Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp6637167rwl; Mon, 9 Jan 2023 10:53:25 -0800 (PST) X-Google-Smtp-Source: AMrXdXuEZOzymsXuqRZz4u6UaIESJCKcuu8mbLhNiRa5h3Hhk9f86YfbOBJuXxos+D7Tr0qTwJId X-Received: by 2002:a05:6a21:e301:b0:af:85b4:2397 with SMTP id cb1-20020a056a21e30100b000af85b42397mr81487775pzc.41.1673290405804; Mon, 09 Jan 2023 10:53:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673290405; cv=none; d=google.com; s=arc-20160816; b=ARsm83eEfGpr6FvdD2xflWSuE6vAd8CirnMB7CDkyc2/Ni9mygm6/D6Bl9VIeJckiF KVpJvDF52KQbCamCafvtaGbInci/mUzgPKij3r1oREwmNhdn7urAYiC9y2Qz9FpfTBjN mqhErrnjCmYFSmF0JY94FJOxh0pwlLTCVc0Tb50k4dJ2O2OxggN2JlXrZpYgD2mxohOX 2pyPsjpmUFaoWXHz+BNMknHzWDtVXeHdlKD2TMH3pWQmucH5BFrDJflCBT5QxKovJSIe iEx5919vIMaz1Ktf8RKAoTz5LNBYu/DFilVO1yNf27IR7vCoZXeCifnQkP5SoDazqjx5 mr5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=TkS2qBI0dPZQnMdkME3l6hJQoHppmeAwetW1iOaX8Co=; b=oq/s05IXumGIu6LlnNWOvTsWdvBctSdR0dBA3f0zEkcSltMrFXxZn7suGN/Eh3kO2u nPiFweR+tdfHn/Ou3hiRylwKfcveBTyso8CxXcWHhspy5rhzjhvVMkvH9Ek4rWqv4v2s 9cqq2Y8Fs+G2WB71OUUAhZo6hMt3B7ULhnQtwGHTA0RkeCRXmG3nS4QPU6ifWtNVJMnz JL5SaoWg5PAWTt5yeQA9ajue2kx5esiKFYmfs474MOX7b/cVxApFes8dmkx6aZIT6ldz 2GKsBLFSlcNzeHKbXSWEokH24gfoM9gb1NdUSSjCY6ZUj6jKDy5/WLigAcpp/jaW/giC 6xaw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=LffKF0uS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 126-20020a630184000000b00476fdba9e11si9479867pgb.622.2023.01.09.10.53.19; Mon, 09 Jan 2023 10:53:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=LffKF0uS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237582AbjAISXF (ORCPT + 53 others); Mon, 9 Jan 2023 13:23:05 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43904 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237240AbjAISWh (ORCPT ); Mon, 9 Jan 2023 13:22:37 -0500 Received: from mail-pg1-x52c.google.com (mail-pg1-x52c.google.com [IPv6:2607:f8b0:4864:20::52c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 457991C906 for ; Mon, 9 Jan 2023 10:21:04 -0800 (PST) Received: by mail-pg1-x52c.google.com with SMTP id v3so6472580pgh.4 for ; Mon, 09 Jan 2023 10:21:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=TkS2qBI0dPZQnMdkME3l6hJQoHppmeAwetW1iOaX8Co=; b=LffKF0uSUV5ZGDd/s4y0yatOiYa77VSJRn8yhrQnwLIA0k1ivjED1LKDPHLMWOFF8G jm/0rQXfEBHpIegKAqLXyxk50UFweQI9fSGzpg6/9KN/RGIik4kPJk0QO1K8g/Q2Jh8o 08hOjpjnPUYprOEirByqVRrdXT8ZsSGxoMO8sUuJON9ECKwhXT0FwB3YbQNyUeGgTJtB adt2WRSOfm41/BtO9jtNJZ712KQakOx6bkjURsURpDvjBj6gUta8Z2FaMRcjP6QxBMtP v8zPDzbsnTqv/D12BkVNpklTWs4VOgx9Ru76PQgxuw6lFJKzsAb1nJACV8Mr3Ifbl98z 865w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=TkS2qBI0dPZQnMdkME3l6hJQoHppmeAwetW1iOaX8Co=; b=GgS5WE8m4n+fJOwR5v7WKIFMi+mLFx9fMcpG1i4Gr+RQADGFmZTxx7ug7rwXgYQLo9 qyY+pu0b5hqCZ+0VrMb50O7FEPACgjOc9m465Nnlk1X+M3g0bNzkGDqWLCdxR4hG9nOV +Ka/0hUwa4JUyEbI2BDNcmMd5Af1UE5K1uiFCewZWc1EBET7cbboE0Dd+bZYgD8U+B1J lpKS1Rjuc2czwowJRAx13N77WVkay0eYx4gQwk8OerRC3rV4roNOnA3yflpQM+xnSv3F naWBmWlLa5YqHP9RIPtlcVyhlDT8ELTU4UWY6GrtpTIP5RyGGvzFz/n7nLF9uIjJ8n4j X4bg== X-Gm-Message-State: AFqh2krviBe4b3bXD+VfzRVHkSjwEmtEBLR5Efd0iAJiiS4qT5qnL9fY i0/vV32wqP1LHsT8iXF5PHmw6Q== X-Received: by 2002:aa7:8f2d:0:b0:582:13b5:d735 with SMTP id y13-20020aa78f2d000000b0058213b5d735mr761256pfr.0.1673288463680; Mon, 09 Jan 2023 10:21:03 -0800 (PST) Received: from google.com (7.104.168.34.bc.googleusercontent.com. [34.168.104.7]) by smtp.gmail.com with ESMTPSA id e2-20020aa798c2000000b005829c60a838sm6345515pfm.183.2023.01.09.10.21.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 Jan 2023 10:21:03 -0800 (PST) Date: Mon, 9 Jan 2023 18:20:59 +0000 From: Sean Christopherson To: Vishal Annapurve Cc: x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, pbonzini@redhat.com, shuah@kernel.org, bgardon@google.com, oupton@google.com, peterx@redhat.com, vkuznets@redhat.com, dmatlack@google.com Subject: Re: [V4 PATCH 4/4] KVM: selftests: x86: Invoke kvm hypercall as per host cpu Message-ID: References: <20221228192438.2835203-1-vannapurve@google.com> <20221228192438.2835203-5-vannapurve@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221228192438.2835203-5-vannapurve@google.com> X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org KVM: selftests: Use host's native hypercall instruction in kvm_hypercall() On Wed, Dec 28, 2022, Vishal Annapurve wrote: > Invoke vmcall/vmmcall instructions from kvm_hypercall as per host CPU () for functions, i.e. kvm_hypercall(). > type. s/type/vendor, "type" is too generic. > CVMs and current kvm_hyerpcall callers need to execute hypercall CVM isn't a not ubiquitous acronym. I would avoid it entirely because "CVM" doesn't strictly imply memory encryption, e.g. KVM could still patch the guest in a pKVM-like implementation. Use the host CPU's native hypercall instruction, i.e. VMCALL vs. VMMCALL, in kvm_hypercall(), as relying on KVM to patch in the native hypercall on a #UD for the "wrong" hypercall requires KVM_X86_QUIRK_FIX_HYPERCALL_INSN to be enabled and flat out doesn't work if guest memory is encrypted with a private key, e.g. for SEV VMs.