From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pl1-f202.google.com (mail-pl1-f202.google.com [209.85.214.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7ADCE4B5C4 for ; Wed, 10 Jan 2024 14:59:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="QDHCZRuX" Received: by mail-pl1-f202.google.com with SMTP id d9443c01a7336-1d3eff55aa5so39050695ad.2 for ; Wed, 10 Jan 2024 06:59:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1704898798; x=1705503598; darn=lists.linux.dev; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=jQgwaFhg2BKv9e1KoNKcmXpgVYtZET9cMV48SEG0pPU=; b=QDHCZRuXs5b7YCABXO+Z+posQTKopsC7FDpbfzDroIJv2SCoMtkpljfy5vPtPGymO5 yv46ZNP+o8J3ZC2wPlmDYihoBShAPdj53QH8Cy0Ogv7mSI93qK42p2whIOkW41E/chD6 LI20syKc59wb96ljJ7CarcxTqzTt5F1GzIN65vKwYh4GM35NoB6atCQtvYIiaPOE2iwE UCZRxNXtSY3fXxiYm/2fSODYv+PVBlaKlzJyJUyY5lBJO1+qG3GZJaQjcPgZ70isyOrw 6v1iqpEuukfLmEWC6HISArcMSyCveOe9X067cCKoOCa2ykRdfY2ElE1wBNuQEPzCEhTO ghgg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704898798; x=1705503598; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=jQgwaFhg2BKv9e1KoNKcmXpgVYtZET9cMV48SEG0pPU=; b=euQ+4cT2NtnEB9lUKhCUdABjdfyDJl8T+paqmcAuiXqv0oHgjFYaEAjLIxTgwLFUc2 x46jeMhjXy1bNBmkjHsHIDhdjz4+Z3NJPkFp5cn4OEC3pRqWMIo7uXa9QTfXVzkPzXWc dBxPh19UrFvuMYli2WdaSYundnCoOZ/zMhmn/zB4EwgfSszxZx0Ui5cR64+R1U26OGY0 GPjl0rouZKgWQ1e/zl/BsvYRk71GQMGYne3HFtBpiHY9wnr4ruenSxD76xompt0I+VxC go5BkMEYBxcaMcAuPjanRF9Wixo0lb11AGd/+5qnHo3kEsxFkUzeRo5OjKZqe7WkHvCa jSqw== X-Gm-Message-State: AOJu0YykM66yqQ4GzXPLXFJ5uysrnG7ZU5G7Vkg7onpYonA9KlIhkajP VR0GJDAS9FStY6OOiMRXkqv0AQynRq3iczHymg== X-Google-Smtp-Source: AGHT+IEFhpLTQv5FIWQpxWjgo1MFihEctBgRDmmwpll2k+f+nuyvSydHAURFUngl8/4pjVhHXFBidN6ogTw= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a17:902:cec1:b0:1d4:a996:fc96 with SMTP id d1-20020a170902cec100b001d4a996fc96mr6121plg.11.1704898797659; Wed, 10 Jan 2024 06:59:57 -0800 (PST) Date: Wed, 10 Jan 2024 06:59:56 -0800 In-Reply-To: <20231230161954.569267-21-michael.roth@amd.com> Precedence: bulk X-Mailing-List: linux-coco@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20231230161954.569267-1-michael.roth@amd.com> <20231230161954.569267-21-michael.roth@amd.com> Message-ID: Subject: Re: [PATCH v1 20/26] crypto: ccp: Add debug support for decrypting pages From: Sean Christopherson To: Michael Roth Cc: x86@kernel.org, kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, tobin@ibm.com, bp@alien8.de, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com, nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com, zhi.a.wang@intel.com, Brijesh Singh Content-Type: text/plain; charset="us-ascii" On Sat, Dec 30, 2023, Michael Roth wrote: > From: Brijesh Singh > > Add support to decrypt guest encrypted memory. These API interfaces can > be used for example to dump VMCBs on SNP guest exit. By who? Nothing in this series, or the KVM series, ever invokes snp_guest_dbg_decrypt_page().