[RFC PATCH] drm/ttm, drm/vmwgfx: Have TTM support AMD SEV encryption
Koenig, Christian
Christian.Koenig at amd.com
Tue May 28 15:17:44 UTC 2019
Hi Thomas,
Am 28.05.19 um 17:11 schrieb Thomas Hellstrom:
> Hi, Tom,
>
> Thanks for the reply. The question is not graphics specific, but lies
> in your answer further below:
>
> On 5/28/19 4:48 PM, Lendacky, Thomas wrote:
>> On 5/28/19 2:31 AM, Thomas Hellstrom wrote:
>> [SNIP]
>> As for kernel vmaps and user-maps, those pages will be marked encrypted
>> (unless explicitly made un-encrypted by calling set_memory_decrypted()).
>> But, if you are copying to/from those areas into the un-encrypted DMA
>> area then everything will be ok.
>
> The question is regarding the above paragraph.
>
> AFAICT, set_memory_decrypted() only changes the fixed kernel map PTEs.
> But when setting up other aliased PTEs to the exact same decrypted
> pages, for example using dma_mmap_coherent(), kmap_atomic_prot(),
> vmap() etc. What code is responsible for clearing the encrypted flag
> on those PTEs? Is there something in the x86 platform code doing that?
Tom actually explained this:
> The encryption bit is bit-47 of a physical address.
In other words set_memory_decrypted() changes the physical address in
the PTEs of the kernel mapping and all other use cases just copy that
from there.
That's rather nifty, because this way everybody will either use or not
use encryption on the page.
Christian.
>
> Thanks,
> Thomas
>
>
>>
>> Things get fuzzy for me when it comes to the GPU access of the memory
>> and what and how it is accessed.
>>
>> Thanks,
>> Tom
More information about the dri-devel
mailing list