From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id C87EEC004C0 for ; Sat, 21 Oct 2023 00:34:18 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233210AbjJUAeR (ORCPT ); Fri, 20 Oct 2023 20:34:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48122 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230034AbjJUAeP (ORCPT ); Fri, 20 Oct 2023 20:34:15 -0400 Received: from mail-yw1-x114a.google.com (mail-yw1-x114a.google.com [IPv6:2607:f8b0:4864:20::114a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D69D0D6F for ; Fri, 20 Oct 2023 17:34:13 -0700 (PDT) Received: by mail-yw1-x114a.google.com with SMTP id 00721157ae682-5a7ed6903a6so18421847b3.2 for ; Fri, 20 Oct 2023 17:34:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1697848453; x=1698453253; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=l/l3UkJzV9Lopd0hoSKNnokZZ/oLpoHJjp/TOvxlez8=; b=GpHZ9GwEiLb5m5Wyx4FNbJ/IJOjLyDWbK2ZanOPlVpR9AYlIxjJOXfVA9WYSlq6GCx 8Lvk6msZtuarMWhJN7buzwbth/cVqFnMoJ4lOklEmkOle9JuzOX8aDbCd8VNEtU1uXra YkhaK/q1AQpg5AfvKgCGi9yEHHTh1WlYmkE3kWozqx7ZJ1VEfBFWITbrJxyu3aH7uO/R NbqdShdEw1FXrNYMi4OnQuZBzM17kyBBFwg6OPKO06FRhlZn2KMJ3kGF4nKmkVFfD5fv L1OTWDPAZEaO5fAPFhX+wXHeoDsZQHtSn96Ffd22GMX5WLkY5xPgMg0z9W2G8SOSRV8C iUYA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697848453; x=1698453253; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=l/l3UkJzV9Lopd0hoSKNnokZZ/oLpoHJjp/TOvxlez8=; b=q4PCnruKyCRjfIFOCf99yQ/RWboi6tlYbnH6GRCBXGVIC2sixJQJwuXMpUUsXRQGt4 97ZAtJ6sdpZrSU7lMcpFdW3f278rk/1jnPjKuh6KKr38wFKE5Y2vTclPWG7AQTwMU8lK K9vYZ+TnKj8B2fc26UFXKNXKDJ3CAK/tuYcDu4f2vlSyhmXkXl2Xds97E2TVWHS2XIss /C0r2N3y+58te0Joy/HUZGftJ/Tc/rI4Zh7ASxi/SOBDQ/05fX4CSV1ZEXxCn26jtk1U 0WyQJDNGd2C0skNtswv4p08mNzDVNfB/NtwbOVUph2zvXYwpvl6zotV0vkvjFKZSBbDI 02jQ== X-Gm-Message-State: AOJu0YxajWCMBP7gdUIwrwU+vmRAiy0lKdXY6uzuBx6uJSO0BGH1soIn v8uBOQzCIEpLSLQfCrcK5xOhZ1F87pI= X-Google-Smtp-Source: AGHT+IHGGC8nkB1wRJbFarlGVUIVZkTYT0GQ2L1f4TAHd8RVRBKy2a0lYnH91ghA1UQfOMrrTZHWfyHwIWY= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a81:48cc:0:b0:5a7:b9ea:5c9d with SMTP id v195-20020a8148cc000000b005a7b9ea5c9dmr77561ywa.8.1697848453097; Fri, 20 Oct 2023 17:34:13 -0700 (PDT) Date: Fri, 20 Oct 2023 17:34:11 -0700 In-Reply-To: Mime-Version: 1.0 References: <20230913124227.12574-1-binbin.wu@linux.intel.com> Message-ID: Subject: Re: [PATCH v11 00/16] LAM and LASS KVM Enabling From: Sean Christopherson To: Binbin Wu Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, pbonzini@redhat.com, chao.gao@intel.com, kai.huang@intel.com, David.Laight@aculab.com, robert.hu@linux.intel.com, guang.zeng@intel.com Content-Type: text/plain; charset="us-ascii" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 20, 2023, Sean Christopherson wrote: > On Wed, Sep 13, 2023, Binbin Wu wrote: > > Binbin Wu (10): > > KVM: x86: Consolidate flags for __linearize() > > KVM: x86: Use a new flag for branch targets > > KVM: x86: Add an emulation flag for implicit system access > > KVM: x86: Add X86EMUL_F_INVLPG and pass it in em_invlpg() > > KVM: x86/mmu: Drop non-PA bits when getting GFN for guest's PGD > > KVM: x86: Add & use kvm_vcpu_is_legal_cr3() to check CR3's legality > > KVM: x86: Remove kvm_vcpu_is_illegal_gpa() > > KVM: x86: Introduce get_untagged_addr() in kvm_x86_ops and call it in > > emulator > > KVM: x86: Untag address for vmexit handlers when LAM applicable > > KVM: x86: Use KVM-governed feature framework to track "LAM enabled" > > > > Robert Hoo (3): > > KVM: x86: Virtualize LAM for supervisor pointer > > KVM: x86: Virtualize LAM for user pointer > > KVM: x86: Advertise and enable LAM (user and supervisor) > > > > Zeng Guang (3): > > KVM: emulator: Add emulation of LASS violation checks on linear > > address > > KVM: VMX: Virtualize LASS > > KVM: x86: Advertise LASS CPUID to user space > > This all looks good! I have a few minor nits, but nothing I can't tweak when > applying. Assuming nothing explodes in testing, I'll get this applied for 6.8 > next week. Gah, by "this" I meant the LAM parts. LASS is going to have to wait until the kernel support lands.