Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1362757pxf; Fri, 2 Apr 2021 08:29:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx65DAP25aRUsol8iGEJM1Ls6voJfldS5InuxMO1HrXqB8mw8rudX53j4PuDO/mxgDCXiQC X-Received: by 2002:a05:6e02:1246:: with SMTP id j6mr11107331ilq.27.1617377392667; Fri, 02 Apr 2021 08:29:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617377392; cv=none; d=google.com; s=arc-20160816; b=oXDQFTrEtJax39t7rtuL5J7szYmVA7JTQj71uwZsBgNbInNCLUB92zzNHPNkAkjBSN GEC86G7mgl0RcZPmsngUjhNxLZ5OjMEcSyRnNgm459RvHmsxG7Y2/QSSvYc8f3EW/aKx SNmRBBspnR24fRn3TVlcoIyqp0bFG2oZn8FTxQT+0EE71mpHnao2K1ixqk0b94ctARqh F0M5CgR3FcdEPxMuU/1M4JWkiZZRl9ebAd6xplQyf+75INb052pyGhjRM1HkLOJK4P8u 5ZNj+G6ZdmvDD/mk+9uXAdBGHU62yfv8mdZzPqzoPuDRTlF51EiI2IdIkywCJlGPhE9I NHWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=NRukntRqIH9oIHyEudEHW0ud1MS+kv1ItAvshsRDqdY=; b=IP6AFHJHL4AFe3U3OwGKgRCoSnvAk4iWe98aQ9yFHvMuUpLulpklbsVC5HoSQhxQG6 5UldO1c3fJnwPWis3Kcf6qfG5sV863PmWDBI/k57zbWHRhJO905WsoLXtFhDSVOttdq1 y5qtpHaQ8MXxS409GJ0nXCn/p1g/filiVNFZh4Tl3PpQuR3LYmNGaRL00k8sW3VD7u/h jgEXdSh6t4lAfGseuaoKfRDvM6Gy3zwZVyMr3aiTifddkWXweY5rbmE7JFE5jKU8Hvhe vztxAlUYDRgdpZw3tJEr6oyjSa4BDPPDfQvL/OwWagkH4nnS9SAaKHMGoufLz4UkxcHJ Kang== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@shutemov-name.20150623.gappssmtp.com header.s=20150623 header.b=OpnsWKAM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e25si7649625ioh.3.2021.04.02.08.29.38; Fri, 02 Apr 2021 08:29:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@shutemov-name.20150623.gappssmtp.com header.s=20150623 header.b=OpnsWKAM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236410AbhDBP1S (ORCPT + 99 others); Fri, 2 Apr 2021 11:27:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58534 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235902AbhDBP1D (ORCPT ); Fri, 2 Apr 2021 11:27:03 -0400 Received: from mail-lf1-x12a.google.com (mail-lf1-x12a.google.com [IPv6:2a00:1450:4864:20::12a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 09E91C0613A5 for ; Fri, 2 Apr 2021 08:27:02 -0700 (PDT) Received: by mail-lf1-x12a.google.com with SMTP id v15so8064806lfq.5 for ; Fri, 02 Apr 2021 08:27:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shutemov-name.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=NRukntRqIH9oIHyEudEHW0ud1MS+kv1ItAvshsRDqdY=; b=OpnsWKAM4VA/3UajjTCQJv0IEmv/0iPE0cJ2j+RQr1BHXgXYYceO6wtUvATOrb8yhE ROIE0NF0cuH3XzqzsGoFP1JH5Z9yBF0PahBLj0EICTqrjAVYZO4E2fXsJt2FgeUg/8U9 ZRGRbz90+MPk3bQ4bB+VUAa43wHu4myuLLxb01b9PPkMBQm771dpsGaPFoITfHu7WFsv iM0kGJIR3O5KSYl9ajKvDg7zS0KcRszn2eh6ZuRc4lo67X7SLMiHDVAUTOAF6p4iwgt+ WdofJyWwhCixbMTTAehF+H2czWQ42ICOYt0u0Kz7T8yHx9byTn7DeA7quwp3YYB0vhrh bE7A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=NRukntRqIH9oIHyEudEHW0ud1MS+kv1ItAvshsRDqdY=; b=jCFBthmqsoy48q1xGaHxGbfE5R59XjKpiTe5A1P41nEsGnXU0hGQL5xe8vmaWa/J7j c1RVJfUWNzY0au6xXQhD8rPCozZuRLWEFw6pMpBiusJ8HIt+VQuLcjGVcNzQekAPJ4rr IwUpr2d2SZJmFDwjXJo04kUwTz84rSjavEknE8H5cfVpoKROxA3PRoCOMefP8/PBXPA6 itdf0K7AT/lqQafgDRzFdVUTO85kFWu5ZQmP4Yhl2a9oQE0MoKoWTQLMmSLtyTFXAWUO 081sPFVWHKfm2ake5FvObrSJtFLWwrh4vcFIrixymLl5hl7OBbLN0EHfUAprdWzqpwyR rm3Q== X-Gm-Message-State: AOAM5319D+aTCiaIJy/bcMo9nAfA3e6ipNDz0U0/T6FbB4PsPqrX0On4 ijyOJZqfj5bEXs2+sQNHMdTKnQ== X-Received: by 2002:a19:b49:: with SMTP id 70mr9524337lfl.342.1617377220450; Fri, 02 Apr 2021 08:27:00 -0700 (PDT) Received: from box.localdomain ([86.57.175.117]) by smtp.gmail.com with ESMTPSA id w23sm953636lji.127.2021.04.02.08.26.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 02 Apr 2021 08:26:59 -0700 (PDT) From: "Kirill A. Shutemov" X-Google-Original-From: "Kirill A. Shutemov" Received: by box.localdomain (Postfix, from userid 1000) id 4E65C102678; Fri, 2 Apr 2021 18:26:59 +0300 (+03) To: Dave Hansen , Andy Lutomirski , Peter Zijlstra , Sean Christopherson , Jim Mattson Cc: David Rientjes , "Edgecombe, Rick P" , "Kleen, Andi" , "Yamahata, Isaku" , x86@kernel.org, kvm@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: [RFCv1 6/7] x86/realmode: Share trampoline area if KVM memory protection enabled Date: Fri, 2 Apr 2021 18:26:44 +0300 Message-Id: <20210402152645.26680-7-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.26.3 In-Reply-To: <20210402152645.26680-1-kirill.shutemov@linux.intel.com> References: <20210402152645.26680-1-kirill.shutemov@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If KVM memory protection is active, the trampoline area will need to be in shared memory. Signed-off-by: Kirill A. Shutemov --- arch/x86/realmode/init.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/arch/x86/realmode/init.c b/arch/x86/realmode/init.c index 22fda7d99159..f3b54b5da693 100644 --- a/arch/x86/realmode/init.c +++ b/arch/x86/realmode/init.c @@ -10,6 +10,7 @@ #include #include #include +#include struct real_mode_header *real_mode_header; u32 *trampoline_cr4_features; @@ -75,11 +76,11 @@ static void __init setup_real_mode(void) base = (unsigned char *)real_mode_header; /* - * If SME is active, the trampoline area will need to be in - * decrypted memory in order to bring up other processors + * If SME or KVM memory protection is active, the trampoline area will + * need to be in decrypted memory in order to bring up other processors * successfully. This is not needed for SEV. */ - if (sme_active()) + if (sme_active() || kvm_mem_protected()) set_memory_decrypted((unsigned long)base, size >> PAGE_SHIFT); memcpy(base, real_mode_blob, size); -- 2.26.3