From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 55A32C6FA82 for ; Mon, 29 Aug 2022 17:11:38 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231372AbiH2RLg (ORCPT ); Mon, 29 Aug 2022 13:11:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53786 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231360AbiH2RL0 (ORCPT ); Mon, 29 Aug 2022 13:11:26 -0400 Received: from mail-pf1-x449.google.com (mail-pf1-x449.google.com [IPv6:2607:f8b0:4864:20::449]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 81A99719B0 for ; Mon, 29 Aug 2022 10:11:04 -0700 (PDT) Received: by mail-pf1-x449.google.com with SMTP id y21-20020a056a001c9500b0053817f57e8dso1534865pfw.6 for ; Mon, 29 Aug 2022 10:11:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:references:mime-version:message-id:in-reply-to :date:from:to:cc; bh=faHDPR33m1K+EQWiVoL8b03bkn/+sib5ALODSi8oxlM=; b=bbC9oDe56U6cVXMzD0t1tIcAdVbDbwF0t0J9c/QscUe1+D90/CWAKgmVJlY4xDAu31 rypdHiqiu8s00EQ2rOWyf4j+A1awKy+g6gu6no4h8EjWqEvGZKNgQVJjR8jmi93eD0Cb lSCIqchtAncZO7jSOBYVrd+AGLqNl5RT1R9ewuTqcG8KqZ6ckFe0qlfsVrQAsyPBLxWj RS09JyIkaXukyA7Q9RBUiT6Ratwn9XBulmX/q7fS2Bp2LKFyS9mCeiLJSxZoxJ37EaDE Yxb26iwGmopetj03VVjFJLtcouz4o5VOz2x8nDoDsjiCRuJLNYaeJ04uC/oycVHF9Qbp 7Xkw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:references:mime-version:message-id:in-reply-to :date:x-gm-message-state:from:to:cc; bh=faHDPR33m1K+EQWiVoL8b03bkn/+sib5ALODSi8oxlM=; b=G93jzdMyBmv9mcqZ9T6W64qt9qL8aayUbsME/JITkMEXKz9DLTQ/NqNRU9wAY5qGJk v6g68JQuHSHzLxmrwyqt4LVYxBXAkTPd2rOU/I0/D9xpQ4fBoFWU4UuSC4l3kEH1DoVL aj46wWi2WAgIOEEb1f9drdk2O5IhGeHTX5kWgOJMVrzAIk4/oUZSwlXCWUDZYl9tYok9 ditmK/8Tr7g7JvqPKTcDEN1bl8kNGdme/eYKASox8/EnIp4suM5rMS6Eyf17H4d0jZ2y 3sVKkIFdGjv8mBc/8OgsS862LntIc9er86Zz4VtyVm2V4Eqfq6QC1E1YTFSzvxBFNoez tgIg== X-Gm-Message-State: ACgBeo1gC4DFJnRKgwRCr/f7xxwsAhgxZ2xYjL0GilHZ4n/p+SFum6qn 2vf1L3TWZXvj6LydJlPSbn6esWcLBaA= X-Google-Smtp-Source: AA6agR5+zI82TokFysYMOruQ5Cg3tQXZMltp+qDYB8UGqRTHvOXBtBSX7aMB9/yGsgQli3WPYP7aQq0kTw0= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:203:cddb:77a7:c55e:a7a2]) (user=pgonda job=sendgmr) by 2002:a17:90b:1e53:b0:1fb:3aba:372e with SMTP id pi19-20020a17090b1e5300b001fb3aba372emr19808530pjb.34.1661793063298; Mon, 29 Aug 2022 10:11:03 -0700 (PDT) Date: Mon, 29 Aug 2022 10:10:20 -0700 In-Reply-To: <20220829171021.701198-1-pgonda@google.com> Message-Id: <20220829171021.701198-8-pgonda@google.com> Mime-Version: 1.0 References: <20220829171021.701198-1-pgonda@google.com> X-Mailer: git-send-email 2.37.2.672.g94769d06f0-goog Subject: [V4 7/8] KVM: selftests: Update ucall pool to allocate from shared memory From: Peter Gonda To: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org, marcorr@google.com, seanjc@google.com, michael.roth@amd.com, thomas.lendacky@amd.com, joro@8bytes.org, mizhang@google.com, pbonzini@redhat.com, andrew.jones@linux.dev, Peter Gonda Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Update the per VM ucall_header allocation from vm_vaddr_alloc() to vm_vaddr_alloc_shared(). This allows encrypted guests to use ucall pools by placing their shared ucall structures in unencrypted (shared) memory. No behavior change for non encrypted guests. Signed-off-by: Peter Gonda --- tools/testing/selftests/kvm/lib/ucall_common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/kvm/lib/ucall_common.c b/tools/testing/selftests/kvm/lib/ucall_common.c index cc79d497b6b4..8e164c47e2fb 100644 --- a/tools/testing/selftests/kvm/lib/ucall_common.c +++ b/tools/testing/selftests/kvm/lib/ucall_common.c @@ -22,7 +22,7 @@ void ucall_init(struct kvm_vm *vm, vm_paddr_t mmio_gpa) vm_vaddr_t vaddr; int i; - vaddr = vm_vaddr_alloc(vm, sizeof(*hdr), KVM_UTIL_MIN_VADDR); + vaddr = vm_vaddr_alloc_shared(vm, sizeof(*hdr), KVM_UTIL_MIN_VADDR); hdr = (struct ucall_header *)addr_gva2hva(vm, vaddr); memset(hdr, 0, sizeof(*hdr)); -- 2.37.2.672.g94769d06f0-goog