Re: [PATCH 41/62] x86/sev-es: Handle MSR events

2020-02-15 Thread Joerg Roedel
On Fri, Feb 14, 2020 at 08:59:39AM -0800, Dave Hansen wrote: > On 2/13/20 11:23 PM, Joerg Roedel wrote: > > Yes, investigating this is on the list for future optimizations (besides > > caching CPUID results). My idea is to use alternatives patching for > > this. But the exception handling is

Re: [PATCH 41/62] x86/sev-es: Handle MSR events

2020-02-14 Thread Dave Hansen
On 2/13/20 11:23 PM, Joerg Roedel wrote: > Yes, investigating this is on the list for future optimizations (besides > caching CPUID results). My idea is to use alternatives patching for > this. But the exception handling is needed anyway because #VC > exceptions happen very early already,

Re: [PATCH 41/62] x86/sev-es: Handle MSR events

2020-02-13 Thread Joerg Roedel
On Thu, Feb 13, 2020 at 07:45:00AM -0800, Dave Hansen wrote: > On 2/11/20 5:52 AM, Joerg Roedel wrote: > > Implement a handler for #VC exceptions caused by RDMSR/WRMSR > > instructions. > > As a general comment on all of these event handlers: Why do we bother > having the hypercalls in the

Re: [PATCH 41/62] x86/sev-es: Handle MSR events

2020-02-13 Thread Dave Hansen
On 2/11/20 5:52 AM, Joerg Roedel wrote: > Implement a handler for #VC exceptions caused by RDMSR/WRMSR > instructions. As a general comment on all of these event handlers: Why do we bother having the hypercalls in the interrupt handler as opposed to just calling them directly. What you have is:

[PATCH 41/62] x86/sev-es: Handle MSR events

2020-02-11 Thread Joerg Roedel
From: Tom Lendacky Implement a handler for #VC exceptions caused by RDMSR/WRMSR instructions. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapt to #VC handling infrastructure ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev-es.c | 32