Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp617072pxv; Wed, 14 Jul 2021 11:15:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz/IBlIr8aSFpy0vR2ca5yBcpVl3QmnGg1E1irCPNGpCvzrLd7tgvZ86J6kFZjRXOj8SDtG X-Received: by 2002:a6b:db03:: with SMTP id t3mr7776378ioc.180.1626286556520; Wed, 14 Jul 2021 11:15:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626286556; cv=none; d=google.com; s=arc-20160816; b=F969mcg+tYLdV4t27v3PmV8UZrW/46/FgASWhVnRD6DDaln/U0X4Z+QnAFA+Y0wDt8 ZYuFV9cGmoIevZPLomvegBG8YggPMrwQ2INX4IRXVmJrLofV3GG9zWRGP/0j1FxkJrpD /6I4HVFczVd+JXeRVI15d1G+vmwy7VGKkw2qGHexoQdwT7S8O0YybCcyHtJPYuX7oQfS WX9xk4X6eiSSTbu5Ovdg5TJ9RneixGJaIm8sqTsjzxx1k2zBARvyocP/DGFtLptKsm4K MDbnfn6h+PkXpfvccTaccLBqAwvXjOT/ztU9NIbnwcPtDfXsLtOJmy0reyLmk8ne6QJs s4Sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=3WKLZGhjXG90Fatu5wm7XoigXrQeEPeI0ZySxgtrf1E=; b=TjCy4j095kK18oL+q9C8tZ0ePWz1ITJEuqSGmrcTXdR1yrqobz5qErjP3oz4n0s9dR zvFSlVFGSjxwobFMgyjBRmAUFx8HZ9iuyDBVgZfJi+Xg74ElZK6Qgiyt1nD1p38x0rua 1X2+6s3zprIkUxGU9ZBtDyregw5jli6YOnv6T8IVdnmjraoLwaHzf6gYcz1NmSicqmSe 5q2SII1VJJwiy8MIq+YI7M+hbXn/7VxNttJesYTQNogSLybp0BiAqIr+hIYj+hdZp0G3 v3iHkblcoorfttGEc9/AhtWdpj1KPYq6AsZDnaJwKN1n7GrmLMJ0V9kyQvBmuCJUxQjh 4BMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=K34aiEbq; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j23si2975016iok.60.2021.07.14.11.15.36; Wed, 14 Jul 2021 11:15:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=K34aiEbq; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240013AbhGNSRs (ORCPT + 99 others); Wed, 14 Jul 2021 14:17:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56970 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230264AbhGNSRr (ORCPT ); Wed, 14 Jul 2021 14:17:47 -0400 Received: from mail-qk1-x72e.google.com (mail-qk1-x72e.google.com [IPv6:2607:f8b0:4864:20::72e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6F2EBC061764 for ; Wed, 14 Jul 2021 11:14:54 -0700 (PDT) Received: by mail-qk1-x72e.google.com with SMTP id z9so2521095qkg.5 for ; Wed, 14 Jul 2021 11:14:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=3WKLZGhjXG90Fatu5wm7XoigXrQeEPeI0ZySxgtrf1E=; b=K34aiEbq6IThsKWJBJDDGsckcOYXonTslRsCf6xEi7ghhFV+UbwNIfzQP6Tq5ldAxz x/gfvgeDt8i9UmUFByP8JylSs7uppp+LheXconENxXR/wPDkP+0iUfG5YhfwPEmQU1fy 4tTjvgWpmY3o7IvTFaQR7Z34VuSgQbU+YmK0iN4AE41bZtFsm7nGfsIz6oRpkXpW6axf 6b+9SsmHKDPDXxNXQY2L0ih10uAe1HpuGUVydXvTdbXoxG4rjZrIfD2Nskrohj6TdZDI j2Q+YXsv7xUpGHDh1ZKrJ93dEG0SbTKyIkbyJdcn2EcTIo/QYOSql+60mVB0ixujp++K tFqQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=3WKLZGhjXG90Fatu5wm7XoigXrQeEPeI0ZySxgtrf1E=; b=fBSvfE/fmfO10S+SPmOyVUwffPlHFf2eyQkGiPOLBKJqOR+Cs/EQIWcmADKdz5n4bC eYoE/MCgvYMeSftMATn9nn/TTft0o4iZLAX6DqBLTYMxMfwl7wSLTYdNqjX41YW0iTvk AGYdVnNXKzCj8JlRZGKzceUEJHAIwLBQR31+w8A0vxZr/k5TH+c5QBTxY/ve9T5HMp+P /2Bvk5GvGGMRk+SvQaOcjbBZNS8rH6NJkVHvZNf7bX1C5Flt7hXmy1v7JSFssXcJhZD9 LNtyG7JABH3uUDkdZJoyGmxPqE3HrO37nFov2XBksW+UnAsmgeaUbGJv8qOzXz0NQZXf 03TQ== X-Gm-Message-State: AOAM533yRi2kfgtAH0jthH9+9gbdSVL6FTqj2xdR+e/1zC8fkjnuWEEs Tiyq1guKsq2NKlTrXRTWcYSwB/Y1ZhW+Uq3U+yiLIg== X-Received: by 2002:a05:620a:a90:: with SMTP id v16mr11085310qkg.150.1626286493309; Wed, 14 Jul 2021 11:14:53 -0700 (PDT) MIME-Version: 1.0 References: <20210707183616.5620-1-brijesh.singh@amd.com> <20210707183616.5620-16-brijesh.singh@amd.com> <98ac737d-83a8-6ee8-feac-554bab673191@amd.com> In-Reply-To: <98ac737d-83a8-6ee8-feac-554bab673191@amd.com> From: Marc Orr Date: Wed, 14 Jul 2021 11:14:41 -0700 Message-ID: Subject: Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled To: Brijesh Singh Cc: x86@kernel.org, linux-kernel@vger.kernel.org, kvm list , linux-efi@vger.kernel.org, platform-driver-x86@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, Thomas Gleixner , Ingo Molnar , Joerg Roedel , Tom Lendacky , "H. Peter Anvin" , Ard Biesheuvel , Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Andy Lutomirski , Dave Hansen , Sergio Lopez , Peter Gonda , Peter Zijlstra , Srinivas Pandruvada , David Rientjes , Dov Murik , Tobin Feldman-Fitzthum , Borislav Petkov , Michael Roth , Vlastimil Babka , tony.luck@intel.com, npmccallum@redhat.com, brijesh.ksingh@gmail.com, Alper Gun Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org > > Should this return a non-zero value -- maybe `-ENODEV`? Otherwise, the > > `snp_alloc_firmware_page()` API will return a page that the caller > > believes is suitable to use with FW. My concern is that someone > > decides to use this API to stash a page very early on during kernel > > boot and that page becomes a time bomb. > > But that means the caller now need to know that SNP is enabled before > calling the APIs. The idea behind the API was that caller does not need > to know whether the firmware is in the INIT state. If the firmware has > initialized the SNP, then it will transparently set the immutable bit in > the RMP table. For SNP, isn't that already the case? There are three scenarios: #1: The PSP driver is loaded and `snp_inited` is `true`: These returns are never hit. #2: The PSP driver is not loaded. The first return, `!psp || !psp->sev_data` fires. As written, it returns `0`, indicating success. However, we never called RMPUPDATE on the page. Thus, later, when the PSP driver is loaded, the page that was previously returned as usable with FW is in fact not usable with FW. Unless SNP is disabled (e.g., SEV, SEV-ES only). In which case I guess the page is OK. #3 The PSP driver is loaded but the SNP_INIT command has not been issued. Looking at this again, I guess `return 0` is OK. Because if we got this far, then `sev_pci_init()` has been called, and the SNP_INIT command has been issued if we're supporting SNP VMs. So in summary, I think we should change the first return to return an error and leave the 2nd return as is. > > If we initialize `rc` to `-ENODEV` (or something similar), then every > > return in this function can be `return rc`. > > > >> + > >> + /* If SEV-SNP is initialized then add the page in RMP table. */ > >> + sev = psp->sev_data; > >> + if (!sev->snp_inited) > >> + return 0; > > > > Ditto. Should this turn a non-zero value? > > > >> + > >> + while (pfn < pfn_end) { > >> + if (need_reclaim) > >> + if (snp_reclaim_page(pfn_to_page(pfn), locked)) > >> + return -EFAULT; > >> + > >> + rc = rmpupdate(pfn_to_page(pfn), val); > >> + if (rc) > >> + return rc; > >> + > >> + pfn++; > >> + } > >> + > >> + return 0; > >> +}