Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1018033rwb; Wed, 16 Nov 2022 10:44:53 -0800 (PST) X-Google-Smtp-Source: AA0mqf7yMNhgXK12mTbyjlnlEK39eNeQZFoHfMJt4caDyeWxuo4zlBuE6vgazIEyf8y4yFyhxYrm X-Received: by 2002:a17:906:e0d2:b0:7ad:9f03:aa1f with SMTP id gl18-20020a170906e0d200b007ad9f03aa1fmr18874431ejb.632.1668624293186; Wed, 16 Nov 2022 10:44:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668624293; cv=none; d=google.com; s=arc-20160816; b=LsDJHZxe8lbQivKfzfBpdkGLnyy//92RJuIK0CgfiyYJBKLUligwsv93v87bj94sos EWdV68lggW9BJfa3SGkjSM2BbhbTb/3n0rTSqLSMOP4cdHvEeyHuapm+aEK1MMXR68aT olxZB4QPekRdmb6H8UQegzDdffH6Lv5XJDFQ2vNtPz8AU+cQh2miUQFLxoQTmqSRdTWR H5CQ8R8bDvlxRWyl5GYqYyWjVjWenhp7coyGxE/L5O4QJS26suI8e4EB4ZTnt/sANfIw 1m2Lwcae5DSp86DhWabyz+hxyImts8sUCDZs0lxp7aKQvBznv7wtHY6NN2p/Z8U/V/dz tvCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=SKs/cQ9tW7DBi0YB79F3rhg/wFGe5BV+AZfeB8CLM8Y=; b=iqxAh/V47quBCvpyxrtGAJvxBpS2ZJVXvDfdqwnGDaLNCDRJ7sk4tnFxfHC2AiSu94 /M6/EQQY32IV0sn+AAl7YaIyDnWQMiwF5S3S39GsMbn1IlEmzD3VbziPTZ1MY77jfIQq wfBhIzhHJ8eUhrUt0/PmVTV78fagIYESv/2uyrc9vL7/SBGuTvIXMky99XE82i2+wtCr ZYylCS3YeyLbL2z/R/7o1ZMtJNsfXhrWv3lRmvPowtSxKiVML0cgK5OsaYjNuGwKG6rX hVPuehKINIh3uWU6kgF9MdK7ogVH1adZCxjeRsL4J/hc7WHF1Yduy/HeM+cjIPSNJ4xB WRfQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=d3X+XG4V; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g16-20020a1709065d1000b0078de44dd61fsi15973006ejt.990.2022.11.16.10.44.20; Wed, 16 Nov 2022 10:44:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=d3X+XG4V; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233485AbiKPScK (ORCPT + 99 others); Wed, 16 Nov 2022 13:32:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37652 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230203AbiKPScJ (ORCPT ); Wed, 16 Nov 2022 13:32:09 -0500 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 86E504B992; Wed, 16 Nov 2022 10:32:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1668623528; x=1700159528; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=9R89P7Fn5UnS6fXNsmjWkdjOCqGyO+Ikj7R423cX13o=; b=d3X+XG4VE1lUFFAupa2GatYvywpF3Y4ACePAF+g6/A3nUwYvuZoVybbo 4XyR7sUQehsg4RzHoiZgRYrgOIQZa4r8WEISk2UuWAqTVVRmGCe8MaEeI 7DpLp9Yb7OXE0VeDimiyh87FvTRHLbLHEDtWnxhwFuybuFhsS6KeFaPHi ZQ7lWsaogcdQ/3xsv6HLdf24wmBjmE5vsj8A66pnASSYcR1O8LOyhohLW HBvwRZ8ojGjV4oI6HWD8a6u3sFAnYaAUAn02cEXDBmpQOJTl+njq4VyWr Wke0MnOiWgGLf6XbMrTYL830I/W5lKYKYarYo8M4ovF2eo+vJC9PiUP2y A==; X-IronPort-AV: E=McAfee;i="6500,9779,10533"; a="292333588" X-IronPort-AV: E=Sophos;i="5.96,169,1665471600"; d="scan'208";a="292333588" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Nov 2022 10:32:08 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10533"; a="670601611" X-IronPort-AV: E=Sophos;i="5.96,169,1665471600"; d="scan'208";a="670601611" Received: from aagbadea-mobl.amr.corp.intel.com (HELO [10.252.138.56]) ([10.252.138.56]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Nov 2022 10:32:06 -0800 Message-ID: <0ab63cf5-7587-0347-22bf-0987704a5153@intel.com> Date: Wed, 16 Nov 2022 10:32:05 -0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2 Subject: Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled Content-Language: en-US To: Vlastimil Babka , "Kalra, Ashish" , Borislav Petkov Cc: x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, michael.roth@amd.com, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, marcorr@google.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, dgilbert@redhat.com, jarkko@kernel.org, "Kaplan, David" , Naoya Horiguchi , Miaohe Lin , Oscar Salvador References: <3a51840f6a80c87b39632dc728dbd9b5dd444cd7.1655761627.git.ashish.kalra@amd.com> <380c9748-1c86-4763-ea18-b884280a3b60@amd.com> <6511c122-d5cc-3f8d-9651-7c2cd67dc5af@amd.com> <7882353e-2b13-d35a-b462-cef35ee56f51@suse.cz> <5b27a05e-09ad-9139-67b1-77b90731419f@amd.com> <9d9f1afe-c981-4df9-f012-89c4cb783cc3@amd.com> <973c6f79-38ad-aa30-bfec-c2a1c7db5d70@suse.cz> <8692e736-7518-d6d2-ae83-720e42e7a059@amd.com> <41b8c83e-2a1a-1dda-945e-99329ca8e7e9@suse.cz> From: Dave Hansen In-Reply-To: <41b8c83e-2a1a-1dda-945e-99329ca8e7e9@suse.cz> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 11/16/22 02:25, Vlastimil Babka wrote: >> Referring back to your thoughts about putting these pages on some leaked >> pages list, do any such leaked pages list exist currently ? > Not AFAIK, you could just create a list_head somewhere appropriate (some snp > state structure?) and put the pages there, maybe with a counter exposed in > debugs. The point would be mostly that if something goes so wrong it would > be leaking substantial amounts of memory, we can at least recognize the > cause (but I suppose the dmesg will be also full of messages) and e.g. find > the pages in a crash dump. It might also be worth looking through the places that check PageHWPoison() and making sure that none of them are poking into the page contents. It's also the kind of thing that adding some CONFIG_DEBUG_VM checks might help with. For instance, nobody should ever be kmap*()'ing a private page. The same might even go for pin_user_pages().