From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C76F9C47DA2 for ; Tue, 16 Jan 2024 17:10:20 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5FEB56B0089; Tue, 16 Jan 2024 12:10:20 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 5AF276B008A; Tue, 16 Jan 2024 12:10:20 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 478296B008C; Tue, 16 Jan 2024 12:10:20 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 375436B0089 for ; Tue, 16 Jan 2024 12:10:20 -0500 (EST) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 0CCE3140AC0 for ; Tue, 16 Jan 2024 17:10:20 +0000 (UTC) X-FDA: 81685812600.21.622A50A Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.12]) by imf16.hostedemail.com (Postfix) with ESMTP id 1E8F0180021 for ; Tue, 16 Jan 2024 17:10:16 +0000 (UTC) Authentication-Results: imf16.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=PIy2ABUv; dmarc=pass (policy=none) header.from=intel.com; spf=none (imf16.hostedemail.com: domain of rick.p.edgecombe@linux.intel.com has no SPF policy when checking 198.175.65.12) smtp.mailfrom=rick.p.edgecombe@linux.intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1705425018; a=rsa-sha256; cv=none; b=TYiV33uaOOazVb0cyRUjsY2KC6s0jksdsidv8Z5BMYAe6WMnjFHeA8yIengOe0NNrfELDZ 4uTsud692yU7txgTSqK09Tw1r/jK3UwDd6p0upt5mpAX8rgPIwi1hqeIw8wvBDSeP91Dwr 9w5hHzOE37UhxUzlxon4Oxvi7dijuGE= ARC-Authentication-Results: i=1; imf16.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=PIy2ABUv; dmarc=pass (policy=none) header.from=intel.com; spf=none (imf16.hostedemail.com: domain of rick.p.edgecombe@linux.intel.com has no SPF policy when checking 198.175.65.12) smtp.mailfrom=rick.p.edgecombe@linux.intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1705425018; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=+F0EM0MyQ7NcCg3Ixxu9z5Tybad96Gl5Tf0YqH4Dt+U=; b=zr/S/MSEYmXCRwHS4H2+c8rLlOTt5BhtgVAusklJCLiS45kaCcmr9XYlIJxa6wfwmWfraW J3CcOWIzm0mq3HO9ZS72+MSlhpg1RwturuD0jYpHEgNe8QctGgJI5JGN7wl6zwloCNfQmR fi0SsWv+vIulD5l3Q/vcXRWzeCs23FE= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1705425018; x=1736961018; h=message-id:subject:from:to:date:in-reply-to:references: content-transfer-encoding:mime-version; bh=+F0EM0MyQ7NcCg3Ixxu9z5Tybad96Gl5Tf0YqH4Dt+U=; b=PIy2ABUv4hFz07K0/qL/t7osESZuUZ/PqD5xcZ6Xujn5gUAQ9R0mbA2h /2nbbPsPGbB/waOdeXtG0Y/IjckKlxFAw2m9ri17p/zMX40hWBxidKFO1 semsIaHG1pF9qieMiM8A0Z7ibk+HDNQFUvcWDv3D6XnIByF7Q8gsJGqvZ /KWeAq30UwzdXbpK7nftrkD4YiooCl2L/rw8gaGZo54J+jRsRdQe4YlsM QIaCkrA08vGiuBIwwbIBF64WmjyH0+fYuthcOdT4X9H7iA2tdDm/v+hZz eerljVik2F6o2B97EIu2qr3+QeCUumSZ8f7PAL2cUFU+GkcDAvHybiaVh A==; X-IronPort-AV: E=McAfee;i="6600,9927,10955"; a="7295099" X-IronPort-AV: E=Sophos;i="6.05,199,1701158400"; d="scan'208";a="7295099" Received: from orviesa001.jf.intel.com ([10.64.159.141]) by orvoesa104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2024 09:10:11 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.05,199,1701158400"; d="scan'208";a="32529976" Received: from ticela-or-353.amr.corp.intel.com ([10.209.70.241]) by smtpauth.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2024 09:10:09 -0800 Message-ID: <76352c8a2a91135b0fcc9041b6f6e06ff0e0a971.camel@linux.intel.com> Subject: Re: [PATCH v4 0/3] x86/hyperv: Mark CoCo VM pages not present when changing encrypted state From: Rick Edgecombe To: mhklinux@outlook.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, kirill.shutemov@linux.intel.com, haiyangz@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, luto@kernel.org, peterz@infradead.org, akpm@linux-foundation.org, urezki@gmail.com, hch@infradead.org, lstoakes@gmail.com, thomas.lendacky@amd.com, ardb@kernel.org, jroedel@suse.de, seanjc@google.com, sathyanarayanan.kuppuswamy@linux.intel.com, linux-kernel@vger.kernel.org, linux-coco@lists.linux.dev, linux-hyperv@vger.kernel.org, linux-mm@kvack.org Date: Tue, 16 Jan 2024 09:10:08 -0800 In-Reply-To: <20240116022008.1023398-1-mhklinux@outlook.com> References: <20240116022008.1023398-1-mhklinux@outlook.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.44.4-0ubuntu2 MIME-Version: 1.0 X-Rspam-User: X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 1E8F0180021 X-Stat-Signature: hwdm87nyaunmnp9icyifd5qfd6ygf4is X-HE-Tag: 1705425016-876924 X-HE-Meta: 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 BCugGtYO ctjrv4z5yh/dghyRtVznHlYsmaHMwCvrcRTGwMislJ0WgRN9DeiE9Hdbpdm0uJxmAzQlpY9R1CsoKg/j+JXYVuphwMA7rrYuCDlvvh0jHDJUp9Z2zoonIa6PE6x+cVMrXcOHXDMijAoM4JkwUILn22u3HDQ== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Mon, 2024-01-15 at 18:20 -0800, mhkelley58@gmail.com wrote: > =C2=A0 x86/hyperv: Use slow_virt_to_phys() in page transition hypervisor > =C2=A0=C2=A0=C2=A0 callback > =C2=A0 x86/mm: Regularize set_memory_p() parameters and make non-static > =C2=A0 x86/hyperv: Make encrypted/decrypted changes safe for > =C2=A0=C2=A0=C2=A0 load_unaligned_zeropad() I'm not clear on the HyperV specifics, but everything else looked good to me. Thanks.