Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp3207183iog; Mon, 27 Jun 2022 11:25:37 -0700 (PDT) X-Google-Smtp-Source: AGRyM1twXzGM7qAjE6EewGo+/Vpd1ZeUzV84GSFOzq3eIegaaeMMMleeP35Uf+xdc3RosDUU/9LM X-Received: by 2002:a05:6402:428a:b0:42e:8f7e:1638 with SMTP id g10-20020a056402428a00b0042e8f7e1638mr18305253edc.228.1656354337272; Mon, 27 Jun 2022 11:25:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656354337; cv=none; d=google.com; s=arc-20160816; b=zhON564fgvDprAOofOOShzETirqMzjY+kUvFGlQbeX05k9Yp8LAmfo97oMmjnTc+bk 2QiHPdoy2v8teZlLTUqlAgLQvGm6DaX3ry1O1FPYdGTCtR5lQnPRhk4Uw30qKrRKp33t RLqU3w4tZ2yQGs5M+u8TBX90f6qwgCqEUcpH5mDCifmycjW1dlX+yxD/dnFvqaNhIZLo bFkkK2ehDbSF0YFejWMCrnGQ+rNTHa1tlymx872+7Ry7ac/L85oRh6CoDmD33Fs1ZvL0 tSVmohqSWmKjDU+Iv+kCEcXAb+Nx2kPhTNLbhooN1Z+EevAPhl3YnEeI/WDrYHyNSdb+ M4kA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=rvLc0KAoeCG/x6cMf474PJVr5c3IRBsOYfpRWzYOz64=; b=ZF70I12gJI3lydqCt983MQMiErcAj2KW77IstKQV+RazUz1EhlIV5nBTjUnEBE/2HO Ezmok4bXZ7mgGcX+LNYbJO5N95bk2HGa1FG8dFCw6hb8zqX2x0xxJrzD9PaSfVk+QsxA jnqtgtQKBJbyaNDEY1wISvx6CAH2n9gaobPFo9ZFyp6I2QiDCi66jyX91Br+toGJ9nDX Uf3wykVrrfQfdMnORPG4B5QKvDS1N2vxjFquNsabkHjrn5v1273XgsB4rCG5BK6OdyLS BF+2fE6J6cje9UqpHCymeZg4L9XEx78ZmsCZVwaCgrBpbQqEetU+AvqjzxxtRDiDLtGt fSmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=b13f20Mc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l10-20020a056402254a00b0042ad03b5aacsi11351714edb.5.2022.06.27.11.25.11; Mon, 27 Jun 2022 11:25:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=b13f20Mc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239534AbiF0Ruh (ORCPT + 99 others); Mon, 27 Jun 2022 13:50:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55524 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238159AbiF0Ruf (ORCPT ); Mon, 27 Jun 2022 13:50:35 -0400 Received: from mail-oa1-x30.google.com (mail-oa1-x30.google.com [IPv6:2001:4860:4864:20::30]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 27379CE1B for ; Mon, 27 Jun 2022 10:50:34 -0700 (PDT) Received: by mail-oa1-x30.google.com with SMTP id 586e51a60fabf-101d96fe0a5so13900537fac.2 for ; Mon, 27 Jun 2022 10:50:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=rvLc0KAoeCG/x6cMf474PJVr5c3IRBsOYfpRWzYOz64=; b=b13f20McHwfbhFM7Uv3QqZ+tK3PojQDPvs6uKN1cxttfYLzxMVnB/WnBHOprwgqQlr bX5UDBaIRyM6Pfqq1fUb4ehpuiHnwdiuB5ZuEfdtK5FQfRUrnXpSqIZaxGN6Wa3458H3 oYa7qNKfJLj9mBObyCW0Fm1L8ESGgjWD8t7abMrFLqGCsJhW0S/M37WiHVRZ5Asqmqzk T0G9hekokpmUXqnaevM0IGbHvC5N7kgcvl76wTbygNP+3JS1X+mD6Nb15KJNKT2fVsri hZHlUd0jDQBT0aJ4yE8Xkk776Gt8YCORIXRlJsQMcJUfF+13gdNdxvoNKxtpplNDFMyH GBnw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=rvLc0KAoeCG/x6cMf474PJVr5c3IRBsOYfpRWzYOz64=; b=oX0foLEitM5IndYmfLlGL4zgS4DzDar77PTK4UuRKoELXbCT5hi/rnWnL1YvOZTlNi zJmNo19TsaQ/+W3TI1hUNVR/4m8d/rPmX7BYakuhJtr1Vt+YDZkNEOEIsoPngNAX2Jg4 ujNlb6Q/PQdgXEoS6EKNQWOijczzlXOXdntETy0UwBWISx7nJofKA4LKFYX6rAWLwP0s IbNv9Sy8eCmpwe/gUGpuOXPpBtRvtjsTTBLEvCearSfFUquUxOjiu4S/4V3zuWPB6AyX sIMngFcFmgjEt7MayczmAocZLZTWWfMRXQtYGb78j7fO6bgKRI7ochfnOiQsVqlCeEFq