From: Vlastimil Babka <vbabka@suse.cz>
To: Ashish Kalra <Ashish.Kalra@amd.com>,
x86@kernel.org, linux-kernel@vger.kernel.org,
kvm@vger.kernel.org, linux-coco@lists.linux.dev,
linux-mm@kvack.org, linux-crypto@vger.kernel.org
Cc: tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de,
thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org,
pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com,
jmattson@google.com, luto@kernel.org,
dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com,
peterz@infradead.org, srinivas.pandruvada@linux.intel.com,
rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com,
bp@alien8.de, michael.roth@amd.com, kirill@shutemov.name,
ak@linux.intel.com, tony.luck@intel.com, marcorr@google.com,
sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com,
dgilbert@redhat.com, jarkko@kernel.org
Subject: Re: [PATCH Part2 v6 21/49] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
Date: Thu, 4 Aug 2022 13:32:25 +0200 [thread overview]
Message-ID: <ee123648-3ac4-6e0c-419c-281fb09edaa6@suse.cz> (raw)
In-Reply-To: <4896f0fd85947a139dce0ad514044c76048eaed2.1655761627.git.ashish.kalra@amd.com>
On 6/21/22 01:06, Ashish Kalra wrote:
> From: Brijesh Singh <brijesh.singh@amd.com>
>
> Implement a workaround for an SNP erratum where the CPU will incorrectly
> signal an RMP violation #PF if a hugepage (2mb or 1gb) collides with the
> RMP entry of a VMCB, VMSA or AVIC backing page.
>
> When SEV-SNP is globally enabled, the CPU marks the VMCB, VMSA, and AVIC
> backing pages as "in-use" in the RMP after a successful VMRUN. This
> is done for _all_ VMs, not just SNP-Active VMs.
>
> If the hypervisor accesses an in-use page through a writable
> translation, the CPU will throw an RMP violation #PF. On early SNP
> hardware, if an in-use page is 2mb aligned and software accesses any
> part of the associated 2mb region with a hupage, the CPU will
> incorrectly treat the entire 2mb region as in-use and signal a spurious
> RMP violation #PF.
>
> The recommended is to not use the hugepage for the VMCB, VMSA or
> AVIC backing page. Add a generic allocator that will ensure that the
> page returns is not hugepage (2mb or 1gb) and is safe to be used when
> SEV-SNP is enabled.
>
> Co-developed-by: Marc Orr <marcorr@google.com>
> Signed-off-by: Marc Orr <marcorr@google.com>
> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
> ---
> arch/x86/include/asm/kvm-x86-ops.h | 1 +
> arch/x86/include/asm/kvm_host.h | 2 ++
> arch/x86/kvm/lapic.c | 5 ++++-
> arch/x86/kvm/svm/sev.c | 35 ++++++++++++++++++++++++++++++
> arch/x86/kvm/svm/svm.c | 16 ++++++++++++--
> arch/x86/kvm/svm/svm.h | 1 +
> 6 files changed, 57 insertions(+), 3 deletions(-)
>
> diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h
> index da47f60a4650..a66292dae698 100644
> --- a/arch/x86/include/asm/kvm-x86-ops.h
> +++ b/arch/x86/include/asm/kvm-x86-ops.h
> @@ -128,6 +128,7 @@ KVM_X86_OP(msr_filter_changed)
> KVM_X86_OP(complete_emulated_msr)
> KVM_X86_OP(vcpu_deliver_sipi_vector)
> KVM_X86_OP_OPTIONAL_RET0(vcpu_get_apicv_inhibit_reasons);
> +KVM_X86_OP(alloc_apic_backing_page)
>
> #undef KVM_X86_OP
> #undef KVM_X86_OP_OPTIONAL
> diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
> index c24a72ddc93b..0205e2944067 100644
> --- a/arch/x86/include/asm/kvm_host.h
> +++ b/arch/x86/include/asm/kvm_host.h
> @@ -1512,6 +1512,8 @@ struct kvm_x86_ops {
> * Returns vCPU specific APICv inhibit reasons
> */
> unsigned long (*vcpu_get_apicv_inhibit_reasons)(struct kvm_vcpu *vcpu);
> +
> + void *(*alloc_apic_backing_page)(struct kvm_vcpu *vcpu);
> };
>
> struct kvm_x86_nested_ops {
> diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
> index 66b0eb0bda94..7c7fc6c4a7f9 100644
> --- a/arch/x86/kvm/lapic.c
> +++ b/arch/x86/kvm/lapic.c
> @@ -2506,7 +2506,10 @@ int kvm_create_lapic(struct kvm_vcpu *vcpu, int timer_advance_ns)
>
> vcpu->arch.apic = apic;
>
> - apic->regs = (void *)get_zeroed_page(GFP_KERNEL_ACCOUNT);
> + if (kvm_x86_ops.alloc_apic_backing_page)
> + apic->regs = static_call(kvm_x86_alloc_apic_backing_page)(vcpu);
> + else
> + apic->regs = (void *)get_zeroed_page(GFP_KERNEL_ACCOUNT);
> if (!apic->regs) {
> printk(KERN_ERR "malloc apic regs error for vcpu %x\n",
> vcpu->vcpu_id);
> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
> index b49c370d5ae9..93365996bd59 100644
> --- a/arch/x86/kvm/svm/sev.c
> +++ b/arch/x86/kvm/svm/sev.c
> @@ -3030,3 +3030,38 @@ void sev_vcpu_deliver_sipi_vector(struct kvm_vcpu *vcpu, u8 vector)
> break;
> }
> }
> +
> +struct page *snp_safe_alloc_page(struct kvm_vcpu *vcpu)
> +{
> + unsigned long pfn;
> + struct page *p;
> +
> + if (!cpu_feature_enabled(X86_FEATURE_SEV_SNP))
> + return alloc_page(GFP_KERNEL_ACCOUNT | __GFP_ZERO);
> +
> + /*
> + * Allocate an SNP safe page to workaround the SNP erratum where
> + * the CPU will incorrectly signal an RMP violation #PF if a
> + * hugepage (2mb or 1gb) collides with the RMP entry of VMCB, VMSA
> + * or AVIC backing page. The recommeded workaround is to not use the
> + * hugepage.
> + *
> + * Allocate one extra page, use a page which is not 2mb aligned
> + * and free the other.
> + */
> + p = alloc_pages(GFP_KERNEL_ACCOUNT | __GFP_ZERO, 1);
> + if (!p)
> + return NULL;
> +
> + split_page(p, 1);
> +
> + pfn = page_to_pfn(p);
> + if (IS_ALIGNED(__pfn_to_phys(pfn), PMD_SIZE)) {
I think you could simply IS_ALIGNED(pfn, PTRS_PER_PMD), no need to expand to
full phys.
> + pfn++;
> + __free_page(p);
To avoid pfn_to_page(), drop 'pfn++' and
__free_page(p++);
> + } else {
> + __free_page(pfn_to_page(pfn + 1));
__free_page(p+1);
> + }
> +
> + return pfn_to_page(pfn);
return p;
> +}
> diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c
> index efc7623d0f90..b4bd64f94d3a 100644
> --- a/arch/x86/kvm/svm/svm.c
> +++ b/arch/x86/kvm/svm/svm.c
> @@ -1260,7 +1260,7 @@ static int svm_vcpu_create(struct kvm_vcpu *vcpu)
> svm = to_svm(vcpu);
>
> err = -ENOMEM;
> - vmcb01_page = alloc_page(GFP_KERNEL_ACCOUNT | __GFP_ZERO);
> + vmcb01_page = snp_safe_alloc_page(vcpu);
> if (!vmcb01_page)
> goto out;
>
> @@ -1269,7 +1269,7 @@ static int svm_vcpu_create(struct kvm_vcpu *vcpu)
> * SEV-ES guests require a separate VMSA page used to contain
> * the encrypted register state of the guest.
