Received: by 2002:a05:6a10:c7d3:0:0:0:0 with SMTP id h19csp1029748pxy; Sun, 15 Aug 2021 07:42:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzBD1ug5ii2GpbK4kbGmPaUIqC6B+0uIXzUA5J8ns0JbRnAPYYNV8LLOMYfYrD+sOqVUVhh X-Received: by 2002:a17:907:785a:: with SMTP id lb26mr11917612ejc.77.1629038524970; Sun, 15 Aug 2021 07:42:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629038524; cv=none; d=google.com; s=arc-20160816; b=Vek2lxvOJCXSzQMsxqbU0T5vtZ+aC/K0M1rdvOJgIK11/0CM+8slzaIo3XshyWpbmG xIUe2speh2vzooJA6oOP5B9M19wlklUpuFlc/NOkS/cjNOwrH3zhJr/P5ZEKzmUHv3mS ZpDtTRMWmnKyzYYC1k1c5ECtX5vqwBJWjVyY8yZjs5K/iths4tVTrDzOl0mJqJ6JCFet 67Dvn5FZLFVplYrSJBJSTdv4iPIL5ZLsCDi2tWgehi73g5V+cBmAsuKeEDzy/G21I+va O5ySprFOC2rpOinEY5Id/FO6JwOzqkP3yaeNgE3+Z2YjryOtUSHvwJ0r64AIyGSMV4vd +noQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=jL5qXq5tPSUlQog/FJ5eZ1GT2YpJvvVnQmTTUk0cbrA=; b=TLDo8c1dXr/FEpL/u3Fs/EnPFLDO34KY+RO8qc0LcHGtRtjRfGKuhheiBrNB4zRUaS 6uQKsjXz9laMvm0rCCoP+3H7KSH9bc88Z9JPwkLAc7K22FF9VGj/dwp0ug7oRV+ykQ8U 8jz+XtFbLfJR/o63asgCANrvyoI8NP9bjWpTem1+5i67mHbK15yyAoBmHVB5fLr+Vdiv BmEaG2JucaGt7vEui7gRv+fNNcKAx72KSOV5gIrdS6v9Ajy4FBSx1l67G3LWEidjI+k6 AO9mLO4/GU3BWoXICyb2Q3IgPGbMSGjHgjZMvbVqMXRLO8rS6ZPfi78BOq2Es6b9VFrm 5KKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=Ynjh7QDJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id us9si3385287ejb.567.2021.08.15.07.41.40; Sun, 15 Aug 2021 07:42:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=Ynjh7QDJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238485AbhHOOjK (ORCPT + 99 others); Sun, 15 Aug 2021 10:39:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55408 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232465AbhHOOjH (ORCPT ); Sun, 15 Aug 2021 10:39:07 -0400 Received: from mail.skyhub.de (mail.skyhub.de [IPv6:2a01:4f8:190:11c2::b:1457]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 68F42C061764; Sun, 15 Aug 2021 07:38:37 -0700 (PDT) Received: from zn.tnic (p200300ec2f26310039d0ba97aac93c10.dip0.t-ipconnect.de [IPv6:2003:ec:2f26:3100:39d0:ba97:aac9:3c10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 5FF7A1EC0505; Sun, 15 Aug 2021 16:38:31 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1629038311; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=jL5qXq5tPSUlQog/FJ5eZ1GT2YpJvvVnQmTTUk0cbrA=; b=Ynjh7QDJnobQuRzRBtXZMflPEf0vTQxZ/1e/DI2MnZmP0BU3+0pTK5ZZQ5Gk5RnrPuYHa6 IdpdAyOEUiLJZd8HI6wSzceOtBbAWAY0K9LHdKOg+Qfc/RBmkhxNql4Enc7Gc4LTKOJnaI 0ETWtaeGc2m89ri2xInjGo/yEh1iYis= Date: Sun, 15 Aug 2021 16:39:09 +0200 From: Borislav Petkov To: Tom Lendacky Cc: linux-kernel@vger.kernel.org, x86@kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, iommu@lists.linux-foundation.org, kvm@vger.kernel.org, linux-efi@vger.kernel.org, platform-driver-x86@vger.kernel.org, linux-graphics-maintainer@vmware.com, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, kexec@lists.infradead.org, linux-fsdevel@vger.kernel.org, Brijesh Singh , Joerg Roedel , Andi Kleen , Sathyanarayanan Kuppuswamy , Tianyu Lan , Thomas Gleixner , Ingo Molnar , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Joerg Roedel Subject: Re: [PATCH v2 03/12] x86/sev: Add an x86 version of prot_guest_has() Message-ID: References: <7d55bac0cf2e73f53816bce3a3097877ed9663f3.1628873970.git.thomas.lendacky@amd.com> <4710eb91-d054-7b31-5106-09e3e54bba9e@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <4710eb91-d054-7b31-5106-09e3e54bba9e@amd.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Aug 15, 2021 at 08:53:31AM -0500, Tom Lendacky wrote: > It's not a cross-vendor thing as opposed to a KVM or other hypervisor > thing where the family doesn't have to be reported as AMD or HYGON. What would be the use case? A HV starts a guest which is supposed to be encrypted using the AMD's confidential guest technology but the HV tells the guest that it is not running on an AMD SVM HV but something else? Is that even an actual use case? Or am I way off? I know we have talked about this in the past but this still sounds insane. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette