Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp7471234rwd; Tue, 6 Jun 2023 11:09:04 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4+H+aMG4ova2Ijd7ITCKavmLJODpAk8EfEcMxCvYCYb1iyWwKcdjYgrbyjnZtcbOD/Ol5K X-Received: by 2002:a17:903:26cb:b0:1b1:d8ce:73cb with SMTP id jg11-20020a17090326cb00b001b1d8ce73cbmr1253653plb.59.1686074944493; Tue, 06 Jun 2023 11:09:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686074944; cv=none; d=google.com; s=arc-20160816; b=z5AkkCpARoYqN/r1yUaSaj77JWdNjXBEEDwAbtdC46Br8yYx7yvv/creZZ9mlSgTs+ P56hrEGhd6bqetv+IRhX6qbo4mOrvahXHP+q06atdla0qK6xjf6byoKRRDjYJoQRwdMY Uv6P1QRIMxXpeWCjPLIz1U1IR1ueNoBvAVK9KWbfZPYHt3EK3yhRTb4MrKx4eocYirJG T5cjPmcAFp+j7cX8rUPldVQu0ITqWZjUYPi4FkPrAbM7NdncstaWfS90QjPJOmXVHj0O vrIXmhhvaMUX1LT7IUAmbjK4psK25/8hJdQlSLL0jpvDyLuwdXsH0P6b3fFsHZ43h4Vk J68g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=dXKYuUg7HoIp7PZjxrN4e8/tttddAPBgDCmI9zzNWIM=; b=Gwcd3AeTTf37oin9mDQfbKSu5HBJHiqh6hjrkhIQswI2OMTADKGj70eadsbLqoT8ul i8zUxj3pCGxpKqjBXoqcJAn970LcDIo5TVAFLZCj9S9CwbJqKSqMNCVykzg+Jda/1BJv sp07sSLHeME+srfRAE6ePjrTpSoNvkXP5oxhEB2pn0uxswpFYOBj7gm8XavtJDi5Zeu/ G/KfJmUzKokq1yN88Uampcg9YeDAoo5IInXOkftsWOVDfT2chmFc0dI7aciMPL8Ugl3C DU1cStkGLmGB0GYpSGZcHRp0ElLqbrRQB9AHamWuf5u1ozapbl/wcIszPVAHi7xwyNFZ t18g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="SdF8/Z8E"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q16-20020a17090311d000b001a66c501a46si7711857plh.136.2023.06.06.11.08.52; Tue, 06 Jun 2023 11:09:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="SdF8/Z8E"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238785AbjFFRbG (ORCPT + 99 others); Tue, 6 Jun 2023 13:31:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38262 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238084AbjFFRbF (ORCPT ); Tue, 6 Jun 2023 13:31:05 -0400 Received: from mail-pg1-x549.google.com (mail-pg1-x549.google.com [IPv6:2607:f8b0:4864:20::549]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5A1D210F7 for ; Tue, 6 Jun 2023 10:30:55 -0700 (PDT) Received: by mail-pg1-x549.google.com with SMTP id 41be03b00d2f7-543a25df980so866050a12.3 for ; Tue, 06 Jun 2023 10:30:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1686072654; x=1688664654; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=dXKYuUg7HoIp7PZjxrN4e8/tttddAPBgDCmI9zzNWIM=; b=SdF8/Z8EJeQRk6nebFYNKI2ucCPZHcq5xy8rfaeU4njQPuJ7kQD4azGin/4+gcsoYN T9nCw0DFwLMYDwiicyCl+XEXq94tp9cQFrvkr7ZFTRPM/JB+daXfx0nXheK8kXrPF/dc /aC6zuULKdGJLxMhHBrUt+V4MzKkdO4sAQe+keAXvWNSCMaApSLvB3SBe+8DVBkjOYes P5hTSpCcJmIzeoyw+GZbX6//R83wPKpDiFqvMwtkpzDpUg9qrBi290KMuxvUwJuagkIm TzQoatrZ8G21t/ztprM6CizXlJOLzoQt+N/156P0Wvc97YTtFzZ242UvZXCanXGzqmri RQpQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686072654; x=1688664654; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=dXKYuUg7HoIp7PZjxrN4e8/tttddAPBgDCmI9zzNWIM=; b=GT0QPJ7qLvT1vPfX+DGt/Arrw8Wl7FT7XLQ4422v3/pwKj2ho8BOVq5eZT3BbEp3Fe DaA2yxOEI1nCHly62Uh92UDM97/1mAv2Wv2HUP4OOwrVS1YdNGxpZz7EV0y5/OQKS28U CSY0qtpV9bTHCQoq7ibBkBmg/9icwzV3aGq80aWCO1zDMxbRjebDR3zXxtDy4Dy63vlL +2lihoywkPvFXRcjcyj5gx+hM+DnYW1/G13Aegk9rLa7t0DPeVTWriIecxvEFrfixT1V SB5vleUiCcSjMtPtU2+2zRdNI7102BFAcrqH/ogYA+nhGwY8/Z7RkRwVKd5BbceoPQ8E L4sg== X-Gm-Message-State: AC+VfDyl+GEp+/oUztEcC5DG1g7q1Q4BQHnuYbIpb7blop8C/+R4oa4p +HnDYsHDKyUqWKvguGrFWd+HiVweEb8= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a65:58c5:0:b0:540:ca81:4a1d with SMTP id e5-20020a6558c5000000b00540ca814a1dmr571812pgu.11.1686072654653; Tue, 06 Jun 2023 10:30:54 -0700 (PDT) Date: Tue, 6 Jun 2023 10:26:57 -0700 In-Reply-To: <20230524061634.54141-1-chao.gao@intel.com> Mime-Version: 1.0 References: <20230524061634.54141-1-chao.gao@intel.com> X-Mailer: git-send-email 2.41.0.rc2.161.g9c6817b8e7-goog Message-ID: <168607240700.1276728.3313479971658390819.b4-ty@google.com> Subject: Re: [PATCH v2 0/3] MSR_IA32_ARCH_CAPABILITIES cleanups From: Sean Christopherson To: Sean Christopherson , kvm@vger.kernel.org, x86@kernel.org, Chao Gao Cc: xiaoyao.li@intel.com, Alexandre Chartre , Ashok Raj , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Ingo Molnar , Juergen Gross , Kim Phillips , linux-kernel@vger.kernel.org, Paolo Bonzini , Pawan Gupta , Peter Zijlstra , Thomas Gleixner Content-Type: text/plain; charset="utf-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 24 May 2023 14:16:30 +0800, Chao Gao wrote: > Do some cleanups about MSR_IA32_ARCH_CAPABILITIES in KVM e.g, fix stale > comments, elimite open-coded MSR reads, track features that can be exposed to > guests to avoid computing them runtime. They are found when reading the code. > > No functional change intented. > > Changes from v1 -> v2: > 1. toggle ARCH_CAP_SKIP_VMENTRY_L1DFLUSH bit when l1tf mitigation state is > changed by module param. [Xiaoyao, Sean] > 2. add more cleanups (patch 2/3) > > [...] Applied [2/3] to kvm-x86 misc, no need for that one to wait for the dust to settle on the "supported" snapshot. Thanks! [2/3] KVM: x86: Correct the name for skipping VMENTER l1d flush https://github.com/kvm-x86/linux/commit/02f1b0b73660 -- https://github.com/kvm-x86/linux/tree/next https://github.com/kvm-x86/linux/tree/fixes