Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp582671pxt; Fri, 6 Aug 2021 08:50:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyYtI9JzTVT4hQ3ADticHLRWMv4SDVku3D538/UC3VeG/XC2o41rpnoSnAkoWMlP7E3l5HP X-Received: by 2002:a05:6402:11c6:: with SMTP id j6mr13713932edw.349.1628265053754; Fri, 06 Aug 2021 08:50:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628265053; cv=none; d=google.com; s=arc-20160816; b=VtCVLYbOCY7jzJDWlbN+2Cu9nGGH7Ts10Xl4w7fTq9TOxbjCUtN6G5gV8ls/quF1bo 1PMYqnc35eQZnAZEkLDgw5s95IyN7o7b2rcDh3WJNX8gtGztmYNepQJeN/7sOobeeFm2 KUujUjt3z5vz9k/AulVENWhcVMfE1MW8nAlcpQfQXKDSValpHMsvW8hHg8+Mwi/RDNMu Va/CJCCkf+ylTWHp9G0Z7GuMJF2PXcGAHUY+HlbSPQ/LtYqgqGE9HzgzkD1w9uU4SaeY FxLnSaX+PbtQLslQudsw8JmHi/YgVEjUw3eiw413oHEl6+9XNS5VYMjXSytqDpje0fJ1 HRZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:organization :from:references:cc:to:subject:dkim-signature; bh=6CCTGCsVlejSWa2TDvN4nfZAMgKaHGMDw5CATIJdm6E=; b=TizdI1g2g5Js+ELBYB17gz2T8rtVz17+J05KL2I8HfqzX94zxtSNJfRE/u1YbQI0o+ l5naq7oINcFm4O6WngKuL4m6B3sdkFrE9gkI0z6h8gH/uwriBI1MfsN42asvZ+DTO+uc z85jB4Xod3ADDiTZ+x+/SGxxtUNL9+S2yN9Fm/stmo2MTiRBIYjxUmmozhtHXoIRJEVx T1wxbD2h1VhLCdgDYQ2dMOCwpFU1CfME9PsYXDAPQYVsJtbn8vptLyeIdMOY4j3Fy5J1 G+AAMjtKqV0FNE5putTVOcImcet5oGXxEbP4ETORhMoZubBzbffDJwe+BotrpfF5I0S1 zfaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=MYSwsJJG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si8669010edw.429.2021.08.06.08.50.30; Fri, 06 Aug 2021 08:50:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=MYSwsJJG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245573AbhHFLj1 (ORCPT + 99 others); Fri, 6 Aug 2021 07:39:27 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:28308 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232445AbhHFLj1 (ORCPT ); Fri, 6 Aug 2021 07:39:27 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1628249951; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=6CCTGCsVlejSWa2TDvN4nfZAMgKaHGMDw5CATIJdm6E=; b=MYSwsJJGQpbfSg2leZGA4AF/cpFPNysJ6v+NXf7RXuzoMHnTStWatKg5F2i/JfXTccBu/0 uanVwSioqLHgFQWrkfhwggRNfOA2z2zofzVvauu+2rdVA2haX3GPeKbwqMDMiAcwtJFcGG PXSwO7BDPavNY85m8FqrmmZao925ydM= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-397-rGLezRTQPQCGfRM9r4PfBw-1; Fri, 06 Aug 2021 07:39:10 -0400 X-MC-Unique: rGLezRTQPQCGfRM9r4PfBw-1 Received: by mail-wm1-f69.google.com with SMTP id k5-20020a7bc3050000b02901e081f69d80so1927324wmj.8 for ; Fri, 06 Aug 2021 04:39:09 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=6CCTGCsVlejSWa2TDvN4nfZAMgKaHGMDw5CATIJdm6E=; b=VVGqjn/EtJBCJiWIfHWkwqf1e+iOlyPb8Trc+NB9UMykEfopYX2+dF8hk3I7kmQ74j Nt9bLJJsCmINTjwxGl7LpPEO+Y7jztTuSsd1QbP//6SurB8GSqDs/VFnw1dfZiOsWwFm kmjTlNA1oIpuOve5Tr7NVIn/kutCZ1sDW2j9Hs2iaepC/D1jubS6xkPlfKfw/fQKE6hZ wevigsnM4bfE++Me744kgosTTdmRQ2nZ8NRarAoP3nc+PPBxN7vZ9jRiKNZax7NvC4v0 ock34QwvRWP141fnf5tJHWUHtz+roCyt74l3VjyFoWGxr7yVSM0XBuJ5xdSTvY3DdTMM 9gaQ== X-Gm-Message-State: AOAM5300VZ/WQvhKxGj3pvV10mXdMYU4MspqC8vQmei34Q7EjHwzPZcs 8egfvluUZwPzmB7B57nmFDA8AYtFEHxbik57ReHNDFyOV4FOEF5T1MjtU8NcwOkxpDQXc/JBcIe 7mLuT+aEh9FXX5O345y7LQMfP X-Received: by 2002:a05:600c:35c1:: with SMTP id r1mr2807880wmq.101.1628249948973; Fri, 06 Aug 2021 04:39:08 -0700 (PDT) X-Received: by 2002:a05:600c:35c1:: with SMTP id r1mr2807863wmq.101.1628249948780; Fri, 06 Aug 2021 04:39:08 -0700 (PDT) Received: from [192.168.3.132] (p5b0c6104.dip0.t-ipconnect.de. [91.12.97.4]) by smtp.gmail.com with ESMTPSA id b15sm9184520wrx.73.2021.08.06.04.39.07 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 06 Aug 2021 04:39:08 -0700 (PDT) Subject: Re: [PATCH v3 03/14] KVM: s390: pv: leak the ASCE page when destroy fails To: Claudio Imbrenda Cc: kvm@vger.kernel.org, cohuck@redhat.com, borntraeger@de.ibm.com, frankja@linux.ibm.com, thuth@redhat.com, pasic@linux.ibm.com, linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, Ulrich.Weigand@de.ibm.com References: <20210804154046.88552-1-imbrenda@linux.ibm.com> <20210804154046.88552-4-imbrenda@linux.ibm.com> <6b75cc71-b996-cf3d-ce57-dbcd475ebc3a@redhat.com> <20210806113244.4d0712d2@p-imbrenda> From: David Hildenbrand Organization: Red Hat Message-ID: Date: Fri, 6 Aug 2021 13:39:07 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <20210806113244.4d0712d2@p-imbrenda> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06.08.21 11:32, Claudio Imbrenda wrote: > On Fri, 6 Aug 2021 09:31:54 +0200 > David Hildenbrand wrote: > >> On 04.08.21 17:40, Claudio Imbrenda wrote: >>> When a protected VM is created, the topmost level of page tables of >>> its ASCE is marked by the Ultravisor; any attempt to use that >>> memory for protected virtualization will result in failure. >>> >>> Only a successful Destroy Configuration UVC will remove the marking. >>> >>> When the Destroy Configuration UVC fails, the topmost level of page >>> tables of the VM does not get its marking cleared; to avoid issues >>> it must not be used again. >>> >>> Since the page becomes in practice unusable, we set it aside and >>> leak it. >> >> Instead of leaking, can't we add it to some list and try again later? >> Or do we only expect permanent errors? > > once the secure VM has been destroyed unsuccessfully, there is nothing > that can be done, this is a permanent error > >> Also, we really should bail out loud (pr_warn) to tell the admin that >> something really nasty is going on. > > when a destroy secure VM UVC fails, there are already other warnings > printed, no need to add one more > Okay, makes sense then to me, thanks! Might be worth adding some of that info to the patch description. -- Thanks, David / dhildenb