[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZJxlh5mql/Y0syHV@google.com>
Date: Wed, 28 Jun 2023 09:53:27 -0700
From: Sean Christopherson <seanjc@...gle.com>
To: Michael Roth <michael.roth@....com>
Cc: isaku.yamahata@...el.com, kvm@...r.kernel.org,
linux-kernel@...r.kernel.org, isaku.yamahata@...il.com,
Paolo Bonzini <pbonzini@...hat.com>, erdemaktas@...gle.com,
Sagi Shahar <sagis@...gle.com>,
David Matlack <dmatlack@...gle.com>,
Kai Huang <kai.huang@...el.com>,
Zhi Wang <zhi.wang.linux@...il.com>, chen.bo@...el.com,
linux-coco@...ts.linux.dev,
Chao Peng <chao.p.peng@...ux.intel.com>,
Ackerley Tng <ackerleytng@...gle.com>,
Vishal Annapurve <vannapurve@...gle.com>
Subject: Re: [RFC PATCH v2 4/6] KVM: x86: Introduce fault type to indicate kvm
page fault is private
On Tue, Jun 27, 2023, Michael Roth wrote:
> On Mon, Jun 26, 2023 at 11:21:45AM -0700, Sean Christopherson wrote:
> > "is_private" would serve the same purpose as all the other bits that are derived
> > from the error code, e.g. improve readability, reduce line lengths, etc. Though
> > looking at the name, just "private" is probably the right name.
> >
> > /* Derived from error_code. */
> > const bool exec;
> > const bool write;
> > const bool present;
> > const bool rsvd;
> > const bool user;
>
> If we go out of our way to pull bits out of error_code so they can be
> accessed more consistently/sensibly, why introduce additional bits into
> error_code in the first place? It just seems like an unecessary
> intermediate step, and introduces error_code bits that TDX/selftests
> don't actually ever need, which raises the specter of "what if hardware
> starts using this synthetic bit for something else?"
It's not a KVM-defined bit though, it's an AMD-defined bit. That's a very big
difference as AMD and Intel both go to out of their way to not step on each other's
toes.
And *architecturally*, VMX doesn't support #PF error codes larger than 16 bits,
not to mention that all of this needs to be dependent on TDP. And for EPT
violations, the error code is *fully* synthetic anyways because the error code
passed into kvm_mmu_page_fault is a translation of vmcs.EXIT_QUALIFICATION into
the "legacy" error code format.
So there's really no danger here, whereas a truly synthetic, KVM-defined bit like
PFERR_IMPLICIT_ACCESS *does* carry some risk because AMD in particular might use
bit 48 for a new hardware-defined flags.
> Is it mainly to avoid introducing additional parameters to
> kvm_mmu_page_fault() and instead piggy-backing off of error_code param?
> Or does recording the values into error_code have a use outside of that?
It provides canonical behavior within common KVM code. Stashing individual flags
in const bools in kvm_page_fault is purely for ease-of-use, they are NOT the canonical
representation of state for the entirety of page fault handling. E.g. in the unlikely
scenario that kvm_mmu_page_fault() needs to care about shared vs. private, there's
no kvm_page_fault structure to query.
> > > So it makes sense, in the gmem case (and TDX/SNP), to defer the
> > > kvm_mem_is_private() till later in kvm_faultin_pfn(). It avoid a
> > > duplicate lookup, and a race. But .is_private only conveys
> > > encrypted/unencrypted fault in TDX/SNP case, it doesn't have a way to
> > > cleanly convey this case "just use whatever kvm_mem_is_private() reports
> > > later, because it will always be what the VMM set, and it's too early
> > > to check kvm_mem_is_private() right now".
> >
> > Yeah, the duplicate lookup is unfortunate :-/ But I'd really like to be able to
> > make kvm_page_fault.private const, just like all the other booleans that are
> > derived from the error code. My concern with making it *not* const is that
> > there will be a discrepancy between "private" and "error_code", and we'll have
> > to be very careful to never touch "private" before kvm_faultin_pfn().
>
> It can actually be const using the KVM_FAULT_{VMM_DEFINED,SHARED,PRIVATE}
> abstraction. fault->is_private doesn't really need to be overwritten for
> VMM_DEFINED case later, it can just be treated as "use whatever
> kvm_mem_is_private() reports". But I guess that's what you mean by
> "special casing" below.
That's not constifying the state (private vs. shared), that's constifying behavior.
VMM_DEFINED is like Schrodinger's cat; the fault is neither private nor shared
until KVM actually looks at it.
> > And I don't want to special case "VMM defined", because the primary reason the
> > "VMM defined" case exists at this time is to allow testing KVM's implementation
> > without TDX or SNP. E.g. I don't want to end up with code in fast_page_fault()
>
> Are you suggesting VMM_DEFINED would eventually go away once SNP/TDX
> have bigger uptake,
I'm saying I don't want VMM_DEFINED, period. :-)
> or maybe in favor of tests built around some new VM type (e.g.
> software-protected VMs) that use guest hypercalls to set guest-expected
> memory state rather than always relying on what the VMM sets up?
