Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp3647426rwd; Mon, 22 May 2023 18:01:17 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4uHXdtp7yMSxoJ3vLjckYygIbkgS1n69k3HMEP46l21/ED59H1Zfk/56d6ZMc1y29XVTa9 X-Received: by 2002:a17:90a:f601:b0:24b:4e7b:c689 with SMTP id bw1-20020a17090af60100b0024b4e7bc689mr10270770pjb.35.1684803676851; Mon, 22 May 2023 18:01:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684803676; cv=none; d=google.com; s=arc-20160816; b=a2eeQpRQvsR1FR/8BZQD60gnh7juNjtN5pn1hEcKOkMBQIs5hhp1WH7okQRkqnT2g8 8a5tI2wzJ8OrzRMPiienTinEOcNoKYrIvdYyidjPJA0+xJrV5YRiOB86E04LoK2y/t9r QbcnHMs/Qe8Pl+3dRpx3R9qRhLxSwoTTfgEQzQpE4XJp9f43o2pKf7944TwYN5EVobBH Yx7oNQM29PQ5eeKwnz13VsSzbdXaTDJCddJrmU8FlGd2cSimSEvwSvZbRHK81sI4VIOA JkAFhbrKprZpBiDnKm5EoDyc69g8aP0I31CJ7dEnX2IWvF3pG/c/Ji9ObZMQt7rpcRjh xzVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=ekC19PIQyLsypV92abyxoKEPsTE8/RNRPDLgJ2n15Xw=; b=XJ3z0ckwmd6I7gdKmFtuf6L6us3WXwzsHPAjsKI2PePjLhi+4eslpWdoeI0pshM7iM j6GifUGErxK0SJFo7BjDyDwf2ecaCH3vjTJHJhpLSwe3rRMb640uDm9Czoj2YDWkFWD9 v3ons/SyAvu8vwcF8QtvZjnaY733FgxltM3Yw4np31O5asHtMwMOgC7xYOhRj1EVzGkF 6g6l3043dkypWJhJBxSVz8xeP6xSXJkzapujimA3lAZyhbC55K7BCT7NQRQ8O+8D4h68 u9ntnQPZ6eJEoVXVfibQqn3oG76ZxClBPx8pVBfmGzuttI5mXYobGhF/VIMPuWIijeH9 kL1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="XN/1MyZI"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 22-20020a17090a0c1600b00246a5991cc6si5476145pjs.162.2023.05.22.18.01.04; Mon, 22 May 2023 18:01:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="XN/1MyZI"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235575AbjEWAhj (ORCPT + 99 others); Mon, 22 May 2023 20:37:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38356 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234952AbjEWAIw (ORCPT ); Mon, 22 May 2023 20:08:52 -0400 Received: from mail-pg1-x54a.google.com (mail-pg1-x54a.google.com [IPv6:2607:f8b0:4864:20::54a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AF096189 for ; Mon, 22 May 2023 16:44:37 -0700 (PDT) Received: by mail-pg1-x54a.google.com with SMTP id 41be03b00d2f7-5289ce45f11so1931427a12.0 for ; Mon, 22 May 2023 16:44:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1684799077; x=1687391077; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=ekC19PIQyLsypV92abyxoKEPsTE8/RNRPDLgJ2n15Xw=; b=XN/1MyZIwyCwFy4GqYg6SisMPygLRn1w/KxRcndnfp8FedfFhluWIe6zqiyVwM1UeU OY3vFQ7yEZup9IP1qga1LMBRrXj1JEolz+4/QZH6GQaFLPN4BEnXY4r0VeLy4lJyOFr1 xIijqf8wziKNLu2DAMq8dy1p8VzmANU0vqlnAhRzV1ZamylAV6SuxDH/pAnFlbCaXwbV btkpSqyMvH6DsaKKoCxMVNEVOaAjW2rTlfACiBbW7CKRtJRnCVFfF91T5cPV0dsX+Qd7 ZcFvB3MhTQOQQHBWsYX+VU2Pxav357ooGahGZKk8WApiGh245eAIH909YarXj2hsxQmz puLg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1684799077; x=1687391077; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=ekC19PIQyLsypV92abyxoKEPsTE8/RNRPDLgJ2n15Xw=; b=RliDQV5Wh9HSugveXDFGAQ96MlSfmGnWjmKQuea1OOaMvC5t6R7uThev5trDnD/eu9 HFMbY3X1nlBGEggIbbJuizl1FTKtoRORiirsArk4NlUW3nghrUMpl5GU4UqLPpnW+Kv4 nJ124gS5MUHi8lBUT8uSzdCkkWIhGWmyoF08Q2l92PWM3BTEMEpAJutr22p5Sr/yN0DN YkUdnWXL2MreyTvLoP5Vye6/9yRrTrNBzqfSryh6VpNA95pUkv1U8ULSRG6aDdMwvDG2 XC6ODRSkUVD/rGDv8CZEue45DqSmfdEbjyd5Mt73J7gR9G0xltV7ZPa1HgGoF80Pt2AI HdYQ== X-Gm-Message-State: AC+VfDwH1fWqu0ts7vCPTFiYT1J4Ih5nOo15nfkw52w6M5dcQkqLITPu SZydZb/WWz2PrSibmUMv1DCyI4BDr9Y= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a65:6451:0:b0:51b:61f8:6d6 with SMTP id s17-20020a656451000000b0051b61f806d6mr2905284pgv.0.1684799077101; Mon, 22 May 2023 16:44:37 -0700 (PDT) Date: Mon, 22 May 2023 16:44:35 -0700 In-Reply-To: <20230411125718.2297768-7-aik@amd.com> Mime-Version: 1.0 References: <20230411125718.2297768-1-aik@amd.com> <20230411125718.2297768-7-aik@amd.com> Message-ID: Subject: Re: [PATCH kernel v5 6/6] x86/sev: Do not handle #VC for DR7 read/write From: Sean Christopherson To: Alexey Kardashevskiy Cc: kvm@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, Tom Lendacky , Pankaj Gupta , Nikunj A Dadhania , Santosh Shukla , Carlos Bilbao Content-Type: text/plain; charset="us-ascii" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 11, 2023, Alexey Kardashevskiy wrote: > With MSR_AMD64_SEV_DEBUG_SWAP enabled, the guest is not expected to > receive a #VC for reads or writes of DR7. > > Update the SNP_FEATURES_PRESENT mask with MSR_AMD64_SNP_DEBUG_SWAP so > an SNP guest doesn't gracefully terminate during SNP feature negotiation > if MSR_AMD64_SEV_DEBUG_SWAP is enabled. > > Since a guest is not expected to receive a #VC on DR7 accesses when > MSR_AMD64_SEV_DEBUG_SWAP is enabled, return an error from the #VC > handler in this situation. > > Signed-off-by: Alexey Kardashevskiy > Reviewed-by: Carlos Bilbao > Reviewed-by: Tom Lendacky > Reviewed-by: Pankaj Gupta > --- > Changes: > v4: > * rebased on top of SNP feature negotiation > > v2: > * use new bit definition > --- > arch/x86/boot/compressed/sev.c | 2 +- > arch/x86/kernel/sev.c | 6 ++++++ > 2 files changed, 7 insertions(+), 1 deletion(-) Can you post this separately (or bribe Boris to grab it)? IIUC, this has no dependency on the KVM enabling, i.e. can/should go through the tip tree without waiting for the KVM patches to be applied.