Received: by 2002:ab2:6203:0:b0:1f5:f2ab:c469 with SMTP id o3csp2266483lqt; Mon, 22 Apr 2024 06:25:46 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCU12XCLB2kVFk+08iFf5KsZRQA9qhDHB/u5Ni1YuHUX3UvSz5TDYkv64Wyld2Gx9Lr2AQc1gZB4gAv1aNd1O/2M5z6nVzBzSMs+wWw7ZA== X-Google-Smtp-Source: AGHT+IGRYm0kb+ju5spHKOPYBRpCDyqe7zYjfUKC+uqtao+4mXx3bDQfjUtRBgsISVw+aYMrC3ZA X-Received: by 2002:a05:6a21:279d:b0:1ad:3d92:fdcc with SMTP id rn29-20020a056a21279d00b001ad3d92fdccmr1047766pzb.33.1713792345890; Mon, 22 Apr 2024 06:25:45 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713792345; cv=pass; d=google.com; s=arc-20160816; b=FwEb/cyRZvzCGhbgVD0+2vQMxKfW2XVVCmHYxT5i6EXLDZp/hnTzKKaJ0lB27twjbo A0DaJN+XLBcSJRhETMJ0i1IIPqWemN8K35MJh+w5hnpFbVOcW/NqcavT1F9DtcvaVB4n HbTKfuLzePS4xlBvZtWVzPth3vbXhR5DuTPp5IKxk+NGomo4kA4s9mSJG/zD1MYnP7wt GNiNFPeVK2bGkgbDmsBv+6q9aXNbdLY7cOnbibI0imG0x+PdkDglJSIXvMlYwu4zMXNt X/YwmGS36qU83c5yGI0f/ZvynnJOFdDEaT0EyxvfL8nmri8k1NRQyKuGH/0/e62QO7rj 19QA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=qmP5qyvqIWfUfyAhEfkmOf7gu8DbOspWfu7561GReo0=; fh=AGFBHHpYN5mv0+SnhFXAMmpvv/XoqVIL2B5IsBP1bYU=; b=TsBMXPvUGT4ak6g5qw6Tp0SfJYcDAQZL08RiWmjO12qiUHN1LOUwPx7duIKZPF1jTM 1lhEZAVlh6mYf/f7GTNe4NDo/SBG42T+U6lr3Uaz+mDD4W3jEtux0JhOCxRW91oKbGtb On8Jt5kC63osW0mT43O/ijrYgtDB5RNvPCKZcqJQReauH2e/1JZqIchFuBYjorUaW+oM rF8ViSyqsCM8bU26wwSVR/TjqL8OSUETE4T+Q5+sFGxkAusTmU7hkbjhZ8RvJGvSqql6 3P80kr5MOUqZMUow5HrIVPHaQibNVZUWqDqWxoXZCM1IKgeGYT3GCW2zfLUhBklJTOWa +lyw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=LpxCAOKJ; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-153438-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-153438-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id 186-20020a6302c3000000b0060088f00fbfsi1382545pgc.724.2024.04.22.06.25.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 22 Apr 2024 06:25:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-153438-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=LpxCAOKJ; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-153438-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-153438-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 643F0281F03 for ; Mon, 22 Apr 2024 13:25:45 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9F6E03399F; Mon, 22 Apr 2024 13:25:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b="LpxCAOKJ" Received: from mail.alien8.de (mail.alien8.de [65.109.113.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5C1AE14F13B; Mon, 22 Apr 2024 13:25:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=65.109.113.108 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713792337; cv=none; b=cJuwjyXu1zgVf4ZD36JH+xLwd1eKQb0/s9JImYtfIvvst8Q5gPYyxLe20aWLFTc7CycoY6GTArbvODfJQ0WVLPdDed6seAQhofI3We69MKbh+R7Y1tGgEoXp47nL/obmgkxYDucatnAN1JoE/y4popFvnV/3qYsFtUsTMvwc4p4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713792337; c=relaxed/simple; bh=5DvoennQmckQFIaYiAoIASFU7DEMjeJ/9hYgo86JV4Q=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=BDu9EOg4ufIum4zP28HRnlz8o/QqEMXl684TWkwF+AN6nZe5cUwqHXpZBLWG2byT+xJ8YI+ge+XDU/7DbxnUxlKkS6i92i4u5HWrNWVsNA4Pa8Cwt71v1HMkt1Yvgvmiwov6nn2QHEjjWJzieGoX2lwQFL7mABP1jM/VpqrY8bM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de; spf=pass