Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp303664rwr; Tue, 2 May 2023 21:26:05 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ55c+bMafOLfiAw1MSa0VQ2MKg8R4vWxLBHAQZbsOBt4P2ur+CVNE7al0G3fIOM+p5gDxkj X-Received: by 2002:a17:90b:1d06:b0:247:2ed1:e96e with SMTP id on6-20020a17090b1d0600b002472ed1e96emr20374474pjb.18.1683087964671; Tue, 02 May 2023 21:26:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683087964; cv=none; d=google.com; s=arc-20160816; b=ZylqNzA+9FeHDsz92LVZDp49Y7uLb7/4SV+/Zl4yxrk3MGl211pT7QYfYuWCsi0V/1 h4/WfrcpeYTJPehq+xDSxKf+PA4OETs3Agh2HFF7n90FzYXwFtYIngmkazUL+AHLafk4 eNxAt1t4TQuhj1jtOBXSo4Nb8QbYXvBiDFffoWgJH/R4WNS+0l/Hxiay0nHO351PZ8XR 8DU4Gu1fIJNaO8TrZ7h4ut2RLL3DIXOb5WtSXzHBVkIfLcTyYWTpyFmaeug8dqbBVlf+ D4PCZmg6p1fPQZ7K1yVpbmCdfoTb54PHX4LQ3eY8H4byG8VB1Os0gK2iM8t7+Q/WTIxX PFXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :reply-to:dkim-signature; bh=3YJtw62GtGvLodxqlrImmwkb/DnaRXZEiakmDP1KOF8=; b=sTJy8PBWJO9W2AoiAyypAj8LjjIJKH4POgswXAN3BRlNrheYM/DaKSNQi/H6Ln+Pwg kIwA2d9sUe4BCBdz+YowDNjkAkuNt/BWnZtps/hdQGOl90EWu02GpnDsKEdjhNmcKJpq IRGuYAF5K4+YzOzgqWVP8uoZoB05yTnsPPkMX1PG+onXebyc5gLUeNuSYYbLrINXv0Vy C0MDxKYRyflwv5VQ4ZKeXR4BbZyL5L5aHfqsXJsI7DeYr+rQoPUxy1/qEq0iNK/pCRyk AZST0XRmH6JRG8pVXO4km3CrzGhUSJOkvG2O98RBcy77TQYBeMPBX6q2TM9H+ulilfU7 WrpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=o0hLaITS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t12-20020a170902b20c00b001a6b5a7db52si8861527plr.596.2023.05.02.21.25.50; Tue, 02 May 2023 21:26:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=o0hLaITS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229575AbjECEQj (ORCPT + 99 others); Wed, 3 May 2023 00:16:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41488 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229564AbjECEQh (ORCPT ); Wed, 3 May 2023 00:16:37 -0400 Received: from mail-yw1-x1149.google.com (mail-yw1-x1149.google.com [IPv6:2607:f8b0:4864:20::1149]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 495591FCA for ; Tue, 2 May 2023 21:16:36 -0700 (PDT) Received: by mail-yw1-x1149.google.com with SMTP id 00721157ae682-55a04468981so80113857b3.0 for ; Tue, 02 May 2023 21:16:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1683087395; x=1685679395; h=cc:to:from:subject:message-id:mime-version:date:reply-to:from:to:cc :subject:date:message-id:reply-to; bh=3YJtw62GtGvLodxqlrImmwkb/DnaRXZEiakmDP1KOF8=; b=o0hLaITSqsgzFYxltV5RMId55xRCG7Tk7YDz8q1/OPDSGMvILQefICkgC4ZdxBqB5J MjLh+sCmNZ/i4oT6P32JokhR9S9qC2/MKjtHdKTuKxzkXSNBAbjhBRq0E/+wDTsfICmf