Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1492398pxf; Fri, 9 Apr 2021 09:40:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8e9y58ySbuNqXNBHOvdLxvPEYT1aUS1ZHmt1kSszDpCLVa6k7Hbgat2if5ihhf8ykySv9 X-Received: by 2002:a17:902:c408:b029:e7:3242:5690 with SMTP id k8-20020a170902c408b02900e732425690mr13825411plk.85.1617986436071; Fri, 09 Apr 2021 09:40:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617986436; cv=none; d=google.com; s=arc-20160816; b=tTIJVZz706Yb77mSjebWyIoOwc+AAvskbP1Cz5r4BUX3mirTPFXtiWi5tIiQ6pTmpn awMJo1OdYgjKLIUpnG8QzwNXMZy19/TWU+992ChCeRFZPBlGgp1n3ObvtwSsZcMMXjsA 72jO1P6SwPUpAeh+nZo7TKQXyAPNGznDDAR/ris/4Ichd/t71yKwox1dPyaqxXJPJYgM //vDEv9zunVYUWoG1lxjVxX54ie3jmIpD2O06JCE54p2PClPZOmRBP+sni9BnGoCGMvC VwBnu/JKHQ0Bdfr5gezZLbozk8x1eYL8ITXEhsJlLS5BFB+UNwrJDyefQghulgII5b5j 13Rw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=GEH6ahek62aXY8iXScAwAVfTv8FrDuewq6fR1FVMQO8=; b=Krgx3ndRmY57pnrRprUaZ1VgqLroY3PUsI4dEUD3Hv+HMjpQ5tXeyq5VgELFWTsRa/ GiSgwWbZ8++kIO4YhJVzwLIHVhJqceGzV/xgVkBYFmzrYUR+GuWQ7C+OlEVe6SpPs/WD JRbUt0tVoWJhBnKkemvC7NLSNCjcGbdHrGPywwczP2MfDsOWoBNe2cd5cyDC/58t1+Is kqWtdY5cCzot18LZBQQC2FIq+NMNEjzQnpcycdbIqbFrtViocDOqGmbeaEKCGav3Rz5W JgVVH6PF52Qv0HuEVIushw91necOH9eWvJFD6QEX/+clJi9jg7+5Y7JSxep9g3NAoaGf h5dg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=D1yFVy+L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x3si3329223pjv.57.2021.04.09.09.40.23; Fri, 09 Apr 2021 09:40:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=D1yFVy+L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234091AbhDIQid (ORCPT + 99 others); Fri, 9 Apr 2021 12:38:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56750 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234059AbhDIQic (ORCPT ); Fri, 9 Apr 2021 12:38:32 -0400 Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D7D85C061761 for ; Fri, 9 Apr 2021 09:38:19 -0700 (PDT) Received: by mail-pf1-x42a.google.com with SMTP id i190so4575448pfc.12 for ; Fri, 09 Apr 2021 09:38:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=GEH6ahek62aXY8iXScAwAVfTv8FrDuewq6fR1FVMQO8=; b=D1yFVy+LagHtHJAaz6Nq5mGOTpW/BL/vGsFvNliDBdxurJeU+SofsOb+XOkxPk1Dh9 1712P6c3SmC44mcGJbkLyxo5wsnRmaknoP2pjnNpIuCwxIr1BgeuztCuJjbl9XY8Cucb m7gzrUJpyk5nT/GPS8zUf6cosW4htpylaC7gBi44deo4spgx+gVOROp1T+nEPQfKqQ/O G714feR20gYAkRJm1CudfDNSs8GJGWXbaEFVIKNdmIxF3eHteEbFoVfjVzSpsvpEto17 s3mwusCkv2Z5N5ynVYNpFIKa+XvuJgSE6iah+KUijbagQTETG7lO3t73RwPJwAqcOgn/ HCSA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=GEH6ahek62aXY8iXScAwAVfTv8FrDuewq6fR1FVMQO8=; b=gjTSF2d4aTZU/LXDrf2JPnbztSqySbFu+7/rrxIzOxvIx/LiHIDulyCYaGHmCsBkKn vfEkCLQUFNHW/AmPvGEwofeiCP0NwcV47QIHa0bgkU96sAbyoXziFdlD8FG9mhoVusyY aPd/V9J4MRxaOKwrbB8z7+ViAMyzfnE1Pf3vDAGxGfDvT+sCrykpUIObzz6RXeYzApF+ P5A6dLq8e2UTfB/cUK3KUco9MxosmTsWTAHnKXMZOFfFzJm74fr1x5Bfr8MdMOx7n2tG 1N5ZBFkS676aiI9+zEAMr9/AgqEcIyDjHq6/eb2B2XGRtRJ7MH1+uHRQA8eqAxRM8Atv E/3w== X-Gm-Message-State: AOAM531cw/sHVE1N37T116toS7bhR9zRNoHbzCZMlutUppXricltFN0J QoLS7EpGVCvCGf+HXh58ow1wZQ== X-Received: by 2002:aa7:82ce:0:b029:242:deb4:9442 with SMTP id f14-20020aa782ce0000b0290242deb49442mr11941205pfn.73.1617986299273; Fri, 09 Apr 2021 09:38:19 -0700 (PDT) Received: from google.com (240.111.247.35.bc.googleusercontent.com. [35.247.111.240]) by smtp.gmail.com with ESMTPSA id h1sm2598442pfc.122.2021.04.09.09.38.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 09 Apr 2021 09:38:18 -0700 (PDT) Date: Fri, 9 Apr 2021 16:38:14 +0000 From: Sean Christopherson To: Tom Lendacky Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org, Paolo Bonzini , Jim Mattson , Joerg Roedel , Vitaly Kuznetsov , Wanpeng Li , Borislav Petkov , Ingo Molnar , Thomas Gleixner , Brijesh Singh Subject: Re: [PATCH v3] KVM: SVM: Make sure GHCB is mapped before updating Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 09, 2021, Tom Lendacky wrote: > From: Tom Lendacky > > Access to the GHCB is mainly in the VMGEXIT path and it is known that the > GHCB will be mapped. But there are two paths where it is possible the GHCB > might not be mapped. > > The sev_vcpu_deliver_sipi_vector() routine will update the GHCB to inform > the caller of the AP Reset Hold NAE event that a SIPI has been delivered. > However, if a SIPI is performed without a corresponding AP Reset Hold, > then the GHCB might not be mapped (depending on the previous VMEXIT), > which will result in a NULL pointer dereference. > > The svm_complete_emulated_msr() routine will update the GHCB to inform > the caller of a RDMSR/WRMSR operation about any errors. While it is likely > that the GHCB will be mapped in this situation, add a safe guard > in this path to be certain a NULL pointer dereference is not encountered. > > Fixes: f1c6366e3043 ("KVM: SVM: Add required changes to support intercepts under SEV-ES") > Fixes: 647daca25d24 ("KVM: SVM: Add support for booting APs in an SEV-ES guest") > Signed-off-by: Tom Lendacky > > --- Reviewed-by: Sean Christopherson