Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2576542pxb; Tue, 13 Apr 2021 05:27:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxwtOJ1PFqIHMyeCLkLvDq7xnWHJW42ImAi0JdZRi1itRP0WOF/ox75ihfeyKNG5Lfr5p9c X-Received: by 2002:a17:906:98c1:: with SMTP id zd1mr11751299ejb.447.1618316842584; Tue, 13 Apr 2021 05:27:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618316842; cv=none; d=google.com; s=arc-20160816; b=hp7Rs1AvzQiF7BkVx7AFT11oMZKGooNdV7dD4Ta5AOG5Gqv56ZZwWjxhHvQDNr6a11 j4EgFv88qxB+qwQ90xLeTwbliiLxjQmfRnILElJoLVnTQ7+piqNb4ulOMyR0j6t62GYu +SasukNfiHCmPCiDMK68BYpHVRqyZatsCXh28vknfUtwB8DHH3xA7c3MMTfw+KelCg/O sYzJ0hE9XPSEoG5Ylm7P0mcIY5PAFZazl6HFxC7dvdmbybCwbmjM/rKYBT14GdROSAmu lWkowkiG+ukzdNM0EO+uqaqc9o6FH41VhgF6wR3nQqNbDuaXOLS5T8ohGDpW1zH9p6uC Rmyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Wi5y58NXhaqWJqCu7rykbp59hRwnukVU5T9tEJRybe8=; b=ggoyk/5lWeQqhRFvHjsrqbJCezRXIl9BQez06LxrNiS1wZ/stI3yWeXfNAVllKcj0y xrNgXiKD0/7XkA0PJoQP5Jfi+9pK+hFYHiUsUp5emik7myyZ/P96B8Wq9BBnVbcfP3E0 tKnqFlTUFUQJg17udbtEtuvTbtP6RX7LGGrb1f3I2Vk2nxsvtsPX9DK/+oUoAi2Iqpf7 MqgYcVE6SbP/MDEZGbWGPvrKeORC6EaDmQYvXN98vS0Cfr12d0daT1EUB0YjQQjZA82G nFW5u49yx+wHki9ZVKQcchZzNEX844ts3loo9WqSBoDEa+zukOQRZKmscP9MQ1Y6VQts dsVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=iFgUEbfk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l29si10835832edj.393.2021.04.13.05.26.58; Tue, 13 Apr 2021 05:27:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=iFgUEbfk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239728AbhDMAHS (ORCPT + 99 others); Mon, 12 Apr 2021 20:07:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40558 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238214AbhDMAHR (ORCPT ); Mon, 12 Apr 2021 20:07:17 -0400 Received: from mail-il1-x12e.google.com (mail-il1-x12e.google.com [IPv6:2607:f8b0:4864:20::12e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D94C3C061574 for ; Mon, 12 Apr 2021 17:06:58 -0700 (PDT) Received: by mail-il1-x12e.google.com with SMTP id e14so1302991ils.12 for ; Mon, 12 Apr 2021 17:06:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Wi5y58NXhaqWJqCu7rykbp59hRwnukVU5T9tEJRybe8=; b=iFgUEbfkuYGLYjek/vn6OyGcvRT0ASn89ADFGms+ENBK1UIlXIktEm3dG3Ak1YWvre wM+rCeo2ePfcJJ2APzALUB//X/vSC0ytlevnrHT6ojYCQiLUujeUvujyCXAbky+hZnZH 0DUwx5fDjSzBvVhAAJWnhISC+XMFM8fUuL3xvqRd5v6jQ/UxU2O2FBc2ok2gKhMKKaaC CtcnjJNQjtBQrJJppmgTrU4nf6Wy3bf3AvK1s4ZRP/+gqEE1ishwESM+4lSu4ufXbw3I rRy9TW+e0jg0fKQV87RWUfztjyaGtIUKUVhd4fEpI4pBL81KnTy83nRlRiayZA2pvWlI S/UQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Wi5y58NXhaqWJqCu7rykbp59hRwnukVU5T9tEJRybe8=; b=qeQo7d1wkHq0RuOWvDXVWLZkGB1a/BWZyBaJYglVupfX04/Sacex+wWct8B84q0Zcv kn05AV8VirK3wwznGKH5mJhHdFIHcWDTmWyLfXbawg6eAMdaFE1LcOEwvRanuIg/UHdp hQKTpRpFi0x+rgonv2K4WwD4V+fpKPsAZJ4TGzhMX8JFVb5fU3ZwF+ddd+TG/0P5zD/D WWMdyqK9K6Z2tzRWeGvlr9HYIc1pNN0m6VNWiXEaZdFLPFMHUWr4twvYrF7fXFNlisb3 oo+AwsKXNYw49WQkg9AjNklufBVWWfMkoRLbMfu/R2mpb8UO2vD8V3bjwUJM1spzIupQ HOeg== X-Gm-Message-State: AOAM533sMOAD7EuL17qYzwZngFoKMh4lFFEs6Pugg62/yrN9OxY2c1yq XO+3IUbt9dP3T6OcL7fiRK45ZhMDcHuIj6ZjbV6Q3g== X-Received: by 2002:a05:6e02:1e08:: with SMTP id g8mr25434450ila.176.1618272418171; Mon, 12 Apr 2021 17:06:58 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Steve Rutherford