Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp4657472rwr; Mon, 8 May 2023 10:38:27 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5K/JqIgwb69UIlWrICX/C/BbGPU1MILqwB7XX+fcptYekigq358SccWHDq5TrtqDQZwlBX X-Received: by 2002:a17:903:234c:b0:1ab:109e:a553 with SMTP id c12-20020a170903234c00b001ab109ea553mr13844729plh.62.1683567506704; Mon, 08 May 2023 10:38:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683567506; cv=none; d=google.com; s=arc-20160816; b=W1QmNbKKEZC8WNmAIa/c7B/Flpo8jhI9TB+vVyyjRGA8+4YmcQTFQYVx9FHcbzHSUN 9SwpBWuTwkNFhl5KrIcfxYmKhzRrRtAn8+/NTcfwM1x9sJwSFRQjEgQXbSgXiVbGTGGR O/X2Glp287C5vq+QsNsifJXeqtcKP/JUKNW3jC1Sbm7dLuG8NltOfXlB/7tYQaFAQt8b fVyEwTp82I5yWXcyxlXEzPo6rgvLGSluNDJS/ZHaM43TgSLSFtuzVYFbGadWVgjwhovf +eUr7QMNpIrB5zKEmCc0HkIm7aqer0MOCAFIXYr7lzXqVdWT0mtvTn2S0TOTKsQ+kem3 VK5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=nOloBv+gW5rRTKAGiDzwKXMnSLawFEf1w3x+USeJsAM=; b=I/t3bLSQbg32dckW4eVS1cKj6WRU9oH8aUK8kksNqkluboL81hhgCITxN59zz5z6/F 0yJ41bPccL4Frde1YcNEUH0vrcTCE8uczoOqCBGy4UZEHpibNvnUGTd2HLiB4iJSsF4U 0G0si4rLuwOa6aPsHuLKp4Rscfv4tiolZBciwt+cEn1Ai76+zvaVRBQ1c+9621oMcn+A ODl/E3IQwoANaHi692a+xcSHXseGuBlM+2lQQo5Hbw0LnnqV4QFtAtkI/XHE5uBIyKMl RMkBFSq2RrendDLi92eo1vjzGUietnHvUN5YMMZ/1gV0QczPCAx/AdfWkCONU7uZKcKD 1lCg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=x0Fn8uZ9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 28-20020a17090a1a1c00b002299b06dca9si11852780pjk.83.2023.05.08.10.38.14; Mon, 08 May 2023 10:38:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=x0Fn8uZ9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233463AbjEHR3O (ORCPT + 99 others); Mon, 8 May 2023 13:29:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41718 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233575AbjEHR2z (ORCPT ); Mon, 8 May 2023 13:28:55 -0400 Received: from mail-il1-x12f.google.com (mail-il1-x12f.google.com [IPv6:2607:f8b0:4864:20::12f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4632F72BE for ; Mon, 8 May 2023 10:28:28 -0700 (PDT) Received: by mail-il1-x12f.google.com with SMTP id e9e14a558f8ab-32f4e0f42a7so1176925ab.1 for ; Mon, 08 May 2023 10:28:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1683566907; x=1686158907; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=nOloBv+gW5rRTKAGiDzwKXMnSLawFEf1w3x+USeJsAM=; b=x0Fn8uZ9rqBD3GI/vHVP93HlXutIX6YlzRAM+Xe+6fQKG5NceDCQ75d2ieFvWQnP6k m0NvdbA/+pioqcNkGTkrNK0uUl2yf817YlaZeGSROKGYpTohFgD1lsramV2AE6u2D7iA 54atEj212tO7Km2RDbWAwvtRg8J83jXTmHQD8IOqyCIU2RdbnY33YzBpYQJiaNkxmeJp NuyUIP1fq29ut/5qx1+cBX9AK56dmWG6yKurTEwvZf3KYPUTursR3GcoOo0fScYNmV8r WH1Ux35KomncVDkyAE0QXmmnCt1HJm+J43VqLy026wsN21tfo42CvhFHMW0yJzmO33qc 2j5w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683566907; x=1686158907; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=nOloBv+gW5rRTKAGiDzwKXMnSLawFEf1w3x+USeJsAM=; b=Y3Alc1gp3WVp5iss0oACDiETguLpWN2geqrrNd2ijIV2WNjddYpuo81QPSCJo4PSQX P44Z2aOQIUMAIqmUcfc/Hp8nZQKTalm87xCAnSV87X7yS4Np8kXEpPEdn0sjuLg3Cr7s Bkc7gVvl7CQcIEiLjDosoRi6jBgsrEBrfaGBK/0rsiiZle9XF7eSikyAHZaPcT2tICnP FzmGkH0NMZn9lwhg/GO4fIKIc7NI5RHtohgK+/5VQMFJYTnaJT7dgK/1TkeAs5XzQ474 CVjxNegvkN7HZYTK5xByejx45EX6Iaaz4NtwxDvxvyk+h8pBtm/XAZ/TlkU1qLubo2u/ 4WbA== X-Gm-Message-State: AC+VfDzYlTtUezf4tVunJoUKyFct7JTaLTIDMV9Yq0Ru9wLqyVSKFZ9G PqwQGgKFZx4gjE7dgDmx7ksx6ghZqWni9GF/oGDuog== X-Received: by 2002:a05:6e02:20cc:b0:335:5c4b:2f8a with SMTP id 12-20020a056e0220cc00b003355c4b2f8amr235833ilq.5.1683566907524; Mon, 08 May 2023 10:28:27 -0700 (PDT) MIME-Version: 1.0 References: <20230504181827.130532-1-mizhang@google.com> In-Reply-To: From: Jim Mattson Date: Mon, 8 May 2023 10:28:15 -0700 Message-ID: Subject: Re: [PATCH v2] KVM: VMX: add MSR_IA32_TSX_CTRL into msrs_to_save To: Xiaoyao Li Cc: Mingwei Zhang , Sean Christopherson , Paolo Bonzini , "H. Peter Anvin" , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, May 7, 2023 at 6:54=E2=80=AFPM Xiaoyao Li wr= ote: > > On 5/5/2023 2:18 AM, Mingwei Zhang wrote: > > Add MSR_IA32_TSX_CTRL into msrs_to_save[] to explicitly tell userspace = to > > save/restore the register value during migration. Missing this may caus= e > > userspace that relies on KVM ioctl(KVM_GET_MSR_INDEX_LIST) fail to port= the > > value to the target VM. > > > > In addition, there is no need to add MSR_IA32_TSX_CTRL when > > ARCH_CAP_TSX_CTRL_MSR is not supported in guest. So add the checking in > > kvm_probe_msr_to_save(). > > > > Fixes: b07a5c53d42a ("KVM: vmx: use MSR_IA32_TSX_CTRL to hard-disable T= SX on guest that lack it") > > I wonder it's the fix for this commit. > > Apart from this, > > Reviewed-by: Xiaoyao Li I concur. How about: Fixes: ea732b38b341 ("KVM: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality") Reviewed-by: Jim Mattson