Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp255390rwl; Thu, 23 Mar 2023 15:52:47 -0700 (PDT) X-Google-Smtp-Source: AKy350Ys2eg29ZGvGSgwhiOg5Q86GmFJuPYVDG4jCXKztmusZ6YufzVOf7F25G6wt97wfGIuW5TT X-Received: by 2002:a17:902:d485:b0:1a1:dbaf:ae31 with SMTP id c5-20020a170902d48500b001a1dbafae31mr624157plg.1.1679611967219; Thu, 23 Mar 2023 15:52:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679611967; cv=none; d=google.com; s=arc-20160816; b=rbOhiVWCVMlXyxqXSYoCN9hMdnoj0rGPl5j+F1TDlWRe4fWZQQz1JKuCWfTgmtre6M IF+RLA08Wtp7QL9MUKcrbUnL+0Kpm4Eam8zPRmCCui6fvBfZ0TpRBNluTwmxxj8azajq ygwZy1G0uCbw7Aztj24iyJVPHJFBmWau71uPP7LEiPl0Dc11ZjthSJzZp2ROpwHX+/Rw 8q4kqqXWEE6vpUXuE4LokKeqlXcbf5iL265Vbm/sv649iskzrNoYVXfKGLPfTavYLqTR 4QAAFi4HO40eV9H3kYZj65SSTdXCQuo4fQAa9AQO3jZTSAwsTY29JEOA7LlEjmo1EkKu fYbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=HNHBl3QczA2duBiLkiqIakCr9NDsSlzl00Etwe/x6AA=; b=w2hRk7zM4MS1gygeLKq+a/P0xJe+HdnqHgkLPgRCRoAg3O9sQGZakErhSyH/SW1vmB M17satnB9VR5c5+ZKGImKKIsgckSupgrBRJs52Bn5ZyLeTxj4spjE5nQH11ogqfYIT7q NsCMmuxd9wQUAMqrBKW3yAg3xOJ/G6OnMquoBFmIgxtomYrUTPyGiRhviTePFVx4p5SA n0xZxLhXF1LmxWWpUkOQoRd+gyQb/B5lw2zH7/cW6zjobn0AXc/jtg+31uI5YYAagQsE zlMCour6d0T0L2/oB1Mpw64/vfi8yeLdsnwcsJDuRP4wZQHLqbQka4FO7kArcfbryBbV DvvQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=nL4uDHT5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r1-20020a170902be0100b001a1dd023021si9203602pls.542.2023.03.23.15.52.34; Thu, 23 Mar 2023 15:52:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=nL4uDHT5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231329AbjCWWq4 (ORCPT + 99 others); Thu, 23 Mar 2023 18:46:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42594 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229484AbjCWWqz (ORCPT ); Thu, 23 Mar 2023 18:46:55 -0400 Received: from mail-pl1-x649.google.com (mail-pl1-x649.google.com [IPv6:2607:f8b0:4864:20::649]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5B0CEB75A for ; Thu, 23 Mar 2023 15:46:54 -0700 (PDT) Received: by mail-pl1-x649.google.com with SMTP id s11-20020a170902a50b00b001a1f8fc0d2cso128696plq.15 for ; Thu, 23 Mar 2023 15:46:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; t=1679611613; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=HNHBl3QczA2duBiLkiqIakCr9NDsSlzl00Etwe/x6AA=; b=nL4uDHT5LN/KzWrSdMVEP4XYVi62HDk1HQdumZO+SeJ01dVjDn9KXeH7sxgu9tN2Ih RQQcFcuMC2vmrq8CPwa2zJ/d5RXHOZIm0FZWzAhKQIq6n+2wWsoLdQb5LyBdnkh/XCR3 LtelyBK6rrQ7Wl8BO8gKq9k6opsrbtRKnW+b3lr/tsBptbz8VcqOOX0SpuaQVweCq8Bt Ri/yPZwY5ilgL9UQPYNCu1WlZwlnlXh2mY+oVNh1ALHtmbXijZOJe7xRulULIa+f81kc iBSejLd+0rarVjncxsXJjQJmAvi3xW3ecUq/dhtcqRMYksgYeR4S9ZF9hAXyCgsPwIEn 