> */
> - vmsa_page = alloc_page(GFP_KERNEL_ACCOUNT | __GFP_ZERO);
> + vmsa_page = snp_safe_alloc_page(vcpu);
> if (!vmsa_page)
> goto error_free_vmcb_page;
>
> @@ -4598,6 +4598,16 @@ static int svm_vm_init(struct kvm *kvm)
> return 0;
> }
>
> +static void *svm_alloc_apic_backing_page(struct kvm_vcpu *vcpu)
> +{
> + struct page *page = snp_safe_alloc_page(vcpu);
> +
> + if (!page)
> + return NULL;
> +
> + return page_address(page);
> +}
> +
> static struct kvm_x86_ops svm_x86_ops __initdata = {
> .name = "kvm_amd",
>
> @@ -4722,6 +4732,8 @@ static struct kvm_x86_ops svm_x86_ops __initdata = {
>
> .vcpu_deliver_sipi_vector = svm_vcpu_deliver_sipi_vector,
> .vcpu_get_apicv_inhibit_reasons = avic_vcpu_get_apicv_inhibit_reasons,
> +
> + .alloc_apic_backing_page = svm_alloc_apic_backing_page,
> };
>
> /*
> diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h
> index 1f4a8bd09c9e..9672e25a338d 100644
> --- a/arch/x86/kvm/svm/svm.h
> +++ b/arch/x86/kvm/svm/svm.h
> @@ -659,6 +659,7 @@ void sev_es_vcpu_reset(struct vcpu_svm *svm);
> void sev_vcpu_deliver_sipi_vector(struct kvm_vcpu *vcpu, u8 vector);
> void sev_es_prepare_switch_to_guest(struct sev_es_save_area *hostsa);
> void sev_es_unmap_ghcb(struct vcpu_svm *svm);
> +struct page *snp_safe_alloc_page(struct kvm_vcpu *vcpu);
>
> /* vmenter.S */
>
next prev parent reply other threads:[~2022-08-04 11:32 UTC|newest]
Thread overview: 305+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-06-20 22:56 [PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP) Ashish Kalra
2022-06-20 22:59 ` [PATCH Part2 v6 01/49] x86/cpufeatures: Add SEV-SNP CPU feature Ashish Kalra
2022-06-21 8:58 ` Borislav Petkov
2022-06-20 22:59 ` [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support Ashish Kalra
2022-06-21 15:28 ` Peter Gonda
2022-06-21 17:45 ` Kalra, Ashish
2022-06-21 17:50 ` Peter Gonda
2022-06-22 7:33 ` Suthikulpanit, Suravee
2022-08-25 1:28 ` jarkko
2022-08-25 1:30 ` Jarkko Sakkinen
2022-08-26 18:54 ` Kalra, Ashish
2022-08-28 4:18 ` Jarkko Sakkinen
2022-07-01 10:42 ` Borislav Petkov
2022-07-05 13:56 ` Kalra, Ashish
2022-07-05 14:33 ` Borislav Petkov
2022-07-05 14:53 ` Kalra, Ashish
2022-06-20 23:02 ` [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support Ashish Kalra
2022-06-21 15:47 ` Peter Gonda
2022-06-21 17:59 ` Kalra, Ashish
2022-06-23 20:48 ` Marc Orr
2022-06-23 22:22 ` Kalra, Ashish
2022-07-17 10:01 ` Borislav Petkov
2022-07-19 3:56 ` Kalra, Ashish
2022-07-19 8:38 ` Borislav Petkov
2022-07-19 11:34 ` Kalra, Ashish
2022-06-20 23:02 ` [PATCH Part2 v6 04/49] x86/sev: set SYSCFG.MFMD Ashish Kalra
2022-06-23 21:00 ` Marc Orr
2022-07-21 11:29 ` Borislav Petkov
2022-08-01 21:16 ` Kalra, Ashish
2022-06-20 23:02 ` [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers Ashish Kalra
2022-06-22 14:13 ` Dave Hansen
2022-06-22 14:22 ` Kalra, Ashish
2022-06-22 14:29 ` Dave Hansen
2022-06-22 18:15 ` Kalra, Ashish
2022-06-22 18:17 ` Dave Hansen
2022-06-22 18:34 ` Kalra, Ashish
2022-06-22 18:42 ` Dave Hansen
2022-06-22 19:43 ` Kalra, Ashish
2022-06-22 19:49 ` Dave Hansen
2022-06-22 20:15 ` Kalra, Ashish
2022-06-22 20:58 ` Kalra, Ashish
2022-06-23 22:36 ` Sean Christopherson
2022-06-23 22:43 ` Kalra, Ashish
2022-07-22 11:35 ` Borislav Petkov
2022-07-22 19:04 ` Sean Christopherson
2022-07-22 19:25 ` Borislav Petkov
2022-07-22 19:38 ` Borislav Petkov
2022-08-01 21:53 ` Kalra, Ashish
2022-07-22 22:16 ` Sean Christopherson
2022-07-22 22:25 ` Borislav Petkov
2022-08-01 21:50 ` Kalra, Ashish
2022-06-23 21:30 ` Marc Orr
2022-07-22 11:43 ` Borislav Petkov
2022-08-01 21:45 ` Kalra, Ashish
2022-07-25 14:32 ` Borislav Petkov
2022-08-01 22:04 ` Kalra, Ashish
2022-06-20 23:02 ` [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction Ashish Kalra
2022-06-21 16:40 ` Dr. David Alan Gilbert
2022-06-21 17:38 ` Kalra, Ashish
2022-06-22 18:17 ` Kalra, Ashish
2022-06-28 10:50 ` Dr. David Alan Gilbert
2022-06-28 17:57 ` Kalra, Ashish
2022-06-28 18:58 ` Dr. David Alan Gilbert
2022-06-28 19:03 ` Dave Hansen
2022-07-25 13:24 ` Borislav Petkov
2022-08-01 23:32 ` Kalra, Ashish
2022-08-02 14:14 ` Borislav Petkov
2022-06-22 14:26 ` Dave Hansen
2022-06-22 18:04 ` Kalra, Ashish
2022-07-24 17:31 ` Dov Murik
2022-08-02 4:49 ` Kalra, Ashish
2022-07-25 14:36 ` Borislav Petkov
2022-08-01 22:31 ` Kalra, Ashish
2022-08-03 20:26 ` Borislav Petkov
2022-06-20 23:03 ` [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table Ashish Kalra
2022-06-24 0:06 ` Marc Orr
2022-07-27 17:01 ` Borislav Petkov
2022-08-01 23:57 ` Kalra, Ashish
2022-08-04 12:11 ` Borislav Petkov
2022-11-02 3:12 ` Kalra, Ashish
2022-11-02 11:27 ` Borislav Petkov
2022-12-19 15:00 ` Michael Roth
2022-12-19 20:08 ` Borislav Petkov
2022-12-27 21:49 ` Kalra, Ashish
2022-12-29 17:09 ` Borislav Petkov
2023-01-05 21:46 ` Kalra, Ashish
2023-01-05 22:08 ` Marc Orr
2023-01-05 22:27 ` Kalra, Ashish
2023-01-05 22:31 ` Marc Orr
2022-12-30 15:19 ` Mike Rapoport
2022-06-20 23:03 ` [PATCH Part2 v6 08/49] x86/traps: Define RMP violation #PF error code Ashish Kalra
2022-08-08 13:13 ` Borislav Petkov
2022-06-20 23:03 ` [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address Ashish Kalra
2022-06-22 14:29 ` Jeremi Piotrowski
2022-07-12 11:57 ` Jarkko Sakkinen
2022-07-12 14:29 ` Kalra, Ashish
2022-07-12 14:54 ` Jarkko Sakkinen
2022-08-09 16:55 ` Borislav Petkov
2022-08-10 3:59 ` Kalra, Ashish
2022-08-10 9:42 ` Borislav Petkov
2022-08-10 22:00 ` Kalra, Ashish
2022-08-11 14:27 ` Borislav Petkov
