From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 73E53C54EBD for ; Fri, 13 Jan 2023 16:17:40 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D11DB8E0003; Fri, 13 Jan 2023 11:17:39 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id CC1678E0001; Fri, 13 Jan 2023 11:17:39 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B89288E0003; Fri, 13 Jan 2023 11:17:39 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id AAAE98E0001 for ; Fri, 13 Jan 2023 11:17:39 -0500 (EST) Received: from smtpin10.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 36ED7A0E50 for ; Fri, 13 Jan 2023 16:17:39 +0000 (UTC) X-FDA: 80350281438.10.AD4E6E4 Received: from mail-pf1-f175.google.com (mail-pf1-f175.google.com [209.85.210.175]) by imf21.hostedemail.com (Postfix) with ESMTP id 64BA71C0018 for ; Fri, 13 Jan 2023 16:17:36 +0000 (UTC) Authentication-Results: imf21.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=IQ4NJUEE; spf=pass (imf21.hostedemail.com: domain of seanjc@google.com designates 209.85.210.175 as permitted sender) smtp.mailfrom=seanjc@google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1673626656; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=TJeOsX7rqE6g0mVRSRHk5yMoUKpARELqW20Sskbk42I=; b=zXr3972TqxQfFv6hXUPpvluXHxffAhzXboJvAE5Y8/6Ep0on8yTQy4nSyZ5qk55+Mz5rIm 17sBz2sKyJLsZpWC1swSv8AmgX3mPY1fyKDJ0NwLBCjGO0i03eQlLUhvDtf1gENOg2endx FuK+SdIVlA9cBDfzNJhlM4lq+/7z900= ARC-Authentication-Results: i=1; imf21.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=IQ4NJUEE; spf=pass (imf21.hostedemail.com: domain of seanjc@google.com designates 209.85.210.175 as permitted sender) smtp.mailfrom=seanjc@google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1673626656; a=rsa-sha256; cv=none; b=qJovUygVuQzAzQgxmshJ8v5tyU5kj17eBU2WXVXXPp7VOvXi50zC16B4/JA2TNioIg26ER OGgX2B8qPK0v8ArJC2ZFm/7Xc6f0LYf8lIVSoHZ1RouzS5YH+1H4XxsFM3uk9p9nT4QgEO NRXk7xLej3nNeDtY/47glZgaTbIQt6o= Received: by mail-pf1-f175.google.com with SMTP id i1so1485842pfk.3 for ; Fri, 13 Jan 2023 08:17:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=TJeOsX7rqE6g0mVRSRHk5yMoUKpARELqW20Sskbk42I=; b=IQ4NJUEEXnGK+4TAeAUhUDbJE39b5ZeOp1OkVTltv8wQ+Xw/ab4dZJsfeAjbFFROcM t68CuD5zBGt1Hw9j0S/xUGh9mzMnECcJveODqqLxEdLoGsZtXfi33tXPnJw1uXZyMSBw U/4qJwAZBR1xOV8LlKyaG6WbPNsOmhhzRLLYzskRVN3UbSxyKeBJ7w/m1F9d4GyOgXdb 3oGx9CtiHVr1s/ibzcusJma+EtZaQOARrir1OLiel8qyu0IWpN2bkwMxcTJXnpzafR9W iSJbpvsbPUKzW/e0ZnGsOQLM3n1qdnhrQ3HRe/qcqutpi1rYQdcy1s3ckztjiRSdYTUe WkUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=TJeOsX7rqE6g0mVRSRHk5yMoUKpARELqW20Sskbk42I=; b=mWeD8PQ/F8RglwHDRqDA3ePdoAef9fgC84O/EnZ9X/CIEWPG2preWdWh7vWIqzKYdq jxVZPxdia55SWTVi9dvYChnzN6QwQKHSWzbOyaIP1nTCPWLl+l738OVnA16MPXbEF+h/ UQliYO0kgMtUR+GPlsaXNhGF4BaUyGUKFI3LHbKPrmWMHuRYZwlhbvweJ8WysmMmo7Wq y4PAC8sPkSuqIUcFnhwMV9P+lhEp8CJq0J8Qy39mdsv3raOYACf25d9hW47iicsQorry bL0CIQ65Hn3UhLgVlXBDz8ufWAbF7eU/N2iGr2sGo/2StWSTZKxG0ayYMKTDO4Fg8Gm8 TKFQ== X-Gm-Message-State: AFqh2kpA6J6JTpcE6MLlALvtIHXKWiVwMmF6G2ITzhg3gkN1Xanp34tU YCRJa64Ru3GFw6u2UMF0DmbayQ== X-Google-Smtp-Source: AMrXdXuXHVHcsxtYERQM+5pjJq9HKtQ+w/9gzosLvtojx6mjzh7D5LxDRnQ8J2KS7JQnIjIk3czM+g== X-Received: by 2002:aa7:8148:0:b0:576:9252:d06 with SMTP id d8-20020aa78148000000b0057692520d06mr1269277pfn.0.1673626655147; Fri, 13 Jan 2023 08:17:35 -0800 (PST) Received: from google.com (7.104.168.34.bc.googleusercontent.com. [34.168.104.7]) by smtp.gmail.com with ESMTPSA id i1-20020a056a00004100b00581a156b920sm1555298pfk.132.2023.01.13.08.17.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 Jan 2023 08:17:34 -0800 (PST) Date: Fri, 13 Jan 2023 16:17:30 +0000 From: Sean Christopherson To: Borislav Petkov Cc: Michael Roth , kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, vkuznets@redhat.com, wanpengli@tencent.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, marcorr@google.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, dgilbert@redhat.com, jarkko@kernel.org, ashish.kalra@amd.com, harald@profian.com, Nikunj A Dadhania Subject: Re: [PATCH RFC v7 07/64] KVM: SEV: Handle KVM_HC_MAP_GPA_RANGE hypercall Message-ID: References: <20221214194056.161492-1-michael.roth@amd.com> <20221214194056.161492-8-michael.roth@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 64BA71C0018 X-Stat-Signature: 557cechwzyrwtb8f84nxkfwbcirdbqa7 X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1673626656-450987 X-HE-Meta: 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 L4bjfW71 dSmQ9MYIlKS4XU5j2wYvExi8OHRocLj0pI7/RmY6QlkIYsvRQyyS7ZiDgW7Be8iwr8YRX6YoxV8aXZu5Ysk+GQrErGOWBfLxx4e90G4dIJ/bM5+83i4700DCVf6WsQhS7XKD2nAOfBUSO0l0= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000040, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Fri, Jan 13, 2023, Borislav Petkov wrote: > On Wed, Dec 14, 2022 at 01:39:59PM -0600, Michael Roth wrote: > > From: Nikunj A Dadhania > > > > KVM_HC_MAP_GPA_RANGE hypercall is used by the SEV guest to notify a > > change in the page encryption status to the hypervisor. > > > > The hypercall exits to userspace with KVM_EXIT_HYPERCALL exit code, > > currently this is used for explicit memory conversion between > > shared/private for memfd based private memory. > > So Tom and I spent a while to figure out what this is doing... > > Please explain in more detail what that is. Like the hypercall gets ignored for > memslots which cannot be private...? Don't bother, just drop the patch. It's perfectly legal for userspace to create the private memslot in response to a guest request.