Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp5309366ioo; Wed, 1 Jun 2022 02:50:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwhZE5WNPV5CWhx2x6G8dIQSJXFs4QFMlcCo7Jui5lsDuc9430LKGC2fjuPxgWkl21syb3x X-Received: by 2002:aa7:ce84:0:b0:42d:ce51:8c6e with SMTP id y4-20020aa7ce84000000b0042dce518c6emr17923185edv.10.1654077052304; Wed, 01 Jun 2022 02:50:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654077052; cv=none; d=google.com; s=arc-20160816; b=ZOXj7m0TLx1MkR5mjGlGxI7nPGekKOuxNKxgutzOv18/5iijT/EcdoKsh+GXqqPkdR 7/hFuD/u6rhvekE4ppjoJOIsaep2oW0Eoihqq5GcqfjY7V3H5mqPwAohla4c95zYY6Id 1H8ZAJeUeVMTvYyjc3dpf8a3v/KK8/Tg1vsfvZ1JW8iyRhFGEy4f/mGxam2TcKaVbQo0 EyBnRHfh/7+q5di/CdKF6s3UoQw/siJpBAZhCVuuBADjlQNd5WtM9Mv1w6eqEJrjuGHc r0IHpK9fovqDsj6XF7er1dKOBM0BU7zlkDOrKYBnQWPOf5A5gLMYSq5BtS//dC2MNnA5 LoFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:user-agent:date :mime-version:references:in-reply-to:cc:to:from:subject:message-id :dkim-signature; bh=EXNXuLmTPD9FG1SnrYeLm0XkwF3BJdI+aVRzRNWsAJg=; b=fbJAdPP0ovtngDvO41GBnxd8Z2rvkZJBcAREgF193tu5pt+LJQSxj/cTeRjKpoQbAx VQ0RsYYVSS3mAAwMyPMGN+aF4VvIAKYSIpv1ygfSwVfpMGOVquvftaIl0kCiEof9TZUZ Nexyb916dDORYBsznyXlPpiOw9dftcnkvr3q6BY8FMocwhOWBktqvx5LCs+yQFJAuxID S9Ebwj6lOmNAydo14MDpkYtDPUJwTRcirxxl5pPt34Fort21/9HlLqKeViAtL3PnqPEg iiDQcZdLyTsS7p/9MWqqFV1ViD9gFXkLlFX8EBuxUsMetx0E5m35WA7fAoiEpRSoOZkH Sbeg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=IhWj4q+A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ji12-20020a170907980c00b006e7fd3f1dd2si1497016ejc.1001.2022.06.01.02.50.26; Wed, 01 Jun 2022 02:50:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=IhWj4q+A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235437AbiE3Krw (ORCPT + 99 others); Mon, 30 May 2022 06:47:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49540 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235615AbiE3Krn (ORCPT ); Mon, 30 May 2022 06:47:43 -0400 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A74397CB67 for ; Mon, 30 May 2022 03:47:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1653907653; x=1685443653; h=message-id:subject:from:to:cc:in-reply-to:references: mime-version:date:content-transfer-encoding; bh=o5SGoknLhcf36naf8dL6NWETDY5hMeyO9OFdAjzRBRg=; b=IhWj4q+ATeByo99j7QWu9H1fmdUqAn6CUAgd+B5w9ox5v5B5UE1K5aIQ LbIOnkXfN3vzwNKrDrceOiZS3B9XHRLjlc+Uam8S0pEiJZocV6H2FXeGj ex5UIe7CaldQpdG0XI2LII0VxsUoKLGuNsIfQTm0f3kKg22hhejd4gqaP nRldWCbGN3aYwwUQ/9jQeRNaBAPYd7VkZLTSWhPbK6g71vFd768IcdakE dkzq4eFmRmlL7eIWhvD+Fnm346e1edcLD7oVpo3fMk9GufTTKp71VAWWK /lkydqE3aYNrQCCHSJBQb2kyP/MBfTJKJ7dMuFuxp27TM05Rb/+oIN5IX Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10362"; a="275056254" X-IronPort-AV: E=Sophos;i="5.91,262,1647327600"; d="scan'208";a="275056254" Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 May 2022 03:47:31 -0700 X-IronPort-AV: E=Sophos;i="5.91,262,1647327600"; d="scan'208";a="529128753" Received: from machambe-mobl.amr.corp.intel.com (HELO khuang2-desk.gar.corp.intel.com) ([10.254.36.179]) by orsmga003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 May 2022 03:47:27 -0700 Message-ID: Subject: Re: [PATCH v7 3/5] x86/mm: Make tdx_enc_status_changed() vmalloc address compatible From: Kai Huang To: Kuppuswamy Sathyanarayanan , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org Cc: "H . Peter Anvin" , "Kirill A . Shutemov" , Tony Luck , Andi Kleen , Wander Lairson Costa , Isaku Yamahata , marcelo.cerri@canonical.com, tim.gardner@canonical.com, khalid.elmously@canonical.com, philip.cox@canonical.com, linux-kernel@vger.kernel.org In-Reply-To: <20220524040517.703581-4-sathyanarayanan.kuppuswamy@linux.intel.com> References: <20220524040517.703581-1-sathyanarayanan.kuppuswamy@linux.intel.com> <20220524040517.703581-4-sathyanarayanan.kuppuswamy@linux.intel.com> Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Date: Mon, 30 May 2022 22:47:15 +1200 User-Agent: Evolution 3.42.4 (3.42.4-2.fc35) Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2022-05-23 at 21:05 -0700, Kuppuswamy Sathyanarayanan wrote: > set_memory_*crypted() APIs are used to change encryption or decryption > page attributes for the given address. It also by default support the > conversion for the vmalloc'ed memory address. > > In TDX Guest, tdx_enc_status_changed() function is triggered by > set_memory_*crypted() APIs when converting memory from/to shared or > private. Internally this function uses __pa() for physical address > conversion, which breaks the vmalloc address compatibility of the > set_memory_*crypted() APIs. > > So add support to fix the vmalloc'ed address compatibility issue. > > Signed-off-by: Kuppuswamy Sathyanarayanan > --- > arch/x86/coco/tdx/tdx.c | 11 +++++++++-- > 1 file changed, 9 insertions(+), 2 deletions(-) > > diff --git a/arch/x86/coco/tdx/tdx.c b/arch/x86/coco/tdx/tdx.c > index b49211994864..37d58675ccf1 100644 > --- a/arch/x86/coco/tdx/tdx.c > +++ b/arch/x86/coco/tdx/tdx.c > @@ -15,6 +15,7 @@ > #include > #include > #include > +#include > > /* TDX module Call Leaf IDs */ > #define TDX_GET_INFO 1 > @@ -680,8 +681,14 @@ static bool try_accept_one(phys_addr_t *start, unsigned long len, > */ > static bool tdx_enc_status_changed(unsigned long vaddr, int numpages, bool enc) > { > - phys_addr_t start = __pa(vaddr); > - phys_addr_t end = __pa(vaddr + numpages * PAGE_SIZE); > + phys_addr_t start, end; > + > + if (is_vmalloc_addr((void *)vaddr)) > + start = vmalloc_to_pfn((void *) vaddr) << PAGE_SHIFT; > + else > + start = __pa(vaddr); > + > + end = start + numpages * PAGE_SIZE; > > if (!enc) { > /* Set the shared (decrypted) bits: */ AMD uses lookup_address() which doesn't require the vaddr being vmap() address. Shouldn't TDX use the same way? -- Thanks, -Kai