Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp949248rwr; Thu, 4 May 2023 11:48:27 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5YuqYBkL4a/VepDfJK3T0nrkM4uZBjHeur5/pfrUZSd1WDgFGStM2BwtO+dbq5oAe0tLgV X-Received: by 2002:a17:902:b70f:b0:1a6:386f:39a3 with SMTP id d15-20020a170902b70f00b001a6386f39a3mr4500654pls.31.1683226107290; Thu, 04 May 2023 11:48:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683226107; cv=none; d=google.com; s=arc-20160816; b=a80g5mlIEYwbLuHFmZ58xpNrMzJzyvqao8Tl5cgrqba7q5xRYDran0FdmEas/JR1WM 4IiKpLXaYbIIxgucpAWmMkBI4GnL2yNIbl0Ci3ii8wX1FMjTg//18YhmAzD71z09zYKp 0F7VYcjdr5IOhfgrI263p+ecPfmgoAehVVAI87ypKuV0qJtFCKoZeXeaD8gQfbHKaOqL F0vLdS4SAEU4/y1Iww7Ffi/dMWiDpE7S9UnhGmvIl7nvEDQW8e6I6Yn+YGdNL/LFu186 u/P0tY4PJr6gq5KPHxCInfR3aGfhaqX75whUfqGUNAlVoAyjkfr4NUXJn19JQFFNPMq9 1t2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=ikJLj9UcZMZg1J2stu5wI6bhIEl+t7Zsf0nTDY3caoE=; b=AcvjBS7BWj3wEEttQkTJgvVcQsNvFKumLznS7+vWiIvfThgbElgOPke8OXAKH9N4Ih HvLWmhhC8/VsCBSTnhy8Ultv+nCID4UoPz9zjL1LZbXhXD0oKidAcQ6dGnI1nC3d2ZrJ tHDbeNHY3w3mJT63xdojIwDyXZazIWl3uNdaRVGiuJwO7Yf0oMJQsY2PhYLLE4MfdtdW gmEHVTJJDHYWJumLTXdC3M1bDJA7eM9KtyEbEzmjzbukc4dKGQSiwmYggWkBFCNiMidE zwlf2zNTOtegW+RhKExYq67RxoiqQxVNUp/lLEOI794Np27Ix9H1B+Ln0pX5p/T8wtQB 5OKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=EZPArdHu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jg1-20020a17090326c100b001aaf62c76cesi9814669plb.129.2023.05.04.11.48.14; Thu, 04 May 2023 11:48:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=EZPArdHu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229872AbjEDS1J (ORCPT + 99 others); Thu, 4 May 2023 14:27:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33774 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229545AbjEDS1I (ORCPT ); Thu, 4 May 2023 14:27:08 -0400 Received: from mail-il1-x131.google.com (mail-il1-x131.google.com [IPv6:2607:f8b0:4864:20::131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 83BC165BF for ; Thu, 4 May 2023 11:27:07 -0700 (PDT) Received: by mail-il1-x131.google.com with SMTP id e9e14a558f8ab-33124b0dd85so591425ab.1 for ; Thu, 04 May 2023 11:27:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1683224827; x=1685816827; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=ikJLj9UcZMZg1J2stu5wI6bhIEl+t7Zsf0nTDY3caoE=; b=EZPArdHukXu5W/pYa8vFfG/PWnoZ0IyWqqb7mVWfoCHOqqfPXfoDVf7QoCTJ1ksTQc 107SD0StxNzFc1Z7FC4+BsXY3TGiEoIeoSGNNdh4s+BzBd5ELVf9iw+i8uh3yilDpr3v LJl5vSudldj9Vws/6OVaqAmpbWeCt3bDvo3WrdfR2PrYaQK/Fq6pAerYXytGe4DOKmHL SKCXp21iLL4DaDLO0k0vFMke50hpL0mZZosioUkQyFzKWEkv9z8Pzz4sBPz/wIr3hiPd JmljBoyTbobx9V3y5c2W1qdspSVAkacM2yzf1SGUJh5QM6Su9GA3UZBW8JjAKz9ei4lt b9RQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683224827; x=1685816827; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ikJLj9UcZMZg1J2stu5wI6bhIEl+t7Zsf0nTDY3caoE=; b=hw4ZadQsS/MNSeTS0rsSRU2yBGurSSw/eiBKApgQJjbmj5csrbDLS4SUeeGxhngPkV GpU8/h3JLt99bfai0OFPJhTNuIFd93htqVyhoXkWCQ4gXHUVD9EO8SefSaX/TbO2fxbT aO9gTTfc6nuD1fKcJeJJlGJTTASbuIApa1FShvEvoDYRwBjPAJcyuyErp6zb3dRxdY0n DH7ItFJRXOQORfFZcrchYmUrcRTm1nfYfJIU7RlhU1mR7gEfiOBdJczvZtSg/mHCpNHW 6a3tAqqv3yPxd9b3tGndE9erVoFdhboygjPw9g1d6V28o6q/GlHlYUbb0Zb3y+WXLFYG xv5Q== X-Gm-Message-State: AC+VfDw7QxzbYlIK5A5B+C6YFdAU6uAo788MFSHmFlWwdSCyPsyz1BEm kb3iv0oXesKFP2+a195HSrUTgKDILsgGRWxv6jvXzg== X-Received: by 2002:a05:6e02:12ce:b0:322:848b:6c53 with SMTP id i14-20020a056e0212ce00b00322848b6c53mr18499ilm.14.1683224826598; Thu, 04 May 2023 11:27:06 -0700 (PDT) MIME-Version: 1.0 References: <20230504181827.130532-1-mizhang@google.com> In-Reply-To: <20230504181827.130532-1-mizhang@google.com> From: Jim Mattson Date: Thu, 4 May 2023 11:26:55 -0700 Message-ID: Subject: Re: [PATCH v2] KVM: VMX: add MSR_IA32_TSX_CTRL into msrs_to_save To: Mingwei Zhang Cc: Sean Christopherson , Paolo Bonzini , "H. Peter Anvin" , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 4, 2023 at 11:18=E2=80=AFAM Mingwei Zhang = wrote: > > Add MSR_IA32_TSX_CTRL into msrs_to_save[] to explicitly tell userspace to > save/restore the register value during migration. Missing this may cause > userspace that relies on KVM ioctl(KVM_GET_MSR_INDEX_LIST) fail to port t= he > value to the target VM. > > In addition, there is no need to add MSR_IA32_TSX_CTRL when > ARCH_CAP_TSX_CTRL_MSR is not supported in guest. So add the checking in > kvm_probe_msr_to_save(). > > Fixes: b07a5c53d42a ("KVM: vmx: use MSR_IA32_TSX_CTRL to hard-disable TSX= on guest that lack it") > Reported-by: Jim Mattson > Signed-off-by: Mingwei Zhang Reviewed-by: Jim Mattson