diff for duplicates of <abbe9937-7e0f-4fbd-be0b-488de07dd56c@redhat.com> diff --git a/a/1.txt b/N1/1.txt index afe98d6..438d316 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -28,3 +28,622 @@ Reviewed-by: Paolo Bonzini <pbonzini@redhat.com> > > /* enable/disable SEV-ES DebugSwap support */ > static bool sev_es_debug_swap_enabled = true; + + +X-sender: <linux-kernel+bounces-125897-steffen.klassert=secunet.com@vger.kernel.org> +X-Receiver: <steffen.klassert@secunet.com> ORCPT=rfc822;steffen.klassert@secunet.com NOTIFY=NEVER; X-ExtendedProps=BQAVABYAAgAAAAUAFAARAPDFCS25BAlDktII2g02frgPADUAAABNaWNyb3NvZnQuRXhjaGFuZ2UuVHJhbnNwb3J0LkRpcmVjdG9yeURhdGEuSXNSZXNvdXJjZQIAAAUAagAJAAEAAAAAAAAABQAWAAIAAAUAQwACAAAFAEYABwADAAAABQBHAAIAAAUAEgAPAGIAAAAvbz1zZWN1bmV0L291PUV4Y2hhbmdlIEFkbWluaXN0cmF0aXZlIEdyb3VwIChGWURJQk9IRjIzU1BETFQpL2NuPVJlY2lwaWVudHMvY249U3RlZmZlbiBLbGFzc2VydDY4YwUACwAXAL4AAACheZxkHSGBRqAcAp3ukbifQ049REI2LENOPURhdGFiYXNlcyxDTj1FeGNoYW5nZSBBZG1pbmlzdHJhdGl2ZSBHcm91cCAoRllESUJPSEYyM1NQRExUKSxDTj1BZG1pbmlzdHJhdGl2ZSBHcm91cHMsQ049c2VjdW5ldCxDTj1NaWNyb3NvZnQgRXhjaGFuZ2UsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1zZWN1bmV0LERDPWRlBQAOABEABiAS9uuMOkqzwmEZDvWNNQUAHQAPAAwAAABtYngtZXNzZW4tMDIFADwAAgAADwA2AAAATWljcm9zb2Z0LkV4Y2hhbmdlLlRyYW5zcG9ydC5NYWlsUmVjaXBpZW50LkRpc3BsYXlOYW1lDwARAAAAS2xhc3NlcnQsIFN0ZWZmZW4FAAwAAgAABQBsAAIAAAUAWAAXAEoAAADwxQktuQQJQ5LSCNoNNn64Q049S2xhc3NlcnQgU3RlZmZlbixPVT1Vc2VycyxPVT1NaWdyYXRpb24sREM9c2VjdW5ldCxEQz1kZQUAJgACAAEFACIADwAxAAAAQXV0b1Jlc3BvbnNlU3VwcHJlc3M6IDANClRyYW5zbWl0SGlzdG9yeTogRmFsc2UNCg8ALwAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuRXhwYW5zaW9uR3JvdXBUeXBlDwAVAAAATWVtYmVyc0dyb3VwRXhwYW5zaW9uBQAjAAIAAQ== +X-CreatedBy: MSExchange15 +X-HeloDomain: a.mx.secunet.com +X-ExtendedProps: BQBjAAoAtaNAQuxQ3AgFAGEACAABAAAABQA3AAIAAA8APAAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuTWFpbFJlY2lwaWVudC5Pcmdhbml6YXRpb25TY29wZREAAAAAAAAAAAAAAAAAAAAAAAUASQACAAEFAGIACgBgAAAAo4oAAAUABAAUIAEAAAAcAAAAc3RlZmZlbi5rbGFzc2VydEBzZWN1bmV0LmNvbQUABgACAAEFACkAAgABDwAJAAAAQ0lBdWRpdGVkAgABBQACAAcAAQAAAAUAAwAHAAAAAAAFAAUAAgABBQBkAA8AAwAAAEh1Yg== +X-Source: SMTP:Default MBX-DRESDEN-01 +X-SourceIPAddress: 62.96.220.36 +X-EndOfInjectedXHeaders: 18849 +Received: from cas-essen-02.secunet.de (10.53.40.202) by + mbx-dresden-01.secunet.de (10.53.40.199) with Microsoft SMTP Server + (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id + 15.1.2507.37; Sat, 30 Mar 2024 22:36:33 +0100 +Received: from a.mx.secunet.com (62.96.220.36) by cas-essen-02.secunet.de + (10.53.40.202) with Microsoft SMTP Server (version=TLS1_2, + cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.37 via Frontend + Transport; Sat, 30 Mar 2024 22:36:32 +0100 +Received: from localhost (localhost [127.0.0.1]) + by a.mx.secunet.com (Postfix) with ESMTP id 0DD0C2076B + for <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:33 +0100 (CET) +X-Virus-Scanned: by secunet +X-Spam-Flag: NO +X-Spam-Score: -2.851 +X-Spam-Level: +X-Spam-Status: No, score=-2.851 tagged_above=-999 required=2.1 + tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.1, DKIM_SIGNED=0.1, + DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, + HEADER_FROM_DIFFERENT_DOMAINS=0.249, MAILING_LIST_MULTI=-1, + RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] + autolearn=ham autolearn_force=no +Authentication-Results: a.mx.secunet.com (amavisd-new); + dkim=pass (1024-bit key) header.d=redhat.com +Received: from a.mx.secunet.com ([127.0.0.1]) + by localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024) + with ESMTP id Llvtz-F6YAUT for <steffen.klassert@secunet.com>; + Sat, 30 Mar 2024 22:36:32 +0100 (CET) +Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=147.75.199.223; helo=ny.mirrors.kernel.org; envelope-from=linux-kernel+bounces-125897-steffen.klassert=secunet.com@vger.kernel.org; receiver=steffen.klassert@secunet.com +DKIM-Filter: OpenDKIM Filter v2.11.0 a.mx.secunet.com 56C4D20185 +Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org [147.75.199.223]) + (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) + (No client certificate requested) + by a.mx.secunet.com (Postfix) with ESMTPS id 56C4D20185 + for <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:32 +0100 (CET) +Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) + (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) + (No client certificate requested) + by ny.mirrors.kernel.org (Postfix) with ESMTPS id 5BB441C21934 + for <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 21:36:31 +0000 (UTC) +Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) + by smtp.subspace.kernel.org (Postfix) with ESMTP id 86A3C53E1A; + Sat, 30 Mar 2024 21:35:57 +0000 (UTC) +Authentication-Results: smtp.subspace.kernel.org; + dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="FE2gpGrp" +Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) + (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) + (No client certificate requested) + by smtp.subspace.kernel.org (Postfix) with ESMTPS id E02684E1D5 + for <linux-kernel@vger.kernel.org>; Sat, 30 Mar 2024 21:35:52 +0000 (UTC) +Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124 +ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; + t=1711834554; cv=none; b=b7FLHTh4s5KJyGT/U4EW3C8rUKvo/8XbW15xZoW/Ldj2ZB8F8CXR9RWx0TCo/a98NqmsgnvLyRO7h1Q+ND/K5AkfFYKtNN8lnH9S/HOGTR8dIJ+Y19DfORrgncGvyXDsbD1yRzrgW6lNzkQZGIYg3Wge86P7hO76kHvxfnPeNF4= +ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; + s=arc-20240116; t=1711834554; c=relaxed/simple; + bh=XGP/bsxmN4UA90jlZmkSiIF6HI+T7qPBdxxu9QCdFjI=; + h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: + In-Reply-To:Content-Type; b=uZvh3XkJIn35qzaxDGIlHNhGzRYSCjqfwQz9k78Cz5x4mG0aLHBAolrCiB7Ze9uRoohtZPKvgup+SgEcbrEsrmbsyZ80+rn4kDeCRHbiIvapx4UliYLo6PwJvOaTOtzrbKuROkk6/cjzopwOfYjQBGYlOabniJ2QgL1qeXhasBk= +ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=FE2gpGrp; arc=none smtp.client-ip=170.10.133.124 +Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com +Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com +DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; + s=mimecast20190719; t=1711834551; + h=from:from:reply-to:subject:subject:date:date:message-id:message-id: + to:to:cc:cc:mime-version:mime-version:content-type:content-type: + content-transfer-encoding:content-transfer-encoding: + in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; + bh=R/YdumI8jd8jDImfb7MEXm8pAf+7owyDUrM2XftNAOY=; + b=FE2gpGrpWlnRIpXbWfocTT4UIYFVk24/FqG5zZimf7CIdtAnU/kIbb074rzBV4VNQquOeb + eTN3MbKMOVPS2ppvxfoagxAufdAKFn0UfYxkHQz7N30hayElSK0pLcXCFJKreU8cT+hWW4 + 70pBRDiWqHLwO0MhAJS60JlSC8hhBTE= +Received: from mail-lf1-f71.google.com (mail-lf1-f71.google.com + [209.85.167.71]) by relay.mimecast.com with ESMTP with STARTTLS + (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id + us-mta-66-mkNfF_eMO-6IX7-uTbmq-g-1; Sat, 30 Mar 2024 17:35:50 -0400 +X-MC-Unique: mkNfF_eMO-6IX7-uTbmq-g-1 +Received: by mail-lf1-f71.google.com with SMTP id 2adb3069b0e04-515c1948e73so2306242e87.3 + for <linux-kernel@vger.kernel.org>; Sat, 30 Mar 2024 14:35:49 -0700 (PDT) +X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; + d=1e100.net; s=20230601; t=1711834548; x=1712439348; + h=content-transfer-encoding:in-reply-to:autocrypt:content-language + :from:references:cc:to:subject:user-agent:mime-version:date + :message-id:x-gm-message-state:from:to:cc:subject:date:message-id + :reply-to; + bh=R/YdumI8jd8jDImfb7MEXm8pAf+7owyDUrM2XftNAOY=; + b=XibPL1YT7C7WAHy76R2BNffFmAKXq7tS4GkdU7jlYD5NyTyafk9PfACl7Hn3jFgRov + Eu/Gt2HDNLI1zhBxauFdOJw7qdJ+IhtQgAHjQCWEP4FfItR4A0ph6qTBh0bsFO8nQCLh + boJk/wP5IrediBxEvZ0p1MP7BPe6STjykG10jomz1zS84ULjUkvmbBB9W8ArJOkYm2dS + wepwoevgsr34g16XRpAOviKeYv1JLIMYPU9o4eCgg4n5L/jaI4to02XXlNF4HT1OGQ05 + HNsIgkbEuVI+EyqHiRqeWEmmIy86zclP6cdw6skT9jNOEGwogsGgay2cb6hTap+qh0aO + Lkug== +X-Forwarded-Encrypted: i=1; AJvYcCUpZGruGvtSL/GRzzb/T9l9NEdlyPXCEPSxQp58gfVW2yTXYs3Fm0An24hPuTNlnIRLdQSrQRaCzpAWGinXnitsZhYQjW/v+HJXwwK6 +X-Gm-Message-State: AOJu0YxhKpBvOwa3o7UuzohVTOgan1vevOaRV+MzsvuUCnNUnrNpe/uC + D+q4iEuOd+EUyRD/EL7daw1o5qU2e2uGqU0A8JAf1JdH8jH52FlXFRnaLRT8uxrZd+Ksr2BjQaX + NmIKeRvlwGdfC2KaqNeLkTxAV6qmMXN9Ht8GHDfyLF4uXW/q6WkeV5IFucCL/qA== +X-Received: by 2002:ac2:4256:0:b0:515:a5b1:1dd0 with SMTP id m22-20020ac24256000000b00515a5b11dd0mr3175194lfl.55.1711834548712; + Sat, 30 Mar 2024 14:35:48 -0700 (PDT) +X-Google-Smtp-Source: AGHT+IGtpVK74hYMJQRsbSNAOxNo0vPDNEDLKCnR39FTY23/i2sK1bKLUmtvrUTSb2GUD2WssCJO3g== +X-Received: by 2002:ac2:4256:0:b0:515:a5b1:1dd0 with SMTP id m22-20020ac24256000000b00515a5b11dd0mr3175156lfl.55.1711834548253; + Sat, 30 Mar 2024 14:35:48 -0700 (PDT) +Received: from [192.168.10.4] ([151.95.49.219]) + by smtp.googlemail.com with ESMTPSA id os26-20020a170906af7a00b00a465b72a1f3sm3494452ejb.85.2024.03.30.14.35.45 + (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); + Sat, 30 Mar 2024 14:35:47 -0700 (PDT) +Message-ID: <abbe9937-7e0f-4fbd-be0b-488de07dd56c@redhat.com> +Date: Sat, 30 Mar 2024 22:35:44 +0100 +Precedence: bulk +X-Mailing-List: linux-kernel@vger.kernel.org +List-Id: <linux-kernel.vger.kernel.org> +List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> +List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> +MIME-Version: 1.0 +User-Agent: Mozilla Thunderbird +Subject: Re: [PATCH v12 25/29] KVM: SVM: Add module parameter to enable the + SEV-SNP +To: Michael Roth <michael.roth@amd.com>, kvm@vger.kernel.org +Cc: linux-coco@lists.linux.dev, linux-mm@kvack.org, + linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, + tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, + thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, seanjc@google.com, + vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, + dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, + peterz@infradead.org, srinivas.pandruvada@linux.intel.com, + rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, bp@alien8.de, + vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, + tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, + alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com, + nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com, + Brijesh Singh <brijesh.singh@amd.com> +References: <20240329225835.400662-1-michael.roth@amd.com> + <20240329225835.400662-26-michael.roth@amd.com> +From: Paolo Bonzini <pbonzini@redhat.com> +Content-Language: en-US +Autocrypt: addr=pbonzini@redhat.com; keydata= + xsEhBFRCcBIBDqDGsz4K0zZun3jh+U6Z9wNGLKQ0kSFyjN38gMqU1SfP+TUNQepFHb/Gc0E2 + CxXPkIBTvYY+ZPkoTh5xF9oS1jqI8iRLzouzF8yXs3QjQIZ2SfuCxSVwlV65jotcjD2FTN04 + hVopm9llFijNZpVIOGUTqzM4U55sdsCcZUluWM6x4HSOdw5F5Utxfp1wOjD/v92Lrax0hjiX + DResHSt48q+8FrZzY+AUbkUS+Jm34qjswdrgsC5uxeVcLkBgWLmov2kMaMROT0YmFY6A3m1S + P/kXmHDXxhe23gKb3dgwxUTpENDBGcfEzrzilWueOeUWiOcWuFOed/C3SyijBx3Av/lbCsHU + Vx6pMycNTdzU1BuAroB+Y3mNEuW56Yd44jlInzG2UOwt9XjjdKkJZ1g0P9dwptwLEgTEd3Fo + UdhAQyRXGYO8oROiuh+RZ1lXp6AQ4ZjoyH8WLfTLf5g1EKCTc4C1sy1vQSdzIRu3rBIjAvnC + tGZADei1IExLqB3uzXKzZ1BZ+Z8hnt2og9hb7H0y8diYfEk2w3R7wEr+Ehk5NQsT2MPI2QBd + wEv1/Aj1DgUHZAHzG1QN9S8wNWQ6K9DqHZTBnI1hUlkp22zCSHK/6FwUCuYp1zcAEQEAAc0j + UGFvbG8gQm9uemluaSA8cGJvbnppbmlAcmVkaGF0LmNvbT7CwU0EEwECACMFAlRCcBICGwMH + CwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRB+FRAMzTZpsbceDp9IIN6BIA0Ol7MoB15E + 11kRz/ewzryFY54tQlMnd4xxfH8MTQ/mm9I482YoSwPMdcWFAKnUX6Yo30tbLiNB8hzaHeRj + jx12K+ptqYbg+cevgOtbLAlL9kNgLLcsGqC2829jBCUTVeMSZDrzS97ole/YEez2qFpPnTV0 + VrRWClWVfYh+JfzpXmgyhbkuwUxNFk421s4Ajp3d8nPPFUGgBG5HOxzkAm7xb1cjAuJ+oi/K + CHfkuN+fLZl/u3E/fw7vvOESApLU5o0icVXeakfSz0LsygEnekDbxPnE5af/9FEkXJD5EoYG + SEahaEtgNrR4qsyxyAGYgZlS70vkSSYJ+iT2rrwEiDlo31MzRo6Ba2FfHBSJ7lcYdPT7bbk9 + AO3hlNMhNdUhoQv7M5HsnqZ6unvSHOKmReNaS9egAGdRN0/GPDWr9wroyJ65ZNQsHl9nXBqE + AukZNr5oJO5vxrYiAuuTSd6UI/xFkjtkzltG3mw5ao2bBpk/V/YuePrJsnPFHG7NhizrxttB + nTuOSCMo45pfHQ+XYd5K1+Cv/NzZFNWscm5htJ0HznY+oOsZvHTyGz3v91pn51dkRYN0otqr + bQ4tlFFuVjArBZcapSIe6NV8C4cEiSTOwE0EVEJx7gEIAMeHcVzuv2bp9HlWDp6+RkZe+vtl + KwAHplb/WH59j2wyG8V6i33+6MlSSJMOFnYUCCL77bucx9uImI5nX24PIlqT+zasVEEVGSRF + m8dgkcJDB7Tps0IkNrUi4yof3B3shR+vMY3i3Ip0e41zKx0CvlAhMOo6otaHmcxr35sWq1Jk + tLkbn3wG+fPQCVudJJECvVQ//UAthSSEklA50QtD2sBkmQ14ZryEyTHQ+E42K3j2IUmOLriF + dNr9NvE1QGmGyIcbw2NIVEBOK/GWxkS5+dmxM2iD4Jdaf2nSn3jlHjEXoPwpMs0KZsgdU0pP + JQzMUMwmB1wM8JxovFlPYrhNT9MAEQEAAcLBMwQYAQIACQUCVEJx7gIbDAAKCRB+FRAMzTZp + sadRDqCctLmYICZu4GSnie4lKXl+HqlLanpVMOoFNnWs9oRP47MbE2wv8OaYh5pNR9VVgyhD + OG0AU7oidG36OeUlrFDTfnPYYSF/mPCxHttosyt8O5kabxnIPv2URuAxDByz+iVbL+RjKaGM + GDph56ZTswlx75nZVtIukqzLAQ5fa8OALSGum0cFi4ptZUOhDNz1onz61klD6z3MODi0sBZN + Aj6guB2L/+2ZwElZEeRBERRd/uommlYuToAXfNRdUwrwl9gRMiA0WSyTb190zneRRDfpSK5d + usXnM/O+kr3Dm+Ui+UioPf6wgbn3T0o6I5BhVhs4h4hWmIW7iNhPjX1iybXfmb1gAFfjtHfL + xRUr64svXpyfJMScIQtBAm0ihWPltXkyITA92ngCmPdHa6M1hMh4RDX+Jf1fiWubzp1voAg0 + JBrdmNZSQDz0iKmSrx8xkoXYfA3bgtFN8WJH2xgFL28XnqY4M6dLhJwV3z08tPSRqYFm4NMP + dRsn0/7oymhneL8RthIvjDDQ5ktUjMe8LtHr70OZE/TT88qvEdhiIVUogHdo4qBrk41+gGQh + b906Dudw5YhTJFU3nC6bbF2nrLlB4C/XSiH76ZvqzV0Z/cAMBo5NF/w= +In-Reply-To: <20240329225835.400662-26-michael.roth@amd.com> +Content-Type: text/plain; charset=UTF-8; format=flowed +Content-Transfer-Encoding: 7bit +Return-Path: linux-kernel+bounces-125897-steffen.klassert=secunet.com@vger.kernel.org +X-MS-Exchange-Organization-OriginalArrivalTime: 30 Mar 2024 21:36:32.9947 + (UTC) +X-MS-Exchange-Organization-Network-Message-Id: c85bfe61-624d-4800-c8ac-08dc51017801 +X-MS-Exchange-Organization-OriginalClientIPAddress: 62.96.220.36 +X-MS-Exchange-Organization-OriginalServerIPAddress: 10.53.40.202 +X-MS-Exchange-Organization-Cross-Premises-Headers-Processed: cas-essen-02.secunet.de +X-MS-Exchange-Organization-OrderedPrecisionLatencyInProgress: LSRV=mbx-dresden-01.secunet.de:TOTAL-HUB=0.419|SMR=0.341(SMRDE=0.035|SMRC=0.305(SMRCL=0.102|X-SMRCR=0.306))|CAT=0.077(CATOS=0.011 + (CATSM=0.011(CATSM-Malware + Agent=0.010))|CATRESL=0.041(CATRESLP2R=0.037)|CATORES=0.023 + (CATRS=0.023(CATRS-Index Routing Agent=0.022)));2024-03-30T21:36:33.464Z +X-MS-Exchange-Forest-ArrivalHubServer: mbx-dresden-01.secunet.de +X-MS-Exchange-Organization-AuthSource: cas-essen-02.secunet.de +X-MS-Exchange-Organization-AuthAs: Anonymous +X-MS-Exchange-Organization-FromEntityHeader: Internet +X-MS-Exchange-Organization-OriginalSize: 13311 +X-MS-Exchange-Organization-HygienePolicy: Standard +X-MS-Exchange-Organization-MessageLatency: SRV=cas-essen-02.secunet.de:TOTAL-FE=0.050|SMR=0.008(SMRPI=0.005(SMRPI-FrontendProxyAgent=0.005))|SMS=0.042 +X-MS-Exchange-Organization-AVStamp-Enterprise: 1.0 +X-MS-Exchange-Organization-Recipient-Limit-Verified: True +X-MS-Exchange-Organization-TotalRecipientCount: 1 +X-MS-Exchange-Organization-Rules-Execution-History: 0b0cf904-14ac-4724-8bdf-482ee6223cf2%%%fd34672d-751c-45ae-a963-ed177fcabe23%%%d8080257-b0c3-47b4-b0db-23bc0c8ddb3c%%%95e591a2-5d7d-4afa-b1d0-7573d6c0a5d9%%%f7d0f6bc-4dcc-4876-8c5d-b3d6ddbb3d55%%%16355082-c50b-4214-9c7d-d39575f9f79b +X-MS-Exchange-Forest-RulesExecuted: mbx-dresden-01 +X-MS-Exchange-Organization-RulesExecuted: mbx-dresden-01 +X-MS-Exchange-Forest-IndexAgent-0: AQ0CZW4AAVUDAAAPAAADH4sIAAAAAAAEAJVS33PaRhDew0IgCHbqpA + 9920c7AmQbbBPH9Thu03YmE9cTZvLKHLoTugZ0jE7gJNM/u39A9ySZ + UoIz7SAdu6vv+/bH7V/13xPsBScvg5M+nvQuTgdtfKfCmMspvtdZjP + epzuRFq3GFv6R6doE3qfpDmhiHKpnEeDku3K6x7jWfiW6oZ1cEt4zX + QiDHmRaLqcQ5T/lMZjLFLOYJhvSOJS6MFJhplAkfE0inKJTJzSyWOH + zzoTO8vbNakeTZIpVdvNX3ViHDtx/eYaiTjKvE5GizmM91mmGk04J9 + e4dGZrn9628/3ViZ+PNcpktlCFIqYjTlE1uCSoQKeSYLdUtW5kFTim + 7Z01BNEik6Ooo648//fRybvNcmVkR7y6cpx0uee92P1ltjtRrv5VLJ + e+JZzh3XU403OvmiEoWX83FhXadSUMUrzhV2Oh37h8jTMA4+Dc6Cj8 + tZYOwrl90Q/8Qe+n6JOcZI0bjpypOJFG08oUEYmWZKJ+bAP2wTQMip + tP5B57CcglBRRGkmKkMePJJl/MgHy6dZy0/YkwMhz8NxLxy87HbPTg + fHx2envfOoF+Hx0dFZv18282gO+933/W+mur7GTn/QPkefzoF1TcYz + RfVpPaX9WI6kGRXrJ/BHzNKFfFVMpljcUb64o4SWVxwU8PYGrZ1rtf + Go3+8fvipHhBi8KNc6eNjpcp9Xm/oiyDvcLMgk8wfpvBT/G4D1kv1H + KiZ4e5P3v2p+M8Sf5XgxGd7z+UbxuG2cwoJHhtBfl2l/ABXYYQxqxQ + MVcitspwpQhVoN6g5Uq9BwwCXbRhh8bw13B5wdaNLJoOJCzbOYKrlE + J4NOCtJJLIu0yoQnQY/cAlnP7RKw9jhQb0CzSE0KBFspe/Cdy6AFtd + x1tpVUXwdQDQSgyHNrlIA6gyZ49LVqm/LIfQaeaynPikSrhzHqDhhr + 2hMq9LXGvMJusL3CqMO+k6crAP+iQ2VbkObpPoHdJ6zlAriwuw3jbQ + kyGhRdVVFS5R8bqlS8BTPYzadUs3fRpK73865t44wS2YGsYTyHuQ6A + A/tuftEPd0RT3VsJ7pWR1lcRStHYSJHT1zFbUrjlPTZq8HSl+UMeJB + E7YVL+GzbhDKYKBwAAAQq1Azw/eG1sIHZlcnNpb249IjEuMCIgZW5j + b2Rpbmc9InV0Zi0xNiI/Pg0KPEVtYWlsU2V0Pg0KICA8VmVyc2lvbj + 4xNS4wLjAuMDwvVmVyc2lvbj4NCiAgPEVtYWlscz4NCiAgICA8RW1h + aWwgU3RhcnRJbmRleD0iNjIiPg0KICAgICAgPEVtYWlsU3RyaW5nPm + JyaWplc2guc2luZ2hAYW1kLmNvbTwvRW1haWxTdHJpbmc+DQogICAg + PC9FbWFpbD4NCiAgICA8RW1haWwgU3RhcnRJbmRleD0iMzg4Ij4NCi + AgICAgIDxFbWFpbFN0cmluZz5hc2hpc2gua2FscmFAYW1kLmNvbTwv + RW1haWxTdHJpbmc+DQogICAgPC9FbWFpbD4NCiAgICA8RW1haWwgU3 + RhcnRJbmRleD0iNDQxIiBQb3NpdGlvbj0iU2lnbmF0dXJlIj4NCiAg + ICAgIDxFbWFpbFN0cmluZz5wYm9uemluaUByZWRoYXQuY29tPC9FbW + FpbFN0cmluZz4NCiAgICA8L0VtYWlsPg0KICA8L0VtYWlscz4NCjwv + RW1haWxTZXQ+AQyWCjw/eG1sIHZlcnNpb249IjEuMCIgZW5jb2Rpbm + c9InV0Zi0xNiI/Pg0KPENvbnRhY3RTZXQ+DQogIDxWZXJzaW9uPjE1 + LjAuMC4wPC9WZXJzaW9uPg0KICA8Q29udGFjdHM+DQogICAgPENvbn + RhY3QgU3RhcnRJbmRleD0iMzE4Ij4NCiAgICAgIDxQZXJzb24gU3Rh + cnRJbmRleD0iMzE4Ij4NCiAgICAgICAgPFBlcnNvblN0cmluZz5Ccm + lqZXNoIFNpbmdoPC9QZXJzb25TdHJpbmc+DQogICAgICA8L1BlcnNv + bj4NCiAgICAgIDxFbWFpbHM+DQogICAgICAgIDxFbWFpbCBTdGFydE + luZGV4PSIzMzMiPg0KICAgICAgICAgIDxFbWFpbFN0cmluZz5icmlq + ZXNoLnNpbmdoQGFtZC5jb208L0VtYWlsU3RyaW5nPg0KICAgICAgIC + A8L0VtYWlsPg0KICAgICAgPC9FbWFpbHM+DQogICAgICA8Q29udGFj + dFN0cmluZz5CcmlqZXNoIFNpbmdoICZsdDticmlqZXNoLnNpbmdoQG + FtZC5jb208L0NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YWN0Pg0K + ICAgIDxDb250YWN0IFN0YXJ0SW5kZXg9IjM3NCI+DQogICAgICA8UG + Vyc29uIFN0YXJ0SW5kZXg9IjM3NCI+DQogICAgICAgIDxQZXJzb25T + dHJpbmc+QXNoaXNoIEthbHJhPC9QZXJzb25TdHJpbmc+DQogICAgIC + A8L1BlcnNvbj4NCiAgICAgIDxFbWFpbHM+DQogICAgICAgIDxFbWFp + bCBTdGFydEluZGV4PSIzODgiPg0KICAgICAgICAgIDxFbWFpbFN0cm + luZz5hc2hpc2gua2FscmFAYW1kLmNvbTwvRW1haWxTdHJpbmc+DQog + ICAgICAgIDwvRW1haWw+DQogICAgICA8L0VtYWlscz4NCiAgICAgID + xDb250YWN0U3RyaW5nPkFzaGlzaCBLYWxyYSAmbHQ7YXNoaXNoLmth + bHJhQGFtZC5jb208L0NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YW + N0Pg0KICAgIDxDb250YWN0IFN0YXJ0SW5kZXg9IjQyNiIgUG9zaXRp + b249IlNpZ25hdHVyZSI+DQogICAgICA8UGVyc29uIFN0YXJ0SW5kZX + g9IjQyNiIgUG9zaXRpb249IlNpZ25hdHVyZSI+DQogICAgICAgIDxQ + ZXJzb25TdHJpbmc+UGFvbG8gQm9uemluaTwvUGVyc29uU3RyaW5nPg + 0KICAgICAgPC9QZXJzb24+DQogICAgICA8RW1haWxzPg0KICAgICAg + ICA8RW1haWwgU3RhcnRJbmRleD0iNDQxIiBQb3NpdGlvbj0iU2lnbm + F0dXJlIj4NCiAgICAgICAgICA8RW1haWxTdHJpbmc+cGJvbnppbmlA + cmVkaGF0LmNvbTwvRW1haWxTdHJpbmc+DQogICAgICAgIDwvRW1haW + w+DQogICAgICA8L0VtYWlscz4NCiAgICAgIDxDb250YWN0U3RyaW5n + PlBhb2xvIEJvbnppbmkgJmx0O3Bib256aW5pQHJlZGhhdC5jb208L0 + NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YWN0Pg0KICA8L0NvbnRh + Y3RzPg0KPC9Db250YWN0U2V0PgEOzwFSZXRyaWV2ZXJPcGVyYXRvci + wxMCwxO1JldHJpZXZlck9wZXJhdG9yLDExLDE7UG9zdERvY1BhcnNl + ck9wZXJhdG9yLDEwLDA7UG9zdERvY1BhcnNlck9wZXJhdG9yLDExLD + A7UG9zdFdvcmRCcmVha2VyRGlhZ25vc3RpY09wZXJhdG9yLDEwLDA7 + UG9zdFdvcmRCcmVha2VyRGlhZ25vc3RpY09wZXJhdG9yLDExLDA7VH + JhbnNwb3J0V3JpdGVyUHJvZHVjZXIsMjAsMTM= +X-MS-Exchange-Forest-IndexAgent: 1 2822 +X-MS-Exchange-Forest-EmailMessageHash: 605501D6 +X-MS-Exchange-Forest-Language: en +X-MS-Exchange-Organization-Processed-By-Journaling: Journal Agent + +On 3/29/24 23:58, Michael Roth wrote: +> From: Brijesh Singh <brijesh.singh@amd.com> +> +> Add a module parameter than can be used to enable or disable the SEV-SNP +> feature. Now that KVM contains the support for the SNP set the GHCB +> hypervisor feature flag to indicate that SNP is supported. +> +> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com> +> Signed-off-by: Ashish Kalra <ashish.kalra@amd.com> + +Reviewed-by: Paolo Bonzini <pbonzini@redhat.com> + +> --- +> arch/x86/kvm/svm/sev.c | 3 ++- +> 1 file changed, 2 insertions(+), 1 deletion(-) +> +> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c +> index 3e8de7cb3c89..658116537f3f 100644 +> --- a/arch/x86/kvm/svm/sev.c +> +++ b/arch/x86/kvm/svm/sev.c +> @@ -48,7 +48,8 @@ static bool sev_es_enabled = true; +> module_param_named(sev_es, sev_es_enabled, bool, 0444); +> +> /* enable/disable SEV-SNP support */ +> -static bool sev_snp_enabled; +> +static bool sev_snp_enabled = true; +> +module_param_named(sev_snp, sev_snp_enabled, bool, 0444); +> +> /* enable/disable SEV-ES DebugSwap support */ +> static bool sev_es_debug_swap_enabled = true; + + +X-sender: <linux-crypto+bounces-3137-steffen.klassert=secunet.com@vger.kernel.org> +X-Receiver: <steffen.klassert@secunet.com> ORCPT=rfc822;steffen.klassert@secunet.com NOTIFY=NEVER; X-ExtendedProps=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 +X-CreatedBy: MSExchange15 +X-HeloDomain: a.mx.secunet.com +X-ExtendedProps: BQBjAAoAtaNAQuxQ3AgFAGEACAABAAAABQA3AAIAAA8APAAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuTWFpbFJlY2lwaWVudC5Pcmdhbml6YXRpb25TY29wZREAAAAAAAAAAAAAAAAAAAAAAAUASQACAAEFAGIACgBhAAAAo4oAAAUABAAUIAEAAAAcAAAAc3RlZmZlbi5rbGFzc2VydEBzZWN1bmV0LmNvbQUABgACAAEFACkAAgABDwAJAAAAQ0lBdWRpdGVkAgABBQACAAcAAQAAAAUAAwAHAAAAAAAFAAUAAgABBQBkAA8AAwAAAEh1Yg== +X-Source: SMTP:Default MBX-DRESDEN-01 +X-SourceIPAddress: 62.96.220.36 +X-EndOfInjectedXHeaders: 18895 +Received: from cas-essen-02.secunet.de (10.53.40.202) by + mbx-dresden-01.secunet.de (10.53.40.199) with Microsoft SMTP Server + (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id + 15.1.2507.37; Sat, 30 Mar 2024 22:36:37 +0100 +Received: from a.mx.secunet.com (62.96.220.36) by cas-essen-02.secunet.de + (10.53.40.202) with Microsoft SMTP Server (version=TLS1_2, + cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.37 via Frontend + Transport; Sat, 30 Mar 2024 22:36:37 +0100 +Received: from localhost (localhost [127.0.0.1]) + by a.mx.secunet.com (Postfix) with ESMTP id 7795A2076B + for <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:37 +0100 (CET) +X-Virus-Scanned: by secunet +X-Spam-Flag: NO +X-Spam-Score: -2.851 +X-Spam-Level: +X-Spam-Status: No, score=-2.851 tagged_above=-999 required=2.1 + tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.1, DKIM_SIGNED=0.1, + DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, + HEADER_FROM_DIFFERENT_DOMAINS=0.249, MAILING_LIST_MULTI=-1, + RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] + autolearn=unavailable autolearn_force=no +Authentication-Results: a.mx.secunet.com (amavisd-new); + dkim=pass (1024-bit key) header.d=redhat.com +Received: from a.mx.secunet.com ([127.0.0.1]) + by localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024) + with ESMTP id G6SLbWf-sN4u for <steffen.klassert@secunet.com>; + Sat, 30 Mar 2024 22:36:35 +0100 (CET) +Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=147.75.80.249; helo=am.mirrors.kernel.org; envelope-from=linux-crypto+bounces-3137-steffen.klassert=secunet.com@vger.kernel.org; receiver=steffen.klassert@secunet.com +DKIM-Filter: OpenDKIM Filter v2.11.0 a.mx.secunet.com 2659620185 +Received: from am.mirrors.kernel.org (am.mirrors.kernel.org [147.75.80.249]) + (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) + (No client certificate requested) + by a.mx.secunet.com (Postfix) with ESMTPS id 2659620185 + for <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:35 +0100 (CET) +Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) + (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) + (No client certificate requested) + by am.mirrors.kernel.org (Postfix) with ESMTPS id A8BD91F20F1A + for <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 21:36:34 +0000 (UTC) +Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) + by smtp.subspace.kernel.org (Postfix) with ESMTP id 3D3294AEFE; + Sat, 30 Mar 2024 21:35:58 +0000 (UTC) +Authentication-Results: smtp.subspace.kernel.org; + dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="edzURYOC" +X-Original-To: linux-crypto@vger.kernel.org +Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) + (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) + (No client certificate requested) + by smtp.subspace.kernel.org (Postfix) with ESMTPS id ADED553E01 + for <linux-crypto@vger.kernel.org>; Sat, 30 Mar 2024 21:35:56 +0000 (UTC) +Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124 +ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; + t=1711834558; cv=none; b=mK2jizNfxG9VHmSSZBvZOv6QjGjIeAngFOyDRTkyJ3Leaz1Va1dAbod4TVAy8YdKzqURe3upvRp/RMesFhGI5gXIpfKCSSNo8snDxEt7kzgOUTicq56K3gHtQPq1mV38G3+g1BzJI/gEiXZTKWbXP7+8PzqIcxtUd8yhroN1bog= +ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; + s=arc-20240116; t=1711834558; c=relaxed/simple; + bh=XGP/bsxmN4UA90jlZmkSiIF6HI+T7qPBdxxu9QCdFjI=; + h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: + In-Reply-To:Content-Type; b=ZsHILqnU7JxzV7lD0u1g/5u8/S9mtmJ4pDD8qQlRIiIQ59As4x/pd2/KIU1fOubJj7jw6QUoJUrcgoFDuhx2TNyUrYeK0iLbQrUaX4VMx7ydR+evg+OL+dbopuaG6//RUXyWtVc2BlSOMnb3Iqu+Khs5YkBpuJsqxpN+WmVTHA4= +ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=edzURYOC; arc=none smtp.client-ip=170.10.133.124 +Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com +Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com +DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; + s=mimecast20190719; t=1711834553; + h=from:from:reply-to:subject:subject:date:date:message-id:message-id: + to:to:cc:cc:mime-version:mime-version:content-type:content-type: + content-transfer-encoding:content-transfer-encoding: + in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; + bh=R/YdumI8jd8jDImfb7MEXm8pAf+7owyDUrM2XftNAOY=; + b=edzURYOCFJVuOxIxSh1ksZBAL0UGPu7VXOXMLyCPfPp4rTQGswX93HzJ8EvG0r0mMucCZM + ywkHDRqKu3NE8vtnD7XOVdsc2SJQ02jMcMI8zXw6svXcoxmS16bWN+AwMfPA0Tm/bcGNHq + RxZL7PismjkuX8GtGL4nItNQLxvHbgQ= +Received: from mail-lf1-f70.google.com (mail-lf1-f70.google.com + [209.85.167.70]) by relay.mimecast.com with ESMTP with STARTTLS + (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id + us-mta-8-RmynicKXOH-0H-BwJSYPHw-1; Sat, 30 Mar 2024 17:35:51 -0400 +X-MC-Unique: RmynicKXOH-0H-BwJSYPHw-1 +Received: by mail-lf1-f70.google.com with SMTP id 2adb3069b0e04-50e91f9d422so2894541e87.2 + for <linux-crypto@vger.kernel.org>; Sat, 30 Mar 2024 14:35:50 -0700 (PDT) +X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; + d=1e100.net; s=20230601; t=1711834548; x=1712439348; + h=content-transfer-encoding:in-reply-to:autocrypt:content-language + :from:references:cc:to:subject:user-agent:mime-version:date + :message-id:x-gm-message-state:from:to:cc:subject:date:message-id + :reply-to; + bh=R/YdumI8jd8jDImfb7MEXm8pAf+7owyDUrM2XftNAOY=; + b=IouwQLJ2RZGq+nmfEfo2RoHQX8cOVnn6y7J3PyJLuEmVh8Dy5fnLbAY7NFPF57x1ed + HSUJIOD5mdSSeL5gRGbOvmE1PAouwFQ4nGY6LEZlBOO+JcufJoDzy1AEqravyBInAcMu + eF+LonSu5Gb6ioQUuOkQMjC8aDJV2aqNCGqL+yP3DNHYfMFoi4Spyb3dh50cQdThSSUA + A5EDGUObV9jPKuI4w+yffjkngoG69cmkCfZoGml18yDZZXWXPImjbxRgHoktckgFbVpu + 3goZ69ifnHkyEZNChhUWeb56GAn80/AmvyFnkWv+s0g4iyyJXY/r6E3/nJxnm9o/HgxI + d8HQ== +X-Forwarded-Encrypted: i=1; AJvYcCXgbdPKNpSp6x0pqfKIPH7UxydRGmQAsyq2wfAsNOF9Sefd/uzcOpJliopU2eHTtHwULlcYs4mO0/ifhDB5/hQy4wtXIscLoEyvQ0Oa +X-Gm-Message-State: AOJu0YyPJSuW7MwDC/9Sg96ZOYuImIvc8NWkUzDXWgN7EzYwBPBDOyC2 + ZDX3rSI3E78xHxq10hIUUkvGMmJESO6eh8H2p1z79F4S76qBQJmRs1570VAfl2zF7VJAho57Qfn + pnPpJ8V8V/9hkKNHH6p4O+le41idF1bYyEU6w8xJ4yrrB+Ib1ne5gmif7zZFp4w== +X-Received: by 2002:ac2:4256:0:b0:515:a5b1:1dd0 with SMTP id m22-20020ac24256000000b00515a5b11dd0mr3175179lfl.55.1711834548603; + Sat, 30 Mar 2024 14:35:48 -0700 (PDT) +X-Google-Smtp-Source: AGHT+IGtpVK74hYMJQRsbSNAOxNo0vPDNEDLKCnR39FTY23/i2sK1bKLUmtvrUTSb2GUD2WssCJO3g== +X-Received: by 2002:ac2:4256:0:b0:515:a5b1:1dd0 with SMTP id m22-20020ac24256000000b00515a5b11dd0mr3175156lfl.55.1711834548253; + Sat, 30 Mar 2024 14:35:48 -0700 (PDT) +Received: from [192.168.10.4] ([151.95.49.219]) + by smtp.googlemail.com with ESMTPSA id os26-20020a170906af7a00b00a465b72a1f3sm3494452ejb.85.2024.03.30.14.35.45 + (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); + Sat, 30 Mar 2024 14:35:47 -0700 (PDT) +Message-ID: <abbe9937-7e0f-4fbd-be0b-488de07dd56c@redhat.com> +Date: Sat, 30 Mar 2024 22:35:44 +0100 +Precedence: bulk +X-Mailing-List: linux-crypto@vger.kernel.org +List-Id: <linux-crypto.vger.kernel.org> +List-Subscribe: <mailto:linux-crypto+subscribe@vger.kernel.org> +List-Unsubscribe: <mailto:linux-crypto+unsubscribe@vger.kernel.org> +MIME-Version: 1.0 +User-Agent: Mozilla Thunderbird +Subject: Re: [PATCH v12 25/29] KVM: SVM: Add module parameter to enable the + SEV-SNP +To: Michael Roth <michael.roth@amd.com>, kvm@vger.kernel.org +Cc: linux-coco@lists.linux.dev, linux-mm@kvack.org, + linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, + tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, + thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, seanjc@google.com, + vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, + dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, + peterz@infradead.org, srinivas.pandruvada@linux.intel.com, + rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, bp@alien8.de, + vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, + tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, + alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com, + nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com, + Brijesh Singh <brijesh.singh@amd.com> +References: <20240329225835.400662-1-michael.roth@amd.com> + <20240329225835.400662-26-michael.roth@amd.com> +From: Paolo Bonzini <pbonzini@redhat.com> +Content-Language: en-US +Autocrypt: addr=pbonzini@redhat.com; keydata= + xsEhBFRCcBIBDqDGsz4K0zZun3jh+U6Z9wNGLKQ0kSFyjN38gMqU1SfP+TUNQepFHb/Gc0E2 + CxXPkIBTvYY+ZPkoTh5xF9oS1jqI8iRLzouzF8yXs3QjQIZ2SfuCxSVwlV65jotcjD2FTN04 + hVopm9llFijNZpVIOGUTqzM4U55sdsCcZUluWM6x4HSOdw5F5Utxfp1wOjD/v92Lrax0hjiX + DResHSt48q+8FrZzY+AUbkUS+Jm34qjswdrgsC5uxeVcLkBgWLmov2kMaMROT0YmFY6A3m1S + P/kXmHDXxhe23gKb3dgwxUTpENDBGcfEzrzilWueOeUWiOcWuFOed/C3SyijBx3Av/lbCsHU + Vx6pMycNTdzU1BuAroB+Y3mNEuW56Yd44jlInzG2UOwt9XjjdKkJZ1g0P9dwptwLEgTEd3Fo + UdhAQyRXGYO8oROiuh+RZ1lXp6AQ4ZjoyH8WLfTLf5g1EKCTc4C1sy1vQSdzIRu3rBIjAvnC + tGZADei1IExLqB3uzXKzZ1BZ+Z8hnt2og9hb7H0y8diYfEk2w3R7wEr+Ehk5NQsT2MPI2QBd + wEv1/Aj1DgUHZAHzG1QN9S8wNWQ6K9DqHZTBnI1hUlkp22zCSHK/6FwUCuYp1zcAEQEAAc0j + UGFvbG8gQm9uemluaSA8cGJvbnppbmlAcmVkaGF0LmNvbT7CwU0EEwECACMFAlRCcBICGwMH + CwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRB+FRAMzTZpsbceDp9IIN6BIA0Ol7MoB15E + 11kRz/ewzryFY54tQlMnd4xxfH8MTQ/mm9I482YoSwPMdcWFAKnUX6Yo30tbLiNB8hzaHeRj + jx12K+ptqYbg+cevgOtbLAlL9kNgLLcsGqC2829jBCUTVeMSZDrzS97ole/YEez2qFpPnTV0 + VrRWClWVfYh+JfzpXmgyhbkuwUxNFk421s4Ajp3d8nPPFUGgBG5HOxzkAm7xb1cjAuJ+oi/K + CHfkuN+fLZl/u3E/fw7vvOESApLU5o0icVXeakfSz0LsygEnekDbxPnE5af/9FEkXJD5EoYG + SEahaEtgNrR4qsyxyAGYgZlS70vkSSYJ+iT2rrwEiDlo31MzRo6Ba2FfHBSJ7lcYdPT7bbk9 + AO3hlNMhNdUhoQv7M5HsnqZ6unvSHOKmReNaS9egAGdRN0/GPDWr9wroyJ65ZNQsHl9nXBqE + AukZNr5oJO5vxrYiAuuTSd6UI/xFkjtkzltG3mw5ao2bBpk/V/YuePrJsnPFHG7NhizrxttB + nTuOSCMo45pfHQ+XYd5K1+Cv/NzZFNWscm5htJ0HznY+oOsZvHTyGz3v91pn51dkRYN0otqr + bQ4tlFFuVjArBZcapSIe6NV8C4cEiSTOwE0EVEJx7gEIAMeHcVzuv2bp9HlWDp6+RkZe+vtl + KwAHplb/WH59j2wyG8V6i33+6MlSSJMOFnYUCCL77bucx9uImI5nX24PIlqT+zasVEEVGSRF + m8dgkcJDB7Tps0IkNrUi4yof3B3shR+vMY3i3Ip0e41zKx0CvlAhMOo6otaHmcxr35sWq1Jk + tLkbn3wG+fPQCVudJJECvVQ//UAthSSEklA50QtD2sBkmQ14ZryEyTHQ+E42K3j2IUmOLriF + dNr9NvE1QGmGyIcbw2NIVEBOK/GWxkS5+dmxM2iD4Jdaf2nSn3jlHjEXoPwpMs0KZsgdU0pP + JQzMUMwmB1wM8JxovFlPYrhNT9MAEQEAAcLBMwQYAQIACQUCVEJx7gIbDAAKCRB+FRAMzTZp + sadRDqCctLmYICZu4GSnie4lKXl+HqlLanpVMOoFNnWs9oRP47MbE2wv8OaYh5pNR9VVgyhD + OG0AU7oidG36OeUlrFDTfnPYYSF/mPCxHttosyt8O5kabxnIPv2URuAxDByz+iVbL+RjKaGM + GDph56ZTswlx75nZVtIukqzLAQ5fa8OALSGum0cFi4ptZUOhDNz1onz61klD6z3MODi0sBZN + Aj6guB2L/+2ZwElZEeRBERRd/uommlYuToAXfNRdUwrwl9gRMiA0WSyTb190zneRRDfpSK5d + usXnM/O+kr3Dm+Ui+UioPf6wgbn3T0o6I5BhVhs4h4hWmIW7iNhPjX1iybXfmb1gAFfjtHfL + xRUr64svXpyfJMScIQtBAm0ihWPltXkyITA92ngCmPdHa6M1hMh4RDX+Jf1fiWubzp1voAg0 + JBrdmNZSQDz0iKmSrx8xkoXYfA3bgtFN8WJH2xgFL28XnqY4M6dLhJwV3z08tPSRqYFm4NMP + dRsn0/7oymhneL8RthIvjDDQ5ktUjMe8LtHr70OZE/TT88qvEdhiIVUogHdo4qBrk41+gGQh + b906Dudw5YhTJFU3nC6bbF2nrLlB4C/XSiH76ZvqzV0Z/cAMBo5NF/w= +In-Reply-To: <20240329225835.400662-26-michael.roth@amd.com> +Content-Type: text/plain; charset=UTF-8; format=flowed +Content-Transfer-Encoding: 7bit +Return-Path: linux-crypto+bounces-3137-steffen.klassert=secunet.com@vger.kernel.org +X-MS-Exchange-Organization-OriginalArrivalTime: 30 Mar 2024 21:36:37.4225 + (UTC) +X-MS-Exchange-Organization-Network-Message-Id: acec573f-931a-46c9-6803-08dc51017aa5 +X-MS-Exchange-Organization-OriginalClientIPAddress: 62.96.220.36 +X-MS-Exchange-Organization-OriginalServerIPAddress: 10.53.40.202 +X-MS-Exchange-Organization-Cross-Premises-Headers-Processed: cas-essen-02.secunet.de +X-MS-Exchange-Organization-OrderedPrecisionLatencyInProgress: LSRV=mbx-dresden-01.secunet.de:TOTAL-HUB=0.423|SMR=0.345(SMRDE=0.035|SMRC=0.310(SMRCL=0.102|X-SMRCR=0.309))|CAT=0.077(CATOS=0.012 + (CATSM=0.012(CATSM-Malware + Agent=0.011))|CATRESL=0.039(CATRESLP2R=0.036)|CATORES=0.024 + (CATRS=0.024(CATRS-Index Routing Agent=0.023)));2024-03-30T21:36:37.911Z +X-MS-Exchange-Forest-ArrivalHubServer: mbx-dresden-01.secunet.de +X-MS-Exchange-Organization-AuthSource: cas-essen-02.secunet.de +X-MS-Exchange-Organization-AuthAs: Anonymous +X-MS-Exchange-Organization-FromEntityHeader: Internet +X-MS-Exchange-Organization-OriginalSize: 13357 +X-MS-Exchange-Organization-HygienePolicy: Standard +X-MS-Exchange-Organization-MessageLatency: SRV=cas-essen-02.secunet.de:TOTAL-FE=0.065|SMR=0.024(SMRPI=0.021(SMRPI-FrontendProxyAgent=0.021))|SMS=0.041 +X-MS-Exchange-Organization-AVStamp-Enterprise: 1.0 +X-MS-Exchange-Organization-Recipient-Limit-Verified: True +X-MS-Exchange-Organization-TotalRecipientCount: 1 +X-MS-Exchange-Organization-Rules-Execution-History: 0b0cf904-14ac-4724-8bdf-482ee6223cf2%%%fd34672d-751c-45ae-a963-ed177fcabe23%%%d8080257-b0c3-47b4-b0db-23bc0c8ddb3c%%%95e591a2-5d7d-4afa-b1d0-7573d6c0a5d9%%%f7d0f6bc-4dcc-4876-8c5d-b3d6ddbb3d55%%%16355082-c50b-4214-9c7d-d39575f9f79b +X-MS-Exchange-Forest-RulesExecuted: mbx-dresden-01 +X-MS-Exchange-Organization-RulesExecuted: mbx-dresden-01 +X-MS-Exchange-Forest-IndexAgent-0: AQ0CZW4AAVUDAAAPAAADH4sIAAAAAAAEAJVS33PaRhDew0IgCHbqpA + 9920c7AmQbbBPH9Thu03YmE9cTZvLKHLoTugZ0jE7gJNM/u39A9ySZ + UoIz7SAdu6vv+/bH7V/13xPsBScvg5M+nvQuTgdtfKfCmMspvtdZjP + epzuRFq3GFv6R6doE3qfpDmhiHKpnEeDku3K6x7jWfiW6oZ1cEt4zX + QiDHmRaLqcQ5T/lMZjLFLOYJhvSOJS6MFJhplAkfE0inKJTJzSyWOH + zzoTO8vbNakeTZIpVdvNX3ViHDtx/eYaiTjKvE5GizmM91mmGk04J9 + e4dGZrn9628/3ViZ+PNcpktlCFIqYjTlE1uCSoQKeSYLdUtW5kFTim + 7Z01BNEik6Ooo648//fRybvNcmVkR7y6cpx0uee92P1ltjtRrv5VLJ + e+JZzh3XU403OvmiEoWX83FhXadSUMUrzhV2Oh37h8jTMA4+Dc6Cj8 + tZYOwrl90Q/8Qe+n6JOcZI0bjpypOJFG08oUEYmWZKJ+bAP2wTQMip + tP5B57CcglBRRGkmKkMePJJl/MgHy6dZy0/YkwMhz8NxLxy87HbPTg + fHx2envfOoF+Hx0dFZv18282gO+933/W+mur7GTn/QPkefzoF1TcYz + RfVpPaX9WI6kGRXrJ/BHzNKFfFVMpljcUb64o4SWVxwU8PYGrZ1rtf + Go3+8fvipHhBi8KNc6eNjpcp9Xm/oiyDvcLMgk8wfpvBT/G4D1kv1H + KiZ4e5P3v2p+M8Sf5XgxGd7z+UbxuG2cwoJHhtBfl2l/ABXYYQxqxQ + MVcitspwpQhVoN6g5Uq9BwwCXbRhh8bw13B5wdaNLJoOJCzbOYKrlE + J4NOCtJJLIu0yoQnQY/cAlnP7RKw9jhQb0CzSE0KBFspe/Cdy6AFtd + x1tpVUXwdQDQSgyHNrlIA6gyZ49LVqm/LIfQaeaynPikSrhzHqDhhr + 2hMq9LXGvMJusL3CqMO+k6crAP+iQ2VbkObpPoHdJ6zlAriwuw3jbQ + kyGhRdVVFS5R8bqlS8BTPYzadUs3fRpK73865t44wS2YGsYTyHuQ6A + A/tuftEPd0RT3VsJ7pWR1lcRStHYSJHT1zFbUrjlPTZq8HSl+UMeJB + E7YVL+GzbhDKYKBwAAAQq1Azw/eG1sIHZlcnNpb249IjEuMCIgZW5j + b2Rpbmc9InV0Zi0xNiI/Pg0KPEVtYWlsU2V0Pg0KICA8VmVyc2lvbj + 4xNS4wLjAuMDwvVmVyc2lvbj4NCiAgPEVtYWlscz4NCiAgICA8RW1h + aWwgU3RhcnRJbmRleD0iNjIiPg0KICAgICAgPEVtYWlsU3RyaW5nPm + JyaWplc2guc2luZ2hAYW1kLmNvbTwvRW1haWxTdHJpbmc+DQogICAg + PC9FbWFpbD4NCiAgICA8RW1haWwgU3RhcnRJbmRleD0iMzg4Ij4NCi + AgICAgIDxFbWFpbFN0cmluZz5hc2hpc2gua2FscmFAYW1kLmNvbTwv + RW1haWxTdHJpbmc+DQogICAgPC9FbWFpbD4NCiAgICA8RW1haWwgU3 + RhcnRJbmRleD0iNDQxIiBQb3NpdGlvbj0iU2lnbmF0dXJlIj4NCiAg + ICAgIDxFbWFpbFN0cmluZz5wYm9uemluaUByZWRoYXQuY29tPC9FbW + FpbFN0cmluZz4NCiAgICA8L0VtYWlsPg0KICA8L0VtYWlscz4NCjwv + RW1haWxTZXQ+AQyWCjw/eG1sIHZlcnNpb249IjEuMCIgZW5jb2Rpbm + c9InV0Zi0xNiI/Pg0KPENvbnRhY3RTZXQ+DQogIDxWZXJzaW9uPjE1 + LjAuMC4wPC9WZXJzaW9uPg0KICA8Q29udGFjdHM+DQogICAgPENvbn + RhY3QgU3RhcnRJbmRleD0iMzE4Ij4NCiAgICAgIDxQZXJzb24gU3Rh + cnRJbmRleD0iMzE4Ij4NCiAgICAgICAgPFBlcnNvblN0cmluZz5Ccm + lqZXNoIFNpbmdoPC9QZXJzb25TdHJpbmc+DQogICAgICA8L1BlcnNv + bj4NCiAgICAgIDxFbWFpbHM+DQogICAgICAgIDxFbWFpbCBTdGFydE + luZGV4PSIzMzMiPg0KICAgICAgICAgIDxFbWFpbFN0cmluZz5icmlq + ZXNoLnNpbmdoQGFtZC5jb208L0VtYWlsU3RyaW5nPg0KICAgICAgIC + A8L0VtYWlsPg0KICAgICAgPC9FbWFpbHM+DQogICAgICA8Q29udGFj + dFN0cmluZz5CcmlqZXNoIFNpbmdoICZsdDticmlqZXNoLnNpbmdoQG + FtZC5jb208L0NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YWN0Pg0K + ICAgIDxDb250YWN0IFN0YXJ0SW5kZXg9IjM3NCI+DQogICAgICA8UG + Vyc29uIFN0YXJ0SW5kZXg9IjM3NCI+DQogICAgICAgIDxQZXJzb25T + dHJpbmc+QXNoaXNoIEthbHJhPC9QZXJzb25TdHJpbmc+DQogICAgIC + A8L1BlcnNvbj4NCiAgICAgIDxFbWFpbHM+DQogICAgICAgIDxFbWFp + bCBTdGFydEluZGV4PSIzODgiPg0KICAgICAgICAgIDxFbWFpbFN0cm + luZz5hc2hpc2gua2FscmFAYW1kLmNvbTwvRW1haWxTdHJpbmc+DQog + ICAgICAgIDwvRW1haWw+DQogICAgICA8L0VtYWlscz4NCiAgICAgID + xDb250YWN0U3RyaW5nPkFzaGlzaCBLYWxyYSAmbHQ7YXNoaXNoLmth + bHJhQGFtZC5jb208L0NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YW + N0Pg0KICAgIDxDb250YWN0IFN0YXJ0SW5kZXg9IjQyNiIgUG9zaXRp + b249IlNpZ25hdHVyZSI+DQogICAgICA8UGVyc29uIFN0YXJ0SW5kZX + g9IjQyNiIgUG9zaXRpb249IlNpZ25hdHVyZSI+DQogICAgICAgIDxQ + ZXJzb25TdHJpbmc+UGFvbG8gQm9uemluaTwvUGVyc29uU3RyaW5nPg + 0KICAgICAgPC9QZXJzb24+DQogICAgICA8RW1haWxzPg0KICAgICAg + ICA8RW1haWwgU3RhcnRJbmRleD0iNDQxIiBQb3NpdGlvbj0iU2lnbm + F0dXJlIj4NCiAgICAgICAgICA8RW1haWxTdHJpbmc+cGJvbnppbmlA + cmVkaGF0LmNvbTwvRW1haWxTdHJpbmc+DQogICAgICAgIDwvRW1haW + w+DQogICAgICA8L0VtYWlscz4NCiAgICAgIDxDb250YWN0U3RyaW5n + PlBhb2xvIEJvbnppbmkgJmx0O3Bib256aW5pQHJlZGhhdC5jb208L0 + NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YWN0Pg0KICA8L0NvbnRh + Y3RzPg0KPC9Db250YWN0U2V0PgEOzwFSZXRyaWV2ZXJPcGVyYXRvci + wxMCwwO1JldHJpZXZlck9wZXJhdG9yLDExLDE7UG9zdERvY1BhcnNl + ck9wZXJhdG9yLDEwLDA7UG9zdERvY1BhcnNlck9wZXJhdG9yLDExLD + A7UG9zdFdvcmRCcmVha2VyRGlhZ25vc3RpY09wZXJhdG9yLDEwLDA7 + UG9zdFdvcmRCcmVha2VyRGlhZ25vc3RpY09wZXJhdG9yLDExLDA7VH + JhbnNwb3J0V3JpdGVyUHJvZHVjZXIsMjAsMTI= +X-MS-Exchange-Forest-IndexAgent: 1 2822 +X-MS-Exchange-Forest-EmailMessageHash: 605501D6 +X-MS-Exchange-Forest-Language: en +X-MS-Exchange-Organization-Processed-By-Journaling: Journal Agent + +On 3/29/24 23:58, Michael Roth wrote: +> From: Brijesh Singh <brijesh.singh@amd.com> +> +> Add a module parameter than can be used to enable or disable the SEV-SNP +> feature. Now that KVM contains the support for the SNP set the GHCB +> hypervisor feature flag to indicate that SNP is supported. +> +> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com> +> Signed-off-by: Ashish Kalra <ashish.kalra@amd.com> + +Reviewed-by: Paolo Bonzini <pbonzini@redhat.com> + +> --- +> arch/x86/kvm/svm/sev.c | 3 ++- +> 1 file changed, 2 insertions(+), 1 deletion(-) +> +> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c +> index 3e8de7cb3c89..658116537f3f 100644 +> --- a/arch/x86/kvm/svm/sev.c +> +++ b/arch/x86/kvm/svm/sev.c +> @@ -48,7 +48,8 @@ static bool sev_es_enabled = true; +> module_param_named(sev_es, sev_es_enabled, bool, 0444); +> +> /* enable/disable SEV-SNP support */ +> -static bool sev_snp_enabled; +> +static bool sev_snp_enabled = true; +> +module_param_named(sev_snp, sev_snp_enabled, bool, 0444); +> +> /* enable/disable SEV-ES DebugSwap support */ +> static bool sev_es_debug_swap_enabled = true; diff --git a/a/content_digest b/N1/content_digest index ee2d077..a02b633 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -72,6 +72,625 @@ "> +module_param_named(sev_snp, sev_snp_enabled, bool, 0444);\n" "> \n" "> /* enable/disable SEV-ES DebugSwap support */\n" + "> static bool sev_es_debug_swap_enabled = true;\n" + "\n" + "\n" + "X-sender: <linux-kernel+bounces-125897-steffen.klassert=secunet.com@vger.kernel.org>\n" + "X-Receiver: <steffen.klassert@secunet.com> ORCPT=rfc822;steffen.klassert@secunet.com NOTIFY=NEVER; X-ExtendedProps=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\n" + "X-CreatedBy: MSExchange15\n" + "X-HeloDomain: a.mx.secunet.com\n" + "X-ExtendedProps: BQBjAAoAtaNAQuxQ3AgFAGEACAABAAAABQA3AAIAAA8APAAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuTWFpbFJlY2lwaWVudC5Pcmdhbml6YXRpb25TY29wZREAAAAAAAAAAAAAAAAAAAAAAAUASQACAAEFAGIACgBgAAAAo4oAAAUABAAUIAEAAAAcAAAAc3RlZmZlbi5rbGFzc2VydEBzZWN1bmV0LmNvbQUABgACAAEFACkAAgABDwAJAAAAQ0lBdWRpdGVkAgABBQACAAcAAQAAAAUAAwAHAAAAAAAFAAUAAgABBQBkAA8AAwAAAEh1Yg==\n" + "X-Source: SMTP:Default MBX-DRESDEN-01\n" + "X-SourceIPAddress: 62.96.220.36\n" + "X-EndOfInjectedXHeaders: 18849\n" + "Received: from cas-essen-02.secunet.de (10.53.40.202) by\n" + " mbx-dresden-01.secunet.de (10.53.40.199) with Microsoft SMTP Server\n" + " (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id\n" + " 15.1.2507.37; Sat, 30 Mar 2024 22:36:33 +0100\n" + "Received: from a.mx.secunet.com (62.96.220.36) by cas-essen-02.secunet.de\n" + " (10.53.40.202) with Microsoft SMTP Server (version=TLS1_2,\n" + " cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.37 via Frontend\n" + " Transport; Sat, 30 Mar 2024 22:36:32 +0100\n" + "Received: from localhost (localhost [127.0.0.1])\n" + "\tby a.mx.secunet.com (Postfix) with ESMTP id 0DD0C2076B\n" + "\tfor <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:33 +0100 (CET)\n" + "X-Virus-Scanned: by secunet\n" + "X-Spam-Flag: NO\n" + "X-Spam-Score: -2.851\n" + "X-Spam-Level:\n" + "X-Spam-Status: No, score=-2.851 tagged_above=-999 required=2.1\n" + "\ttests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.1, DKIM_SIGNED=0.1,\n" + "\tDKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,\n" + "\tHEADER_FROM_DIFFERENT_DOMAINS=0.249, MAILING_LIST_MULTI=-1,\n" + "\tRCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001]\n" + "\tautolearn=ham autolearn_force=no\n" + "Authentication-Results: a.mx.secunet.com (amavisd-new);\n" + "\tdkim=pass (1024-bit key) header.d=redhat.com\n" + "Received: from a.mx.secunet.com ([127.0.0.1])\n" + "\tby localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024)\n" + "\twith ESMTP id Llvtz-F6YAUT for <steffen.klassert@secunet.com>;\n" + "\tSat, 30 Mar 2024 22:36:32 +0100 (CET)\n" + "Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=147.75.199.223; helo=ny.mirrors.kernel.org; envelope-from=linux-kernel+bounces-125897-steffen.klassert=secunet.com@vger.kernel.org; receiver=steffen.klassert@secunet.com \n" + "DKIM-Filter: OpenDKIM Filter v2.11.0 a.mx.secunet.com 56C4D20185\n" + "Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org [147.75.199.223])\n" + "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n" + "\t(No client certificate requested)\n" + "\tby a.mx.secunet.com (Postfix) with ESMTPS id 56C4D20185\n" + "\tfor <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:32 +0100 (CET)\n" + "Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140])\n" + "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n" + "\t(No client certificate requested)\n" + "\tby ny.mirrors.kernel.org (Postfix) with ESMTPS id 5BB441C21934\n" + "\tfor <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 21:36:31 +0000 (UTC)\n" + "Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])\n" + "\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 86A3C53E1A;\n" + "\tSat, 30 Mar 2024 21:35:57 +0000 (UTC)\n" + "Authentication-Results: smtp.subspace.kernel.org;\n" + "\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=\"FE2gpGrp\"\n" + "Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n" + "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n" + "\t(No client certificate requested)\n" + "\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id E02684E1D5\n" + "\tfor <linux-kernel@vger.kernel.org>; Sat, 30 Mar 2024 21:35:52 +0000 (UTC)\n" + "Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124\n" + "ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n" + "\tt=1711834554; cv=none; b=b7FLHTh4s5KJyGT/U4EW3C8rUKvo/8XbW15xZoW/Ldj2ZB8F8CXR9RWx0TCo/a98NqmsgnvLyRO7h1Q+ND/K5AkfFYKtNN8lnH9S/HOGTR8dIJ+Y19DfORrgncGvyXDsbD1yRzrgW6lNzkQZGIYg3Wge86P7hO76kHvxfnPeNF4=\n" + "ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org;\n" + "\ts=arc-20240116; t=1711834554; c=relaxed/simple;\n" + "\tbh=XGP/bsxmN4UA90jlZmkSiIF6HI+T7qPBdxxu9QCdFjI=;\n" + "\th=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:\n" + "\t In-Reply-To:Content-Type; b=uZvh3XkJIn35qzaxDGIlHNhGzRYSCjqfwQz9k78Cz5x4mG0aLHBAolrCiB7Ze9uRoohtZPKvgup+SgEcbrEsrmbsyZ80+rn4kDeCRHbiIvapx4UliYLo6PwJvOaTOtzrbKuROkk6/cjzopwOfYjQBGYlOabniJ2QgL1qeXhasBk=\n" + "ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=FE2gpGrp; arc=none smtp.client-ip=170.10.133.124\n" + "Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com\n" + "Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com\n" + "DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n" + "\ts=mimecast20190719; t=1711834551;\n" + "\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n" + "\t to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n" + "\t content-transfer-encoding:content-transfer-encoding:\n" + "\t in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n" + "\tbh=R/YdumI8jd8jDImfb7MEXm8pAf+7owyDUrM2XftNAOY=;\n" + "\tb=FE2gpGrpWlnRIpXbWfocTT4UIYFVk24/FqG5zZimf7CIdtAnU/kIbb074rzBV4VNQquOeb\n" + "\teTN3MbKMOVPS2ppvxfoagxAufdAKFn0UfYxkHQz7N30hayElSK0pLcXCFJKreU8cT+hWW4\n" + "\t70pBRDiWqHLwO0MhAJS60JlSC8hhBTE=\n" + "Received: from mail-lf1-f71.google.com (mail-lf1-f71.google.com\n" + " [209.85.167.71]) by relay.mimecast.com with ESMTP with STARTTLS\n" + " (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n" + " us-mta-66-mkNfF_eMO-6IX7-uTbmq-g-1; Sat, 30 Mar 2024 17:35:50 -0400\n" + "X-MC-Unique: mkNfF_eMO-6IX7-uTbmq-g-1\n" + "Received: by mail-lf1-f71.google.com with SMTP id 2adb3069b0e04-515c1948e73so2306242e87.3\n" + " for <linux-kernel@vger.kernel.org>; Sat, 30 Mar 2024 14:35:49 -0700 (PDT)\n" + "X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;\n" + " d=1e100.net; s=20230601; t=1711834548; x=1712439348;\n" + " h=content-transfer-encoding:in-reply-to:autocrypt:content-language\n" + " :from:references:cc:to:subject:user-agent:mime-version:date\n" + " :message-id:x-gm-message-state:from:to:cc:subject:date:message-id\n" + " :reply-to;\n" + " bh=R/YdumI8jd8jDImfb7MEXm8pAf+7owyDUrM2XftNAOY=;\n" + " b=XibPL1YT7C7WAHy76R2BNffFmAKXq7tS4GkdU7jlYD5NyTyafk9PfACl7Hn3jFgRov\n" + " Eu/Gt2HDNLI1zhBxauFdOJw7qdJ+IhtQgAHjQCWEP4FfItR4A0ph6qTBh0bsFO8nQCLh\n" + " boJk/wP5IrediBxEvZ0p1MP7BPe6STjykG10jomz1zS84ULjUkvmbBB9W8ArJOkYm2dS\n" + " wepwoevgsr34g16XRpAOviKeYv1JLIMYPU9o4eCgg4n5L/jaI4to02XXlNF4HT1OGQ05\n" + " HNsIgkbEuVI+EyqHiRqeWEmmIy86zclP6cdw6skT9jNOEGwogsGgay2cb6hTap+qh0aO\n" + " Lkug==\n" + "X-Forwarded-Encrypted: i=1; AJvYcCUpZGruGvtSL/GRzzb/T9l9NEdlyPXCEPSxQp58gfVW2yTXYs3Fm0An24hPuTNlnIRLdQSrQRaCzpAWGinXnitsZhYQjW/v+HJXwwK6\n" + "X-Gm-Message-State: AOJu0YxhKpBvOwa3o7UuzohVTOgan1vevOaRV+MzsvuUCnNUnrNpe/uC\n" + "\tD+q4iEuOd+EUyRD/EL7daw1o5qU2e2uGqU0A8JAf1JdH8jH52FlXFRnaLRT8uxrZd+Ksr2BjQaX\n" + "\tNmIKeRvlwGdfC2KaqNeLkTxAV6qmMXN9Ht8GHDfyLF4uXW/q6WkeV5IFucCL/qA==\n" + "X-Received: by 2002:ac2:4256:0:b0:515:a5b1:1dd0 with SMTP id m22-20020ac24256000000b00515a5b11dd0mr3175194lfl.55.1711834548712;\n" + " Sat, 30 Mar 2024 14:35:48 -0700 (PDT)\n" + "X-Google-Smtp-Source: AGHT+IGtpVK74hYMJQRsbSNAOxNo0vPDNEDLKCnR39FTY23/i2sK1bKLUmtvrUTSb2GUD2WssCJO3g==\n" + "X-Received: by 2002:ac2:4256:0:b0:515:a5b1:1dd0 with SMTP id m22-20020ac24256000000b00515a5b11dd0mr3175156lfl.55.1711834548253;\n" + " Sat, 30 Mar 2024 14:35:48 -0700 (PDT)\n" + "Received: from [192.168.10.4] ([151.95.49.219])\n" + " by smtp.googlemail.com with ESMTPSA id os26-20020a170906af7a00b00a465b72a1f3sm3494452ejb.85.2024.03.30.14.35.45\n" + " (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n" + " Sat, 30 Mar 2024 14:35:47 -0700 (PDT)\n" + "Message-ID: <abbe9937-7e0f-4fbd-be0b-488de07dd56c@redhat.com>\n" + "Date: Sat, 30 Mar 2024 22:35:44 +0100\n" + "Precedence: bulk\n" + "X-Mailing-List: linux-kernel@vger.kernel.org\n" + "List-Id: <linux-kernel.vger.kernel.org>\n" + "List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org>\n" + "List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org>\n" + "MIME-Version: 1.0\n" + "User-Agent: Mozilla Thunderbird\n" + "Subject: Re: [PATCH v12 25/29] KVM: SVM: Add module parameter to enable the\n" + " SEV-SNP\n" + "To: Michael Roth <michael.roth@amd.com>, kvm@vger.kernel.org\n" + "Cc: linux-coco@lists.linux.dev, linux-mm@kvack.org,\n" + " linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org,\n" + " tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de,\n" + " thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, seanjc@google.com,\n" + " vkuznets@redhat.com, jmattson@google.com, luto@kernel.org,\n" + " dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com,\n" + " peterz@infradead.org, srinivas.pandruvada@linux.intel.com,\n" + " rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, bp@alien8.de,\n" + " vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com,\n" + " tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com,\n" + " alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com,\n" + " nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com,\n" + " Brijesh Singh <brijesh.singh@amd.com>\n" + "References: <20240329225835.400662-1-michael.roth@amd.com>\n" + " <20240329225835.400662-26-michael.roth@amd.com>\n" + "From: Paolo Bonzini <pbonzini@redhat.com>\n" + "Content-Language: en-US\n" + "Autocrypt: addr=pbonzini@redhat.com; keydata=\n" + " xsEhBFRCcBIBDqDGsz4K0zZun3jh+U6Z9wNGLKQ0kSFyjN38gMqU1SfP+TUNQepFHb/Gc0E2\n" + " CxXPkIBTvYY+ZPkoTh5xF9oS1jqI8iRLzouzF8yXs3QjQIZ2SfuCxSVwlV65jotcjD2FTN04\n" + " hVopm9llFijNZpVIOGUTqzM4U55sdsCcZUluWM6x4HSOdw5F5Utxfp1wOjD/v92Lrax0hjiX\n" + " DResHSt48q+8FrZzY+AUbkUS+Jm34qjswdrgsC5uxeVcLkBgWLmov2kMaMROT0YmFY6A3m1S\n" + " P/kXmHDXxhe23gKb3dgwxUTpENDBGcfEzrzilWueOeUWiOcWuFOed/C3SyijBx3Av/lbCsHU\n" + " Vx6pMycNTdzU1BuAroB+Y3mNEuW56Yd44jlInzG2UOwt9XjjdKkJZ1g0P9dwptwLEgTEd3Fo\n" + " UdhAQyRXGYO8oROiuh+RZ1lXp6AQ4ZjoyH8WLfTLf5g1EKCTc4C1sy1vQSdzIRu3rBIjAvnC\n" + " tGZADei1IExLqB3uzXKzZ1BZ+Z8hnt2og9hb7H0y8diYfEk2w3R7wEr+Ehk5NQsT2MPI2QBd\n" + " wEv1/Aj1DgUHZAHzG1QN9S8wNWQ6K9DqHZTBnI1hUlkp22zCSHK/6FwUCuYp1zcAEQEAAc0j\n" + " UGFvbG8gQm9uemluaSA8cGJvbnppbmlAcmVkaGF0LmNvbT7CwU0EEwECACMFAlRCcBICGwMH\n" + " CwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRB+FRAMzTZpsbceDp9IIN6BIA0Ol7MoB15E\n" + " 11kRz/ewzryFY54tQlMnd4xxfH8MTQ/mm9I482YoSwPMdcWFAKnUX6Yo30tbLiNB8hzaHeRj\n" + " jx12K+ptqYbg+cevgOtbLAlL9kNgLLcsGqC2829jBCUTVeMSZDrzS97ole/YEez2qFpPnTV0\n" + " VrRWClWVfYh+JfzpXmgyhbkuwUxNFk421s4Ajp3d8nPPFUGgBG5HOxzkAm7xb1cjAuJ+oi/K\n" + " CHfkuN+fLZl/u3E/fw7vvOESApLU5o0icVXeakfSz0LsygEnekDbxPnE5af/9FEkXJD5EoYG\n" + " SEahaEtgNrR4qsyxyAGYgZlS70vkSSYJ+iT2rrwEiDlo31MzRo6Ba2FfHBSJ7lcYdPT7bbk9\n" + " AO3hlNMhNdUhoQv7M5HsnqZ6unvSHOKmReNaS9egAGdRN0/GPDWr9wroyJ65ZNQsHl9nXBqE\n" + " AukZNr5oJO5vxrYiAuuTSd6UI/xFkjtkzltG3mw5ao2bBpk/V/YuePrJsnPFHG7NhizrxttB\n" + " nTuOSCMo45pfHQ+XYd5K1+Cv/NzZFNWscm5htJ0HznY+oOsZvHTyGz3v91pn51dkRYN0otqr\n" + " bQ4tlFFuVjArBZcapSIe6NV8C4cEiSTOwE0EVEJx7gEIAMeHcVzuv2bp9HlWDp6+RkZe+vtl\n" + " KwAHplb/WH59j2wyG8V6i33+6MlSSJMOFnYUCCL77bucx9uImI5nX24PIlqT+zasVEEVGSRF\n" + " m8dgkcJDB7Tps0IkNrUi4yof3B3shR+vMY3i3Ip0e41zKx0CvlAhMOo6otaHmcxr35sWq1Jk\n" + " tLkbn3wG+fPQCVudJJECvVQ//UAthSSEklA50QtD2sBkmQ14ZryEyTHQ+E42K3j2IUmOLriF\n" + " dNr9NvE1QGmGyIcbw2NIVEBOK/GWxkS5+dmxM2iD4Jdaf2nSn3jlHjEXoPwpMs0KZsgdU0pP\n" + " JQzMUMwmB1wM8JxovFlPYrhNT9MAEQEAAcLBMwQYAQIACQUCVEJx7gIbDAAKCRB+FRAMzTZp\n" + " sadRDqCctLmYICZu4GSnie4lKXl+HqlLanpVMOoFNnWs9oRP47MbE2wv8OaYh5pNR9VVgyhD\n" + " OG0AU7oidG36OeUlrFDTfnPYYSF/mPCxHttosyt8O5kabxnIPv2URuAxDByz+iVbL+RjKaGM\n" + " GDph56ZTswlx75nZVtIukqzLAQ5fa8OALSGum0cFi4ptZUOhDNz1onz61klD6z3MODi0sBZN\n" + " Aj6guB2L/+2ZwElZEeRBERRd/uommlYuToAXfNRdUwrwl9gRMiA0WSyTb190zneRRDfpSK5d\n" + " usXnM/O+kr3Dm+Ui+UioPf6wgbn3T0o6I5BhVhs4h4hWmIW7iNhPjX1iybXfmb1gAFfjtHfL\n" + " xRUr64svXpyfJMScIQtBAm0ihWPltXkyITA92ngCmPdHa6M1hMh4RDX+Jf1fiWubzp1voAg0\n" + " JBrdmNZSQDz0iKmSrx8xkoXYfA3bgtFN8WJH2xgFL28XnqY4M6dLhJwV3z08tPSRqYFm4NMP\n" + " dRsn0/7oymhneL8RthIvjDDQ5ktUjMe8LtHr70OZE/TT88qvEdhiIVUogHdo4qBrk41+gGQh\n" + " b906Dudw5YhTJFU3nC6bbF2nrLlB4C/XSiH76ZvqzV0Z/cAMBo5NF/w=\n" + "In-Reply-To: <20240329225835.400662-26-michael.roth@amd.com>\n" + "Content-Type: text/plain; charset=UTF-8; format=flowed\n" + "Content-Transfer-Encoding: 7bit\n" + "Return-Path: linux-kernel+bounces-125897-steffen.klassert=secunet.com@vger.kernel.org\n" + "X-MS-Exchange-Organization-OriginalArrivalTime: 30 Mar 2024 21:36:32.9947\n" + " (UTC)\n" + "X-MS-Exchange-Organization-Network-Message-Id: c85bfe61-624d-4800-c8ac-08dc51017801\n" + "X-MS-Exchange-Organization-OriginalClientIPAddress: 62.96.220.36\n" + "X-MS-Exchange-Organization-OriginalServerIPAddress: 10.53.40.202\n" + "X-MS-Exchange-Organization-Cross-Premises-Headers-Processed: cas-essen-02.secunet.de\n" + "X-MS-Exchange-Organization-OrderedPrecisionLatencyInProgress: LSRV=mbx-dresden-01.secunet.de:TOTAL-HUB=0.419|SMR=0.341(SMRDE=0.035|SMRC=0.305(SMRCL=0.102|X-SMRCR=0.306))|CAT=0.077(CATOS=0.011\n" + " (CATSM=0.011(CATSM-Malware\n" + " Agent=0.010))|CATRESL=0.041(CATRESLP2R=0.037)|CATORES=0.023\n" + " (CATRS=0.023(CATRS-Index Routing Agent=0.022)));2024-03-30T21:36:33.464Z\n" + "X-MS-Exchange-Forest-ArrivalHubServer: mbx-dresden-01.secunet.de\n" + "X-MS-Exchange-Organization-AuthSource: cas-essen-02.secunet.de\n" + "X-MS-Exchange-Organization-AuthAs: Anonymous\n" + "X-MS-Exchange-Organization-FromEntityHeader: Internet\n" + "X-MS-Exchange-Organization-OriginalSize: 13311\n" + "X-MS-Exchange-Organization-HygienePolicy: Standard\n" + "X-MS-Exchange-Organization-MessageLatency: SRV=cas-essen-02.secunet.de:TOTAL-FE=0.050|SMR=0.008(SMRPI=0.005(SMRPI-FrontendProxyAgent=0.005))|SMS=0.042\n" + "X-MS-Exchange-Organization-AVStamp-Enterprise: 1.0\n" + "X-MS-Exchange-Organization-Recipient-Limit-Verified: True\n" + "X-MS-Exchange-Organization-TotalRecipientCount: 1\n" + "X-MS-Exchange-Organization-Rules-Execution-History: 0b0cf904-14ac-4724-8bdf-482ee6223cf2%%%fd34672d-751c-45ae-a963-ed177fcabe23%%%d8080257-b0c3-47b4-b0db-23bc0c8ddb3c%%%95e591a2-5d7d-4afa-b1d0-7573d6c0a5d9%%%f7d0f6bc-4dcc-4876-8c5d-b3d6ddbb3d55%%%16355082-c50b-4214-9c7d-d39575f9f79b\n" + "X-MS-Exchange-Forest-RulesExecuted: mbx-dresden-01\n" + "X-MS-Exchange-Organization-RulesExecuted: mbx-dresden-01\n" + "X-MS-Exchange-Forest-IndexAgent-0: AQ0CZW4AAVUDAAAPAAADH4sIAAAAAAAEAJVS33PaRhDew0IgCHbqpA\n" + " 9920c7AmQbbBPH9Thu03YmE9cTZvLKHLoTugZ0jE7gJNM/u39A9ySZ\n" + " UoIz7SAdu6vv+/bH7V/13xPsBScvg5M+nvQuTgdtfKfCmMspvtdZjP\n" + " epzuRFq3GFv6R6doE3qfpDmhiHKpnEeDku3K6x7jWfiW6oZ1cEt4zX\n" + " QiDHmRaLqcQ5T/lMZjLFLOYJhvSOJS6MFJhplAkfE0inKJTJzSyWOH\n" + " zzoTO8vbNakeTZIpVdvNX3ViHDtx/eYaiTjKvE5GizmM91mmGk04J9\n" + " e4dGZrn9628/3ViZ+PNcpktlCFIqYjTlE1uCSoQKeSYLdUtW5kFTim\n" + " 7Z01BNEik6Ooo648//fRybvNcmVkR7y6cpx0uee92P1ltjtRrv5VLJ\n" + " e+JZzh3XU403OvmiEoWX83FhXadSUMUrzhV2Oh37h8jTMA4+Dc6Cj8\n" + " tZYOwrl90Q/8Qe+n6JOcZI0bjpypOJFG08oUEYmWZKJ+bAP2wTQMip\n" + " tP5B57CcglBRRGkmKkMePJJl/MgHy6dZy0/YkwMhz8NxLxy87HbPTg\n" + " fHx2envfOoF+Hx0dFZv18282gO+933/W+mur7GTn/QPkefzoF1TcYz\n" + " RfVpPaX9WI6kGRXrJ/BHzNKFfFVMpljcUb64o4SWVxwU8PYGrZ1rtf\n" + " Go3+8fvipHhBi8KNc6eNjpcp9Xm/oiyDvcLMgk8wfpvBT/G4D1kv1H\n" + " KiZ4e5P3v2p+M8Sf5XgxGd7z+UbxuG2cwoJHhtBfl2l/ABXYYQxqxQ\n" + " MVcitspwpQhVoN6g5Uq9BwwCXbRhh8bw13B5wdaNLJoOJCzbOYKrlE\n" + " J4NOCtJJLIu0yoQnQY/cAlnP7RKw9jhQb0CzSE0KBFspe/Cdy6AFtd\n" + " x1tpVUXwdQDQSgyHNrlIA6gyZ49LVqm/LIfQaeaynPikSrhzHqDhhr\n" + " 2hMq9LXGvMJusL3CqMO+k6crAP+iQ2VbkObpPoHdJ6zlAriwuw3jbQ\n" + " kyGhRdVVFS5R8bqlS8BTPYzadUs3fRpK73865t44wS2YGsYTyHuQ6A\n" + " A/tuftEPd0RT3VsJ7pWR1lcRStHYSJHT1zFbUrjlPTZq8HSl+UMeJB\n" + " E7YVL+GzbhDKYKBwAAAQq1Azw/eG1sIHZlcnNpb249IjEuMCIgZW5j\n" + " b2Rpbmc9InV0Zi0xNiI/Pg0KPEVtYWlsU2V0Pg0KICA8VmVyc2lvbj\n" + " 4xNS4wLjAuMDwvVmVyc2lvbj4NCiAgPEVtYWlscz4NCiAgICA8RW1h\n" + " aWwgU3RhcnRJbmRleD0iNjIiPg0KICAgICAgPEVtYWlsU3RyaW5nPm\n" + " JyaWplc2guc2luZ2hAYW1kLmNvbTwvRW1haWxTdHJpbmc+DQogICAg\n" + " PC9FbWFpbD4NCiAgICA8RW1haWwgU3RhcnRJbmRleD0iMzg4Ij4NCi\n" + " AgICAgIDxFbWFpbFN0cmluZz5hc2hpc2gua2FscmFAYW1kLmNvbTwv\n" + " RW1haWxTdHJpbmc+DQogICAgPC9FbWFpbD4NCiAgICA8RW1haWwgU3\n" + " RhcnRJbmRleD0iNDQxIiBQb3NpdGlvbj0iU2lnbmF0dXJlIj4NCiAg\n" + " ICAgIDxFbWFpbFN0cmluZz5wYm9uemluaUByZWRoYXQuY29tPC9FbW\n" + " FpbFN0cmluZz4NCiAgICA8L0VtYWlsPg0KICA8L0VtYWlscz4NCjwv\n" + " RW1haWxTZXQ+AQyWCjw/eG1sIHZlcnNpb249IjEuMCIgZW5jb2Rpbm\n" + " c9InV0Zi0xNiI/Pg0KPENvbnRhY3RTZXQ+DQogIDxWZXJzaW9uPjE1\n" + " LjAuMC4wPC9WZXJzaW9uPg0KICA8Q29udGFjdHM+DQogICAgPENvbn\n" + " RhY3QgU3RhcnRJbmRleD0iMzE4Ij4NCiAgICAgIDxQZXJzb24gU3Rh\n" + " cnRJbmRleD0iMzE4Ij4NCiAgICAgICAgPFBlcnNvblN0cmluZz5Ccm\n" + " lqZXNoIFNpbmdoPC9QZXJzb25TdHJpbmc+DQogICAgICA8L1BlcnNv\n" + " bj4NCiAgICAgIDxFbWFpbHM+DQogICAgICAgIDxFbWFpbCBTdGFydE\n" + " luZGV4PSIzMzMiPg0KICAgICAgICAgIDxFbWFpbFN0cmluZz5icmlq\n" + " ZXNoLnNpbmdoQGFtZC5jb208L0VtYWlsU3RyaW5nPg0KICAgICAgIC\n" + " A8L0VtYWlsPg0KICAgICAgPC9FbWFpbHM+DQogICAgICA8Q29udGFj\n" + " dFN0cmluZz5CcmlqZXNoIFNpbmdoICZsdDticmlqZXNoLnNpbmdoQG\n" + " FtZC5jb208L0NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YWN0Pg0K\n" + " ICAgIDxDb250YWN0IFN0YXJ0SW5kZXg9IjM3NCI+DQogICAgICA8UG\n" + " Vyc29uIFN0YXJ0SW5kZXg9IjM3NCI+DQogICAgICAgIDxQZXJzb25T\n" + " dHJpbmc+QXNoaXNoIEthbHJhPC9QZXJzb25TdHJpbmc+DQogICAgIC\n" + " A8L1BlcnNvbj4NCiAgICAgIDxFbWFpbHM+DQogICAgICAgIDxFbWFp\n" + " bCBTdGFydEluZGV4PSIzODgiPg0KICAgICAgICAgIDxFbWFpbFN0cm\n" + " luZz5hc2hpc2gua2FscmFAYW1kLmNvbTwvRW1haWxTdHJpbmc+DQog\n" + " ICAgICAgIDwvRW1haWw+DQogICAgICA8L0VtYWlscz4NCiAgICAgID\n" + " xDb250YWN0U3RyaW5nPkFzaGlzaCBLYWxyYSAmbHQ7YXNoaXNoLmth\n" + " bHJhQGFtZC5jb208L0NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YW\n" + " N0Pg0KICAgIDxDb250YWN0IFN0YXJ0SW5kZXg9IjQyNiIgUG9zaXRp\n" + " b249IlNpZ25hdHVyZSI+DQogICAgICA8UGVyc29uIFN0YXJ0SW5kZX\n" + " g9IjQyNiIgUG9zaXRpb249IlNpZ25hdHVyZSI+DQogICAgICAgIDxQ\n" + " ZXJzb25TdHJpbmc+UGFvbG8gQm9uemluaTwvUGVyc29uU3RyaW5nPg\n" + " 0KICAgICAgPC9QZXJzb24+DQogICAgICA8RW1haWxzPg0KICAgICAg\n" + " ICA8RW1haWwgU3RhcnRJbmRleD0iNDQxIiBQb3NpdGlvbj0iU2lnbm\n" + " F0dXJlIj4NCiAgICAgICAgICA8RW1haWxTdHJpbmc+cGJvbnppbmlA\n" + " cmVkaGF0LmNvbTwvRW1haWxTdHJpbmc+DQogICAgICAgIDwvRW1haW\n" + " w+DQogICAgICA8L0VtYWlscz4NCiAgICAgIDxDb250YWN0U3RyaW5n\n" + " PlBhb2xvIEJvbnppbmkgJmx0O3Bib256aW5pQHJlZGhhdC5jb208L0\n" + " NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YWN0Pg0KICA8L0NvbnRh\n" + " Y3RzPg0KPC9Db250YWN0U2V0PgEOzwFSZXRyaWV2ZXJPcGVyYXRvci\n" + " wxMCwxO1JldHJpZXZlck9wZXJhdG9yLDExLDE7UG9zdERvY1BhcnNl\n" + " ck9wZXJhdG9yLDEwLDA7UG9zdERvY1BhcnNlck9wZXJhdG9yLDExLD\n" + " A7UG9zdFdvcmRCcmVha2VyRGlhZ25vc3RpY09wZXJhdG9yLDEwLDA7\n" + " UG9zdFdvcmRCcmVha2VyRGlhZ25vc3RpY09wZXJhdG9yLDExLDA7VH\n" + " JhbnNwb3J0V3JpdGVyUHJvZHVjZXIsMjAsMTM=\n" + "X-MS-Exchange-Forest-IndexAgent: 1 2822\n" + "X-MS-Exchange-Forest-EmailMessageHash: 605501D6\n" + "X-MS-Exchange-Forest-Language: en\n" + "X-MS-Exchange-Organization-Processed-By-Journaling: Journal Agent\n" + "\n" + "On 3/29/24 23:58, Michael Roth wrote:\n" + "> From: Brijesh Singh <brijesh.singh@amd.com>\n" + "> \n" + "> Add a module parameter than can be used to enable or disable the SEV-SNP\n" + "> feature. Now that KVM contains the support for the SNP set the GHCB\n" + "> hypervisor feature flag to indicate that SNP is supported.\n" + "> \n" + "> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>\n" + "> Signed-off-by: Ashish Kalra <ashish.kalra@amd.com>\n" + "\n" + "Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>\n" + "\n" + "> ---\n" + "> arch/x86/kvm/svm/sev.c | 3 ++-\n" + "> 1 file changed, 2 insertions(+), 1 deletion(-)\n" + "> \n" + "> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c\n" + "> index 3e8de7cb3c89..658116537f3f 100644\n" + "> --- a/arch/x86/kvm/svm/sev.c\n" + "> +++ b/arch/x86/kvm/svm/sev.c\n" + "> @@ -48,7 +48,8 @@ static bool sev_es_enabled = true;\n" + "> module_param_named(sev_es, sev_es_enabled, bool, 0444);\n" + "> \n" + "> /* enable/disable SEV-SNP support */\n" + "> -static bool sev_snp_enabled;\n" + "> +static bool sev_snp_enabled = true;\n" + "> +module_param_named(sev_snp, sev_snp_enabled, bool, 0444);\n" + "> \n" + "> /* enable/disable SEV-ES DebugSwap support */\n" + "> static bool sev_es_debug_swap_enabled = true;\n" + "\n" + "\n" + "X-sender: <linux-crypto+bounces-3137-steffen.klassert=secunet.com@vger.kernel.org>\n" + "X-Receiver: <steffen.klassert@secunet.com> ORCPT=rfc822;steffen.klassert@secunet.com NOTIFY=NEVER; X-ExtendedProps=BQAVABYAAgAAAAUAFAARAPDFCS25BAlDktII2g02frgPADUAAABNaWNyb3NvZnQuRXhjaGFuZ2UuVHJhbnNwb3J0LkRpcmVjdG9yeURhdGEuSXNSZXNvdXJjZQIAAAUAagAJAAEAAAAAAAAABQAWAAIAAAUAQwACAAAFAEYABwADAAAABQBHAAIAAAUAEgAPAGIAAAAvbz1zZWN1bmV0L291PUV4Y2hhbmdlIEFkbWluaXN0cmF0aXZlIEdyb3VwIChGWURJQk9IRjIzU1BETFQpL2NuPVJlY2lwaWVudHMvY249U3RlZmZlbiBLbGFzc2VydDY4YwUACwAXAL4AAACheZxkHSGBRqAcAp3ukbifQ049REI2LENOPURhdGFiYXNlcyxDTj1FeGNoYW5nZSBBZG1pbmlzdHJhdGl2ZSBHcm91cCAoRllESUJPSEYyM1NQRExUKSxDTj1BZG1pbmlzdHJhdGl2ZSBHcm91cHMsQ049c2VjdW5ldCxDTj1NaWNyb3NvZnQgRXhjaGFuZ2UsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1zZWN1bmV0LERDPWRlBQAOABEABiAS9uuMOkqzwmEZDvWNNQUAHQAPAAwAAABtYngtZXNzZW4tMDIFADwAAgAADwA2AAAATWljcm9zb2Z0LkV4Y2hhbmdlLlRyYW5zcG9ydC5NYWlsUmVjaXBpZW50LkRpc3BsYXlOYW1lDwARAAAAS2xhc3NlcnQsIFN0ZWZmZW4FAAwAAgAABQBsAAIAAAUAWAAXAEoAAADwxQktuQQJQ5LSCNoNNn64Q049S2xhc3NlcnQgU3RlZmZlbixPVT1Vc2VycyxPVT1NaWdyYXRpb24sREM9c2VjdW5ldCxEQz1kZQUAJgACAAEFACIADwAxAAAAQXV0b1Jlc3BvbnNlU3VwcHJlc3M6IDANClRyYW5zbWl0SGlzdG9yeTogRmFsc2UNCg8ALwAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuRXhwYW5zaW9uR3JvdXBUeXBlDwAVAAAATWVtYmVyc0dyb3VwRXhwYW5zaW9uBQAjAAIAAQ==\n" + "X-CreatedBy: MSExchange15\n" + "X-HeloDomain: a.mx.secunet.com\n" + "X-ExtendedProps: BQBjAAoAtaNAQuxQ3AgFAGEACAABAAAABQA3AAIAAA8APAAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuTWFpbFJlY2lwaWVudC5Pcmdhbml6YXRpb25TY29wZREAAAAAAAAAAAAAAAAAAAAAAAUASQACAAEFAGIACgBhAAAAo4oAAAUABAAUIAEAAAAcAAAAc3RlZmZlbi5rbGFzc2VydEBzZWN1bmV0LmNvbQUABgACAAEFACkAAgABDwAJAAAAQ0lBdWRpdGVkAgABBQACAAcAAQAAAAUAAwAHAAAAAAAFAAUAAgABBQBkAA8AAwAAAEh1Yg==\n" + "X-Source: SMTP:Default MBX-DRESDEN-01\n" + "X-SourceIPAddress: 62.96.220.36\n" + "X-EndOfInjectedXHeaders: 18895\n" + "Received: from cas-essen-02.secunet.de (10.53.40.202) by\n" + " mbx-dresden-01.secunet.de (10.53.40.199) with Microsoft SMTP Server\n" + " (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id\n" + " 15.1.2507.37; Sat, 30 Mar 2024 22:36:37 +0100\n" + "Received: from a.mx.secunet.com (62.96.220.36) by cas-essen-02.secunet.de\n" + " (10.53.40.202) with Microsoft SMTP Server (version=TLS1_2,\n" + " cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.37 via Frontend\n" + " Transport; Sat, 30 Mar 2024 22:36:37 +0100\n" + "Received: from localhost (localhost [127.0.0.1])\n" + "\tby a.mx.secunet.com (Postfix) with ESMTP id 7795A2076B\n" + "\tfor <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:37 +0100 (CET)\n" + "X-Virus-Scanned: by secunet\n" + "X-Spam-Flag: NO\n" + "X-Spam-Score: -2.851\n" + "X-Spam-Level:\n" + "X-Spam-Status: No, score=-2.851 tagged_above=-999 required=2.1\n" + "\ttests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.1, DKIM_SIGNED=0.1,\n" + "\tDKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,\n" + "\tHEADER_FROM_DIFFERENT_DOMAINS=0.249, MAILING_LIST_MULTI=-1,\n" + "\tRCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001]\n" + "\tautolearn=unavailable autolearn_force=no\n" + "Authentication-Results: a.mx.secunet.com (amavisd-new);\n" + "\tdkim=pass (1024-bit key) header.d=redhat.com\n" + "Received: from a.mx.secunet.com ([127.0.0.1])\n" + "\tby localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024)\n" + "\twith ESMTP id G6SLbWf-sN4u for <steffen.klassert@secunet.com>;\n" + "\tSat, 30 Mar 2024 22:36:35 +0100 (CET)\n" + "Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=147.75.80.249; helo=am.mirrors.kernel.org; envelope-from=linux-crypto+bounces-3137-steffen.klassert=secunet.com@vger.kernel.org; receiver=steffen.klassert@secunet.com \n" + "DKIM-Filter: OpenDKIM Filter v2.11.0 a.mx.secunet.com 2659620185\n" + "Received: from am.mirrors.kernel.org (am.mirrors.kernel.org [147.75.80.249])\n" + "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n" + "\t(No client certificate requested)\n" + "\tby a.mx.secunet.com (Postfix) with ESMTPS id 2659620185\n" + "\tfor <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:35 +0100 (CET)\n" + "Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140])\n" + "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n" + "\t(No client certificate requested)\n" + "\tby am.mirrors.kernel.org (Postfix) with ESMTPS id A8BD91F20F1A\n" + "\tfor <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 21:36:34 +0000 (UTC)\n" + "Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])\n" + "\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 3D3294AEFE;\n" + "\tSat, 30 Mar 2024 21:35:58 +0000 (UTC)\n" + "Authentication-Results: smtp.subspace.kernel.org;\n" + "\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=\"edzURYOC\"\n" + "X-Original-To: linux-crypto@vger.kernel.org\n" + "Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n" + "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n" + "\t(No client certificate requested)\n" + "\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id ADED553E01\n" + "\tfor <linux-crypto@vger.kernel.org>; Sat, 30 Mar 2024 21:35:56 +0000 (UTC)\n" + "Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124\n" + "ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n" + "\tt=1711834558; cv=none; b=mK2jizNfxG9VHmSSZBvZOv6QjGjIeAngFOyDRTkyJ3Leaz1Va1dAbod4TVAy8YdKzqURe3upvRp/RMesFhGI5gXIpfKCSSNo8snDxEt7kzgOUTicq56K3gHtQPq1mV38G3+g1BzJI/gEiXZTKWbXP7+8PzqIcxtUd8yhroN1bog=\n" + "ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org;\n" + "\ts=arc-20240116; t=1711834558; c=relaxed/simple;\n" + "\tbh=XGP/bsxmN4UA90jlZmkSiIF6HI+T7qPBdxxu9QCdFjI=;\n" + "\th=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:\n" + "\t In-Reply-To:Content-Type; b=ZsHILqnU7JxzV7lD0u1g/5u8/S9mtmJ4pDD8qQlRIiIQ59As4x/pd2/KIU1fOubJj7jw6QUoJUrcgoFDuhx2TNyUrYeK0iLbQrUaX4VMx7ydR+evg+OL+dbopuaG6//RUXyWtVc2BlSOMnb3Iqu+Khs5YkBpuJsqxpN+WmVTHA4=\n" + "ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=edzURYOC; arc=none smtp.client-ip=170.10.133.124\n" + "Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com\n" + "Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com\n" + "DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n" + "\ts=mimecast20190719; t=1711834553;\n" + "\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n" + "\t to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n" + "\t content-transfer-encoding:content-transfer-encoding:\n" + "\t in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n" + "\tbh=R/YdumI8jd8jDImfb7MEXm8pAf+7owyDUrM2XftNAOY=;\n" + "\tb=edzURYOCFJVuOxIxSh1ksZBAL0UGPu7VXOXMLyCPfPp4rTQGswX93HzJ8EvG0r0mMucCZM\n" + "\tywkHDRqKu3NE8vtnD7XOVdsc2SJQ02jMcMI8zXw6svXcoxmS16bWN+AwMfPA0Tm/bcGNHq\n" + "\tRxZL7PismjkuX8GtGL4nItNQLxvHbgQ=\n" + "Received: from mail-lf1-f70.google.com (mail-lf1-f70.google.com\n" + " [209.85.167.70]) by relay.mimecast.com with ESMTP with STARTTLS\n" + " (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n" + " us-mta-8-RmynicKXOH-0H-BwJSYPHw-1; Sat, 30 Mar 2024 17:35:51 -0400\n" + "X-MC-Unique: RmynicKXOH-0H-BwJSYPHw-1\n" + "Received: by mail-lf1-f70.google.com with SMTP id 2adb3069b0e04-50e91f9d422so2894541e87.2\n" + " for <linux-crypto@vger.kernel.org>; Sat, 30 Mar 2024 14:35:50 -0700 (PDT)\n" + "X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;\n" + " d=1e100.net; s=20230601; t=1711834548; x=1712439348;\n" + " h=content-transfer-encoding:in-reply-to:autocrypt:content-language\n" + " :from:references:cc:to:subject:user-agent:mime-version:date\n" + " :message-id:x-gm-message-state:from:to:cc:subject:date:message-id\n" + " :reply-to;\n" + " bh=R/YdumI8jd8jDImfb7MEXm8pAf+7owyDUrM2XftNAOY=;\n" + " b=IouwQLJ2RZGq+nmfEfo2RoHQX8cOVnn6y7J3PyJLuEmVh8Dy5fnLbAY7NFPF57x1ed\n" + " HSUJIOD5mdSSeL5gRGbOvmE1PAouwFQ4nGY6LEZlBOO+JcufJoDzy1AEqravyBInAcMu\n" + " eF+LonSu5Gb6ioQUuOkQMjC8aDJV2aqNCGqL+yP3DNHYfMFoi4Spyb3dh50cQdThSSUA\n" + " A5EDGUObV9jPKuI4w+yffjkngoG69cmkCfZoGml18yDZZXWXPImjbxRgHoktckgFbVpu\n" + " 3goZ69ifnHkyEZNChhUWeb56GAn80/AmvyFnkWv+s0g4iyyJXY/r6E3/nJxnm9o/HgxI\n" + " d8HQ==\n" + "X-Forwarded-Encrypted: i=1; AJvYcCXgbdPKNpSp6x0pqfKIPH7UxydRGmQAsyq2wfAsNOF9Sefd/uzcOpJliopU2eHTtHwULlcYs4mO0/ifhDB5/hQy4wtXIscLoEyvQ0Oa\n" + "X-Gm-Message-State: AOJu0YyPJSuW7MwDC/9Sg96ZOYuImIvc8NWkUzDXWgN7EzYwBPBDOyC2\n" + "\tZDX3rSI3E78xHxq10hIUUkvGMmJESO6eh8H2p1z79F4S76qBQJmRs1570VAfl2zF7VJAho57Qfn\n" + "\tpnPpJ8V8V/9hkKNHH6p4O+le41idF1bYyEU6w8xJ4yrrB+Ib1ne5gmif7zZFp4w==\n" + "X-Received: by 2002:ac2:4256:0:b0:515:a5b1:1dd0 with SMTP id m22-20020ac24256000000b00515a5b11dd0mr3175179lfl.55.1711834548603;\n" + " Sat, 30 Mar 2024 14:35:48 -0700 (PDT)\n" + "X-Google-Smtp-Source: AGHT+IGtpVK74hYMJQRsbSNAOxNo0vPDNEDLKCnR39FTY23/i2sK1bKLUmtvrUTSb2GUD2WssCJO3g==\n" + "X-Received: by 2002:ac2:4256:0:b0:515:a5b1:1dd0 with SMTP id m22-20020ac24256000000b00515a5b11dd0mr3175156lfl.55.1711834548253;\n" + " Sat, 30 Mar 2024 14:35:48 -0700 (PDT)\n" + "Received: from [192.168.10.4] ([151.95.49.219])\n" + " by smtp.googlemail.com with ESMTPSA id os26-20020a170906af7a00b00a465b72a1f3sm3494452ejb.85.2024.03.30.14.35.45\n" + " (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n" + " Sat, 30 Mar 2024 14:35:47 -0700 (PDT)\n" + "Message-ID: <abbe9937-7e0f-4fbd-be0b-488de07dd56c@redhat.com>\n" + "Date: Sat, 30 Mar 2024 22:35:44 +0100\n" + "Precedence: bulk\n" + "X-Mailing-List: linux-crypto@vger.kernel.org\n" + "List-Id: <linux-crypto.vger.kernel.org>\n" + "List-Subscribe: <mailto:linux-crypto+subscribe@vger.kernel.org>\n" + "List-Unsubscribe: <mailto:linux-crypto+unsubscribe@vger.kernel.org>\n" + "MIME-Version: 1.0\n" + "User-Agent: Mozilla Thunderbird\n" + "Subject: Re: [PATCH v12 25/29] KVM: SVM: Add module parameter to enable the\n" + " SEV-SNP\n" + "To: Michael Roth <michael.roth@amd.com>, kvm@vger.kernel.org\n" + "Cc: linux-coco@lists.linux.dev, linux-mm@kvack.org,\n" + " linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org,\n" + " tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de,\n" + " thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, seanjc@google.com,\n" + " vkuznets@redhat.com, jmattson@google.com, luto@kernel.org,\n" + " dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com,\n" + " peterz@infradead.org, srinivas.pandruvada@linux.intel.com,\n" + " rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, bp@alien8.de,\n" + " vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com,\n" + " tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com,\n" + " alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com,\n" + " nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com,\n" + " Brijesh Singh <brijesh.singh@amd.com>\n" + "References: <20240329225835.400662-1-michael.roth@amd.com>\n" + " <20240329225835.400662-26-michael.roth@amd.com>\n" + "From: Paolo Bonzini <pbonzini@redhat.com>\n" + "Content-Language: en-US\n" + "Autocrypt: addr=pbonzini@redhat.com; keydata=\n" + " xsEhBFRCcBIBDqDGsz4K0zZun3jh+U6Z9wNGLKQ0kSFyjN38gMqU1SfP+TUNQepFHb/Gc0E2\n" + " CxXPkIBTvYY+ZPkoTh5xF9oS1jqI8iRLzouzF8yXs3QjQIZ2SfuCxSVwlV65jotcjD2FTN04\n" + " hVopm9llFijNZpVIOGUTqzM4U55sdsCcZUluWM6x4HSOdw5F5Utxfp1wOjD/v92Lrax0hjiX\n" + " DResHSt48q+8FrZzY+AUbkUS+Jm34qjswdrgsC5uxeVcLkBgWLmov2kMaMROT0YmFY6A3m1S\n" + " P/kXmHDXxhe23gKb3dgwxUTpENDBGcfEzrzilWueOeUWiOcWuFOed/C3SyijBx3Av/lbCsHU\n" + " Vx6pMycNTdzU1BuAroB+Y3mNEuW56Yd44jlInzG2UOwt9XjjdKkJZ1g0P9dwptwLEgTEd3Fo\n" + " UdhAQyRXGYO8oROiuh+RZ1lXp6AQ4ZjoyH8WLfTLf5g1EKCTc4C1sy1vQSdzIRu3rBIjAvnC\n" + " tGZADei1IExLqB3uzXKzZ1BZ+Z8hnt2og9hb7H0y8diYfEk2w3R7wEr+Ehk5NQsT2MPI2QBd\n" + " wEv1/Aj1DgUHZAHzG1QN9S8wNWQ6K9DqHZTBnI1hUlkp22zCSHK/6FwUCuYp1zcAEQEAAc0j\n" + " UGFvbG8gQm9uemluaSA8cGJvbnppbmlAcmVkaGF0LmNvbT7CwU0EEwECACMFAlRCcBICGwMH\n" + " CwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRB+FRAMzTZpsbceDp9IIN6BIA0Ol7MoB15E\n" + " 11kRz/ewzryFY54tQlMnd4xxfH8MTQ/mm9I482YoSwPMdcWFAKnUX6Yo30tbLiNB8hzaHeRj\n" + " jx12K+ptqYbg+cevgOtbLAlL9kNgLLcsGqC2829jBCUTVeMSZDrzS97ole/YEez2qFpPnTV0\n" + " VrRWClWVfYh+JfzpXmgyhbkuwUxNFk421s4Ajp3d8nPPFUGgBG5HOxzkAm7xb1cjAuJ+oi/K\n" + " CHfkuN+fLZl/u3E/fw7vvOESApLU5o0icVXeakfSz0LsygEnekDbxPnE5af/9FEkXJD5EoYG\n" + " SEahaEtgNrR4qsyxyAGYgZlS70vkSSYJ+iT2rrwEiDlo31MzRo6Ba2FfHBSJ7lcYdPT7bbk9\n" + " AO3hlNMhNdUhoQv7M5HsnqZ6unvSHOKmReNaS9egAGdRN0/GPDWr9wroyJ65ZNQsHl9nXBqE\n" + " AukZNr5oJO5vxrYiAuuTSd6UI/xFkjtkzltG3mw5ao2bBpk/V/YuePrJsnPFHG7NhizrxttB\n" + " nTuOSCMo45pfHQ+XYd5K1+Cv/NzZFNWscm5htJ0HznY+oOsZvHTyGz3v91pn51dkRYN0otqr\n" + " bQ4tlFFuVjArBZcapSIe6NV8C4cEiSTOwE0EVEJx7gEIAMeHcVzuv2bp9HlWDp6+RkZe+vtl\n" + " KwAHplb/WH59j2wyG8V6i33+6MlSSJMOFnYUCCL77bucx9uImI5nX24PIlqT+zasVEEVGSRF\n" + " m8dgkcJDB7Tps0IkNrUi4yof3B3shR+vMY3i3Ip0e41zKx0CvlAhMOo6otaHmcxr35sWq1Jk\n" + " tLkbn3wG+fPQCVudJJECvVQ//UAthSSEklA50QtD2sBkmQ14ZryEyTHQ+E42K3j2IUmOLriF\n" + " dNr9NvE1QGmGyIcbw2NIVEBOK/GWxkS5+dmxM2iD4Jdaf2nSn3jlHjEXoPwpMs0KZsgdU0pP\n" + " JQzMUMwmB1wM8JxovFlPYrhNT9MAEQEAAcLBMwQYAQIACQUCVEJx7gIbDAAKCRB+FRAMzTZp\n" + " sadRDqCctLmYICZu4GSnie4lKXl+HqlLanpVMOoFNnWs9oRP47MbE2wv8OaYh5pNR9VVgyhD\n" + " OG0AU7oidG36OeUlrFDTfnPYYSF/mPCxHttosyt8O5kabxnIPv2URuAxDByz+iVbL+RjKaGM\n" + " GDph56ZTswlx75nZVtIukqzLAQ5fa8OALSGum0cFi4ptZUOhDNz1onz61klD6z3MODi0sBZN\n" + " Aj6guB2L/+2ZwElZEeRBERRd/uommlYuToAXfNRdUwrwl9gRMiA0WSyTb190zneRRDfpSK5d\n" + " usXnM/O+kr3Dm+Ui+UioPf6wgbn3T0o6I5BhVhs4h4hWmIW7iNhPjX1iybXfmb1gAFfjtHfL\n" + " xRUr64svXpyfJMScIQtBAm0ihWPltXkyITA92ngCmPdHa6M1hMh4RDX+Jf1fiWubzp1voAg0\n" + " JBrdmNZSQDz0iKmSrx8xkoXYfA3bgtFN8WJH2xgFL28XnqY4M6dLhJwV3z08tPSRqYFm4NMP\n" + " dRsn0/7oymhneL8RthIvjDDQ5ktUjMe8LtHr70OZE/TT88qvEdhiIVUogHdo4qBrk41+gGQh\n" + " b906Dudw5YhTJFU3nC6bbF2nrLlB4C/XSiH76ZvqzV0Z/cAMBo5NF/w=\n" + "In-Reply-To: <20240329225835.400662-26-michael.roth@amd.com>\n" + "Content-Type: text/plain; charset=UTF-8; format=flowed\n" + "Content-Transfer-Encoding: 7bit\n" + "Return-Path: linux-crypto+bounces-3137-steffen.klassert=secunet.com@vger.kernel.org\n" + "X-MS-Exchange-Organization-OriginalArrivalTime: 30 Mar 2024 21:36:37.4225\n" + " (UTC)\n" + "X-MS-Exchange-Organization-Network-Message-Id: acec573f-931a-46c9-6803-08dc51017aa5\n" + "X-MS-Exchange-Organization-OriginalClientIPAddress: 62.96.220.36\n" + "X-MS-Exchange-Organization-OriginalServerIPAddress: 10.53.40.202\n" + "X-MS-Exchange-Organization-Cross-Premises-Headers-Processed: cas-essen-02.secunet.de\n" + "X-MS-Exchange-Organization-OrderedPrecisionLatencyInProgress: LSRV=mbx-dresden-01.secunet.de:TOTAL-HUB=0.423|SMR=0.345(SMRDE=0.035|SMRC=0.310(SMRCL=0.102|X-SMRCR=0.309))|CAT=0.077(CATOS=0.012\n" + " (CATSM=0.012(CATSM-Malware\n" + " Agent=0.011))|CATRESL=0.039(CATRESLP2R=0.036)|CATORES=0.024\n" + " (CATRS=0.024(CATRS-Index Routing Agent=0.023)));2024-03-30T21:36:37.911Z\n" + "X-MS-Exchange-Forest-ArrivalHubServer: mbx-dresden-01.secunet.de\n" + "X-MS-Exchange-Organization-AuthSource: cas-essen-02.secunet.de\n" + "X-MS-Exchange-Organization-AuthAs: Anonymous\n" + "X-MS-Exchange-Organization-FromEntityHeader: Internet\n" + "X-MS-Exchange-Organization-OriginalSize: 13357\n" + "X-MS-Exchange-Organization-HygienePolicy: Standard\n" + "X-MS-Exchange-Organization-MessageLatency: SRV=cas-essen-02.secunet.de:TOTAL-FE=0.065|SMR=0.024(SMRPI=0.021(SMRPI-FrontendProxyAgent=0.021))|SMS=0.041\n" + "X-MS-Exchange-Organization-AVStamp-Enterprise: 1.0\n" + "X-MS-Exchange-Organization-Recipient-Limit-Verified: True\n" + "X-MS-Exchange-Organization-TotalRecipientCount: 1\n" + "X-MS-Exchange-Organization-Rules-Execution-History: 0b0cf904-14ac-4724-8bdf-482ee6223cf2%%%fd34672d-751c-45ae-a963-ed177fcabe23%%%d8080257-b0c3-47b4-b0db-23bc0c8ddb3c%%%95e591a2-5d7d-4afa-b1d0-7573d6c0a5d9%%%f7d0f6bc-4dcc-4876-8c5d-b3d6ddbb3d55%%%16355082-c50b-4214-9c7d-d39575f9f79b\n" + "X-MS-Exchange-Forest-RulesExecuted: mbx-dresden-01\n" + "X-MS-Exchange-Organization-RulesExecuted: mbx-dresden-01\n" + "X-MS-Exchange-Forest-IndexAgent-0: AQ0CZW4AAVUDAAAPAAADH4sIAAAAAAAEAJVS33PaRhDew0IgCHbqpA\n" + " 9920c7AmQbbBPH9Thu03YmE9cTZvLKHLoTugZ0jE7gJNM/u39A9ySZ\n" + " UoIz7SAdu6vv+/bH7V/13xPsBScvg5M+nvQuTgdtfKfCmMspvtdZjP\n" + " epzuRFq3GFv6R6doE3qfpDmhiHKpnEeDku3K6x7jWfiW6oZ1cEt4zX\n" + " QiDHmRaLqcQ5T/lMZjLFLOYJhvSOJS6MFJhplAkfE0inKJTJzSyWOH\n" + " zzoTO8vbNakeTZIpVdvNX3ViHDtx/eYaiTjKvE5GizmM91mmGk04J9\n" + " e4dGZrn9628/3ViZ+PNcpktlCFIqYjTlE1uCSoQKeSYLdUtW5kFTim\n" + " 7Z01BNEik6Ooo648//fRybvNcmVkR7y6cpx0uee92P1ltjtRrv5VLJ\n" + " e+JZzh3XU403OvmiEoWX83FhXadSUMUrzhV2Oh37h8jTMA4+Dc6Cj8\n" + " tZYOwrl90Q/8Qe+n6JOcZI0bjpypOJFG08oUEYmWZKJ+bAP2wTQMip\n" + " tP5B57CcglBRRGkmKkMePJJl/MgHy6dZy0/YkwMhz8NxLxy87HbPTg\n" + " fHx2envfOoF+Hx0dFZv18282gO+933/W+mur7GTn/QPkefzoF1TcYz\n" + " RfVpPaX9WI6kGRXrJ/BHzNKFfFVMpljcUb64o4SWVxwU8PYGrZ1rtf\n" + " Go3+8fvipHhBi8KNc6eNjpcp9Xm/oiyDvcLMgk8wfpvBT/G4D1kv1H\n" + " KiZ4e5P3v2p+M8Sf5XgxGd7z+UbxuG2cwoJHhtBfl2l/ABXYYQxqxQ\n" + " MVcitspwpQhVoN6g5Uq9BwwCXbRhh8bw13B5wdaNLJoOJCzbOYKrlE\n" + " J4NOCtJJLIu0yoQnQY/cAlnP7RKw9jhQb0CzSE0KBFspe/Cdy6AFtd\n" + " x1tpVUXwdQDQSgyHNrlIA6gyZ49LVqm/LIfQaeaynPikSrhzHqDhhr\n" + " 2hMq9LXGvMJusL3CqMO+k6crAP+iQ2VbkObpPoHdJ6zlAriwuw3jbQ\n" + " kyGhRdVVFS5R8bqlS8BTPYzadUs3fRpK73865t44wS2YGsYTyHuQ6A\n" + " A/tuftEPd0RT3VsJ7pWR1lcRStHYSJHT1zFbUrjlPTZq8HSl+UMeJB\n" + " E7YVL+GzbhDKYKBwAAAQq1Azw/eG1sIHZlcnNpb249IjEuMCIgZW5j\n" + " b2Rpbmc9InV0Zi0xNiI/Pg0KPEVtYWlsU2V0Pg0KICA8VmVyc2lvbj\n" + " 4xNS4wLjAuMDwvVmVyc2lvbj4NCiAgPEVtYWlscz4NCiAgICA8RW1h\n" + " aWwgU3RhcnRJbmRleD0iNjIiPg0KICAgICAgPEVtYWlsU3RyaW5nPm\n" + " JyaWplc2guc2luZ2hAYW1kLmNvbTwvRW1haWxTdHJpbmc+DQogICAg\n" + " PC9FbWFpbD4NCiAgICA8RW1haWwgU3RhcnRJbmRleD0iMzg4Ij4NCi\n" + " AgICAgIDxFbWFpbFN0cmluZz5hc2hpc2gua2FscmFAYW1kLmNvbTwv\n" + " RW1haWxTdHJpbmc+DQogICAgPC9FbWFpbD4NCiAgICA8RW1haWwgU3\n" + " RhcnRJbmRleD0iNDQxIiBQb3NpdGlvbj0iU2lnbmF0dXJlIj4NCiAg\n" + " ICAgIDxFbWFpbFN0cmluZz5wYm9uemluaUByZWRoYXQuY29tPC9FbW\n" + " FpbFN0cmluZz4NCiAgICA8L0VtYWlsPg0KICA8L0VtYWlscz4NCjwv\n" + " RW1haWxTZXQ+AQyWCjw/eG1sIHZlcnNpb249IjEuMCIgZW5jb2Rpbm\n" + " c9InV0Zi0xNiI/Pg0KPENvbnRhY3RTZXQ+DQogIDxWZXJzaW9uPjE1\n" + " LjAuMC4wPC9WZXJzaW9uPg0KICA8Q29udGFjdHM+DQogICAgPENvbn\n" + " RhY3QgU3RhcnRJbmRleD0iMzE4Ij4NCiAgICAgIDxQZXJzb24gU3Rh\n" + " cnRJbmRleD0iMzE4Ij4NCiAgICAgICAgPFBlcnNvblN0cmluZz5Ccm\n" + " lqZXNoIFNpbmdoPC9QZXJzb25TdHJpbmc+DQogICAgICA8L1BlcnNv\n" + " bj4NCiAgICAgIDxFbWFpbHM+DQogICAgICAgIDxFbWFpbCBTdGFydE\n" + " luZGV4PSIzMzMiPg0KICAgICAgICAgIDxFbWFpbFN0cmluZz5icmlq\n" + " ZXNoLnNpbmdoQGFtZC5jb208L0VtYWlsU3RyaW5nPg0KICAgICAgIC\n" + " A8L0VtYWlsPg0KICAgICAgPC9FbWFpbHM+DQogICAgICA8Q29udGFj\n" + " dFN0cmluZz5CcmlqZXNoIFNpbmdoICZsdDticmlqZXNoLnNpbmdoQG\n" + " FtZC5jb208L0NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YWN0Pg0K\n" + " ICAgIDxDb250YWN0IFN0YXJ0SW5kZXg9IjM3NCI+DQogICAgICA8UG\n" + " Vyc29uIFN0YXJ0SW5kZXg9IjM3NCI+DQogICAgICAgIDxQZXJzb25T\n" + " dHJpbmc+QXNoaXNoIEthbHJhPC9QZXJzb25TdHJpbmc+DQogICAgIC\n" + " A8L1BlcnNvbj4NCiAgICAgIDxFbWFpbHM+DQogICAgICAgIDxFbWFp\n" + " bCBTdGFydEluZGV4PSIzODgiPg0KICAgICAgICAgIDxFbWFpbFN0cm\n" + " luZz5hc2hpc2gua2FscmFAYW1kLmNvbTwvRW1haWxTdHJpbmc+DQog\n" + " ICAgICAgIDwvRW1haWw+DQogICAgICA8L0VtYWlscz4NCiAgICAgID\n" + " xDb250YWN0U3RyaW5nPkFzaGlzaCBLYWxyYSAmbHQ7YXNoaXNoLmth\n" + " bHJhQGFtZC5jb208L0NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YW\n" + " N0Pg0KICAgIDxDb250YWN0IFN0YXJ0SW5kZXg9IjQyNiIgUG9zaXRp\n" + " b249IlNpZ25hdHVyZSI+DQogICAgICA8UGVyc29uIFN0YXJ0SW5kZX\n" + " g9IjQyNiIgUG9zaXRpb249IlNpZ25hdHVyZSI+DQogICAgICAgIDxQ\n" + " ZXJzb25TdHJpbmc+UGFvbG8gQm9uemluaTwvUGVyc29uU3RyaW5nPg\n" + " 0KICAgICAgPC9QZXJzb24+DQogICAgICA8RW1haWxzPg0KICAgICAg\n" + " ICA8RW1haWwgU3RhcnRJbmRleD0iNDQxIiBQb3NpdGlvbj0iU2lnbm\n" + " F0dXJlIj4NCiAgICAgICAgICA8RW1haWxTdHJpbmc+cGJvbnppbmlA\n" + " cmVkaGF0LmNvbTwvRW1haWxTdHJpbmc+DQogICAgICAgIDwvRW1haW\n" + " w+DQogICAgICA8L0VtYWlscz4NCiAgICAgIDxDb250YWN0U3RyaW5n\n" + " PlBhb2xvIEJvbnppbmkgJmx0O3Bib256aW5pQHJlZGhhdC5jb208L0\n" + " NvbnRhY3RTdHJpbmc+DQogICAgPC9Db250YWN0Pg0KICA8L0NvbnRh\n" + " Y3RzPg0KPC9Db250YWN0U2V0PgEOzwFSZXRyaWV2ZXJPcGVyYXRvci\n" + " wxMCwwO1JldHJpZXZlck9wZXJhdG9yLDExLDE7UG9zdERvY1BhcnNl\n" + " ck9wZXJhdG9yLDEwLDA7UG9zdERvY1BhcnNlck9wZXJhdG9yLDExLD\n" + " A7UG9zdFdvcmRCcmVha2VyRGlhZ25vc3RpY09wZXJhdG9yLDEwLDA7\n" + " UG9zdFdvcmRCcmVha2VyRGlhZ25vc3RpY09wZXJhdG9yLDExLDA7VH\n" + " JhbnNwb3J0V3JpdGVyUHJvZHVjZXIsMjAsMTI=\n" + "X-MS-Exchange-Forest-IndexAgent: 1 2822\n" + "X-MS-Exchange-Forest-EmailMessageHash: 605501D6\n" + "X-MS-Exchange-Forest-Language: en\n" + "X-MS-Exchange-Organization-Processed-By-Journaling: Journal Agent\n" + "\n" + "On 3/29/24 23:58, Michael Roth wrote:\n" + "> From: Brijesh Singh <brijesh.singh@amd.com>\n" + "> \n" + "> Add a module parameter than can be used to enable or disable the SEV-SNP\n" + "> feature. Now that KVM contains the support for the SNP set the GHCB\n" + "> hypervisor feature flag to indicate that SNP is supported.\n" + "> \n" + "> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>\n" + "> Signed-off-by: Ashish Kalra <ashish.kalra@amd.com>\n" + "\n" + "Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>\n" + "\n" + "> ---\n" + "> arch/x86/kvm/svm/sev.c | 3 ++-\n" + "> 1 file changed, 2 insertions(+), 1 deletion(-)\n" + "> \n" + "> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c\n" + "> index 3e8de7cb3c89..658116537f3f 100644\n" + "> --- a/arch/x86/kvm/svm/sev.c\n" + "> +++ b/arch/x86/kvm/svm/sev.c\n" + "> @@ -48,7 +48,8 @@ static bool sev_es_enabled = true;\n" + "> module_param_named(sev_es, sev_es_enabled, bool, 0444);\n" + "> \n" + "> /* enable/disable SEV-SNP support */\n" + "> -static bool sev_snp_enabled;\n" + "> +static bool sev_snp_enabled = true;\n" + "> +module_param_named(sev_snp, sev_snp_enabled, bool, 0444);\n" + "> \n" + "> /* enable/disable SEV-ES DebugSwap support */\n" > static bool sev_es_debug_swap_enabled = true; -67e1eda3c91a31752754205eb4674711e9fe2835a3faaff790cb82c0086980e7 +9d6372454f5483112c78f040c6c54d80840b6591d2f71f8290a31d3fda31f7a9
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox