Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2581823rwb; Thu, 17 Nov 2022 12:55:22 -0800 (PST) X-Google-Smtp-Source: AA0mqf7uzA9Wbau9964K5ffkgQ57gmrIX4bIrjhWeJx6GhY7PFmcbjy1FXLt0mrh2ePi8U3na2KL X-Received: by 2002:aa7:d8ca:0:b0:463:4dd8:d6ea with SMTP id k10-20020aa7d8ca000000b004634dd8d6eamr3734915eds.426.1668718522366; Thu, 17 Nov 2022 12:55:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668718522; cv=none; d=google.com; s=arc-20160816; b=fzf/PJSXVHOGeNx0ORYqiamApXZKBOeWVy6zmtabo84hOIExgXZCxA/2HeRPZ4NjUA rThZesxsrlwA4s3+OKG4adCwmjBA+x1Y5qQtsgCd4Bga6DbSdjn4vQXj3+D/h1DXzFWR TIrn98lTjZc8IeBKyj3n59JBE0i/ROFqZeGBfvcIZuNgP9/3zHbWrjGTutm7Uqq8+7en LFqFBA/L4sLYls0029ijCNjF7+4ksilbbsDswl6vC2pto5zDNlpztbBOPpXi7VQzJv7d O+VcqbkjaS12fvXp5mXHpBVjzdfe5o5pznkDBRWBF7ZaCz9nCC9+eE6xZR253//TUOan oeZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=qjPvhUtx2vpq21G6yppeUkSS2gj9D+uNetGzarYUrGk=; b=tfyxLMwIhWVO0L7lDaIKSlD8Xuz6qJq6jIKpqKJsXQPlkj8uQ6jvmkhtmaVpQMbUCC DiPXkaZGs4/NjwWpT3Wsb7ScrMgixlxhP+EfZ90hS43Zpenzktb9v0aytAjxS5/4+zsu GM/dZ6Kte9C01fW2eH7nkk0vphNwVmZ5WrujSr7chTt9pF4lkwEEei3eSOYeXcqajztW bh5DxyfL0DTk4YtH3XY9ecJo4qW7R4YRY+aPtHC6HbKIhDi3eH1XIpXwjQn9xffAdZkS EYaYYSkBNgtGARYIB13yhkqSN3d6vO97QPwrx/o1uIVdX/Z5pG4JhjmzS4HZ4DERWj3x b7fg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=HOUcxMgk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r13-20020a05640251cd00b00462e5d768b3si1877761edd.612.2022.11.17.12.54.59; Thu, 17 Nov 2022 12:55:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=HOUcxMgk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234904AbiKQU2I (ORCPT + 92 others); Thu, 17 Nov 2022 15:28:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60572 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230287AbiKQU2H (ORCPT ); Thu, 17 Nov 2022 15:28:07 -0500 Received: from mail-pf1-x42d.google.com (mail-pf1-x42d.google.com [IPv6:2607:f8b0:4864:20::42d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 32121697DE for ; Thu, 17 Nov 2022 12:28:04 -0800 (PST) Received: by mail-pf1-x42d.google.com with SMTP id g62so2864989pfb.10 for ; Thu, 17 Nov 2022 12:28:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=qjPvhUtx2vpq21G6yppeUkSS2gj9D+uNetGzarYUrGk=; b=HOUcxMgkGsrLHQg9cgfl2AGgr+gBpBVzZsKBIMmL0NWLOpU16yxxBrKvjr3dAAHVk3 ShvcqhvIHigUkfSoUbhib8KYcJ3kBJzNDcvN6Fr+yvjVIn0KXdmuPM/7oZkHMalQvK4i JX9OBUGpDIho/I3FKJBR4Tgw1KB+p+SbrKiIHYCLXCuZk9unlCObWDSpkYt75kRhWWEZ 1Z3hAvoiMNrQwLfeSQnZvA2Kwdvfoh2BMy75LExHyMX2oRDkkBkvRAvCvqoeF0gSgHuw HJp2JUcbJT5BUTJuBIBv7+9e5BuvJxF6s0l2HVTIF/a5GXv4Yti4WFjPIqVRa3MhrJd3 