* [PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration
@ 2023-08-25 2:23 Sean Christopherson
2023-08-25 2:23 ` [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for " Sean Christopherson
` (2 more replies)
0 siblings, 3 replies; 8+ messages in thread
From: Sean Christopherson @ 2023-08-25 2:23 UTC (permalink / raw)
To: Sean Christopherson, Paolo Bonzini; +Cc: kvm, linux-kernel, Peter Gonda
Fix two fatal bugs in SEV-ES intrahost migration, found by running
sev_migrate_tests (:shocked-pikachu:).
IIRC, for some reason our platforms haven't played nice with SEV-ES on
upstream kernels for a while, i.e. the test hasn't been run as part of my
usual testing.
Sean Christopherson (2):
KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost
migration
KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL
arch/x86/kvm/svm/sev.c | 9 ++++++---
1 file changed, 6 insertions(+), 3 deletions(-)
base-commit: fff2e47e6c3b8050ca26656693caa857e3a8b740
--
2.42.0.rc2.253.gd59a3bf2b4-goog
^ permalink raw reply [flat|nested] 8+ messages in thread
* [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration
2023-08-25 2:23 [PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration Sean Christopherson
@ 2023-08-25 2:23 ` Sean Christopherson
2023-08-25 10:23 ` Gupta, Pankaj
2023-08-25 2:23 ` [PATCH 2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL Sean Christopherson
2023-08-25 19:02 ` [PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration Sean Christopherson
2 siblings, 1 reply; 8+ messages in thread
From: Sean Christopherson @ 2023-08-25 2:23 UTC (permalink / raw)
To: Sean Christopherson, Paolo Bonzini; +Cc: kvm, linux-kernel, Peter Gonda
Fix a goof where KVM tries to grab source vCPUs from the destination VM
when doing intrahost migration. Grabbing the wrong vCPU not only hoses
the guest, it also crashes the host due to the VMSA pointer being left
NULL.
BUG: unable to handle page fault for address: ffffe38687000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] SMP NOPTI
CPU: 39 PID: 17143 Comm: sev_migrate_tes Tainted: GO 6.5.0-smp--fff2e47e6c3b-next #151
Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.28.0 07/10/2023
RIP: 0010:__free_pages+0x15/0xd0
RSP: 0018:ffff923fcf6e3c78 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffe38687000000 RCX: 0000000000000100
RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffe38687000000
RBP: ffff923fcf6e3c88 R08: ffff923fcafb0000 R09: 0000000000000000
R10: 0000000000000000 R11: ffffffff83619b90 R12: ffff923fa9540000
R13: 0000000000080007 R14: ffff923f6d35d000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff929d0d7c0000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffe38687000000 CR3: 0000005224c34005 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace:
<TASK>
sev_free_vcpu+0xcb/0x110 [kvm_amd]
svm_vcpu_free+0x75/0xf0 [kvm_amd]
kvm_arch_vcpu_destroy+0x36/0x140 [kvm]
kvm_destroy_vcpus+0x67/0x100 [kvm]
kvm_arch_destroy_vm+0x161/0x1d0 [kvm]
kvm_put_kvm+0x276/0x560 [kvm]
kvm_vm_release+0x25/0x30 [kvm]
__fput+0x106/0x280
____fput+0x12/0x20
task_work_run+0x86/0xb0
do_exit+0x2e3/0x9c0
do_group_exit+0xb1/0xc0
__x64_sys_exit_group+0x1b/0x20
do_syscall_64+0x41/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd
</TASK>
CR2: ffffe38687000000
Fixes: 6defa24d3b12 ("KVM: SEV: Init target VMCBs in sev_migrate_from")
Cc: stable@vger.kernel.org
Cc: Peter Gonda <pgonda@google.com>
Signed-off-by: Sean Christopherson <seanjc@google.com>
---
arch/x86/kvm/svm/sev.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
index 2cd15783dfb9..acc700bcb299 100644
--- a/arch/x86/kvm/svm/sev.c
+++ b/arch/x86/kvm/svm/sev.c
@@ -1739,7 +1739,7 @@ static void sev_migrate_from(struct kvm *dst_kvm, struct kvm *src_kvm)
* Note, the source is not required to have the same number of
* vCPUs as the destination when migrating a vanilla SEV VM.
*/
- src_vcpu = kvm_get_vcpu(dst_kvm, i);
+ src_vcpu = kvm_get_vcpu(src_kvm, i);
src_svm = to_svm(src_vcpu);
/*
--
2.42.0.rc2.253.gd59a3bf2b4-goog
^ permalink raw reply related [flat|nested] 8+ messages in thread
* [PATCH 2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL
2023-08-25 2:23 [PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration Sean Christopherson
2023-08-25 2:23 ` [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for " Sean Christopherson
@ 2023-08-25 2:23 ` Sean Christopherson
2023-08-25 10:26 ` Gupta, Pankaj
2023-08-25 19:02 ` [PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration Sean Christopherson
2 siblings, 1 reply; 8+ messages in thread
From: Sean Christopherson @ 2023-08-25 2:23 UTC (permalink / raw)
To: Sean Christopherson, Paolo Bonzini; +Cc: kvm, linux-kernel, Peter Gonda
Skip initializing the VMSA physical address in the VMCB if the VMSA is
NULL, which occurs during intrahost migration as KVM initializes the VMCB
before copying over state from the source to the destination (including
the VMSA and its physical address).
In normal builds, __pa() is just math, so the bug isn't fatal, but with
CONFIG_DEBUG_VIRTUAL=y, the validity of the virtual address is verified
and passing in NULL will make the kernel unhappy.
Fixes: 6defa24d3b12 ("KVM: SEV: Init target VMCBs in sev_migrate_from")
Cc: stable@vger.kernel.org
Cc: Peter Gonda <pgonda@google.com>
Signed-off-by: Sean Christopherson <seanjc@google.com>
---
arch/x86/kvm/svm/sev.c | 7 +++++--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
index acc700bcb299..5585a3556179 100644
--- a/arch/x86/kvm/svm/sev.c
+++ b/arch/x86/kvm/svm/sev.c
@@ -2975,9 +2975,12 @@ static void sev_es_init_vmcb(struct vcpu_svm *svm)
/*
* An SEV-ES guest requires a VMSA area that is a separate from the
* VMCB page. Do not include the encryption mask on the VMSA physical
- * address since hardware will access it using the guest key.
+ * address since hardware will access it using the guest key. Note,
+ * the VMSA will be NULL if this vCPU is the destination for intrahost
+ * migration, and will be copied later.
*/
- svm->vmcb->control.vmsa_pa = __pa(svm->sev_es.vmsa);
+ if (svm->sev_es.vmsa)
+ svm->vmcb->control.vmsa_pa = __pa(svm->sev_es.vmsa);
/* Can't intercept CR register access, HV can't modify CR registers */
svm_clr_intercept(svm, INTERCEPT_CR0_READ);
--
2.42.0.rc2.253.gd59a3bf2b4-goog
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration
2023-08-25 2:23 ` [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for " Sean Christopherson
@ 2023-08-25 10:23 ` Gupta, Pankaj
2023-08-25 13:54 ` Peter Gonda
0 siblings, 1 reply; 8+ messages in thread
From: Gupta, Pankaj @ 2023-08-25 10:23 UTC (permalink / raw)
To: Sean Christopherson, Paolo Bonzini; +Cc: kvm, linux-kernel, Peter Gonda
On 8/25/2023 4:23 AM, Sean Christopherson wrote:
> Fix a goof where KVM tries to grab source vCPUs from the destination VM
> when doing intrahost migration. Grabbing the wrong vCPU not only hoses
> the guest, it also crashes the host due to the VMSA pointer being left
> NULL.
>
> BUG: unable to handle page fault for address: ffffe38687000000
> #PF: supervisor read access in kernel mode
> #PF: error_code(0x0000) - not-present page
> PGD 0 P4D 0
> Oops: 0000 [#1] SMP NOPTI
> CPU: 39 PID: 17143 Comm: sev_migrate_tes Tainted: GO 6.5.0-smp--fff2e47e6c3b-next #151
> Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.28.0 07/10/2023
> RIP: 0010:__free_pages+0x15/0xd0
> RSP: 0018:ffff923fcf6e3c78 EFLAGS: 00010246
> RAX: 0000000000000000 RBX: ffffe38687000000 RCX: 0000000000000100
> RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffe38687000000
> RBP: ffff923fcf6e3c88 R08: ffff923fcafb0000 R09: 0000000000000000
> R10: 0000000000000000 R11: ffffffff83619b90 R12: ffff923fa9540000
> R13: 0000000000080007 R14: ffff923f6d35d000 R15: 0000000000000000
> FS: 0000000000000000(0000) GS:ffff929d0d7c0000(0000) knlGS:0000000000000000
> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: ffffe38687000000 CR3: 0000005224c34005 CR4: 0000000000770ee0
> PKRU: 55555554
> Call Trace:
> <TASK>
> sev_free_vcpu+0xcb/0x110 [kvm_amd]
> svm_vcpu_free+0x75/0xf0 [kvm_amd]
> kvm_arch_vcpu_destroy+0x36/0x140 [kvm]
> kvm_destroy_vcpus+0x67/0x100 [kvm]
> kvm_arch_destroy_vm+0x161/0x1d0 [kvm]
> kvm_put_kvm+0x276/0x560 [kvm]
> kvm_vm_release+0x25/0x30 [kvm]
> __fput+0x106/0x280
> ____fput+0x12/0x20
> task_work_run+0x86/0xb0
> do_exit+0x2e3/0x9c0
> do_group_exit+0xb1/0xc0
> __x64_sys_exit_group+0x1b/0x20
> do_syscall_64+0x41/0x90
> entry_SYSCALL_64_after_hwframe+0x63/0xcd
> </TASK>
> CR2: ffffe38687000000
>
> Fixes: 6defa24d3b12 ("KVM: SEV: Init target VMCBs in sev_migrate_from")
> Cc: stable@vger.kernel.org
> Cc: Peter Gonda <pgonda@google.com>
> Signed-off-by: Sean Christopherson <seanjc@google.com>
> ---
> arch/x86/kvm/svm/sev.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
> index 2cd15783dfb9..acc700bcb299 100644
> --- a/arch/x86/kvm/svm/sev.c
> +++ b/arch/x86/kvm/svm/sev.c
> @@ -1739,7 +1739,7 @@ static void sev_migrate_from(struct kvm *dst_kvm, struct kvm *src_kvm)
> * Note, the source is not required to have the same number of
> * vCPUs as the destination when migrating a vanilla SEV VM.
> */
> - src_vcpu = kvm_get_vcpu(dst_kvm, i);
> + src_vcpu = kvm_get_vcpu(src_kvm, i);
> src_svm = to_svm(src_vcpu);
>
> /*
Reviewed-by: Pankaj Gupta <pankaj.gupta@amd.com>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL
2023-08-25 2:23 ` [PATCH 2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL Sean Christopherson
@ 2023-08-25 10:26 ` Gupta, Pankaj
2023-08-25 13:56 ` Peter Gonda
0 siblings, 1 reply; 8+ messages in thread
From: Gupta, Pankaj @ 2023-08-25 10:26 UTC (permalink / raw)
To: Sean Christopherson, Paolo Bonzini; +Cc: kvm, linux-kernel, Peter Gonda
On 8/25/2023 4:23 AM, Sean Christopherson wrote:
> Skip initializing the VMSA physical address in the VMCB if the VMSA is
> NULL, which occurs during intrahost migration as KVM initializes the VMCB
> before copying over state from the source to the destination (including
> the VMSA and its physical address).
>
> In normal builds, __pa() is just math, so the bug isn't fatal, but with
> CONFIG_DEBUG_VIRTUAL=y, the validity of the virtual address is verified
> and passing in NULL will make the kernel unhappy.
>
> Fixes: 6defa24d3b12 ("KVM: SEV: Init target VMCBs in sev_migrate_from")
> Cc: stable@vger.kernel.org
> Cc: Peter Gonda <pgonda@google.com>
> Signed-off-by: Sean Christopherson <seanjc@google.com>
> ---
> arch/x86/kvm/svm/sev.c | 7 +++++--
> 1 file changed, 5 insertions(+), 2 deletions(-)
>
> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
> index acc700bcb299..5585a3556179 100644
> --- a/arch/x86/kvm/svm/sev.c
> +++ b/arch/x86/kvm/svm/sev.c
> @@ -2975,9 +2975,12 @@ static void sev_es_init_vmcb(struct vcpu_svm *svm)
> /*
> * An SEV-ES guest requires a VMSA area that is a separate from the
> * VMCB page. Do not include the encryption mask on the VMSA physical
> - * address since hardware will access it using the guest key.
> + * address since hardware will access it using the guest key. Note,
> + * the VMSA will be NULL if this vCPU is the destination for intrahost
> + * migration, and will be copied later.
> */
> - svm->vmcb->control.vmsa_pa = __pa(svm->sev_es.vmsa);
> + if (svm->sev_es.vmsa)
> + svm->vmcb->control.vmsa_pa = __pa(svm->sev_es.vmsa);
>
> /* Can't intercept CR register access, HV can't modify CR registers */
> svm_clr_intercept(svm, INTERCEPT_CR0_READ);
Reviewed-by: Pankaj Gupta <pankaj.gupta@amd.com>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration
2023-08-25 10:23 ` Gupta, Pankaj
@ 2023-08-25 13:54 ` Peter Gonda
0 siblings, 0 replies; 8+ messages in thread
From: Peter Gonda @ 2023-08-25 13:54 UTC (permalink / raw)
To: Gupta, Pankaj; +Cc: Sean Christopherson, Paolo Bonzini, kvm, linux-kernel
On Fri, Aug 25, 2023 at 4:23 AM Gupta, Pankaj <pankaj.gupta@amd.com> wrote:
>
> On 8/25/2023 4:23 AM, Sean Christopherson wrote:
> > Fix a goof where KVM tries to grab source vCPUs from the destination VM
> > when doing intrahost migration. Grabbing the wrong vCPU not only hoses
> > the guest, it also crashes the host due to the VMSA pointer being left
> > NULL.
> >
> > BUG: unable to handle page fault for address: ffffe38687000000
> > #PF: supervisor read access in kernel mode
> > #PF: error_code(0x0000) - not-present page
> > PGD 0 P4D 0
> > Oops: 0000 [#1] SMP NOPTI
> > CPU: 39 PID: 17143 Comm: sev_migrate_tes Tainted: GO 6.5.0-smp--fff2e47e6c3b-next #151
> > Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.28.0 07/10/2023
> > RIP: 0010:__free_pages+0x15/0xd0
> > RSP: 0018:ffff923fcf6e3c78 EFLAGS: 00010246
> > RAX: 0000000000000000 RBX: ffffe38687000000 RCX: 0000000000000100
> > RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffe38687000000
> > RBP: ffff923fcf6e3c88 R08: ffff923fcafb0000 R09: 0000000000000000
> > R10: 0000000000000000 R11: ffffffff83619b90 R12: ffff923fa9540000
> > R13: 0000000000080007 R14: ffff923f6d35d000 R15: 0000000000000000
> > FS: 0000000000000000(0000) GS:ffff929d0d7c0000(0000) knlGS:0000000000000000
> > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > CR2: ffffe38687000000 CR3: 0000005224c34005 CR4: 0000000000770ee0
> > PKRU: 55555554
> > Call Trace:
> > <TASK>
> > sev_free_vcpu+0xcb/0x110 [kvm_amd]
> > svm_vcpu_free+0x75/0xf0 [kvm_amd]
> > kvm_arch_vcpu_destroy+0x36/0x140 [kvm]
> > kvm_destroy_vcpus+0x67/0x100 [kvm]
> > kvm_arch_destroy_vm+0x161/0x1d0 [kvm]
> > kvm_put_kvm+0x276/0x560 [kvm]
> > kvm_vm_release+0x25/0x30 [kvm]
> > __fput+0x106/0x280
> > ____fput+0x12/0x20
> > task_work_run+0x86/0xb0
> > do_exit+0x2e3/0x9c0
> > do_group_exit+0xb1/0xc0
> > __x64_sys_exit_group+0x1b/0x20
> > do_syscall_64+0x41/0x90
> > entry_SYSCALL_64_after_hwframe+0x63/0xcd
> > </TASK>
> > CR2: ffffe38687000000
> >
> > Fixes: 6defa24d3b12 ("KVM: SEV: Init target VMCBs in sev_migrate_from")
> > Cc: stable@vger.kernel.org
> > Cc: Peter Gonda <pgonda@google.com>
> > Signed-off-by: Sean Christopherson <seanjc@google.com>
> > ---
> > arch/x86/kvm/svm/sev.c | 2 +-
> > 1 file changed, 1 insertion(+), 1 deletion(-)
> >
> > diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
> > index 2cd15783dfb9..acc700bcb299 100644
> > --- a/arch/x86/kvm/svm/sev.c
> > +++ b/arch/x86/kvm/svm/sev.c
> > @@ -1739,7 +1739,7 @@ static void sev_migrate_from(struct kvm *dst_kvm, struct kvm *src_kvm)
> > * Note, the source is not required to have the same number of
> > * vCPUs as the destination when migrating a vanilla SEV VM.
> > */
> > - src_vcpu = kvm_get_vcpu(dst_kvm, i);
> > + src_vcpu = kvm_get_vcpu(src_kvm, i);
> > src_svm = to_svm(src_vcpu);
> >
> > /*
>
> Reviewed-by: Pankaj Gupta <pankaj.gupta@amd.com>
Thanks Sean.
Reviewed-by: Peter Gonda <pgonda@google.com>
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL
2023-08-25 10:26 ` Gupta, Pankaj
@ 2023-08-25 13:56 ` Peter Gonda
0 siblings, 0 replies; 8+ messages in thread
From: Peter Gonda @ 2023-08-25 13:56 UTC (permalink / raw)
To: Gupta, Pankaj; +Cc: Sean Christopherson, Paolo Bonzini, kvm, linux-kernel
On Fri, Aug 25, 2023 at 4:26 AM Gupta, Pankaj <pankaj.gupta@amd.com> wrote:
>
> On 8/25/2023 4:23 AM, Sean Christopherson wrote:
> > Skip initializing the VMSA physical address in the VMCB if the VMSA is
> > NULL, which occurs during intrahost migration as KVM initializes the VMCB
> > before copying over state from the source to the destination (including
> > the VMSA and its physical address).
> >
> > In normal builds, __pa() is just math, so the bug isn't fatal, but with
> > CONFIG_DEBUG_VIRTUAL=y, the validity of the virtual address is verified
> > and passing in NULL will make the kernel unhappy.
> >
> > Fixes: 6defa24d3b12 ("KVM: SEV: Init target VMCBs in sev_migrate_from")
> > Cc: stable@vger.kernel.org
> > Cc: Peter Gonda <pgonda@google.com>
> > Signed-off-by: Sean Christopherson <seanjc@google.com>
> > ---
> > arch/x86/kvm/svm/sev.c | 7 +++++--
> > 1 file changed, 5 insertions(+), 2 deletions(-)
> >
> > diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
> > index acc700bcb299..5585a3556179 100644
> > --- a/arch/x86/kvm/svm/sev.c
> > +++ b/arch/x86/kvm/svm/sev.c
> > @@ -2975,9 +2975,12 @@ static void sev_es_init_vmcb(struct vcpu_svm *svm)
> > /*
> > * An SEV-ES guest requires a VMSA area that is a separate from the
> > * VMCB page. Do not include the encryption mask on the VMSA physical
> > - * address since hardware will access it using the guest key.
> > + * address since hardware will access it using the guest key. Note,
> > + * the VMSA will be NULL if this vCPU is the destination for intrahost
> > + * migration, and will be copied later.
> > */
> > - svm->vmcb->control.vmsa_pa = __pa(svm->sev_es.vmsa);
> > + if (svm->sev_es.vmsa)
> > + svm->vmcb->control.vmsa_pa = __pa(svm->sev_es.vmsa);
> >
> > /* Can't intercept CR register access, HV can't modify CR registers */
> > svm_clr_intercept(svm, INTERCEPT_CR0_READ);
>
> Reviewed-by: Pankaj Gupta <pankaj.gupta@amd.com>
Reviewed-by: Peter Gonda <pgonda@google.com>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration
2023-08-25 2:23 [PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration Sean Christopherson
2023-08-25 2:23 ` [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for " Sean Christopherson
2023-08-25 2:23 ` [PATCH 2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL Sean Christopherson
@ 2023-08-25 19:02 ` Sean Christopherson
2 siblings, 0 replies; 8+ messages in thread
From: Sean Christopherson @ 2023-08-25 19:02 UTC (permalink / raw)
To: Sean Christopherson, Paolo Bonzini; +Cc: kvm, linux-kernel, Peter Gonda
On Thu, 24 Aug 2023 19:23:55 -0700, Sean Christopherson wrote:
> Fix two fatal bugs in SEV-ES intrahost migration, found by running
> sev_migrate_tests (:shocked-pikachu:).
>
> IIRC, for some reason our platforms haven't played nice with SEV-ES on
> upstream kernels for a while, i.e. the test hasn't been run as part of my
> usual testing.
>
> [...]
Applied to kvm-x86 svm, thanks for the quick reviews!
[1/2] KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration
https://github.com/kvm-x86/linux/commit/f1187ef24eb8
[2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL
https://github.com/kvm-x86/linux/commit/1952e74da96f
--
https://github.com/kvm-x86/linux/tree/next
https://github.com/kvm-x86/linux/tree/fixes
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2023-08-25 19:03 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-08-25 2:23 [PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration Sean Christopherson
2023-08-25 2:23 ` [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for " Sean Christopherson
2023-08-25 10:23 ` Gupta, Pankaj
2023-08-25 13:54 ` Peter Gonda
2023-08-25 2:23 ` [PATCH 2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL Sean Christopherson
2023-08-25 10:26 ` Gupta, Pankaj
2023-08-25 13:56 ` Peter Gonda
2023-08-25 19:02 ` [PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration Sean Christopherson
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox