Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp2006358ybt; Thu, 2 Jul 2020 21:05:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx7zYcYV7jQq71o4zkFmCZhAcPCF/Ab3+4w3vNliaq2bXx4C/xbh4/KeqEq+pGyIODenxCi X-Received: by 2002:a17:906:7d86:: with SMTP id v6mr29735096ejo.542.1593749149877; Thu, 02 Jul 2020 21:05:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593749149; cv=none; d=google.com; s=arc-20160816; b=qpFihCzRYkKCa0jOXFuxD+89mGlnQEmeY5lJbl5B72jvOmD0Y7ptBptRmsy0zlb0D2 MPYYz4n8lqoiAMdByetx2hbFySSjmjZprJkWqHGtDpOl2k4fUBHXQzpZDymkSEcDHOQ6 zmxi56FZ+1fD8W9mu4sqCyU2nOAQIhEtglKS2vjHNkAzMZm1JhtgSjPLLB0Aj5wle0VS 136DsfxgvvY7kEfYaIQMWmHVw8gbL5STceyxFZVjYd7Hnh70x25IwuDMOxIyxQqivem6 qs++9PSlSxGrTVxXpgTNXOQfq0NtsUbM67HFowSd72VShkJsttbmfun7qDtiSQGzRJVq hgXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=2XWPqq/gZurJEtCwY18W8J1Xo/THD6S/3Q82EoJaWxs=; b=gXE9MmthukKKNxy+lpScQ0fFb2Kdj6oMCsz7zW8wkJ5ykrZYNogTPFuDm1NvujkcLU iFgV2BkIQwT6hNLqLz1Oeib9IIhihZVbFVLc7TY0Vdl3bwMscd9qPjntnol7vnJmw8uu bYRPeVTC4I8XVXnw9Hr+Ogb+PbRt4XXJCQ5orh1jF9xSYHFWisjN/JvJ1YTzV9GfKMsV N1a+hF0zdRU8VlXSfIIC7tentQlT1s6ySZ5yM07U/Kf6zVQC9SlhMazyjTDIiE2TcKcY pv6UXPd3S7VPOE6PCxbXXmGNOq5Olb7KAy0zqnjTkipkjMwNkToDnS2l/oNqm98NOm29 PnFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o26si7318155edq.32.2020.07.02.21.05.27; Thu, 02 Jul 2020 21:05:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726108AbgGCEEY (ORCPT + 99 others); Fri, 3 Jul 2020 00:04:24 -0400 Received: from mga06.intel.com ([134.134.136.31]:9178 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725949AbgGCEEY (ORCPT ); Fri, 3 Jul 2020 00:04:24 -0400 IronPort-SDR: T0PMF1y7rpgIPB8g5nCfQQhdUGvPovYA8IFm4OjJcqbZISUENd8Zf2lypln2etoSyTDAJgUjs9 HaOXllDbLKmw== X-IronPort-AV: E=McAfee;i="6000,8403,9670"; a="208604063" X-IronPort-AV: E=Sophos;i="5.75,306,1589266800"; d="scan'208";a="208604063" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Jul 2020 21:04:23 -0700 IronPort-SDR: fnx8n/5dfBVrfbLT24PWc42gDpm6Xk9Uw46kztNqKbJ6gFnmskAg2zxmCEqSASO0pUJAv/fmSi Wbsn0b/sJxpQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,306,1589266800"; d="scan'208";a="387520208" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.152]) by fmsmga001.fm.intel.com with ESMTP; 02 Jul 2020 21:04:22 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 0/2] KVM: VMX: CR0/CR4 guest/host masks cleanup Date: Thu, 2 Jul 2020 21:04:20 -0700 Message-Id: <20200703040422.31536-1-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.26.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix a bug where CR4.TSD isn't correctly marked as being possibly owned by the guest in the common x86 macro, then clean up the mess that made the bug possible by throwing away VMX's mix of duplicate code and open coded tweaks. The lack of a define for the guest-owned CR0 bit has bugged me for a long time, but adding another define always seemed ridiculous. Sean Christopherson (2): KVM: x86: Mark CR4.TSD as being possibly owned by the guest KVM: VMX: Use KVM_POSSIBLE_CR*_GUEST_BITS to initialize guest/host masks arch/x86/kvm/kvm_cache_regs.h | 2 +- arch/x86/kvm/vmx/nested.c | 4 ++-- arch/x86/kvm/vmx/vmx.c | 13 +++++-------- 3 files changed, 8 insertions(+), 11 deletions(-) -- 2.26.0