aboutsummaryrefslogtreecommitdiffstats
path: root/tools/testing/selftests/net/lib/py/utils.py
diff options
context:
space:
mode:
authorSean Christopherson <[email protected]>2025-02-27 01:25:35 +0000
committerSean Christopherson <[email protected]>2025-03-03 15:33:44 +0000
commitd26638bfcdfc5c8c4e085dc3f5976a0443abab3c (patch)
treef3032d029107af2a3349cd4ac37e106db6b8cd01 /tools/testing/selftests/net/lib/py/utils.py
parentKVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest has an invalid VMSA (diff)
downloadkernel-d26638bfcdfc5c8c4e085dc3f5976a0443abab3c.tar.gz
kernel-d26638bfcdfc5c8c4e085dc3f5976a0443abab3c.zip
KVM: SVM: Don't change target vCPU state on AP Creation VMGEXIT error
If KVM rejects an AP Creation event, leave the target vCPU state as-is. Nothing in the GHCB suggests the hypervisor is *allowed* to muck with vCPU state on failure, let alone required to do so. Furthermore, kicking only in the !ON_INIT case leads to divergent behavior, and even the "kick" case is non-deterministic. E.g. if an ON_INIT request fails, the guest can successfully retry if the fixed AP Creation request is made prior to sending INIT. And if a !ON_INIT fails, the guest can successfully retry if the fixed AP Creation request is handled before the target vCPU processes KVM's KVM_REQ_UPDATE_PROTECTED_GUEST_STATE. Fixes: e366f92ea99e ("KVM: SEV: Support SEV-SNP AP Creation NAE event") Cc: [email protected] Reviewed-by: Tom Lendacky <[email protected]> Reviewed-by: Pankaj Gupta <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Sean Christopherson <[email protected]>
Diffstat (limited to 'tools/testing/selftests/net/lib/py/utils.py')
0 files changed, 0 insertions, 0 deletions