From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pg1-f202.google.com (mail-pg1-f202.google.com [209.85.215.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CACA22F5311 for ; Wed, 25 Feb 2026 20:05:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.215.202 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772049920; cv=none; b=iYm7Ds1qsjuztKZ84yroFHiBHBn9arevrPljo3znUlTCJnyfubd5zTm/hBfJ06+YMOm2tNciqYGs+hTTG9lbr6mijCzqnQx1JvAQKPtB46ePW4AjwKXreHsiDtBMPI06+AImUjlVCgYDSkhFzduhbSkjrIGIFhsfBgr6qMxryDU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772049920; c=relaxed/simple; bh=tKRbocRq14DmTJ0Xibmw+KZElUfkj3XNWjkuRruFO5k=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=I1R/7LKNyK6wAEhugUCfG4gcgXUS6ZZnUanM6zpzDfHiXMLVDp7NUUAv4txIXJYThbEfb+xsXXWGFoffLP5zzh03qVbKlYaMfm9RO5kcqbGnOFkJoodnV8knq9fTtV2Psdp/z7QbA7WWdw+JrW5OK2ytEnUL5PjhaQSD0MDFM3E= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=t3IvwJ5D; arc=none smtp.client-ip=209.85.215.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="t3IvwJ5D" Received: by mail-pg1-f202.google.com with SMTP id 41be03b00d2f7-c70ea2f7d1bso9185a12.2 for ; Wed, 25 Feb 2026 12:05:18 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1772049918; x=1772654718; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=euk6pR55vngbiALkr/Ss6DCVuRl2d4R3J4RSxPrxxr8=; b=t3IvwJ5DzVnW8y3cYaPl8NngrIgAJOODKDco4UTexBqLyfDybofjqt/Y0QsuXdVKCu lXSv1gkV1TQbfU1j8AGpB738v46zazd0pUyctMiWIOPj+gTnSF1ndz5me65mBngVmSTN qkM78LrtT9cZemgI3PluBUgYIOKB/nuepn6L+LUHZfP0i0lhwF4N63gHnDVRhHLvrA3q 1p4pnQxz5LALFe1y03/zMg4qfW8OH/KiAcicgiN30xszlWbeoNsSiyxpHSc6+kS/xVGG QFS6rSlT3Cfee1oIeWKBXPSMhevAgFfx4EdHCAPdRIReb9v6+9WQKMMEKXx/bSYBaGl1 CJLw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1772049918; x=1772654718; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=euk6pR55vngbiALkr/Ss6DCVuRl2d4R3J4RSxPrxxr8=; b=BS1i/JjlzH6uR1urWH98hpcN7QU+l7/IeIxDD/CqnaI4Lzmse/5EKBAxznj0wRGDsq OrkIIaD5vulmVimhB3CevZXG7yBU3OlGM0ef7Slk5u6FAfUPT1e4xbwLyzQvB0RTD8RN 2l59xzWY6wXDJHIveUm1ulZcObN0kYzmSI/5MAfVEXQyXLobaG8nxfBoH9imo2vT1CUV PuWNPf4O+BNBOF/3+6VmxmCyZBVAt2dLKOojYUkoXiD2+KXQDDnLAP+uz/K+R7jJQSod Sln70Jzkomk7O5pXAUJlaFCzhw/UZdZNO0JotjF2+kcT0/yos7huJ+p5d941fM4kdXrG 2qpA== X-Forwarded-Encrypted: i=1; AJvYcCX2Xldtadhdb0yHEjJqh5jbGLaEuCZx9PeupPmhu6pedzuq1LWxQY8a99aE1BYB7sbmb75meaXEbt+nqHY=@vger.kernel.org X-Gm-Message-State: AOJu0YyIu0GbjXtvcqPtJCHyDhgZXJLm7U/k5GR7p2xuvHJR0ET62tUa qgliqaenXr2NDqowFwycOfIJf4OPWgLLBgNj9MlGMPGm+20LRlSjbi1oRDOCYSDPyP7wCIpMtmB ddegpkw== X-Received: from pgbda10.prod.google.com ([2002:a05:6a02:238a:b0:c6e:6f7d:a6d9]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6a21:6083:b0:38e:87d7:7b95 with SMTP id adf61e73a8af0-39545e91cafmr14346518637.20.1772049917923; Wed, 25 Feb 2026 12:05:17 -0800 (PST) Date: Wed, 25 Feb 2026 12:05:16 -0800 In-Reply-To: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: Message-ID: Subject: Re: [PATCH] KVM: SEV: Track SNP launch state and disallow invalid userspace interactions From: Sean Christopherson To: Jethro Beekman Cc: Paolo Bonzini , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-coco@lists.linux.dev Content-Type: text/plain; charset="us-ascii" On Mon, Jan 19, 2026, Jethro Beekman wrote: > Calling any of the SNP_LAUNCH_ ioctls after SNP_LAUNCH_FINISH results in a > kernel page fault due to RMP violation. Track SNP launch state and exit early. What exactly trips the RMP #PF? A backtrace would be especially helpful for posterity. I ask because it's basically impossible to determine if this approach is optimal without knowing exactly what's going wrong. Semantically it sounds reasonable, but ideally KVM would naturally handle userspace stupidity (without exploding).