smtp.mailfrom=alien8.de; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b=LpxCAOKJ; arc=none smtp.client-ip=65.109.113.108 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=alien8.de Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTP id 3852D40E0249; Mon, 22 Apr 2024 13:25:34 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at mail.alien8.de Authentication-Results: mail.alien8.de (amavisd-new); dkim=pass (4096-bit key) header.d=alien8.de Received: from mail.alien8.de ([127.0.0.1]) by localhost (mail.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id BwRWVbxTdVd4; Mon, 22 Apr 2024 13:25:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=alien8; t=1713792330; bh=qmP5qyvqIWfUfyAhEfkmOf7gu8DbOspWfu7561GReo0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=LpxCAOKJ21rdSnLNOzU4D1RYdLRCcOX2VTRJl+WnZAAJER9BSoDoOoFUwSAfg0rXi LQ+lejeMqvQcilsI/ysnlsXOJP4uGjrMIkMwBsJMCr2rxofLa0EltkVaG7Fnf8WWkg w6KMQDlV+bD1NVWOBdw/azhFpCZsvLURHi9CjTuEvhk2J8p81+tcJYDN7kZK+5r+ax xzLmPYU9OyD2uiQ+foh31Rlgb5BbacfVfrpU2Kg22MTMW39XfMawcUsMi21aihT4ow zbc0SDszmzKIkjX2CNBx21Ju8LjXTA9BvyUyo6Io5IlBaI0V2ZdcfbAR9Hwzws0wsy tPDP4efGU9staHn0IL70Dg1qSC5y7BAgxJAaPbzWXHnnmcMcNLkzVgH55b9kfdT5ME OocJt1YeHp9iEgO3PZnZYGVL8/gZnpixfnUAjuj2AsWjzIdM/aid3/9csPHhn0jBAT 6tnNt90ARUBsFTsdBCYH0Wi7VXhXmOH6t8U1Tgpk2VeCUclKQ5ilNTeoeoCug+Ymi2 mUWMVb9ffqqFX7ObfNR4a/Xv8dd55f5dlDGI1RxaH00UPXmF6eqk05oTrpHQox9rVf X46/BwuskG8km0gvd0nn19nqJLPdkSDM+plKwrWyHENf6UkmzjtO1D8CjkXAq61GDP f0+C1kFv+sAnbpSE2WtU0gMI= Received: from nazgul.tnic (unknown [IPv6:2a02:3038:209:d596:9e4e:36ff:fe9e:77ac]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 523A140E0240; Mon, 22 Apr 2024 13:25:19 +0000 (UTC) Date: Mon, 22 Apr 2024 15:25:21 +0200 From: Borislav Petkov To: Nikunj A Dadhania Cc: linux-kernel@vger.kernel.org, thomas.lendacky@amd.com, x86@kernel.org, kvm@vger.kernel.org, mingo@redhat.com, tglx@linutronix.de, dave.hansen@linux.intel.com, pgonda@google.com, seanjc@google.com, pbonzini@redhat.com Subject: Re: [PATCH v8 09/16] x86/cpufeatures: Add synthetic Secure TSC bit Message-ID: <20240422132521.GCZiZlQfpu1nQliyYs@fat_crate.local> References: <20240215113128.275608-1-nikunj@amd.com> <20240215113128.275608-10-nikunj@amd.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20240215113128.275608-10-nikunj@amd.com> On Thu, Feb 15, 2024 at 05:01:21PM +0530, Nikunj A Dadhania wrote: > Add support for the synthetic CPUID flag which indicates that the SNP > guest is running with secure tsc enabled (MSR_AMD64_SEV Bit 11 - "TSC" > SecureTsc_Enabled) . This flag is there so that this capability in the > guests can be detected easily without reading MSRs every time accessors. Why? What's wrong with cc_platform_has(CC_ATTR_GUEST_SECURE_TSC) or so? -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette