Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp667216pxv; Thu, 24 Jun 2021 17:20:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy7VFSfss3wO9QtNLTPzTqKQ7vlV7eY0ZwFTimr6RoYW56mB9F/Pzzr6EsdnJAdqkVD7+Gk X-Received: by 2002:aa7:c04e:: with SMTP id k14mr10494800edo.157.1624580412778; Thu, 24 Jun 2021 17:20:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624580412; cv=none; d=google.com; s=arc-20160816; b=v7RoD8z/bSaqJdVuaM7XtqGeemBnvydb6dMogfuSrp8d8QUwkcCT24YupvXdw1femT Qn0WroTCQ+0tfUdLHFkUwfFtWRLbedW7p7Yvi3bwLOpWfZZA0qET2ZYojMddywNcgwri +JrP0ARNR1+Q6UzPQZAifaSLtmD4CrEkZCpa+kwTi13fWk9gE5P20X6Zy5BWygwwXVcK oHOndcITARQyxYPXuebF8P+OU6HIZFbvt+uMXzTX9SplCPLKEckP2+FdVv7+yU3GOJP0 crmPk95/+YI3VnHFAF3m0ITmoUVB4UWNau8ELqKJYjyN6syeuVvISmCccgPOIy1M/pPy R14Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :reply-to:dkim-signature; bh=6fjzUtku/PtRujaCxglb2g16yONAmo5V2De3zOjXjoc=; b=dxsJZMc+crqj6s6GXejn2aCfvcasUw9M/y5kYCMSxzy3+gSnKfRsUK10LpuwyQXJgC 18e1JTMEAjBp1rKOUw9+soGbs3dqRcF3W+qppcGR1yErpU7CeySkQ3yXRCSm9ysZB7DH wbXrwMk975Z11CeUTmsoKKEX1AsxPVYdtA3Pfu81ciN5WeI2peR0vF+chAwG3wsbFqxi qvQmfui1vQTDw9ti1GdViI27JbY/DVQ+HI8heSxpAIrvBitQj658AFY14TajFOm/mCMP 67YobZBx7tITzO9TR85OJp8qyRJqOORaSwDuP8LFBLmJdcEn9jfqFQddXQ37Vw+vpM/2 GMSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=qpcFFW0R; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id df27si4272474edb.247.2021.06.24.17.19.49; Thu, 24 Jun 2021 17:20:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=qpcFFW0R; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232906AbhFYAVT (ORCPT + 99 others); Thu, 24 Jun 2021 20:21:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36714 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229585AbhFYAVT (ORCPT ); Thu, 24 Jun 2021 20:21:19 -0400 Received: from mail-yb1-xb49.google.com (mail-yb1-xb49.google.com [IPv6:2607:f8b0:4864:20::b49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4C2F5C061574 for ; Thu, 24 Jun 2021 17:18:59 -0700 (PDT) Received: by mail-yb1-xb49.google.com with SMTP id x187-20020a25e0c40000b029052a5f0bf9acso1697082ybg.1 for ; Thu, 24 Jun 2021 17:18:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=reply-to:date:message-id:mime-version:subject:from:to:cc; bh=6fjzUtku/PtRujaCxglb2g16yONAmo5V2De3zOjXjoc=; b=qpcFFW0RGwSColAnhc/3Iy3uEck2HZTjVCBNLgz4JdCOAAd/9YXF7I2xAPgKIazivh 4AJPvqK51r9HiW1ZqGa/sHvXsLYOoerJv7r0D33alsqvPpjqtMIJfLgDiTSOa1leGXSy BcjwmikeAthbKD6Mwe9T/XGoPNDeWXWg3jwqFfVpta6+1b0cQpwJsVGAhT5+bk8z+gpt sczX8FKOW044HHSuLV9VdbfjjE8Qw3xVIne4RypNx5bRpbF+2mJUbUWXq1fojtEPOL4l a8B1JTKN4F4bEbkUiByeI+c05DTMgIuI/01b+5vEn/9I24QLogLql9GqAFYaxMll/CcL GcFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:reply-to:date:message-id:mime-version:subject :from:to:cc; bh=6fjzUtku/PtRujaCxglb2g16yONAmo5V2De3zOjXjoc=; b=iNWbEUmpq8swtC5f5jbgAnhePca7TzBrh9XCSCNnsA8AavBEjzByeI+/8UU4FSQNEL YLhf1Au8xm56YBx0LBRp8oXttx+FUSCSXAp0ie5d5dTVkG4AeD9g1tHqS4gb3vCOS+Cg U8IoWCXZGYsshwGcBVVd/3hVr4ivnu+AfKR4tlRQsTnelnOCCkgDsKSj1JulsHpkMJXZ ICzS73yiQjQOOMMfEVhbtMYTdZNGsaG5jt+XdaJl4Xgmr17/E77GHofeYIOB4vcNKiBJ Qj0vg/qw7vRiJZ3znTckIYb9maEqhreAOdSZ6/D/4wghpbd8ZxBP+moQ1RNkxe1B6HB0 M+lA== X-Gm-Message-State: AOAM533vlvYpxkTYe5if3xNcIhSK84yQj3eebp3DAxY6HtTUb44MY5uY 1sob8p4MAnigtsTRucEI7ybmput8mqk= X-Received: from seanjc798194.pdx.corp.google.com ([2620:15c:f:10:7c83:7704:b3b6:754c]) (user=seanjc job=sendgmr) by 2002:a25:74cc:: with SMTP id p195mr9042062ybc.109.1624580338507; Thu, 24 Jun 2021 17:18:58 -0700 (PDT) Reply-To: Sean Christopherson Date: Thu, 24 Jun 2021 17:18:53 -0700 Message-Id: <20210625001853.318148-1-seanjc@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.32.0.93.g670b81a890-goog Subject: [PATCH] Revert "KVM: x86: WARN and reject loading KVM if NX is supported but not enabled" From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Let KVM load if EFER.NX=0 even if NX is supported, the analysis and testing (or lack thereof) for the non-PAE host case was garbage. If the kernel won't be using PAE paging, .Ldefault_entry in head_32.S skips over the entire EFER sequence. Hopefully that can be changed in the future to allow KVM to require EFER.NX, but the motivation behind KVM's requirement isn't yet merged. Reverting and revisiting the mess at a later date is by far the safest approach. This reverts commit 8bbed95d2cb6e5de8a342d761a89b0a04faed7be. Fixes: 8bbed95d2cb6 ("KVM: x86: WARN and reject loading KVM if NX is supported but not enabled") Signed-off-by: Sean Christopherson --- Hopefully it's not too late to just drop the original patch... arch/x86/kvm/x86.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 4a597aafe637..1cc02a3685d0 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -10981,9 +10981,6 @@ int kvm_arch_hardware_setup(void *opaque) int r; rdmsrl_safe(MSR_EFER, &host_efer); - if (WARN_ON_ONCE(boot_cpu_has(X86_FEATURE_NX) && - !(host_efer & EFER_NX))) - return -EIO; if (boot_cpu_has(X86_FEATURE_XSAVES)) rdmsrl(MSR_IA32_XSS, host_xss); -- 2.32.0.93.g670b81a890-goog