Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp4218075pxb; Mon, 8 Feb 2021 10:37:36 -0800 (PST) X-Google-Smtp-Source: ABdhPJzquHoLyVyg/PdLlclMS0eEKuJxMyyg6MOIVALm03LlFnk8LKm1yjWcf6LDaeObgYzN7eFj X-Received: by 2002:a50:fd97:: with SMTP id o23mr17513917edt.306.1612809456519; Mon, 08 Feb 2021 10:37:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612809456; cv=none; d=google.com; s=arc-20160816; b=BH14ZlImWLMaV8N9yZQOwEL0WILOmwVei60WDDyVHhchcuiZx0tIAPvmRVeYmPjaxm nMpbGMazUtrbo05FaaFrAU+uuadLm7iCbFszKher1Y6EeMcDIeW34t/N9WWB1tJI6cdJ 1zMmrV1kY3PxMzJ9vU8FwxCXLlhlD50YCdatOIQwhMhp/MQp8WxIIof3+EM4lOREV408 /lK5Gzj5l97Z1RHzRBAl2mZ3oTiZV2D+HS74MKmy2ZRUPvN2LnjL495IKxtWYDKGR7c0 zEkfpT6EOFIonbpRsxgkzRpOF1Ui/h5nliOmTmssVl/LyFAZP/lFjtLBiAwASKdcw77O QUPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:ironport-sdr :ironport-sdr; bh=ql/p6kGfpebRyXKrhBFw5OP3iz6ugZrCUn+EMjBvGYU=; b=myzynTc96yvAdIFJ2A2gKH28tjysrLZPYRnrCZOIVJNlS7o6StmCwZSY2aElc4Oeac s7Mx1fzZuICsi8n5c2mZlaCaJGbr3KtHB1En4AT9TG7uOrnnEaIq/NfDVTWLE++9tWV3 XkodT5GnI9flvTAl8SY38f6iQy0bR2xM2v6clFcIZesDlCcrMPexx/YtHzlqAbAPV+ry glr0oolBNyhFRtq5Qqy115Zyn+WLGvqLEcm6ZMv3chSkZj5BE+2/oPLV92zHZ3ymv3aS 9VQ9XA+kT+0kk4RuKkXo6g87t/NbqTlecdvnkq6D/AkWUaKKavRjpCb0N0zHBWPkZg33 kb5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e23si12854070edu.203.2021.02.08.10.37.12; Mon, 08 Feb 2021 10:37:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235636AbhBHSg1 (ORCPT + 99 others); Mon, 8 Feb 2021 13:36:27 -0500 Received: from mga07.intel.com ([134.134.136.100]:56479 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234386AbhBHQYz (ORCPT ); Mon, 8 Feb 2021 11:24:55 -0500 IronPort-SDR: R86VVuV5TWHoH7XsLokun5P0u5v+8njqJuos50hY4yxYmtFWzNcHUDA4wLUck0WAHrk/5Vp0kb t5PYUaEOlhBw== X-IronPort-AV: E=McAfee;i="6000,8403,9889"; a="245808148" X-IronPort-AV: E=Sophos;i="5.81,162,1610438400"; d="scan'208";a="245808148" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Feb 2021 08:23:07 -0800 IronPort-SDR: XgokToR/vwQMpgN/NoXF/Xw+qqURHCxxdE2gq4ZFUzA3eUV+rTJTyC/f6+dVP3Qv+vqEtxheqj Vy+PvYpw02Ag== X-IronPort-AV: E=Sophos;i="5.81,162,1610438400"; d="scan'208";a="411103555" Received: from tassilo.jf.intel.com ([10.54.74.11]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Feb 2021 08:23:06 -0800 Date: Mon, 8 Feb 2021 08:23:01 -0800 From: Andi Kleen To: Peter Zijlstra Cc: Kuppuswamy Sathyanarayanan , Andy Lutomirski , Dave Hansen , Kirill Shutemov , Kuppuswamy Sathyanarayanan , Dan Williams , Raj Ashok , Sean Christopherson , linux-kernel@vger.kernel.org, Sean Christopherson Subject: Re: [RFC v1 05/26] x86/traps: Add #VE support for TDX guest Message-ID: <20210208162301.GA365765@tassilo.jf.intel.com> References: <48a702f536ccf953eee5778023ed6d1a452f6dcf.1612563142.git.sathyanarayanan.kuppuswamy@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Which is supposedly then set up to avoid #VE during the syscall gap, > yes? Which then results in #VE not having to be IST. Yes that is currently true because all memory is pre-accepted. If we ever do lazy accept we would need to make sure the memory accessed in the syscall gap is already accepted, or move over to an IST. > > +#ifdef CONFIG_INTEL_TDX_GUEST > > +DEFINE_IDTENTRY(exc_virtualization_exception) > > +{ > > + struct ve_info ve; > > + int ret; > > + > > + RCU_LOCKDEP_WARN(!rcu_is_watching(), "entry code didn't wake RCU"); > > + > > + /* Consume #VE info before re-enabling interrupts */ > > So what happens if NMI happens here, and triggers a nested #VE ? Yes that's a gap. We should probably bail out and reexecute the original instruction. The VE handler would need to set a flag for that. Or alternatively the NMI always gets the VE information and puts it on some internal stack, but that would seem clunkier. -Andi