From nobody Mon Feb 9 16:00:53 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 674BCC433EF for ; Tue, 24 May 2022 04:06:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234174AbiEXEGO (ORCPT ); Tue, 24 May 2022 00:06:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47534 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234143AbiEXEGD (ORCPT ); Tue, 24 May 2022 00:06:03 -0400 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 801CA100C for ; Mon, 23 May 2022 21:06:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1653365162; x=1684901162; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=axd6CIMkKKwgPL8PgFH1WkIgbrXV7y44ZdJBhgbW0e0=; b=S6tLWdDYGDPswjrq3xgDFgd7FnpDUXCWbhdlYAB9nmdFI8ndf2VE0llc KiJ57gGhB3lJL91qyA0poFM7IjtAE+3cSBEH02QnVtlnOGVO8RggRPsmK Cu1DeuhS98YsvYvLc6UUAYGKwjg6J1XXwiP9tPKdQBShnKZR57mz/SuBY rX0xwZIVSTLcEtiN7H0nA7WGK5IE8Ux7b6O+Hhlg5VRrSopQuoL9SPSz6 szZ5i/FOCyfXv3PoVNj9+A/nkHp/iaNj6pnKJ0Hc5kkwoO4YQ8jQfRAKk Q+21lRH/E78q6JEv8Od8bjJGU6abQGRaODmoLm1pEepJmg6Xjej1lUTbC g==; X-IronPort-AV: E=McAfee;i="6400,9594,10356"; a="336479188" X-IronPort-AV: E=Sophos;i="5.91,248,1647327600"; d="scan'208";a="336479188" Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 May 2022 21:05:56 -0700 X-IronPort-AV: E=Sophos;i="5.91,248,1647327600"; d="scan'208";a="526242039" Received: from jwosulli-mobl1.ger.corp.intel.com (HELO skuppusw-desk1.home) ([10.212.165.122]) by orsmga003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 May 2022 21:05:55 -0700 From: Kuppuswamy Sathyanarayanan To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org Cc: "H . Peter Anvin" , Kuppuswamy Sathyanarayanan , "Kirill A . Shutemov" , Tony Luck , Andi Kleen , Kai Huang , Wander Lairson Costa , Isaku Yamahata , marcelo.cerri@canonical.com, tim.gardner@canonical.com, khalid.elmously@canonical.com, philip.cox@canonical.com, linux-kernel@vger.kernel.org Subject: [PATCH v7 3/5] x86/mm: Make tdx_enc_status_changed() vmalloc address compatible Date: Mon, 23 May 2022 21:05:15 -0700 Message-Id: <20220524040517.703581-4-sathyanarayanan.kuppuswamy@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220524040517.703581-1-sathyanarayanan.kuppuswamy@linux.intel.com> References: <20220524040517.703581-1-sathyanarayanan.kuppuswamy@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" set_memory_*crypted() APIs are used to change encryption or decryption page attributes for the given address. It also by default support the conversion for the vmalloc'ed memory address. In TDX Guest, tdx_enc_status_changed() function is triggered by set_memory_*crypted() APIs when converting memory from/to shared or private. Internally this function uses __pa() for physical address conversion, which breaks the vmalloc address compatibility of the set_memory_*crypted() APIs. So add support to fix the vmalloc'ed address compatibility issue. Signed-off-by: Kuppuswamy Sathyanarayanan Acked-by: Wander Lairson Costa --- arch/x86/coco/tdx/tdx.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/arch/x86/coco/tdx/tdx.c b/arch/x86/coco/tdx/tdx.c index b49211994864..37d58675ccf1 100644 --- a/arch/x86/coco/tdx/tdx.c +++ b/arch/x86/coco/tdx/tdx.c @@ -15,6 +15,7 @@ #include #include #include +#include =20 /* TDX module Call Leaf IDs */ #define TDX_GET_INFO 1 @@ -680,8 +681,14 @@ static bool try_accept_one(phys_addr_t *start, unsigne= d long len, */ static bool tdx_enc_status_changed(unsigned long vaddr, int numpages, bool= enc) { - phys_addr_t start =3D __pa(vaddr); - phys_addr_t end =3D __pa(vaddr + numpages * PAGE_SIZE); + phys_addr_t start, end; + + if (is_vmalloc_addr((void *)vaddr)) + start =3D vmalloc_to_pfn((void *) vaddr) << PAGE_SHIFT; + else + start =3D __pa(vaddr); + + end =3D start + numpages * PAGE_SIZE; =20 if (!enc) { /* Set the shared (decrypted) bits: */ --=20 2.25.1