>
> I guess in that case VMM_DEFINED handling could just be dropped at
> that point, and KVM_FAULT_{SHARED,PRIVATE} would still be relevant (or they
> could get switched back to bool at that point), and software-protected VMs
> would set that value based on whatever state tracks the hypercalls.
>
> But if that's the end-game maybe it's a good reason for keeping
> fault->is_private bool and avoiding enums. But still don't really see the
> worth in also setting the bit in error_code.
>
> > without TDX or SNP. E.g. I don't want to end up with code in fast_page_fault()
> > or so that does X for KVM_FAULT_VMM_DEFINED, but Y for KVM_FAULT_PRIVATE.
>
> Hadn't really considered fast_page_fault() for SNP... it seems like
> for explicit page-state changes, the vCPU issuing the conversions
> would just block until the GHCB request it issued was completed. So by
> the time it accesses the GPA, KVM_SET_MEMORY_ATTRIBUTES would have
> already zapped the old entry, so the fast path would get bypassed at
> that point.
>
> For implicit page-state changes, I guess there's a risk you can
> get stuck looping on fast_page_fault() since it's up to KVM MMU
> to generate the KVM_EXIT_MEMORY_FAULT so KVM_SET_MEMORY_ATTRIBUTES
> gets called eventually. Sort of surprised I haven't encountered
> that case though... but anyway...
>
> If you rely on similar checks to what slow path does:
>
> if (fault->is_private != kvm_mem_is_private(vcpu->kvm, fault->gfn))
> return kvm_do_memory_fault_exit(vcpu, fault);
>
> kvm_mem_is_private() could be stale due to unnoticed invalidation,
> but eventually it would reach steady-state and the
> KVM_EXIT_MEMORY_FAULT would fire. Is that sort of what you have in
> mind there?
>
> For SNP it seems more efficient to check for RMP bit and then head
> straight to the slow-path, but this isn't a hot path so probably
> doesn't matter much.
I'm not concerned about any specific path, i.e. don't read too much into my
arbitrary fast_page_fault() example.
What I am trying to point out is that I don't want to end up in a world where
a page fault is known to be private or shared for TDX/SNP, but not for SW-protected
VMs. Because if that happens, then we'll end up in one of three situations:
1. KVM can't act on private versus shared until after __kvm_faultin_pfn()
2. KVM is buggy because it is consuming undefined state, i.e. querying if memory
is private versus shared before looking inside the box
3. KVM has different flows for TDX/SNP versus SW-protected VMs
> > So I'm leaning toward the above be
> >
> > if (fault->is_private != kvm_mem_is_private(vcpu->kvm, fault->gfn)) {
> > if (vcpu->kvm->vm_type == KVM_X86_PROTECTED_VM)
> > return RET_PF_RETRY;
> > else
> > return kvm_do_memory_fault_exit(vcpu, fault);
> > }
> >
> > even though software-protected VMs would perform a technically-unnecessary
> > attributes lookup. *If* software-protected VMs ever get to the point where folks
> > care about the performance overhead of the extra lookup, then I'm all for
> > revisiting the implementation, but that is a ginormous "if" at this point. Though
> > even then I'd still prefer to figure out a way to make the flag const, but that's
> > a future problem.
> >
> > > So that's where this enum type came from. Although in the discussion I
> > > linked to above I suggested just:
> > >
> > > enum kvm_fault_type {
> > > KVM_FAULT_VMM_DEFINED,
> > > KVM_FAULT_SHARED,
> > > KVM_FAULT_PRIVATE,
> > >
> > > Which I think would work just as well,
> >
> > I want to use vm_type for tracking "VMM_DEFINED". KVM's ABI easily allows for 64
> > VM types, I see no reason to reuse KVM_X86_PROTECTED_VM for TDX and/or SNP, though
> > the type probably should be KVM_X86_SW_PROTECTED_VM. With that out of the way,
> > there's no need for an enum to track shared vs. private.
> >
>
> Introducing TDX/SNP vm types seems to buy us some flexibility so it
> sounds useful.
>
> Rather than synthesizing bits in error_code, maybe we could also use it
> to help out there as well? (assuming parameter-passing was the main
> use-case there)
>
> static bool kvm_fault_is_private(kvm, gpa, error_code)
> {
> if (kvm->vm_type == KVM_X86_TDX_VM)
> return gpa & TDX_SHARED_GPA_MASK;
>
> if (kvm->vm_type == KVM_X86_SNP_VM)
> return error_code & PFERR_GUEST_ENC_MASK;
>
> return kvm_mem_is_private(kvm, gpa);
> }
That's also an option, but (a) it's a bit kludgy as it requries three pieces of data,
(b) it's suboptimal for KVM_X86_SW_PROTECTED_VM if there are multiple lookups, and
(c) it will result in inconsistent behavior if there are multiple lookups.
E.g. these two things wouldn't be functionally equivalent, which is just asking
for bugs.
if (!kvm_fault_is_private(...)
A();
B();
if (kvm_fault_is_private(...)
C();
versus
bool private = kvm_fault_is_private();
if (!private)
A();
B();
if (private)
C();
Powered by blists - more mailing lists