Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp3087337rwi; Fri, 28 Oct 2022 15:49:10 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5a+Pp2CJB71wuBz4pAQypbvnRNY/5wPJQMdDx3NI1qsXXTyk/GweISL19zZCff14Bdqjgg X-Received: by 2002:a05:6402:4148:b0:440:cb9f:d10f with SMTP id x8-20020a056402414800b00440cb9fd10fmr1626126eda.77.1666997350139; Fri, 28 Oct 2022 15:49:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666997350; cv=none; d=google.com; s=arc-20160816; b=Vu3jtlkWiuNMdJu5jM/zBjAoW6iuSDb0lwcjfAy0KSPtIaBoV5PDKjSFLdhhflEmKD JYIG6Pj5D/7jMFVqHkpVUimlu6ZGMekQNWquXtIIp8JG4otrbgIC122rz5ouztJ+zfHU x3sz+lmH+w7q3kVavCh7E0ii2JPF/xPFWhxAi1bKTzGjs7/Y658ein0s5wi/nxSzYeI1 OgB2weRxjmiGW9NNNZWeGA2ubXckgJGDkCdal7CbmoY0ljryVYMLu3Q9pRFW7Al00ORc TPbJ0Eg9yOlY6KCxkZk0nw2xEvZAhHBOjks3XOgvHXQoaQZvzA/6TL8UDrWUviOTOuxS YqhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=qiyREI2SgqEB0J7OWHvr962cdqJ8Dp9P5OV9egU229Y=; b=Jey+ddoSWB+p3Ngr4BF9+RvvR7t20WfHGJcjJMN5P/J/pjbMDZicOw9xkP2EAYoD2o PV3b+yr1xVyoCdoGPiXxiIVyJia4q24cRrECi5kQM9zkBeRhjSvhSpkJPfXaAYfWO3NF PZITpVV22oRNpL52dGH1ivkrF/OPHc4z7lzSWnXi401eLWCI0SQbYhrDDgC7Rwy5tz1p 8SzbJ829lOW5U4a/8WIouk0W2doNToYPHOdyP/kjuS3v9x6goUqJ+L237sMRN9/Ghv9t 6/havFH9YbBw3pIfkzmwzXdxDZdPj/ov6s835Rk9DsY5F74wVYDuW8XSEL/p9DarqXxp VGjQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=RMT+IuqV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v1-20020a056402348100b004617e8811c4si6076135edc.28.2022.10.28.15.48.44; Fri, 28 Oct 2022 15:49:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=RMT+IuqV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229909AbiJ1Wmc (ORCPT + 99 others); Fri, 28 Oct 2022 18:42:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44238 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229744AbiJ1Wm3 (ORCPT ); Fri, 28 Oct 2022 18:42:29 -0400 Received: from mail-pj1-x1031.google.com (mail-pj1-x1031.google.com [IPv6:2607:f8b0:4864:20::1031]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 69A2F1C3E7F for ; Fri, 28 Oct 2022 15:42:28 -0700 (PDT) Received: by mail-pj1-x1031.google.com with SMTP id d13-20020a17090a3b0d00b00213519dfe4aso5752136pjc.2 for ; Fri, 28 Oct 2022 15:42:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date:from:to :cc:subject:date:message-id:reply-to; bh=qiyREI2SgqEB0J7OWHvr962cdqJ8Dp9P5OV9egU229Y=; b=RMT+IuqVyDLxzVmXaVtVtqLevGLIyWNxAWTJBPXpIiQWhWr2HbTMty6+sDQVRUAPva +lRry2mLQfsIjIOH1wclj9jcvG8dGoOGwtjb2sOTHDuX9EoZ7dfMWrYUUIQ9yr6i00Q7 jyJ6hPbNO+Npnuxj/JkvV3C7J72NONB7xto3ixhTU4ZbfYYqApiQiKPp/YGYEY9Di3YO IrGaw2VOWZpf+mPFPUVUSt2+p607jbxmqSUk/hRYMl4CeBmTnPIpcd5LvTBmnBl+D3ry ZsnR2POs2hnnRJBpzSHh6XSuRX2nuzvOmpYaErnyg9eT2C5vngho7r+qU3mDogzBh4T3 AxxQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=qiyREI2SgqEB0J7OWHvr962cdqJ8Dp9P5OV9egU229Y=; b=xSIyNI6zgylfodndcaT00X/6RgMDjFUrQiMLErG6vb/hxAX0n/hp5ci2ia+Fv3AW5/ X9D/FJa6rnsEjFnMQ43nISS9k6+0fstIBJZxsNRhkKtqfU3xjRn1sN0CFelu4sBnkgcT Emtv3BkQvqoeKUfk36aQL+zl3na8pkPT1mW+zuwuMLxb9IZKnWHAbqgvo+PjDr+WQvHW eLtgs+7OluypQO2Ddu4RwmwFgB+21oC/4R2rtS80rsScxAXOE1zZfahFC+uQcjHiAAwo q8/J5/9GAZqwp5BrjzeUHVWu8xQSZH+EHvXPferhsOCuL3v7paglf0wr6OVGjDNxtgZs oKEQ== X-Gm-Message-State: ACrzQf2ivePKD0OcWQ/sKmk5uK0GQmZ7m4Y7rhdS7PjeIZpYQcDzkR26 m/Fn6Oc2SDSAXwCeYXoadp8kEw== X-Received: by 2002:a17:902:f683:b0:184:d45b:a096 with SMTP id l3-20020a170902f68300b00184d45ba096mr1267483plg.23.1666996947750; Fri, 28 Oct 2022 15:42:27 -0700 (PDT) Received: from google.com (7.104.168.34.bc.googleusercontent.com. [34.168.104.7]) by smtp.gmail.com with ESMTPSA id f13-20020a63f74d000000b00462612c2699sm3175221pgk.86.2022.10.28.15.42.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 28 Oct 2022 15:42:27 -0700 (PDT) Date: Fri, 28 Oct 2022 22:42:23 +0000 From: Sean Christopherson To: Paolo Bonzini Cc: Maxim Levitsky , kvm@vger.kernel.org, Thomas Gleixner , Yang Zhong , x86@kernel.org, Jim Mattson , Vitaly Kuznetsov , Wanpeng Li , Shuah Khan , Guang Zeng , Joerg Roedel , linux-kernel@vger.kernel.org, Dave Hansen , Ingo Molnar , linux-kselftest@vger.kernel.org, Kees Cook , "H. Peter Anvin" , Wei Wang , Borislav Petkov Subject: Re: [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes Message-ID: References: <20221025124741.228045-1-mlevitsk@redhat.com> <0e3a0cab-1093-3e83-9e9c-f8639ebe5da0@redhat.com> <4ce3d40e-9b2a-5f81-fc62-839f788fed16@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <4ce3d40e-9b2a-5f81-fc62-839f788fed16@redhat.com> X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 28, 2022, Paolo Bonzini wrote: > On 10/27/22 19:06, Maxim Levitsky wrote: > > On Thu, 2022-10-27 at 18:49 +0200, Paolo Bonzini wrote: > > > On 10/25/22 14:47, Maxim Levitsky wrote: > > > > This patch series is a result of long debug work to find out why > > > > sometimes guests with win11 secure boot > > > > were failing during boot. > > > > > > > > During writing a unit test I found another bug, turns out > > > > that on rsm emulation, if the rsm instruction was done in real > > > > or 32 bit mode, KVM would truncate the restored RIP to 32 bit. > > > > > > > > I also refactored the way we write SMRAM so it is easier > > > > now to understand what is going on. > > > > > > > > The main bug in this series which I fixed is that we > > > > allowed #SMI to happen during the STI interrupt shadow, > > > > and we did nothing to both reset it on #SMI handler > > > > entry and restore it on RSM. > > > > > > I have now sent out the final/new version of the first 8 patches and > > > will review these tomorrow. Thanks for your patience. :) > > > > > > Paolo > > > > > Thank you very much!! > > Queued, thanks. Note that some emulator patches should go in stable > releases so I have reordered them in front. Can you fix patch 04 (also patch 04 in your series[*]) before pushing to kvm/queue? The unused variable breaks CONFIG_KVM_WERROR=y builds. arch/x86/kvm/smm.c: In function ‘emulator_leave_smm’: arch/x86/kvm/smm.c:567:33: error: unused variable ‘efer’ [-Werror=unused-variable] 567 | unsigned long cr0, cr4, efer; | ^~~~ arch/x86/kvm/smm.c:567:28: error: unused variable ‘cr4’ [-Werror=unused-variable] 567 | unsigned long cr0, cr4, efer; | [*] https://lore.kernel.org/all/Y1xNso2nYZkSSZ0T@google.com