From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 11BFBC54EBE for ; Fri, 13 Jan 2023 16:00:38 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4939D8E0003; Fri, 13 Jan 2023 11:00:38 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 442188E0001; Fri, 13 Jan 2023 11:00:38 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 358708E0003; Fri, 13 Jan 2023 11:00:38 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 289E48E0001 for ; Fri, 13 Jan 2023 11:00:38 -0500 (EST) Received: from smtpin14.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id BE63DC0EBA for ; Fri, 13 Jan 2023 16:00:37 +0000 (UTC) X-FDA: 80350238514.14.F299AB1 Received: from mail.skyhub.de (mail.skyhub.de [5.9.137.197]) by imf22.hostedemail.com (Postfix) with ESMTP id 0DECEC0026 for ; Fri, 13 Jan 2023 16:00:29 +0000 (UTC) Authentication-Results: imf22.hostedemail.com; dkim=temperror ("DNS error when getting key") header.d=alien8.de header.s=dkim header.b=e25h2q38; spf=pass (imf22.hostedemail.com: domain of bp@alien8.de designates 5.9.137.197 as permitted sender) smtp.mailfrom=bp@alien8.de; dmarc=pass (policy=none) header.from=alien8.de ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1673625635; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=27o6Yp9lIyQ9qbRTNp3Mdd/CmshSTWD6HQz/gXlOA3o=; b=iOBStDn4CxRNkxyGIfCl8L9a/HVsHc51YirqUL3ehaTqsZjJBmjcf7Pd/YMdeAYlGVIyEI bkW/VtuMv+5EvO3dx6SYndatED+tbNryNBm5DngvTiTm+cEaDkSgWqlq5SZqbAuINT4bec Cc4ecqWTmPLpGNQL4TAbttEQ5CtKzPc= ARC-Authentication-Results: i=1; imf22.hostedemail.com; dkim=temperror ("DNS error when getting key") header.d=alien8.de header.s=dkim header.b=e25h2q38; spf=pass (imf22.hostedemail.com: domain of bp@alien8.de designates 5.9.137.197 as permitted sender) smtp.mailfrom=bp@alien8.de; dmarc=pass (policy=none) header.from=alien8.de ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1673625635; a=rsa-sha256; cv=none; b=VYba9hFZG34MzFAFb9vFBVsDnl/N0rdogdaqCRTDVIhDfEGpgKJhU3nMdsDt8jyMj9JMNL 4QTbPgky/xd+QX3Qo7tZnGf5m4LaqPOsTU2ytpQd1pcwW/6SWFUmjbt4kmDxb8Ol6toU94 xL+p1WIV6DBiSN0iFO2SsclSP3fDwN4= Received: from zn.tnic (p5de8e9fe.dip0.t-ipconnect.de [93.232.233.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id E46401EC0657; Fri, 13 Jan 2023 17:00:27 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1673625627; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=27o6Yp9lIyQ9qbRTNp3Mdd/CmshSTWD6HQz/gXlOA3o=; b=e25h2q38vIHUR9CNYNMf4tXTOlOHI4G8rk4VVrsSmSLtK5pcWLoKu4BpzQjB4kuEIq3lg+ IsXSlOSBZ8LddYkmLkfbbsvYWLBHAbCUKnqKZnif4mdcYkpHnf//cFvKItev7lixW7KDtI BAYLJEDGsUX250/UeZjiceJ21LbTllE= Date: Fri, 13 Jan 2023 17:00:24 +0100 From: Borislav Petkov To: Michael Roth Cc: kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, wanpengli@tencent.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, marcorr@google.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, dgilbert@redhat.com, jarkko@kernel.org, ashish.kalra@amd.com, harald@profian.com, Nikunj A Dadhania Subject: Re: [PATCH RFC v7 07/64] KVM: SEV: Handle KVM_HC_MAP_GPA_RANGE hypercall Message-ID: References: <20221214194056.161492-1-michael.roth@amd.com> <20221214194056.161492-8-michael.roth@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20221214194056.161492-8-michael.roth@amd.com> X-Rspamd-Queue-Id: 0DECEC0026 X-Stat-Signature: twj1ea7aoyhockzkifqbkskynpyqt1qs X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1673625629-617010 X-HE-Meta: U2FsdGVkX1/PPP0vYGQwArV5pchidvStVECADyPIgB8zrDsLOB7RvbcxpIjsymGVgPbNoddgkZVOi2y8iSGEhDCSLbW6uOWO6OcyZKfmqYjd7tNQvXmT2lrlU5BDTOb8ld8cBGLNNAOOFyB/sINLp9WMH/GE112qj5KMkLl04nzN+Jqpp44TU4gNsi7Oo4k/Ea/GoSGVma8gS8xELSDAEMWsDCyDVFhOGBDCJRqdRndgRVGTz+2nt1ughhfUk7dz8H3yV/MF/Tkrj+yxfouqEqLIr2GFnkIjlvDLXHgFIDgW0+0TDlbUmOE7GPV6EbAq0ec1gjXdCQXWk/ViJu4JkzFX54z8ye3zN3A17vlWEranvIjDW9wYqFL3gIWCceXzXa6sGtB1q7mTz1CsVeosG1EG9h5IIYJ5FHgETDf3mYsH2L0t9X1JChh7V8uzQGBF+vodW9kPEpgxyp5t3ubqc33lsp3ZMIBc/B1juIJopfbUOqKnpiKp4p6FQ3+Q+wWZW58d21zaou/lIXjFyc0keG0eYk1oaAvVid0eV7bOtv+YiZzbwpQfYeZI29g/O7WC1mLSfU4FJQMm7U5h13+Sd+jqnZsc2nSqIyEU/Ocj7AJFmENSLbtQotUwR+sc3ZNPAiU/TQFoJuJKhmr3AsbzoREkEOCiL49cA+kXskUL46Pl2KQiPAUazBjfBXeV7XCM8W05Hf4aMvDWa08GLjie6ql3jNBW0Q56SHZIhTJ1T3hSVCweHUYPGS20Y5xU8pcBmcmvE6Uw67JujQ99jVvrCNq6dBFi10bLdjofMACA8mUnk3/b1XcBnGTeK+SUU9EvbA+kDEvloPBsgD9LGr4wPkh+YHQOuTxzIH0swE5XL0gj6wULyYyLcqXGxIUIFecDylpKr4FUISRVc7px+lxWlg== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Wed, Dec 14, 2022 at 01:39:59PM -0600, Michael Roth wrote: > From: Nikunj A Dadhania > > KVM_HC_MAP_GPA_RANGE hypercall is used by the SEV guest to notify a > change in the page encryption status to the hypervisor. > > The hypercall exits to userspace with KVM_EXIT_HYPERCALL exit code, > currently this is used for explicit memory conversion between > shared/private for memfd based private memory. So Tom and I spent a while to figure out what this is doing... Please explain in more detail what that is. Like the hypercall gets ignored for memslots which cannot be private...? And what's the story with supporting UPM with SEV{,-ES} guests? In general, this text needs more background and why this is being done. Thx. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette