Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp6853050rdb; Tue, 2 Jan 2024 16:30:25 -0800 (PST) X-Google-Smtp-Source: AGHT+IFH/CW3VvtPx1rT2b9sqMC5ThmCQkI25ezyn3vvKcAyr18n/uIVsSVFC5oxY6VvgEjCYdex X-Received: by 2002:a05:6a00:b4f:b0:6d9:8adc:7891 with SMTP id p15-20020a056a000b4f00b006d98adc7891mr21697509pfo.36.1704241825050; Tue, 02 Jan 2024 16:30:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704241825; cv=none; d=google.com; s=arc-20160816; b=sl7AAHwlsq1Vo53qCmOohoz11zC89bWerOkcBpZDCBKOzK5trqKMNBXESTYPas8GNv KHk7YGR6ktGTTt33Tc7m3MaEZIbrP87aljQ2KTg6nY3Vxm69nd5CRCDZMa9yHX/6hPvH D5+HwK96VlF6Th3lb4/IQzs8fK7eSh2URcK+D9yZW/0SzUBi4kfr6R7EESIGsvV/d96C WVORVyoHLgtuYues/F4zvA+vg0xV9wHt45wdcgBoV5E+VJx68V3qF9m/Sncks9gOnCTJ DFH5sNX5URgiywPzSwr1EeiittVU8XwZYme1tP0r9arnlEoJpLqLLdvkkvVxb6KlFGGf JSlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:from:subject:message-id:references:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:in-reply-to:date :dkim-signature; bh=TDHMClrrYcWpmzuNGOOsVgi0AHu5ZiLUhnNFQeXTWPg=; fh=ajJHXYT06i7mW9cD+AC/3t80yNR1SSt9Vz6dioBS/ok=; b=Mazd6OQuDr07yybqvdCb77rDAjWxE/1b7E4/qA37ABfsIRLMHT1cahDU4qyRFYohVV XOV3NTetg8YoPmLu846w93NLqcK+iw+Jfm/KTCjbgivIGf7B/B40SVxlZKxdD+P7+4DZ bKPe/u7pqhdzhqV8Zf7qZs6sCE32wZ8yRKwJgxIGDR+Uva7bc0H7nq+jdHMDjPxwPyMh aAHBLAPRaPwmtJMv9lB9YuTuqU0HdO3N2GtaDZdsSBlh8VFT52qSYJv/DvMqpK3Js7u2 fzEybTe0SdZYza5Yc6LeH3pqOV6xDosY7MEkEUl2mxGPywcBsQEVmZA7Hi/lNodlBCU5 FbEg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="lZk2/sZf"; spf=pass (google.com: domain of linux-kernel+bounces-14998-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-14998-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id t12-20020a6564cc000000b005cd813c23c4si20873164pgv.579.2024.01.02.16.30.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 Jan 2024 16:30:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-14998-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="lZk2/sZf"; spf=pass (google.com: domain of linux-kernel+bounces-14998-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-14998-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id A52BA284676 for ; Wed, 3 Jan 2024 00:30:24 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 71259A3F; Wed, 3 Jan 2024 00:30:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="lZk2/sZf" X-Original-To: linux-kernel@vger.kernel.org Received: from mail-pf1-f202.google.com (mail-pf1-f202.google.com [209.85.210.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4EBE762A for ; Wed, 3 Jan 2024 00:30:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Received: by mail-pf1-f202.google.com with SMTP id d2e1a72fcca58-6d9c7de0620so4819720b3a.1 for ; Tue, 02 Jan 2024 16:30:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1704241811; x=1704846611; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=TDHMClrrYcWpmzuNGOOsVgi0AHu5ZiLUhnNFQeXTWPg=; b=lZk2/sZf4KRXjxiAbnUItfawfp9DfgjfQ3OAnp0JRR8LztaIF0wdC7ttSexv/oZ1LW qHA+nuu+Wl7Q4CyvQ6pLt3piiDAxBPnSGPo3e0nHPhCBb5yvFZ0kGb7MTvRn2LECDi3M xSjJn17bmNbsL7g1163sLS3ub33bghO3s/WI0J2ElLBmyMCk2WmSDhJactnk6C+YB151 qUt8r4cRYW31H6N18XkFiuIgZSGI0VTa6g1JcTOmEBa9TzBOm3ud9UN1Lu0uSNJPPZgV +Llo26ZSE7Sq2z7eRSzhZCxi+hQNFbaCF6lOsB/u2mxMar3577WZCaFqaYHPIWKlDnCF vCqg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704241811; x=1704846611; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=TDHMClrrYcWpmzuNGOOsVgi0AHu5ZiLUhnNFQeXTWPg=; b=YK3/Qpl/cOXpiQEyC8qpD+v+zDo7E9DsgWsC6ep78sNx69/1I9BBB5OAZ7M0NhhocA L0o/+W0QEBaMpyQQrQ5EjxrotB3ZWLL1QZAYeb3LEtaK2ewJO+mRJjFj9rAOUPA2K7AV od0MyZmjpR5EzcXHGFFzDXBZaSS22X7AKmblkaE802zinsjbP0R0mhVAcewsuGblpFs4 AIcAGZn1FK1XBjeJ49iEtofy6gu5eN5ne4iJG8kv3p/AIgjevgFparT7hj/8mbCVqWcK aWgkXED+JcQNrBXDSec2yA1szvI0T0ZCCeBCMBs/yn4u6OSrgEKISnDXz3628ipK7Jle d3xg== X-Gm-Message-State: AOJu0Yw1COpvuBFj/RzdpIOZ63GijksX3kNP/iyxR+bSQuej/tuIQeWl 6I7qmxDCPcHgW7h0oNmqKgWewKbwSER7sy5xKA== X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a05:6a00:9297:b0:6d9:bcaf:5f16 with SMTP id jw23-20020a056a00929700b006d9bcaf5f16mr40479pfb.3.1704241811632; Tue, 02 Jan 2024 16:30:11 -0800 (PST) Date: Tue, 2 Jan 2024 16:30:10 -0800 In-Reply-To: <20240102232136.38778-1-Ashish.Kalra@amd.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20240102232136.38778-1-Ashish.Kalra@amd.com> Message-ID: Subject: Re: [PATCH] x86/sev: Add support for allowing zero SEV ASIDs. From: Sean Christopherson To: Ashish Kalra Cc: pbonzini@redhat.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, thomas.lendacky@amd.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, joro@8bytes.org Content-Type: text/plain; charset="us-ascii" On Tue, Jan 02, 2024, Ashish Kalra wrote: > @@ -2172,8 +2176,10 @@ void sev_vm_destroy(struct kvm *kvm) > > void __init sev_set_cpu_caps(void) > { > - if (!sev_enabled) > + if (!sev_guests_enabled) { Ugh, what a mess. The module param will show sev_enabled=false, but the caps and CPUID will show SEV=true. And this is doubly silly because "sev_enabled" is never actually checked, e.g. if misc cgroup support is disabled, KVM_SEV_INIT will try to reclaim ASIDs and eventually fail with -EBUSY, which is super confusing to users. The other weirdness is that KVM can cause sev_enabled=false && sev_es_enabled=true, but if *userspace* sets sev_enabled=false then sev_es_enabled is also forced off. In other words, the least awful option seems to be to keep sev_enabled true :-( > kvm_cpu_cap_clear(X86_FEATURE_SEV); > + return; This is blatantly wrong, as it can result in KVM advertising SEV-ES if SEV is disabled by the user. > + } > if (!sev_es_enabled) > kvm_cpu_cap_clear(X86_FEATURE_SEV_ES); > } > @@ -2229,9 +2235,11 @@ void __init sev_hardware_setup(void) > goto out; > } > > - sev_asid_count = max_sev_asid - min_sev_asid + 1; > - WARN_ON_ONCE(misc_cg_set_capacity(MISC_CG_RES_SEV, sev_asid_count)); > - sev_supported = true; > + if (min_sev_asid <= max_sev_asid) { > + sev_asid_count = max_sev_asid - min_sev_asid + 1; > + WARN_ON_ONCE(misc_cg_set_capacity(MISC_CG_RES_SEV, sev_asid_count)); > + sev_supported = true; > + } > > /* SEV-ES support requested? */ > if (!sev_es_enabled) > @@ -2262,7 +2270,8 @@ void __init sev_hardware_setup(void) > if (boot_cpu_has(X86_FEATURE_SEV)) > pr_info("SEV %s (ASIDs %u - %u)\n", > sev_supported ? "enabled" : "disabled", > - min_sev_asid, max_sev_asid); > + sev_supported ? min_sev_asid : 0, > + sev_supported ? max_sev_asid : 0); I honestly think we should print the "garbage" values. The whole point of printing the min/max SEV ASIDs was to help users understand why SEV is disabled, i.e. printing zeroes is counterproductive. > if (boot_cpu_has(X86_FEATURE_SEV_ES)) > pr_info("SEV-ES %s (ASIDs %u - %u)\n", > sev_es_supported ? "enabled" : "disabled", It's all a bit gross, but I think we want something like this (I'm definitely open to suggestions though): diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index d0c580607f00..bfac6d17462a 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -143,8 +143,20 @@ static void sev_misc_cg_uncharge(struct kvm_sev_info *sev) static int sev_asid_new(struct kvm_sev_info *sev) { - int asid, min_asid, max_asid, ret; + /* + * SEV-enabled guests must use asid from min_sev_asid to max_sev_asid. + * SEV-ES-enabled guest can use from 1 to min_sev_asid - 1. Note, the + * min ASID can end up larger than the max if basic SEV support is + * effectively disabled by disallowing use of ASIDs for SEV guests. + */ + unsigned int min_asid = sev->es_active ? 1 : min_sev_asid; + unsigned int max_asid = sev->es_active ? min_sev_asid - 1 : max_sev_asid; + unsigned int asid; bool retry = true; + int ret; + + if (min_asid > max_asid) + return -ENOTTY; WARN_ON(sev->misc_cg); sev->misc_cg = get_current_misc_cg(); @@ -157,12 +169,6 @@ static int sev_asid_new(struct kvm_sev_info *sev) mutex_lock(&sev_bitmap_lock); - /* - * SEV-enabled guests must use asid from min_sev_asid to max_sev_asid. - * SEV-ES-enabled guest can use from 1 to min_sev_asid - 1. - */ - min_asid = sev->es_active ? 1 : min_sev_asid; - max_asid = sev->es_active ? min_sev_asid - 1 : max_sev_asid; again: asid = find_next_zero_bit(sev_asid_bitmap, max_asid + 1, min_asid); if (asid > max_asid) { @@ -2232,8 +2238,10 @@ void __init sev_hardware_setup(void) goto out; } - sev_asid_count = max_sev_asid - min_sev_asid + 1; - WARN_ON_ONCE(misc_cg_set_capacity(MISC_CG_RES_SEV, sev_asid_count)); + if (min_sev_asid <= max_sev_asid) { + sev_asid_count = max_sev_asid - min_sev_asid + 1; + WARN_ON_ONCE(misc_cg_set_capacity(MISC_CG_RES_SEV, sev_asid_count)); + } sev_supported = true; /* SEV-ES support requested? */ @@ -2264,8 +2272,9 @@ void __init sev_hardware_setup(void) out: if (boot_cpu_has(X86_FEATURE_SEV)) pr_info("SEV %s (ASIDs %u - %u)\n", - sev_supported ? "enabled" : "disabled", - min_sev_asid, max_sev_asid); + sev_supported ? (min_sev_asid <= max_sev_asid ? "enabled" : "unusable") : "disabled", + sev_supported ? min_sev_asid : 0, + sev_supported ? max_sev_asid : 0); if (boot_cpu_has(X86_FEATURE_SEV_ES)) pr_info("SEV-ES %s (ASIDs %u - %u)\n", sev_es_supported ? "enabled" : "disabled",