[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f8bf7e26-26dc-e19a-007c-40b26e0a0a45@intel.com>
Date: Thu, 25 Mar 2021 08:59:51 -0700
From: Dave Hansen <dave.hansen@...el.com>
To: Brijesh Singh <brijesh.singh@....com>,
linux-kernel@...r.kernel.org, x86@...nel.org, kvm@...r.kernel.org,
linux-crypto@...r.kernel.org
Cc: ak@...ux.intel.com, herbert@...dor.apana.org.au,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
Joerg Roedel <jroedel@...e.de>,
"H. Peter Anvin" <hpa@...or.com>, Tony Luck <tony.luck@...el.com>,
"Peter Zijlstra (Intel)" <peterz@...radead.org>,
Paolo Bonzini <pbonzini@...hat.com>,
Tom Lendacky <thomas.lendacky@....com>,
David Rientjes <rientjes@...gle.com>,
Sean Christopherson <seanjc@...gle.com>
Subject: Re: [RFC Part2 PATCH 07/30] mm: add support to split the large THP
based on RMP violation
On 3/25/21 8:24 AM, Brijesh Singh wrote:
> On 3/25/21 9:48 AM, Dave Hansen wrote:
>> On 3/24/21 10:04 AM, Brijesh Singh wrote:
>>> When SEV-SNP is enabled globally in the system, a write from the hypervisor
>>> can raise an RMP violation. We can resolve the RMP violation by splitting
>>> the virtual address to a lower page level.
>>>
>>> e.g
>>> - guest made a page shared in the RMP entry so that the hypervisor
>>> can write to it.
>>> - the hypervisor has mapped the pfn as a large page. A write access
>>> will cause an RMP violation if one of the pages within the 2MB region
>>> is a guest private page.
>>>
>>> The above RMP violation can be resolved by simply splitting the large
>>> page.
>> What if the large page is provided by hugetlbfs?
> I was not able to find a method to split the large pages in the
> hugetlbfs. Unfortunately, at this time a VMM cannot use the backing
> memory from the hugetlbfs pool. An SEV-SNP aware VMM can use either
> transparent hugepage or small pages.
That's really, really nasty. Especially since it might not be evident
until long after boot and the guest is killed.
It's even nastier because hugetlbfs is actually a great fit for SEV-SNP
memory. It's physically contiguous, so it would keep you from having to
fracture the direct map all the way down to 4k, it also can't be
reclaimed (just like all SEV memory).
I think the minimal thing you can do here is to fail to add memory to
the RMP in the first place if you can't split it. That way, users will
at least fail to _start_ their VM versus dying randomly for no good reason.
Even better would be to come up with a stronger contract between host
and guest. I really don't think the host should be exposed to random
RMP faults on the direct map. If the guest wants to share memory, then
it needs to tell the host and give the host an opportunity to move the
guest physical memory. It might, for instance, sequester all the shared
pages in a single spot to minimize direct map fragmentation.
I'll let the other x86 folks chime in on this, but I really think this
needs a different approach than what's being proposed.
Powered by blists - more mailing lists