From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.2 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MSGID_FROM_MTA_HEADER,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 772A0C07E95 for ; Mon, 19 Jul 2021 21:34:56 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id DC73C6113A for ; Mon, 19 Jul 2021 21:34:55 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org DC73C6113A Authentication-Results: mail.kernel.org; dmarc=fail (p=quarantine dis=none) header.from=amd.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 48C216B012E; Mon, 19 Jul 2021 17:34:56 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 43BDF6B012F; Mon, 19 Jul 2021 17:34:56 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 240D86B0130; Mon, 19 Jul 2021 17:34:56 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0073.hostedemail.com [216.40.44.73]) by kanga.kvack.org (Postfix) with ESMTP id E97246B012E for ; Mon, 19 Jul 2021 17:34:55 -0400 (EDT) Received: from smtpin10.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 6D2A820BD6 for ; Mon, 19 Jul 2021 21:34:54 +0000 (UTC) X-FDA: 78380642508.10.EE4BDB5 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2088.outbound.protection.outlook.com [40.107.223.88]) by imf18.hostedemail.com (Postfix) with ESMTP id D92624002092 for ; Mon, 19 Jul 2021 21:34:53 +0000 (UTC) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OvrKggBdPD80lZTsqNtz/MCc/zKLFiaxDPKkmgNQWzGGomiO70w+qhDA/s/wTRvYCaw66ETqVBoFBEJQVbgrmOwdssQDZ63mGw4RCq20SMLy2TCwFzxbbjeQtg7br5jMsEEvmS8D0xg9NEmlsbQ+q8ljyXENLg8KGLx8q/ogNk42A1CO4HCLOlWYaTAMvY21RO05T7+rbWEhT9iyusDBtZDsDQmvHSitVUSmncOHIVYPZtUQ73annMaG594qg3KfU8HTspdNFbpk0PLiT6CICAF2fJQ5WQAFdGJJtzarPEduiaeUNdkxze9lpi47lQJwd51Do0C2+3hFpMqvfRDoxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6JoeORAA/fqGx16l534blhrvPxVCpfHSUxf23zzZX50=; b=XDVUuGqqZK7hpyvWsORwoQUrY1qtwDtH73xQpCK+pdtojVP1AwXrFQIjwnJWm6ti4MvMrHFmrNq2zDJMSJ2mdjQ/Q7APBWxxyYh9WZwaUb30ArxEdtAtiq4XyoVM4AhmovUc2qF2R73AkQNJ5/n57wGIA5qa+xfJgMMrTyH0/AnRfIkY77PBM9wL3JN+s9jWrH57p2xFiJAUPzh5szlyFodoQtNsf2/T4zpmkDqzOLXtcBoJySmg4ANXE8n0wnJrz8ySbRPAPHaNdeWkJ25JMi+CiWNKiG0CrLqVF2aLLNC/7X/1aFtBXKeGPBNJHtMiHzo0GHXE6wk3yVhXkemAjQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6JoeORAA/fqGx16l534blhrvPxVCpfHSUxf23zzZX50=; b=RSyixSLm8RM+jE/XcuY//mvaNUmnXHYoT4fWR8zCCFQYt8vhHnVkUZdZumsh7GWRmwMVT+KoCqY48WMtEsNQlZLjKsFqlTMDeQnV5vsBN0nwe5rEdDR/zx1ReoG5VWc2PyOM1F3vcc6hlrkAgqctoE8f2u/Px+8Eiw15jGv/RKU= Received: from SN6PR12MB2718.namprd12.prod.outlook.com (2603:10b6:805:6f::22) by SA0PR12MB4415.namprd12.prod.outlook.com (2603:10b6:806:70::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.26; Mon, 19 Jul 2021 21:34:51 +0000 Received: from SN6PR12MB2718.namprd12.prod.outlook.com ([fe80::a8a9:2aac:4fd1:88fa]) by SN6PR12MB2718.namprd12.prod.outlook.com ([fe80::a8a9:2aac:4fd1:88fa%3]) with mapi id 15.20.4331.033; Mon, 19 Jul 2021 21:34:51 +0000 Cc: brijesh.singh@amd.com, x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-efi@vger.kernel.org, platform-driver-x86@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, Thomas Gleixner , Ingo Molnar , Joerg Roedel , Tom Lendacky , "H. Peter Anvin" , Ard Biesheuvel , Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Andy Lutomirski , Dave Hansen , Sergio Lopez , Peter Gonda , Peter Zijlstra , Srinivas Pandruvada , David Rientjes , Dov Murik , Tobin Feldman-Fitzthum , Borislav Petkov , Michael Roth , Vlastimil Babka , tony.luck@intel.com, npmccallum@redhat.com, brijesh.ksingh@gmail.com Subject: Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command To: Sean Christopherson References: <20210707183616.5620-1-brijesh.singh@amd.com> <20210707183616.5620-25-brijesh.singh@amd.com> From: Brijesh Singh Message-ID: <4af1b784-2744-5f9e-59f6-dd8b9de2ec4d@amd.com> Date: Mon, 19 Jul 2021 16:34:48 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-ClientProxiedBy: SN7PR04CA0013.namprd04.prod.outlook.com (2603:10b6:806:f2::18) To SN6PR12MB2718.namprd12.prod.outlook.com (2603:10b6:805:6f::22) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from [10.236.31.95] (165.204.77.1) by SN7PR04CA0013.namprd04.prod.outlook.com (2603:10b6:806:f2::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.21 via Frontend Transport; Mon, 19 Jul 2021 21:34:49 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 44bc5843-bfe4-41fc-012f-08d94afd0a3f X-MS-TrafficTypeDiagnostic: SA0PR12MB4415: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN6PR12MB2718.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(346002)(136003)(366004)(396003)(39860400002)(376002)(316002)(66556008)(66476007)(36756003)(4326008)(66946007)(16576012)(54906003)(186003)(53546011)(86362001)(52116002)(7416002)(31696002)(478600001)(7406005)(6916009)(956004)(2616005)(8936002)(5660300002)(8676002)(44832011)(38350700002)(38100700002)(83380400001)(2906002)(6486002)(31686004)(26005)(45980500001)(43740500002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?UFhkMTlkMFJ2M29GVDNLNVlkOFUxWENQS2VUVG4vcHFxTkwxU1RXNkR4SW8w?= =?utf-8?B?b2FCYmx2Q056Z3p6SDlobzdhQVlaajRQMHF4dEI2akZpR3YwNjdJem9ObmU0?= =?utf-8?B?U0c1OTJlT0RTSGZMcE5HZWFjRFdkczlqWmhyY3FPZ25QUHQvSFRoVXB6dGo0?= =?utf-8?B?RExWTlJCUy9aZlZaWDAzSllZZVJGSHRqc3l2bDMwZWowYUp3THdNWHQzMVBY?= =?utf-8?B?YXEreFRPRmlieTQwRVFNRzJzaHRuemRmbGMvc3MzUGp3dWZ6WUpqeFE0OWpi?= =?utf-8?B?ckRMbUw5K0tKS2pzaXgwNHNTQ0hZWE9KQjdOTGNmQmRlR0MwNFlPOWxhNUxC?= =?utf-8?B?L0pscmVjUi9EcTRuNTcyakEveFZDNkZzZitEYmxINXEvdGVMeFdIVDJ1NzBF?= =?utf-8?B?ckFoZXFhYnRZQ3JjcDltUzN5ZXBJZGFxSkcxYjdOaXRnM0w0czFUQjQxN2NY?= =?utf-8?B?VGFUamFjblZIT1lJTHY5NzB2RHhLL3F1M3dEOFhITzJZcW03czg1L0U0cTJm?= =?utf-8?B?RGI0SHpEVlE0Wm92SUFwRVFTUCtBZnNpSnVjWWoybDRiT2hGa3p6WkFvNUlM?= =?utf-8?B?a3lXaC9KMmllQkhCcGhqSEFMNzViQlJXalBja1FUNFZoUE55aUpQU2k4WDMv?= =?utf-8?B?a0lRSWh6UDhMVm13emdmNGVycUVVV2tSTDlWMENaSEhabXFVdm53OENNK1B4?= =?utf-8?B?MEVFaEtRUUtvdWhhMmpxL2o3SkpmY1BUY0tsN0NRSUdlTVBZUmFqMlh1ZGtk?= =?utf-8?B?QTBQOWczNkc0UEdEQ3RoSGZDWEZ4MWdHTUdFWE8vQkhTVE1DVVM0TmFraXlr?= =?utf-8?B?QnVLc2hYTjJhWWQwLzlqRHhSZ1ZWcnlRbTlTZlpUNi9qc0h5SW9NUHR2aFJy?= =?utf-8?B?czlxWEp5OXgxekRqVkRrK2JKNGZFeEZTdmVTbFlNNVFIdWRZRk1keFFDTXJO?= =?utf-8?B?QXFTVm94RDBiZmpCekZ6aWpKMjZGcDJ5TE15SjJMS1YrVFQ5TG1RSVg2dmlR?= =?utf-8?B?ZjVLWTBVd2dIN2tiVnBncm9zeGFPWEV3TUwrRnNDTWVqSDlZTUZjak10RlRq?= =?utf-8?B?NHNkWnE2eUtJbEE1NGttUTZtejMxRzg2L3VBUk82SGNwaTFvOERXMGRIQ3hD?= =?utf-8?B?emNVNjF2OTRzOUlEcWhucTJBektnTm9pRkx1WHRBUXZXYjkyWERTQnVkdEt1?= =?utf-8?B?R1c1SDdXUzZBMzl5cnhLNlBMNGkrUjFEQWRvS0tsSmxjZm1DblRibWZhMXBm?= =?utf-8?B?YktmT0VzUU1qWlpMSlY1SWR2SHA2WkI3TlpxaDNsaFpSdEdKTWduaUpGR3oy?= =?utf-8?B?djJ0c0t4eUdzUUpxRWphWFpLNi80b1Q3eFRhblQ0aEg2TE9aNkorQlF5MUNP?= =?utf-8?B?OEVEZEJ6ZGdSc2krQWIrSjB3MWIwcUlKd20xcERPRlVlcEVodTBpNnpFb1hp?= =?utf-8?B?aG8wQVl2R2luTXRUbkJPWHBGdnQ0cFZhTUs5MHNXZ283ckcxc2xycnJuNmlV?= =?utf-8?B?VGQ2YmpiR213STVyTzlaTFpnUjlVR0FqejRyUjNlbDB0M29RUHcxamRCdWcv?= =?utf-8?B?dkFVdVRjZkxrWEgyR1hZZDBvbDR3OWl4alhKd1J3VVc4TklvN25WejZzYlBU?= =?utf-8?B?RGo3ZndHeDF4ejdmamwzcE9TN0l4NzhLRXZEeHRoaGhOUHlDZ054VzR5L3Bq?= =?utf-8?B?RkMyVFRnSzVZZGZNc29NcGptbnhGeGZoRUtPbVhweFBraFZVNCtNRWpiUThI?= =?utf-8?Q?BpZW/MqZdEUovmvqYz+SXKqyANwNfzVy0FGoDYn?= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 44bc5843-bfe4-41fc-012f-08d94afd0a3f X-MS-Exchange-CrossTenant-AuthSource: SN6PR12MB2718.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Jul 2021 21:34:51.0687 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: qWmFeoOKDET11WKs4AFBf8c2xE/NbrpQmWVDYpeuPL8PRMF5SMTyGmtgnO9i3TWrTKUKUP6sMKURODEBgliYzA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR12MB4415 Authentication-Results: imf18.hostedemail.com; dkim=pass header.d=amd.com header.s=selector1 header.b=RSyixSLm; spf=pass (imf18.hostedemail.com: domain of brijesh.singh@amd.com designates 40.107.223.88 as permitted sender) smtp.mailfrom=brijesh.singh@amd.com; dmarc=pass (policy=quarantine) header.from=amd.com X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: D92624002092 X-Stat-Signature: g9rythpkiehahx7sxr867xh8kfmx5wpf X-HE-Tag: 1626730493-407086 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 7/19/21 3:51 PM, Sean Christopherson wrote: > > Hmm, and there's no indication on success that the previous entry was assigned? > Adding a tracepoint in rmpupdate() to allow tracking transitions is probably a > good idea, otherwise debugging RMP violations and/or unexpected #VC is going to > be painful. > Absolutely agree. It's in my TODO list for v5. I have been using my private debug patches with all those trace debug and will try to pull some of those in v5. > And/or if the kernel/KVM behavior is to never reassign directly and reading an RMP > entry isn't prohibitively expensive, then we could add a sanity check that the RMP > is unassigned and reject rmpupdate() if the page is already assigned. Probably > not worth it if the overhead is noticeable, but it could be nice to have if things > go sideways. > In later patches you see that during the page-state change, I do try to read RMP entry to detect some of these condition and warn user about them. The GHCB specification lets the hypervisor choose how it wants to handle the case in guest wanting to add the previously validated page. > > To be clear, it's not just an optimization. Pages that haven't yet been touched > may be already owned by a different VM (or even this VM). I.e. "reverting" those > pages would actually result in a form of corruption. It's somewhat of a moot point > because assigning a single page to multiple guests is going to be fatal anyways, > but potentially making a bug worse by introducing even more noise/confusion is not > good. > As you said, if a process is assigning the same page to multiple VMs then its fatal but I agree that we should do the right thing from the kernel ioctl handling. I will just clear the RMP entry for the pages which we touched. thanks