[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Resend RFC PATCH V4 13/13] x86/HV: Not set memory decrypted/encrypted during kexec alloc/free page in IVM
- To: Dave Hansen <dave.hansen@xxxxxxxxx>, kys@xxxxxxxxxxxxx, haiyangz@xxxxxxxxxxxxx, sthemmin@xxxxxxxxxxxxx, wei.liu@xxxxxxxxxx, decui@xxxxxxxxxxxxx, tglx@xxxxxxxxxxxxx, mingo@xxxxxxxxxx, bp@xxxxxxxxx, x86@xxxxxxxxxx, hpa@xxxxxxxxx, dave.hansen@xxxxxxxxxxxxxxx, luto@xxxxxxxxxx, peterz@xxxxxxxxxxxxx, konrad.wilk@xxxxxxxxxx, boris.ostrovsky@xxxxxxxxxx, jgross@xxxxxxxx, sstabellini@xxxxxxxxxx, joro@xxxxxxxxxx, will@xxxxxxxxxx, davem@xxxxxxxxxxxxx, kuba@xxxxxxxxxx, jejb@xxxxxxxxxxxxx, martin.petersen@xxxxxxxxxx, arnd@xxxxxxxx, hch@xxxxxx, m.szyprowski@xxxxxxxxxxx, robin.murphy@xxxxxxx, kirill.shutemov@xxxxxxxxxxxxxxx, akpm@xxxxxxxxxxxxxxxxxxxx, rppt@xxxxxxxxxx, Tianyu.Lan@xxxxxxxxxxxxx, thomas.lendacky@xxxxxxx, ardb@xxxxxxxxxx, robh@xxxxxxxxxx, nramas@xxxxxxxxxxxxxxxxxxx, pgonda@xxxxxxxxxx, martin.b.radev@xxxxxxxxx, david@xxxxxxxxxx, krish.sadhukhan@xxxxxxxxxx, saravanand@xxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxxx, keescook@xxxxxxxxxxxx, rientjes@xxxxxxxxxx, hannes@xxxxxxxxxxx, michael.h.kelley@xxxxxxxxxxxxx
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Date: Thu, 8 Jul 2021 21:54:15 +0800
- Cc: iommu@xxxxxxxxxxxxxxxxxxxxxxxxxx, linux-arch@xxxxxxxxxxxxxxx, linux-hyperv@xxxxxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, linux-scsi@xxxxxxxxxxxxxxx, netdev@xxxxxxxxxxxxxxx, vkuznets@xxxxxxxxxx, brijesh.singh@xxxxxxx, anparri@xxxxxxxxxxxxx
- Delivery-date: Thu, 08 Jul 2021 13:54:49 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
Hi Dave:
Thanks for your review.
On 7/8/2021 12:14 AM, Dave Hansen wrote:
On 7/7/21 8:46 AM, Tianyu Lan wrote:
@@ -598,7 +599,7 @@ void arch_kexec_unprotect_crashkres(void)
*/
int arch_kexec_post_alloc_pages(void *vaddr, unsigned int pages, gfp_t gfp)
{
- if (sev_active())
+ if (sev_active() || hv_is_isolation_supported())
return 0;
/*
@@ -611,7 +612,7 @@ int arch_kexec_post_alloc_pages(void *vaddr, unsigned int
pages, gfp_t gfp)
void arch_kexec_pre_free_pages(void *vaddr, unsigned int pages)
{
- if (sev_active())
+ if (sev_active() || hv_is_isolation_supported())
return;
You might want to take a look through the "protected guest" patches. I
think this series is touching a few of the same locations that TDX and
recent SEV work touch.
https://lore.kernel.org/lkml/20210618225755.662725-5-sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx/
Thanks for reminder. You are right. There will be a generic API to check
"proteced guest" type.
|