From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9BE4CC4332F for ; Wed, 13 Dec 2023 15:42:09 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id AC0F78D003B; Wed, 13 Dec 2023 10:42:07 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 9D5E58D0035; Wed, 13 Dec 2023 10:42:07 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 827F88D003B; Wed, 13 Dec 2023 10:42:07 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 6789F8D0035 for ; Wed, 13 Dec 2023 10:42:07 -0500 (EST) Received: from smtpin28.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 2BFCF140B14 for ; Wed, 13 Dec 2023 15:42:07 +0000 (UTC) X-FDA: 81562211094.28.B524CD0 Received: from mail.alien8.de (mail.alien8.de [65.109.113.108]) by imf06.hostedemail.com (Postfix) with ESMTP id 522CC180010 for ; Wed, 13 Dec 2023 15:42:03 +0000 (UTC) Authentication-Results: imf06.hostedemail.com; dkim=pass header.d=alien8.de header.s=alien8 header.b="QOAG/cZ1"; dmarc=pass (policy=none) header.from=alien8.de; spf=pass (imf06.hostedemail.com: domain of bp@alien8.de designates 65.109.113.108 as permitted sender) smtp.mailfrom=bp@alien8.de ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1702482125; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=IyhM7Slw/zIKLzW0NKmy0CrnbMXBOwC2G6bxrBly64g=; b=yD7P/LqLqrnJQc6B9mFzmsrnk3OZlUPRNf27eaeiNmD8yOjg/ae24HcV5lQ4SJsTDmiT9x X90p73W4F3kXw0FQPa1C29480/J2yn/G/TokylcboHYbO9Y498BAwRGfC4HGtBdCV9Ythd mlbQfS0my9odtPxM/+VOiqCX16TUaTo= ARC-Authentication-Results: i=1; imf06.hostedemail.com; dkim=pass header.d=alien8.de header.s=alien8 header.b="QOAG/cZ1"; dmarc=pass (policy=none) header.from=alien8.de; spf=pass (imf06.hostedemail.com: domain of bp@alien8.de designates 65.109.113.108 as permitted sender) smtp.mailfrom=bp@alien8.de ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1702482125; a=rsa-sha256; cv=none; b=1RT9Tn/DGc364EYMbzRG/6bShMDSZ6MZOetNVqiJWM5oJhi6OJi1rPLmVr4kiOy5lDr9qh leufGj4qFZr9zs8CUrzVymKqxHWwHVdmhnC0/MG+zdPHt2dmFj/ydGOlBB0kD7opYLJHW8 oeN9VNpyyOSkpq/cpJu8OTfiZ1Kp25Q= Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTP id 834E940E00CB; Wed, 13 Dec 2023 15:41:57 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at mail.alien8.de Received: from mail.alien8.de ([127.0.0.1]) by localhost (mail.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 3WN12W1SPrIZ; Wed, 13 Dec 2023 15:41:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=alien8; t=1702482115; bh=IyhM7Slw/zIKLzW0NKmy0CrnbMXBOwC2G6bxrBly64g=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=QOAG/cZ16FSsNmwYJBb7r6qQgBeJQZTYcRo4azQifv+sKJfJy0k00NV5msq6ymTAY NdSWQqiaJzIIbbjQawtF5wiDnmZRIpMjCY5i5wVf1mcEiJ5QdOMvwYylKQB0wtBzsA wADGzcVl17JzPGddFLy0pTMafOg2YyX7aoMJdR8zVSaPE7JKCZNzqsXKkBWQRozFUr jaFqS5IATs10wyL7JrP6lrjpe/uG23/9rJkvrNsl+S8T76DZT7ZSxIhSBIwItLek0B 4fbUky4Eiz7wCrJoMdKeUoBz12+M+ToP6KNiAj0eYkTIKvM4ANAKMXiWWvW4/ZFTbY tsZr7I8vWlAoUPMOtYV0mVZaUei4nttnjdpAvWsNNX05bY6ByXb10hG7vZuoAnbRiW ZRHqIscTgQNR0E3nEVAczRVmsSUnmQve5Li6FeVGf5BmVgKrVl2psZiiTXV+N6UdWF pRYwOSxj4xEoiW73XfixRM7B8R1yJ01piZAtC1OZHPaBlUT2kqUaUlQVg62qfO/Cjy TQrMu6YCHcrmOGZjE2T5WSBPMUEh/ayPYhujwMrw3O/+wYBDFxhpyeAsLK3xChvB5O HBPreAb4duw1cKA5I6mD6repeSryseqxrlv4kLdUJJTs956fDOM2icXv+LzuLksbOW BbNi0uSQw+rozRuITpo5zsMI= Received: from zn.tnic (pd95304da.dip0.t-ipconnect.de [217.83.4.218]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id ED3D640E00CD; Wed, 13 Dec 2023 15:41:13 +0000 (UTC) Date: Wed, 13 Dec 2023 16:41:07 +0100 From: Borislav Petkov To: Paolo Bonzini Cc: Michael Roth , kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, seanjc@google.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, marcorr@google.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com, nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com, zhi.a.wang@intel.com, Brijesh Singh , Jarkko Sakkinen Subject: Re: [PATCH v10 04/50] x86/cpufeatures: Add SEV-SNP CPU feature Message-ID: <20231213154107.GGZXnQkxEuw6dJfbc7@fat_crate.local> References: <20231016132819.1002933-1-michael.roth@amd.com> <20231016132819.1002933-5-michael.roth@amd.com> <0b2eb374-356c-46c6-9c4a-9512fbfece7a@redhat.com> <20231213131324.GDZXmt9LsMmJZyzCJw@fat_crate.local> <40915dc3-4083-4b9f-bc64-7542833566e1@redhat.com> <20231213133628.GEZXmzXFwA1p+crH/5@fat_crate.local> <9ac2311c-9ccc-4468-9b26-6cb0872e207f@redhat.com> <20231213134945.GFZXm2eTkd+IfdsjVE@fat_crate.local> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 522CC180010 X-Rspam-User: X-Rspamd-Server: rspam04 X-Stat-Signature: u1wbaiczzgxjgaohn5azyz4wkn89r5gf X-HE-Tag: 1702482123-481265 X-HE-Meta: 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 WWh4QhfF c6TLq8SBtukccXZxm8cnBkoumBx3TnBIWhhg8I1w9HZ7Hp05d0m3m7O8Q3SFu+Ga9vR0WoleWdHgKyyhgWWxv5XNa+kMx8oegTFpk7crZPZdwb08Xdqh97MvcWkaNVlz6QJ4+Hid7hHrOc26Ap7xf+yb0Zfu3NkYCSLXQ6c72jleUxleX5PrGBkTO4+gmQqcc5DjBhvJ8S74oFMo= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Wed, Dec 13, 2023 at 03:18:17PM +0100, Paolo Bonzini wrote: > Surely we can agree that cpu_feature_enabled(X86_FEATURE_SEV_SNP) has nothing > to do with SEV-SNP host patches being present? It does - we're sanitizing the meaning of a CPUID flag present in /proc/cpuinfo, see here: https://git.kernel.org/tip/79c603ee43b2674fba0257803bab265147821955 > And that therefore retpolines are preferred even without any SEV-SNP > support in KVM? No, automatic IBRS should be disabled when SNP is enabled. Not CPUID present - enabled. We clear that bit on a couple of occasions in the SNP host patchset if we determine that SNP host support is not possible so 4/50 needs to go together with the rest to mean something. > And can we agree that "Acked-by" means "feel free and take it if you wish, I can see how it can mean that and I'm sorry for the misunderstanding I caused. Two things here: * I acked it because I did a lengthly digging internally on whether disabling AIBRS makes sense on SNP and this was a note more to myself to say, yes, that's a good change. * If I wanted for you to pick it up, I would've acked 4/50 too. Which I haven't. > I'm asking because I'm not sure if we agree on these two things, but they > really seem basic to me? I think KVM and x86 maintainers should sit down and discuss who picks up what and through which tree so that there's no more confusion in the future. It seems things need discussion... Thx. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette