From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id A9AF1C7115A for ; Wed, 18 Jun 2025 19:29:37 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 461B66B00DD; Wed, 18 Jun 2025 15:29:37 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 410526B00DE; Wed, 18 Jun 2025 15:29:37 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2D85F6B00DF; Wed, 18 Jun 2025 15:29:37 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 177766B00DD for ; Wed, 18 Jun 2025 15:29:37 -0400 (EDT) Received: from smtpin05.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id B9DB6160BA3 for ; Wed, 18 Jun 2025 19:29:36 +0000 (UTC) X-FDA: 83569510752.05.DEBFE37 Received: from mail-pg1-f177.google.com (mail-pg1-f177.google.com [209.85.215.177]) by imf19.hostedemail.com (Postfix) with ESMTP id B48451A000D for ; Wed, 18 Jun 2025 19:29:34 +0000 (UTC) Authentication-Results: imf19.hostedemail.com; dkim=pass header.d=broadcom.com header.s=google header.b=egOwaUgK; dmarc=pass (policy=quarantine) header.from=broadcom.com; spf=pass (imf19.hostedemail.com: domain of zack.rusin@broadcom.com designates 209.85.215.177 as permitted sender) smtp.mailfrom=zack.rusin@broadcom.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1750274975; a=rsa-sha256; cv=none; b=YQIpEhTmkBLmW5axeWccI/RhLwkyR9ZeKg99f5avFmcMmiYMqubEh6sLFE4U3a1oaQ39KP nmLYHMzPXCC3Pz2qr6mOtsSb9ZpM+F2TD1yEjUHjAJ990BgVienW7A2Y5oAM76ncHHPW2C omaCAZd1fkGwERdHlwyYf+NUNXl8aa0= ARC-Authentication-Results: i=1; imf19.hostedemail.com; dkim=pass header.d=broadcom.com header.s=google header.b=egOwaUgK; dmarc=pass (policy=quarantine) header.from=broadcom.com; spf=pass (imf19.hostedemail.com: domain of zack.rusin@broadcom.com designates 209.85.215.177 as permitted sender) smtp.mailfrom=zack.rusin@broadcom.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1750274975; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references:dkim-signature; bh=F8+TZfmF3MLk4xE+85WYNr1ilSLO44mBRcYRUA2SMdE=; b=PD09N3m9gJbnQnSSC+wBll+w+zUYmZUJJbHOebcuUOIexy4fxZtt+YRUvO/Zdslif/Oh7G kzTf3nY6O5xiQXwkR0/Ckar0iqcUTw/rXrpDRT9kqNiM5LoNTF98rKcOG1l234/KwuaqLn OSyJd6aEVdvk5cUNv8BwYxcpoxVvTck= Received: by mail-pg1-f177.google.com with SMTP id 41be03b00d2f7-b2c4e46a89fso49866a12.2 for ; Wed, 18 Jun 2025 12:29:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; t=1750274973; x=1750879773; darn=kvack.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=F8+TZfmF3MLk4xE+85WYNr1ilSLO44mBRcYRUA2SMdE=; b=egOwaUgKMeClGW3C/snwmU9OVhlHIXaJoTYn6/fbn7tRIs44+4kGCXAh85OtzQ5QFz HnoL/x/wTjbDE02GmN0BomtuLMFQmPPPbKc3PFdKI/9i/h56YWO3u9N1q75qDYZChdoK tR1lRl7JQd86FW/h3rEj4YYSW3TdKx6rBamr4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1750274973; x=1750879773; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=F8+TZfmF3MLk4xE+85WYNr1ilSLO44mBRcYRUA2SMdE=; b=SgC4RPk+znz5hCX/L+b/QgAmQ3evekvs0//0VunbZrXsAjnkb/SMdq+6L/t4A0ZDsK 1KXTmNsD1/t4nun6DasRp7Y6odh/C/p1KaINyexxAdv9SsmaVlcOyDmMFm00NwKH7Kzz nRYnNYkNjjC8nPqzbjudbzPcxCzhNwDjxrqfWUw5rc7RzYykZy1mdhbf2DAps07uOK4X FmKkJoBPdwZhQ5m+6G+juPRaxzLr2o46i6UKDXPfBELEBin3MDJzRe6rubGDsQfO81L/ gXRMbYaesKQc/1xQzcFhn3P3HV5g2O3bDP3N2+ShcL5v+tyFJMQMa7hYZyJjgmpwaN3r qMCw== X-Forwarded-Encrypted: i=1; AJvYcCVcO0onj21Hg4CVHceQsY9dtRIYQAD7ar7/h57HI5lzW/3k2PKjP2BVBBGAYxXGpwXH3gUhliIMig==@kvack.org X-Gm-Message-State: AOJu0YxXlwKkcdt7s0SuId/XwMvbR/ppIio1tH4REcS6qgxG5Iu6u+Fn +hv/hi56phCc4UU8OASGsUS2zexZ1n0/lVo6+FIobFXcgmA92EI5QSCjokGXNMK5Rg== X-Gm-Gg: ASbGncsIVtd9hF4WUfq7wjPtImw+YElaeImNUKSzopkiBxOewuuBj2xjmiJ/omjPBbk cZgvs0jJNZtkTY8tCMXyhybncXBSiTw82yvXfjC7oTYLGDVpH28HePNctrPUYHjaFeUMBUVSqXQ NJdlTK9GMBBLyF5EJUeaxehtlvY0X45HX+YCippv+8j7YmxnOcraWs8Qu4W0HKYK0fV3LsrbYgH 8I6yE4qzWumJY1SwyAhJHYDr7wZVlWQie6ybYFU+myCO9a2Ob9mjkxbCz3OudmsFzzxL01ND/NP c8mqEI0OXce6aQOZIXZMJlR+tFeRx/ER1bBdF6JFwJR4Ggz4vPPxWGUZPCKOcslZz4lzFN4Y6qO MmG8kzUISxE/rvkfXpdGp5LZ+vE0= X-Google-Smtp-Source: AGHT+IEemXY9lgPJEGcgUMUbG4MenbkaeF3LFGibrarvQsRmFlD2WLnpskK4KRqGLBUdq8hkOorarQ== X-Received: by 2002:a05:6a21:338c:b0:21e:7d1b:4401 with SMTP id adf61e73a8af0-21fbd55a0e2mr28926494637.22.1750274973514; Wed, 18 Jun 2025 12:29:33 -0700 (PDT) Received: from localhost.localdomain ([192.19.144.250]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-748900cec72sm11451139b3a.150.2025.06.18.12.29.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 Jun 2025 12:29:33 -0700 (PDT) From: Zack Rusin To: dri-devel@lists.freedesktop.org Cc: Broadcom internal kernel review list , ian.forbes@broadcom.com, martin.krastev@broadcom.com, maaz.mombasawala@broadcom.com, Marko Kiiskila , Zack Rusin , "Kirill A. Shutemov" , Ingo Molnar , Andrew Morton , Dave Hansen , Linus Torvalds , Peter Zijlstra , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH] drm/vmwgfx: Fix guests running with TDX/SEV Date: Wed, 18 Jun 2025 15:29:26 -0400 Message-ID: <20250618192926.1092450-1-zack.rusin@broadcom.com> X-Mailer: git-send-email 2.48.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Rspam-User: X-Rspamd-Queue-Id: B48451A000D X-Rspamd-Server: rspam02 X-Stat-Signature: r63yfmeteiaep1fuhmk3ymapseptxmod X-HE-Tag: 1750274974-60156 X-HE-Meta: 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 /QuaiODa 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Marko Kiiskila Commit 81256a50aa0f ("x86/mm: Make memremap(MEMREMAP_WB) map memory as encrypted by default") changed the default behavior of memremap(MEMREMAP_WB) and started mapping memory as encrypted. The driver requires the fifo memory to be decrypted to communicate with the host but was relaying on the old default behavior of memremap(MEMREMAP_WB) and thus broke. Fix it by explicitly specifying the desired behavior and passing MEMREMAP_DEC to memremap. Fixes: 81256a50aa0f ("x86/mm: Make memremap(MEMREMAP_WB) map memory as encrypted by default") Signed-off-by: Marko Kiiskila Signed-off-by: Zack Rusin Cc: Kirill A. Shutemov Cc: Ingo Molnar Cc: Andrew Morton Cc: Dave Hansen Cc: Linus Torvalds Cc: Peter Zijlstra Cc: linux-mm@kvack.org Cc: linux-kernel@vger.kernel.org --- drivers/gpu/drm/vmwgfx/vmwgfx_drv.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/gpu/drm/vmwgfx/vmwgfx_drv.c b/drivers/gpu/drm/vmwgfx/vmwgfx_drv.c index bc0342c58b4b..8ff958d119be 100644 --- a/drivers/gpu/drm/vmwgfx/vmwgfx_drv.c +++ b/drivers/gpu/drm/vmwgfx/vmwgfx_drv.c @@ -750,7 +750,7 @@ static int vmw_setup_pci_resources(struct vmw_private *dev, dev->fifo_mem = devm_memremap(dev->drm.dev, fifo_start, fifo_size, - MEMREMAP_WB); + MEMREMAP_WB | MEMREMAP_DEC); if (IS_ERR(dev->fifo_mem)) { drm_err(&dev->drm, -- 2.48.1