2022-09-01 20:32 ` Kalra, Ashish
2022-09-02 6:52 ` Borislav Petkov
2022-09-02 15:33 ` Kalra, Ashish
2022-09-03 4:25 ` Borislav Petkov
2022-09-03 5:51 ` Kalra, Ashish
2022-09-03 6:57 ` Kalra, Ashish
2022-09-03 8:31 ` Boris Petkov
2022-09-03 17:30 ` Kalra, Ashish
2022-09-04 6:37 ` Borislav Petkov
2022-09-06 14:06 ` Kalra, Ashish
2022-09-06 10:25 ` Jarkko Sakkinen
2022-09-06 10:33 ` Jarkko Sakkinen
2022-09-06 13:54 ` Marc Orr
2022-09-06 14:17 ` Kalra, Ashish
2022-09-06 15:06 ` Michael Roth
2022-09-06 16:39 ` Kalra, Ashish
2022-09-07 5:14 ` Marc Orr
2022-09-06 15:44 ` Jarkko Sakkinen
2022-09-08 7:46 ` Jarkko Sakkinen
2022-09-08 7:57 ` Jarkko Sakkinen
2022-08-11 15:15 ` vbabka
2022-09-06 2:30 ` Dave Hansen
2022-06-20 23:03 ` [PATCH Part2 v6 10/49] x86/fault: Add support to dump RMP entry on fault Ashish Kalra
2022-06-22 14:33 ` Jeremi Piotrowski
2022-06-22 14:42 ` Jeremi Piotrowski
2022-06-22 18:08 ` Kalra, Ashish
2022-08-23 13:21 ` Borislav Petkov
2022-06-20 23:04 ` [PATCH Part2 v6 11/49] crypto:ccp: Define the SEV-SNP commands Ashish Kalra
2022-09-20 13:03 ` Borislav Petkov
2022-09-20 13:46 ` Kalra, Ashish
2022-09-20 14:04 ` Borislav Petkov
2022-06-20 23:04 ` [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP Ashish Kalra
2022-10-01 17:33 ` Borislav Petkov
2022-10-14 21:09 ` Kalra, Ashish
2022-10-14 21:31 ` Kalra, Ashish
2022-10-25 8:56 ` Borislav Petkov
2022-10-19 18:48 ` Kalra, Ashish
2022-10-23 21:17 ` Jarkko Sakkinen
2022-10-25 9:07 ` Borislav Petkov
2022-10-25 8:30 ` Borislav Petkov
2022-06-20 23:04 ` [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands Ashish Kalra
2022-06-21 21:43 ` Peter Gonda
2022-06-22 1:44 ` Kalra, Ashish
2022-08-02 10:52 ` Jarkko Sakkinen
2022-10-01 20:17 ` Borislav Petkov
2022-10-03 14:38 ` Kalra, Ashish
2022-10-03 16:16 ` Borislav Petkov
2022-10-03 17:11 ` Kalra, Ashish
2022-10-03 17:45 ` Borislav Petkov
2022-10-03 18:01 ` Peter Gonda
2022-10-03 18:16 ` Borislav Petkov
2022-10-03 18:43 ` Kalra, Ashish
2022-10-03 18:53 ` Borislav Petkov
2022-06-20 23:05 ` [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled Ashish Kalra
2022-06-21 18:11 ` Peter Gonda
2022-06-21 20:17 ` Kalra, Ashish
2022-06-24 14:19 ` Peter Gonda
2022-08-02 12:17 ` jarkko
2022-08-02 11:17 ` Jarkko Sakkinen
2022-10-13 15:15 ` Borislav Petkov
2022-10-14 20:00 ` Kalra, Ashish
2022-10-25 10:25 ` Borislav Petkov
2022-10-31 20:10 ` Kalra, Ashish
2022-10-31 21:15 ` Borislav Petkov
2022-10-31 21:58 ` Kalra, Ashish
2022-11-02 11:22 ` Borislav Petkov
2022-11-14 23:36 ` Kalra, Ashish
2022-11-15 14:26 ` Borislav Petkov
2022-11-15 15:14 ` Vlastimil Babka
2022-11-15 15:22 ` Borislav Petkov
2022-11-15 16:27 ` Borislav Petkov
2022-11-15 22:44 ` Kalra, Ashish
2022-11-15 17:24 ` Kalra, Ashish
2022-11-15 18:15 ` Kalra, Ashish
2022-11-16 9:08 ` Vlastimil Babka
2022-11-16 10:19 ` Kalra, Ashish
2022-11-16 10:25 ` Vlastimil Babka
2022-11-16 18:01 ` Kalra, Ashish
2022-11-16 18:33 ` Borislav Petkov
2022-11-16 18:53 ` Kalra, Ashish
2022-11-16 19:09 ` Borislav Petkov
2022-11-16 19:23 ` Kalra, Ashish
2022-11-16 18:32 ` Dave Hansen
2022-11-16 5:19 ` HORIGUCHI NAOYA(堀口 直也)
2022-11-16 10:28 ` Kalra, Ashish
2022-11-16 23:41 ` HORIGUCHI NAOYA(堀口 直也)
2022-11-17 20:56 ` Kalra, Ashish
2022-11-20 21:34 ` Borislav Petkov
2022-11-22 0:37 ` Kalra, Ashish
2022-11-22 10:17 ` Borislav Petkov
2022-11-22 10:32 ` Kalra, Ashish
2022-11-22 10:44 ` Borislav Petkov
2022-11-22 11:44 ` Kalra, Ashish
2022-11-23 11:40 ` Borislav Petkov
2022-11-23 18:32 ` Kalra, Ashish
2022-06-20 23:05 ` [PATCH Part2 v6 15/49] crypto: ccp: Handle the legacy SEV command " Ashish Kalra
2022-06-20 23:05 ` [PATCH Part2 v6 16/49] crypto: ccp: Add the SNP_PLATFORM_STATUS command Ashish Kalra
2022-06-20 23:05 ` [PATCH Part2 v6 17/49] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command Ashish Kalra
2022-06-21 22:13 ` Peter Gonda
2022-06-22 1:58 ` Kalra, Ashish
2022-08-02 12:31 ` Jarkko Sakkinen
2022-08-08 19:27 ` Dionna Amalie Glaze
2022-08-08 21:32 ` Tom Lendacky
2022-08-08 23:25 ` Dionna Amalie Glaze
2022-06-20 23:06 ` [PATCH Part2 v6 18/49] crypto: ccp: Provide APIs to query extended attestation report Ashish Kalra
2022-06-21 22:30 ` Peter Gonda
2022-08-02 12:39 ` Jarkko Sakkinen
2022-06-20 23:06 ` [PATCH Part2 v6 19/49] KVM: SVM: Add support to handle AP reset MSR protocol Ashish Kalra
2022-06-20 23:06 ` [PATCH Part2 v6 20/49] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT Ashish Kalra
2022-06-20 23:06 ` [PATCH Part2 v6 21/49] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe Ashish Kalra
2022-08-04 11:32 ` Vlastimil Babka [this message]
2022-06-20 23:07 ` [PATCH Part2 v6 22/49] KVM: SVM: Add initial SEV-SNP support Ashish Kalra
2022-06-20 23:07 ` [PATCH Part2 v6 23/49] KVM: SVM: Add KVM_SNP_INIT command Ashish Kalra
2022-06-20 23:07 ` [PATCH Part2 v6 24/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command Ashish Kalra
2022-06-24 14:42 ` Peter Gonda
2022-06-24 18:17 ` Kalra, Ashish
2022-08-02 13:19 ` Jarkko Sakkinen
2022-06-20 23:07 ` [PATCH Part2 v6 25/49] KVM: SVM: Disallow registering memory range from HugeTLB for SNP guest Ashish Kalra
2022-08-04 13:37 ` Vlastimil Babka
2022-06-20 23:08 ` [PATCH Part2 v6 26/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command Ashish Kalra
2022-06-24 14:33 ` Peter Gonda
2022-06-29 18:14 ` Kalra, Ashish
2022-08-02 12:50 ` Jarkko Sakkinen
2022-08-09 13:55 ` Sabin Rapan
2022-08-15 23:04 ` Kalra, Ashish
2022-06-20 23:08 ` [PATCH Part2 v6 27/49] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests Ashish Kalra
2022-06-22 10:29 ` Dr. David Alan Gilbert
2022-08-04 10:56 ` Vlastimil Babka
2022-06-20 23:08 ` [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command Ashish Kalra
2022-07-11 14:05 ` Peter Gonda
2022-07-11 22:41 ` Kalra, Ashish
2022-07-12 14:45 ` Peter Gonda
2022-07-12 15:22 ` Kalra, Ashish
2022-07-12 16:04 ` Peter Gonda
2022-07-12 17:40 ` Tom Lendacky
2022-07-13 14:59 ` Peter Gonda
2022-08-02 13:28 ` Jarkko Sakkinen
2022-09-08 14:55 ` [[PATCH for v6]] KVM: SEV: fix snp_launch_finish Harald Hoyer
2022-09-08 15:11 ` Sean Christopherson
2022-09-08 20:34 ` Jarkko Sakkinen
2022-09-09 8:04 ` [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command Harald Hoyer
2022-06-20 23:08 ` [PATCH Part2 v6 29/49] KVM: X86: Keep the NPT and RMP page level in sync Ashish Kalra
2022-07-12 16:44 ` Jarkko Sakkinen
2022-06-20 23:09 ` [PATCH Part2 v6 30/49] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX and SNP Ashish Kalra
2022-06-20 23:09 ` [PATCH Part2 v6 31/49] KVM: x86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use Ashish Kalra
2022-09-07 17:45 ` Alper Gun
2022-06-20 23:09 ` [PATCH Part2 v6 32/49] KVM: x86: Define RMP page fault error bits for #NPF Ashish Kalra
2022-06-20 23:10 ` [PATCH Part2 v6 33/49] KVM: x86: Update page-fault trace to log full 64-bit error code Ashish Kalra
2022-07-25 11:19 ` Vlastimil Babka
2022-06-20 23:10 ` [PATCH Part2 v6 34/49] KVM: SVM: Do not use long-lived GHCB map while setting scratch area Ashish Kalra
2022-06-20 23:10 ` [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map Ashish Kalra
2022-06-24 15:12 ` Peter Gonda
2022-06-24 20:14 ` Kalra, Ashish
2022-07-07 20:06 ` Peter Gonda
2022-07-07 20:31 ` Kalra, Ashish
2022-07-08 15:54 ` Peter Gonda
2022-07-08 15:59 ` Kalra, Ashish
2022-06-20 23:11 ` [PATCH Part2 v6 36/49] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT Ashish Kalra
2022-06-28 13:28 ` Dr. David Alan Gilbert
2022-06-20 23:11 ` [PATCH Part2 v6 37/49] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT Ashish Kalra
2022-08-19 16:54 ` Peter Gonda
2022-09-19 17:53 ` Alper Gun
2022-09-19 21:38 ` Tom Lendacky
2022-09-19 22:02 ` Alper Gun
2022-09-19 22:18 ` Tom Lendacky
2022-09-19 23:46 ` Ashish Kalra
2022-09-26 15:19 ` Peter Gonda
2022-10-12 20:15 ` Kalra, Ashish
2022-10-12 22:57 ` Michael Roth
2022-06-20 23:11 ` [PATCH Part2 v6 38/49] KVM: SVM: Add support to handle " Ashish Kalra
2022-06-20 23:12 ` [PATCH Part2 v6 39/49] KVM: SVM: Introduce ops for the post gfn map and unmap Ashish Kalra
2022-08-18 3:47 ` Alper Gun
2022-11-17 20:18 ` Peter Gonda
2022-11-17 20:28 ` Kalra, Ashish
2022-11-17 21:36 ` Kalra, Ashish
