Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp327241ybh; Mon, 20 Jul 2020 18:10:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzGAzIwYJp8bsBwWIfrMGw+Jhejdsff413BUX7/10eteowLkUeJCESQOPoOMcr/4SgRb7Wm X-Received: by 2002:a17:906:4a94:: with SMTP id x20mr24254437eju.539.1595293849598; Mon, 20 Jul 2020 18:10:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595293849; cv=none; d=google.com; s=arc-20160816; b=JPkA6cqKE/wIisrL98kzcMHIioHMAe+qXvU+dT9JMhiSxJs7xOae3hLnEA+nuJNR9D 4hQ+Ea8+ly5K9Hh6V6dfvXSECsEywnZJgrgC91LxPC/qJwsKWgtkTEzJ1izHj+xu22pb Ezr03QIvf0kNjp4KCPoJu12RTMTaF1x20n9BJwtio/G89hdaBPgMeVeAr+Ik2eGPbaZL ZnU2ZWYZhZQkE9FFbncr1wVsZdlcDh2PHvt/Gk4iPh8DW2+dqcABF3KGfy51DnkOaSfK O9//xvRNgSn453B10w+DcuC79KSxI6p4ODpW/d+4UNqby4Ka3OI8h0tUCEOJ8ZY0ulVj xUSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=dt+Q1yBp4pDTEEa5JxC/tBw6WPMfkbJUYHcrzD2fQPw=; b=S28sLh2rj3nyTOIRLo35J0YLNL7DcytLLp5BVVMLFTq7lF82mnu/CivLp9CiKABYLR PZQ6khaPybPkcoyOK08ObulaEt5igFbQTB1rT46AR+RWgZeFZoeyQ2n5jO48PoFTcLqI NVFrKlJzXEUkNWRyObk4MP+ih40k87nGUKhE23AXvNlsL6Wyr2rASDvxd9HX/UMZNYNG qXwca9JQ4wRgatONwNIJ2qY+iGyJSKKZNdcuUYrxMIg06GP48kFvkL+4yu7ngGlMhlcL w71uBQnlVXZ0Rd1Dm303l3sBVqz814QZ/hHM3qqJShp/AgChwec2mKA5py5CGsDdY5vQ c36g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=UvsgbLTU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 18si15198205edv.191.2020.07.20.18.09.47; Mon, 20 Jul 2020 18:10:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=UvsgbLTU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727119AbgGUBJc (ORCPT + 99 others); Mon, 20 Jul 2020 21:09:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41960 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726127AbgGUBJb (ORCPT ); Mon, 20 Jul 2020 21:09:31 -0400 Received: from mail-oi1-x241.google.com (mail-oi1-x241.google.com [IPv6:2607:f8b0:4864:20::241]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8E195C061794 for ; Mon, 20 Jul 2020 18:09:31 -0700 (PDT) Received: by mail-oi1-x241.google.com with SMTP id 12so15911365oir.4 for ; Mon, 20 Jul 2020 18:09:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=dt+Q1yBp4pDTEEa5JxC/tBw6WPMfkbJUYHcrzD2fQPw=; b=UvsgbLTUQVe3b9JkR+S3lcYaaULY2+DOIgYkocU2xTKRCoNAhp507MLqfV8Tr7TxY5 SV2680GHMFFcbul/qFtIEHUMySCfPwia7v4SzLorXXNiUDtiD7SZ9pOE2+AnZPIxqCrp nAJ9T6tfwuFOr8XBFfc9SwXZAdsJkxeP/C6j/NqQJyf+3vXmHBVk56fpwRATQ6TWtoOt gkob0DsXY93bLDeEgFEEyShn8N6C7hky2zBopNoCIWijwswFg7cyrrQssMsACCIxfoXy 8LJoO6CFPVZ32L5qPqKXFAVxKcNVCYvNxpdATzgIgnvq3t5A8Ld4C60w5CNENQWJM2M6 d2lg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=dt+Q1yBp4pDTEEa5JxC/tBw6WPMfkbJUYHcrzD2fQPw=; b=l4uQV3cZYxgSABs7dyMqYDzZd6+cndMCijZQ6DnIklOpW5ugU1J5nPXG0BkqNGOQ4R tNKTlEPGUmvMG2Ec6J11kXKs6sExkXWuIJr43rh3qHeqlj1N0Em0mAKF+AdAJtjRup3j k4K19evMMY+8ofw9GWlkmC57F92AG7E/zV18n4ZteF7yr5nhxVFqavYm5j7RrAoiMH8O 5WFM+1P3mZAGk2f8WY2CG7K/2RPqrYSc0lrf26ROBewCOq6eu2uXxPC6toT9d6fMqfeR hpE0rFUNAuxTc96+7yzonMnFhKT8NfnQ9dyrQwBY0iCRnIDArkeu0gofLt9wE1AXZ+9s t54A== X-Gm-Message-State: AOAM531YXSLqkJhQ7UwHA4M3RqnKvgXSYbg3AR+KKyHrSxDSE4Z3dl1C OsncvNBaEgbPT1tJY3Z+UcCEjjqrn3HnumHzSCQ5UQ== X-Received: by 2002:aca:d643:: with SMTP id n64mr1432769oig.33.1595293770513; Mon, 20 Jul 2020 18:09:30 -0700 (PDT) MIME-Version: 1.0 References: <20200714120917.11253-1-joro@8bytes.org> <20200715092456.GE10769@hirez.programming.kicks-ass.net> <20200715093426.GK16200@suse.de> <20200715095556.GI10769@hirez.programming.kicks-ass.net> <20200715101034.GM16200@suse.de> In-Reply-To: <20200715101034.GM16200@suse.de> From: Erdem Aktas Date: Mon, 20 Jul 2020 18:09:19 -0700 Message-ID: Subject: Re: [PATCH v4 00/75] x86: SEV-ES Guest Support To: Joerg Roedel Cc: Peter Zijlstra , Joerg Roedel , x86@kernel.org, hpa@zytor.com, Andy Lutomirski , Dave Hansen , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , David Rientjes , Cfir Cohen , Masami Hiramatsu , Mike Stunes , Sean Christopherson , Martin Radev , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, It looks like there is an expectation that the bootloader will start from the 64bit entry point in header_64.S. With the current patch series, it will not boot up if the bootloader jumps to the startup_32 entry, which might break some default distro images. What are supported bootloaders and configurations? I am using grub ( 2.02-2ubuntu8.15) and it fails to boot because of this reason. I am not a grub expert, so I would appreciate any pointers on this. Also, it would be nice to put some error code in the GHCB MSR if the guest dies for some reason in real mode. Currently, it just dies with no information provided. PS: sorry for sending twice due to the wrong email body type. Regards -Erdem On Wed, Jul 15, 2020 at 3:10 AM Joerg Roedel wrote: > > On Wed, Jul 15, 2020 at 11:55:56AM +0200, Peter Zijlstra wrote: > > And recursive #VC was instant death, right? Because there's no way to > > avoid IST stack corruption in that case. > > Right, a #VC exception while still on the IST stack must instantly kill > the VM. That needs an additional check which is not implemented yet, as > it only becomes necessary with SNP. > > Regards, > > Joerg > >