Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp637076pxb; Wed, 3 Feb 2021 13:50:24 -0800 (PST) X-Google-Smtp-Source: ABdhPJwoiMm7dEjgQMzeP1rgVV56JOPSiCadUk6B89o2FIVfcIGWmKsH3fQfj1uNPQYVooVzdWnL X-Received: by 2002:a17:906:af41:: with SMTP id ly1mr5054559ejb.525.1612389023928; Wed, 03 Feb 2021 13:50:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612389023; cv=none; d=google.com; s=arc-20160816; b=fFrDsNuzTczuCc8f+AIAHz1DLAjAZQESkkxDBN+ewWV14D+njHKHCD51bWR+wVUKdj kp9+Yptae8VmjR5I52aFq2TJ0QGMrmzDSXJHU8QVXIIsCn4prHWaUtI17RI4K4l+cKbg t5H8Glqgk2DDsJ4rBT/7IjqQ+/VBt83kek3/uzZJZ8KCJNNqhla6POEvBMbmg92xIwfw w85wi7c+cSL4DY/jAahVJE2kygi2aJg6TiL4bMP3Y5n3ApLKighSyEoiNS/QKTpvlRhi x91Psn3XbsrRuq8cXhVKeXzRwf/jAgWSDh5LnrDVm54DJT5JxUwmnYfNpjLj5IFde0Zz Lx/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=EXC4BHA62oPh1DytXMv6z3tOZEILHTomqpBj4phV+a4=; b=ZU6fU0pq6PMAs2XWl/MOb42WyjKg0L5L0VT5PlclgoXGxS0IkwAdwCp8i3qhBhlfRH hdfqrlp/hlLKipX7yho6RD70CdnF152WOfrw88GXKWR5bPt6okZhH67uguXwsTvHZn32 7/f2zT1FILwSOK4Y64BWNKgJwsE1b1tZgeiFs9zu81A0SPx0a3tjK3z04bmk4dz4IuXU KtdNSDRq6lVqsN+Jb2Ad3M0c68HKE0drYuG5jDfiKEnit+iEk9VqAWKKpXm2G4VFb87y e/+qnk0OWRkx3oT0Pgv7Ua4NJqYk8WdtvkulMA/yJipm5153dBmhctDnhIWwkYpFSCbb Eocw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=BCHTnncL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d4si2154542ejb.594.2021.02.03.13.49.59; Wed, 03 Feb 2021 13:50:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=BCHTnncL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232138AbhBCVrb (ORCPT + 99 others); Wed, 3 Feb 2021 16:47:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36918 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229897AbhBCVr3 (ORCPT ); Wed, 3 Feb 2021 16:47:29 -0500 Received: from mail-pg1-x530.google.com (mail-pg1-x530.google.com [IPv6:2607:f8b0:4864:20::530]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 79D57C061573 for ; Wed, 3 Feb 2021 13:46:49 -0800 (PST) Received: by mail-pg1-x530.google.com with SMTP id s23so643652pgh.11 for ; Wed, 03 Feb 2021 13:46:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=EXC4BHA62oPh1DytXMv6z3tOZEILHTomqpBj4phV+a4=; b=BCHTnncLTmJ42YFBYuEgoCsRxxh6EAN4G/9kBKu6FH7Z+tV8WCsfZxGYPmTIGT3yLM e/BD+HO9lL3sqDQEcXTcCfV8wYX0gVPg1fWPTG91IOBpObWsXaI0++SiHlQkC3p3aO8S H39EbEpBk7vqqhmRzcSxB0hdd8RTamq6vF8Ej/MXEEAWmZZfmS32BobdsgNcGfSvG8TO LEZAo7HboC1XFJahd1WVRoMdfoKN6eXTdBKb8u1EMVidTEYll+IUfTEJT0vBZ1a+11Px CXiXO0I2h8a2lT1EHb6qd8AJjkGyAtGKXOvBERNJKL70ZMiIoUjCRX9SoaVgwMF6jCUN IXpg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=EXC4BHA62oPh1DytXMv6z3tOZEILHTomqpBj4phV+a4=; b=p3AT5/VbQ/x4mx7Mxgd0QU4zaDmnTectvmSAZRyqbAnveSGF83sJrIth9pmuN8M9Bq 31LcB7XYKFZ5PNZ7RUPBi2yu7ngdnhkgTEP0IScd5d4hKglT6UzdzGyTMxXdK73O2iES ussA2SCWJHOc+zdOP1m3cNM3zL9fppeBAjyICVU7OnAtYAwdAR6rwmUOGeDVAgfvQ0M/ U979rh/7IXrGvlFPwEx8ibEEGT+7fiXWntadP0dU/Xoo4QeNeN6KLmvbhVMWWYYbSamG kiPViJAa9H+MQ13GToWXmZ924Fz18VI2T59gvKp9dqB09WuqObagd9JEaBO7I0ijDtjH Pxyg== X-Gm-Message-State: AOAM532NNeSyXeDrzGCl32BKOm0944BJzXYR94xN+Ez8UxttA8GYKVAi 19eNz1XZZ891XvcHjMbzIp/tBw== X-Received: by 2002:a65:4781:: with SMTP id e1mr5739812pgs.30.1612388808835; Wed, 03 Feb 2021 13:46:48 -0800 (PST) Received: from google.com ([2620:15c:f:10:a9a0:e924:d161:b6cb]) by smtp.gmail.com with ESMTPSA id a37sm3820669pgm.79.2021.02.03.13.46.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Feb 2021 13:46:48 -0800 (PST) Date: Wed, 3 Feb 2021 13:46:42 -0800 From: Sean Christopherson To: Yang Weijiang Cc: pbonzini@redhat.com, jmattson@google.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, yu.c.zhang@linux.intel.com Subject: Re: [PATCH v15 04/14] KVM: x86: Add #CP support in guest exception dispatch Message-ID: References: <20210203113421.5759-1-weijiang.yang@intel.com> <20210203113421.5759-5-weijiang.yang@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20210203113421.5759-5-weijiang.yang@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 03, 2021, Yang Weijiang wrote: > Add handling for Control Protection (#CP) exceptions, vector 21, used > and introduced by Intel's Control-Flow Enforcement Technology (CET). > relevant CET violation case. See Intel's SDM for details. > > Signed-off-by: Yang Weijiang > --- > arch/x86/include/uapi/asm/kvm.h | 1 + > arch/x86/kvm/x86.c | 1 + > arch/x86/kvm/x86.h | 2 +- > 3 files changed, 3 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/include/uapi/asm/kvm.h b/arch/x86/include/uapi/asm/kvm.h > index 8e76d3701db3..507263d1d0b2 100644 > --- a/arch/x86/include/uapi/asm/kvm.h > +++ b/arch/x86/include/uapi/asm/kvm.h > @@ -32,6 +32,7 @@ > #define MC_VECTOR 18 > #define XM_VECTOR 19 > #define VE_VECTOR 20 > +#define CP_VECTOR 21 > > /* Select x86 specific features in */ > #define __KVM_HAVE_PIT > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index 99f787152d12..d9d3bae40a8c 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -436,6 +436,7 @@ static int exception_class(int vector) > case NP_VECTOR: > case SS_VECTOR: > case GP_VECTOR: > + case CP_VECTOR: > return EXCPT_CONTRIBUTORY; > default: > break; > diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h > index c5ee0f5ce0f1..bdbd0b023ecc 100644 > --- a/arch/x86/kvm/x86.h > +++ b/arch/x86/kvm/x86.h > @@ -116,7 +116,7 @@ static inline bool x86_exception_has_error_code(unsigned int vector) > { > static u32 exception_has_error_code = BIT(DF_VECTOR) | BIT(TS_VECTOR) | > BIT(NP_VECTOR) | BIT(SS_VECTOR) | BIT(GP_VECTOR) | > - BIT(PF_VECTOR) | BIT(AC_VECTOR); > + BIT(PF_VECTOR) | BIT(AC_VECTOR) | BIT(CP_VECTOR); These need to be conditional on CET being exposed to the guest. TBD exceptions are non-contributory and don't have an error code. Found when running unit tests in L1 with a kvm/queue as L1, but an older L0. cr4_guest_rsvd_bits can be used to avoid guest_cpuid_has() lookups. The SDM also gets this wrong. Section 26.2.1.3, VM-Entry Control Fields, needs to be updated to add #CP to the list. — The field's deliver-error-code bit (bit 11) is 1 if each of the following holds: (1) the interruption type is hardware exception; (2) bit 0 (corresponding to CR0.PE) is set in the CR0 field in the guest-state area; (3) IA32_VMX_BASIC[56] is read as 0 (see Appendix A.1); and (4) the vector indicates one of the following exceptions: #DF (vector 8), #TS (10), #NP (11), #SS (12), #GP (13), #PF (14), or #AC (17). diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vmx/nested.c index dbca1687ae8e..0b6dab6915a3 100644 --- a/arch/x86/kvm/vmx/nested.c +++ b/arch/x86/kvm/vmx/nested.c @@ -2811,7 +2811,7 @@ static int nested_check_vm_entry_controls(struct kvm_vcpu *vcpu, /* VM-entry interruption-info field: deliver error code */ should_have_error_code = intr_type == INTR_TYPE_HARD_EXCEPTION && prot_mode && - x86_exception_has_error_code(vector); + x86_exception_has_error_code(vcpu, vector); if (CC(has_error_code != should_have_error_code)) return -EINVAL; diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 28fea7ff7a86..0288d6a364bd 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -437,17 +437,20 @@ EXPORT_SYMBOL_GPL(kvm_spurious_fault); #define EXCPT_CONTRIBUTORY 1 #define EXCPT_PF 2 -static int exception_class(int vector) +static int exception_class(struct kvm_vcpu *vcpu, int vector) { switch (vector) { case PF_VECTOR: return EXCPT_PF; + case CP_VECTOR: + if (vcpu->arch.cr4_guest_rsvd_bits & X86_CR4_CET) + return EXCPT_BENIGN; + return EXCPT_CONTRIBUTORY; case DE_VECTOR: case TS_VECTOR: case NP_VECTOR: case SS_VECTOR: case GP_VECTOR: - case CP_VECTOR: return EXCPT_CONTRIBUTORY; default: break; @@ -588,8 +591,8 @@ static void kvm_multiple_exception(struct kvm_vcpu *vcpu, kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); return; } - class1 = exception_class(prev_nr); - class2 = exception_class(nr); + class1 = exception_class(vcpu, prev_nr); + class2 = exception_class(vcpu, nr); if ((class1 == EXCPT_CONTRIBUTORY && class2 == EXCPT_CONTRIBUTORY) || (class1 == EXCPT_PF && class2 != EXCPT_BENIGN)) { /* diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h index a14da36a30ed..dce756ffb577 100644 --- a/arch/x86/kvm/x86.h +++ b/arch/x86/kvm/x86.h @@ -120,12 +120,16 @@ static inline bool is_la57_mode(struct kvm_vcpu *vcpu) #endif } -static inline bool x86_exception_has_error_code(unsigned int vector) +static inline bool x86_exception_has_error_code(struct kvm_vcpu *vcpu, + unsigned int vector) { static u32 exception_has_error_code = BIT(DF_VECTOR) | BIT(TS_VECTOR) | BIT(NP_VECTOR) | BIT(SS_VECTOR) | BIT(GP_VECTOR) | BIT(PF_VECTOR) | BIT(AC_VECTOR) | BIT(CP_VECTOR); + if (vector == CP_VECTOR && (vcpu->arch.cr4_guest_rsvd_bits & X86_CR4_CET)) + return false; + return (1U << vector) & exception_has_error_code; }