Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp3652402rdg; Wed, 18 Oct 2023 01:46:16 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFUriA+OseblrgKVzMxWi7kDlOEMZZwKwVq/lrdqp1u6Huo91jK7sc5LLY1gbF15ErvzBIt X-Received: by 2002:a17:90a:e393:b0:27d:63f1:2d24 with SMTP id b19-20020a17090ae39300b0027d63f12d24mr6280845pjz.0.1697618776033; Wed, 18 Oct 2023 01:46:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697618776; cv=none; d=google.com; s=arc-20160816; b=bx2qe6iEUJbExurW4RC1O2jiG53nfMpNQ9FTagahQpI+KnrYUpWZXfHuxXksTeiMN5 TtGQ71Xfq02K0926xKatN4GCz0GRbMBU+7V6riJwBJC9JuVlxXlLLZfBs/v7xjSGDBWq d5YMhzc/S3+c5d1o4aNe9HkFNAhb7P56lFv2Ztpz+jXSQKQrxV7KA7EXr1fO/Cm0EE3j y9U3+7k04Dp0IdMHrPr4ukUQRv4PmO7gtaJJEnbwk3n3MQUcAeow+sj5AJ1WC3w4s4Dn xvrSGA6fsJLJGlLKGGplA+ZsrJjgICU3c+eTE9YQF5nDgrVovYSwAohcNqSsBMjlI4L6 QLWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:sender:dkim-signature; bh=wSgTjdOEv9o43R13g98wkLpNBZhKvWTIsoJaIcBH5Qg=; fh=JXTCmPJtjHo9b33zX2dk+F4nz+yMXRNqEFf0dG0h/bM=; b=LGhaYuvAk+raCcPIzEiyigllRrSsytknN5+Mop/zlWb6aDHe794vtCgTuzYyEXfu5+ 8wGseuJW9JCMTXIdpjvO7i3gVPeO502GKHnAT79jgdyBW7FyvGmhzcJtCpJ7+Bh3ma4v 6mA5jbHd77A3F+HqVmU5fwpY/44I6GMIOxSS0tjnUEpDWf7MoCA2Jv/6mXKIHAOG/zp2 mz6AHnI1NuVoV6PXskZF0Vi6mprDCYViYVS55GnV4FFkPoUW4XnNveMf/BJ6ewWXqTAH oFXyRoRhS8MUmF/aRZ1OO5uFAzdSl3+bT4KxeGHSysGtp6uca4sSJtkmavmBePXksXtO 1e2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=dUT+VUwS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [23.128.96.34]) by mx.google.com with ESMTPS id l15-20020a170903244f00b001bf1a9dbcc9si1235847pls.549.2023.10.18.01.46.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 Oct 2023 01:46:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) client-ip=23.128.96.34; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=dUT+VUwS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 71105807B9AD; Wed, 18 Oct 2023 01:45:19 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230185AbjJRIpB (ORCPT + 99 others); Wed, 18 Oct 2023 04:45:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41662 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230038AbjJRIo6 (ORCPT ); Wed, 18 Oct 2023 04:44:58 -0400 Received: from mail-ej1-x629.google.com (mail-ej1-x629.google.com [IPv6:2a00:1450:4864:20::629]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1058AFE; Wed, 18 Oct 2023 01:44:56 -0700 (PDT) Received: by mail-ej1-x629.google.com with SMTP id a640c23a62f3a-9c5b313b3ffso293353366b.0; Wed, 18 Oct 2023 01:44:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1697618694; x=1698223494; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:sender:from:to:cc:subject:date:message-id :reply-to; bh=wSgTjdOEv9o43R13g98wkLpNBZhKvWTIsoJaIcBH5Qg=; b=dUT+VUwSgajNZTNtOq55n8P0FbvbUTCnglGBanOK6I5IP00cBd1CPq9bHdy3/nWYfk 3D63mrlvDkTXi2BTPsBenI+S+k7Cx+NFrSG7fGHZXsgsdFueRaZTnpDUd2Qe/2kaao5D BYdOHRIm0M1RrHIjaCp/kz80vucEeFJcuBZpotGv+Iyx36NkCsxCQCnxN9KV4miHU+vm 6nKFDINB2ZntP9eO80e21w+RZrGQ+mahObOFdTiVzE52gOjHKS4WQH7ILR+srxjamJif ZsrG8MZIgSRDOzv0MHHy7QEF0Sxe82X8CW7m1fudx5bjSqQlyh08wuSKr3Fop3wRazjW kSug== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697618694; x=1698223494; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:sender:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=wSgTjdOEv9o43R13g98wkLpNBZhKvWTIsoJaIcBH5Qg=; b=Shgw45MmT0yiYaJcoTiUl+PNTYBhCGNeLkul5TPiLfbsqNxC6UHSXqeMfYMwAFnuEc c7IMQAbD2qRb7lsbuY7Atn3PewU2cWG8gBi0hfT1zwWzsks/gYCexOYg2x9LG5adWyyy Z9RXqcK71KDD4rKFDFE3H31cFpRfhpGZrjqfKQsYJjvozvXyvebuG3u6UAs+FRCyemEF ACJy8ET03907fltuDKG6rH2tSZEdMg+E8bNCcI+E4kNKTJR9EMn94pzA9O26hIj3GibH NA2avAzc55V0ipQOMl+ni1nEl17qlMKNLjWNtgkeWOWShBkJQ/zE1jAmQdzFXtwZZyXs bB5Q== X-Gm-Message-State: AOJu0YzBTdorps58Blrrcd0ojcdAA9FrrKt4i5IWfWG/YdbDv7rITZ97 8LFRqDr7ceB78PUNRrk4bXU= X-Received: by 2002:a17:907:7d9e:b0:9be:8ead:54c7 with SMTP id oz30-20020a1709077d9e00b009be8ead54c7mr3542268ejc.12.1697618694114; Wed, 18 Oct 2023 01:44:54 -0700 (PDT) Received: from gmail.com (1F2EF7B2.nat.pool.telekom.hu. [31.46.247.178]) by smtp.gmail.com with ESMTPSA id a7-20020a170906468700b009b957d5237asm1199002ejr.80.2023.10.18.01.44.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 Oct 2023 01:44:53 -0700 (PDT) Sender: Ingo Molnar Date: Wed, 18 Oct 2023 10:44:51 +0200 From: Ingo Molnar To: Rick Edgecombe Cc: x86@kernel.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, hpa@zytor.com, luto@kernel.org, peterz@infradead.org, kirill.shutemov@linux.intel.com, elena.reshetova@intel.com, isaku.yamahata@intel.com, seanjc@google.com, Michael Kelley , thomas.lendacky@amd.com, decui@microsoft.com, sathyanarayanan.kuppuswamy@linux.intel.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org Subject: Re: [PATCH 02/10] x86/mm/cpa: Reject incorrect encryption change requests Message-ID: References: <20231017202505.340906-1-rick.p.edgecombe@intel.com> <20231017202505.340906-3-rick.p.edgecombe@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231017202505.340906-3-rick.p.edgecombe@intel.com> X-Spam-Status: No, score=-1.0 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Wed, 18 Oct 2023 01:45:19 -0700 (PDT) * Rick Edgecombe wrote: > Kernel memory is "encrypted" by default. Some callers may "decrypt" it > in order to share it with things outside the kernel like a device or an > untrusted VMM. > > There is nothing to stop set_memory_encrypted() from being passed memory > that is already "encrypted" (aka. "private" on TDX). In fact, some > callers do this because ... $REASONS. Unfortunately, part of the TDX > decrypted=>encrypted transition is truly one way*. It can't handle > being asked to encrypt an already encrypted page > > Allow __set_memory_enc_pgtable() to detect already-encrypted memory > before it hits the TDX code. > > * The one way part is "page acceptance" > > [commit log written by Dave Hansen] > Signed-off-by: Rick Edgecombe > --- > arch/x86/mm/pat/set_memory.c | 41 +++++++++++++++++++++++++++++++++++- > 1 file changed, 40 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/mm/pat/set_memory.c b/arch/x86/mm/pat/set_memory.c > index bda9f129835e..1238b0db3e33 100644 > --- a/arch/x86/mm/pat/set_memory.c > +++ b/arch/x86/mm/pat/set_memory.c > @@ -2122,6 +2122,21 @@ int set_memory_global(unsigned long addr, int numpages) > __pgprot(_PAGE_GLOBAL), 0); > } > > +static bool kernel_vaddr_encryped(unsigned long addr, bool enc) > +{ > + unsigned int level; > + pte_t *pte; > + > + pte = lookup_address(addr, &level); > + if (!pte) > + return false; > + > + if (enc) > + return pte_val(*pte) == cc_mkenc(pte_val(*pte)); > + > + return pte_val(*pte) == cc_mkdec(pte_val(*pte)); > +} > + > /* > * __set_memory_enc_pgtable() is used for the hypervisors that get > * informed about "encryption" status via page tables. > @@ -2130,7 +2145,7 @@ static int __set_memory_enc_pgtable(unsigned long addr, int numpages, bool enc) > { > pgprot_t empty = __pgprot(0); > struct cpa_data cpa; > - int ret; > + int ret, numpages_in_state = 0; > > /* Should not be working on unaligned addresses */ > if (WARN_ONCE(addr & ~PAGE_MASK, "misaligned address: %#lx\n", addr)) > @@ -2143,6 +2158,30 @@ static int __set_memory_enc_pgtable(unsigned long addr, int numpages, bool enc) > cpa.mask_clr = enc ? pgprot_decrypted(empty) : pgprot_encrypted(empty); > cpa.pgd = init_mm.pgd; > > + /* > + * If any page is already in the right state, bail with an error > + * because the code doesn't handled it. This is likely because Grammar mistake here. > + * something has gone wrong and isn't worth optimizing for. > + * > + * If all the memory pages are already in the desired state return > + * success. Missing comma. > + * > + * kernel_vaddr_encryped() does not synchronize against huge page > + * splits so take pgd_lock. A caller doing strange things could Missing comma. Thanks, Ingo