From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8F848CCA47F for ; Fri, 22 Jul 2022 11:43:40 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id EF5B46B0072; Fri, 22 Jul 2022 07:43:39 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id E7DED6B0073; Fri, 22 Jul 2022 07:43:39 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D1EE76B0074; Fri, 22 Jul 2022 07:43:39 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id BCA9E6B0072 for ; Fri, 22 Jul 2022 07:43:39 -0400 (EDT) Received: from smtpin12.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 63BFA160BF1 for ; Fri, 22 Jul 2022 11:43:39 +0000 (UTC) X-FDA: 79714550958.12.BA16603 Received: from mail.skyhub.de (mail.skyhub.de [5.9.137.197]) by imf12.hostedemail.com (Postfix) with ESMTP id E922A40017 for ; Fri, 22 Jul 2022 11:43:36 +0000 (UTC) Received: from zn.tnic (p200300ea97297665329c23fffea6a903.dip0.t-ipconnect.de [IPv6:2003:ea:9729:7665:329c:23ff:fea6:a903]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 44D461EC0666; Fri, 22 Jul 2022 13:43:31 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1658490211; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=ksPuM1kYKnp5lVqg/WP+CGQc5Ka79BDAGC9xOepY/I8=; b=mW4n+A9CpNvcdQwAqKcXgvmWOsDSsNK3ZD5SmnfCZUkjkfe4FTPiMGByOVdN9xu29mX4vg pFroZSFFP4rbGAhPtmfUnFmR9JtI+IhRnclmU7b32N1MUY18t1EisNbMnXk5rhk37BO1X8 3cSBJR8ssvT+wIkx5YmH4eak7buGyi4= Date: Fri, 22 Jul 2022 13:43:30 +0200 From: Borislav Petkov To: Ashish Kalra Cc: x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, michael.roth@amd.com, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, marcorr@google.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, dgilbert@redhat.com, jarkko@kernel.org Subject: Re: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers Message-ID: References: <8f63961f00fd170ba0e561f499292175f3155d26.1655761627.git.ashish.kalra@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <8f63961f00fd170ba0e561f499292175f3155d26.1655761627.git.ashish.kalra@amd.com> ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1658490219; a=rsa-sha256; cv=none; b=WAZi65WmsiPxdQll+FUxRnkeDGHATGpZgxppc09kfh8k5Xs0QxyZj8eIx8qfH++3rXvXWN UiK3FoKQFZfMBYAczITu17uRZ+hIgl9hFsx57aDad1NM4Q8HSNArs4IukCfnU33Iq+550J 6CoOSW9mpDi51zYJhkj0h1QqkvhjoG8= ARC-Authentication-Results: i=1; imf12.hostedemail.com; dkim=pass header.d=alien8.de header.s=dkim header.b=mW4n+A9C; dmarc=pass (policy=none) header.from=alien8.de; spf=pass (imf12.hostedemail.com: domain of bp@alien8.de designates 5.9.137.197 as permitted sender) smtp.mailfrom=bp@alien8.de ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1658490219; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=ksPuM1kYKnp5lVqg/WP+CGQc5Ka79BDAGC9xOepY/I8=; b=t0duMBhGXpFJLpwsRL/ALTSR2EZ5hMsKE0lCbrA5jYkKErFLuVHpCjUozX/MUaIIAcyYtn 7knVxBNBGmiOBe1EB/SQFkf0fVWhUXRtc5VW/uQ2dSeExNJjLa62x155aSgUpojv0RVwbG k1ZzpVevHicOj8YPcGxj78raxeQdZHE= X-Rspamd-Server: rspam12 Authentication-Results: imf12.hostedemail.com; dkim=pass header.d=alien8.de header.s=dkim header.b=mW4n+A9C; dmarc=pass (policy=none) header.from=alien8.de; spf=pass (imf12.hostedemail.com: domain of bp@alien8.de designates 5.9.137.197 as permitted sender) smtp.mailfrom=bp@alien8.de X-Rspam-User: X-Stat-Signature: wt4d9g4fre6eq11sj7zxzipzem43cf1w X-Rspamd-Queue-Id: E922A40017 X-HE-Tag: 1658490216-860616 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Mon, Jun 20, 2022 at 11:02:33PM +0000, Ashish Kalra wrote: > diff --git a/arch/x86/kernel/sev.c b/arch/x86/kernel/sev.c > index 25c7feb367f6..59e7ec6b0326 100644 > --- a/arch/x86/kernel/sev.c > +++ b/arch/x86/kernel/sev.c > @@ -65,6 +65,8 @@ > * bookkeeping, the range need to be added during the RMP entry lookup. > */ > #define RMPTABLE_CPU_BOOKKEEPING_SZ 0x4000 > +#define RMPENTRY_SHIFT 8 > +#define rmptable_page_offset(x) (RMPTABLE_CPU_BOOKKEEPING_SZ + (((unsigned long)x) >> RMPENTRY_SHIFT)) > > /* For early boot hypervisor communication in SEV-ES enabled guests */ > static struct ghcb boot_ghcb_page __bss_decrypted __aligned(PAGE_SIZE); > @@ -2386,3 +2388,44 @@ static int __init snp_rmptable_init(void) > * available after subsys_initcall(). > */ > fs_initcall(snp_rmptable_init); > + > +static struct rmpentry *__snp_lookup_rmpentry(u64 pfn, int *level) > +{ > + unsigned long vaddr, paddr = pfn << PAGE_SHIFT; > + struct rmpentry *entry, *large_entry; > + > + if (!pfn_valid(pfn)) > + return ERR_PTR(-EINVAL); > + > + if (!cpu_feature_enabled(X86_FEATURE_SEV_SNP)) > + return ERR_PTR(-ENXIO); That test should happen first. > + vaddr = rmptable_start + rmptable_page_offset(paddr); Wait, what does that macro do? It takes the physical address and gives the offset from the beginning of the RMP table in VA space? So why don't you do entry = rmptable_entry(paddr) instead which simply gives you directly the entry in the RMP table with which you can work further? Instead of this macro doing half the work and then callers having to add the RMP start address and cast. And make it small function so that you can have typechecking too, while at it. > + if (unlikely(vaddr > rmptable_end)) > + return ERR_PTR(-ENXIO); > + > + entry = (struct rmpentry *)vaddr; > + > + /* Read a large RMP entry to get the correct page level used in RMP entry. */ > + vaddr = rmptable_start + rmptable_page_offset(paddr & PMD_MASK); > + large_entry = (struct rmpentry *)vaddr; > + *level = RMP_TO_X86_PG_LEVEL(rmpentry_pagesize(large_entry)); > + > + return entry; > +} > + > +/* > + * Return 1 if the RMP entry is assigned, 0 if it exists but is not assigned, > + * and -errno if there is no corresponding RMP entry. > + */ > +int snp_lookup_rmpentry(u64 pfn, int *level) > +{ > + struct rmpentry *e; > + > + e = __snp_lookup_rmpentry(pfn, level); > + if (IS_ERR(e)) > + return PTR_ERR(e); > + > + return !!rmpentry_assigned(e); > +} > +EXPORT_SYMBOL_GPL(snp_lookup_rmpentry); > diff --git a/include/linux/sev.h b/include/linux/sev.h > new file mode 100644 > index 000000000000..1a68842789e1 > --- /dev/null > +++ b/include/linux/sev.h Why is this header in the linux/ namespace and not in arch/x86/ ? All that stuff in here doesn't have any meaning outside of x86... -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette