On Tue, Apr 15, 2025, Andrew Cooper wrote:
> On 11/04/2025 10:40 pm, Sean Christopherson wrote:
> > On Thu, Apr 10, 2025, Ross Philipson wrote:
> >> + * instruction can return for a number of reasons. Test to see if it
> >> returned
> >> +
On Thu, Apr 10, 2025, Ross Philipson wrote:
> + /*
> + * Get a pointer to the monitor location on this APs stack to test below
> + * after mwait returns. Currently %esp points to just past the pushed
> APIC
> + * ID value.
> + */
> + movl%esp, %eax
> + subl$
On Fri, Apr 11, 2025, ross.philip...@oracle.com wrote:
> On 4/10/25 10:50 PM, ALOK TIWARI wrote:
> >
> >
> > On 11-04-2025 02:11, Ross Philipson wrote:
> > > +
> > > + - Entry from the dynamic launch jumps to the SL stub.
> > > + - SL stub fixes up the world on the BSP.
> > > + - For TXT, SL stub
On Wed, Sep 04, 2024, Ashish Kalra wrote:
> On 9/4/2024 2:54 PM, Michael Roth wrote:
> > - Sean inquired about making the target kdump kernel more agnostic to
> > whether or not SNP_SHUTDOWN was done properly, since that might
> > allow for capturing state even for edge cases where we can
On Tue, Sep 03, 2024, Ashish Kalra wrote:
> From: Ashish Kalra
> [1.671804] AMD-Vi: Using global IVHD EFR:0x841f77e022094ace, EFR2:0x0
> [1.679835] AMD-Vi: Translation is already enabled - trying to copy
> translation structures
> [1.689363] AMD-Vi: Copied DEV table from previous kern
On Thu, Aug 29, 2024, Borislav Petkov wrote:
> On August 27, 2024 10:38:04 PM GMT+02:00, Ashish Kalra
> wrote:
> >From: Ashish Kalra
> >
> >With active SNP VMs, SNP_SHUTDOWN_EX invoked during panic notifiers causes
> >crashkernel boot failure with the following signature:
>
> Why would SNP_SHUT
On Tue, Apr 09, 2024, Kirill A. Shutemov wrote:
> Depending on setup, TDX guests might be allowed to clear CR4.MCE.
> Attempt to clear it leads to #VE.
>
> Use alternatives to keep the flag during kexec for TDX guests.
>
> The change doesn't affect non-TDX-guest environments.
>
> Signed-off-by:
On Thu, Jan 04, 2024, Kirill A. Shutemov wrote:
> On Wed, Dec 13, 2023 at 09:22:34AM -0800, Sean Christopherson wrote:
> > On Tue, Dec 12, 2023, Kirill A. Shutemov wrote:
> > > On Tue, Dec 05, 2023 at 03:45:01AM +0300, Kirill A. Shutemov wrote:
> > > > kvm_guest_
E2 KVM paravirt
> > features.
> >
> > Do not disable kvmclock if it was not enabled.
> >
> > Signed-off-by: Kirill A. Shutemov
> > Fixes: c02027b5742b ("x86/kvm: Disable kvmclock on all CPUs on shutdown")
> > Reviewed-by: Sean Christopherson
On Mon, Dec 11, 2023, Sean Christopherson wrote:
> On Sat, Dec 09, 2023, James Gowans wrote:
> > Hi Sean,
> >
> > Blast from the past but I've just been bitten by this patch when
> > rebasing across v6.4.
> >
> > On Fri, 2023-05-12 at 16:31
On Sat, Dec 09, 2023, James Gowans wrote:
> Hi Sean,
>
> Blast from the past but I've just been bitten by this patch when
> rebasing across v6.4.
>
> On Fri, 2023-05-12 at 16:31 -0700, Sean Christopherson wrote:
> > Use syscore_ops.shutdown to disable hardware virtu
On Fri, Nov 10, 2023, Ross Philipson wrote:
> Prior to running the next kernel via kexec, the Secure Launch code
> closes down private SMX resources and does an SEXIT. This allows the
> next kernel to start normally without any issues starting the APs etc.
>
> Signed-off-by: Ross Philipson
> ---
On Mon, Oct 23, 2023, Vitaly Kuznetsov wrote:
> Sean Christopherson writes:
>
> > On Fri, Oct 20, 2023, Vitaly Kuznetsov wrote:
> >> diff --git a/arch/x86/kernel/kvm.c b/arch/x86/kernel/kvm.c
> >> index b8ab9ee5896c..1ee49c98e70a 100644
> >> --- a/arch/x86/
On Fri, Oct 20, 2023, Vitaly Kuznetsov wrote:
> > ---
> > arch/x86/kernel/kvmclock.c | 12
> > 1 file changed, 8 insertions(+), 4 deletions(-)
> >
> > diff --git a/arch/x86/kernel/kvmclock.c b/arch/x86/kernel/kvmclock.c
> > index fb8f52149be9..f2fff625576d 100644
> > --- a/arch/x86/ke
Kirill A. Shutemov
> Fixes: c02027b5742b ("x86/kvm: Disable kvmclock on all CPUs on shutdown")
> Cc: Paolo Bonzini
> Cc: Wanpeng Li
> Cc: Vitaly Kuznetsov
> Cc: Sean Christopherson
> ---
Reviewed-by: Sean Christopherson
On Thu, Oct 05, 2023, Kirill A. Shutemov wrote:
> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
> index 7368d254d01f..b5acf9fb4c70 100644
> --- a/arch/x86/Kconfig
> +++ b/arch/x86/Kconfig
> @@ -884,6 +884,7 @@ config INTEL_TDX_GUEST
> select X86_MEM_ENCRYPT
> select X86_MCE
> s
+Paolo
Please use get_maintainers...
On Thu, Oct 05, 2023, Kirill A. Shutemov wrote:
> kvm_guest_cpu_offline() tries to disable kvmclock regardless if it is
> present in the VM. It leads to write to a MSR that doesn't exist on some
> configurations, namely in TDX guest:
>
> unchecked MSR a
On Thu, Jan 27, 2022, Joerg Roedel wrote:
> +static int __init sev_setup_ap_jump_table(void)
This name is really confusing. AFAICT, it's specific to SEV-ES, but used only
"sev" for the namespace because sev_es_setup_ap_jump_table() already exists.
I assume this variant is purely for parking/offli
On Thu, Jan 27, 2022, Joerg Roedel wrote:
> From: Joerg Roedel
>
> Store the physical address of the AP jump table in kernel memory so
> that it does not need to be fetched from the Hypervisor again.
This doesn't explain why the kernel would retrieve the jump table more than
once,
e.g. at this
On Wed, Jul 21, 2021, Joerg Roedel wrote:
> From: Joerg Roedel
>
> Handle CLFLUSH instruction to MMIO memory in the #VC handler. The
^
|- emulated
> instruction is ignored by the handler, as the Hypervisor is
> responsible for cache m
On Tue, Jul 27, 2021, Tom Lendacky wrote:
> @@ -451,7 +450,7 @@ void __init mem_encrypt_free_decrypted_mem(void)
>* The unused memory range was mapped decrypted, change the encryption
>* attribute from decrypted to encrypted before freeing it.
>*/
> - if (mem_encrypt_act
On Thu, May 06, 2021, Joerg Roedel wrote:
> From: Joerg Roedel
>
> Allow a runtime opt-out of kexec support for architecture code in case
> the kernel is running in an environment where kexec is not properly
> supported yet.
>
> This will be used on x86 when the kernel is running as an SEV-ES
>
22 matches
Mail list logo