All the mail mirrored from lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <00800f4b-5403-4416-b984-12b207362a19@redhat.com>

diff --git a/a/1.txt b/N1/1.txt
index 22e3bb9..f1e68ea 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -37,3 +37,592 @@ Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
 >   		return;
 >   
 >   	wbinvd_on_all_cpus();
+
+
+X-sender: <kvm+bounces-13160-martin.weber=secunet.com@vger.kernel.org>
+X-Receiver: <martin.weber@secunet.com> ORCPT=rfc822;martin.weber@secunet.com NOTIFY=NEVER; X-ExtendedProps=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
+X-CreatedBy: MSExchange15
+X-HeloDomain: b.mx.secunet.com
+X-ExtendedProps: BQBjAAoAuKNAQuxQ3AgFAGEACAABAAAABQA3AAIAAA8APAAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuTWFpbFJlY2lwaWVudC5Pcmdhbml6YXRpb25TY29wZREAAAAAAAAAAAAAAAAAAAAAAAUASQACAAEFAGIACgBdAAAAo4oAAAUABAAUIAEAAAAYAAAAbWFydGluLndlYmVyQHNlY3VuZXQuY29tBQAGAAIAAQUAKQACAAEPAAkAAABDSUF1ZGl0ZWQCAAEFAAIABwABAAAABQADAAcAAAAAAAUABQACAAEFAGQADwADAAAASHVi
+X-Source: SMTP:Default MBX-DRESDEN-01
+X-SourceIPAddress: 62.96.220.37
+X-EndOfInjectedXHeaders: 17817
+Received: from cas-essen-01.secunet.de (10.53.40.201) by
+ mbx-dresden-01.secunet.de (10.53.40.199) with Microsoft SMTP Server
+ (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
+ 15.1.2507.37; Sat, 30 Mar 2024 22:36:05 +0100
+Received: from b.mx.secunet.com (62.96.220.37) by cas-essen-01.secunet.de
+ (10.53.40.201) with Microsoft SMTP Server (version=TLS1_2,
+ cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.37 via Frontend
+ Transport; Sat, 30 Mar 2024 22:36:05 +0100
+Received: from localhost (localhost [127.0.0.1])
+	by b.mx.secunet.com (Postfix) with ESMTP id C1C7D20322
+	for <martin.weber@secunet.com>; Sat, 30 Mar 2024 22:36:05 +0100 (CET)
+X-Virus-Scanned: by secunet
+X-Spam-Flag: NO
+X-Spam-Score: -2.851
+X-Spam-Level:
+X-Spam-Status: No, score=-2.851 tagged_above=-999 required=2.1
+	tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.1, DKIM_SIGNED=0.1,
+	DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,
+	HEADER_FROM_DIFFERENT_DOMAINS=0.249, MAILING_LIST_MULTI=-1,
+	RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001]
+	autolearn=ham autolearn_force=no
+Authentication-Results: a.mx.secunet.com (amavisd-new);
+	dkim=pass (1024-bit key) header.d=redhat.com
+Received: from b.mx.secunet.com ([127.0.0.1])
+	by localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024)
+	with ESMTP id G3vJTeK-xASN for <martin.weber@secunet.com>;
+	Sat, 30 Mar 2024 22:36:03 +0100 (CET)
+Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=147.75.199.223; helo=ny.mirrors.kernel.org; envelope-from=kvm+bounces-13160-martin.weber=secunet.com@vger.kernel.org; receiver=martin.weber@secunet.com 
+DKIM-Filter: OpenDKIM Filter v2.11.0 b.mx.secunet.com 572412025D
+Authentication-Results: b.mx.secunet.com;
+	dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="AaC50WIk"
+Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org [147.75.199.223])
+	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
+	(No client certificate requested)
+	by b.mx.secunet.com (Postfix) with ESMTPS id 572412025D
+	for <martin.weber@secunet.com>; Sat, 30 Mar 2024 22:36:03 +0100 (CET)
+Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140])
+	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
+	(No client certificate requested)
+	by ny.mirrors.kernel.org (Postfix) with ESMTPS id 5F0571C216C7
+	for <martin.weber@secunet.com>; Sat, 30 Mar 2024 21:36:02 +0000 (UTC)
+Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
+	by smtp.subspace.kernel.org (Postfix) with ESMTP id D70FB5103E;
+	Sat, 30 Mar 2024 21:35:44 +0000 (UTC)
+Authentication-Results: smtp.subspace.kernel.org;
+	dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="AaC50WIk"
+X-Original-To: kvm@vger.kernel.org
+Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124])
+	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
+	(No client certificate requested)
+	by smtp.subspace.kernel.org (Postfix) with ESMTPS id E5D084A99C
+	for <kvm@vger.kernel.org>; Sat, 30 Mar 2024 21:35:42 +0000 (UTC)
+Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124
+ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
+	t=1711834544; cv=none; b=llVqaoaCimh+5hmI9zmsnC/iwyzb2E5Hu7QNGoMonpzPGejc///CLaxbkq8Cweg+S1JiGYBT3GW4IXKhqhtyeU45YUqJD3NDZBzyxFgxcr6x2bJ/zqwbjYWUDHB6m51Ve9hV/UuT0jat8CyrbAV3/nk8SjFStB8Gtdb3yUASx7Y=
+ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org;
+	s=arc-20240116; t=1711834544; c=relaxed/simple;
+	bh=A/4nTvH3zcKKDjwq9z7ISuECCM1K8A3A6bBgBipegtg=;
+	h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:
+	 In-Reply-To:Content-Type; b=eFNgdjaR4J4Uoz+I3mgxLCqDUhmelqAAHz0lyzdxYao424xVWR2Nhu0tjv7RzRU8+BurJQYRKYCRtuYssoMOcH5fLyOkLqidZ7AIYF220I4hAc3/JVLff8IYWvxugAc9q4yrqtBIOvmWRLQaDqhCFqYWv+xjN9Pyjs5/yvVQ9xA=
+ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=AaC50WIk; arc=none smtp.client-ip=170.10.133.124
+Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com
+Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com
+DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
+	s=mimecast20190719; t=1711834542;
+	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
+	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
+	 content-transfer-encoding:content-transfer-encoding:
+	 in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;
+	bh=k6nhJ/n2fVMLTJ5orSzZrSN05UZkFdn1WgbErq3l2Pk=;
+	b=AaC50WIksL9NXcrY24Vf8866p2pD2dqoSt2KH3Q9m5G0W+ckANKXwFV174bh285mSHdYYp
+	Am7Pp2OVACSpmiGTiarIdJ3LjY7U4pMD4dIoEJj3ZGOB4HEAf14Rvx311TLCJXwVJkY5J+
+	xI1Knv3RO0diA68TV+qXMsxlED6tSMU=
+Received: from mail-lf1-f72.google.com (mail-lf1-f72.google.com
+ [209.85.167.72]) by relay.mimecast.com with ESMTP with STARTTLS
+ (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id
+ us-mta-422-DH0MhiZ-NpO52d4IzgoGyw-1; Sat, 30 Mar 2024 17:35:39 -0400
+X-MC-Unique: DH0MhiZ-NpO52d4IzgoGyw-1
+Received: by mail-lf1-f72.google.com with SMTP id 2adb3069b0e04-50e91f9d422so2894479e87.2
+        for <kvm@vger.kernel.org>; Sat, 30 Mar 2024 14:35:39 -0700 (PDT)
+X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
+        d=1e100.net; s=20230601; t=1711834538; x=1712439338;
+        h=content-transfer-encoding:in-reply-to:autocrypt:content-language
+         :from:references:cc:to:subject:user-agent:mime-version:date
+         :message-id:x-gm-message-state:from:to:cc:subject:date:message-id
+         :reply-to;
+        bh=k6nhJ/n2fVMLTJ5orSzZrSN05UZkFdn1WgbErq3l2Pk=;
+        b=RCf5TMeMQhuiEsqquu6GXQ6GB3m+0/iFcCRbdF6FHT1Iubn/tjzv9lJOylHmfYv5Rd
+         0IDLo6EJAZe/Wj/3XMS1gcLnaViQijGQJp80IzzKosq6bJfMwoJ05jO2hHjP2LesRkCL
+         ls6tLS8SmE7uOn5J/O8eraI2NB5d2E7aFk5FjrSgdc4szOq6yKDiEsUZh7LD8AZt3x3V
+         FjPHhGFDXaTfQRvJNBteXbSAO2dwmd9M+EVjU5OP479DDtLt7PAvHOQhrnFbM2mI+xQ1
+         GpaNnNlrtdfoevCxQxcG3X81fpRXiK2IjIEOGdqn+4ljVqkGltjlAiV1zSYWssY4ZXsf
+         Yajg==
+X-Forwarded-Encrypted: i=1; AJvYcCVsvUr1yfJMqn5TiPVxUHnKx54OrM1lq42sSt5QV6/IUdSjUCRDAopDDLunjYXvT4rMttWkkf9EOqxfV0NgTL6zg5Gv
+X-Gm-Message-State: AOJu0Yw78dI/Q4jTJmUdgdVwmJo61d5Dc0X6+N42kKg2Ei0tQZSPKJKn
+	85HBFAanKtI/SqjFIhGrwICQQxDWmQLuhNwCXKkLmnck6SXZv02QHXiI7Juury1kcXbmHeR23iX
+	H7r5aoSL0elu+EUpX1DdU0z9z4Uju3Ci5pQXkOOY1Vc6cKsnqGw==
+X-Received: by 2002:a19:2d18:0:b0:513:b062:98c4 with SMTP id k24-20020a192d18000000b00513b06298c4mr3643259lfj.11.1711834538175;
+        Sat, 30 Mar 2024 14:35:38 -0700 (PDT)
+X-Google-Smtp-Source: AGHT+IH5PGmEGHf24nUfF7B7vuwJRBVN0rKW1MZiU9RQdC6MVZb3TnEUgyIIaZghldmm9GaQfOSwZw==
+X-Received: by 2002:a19:2d18:0:b0:513:b062:98c4 with SMTP id k24-20020a192d18000000b00513b06298c4mr3643226lfj.11.1711834537752;
+        Sat, 30 Mar 2024 14:35:37 -0700 (PDT)
+Received: from [192.168.10.4] ([151.95.49.219])
+        by smtp.googlemail.com with ESMTPSA id w4-20020a1709062f8400b00a4e07f8b6bfsm3445434eji.59.2024.03.30.14.35.34
+        (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
+        Sat, 30 Mar 2024 14:35:37 -0700 (PDT)
+Message-ID: <00800f4b-5403-4416-b984-12b207362a19@redhat.com>
+Date: Sat, 30 Mar 2024 22:35:33 +0100
+Precedence: bulk
+X-Mailing-List: kvm@vger.kernel.org
+List-Id: <kvm.vger.kernel.org>
+List-Subscribe: <mailto:kvm+subscribe@vger.kernel.org>
+List-Unsubscribe: <mailto:kvm+unsubscribe@vger.kernel.org>
+MIME-Version: 1.0
+User-Agent: Mozilla Thunderbird
+Subject: Re: [PATCH v12 24/29] KVM: SEV: Avoid WBINVD for HVA-based MMU
+ notifications for SNP
+To: Michael Roth <michael.roth@amd.com>, kvm@vger.kernel.org
+Cc: linux-coco@lists.linux.dev, linux-mm@kvack.org,
+ linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org,
+ tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de,
+ thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, seanjc@google.com,
+ vkuznets@redhat.com, jmattson@google.com, luto@kernel.org,
+ dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com,
+ peterz@infradead.org, srinivas.pandruvada@linux.intel.com,
+ rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, bp@alien8.de,
+ vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com,
+ tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com,
+ alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com,
+ nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com
+References: <20240329225835.400662-1-michael.roth@amd.com>
+ <20240329225835.400662-25-michael.roth@amd.com>
+From: Paolo Bonzini <pbonzini@redhat.com>
+Content-Language: en-US
+Autocrypt: addr=pbonzini@redhat.com; keydata=
+ xsEhBFRCcBIBDqDGsz4K0zZun3jh+U6Z9wNGLKQ0kSFyjN38gMqU1SfP+TUNQepFHb/Gc0E2
+ CxXPkIBTvYY+ZPkoTh5xF9oS1jqI8iRLzouzF8yXs3QjQIZ2SfuCxSVwlV65jotcjD2FTN04
+ hVopm9llFijNZpVIOGUTqzM4U55sdsCcZUluWM6x4HSOdw5F5Utxfp1wOjD/v92Lrax0hjiX
+ DResHSt48q+8FrZzY+AUbkUS+Jm34qjswdrgsC5uxeVcLkBgWLmov2kMaMROT0YmFY6A3m1S
+ P/kXmHDXxhe23gKb3dgwxUTpENDBGcfEzrzilWueOeUWiOcWuFOed/C3SyijBx3Av/lbCsHU
+ Vx6pMycNTdzU1BuAroB+Y3mNEuW56Yd44jlInzG2UOwt9XjjdKkJZ1g0P9dwptwLEgTEd3Fo
+ UdhAQyRXGYO8oROiuh+RZ1lXp6AQ4ZjoyH8WLfTLf5g1EKCTc4C1sy1vQSdzIRu3rBIjAvnC
+ tGZADei1IExLqB3uzXKzZ1BZ+Z8hnt2og9hb7H0y8diYfEk2w3R7wEr+Ehk5NQsT2MPI2QBd
+ wEv1/Aj1DgUHZAHzG1QN9S8wNWQ6K9DqHZTBnI1hUlkp22zCSHK/6FwUCuYp1zcAEQEAAc0j
+ UGFvbG8gQm9uemluaSA8cGJvbnppbmlAcmVkaGF0LmNvbT7CwU0EEwECACMFAlRCcBICGwMH
+ CwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRB+FRAMzTZpsbceDp9IIN6BIA0Ol7MoB15E
+ 11kRz/ewzryFY54tQlMnd4xxfH8MTQ/mm9I482YoSwPMdcWFAKnUX6Yo30tbLiNB8hzaHeRj
+ jx12K+ptqYbg+cevgOtbLAlL9kNgLLcsGqC2829jBCUTVeMSZDrzS97ole/YEez2qFpPnTV0
+ VrRWClWVfYh+JfzpXmgyhbkuwUxNFk421s4Ajp3d8nPPFUGgBG5HOxzkAm7xb1cjAuJ+oi/K
+ CHfkuN+fLZl/u3E/fw7vvOESApLU5o0icVXeakfSz0LsygEnekDbxPnE5af/9FEkXJD5EoYG
+ SEahaEtgNrR4qsyxyAGYgZlS70vkSSYJ+iT2rrwEiDlo31MzRo6Ba2FfHBSJ7lcYdPT7bbk9
+ AO3hlNMhNdUhoQv7M5HsnqZ6unvSHOKmReNaS9egAGdRN0/GPDWr9wroyJ65ZNQsHl9nXBqE
+ AukZNr5oJO5vxrYiAuuTSd6UI/xFkjtkzltG3mw5ao2bBpk/V/YuePrJsnPFHG7NhizrxttB
+ nTuOSCMo45pfHQ+XYd5K1+Cv/NzZFNWscm5htJ0HznY+oOsZvHTyGz3v91pn51dkRYN0otqr
+ bQ4tlFFuVjArBZcapSIe6NV8C4cEiSTOwE0EVEJx7gEIAMeHcVzuv2bp9HlWDp6+RkZe+vtl
+ KwAHplb/WH59j2wyG8V6i33+6MlSSJMOFnYUCCL77bucx9uImI5nX24PIlqT+zasVEEVGSRF
+ m8dgkcJDB7Tps0IkNrUi4yof3B3shR+vMY3i3Ip0e41zKx0CvlAhMOo6otaHmcxr35sWq1Jk
+ tLkbn3wG+fPQCVudJJECvVQ//UAthSSEklA50QtD2sBkmQ14ZryEyTHQ+E42K3j2IUmOLriF
+ dNr9NvE1QGmGyIcbw2NIVEBOK/GWxkS5+dmxM2iD4Jdaf2nSn3jlHjEXoPwpMs0KZsgdU0pP
+ JQzMUMwmB1wM8JxovFlPYrhNT9MAEQEAAcLBMwQYAQIACQUCVEJx7gIbDAAKCRB+FRAMzTZp
+ sadRDqCctLmYICZu4GSnie4lKXl+HqlLanpVMOoFNnWs9oRP47MbE2wv8OaYh5pNR9VVgyhD
+ OG0AU7oidG36OeUlrFDTfnPYYSF/mPCxHttosyt8O5kabxnIPv2URuAxDByz+iVbL+RjKaGM
+ GDph56ZTswlx75nZVtIukqzLAQ5fa8OALSGum0cFi4ptZUOhDNz1onz61klD6z3MODi0sBZN
+ Aj6guB2L/+2ZwElZEeRBERRd/uommlYuToAXfNRdUwrwl9gRMiA0WSyTb190zneRRDfpSK5d
+ usXnM/O+kr3Dm+Ui+UioPf6wgbn3T0o6I5BhVhs4h4hWmIW7iNhPjX1iybXfmb1gAFfjtHfL
+ xRUr64svXpyfJMScIQtBAm0ihWPltXkyITA92ngCmPdHa6M1hMh4RDX+Jf1fiWubzp1voAg0
+ JBrdmNZSQDz0iKmSrx8xkoXYfA3bgtFN8WJH2xgFL28XnqY4M6dLhJwV3z08tPSRqYFm4NMP
+ dRsn0/7oymhneL8RthIvjDDQ5ktUjMe8LtHr70OZE/TT88qvEdhiIVUogHdo4qBrk41+gGQh
+ b906Dudw5YhTJFU3nC6bbF2nrLlB4C/XSiH76ZvqzV0Z/cAMBo5NF/w=
+In-Reply-To: <20240329225835.400662-25-michael.roth@amd.com>
+Content-Type: text/plain; charset=UTF-8; format=flowed
+Content-Transfer-Encoding: 7bit
+Return-Path: kvm+bounces-13160-martin.weber=secunet.com@vger.kernel.org
+X-MS-Exchange-Organization-OriginalArrivalTime: 30 Mar 2024 21:36:05.7650
+ (UTC)
+X-MS-Exchange-Organization-Network-Message-Id: 24f51bbd-dcf0-4e6f-b4c7-08dc510167c6
+X-MS-Exchange-Organization-OriginalClientIPAddress: 62.96.220.37
+X-MS-Exchange-Organization-OriginalServerIPAddress: 10.53.40.201
+X-MS-Exchange-Organization-Cross-Premises-Headers-Processed: cas-essen-01.secunet.de
+X-MS-Exchange-Organization-OrderedPrecisionLatencyInProgress: LSRV=mbx-dresden-01.secunet.de:TOTAL-HUB=0.419|SMR=0.345(SMRDE=0.035|SMRC=0.310(SMRCL=0.100|X-SMRCR=0.309))|CAT=0.072(CATOS=0.012
+ (CATSM=0.012(CATSM-Malware
+ Agent=0.011))|CATRESL=0.042(CATRESLP2R=0.039)|CATORES=0.016
+ (CATRS=0.015(CATRS-Index Routing Agent=0.014)));2024-03-30T21:36:06.214Z
+X-MS-Exchange-Forest-ArrivalHubServer: mbx-dresden-01.secunet.de
+X-MS-Exchange-Organization-AuthSource: cas-essen-01.secunet.de
+X-MS-Exchange-Organization-AuthAs: Anonymous
+X-MS-Exchange-Organization-FromEntityHeader: Internet
+X-MS-Exchange-Organization-OriginalSize: 13679
+X-MS-Exchange-Organization-HygienePolicy: Standard
+X-MS-Exchange-Organization-MessageLatency: SRV=cas-essen-01.secunet.de:TOTAL-FE=0.029|SMR=0.022(SMRPI=0.020(SMRPI-FrontendProxyAgent=0.020))|SMS=0.008
+X-MS-Exchange-Organization-AVStamp-Enterprise: 1.0
+X-MS-Exchange-Organization-Recipient-Limit-Verified: True
+X-MS-Exchange-Organization-TotalRecipientCount: 1
+X-MS-Exchange-Organization-Rules-Execution-History: 0b0cf904-14ac-4724-8bdf-482ee6223cf2%%%fd34672d-751c-45ae-a963-ed177fcabe23%%%d8080257-b0c3-47b4-b0db-23bc0c8ddb3c%%%95e591a2-5d7d-4afa-b1d0-7573d6c0a5d9%%%f7d0f6bc-4dcc-4876-8c5d-b3d6ddbb3d55%%%16355082-c50b-4214-9c7d-d39575f9f79b
+X-MS-Exchange-Forest-RulesExecuted: mbx-dresden-01
+X-MS-Exchange-Organization-RulesExecuted: mbx-dresden-01
+X-MS-Exchange-Forest-IndexAgent-0: AQ0CZW4AAYEEAAAPAAADH4sIAAAAAAAEAI1UW2/bNhQ+si35EjvBmh
+ Yb+jCcvjmJL7nHSYMg3cNQYMhWtNv6MAwGLVEWUYkyRNmJt/yG/eYd
+ koovg7ONoGWS5zvfuZJ/NX+SeNI/vuwfn+LxydXZoIN3wo8Yj/Fjmk
+ d4n6U5v2o1bvD7LE2u8J2KhIrwBxZnDK+Z2fW+6N0tS4KenyY3BNb4
+ z4LUP/34oT+ecpUPE56EQQcnmZixnPe59LP5JOcBkiDN5qiidBoHKN
+ McRxwTNpmwUcw7monJAO/uftEyEQqf5SKVCsM0w/e/vutq6JLmXsQx
+ pjKea5aMx3zGZI55qnmmcmnVOFUo9fDniGecCHkH84j0jAkWcyKJBF
+ kXSk2FHCPTNPcjIWfBMJVDFsdDfzJV7T0UEhWfDRexEu0w437MRMID
+ kq+ER/7Gc02kI6AEWV+UCdNnUjsuxpKcCXpFKj/RngfdNAy7o/n/rQ
+ H+lgQZgYMAVZpwJF+ylfSRwwRMRP77BgtrLXCd2F2PWiFasdBqfOQz
+ we9JT+t8YGmc4nep/ENIgdeTkV3dUhwRyxc6N9jtdvUfIsv8qP8wOO
+ 9/mSV9pX981vPxES/xoBgF8ghDQdUgN+SYUxcNyH3FMxNJ+2CvQ4CA
+ aq337e5ekbVAhCEZGwtKef8ZW6NnBFqfCs8f8OQoPA9PLwbnZ4cnvd
+ 4JHwT8wh+d+INLPDo8PD89LUJ61oaWUyT/aur2FrvHlxdnnQs8MP9H
+ p/pM5VQsH2epCEx3hfFURcNFEw8nbMzbKs+mfo7EOZxRM+K+/nas0v
+ 6MPWUDlzTPNOmSCPfps2e1/jTxoR4ixPabBUFbYwzowEj7+8s17i+u
+ /8GYDP33vR/xNe2pzDijctMTgDPBzK2MZqw7YkqrJtPiMeCZ6ukWF/
+ bCxvPOGo2+YSpi1ILdm8IDzDMmVWxvQQff9z/TPdDXX/rF68Glmmbr
+ 7oQio9fCvhnM97lS9KQYp3QJ8N6E4MecZZhOCSLnyB+EyunNWOMJRJ
+ bPyd5EcIVpSAwspzvvRzwWkvdWsf3lZkPe8fHRlFLJyT+rsT4ynk8z
+ +XbRBHpsesDe6rvZagCUoOw4ULUTSrQtOWUXwIVqFWoVcF1oVMDzoE
+ onngMv9cIrQ6UMWySlhevAFngWX4cGIWnSOVHVoGWQlRZs64UDDahY
+ AOnSNJh6CbwtaLraCjFsEdLyEKEDLhl9AVVC0nnFLhx4TXaNV3VoWn
+ Mu1K0tu7UOVGGH1FuFP5VNUZCWa5jdbdghFQ+2VlVMEryqVqnZeMtQ
+ q+mQyW3tQxXqtN2FurG7+4QppuNUHADH+Up/oUTSqlO364azYxc1eF
+ Ex5ixgTR1Kmw6pKF4TtptOywPwYHsTpr7h0Knpyjqecalk1yXdA56t
+ CCX2GxNUXRfd1RE5UNPJ8ewsQdPCVvLfMIGToVclI6obURm+rRSJ9V
+ YbowQ7VOvCpSWYKr7VhNemfDXCN01QNJ882XV1j3neshNce2KpavBq
+ ISVRHd6sO1Mr65pWysX2aw9ervXV3xVfMWkZCQAAAQrBAzw/eG1sIH
+ ZlcnNpb249IjEuMCIgZW5jb2Rpbmc9InV0Zi0xNiI/Pg0KPEVtYWls
+ U2V0Pg0KICA8VmVyc2lvbj4xNS4wLjAuMDwvVmVyc2lvbj4NCiAgPE
+ VtYWlscz4NCiAgICA8RW1haWwgU3RhcnRJbmRleD0iNjEiPg0KICAg
+ ICAgPEVtYWlsU3RyaW5nPmFzaGlzaC5rYWxyYUBhbWQuY29tPC9FbW
+ FpbFN0cmluZz4NCiAgICA8L0VtYWlsPg0KICAgIDxFbWFpbCBTdGFy
+ dEluZGV4PSI1NDciIFBvc2l0aW9uPSJPdGhlciI+DQogICAgICA8RW
+ 1haWxTdHJpbmc+bWljaGFlbC5yb3RoQGFtZC5jb208L0VtYWlsU3Ry
+ aW5nPg0KICAgIDwvRW1haWw+DQogICAgPEVtYWlsIFN0YXJ0SW5kZX
+ g9IjYwMCIgUG9zaXRpb249Ik90aGVyIj4NCiAgICAgIDxFbWFpbFN0
+ cmluZz5wYm9uemluaUByZWRoYXQuY29tPC9FbWFpbFN0cmluZz4NCi
+ AgICA8L0VtYWlsPg0KICA8L0VtYWlscz4NCjwvRW1haWxTZXQ+AQ7O
+ AVJldHJpZXZlck9wZXJhdG9yLDEwLDE7UmV0cmlldmVyT3BlcmF0b3
+ IsMTEsMTtQb3N0RG9jUGFyc2VyT3BlcmF0b3IsMTAsMDtQb3N0RG9j
+ UGFyc2VyT3BlcmF0b3IsMTEsMDtQb3N0V29yZEJyZWFrZXJEaWFnbm
+ 9zdGljT3BlcmF0b3IsMTAsMDtQb3N0V29yZEJyZWFrZXJEaWFnbm9z
+ dGljT3BlcmF0b3IsMTEsMDtUcmFuc3BvcnRXcml0ZXJQcm9kdWNlci wyMCw3
+X-MS-Exchange-Forest-IndexAgent: 1 1827
+X-MS-Exchange-Forest-EmailMessageHash: A196860A
+X-MS-Exchange-Forest-Language: en
+X-MS-Exchange-Organization-Processed-By-Journaling: Journal Agent
+
+On 3/29/24 23:58, Michael Roth wrote:
+> From: Ashish Kalra <ashish.kalra@amd.com>
+> 
+> With SNP/guest_memfd, private/encrypted memory should not be mappable,
+> and MMU notifications for HVA-mapped memory will only be relevant to
+> unencrypted guest memory. Therefore, the rationale behind issuing a
+> wbinvd_on_all_cpus() in sev_guest_memory_reclaimed() should not apply
+> for SNP guests and can be ignored.
+> 
+> Signed-off-by: Ashish Kalra <ashish.kalra@amd.com>
+> [mdr: Add some clarifications in commit]
+> Signed-off-by: Michael Roth <michael.roth@amd.com>
+
+Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
+
+> ---
+>   arch/x86/kvm/svm/sev.c | 9 ++++++++-
+>   1 file changed, 8 insertions(+), 1 deletion(-)
+> 
+> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
+> index 31f6f4786503..3e8de7cb3c89 100644
+> --- a/arch/x86/kvm/svm/sev.c
+> +++ b/arch/x86/kvm/svm/sev.c
+> @@ -2975,7 +2975,14 @@ static void sev_flush_encrypted_page(struct kvm_vcpu *vcpu, void *va)
+>   
+>   void sev_guest_memory_reclaimed(struct kvm *kvm)
+>   {
+> -	if (!sev_guest(kvm))
+> +	/*
+> +	 * With SNP+gmem, private/encrypted memory should be
+> +	 * unreachable via the hva-based mmu notifiers. Additionally,
+> +	 * for shared->private translations, H/W coherency will ensure
+> +	 * first guest access to the page would clear out any existing
+> +	 * dirty copies of that cacheline.
+> +	 */
+> +	if (!sev_guest(kvm) || sev_snp_guest(kvm))
+>   		return;
+>   
+>   	wbinvd_on_all_cpus();
+
+
+X-sender: <linux-kernel+bounces-125896-steffen.klassert=secunet.com@vger.kernel.org>
+X-Receiver: <steffen.klassert@secunet.com> ORCPT=rfc822;steffen.klassert@secunet.com NOTIFY=NEVER; X-ExtendedProps=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
+X-CreatedBy: MSExchange15
+X-HeloDomain: b.mx.secunet.com
+X-ExtendedProps: BQBjAAoAtaNAQuxQ3AgFAGEACAABAAAABQA3AAIAAA8APAAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuTWFpbFJlY2lwaWVudC5Pcmdhbml6YXRpb25TY29wZREAAAAAAAAAAAAAAAAAAAAAAAUASQACAAEFAGIACgBeAAAAo4oAAAUABAAUIAEAAAAcAAAAc3RlZmZlbi5rbGFzc2VydEBzZWN1bmV0LmNvbQUABgACAAEFACkAAgABDwAJAAAAQ0lBdWRpdGVkAgABBQACAAcAAQAAAAUAAwAHAAAAAAAFAAUAAgABBQBkAA8AAwAAAEh1Yg==
+X-Source: SMTP:Default MBX-DRESDEN-01
+X-SourceIPAddress: 62.96.220.37
+X-EndOfInjectedXHeaders: 17913
+Received: from cas-essen-02.secunet.de (10.53.40.202) by
+ mbx-dresden-01.secunet.de (10.53.40.199) with Microsoft SMTP Server
+ (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
+ 15.1.2507.37; Sat, 30 Mar 2024 22:36:14 +0100
+Received: from b.mx.secunet.com (62.96.220.37) by cas-essen-02.secunet.de
+ (10.53.40.202) with Microsoft SMTP Server (version=TLS1_2,
+ cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.37 via Frontend
+ Transport; Sat, 30 Mar 2024 22:36:14 +0100
+Received: from localhost (localhost [127.0.0.1])
+	by b.mx.secunet.com (Postfix) with ESMTP id B4B9520322
+	for <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:14 +0100 (CET)
+X-Virus-Scanned: by secunet
+X-Spam-Flag: NO
+X-Spam-Score: -2.851
+X-Spam-Level:
+X-Spam-Status: No, score=-2.851 tagged_above=-999 required=2.1
+	tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.1, DKIM_SIGNED=0.1,
+	DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,
+	HEADER_FROM_DIFFERENT_DOMAINS=0.249, MAILING_LIST_MULTI=-1,
+	RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001]
+	autolearn=unavailable autolearn_force=no
+Authentication-Results: a.mx.secunet.com (amavisd-new);
+	dkim=pass (1024-bit key) header.d=redhat.com
+Received: from b.mx.secunet.com ([127.0.0.1])
+	by localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024)
+	with ESMTP id bX0hQhQjf4l0 for <steffen.klassert@secunet.com>;
+	Sat, 30 Mar 2024 22:36:13 +0100 (CET)
+Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=147.75.80.249; helo=am.mirrors.kernel.org; envelope-from=linux-kernel+bounces-125896-steffen.klassert=secunet.com@vger.kernel.org; receiver=steffen.klassert@secunet.com 
+DKIM-Filter: OpenDKIM Filter v2.11.0 b.mx.secunet.com 3DC7E2025D
+Authentication-Results: b.mx.secunet.com;
+	dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="JSkQ4rEh"
+Received: from am.mirrors.kernel.org (am.mirrors.kernel.org [147.75.80.249])
+	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
+	(No client certificate requested)
+	by b.mx.secunet.com (Postfix) with ESMTPS id 3DC7E2025D
+	for <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 22:36:13 +0100 (CET)
+Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140])
+	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
+	(No client certificate requested)
+	by am.mirrors.kernel.org (Postfix) with ESMTPS id B5FFC1F21DFE
+	for <steffen.klassert@secunet.com>; Sat, 30 Mar 2024 21:36:12 +0000 (UTC)
+Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])
+	by smtp.subspace.kernel.org (Postfix) with ESMTP id 6933F52F70;
+	Sat, 30 Mar 2024 21:35:46 +0000 (UTC)
+Authentication-Results: smtp.subspace.kernel.org;
+	dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="JSkQ4rEh"
+Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124])
+	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
+	(No client certificate requested)
+	by smtp.subspace.kernel.org (Postfix) with ESMTPS id 047A91DFC6
+	for <linux-kernel@vger.kernel.org>; Sat, 30 Mar 2024 21:35:41 +0000 (UTC)
+Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124
+ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;
+	t=1711834543; cv=none; b=ccog+mZGdcIjlotH1ju2gIP+H8Ihe03fxFUhE4rASqbEAUuXyGOV6OARBR2a/ue+ukMJZEXif0R/51/PisvRQr7KCPTmLGbVNim/5k+zbSTPVubege281Lcw+fLzTw94RUeNV05FDMdKG9gJ1STLM78HBWz+k2BA+oTgfxL+gr4=
+ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org;
+	s=arc-20240116; t=1711834543; c=relaxed/simple;
+	bh=A/4nTvH3zcKKDjwq9z7ISuECCM1K8A3A6bBgBipegtg=;
+	h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:
+	 In-Reply-To:Content-Type; b=lhwggt1Q7u+PTm50rqr0jpiDnPgBOKmFdevuB0Q9wuPRK6pZlQjVmloy5qWWkfRebugKpr0MjH47ARrNBeWtvHItAi3pRPhVqijUjO808hQs7BY8FUd10N3j46QWLytQN4PXyGDaKzEluE33+JFzMmHh5S+lX3RvXHgXm81iPL8=
+ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=JSkQ4rEh; arc=none smtp.client-ip=170.10.133.124
+Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com
+Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com
+DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
+	s=mimecast20190719; t=1711834541;
+	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
+	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
+	 content-transfer-encoding:content-transfer-encoding:
+	 in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;
+	bh=k6nhJ/n2fVMLTJ5orSzZrSN05UZkFdn1WgbErq3l2Pk=;
+	b=JSkQ4rEhAmsVeZHuSYL5XgrgNAt13SHnq30WYpbBo6nFSIhiqf0vtKADsEKaBU6OpGVLpQ
+	QDX2PzilH9CaTqvHEj9l8ryQdEGf/Tgw6oCc+JpP/bBlFa90eiL40fMPrYKiSpY28VeuVr
+	I/R0WttkS5b3uVoyvz/AgBrsOKNpSuI=
+Received: from mail-lf1-f70.google.com (mail-lf1-f70.google.com
+ [209.85.167.70]) by relay.mimecast.com with ESMTP with STARTTLS
+ (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id
+ us-mta-464-TulHzr_5OgWLCaLKMpfrXA-1; Sat, 30 Mar 2024 17:35:39 -0400
+X-MC-Unique: TulHzr_5OgWLCaLKMpfrXA-1
+Received: by mail-lf1-f70.google.com with SMTP id 2adb3069b0e04-515bbb9a73aso2292533e87.0
+        for <linux-kernel@vger.kernel.org>; Sat, 30 Mar 2024 14:35:39 -0700 (PDT)
+X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
+        d=1e100.net; s=20230601; t=1711834538; x=1712439338;
+        h=content-transfer-encoding:in-reply-to:autocrypt:content-language
+         :from:references:cc:to:subject:user-agent:mime-version:date
+         :message-id:x-gm-message-state:from:to:cc:subject:date:message-id
+         :reply-to;
+        bh=k6nhJ/n2fVMLTJ5orSzZrSN05UZkFdn1WgbErq3l2Pk=;
+        b=GcPMMfkXq56SYLgMLVaoTFznA0YsHR7ZwCQhB1WbbcUB8I4+plNHYpzcbLzX8120s/
+         juvL1k7m7nQJsH3N/8VmXi7m7PYGgyfc7VTDz0kAaDSInp0iELAxaUVR96e6XRBLgecz
+         PwSqKfWTvSHaqUtv7ucJs88ESWF1/DuqfQxIg+fIL67zkZApg16yV0i5Bu6qgN8DxGGN
+         A/vQUDCGbEwhedqbftl8w96+N7+oWk//sl9MuPUj++jQDFPdx92ae71gLPleWQUdD1Gd
+         als/rv8D7OO/yZqscoZrJkTHSKzw7OgNuSyGHXdeTlU5gKeZGGGWThlyeOC/Jv+eyIN9
+         gbOw==
+X-Forwarded-Encrypted: i=1; AJvYcCUGbr2aAbIhSFLUwf7Rao2KTehNv26xGMI4cS8oD+mFauDsHLHhTXa5YQVcm2Iro4N8olHuxY5IjrBYPnYK5PjVTEu3Ed109f+BWbod
+X-Gm-Message-State: AOJu0YzBxnxGLehy+JxKH/2lQLAaIRi40ZZbcTQkkw9JFwSEQKZ1yB02
+	c8jJDyMRPwzPX7S78f/cVwIp8r/+JtXelF3Rh/kIaauyKpCWs0P7lslRUKn0LfPRhXNwYbYOvkr
+	nmLxuXFk8otl8o8GKde2ds3nwKplUHqDWqrOW4TJArdl7Xy7mNp46ieTitGfjpg==
+X-Received: by 2002:a19:2d18:0:b0:513:b062:98c4 with SMTP id k24-20020a192d18000000b00513b06298c4mr3643244lfj.11.1711834538172;
+        Sat, 30 Mar 2024 14:35:38 -0700 (PDT)
+X-Google-Smtp-Source: AGHT+IH5PGmEGHf24nUfF7B7vuwJRBVN0rKW1MZiU9RQdC6MVZb3TnEUgyIIaZghldmm9GaQfOSwZw==
+X-Received: by 2002:a19:2d18:0:b0:513:b062:98c4 with SMTP id k24-20020a192d18000000b00513b06298c4mr3643226lfj.11.1711834537752;
+        Sat, 30 Mar 2024 14:35:37 -0700 (PDT)
+Received: from [192.168.10.4] ([151.95.49.219])
+        by smtp.googlemail.com with ESMTPSA id w4-20020a1709062f8400b00a4e07f8b6bfsm3445434eji.59.2024.03.30.14.35.34
+        (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
+        Sat, 30 Mar 2024 14:35:37 -0700 (PDT)
+Message-ID: <00800f4b-5403-4416-b984-12b207362a19@redhat.com>
+Date: Sat, 30 Mar 2024 22:35:33 +0100
+Precedence: bulk
+X-Mailing-List: linux-kernel@vger.kernel.org
+List-Id: <linux-kernel.vger.kernel.org>
+List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org>
+List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org>
+MIME-Version: 1.0
+User-Agent: Mozilla Thunderbird
+Subject: Re: [PATCH v12 24/29] KVM: SEV: Avoid WBINVD for HVA-based MMU
+ notifications for SNP
+To: Michael Roth <michael.roth@amd.com>, kvm@vger.kernel.org
+Cc: linux-coco@lists.linux.dev, linux-mm@kvack.org,
+ linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org,
+ tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de,
+ thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, seanjc@google.com,
+ vkuznets@redhat.com, jmattson@google.com, luto@kernel.org,
+ dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com,
+ peterz@infradead.org, srinivas.pandruvada@linux.intel.com,
+ rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, bp@alien8.de,
+ vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com,
+ tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com,
+ alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com,
+ nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com
+References: <20240329225835.400662-1-michael.roth@amd.com>
+ <20240329225835.400662-25-michael.roth@amd.com>
+From: Paolo Bonzini <pbonzini@redhat.com>
+Content-Language: en-US
+Autocrypt: addr=pbonzini@redhat.com; keydata=
+ xsEhBFRCcBIBDqDGsz4K0zZun3jh+U6Z9wNGLKQ0kSFyjN38gMqU1SfP+TUNQepFHb/Gc0E2
+ CxXPkIBTvYY+ZPkoTh5xF9oS1jqI8iRLzouzF8yXs3QjQIZ2SfuCxSVwlV65jotcjD2FTN04
+ hVopm9llFijNZpVIOGUTqzM4U55sdsCcZUluWM6x4HSOdw5F5Utxfp1wOjD/v92Lrax0hjiX
+ DResHSt48q+8FrZzY+AUbkUS+Jm34qjswdrgsC5uxeVcLkBgWLmov2kMaMROT0YmFY6A3m1S
+ P/kXmHDXxhe23gKb3dgwxUTpENDBGcfEzrzilWueOeUWiOcWuFOed/C3SyijBx3Av/lbCsHU
+ Vx6pMycNTdzU1BuAroB+Y3mNEuW56Yd44jlInzG2UOwt9XjjdKkJZ1g0P9dwptwLEgTEd3Fo
+ UdhAQyRXGYO8oROiuh+RZ1lXp6AQ4ZjoyH8WLfTLf5g1EKCTc4C1sy1vQSdzIRu3rBIjAvnC
+ tGZADei1IExLqB3uzXKzZ1BZ+Z8hnt2og9hb7H0y8diYfEk2w3R7wEr+Ehk5NQsT2MPI2QBd
+ wEv1/Aj1DgUHZAHzG1QN9S8wNWQ6K9DqHZTBnI1hUlkp22zCSHK/6FwUCuYp1zcAEQEAAc0j
+ UGFvbG8gQm9uemluaSA8cGJvbnppbmlAcmVkaGF0LmNvbT7CwU0EEwECACMFAlRCcBICGwMH
+ CwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRB+FRAMzTZpsbceDp9IIN6BIA0Ol7MoB15E
+ 11kRz/ewzryFY54tQlMnd4xxfH8MTQ/mm9I482YoSwPMdcWFAKnUX6Yo30tbLiNB8hzaHeRj
+ jx12K+ptqYbg+cevgOtbLAlL9kNgLLcsGqC2829jBCUTVeMSZDrzS97ole/YEez2qFpPnTV0
+ VrRWClWVfYh+JfzpXmgyhbkuwUxNFk421s4Ajp3d8nPPFUGgBG5HOxzkAm7xb1cjAuJ+oi/K
+ CHfkuN+fLZl/u3E/fw7vvOESApLU5o0icVXeakfSz0LsygEnekDbxPnE5af/9FEkXJD5EoYG
+ SEahaEtgNrR4qsyxyAGYgZlS70vkSSYJ+iT2rrwEiDlo31MzRo6Ba2FfHBSJ7lcYdPT7bbk9
+ AO3hlNMhNdUhoQv7M5HsnqZ6unvSHOKmReNaS9egAGdRN0/GPDWr9wroyJ65ZNQsHl9nXBqE
+ AukZNr5oJO5vxrYiAuuTSd6UI/xFkjtkzltG3mw5ao2bBpk/V/YuePrJsnPFHG7NhizrxttB
+ nTuOSCMo45pfHQ+XYd5K1+Cv/NzZFNWscm5htJ0HznY+oOsZvHTyGz3v91pn51dkRYN0otqr
+ bQ4tlFFuVjArBZcapSIe6NV8C4cEiSTOwE0EVEJx7gEIAMeHcVzuv2bp9HlWDp6+RkZe+vtl
+ KwAHplb/WH59j2wyG8V6i33+6MlSSJMOFnYUCCL77bucx9uImI5nX24PIlqT+zasVEEVGSRF
+ m8dgkcJDB7Tps0IkNrUi4yof3B3shR+vMY3i3Ip0e41zKx0CvlAhMOo6otaHmcxr35sWq1Jk
+ tLkbn3wG+fPQCVudJJECvVQ//UAthSSEklA50QtD2sBkmQ14ZryEyTHQ+E42K3j2IUmOLriF
+ dNr9NvE1QGmGyIcbw2NIVEBOK/GWxkS5+dmxM2iD4Jdaf2nSn3jlHjEXoPwpMs0KZsgdU0pP
+ JQzMUMwmB1wM8JxovFlPYrhNT9MAEQEAAcLBMwQYAQIACQUCVEJx7gIbDAAKCRB+FRAMzTZp
+ sadRDqCctLmYICZu4GSnie4lKXl+HqlLanpVMOoFNnWs9oRP47MbE2wv8OaYh5pNR9VVgyhD
+ OG0AU7oidG36OeUlrFDTfnPYYSF/mPCxHttosyt8O5kabxnIPv2URuAxDByz+iVbL+RjKaGM
+ GDph56ZTswlx75nZVtIukqzLAQ5fa8OALSGum0cFi4ptZUOhDNz1onz61klD6z3MODi0sBZN
+ Aj6guB2L/+2ZwElZEeRBERRd/uommlYuToAXfNRdUwrwl9gRMiA0WSyTb190zneRRDfpSK5d
+ usXnM/O+kr3Dm+Ui+UioPf6wgbn3T0o6I5BhVhs4h4hWmIW7iNhPjX1iybXfmb1gAFfjtHfL
+ xRUr64svXpyfJMScIQtBAm0ihWPltXkyITA92ngCmPdHa6M1hMh4RDX+Jf1fiWubzp1voAg0
+ JBrdmNZSQDz0iKmSrx8xkoXYfA3bgtFN8WJH2xgFL28XnqY4M6dLhJwV3z08tPSRqYFm4NMP
+ dRsn0/7oymhneL8RthIvjDDQ5ktUjMe8LtHr70OZE/TT88qvEdhiIVUogHdo4qBrk41+gGQh
+ b906Dudw5YhTJFU3nC6bbF2nrLlB4C/XSiH76ZvqzV0Z/cAMBo5NF/w=
+In-Reply-To: <20240329225835.400662-25-michael.roth@amd.com>
+Content-Type: text/plain; charset=UTF-8; format=flowed
+Content-Transfer-Encoding: 7bit
+Return-Path: linux-kernel+bounces-125896-steffen.klassert=secunet.com@vger.kernel.org
+X-MS-Exchange-Organization-OriginalArrivalTime: 30 Mar 2024 21:36:14.6826
+ (UTC)
+X-MS-Exchange-Organization-Network-Message-Id: 4110a7a6-c5e7-483a-949d-08dc51016d17
+X-MS-Exchange-Organization-OriginalClientIPAddress: 62.96.220.37
+X-MS-Exchange-Organization-OriginalServerIPAddress: 10.53.40.202
+X-MS-Exchange-Organization-Cross-Premises-Headers-Processed: cas-essen-02.secunet.de
+X-MS-Exchange-Organization-OrderedPrecisionLatencyInProgress: LSRV=mbx-dresden-01.secunet.de:TOTAL-HUB=0.411|SMR=0.340(SMRDE=0.035|SMRC=0.305(SMRCL=0.101|X-SMRCR=0.305))|CAT=0.070(CATOS=0.011
+ (CATSM=0.011(CATSM-Malware
+ Agent=0.011))|CATRESL=0.040(CATRESLP2R=0.036)|CATORES=0.015
+ (CATRS=0.015(CATRS-Index Routing Agent=0.014)));2024-03-30T21:36:15.157Z
+X-MS-Exchange-Forest-ArrivalHubServer: mbx-dresden-01.secunet.de
+X-MS-Exchange-Organization-AuthSource: cas-essen-02.secunet.de
+X-MS-Exchange-Organization-AuthAs: Anonymous
+X-MS-Exchange-Organization-FromEntityHeader: Internet
+X-MS-Exchange-Organization-OriginalSize: 13777
+X-MS-Exchange-Organization-HygienePolicy: Standard
+X-MS-Exchange-Organization-MessageLatency: SRV=cas-essen-02.secunet.de:TOTAL-FE=0.064|SMR=0.023(SMRPI=0.020(SMRPI-FrontendProxyAgent=0.020))|SMS=0.040
+X-MS-Exchange-Organization-AVStamp-Enterprise: 1.0
+X-MS-Exchange-Organization-Recipient-Limit-Verified: True
+X-MS-Exchange-Organization-TotalRecipientCount: 1
+X-MS-Exchange-Organization-Rules-Execution-History: 0b0cf904-14ac-4724-8bdf-482ee6223cf2%%%fd34672d-751c-45ae-a963-ed177fcabe23%%%d8080257-b0c3-47b4-b0db-23bc0c8ddb3c%%%95e591a2-5d7d-4afa-b1d0-7573d6c0a5d9%%%f7d0f6bc-4dcc-4876-8c5d-b3d6ddbb3d55%%%16355082-c50b-4214-9c7d-d39575f9f79b
+X-MS-Exchange-Forest-RulesExecuted: mbx-dresden-01
+X-MS-Exchange-Organization-RulesExecuted: mbx-dresden-01
+X-MS-Exchange-Forest-IndexAgent-0: AQ0CZW4AAYEEAAAPAAADH4sIAAAAAAAEAI1UW2/bNhQ+si35EjvBmh
+ Yb+jCcvjmJL7nHSYMg3cNQYMhWtNv6MAwGLVEWUYkyRNmJt/yG/eYd
+ koovg7ONoGWS5zvfuZJ/NX+SeNI/vuwfn+LxydXZoIN3wo8Yj/Fjmk
+ d4n6U5v2o1bvD7LE2u8J2KhIrwBxZnDK+Z2fW+6N0tS4KenyY3BNb4
+ z4LUP/34oT+ecpUPE56EQQcnmZixnPe59LP5JOcBkiDN5qiidBoHKN
+ McRxwTNpmwUcw7monJAO/uftEyEQqf5SKVCsM0w/e/vutq6JLmXsQx
+ pjKea5aMx3zGZI55qnmmcmnVOFUo9fDniGecCHkH84j0jAkWcyKJBF
+ kXSk2FHCPTNPcjIWfBMJVDFsdDfzJV7T0UEhWfDRexEu0w437MRMID
+ kq+ER/7Gc02kI6AEWV+UCdNnUjsuxpKcCXpFKj/RngfdNAy7o/n/rQ
+ H+lgQZgYMAVZpwJF+ylfSRwwRMRP77BgtrLXCd2F2PWiFasdBqfOQz
+ we9JT+t8YGmc4nep/ENIgdeTkV3dUhwRyxc6N9jtdvUfIsv8qP8wOO
+ 9/mSV9pX981vPxES/xoBgF8ghDQdUgN+SYUxcNyH3FMxNJ+2CvQ4CA
+ aq337e5ekbVAhCEZGwtKef8ZW6NnBFqfCs8f8OQoPA9PLwbnZ4cnvd
+ 4JHwT8wh+d+INLPDo8PD89LUJ61oaWUyT/aur2FrvHlxdnnQs8MP9H
+ p/pM5VQsH2epCEx3hfFURcNFEw8nbMzbKs+mfo7EOZxRM+K+/nas0v
+ 6MPWUDlzTPNOmSCPfps2e1/jTxoR4ixPabBUFbYwzowEj7+8s17i+u
+ /8GYDP33vR/xNe2pzDijctMTgDPBzK2MZqw7YkqrJtPiMeCZ6ukWF/
+ bCxvPOGo2+YSpi1ILdm8IDzDMmVWxvQQff9z/TPdDXX/rF68Glmmbr
+ 7oQio9fCvhnM97lS9KQYp3QJ8N6E4MecZZhOCSLnyB+EyunNWOMJRJ
+ bPyd5EcIVpSAwspzvvRzwWkvdWsf3lZkPe8fHRlFLJyT+rsT4ynk8z
+ +XbRBHpsesDe6rvZagCUoOw4ULUTSrQtOWUXwIVqFWoVcF1oVMDzoE
+ onngMv9cIrQ6UMWySlhevAFngWX4cGIWnSOVHVoGWQlRZs64UDDahY
+ AOnSNJh6CbwtaLraCjFsEdLyEKEDLhl9AVVC0nnFLhx4TXaNV3VoWn
+ Mu1K0tu7UOVGGH1FuFP5VNUZCWa5jdbdghFQ+2VlVMEryqVqnZeMtQ
+ q+mQyW3tQxXqtN2FurG7+4QppuNUHADH+Up/oUTSqlO364azYxc1eF
+ Ex5ixgTR1Kmw6pKF4TtptOywPwYHsTpr7h0Knpyjqecalk1yXdA56t
+ CCX2GxNUXRfd1RE5UNPJ8ewsQdPCVvLfMIGToVclI6obURm+rRSJ9V
+ YbowQ7VOvCpSWYKr7VhNemfDXCN01QNJ882XV1j3neshNce2KpavBq
+ ISVRHd6sO1Mr65pWysX2aw9ervXV3xVfMWkZCQAAAQrBAzw/eG1sIH
+ ZlcnNpb249IjEuMCIgZW5jb2Rpbmc9InV0Zi0xNiI/Pg0KPEVtYWls
+ U2V0Pg0KICA8VmVyc2lvbj4xNS4wLjAuMDwvVmVyc2lvbj4NCiAgPE
+ VtYWlscz4NCiAgICA8RW1haWwgU3RhcnRJbmRleD0iNjEiPg0KICAg
+ ICAgPEVtYWlsU3RyaW5nPmFzaGlzaC5rYWxyYUBhbWQuY29tPC9FbW
+ FpbFN0cmluZz4NCiAgICA8L0VtYWlsPg0KICAgIDxFbWFpbCBTdGFy
+ dEluZGV4PSI1NDciIFBvc2l0aW9uPSJPdGhlciI+DQogICAgICA8RW
+ 1haWxTdHJpbmc+bWljaGFlbC5yb3RoQGFtZC5jb208L0VtYWlsU3Ry
+ aW5nPg0KICAgIDwvRW1haWw+DQogICAgPEVtYWlsIFN0YXJ0SW5kZX
+ g9IjYwMCIgUG9zaXRpb249Ik90aGVyIj4NCiAgICAgIDxFbWFpbFN0
+ cmluZz5wYm9uemluaUByZWRoYXQuY29tPC9FbWFpbFN0cmluZz4NCi
+ AgICA8L0VtYWlsPg0KICA8L0VtYWlscz4NCjwvRW1haWxTZXQ+AQ7O
+ AVJldHJpZXZlck9wZXJhdG9yLDEwLDA7UmV0cmlldmVyT3BlcmF0b3
+ IsMTEsMTtQb3N0RG9jUGFyc2VyT3BlcmF0b3IsMTAsMDtQb3N0RG9j
+ UGFyc2VyT3BlcmF0b3IsMTEsMDtQb3N0V29yZEJyZWFrZXJEaWFnbm
+ 9zdGljT3BlcmF0b3IsMTAsMDtQb3N0V29yZEJyZWFrZXJEaWFnbm9z
+ dGljT3BlcmF0b3IsMTEsMDtUcmFuc3BvcnRXcml0ZXJQcm9kdWNlci wyMCw3
+X-MS-Exchange-Forest-IndexAgent: 1 1827
+X-MS-Exchange-Forest-EmailMessageHash: A196860A
+X-MS-Exchange-Forest-Language: en
+X-MS-Exchange-Organization-Processed-By-Journaling: Journal Agent
+
+On 3/29/24 23:58, Michael Roth wrote:
+> From: Ashish Kalra <ashish.kalra@amd.com>
+> 
+> With SNP/guest_memfd, private/encrypted memory should not be mappable,
+> and MMU notifications for HVA-mapped memory will only be relevant to
+> unencrypted guest memory. Therefore, the rationale behind issuing a
+> wbinvd_on_all_cpus() in sev_guest_memory_reclaimed() should not apply
+> for SNP guests and can be ignored.
+> 
+> Signed-off-by: Ashish Kalra <ashish.kalra@amd.com>
+> [mdr: Add some clarifications in commit]
+> Signed-off-by: Michael Roth <michael.roth@amd.com>
+
+Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
+
+> ---
+>   arch/x86/kvm/svm/sev.c | 9 ++++++++-
+>   1 file changed, 8 insertions(+), 1 deletion(-)
+> 
+> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
+> index 31f6f4786503..3e8de7cb3c89 100644
+> --- a/arch/x86/kvm/svm/sev.c
+> +++ b/arch/x86/kvm/svm/sev.c
+> @@ -2975,7 +2975,14 @@ static void sev_flush_encrypted_page(struct kvm_vcpu *vcpu, void *va)
+>   
+>   void sev_guest_memory_reclaimed(struct kvm *kvm)
+>   {
+> -	if (!sev_guest(kvm))
+> +	/*
+> +	 * With SNP+gmem, private/encrypted memory should be
+> +	 * unreachable via the hva-based mmu notifiers. Additionally,
+> +	 * for shared->private translations, H/W coherency will ensure
+> +	 * first guest access to the page would clear out any existing
+> +	 * dirty copies of that cacheline.
+> +	 */
+> +	if (!sev_guest(kvm) || sev_snp_guest(kvm))
+>   		return;
+>   
+>   	wbinvd_on_all_cpus();
diff --git a/a/content_digest b/N1/content_digest
index d6a0678..6397682 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -61,6 +61,595 @@
   "b\0"
 ]
 [
+  "On 3/29/24 23:58, Michael Roth wrote:\n",
+  "> From: Ashish Kalra <ashish.kalra\@amd.com>\n",
+  "> \n",
+  "> With SNP/guest_memfd, private/encrypted memory should not be mappable,\n",
+  "> and MMU notifications for HVA-mapped memory will only be relevant to\n",
+  "> unencrypted guest memory. Therefore, the rationale behind issuing a\n",
+  "> wbinvd_on_all_cpus() in sev_guest_memory_reclaimed() should not apply\n",
+  "> for SNP guests and can be ignored.\n",
+  "> \n",
+  "> Signed-off-by: Ashish Kalra <ashish.kalra\@amd.com>\n",
+  "> [mdr: Add some clarifications in commit]\n",
+  "> Signed-off-by: Michael Roth <michael.roth\@amd.com>\n",
+  "\n",
+  "Reviewed-by: Paolo Bonzini <pbonzini\@redhat.com>\n",
+  "\n",
+  "> ---\n",
+  ">   arch/x86/kvm/svm/sev.c | 9 ++++++++-\n",
+  ">   1 file changed, 8 insertions(+), 1 deletion(-)\n",
+  "> \n",
+  "> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c\n",
+  "> index 31f6f4786503..3e8de7cb3c89 100644\n",
+  "> --- a/arch/x86/kvm/svm/sev.c\n",
+  "> +++ b/arch/x86/kvm/svm/sev.c\n",
+  "> \@\@ -2975,7 +2975,14 \@\@ static void sev_flush_encrypted_page(struct kvm_vcpu *vcpu, void *va)\n",
+  ">   \n",
+  ">   void sev_guest_memory_reclaimed(struct kvm *kvm)\n",
+  ">   {\n",
+  "> -\tif (!sev_guest(kvm))\n",
+  "> +\t/*\n",
+  "> +\t * With SNP+gmem, private/encrypted memory should be\n",
+  "> +\t * unreachable via the hva-based mmu notifiers. Additionally,\n",
+  "> +\t * for shared->private translations, H/W coherency will ensure\n",
+  "> +\t * first guest access to the page would clear out any existing\n",
+  "> +\t * dirty copies of that cacheline.\n",
+  "> +\t */\n",
+  "> +\tif (!sev_guest(kvm) || sev_snp_guest(kvm))\n",
+  ">   \t\treturn;\n",
+  ">   \n",
+  ">   \twbinvd_on_all_cpus();\n",
+  "\n",
+  "\n",
+  "X-sender: <kvm+bounces-13160-martin.weber=secunet.com\@vger.kernel.org>\n",
+  "X-Receiver: <martin.weber\@secunet.com> ORCPT=rfc822;martin.weber\@secunet.com NOTIFY=NEVER; X-ExtendedProps=BQAVABYAAgAAAAUAFAARAJuYHy0vkvxLoOu7fW2WcxcPADUAAABNaWNyb3NvZnQuRXhjaGFuZ2UuVHJhbnNwb3J0LkRpcmVjdG9yeURhdGEuSXNSZXNvdXJjZQIAAAUAagAJAAEAAAAAAAAABQAWAAIAAAUAQwACAAAFAEYABwADAAAABQBHAAIAAAUAEgAPAF4AAAAvbz1zZWN1bmV0L291PUV4Y2hhbmdlIEFkbWluaXN0cmF0aXZlIEdyb3VwIChGWURJQk9IRjIzU1BETFQpL2NuPVJlY2lwaWVudHMvY249V2ViZXIgTWFydGluOTU1BQALABcAvgAAALMpUnVJ4+pPsL47FHo+lvtDTj1EQjIsQ049RGF0YWJhc2VzLENOPUV4Y2hhbmdlIEFkbWluaXN0cmF0aXZlIEdyb3VwIChGWURJQk9IRjIzU1BETFQpLENOPUFkbWluaXN0cmF0aXZlIEdyb3VwcyxDTj1zZWN1bmV0LENOPU1pY3Jvc29mdCBFeGNoYW5nZSxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPXNlY3VuZXQsREM9ZGUFAA4AEQBACf3SYEkDT461FZzDv+B7BQAdAA8ADAAAAG1ieC1lc3Nlbi0wMQUAPAACAAAPADYAAABNaWNyb3NvZnQuRXhjaGFuZ2UuVHJhbnNwb3J0Lk1haWxSZWNpcGllbnQuRGlzcGxheU5hbWUPAA0AAABXZWJlciwgTWFydGluBQAMAAIAAAUAbAACAAAFAFgAFwBGAAAAm5gfLS+S/Eug67t9bZZzF0NOPVdlYmVyIE1hcnRpbixPVT1Vc2VycyxPVT1NaWdyYXRpb24sREM9c2VjdW5ldCxEQz1kZQUAJgACAAEFACIADwAxAAAAQXV0b1Jlc3BvbnNlU3VwcHJlc3M6IDANClRyYW5zbWl0SGlzdG9yeTogRmFsc2UNCg8ALwAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuRXhwYW5zaW9uR3JvdXBUeXBlDwAVAAAATWVtYmVyc0dyb3VwRXhwYW5zaW9uBQAjAAIAAQ==\n",
+  "X-CreatedBy: MSExchange15\n",
+  "X-HeloDomain: b.mx.secunet.com\n",
+  "X-ExtendedProps: BQBjAAoAuKNAQuxQ3AgFAGEACAABAAAABQA3AAIAAA8APAAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuTWFpbFJlY2lwaWVudC5Pcmdhbml6YXRpb25TY29wZREAAAAAAAAAAAAAAAAAAAAAAAUASQACAAEFAGIACgBdAAAAo4oAAAUABAAUIAEAAAAYAAAAbWFydGluLndlYmVyQHNlY3VuZXQuY29tBQAGAAIAAQUAKQACAAEPAAkAAABDSUF1ZGl0ZWQCAAEFAAIABwABAAAABQADAAcAAAAAAAUABQACAAEFAGQADwADAAAASHVi\n",
+  "X-Source: SMTP:Default MBX-DRESDEN-01\n",
+  "X-SourceIPAddress: 62.96.220.37\n",
+  "X-EndOfInjectedXHeaders: 17817\n",
+  "Received: from cas-essen-01.secunet.de (10.53.40.201) by\n",
+  " mbx-dresden-01.secunet.de (10.53.40.199) with Microsoft SMTP Server\n",
+  " (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id\n",
+  " 15.1.2507.37; Sat, 30 Mar 2024 22:36:05 +0100\n",
+  "Received: from b.mx.secunet.com (62.96.220.37) by cas-essen-01.secunet.de\n",
+  " (10.53.40.201) with Microsoft SMTP Server (version=TLS1_2,\n",
+  " cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.37 via Frontend\n",
+  " Transport; Sat, 30 Mar 2024 22:36:05 +0100\n",
+  "Received: from localhost (localhost [127.0.0.1])\n",
+  "\tby b.mx.secunet.com (Postfix) with ESMTP id C1C7D20322\n",
+  "\tfor <martin.weber\@secunet.com>; Sat, 30 Mar 2024 22:36:05 +0100 (CET)\n",
+  "X-Virus-Scanned: by secunet\n",
+  "X-Spam-Flag: NO\n",
+  "X-Spam-Score: -2.851\n",
+  "X-Spam-Level:\n",
+  "X-Spam-Status: No, score=-2.851 tagged_above=-999 required=2.1\n",
+  "\ttests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.1, DKIM_SIGNED=0.1,\n",
+  "\tDKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,\n",
+  "\tHEADER_FROM_DIFFERENT_DOMAINS=0.249, MAILING_LIST_MULTI=-1,\n",
+  "\tRCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001]\n",
+  "\tautolearn=ham autolearn_force=no\n",
+  "Authentication-Results: a.mx.secunet.com (amavisd-new);\n",
+  "\tdkim=pass (1024-bit key) header.d=redhat.com\n",
+  "Received: from b.mx.secunet.com ([127.0.0.1])\n",
+  "\tby localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024)\n",
+  "\twith ESMTP id G3vJTeK-xASN for <martin.weber\@secunet.com>;\n",
+  "\tSat, 30 Mar 2024 22:36:03 +0100 (CET)\n",
+  "Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=147.75.199.223; helo=ny.mirrors.kernel.org; envelope-from=kvm+bounces-13160-martin.weber=secunet.com\@vger.kernel.org; receiver=martin.weber\@secunet.com \n",
+  "DKIM-Filter: OpenDKIM Filter v2.11.0 b.mx.secunet.com 572412025D\n",
+  "Authentication-Results: b.mx.secunet.com;\n",
+  "\tdkim=pass (1024-bit key) header.d=redhat.com header.i=\@redhat.com header.b=\"AaC50WIk\"\n",
+  "Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org [147.75.199.223])\n",
+  "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n",
+  "\t(No client certificate requested)\n",
+  "\tby b.mx.secunet.com (Postfix) with ESMTPS id 572412025D\n",
+  "\tfor <martin.weber\@secunet.com>; Sat, 30 Mar 2024 22:36:03 +0100 (CET)\n",
+  "Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140])\n",
+  "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n",
+  "\t(No client certificate requested)\n",
+  "\tby ny.mirrors.kernel.org (Postfix) with ESMTPS id 5F0571C216C7\n",
+  "\tfor <martin.weber\@secunet.com>; Sat, 30 Mar 2024 21:36:02 +0000 (UTC)\n",
+  "Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])\n",
+  "\tby smtp.subspace.kernel.org (Postfix) with ESMTP id D70FB5103E;\n",
+  "\tSat, 30 Mar 2024 21:35:44 +0000 (UTC)\n",
+  "Authentication-Results: smtp.subspace.kernel.org;\n",
+  "\tdkim=pass (1024-bit key) header.d=redhat.com header.i=\@redhat.com header.b=\"AaC50WIk\"\n",
+  "X-Original-To: kvm\@vger.kernel.org\n",
+  "Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n",
+  "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n",
+  "\t(No client certificate requested)\n",
+  "\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id E5D084A99C\n",
+  "\tfor <kvm\@vger.kernel.org>; Sat, 30 Mar 2024 21:35:42 +0000 (UTC)\n",
+  "Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124\n",
+  "ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n",
+  "\tt=1711834544; cv=none; b=llVqaoaCimh+5hmI9zmsnC/iwyzb2E5Hu7QNGoMonpzPGejc///CLaxbkq8Cweg+S1JiGYBT3GW4IXKhqhtyeU45YUqJD3NDZBzyxFgxcr6x2bJ/zqwbjYWUDHB6m51Ve9hV/UuT0jat8CyrbAV3/nk8SjFStB8Gtdb3yUASx7Y=\n",
+  "ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org;\n",
+  "\ts=arc-20240116; t=1711834544; c=relaxed/simple;\n",
+  "\tbh=A/4nTvH3zcKKDjwq9z7ISuECCM1K8A3A6bBgBipegtg=;\n",
+  "\th=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:\n",
+  "\t In-Reply-To:Content-Type; b=eFNgdjaR4J4Uoz+I3mgxLCqDUhmelqAAHz0lyzdxYao424xVWR2Nhu0tjv7RzRU8+BurJQYRKYCRtuYssoMOcH5fLyOkLqidZ7AIYF220I4hAc3/JVLff8IYWvxugAc9q4yrqtBIOvmWRLQaDqhCFqYWv+xjN9Pyjs5/yvVQ9xA=\n",
+  "ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=\@redhat.com header.b=AaC50WIk; arc=none smtp.client-ip=170.10.133.124\n",
+  "Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com\n",
+  "Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com\n",
+  "DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n",
+  "\ts=mimecast20190719; t=1711834542;\n",
+  "\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n",
+  "\t to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n",
+  "\t content-transfer-encoding:content-transfer-encoding:\n",
+  "\t in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n",
+  "\tbh=k6nhJ/n2fVMLTJ5orSzZrSN05UZkFdn1WgbErq3l2Pk=;\n",
+  "\tb=AaC50WIksL9NXcrY24Vf8866p2pD2dqoSt2KH3Q9m5G0W+ckANKXwFV174bh285mSHdYYp\n",
+  "\tAm7Pp2OVACSpmiGTiarIdJ3LjY7U4pMD4dIoEJj3ZGOB4HEAf14Rvx311TLCJXwVJkY5J+\n",
+  "\txI1Knv3RO0diA68TV+qXMsxlED6tSMU=\n",
+  "Received: from mail-lf1-f72.google.com (mail-lf1-f72.google.com\n",
+  " [209.85.167.72]) by relay.mimecast.com with ESMTP with STARTTLS\n",
+  " (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n",
+  " us-mta-422-DH0MhiZ-NpO52d4IzgoGyw-1; Sat, 30 Mar 2024 17:35:39 -0400\n",
+  "X-MC-Unique: DH0MhiZ-NpO52d4IzgoGyw-1\n",
+  "Received: by mail-lf1-f72.google.com with SMTP id 2adb3069b0e04-50e91f9d422so2894479e87.2\n",
+  "        for <kvm\@vger.kernel.org>; Sat, 30 Mar 2024 14:35:39 -0700 (PDT)\n",
+  "X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;\n",
+  "        d=1e100.net; s=20230601; t=1711834538; x=1712439338;\n",
+  "        h=content-transfer-encoding:in-reply-to:autocrypt:content-language\n",
+  "         :from:references:cc:to:subject:user-agent:mime-version:date\n",
+  "         :message-id:x-gm-message-state:from:to:cc:subject:date:message-id\n",
+  "         :reply-to;\n",
+  "        bh=k6nhJ/n2fVMLTJ5orSzZrSN05UZkFdn1WgbErq3l2Pk=;\n",
+  "        b=RCf5TMeMQhuiEsqquu6GXQ6GB3m+0/iFcCRbdF6FHT1Iubn/tjzv9lJOylHmfYv5Rd\n",
+  "         0IDLo6EJAZe/Wj/3XMS1gcLnaViQijGQJp80IzzKosq6bJfMwoJ05jO2hHjP2LesRkCL\n",
+  "         ls6tLS8SmE7uOn5J/O8eraI2NB5d2E7aFk5FjrSgdc4szOq6yKDiEsUZh7LD8AZt3x3V\n",
+  "         FjPHhGFDXaTfQRvJNBteXbSAO2dwmd9M+EVjU5OP479DDtLt7PAvHOQhrnFbM2mI+xQ1\n",
+  "         GpaNnNlrtdfoevCxQxcG3X81fpRXiK2IjIEOGdqn+4ljVqkGltjlAiV1zSYWssY4ZXsf\n",
+  "         Yajg==\n",
+  "X-Forwarded-Encrypted: i=1; AJvYcCVsvUr1yfJMqn5TiPVxUHnKx54OrM1lq42sSt5QV6/IUdSjUCRDAopDDLunjYXvT4rMttWkkf9EOqxfV0NgTL6zg5Gv\n",
+  "X-Gm-Message-State: AOJu0Yw78dI/Q4jTJmUdgdVwmJo61d5Dc0X6+N42kKg2Ei0tQZSPKJKn\n",
+  "\t85HBFAanKtI/SqjFIhGrwICQQxDWmQLuhNwCXKkLmnck6SXZv02QHXiI7Juury1kcXbmHeR23iX\n",
+  "\tH7r5aoSL0elu+EUpX1DdU0z9z4Uju3Ci5pQXkOOY1Vc6cKsnqGw==\n",
+  "X-Received: by 2002:a19:2d18:0:b0:513:b062:98c4 with SMTP id k24-20020a192d18000000b00513b06298c4mr3643259lfj.11.1711834538175;\n",
+  "        Sat, 30 Mar 2024 14:35:38 -0700 (PDT)\n",
+  "X-Google-Smtp-Source: AGHT+IH5PGmEGHf24nUfF7B7vuwJRBVN0rKW1MZiU9RQdC6MVZb3TnEUgyIIaZghldmm9GaQfOSwZw==\n",
+  "X-Received: by 2002:a19:2d18:0:b0:513:b062:98c4 with SMTP id k24-20020a192d18000000b00513b06298c4mr3643226lfj.11.1711834537752;\n",
+  "        Sat, 30 Mar 2024 14:35:37 -0700 (PDT)\n",
+  "Received: from [192.168.10.4] ([151.95.49.219])\n",
+  "        by smtp.googlemail.com with ESMTPSA id w4-20020a1709062f8400b00a4e07f8b6bfsm3445434eji.59.2024.03.30.14.35.34\n",
+  "        (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n",
+  "        Sat, 30 Mar 2024 14:35:37 -0700 (PDT)\n",
+  "Message-ID: <00800f4b-5403-4416-b984-12b207362a19\@redhat.com>\n",
+  "Date: Sat, 30 Mar 2024 22:35:33 +0100\n",
+  "Precedence: bulk\n",
+  "X-Mailing-List: kvm\@vger.kernel.org\n",
+  "List-Id: <kvm.vger.kernel.org>\n",
+  "List-Subscribe: <mailto:kvm+subscribe\@vger.kernel.org>\n",
+  "List-Unsubscribe: <mailto:kvm+unsubscribe\@vger.kernel.org>\n",
+  "MIME-Version: 1.0\n",
+  "User-Agent: Mozilla Thunderbird\n",
+  "Subject: Re: [PATCH v12 24/29] KVM: SEV: Avoid WBINVD for HVA-based MMU\n",
+  " notifications for SNP\n",
+  "To: Michael Roth <michael.roth\@amd.com>, kvm\@vger.kernel.org\n",
+  "Cc: linux-coco\@lists.linux.dev, linux-mm\@kvack.org,\n",
+  " linux-crypto\@vger.kernel.org, x86\@kernel.org, linux-kernel\@vger.kernel.org,\n",
+  " tglx\@linutronix.de, mingo\@redhat.com, jroedel\@suse.de,\n",
+  " thomas.lendacky\@amd.com, hpa\@zytor.com, ardb\@kernel.org, seanjc\@google.com,\n",
+  " vkuznets\@redhat.com, jmattson\@google.com, luto\@kernel.org,\n",
+  " dave.hansen\@linux.intel.com, slp\@redhat.com, pgonda\@google.com,\n",
+  " peterz\@infradead.org, srinivas.pandruvada\@linux.intel.com,\n",
+  " rientjes\@google.com, dovmurik\@linux.ibm.com, tobin\@ibm.com, bp\@alien8.de,\n",
+  " vbabka\@suse.cz, kirill\@shutemov.name, ak\@linux.intel.com,\n",
+  " tony.luck\@intel.com, sathyanarayanan.kuppuswamy\@linux.intel.com,\n",
+  " alpergun\@google.com, jarkko\@kernel.org, ashish.kalra\@amd.com,\n",
+  " nikunj.dadhania\@amd.com, pankaj.gupta\@amd.com, liam.merwick\@oracle.com\n",
+  "References: <20240329225835.400662-1-michael.roth\@amd.com>\n",
+  " <20240329225835.400662-25-michael.roth\@amd.com>\n",
+  "From: Paolo Bonzini <pbonzini\@redhat.com>\n",
+  "Content-Language: en-US\n",
+  "Autocrypt: addr=pbonzini\@redhat.com; keydata=\n",
+  " xsEhBFRCcBIBDqDGsz4K0zZun3jh+U6Z9wNGLKQ0kSFyjN38gMqU1SfP+TUNQepFHb/Gc0E2\n",
+  " CxXPkIBTvYY+ZPkoTh5xF9oS1jqI8iRLzouzF8yXs3QjQIZ2SfuCxSVwlV65jotcjD2FTN04\n",
+  " hVopm9llFijNZpVIOGUTqzM4U55sdsCcZUluWM6x4HSOdw5F5Utxfp1wOjD/v92Lrax0hjiX\n",
+  " DResHSt48q+8FrZzY+AUbkUS+Jm34qjswdrgsC5uxeVcLkBgWLmov2kMaMROT0YmFY6A3m1S\n",
+  " P/kXmHDXxhe23gKb3dgwxUTpENDBGcfEzrzilWueOeUWiOcWuFOed/C3SyijBx3Av/lbCsHU\n",
+  " Vx6pMycNTdzU1BuAroB+Y3mNEuW56Yd44jlInzG2UOwt9XjjdKkJZ1g0P9dwptwLEgTEd3Fo\n",
+  " UdhAQyRXGYO8oROiuh+RZ1lXp6AQ4ZjoyH8WLfTLf5g1EKCTc4C1sy1vQSdzIRu3rBIjAvnC\n",
+  " tGZADei1IExLqB3uzXKzZ1BZ+Z8hnt2og9hb7H0y8diYfEk2w3R7wEr+Ehk5NQsT2MPI2QBd\n",
+  " wEv1/Aj1DgUHZAHzG1QN9S8wNWQ6K9DqHZTBnI1hUlkp22zCSHK/6FwUCuYp1zcAEQEAAc0j\n",
+  " UGFvbG8gQm9uemluaSA8cGJvbnppbmlAcmVkaGF0LmNvbT7CwU0EEwECACMFAlRCcBICGwMH\n",
+  " CwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRB+FRAMzTZpsbceDp9IIN6BIA0Ol7MoB15E\n",
+  " 11kRz/ewzryFY54tQlMnd4xxfH8MTQ/mm9I482YoSwPMdcWFAKnUX6Yo30tbLiNB8hzaHeRj\n",
+  " jx12K+ptqYbg+cevgOtbLAlL9kNgLLcsGqC2829jBCUTVeMSZDrzS97ole/YEez2qFpPnTV0\n",
+  " VrRWClWVfYh+JfzpXmgyhbkuwUxNFk421s4Ajp3d8nPPFUGgBG5HOxzkAm7xb1cjAuJ+oi/K\n",
+  " CHfkuN+fLZl/u3E/fw7vvOESApLU5o0icVXeakfSz0LsygEnekDbxPnE5af/9FEkXJD5EoYG\n",
+  " SEahaEtgNrR4qsyxyAGYgZlS70vkSSYJ+iT2rrwEiDlo31MzRo6Ba2FfHBSJ7lcYdPT7bbk9\n",
+  " AO3hlNMhNdUhoQv7M5HsnqZ6unvSHOKmReNaS9egAGdRN0/GPDWr9wroyJ65ZNQsHl9nXBqE\n",
+  " AukZNr5oJO5vxrYiAuuTSd6UI/xFkjtkzltG3mw5ao2bBpk/V/YuePrJsnPFHG7NhizrxttB\n",
+  " nTuOSCMo45pfHQ+XYd5K1+Cv/NzZFNWscm5htJ0HznY+oOsZvHTyGz3v91pn51dkRYN0otqr\n",
+  " bQ4tlFFuVjArBZcapSIe6NV8C4cEiSTOwE0EVEJx7gEIAMeHcVzuv2bp9HlWDp6+RkZe+vtl\n",
+  " KwAHplb/WH59j2wyG8V6i33+6MlSSJMOFnYUCCL77bucx9uImI5nX24PIlqT+zasVEEVGSRF\n",
+  " m8dgkcJDB7Tps0IkNrUi4yof3B3shR+vMY3i3Ip0e41zKx0CvlAhMOo6otaHmcxr35sWq1Jk\n",
+  " tLkbn3wG+fPQCVudJJECvVQ//UAthSSEklA50QtD2sBkmQ14ZryEyTHQ+E42K3j2IUmOLriF\n",
+  " dNr9NvE1QGmGyIcbw2NIVEBOK/GWxkS5+dmxM2iD4Jdaf2nSn3jlHjEXoPwpMs0KZsgdU0pP\n",
+  " JQzMUMwmB1wM8JxovFlPYrhNT9MAEQEAAcLBMwQYAQIACQUCVEJx7gIbDAAKCRB+FRAMzTZp\n",
+  " sadRDqCctLmYICZu4GSnie4lKXl+HqlLanpVMOoFNnWs9oRP47MbE2wv8OaYh5pNR9VVgyhD\n",
+  " OG0AU7oidG36OeUlrFDTfnPYYSF/mPCxHttosyt8O5kabxnIPv2URuAxDByz+iVbL+RjKaGM\n",
+  " GDph56ZTswlx75nZVtIukqzLAQ5fa8OALSGum0cFi4ptZUOhDNz1onz61klD6z3MODi0sBZN\n",
+  " Aj6guB2L/+2ZwElZEeRBERRd/uommlYuToAXfNRdUwrwl9gRMiA0WSyTb190zneRRDfpSK5d\n",
+  " usXnM/O+kr3Dm+Ui+UioPf6wgbn3T0o6I5BhVhs4h4hWmIW7iNhPjX1iybXfmb1gAFfjtHfL\n",
+  " xRUr64svXpyfJMScIQtBAm0ihWPltXkyITA92ngCmPdHa6M1hMh4RDX+Jf1fiWubzp1voAg0\n",
+  " JBrdmNZSQDz0iKmSrx8xkoXYfA3bgtFN8WJH2xgFL28XnqY4M6dLhJwV3z08tPSRqYFm4NMP\n",
+  " dRsn0/7oymhneL8RthIvjDDQ5ktUjMe8LtHr70OZE/TT88qvEdhiIVUogHdo4qBrk41+gGQh\n",
+  " b906Dudw5YhTJFU3nC6bbF2nrLlB4C/XSiH76ZvqzV0Z/cAMBo5NF/w=\n",
+  "In-Reply-To: <20240329225835.400662-25-michael.roth\@amd.com>\n",
+  "Content-Type: text/plain; charset=UTF-8; format=flowed\n",
+  "Content-Transfer-Encoding: 7bit\n",
+  "Return-Path: kvm+bounces-13160-martin.weber=secunet.com\@vger.kernel.org\n",
+  "X-MS-Exchange-Organization-OriginalArrivalTime: 30 Mar 2024 21:36:05.7650\n",
+  " (UTC)\n",
+  "X-MS-Exchange-Organization-Network-Message-Id: 24f51bbd-dcf0-4e6f-b4c7-08dc510167c6\n",
+  "X-MS-Exchange-Organization-OriginalClientIPAddress: 62.96.220.37\n",
+  "X-MS-Exchange-Organization-OriginalServerIPAddress: 10.53.40.201\n",
+  "X-MS-Exchange-Organization-Cross-Premises-Headers-Processed: cas-essen-01.secunet.de\n",
+  "X-MS-Exchange-Organization-OrderedPrecisionLatencyInProgress: LSRV=mbx-dresden-01.secunet.de:TOTAL-HUB=0.419|SMR=0.345(SMRDE=0.035|SMRC=0.310(SMRCL=0.100|X-SMRCR=0.309))|CAT=0.072(CATOS=0.012\n",
+  " (CATSM=0.012(CATSM-Malware\n",
+  " Agent=0.011))|CATRESL=0.042(CATRESLP2R=0.039)|CATORES=0.016\n",
+  " (CATRS=0.015(CATRS-Index Routing Agent=0.014)));2024-03-30T21:36:06.214Z\n",
+  "X-MS-Exchange-Forest-ArrivalHubServer: mbx-dresden-01.secunet.de\n",
+  "X-MS-Exchange-Organization-AuthSource: cas-essen-01.secunet.de\n",
+  "X-MS-Exchange-Organization-AuthAs: Anonymous\n",
+  "X-MS-Exchange-Organization-FromEntityHeader: Internet\n",
+  "X-MS-Exchange-Organization-OriginalSize: 13679\n",
+  "X-MS-Exchange-Organization-HygienePolicy: Standard\n",
+  "X-MS-Exchange-Organization-MessageLatency: SRV=cas-essen-01.secunet.de:TOTAL-FE=0.029|SMR=0.022(SMRPI=0.020(SMRPI-FrontendProxyAgent=0.020))|SMS=0.008\n",
+  "X-MS-Exchange-Organization-AVStamp-Enterprise: 1.0\n",
+  "X-MS-Exchange-Organization-Recipient-Limit-Verified: True\n",
+  "X-MS-Exchange-Organization-TotalRecipientCount: 1\n",
+  "X-MS-Exchange-Organization-Rules-Execution-History: 0b0cf904-14ac-4724-8bdf-482ee6223cf2%%%fd34672d-751c-45ae-a963-ed177fcabe23%%%d8080257-b0c3-47b4-b0db-23bc0c8ddb3c%%%95e591a2-5d7d-4afa-b1d0-7573d6c0a5d9%%%f7d0f6bc-4dcc-4876-8c5d-b3d6ddbb3d55%%%16355082-c50b-4214-9c7d-d39575f9f79b\n",
+  "X-MS-Exchange-Forest-RulesExecuted: mbx-dresden-01\n",
+  "X-MS-Exchange-Organization-RulesExecuted: mbx-dresden-01\n",
+  "X-MS-Exchange-Forest-IndexAgent-0: AQ0CZW4AAYEEAAAPAAADH4sIAAAAAAAEAI1UW2/bNhQ+si35EjvBmh\n",
+  " Yb+jCcvjmJL7nHSYMg3cNQYMhWtNv6MAwGLVEWUYkyRNmJt/yG/eYd\n",
+  " koovg7ONoGWS5zvfuZJ/NX+SeNI/vuwfn+LxydXZoIN3wo8Yj/Fjmk\n",
+  " d4n6U5v2o1bvD7LE2u8J2KhIrwBxZnDK+Z2fW+6N0tS4KenyY3BNb4\n",
+  " z4LUP/34oT+ecpUPE56EQQcnmZixnPe59LP5JOcBkiDN5qiidBoHKN\n",
+  " McRxwTNpmwUcw7monJAO/uftEyEQqf5SKVCsM0w/e/vutq6JLmXsQx\n",
+  " pjKea5aMx3zGZI55qnmmcmnVOFUo9fDniGecCHkH84j0jAkWcyKJBF\n",
+  " kXSk2FHCPTNPcjIWfBMJVDFsdDfzJV7T0UEhWfDRexEu0w437MRMID\n",
+  " kq+ER/7Gc02kI6AEWV+UCdNnUjsuxpKcCXpFKj/RngfdNAy7o/n/rQ\n",
+  " H+lgQZgYMAVZpwJF+ylfSRwwRMRP77BgtrLXCd2F2PWiFasdBqfOQz\n",
+  " we9JT+t8YGmc4nep/ENIgdeTkV3dUhwRyxc6N9jtdvUfIsv8qP8wOO\n",
+  " 9/mSV9pX981vPxES/xoBgF8ghDQdUgN+SYUxcNyH3FMxNJ+2CvQ4CA\n",
+  " aq337e5ekbVAhCEZGwtKef8ZW6NnBFqfCs8f8OQoPA9PLwbnZ4cnvd\n",
+  " 4JHwT8wh+d+INLPDo8PD89LUJ61oaWUyT/aur2FrvHlxdnnQs8MP9H\n",
+  " p/pM5VQsH2epCEx3hfFURcNFEw8nbMzbKs+mfo7EOZxRM+K+/nas0v\n",
+  " 6MPWUDlzTPNOmSCPfps2e1/jTxoR4ixPabBUFbYwzowEj7+8s17i+u\n",
+  " /8GYDP33vR/xNe2pzDijctMTgDPBzK2MZqw7YkqrJtPiMeCZ6ukWF/\n",
+  " bCxvPOGo2+YSpi1ILdm8IDzDMmVWxvQQff9z/TPdDXX/rF68Glmmbr\n",
+  " 7oQio9fCvhnM97lS9KQYp3QJ8N6E4MecZZhOCSLnyB+EyunNWOMJRJ\n",
+  " bPyd5EcIVpSAwspzvvRzwWkvdWsf3lZkPe8fHRlFLJyT+rsT4ynk8z\n",
+  " +XbRBHpsesDe6rvZagCUoOw4ULUTSrQtOWUXwIVqFWoVcF1oVMDzoE\n",
+  " onngMv9cIrQ6UMWySlhevAFngWX4cGIWnSOVHVoGWQlRZs64UDDahY\n",
+  " AOnSNJh6CbwtaLraCjFsEdLyEKEDLhl9AVVC0nnFLhx4TXaNV3VoWn\n",
+  " Mu1K0tu7UOVGGH1FuFP5VNUZCWa5jdbdghFQ+2VlVMEryqVqnZeMtQ\n",
+  " q+mQyW3tQxXqtN2FurG7+4QppuNUHADH+Up/oUTSqlO364azYxc1eF\n",
+  " Ex5ixgTR1Kmw6pKF4TtptOywPwYHsTpr7h0Knpyjqecalk1yXdA56t\n",
+  " CCX2GxNUXRfd1RE5UNPJ8ewsQdPCVvLfMIGToVclI6obURm+rRSJ9V\n",
+  " YbowQ7VOvCpSWYKr7VhNemfDXCN01QNJ882XV1j3neshNce2KpavBq\n",
+  " ISVRHd6sO1Mr65pWysX2aw9ervXV3xVfMWkZCQAAAQrBAzw/eG1sIH\n",
+  " ZlcnNpb249IjEuMCIgZW5jb2Rpbmc9InV0Zi0xNiI/Pg0KPEVtYWls\n",
+  " U2V0Pg0KICA8VmVyc2lvbj4xNS4wLjAuMDwvVmVyc2lvbj4NCiAgPE\n",
+  " VtYWlscz4NCiAgICA8RW1haWwgU3RhcnRJbmRleD0iNjEiPg0KICAg\n",
+  " ICAgPEVtYWlsU3RyaW5nPmFzaGlzaC5rYWxyYUBhbWQuY29tPC9FbW\n",
+  " FpbFN0cmluZz4NCiAgICA8L0VtYWlsPg0KICAgIDxFbWFpbCBTdGFy\n",
+  " dEluZGV4PSI1NDciIFBvc2l0aW9uPSJPdGhlciI+DQogICAgICA8RW\n",
+  " 1haWxTdHJpbmc+bWljaGFlbC5yb3RoQGFtZC5jb208L0VtYWlsU3Ry\n",
+  " aW5nPg0KICAgIDwvRW1haWw+DQogICAgPEVtYWlsIFN0YXJ0SW5kZX\n",
+  " g9IjYwMCIgUG9zaXRpb249Ik90aGVyIj4NCiAgICAgIDxFbWFpbFN0\n",
+  " cmluZz5wYm9uemluaUByZWRoYXQuY29tPC9FbWFpbFN0cmluZz4NCi\n",
+  " AgICA8L0VtYWlsPg0KICA8L0VtYWlscz4NCjwvRW1haWxTZXQ+AQ7O\n",
+  " AVJldHJpZXZlck9wZXJhdG9yLDEwLDE7UmV0cmlldmVyT3BlcmF0b3\n",
+  " IsMTEsMTtQb3N0RG9jUGFyc2VyT3BlcmF0b3IsMTAsMDtQb3N0RG9j\n",
+  " UGFyc2VyT3BlcmF0b3IsMTEsMDtQb3N0V29yZEJyZWFrZXJEaWFnbm\n",
+  " 9zdGljT3BlcmF0b3IsMTAsMDtQb3N0V29yZEJyZWFrZXJEaWFnbm9z\n",
+  " dGljT3BlcmF0b3IsMTEsMDtUcmFuc3BvcnRXcml0ZXJQcm9kdWNlci wyMCw3\n",
+  "X-MS-Exchange-Forest-IndexAgent: 1 1827\n",
+  "X-MS-Exchange-Forest-EmailMessageHash: A196860A\n",
+  "X-MS-Exchange-Forest-Language: en\n",
+  "X-MS-Exchange-Organization-Processed-By-Journaling: Journal Agent\n",
+  "\n",
+  "On 3/29/24 23:58, Michael Roth wrote:\n",
+  "> From: Ashish Kalra <ashish.kalra\@amd.com>\n",
+  "> \n",
+  "> With SNP/guest_memfd, private/encrypted memory should not be mappable,\n",
+  "> and MMU notifications for HVA-mapped memory will only be relevant to\n",
+  "> unencrypted guest memory. Therefore, the rationale behind issuing a\n",
+  "> wbinvd_on_all_cpus() in sev_guest_memory_reclaimed() should not apply\n",
+  "> for SNP guests and can be ignored.\n",
+  "> \n",
+  "> Signed-off-by: Ashish Kalra <ashish.kalra\@amd.com>\n",
+  "> [mdr: Add some clarifications in commit]\n",
+  "> Signed-off-by: Michael Roth <michael.roth\@amd.com>\n",
+  "\n",
+  "Reviewed-by: Paolo Bonzini <pbonzini\@redhat.com>\n",
+  "\n",
+  "> ---\n",
+  ">   arch/x86/kvm/svm/sev.c | 9 ++++++++-\n",
+  ">   1 file changed, 8 insertions(+), 1 deletion(-)\n",
+  "> \n",
+  "> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c\n",
+  "> index 31f6f4786503..3e8de7cb3c89 100644\n",
+  "> --- a/arch/x86/kvm/svm/sev.c\n",
+  "> +++ b/arch/x86/kvm/svm/sev.c\n",
+  "> \@\@ -2975,7 +2975,14 \@\@ static void sev_flush_encrypted_page(struct kvm_vcpu *vcpu, void *va)\n",
+  ">   \n",
+  ">   void sev_guest_memory_reclaimed(struct kvm *kvm)\n",
+  ">   {\n",
+  "> -\tif (!sev_guest(kvm))\n",
+  "> +\t/*\n",
+  "> +\t * With SNP+gmem, private/encrypted memory should be\n",
+  "> +\t * unreachable via the hva-based mmu notifiers. Additionally,\n",
+  "> +\t * for shared->private translations, H/W coherency will ensure\n",
+  "> +\t * first guest access to the page would clear out any existing\n",
+  "> +\t * dirty copies of that cacheline.\n",
+  "> +\t */\n",
+  "> +\tif (!sev_guest(kvm) || sev_snp_guest(kvm))\n",
+  ">   \t\treturn;\n",
+  ">   \n",
+  ">   \twbinvd_on_all_cpus();\n",
+  "\n",
+  "\n",
+  "X-sender: <linux-kernel+bounces-125896-steffen.klassert=secunet.com\@vger.kernel.org>\n",
+  "X-Receiver: <steffen.klassert\@secunet.com> ORCPT=rfc822;steffen.klassert\@secunet.com NOTIFY=NEVER; X-ExtendedProps=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\n",
+  "X-CreatedBy: MSExchange15\n",
+  "X-HeloDomain: b.mx.secunet.com\n",
+  "X-ExtendedProps: BQBjAAoAtaNAQuxQ3AgFAGEACAABAAAABQA3AAIAAA8APAAAAE1pY3Jvc29mdC5FeGNoYW5nZS5UcmFuc3BvcnQuTWFpbFJlY2lwaWVudC5Pcmdhbml6YXRpb25TY29wZREAAAAAAAAAAAAAAAAAAAAAAAUASQACAAEFAGIACgBeAAAAo4oAAAUABAAUIAEAAAAcAAAAc3RlZmZlbi5rbGFzc2VydEBzZWN1bmV0LmNvbQUABgACAAEFACkAAgABDwAJAAAAQ0lBdWRpdGVkAgABBQACAAcAAQAAAAUAAwAHAAAAAAAFAAUAAgABBQBkAA8AAwAAAEh1Yg==\n",
+  "X-Source: SMTP:Default MBX-DRESDEN-01\n",
+  "X-SourceIPAddress: 62.96.220.37\n",
+  "X-EndOfInjectedXHeaders: 17913\n",
+  "Received: from cas-essen-02.secunet.de (10.53.40.202) by\n",
+  " mbx-dresden-01.secunet.de (10.53.40.199) with Microsoft SMTP Server\n",
+  " (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id\n",
+  " 15.1.2507.37; Sat, 30 Mar 2024 22:36:14 +0100\n",
+  "Received: from b.mx.secunet.com (62.96.220.37) by cas-essen-02.secunet.de\n",
+  " (10.53.40.202) with Microsoft SMTP Server (version=TLS1_2,\n",
+  " cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.37 via Frontend\n",
+  " Transport; Sat, 30 Mar 2024 22:36:14 +0100\n",
+  "Received: from localhost (localhost [127.0.0.1])\n",
+  "\tby b.mx.secunet.com (Postfix) with ESMTP id B4B9520322\n",
+  "\tfor <steffen.klassert\@secunet.com>; Sat, 30 Mar 2024 22:36:14 +0100 (CET)\n",
+  "X-Virus-Scanned: by secunet\n",
+  "X-Spam-Flag: NO\n",
+  "X-Spam-Score: -2.851\n",
+  "X-Spam-Level:\n",
+  "X-Spam-Status: No, score=-2.851 tagged_above=-999 required=2.1\n",
+  "\ttests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.1, DKIM_SIGNED=0.1,\n",
+  "\tDKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,\n",
+  "\tHEADER_FROM_DIFFERENT_DOMAINS=0.249, MAILING_LIST_MULTI=-1,\n",
+  "\tRCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001]\n",
+  "\tautolearn=unavailable autolearn_force=no\n",
+  "Authentication-Results: a.mx.secunet.com (amavisd-new);\n",
+  "\tdkim=pass (1024-bit key) header.d=redhat.com\n",
+  "Received: from b.mx.secunet.com ([127.0.0.1])\n",
+  "\tby localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024)\n",
+  "\twith ESMTP id bX0hQhQjf4l0 for <steffen.klassert\@secunet.com>;\n",
+  "\tSat, 30 Mar 2024 22:36:13 +0100 (CET)\n",
+  "Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=147.75.80.249; helo=am.mirrors.kernel.org; envelope-from=linux-kernel+bounces-125896-steffen.klassert=secunet.com\@vger.kernel.org; receiver=steffen.klassert\@secunet.com \n",
+  "DKIM-Filter: OpenDKIM Filter v2.11.0 b.mx.secunet.com 3DC7E2025D\n",
+  "Authentication-Results: b.mx.secunet.com;\n",
+  "\tdkim=pass (1024-bit key) header.d=redhat.com header.i=\@redhat.com header.b=\"JSkQ4rEh\"\n",
+  "Received: from am.mirrors.kernel.org (am.mirrors.kernel.org [147.75.80.249])\n",
+  "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n",
+  "\t(No client certificate requested)\n",
+  "\tby b.mx.secunet.com (Postfix) with ESMTPS id 3DC7E2025D\n",
+  "\tfor <steffen.klassert\@secunet.com>; Sat, 30 Mar 2024 22:36:13 +0100 (CET)\n",
+  "Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140])\n",
+  "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n",
+  "\t(No client certificate requested)\n",
+  "\tby am.mirrors.kernel.org (Postfix) with ESMTPS id B5FFC1F21DFE\n",
+  "\tfor <steffen.klassert\@secunet.com>; Sat, 30 Mar 2024 21:36:12 +0000 (UTC)\n",
+  "Received: from localhost.localdomain (localhost.localdomain [127.0.0.1])\n",
+  "\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 6933F52F70;\n",
+  "\tSat, 30 Mar 2024 21:35:46 +0000 (UTC)\n",
+  "Authentication-Results: smtp.subspace.kernel.org;\n",
+  "\tdkim=pass (1024-bit key) header.d=redhat.com header.i=\@redhat.com header.b=\"JSkQ4rEh\"\n",
+  "Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n",
+  "\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n",
+  "\t(No client certificate requested)\n",
+  "\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 047A91DFC6\n",
+  "\tfor <linux-kernel\@vger.kernel.org>; Sat, 30 Mar 2024 21:35:41 +0000 (UTC)\n",
+  "Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124\n",
+  "ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n",
+  "\tt=1711834543; cv=none; b=ccog+mZGdcIjlotH1ju2gIP+H8Ihe03fxFUhE4rASqbEAUuXyGOV6OARBR2a/ue+ukMJZEXif0R/51/PisvRQr7KCPTmLGbVNim/5k+zbSTPVubege281Lcw+fLzTw94RUeNV05FDMdKG9gJ1STLM78HBWz+k2BA+oTgfxL+gr4=\n",
+  "ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org;\n",
+  "\ts=arc-20240116; t=1711834543; c=relaxed/simple;\n",
+  "\tbh=A/4nTvH3zcKKDjwq9z7ISuECCM1K8A3A6bBgBipegtg=;\n",
+  "\th=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:\n",
+  "\t In-Reply-To:Content-Type; b=lhwggt1Q7u+PTm50rqr0jpiDnPgBOKmFdevuB0Q9wuPRK6pZlQjVmloy5qWWkfRebugKpr0MjH47ARrNBeWtvHItAi3pRPhVqijUjO808hQs7BY8FUd10N3j46QWLytQN4PXyGDaKzEluE33+JFzMmHh5S+lX3RvXHgXm81iPL8=\n",
+  "ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=\@redhat.com header.b=JSkQ4rEh; arc=none smtp.client-ip=170.10.133.124\n",
+  "Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com\n",
+  "Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com\n",
+  "DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n",
+  "\ts=mimecast20190719; t=1711834541;\n",
+  "\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n",
+  "\t to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n",
+  "\t content-transfer-encoding:content-transfer-encoding:\n",
+  "\t in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n",
+  "\tbh=k6nhJ/n2fVMLTJ5orSzZrSN05UZkFdn1WgbErq3l2Pk=;\n",
+  "\tb=JSkQ4rEhAmsVeZHuSYL5XgrgNAt13SHnq30WYpbBo6nFSIhiqf0vtKADsEKaBU6OpGVLpQ\n",
+  "\tQDX2PzilH9CaTqvHEj9l8ryQdEGf/Tgw6oCc+JpP/bBlFa90eiL40fMPrYKiSpY28VeuVr\n",
+  "\tI/R0WttkS5b3uVoyvz/AgBrsOKNpSuI=\n",
+  "Received: from mail-lf1-f70.google.com (mail-lf1-f70.google.com\n",
+  " [209.85.167.70]) by relay.mimecast.com with ESMTP with STARTTLS\n",
+  " (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n",
+  " us-mta-464-TulHzr_5OgWLCaLKMpfrXA-1; Sat, 30 Mar 2024 17:35:39 -0400\n",
+  "X-MC-Unique: TulHzr_5OgWLCaLKMpfrXA-1\n",
+  "Received: by mail-lf1-f70.google.com with SMTP id 2adb3069b0e04-515bbb9a73aso2292533e87.0\n",
+  "        for <linux-kernel\@vger.kernel.org>; Sat, 30 Mar 2024 14:35:39 -0700 (PDT)\n",
+  "X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;\n",
+  "        d=1e100.net; s=20230601; t=1711834538; x=1712439338;\n",
+  "        h=content-transfer-encoding:in-reply-to:autocrypt:content-language\n",
+  "         :from:references:cc:to:subject:user-agent:mime-version:date\n",
+  "         :message-id:x-gm-message-state:from:to:cc:subject:date:message-id\n",
+  "         :reply-to;\n",
+  "        bh=k6nhJ/n2fVMLTJ5orSzZrSN05UZkFdn1WgbErq3l2Pk=;\n",
+  "        b=GcPMMfkXq56SYLgMLVaoTFznA0YsHR7ZwCQhB1WbbcUB8I4+plNHYpzcbLzX8120s/\n",
+  "         juvL1k7m7nQJsH3N/8VmXi7m7PYGgyfc7VTDz0kAaDSInp0iELAxaUVR96e6XRBLgecz\n",
+  "         PwSqKfWTvSHaqUtv7ucJs88ESWF1/DuqfQxIg+fIL67zkZApg16yV0i5Bu6qgN8DxGGN\n",
+  "         A/vQUDCGbEwhedqbftl8w96+N7+oWk//sl9MuPUj++jQDFPdx92ae71gLPleWQUdD1Gd\n",
+  "         als/rv8D7OO/yZqscoZrJkTHSKzw7OgNuSyGHXdeTlU5gKeZGGGWThlyeOC/Jv+eyIN9\n",
+  "         gbOw==\n",
+  "X-Forwarded-Encrypted: i=1; AJvYcCUGbr2aAbIhSFLUwf7Rao2KTehNv26xGMI4cS8oD+mFauDsHLHhTXa5YQVcm2Iro4N8olHuxY5IjrBYPnYK5PjVTEu3Ed109f+BWbod\n",
+  "X-Gm-Message-State: AOJu0YzBxnxGLehy+JxKH/2lQLAaIRi40ZZbcTQkkw9JFwSEQKZ1yB02\n",
+  "\tc8jJDyMRPwzPX7S78f/cVwIp8r/+JtXelF3Rh/kIaauyKpCWs0P7lslRUKn0LfPRhXNwYbYOvkr\n",
+  "\tnmLxuXFk8otl8o8GKde2ds3nwKplUHqDWqrOW4TJArdl7Xy7mNp46ieTitGfjpg==\n",
+  "X-Received: by 2002:a19:2d18:0:b0:513:b062:98c4 with SMTP id k24-20020a192d18000000b00513b06298c4mr3643244lfj.11.1711834538172;\n",
+  "        Sat, 30 Mar 2024 14:35:38 -0700 (PDT)\n",
+  "X-Google-Smtp-Source: AGHT+IH5PGmEGHf24nUfF7B7vuwJRBVN0rKW1MZiU9RQdC6MVZb3TnEUgyIIaZghldmm9GaQfOSwZw==\n",
+  "X-Received: by 2002:a19:2d18:0:b0:513:b062:98c4 with SMTP id k24-20020a192d18000000b00513b06298c4mr3643226lfj.11.1711834537752;\n",
+  "        Sat, 30 Mar 2024 14:35:37 -0700 (PDT)\n",
+  "Received: from [192.168.10.4] ([151.95.49.219])\n",
+  "        by smtp.googlemail.com with ESMTPSA id w4-20020a1709062f8400b00a4e07f8b6bfsm3445434eji.59.2024.03.30.14.35.34\n",
+  "        (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n",
+  "        Sat, 30 Mar 2024 14:35:37 -0700 (PDT)\n",
+  "Message-ID: <00800f4b-5403-4416-b984-12b207362a19\@redhat.com>\n",
+  "Date: Sat, 30 Mar 2024 22:35:33 +0100\n",
+  "Precedence: bulk\n",
+  "X-Mailing-List: linux-kernel\@vger.kernel.org\n",
+  "List-Id: <linux-kernel.vger.kernel.org>\n",
+  "List-Subscribe: <mailto:linux-kernel+subscribe\@vger.kernel.org>\n",
+  "List-Unsubscribe: <mailto:linux-kernel+unsubscribe\@vger.kernel.org>\n",
+  "MIME-Version: 1.0\n",
+  "User-Agent: Mozilla Thunderbird\n",
+  "Subject: Re: [PATCH v12 24/29] KVM: SEV: Avoid WBINVD for HVA-based MMU\n",
+  " notifications for SNP\n",
+  "To: Michael Roth <michael.roth\@amd.com>, kvm\@vger.kernel.org\n",
+  "Cc: linux-coco\@lists.linux.dev, linux-mm\@kvack.org,\n",
+  " linux-crypto\@vger.kernel.org, x86\@kernel.org, linux-kernel\@vger.kernel.org,\n",
+  " tglx\@linutronix.de, mingo\@redhat.com, jroedel\@suse.de,\n",
+  " thomas.lendacky\@amd.com, hpa\@zytor.com, ardb\@kernel.org, seanjc\@google.com,\n",
+  " vkuznets\@redhat.com, jmattson\@google.com, luto\@kernel.org,\n",
+  " dave.hansen\@linux.intel.com, slp\@redhat.com, pgonda\@google.com,\n",
+  " peterz\@infradead.org, srinivas.pandruvada\@linux.intel.com,\n",
+  " rientjes\@google.com, dovmurik\@linux.ibm.com, tobin\@ibm.com, bp\@alien8.de,\n",
+  " vbabka\@suse.cz, kirill\@shutemov.name, ak\@linux.intel.com,\n",
+  " tony.luck\@intel.com, sathyanarayanan.kuppuswamy\@linux.intel.com,\n",
+  " alpergun\@google.com, jarkko\@kernel.org, ashish.kalra\@amd.com,\n",
+  " nikunj.dadhania\@amd.com, pankaj.gupta\@amd.com, liam.merwick\@oracle.com\n",
+  "References: <20240329225835.400662-1-michael.roth\@amd.com>\n",
+  " <20240329225835.400662-25-michael.roth\@amd.com>\n",
+  "From: Paolo Bonzini <pbonzini\@redhat.com>\n",
+  "Content-Language: en-US\n",
+  "Autocrypt: addr=pbonzini\@redhat.com; keydata=\n",
+  " xsEhBFRCcBIBDqDGsz4K0zZun3jh+U6Z9wNGLKQ0kSFyjN38gMqU1SfP+TUNQepFHb/Gc0E2\n",
+  " CxXPkIBTvYY+ZPkoTh5xF9oS1jqI8iRLzouzF8yXs3QjQIZ2SfuCxSVwlV65jotcjD2FTN04\n",
+  " hVopm9llFijNZpVIOGUTqzM4U55sdsCcZUluWM6x4HSOdw5F5Utxfp1wOjD/v92Lrax0hjiX\n",
+  " DResHSt48q+8FrZzY+AUbkUS+Jm34qjswdrgsC5uxeVcLkBgWLmov2kMaMROT0YmFY6A3m1S\n",
+  " P/kXmHDXxhe23gKb3dgwxUTpENDBGcfEzrzilWueOeUWiOcWuFOed/C3SyijBx3Av/lbCsHU\n",
+  " Vx6pMycNTdzU1BuAroB+Y3mNEuW56Yd44jlInzG2UOwt9XjjdKkJZ1g0P9dwptwLEgTEd3Fo\n",
+  " UdhAQyRXGYO8oROiuh+RZ1lXp6AQ4ZjoyH8WLfTLf5g1EKCTc4C1sy1vQSdzIRu3rBIjAvnC\n",
+  " tGZADei1IExLqB3uzXKzZ1BZ+Z8hnt2og9hb7H0y8diYfEk2w3R7wEr+Ehk5NQsT2MPI2QBd\n",
+  " wEv1/Aj1DgUHZAHzG1QN9S8wNWQ6K9DqHZTBnI1hUlkp22zCSHK/6FwUCuYp1zcAEQEAAc0j\n",
+  " UGFvbG8gQm9uemluaSA8cGJvbnppbmlAcmVkaGF0LmNvbT7CwU0EEwECACMFAlRCcBICGwMH\n",
+  " CwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRB+FRAMzTZpsbceDp9IIN6BIA0Ol7MoB15E\n",
+  " 11kRz/ewzryFY54tQlMnd4xxfH8MTQ/mm9I482YoSwPMdcWFAKnUX6Yo30tbLiNB8hzaHeRj\n",
+  " jx12K+ptqYbg+cevgOtbLAlL9kNgLLcsGqC2829jBCUTVeMSZDrzS97ole/YEez2qFpPnTV0\n",
+  " VrRWClWVfYh+JfzpXmgyhbkuwUxNFk421s4Ajp3d8nPPFUGgBG5HOxzkAm7xb1cjAuJ+oi/K\n",
+  " CHfkuN+fLZl/u3E/fw7vvOESApLU5o0icVXeakfSz0LsygEnekDbxPnE5af/9FEkXJD5EoYG\n",
+  " SEahaEtgNrR4qsyxyAGYgZlS70vkSSYJ+iT2rrwEiDlo31MzRo6Ba2FfHBSJ7lcYdPT7bbk9\n",
+  " AO3hlNMhNdUhoQv7M5HsnqZ6unvSHOKmReNaS9egAGdRN0/GPDWr9wroyJ65ZNQsHl9nXBqE\n",
+  " AukZNr5oJO5vxrYiAuuTSd6UI/xFkjtkzltG3mw5ao2bBpk/V/YuePrJsnPFHG7NhizrxttB\n",
+  " nTuOSCMo45pfHQ+XYd5K1+Cv/NzZFNWscm5htJ0HznY+oOsZvHTyGz3v91pn51dkRYN0otqr\n",
+  " bQ4tlFFuVjArBZcapSIe6NV8C4cEiSTOwE0EVEJx7gEIAMeHcVzuv2bp9HlWDp6+RkZe+vtl\n",
+  " KwAHplb/WH59j2wyG8V6i33+6MlSSJMOFnYUCCL77bucx9uImI5nX24PIlqT+zasVEEVGSRF\n",
+  " m8dgkcJDB7Tps0IkNrUi4yof3B3shR+vMY3i3Ip0e41zKx0CvlAhMOo6otaHmcxr35sWq1Jk\n",
+  " tLkbn3wG+fPQCVudJJECvVQ//UAthSSEklA50QtD2sBkmQ14ZryEyTHQ+E42K3j2IUmOLriF\n",
+  " dNr9NvE1QGmGyIcbw2NIVEBOK/GWxkS5+dmxM2iD4Jdaf2nSn3jlHjEXoPwpMs0KZsgdU0pP\n",
+  " JQzMUMwmB1wM8JxovFlPYrhNT9MAEQEAAcLBMwQYAQIACQUCVEJx7gIbDAAKCRB+FRAMzTZp\n",
+  " sadRDqCctLmYICZu4GSnie4lKXl+HqlLanpVMOoFNnWs9oRP47MbE2wv8OaYh5pNR9VVgyhD\n",
+  " OG0AU7oidG36OeUlrFDTfnPYYSF/mPCxHttosyt8O5kabxnIPv2URuAxDByz+iVbL+RjKaGM\n",
+  " GDph56ZTswlx75nZVtIukqzLAQ5fa8OALSGum0cFi4ptZUOhDNz1onz61klD6z3MODi0sBZN\n",
+  " Aj6guB2L/+2ZwElZEeRBERRd/uommlYuToAXfNRdUwrwl9gRMiA0WSyTb190zneRRDfpSK5d\n",
+  " usXnM/O+kr3Dm+Ui+UioPf6wgbn3T0o6I5BhVhs4h4hWmIW7iNhPjX1iybXfmb1gAFfjtHfL\n",
+  " xRUr64svXpyfJMScIQtBAm0ihWPltXkyITA92ngCmPdHa6M1hMh4RDX+Jf1fiWubzp1voAg0\n",
+  " JBrdmNZSQDz0iKmSrx8xkoXYfA3bgtFN8WJH2xgFL28XnqY4M6dLhJwV3z08tPSRqYFm4NMP\n",
+  " dRsn0/7oymhneL8RthIvjDDQ5ktUjMe8LtHr70OZE/TT88qvEdhiIVUogHdo4qBrk41+gGQh\n",
+  " b906Dudw5YhTJFU3nC6bbF2nrLlB4C/XSiH76ZvqzV0Z/cAMBo5NF/w=\n",
+  "In-Reply-To: <20240329225835.400662-25-michael.roth\@amd.com>\n",
+  "Content-Type: text/plain; charset=UTF-8; format=flowed\n",
+  "Content-Transfer-Encoding: 7bit\n",
+  "Return-Path: linux-kernel+bounces-125896-steffen.klassert=secunet.com\@vger.kernel.org\n",
+  "X-MS-Exchange-Organization-OriginalArrivalTime: 30 Mar 2024 21:36:14.6826\n",
+  " (UTC)\n",
+  "X-MS-Exchange-Organization-Network-Message-Id: 4110a7a6-c5e7-483a-949d-08dc51016d17\n",
+  "X-MS-Exchange-Organization-OriginalClientIPAddress: 62.96.220.37\n",
+  "X-MS-Exchange-Organization-OriginalServerIPAddress: 10.53.40.202\n",
+  "X-MS-Exchange-Organization-Cross-Premises-Headers-Processed: cas-essen-02.secunet.de\n",
+  "X-MS-Exchange-Organization-OrderedPrecisionLatencyInProgress: LSRV=mbx-dresden-01.secunet.de:TOTAL-HUB=0.411|SMR=0.340(SMRDE=0.035|SMRC=0.305(SMRCL=0.101|X-SMRCR=0.305))|CAT=0.070(CATOS=0.011\n",
+  " (CATSM=0.011(CATSM-Malware\n",
+  " Agent=0.011))|CATRESL=0.040(CATRESLP2R=0.036)|CATORES=0.015\n",
+  " (CATRS=0.015(CATRS-Index Routing Agent=0.014)));2024-03-30T21:36:15.157Z\n",
+  "X-MS-Exchange-Forest-ArrivalHubServer: mbx-dresden-01.secunet.de\n",
+  "X-MS-Exchange-Organization-AuthSource: cas-essen-02.secunet.de\n",
+  "X-MS-Exchange-Organization-AuthAs: Anonymous\n",
+  "X-MS-Exchange-Organization-FromEntityHeader: Internet\n",
+  "X-MS-Exchange-Organization-OriginalSize: 13777\n",
+  "X-MS-Exchange-Organization-HygienePolicy: Standard\n",
+  "X-MS-Exchange-Organization-MessageLatency: SRV=cas-essen-02.secunet.de:TOTAL-FE=0.064|SMR=0.023(SMRPI=0.020(SMRPI-FrontendProxyAgent=0.020))|SMS=0.040\n",
+  "X-MS-Exchange-Organization-AVStamp-Enterprise: 1.0\n",
+  "X-MS-Exchange-Organization-Recipient-Limit-Verified: True\n",
+  "X-MS-Exchange-Organization-TotalRecipientCount: 1\n",
+  "X-MS-Exchange-Organization-Rules-Execution-History: 0b0cf904-14ac-4724-8bdf-482ee6223cf2%%%fd34672d-751c-45ae-a963-ed177fcabe23%%%d8080257-b0c3-47b4-b0db-23bc0c8ddb3c%%%95e591a2-5d7d-4afa-b1d0-7573d6c0a5d9%%%f7d0f6bc-4dcc-4876-8c5d-b3d6ddbb3d55%%%16355082-c50b-4214-9c7d-d39575f9f79b\n",
+  "X-MS-Exchange-Forest-RulesExecuted: mbx-dresden-01\n",
+  "X-MS-Exchange-Organization-RulesExecuted: mbx-dresden-01\n",
+  "X-MS-Exchange-Forest-IndexAgent-0: AQ0CZW4AAYEEAAAPAAADH4sIAAAAAAAEAI1UW2/bNhQ+si35EjvBmh\n",
+  " Yb+jCcvjmJL7nHSYMg3cNQYMhWtNv6MAwGLVEWUYkyRNmJt/yG/eYd\n",
+  " koovg7ONoGWS5zvfuZJ/NX+SeNI/vuwfn+LxydXZoIN3wo8Yj/Fjmk\n",
+  " d4n6U5v2o1bvD7LE2u8J2KhIrwBxZnDK+Z2fW+6N0tS4KenyY3BNb4\n",
+  " z4LUP/34oT+ecpUPE56EQQcnmZixnPe59LP5JOcBkiDN5qiidBoHKN\n",
+  " McRxwTNpmwUcw7monJAO/uftEyEQqf5SKVCsM0w/e/vutq6JLmXsQx\n",
+  " pjKea5aMx3zGZI55qnmmcmnVOFUo9fDniGecCHkH84j0jAkWcyKJBF\n",
+  " kXSk2FHCPTNPcjIWfBMJVDFsdDfzJV7T0UEhWfDRexEu0w437MRMID\n",
+  " kq+ER/7Gc02kI6AEWV+UCdNnUjsuxpKcCXpFKj/RngfdNAy7o/n/rQ\n",
+  " H+lgQZgYMAVZpwJF+ylfSRwwRMRP77BgtrLXCd2F2PWiFasdBqfOQz\n",
+  " we9JT+t8YGmc4nep/ENIgdeTkV3dUhwRyxc6N9jtdvUfIsv8qP8wOO\n",
+  " 9/mSV9pX981vPxES/xoBgF8ghDQdUgN+SYUxcNyH3FMxNJ+2CvQ4CA\n",
+  " aq337e5ekbVAhCEZGwtKef8ZW6NnBFqfCs8f8OQoPA9PLwbnZ4cnvd\n",
+  " 4JHwT8wh+d+INLPDo8PD89LUJ61oaWUyT/aur2FrvHlxdnnQs8MP9H\n",
+  " p/pM5VQsH2epCEx3hfFURcNFEw8nbMzbKs+mfo7EOZxRM+K+/nas0v\n",
+  " 6MPWUDlzTPNOmSCPfps2e1/jTxoR4ixPabBUFbYwzowEj7+8s17i+u\n",
+  " /8GYDP33vR/xNe2pzDijctMTgDPBzK2MZqw7YkqrJtPiMeCZ6ukWF/\n",
+  " bCxvPOGo2+YSpi1ILdm8IDzDMmVWxvQQff9z/TPdDXX/rF68Glmmbr\n",
+  " 7oQio9fCvhnM97lS9KQYp3QJ8N6E4MecZZhOCSLnyB+EyunNWOMJRJ\n",
+  " bPyd5EcIVpSAwspzvvRzwWkvdWsf3lZkPe8fHRlFLJyT+rsT4ynk8z\n",
+  " +XbRBHpsesDe6rvZagCUoOw4ULUTSrQtOWUXwIVqFWoVcF1oVMDzoE\n",
+  " onngMv9cIrQ6UMWySlhevAFngWX4cGIWnSOVHVoGWQlRZs64UDDahY\n",
+  " AOnSNJh6CbwtaLraCjFsEdLyEKEDLhl9AVVC0nnFLhx4TXaNV3VoWn\n",
+  " Mu1K0tu7UOVGGH1FuFP5VNUZCWa5jdbdghFQ+2VlVMEryqVqnZeMtQ\n",
+  " q+mQyW3tQxXqtN2FurG7+4QppuNUHADH+Up/oUTSqlO364azYxc1eF\n",
+  " Ex5ixgTR1Kmw6pKF4TtptOywPwYHsTpr7h0Knpyjqecalk1yXdA56t\n",
+  " CCX2GxNUXRfd1RE5UNPJ8ewsQdPCVvLfMIGToVclI6obURm+rRSJ9V\n",
+  " YbowQ7VOvCpSWYKr7VhNemfDXCN01QNJ882XV1j3neshNce2KpavBq\n",
+  " ISVRHd6sO1Mr65pWysX2aw9ervXV3xVfMWkZCQAAAQrBAzw/eG1sIH\n",
+  " ZlcnNpb249IjEuMCIgZW5jb2Rpbmc9InV0Zi0xNiI/Pg0KPEVtYWls\n",
+  " U2V0Pg0KICA8VmVyc2lvbj4xNS4wLjAuMDwvVmVyc2lvbj4NCiAgPE\n",
+  " VtYWlscz4NCiAgICA8RW1haWwgU3RhcnRJbmRleD0iNjEiPg0KICAg\n",
+  " ICAgPEVtYWlsU3RyaW5nPmFzaGlzaC5rYWxyYUBhbWQuY29tPC9FbW\n",
+  " FpbFN0cmluZz4NCiAgICA8L0VtYWlsPg0KICAgIDxFbWFpbCBTdGFy\n",
+  " dEluZGV4PSI1NDciIFBvc2l0aW9uPSJPdGhlciI+DQogICAgICA8RW\n",
+  " 1haWxTdHJpbmc+bWljaGFlbC5yb3RoQGFtZC5jb208L0VtYWlsU3Ry\n",
+  " aW5nPg0KICAgIDwvRW1haWw+DQogICAgPEVtYWlsIFN0YXJ0SW5kZX\n",
+  " g9IjYwMCIgUG9zaXRpb249Ik90aGVyIj4NCiAgICAgIDxFbWFpbFN0\n",
+  " cmluZz5wYm9uemluaUByZWRoYXQuY29tPC9FbWFpbFN0cmluZz4NCi\n",
+  " AgICA8L0VtYWlsPg0KICA8L0VtYWlscz4NCjwvRW1haWxTZXQ+AQ7O\n",
+  " AVJldHJpZXZlck9wZXJhdG9yLDEwLDA7UmV0cmlldmVyT3BlcmF0b3\n",
+  " IsMTEsMTtQb3N0RG9jUGFyc2VyT3BlcmF0b3IsMTAsMDtQb3N0RG9j\n",
+  " UGFyc2VyT3BlcmF0b3IsMTEsMDtQb3N0V29yZEJyZWFrZXJEaWFnbm\n",
+  " 9zdGljT3BlcmF0b3IsMTAsMDtQb3N0V29yZEJyZWFrZXJEaWFnbm9z\n",
+  " dGljT3BlcmF0b3IsMTEsMDtUcmFuc3BvcnRXcml0ZXJQcm9kdWNlci wyMCw3\n",
+  "X-MS-Exchange-Forest-IndexAgent: 1 1827\n",
+  "X-MS-Exchange-Forest-EmailMessageHash: A196860A\n",
+  "X-MS-Exchange-Forest-Language: en\n",
+  "X-MS-Exchange-Organization-Processed-By-Journaling: Journal Agent\n",
+  "\n",
   "On 3/29/24 23:58, Michael Roth wrote:\n",
   "> From: Ashish Kalra <ashish.kalra\@amd.com>\n",
   "> \n",
@@ -102,4 +691,4 @@
   ">   \twbinvd_on_all_cpus();"
 ]
 
-22a204b496adc11afbd0076320671868fab7b410940cf2c9f303646f95abad3d
+6b6858c7909467d3ded3cc917614578ed22d1d5f17adcf1875123d0875a92923

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.