From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.9 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 92959C433E0 for ; Tue, 2 Feb 2021 19:26:33 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 5FEA164E49 for ; Tue, 2 Feb 2021 19:26:33 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239732AbhBBT0F (ORCPT ); Tue, 2 Feb 2021 14:26:05 -0500 Received: from mga02.intel.com ([134.134.136.20]:28447 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239292AbhBBTYX (ORCPT ); Tue, 2 Feb 2021 14:24:23 -0500 IronPort-SDR: hcxCnVpsgwMjEzI0xw/12p9b+k+GYwMOxscVQIZVLbYzO97gmnRGLMa4yaX8FEjqLqvptrhlAq DLgkqXBs5ihA== X-IronPort-AV: E=McAfee;i="6000,8403,9883"; a="168022815" X-IronPort-AV: E=Sophos;i="5.79,396,1602572400"; d="scan'208";a="168022815" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Feb 2021 11:23:47 -0800 IronPort-SDR: l5pgKg6I9ccL/0IrUbNE9oi/bDD8/Dv9qXFEgGwGU9B4T08x6RLL5/vQeB2ZETcNNL8G8H4XQu yeQujLo4sRmg== X-IronPort-AV: E=Sophos;i="5.79,396,1602572400"; d="scan'208";a="413713179" Received: from asalasax-mobl2.amr.corp.intel.com (HELO khuang2-desk.gar.corp.intel.com) ([10.251.7.175]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Feb 2021 11:23:42 -0800 Date: Wed, 3 Feb 2021 08:23:40 +1300 From: Kai Huang To: Jarkko Sakkinen Cc: linux-sgx@vger.kernel.org, kvm@vger.kernel.org, x86@kernel.org, seanjc@google.com, luto@kernel.org, dave.hansen@intel.com, haitao.huang@intel.com, pbonzini@redhat.com, bp@alien8.de, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, jmattson@google.com, joro@8bytes.org, vkuznets@redhat.com, wanpengli@tencent.com Subject: Re: [RFC PATCH v3 16/27] KVM: VMX: Convert vcpu_vmx.exit_reason to a union Message-Id: <20210203082340.e808a4d97318e07b265d0326@intel.com> In-Reply-To: References: <20210201133259.e0398c9f0b229fd79a8c16c6@intel.com> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-sgx@vger.kernel.org On Tue, 2 Feb 2021 19:24:42 +0200 Jarkko Sakkinen wrote: > On Mon, Feb 01, 2021 at 01:32:59PM +1300, Kai Huang wrote: > > On Sat, 30 Jan 2021 17:00:46 +0200 Jarkko Sakkinen wrote: > > > On Tue, Jan 26, 2021 at 10:31:37PM +1300, Kai Huang wrote: > > > > From: Sean Christopherson > > > > > > > > Convert vcpu_vmx.exit_reason from a u32 to a union (of size u32). The > > > > full VM_EXIT_REASON field is comprised of a 16-bit basic exit reason in > > > > bits 15:0, and single-bit modifiers in bits 31:16. > > > > > > > > Historically, KVM has only had to worry about handling the "failed > > > > VM-Entry" modifier, which could only be set in very specific flows and > > > > required dedicated handling. I.e. manually stripping the FAILED_VMENTRY > > > > bit was a somewhat viable approach. But even with only a single bit to > > > > worry about, KVM has had several bugs related to comparing a basic exit > > > > reason against the full exit reason store in vcpu_vmx. > > > > > > > > Upcoming Intel features, e.g. SGX, will add new modifier bits that can > > BTW, SGX is not an upcoming CPU feature. Probably Sean was implying: "Upcoming CPU features that will be supported by Linux". I don't see big deal here. > > Also, broadly speaking of upcoming features is not right thing to do. > Better just to scope this down SGX. Theoretically upcoming CPU features > can do pretty much anything. This is change is first and foremost done > for SGX. > > > > > be set on more or less any VM-Exit, as opposed to the significantly more > > > > restricted FAILED_VMENTRY, i.e. correctly handling everything in one-off > > > > flows isn't scalable. Tracking exit reason in a union forces code to > > > > explicitly choose between consuming the full exit reason and the basic > > > > exit, and is a convenient way to document and access the modifiers. > > > > > > I *believe* that the change is correct but I dropped in the last paragraph > > > - most likely only because of lack of expertise in this area. > > > > > > I ask the most basic question: why SGX will add new modifier bits? > > > > Not 100% sure about your question. Assuming you are asking SGX hardware > > behavior, SGX architecture adds a new modifier bit (27) to Exit Reason, similar > > to new #PF.SGX bit. > > > > Please refer to SDM Volume 3, Chapter 27.2.1 Basic VM-Exit Information. > > > > Sean's commit msg already provides significant motivation of the change in this > > patch. > > Just describe why SGX requires this. That's all. This patch is to change vmexit info from u32 to union, because at least one additional modifier is going to be added, due to SGX. So the motivation of this patch is the fact that "one or more additional modifier bits will be added", and SGX is just example. So I don't think adding too much SGX backgroud in *THIS* patch is needed. And another patch: [RFC PATCH v3 21/27] KVM: VMX: Add basic handling of VM-Exit from SGX enclave already has enough information of "why new modifier bit is aadded for SGX". Sean also replied to you. Please look at that patch and see whether it satisfies you. > > /Jarkko