Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp4059555iog; Tue, 21 Jun 2022 11:08:40 -0700 (PDT) X-Google-Smtp-Source: AGRyM1saPZ1C+bEV7KIZPmCYTIXToFno6NwjKdHWleGRFLPhAvy3PWckBEZi1kUMSg+1iUBr3Hxg X-Received: by 2002:a05:6402:42c6:b0:42d:ed84:6fe0 with SMTP id i6-20020a05640242c600b0042ded846fe0mr37359159edc.58.1655834919949; Tue, 21 Jun 2022 11:08:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655834919; cv=none; d=google.com; s=arc-20160816; b=0txZ4bk4Tsa2iQZFd5mwyyg2sY8d7NuiY4KIzNedhvG6IYkEv0MKQNjCgZjz3DKtjz zYXYTgbr+xZCueaxId/42/qWOQl7KjS7qpE+rS2ut2GdrVcJ3gpxvrui4yF4tIjhbq1i RM1P8l6bUJqoLN42oPbsTBsK9nkFDrsEKCXzcFfUocwfe+rlqPF0oXAlGs0pq5ZWYuXj Kueng4aMYSLBujrx5gy5R3irZcOZLPcE7HAGJM8xEUDby8Gfu8aLpewVDuJZDRvYJXgM AZoJay9fpE1RYM1dzbNTd5I3AUB/04w52mhjWqCkHeEJtnRi4LVRZKezQwNNMX/fPC6T kIrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=/sWmRxaBB/7Gvydpg8oN2fyGVNJ3tXVZl0R1M5vQ/Us=; b=xwelaPfK4Q2U5bKvTcQCc1tTsKHe9fWO9jy8BXSgcSqR8QC1Oy9YgwBfGChQXnjTww IHYy592H0wVqqnYnQVyvAfZC+rosbG3ylBkNkq9+4zfu80ALcs9HkXCA/Co/zmWlI3/G 4uu9NJBu3DaAPAAG4hIJn8WUyUvPF47rx8Vg1sn0pPfOtw3+7AagPCFYlX2mS93Q7saq m6FU8/mByF7ujxvG1HdymAqoywlLG/FVgItJy1GFpWlOQdofeKabasIhq+WOVUrScw03 1JsOadaUncLOV+3VoKcoVJehRsS4NqblEj8x0Kw2bf8HbTEeQZ/kUMnePZn2bvfS5tuF BZGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=SIUQ2bfT; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i9-20020a05640242c900b004359a63823esi2432123edc.225.2022.06.21.11.08.13; Tue, 21 Jun 2022 11:08:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=SIUQ2bfT; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348113AbiFURvP (ORCPT + 99 others); Tue, 21 Jun 2022 13:51:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44876 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229628AbiFURvO (ORCPT ); Tue, 21 Jun 2022 13:51:14 -0400 Received: from mail-lj1-x22c.google.com (mail-lj1-x22c.google.com [IPv6:2a00:1450:4864:20::22c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 096D71DA73 for ; Tue, 21 Jun 2022 10:51:13 -0700 (PDT) Received: by mail-lj1-x22c.google.com with SMTP id b7so16347613ljr.6 for ; Tue, 21 Jun 2022 10:51:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/sWmRxaBB/7Gvydpg8oN2fyGVNJ3tXVZl0R1M5vQ/Us=; b=SIUQ2bfTgtqyKzjQXnVabWR9Z3n/VgrhU2riRxw0AgmXz5H2i9bjCSpp+euFcuWuLr btapNTHSb4sb6Dlc8c5EtrlKyvn9xrjsaMXEm7aPioRHs8rBMY+uZERTAzQmLVQnK1vN yKhxZkZUR82fcxHyRRqxyWHUHzDwy9sB8NRvzJ+vl/OwnzuaafTUAnsbscxCWGwt7jMB 59esRMJI0H8QHYn6id6vBjd3uYPVHJcFcswVldGJo9tbKjNdP2YqadzjvdVZprf72/is jTh2NPUKW0DrIwZ3k8Ui1RzbVJGEGC+pQhncUSl4DSXTSJGsx66cmG7eT/EtfXyb3aRj zdMg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/sWmRxaBB/7Gvydpg8oN2fyGVNJ3tXVZl0R1M5vQ/Us=; b=yw/icU50GtsSengB5qdExtMEwhNSIjgfAtPV/lV0gL9wjbsmHP0uFrGDsYbPmFplMj