C/8w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=qjPvhUtx2vpq21G6yppeUkSS2gj9D+uNetGzarYUrGk=; b=Oby6S/4qvDGFZZqi+K5Msq3fZto+HvV/hK8o8Df5j7Fcc5VqVyqwXdKDonTJWJKi7E xJtWQYEl8USG4rRzSdPduDuaOTa163S19M2+PDeQOfv1l14XU+P5ljKFMUvLGasw0QPq VAxuuqj9Hy2z+cdC+zHkdKkp4fm7g0QmDHanhF/jfp3MP/4Uj5gCitJEfLv0nAkFbSgg Z41ossDFhQez0KaYdVZu9fpX6IhsdVGC2V3ofnaemCij8/+lNEBJDU3ojQvpnveksxOJ xEmEMw5INno1XG8pRWFVCvVUyKYvzGeHydIzCC0DiXC+VpQCig5iK5/5XvbkFNSvnWpq EiSA== X-Gm-Message-State: ANoB5pkAt4lDMLYUkAzs9DOVVw4RyJyDUdVbyJAsW0kHKHV+6DdbeTCa bXmp7Vd1QPYNFhcGstOGE41xFw== X-Received: by 2002:a65:5541:0:b0:476:759b:7952 with SMTP id t1-20020a655541000000b00476759b7952mr3658694pgr.316.1668716883589; Thu, 17 Nov 2022 12:28:03 -0800 (PST) Received: from google.com (7.104.168.34.bc.googleusercontent.com. [34.168.104.7]) by smtp.gmail.com with ESMTPSA id f8-20020a170902684800b00186e34524e3sm1797697pln.136.2022.11.17.12.28.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 17 Nov 2022 12:28:03 -0800 (PST) Date: Thu, 17 Nov 2022 20:27:59 +0000 From: Sean Christopherson To: Maxim Levitsky Cc: kvm@vger.kernel.org, Paolo Bonzini , Ingo Molnar , "H. Peter Anvin" , Dave Hansen , linux-kernel@vger.kernel.org, Peter Zijlstra , Thomas Gleixner , Sandipan Das , Daniel Sneddon , Jing Liu , Josh Poimboeuf , Wyes Karny , Borislav Petkov , Babu Moger , Pawan Gupta , Jim Mattson , x86@kernel.org, Santosh Shukla Subject: Re: [PATCH 06/13] KVM: SVM: Add VNMI bit definition Message-ID: References: <20221117143242.102721-1-mlevitsk@redhat.com> <20221117143242.102721-7-mlevitsk@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221117143242.102721-7-mlevitsk@redhat.com> X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 17, 2022, Maxim Levitsky wrote: > diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c > index 03acbe8ff34edb..08a7b2a0a29f3a 100644 > --- a/arch/x86/kvm/svm/svm.c > +++ b/arch/x86/kvm/svm/svm.c > @@ -230,6 +230,8 @@ module_param(dump_invalid_vmcb, bool, 0644); > bool intercept_smi = true; > module_param(intercept_smi, bool, 0444); > > +bool vnmi = true; This can be __ro_after_init, e.g. see https://lore.kernel.org/all/20221110013003.1421895-4-seanjc@google.com > +module_param(vnmi, bool, 0444); The exposure of "vnmi" to userspace belongs in the last patch. E.g. this patch should only stub in vnmi: bool __ro_after_init vnmi; and then the last patch that actually enables it can default it to true and expose the param to users. It obviously doesn't matter in the end, but it technically makes this series broken, e.g. nested_sync_int_ctl_from_vmcb02() pivots on "vnmi" without the extra V_NMI_ENABLE check, and advertising the vnmi is enabled when it actually isn't is wrong/misleading.