From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f201.google.com (mail-pf1-f201.google.com [209.85.210.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B6CCC2288D5 for ; Sat, 7 Mar 2026 01:58:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772848721; cv=none; b=KwTQ1gUs210jwR/Uy2gwgdu/0o2IBZ8gmTstDEQpFI5LAmWgI9v7nz0lcJyzAwymckUW8XP9XGz4VXO1TCjuOk2M3lQItTnEOYuoqW36PvbahlbqDdyaetcV++4w6KOAVNQbjkoPPsrSr6m9Mbza+gjGzHziYUYcSaCZQGRsBO4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772848721; c=relaxed/simple; bh=/3p7xZEybQEyoIPj8z7QKfOrsJvz2O+7OeYPPTzJFrQ=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=Ng/aPOE1RmQ0SvyebczjAkkhxbSUWUdqrAn6SgquR1dCyPyFwdIAcka/zBrHaG9RKMODWGigFBmQzQGPMdfVsSp/Axfkb4vrmBa/Nv9dsvCkGsNd3gQbju3aKfemQ/gDd41sUYWqNrOEclg36VLfv+iBWjzQUhVJ3t/uCCThusk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=ZEXnUpct; arc=none smtp.client-ip=209.85.210.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="ZEXnUpct" Received: by mail-pf1-f201.google.com with SMTP id d2e1a72fcca58-82983c9d78aso6139207b3a.2 for ; Fri, 06 Mar 2026 17:58:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1772848720; x=1773453520; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=FJcj4qTONIol7UXFe/O3JWnAgsBTo4u6T1CUvhonsps=; b=ZEXnUpctj81/Eb6CcDNggf1IC9CR60l+3rxoyUeg4fEi8Vn5ixWTk0atoziTj8m8/T ZnA8ZCrIEMXWG02sI1BskLww8WxmeUvzTLcZ+QW4fyTeAf7+TslZVWXwojoKhC5e7EJL rBO6/YG3ZHFgCUmmZbwY6wXWk25R3MXO9gwE8Dqv3hrkidAYmIwcYRCpwXPqbJyLl6nK GcRhnskuzlKHWSMNTThSen9UQQmiVQC9GNeLAYLPZsI54lnYA82YjsXFM5eMUIspTN7p xiEhLt4BA9raKkisvHfSLiQa8JXJtx6KPrinoJGDwXWVfYl42sfJ3wO/7sQ+D2Aib9H7 mMTg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1772848720; x=1773453520; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=FJcj4qTONIol7UXFe/O3JWnAgsBTo4u6T1CUvhonsps=; b=Of9A69Wdnnw151+Y263crTYqnZbjVVdz8jOumM7Jjn5v3bSR/yJ8qVXgAyNCzgs8Mi irbrD31px44j2xd7NuLEKdYjjZCs6K1OmK1ZuVzlQIZeIoMUm2CDtiudM+pt4HkqsLU5 ChpNhQNsBSLgLiSgH3XtO0DmHvb3dcn5dknjnMecDc6VVCk0UrpLpOreUeI6mIMDivpP WH2RYMeoaM3MdPkDvc6cMLhiBzABi5BJjf+Q3csnOaudVENaSKzNQ+8rsGTE3pI/UuAn F4Vnmh92nYqZmOhLF7OIb27oY4OMUNRPt00M4QXN3luZsKFtsw8+IE2C/z7rS0CdnnrW lYUw== X-Forwarded-Encrypted: i=1; AJvYcCV3S/df8uMUlggcQ1wTGpBdKcwCN/5Vz9vtpLlayQrMAJHJpWMiiI0HYd2NWGb87AO5SzUfI6RR4+hki7c=@vger.kernel.org X-Gm-Message-State: AOJu0Yw3zxAaqo/cLlsKTRmtYQvTyj2qnB6eUgxlXwmARPOGVIZAuk+f uelWP8X7Kcoq2o1IyUS1QXsv22bRUZPE16Hn4BJrApHxTUpZXtH0iIX8VrOb9kAJcMUSjihkjfe Mb11/bA== X-Received: from pfcf9.prod.google.com ([2002:a05:6a00:2389:b0:824:b871:c7cb]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6a00:1827:b0:829:6f37:158a with SMTP id d2e1a72fcca58-829a2e3f823mr4056095b3a.18.1772848719917; Fri, 06 Mar 2026 17:58:39 -0800 (PST) Date: Fri, 6 Mar 2026 17:58:38 -0800 In-Reply-To: <20260129063653.3553076-2-shivansh.dhiman@amd.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20260129063653.3553076-1-shivansh.dhiman@amd.com> <20260129063653.3553076-2-shivansh.dhiman@amd.com> Message-ID: Subject: Re: [PATCH 1/7] KVM: SVM: Initialize FRED VMCB fields From: Sean Christopherson To: Shivansh Dhiman Cc: pbonzini@redhat.com, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, xin@zytor.com, nikunj.dadhania@amd.com, santosh.shukla@amd.com Content-Type: text/plain; charset="us-ascii" On Thu, Jan 29, 2026, Shivansh Dhiman wrote: > From: Neeraj Upadhyay > > The upcoming AMD FRED (Flexible Return and Event Delivery) feature > introduces several new fields to the VMCB save area. These fields include > FRED-specific stack pointers (fred_rsp[0-3], fred_ssp[1-3]), stack level > tracking (fred_stklvls), and configuration (fred_config). > > Ensure that a vCPU starts with a clean and valid FRED state on > capable hardware. Also update the size of save areas of VMCB. > diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c > index f4ccb3e66635..5cec971a1f5a 100644 > --- a/arch/x86/kvm/svm/svm.c > +++ b/arch/x86/kvm/svm/svm.c > @@ -1110,6 +1110,16 @@ static void init_vmcb(struct kvm_vcpu *vcpu, bool init_event) > save->idtr.base = 0; > save->idtr.limit = 0xffff; > > + save->fred_rsp0 = 0; > + save->fred_rsp1 = 0; > + save->fred_rsp2 = 0; > + save->fred_rsp3 = 0; > + save->fred_stklvls = 0; > + save->fred_ssp1 = 0; > + save->fred_ssp2 = 0; > + save->fred_ssp3 = 0; > + save->fred_config = 0; Is this architecturally correct? I.e. are all the FRED MSRs zeroed on INIT?