lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 4 Jan 2021 18:50:47 +0100 From: Paolo Bonzini <pbonzini@...hat.com> To: Tom Lendacky <thomas.lendacky@....com>, kvm@...r.kernel.org, linux-kernel@...r.kernel.org, x86@...nel.org Cc: Jim Mattson <jmattson@...gle.com>, Joerg Roedel <joro@...tes.org>, Sean Christopherson <seanjc@...gle.com>, Vitaly Kuznetsov <vkuznets@...hat.com>, Wanpeng Li <wanpengli@...cent.com>, Borislav Petkov <bp@...en8.de>, Ingo Molnar <mingo@...hat.com>, Thomas Gleixner <tglx@...utronix.de>, Brijesh Singh <brijesh.singh@....com> Subject: Re: [PATCH v5 27/34] KVM: SVM: Add support for booting APs for an SEV-ES guest On 04/01/21 18:38, Tom Lendacky wrote: >> >> Paolo, is this something along the lines of what you were thinking, or am >> I off base? I created kvm_emulate_ap_reset_hold() to keep the code >> consolidated and remove the duplication, but can easily make those >> changes >> local to sev.c. I'd also like to rename SVM_VMGEXIT_AP_HLT_LOOP to >> SVM_VMGEXIT_AP_RESET_HOLD to more closely match the GHBC document, but >> that can be done later (if possible, since it is already part of the uapi >> include file). > > Paolo, a quick ping after the holidays as to whether this is the > approach you were thinking. I think there are a couple of places in > x86.c to update (vcpu_block() and kvm_arch_vcpu_ioctl_get_mpstate()), also. Yes, this is the basic idea. Paolo
Powered by blists - more mailing lists