Received: by 2002:ab2:710b:0:b0:1ef:a325:1205 with SMTP id z11csp608673lql; Mon, 11 Mar 2024 11:49:02 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCX2SJ0us3MbbMhV/Ry6eCmMdpWwWCoDkKBGL7jUaZc98rs93SxSkcOFR0Rp0FTlrsBv81yXLd9ay3twMLrUZtF44VDj1VG6Aa/yhzp02Q== X-Google-Smtp-Source: AGHT+IHerYI8PEvhCxlUy//Q8luqkSKIWEsUV+47VxwREGSSc3FhpuyfNrdVBRTCbV4xdfyr87VN X-Received: by 2002:a05:6a00:8c1:b0:6e6:42b5:f746 with SMTP id s1-20020a056a0008c100b006e642b5f746mr10576118pfu.29.1710182942176; Mon, 11 Mar 2024 11:49:02 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710182942; cv=pass; d=google.com; s=arc-20160816; b=1LYRDDJtaU60nvmOcSy6D72Ml2HuLlKI/Uvb0B+56y8Gg2DqzAPwEA8nC9iH9g8Xwq dDS/HMx3NLpin1M8K74eF01kYMDM0ROCnyv/1En3ysPwxpR4/o1i7Q0DOkpyJ91I+7Nh 1exJ8ok8NWDOYMnrLti/62/Lm1PrrjNubP/rLbIov21eDQ6+zJkR5vWZg8m/1y27Oxos nk9ufnpgp+yLq29yRHAHAec7DmJmzRN2ONxBFWKtNv60fmm5Lc/+VuwmoFrL4bczXYok d2NBLXullxJgcCoJN7D7pxIemWKaLHd/Ak7vtnJEDpzb+p6eJ8j9gTiw1CWrggrrRPv6 XJSA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=qTccvsk60Bz1Rf2VD7PQHQdtvf5w8FXD5SbjBoAvKPU=; fh=bJ8hlCTip4CGbDZiMUucKzLoacqYUJSSL96E1zJiEPg=; b=SFF8d6YIZLIHusFPAZk+M59Ynl63hEKSLWgvwptXyi3mtxX5Kh+ZrGS1nwS1QzujiB MkTFOQzLjVPqjH+mgjfNxEULjgknRzdL40fzSzZW74fEWpSNluDVGp4yaN9Fmcwiqvwe TLAnvGVriKbruHVs1VXG4hDzupPBo8QvfYJ6mKoIAzh/F/rl0jkixkeJhug/ZpSROGCT /OCCwOh9vCab39T8Ut1JWKEfvqJ50YRcWfVgmU5NLfqDftQRhJTjIifRzzCkk62CEO2Q wr7tH+DU0N+eoFwpmSa3SUZMaFylQksrA2Egn77GZpwWVLSDT9vsuhvvjlwR4j7HLeU2 H8WQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bs8jeMT+; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-99377-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-99377-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id 6-20020a631046000000b005dca7a43069si5430714pgq.603.2024.03.11.11.49.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Mar 2024 11:49:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-99377-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bs8jeMT+; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-99377-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-99377-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 092872854C4 for ; Mon, 11 Mar 2024 18:37:58 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 984D55730D; Mon, 11 Mar 2024 18:36:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="bs8jeMT+" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BFBD654BE8; Mon, 11 Mar 2024 18:36:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710182195; cv=none; b=PJnUv782kMfCvJlJnBecLaMIFJPwWL3X9vWjoKEZJvr+dh1MAd5xMXGIL7VDHUfPhBouKlzDp4wxZ6Y71TxSKmeFy3LuuivO/KFV5mX4tRVTGFMiX3VOHM8qJkX6f0YrG1pMUOcN6AxjfOnsolUv2jGHK1+laDceyqU7c/2tcM0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710182195; c=relaxed/simple; bh=G/OiPWZK5HAkqivFGdw4pb+Z3+zG63y8DlP0bpwmDG4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=eocRoaxpQS7ssB6nEYkizqyJPZxKrtmeg2CoyJOpU23K3xv1NXhJGgqyTTI4aHv2viPBgYK/NYGXIW0QyD9skbbjgwfQ1EmTu2SOc9k0+KbAfHuNEccBr7UcjSLHHa4fNbznQnDQx/yI1Brst5hFfjx6achSQ/tHNmPo4dkz2Ns= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=bs8jeMT+; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id E941FC43394; Mon, 11 Mar 2024 18:36:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1710182195; bh=G/OiPWZK5HAkqivFGdw4pb+Z3+zG63y8DlP0bpwmDG4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bs8jeMT+Ql+3aSFhldKqq8S9hhSCwPWGFzlfu3NyCQFJAo4BpJQ5Qp8HBoX1qZvGD iWqeSMtIO4/FEM5L+Ny7avlx1DQkf+jtkyZ0UH+SIk71AVnIBIoB7gMTdX4rnFA4zW /2KRbt73ltTH5iAIyb82pa7TQz3DCA5T9tmnjz6B6HPJfGXPSw4j923tAmb3woA2+n zAIlp/UibpYaYX/tGMOCDlUnEjgtw8kI8Gz2sR+ED0KyOcq4L1/gLgYubjJaWaQ2gz mVfbKTDSD4rJim9CQBjXoVQ+fzcwdhWkbbZNxuzzUGWHfhyvhl3tzMXqVDELVZ5VJq UZYqr6SZT15TQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Michael Kelley , "Kirill A . Shutemov" , Rick Edgecombe , Wei Liu , Sasha Levin , kys@microsoft.com, haiyangz@microsoft.com, sthemmin@microsoft.