Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3545041pxf; Mon, 5 Apr 2021 15:17:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzKRGUxw/rW7AZtnj1LyO60Ph7REnvq8Cm5N+eOneSlYO5rujnG11fyTv7dS3USypxn4V6s X-Received: by 2002:a5e:840a:: with SMTP id h10mr21513343ioj.206.1617661043606; Mon, 05 Apr 2021 15:17:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617661043; cv=none; d=google.com; s=arc-20160816; b=BLk5PMmPhk8MOMFkBVWEPrLnaHFXNiyeYq9lVSv97mXbFyFg9OA5FgVfU25rtc9cMt eCtCssis2Aoni3udTk9V2EuEeQoIes1LVshY7Fm5i+FwqsK/Y4b4+pE6NHHpQLGOD0YE vKPckMAHSssEO8P5O3g7HdpD1ayEXQoteNR8N+00GkvXHgaz3WkQx7LYYqyb3Q1bkT1X 1EcxkHacmDeB9YRc7WvPBAuvk6yCumBTwfG1N+itp7fSsMTiYots1vncJ4cenqSA0BB1 sSkJlr+exc7AsjlEpIwrqhumfAq+xoEJLu/Ec0KzXU9WEn7qULAJ/0eXOmNQGMNbAbtS nLOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=nBPPSw2BQxZv3JDlctzmEukgrzYX1yJ+ZaCR4IZI8eQ=; b=AaSyoQvaPA21nYjMOWXbF/SRTnOerJtw/nhog8v3tWBTZj9NM6LZsEIeV5VCWsJjLz ZR78uE5YUY/dTioDO768qA+qJ0cT4dtVqJwsHHrUf5cTDGjzXJdnaPBmVmIg15W0sdMC CTGFKtvYMEBDZZJrvL3knKM5P4P15hmcVdbw055WlQ7FmEyfkxBU3bNCZIP34WTC5Q+O L+XrnMcW2nyMSWFG9JvKt4VtZnllPveiCXtdYmciupMvuT2w8gc0w4KG96O8Pq9fSXzX y7tmshTh02hJFv0wLEi6eEtoiB/eOYftN4NKseodKoMji+HiGgLEndOLoT5lWt3Jd1y7 +hEQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NI+p1o0Q; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v19si16055153iom.33.2021.04.05.15.17.08; Mon, 05 Apr 2021 15:17:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NI+p1o0Q; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241440AbhDEPHH (ORCPT + 99 others); Mon, 5 Apr 2021 11:07:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48412 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241428AbhDEPHH (ORCPT ); Mon, 5 Apr 2021 11:07:07 -0400 Received: from mail-pj1-x102b.google.com (mail-pj1-x102b.google.com [IPv6:2607:f8b0:4864:20::102b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 96DB6C06178C for ; Mon, 5 Apr 2021 08:06:59 -0700 (PDT) Received: by mail-pj1-x102b.google.com with SMTP id ot17-20020a17090b3b51b0290109c9ac3c34so7980485pjb.4 for ; Mon, 05 Apr 2021 08:06:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=nBPPSw2BQxZv3JDlctzmEukgrzYX1yJ+ZaCR4IZI8eQ=; b=NI+p1o0Q/CMmczfcVuoWxmf3Ag3le4FRp9YUh+wTgeNm7hm6t2SdT8SMhF/WhnqhDC 1wyQSlMAxO1h7+9N1lc9VS8xbeqJc08aDb6XpltI6iXdgAVd0HdRaV5ia5X4EjAFxm/B LrUpy8vj7tP/zQs/Q5Ls670smqXpVWCu3FiSlgHfrNb1zfF6jiOQph4F6WiUIuroIjOS PDo1GG4V6wLhicRUHpO9Y2GYAcWInEE/+dsrVNfA4mlgiSC6ThfZgwsnOuI3DoPKRyT4 /5M/RkaJM7acKMan4+n5DC2pg0N4qwFAYEw0TUq+jqElU0djXNimbQZC/OgHl+In/CiZ cGgA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=nBPPSw2BQxZv3JDlctzmEukgrzYX1yJ+ZaCR4IZI8eQ=; b=UsTvHiwfWb3ljEq66Q1Qwk0MA6uomE8SG/pbvl4nUHVXIHwzXpH++Bd0hOduSo71rF QFir3mjaE0TtYDWHSD1SIzPrlCvSuA0gWS9t0J/5Zbm6ZlmRSivBJZF1wko7kzHhLGLD 479QfjrrXASDRedAg8EfyJCKH9b8vrFiwehMKL0j+D9nhHKteo8ss/3FX26WZNBT3TXB FNOSEFivwjl5qyqrahaexHwV2e5lTFPUCjjjE+C+5CXeO3cZZH3Cq27cEp8YtE0NN8M4 S+4XYPvRmIHkadJryPOLPgTQF1RDFz8YUQp12BWEJug75txaM5yGD3SU383LPLPilATs DjOA== X-Gm-Message-State: AOAM530J+7kYVzRIVC5Knf+6rMrDeefArTje8JkGVq0OF45Iam279Pa2 6cY30h0MAeTwNpBRyinhNkAO0A== X-Received: by 2002:a17:902:988d:b029:e8:dd65:e2b5 with SMTP id s13-20020a170902988db02900e8dd65e2b5mr9896147plp.36.1617635218900; Mon, 05 Apr 2021 08:06:58 -0700 (PDT) Received: from google.com (240.111.247.35.bc.googleusercontent.com. [35.247.111.240]) by smtp.gmail.com with ESMTPSA id v13sm15319156pfu.54.2021.04.05.08.06.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 05 Apr 2021 08:06:58 -0700 (PDT) Date: Mon, 5 Apr 2021 15:06:54 +0000 From: Sean Christopherson To: Christophe Leroy Cc: Paolo Bonzini , Brijesh Singh , Tom Lendacky , John Allen , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Borislav Petkov Subject: Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs Message-ID: References: <20210402233702.3291792-1-seanjc@google.com> <20210402233702.3291792-4-seanjc@google.com> <8ea3744f-fdf7-1704-2860-40c2b8fb47e1@csgroup.eu> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <8ea3744f-fdf7-1704-2860-40c2b8fb47e1@csgroup.eu> Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Sun, Apr 04, 2021, Christophe Leroy wrote: > > Le 03/04/2021 ? 01:37, Sean Christopherson a ?crit?: > > @@ -152,11 +153,21 @@ static int __sev_do_cmd_locked(int cmd, void *data, int *psp_ret) > > sev = psp->sev_data; > > buf_len = sev_cmd_buffer_len(cmd); > > - if (WARN_ON_ONCE(!!data != !!buf_len)) > > + if (WARN_ON_ONCE(!!__data != !!buf_len)) > > return -EINVAL; > > - if (WARN_ON_ONCE(data && is_vmalloc_addr(data))) > > - return -EINVAL; > > + if (__data && is_vmalloc_addr(__data)) { > > + /* > > + * If the incoming buffer is virtually allocated, copy it to > > + * the driver's scratch buffer as __pa() will not work for such > > + * addresses, vmalloc_to_page() is not guaranteed to succeed, > > + * and vmalloc'd data may not be physically contiguous. > > + */ > > + data = sev->cmd_buf; > > + memcpy(data, __data, buf_len); > > + } else { > > + data = __data; > > + } > > I don't know how big commands are, but if they are small, it would probably > be more efficient to inconditionnally copy them to the buffer rather then > doing the test. Brijesh, I assume SNP support will need to copy the commands unconditionally? If yes, it probably makes sense to do so now and avoid vmalloc dependencies completely. And I think that would allow for the removal of status_cmd_buf and init_cmd_buf, or is there another reason those dedicated buffers exist?