From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pl1-f202.google.com (mail-pl1-f202.google.com [209.85.214.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A1DE9158536 for ; Wed, 5 Feb 2025 15:15:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.202 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738768515; cv=none; b=Z/N7d+n/R3HAjnGAdMhGJlVSaI5/uZRmyITxjzF96A/gV0zeEo20O5VTxghkgTy2f+COXlMtbeWGzZorCcUtSjVh2qjukqUu3zxBsYiACO+u0V9339BA4E5oL8xFPNXhQ6z4zVDQYHcB+5qbD6yVlMUIC3nDuPMyvXnuP8otAtc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738768515; c=relaxed/simple; bh=4szL1eJgPRArjYOVHDwKE/JvLZRZfgR79x/numwtyM4=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=hVBhJ0G9Sl9X5CM6SHqtFvXlkDcSpb2+bg7O4JrYXvBsiLiQUpsczGN1Msqt5liVSRJn7mx6JnK3dBdAg3rqnKl9ZV/Pfkpfq0b/8C+/WpHAkPlmB/ZxuS5Z6Krvf48+ZrbPro5icqz2bwsFg8NG08MnXQ6KbravcKv6M016ZUc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=Y5L0KZP1; arc=none smtp.client-ip=209.85.214.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="Y5L0KZP1" Received: by mail-pl1-f202.google.com with SMTP id d9443c01a7336-216311faa51so20406255ad.0 for ; Wed, 05 Feb 2025 07:15:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1738768513; x=1739373313; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=RjqsFlgPguDEnBdcgetC9zWFV3PjaxpPC075lKRZgFw=; b=Y5L0KZP1UO6rB9GAHvnNcHiDP/hI1qsv4laQaR1ijSOSeZ+m+LlNJcr0OKnjTJZwhY QJzhygz2wyqdrwWMpvSwT4FRdIwnirmI6qJSrOJDcaVyehr54atLs2NTCAx2r75nCYZl UjiaYqGAK6IX899BY/VVI5M3tiyhdO+o1qagP3bmj7lPkML3qYdHZkdRPBFKChNJaCgU ZLUtykGwweQQzuYP8nf2Hez7qFOcCf5atnOehG32qQVI+ghC1oAhGEb4tOSFRF4exkom XYKvrkp33kHnXXoTu3TCa4kGQ5xpoosTluQ2Mrb3yext99/mpLd19K7TJXrBF6HQWLy5 gL0w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1738768513; x=1739373313; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=RjqsFlgPguDEnBdcgetC9zWFV3PjaxpPC075lKRZgFw=; b=l4q5IaaQ1yXGHUcln4huHDSdrwqcJu3Hs4cI47n66NAf7STs4k5wzp/yqTLhh+xm7h nZ+R4pdkzLOAXaLGFwkg4U5IvOXUT18t+SlZj4Az25KnpRy+dsG+ugQ2bR5Qcq/+/t6Z 4QfdxuoJWWPdENvv8+LkHS1AkJC7zOGZwhd++Qe2HY6vZVqMMa5QvHRrMVKUkbca34Zo O+3BAHKBXcFjvtsB1I4WV8fMZw63a2xBiB8MxGEsd87Yzq6KfwfyMzArDOqTW86Gg1z5 5aZG/5iENwVeiqQbIkNUYmyqhzWjXVtwO8GoRsNZb1f3xIK93gL6JvWbC6t3m0+hTU49 NyBg== X-Forwarded-Encrypted: i=1; AJvYcCXbnJT883Y4i22XihE0GM34zp6LAzvIOyuojE9CDYURWpmCUkAjBE6cfULaCHy/5UTg6I3xY1zeRKSDSuA=@vger.kernel.org X-Gm-Message-State: AOJu0Yz5oALwgmoYpwx5pQBVGv3joLfCvYm1Nvo5fXx4lo0hCyo2JBDm MrRfCzgpVzQk9cu3l1nPY5IlCEKQEeLMZjHOJx10I+4NB//42IpyFzQlX80JZkpxDGNqRS+rHJ0 IPw== X-Google-Smtp-Source: AGHT+IFHs7tj+Q54d64NDKOfhfMfAS91bOZEx/8/ugogv1Ut4aJidKZIV/qdikwiSwu5m+q7+e5T4vD0P74= X-Received: from plgi6.prod.google.com ([2002:a17:902:cf06:b0:21c:144d:411b]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a17:902:daca:b0:215:758c:52e8 with SMTP id d9443c01a7336-21f17a774a7mr66004375ad.12.1738768512794; Wed, 05 Feb 2025 07:15:12 -0800 (PST) Date: Wed, 5 Feb 2025 07:15:11 -0800 In-Reply-To: <1969aa1a-e092-4a48-b4a0-9a50ec2ef3b6@amd.com> Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <1969aa1a-e092-4a48-b4a0-9a50ec2ef3b6@amd.com> Message-ID: Subject: Re: [PATCH v2 4/4] iommu/amd: Enable Host SNP support after enabling IOMMU SNP support From: Sean Christopherson To: Vasant Hegde Cc: Ashish Kalra , pbonzini@redhat.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, thomas.lendacky@amd.com, john.allen@amd.com, herbert@gondor.apana.org.au, davem@davemloft.net, joro@8bytes.org, suravee.suthikulpanit@amd.com, will@kernel.org, robin.murphy@arm.com, michael.roth@amd.com, dionnaglaze@google.com, nikunj@amd.com, ardb@kernel.org, kevinloughlin@google.com, Neeraj.Upadhyay@amd.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, linux-coco@lists.linux.dev, iommu@lists.linux.dev Content-Type: text/plain; charset="us-ascii" On Wed, Feb 05, 2025, Vasant Hegde wrote: > On 1/31/2025 7:18 AM, Sean Christopherson wrote: > > On Fri, Jan 31, 2025, Ashish Kalra wrote: > >> @@ -3426,18 +3431,23 @@ void __init amd_iommu_detect(void) > >> int ret; > >> > >> if (no_iommu || (iommu_detected && !gart_iommu_aperture)) > >> - return; > >> + goto disable_snp; > >> > >> if (!amd_iommu_sme_check()) > >> - return; > >> + goto disable_snp; > >> > >> ret = iommu_go_to_state(IOMMU_IVRS_DETECTED); > >> if (ret) > >> - return; > >> + goto disable_snp; > > > > This handles initial failure, but it won't handle the case where amd_iommu_prepare() > > fails, as the iommu_go_to_state() call from amd_iommu_enable() will get > > short-circuited. I don't see any pleasant options. Maybe this? > > > > diff --git a/drivers/iommu/amd/init.c b/drivers/iommu/amd/init.c > > index c5cd92edada0..436e47f13f8f 100644 > > --- a/drivers/iommu/amd/init.c > > +++ b/drivers/iommu/amd/init.c > > @@ -3318,6 +3318,8 @@ static int __init iommu_go_to_state(enum iommu_init_state state) > > ret = state_next(); > > } > > > > + if (ret && !amd_iommu_snp_en && cc_platform_has(CC_ATTR_HOST_SEV_SNP)) > > I think we should clear when `amd_iommu_snp_en` is true. That doesn't address the case where amd_iommu_prepare() fails, because amd_iommu_snp_en will be %false (it's init value) and the RMP will be uninitialized, i.e. CC_ATTR_HOST_SEV_SNP will be incorrectly left set. And conversely, IMO clearing CC_ATTR_HOST_SEV_SNP after initializing the IOMMU and RMP is wrong as well. Such a host is probably hosted regardless, but from the CPU's perspective, SNP is supported and enabled. > May be below check is enough? > > if (ret && amd_iommu_snp_en)