Received: by 2002:ab2:1689:0:b0:1f7:5705:b850 with SMTP id d9csp481692lqa; Sat, 27 Apr 2024 09:55:58 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCW3pgwjRxFUnrEG4ddQDyFTyaUyBfO5OnMPaCSJEKevvZfGWSf1hxBCp4UeLUhjki7W/4AUUhjg6a4su/+1De2YhTWSFb/Ff97W+zlWFQ== X-Google-Smtp-Source: AGHT+IFmF8R63G3a4kSP0wHxRLqvE5SbEIuLS0qVtvozZg0aQpAIiDKPHaHWwSRSItHhRWgE3xpN X-Received: by 2002:a05:6a20:87a9:b0:1aa:a6dc:38ca with SMTP id g41-20020a056a2087a900b001aaa6dc38camr5454883pzf.16.1714236958015; Sat, 27 Apr 2024 09:55:58 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714236958; cv=pass; d=google.com; s=arc-20160816; b=veiq1aT7tbvfVctqaT+nvNFIo4lzFcNQ2uYUUzNxSCBTjWBxc5cWn+6I7N2LtyWrdg bVhOjTO5pZ8iHu9ekHNxh74m8vxz+jdnlQAZpgZJeVEgXdNrnbDHzFpkbfTuulVMvYY6 a/R/9Sm3muWIpLWb6b3pQQubIi2sHTfR5bdI+T3H6dYQLckEwfg/v3vT4mj58AMlLa+d b7/mwbAg6y93i7wz3hc5lkFOF4vSIg5cMVbCkdC/djMrkNg9OpMQSiSlDrNHqLsu77i5 1yhUruTp+3dU5SrovWjcxK4upVHmbMsqm/RUqD6ic6mekAYQhl8KfHiUI/PKeMmj1aO4 zuSg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=SQR9m3AlnZH/DoVLOL78q+n6vHtGt70RLlgLJ3+EdQY=; fh=vaeetK5+nmcnRj8LIaYu4kZHSwwgxcmUFXkt2HV0QS8=; b=kAh2NEbS6W4Ak4OjGWifv5xu6B3lXv1ce9WCQIihEZPMGJERS1dRhUoWOCAc5N7kMl o8gbL08UtzBejr6pVkyPP/aK+pL0CKqmnR/2ub5tF5mkMEgMIUSo9mZKLGSFP7v0e65w 9IetoUmf9w/MmQSnVVotdf0gzHqXOZs1dwKtx3LqpFcItUXWNh4ZytBVgDHpr12CMj+l WZWmnU22oNKHxiKc70YrpYY4OvVBjOre01wBUhPObVDBU6QZCifQ1Sw1GcWKumWgZ4pA NYquZqtTLzaq+3TTvhLPfuELG/udQWhM9AF0eOmWW+TbalfuHjpjCP9EqNAskSeeznTS 5jrw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=DjGXAN+b; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-161107-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-161107-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id d16-20020a17090ab31000b002abd8a0e651si16926631pjr.96.2024.04.27.09.55.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 27 Apr 2024 09:55:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-161107-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=DjGXAN+b; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-161107-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-161107-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id DD9F42826DE for ; Sat, 27 Apr 2024 16:55:55 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1FD2E1428ED; Sat, 27 Apr 2024 16:55:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b="DjGXAN+b" Received: from mail.alien8.de (mail.alien8.de [65.109.113.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BB8748F77 for ; Sat, 27 Apr 2024 16:55:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=65.109.113.108 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714236950; cv=none; b=ot6i7SG6APTbER8boJFqri4DEFl8xBmEogDEv+fPBOFgnTJrOJIjOpsZr+TUuOv9MmpFwRf6SSjoP4sgh+r4Kj2NI+kTI8t/HxZRO95kD1np0BFVeaRjjpJV1UGk0xpXfKcUEb9T4scNTQMLg7XZZQ3TMfPvmvlpNbv1YkwbEFg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714236950; c=relaxed/simple; bh=B+EwIW3/BGAmVbm61WUgZ9X7DpD/uEeYcPKZ0BRR3dY=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=gnUnmczR6y/IGl9Apy22MLqbsJHeshB+MRmd+pnBk3yNPQdoZOW9C4HhIQJfcrQsBvRppfOA2MS6FPmVg+sHMFJPMh541ZzKIrd8lUMBp7ucOz5Ga7JnL0ktmiPbs8Jr3KZJsjdlSC9Ey+JuHbO8zKOPtoWdb01MlhZ+ZgpZaaw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de; spf=pass smtp.mailfrom=alien8.de; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b=DjGXAN+b; arc=none smtp.client-ip=65.109.113.108 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=alien8.de Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTP id 05F6740E0187; Sat, 27 Apr 2024 16:48:19 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at mail.alien8.de Authentication-Results: mail.alien8.de (amavisd-new); dkim=pass (4096-bit key) header.d=alien8.de Received: from mail.alien8.de ([127.0.0.1]) by localhost (mail.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id RJqSXYuWMYl9; Sat, 27 Apr 2024 16:48:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=alien8; t=1714236494; bh=SQR9m3AlnZH/DoVLOL78q+n6vHtGt70RLlgLJ3+EdQY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=DjGXAN+b8wx5Km/bOJsO0ZI7VOO8xPDmfWqfW9OmLLleG0fdy/h8yBpHmZEFNOg7l tQZd0ZkO/ujyqgn/tRcghWxqpMJL8W71cRx6yggVBsm5c5AsKPqH5mAatwZCB7xZTE KorsprTHlyDtCLstPx/3aiTaQjasP2LdyvZW3TuVBRvK8UD8u+MSeJsgI7ww0v0dWk lI2HFNxI1TmbgjPJ7+Q4NN2jfPCsi1nGWOftkZ/9mc1Kvhj+vdeTfilKimvNzOkGAw syf9J5Ruw4c6Qw6R3h2f75cxRCyCcED9hFofDHFCgI3Sh/TtlKCt65mzh4CYNuEZR5 x8ZIU2Zw20taEdkP48LQ/eqVmzLY7aByaogExDmDokQhpWRCiLg8gRia1i7JXwb/nj Sfh4DAXa4p9rR426wKQTOv0G+g4j0zEWBNbwKuf2qVco12zHvqyHmZDJNimQM6NGhc nSyZOzlfQRkIEKdxZJ/oQmirPtXa5Q5a+48XB5ab0O1PV5G0XEqqQopa/gaG9Ia/ad ChY80GmGaeXjVq8kNRbqkvF5QFmsnKI2kd8zYfNbA0AS5sdwG13ir5hSEaNx17vIw4 uYeA7jdWVeg+7GmxPjJHc11qf0yzFRgdOLzVS1ErEhxZplrbsG9wdobsPO44KRJ8/r 18rO1xRu2is89599r8DzbBoQ= Received: from zn.tnic (pd953020b.dip0.t-ipconnect.de [217.83.2.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 831FE40E0177; Sat, 27 Apr 2024 16:47:52 +0000 (UTC) Date: Sat, 27 Apr 2024 18:47:47 +0200 From: Borislav Petkov To: "Kirill A. Shutemov" Cc: Thomas Gleixner , Ingo Molnar , Dave Hansen , x86@kernel.org, "Rafael J. Wysocki" , Peter Zijlstra , Adrian Hunter , Kuppuswamy Sathyanarayanan , Elena Reshetova , Jun Nakajima , Rick Edgecombe , Tom Lendacky , "Kalra, Ashish" , Sean Christopherson , "Huang, Kai" , Baoquan He , kexec@lists.infradead.org, linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, Nikolay Borisov , Tao Liu Subject: Re: [PATCHv10 09/18] x86/mm: Adding callbacks to prepare encrypted memory for kexec Message-ID: <20240427164747.GCZi0sM6HBCBYtgWqF@fat_crate.local> References: <20240409113010.465412-1-kirill.shutemov@linux.intel.com> <20240409113010.465412-10-kirill.shutemov@linux.intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20240409113010.465412-10-kirill.shutemov@linux.intel.com> On Tue, Apr 09, 2024 at 02:30:01PM +0300, Kirill A. Shutemov wrote: > diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c > index e74d0c4286c1..7a1560d7e62d 100644 > --- a/arch/x86/kernel/crash.c > +++ b/arch/x86/kernel/crash.c > @@ -128,6 +128,12 @@ void native_machine_crash_shutdown(struct pt_regs *regs) > #ifdef CONFIG_HPET_TIMER > hpet_disable(); > #endif > + > + if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) { > + x86_platform.guest.enc_kexec_stop_conversion(true); > + x86_platform.guest.enc_kexec_unshare_mem(); > + } This is not how this is done - the point of those function pointers is to avoid random checks in the code but simply unconditionally call them. The platform which needs something special to happen, assigns to them its own function pointers and the rest assigns dummy stubs. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette