Bug 8573 - A series changes to make SME/CSV/CSV2 more usable and robust
Summary: A series changes to make SME/CSV/CSV2 more usable and robust
Status: NEW
Alias: None
Product: ANCK 6.6 Dev
Classification: ANCK
Component: X86 (show other bugs) X86
Version: unspecified
Hardware: All Linux
: P3-Medium S3-normal
Target Milestone: ---
Assignee: Guanjun
QA Contact: shuming
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-03-19 19:46 UTC by wojiaohanliyang
Modified: 2024-03-19 21:46 UTC (History)
3 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description wojiaohanliyang hygon_group 2024-03-19 19:46:22 UTC
Description of problem:

1. Fix initrd encrption/decryption issue when booting host linux which is using SME. [Reference: https://bugzilla.openanolis.cn/show_bug.cgi?id=3267]
2. Fix available asid range for Hygon CSV2 guest. [Reference: https://bugzilla.openanolis.cn/show_bug.cgi?id=6127]
3. Ensure kernel in the atomic context if #VC handler fetch userspace instructions [Reference: https://bugzilla.openanolis.cn/show_bug.cgi?id=6128]
4. Fix the KVM warning log when CSV2 issuing hypercall to notify page enc state.
5. Fix cache coherent issue on .bss..decrypted section when booting a memory encrypted guest. [Reference: https://bugzilla.openanolis.cn/show_bug.cgi?id=7830]
6. Don't intercept MSR_IA32_XSS so that the unexpected nested #VC exception will be happen and the guest will not crash.
7. Add pointer check in __sev_platform_shutdown_locked() to avoid NULL pointer reference.
8. Fix uninitialized local variable which may leak to userspace when KVM return MSR data to userspace.

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:
Comment 1 小龙 admin 2024-03-19 21:46:10 UTC
The PR Link: https://gitee.com/anolis/cloud-kernel/pulls/2914