Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp267567pxt; Fri, 6 Aug 2021 01:16:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwDDO4LoMGoFK01d3AcC/HUxjagW5ZcjHreC+8GITozZewsTctxwvHIcoiaJuxgc9nvWTLO X-Received: by 2002:a05:6402:11c6:: with SMTP id j6mr11377019edw.349.1628237801847; Fri, 06 Aug 2021 01:16:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628237801; cv=none; d=google.com; s=arc-20160816; b=sAbPZ7gA0Je0KRsWEF6t6L+6zseUxBanlu5634y0fUFoCAZPs1dLL9CZAKmlRr9mMG DAVZyt4rp5xz/Vf9PvbJ5GSSioLIQbRBWpFcA96OZtJa2bHaRI/dCJPj/yc/N4o8rIz/ KBKT1D6XMa5MubAyEGS9EdUXGR9JYrMsTEexXzjnfZ6/uKjS9lWy+EXaXnY+4saXhGcG dPwZ0tQ/2QtHBl7Nk0/v/WNM9x5+umR1768M8sk8VeNCiSDhjJUNf7ni8W0WFKDDf9M3 jgSqrBmh1YDuOgwvv60sFYrZVE35WChs2mXUD0Vvx8wI0JPRXiQxhCR8VFCzqSOVldHz 904g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:organization :from:references:cc:to:subject:dkim-signature; bh=pVWC3UDptA7H+V1Kg/+VGDadWKlNerXuJRs5msdmzWc=; b=gKssfbdvFidRcfLlzKUHV2uBSv2gPyRUAOXiYRu1wWtg1pAfTZh5kxgCpdx7Z9lMhc AoXpHP0enDn4KI/Kj9qlRXMDw6rV61w8z2ATkzANeMbb6im+2UN42l/S0nq7rCIzdfP8 5ZKTTl0isYzc/Mv3jJ7EraAULEDGrA+IODnvodV3ayJEByD5b9uxK4dzkuQS74nV4QcS fEWJYahbVf8NbpHI9QKNJnJYdHBKiwUfsQoLD4RxA6st6gSh/KE01Nk96Hd+IoDgJ5u3 xiqGbPeZxYgp9oBDrEm+o9DzYX1X5GrRSGnm/rCA2i0c+X9pyMXpHshD8ubjtD08ZQCB pCtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=RZhsMLBq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b2si8339408ejc.314.2021.08.06.01.16.07; Fri, 06 Aug 2021 01:16:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=RZhsMLBq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230204AbhHFHcO (ORCPT + 99 others); Fri, 6 Aug 2021 03:32:14 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:59185 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233871AbhHFHcN (ORCPT ); Fri, 6 Aug 2021 03:32:13 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1628235117; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=pVWC3UDptA7H+V1Kg/+VGDadWKlNerXuJRs5msdmzWc=; b=RZhsMLBqXDzNvYL/aZr4aClU+Jr1nmFS71BZnyBac0kixbV1q+vqn76qfcbZV7QJd73MqJ MH4Hn4/5eS/wP6Pgaf31OLjf+BDE2uOiFA4YD5dokOGv2aEGzjg63/ucLFkJjZS7oKKP5e AWH2ehg2p4gnQ2BFp+Ep2kDbxbZem+A= Received: from mail-wr1-f72.google.com (mail-wr1-f72.google.com [209.85.221.72]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-356-Yr1MV10cOhq5oOEc-Mm9MQ-1; Fri, 06 Aug 2021 03:31:56 -0400 X-MC-Unique: Yr1MV10cOhq5oOEc-Mm9MQ-1 Received: by mail-wr1-f72.google.com with SMTP id r17-20020adfda510000b02901526f76d738so2860159wrl.0 for ; Fri, 06 Aug 2021 00:31:56 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=pVWC3UDptA7H+V1Kg/+VGDadWKlNerXuJRs5msdmzWc=; b=lxAAzkOFAq20jYCyYrOaZHScJyBeMlSW/NeWe/DTJeZB0Fqaak149BhYm3VVU591PJ klbeKovN/xKcmkT8lQaxY+zvCiBThiTG7wXHQl/fUseL0VARCmIvtixffIZ8jHOz4nIn cLvdG2LIs+hbnGuoDF/vLlxqt/LIPXozEBU3etZ7PMcRbZs1S78NFmLhq1zX3AFWPt3v NA0rq1ChslRP36DgbSKZmw1U1XfLAq+ADBrnkv71L53670RLnjYAAKSRitoWYfDfPuWg GEsRfojDtfwESLYsxnQwve4htZMAelzY4sCy2PzrTMx6F8arNloQL475n2O56FOAPYrN t+8w== X-Gm-Message-State: AOAM5310l5tarOjr07eWprthddNdelQXZow/acrOZQQUO6JkG4AIlMO6 Puw2tu9d9lb3ZRXxeK0Ez+8CUb/cd7JU0uSoD55RZHLElLWsF9UMPbQmpTAkSXsejx9QFeqCsDc YvNzAKKQeHt+Pyz2vhpEGtF0s X-Received: by 2002:adf:d84b:: with SMTP id k11mr9111341wrl.135.1628235115559; Fri, 06 Aug 2021 00:31:55 -0700 (PDT) X-Received: by 2002:adf:d84b:: with SMTP id k11mr9111324wrl.135.1628235115424; Fri, 06 Aug 2021 00:31:55 -0700 (PDT) Received: from [192.168.3.132] (p5b0c6104.dip0.t-ipconnect.de. [91.12.97.4]) by smtp.gmail.com with ESMTPSA id o24sm9843900wmm.37.2021.08.06.00.31.54 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 06 Aug 2021 00:31:55 -0700 (PDT) Subject: Re: [PATCH v3 03/14] KVM: s390: pv: leak the ASCE page when destroy fails To: Claudio Imbrenda , kvm@vger.kernel.org Cc: cohuck@redhat.com, borntraeger@de.ibm.com, frankja@linux.ibm.com, thuth@redhat.com, pasic@linux.ibm.com, linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, Ulrich.Weigand@de.ibm.com References: <20210804154046.88552-1-imbrenda@linux.ibm.com> <20210804154046.88552-4-imbrenda@linux.ibm.com> From: David Hildenbrand Organization: Red Hat Message-ID: <6b75cc71-b996-cf3d-ce57-dbcd475ebc3a@redhat.com> Date: Fri, 6 Aug 2021 09:31:54 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <20210804154046.88552-4-imbrenda@linux.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04.08.21 17:40, Claudio Imbrenda wrote: > When a protected VM is created, the topmost level of page tables of its > ASCE is marked by the Ultravisor; any attempt to use that memory for > protected virtualization will result in failure. > > Only a successful Destroy Configuration UVC will remove the marking. > > When the Destroy Configuration UVC fails, the topmost level of page > tables of the VM does not get its marking cleared; to avoid issues it > must not be used again. > > Since the page becomes in practice unusable, we set it aside and leak it. Instead of leaking, can't we add it to some list and try again later? Or do we only expect permanent errors? Also, we really should bail out loud (pr_warn) to tell the admin that something really nasty is going on. -- Thanks, David / dhildenb