[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0918025f-736e-de4a-832e-b4b6d903eba2@redhat.com>
Date: Tue, 23 Mar 2021 17:40:18 +0100
From: Paolo Bonzini <pbonzini@...hat.com>
To: Kai Huang <kai.huang@...el.com>
Cc: Sean Christopherson <seanjc@...gle.com>,
Borislav Petkov <bp@...en8.de>, kvm@...r.kernel.org,
x86@...nel.org, linux-sgx@...r.kernel.org,
linux-kernel@...r.kernel.org, jarkko@...nel.org, luto@...nel.org,
dave.hansen@...el.com, rick.p.edgecombe@...el.com,
haitao.huang@...el.com, tglx@...utronix.de, mingo@...hat.com,
hpa@...or.com
Subject: Re: [PATCH v3 03/25] x86/sgx: Wipe out EREMOVE from
sgx_free_epc_page()
On 22/03/21 21:43, Kai Huang wrote:
>> That was my recollection as well from previous threads but, to be fair
>> to Boris, the commit message is a lot more scary (and, which is what
>> triggers me, puts the blame on KVM). It just says "KVM does not track
>> how guest pages are used, which means that SGX virtualization use of
>> EREMOVE might fail".
>
> I don't see the commit msg being scary. EREMOVE might fail but virtual EPC code
> can handle that. This is the reason to break out EREMOVE from original
> sgx_free_epc_page(), so virtual EPC code can have its own logic of handling
> EREMOVE failure.
I should explain what I mean by scary.
What you wrote above, "EREMOVE might fail but virtual EPC code can
handle that" sounds fine. But it doesn't say the failure mode, so it's
hiding information.
What I would like to have, "EREMOVE might fail and will be leaked, but
virtual EPC code will not crash and in any case there are much worse
problems waiting to happen" is fine. (It's even better with an
explanation of the problems).
Your message however was in the middle: "EREMOVE might fail, virtual EPC
code will not crash but the page will be leaked". It gives the failure
mode but not how the problem arises, and it is this combination that
results in something scary-sounding.
Paolo
Powered by blists - more mailing lists