QPnSYSpFQGfgPh9SoetmTsBGucvMVaYAmUMEavxgR2YWDVf6noAnJ89JuBro7gMQGiaw 46+qLbWVjPzPWWnT54vf6Q78PH7/VeL+0L1rdJR/T3nSdmKeYD7tQoYXhZ5QylK8X6/B G9ars/m9dekJeHaxs+6U0IcwtX6U4wqxu8SGm4tm5PQMv+kIkL5tmwiBfhlNHnMSuy1e 8WyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683087395; x=1685679395; h=cc:to:from:subject:message-id:mime-version:date:reply-to :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=3YJtw62GtGvLodxqlrImmwkb/DnaRXZEiakmDP1KOF8=; b=UZ3JYNpzm2vabXEVBXEDqxtxO/L5++RodGH2H8PmOhGDS9MAfKayH4ypVZFZtzvg0P 3WTPTQ+bZBtPYFUjzZJjMcc2LBzmIFkFBO7QYDs5BdylYa0yUurpgoTSTGhLVB4ddLgz o3pSTaA2mQ6GRa+uA1V5unGOw22T5KR+0YnzKjtyxX1gR1Uq+yt7kz5vcj8WH3tcswLX o8ciKgw7qEy3JpzbKkuKE3nR8B0TtDnchU0AQsvAd03uSnym4EfMlecas9Vc8l1mjZRr N+6faxjI/yTkgxtXQ8O0HWAHAKtZCxPhFCZ5vsACdieqicmVn5bl+G0Wzs0h0WotUKl3 mBZg== X-Gm-Message-State: AC+VfDxSzJPzwd9gUp1AHLk0DTTgXQuGpd/minELrQ8D/fbUto+bpeLB HlKfpCoYpRWTRTYGzFjeJRBIMrhQGfBZ X-Received: from mizhang-super.c.googlers.com ([34.105.13.176]) (user=mizhang job=sendgmr) by 2002:a81:b145:0:b0:552:f777:88ce with SMTP id p66-20020a81b145000000b00552f77788cemr11660614ywh.3.1683087395559; Tue, 02 May 2023 21:16:35 -0700 (PDT) Reply-To: Mingwei Zhang Date: Wed, 3 May 2023 04:16:31 +0000 Mime-Version: 1.0 X-Mailer: git-send-email 2.40.1.495.gc816e09b53d-goog Message-ID: <20230503041631.3368796-1-mizhang@google.com> Subject: [PATCH] KVM: VMX: add MSR_IA32_TSX_CTRL into msrs_to_save From: Mingwei Zhang To: Sean Christopherson , Paolo Bonzini Cc: "H. Peter Anvin" , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Jim Mattson , Mingwei Zhang Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add MSR_IA32_TSX_CTRL into msrs_to_save[] to explicitly tell userspace to save/restore the register value during migration. Missing this may cause userspace that relies on KVM ioctl(KVM_GET_MSR_INDEX_LIST) fail to port the value to the target VM. Fixes: b07a5c53d42a ("KVM: vmx: use MSR_IA32_TSX_CTRL to hard-disable TSX on guest that lack it") Reported-by: Jim Mattson Signed-off-by: Mingwei Zhang --- arch/x86/kvm/x86.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 237c483b1230..2236cfee4b7a 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -1431,7 +1431,7 @@ static const u32 msrs_to_save_base[] = { #endif MSR_IA32_TSC, MSR_IA32_CR_PAT, MSR_VM_HSAVE_PA, MSR_IA32_FEAT_CTL, MSR_IA32_BNDCFGS, MSR_TSC_AUX, - MSR_IA32_SPEC_CTRL, + MSR_IA32_SPEC_CTRL, MSR_IA32_TSX_CTRL, MSR_IA32_RTIT_CTL, MSR_IA32_RTIT_STATUS, MSR_IA32_RTIT_CR3_MATCH, MSR_IA32_RTIT_OUTPUT_BASE, MSR_IA32_RTIT_OUTPUT_MASK, MSR_IA32_RTIT_ADDR0_A, MSR_IA32_RTIT_ADDR0_B, -- 2.40.1.495.gc816e09b53d-goog