Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp3861967pxt; Tue, 10 Aug 2021 13:10:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJySChtpTYrYGj/9xjeGzSWNbx2RP+GNVPr9L5F/jzJ7jb+A2QLa0ugEk7q4nLKakZI4x+vm X-Received: by 2002:a6b:c895:: with SMTP id y143mr391562iof.74.1628626238576; Tue, 10 Aug 2021 13:10:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628626238; cv=none; d=google.com; s=arc-20160816; b=zL8QdYhDEW1eHI/pmBTcAaaNO6PN32xkyAxVbBvOsknoto4Py0tvCHX3rs17KiRRib Nk/LFiYeTpLopsDcTzCzlH2+k9bnISplcg85c0ljBhFsbcWkDi9midlRmfdUPYf0+0ND yfR2HuMpwFlbVPVOffd7dhd1gTyf7kwCMpSguM86cDSS5l3oYPobVkZ/H85kItMnKEy0 LjCXGrzKKCbm1c1p3lq4Fxyh3ghjvndGpQk6HKeJbkioCur8Wb4w8cgGQ42WkpAsfAWo wcbiwLnaUivGBc/1IQWQXYp/PbNRB6tbmJVc9yfj/njlfMaiPBC19F6lkK+9kKEagDwJ G4BQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=NTqRrWRFEw/Rgv5Z59+Mtc1iJ6yQaIegvAOgbmJ1QWs=; b=aMSG+FO1yIqPF7ZFSvOcJ3uBSgzJT50roy2qY+63Supo9UHin0ukIk2dqcRTCMyd3Q kXvmuBoWkm5KzJEnFocMN/QbTdosXSUQZgEk6WHJ73N/FxsEvl8tlQo8soQPUDhaXQ2p W+KTUC57hdcSNcKpE9yoJ4SiJ72v5JyNSHbo/TZ0YsL03ejzEGhEOvE9s9zRMvE9txHP MmoiR4c0WdwBbapi6epHKD55CEIDuTL/6EHYvdOa0cwZGNt2B8BPZSqFqAFJnJOn0nuJ nKGqUtw8bl6msVXMe0xha0XfFuIB+qhIDtR65Xi3Ir3VFGeDf3wW5AkP5uIP0ATojuge oVEA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f21si2303871iow.30.2021.08.10.13.10.24; Tue, 10 Aug 2021 13:10:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232860AbhHJUJa (ORCPT + 99 others); Tue, 10 Aug 2021 16:09:30 -0400 Received: from mga18.intel.com ([134.134.136.126]:55710 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229788AbhHJUJa (ORCPT ); Tue, 10 Aug 2021 16:09:30 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10072"; a="202152493" X-IronPort-AV: E=Sophos;i="5.84,310,1620716400"; d="scan'208";a="202152493" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Aug 2021 13:09:06 -0700 X-IronPort-AV: E=Sophos;i="5.84,310,1620716400"; d="scan'208";a="515971399" Received: from pdmuelle-desk2.amr.corp.intel.com (HELO skuppusw-mobl5.amr.corp.intel.com) ([10.213.166.202]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Aug 2021 13:09:05 -0700 Subject: Re: [PATCH 07/11] treewide: Replace the use of mem_encrypt_active() with prot_guest_has() To: Tom Lendacky , linux-kernel@vger.kernel.org, x86@kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, iommu@lists.linux-foundation.org, kvm@vger.kernel.org, linux-efi@vger.kernel.org, platform-driver-x86@vger.kernel.org, linux-graphics-maintainer@vmware.com, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, kexec@lists.infradead.org, linux-fsdevel@vger.kernel.org Cc: Borislav Petkov , Brijesh Singh , Joerg Roedel , Andi Kleen , Tianyu Lan , Thomas Gleixner , Ingo Molnar , Dave Hansen , Andy Lutomirski , Peter Zijlstra , David Airlie , Daniel Vetter , Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , Will Deacon , Dave Young , Baoquan He , "Kirill A. Shutemov" References: <029791b24c6412f9427cfe6ec598156c64395964.1627424774.git.thomas.lendacky@amd.com> <166f30d8-9abb-02de-70d8-6e97f44f85df@linux.intel.com> <4b885c52-f70a-147e-86bd-c71a8f4ef564@amd.com> From: "Kuppuswamy, Sathyanarayanan" Message-ID: <4f9effcb-055b-51ee-6722-c9f0cc1d8acf@linux.intel.com> Date: Tue, 10 Aug 2021 13:09:02 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <4b885c52-f70a-147e-86bd-c71a8f4ef564@amd.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/10/21 12:48 PM, Tom Lendacky wrote: > On 8/10/21 1:45 PM, Kuppuswamy, Sathyanarayanan wrote: >> >> >> On 7/27/21 3:26 PM, Tom Lendacky wrote: >>> diff --git a/arch/x86/kernel/head64.c b/arch/x86/kernel/head64.c >>> index de01903c3735..cafed6456d45 100644 >>> --- a/arch/x86/kernel/head64.c >>> +++ b/arch/x86/kernel/head64.c >>> @@ -19,7 +19,7 @@ >>>   #include >>>   #include >>>   #include >>> -#include >>> +#include >>>   #include >>>     #include >>> @@ -285,7 +285,7 @@ unsigned long __head __startup_64(unsigned long >>> physaddr, >>>        * there is no need to zero it after changing the memory encryption >>>        * attribute. >>>        */ >>> -    if (mem_encrypt_active()) { >>> +    if (prot_guest_has(PATTR_MEM_ENCRYPT)) { >>>           vaddr = (unsigned long)__start_bss_decrypted; >>>           vaddr_end = (unsigned long)__end_bss_decrypted; >> >> >> Since this change is specific to AMD, can you replace PATTR_MEM_ENCRYPT with >> prot_guest_has(PATTR_SME) || prot_guest_has(PATTR_SEV). It is not used in >> TDX. > > This is a direct replacement for now. I think the change you're requesting > should be done as part of the TDX support patches so it's clear why it is > being changed. Ok. I will include it part of TDX changes. > > But, wouldn't TDX still need to do something with this shared/unencrypted > area, though? Or since it is shared, there's actually nothing you need to > do (the bss decrpyted section exists even if CONFIG_AMD_MEM_ENCRYPT is not > configured)? Kirill had a requirement to turn on CONFIG_AMD_MEM_ENCRYPT for adding lazy accept support in TDX guest kernel. Kirill, can you add details here? > > Thanks, > Tom > >> -- Sathyanarayanan Kuppuswamy Linux Kernel Developer