From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-21.3 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT, USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 89B25C433B4 for ; Fri, 7 May 2021 16:59:55 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 4340E61464 for ; Fri, 7 May 2021 16:59:55 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238455AbhEGRAy (ORCPT ); Fri, 7 May 2021 13:00:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33612 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236776AbhEGRAx (ORCPT ); Fri, 7 May 2021 13:00:53 -0400 Received: from mail-qv1-xf49.google.com (mail-qv1-xf49.google.com [IPv6:2607:f8b0:4864:20::f49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7DE64C061761 for ; Fri, 7 May 2021 09:59:53 -0700 (PDT) Received: by mail-qv1-xf49.google.com with SMTP id a18-20020a0cca920000b02901d3c6996bb7so7093655qvk.6 for ; Fri, 07 May 2021 09:59:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=reply-to:date:message-id:mime-version:subject:from:to:cc; bh=uGowWnX27OFq3X1gHuwjZTbUlKh4i8rvEkAnK10zYZE=; b=mnSStCy9NenGQ9//ObWsCgKQmNe7czVPdK7QhmoAJFZ7H/LYAa9AmCI99Q39bNSwzm wMCb0nAcQ/xgUJG/nSE0lqXCIni649ugapCTs6DEpVto8egto6V4nJXrw3Bk7FdEP4uz Lqo5yLB9lAo2KL2sAlNj5hvyWdOmkzxc1RTdayzCz1YQvt/sIuTFwwA3yuKFiK7DxBqh bzyCKol8nGb397q/Y5yz0m1nwvt+n2jeqfY/g751BFIEbuu5IZwoJ5ExXwAE1TxARvUK JOfclvETVaGiKMmizl6qxTkLLlGGoaPxEg1FOFobvWqX4EOY17u1i+OEioDZnBI3/y4E lmcQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:reply-to:date:message-id:mime-version:subject :from:to:cc; bh=uGowWnX27OFq3X1gHuwjZTbUlKh4i8rvEkAnK10zYZE=; b=Hpm8d6pv60E0pCTnpBGRTJhosZHQyj9fhMZXwTx3CPxJdkwO01Qu4w2I+Kzhsq1TY1 trkTNQm8J8SJYXMrUIf8BMZ8RRrypFLjW7yiloqwzSbRPhUweqv+3f2v4AaUuMOYd7JX xNYgML04f8XjgTpuwwjN8S5sg9A/zItLmvgltl612HbwKVvxSEndC9lIuhXcq/J/dz7X Z7FoXFqlqL+Xu4TnTopJ8CbUHW85UAjrR1l0i40CtGbDbnwgl0csFDNuVFiXopT2cGPW QzSpeqDZem/MnY/k+UQGDR9VBN6tyori+oPOBvU0OQqOgctBEPYe3whvkf6Dj6n0nb9W ifPQ== X-Gm-Message-State: AOAM533LdagHfNwx1nRByMdalH4KWQGsKSyJDYlv+i2XMT3jTB86o1vv P3jqorSaaKwNdmHiyoWAGKBS1bOQ4uw= X-Google-Smtp-Source: ABdhPJxFM635GyWiSG/BnziS1EI1yIDc1gHO1U+htrLY1MFsVNaVy0Dc2UGxrhy5kab0tvrOWUBR6geOiUU= X-Received: from seanjc798194.pdx.corp.google.com ([2620:15c:f:10:7352:5279:7518:418f]) (user=seanjc job=sendgmr) by 2002:a0c:bd13:: with SMTP id m19mr10783603qvg.29.1620406792652; Fri, 07 May 2021 09:59:52 -0700 (PDT) Reply-To: Sean Christopherson Date: Fri, 7 May 2021 09:59:45 -0700 Message-Id: <20210507165947.2502412-1-seanjc@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.31.1.607.g51e8a6a459-goog Subject: [PATCH 0/2] KVM: x86: Fixes for SEV-ES state tracking From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Peter Gonda , Maxim Levitsky Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org For SEV-ES guests, Ensure KVM's model of EFER is up-to-date after a CR0 load, and let userspace set tracked state via KVM_SET_SREGS, relying on the vendor code to not propagate the changes to hardware (VMCB in this case). Peter, patch 02 is different than what I sent to you off list. I'm still 100% convinced that the load_pdptrs() call is flawed, but Maxim has an in-progress series that's tackling the PDPTR save/restore mess. Sean Christopherson (2): KVM: SVM: Update EFER software model on CR0 trap for SEV-ES KVM: x86: Allow userspace to update tracked sregs for protected guests arch/x86/kvm/svm/svm.c | 8 +++-- arch/x86/kvm/x86.c | 73 ++++++++++++++++++++++++------------------ 2 files changed, 47 insertions(+), 34 deletions(-) -- 2.31.1.607.g51e8a6a459-goog