From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751407AbdJWWk4 (ORCPT ); Mon, 23 Oct 2017 18:40:56 -0400 Received: from mail-by2nam01on0085.outbound.protection.outlook.com ([104.47.34.85]:18080 "EHLO NAM01-BY2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751200AbdJWWky (ORCPT ); Mon, 23 Oct 2017 18:40:54 -0400 Cc: brijesh.singh@amd.com, kvm@vger.kernel.org, bp@alien8.de, Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Paolo Bonzini , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Borislav Petkov , Tom Lendacky , x86@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [Part2 PATCH v6 01/38] Documentation/virtual/kvm: Add AMD Secure Encrypted Virtualization (SEV) To: Jonathan Corbet References: <20171020023413.122280-1-brijesh.singh@amd.com> <20171020023413.122280-2-brijesh.singh@amd.com> <20171020071807.3e771d3c@lwn.net> From: Brijesh Singh Message-ID: Date: Mon, 23 Oct 2017 17:40:47 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: <20171020071807.3e771d3c@lwn.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: DM5PR06CA0055.namprd06.prod.outlook.com (10.168.110.145) To SN1PR12MB0160.namprd12.prod.outlook.com (10.162.3.147) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 8d383541-ff9d-4600-951d-08d51a671cfe X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(48565401081)(4534020)(4602075)(4627075)(201703031133081)(201702281549075)(2017052603229);SRVR:SN1PR12MB0160; X-Microsoft-Exchange-Diagnostics: 1;SN1PR12MB0160;3:Zb8NCZzYaepwZmbtMrgp36xP/A44DNOILovge3Vmh7QAAfFzK8it7Mb65uRrHgsEBsh0oUOO/gK/O0osOBlvkQub084d9M1mzJ5UpWg0oJv/zca2YDrkjG243EUMY3bjZGFSElmzUp9F+xp1qgJot6KpQvsl0ZRyP/GayhbUgFEv/1HsvCj2WZqpoHV0LuM2a7I6m4vTaxIWOWPBxRUY5P0I1bUzzia23xT7cxvmaqAsyWNQOUkvIDubegXR6U1J;25:Sd3SKXHh0xCGLZHVtKt2vUQW1jQifBE+UDE0fPkQVkKprXqlYXwadMtI9XJ1UU1IfjCIrrauuXOHB5IUNhbvGUgQ8v34k9eMRIY1KCSelqqMGp2N9NZi946LIajaN8VPdXqsVD9s2PmchrbUkkGE/K0xd8U8IQgkZlOFDB2V5p7g5BXCqeTPNSn6+9eWnyjeeQz6fxoeJkVt4nw9lsQefEgbA8yu78UezEirolWDNEvnsVtj8VdM4tLX178+132XjvyfAY5E0qRZ9a1jr2AQourau6kX0x/OJ21KrVUwTFCgpf0Q29cwxtmZ5CoayNsJpUL0XKB4ugZHNsPVKlYmHEr3fuh34L0x+QiTAd5l+9w=;31:yELdhu+7sDw+u9yxKjhMTiWdMT/LNBbneD9nvpYtLyJ8zAKIuwS1s3ZNv5W5QA97UMRb4aW2JKQcbq725NQ9lALEMyRkemYd6uPGu24zvl/dB99CdJCle10X8RQGR1se9JD7M4LMqendlq8Y1uU1t6C/zLac1jgBWUX6qpJXKQVCmJxAK/0bEt5Q/s/f+Hm86Quy5UymfKKDQ0v7uDKiKU/q4BSODCxrb9G9ka5ntc8= X-MS-TrafficTypeDiagnostic: SN1PR12MB0160: X-Microsoft-Exchange-Diagnostics: 1;SN1PR12MB0160;20:038OxlOArmkmEZ+dCRawEG/K44corPfNUH6Lb6zBWDKTAJJ8tzf25CQ0SGmr1KFv1ZztoZgWTnJosyHcV9eIHPkmVS3FI3Q1bUKCU3rx+O13rkyv1OA5cO7ceM55i9yikR3hx4NlfU9hmlkYlXJw4K0leAj7NVScvcTEshAaau22GooW/jeLNYZbb5TbE1qgThOizszfINHK41a3XAFFe7lzMuryhPE7y2W1Oztc4mkkaROi2VQZQED3p4tiDJ9xKOIW1dQtMlhzvVzP0aYKlGcAoCS+Yp8zBDEYQraeGZ/PxPPKjG6gqKKP0JZ14u/y0Bqh/FiM7CXKVlg6I9XaXlTqfcTW6FILDwrkcnKliG2EQmEFVdDdxPaW5PXAOtl9ML4qwNJ8fmhAgwyWTyNizqbt+lMK+FAFSq1vm4HUMuv9exVKrJPqNaxWnyZKNzxwkXGBemV2OE0AJ/Rn19uobv9kuEe0laKtNEHM0k2TwbaVEOVRM1fOvgvwf94e4cDW;4:yXHboGV0fRArdr4SIQszbXENVk6oUMWDbTI1GxGvZ0t7geuzMRpDiz3V2a/B7JJpjbAfXuUcif9xB8H0eP4XTyLK2jiVCGDLIdrLUAMaf43bB4pmzOoLHtZPd3DP0GmlPDzmVfs5dKjRh4LTHfRyXyxx2GW8D8x+0KrLIFo6x5ZAowKr7yEW3mp0jmQS4Oy6OzArr/f5RW++ZI+SS8VBYBIbkgWhnDw5uXh0xWnsCQZEynZwSq/kQvY0TNuKDUl75AbgFXYbiGqbK3MPoemN1AHfImllDG1+wKrKW7vAWLY= X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(3002001)(10201501046)(3231020)(100000703101)(100105400095)(93006095)(93001095)(6055026)(6041248)(20161123564025)(20161123562025)(20161123555025)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:SN1PR12MB0160;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:SN1PR12MB0160; X-Forefront-PRVS: 046985391D X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(6049001)(6009001)(346002)(39860400002)(376002)(189002)(199003)(24454002)(47776003)(23676002)(65956001)(65806001)(4326008)(66066001)(316002)(58126008)(54906003)(36756003)(33646002)(7416002)(16576012)(54356999)(76176999)(2950100002)(6306002)(65826007)(5660300001)(6246003)(101416001)(106356001)(53936002)(230700001)(6916009)(50986999)(105586002)(6116002)(77096006)(16526018)(8676002)(31686004)(6486002)(189998001)(6666003)(83506002)(2906002)(68736007)(90366009)(81166006)(305945005)(31696002)(64126003)(97736004)(478600001)(86362001)(966005)(53546010)(50466002)(81156014)(229853002)(7736002)(25786009)(8936002)(3846002);DIR:OUT;SFP:1101;SCL:1;SRVR:SN1PR12MB0160;H:[10.236.136.62];FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtTTjFQUjEyTUIwMTYwOzIzOkZVTXNmTUlkZWs2Q0RPaG1lWmVNZFFtVE5G?= =?utf-8?B?MFU0THZZL080NndoRTU2SXB3Ri9PanB5QWJHYUtBcEJ0L1JHbmJqdkcwak1p?= =?utf-8?B?bFJJR1R0dVBnMXNlenRERHkyVDBaL2VjUWh2Z2gvdi9PTFNTQlhwVEJqaWRG?= =?utf-8?B?K2NwK0pVcVdBUGZuTjUrYVU0UzYrS3B4d3BaSk5VZlFGbi9Sd3BkMWFZMzJk?= =?utf-8?B?SzRCMXEyZkxuQnJPUk9oTzJyM2VDTTNvWnNFK1Avc3U4L0JEdXpnVGlvZ1hG?= =?utf-8?B?akpTeG11eDkySURvU1ZWaTVGM0tVUm8rSnMycHF0eGNxRHphZjJjb1dvdWxY?= =?utf-8?B?VUVwOVdaSG04alllTGdSbDVRMlJuMklRSHllMmdsc2E3Skg0eGpvQnFhaUpr?= =?utf-8?B?SWM4VmN2ZXU4MXQ5QjE3YktMQXdEcnNnbUNWS1JPSkUwdlc3Y0dYbXQ0bnJD?= =?utf-8?B?Zms4M2s4Q2N1dkN4L2s2OEVOMnNPWk9KMTJNUVhnRmxZVTJTbkZKWkwwTmg5?= =?utf-8?B?K0hReVZYZS8zYzRqMXV6TVd4ck1GOFhZa3crZnlDYk5nWVZEdnRPWlRvMEJw?= =?utf-8?B?Q0cwMGt5K0V0YnFNRDNHc3RIdTdGM1BDSlRUdXlmeEhLZ05BMmhJMlpoTmg2?= =?utf-8?B?SmEwWDNRejI5eGYxdHRhQklzdTI1QW1KS2VaT25PaXJmNUluSlA0SE5mZVRY?= =?utf-8?B?WjZWUzVhc3dKdGRaSHJiT05VWFM3NUxOSHE3ZVpLcXpnLzMvZU9zeWVIVmJK?= =?utf-8?B?a0dlTmdoaGx1R3VyUVpxOTd3WXJiaWtsMEI1dXduZzdyZmZFVWNzdHdTY28y?= =?utf-8?B?SEVXZHZZc3pyWlhNS0VsenJwY21ETm1wL2FxNVlDZzZBdU5VaHZabDcrb3Fn?= =?utf-8?B?V2pFZnN3YzBKK0wwSGtFcTB5bEUyNm1ObmdOaElGUVJrWDYrdzF4K0NEb2RZ?= =?utf-8?B?eXIzdjlraldGbWJ4dm9jM1ZhWU1rOFd2b2tzTUppRW51OG1EQnpKK253L2h5?= =?utf-8?B?YWxWSlBTcWlHVTNnT2lML2phb25zVlJOajBtWFJEcEZlaFk2MVFVOWVzR2NX?= =?utf-8?B?RmdOZFN5aHpVQVNUaEJZL2Jtd3d0QVdRUGNVM3RnZllIaEYwSFhORStoRmFI?= =?utf-8?B?b0dJaDRpV3hQaURqYmpqTG5NWElyTUVDNWpvOGpMZllUV2JPSFp6Q00rSGZ6?= =?utf-8?B?Nmg4U2k1WFA1RmJhMUlPY3NrdjRYSWFFR09XSjRldmdjWDdnL1ZkZFdEaVlY?= =?utf-8?B?RURWZEtzdTRjVStQY0pkRHdXYnNsWXpCdTAybUdkSVlkaHV0MFBaQWNGQTF1?= =?utf-8?B?bk9pb2U5OXd0ZVNZZEFwSjNtZVlSMXVIUEREL3ZvS09jNDRRek9PSExzTHht?= =?utf-8?B?RkhZSmFCUTB2d1I4UGdmN0JWRmpuRnRrN0hwZjBBbmt4S1lGZTNxcXZEMHg5?= =?utf-8?B?YzNUd3RGbzR0ZlBNa2pLOXA2WFFSNXNNVFJjY2FSU251R1BCSjU0dlpTbURE?= =?utf-8?B?NEhGZ3R1SzZCVlRzUkV4UEcyWnQ5QWhBaHM2amhwZXA4M3lBVm9LNWtLTDhu?= =?utf-8?B?Z3Y5ZXpsY3hRaG14U1pvTFVNYUNlSVV4ZXhPaXhmMWo3eXNTakovRmhvdTRL?= =?utf-8?B?MW9pU1ZvdWE0Z0tBcThqNzgwQjIzVWsxRlUxOFlpelZGWVpuR1IvWEphVHI2?= =?utf-8?B?RkdKeTJna1NybStRcHUrQnNvaFltdzJqUEtNZWRhK1d4UTgwa0JRT2g1cVdw?= =?utf-8?B?S1M5UFYzQTFsdmhNVzdnRzdXTk41NkJJeldRdE1WcDRpNHZDbUJyU2pZUXVn?= =?utf-8?B?Y0N5ZEYzM1A5YVVzNVEzNTNhZnRVb09pM3FWeHhCTTBJaVA2ZnZwTHdEUzNs?= =?utf-8?B?ZFROTEtXMmhTUUwyNFBtenRBNHNOdlhtUUhsczcwRm9nWTBFRmk3RkxqUHJk?= =?utf-8?Q?qmYXozn+xaSqnIVkVX87ms1Fv0n2jI=3D?= X-Microsoft-Exchange-Diagnostics: 1;SN1PR12MB0160;6:qieyy30gALvNKJWF6XzXUzYXDX8hfnv4avtEGTSlJyD2mog3/ZvbbYUEm9ZMJflaGuB4nZOxcbS0Dx2Ud184SK3acVlyKiA2gNOXfb4Prq2FRUKMG0asaJ82RLBl8uaHLLtB7n7gLmRlFSCAU2d6y8Lsj3LJhJsVlEwGG2q6j/RMNdmeIasEXutrnvaGQdr6rbKbPsey0nPW68GRwBQVD5COLymaGAUR8cIGojtWgssXxRlu13zx/ukmHT0LpyCVj210ZpeYsoPdRQYGGzfOCQi39UYUcBB0FAlByHhDuSypKaJ8eq1Gl329pUqS68mYUPMv9y/CyrGlz7CEJUlkGw==;5:5i8hIIFiSv5Rb5C/+W077ujgZ188qA48//3js82mPsVxePB96DFT7yuZXP1isWpao3jb4GTrAQhgXfy5j5w1+xs5Yi+oiLrgcz0rsDplAgBXD+RAxAGaziVgCz6XeK3003Apa4PC4yehqOqCOKxqvg==;24:9kuuOo2MH87qInAYdZ2iDuHq6hENa//Jm7ZCtwUNwYTcF5EfeSrEzgKZh5PeSPCUeGt9eyu0FLjT2z8p041DKC1SIY+I+EokJGRoBEHscTw=;7:lWE22fqnL+bk0dQcvaQHTpwyqd0hQPqeVKx4bbbce5zXkDFUGWI6GjQ1SC6sOUdLrEBL6jHkhF5LT945Gepp5HVXKJqR/Nip61crmw8rtqBULv4n6HUOzbnNBzOgQW+8rBKrBxxOKTqHIHxO0fCXxEfWCv6z9HwEzkEm9s8AcjreQu3f8mMVEG81fvb//otlpY03w6irUFJqkI7MKj3PAYE8lW3eezGPQT+SSvXpSlc= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;SN1PR12MB0160;20:ht4EPqmZtPg+TAM6rab+A7vMgMG7FK+3mU/ax3E1GplYndTnSYZpvCsoOyLeSM5FqPShQsHNqg85YDVw1EfUXjj/nFjgtvy5qQbg4MGHY+KgNiayS8Z0fsUOxEqkpgEdDvBpdZQ0aW0GvhAJWalOHpjF8n8V23qod/OWoLHkU5/+uTMspGPRZN0vcGu+7ibwsuZATk7NRHqIFKvf+ePJOcIcVWwFCKLjDLZwuW5jsJuPyYqc2EfxvtQv8tUarnbc X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Oct 2017 22:40:50.6162 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8d383541-ff9d-4600-951d-08d51a671cfe X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR12MB0160 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/20/2017 08:18 AM, Jonathan Corbet wrote: > On Thu, 19 Oct 2017 21:33:36 -0500 > Brijesh Singh wrote: > >> Create a Documentation entry to describe the AMD Secure Encrypted >> Virtualization (SEV) feature. > > A couple of quick notes... > > - This is describing an x86 subarchitecture feature, so it seems to me > that Documentation/x86 would be a more logical place for it. Yes, KVM > can use this feature, but it's not a KVM feature and there might be > something else that takes advantage of it too. > In part1 of SEV patches, we do expand the Documentation/x86/amd-memory-eencryption.txt to explain the SEV architecture feature. In this patch, we focus on documenting the SEV specific changes from the KVM point of view and how it integrate with KVM. > - Any chance of getting it formatted as RST? It's almost there already. > Sure, next rev I will convert it to RST format. > Beyond that, the document obviously falls far short of what one would > have to know to use SEV; probably filling all that in would make it long > indeed. > In later part of patches (Patch 24/38 [1]), I expand this doc to provide high level overview of various SEV commands to support common lifecycle events of SEV guests, such as launching, running, snapshotting, migrating etc. [1] https://patchwork.kernel.org/patch/10018671/