Received: by 2002:ac0:e34a:0:0:0:0:0 with SMTP id g10csp311656imn; Wed, 27 Jul 2022 07:01:27 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uJr7sM/zOLraqG02dlXTrW5ixy7v7W7r7/C5H4D09Mwt1R0YibfYbXdfyz3Q4Zf9ehHxno X-Received: by 2002:a17:902:ef4f:b0:16b:8744:6c5f with SMTP id e15-20020a170902ef4f00b0016b87446c5fmr22080689plx.60.1658930487198; Wed, 27 Jul 2022 07:01:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658930487; cv=none; d=google.com; s=arc-20160816; b=tX4oW/OOy/rFUhTqQu92VIGMKgBDmMvl6mby8gMDHLdxTA0JZ7taHW4ZfTJLPVK/xC AMcAY13zx55Mo4ZUAQNDUXFqmPhKVjp7w+ck7XEcbO2imURgBQUW8nrZZeiRnmGHlwAV Vl8KviGpXgSf2sWoJJOuCDlEKxCcFTl680oSrSMpXtfWDv0EVrxrHefIkBNpfED8bfds psLMyE2nYFhM+iNAcbz0N9/qCkXi+u3TNpZleJ0XKLI+ggkx6pWwUtqlOIdlY8mEUqEF 7ZBfVYfB/RUvs36oh4zdOnjdBcb/mH2a3EnuPJcn12aydEtyHbvj2W7XQEMRVQYhEo4t PfiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=R7BSP6lgLmU+GFwcCkarvv2oJomnIPaQ62Slz1uYejA=; b=rI0+zfFnjFFr4AwtjFQnARkB9S0Ct613fH0M8W3R0RT79iQvGoZeNlTsRAvoyvKrFc DwM7Xu5jTjgQ0IhMLV2glWkqBvJA8llQHw1o/v4iboXpLx/csolX46gxEHaNMHJqfW2x /KVdKzcv14UsbD39Yr9EgIvUsM4GPadRJeolarPeWbKaXe+QGUBskkU4t+K1erB9TBwo J1lcBNwXdfsQ9p4Q1OKZRPhHTIfQcXw4BCnQwDIo9HNIElf5cJpjSmTo+7ccIrwyLQKl I8iu+kVW1hHCMUqNcf9hrX72hUCuo9lOmeR1zbE3xX5VFmOS4epv7NnArfxB8XA1J67O tdjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=CS8tOTTw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 128-20020a630286000000b004114fd8e9a9si19792989pgc.825.2022.07.27.07.01.10; Wed, 27 Jul 2022 07:01:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=CS8tOTTw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232343AbiG0N4P (ORCPT + 99 others); Wed, 27 Jul 2022 09:56:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56960 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232688AbiG0N4K (ORCPT ); Wed, 27 Jul 2022 09:56:10 -0400 Received: from out1.migadu.com (out1.migadu.com [91.121.223.63]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D6CB7BC27; Wed, 27 Jul 2022 06:56:08 -0700 (PDT) Date: Wed, 27 Jul 2022 15:56:03 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1658930166; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=R7BSP6lgLmU+GFwcCkarvv2oJomnIPaQ62Slz1uYejA=; b=CS8tOTTw8N//Cwkjyu3Urhp4VM7oxbSFgmPiPyOswnYJ1k7UlGTDdvPQftFPfgEprtdtlT qm9XXfe9hVhaCgCThgl6EID6ZzdbZ955wU6oL/ycnNYMWECsdc3NPmzSq1aDwGWTzGZsR0 3v4XtZflhTMRtDLCWwBIQDDjxDdgy/Q= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Andrew Jones To: Peter Gonda Cc: kvm list , LKML , Marc Orr , Sean Christopherson , Michael Roth , "Lendacky, Thomas" , Joerg Roedel , Mingwei Zhang , Paolo Bonzini Subject: Re: [RFC V1 08/10] KVM: selftests: Make ucall work with encrypted guests Message-ID: <20220727135603.ld5torjrn4gatjb4@kamzik> References: <20220715192956.1873315-1-pgonda@google.com> <20220715192956.1873315-10-pgonda@google.com> <20220719154330.wnwnu23gagcya3o7@kamzik> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Migadu-Flow: FLOW_OUT X-Migadu-Auth-User: linux.dev X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_PASS, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 27, 2022 at 07:38:29AM -0600, Peter Gonda wrote: > On Tue, Jul 19, 2022 at 9:43 AM Andrew Jones wrote: > > I'm not a big fan of mixing the concept of encrypted guests into ucalls. I > > think we should have two types of ucalls, those have a uc pool in memory > > shared with the host and those that don't. Encrypted guests pick the pool > > version. > > Sean suggested this version where encrypted guests and normal guests > used the same ucall macros/functions. I am fine with adding a second > interface for encrypted VM ucall, do you think macros like > ENCRYPTED_GUEST_SYNC, ENCRYPTED_GUEST_ASSERT, and > get_encrypted_ucall() ? > It's fine to add new functionality to ucall in order to keep the interfaces the same, except for initializing with some sort of indication that the "uc pool" version is needed. I just don't like all the references to encrypted guests inside ucall. ucall should implement uc pools without the current motivation for uc pools creeping into its implementation. Thanks, drew