Received: by 2002:ab2:6203:0:b0:1f5:f2ab:c469 with SMTP id o3csp2844345lqt; Tue, 23 Apr 2024 03:29:28 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWDz91UyqrcmgTkX67KtvHHRU+zd/hLbkuQL2HLc/5ABZff+IIru5IdKzElTapc1/gAGNoIybTiRI99mJOdHqZSwYeApEHeuR/iPLlTPA== X-Google-Smtp-Source: AGHT+IEgF56j6n66Z7iyiKM4zZMAamUuxQvjan0a7GB1kiZrrU4hyZHS+wddr0UqzWJ3J6lcG0cT X-Received: by 2002:a05:690c:28f:b0:611:26e1:f482 with SMTP id bf15-20020a05690c028f00b0061126e1f482mr14083544ywb.32.1713868168003; Tue, 23 Apr 2024 03:29:28 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713868167; cv=pass; d=google.com; s=arc-20160816; b=aJoSQkorAQ637cofOA4hVYBh+4BdasBtWVPb3g6s6qRkDSxMGCgsRPUvog8Ph4nxuL 1nIzGSSHJLVk9guUKrrYxJr5D91twG2vp7l2YecJNJJA6o+KEb0wDDfgVm1yU2jvq8fE 4FMe/ErqVKaRHSiG69DYcOMwyR1t3zynhs9i/kB9nc+549v9Q+PNRcR+b4Pca62KtYWO zfDS0LMGOlkoSQ/bvU1uFSBkmLX/ektjUGKnqx6l1mS1TFtE+3lnAHU2rV/Tld8A2J3L Dqt1w+efZeSL7Twh256SdOKoyJskvDiApH71QOdxHtPq/Ofidr4WaZBvBUCFJVfBPXC6 KX9w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=c06iWq/U5QU79LoYabk6NNZS2MWKKgb0Cpqli/6PTJs=; fh=Ca2KFt+qDkIG6yn6EV1myWhZMbDPxzrojeF3ObkvTbo=; b=NrFNOOGGkkUJembqWl+CRaGOfVhc1nnBnF3S4NrkRdc0zPjZbhN2kpi/ir7OcYakXZ lIHy+C5P4al+0dqhZVMUBNJZDtkC3A3FbTw2ZvDf18Y3s3s3HG67pIsgflamUKTASGAG cQsZzz8UVM/PmU/6CMvCXrZduQm2mqy7JbOLa1mkfNwKSPiF5pWL8TMiwKHqesSfmM3U rpElvyIJz0yRdKJ61YeBW6QYe5kdtP30y0x1jXFAcgX18OVRGWfgQ0UeR7Us4pGXiDoG jl378CA2dE5fOe5scbHNMMX7PhP6muMBBb6CN1Oqbwo8JCUaQOatjvZaQwWBHMmi0ZVE tKYQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=Z3FH4zLE; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-154865-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-154865-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id eo11-20020a05622a544b00b0043784bd31easi12344319qtb.329.2024.04.23.03.29.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 23 Apr 2024 03:29:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-154865-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=Z3FH4zLE; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-154865-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-154865-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id B43971C2189A for ; Tue, 23 Apr 2024 10:29:27 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8CC6964CFC; Tue, 23 Apr 2024 10:28:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b="Z3FH4zLE" Received: from mail.alien8.de (mail.alien8.de [65.109.113.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4EFEE57303; Tue, 23 Apr 2024 10:28:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=65.109.113.108 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713868135; cv=none; b=i6/NpzemV+3kGA8lqW/YjAv3dj+jm3ylgC6q/jQusXuYIkjXo1S8vf6rQTC/+bCtOn65op/3xmGYsGBkfxuLs3GLfLQYhKPtP0lSxRqkoUf9K5xzEBTT7YKgceR6RVhFnVedQzc7VLZuH7aazPwRzdKkHJaHzPvuofFU8QhRy3A= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713868135; c=relaxed/simple; bh=uh3qowr3m7iMpEAznogEW2Z/W4vdpFPZBLkqnX3kXJk=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=dQ/Fgl0byPTY0F4ZemaUcRx5dN+jdpKcW9+VTy83E6EP3dwZxhBtygcKGo8qeMbbi0/U71tQ7bwElKHY5UjrV2USI0+plGWlR2Hg/bYz2x5kaJdOKsJiuPsWa/+XEMhBuQba3YAofjP/7dN6IwbljWjFj34msFNG39vCH0gUI5c= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de; spf=pass smtp.mailfrom=alien8.de; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b=Z3FH4zLE; arc=none smtp.client-ip=65.109.113.108 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=alien8.de Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTP id C8C2540E0192; Tue, 23 Apr 2024 10:28:50 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at mail.alien8.de Authentication-Results: mail.alien8.de (amavisd-new); dkim=pass (4096-bit key) header.d=alien8.de Received: from mail.alien8.de ([127.0.0.1]) by localhost (mail.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id K4TEGVbBZaV8; Tue, 23 Apr 2024 10:28:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=alien8; t=1713868126; bh=c06iWq/U5QU79LoYabk6NNZS2MWKKgb0Cpqli/6PTJs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Z3FH4zLEd5fO/jmwUKzXZVRNHTIcKRObRRp8a5M6PtmwkQjZ1og+lDQ0PUNGjvFZw 5u34wtAYTjZTphebOJxFn9rcKnGTLn9Wr+a4EZbCe50NBnVxUQtX23qQabMWrrXkMx GZjVmxcn3LfHe4QWHKuGOkzGcCJ5feIXugB5CbtPuC02aAAEGTQJ8mzje4fAA7aesI m7NvwXgkE1IXo4MoB0JliP5XKJEgM041bjaapWGKi1ItjJrh+Nst1BYfmuIaVTdY8d XOGbfhKiaqHL90wTM/b5zdFD2TYm3wssUTcp0tCKpKT3O1nE74olmgY5csqVV4ZgwZ HhIm/jsSf1+LqoPQAI6bN9lyBQ8vtCFO70rPEFVuncQuYTk7K9i7RHsmZiPWYAwkuk A7XxLKJZSypuGSmpzEdMMWLi1mZbvn8mIOI/KK5mKhb6rxj9mOJEZhIrOhAdKyWcyG ssJ5sMKTUkZjhVy/vCtvLAEtSP/zG/ed17/wjodJY7zgGfr9FPIDH4WdwUA1X/hAks 8eAKWWZrSbAMBU+Tl4ulBjxa8e4OeoSYxA5j1eW5l91WLGR1w87mZJMgXeCZWj5vYi DRsa5rfNkY9JuYyRzPHv0ECfD/f+LS1syX6eLLmwcW3iQofSQHZXTt5DMRjSx2UxrF pwlNX+kwDM0CujqWneLZSfUo= Received: from zn.tnic (pd953020b.dip0.t-ipconnect.de [217.83.2.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 7939040E00B2; Tue, 23 Apr 2024 10:28:35 +0000 (UTC) Date: Tue, 23 Apr 2024 12:28:29 +0200 From: Borislav Petkov To: "Nikunj A. Dadhania" Cc: linux-kernel@vger.kernel.org, thomas.lendacky@amd.com, x86@kernel.org, kvm@vger.kernel.org, mingo@redhat.com, tglx@linutronix.de, dave.hansen@linux.intel.com, pgonda@google.com, seanjc@google.com, pbonzini@redhat.com Subject: Re: [PATCH v8 06/16] virt: sev-guest: Move SNP Guest command mutex Message-ID: <20240423102829.GCZieNTcHyuAYMcRf5@fat_crate.local> References: <20240215113128.275608-1-nikunj@amd.com> <20240215113128.275608-7-nikunj@amd.com> <20240422130012.GAZiZfXM5Z2yRvw7Cx@fat_crate.local> <6a7a8892-bb8d-4f03-a802-d7eee48045b5@amd.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <6a7a8892-bb8d-4f03-a802-d7eee48045b5@amd.com> On Tue, Apr 23, 2024 at 09:52:41AM +0530, Nikunj A. Dadhania wrote: > SNP guest messaging will be moving as part of sev.c, and Secure TSC code > will use this mutex. No, this is all backwards. You have a *static* function in sev-guest - snp_guest_ioctl- which takes an exported lock - snp_guest_cmd_lock - in order to synchronize with other callers which are only in that same sev-guest driver. Why do you even need the guest messaging in sev.c? I guess this: "Many of the required functions are implemented in the sev-guest driver and therefore not available at early boot." But then your API is misdesigned: the lock should be private to sev.c and none of the callers should pay attention to grabbing it - the callers simply call the functions and underneath the locking works automatically for them - they don't care. Just like any other shared resource, users see only the API they call and the actual synchronization is done behind the scenes. Sounds like you need to go back to the drawing board and think how this thing should look like. And when you have it, make sure to explain the commit messages *why* it is done this way. Thx. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette