Received: by 2002:a05:6358:16cd:b0:dc:6189:e246 with SMTP id r13csp1569732rwl; Fri, 4 Nov 2022 16:05:09 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4acykQPMWzqiQ6Z7tQA3ABaDmsIWZYw0wtLRfk83a5kSchfEXxzYYtIuenNyEmDNjaANPL X-Received: by 2002:a17:906:730d:b0:78e:9ca5:3269 with SMTP id di13-20020a170906730d00b0078e9ca53269mr37013244ejc.366.1667603108961; Fri, 04 Nov 2022 16:05:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667603108; cv=none; d=google.com; s=arc-20160816; b=zPt16e99eF663ZR/BcgBQkRtU9nD9YEPKBuqYqhlzpqf1QYMcySe7riIljs48OUh2E CwkViVdCJ0nbZhExGuqHZfII6cJAY/on0ldh4p8nkwT53jLA33XQlfqtFHyI+QRHdMU7 60h7MSQNgZiXrTX0DB2Dm2rot8N/iO19ZWDS/gyXXjWxMq8wEIYjPsfzqf9+Eg13CvgW YDuzqImYDb5eKE60gUC/drV+ef6bzbiUEbyTRAR9nEXMWppcmCIU+sIyDd7p82kPGsnM 3ruBPtF/idrxDWCatng1WYsJgIjdE+5qgYOs8yCoPMJFUbHhk/uAHU7N1gekzJTv5PSm LouQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=LUDNOFrCabE9fqr4CIKxpjV0lKU31zwrwQxKjbNeIvE=; b=rx5mBKSq8g+6c4U5dmYQ9RP3vbl3mFrumT26JQIs3I5Pn5qWLffVur4kmhB4lxpl5a gGrcitBq/90IRmou69djH5ltXy5O5UjpbbEd3MYqtu8tEDxSetPQ1rtVB1fT9HNeNpUK pIzO8LaW3ONxRwp782Wfp8RQ+0c7/H4N9nSbl1KVQiSVWuYi78J5uXcE9DIV8xAVgWJW pUKRf/J8XqcuRlLWNXcPQu0aroUFJB/R6kN6AXoZcPFlepwbtSN3e6kaL3VkhFFJI0Vy WstJiSNhH6udDzXXugH6CQNiYazcQ66pHczf1+EQN7IzbX/tfFzhAlFx9jgT/uQxoM9A 0mAQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=VhaCKaZB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gt34-20020a1709072da200b0078dcddc1b8csi307797ejc.788.2022.11.04.16.04.45; Fri, 04 Nov 2022 16:05:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=VhaCKaZB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229628AbiKDXA5 (ORCPT + 97 others); Fri, 4 Nov 2022 19:00:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36410 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229667AbiKDXAw (ORCPT ); Fri, 4 Nov 2022 19:00:52 -0400 Received: from mail-pl1-x64a.google.com (mail-pl1-x64a.google.com [IPv6:2607:f8b0:4864:20::64a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ECCE642F72 for ; Fri, 4 Nov 2022 16:00:48 -0700 (PDT) Received: by mail-pl1-x64a.google.com with SMTP id n1-20020a170902f60100b00179c0a5c51fso4446999plg.7 for ; Fri, 04 Nov 2022 16:00:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=LUDNOFrCabE9fqr4CIKxpjV0lKU31zwrwQxKjbNeIvE=; b=VhaCKaZBHbMc2kop6ZZi96uSrzdSP01GxTxv1w46LALkG4vLaDRK+fM6mtqq5wq5FW EGfO8Qz2QNywChLOhqfqOwlK0FBWb5X+rAgsBOn6bWneCwT3AP4nEJD/weHKxgY+1Z9v Uj6seLeo5MPyY/+WY8os7G7zQf5Y63SZ730dDKTUvEqDbOI3LzwFI96I3t074ZOK4zio 1+KAJ5ljdwSiRtqWVTRC8QGu/0Jvm0048bHot24Haniy4XOVlN75Hs2k+uS9cjZtHwrT 6+3qO87fpuAVgilzktZYufzJy/auGsZ8IqNwsZ7PdEm3X6lZhi/v14W/D72OTNyTZDJC rUOg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=LUDNOFrCabE9fqr4CIKxpjV0lKU31zwrwQxKjbNeIvE=; b=B03wfUOrfj/gz8Lq8rDvbcYadJ0j8UIDKVtpYQ+MXK8RoL24Lq/vdKYHdcphrBC1lr j1Y7wWIhKeusUc4ACvPHV++QusXtKh6Iubw5Z9xTI6gfUIA2rngoWBHwNeM4s2Hkbe+j sagP7EiodY+UfdtSldCukfGd4Wd34hKNFWbzF8l0rgsw5jncJ677nm7yZZ/zqjF/u9JQ 4D5ssJ8abuEiqBChZOxqXwVz0wkpojD3x2fUqX7mLprQymj1hKG2rBMX2XL1dSAKmZ9B HFFiBTpvXb+0SQYidcR1drIncfpCo2oYc4wN/sGvtNRuBULHRWDF/Ekng4DUODVECEXt IwoQ== X-Gm-Message-State: ACrzQf02/LyG18jJgEj4IOK6dbFjMQdxtQ4z2Dsn+3tn56yKo1bRvndU ZjdtHKebTf0dWpGm5v/EfT7bucms1mOsbtoB1s60lIDs3VoUVqe4fyE1W0GR6OF07rf5A2ksRzl i5Tr6O4VYcIFvbT1oYz6AKdrOwAYBFLcIgwZsX4p3Pb45rn0gJYEDesu86YQS8LkkVoMnDH4Vo9 rM8bHrZGo= X-Received: from dionnaglaze.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:2ee6]) (user=dionnaglaze job=sendgmr) by 2002:a17:903:1110:b0:178:9f67:b524 with SMTP id n16-20020a170903111000b001789f67b524mr38239984plh.50.1667602848377; Fri, 04 Nov 2022 16:00:48 -0700 (PDT) Date: Fri, 4 Nov 2022 23:00:36 +0000 Mime-Version: 1.0 X-Mailer: git-send-email 2.38.1.431.g37b22c650d-goog Message-ID: <20221104230040.2346862-1-dionnaglaze@google.com> Subject: [PATCH v8 0/4] Add throttling detection to sev-guest From: Dionna Glaze To: linux-kernel@vger.kernel.org, x86@kernel.org Cc: Dionna Glaze , Tom Lendacky , Paolo Bonzini , Joerg Roedel , Peter Gonda , Thomas Gleixner , Dave Hansen Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The guest request synchronous API from SEV-SNP VMs to the host's security processor consumes a global resource. For this reason, AMD's docs recommend that the host implements a throttling mechanism. In order for the guest to know it's been throttled and should try its request again, we need some good-faith communication from the host that the request has been throttled. These patches work with the existing /dev/sev-guest ABI to detect a throttling code. Changes from v7: * Replaced handle_guest_request arguments msg_ver and fw_err with a pointer to the snp_guest_request_ioctl argument struct. Changes from v6: * Rebased on the IV reuse fix patch * renamed rate_hz to rate_s and fixed its MODULE_PARM_DESC to use the correct variable name. * Changed sleep_timeout_interrutible (not defined) to schedule_timeout_interruptible. Changes from v5: * Fixed commit prefix text * Added all get_maintainers.pl folks to commits' Cc tags * Changed SET_RET_NO_FW_CALL commit's metadata to show pgonda signs off and is the author. Changes from v4: * Clarified comment on SEV_RET_NO_FW_CALL * Changed ratelimit loop to use sleep_timeout_interruptible Changes from v3: * sev-guest ratelimits itself to one request twice a second. * Fixed a type signature to use u64 instead of unsigned int * Set *exitinfo2 unconditionally after the ghcb_hv_call. Changes from v2: * Codified the non-firmware-call firmware error code as (u32)-1. * Changed sev_issue_guest_request unsigned long *fw_err argument to u64 *exitinfo2 to more accurately and type-safely describe the value that it outputs. * Changed sev_issue_guest_request to always set its exitinfo2 argument to either the non-firmware-call error code, the EXIT_INFO_2 returned from the VMM if the request failed, or 0 on success. This fixes a bug that returned uninitialized kernel stack memory to the user when there is no error. * Changed the throttle behavior to retry in the driver instead of returning -EAGAIN, due to possible message sequence number reuse on different message contents. Changes from v1: * Changed throttle error code to 2 Cc: Tom Lendacky Cc: Paolo Bonzini Cc: Joerg Roedel Cc: Peter Gonda Cc: Thomas Gleixner Cc: Dave Hansen Signed-off-by: Dionna Glaze Dionna Glaze (3): x86/sev: Change snp_guest_issue_request's fw_err virt: sev-guest: Remove err in handle_guest_request virt: sev-guest: interpret VMM errors from guest request Peter Gonda (1): crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL arch/x86/include/asm/sev.h | 4 +- arch/x86/kernel/sev.c | 10 ++-- drivers/crypto/ccp/sev-dev.c | 2 +- drivers/virt/coco/sev-guest/sev-guest.c | 76 +++++++++++++++++-------- include/uapi/linux/psp-sev.h | 7 +++ include/uapi/linux/sev-guest.h | 18 +++++- 6 files changed, 85 insertions(+), 32 deletions(-) -- 2.38.1.431.g37b22c650d-goog