Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1519221rdb; Wed, 31 Jan 2024 00:37:07 -0800 (PST) X-Google-Smtp-Source: AGHT+IEw7ME3zlYtt0YKPchW8PUyyqc07Tsai6UZFcuywn89L9LSFRXAHCtsRn2htYS/yEBWXvee X-Received: by 2002:a17:902:ecc1:b0:1d8:a108:2cab with SMTP id a1-20020a170902ecc100b001d8a1082cabmr1182117plh.67.1706690226742; Wed, 31 Jan 2024 00:37:06 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706690226; cv=pass; d=google.com; s=arc-20160816; b=Qs94IdwbgQzqBkY1EjdbegZtYYezeENOIlg46haoM9c2Vh9UJbIMo58exrwp6zhHSX ++vogsf3ndJilRpmVBqnv4US+Wld8bC6p4tjbsqc7h/KAHDa5vBTVHuaiU41Du42ka9s kKclAoXNablAKKQqKkGf1cJg4cUdCPH5T3olVPluEuDmO+aCkW6ep0AgTMVDszXwpaqM QYx4O6uWDMHA73IOHTFgDpT5kNjwCjb2/lxHIb1taYzidb9EGFbpY73MIW/2qRAfoDkl gGzDiCGSatls/4hexm3x8MEzsMQVJqIk6hrVCbdBAZFIAutWlaIEBRGJX6woe7ugVsJb ZP4w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=xURQLsUGYaQ4/5XRPeN2ACN4Xrra60hRGTkIk7Y7YVU=; fh=Ykrs9LVQVOz3mDxjIXmA9BzKlJU/kwjmF6BCB26euWE=; b=G/PLoKdYKzZKU2YBlO91/nV4OBTwAnYeARhwzottyviwipvgsvXW7YYSP4X3O9qRk/ 4UKFTGzo3dnk0hwPeVHS9q+FevL5NTQN1TAnTzVs8MnAku7IxDmi3mw70+ty/3ifa+zv xy4CwoqrKxCuzYRwmExeCyRq7msmzwxjKxdMhRyDJziwcIn20ADkxDqVPfrQC9OQZBbg dUGZcHzVvAsu/puldVU8ysONdiny0F7jQ30JbGxlIHx0ME/BCCHLOS2m092q9qd40eW5 WStzjMtAvxNbS7cnq4UiQtd/JqIpLNzsF6a0y+cDJe668hrgZgowfHVof1he+PTE+GHK 143g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=Zwrvtkcc; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-46008-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-46008-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de X-Forwarded-Encrypted: i=1; AJvYcCV/dRrgzR8wLdrmHd6v9acmZ0eOP1zOAj2Klea/dXZ1hbLZvVRXbFDHVgNKksBETaDYyehZIsmytA66O4LsgwwiYTKVUR/zmupwgSyIyQ== Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id p17-20020a170902e75100b001d5b6eee7ebsi4613084plf.152.2024.01.31.00.37.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 31 Jan 2024 00:37:06 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-46008-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=Zwrvtkcc; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-46008-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-46008-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id D7C2DB25846 for ; Wed, 31 Jan 2024 08:35:50 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2D1265D91D; Wed, 31 Jan 2024 08:35:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b="Zwrvtkcc" Received: from mail.alien8.de (mail.alien8.de [65.109.113.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3EE3037149; Wed, 31 Jan 2024 08:35:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=65.109.113.108 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706690143; cv=none; b=J6AtOLzfvZGwbfuv4/1dMFE1ImrdH9OTCsfhBCZs8pUNOMuDe243i17JUJXPIetKSLf86xkccfBsUYmg9Y0RRZtzXB/dK5XFzx+hbnPDFjKa/FKVa7Cavt8pGjb38AazFBUhu+jAgSgqUDGiHu+XkSMu+eMuHg+LUEanMl71A1Y= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706690143; c=relaxed/simple; bh=NxDDW81zyrs7kxVhirPfAM74ZB+GArrAzsWzsR1+ixE=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=BUpK7uIXMZ/QfebutzFrdosrwLxPFM914MJS0eYny1a2JI+ZB3kGat9zlW/kh006bQa71DKlviqhIfC7oMsQqhNXS26IdYHb0qof0C76LvRd/X9vomwun9FsyIF3kWNYi6f48WZD3LuEL+xU2o8eFFeJPLEPiUInInSM4lXwgM0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de; spf=pass smtp.mailfrom=alien8.de; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b=Zwrvtkcc; arc=none smtp.client-ip=65.109.113.108 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=alien8.de Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTP id 9450740E01A2; Wed, 31 Jan 2024 08:35:37 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at mail.alien8.de Authentication-Results: mail.alien8.de (amavisd-new); dkim=pass (4096-bit key) header.d=alien8.de Received: from mail.alien8.de ([127.0.0.1]) by localhost (mail.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id D5H5JuvwD2rP; Wed, 31 Jan 2024 08:35:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=alien8; t=1706690135; bh=xURQLsUGYaQ4/5XRPeN2ACN4Xrra60hRGTkIk7Y7YVU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ZwrvtkccKRg8bZ4jDh5jU+s8+WM4ifbbsjg+wXsL2donJtWAqneLDVYfm08FM62Ra YPLh191VjLFBI7rRLM6CEp1/ktGJlxM0IqwLUxDSdmwENcwn5igyTeiNC7+rS0QPyZ XRHo9AermmOti0ktm7qZoxExEgowg0+lKv+2otVwACXWH6wHRMlpJzrUhprR50DDbl zsrYKhO1EUgfIR7s9BElmeW8krpFJ8mvkwdh+f/bp3YNOFPvycYCdRez7qfhOllRHq xpiTcYQeroQSLbIPucbC3bnOej1Dujs+Lj2Fy90s9Z3+FURoXePGM6WXPdLev/ARYv 6SGNY3znons6uz74ShM+Ny7fpDPthIsEWEsBfIH3mi+cdo7nDlFxdVnP8igtE0YNMC /wruhQizA/JXLI5vBXHWklIugIKP6mRFVidy2jENyI7cQzCWcuUpHjEy/HDksvBZ++ 4+U2FACoZwKIEYvuSjHWKfVfvkyJ/tapIMRU3CXVNTORUBUycxhSWP9QILGVJFIYGM 8kgHS3WxhnRn6IisC5Se0f3zJMyitRRZSSmmz7pcc6CJMn0HJ+F07+YhzboVHsp6h/ FZaQZNEjLmAWXALLxZhI4G+9H8gQ/yZOfq5PU2qxyaX/o2hA0YKAARjjKqortoq4Zx Y+YPK5O+MowySqghsgYgENrY= Received: from zn.tnic (pd953033e.dip0.t-ipconnect.de [217.83.3.62]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 580E340E016C; Wed, 31 Jan 2024 08:35:17 +0000 (UTC) Date: Wed, 31 Jan 2024 09:35:11 +0100 From: Borislav Petkov To: Ard Biesheuvel Cc: linux-kernel@vger.kernel.org, Ard Biesheuvel , Kevin Loughlin , Tom Lendacky , Dionna Glaze , Thomas Gleixner , Ingo Molnar , Dave Hansen , Andy Lutomirski , Arnd Bergmann , Nathan Chancellor , Nick Desaulniers , Justin Stitt , Kees Cook , Brian Gerst , linux-arch@vger.kernel.org, llvm@lists.linux.dev Subject: Re: [PATCH v3 02/19] x86/boot: Move mem_encrypt= parsing to the decompressor Message-ID: <20240131083511.GIZboGP8jPIrUZA8DF@fat_crate.local> References: <20240129180502.4069817-21-ardb+git@google.com> <20240129180502.4069817-23-ardb+git@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20240129180502.4069817-23-ardb+git@google.com> On Mon, Jan 29, 2024 at 07:05:05PM +0100, Ard Biesheuvel wrote: > +/* > + * Set the memory encryption xloadflag based on the mem_encrypt= command line > + * parameter, if provided. If not, the consumer of the flag decides what the > + * default behavior should be. > + */ > +static void set_mem_encrypt_flag(struct setup_header *hdr) parse_mem_encrypt > +{ > + hdr->xloadflags &= ~(XLF_MEM_ENCRYPTION | XLF_MEM_ENCRYPTION_ENABLED); > + > + if (IS_ENABLED(CONFIG_ARCH_HAS_MEM_ENCRYPT)) { That's unconditionally enabled on x86: select ARCH_HAS_MEM_ENCRYPT in x86/Kconfig. Which sounds like you need a single XLF_MEM_ENCRYPT and simplify this more. > + int on = cmdline_find_option_bool("mem_encrypt=on"); > + int off = cmdline_find_option_bool("mem_encrypt=off"); > + > + if (on || off) > + hdr->xloadflags |= XLF_MEM_ENCRYPTION; > + if (on > off) > + hdr->xloadflags |= XLF_MEM_ENCRYPTION_ENABLED; > + } > +} Otherwise, I like the simplification. Thx. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette