Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp3188780pxb; Tue, 20 Apr 2021 02:35:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyhynQfPehrLpqggbHn8CVxeRI2Wyu5BXPO1Npo22Y30EevkdA2rGL5x10CCNzgCTXjGhCm X-Received: by 2002:a05:6402:cbb:: with SMTP id cn27mr17408313edb.222.1618911338458; Tue, 20 Apr 2021 02:35:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618911338; cv=none; d=google.com; s=arc-20160816; b=H/Bar4M5lLWXNAIEeTZ1DTTO6WNZ1XqD1IBtgfHaEE1MRweSFvNHfLfhJUT05n5u1d rDMJMFFqXgNl2HmOSMNFfXk7jUdewXgd6kW+oVM3tBWd70Iq0mkZYrkbRH22VEzS6gMe q3nbhEV1tYWX9lxWRn/+l+/rFiMyxPWneUkYbHOorkQnaOBOuSCeAQ5xQZxRn27fwLoO xXSiJRHerKns1qO9aO+x4RpyuLQAOkvP/9LuU/ZuCu3TEb8DEsz4sseRdZ9NEOSg7iNP gnirtgsgSxVQ8QxO90oXd0lPnNYgl+6rElHvmxATeiDbwv//lc2V6a9stfCNGcImp5nP Wr4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=HR9PGFeuseuv+4p0efVgdR4ZvWDR0WWeCLxvhuktGw8=; b=EBOnA3IhGSJ+toYbBe8zUqQC3tjCzNFyI1XSY8JLSTUjzGRiVrN8tdAn5EhLPEQs4/ 74AobaamfN0OD6R9fvP5WRh3bwMQ3v+PGEZ3BpUTIC27rNQLf0Y2uRMqZyJGR2gD27Gu uyrW0tg9RrVQmwsd/+L1fRMh03s2z0NXKmvx7r0g5+Qr2QVaRFvwFTWLKJo4TaXnoyZU q52HJBQzZNQkOnbu0sBi+tdeyXbZxDvbtc/ajfVRry2iNUCnqc26qT4wy0TC+WRvouEL fGbjXNW+7JHFlSYloJXfgTcLOTGLrmrns8BlZMLiEuxr6GUFzn2ETxZudv6LJG4q4JdR 4hYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="RDx/XDB4"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a18si14696805ejb.116.2021.04.20.02.35.14; Tue, 20 Apr 2021 02:35:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="RDx/XDB4"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231246AbhDTJet (ORCPT + 99 others); Tue, 20 Apr 2021 05:34:49 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:25668 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230429AbhDTJer (ORCPT ); Tue, 20 Apr 2021 05:34:47 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1618911255; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=HR9PGFeuseuv+4p0efVgdR4ZvWDR0WWeCLxvhuktGw8=; b=RDx/XDB48pjHJzSqYv+bdY95dViPBnmwOM4bVD3C6NFbCJnZaeCbrq6TbUrjSney5DaPpw uvfokhh/er6zIUkJmsykLmk1kyyQVtj3dCUe794YZcYrelIHOBgNQYdJFbZer3yfuIRElC cUVmTXPR3iNqTJDN5hbgOBYH0VWqQ0w= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-319-SJp_Z5AbNziPaAD3TyvAdw-1; Tue, 20 Apr 2021 05:34:13 -0400 X-MC-Unique: SJp_Z5AbNziPaAD3TyvAdw-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id C5736107ACCA; Tue, 20 Apr 2021 09:34:12 +0000 (UTC) Received: from virtlab511.virt.lab.eng.bos.redhat.com (virtlab511.virt.lab.eng.bos.redhat.com [10.19.152.198]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6152710016FE; Tue, 20 Apr 2021 09:34:12 +0000 (UTC) From: Paolo Bonzini To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Brijesh Singh Subject: [PATCH] KVM: x86: document behavior of measurement ioctls with len==0 Date: Tue, 20 Apr 2021 05:34:11 -0400 Message-Id: <20210420093411.1498840-1-pbonzini@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Signed-off-by: Paolo Bonzini --- Documentation/virt/kvm/amd-memory-encryption.rst | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Documentation/virt/kvm/amd-memory-encryption.rst b/Documentation/virt/kvm/amd-memory-encryption.rst index 469a6308765b..34ce2d1fcb89 100644 --- a/Documentation/virt/kvm/amd-memory-encryption.rst +++ b/Documentation/virt/kvm/amd-memory-encryption.rst @@ -148,6 +148,9 @@ measurement. Since the guest owner knows the initial contents of the guest at boot, the measurement can be verified by comparing it to what the guest owner expects. +If len is zero on entry, the measurement blob length is written to len and +uaddr is unused. + Parameters (in): struct kvm_sev_launch_measure Returns: 0 on success, -negative on error @@ -271,6 +274,9 @@ report containing the SHA-256 digest of the guest memory and VMSA passed through commands and signed with the PEK. The digest returned by the command should match the digest used by the guest owner with the KVM_SEV_LAUNCH_MEASURE. +If len is zero on entry, the measurement blob length is written to len and +uaddr is unused. + Parameters (in): struct kvm_sev_attestation Returns: 0 on success, -negative on error -- 2.26.2