Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2680320ybl; Thu, 29 Aug 2019 11:22:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqyERckq84bzN5s/YkXwMelk5CR9KyCLwTl0r37nalS/mz5gldTQSqIII1jRS3nJajtdK+YQ X-Received: by 2002:a17:90a:fa82:: with SMTP id cu2mr11672840pjb.85.1567102966343; Thu, 29 Aug 2019 11:22:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567102966; cv=none; d=google.com; s=arc-20160816; b=XaLyxAwFT5OVtzXhVHsDRBYUNQj1/iAmdIG1Fj5VEVRATPkeTC2FqdzT6KwwA2NWnJ 5bWxuwV4P24cRrEujBjrmzAJP0GL9R/RybYuezUidBV//6N0E4riUTpV3RxvXBUpocbf usvQDioHo6ttJWRZQrnYIruf32SN7ahCqAu2jMKA1b0hizbmH/q64S38zq23UC1kaz0r t7ICxaDRd+/DhHyQfXIksX/wcB5zcKV3ZNEbKxEHrzb256PwPDHo1sWUPcaOKQvWtUpH b3C8Z8lO0yaUgX/+a8pma1dT07J3HfPcBUl9AI8TFmHl95J8yyh1zavD7R4KXyN621QC /Maw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=XzseWLkTaHRn336H98J7BP1SkfMIHsEOpA6zMAEABEk=; b=rbRZlmmJS6TI6cirhG6kABKtfzOyryqxp+65UyC7YE66yqzJWmQbRfsYT0lBPvgSmz Ehjv+Af1tlJmMBVw3dhE24DvqaL+/k3jOY46lEBJ8v6NyGKnujtsNOBX1JW8z7uUbk1j pEathsg2clBSU+/ZTK73HbpczARjuB49PWeKn0eCapJFIH75e7SCLduO36snzOUZAV0t BCl0IGrDoghdL9l/3jM5yl+MtMXDzBm2I0FH8+mWOOT/dTM9WSaAgj/v6aEHKJ/Y/ud6 PWJOuiQ/FRQEOoxfcfXxboEfQSOJ7M06M3uHEQn4vNMC3BFlKtzldZw++KV9sQb0eY0A qIlA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y1si2593907pgg.490.2019.08.29.11.22.31; Thu, 29 Aug 2019 11:22:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728946AbfH2SVq (ORCPT + 99 others); Thu, 29 Aug 2019 14:21:46 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:51220 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729743AbfH2SVo (ORCPT ); Thu, 29 Aug 2019 14:21:44 -0400 Received: from p5de0b6c5.dip0.t-ipconnect.de ([93.224.182.197] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1i3P38-0003sP-Me; Thu, 29 Aug 2019 20:21:34 +0200 Date: Thu, 29 Aug 2019 20:21:33 +0200 (CEST) From: Thomas Gleixner To: Borislav Petkov cc: "Singh, Brijesh" , "kvm@vger.kernel.org" , Ingo Molnar , "H. Peter Anvin" , Paolo Bonzini , =?ISO-8859-2?Q?Radim_Kr=E8m=E1=F8?= , Joerg Roedel , "Lendacky, Thomas" , "x86@kernel.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH v3 10/11] mm: x86: Invoke hypercall when page encryption status is changed In-Reply-To: <20190829180717.GF2132@zn.tnic> Message-ID: References: <20190710201244.25195-1-brijesh.singh@amd.com> <20190710201244.25195-11-brijesh.singh@amd.com> <20190829180717.GF2132@zn.tnic> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 29 Aug 2019, Borislav Petkov wrote: > On Wed, Jul 10, 2019 at 08:13:11PM +0000, Singh, Brijesh wrote: > > @@ -2060,6 +2067,14 @@ static int __set_memory_enc_dec(unsigned long addr, int numpages, bool enc) > > */ > > cpa_flush(&cpa, 0); > > > > + /* > > + * When SEV is active, notify hypervisor that a given memory range is mapped > > + * encrypted or decrypted. Hypervisor will use this information during > > + * the VM migration. > > + */ > > + if (sev_active()) > > + set_memory_enc_dec_hypercall(addr, numpages << PAGE_SHIFT, enc); > > Btw, tglx has a another valid design concern here: why isn't this a > pv_ops thing? So that it is active only when the hypervisor is actually > present? > > I know, I know, this will run on SEV guests only because it is all > (hopefully) behind "if (sev_active())" checks but the clean and accepted > design is a paravirt call, I'd say. No. sev_active() has nothing to do with guest mode. It tells whether SEV is active or not. So yes, this calls into this function on both guest and host. The latter is beyond pointless. Thanks, tglx