From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id EA211C43381 for ; Mon, 15 Mar 2021 03:14:26 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id D5A1A64EB7 for ; Mon, 15 Mar 2021 03:14:26 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229873AbhCODNx (ORCPT ); Sun, 14 Mar 2021 23:13:53 -0400 Received: from mga06.intel.com ([134.134.136.31]:58290 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229747AbhCODNa (ORCPT ); Sun, 14 Mar 2021 23:13:30 -0400 IronPort-SDR: B39+thwy6Ux1i4cGSmKM+ioznOoMk3Thf9T1VuaCKy9MiFlRKXKJhlnuOznBZYrhzqv5JJjand xm3a6mu0HeAw== X-IronPort-AV: E=McAfee;i="6000,8403,9923"; a="250395008" X-IronPort-AV: E=Sophos;i="5.81,249,1610438400"; d="scan'208";a="250395008" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Mar 2021 20:13:24 -0700 IronPort-SDR: p8LbPsQcux8hrC2l1EGDiqITPv19SPhk0nZDYEJES0jLJ7AHA6zjXX6ywiY+GcQjVOe0WknA/6 l8SZGUUnxGIg== X-IronPort-AV: E=Sophos;i="5.81,249,1610438400"; d="scan'208";a="604695617" Received: from avaldezb-mobl.amr.corp.intel.com (HELO khuang2-desk.gar.corp.intel.com) ([10.255.229.198]) by fmsmga005-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Mar 2021 20:13:19 -0700 Date: Mon, 15 Mar 2021 16:13:17 +1300 From: Kai Huang To: Jarkko Sakkinen Cc: Sean Christopherson , kvm@vger.kernel.org, linux-sgx@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, luto@kernel.org, dave.hansen@intel.com, rick.p.edgecombe@intel.com, haitao.huang@intel.com, pbonzini@redhat.com, bp@alien8.de, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com Subject: Re: [PATCH v2 07/25] x86/sgx: Initialize virtual EPC driver even when SGX driver is disabled Message-Id: <20210315161317.9c72479dfcde4e22078abcd2@intel.com> In-Reply-To: References: X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 14 Mar 2021 17:27:18 +0200 Jarkko Sakkinen wrote: > On Sun, Mar 14, 2021 at 05:25:26PM +0200, Jarkko Sakkinen wrote: > > On Sat, Mar 13, 2021 at 09:07:36PM +0200, Jarkko Sakkinen wrote: > > > On Sat, Mar 13, 2021 at 09:05:36PM +0200, Jarkko Sakkinen wrote: > > > > On Fri, Mar 12, 2021 at 01:44:58PM -0800, Sean Christopherson wrote: > > > > > On Tue, Mar 09, 2021, Kai Huang wrote: > > > > > > Modify sgx_init() to always try to initialize the virtual EPC driver, > > > > > > even if the SGX driver is disabled. The SGX driver might be disabled > > > > > > if SGX Launch Control is in locked mode, or not supported in the > > > > > > hardware at all. This allows (non-Linux) guests that support non-LC > > > > > > configurations to use SGX. > > > > > > > > > > > > Acked-by: Dave Hansen > > > > > > Signed-off-by: Kai Huang > > > > > > --- > > > > > > arch/x86/kernel/cpu/sgx/main.c | 10 +++++++++- > > > > > > 1 file changed, 9 insertions(+), 1 deletion(-) > > > > > > > > > > > > diff --git a/arch/x86/kernel/cpu/sgx/main.c b/arch/x86/kernel/cpu/sgx/main.c > > > > > > index 44fe91a5bfb3..8c922e68274d 100644 > > > > > > --- a/arch/x86/kernel/cpu/sgx/main.c > > > > > > +++ b/arch/x86/kernel/cpu/sgx/main.c > > > > > > @@ -712,7 +712,15 @@ static int __init sgx_init(void) > > > > > > goto err_page_cache; > > > > > > } > > > > > > > > > > > > - ret = sgx_drv_init(); > > > > > > + /* > > > > > > + * Always try to initialize the native *and* KVM drivers. > > > > > > + * The KVM driver is less picky than the native one and > > > > > > + * can function if the native one is not supported on the > > > > > > + * current system or fails to initialize. > > > > > > + * > > > > > > + * Error out only if both fail to initialize. > > > > > > + */ > > > > > > + ret = !!sgx_drv_init() & !!sgx_vepc_init(); > > > > > > > > > > I love this code. > > > > > > > > > > Reviewed-by: Sean Christopherson > > > > > > > > I'm still wondering why this code let's go through when sgx_drv_init() > > > > succeeds and sgx_vepc_init() fails. > > > > > > > > The inline comment explains only the mirrored case (which does make > > > > sense). > > > > > > I.e. if sgx_drv_init() succeeds, I'd expect that sgx_vepc_init() must > > > succeed. Why expect legitly anything else? > > > > Apologies coming with these ideas at this point, but here is what this > > led me. > > > > I think that the all this complexity comes from a bad code structure. > > > > So, what is essentially happening here: > > > > - We essentially want to make EPC always work. > > - Driver optionally. > > > > So what this sums to is something like: > > > > ret = sgx_epc_init(); > > if (ret) { > > pr_err("EPC initialization failed.\n"); > > return ret; > > } > > > > ret = sgx_drv_init(); > > if (ret) > > pr_info("Driver could not be initialized.\n"); > > > > /* continue */ > > > > I.e. I think there should be a single EPC init, which does both EPC > > bootstrapping and vepc, and driver initialization comes after that. > > In other words, from SGX point of view, the thing that KVM needs is > to cut out EPC and driver part into different islands. How this is now > implemented in the current patch set is half-way there but not yet what > it should be. Well conceptually, SGX virtualization and SGX driver are two independently functionalities can be enabled separately, although they both requires some come functionalities, such as /dev/sgx_provision, which we have moved to sgx/main.c exactly for this purpose. THerefore, conceptually, it is bad to make assumption that, if SGX virtualization initialization succeeded, SGX driver must succeed -- we can potentially add more staff in SGX virtualization in the future.. If the name sgx_vepc_init() confuses you, I can rename it to sgx_virt_init(). Hi Sean, Please let us know if you have comments.