Re: [PATCH kernel 6/9] x86/dma-direct: Stop changing encrypted page state for TDISP devices
From: Jason Gunthorpe
Date: Tue Mar 03 2026 - 07:29:44 EST
On Tue, Mar 03, 2026 at 07:19:36PM +1100, Alexey Kardashevskiy wrote:
> > It seems from your email that the CPU S2 has the Cbit as part of the
> > address and the S1 feeds it through to the S2, so it is genuinely has
> > two addres spaces?
>
> S1/S2 PTEs have Cbit. Addresses to look up those PTEs - do not.
So we are back to what I was saying before: using phys_addr_t to
encode a PTE bit is probably a very confusing idea - especially when
contrasted with the other arches that have a legitimate address bit.
> > Same way it knows if there is no S1?
>
> If no S1 - then sDTE decides on Cbit for the entire ASID (with the help of vTOM).
Sounds like the intention was the IOMMU shared/private space would be
controlled with vTOM which actually does a create a legitimate address
bit in the phys_addr_t.
A sDTE global control is OK for non-TDISP devices, or even devices
that haven't entered RUN yet, but it is not OK for a TDISP device that
must still be able to access shared memory.
> I understand I am often confusing, trying to unconfuse (including myself)... Thanks,
It seems to me the AMD architecture itself is pretty confusing. :\
Jason