public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Sean Christopherson <seanjc@google.com>
To: Tom Lendacky <thomas.lendacky@amd.com>
Cc: Nikunj A Dadhania <nikunj@amd.com>,
	pbonzini@redhat.com, kvm@vger.kernel.org,
	 santosh.shukla@amd.com
Subject: Re: [PATCH] KVM: SVM: Add module parameter to control SEV-SNP Secure TSC feature
Date: Wed, 29 Oct 2025 09:52:36 -0700	[thread overview]
Message-ID: <aQJGVDSQruEooAE5@google.com> (raw)
In-Reply-To: <0a327c8d-c8a2-4b73-9231-bc5201e36e1e@amd.com>

On Wed, Oct 29, 2025, Tom Lendacky wrote:
> On 10/29/25 08:58, Sean Christopherson wrote:
> > On Wed, Oct 29, 2025, Nikunj A Dadhania wrote:
> >> Add a module parameter secure_tsc to allow control of the SEV-SNP Secure
> >> TSC feature at module load time, providing administrators with the ability
> >> to disable Secure TSC support even when the hardware and kernel support it.
> > 
> > Why?
> 
> That's on me. Based on the debug_swap parameter I thought we wanted to
> be able to control all SEV features that are advertised and thought this
> was just missed for Secure TSC. I'm good with not adding it we don't
> need to do that.

DebugSwap was one big mistake.  At this point, I think we can and should rip out
its module param.

Commit d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") goofed by not
adding a way for the userspace VMM to control the feature.  Functionally, that was
fine, but it broke attestation signatures because SEV_FEATURES are included in the
signature.

Commit 5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") fixed that issue,
but the underlying flaw of userspace not having a way to control SEV_FEATURES was
still there.

That flaw was addressed by commit 4f5defae7089 ("KVM: SEV: introduce KVM_SEV_INIT2
operation"), and so then 4dd5ecacb9a4 ("KVM: SEV: allow SEV-ES DebugSwap again")
re-enabled DebugSwap by default.

Now that the dust is settled, the module param doesn't serve any meaningful purpose.

      reply	other threads:[~2025-10-29 16:52 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-10-29  5:57 [PATCH] KVM: SVM: Add module parameter to control SEV-SNP Secure TSC feature Nikunj A Dadhania
2025-10-29 13:18 ` Tom Lendacky
2025-10-29 13:58 ` Sean Christopherson
2025-10-29 15:38   ` Tom Lendacky
2025-10-29 16:52     ` Sean Christopherson [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=aQJGVDSQruEooAE5@google.com \
    --to=seanjc@google.com \
    --cc=kvm@vger.kernel.org \
    --cc=nikunj@amd.com \
    --cc=pbonzini@redhat.com \
    --cc=santosh.shukla@amd.com \
    --cc=thomas.lendacky@amd.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox