From mboxrd@z Thu Jan 1 00:00:00 1970 From: Alan Cox Subject: Re: [Part1 PATCH v7 13/17] x86/io: Unroll string I/O when SEV is active Date: Fri, 20 Oct 2017 19:39:53 +0100 Message-ID: <20171020193953.7814f013@alans-desktop> References: <20171020143059.3291-1-brijesh.singh@amd.com> <20171020143059.3291-14-brijesh.singh@amd.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Borislav Petkov , Tom Lendacky , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Borislav Petkov , Andy Shevchenko , David Laight , Arnd Bergmann To: Brijesh Singh Return-path: Received: from www.llwyncelyn.cymru ([82.70.14.225]:54828 "EHLO fuzix.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752473AbdJTSkj (ORCPT ); Fri, 20 Oct 2017 14:40:39 -0400 In-Reply-To: <20171020143059.3291-14-brijesh.singh@amd.com> Sender: kvm-owner@vger.kernel.org List-ID: On Fri, 20 Oct 2017 09:30:55 -0500 Brijesh Singh wrote: > From: Tom Lendacky > > Secure Encrypted Virtualization (SEV) does not support string I/O, so > unroll the string I/O operation into a loop operating on one element at > a time. Does this also mean that any firmware running in the virtual machine (EFI, BIOS, VGA etc) has to be patched and if so shouldn't that be documented somewhere ? Alan