m0lQ== X-Gm-Message-State: AJIora9TmemwvAVhYIUgBe/5F7QVi7bUGpnyD49tGvdopIPwuSpcy3on ZfdUEpgBHMirj3mj+51k+G60eZJJ2FKAPa/9PWVwhQ== X-Received: by 2002:a05:6870:c596:b0:101:6409:ae62 with SMTP id ba22-20020a056870c59600b001016409ae62mr11029906oab.112.1656352233275; Mon, 27 Jun 2022 10:50:33 -0700 (PDT) MIME-Version: 1.0 References: <20220627160440.31857-1-vkuznets@redhat.com> In-Reply-To: <20220627160440.31857-1-vkuznets@redhat.com> From: Jim Mattson Date: Mon, 27 Jun 2022 10:50:22 -0700 Message-ID: Subject: Re: [PATCH 00/14] KVM: nVMX: Use vmcs_config for setting up nested VMX MSRs To: Vitaly Kuznetsov Cc: kvm@vger.kernel.org, Paolo Bonzini , Sean Christopherson , Anirudh Rayabharam , Wanpeng Li , Maxim Levitsky , linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 27, 2022 at 9:04 AM Vitaly Kuznetsov wrote: > > Changes since RFC: > - "KVM: VMX: Extend VMX controls macro shenanigans" PATCH added and the > infrastructure is later used in other patches [Sean] PATCHes 1-3 added > to support the change. > - "KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup" PATCH > added [Sean]. > - Commit messages added. > > vmcs_config is a sanitized version of host VMX MSRs where some controls are > filtered out (e.g. when Enlightened VMCS is enabled, some know bugs are > discovered, some inconsistencies in controls are detected,...) but > nested_vmx_setup_ctls_msrs() uses raw host MSRs instead. This may end up > in exposing undesired controls to L1. Switch to using vmcs_config instead. > > Sean Christopherson (1): > KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup > > Vitaly Kuznetsov (13): > KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config() > KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in > setup_vmcs_config() > KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING > in setup_vmcs_config() > KVM: VMX: Extend VMX controls macro shenanigans > KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of > setup_vmcs_config() > KVM: VMX: Add missing VMEXIT controls to vmcs_config > KVM: VMX: Add missing VMENTRY controls to vmcs_config > KVM: VMX: Add missing CPU based VM execution controls to vmcs_config > KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs > KVM: VMX: Store required-1 VMX controls in vmcs_config > KVM: nVMX: Use sanitized required-1 bits for VMX control MSRs > KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config > KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up > nested MSR > > arch/x86/kvm/vmx/capabilities.h | 16 +-- > arch/x86/kvm/vmx/nested.c | 37 +++--- > arch/x86/kvm/vmx/nested.h | 2 +- > arch/x86/kvm/vmx/vmx.c | 198 ++++++++++++++------------------ > arch/x86/kvm/vmx/vmx.h | 118 +++++++++++++++++++ > 5 files changed, 229 insertions(+), 142 deletions(-) > > -- > 2.35.3 > Just checking that this doesn't introduce any backwards-compatibility issues. That is, all features that were reported as being available in the past should still be available moving forward. Thanks, --jim