Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp1032149pxb; Wed, 1 Sep 2021 15:49:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxj4wn4LP9YUPsbf57hHzRQmBrTT6nqsfjQVlMHcVmnb4McEIzoSqBqN9XesByUJW6K4QP2 X-Received: by 2002:a05:6402:14d6:: with SMTP id f22mr271667edx.274.1630536472471; Wed, 01 Sep 2021 15:47:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630536472; cv=none; d=google.com; s=arc-20160816; b=OWYPBk8frHP36zCDtqVH4yoMzjXXTONQ/9HArsyF8ieZxViVik8UVnhjgb9y9+rD/7 S1s07LVa+OU+yCa+z0Sf94E9RklaAv9mEEHp/bG2xtfOKJmqioSEQtnffYQjJWORY5dK 3+OOmzxZFUw+cu7g+LtDlkG7fWqQJEujKXBJs0gz4jt9EQOAO08TqenXH8fYsyZlUaLc ZpJpl3Eti+qXy6/f6PCv3a+ie0leIArVb7dbkzHj6fIWUjL3SrFTaUWxSEtmo3Wee+gF EAlnDHUYPc2nHFv4llWZPJQotsVD8qGevbaTnDMnZMOBMm9d0WdTYx+n3umGvVhFDs6u h59w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=dSXGTY+JbdvvDZ3iVz3szNk7yWsQ5juNTM8UNa0I5HY=; b=T1WnHPo0f/QYZBgTYcHcMU5Yi2fWa/jPQtJlJM+LOvaNNJRJ4j1LLMbkRq0J3kOAmW wZhI3RsPdktr3njFvSRpjJpOzWVrZKDyLfOuvcg6BIOAjAm2NhHVC2jt7CH+RMlFu4lv v5n5/4iD/RxgQlCgtkTt6OCikVET9rdTq2FUKHC9EjNITlr4dLwypCl/4SDXL4/fBZ08 eKYBnvXChcuBnisz7D2M9gLv0h5mi021Y+zMj/9QR0Vj6OEMluqxeDqjweFIzmR/e1iB O349iQI/l34aO0ckamSEMf2a9T11ClqDEUeZYc/IXzFzbJMGLQjNLX7jfj8hxEGO2PtQ Re8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=iOJguTgf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g16si114005edv.404.2021.09.01.15.47.29; Wed, 01 Sep 2021 15:47:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=iOJguTgf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232473AbhIAVqh (ORCPT + 99 others); Wed, 1 Sep 2021 17:46:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47086 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232085AbhIAVqg (ORCPT ); Wed, 1 Sep 2021 17:46:36 -0400 Received: from mail-pf1-x430.google.com (mail-pf1-x430.google.com [IPv6:2607:f8b0:4864:20::430]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 72AA8C061757 for ; Wed, 1 Sep 2021 14:45:39 -0700 (PDT) Received: by mail-pf1-x430.google.com with SMTP id 18so878013pfh.9 for ; Wed, 01 Sep 2021 14:45:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=dSXGTY+JbdvvDZ3iVz3szNk7yWsQ5juNTM8UNa0I5HY=; b=iOJguTgfI7Y49ou+2QSfxVWUN+qUbZM92T5KJprLmUT4JRcQ2B5ZhNYeLVK+IFiGce sbP3YMsWrEa1x3ld+0Rx3FSshNhBfLH7h8SY5rMBiJDwIokFG1EFgzr3NcxRx+nCBkE3 Ddt1oYGbHz4rd/fQjglwD2b9q3GhebLWG0hvfQD07Kice4+fegC2IUhMH5g0QSjvrpy2 ky/UvghuauKjYtifOSlOmh+ewCdQYr/CFoOEgRwFoYgRmDseGePyfGnpmcA5yAnvSbxP AVRoPW3l5P6iSuWRGym8l54imtxxiJB8JHokCmsjBi4l1SXKa3EywK/fbLO6hMpBHPR3 fivA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=dSXGTY+JbdvvDZ3iVz3szNk7yWsQ5juNTM8UNa0I5HY=; b=g0xiGNJ+6fq3gKjrIgtsYwSoDEW2f6711AJ4G4yuGwgBufz8Kiqxu8Q0yHzp2ZhhPa oeIPO7+hU3FTfE4GkNokqrKVpQF/4JrIpc0LITketoE875SVL9tQtBUbRt1nIdtNSduS D5jJKhFjnYs4VXXkb/8BXywIRXJL2QEOVMG+0On5bikHlM6usbHHq4peQpoRQRf0+a+i j2uZxkJRDSVtJx64WTbCFO7yLmk8EUcV0G67j3jO6a1ERoRSfHC68gDDu2D/MPDExzRZ tb7NMks7mvlT4EK1DRgysD1odknl+v+cIbLJsI0BB4i+NbjpRBDhKHm4o1Syu49GrPof DGmw== X-Gm-Message-State: AOAM533s6xrRAFHSLn57bJAFfBaghM9hv5IcHPMqIU68wa+aaPJoWhGQ 0pTt9iydcyLFkkDbsMpwQk75Yw== X-Received: by 2002:a62:a20d:0:b029:35b:73da:dc8d with SMTP id m13-20020a62a20d0000b029035b73dadc8dmr31695pff.54.1630532738568; Wed, 01 Sep 2021 14:45:38 -0700 (PDT) Received: from google.com (157.214.185.35.bc.googleusercontent.com. [35.185.214.157]) by smtp.gmail.com with ESMTPSA id m21sm387659pfa.137.2021.09.01.14.45.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Sep 2021 14:45:37 -0700 (PDT) Date: Wed, 1 Sep 2021 21:45:34 +0000 From: Sean Christopherson To: Joerg Roedel Cc: Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Brijesh Singh , Tom Lendacky , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-coco@lists.linux.dev, Joerg Roedel Subject: Re: [PATCH v2 2/4] KVM: SVM: Add support to handle AP reset MSR protocol Message-ID: References: <20210722115245.16084-1-joro@8bytes.org> <20210722115245.16084-3-joro@8bytes.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210722115245.16084-3-joro@8bytes.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 22, 2021, Joerg Roedel wrote: > diff --git a/arch/x86/include/asm/sev-common.h b/arch/x86/include/asm/sev-common.h > index 8540972cad04..04470aab421b 100644 > --- a/arch/x86/include/asm/sev-common.h > +++ b/arch/x86/include/asm/sev-common.h > @@ -11,6 +11,7 @@ > #define GHCB_MSR_INFO_POS 0 > #define GHCB_DATA_LOW 12 > #define GHCB_MSR_INFO_MASK (BIT_ULL(GHCB_DATA_LOW) - 1) > +#define GHCB_DATA_MASK GENMASK_ULL(51, 0) Note used in this patch, not sure if it's intended to be used in GHCB_DATA below? > #define GHCB_DATA(v) \ > (((unsigned long)(v) & ~GHCB_MSR_INFO_MASK) >> GHCB_DATA_LOW) > diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h > index e322676039f4..5a28f223a9a8 100644 > --- a/arch/x86/include/asm/svm.h > +++ b/arch/x86/include/asm/svm.h > @@ -164,7 +164,6 @@ struct __attribute__ ((__packed__)) vmcb_control_area { > u8 reserved_sw[32]; > }; > > - Unrelated whitespace change. > #define TLB_CONTROL_DO_NOTHING 0 > #define TLB_CONTROL_FLUSH_ALL_ASID 1 > #define TLB_CONTROL_FLUSH_ASID 3