yMWXP1GcI9fBDMJXfWimEdxRLOBEBfivGw7Wr9bu3xY428aGITnVA6lq/d3OZGDlgzb3 q2KG0f7snhgCEA/Q59GtKXtxZnKhMznowlvxRMZRCUxDEQ9KBNzFZ2dFAtywLGuZebTL zJhqrEqPCcaLdFMJw1pkbFoiwPMDWl4ItWy730gWTNnyxKHe+YFdWZfdj/N+lBxxneF8 vVuJGJU9qBX/Te778iMGdaXtykrnCbPz7Odoo3sAEHJIcfjQUlXmeWAoqFBuNjIUyp50 FM+Q== X-Gm-Message-State: AJIora+aOrHubZZHB8BXvQwfq+B37UcqCRm61TqCNgv4ebtrIeyeRkPa 2svOzDhHUmyEys3NCORVnqXRAC83ieNfvjfqX1QcHA== X-Received: by 2002:a2e:2a43:0:b0:25a:84a9:921c with SMTP id q64-20020a2e2a43000000b0025a84a9921cmr375799ljq.83.1655833871147; Tue, 21 Jun 2022 10:51:11 -0700 (PDT) MIME-Version: 1.0 References: <12df64394b1788156c8a3c2ee8dfd62b51ab3a81.1655761627.git.ashish.kalra@amd.com> In-Reply-To: From: Peter Gonda Date: Tue, 21 Jun 2022 11:50:59 -0600 Message-ID: Subject: Re: [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support To: "Kalra, Ashish" Cc: "the arch/x86 maintainers" , LKML , kvm list , "linux-coco@lists.linux.dev" , "linux-mm@kvack.org" , Linux Crypto Mailing List , Thomas Gleixner , Ingo Molnar , Joerg Roedel , "Lendacky, Thomas" , "H. Peter Anvin" , Ard Biesheuvel , Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Andy Lutomirski , Dave Hansen , Sergio Lopez , Peter Zijlstra , Srinivas Pandruvada , David Rientjes , Dov Murik , Tobin Feldman-Fitzthum , Borislav Petkov , "Roth, Michael" , Vlastimil Babka , "Kirill A . Shutemov" , Andi Kleen , Tony Luck , Marc Orr , Sathyanarayanan Kuppuswamy , Alper Gun , "Dr. David Alan Gilbert" , "jarkko@kernel.org" Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Jun 21, 2022 at 11:45 AM Kalra, Ashish wrote: > > [AMD Official Use Only - General] > > Hello Peter, > > >> +bool iommu_sev_snp_supported(void) > >> +{ > >> + struct amd_iommu *iommu; > >> + > >> + /* > >> + * The SEV-SNP support requires that IOMMU must be enabled, and is > >> + * not configured in the passthrough mode. > >> + */ > >> + if (no_iommu || iommu_default_passthrough()) { > >> + pr_err("SEV-SNP: IOMMU is either disabled or > >> + configured in passthrough mode.\n"); > > > Like below could this say something like snp support is disabled because of iommu settings. > > Here we may need to be more precise with the error information indicating why SNP is not enabled. > Please note that this patch may actually become part of the IOMMU + SNP patch series, where > additional checks are done, for example, not enabling SNP if IOMMU v2 page tables are enabled, > so precise error information will be useful here. I agree we should be more precise. I just thought we should explicitly state something like: "SEV-SNP: IOMMU is either disabled or configured in passthrough mode, SNP cannot be supported".