summaryrefslogtreecommitdiffstats
path: root/scripts/stackusage
diff options
context:
space:
mode:
authorSean Christopherson <seanjc@google.com>2022-08-03 22:49:57 +0000
committerMichael Roth <michael.roth@amd.com>2022-08-05 18:12:04 -0500
commit3a885471cf89156ea555341f3b737ad2a8d9d3d0 (patch)
treece691e78b7d00a17f5e27825dfbcf9cdcd857796 /scripts/stackusage
parente1a04ea7bb868d7431afecf4ec49848b2e76035d (diff)
downloadcachepc-linux-3a885471cf89156ea555341f3b737ad2a8d9d3d0.tar.gz
cachepc-linux-3a885471cf89156ea555341f3b737ad2a8d9d3d0.zip
KVM: SVM: Disable SEV-ES support if MMIO caching is disable
Disable SEV-ES if MMIO caching is disabled as SEV-ES relies on MMIO SPTEs generating #NPF(RSVD), which are reflected by the CPU into the guest as a #VC. With SEV-ES, the untrusted host, a.k.a. KVM, doesn't have access to the guest instruction stream or register state and so can't directly emulate in response to a #NPF on an emulated MMIO GPA. Disabling MMIO caching means guest accesses to emulated MMIO ranges cause #NPF(!PRESENT), and those flavors of #NPF cause automatic VM-Exits, not #VC. Adjust KVM's MMIO masks to account for the C-bit location prior to doing SEV(-ES) setup, and document that dependency between adjusting the MMIO SPTE mask and SEV(-ES) setup. Fixes: b09763da4dd8 ("KVM: x86/mmu: Add module param to disable MMIO caching (for testing)") Reported-by: Michael Roth <michael.roth@amd.com> Tested-by: Michael Roth <michael.roth@amd.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Cc: stable@vger.kernel.org Signed-off-by: Sean Christopherson <seanjc@google.com> Signed-off-by: Michael Roth <michael.roth@amd.com>
Diffstat (limited to 'scripts/stackusage')
0 files changed, 0 insertions, 0 deletions