[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Resend RFC PATCH V4 13/13] x86/HV: Not set memory decrypted/encrypted during kexec alloc/free page in IVM
 
- To: Dave Hansen <dave.hansen@xxxxxxxxx>, kys@xxxxxxxxxxxxx, haiyangz@xxxxxxxxxxxxx, sthemmin@xxxxxxxxxxxxx, wei.liu@xxxxxxxxxx, decui@xxxxxxxxxxxxx, tglx@xxxxxxxxxxxxx, mingo@xxxxxxxxxx, bp@xxxxxxxxx, x86@xxxxxxxxxx, hpa@xxxxxxxxx, dave.hansen@xxxxxxxxxxxxxxx, luto@xxxxxxxxxx, peterz@xxxxxxxxxxxxx, konrad.wilk@xxxxxxxxxx, boris.ostrovsky@xxxxxxxxxx, jgross@xxxxxxxx, sstabellini@xxxxxxxxxx, joro@xxxxxxxxxx, will@xxxxxxxxxx, davem@xxxxxxxxxxxxx, kuba@xxxxxxxxxx, jejb@xxxxxxxxxxxxx, martin.petersen@xxxxxxxxxx, arnd@xxxxxxxx, hch@xxxxxx, m.szyprowski@xxxxxxxxxxx, robin.murphy@xxxxxxx, kirill.shutemov@xxxxxxxxxxxxxxx, akpm@xxxxxxxxxxxxxxxxxxxx, rppt@xxxxxxxxxx, Tianyu.Lan@xxxxxxxxxxxxx, thomas.lendacky@xxxxxxx, ardb@xxxxxxxxxx, robh@xxxxxxxxxx, nramas@xxxxxxxxxxxxxxxxxxx, pgonda@xxxxxxxxxx, martin.b.radev@xxxxxxxxx, david@xxxxxxxxxx, krish.sadhukhan@xxxxxxxxxx, saravanand@xxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxxx, keescook@xxxxxxxxxxxx, rientjes@xxxxxxxxxx, hannes@xxxxxxxxxxx, michael.h.kelley@xxxxxxxxxxxxx
 
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
 
- Date: Thu, 8 Jul 2021 21:54:15 +0800
 
- Cc: iommu@xxxxxxxxxxxxxxxxxxxxxxxxxx, linux-arch@xxxxxxxxxxxxxxx, linux-hyperv@xxxxxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, linux-scsi@xxxxxxxxxxxxxxx, netdev@xxxxxxxxxxxxxxx, vkuznets@xxxxxxxxxx, brijesh.singh@xxxxxxx, anparri@xxxxxxxxxxxxx
 
- Delivery-date: Thu, 08 Jul 2021 13:54:49 +0000
 
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
 
 
 
Hi Dave:
     Thanks for your review.
On 7/8/2021 12:14 AM, Dave Hansen wrote:
On 7/7/21 8:46 AM, Tianyu Lan wrote:
 
@@ -598,7 +599,7 @@ void arch_kexec_unprotect_crashkres(void)
   */
  int arch_kexec_post_alloc_pages(void *vaddr, unsigned int pages, gfp_t gfp)
  {
-       if (sev_active())
+       if (sev_active() || hv_is_isolation_supported())
                return 0;
  
  	/*
@@ -611,7 +612,7 @@ int arch_kexec_post_alloc_pages(void *vaddr, unsigned int 
pages, gfp_t gfp)
   
  void arch_kexec_pre_free_pages(void *vaddr, unsigned int pages)
  {
-       if (sev_active())
+       if (sev_active() || hv_is_isolation_supported())
                return;
 
You might want to take a look through the "protected guest" patches.  I
think this series is touching a few of the same locations that TDX and
recent SEV work touch.
https://lore.kernel.org/lkml/20210618225755.662725-5-sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx/
 
 
 Thanks for reminder. You are right. There will be a generic API to check 
"proteced guest" type.
 
 
    
     |