Date: Mon, 12 Apr 2021 17:06:21 -0700 Message-ID: Subject: Re: [PATCH v12 09/13] mm: x86: Invoke hypercall when page encryption status is changed To: Ashish Kalra Cc: Paolo Bonzini , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Joerg Roedel , Borislav Petkov , Tom Lendacky , X86 ML , KVM list , LKML , Sean Christopherson , Venu Busireddy , Brijesh Singh Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 12, 2021 at 12:45 PM Ashish Kalra wrote: > > From: Brijesh Singh > > Invoke a hypercall when a memory region is changed from encrypted -> > decrypted and vice versa. Hypervisor needs to know the page encryption > status during the guest migration. > > Cc: Thomas Gleixner > Cc: Ingo Molnar > Cc: "H. Peter Anvin" > Cc: Paolo Bonzini > Cc: Joerg Roedel > Cc: Borislav Petkov > Cc: Tom Lendacky > Cc: x86@kernel.org > Cc: kvm@vger.kernel.org > Cc: linux-kernel@vger.kernel.org > Reviewed-by: Venu Busireddy > Signed-off-by: Brijesh Singh > Signed-off-by: Ashish Kalra > --- > arch/x86/include/asm/paravirt.h | 10 +++++ > arch/x86/include/asm/paravirt_types.h | 2 + > arch/x86/kernel/paravirt.c | 1 + > arch/x86/mm/mem_encrypt.c | 57 ++++++++++++++++++++++++++- > arch/x86/mm/pat/set_memory.c | 7 ++++ > 5 files changed, 76 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/include/asm/paravirt.h b/arch/x86/include/asm/paravirt.h > index 4abf110e2243..efaa3e628967 100644 > --- a/arch/x86/include/asm/paravirt.h > +++ b/arch/x86/include/asm/paravirt.h > @@ -84,6 +84,12 @@ static inline void paravirt_arch_exit_mmap(struct mm_struct *mm) > PVOP_VCALL1(mmu.exit_mmap, mm); > } > > +static inline void page_encryption_changed(unsigned long vaddr, int npages, > + bool enc) > +{ > + PVOP_VCALL3(mmu.page_encryption_changed, vaddr, npages, enc); > +} > + > #ifdef CONFIG_PARAVIRT_XXL > static inline void load_sp0(unsigned long sp0) > { > @@ -799,6 +805,10 @@ static inline void paravirt_arch_dup_mmap(struct mm_struct *oldmm, > static inline void paravirt_arch_exit_mmap(struct mm_struct *mm) > { > } > + > +static inline void page_encryption_changed(unsigned long vaddr, int npages, bool enc) > +{ > +} > #endif > #endif /* __ASSEMBLY__ */ > #endif /* _ASM_X86_PARAVIRT_H */ > diff --git a/arch/x86/include/asm/paravirt_types.h b/arch/x86/include/asm/paravirt_types.h > index de87087d3bde..69ef9c207b38 100644 > --- a/arch/x86/include/asm/paravirt_types.h > +++ b/arch/x86/include/asm/paravirt_types.h > @@ -195,6 +195,8 @@ struct pv_mmu_ops { > > /* Hook for intercepting the destruction of an mm_struct. */ > void (*exit_mmap)(struct mm_struct *mm); > + void (*page_encryption_changed)(unsigned long vaddr, int npages, > + bool enc); > > #ifdef CONFIG_PARAVIRT_XXL > struct paravirt_callee_save read_cr2; > diff --git a/arch/x86/kernel/paravirt.c b/arch/x86/kernel/paravirt.c > index c60222ab8ab9..9f206e192f6b 100644 > --- a/arch/x86/kernel/paravirt.c > +++ b/arch/x86/kernel/paravirt.c > @@ -335,6 +335,7 @@ struct paravirt_patch_template pv_ops = { > (void (*)(struct mmu_gather *, void *))tlb_remove_page, > > .mmu.exit_mmap = paravirt_nop, > + .mmu.page_encryption_changed = paravirt_nop, > > #ifdef CONFIG_PARAVIRT_XXL > .mmu.read_cr2 = __PV_IS_CALLEE_SAVE(native_read_cr2), > diff --git a/arch/x86/mm/mem_encrypt.c b/arch/x86/mm/mem_encrypt.c > index ae78cef79980..fae9ccbd0da7 100644 > --- a/arch/x86/mm/mem_encrypt.c > +++ b/arch/x86/mm/mem_encrypt.c > @@ -19,6 +19,7 @@ > #include > #include > #include > +#include > > #include > #include > @@ -29,6 +30,7 @@ > #include > #include > #include > +#include > > #include "mm_internal.h" > > @@ -229,6 +231,47 @@ void __init sev_setup_arch(void) > swiotlb_adjust_size(size); > } > > +static void set_memory_enc_dec_hypercall(unsigned long vaddr, int npages, > + bool enc) > +{ > + unsigned long sz = npages << PAGE_SHIFT; > + unsigned long vaddr_end, vaddr_next; > + > + vaddr_end = vaddr + sz; > + > + for (; vaddr < vaddr_end; vaddr = vaddr_next) { > + int psize, pmask, level; > + unsigned long pfn; > + pte_t *kpte; > + > + kpte = lookup_address(vaddr, &level); > + if (!kpte || pte_none(*kpte)) > + return; > + > + switch (level) { > + case PG_LEVEL_4K: > + pfn = pte_pfn(*kpte); > + break; > + case PG_LEVEL_2M: > + pfn = pmd_pfn(*(pmd_t *)kpte); > + break; > + case PG_LEVEL_1G: > + pfn = pud_pfn(*(pud_t *)kpte); > + break; > + default: > + return; > + } > + > + psize = page_level_size(level); > + pmask = page_level_mask(level); > + > + kvm_sev_hypercall3(KVM_HC_PAGE_ENC_STATUS, > + pfn << PAGE_SHIFT, psize >> PAGE_SHIFT, enc); > + > + vaddr_next = (vaddr & pmask) + psize; > + } > +} > + > static void __init __set_clr_pte_enc(pte_t *kpte, int level, bool enc) > { > pgprot_t old_prot, new_prot; > @@ -286,12 +329,13 @@ static void __init __set_clr_pte_enc(pte_t *kpte, int level, bool enc) > static int __init early_set_memory_enc_dec(unsigned long vaddr, > unsigned long size, bool enc) > { > - unsigned long vaddr_end, vaddr_next; > + unsigned long vaddr_end, vaddr_next, start; > unsigned long psize, pmask; > int split_page_size_mask; > int level, ret; > pte_t *kpte; > > + start = vaddr; > vaddr_next = vaddr; > vaddr_end = vaddr + size; > > @@ -346,6 +390,8 @@ static int __init early_set_memory_enc_dec(unsigned long vaddr, > > ret = 0; > > + set_memory_enc_dec_hypercall(start, PAGE_ALIGN(size) >> PAGE_SHIFT, > + enc); > out: > __flush_tlb_all(); > return ret; > @@ -481,6 +527,15 @@ void __init mem_encrypt_init(void) > if (sev_active() && !sev_es_active()) > static_branch_enable(&sev_enable_key); > > +#ifdef CONFIG_PARAVIRT > + /* > + * With SEV, we need to make a hypercall when page encryption state is > + * changed. > + */ > + if (sev_active()) > + pv_ops.mmu.page_encryption_changed = set_memory_enc_dec_hypercall; > +#endif > + > print_mem_encrypt_feature_info(); > } > > diff --git a/arch/x86/mm/pat/set_memory.c b/arch/x86/mm/pat/set_memory.c > index 16f878c26667..3576b583ac65 100644 > --- a/arch/x86/mm/pat/set_memory.c > +++ b/arch/x86/mm/pat/set_memory.c > @@ -27,6 +27,7 @@ > #include > #include > #include > +#include > > #include "../mm_internal.h" > > @@ -2012,6 +2013,12 @@ static int __set_memory_enc_dec(unsigned long addr, int numpages, bool enc) > */ > cpa_flush(&cpa, 0); > > + /* Notify hypervisor that a given memory range is mapped encrypted > + * or decrypted. The hypervisor will use this information during the > + * VM migration. > + */ > + page_encryption_changed(addr, numpages, enc); > + > return ret; > } > > -- > 2.17.1 > Reviewed-by: Steve Rutherford