2022-06-20 23:12 ` [PATCH Part2 v6 40/49] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use Ashish Kalra
2022-06-20 23:13 ` [PATCH Part2 v6 41/49] KVM: SVM: Add support to handle the RMP nested page fault Ashish Kalra
2022-07-12 12:33 ` Jarkko Sakkinen
2022-07-12 12:45 ` Jarkko Sakkinen
2022-07-12 12:48 ` Jarkko Sakkinen
2022-07-12 15:32 ` Kalra, Ashish
2022-10-10 22:03 ` Alper Gun
2022-10-11 2:32 ` Kalra, Ashish
2022-10-12 22:53 ` Alper Gun
2022-10-13 15:00 ` Kalra, Ashish
2022-06-20 23:13 ` [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event Ashish Kalra
2022-06-24 16:25 ` Peter Gonda
2022-06-27 19:03 ` Kalra, Ashish
2022-06-29 19:15 ` Kalra, Ashish
2022-07-08 15:28 ` Peter Gonda
2022-10-21 19:06 ` Tom Lendacky
2022-10-21 21:12 ` Kalra, Ashish
2022-10-21 21:30 ` Tom Lendacky
2022-10-21 21:56 ` Kalra, Ashish
2022-06-20 23:13 ` [PATCH Part2 v6 43/49] KVM: SVM: Use a VMSA physical address variable for populating VMCB Ashish Kalra
2022-06-20 23:14 ` [PATCH Part2 v6 44/49] KVM: SVM: Support SEV-SNP AP Creation NAE event Ashish Kalra
2022-06-20 23:14 ` [PATCH Part2 v6 45/49] KVM: SVM: Add module parameter to enable the SEV-SNP Ashish Kalra
2022-06-20 23:14 ` [PATCH Part2 v6 46/49] ccp: add support to decrypt the page Ashish Kalra
2022-06-20 23:14 ` [PATCH Part2 v6 47/49] *fix for stale per-cpu pointer due to cond_resched during ghcb mapping Ashish Kalra
2022-06-24 16:35 ` Peter Gonda
2022-06-24 16:44 ` Kalra, Ashish
2022-06-20 23:15 ` [PATCH Part2 v6 48/49] *debug: warn and retry failed rmpupdates Ashish Kalra
2022-06-20 23:15 ` [PATCH Part2 v6 49/49] KVM: SVM: Sync the GHCB scratch buffer using already mapped ghcb Ashish Kalra
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ee123648-3ac4-6e0c-419c-281fb09edaa6@suse.cz \
--to=vbabka@suse.cz \
--cc=Ashish.Kalra@amd.com \
--cc=ak@linux.intel.com \
--cc=alpergun@google.com \
--cc=ardb@kernel.org \
--cc=bp@alien8.de \
--cc=dave.hansen@linux.intel.com \
--cc=dgilbert@redhat.com \
--cc=dovmurik@linux.ibm.com \
--cc=hpa@zytor.com \
--cc=jarkko@kernel.org \
--cc=jmattson@google.com \
--cc=jroedel@suse.de \
--cc=kirill@shutemov.name \
--cc=kvm@vger.kernel.org \
--cc=linux-coco@lists.linux.dev \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=luto@kernel.org \
--cc=marcorr@google.com \
--cc=michael.roth@amd.com \
--cc=mingo@redhat.com \
--cc=pbonzini@redhat.com \
--cc=peterz@infradead.org \
--cc=pgonda@google.com \
--cc=rientjes@google.com \
--cc=sathyanarayanan.kuppuswamy@linux.intel.com \
--cc=seanjc@google.com \
--cc=slp@redhat.com \
--cc=srinivas.pandruvada@linux.intel.com \
--cc=tglx@linutronix.de \
--cc=thomas.lendacky@amd.com \
--cc=tobin@ibm.com \
--cc=tony.luck@intel.com \
--cc=vkuznets@redhat.com \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).