From nobody Wed Feb 11 07:08:15 2026 Received: from mail-yb1-f201.google.com (mail-yb1-f201.google.com [209.85.219.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0A6731386B7 for ; Mon, 20 May 2024 17:59:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716227979; cv=none; b=obl4x0Gr+uBs5AdhHhePnoUgA3NmwRbr7DQu56el2dgZCc2r5QK344zla3DETpweFqotGvcoBWO5CyLOdyxp0sVGIWqXPmzqdbFUGyPU5DFs9ewC2Z+UQUiC108p+wknYA6Xyo+IWGJosBY4QtLlUOGD6CJC5/6GRJqxriUsvbQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716227979; c=relaxed/simple; bh=vF2Yj6737+T5fbLrkbfv86yxNTj8wyqqJ3uxL6wKpGg=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=lYfIMINgzvQ/cB3vi8EQmzefPVAC/hEphBD/p6M5FW0klSmFaVhOWUcDK/VQn6zr94/e0igtvy312TSOExTWzXVuCEoDD5GxtvHz6Acsyjii/6HXI4OTWxY20RsLRXVL8xmtRz+ZmM58bUbDXkmb584DM2NhNKJ83VJRu90PzZs= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=Vn0rEH0p; arc=none smtp.client-ip=209.85.219.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="Vn0rEH0p" Received: by mail-yb1-f201.google.com with SMTP id 3f1490d57ef6-de8b6847956so17520541276.1 for ; Mon, 20 May 2024 10:59:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1716227977; x=1716832777; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=iMAt8VWgn8RbL2AEggg8DaZQb1WLQqKQrSgsJ/ON8s4=; b=Vn0rEH0pZvBODPsX+Ug6nqB8rt28uqYNe3QRGT1Bwqf8PZR+8HO2BPuuseqiOlH3mL /bemnJUpJeLmtAD0IoupjFpfR65wN53b324f4n6JsBrxJEg3tH6sU4O6STv1KdaPfhHO Mfio7l7mOb3Vr5rFJvGZ5vun4X+pYvnWrodlcfIEizEfo9SDlRdcFEJYxJCiojyNQZdZ 4/39jfm1iHv/xMqzj3TcSM0luWgkL0v20oLwphAX30wq9yZtoLYEHufH2grYU13Yjtvs FQgqT3y0EG9WrC0iPtNroMzYRWQvWKfBWXYz6IDg3wc9lX8Mi7lmg6QxxhBJHuCU1p/i X9tQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1716227977; x=1716832777; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=iMAt8VWgn8RbL2AEggg8DaZQb1WLQqKQrSgsJ/ON8s4=; b=Ww7Ji1+UxtZbYRCJovbj6uqswUVOtggIRTpjFSm8s42aT/r46414VSrH+a6jGkC5jU OMv/IHNFNTgIXxtJzPD8vl3jEIi1pgd9/SMJmburxeDA7pjqfpk4NjlMLwKxbcAsYBia lvqjdAMPuqZwuuQ5uWOQrp20ojz/FWOf93jwpeqwHAU4CN1hJXbQgwnMuPyOXUEY09rh 56bzI5otWp8iV41oAIGB+cX5BXg5pV8okCgJCXH2SWMtCkktN4eUyLpX9z6M0hRShm9Q KjuiXd1OxB3/5eYrSqpgRtzqr5ifWkJQgZy2rsVVvdqiMvad+VGhfGbCDs2pS+lPo0Fe XPhA== X-Forwarded-Encrypted: i=1; AJvYcCVmiin+9+ZebN08JliQq/wcbMI0X6EayAWYLuR8HhUxYXmU6tCshWuRGSKOYrrwtOJ4FxgPkeysUxrPijVs/Qc8kXDVkDCHGuSZiXgG X-Gm-Message-State: AOJu0Ywj4nXGOZ3C6/MtcALcOXdXG2K0vqBGsBU+FYuU6bLc4Rhox7GF w5EFN92BbUH4YBhUbaEix64TLEvNFvd2gYmukXZDpIZlg5EHwtxIDkYCQv9yA/TnRz5aMKPYKiL mvQ== X-Google-Smtp-Source: AGHT+IHqN7Po+vXF35tjFtD/uavBNtiFJ0bwZsyAqbKYRm71GxGB2SMq71SviX0dXkXHWhjTRbsLdmTul78= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a05:6902:2b05:b0:dee:7d15:e987 with SMTP id 3f1490d57ef6-df49061563dmr2372632276.3.1716227977269; Mon, 20 May 2024 10:59:37 -0700 (PDT) Reply-To: Sean Christopherson Date: Mon, 20 May 2024 10:59:18 -0700 In-Reply-To: <20240520175925.1217334-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20240520175925.1217334-1-seanjc@google.com> X-Mailer: git-send-email 2.45.0.215.g3402c0e53f-goog Message-ID: <20240520175925.1217334-4-seanjc@google.com> Subject: [PATCH v7 03/10] KVM: x86: Stuff vCPU's PAT with default value at RESET, not creation From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Xiaoyao Li , Kai Huang , Shan Kang , Xin Li , Zhao Liu Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Move the stuffing of the vCPU's PAT to the architectural "default" value from kvm_arch_vcpu_create() to kvm_vcpu_reset(), guarded by !init_event, to better capture that the default value is the value "Following Power-up or Reset". E.g. setting PAT only during creation would break if KVM were to expose a RESET ioctl() to userspace (which is unlikely, but that's not a good reason to have unintuitive code). No functional change. Reviewed-by: Xiaoyao Li Reviewed-by: Kai Huang Signed-off-by: Sean Christopherson Reviewed-by: Jim Mattson --- arch/x86/kvm/x86.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index d750546ec934..32fcf2a81f39 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -12211,8 +12211,6 @@ int kvm_arch_vcpu_create(struct kvm_vcpu *vcpu) vcpu->arch.maxphyaddr =3D cpuid_query_maxphyaddr(vcpu); vcpu->arch.reserved_gpa_bits =3D kvm_vcpu_reserved_gpa_bits_raw(vcpu); =20 - vcpu->arch.pat =3D MSR_IA32_CR_PAT_DEFAULT; - kvm_async_pf_hash_reset(vcpu); =20 vcpu->arch.perf_capabilities =3D kvm_caps.supported_perf_cap; @@ -12379,6 +12377,8 @@ void kvm_vcpu_reset(struct kvm_vcpu *vcpu, bool ini= t_event) if (!init_event) { vcpu->arch.smbase =3D 0x30000; =20 + vcpu->arch.pat =3D MSR_IA32_CR_PAT_DEFAULT; + vcpu->arch.msr_misc_features_enables =3D 0; vcpu->arch.ia32_misc_enable_msr =3D MSR_IA32_MISC_ENABLE_PEBS_UNAVAIL | MSR_IA32_MISC_ENABLE_BTS_UNAVAIL; --=20 2.45.0.215.g3402c0e53f-goog