1JJw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1679611613; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=HNHBl3QczA2duBiLkiqIakCr9NDsSlzl00Etwe/x6AA=; b=mas8B8MH7fMspi1Gyr4OhyupXJZ9wf7sWpsSME7uEcp0LQUuMZGdrNVAAYkgY0IETJ GTDmfburBC9NaIPtA7AWllAKxT0fD117EOUFGII4bSxfUA3tRkW1DMmrpTvis7na9po/ bvtbz8KY/pZuoeA4pJ6nky8tf0vGf1DXx6KiNbey2qcfCQt6aHCCM2as6LtODqzxYVN3 imckKjzKxUG3mI9A8t919WJdqGi0sgzAaXADpMLmyO4zNGPXSDxm60SKBEqEYg3wnvVL ixrdvn1nwZLz6qvuliWg86f8byLlpKWmW4AH4iZ9eefEhh1d6rIrkRGU6nuVZW4eNqdj RIPA== X-Gm-Message-State: AAQBX9enL3HL+yu0k6u3ACcpgllW9c3UNkcVDdoC4ghOGexS9Qe0gdjd p+a1iCN84eV7ACy/5aHSUybR4NH2zV4= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a63:89:0:b0:4fc:7e60:d0c with SMTP id 131-20020a630089000000b004fc7e600d0cmr19725pga.11.1679611613647; Thu, 23 Mar 2023 15:46:53 -0700 (PDT) Date: Thu, 23 Mar 2023 15:46:32 -0700 In-Reply-To: <20230322011440.2195485-1-seanjc@google.com> Mime-Version: 1.0 References: <20230322011440.2195485-1-seanjc@google.com> X-Mailer: git-send-email 2.40.0.348.gf938b09366-goog Message-ID: <167949671616.2217955.7836409047320878527.b4-ty@google.com> Subject: Re: [PATCH 0/6] KVM: x86: Unhost the *_CMD MSR mess From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Nathan Chancellor , Emanuele Giuseppe Esposito , Pawan Gupta , Jim Mattson Content-Type: text/plain; charset="utf-8" X-Spam-Status: No, score=-7.7 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 21 Mar 2023 18:14:34 -0700, Sean Christopherson wrote: > Revert the FLUSH_L1D enabling, which has multiple fatal bugs, clean up > the existing PRED_CMD handling, and reintroduce FLUSH_L1D virtualization > without inheriting the mistakes made by PRED_CMD. > > The last patch hardens SVM against one of the bugs introduced in the > FLUSH_L1D enabling. > > [...] Applied to a one-off branch, kvm-x86 cmd_msrs, so that I can get this into kvm-x86 next and onto linux-next asap. I'll drop the branch if Paolo wants to do something else, or if there are issues with the series. [1/6] KVM: x86: Revert MSR_IA32_FLUSH_CMD.FLUSH_L1D enabling https://github.com/kvm-x86/linux/commit/e9c126917c09 [2/6] KVM: VMX: Passthrough MSR_IA32_PRED_CMD based purely on host+guest CPUID https://github.com/kvm-x86/linux/commit/4f9babd37df0 [3/6] KVM: SVM: Passthrough MSR_IA32_PRED_CMD based purely on host+guest CPUID https://github.com/kvm-x86/linux/commit/5ac641dff621 [4/6] KVM: x86: Move MSR_IA32_PRED_CMD WRMSR emulation to common code https://github.com/kvm-x86/linux/commit/584aeda90bd9 [5/6] KVM: x86: Virtualize FLUSH_L1D and passthrough MSR_IA32_FLUSH_CMD https://github.com/kvm-x86/linux/commit/5bdebd246db5 [6/6] KVM: SVM: Return the local "r" variable from svm_set_msr() https://github.com/kvm-x86/linux/commit/8a16ed8c673c -- https://github.com/kvm-x86/linux/tree/next https://github.com/kvm-x86/linux/tree/fixes