Message ID | 20231016132819.1002933-1-michael.roth@amd.com |
---|---|
Headers | show |
Series | Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support | expand |
On 10/16/23 17:12, Greg KH wrote: > On Mon, Oct 16, 2023 at 08:27:30AM -0500, Michael Roth wrote: >> From: Paolo Bonzini <pbonzini@redhat.com> >> >> svm_recalc_instruction_intercepts() is always called at least once >> before the vCPU is started, so the setting or clearing of the RDTSCP >> intercept can be dropped from the TSC_AUX virtualization support. >> >> Extracted from a patch by Tom Lendacky. >> >> Cc: stable@vger.kernel.org >> Fixes: 296d5a17e793 ("KVM: SEV-ES: Use V_TSC_AUX if available instead of RDTSC/MSR_TSC_AUX intercepts") >> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> >> (cherry picked from commit e8d93d5d93f85949e7299be289c6e7e1154b2f78) >> Signed-off-by: Michael Roth <michael.roth@amd.com> >> --- >> arch/x86/kvm/svm/sev.c | 5 +---- >> 1 file changed, 1 insertion(+), 4 deletions(-) > > What stable tree(s) are you wanting this applied to (same for the others > in this series)? It's already in the 6.1.56 release, and the Fixes tag > is for 5.19, so I don't see where it could be missing from? I tink it's missing in the (destined for 6.7) tree that Michael is basing this series on, so he's cherry picking it from Linus's tree. Paolo
> +/** > + * struct sev_data_snp_ext_config - system wide configuration value for SNP. > + * > + * @config_address: address of the struct sev_user_data_snp_config or 0 when > + * reported_tcb does not need to be updated. > + * @certs_address: address of extended guest request certificate chain or > + * 0 when previous certificate should be removed on SNP_SET_EXT_CONFIG. > + * @certs_len: length of the certs > + */ > +struct sev_user_data_ext_snp_config { > + __u64 config_address; /* In */ > + __u64 certs_address; /* In */ > + __u32 certs_len; /* In */ > +} __packed; > + Can we add a generation number to this? Whenever user space sets the certs blob it will invalidate the instance-specific certificates that are settable in KVM. The VMM will need to weave the instance-specific data with the new certs installed at the machine level since we're not adding interpretation of the cert blob to KVM.