Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1703340ybh; Tue, 14 Jul 2020 05:16:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxbiv6agEeeNkMdKTQIYNuUao1sIXuqkM9hnZ3If2DAvWRB5RBDrv1AqttkXNxXDxZeFE1i X-Received: by 2002:a17:906:391:: with SMTP id b17mr4441560eja.282.1594728967915; Tue, 14 Jul 2020 05:16:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594728967; cv=none; d=google.com; s=arc-20160816; b=QxQTzpvn5hAALv7cpg0OS7jj8Ezv/ciMb8/CFLCyRvJ1cuTaZSnOiGNwiW8Be3YDbf GCUwuEyysD35jYGWWYor6g8vbYldM/DtLmxVhiZ3SvrRvzUIW6gIeASJcnEDDAWH0jSV 5UZFRPOxPJXLvBkEvlizLLyBlP6nwCFeG3aWjlxpMvooj6MyEUHO8hp3eGoGXDobVpB9 1oIHtctVCDeVZ2VxyejB4llAuktoONYlb3BbqI/1i7m2VykPNNnH/fE12/AgIwqsfoTf KMKHAJullih1qrpukmKX0V0tDOiiH6r6A5RHTuo3wT5+xxtMXL1EMnPS23MvPJbyN2n7 oLYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=6CRfk7tV8RPGGVSrdM/JeN/0RAPHyV9BZ6mj25JueI8=; b=n/NyMeGu0IR5ulwXO0IghUm1MT/NCGCwR5KruQM3AWXfmcEna1x+x8oW34y2epOiW1 LFgqw20RNdDdCnn2cqZQVmbwqKbViezhdHVp06mKOZxzN4j7soFAIIxu3h6wYbHe+8np g3AnSwiONHRkXbP4fdm2AEiTc+QxJI7M5Xgm8yiDvKvb8L8VjywB8sUcQXzzsgT8VKXc Ftb142Bhe16qFkDKEyKJGw5Ifgjx8Tji67oAAwRyjV0TGf86cHLMYvrgTRQJ4F1Y93HS d6SXQOm3iBMFx9GeKTTDmPwFUW/IEnz8MAPC5EUTxSAeyZgtQ7UCIojCp9DvA3R8Lc6M E1Ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dr9si14610560ejc.147.2020.07.14.05.15.43; Tue, 14 Jul 2020 05:16:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728802AbgGNMMn (ORCPT + 99 others); Tue, 14 Jul 2020 08:12:43 -0400 Received: from 8bytes.org ([81.169.241.247]:52886 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728513AbgGNMLP (ORCPT ); Tue, 14 Jul 2020 08:11:15 -0400 Received: from cap.home.8bytes.org (p5b006776.dip0.t-ipconnect.de [91.0.103.118]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by theia.8bytes.org (Postfix) with ESMTPSA id 4263CFDC; Tue, 14 Jul 2020 14:11:07 +0200 (CEST) From: Joerg Roedel To: x86@kernel.org Cc: Joerg Roedel , Joerg Roedel , hpa@zytor.com, Andy Lutomirski , Dave Hansen , Peter Zijlstra , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , David Rientjes , Cfir Cohen , Erdem Aktas , Masami Hiramatsu , Mike Stunes , Sean Christopherson , Martin Radev , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: [PATCH v4 62/75] x86/sev-es: Handle #AC Events Date: Tue, 14 Jul 2020 14:09:04 +0200 Message-Id: <20200714120917.11253-63-joro@8bytes.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200714120917.11253-1-joro@8bytes.org> References: <20200714120917.11253-1-joro@8bytes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Implement a handler for #VC exceptions caused by #AC exceptions. The #AC exception is just forwarded to do_alignment_check() and not pushed down to the hypervisor, as requested by the SEV-ES GHCB Standardization Specification. Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev-es.c | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) diff --git a/arch/x86/kernel/sev-es.c b/arch/x86/kernel/sev-es.c index 013dcdfeb613..8f275e5d1ce7 100644 --- a/arch/x86/kernel/sev-es.c +++ b/arch/x86/kernel/sev-es.c @@ -915,6 +915,19 @@ static enum es_result vc_handle_vmmcall(struct ghcb *ghcb, return ES_OK; } +static enum es_result vc_handle_trap_ac(struct ghcb *ghcb, + struct es_em_ctxt *ctxt) +{ + /* + * Calling ecx_alignment_check() directly does not work, because it + * enables IRQs and the GHCB is active. Forward the exception and call + * it later from vc_forward_exception(). + */ + ctxt->fi.vector = X86_TRAP_AC; + ctxt->fi.error_code = 0; + return ES_EXCEPTION; +} + static enum es_result vc_handle_exitcode(struct es_em_ctxt *ctxt, struct ghcb *ghcb, unsigned long exit_code) @@ -928,6 +941,9 @@ static enum es_result vc_handle_exitcode(struct es_em_ctxt *ctxt, case SVM_EXIT_WRITE_DR7: result = vc_handle_dr7_write(ghcb, ctxt); break; + case SVM_EXIT_EXCP_BASE + X86_TRAP_AC: + result = vc_handle_trap_ac(ghcb, ctxt); + break; case SVM_EXIT_RDTSC: case SVM_EXIT_RDTSCP: result = vc_handle_rdtsc(ghcb, ctxt, exit_code); @@ -987,6 +1003,9 @@ static __always_inline void vc_forward_exception(struct es_em_ctxt *ctxt) case X86_TRAP_UD: exc_invalid_op(ctxt->regs); break; + case X86_TRAP_AC: + exc_alignment_check(ctxt->regs, error_code); + break; default: pr_emerg("Unsupported exception in #VC instruction emulation - can't continue\n"); BUG(); -- 2.27.0