZ9VkO+Oq6I7XPEob 96W7njTot95p7ggo9e7ApyWbkTprQRQwmdBzOJpq3c8kWs1wOXZXqRxefMunG69R8wpo D10A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=E0ufWGYomYJh/CRjPmWsKjyHaGblzMVR+WH0oCRkU7E=; b=gtb8ugj3fXslJoXCJb80V6FI21kJWYGbf/Xy8iXFBZ6CvyKxkVWCoX2Quu+oFYI2qk M8Dm/6gC1EQHD0oCMREIwspqPT2U7AwI116MJU1byWNtob+TdotlRQeNrePFWhZ/GVb+ i8mnGCVjLOIaP1JUuj8GsTZSFSJwRgl/Y2TO5s/vgLVTEZ/y5bvbZgMjhTJZoJNdT4vB TsAXDbfP5Gr0O9jca/8M1ob8ySyUdR+wcy2vBEIrMuoN5u/aiHYM17Haf+MIzRQPPfzc iaCyy0rGwaBnQb24y+bbHvGaI611hd1iHdjzmnx/e85hlc/ctgjVvDdngeIclVPqxd92 GSSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="f/iY0vx2"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z6si6601456ejw.468.2020.05.11.16.53.34; Mon, 11 May 2020 16:53:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="f/iY0vx2"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727942AbgEKXwH (ORCPT + 99 others); Mon, 11 May 2020 19:52:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42652 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1725854AbgEKXwH (ORCPT ); Mon, 11 May 2020 19:52:07 -0400 Received: from mail-io1-xd42.google.com (mail-io1-xd42.google.com [IPv6:2607:f8b0:4864:20::d42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0DC22C061A0E for ; Mon, 11 May 2020 16:52:07 -0700 (PDT) Received: by mail-io1-xd42.google.com with SMTP id d7so11931827ioq.5 for ; Mon, 11 May 2020 16:52:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=E0ufWGYomYJh/CRjPmWsKjyHaGblzMVR+WH0oCRkU7E=; b=f/iY0vx2TUE477Mbf6Hol0ZEB/geLQUWTBNLPH99rC4gbt8DEL0wyNqLPFi7DoGFZr 7ilzXRx1RjxnU4M6u/agvEQzIfHZW6rcOaLec7iRZfgdIs5es+hT/nY8/8XCkUuiSJCX 1/Xo/s8W0u9nQcPmXTW+yClHZJpEfzP09WjThC38iJaPtMInIRKGDIW64VPwup1usYnG AKTAxx1ZlgIGoPscs5F0u5camKL1ghBq3FWoUTRWNGwRUydM7qXX5aa3q2mQfCE2lQvm QvM7wHQRSeTAI/OwdDkvYruA7jQMIm50ltwqi7LpJEkvov6e9xGs54dTSluoov5M6i7F Kggg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=E0ufWGYomYJh/CRjPmWsKjyHaGblzMVR+WH0oCRkU7E=; b=jOuUNkuA7ipd+OIrbmhuFLT2ofNWwXJT0bKkzjk8vVj4KPMkyJ3zAfXcONBaQGBaUu /6lb84MICqJIRfGnNy5Eth+PcjvAyT1w19evgJKLCXnhvk2AeTqrQ/1Qr333X5oxFbQt kKeBKUyNlv6W2icW9tEsQqq9xLdrCsbXXOkm00YwgcJ5jouCB6pVRX4SAO7AeB2g7T8P UfTZBA+db50lzwyT+iFkcnft6RSpyl2FdWOh9K1uYK5/pNLNivt3Mz91kyPMU05WYbP9 lu7SDFengGiaxN7jCNGUlkZ9S8hTTDBQ4Mb8wkm/DiqnsHA7D9JmL07vVf9eCmkDG3ER UnSg== X-Gm-Message-State: AGi0PuYyGzXAPJ2SAZosmqANxqF8XXPm8VwZBDoeMnSZYinVy1n6uIJa V5HWfP/mXffvrfptQnDHDbDcY+8+6i+MyWXw6jA0tQ== X-Received: by 2002:a02:a60f:: with SMTP id c15mr7562634jam.24.1589241125957; Mon, 11 May 2020 16:52:05 -0700 (PDT) MIME-Version: 1.0 References: <158923982830.20128.14580309786525588408.stgit@naples-babu.amd.com> <158923999440.20128.4859351750654993810.stgit@naples-babu.amd.com> In-Reply-To: <158923999440.20128.4859351750654993810.stgit@naples-babu.amd.com> From: Jim Mattson Date: Mon, 11 May 2020 16:51:54 -0700 Message-ID: Subject: Re: [PATCH v3 3/3] KVM: x86: Move MPK feature detection to common code To: Babu Moger Cc: Jonathan Corbet , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Paolo Bonzini , Sean Christopherson , "the arch/x86 maintainers" , Vitaly Kuznetsov , Wanpeng Li , Joerg Roedel , Dave Hansen , Andy Lutomirski , Peter Zijlstra , mchehab+samsung@kernel.org, changbin.du@intel.com, Nadav Amit , Sebastian Andrzej Siewior , yang.shi@linux.alibaba.com, Anthony Steinhauser , anshuman.khandual@arm.com, Jan Kiszka , Andrew Morton , steven.price@arm.com, rppt@linux.vnet.ibm.com, peterx@redhat.com, Dan Williams , Arjun Roy , logang@deltatee.com, Thomas Hellstrom , Andrea Arcangeli , justin.he@arm.com, robin.murphy@arm.com, ira.weiny@intel.com, Kees Cook , Juergen Gross , Andrew Cooper , pawan.kumar.gupta@linux.intel.com, "Yu, Fenghua" , vineela.tummalapalli@intel.com, yamada.masahiro@socionext.com, sam@ravnborg.org, acme@redhat.com, linux-doc@vger.kernel.org, LKML , kvm list Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 11, 2020 at 4:33 PM Babu Moger wrote: > > Both Intel and AMD support (MPK) Memory Protection Key feature. > Move the feature detection from VMX to the common code. It should > work for both the platforms now. > > Signed-off-by: Babu Moger > --- > arch/x86/kvm/cpuid.c | 4 +++- > arch/x86/kvm/vmx/vmx.c | 4 ---- > 2 files changed, 3 insertions(+), 5 deletions(-) > > diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c > index 901cd1fdecd9..3da7d6ea7574 100644 > --- a/arch/x86/kvm/cpuid.c > +++ b/arch/x86/kvm/cpuid.c > @@ -278,6 +278,8 @@ void kvm_set_cpu_caps(void) > #ifdef CONFIG_X86_64 > unsigned int f_gbpages = F(GBPAGES); > unsigned int f_lm = F(LM); > + /* PKU is not yet implemented for shadow paging. */ > + unsigned int f_pku = tdp_enabled ? F(PKU) : 0; I think we still want to require that OSPKE be set on the host before exposing PKU to the guest.