From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B12D7C43334 for ; Mon, 20 Jun 2022 11:00:28 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241175AbiFTLA1 (ORCPT ); Mon, 20 Jun 2022 07:00:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51498 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240411AbiFTLAW (ORCPT ); Mon, 20 Jun 2022 07:00:22 -0400 Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3331C55AE; Mon, 20 Jun 2022 04:00:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1655722822; x=1687258822; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=5kEN8LEeudPIKeDQ20lyx4aW7nBMG8/Yp54OnqCaljs=; b=Mo1UGGShxIdhLR/5PXFaiZ5T4YOS7UFIqLlOPzPhqJOAbgpFE4gudmnG h4LEeijUb3fif4jZfJUHPMHxT08kG8wr+HSCvmPUHIk3QG60s7QqpTt1p 8YpILD9uZhaW+b3AZsXoiutNr1A4COuNtQtLtoYp4rRaeZBAibqLZv+QN XPpQfUYH4ZS1GWcKCistBJOpGl7wownbei32xmffEjFT4FdtIS74aAK7z 3YfUaMIwa6GQPaZxyrn7ZZsPuhHh4Wmfl6IUFIYio5TToZgh69agZhSi1 ooafz6SgFCRXJuSwGbhKAUkIrjkzG3y1IOC/9XGDEF06FGOXnQvRZjbxd g==; X-IronPort-AV: E=McAfee;i="6400,9594,10380"; a="341547247" X-IronPort-AV: E=Sophos;i="5.92,306,1650956400"; d="scan'208";a="341547247" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Jun 2022 04:00:21 -0700 X-IronPort-AV: E=Sophos;i="5.92,306,1650956400"; d="scan'208";a="591125969" Received: from gao-cwp.sh.intel.com (HELO gao-cwp) ([10.239.159.23]) by fmsmga007-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Jun 2022 04:00:16 -0700 Date: Mon, 20 Jun 2022 19:00:02 +0800 From: Chao Gao To: Shenming Lu Cc: Zeng Guang , Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, Dave Hansen , Tony Luck , Kan Liang , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Kim Phillips , Jarkko Sakkinen , Jethro Beekman , Kai Huang , x86@kernel.org, linux-kernel@vger.kernel.org, Robert Hu , zhouyibo@bytedance.com Subject: Re: [External] [PATCH v9 9/9] KVM: VMX: enable IPI virtualization Message-ID: <20220620105957.GA9496@gao-cwp> References: <20220419154510.11938-1-guang.zeng@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 20, 2022 at 06:02:32PM +0800, Shenming Lu wrote: >> + if (enable_ipiv) >> + tertiary_exec_controls_clearbit(vmx, TERTIARY_EXEC_IPI_VIRT); >> + } >> vmx_update_msr_bitmap_x2apic(vcpu); >> } > >Hi, just a small question here: > >It seems that we clear the TERTIARY_EXEC_IPI_VIRT bit before enabling >interception for APIC_ICR when deactivating APICv on some reason. >Is there any problem with this sequence? Both are done before the next vCPU entry. As long as no guest code can run between them (APICv setting takes effect in guest), this sequence shouldn't have any problem.