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, x86@kernel.org, dave.hansen@linux.intel.com, luto@kernel.org, peterz@infradead.org, devel@linuxdriverproject.org Subject: [PATCH AUTOSEL 6.7 03/14] x86/hyperv: Use slow_virt_to_phys() in page transition hypervisor callback Date: Mon, 11 Mar 2024 14:36:06 -0400 Message-ID: <20240311183618.327694-3-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240311183618.327694-1-sashal@kernel.org> References: <20240311183618.327694-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.7.9 Content-Transfer-Encoding: 8bit From: Michael Kelley [ Upstream commit 9fef276f9f416a1e85eb48d3bd38e6018a220bf5 ] In preparation for temporarily marking pages not present during a transition between encrypted and decrypted, use slow_virt_to_phys() in the hypervisor callback. As long as the PFN is correct, slow_virt_to_phys() works even if the leaf PTE is not present. The existing functions that depend on vmalloc_to_page() all require that the leaf PTE be marked present, so they don't work. Update the comments for slow_virt_to_phys() to note this broader usage and the requirement to work even if the PTE is not marked present. Signed-off-by: Michael Kelley Acked-by: Kirill A. Shutemov Reviewed-by: Rick Edgecombe Link: https://lore.kernel.org/r/20240116022008.1023398-2-mhklinux@outlook.com Signed-off-by: Wei Liu Message-ID: <20240116022008.1023398-2-mhklinux@outlook.com> Signed-off-by: Sasha Levin --- arch/x86/hyperv/ivm.c | 12 +++++++++++- arch/x86/mm/pat/set_memory.c | 12 ++++++++---- 2 files changed, 19 insertions(+), 5 deletions(-) diff --git a/arch/x86/hyperv/ivm.c b/arch/x86/hyperv/ivm.c index 02e55237d919a..851107c77f4db 100644 --- a/arch/x86/hyperv/ivm.c +++ b/arch/x86/hyperv/ivm.c @@ -515,6 +515,8 @@ static bool hv_vtom_set_host_visibility(unsigned long kbuffer, int pagecount, bo enum hv_mem_host_visibility visibility = enc ? VMBUS_PAGE_NOT_VISIBLE : VMBUS_PAGE_VISIBLE_READ_WRITE; u64 *pfn_array; + phys_addr_t paddr; + void *vaddr; int ret = 0; bool result = true; int i, pfn; @@ -524,7 +526,15 @@ static bool hv_vtom_set_host_visibility(unsigned long kbuffer, int pagecount, bo return false; for (i = 0, pfn = 0; i < pagecount; i++) { - pfn_array[pfn] = virt_to_hvpfn((void *)kbuffer + i * HV_HYP_PAGE_SIZE); + /* + * Use slow_virt_to_phys() because the PRESENT bit has been + * temporarily cleared in the PTEs. slow_virt_to_phys() works + * without the PRESENT bit while virt_to_hvpfn() or similar + * does not. + */ + vaddr = (void *)kbuffer + (i * HV_HYP_PAGE_SIZE); + paddr = slow_virt_to_phys(vaddr); + pfn_array[pfn] = paddr >> HV_HYP_PAGE_SHIFT; pfn++; if (pfn == HV_MAX_MODIFY_GPA_REP_COUNT || i == pagecount - 1) { diff --git a/arch/x86/mm/pat/set_memory.c b/arch/x86/mm/pat/set_memory.c index bda9f129835e9..355dc8f5cb7dd 100644 --- a/arch/x86/mm/pat/set_memory.c +++ b/arch/x86/mm/pat/set_memory.c @@ -755,10 +755,14 @@ pmd_t *lookup_pmd_address(unsigned long address) * areas on 32-bit NUMA systems. The percpu areas can * end up in this kind of memory, for instance. * - * This could be optimized, but it is only intended to be - * used at initialization time, and keeping it - * unoptimized should increase the testing coverage for - * the more obscure platforms. + * Note that as long as the PTEs are well-formed with correct PFNs, this + * works without checking the PRESENT bit in the leaf PTE. This is unlike + * the similar vmalloc_to_page() and derivatives. Callers may depend on + * this behavior. + * + * This could be optimized, but it is only used in paths that are not perf + * sensitive, and keeping it unoptimized should increase the testing coverage + * for the more obscure platforms. */ phys_addr_t slow_virt_to_phys(void *__virt_addr) { -- 2.43.0