On Wed, 31 Jan 2024 15:56:05 -0800, Sean Christopherson wrote: > Play nice with systems where SEV and SEV-ES are enabled, but all ASIDs > have been carved out for SEV-eS, i.e. where actually running SEV guests > is impossible. > > v4: > - Convert all ASID usage to unsigned integers. > - Clean up sev_asid_new() so that it doesn't needlessly overload its > return value. > - Split out the -EBUSY=>-EINVAL change to a separate patch. > > [...] Applied to kvm-x86 svm, thanks! [1/4] KVM: SVM: Set sev->asid in sev_asid_new() instead of overloading the return https://github.com/kvm-x86/linux/commit/cc4ce37bed85 [2/4] KVM: SVM: Use unsigned integers when dealing with ASIDs https://github.com/kvm-x86/linux/commit/466eec4a22a7 [3/4] KVM: SVM: Add support for allowing zero SEV ASIDs https://github.com/kvm-x86/linux/commit/0aa6b90ef9d7 [4/4] KVM: SVM: Return -EINVAL instead of -EBUSY on attempt to re-init SEV/SEV-ES https://github.com/kvm-x86/linux/commit/fdd58834d132 -- https://github.com/kvm-x86/linux/tree/next