Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp1201179pxb; Sun, 11 Apr 2021 10:50:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzO30II9Tm2utVA5JMUaRU+tc/BvXHf/u5TdaXBnRd2BkxT9sPoJPMMdF9K8qMAAKcIvpM0 X-Received: by 2002:a17:90a:bf06:: with SMTP id c6mr21579579pjs.186.1618163411971; Sun, 11 Apr 2021 10:50:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618163411; cv=none; d=google.com; s=arc-20160816; b=WgiHD9iq+YPQjpjD9XQGlkD5LJH8GWs2dsJxiagrtLoI0X/k9aT6PZCT5luLbevp+b QJY3PJ+1I5bSjtUhxPJSvN9Q2KVuEVSehMPtGsNLDFHBcqKgysOiRPktKOYeLGx9jnGg xNZDC4+1JouEtPvDGr1FygKouicud4cSQ7V9IbsUypb0jEabvhxEFOJ0IyHBhUGDPUEH NMLWiXpnZWnSPSaJwkQ6HrkxpY1P5TVlkm7Ta6538rYUDas6TYbrynM0Ppvh87fXt8W2 h9tsgCKRaPAxxjaj31m+KPCIhz5+7E2n7r9sVaujTMh1Vfx0TVjAf3f2t/ay3Gl5r25l +UcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:ironport-sdr :ironport-sdr; bh=wwcBiE3vNPgBB6+0THKR48O/6PEuxsbUPQfM5rxRB6A=; b=WWHEOSsNLTjSBV1/TGupn4zoMAGUceHIl+xjWn/ckkQ4123FPPds4F2B/gNgOiF+V6 4iALS1kKO/2KYEMpM5GXWyRtC/evhtWjKGZtr0DYQmUFTtM0oBX7nzOjd66sXIZnfzqW XHCIsKaq4rud7MvU4YMf/8j2gPUHwIGtGE5tsU2XsbhqVIBeXHl3gVavNVZ5ianKTAzz jxtRIP7ZjeNxH0ogERzgyPDdFUMsgnklAFnxzJrapFXJiGxLCXnUv3cmmfUOe+5qFTQn 6/ruK0n+ouY865INllYaWs+yEII+daQaHcNTa2Fas4OCcMVb0CHPShj/RoGISy/dOmu4 DJAw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b11si10644327plg.355.2021.04.11.10.49.59; Sun, 11 Apr 2021 10:50:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236463AbhDKQoA (ORCPT + 99 others); Sun, 11 Apr 2021 12:44:00 -0400 Received: from mga14.intel.com ([192.55.52.115]:26541 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235855AbhDKQoA (ORCPT ); Sun, 11 Apr 2021 12:44:00 -0400 IronPort-SDR: GQZBYxe8kw4jab8Wa0kZWqtE35KauO5urs8siariG0/I68VhQcu2NKplrf/bqOHmbDI/dylCyT cDbxPVk+gwHg== X-IronPort-AV: E=McAfee;i="6000,8403,9951"; a="193610106" X-IronPort-AV: E=Sophos;i="5.82,214,1613462400"; d="scan'208";a="193610106" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Apr 2021 09:43:43 -0700 IronPort-SDR: AGMDNKepf+6A8aWmg8Ikwx/5s9oC0SNzqjbvgKhJ46oqblcjLGpu5Kt1XO0BgDVssdHFAL3a6P tng+GVzZsoCQ== X-IronPort-AV: E=Sophos;i="5.82,214,1613462400"; d="scan'208";a="417042057" Received: from tassilo.jf.intel.com ([10.54.74.11]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Apr 2021 09:43:43 -0700 Date: Sun, 11 Apr 2021 09:43:42 -0700 From: Andi Kleen To: Andy Lutomirski Cc: Borislav Petkov , Thomas Gleixner , Feng Tang , Ingo Molnar , "H . Peter Anvin" , Peter Zijlstra , X86 ML , LKML , "Zhang, Rui" , "Kleen, Andi" , Dave Hansen , Len Brown Subject: Re: [PATCH] x86/msr: Block writes to certain MSRs unconditionally Message-ID: <20210411164342.GL3762101@tassilo.jf.intel.com> References: <1617092747-15769-1-git-send-email-feng.tang@intel.com> <87y2dq32xc.ffs@nanos.tec.linutronix.de> <20210410094752.GB21691@zn.tnic> <20210410121144.GC21691@zn.tnic> <87r1jiug4e.fsf@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > I have actually seen real user programs poke MSR_SYSCALL_MASK. Hmm, what was the use case? -Andi