Received: by 2002:a25:d783:0:0:0:0:0 with SMTP id o125csp427368ybg; Thu, 19 Mar 2020 02:18:32 -0700 (PDT) X-Google-Smtp-Source: ADFU+vv6BW1aB4V4scIJUA78uEojnfGOlED5r3g/i8sebiYC8umn77xDn4DsmEl9hxVwPNW5crft X-Received: by 2002:a05:6830:20c8:: with SMTP id z8mr1471981otq.135.1584609512017; Thu, 19 Mar 2020 02:18:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584609512; cv=none; d=google.com; s=arc-20160816; b=P2WLq/dYv9EwhITW1gtADvTFUUejl6VSe4ZaftXn4rDwXe9CXFpubsZ5Nt0BTgZLX8 zsPlWRo5cBticOynE+ehm7RT2ttgwoJCFOJNeuBMQx81AxQnstHzM+vSo2uTGdnc2jC0 eBolEmtU7a/2FqKOYxLZ1drLCs7RghgcycmKYBpdd2yuSguqqTWS1q5HrHgFMzkWTidD kMGULOxRV4vuv4gqmKNm64BV1IXGs/fnJqV5ARjMYF/wBN8arhx1uUSdivtkHf0JiQ/C PQIikntPP47cssX0c0qWB6x8d1svOuJ1nwTVHGuZcawqT788FBEPSNn6kZpMlGkhSmy7 BpIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=Zwfypk/gaX5pX+adKKXv86RlVbS2kjm6Nlz+bHcr53E=; b=S8HgLHOjOJ0b0gu2zAZvSrrYYW0QQWA6bZRJgWo4weKIk+psb8glmD9c2DNWq/nSXG L27gbffJPYaugmiBKzzYbAzJjJt9ZkheWwlbTNT8bs8uoh4LGpL+gzFclLe+e9Mq8bu2 gE9dcN9TAjKPhsF7/M9R6Z2ReDqginHlXHqpvJRtAOahvPcGmRQFlnSyOCbyWVS6HZNG 4gLRklpcvOYqpjX/T0tVnQzalPnvLu4QOJPW+E6vqA+d31Lyh3VwJ6LVHyL0i8dV/tPU YT/wVEaDKPouC5RJm22EVShI7YOSbkZhoakGU7JjtZceO62xJMCCPxCBP+djwghpue2+ VGjw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w85si762896oif.88.2020.03.19.02.18.20; Thu, 19 Mar 2020 02:18:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727832AbgCSJRe (ORCPT + 99 others); Thu, 19 Mar 2020 05:17:34 -0400 Received: from 8bytes.org ([81.169.241.247]:52214 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727249AbgCSJOi (ORCPT ); Thu, 19 Mar 2020 05:14:38 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id 08C9080A; Thu, 19 Mar 2020 10:14:23 +0100 (CET) From: Joerg Roedel To: x86@kernel.org Cc: hpa@zytor.com, Andy Lutomirski , Dave Hansen , Peter Zijlstra , Thomas Hellstrom , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, Joerg Roedel , Joerg Roedel Subject: [PATCH 41/70] x86/sev-es: Add Runtime #VC Exception Handler Date: Thu, 19 Mar 2020 10:13:38 +0100 Message-Id: <20200319091407.1481-42-joro@8bytes.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200319091407.1481-1-joro@8bytes.org> References: <20200319091407.1481-1-joro@8bytes.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tom Lendacky Add the handler for #VC exceptions invoked at runtime. Signed-off-by: Tom Lendacky Signed-off-by: Joerg Roedel --- arch/x86/entry/entry_64.S | 4 ++ arch/x86/include/asm/traps.h | 7 ++++ arch/x86/kernel/idt.c | 4 +- arch/x86/kernel/sev-es.c | 77 +++++++++++++++++++++++++++++++++++- 4 files changed, 90 insertions(+), 2 deletions(-) diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S index f2bb91e87877..729876d368c5 100644 --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -1210,6 +1210,10 @@ idtentry async_page_fault do_async_page_fault has_error_code=1 read_cr2=1 idtentry machine_check do_mce has_error_code=0 paranoid=1 #endif +#ifdef CONFIG_AMD_MEM_ENCRYPT +idtentry vmm_communication do_vmm_communication has_error_code=1 +#endif + /* * Save all registers in pt_regs, and switch gs if needed. * Use slow, but surefire "are we in kernel?" check. diff --git a/arch/x86/include/asm/traps.h b/arch/x86/include/asm/traps.h index 2aa786484bb1..1be25c065698 100644 --- a/arch/x86/include/asm/traps.h +++ b/arch/x86/include/asm/traps.h @@ -35,6 +35,9 @@ asmlinkage void alignment_check(void); #ifdef CONFIG_X86_MCE asmlinkage void machine_check(void); #endif /* CONFIG_X86_MCE */ +#ifdef CONFIG_AMD_MEM_ENCRYPT +asmlinkage void vmm_communication(void); +#endif asmlinkage void simd_coprocessor_error(void); #if defined(CONFIG_X86_64) && defined(CONFIG_XEN_PV) @@ -93,6 +96,10 @@ dotraplinkage void do_alignment_check(struct pt_regs *regs, long error_code); dotraplinkage void do_machine_check(struct pt_regs *regs, long error_code); #endif dotraplinkage void do_simd_coprocessor_error(struct pt_regs *regs, long error_code); +#ifdef CONFIG_AMD_MEM_ENCRYPT +dotraplinkage void do_vmm_communication_error(struct pt_regs *regs, + long error_code); +#endif #ifdef CONFIG_X86_32 dotraplinkage void do_iret_error(struct pt_regs *regs, long error_code); #endif diff --git a/arch/x86/kernel/idt.c b/arch/x86/kernel/idt.c index 135d208a2d38..25fa8ba70993 100644 --- a/arch/x86/kernel/idt.c +++ b/arch/x86/kernel/idt.c @@ -88,8 +88,10 @@ static const __initconst struct idt_data def_idts[] = { #ifdef CONFIG_X86_MCE INTG(X86_TRAP_MC, &machine_check), #endif - SYSG(X86_TRAP_OF, overflow), +#ifdef CONFIG_AMD_MEM_ENCRYPT + INTG(X86_TRAP_VC, vmm_communication), +#endif #if defined(CONFIG_IA32_EMULATION) SYSG(IA32_SYSCALL_VECTOR, entry_INT80_compat), #elif defined(CONFIG_X86_32) diff --git a/arch/x86/kernel/sev-es.c b/arch/x86/kernel/sev-es.c index 4bf5286310a0..97241d2f0f70 100644 --- a/arch/x86/kernel/sev-es.c +++ b/arch/x86/kernel/sev-es.c @@ -20,7 +20,7 @@ #include #include #include -#include +#include #include /* For early boot hypervisor communication in SEV-ES enabled guests */ @@ -251,6 +251,81 @@ static enum es_result vc_handle_exitcode(struct es_em_ctxt *ctxt, return result; } +static void vc_forward_exception(struct es_em_ctxt *ctxt) +{ + long error_code = ctxt->fi.error_code; + int trapnr = ctxt->fi.vector; + + ctxt->regs->orig_ax = ctxt->fi.error_code; + + switch (trapnr) { + case X86_TRAP_GP: + do_general_protection(ctxt->regs, error_code); + break; + case X86_TRAP_UD: + do_invalid_op(ctxt->regs, 0); + break; + default: + BUG(); + } +} + +dotraplinkage void do_vmm_communication(struct pt_regs *regs, unsigned long exit_code) +{ + struct es_em_ctxt ctxt; + enum es_result result; + struct ghcb *ghcb; + + /* + * This is invoked through an interrupt gate, so IRQs are disabled. The + * code below might walk page-tables for user or kernel addresses, so + * keep the IRQs disabled to protect us against concurrent TLB flushes. + */ + + ghcb = (struct ghcb *)this_cpu_ptr(ghcb_page); + + vc_ghcb_invalidate(ghcb); + result = vc_init_em_ctxt(&ctxt, regs, exit_code); + + if (result == ES_OK) + result = vc_handle_exitcode(&ctxt, ghcb, exit_code); + + /* Done - now check the result */ + switch (result) { + case ES_OK: + vc_finish_insn(&ctxt); + break; + case ES_UNSUPPORTED: + pr_emerg("Unsupported exit-code 0x%02lx in early #VC exception (IP: 0x%lx)\n", + exit_code, regs->ip); + goto fail; + case ES_VMM_ERROR: + pr_emerg("PANIC: Failure in communication with VMM (exit-code 0x%02lx IP: 0x%lx)\n", + exit_code, regs->ip); + goto fail; + case ES_DECODE_FAILED: + pr_emerg("PANIC: Failed to decode instruction (exit-code 0x%02lx IP: 0x%lx)\n", + exit_code, regs->ip); + goto fail; + case ES_EXCEPTION: + vc_forward_exception(&ctxt); + break; + case ES_RETRY: + /* Nothing to do */ + break; + default: + BUG(); + } + + return; + +fail: + show_regs(regs); + + while (true) + halt(); +} + bool __init boot_vc_exception(struct pt_regs *regs) { unsigned long exit_code = regs->orig_ax; -- 2.17.1