Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4244589pxj; Wed, 12 May 2021 00:56:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzS1mTWo19vyUNb3tRGFITqMQ1b3AcnICXvl7WiAyjvCOO0mQvAl+mmOrn00P6a9B3gpIoQ X-Received: by 2002:a05:6e02:4e:: with SMTP id i14mr19239405ilr.145.1620806165803; Wed, 12 May 2021 00:56:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620806165; cv=none; d=google.com; s=arc-20160816; b=Ii7K57K0kD76t7NsUQs4qFgmhkUKpwkhdN14PuDEbr4kGJnq1NZNeqDDCnQDw4e8m/ pkAvkKrDHetFkeLQogsb6TJqkh1Pj3OOzAzRkg9Z7s84+yMspmgNkzW8nAdey+1q4Qvl 6tITXoCT64kYms5jTRpf1TwmWge84qcMGS57idzemXaI2SH0wTmH1nUvgjpVBNFBmhBl 1i9EzjkxgagWgDDOzPP3EnSwLIYPKKK07KIGy4KIiG4YE2sWeWxuBkOjsIVDY5ivx05o VtjHBOTG4VTgXRZ0yCXbk/3I2Q1bEt8Q+toBpa8fCXrjdyjU1ZWBqW5IH+eOu4lCjvt2 SqSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=My5Bln0jlH6SjsLXDshZKp8O8u3tUPxOU5MksnkvnUw=; b=XX+FHWMXjQBur4z4O4oCUzayGZqOSUz0uAm0KyU7xBEDnisi+2fTrJelwudgQDlTga wBHo8fNTWCFmhZOSsCmsPh3R3oMIwlj1d0LwAjxhvFuusmbM2yX2QMOD7W4z4f81jkMd gFHdZFzVXbWH0gyD4aRvza4wHBoG+IpAWt7II5OYPFPcDprsq+Egdq2f45hALMayKoP7 n+p1ph4qZunaqN7OrRqt9YX3T4xrebVIjJa6XS3jPKnw4rDB0TLjsLMa+g6IBuBQwvhl Ygcj6e1btOD92M1QQQ/nnxxMkKx6xb2YCy1P38O3hYRwe/tWY3QQ+LLw0YP5LFyyeyNl 6WAw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h13si24731677ild.132.2021.05.12.00.55.53; Wed, 12 May 2021 00:56:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230338AbhELH4W (ORCPT + 99 others); Wed, 12 May 2021 03:56:22 -0400 Received: from 8bytes.org ([81.169.241.247]:38564 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230137AbhELH4R (ORCPT ); Wed, 12 May 2021 03:56:17 -0400 Received: from cap.home.8bytes.org (p549ad305.dip0.t-ipconnect.de [84.154.211.5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by theia.8bytes.org (Postfix) with ESMTPSA id E9F862A5; Wed, 12 May 2021 09:55:07 +0200 (CEST) From: Joerg Roedel To: x86@kernel.org, Hyunwook Baek Cc: Joerg Roedel , Joerg Roedel , stable@vger.kernel.org, hpa@zytor.com, Andy Lutomirski , Dave Hansen , Peter Zijlstra , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , David Rientjes , Cfir Cohen , Erdem Aktas , Masami Hiramatsu , Mike Stunes , Sean Christopherson , Martin Radev , Arvind Sankar , linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: [PATCH 1/6] x86/sev-es: Don't return NULL from sev_es_get_ghcb() Date: Wed, 12 May 2021 09:54:40 +0200 Message-Id: <20210512075445.18935-2-joro@8bytes.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512075445.18935-1-joro@8bytes.org> References: <20210512075445.18935-1-joro@8bytes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel The sev_es_get_ghcb() is called from several places, but only one of them checks the return value. The reaction to returning NULL is always the same: Calling panic() and kill the machine. Instead of adding checks to all call-places, move the panic() into the function itself so that it will no longer return NULL. Fixes: 0786138c78e7 ("x86/sev-es: Add a Runtime #VC Exception Handler") Cc: stable@vger.kernel.org # v5.10+ Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev.c | 25 ++++++++++++------------- 1 file changed, 12 insertions(+), 13 deletions(-) diff --git a/arch/x86/kernel/sev.c b/arch/x86/kernel/sev.c index 9578c82832aa..c49270c7669e 100644 --- a/arch/x86/kernel/sev.c +++ b/arch/x86/kernel/sev.c @@ -203,8 +203,18 @@ static __always_inline struct ghcb *sev_es_get_ghcb(struct ghcb_state *state) if (unlikely(data->ghcb_active)) { /* GHCB is already in use - save its contents */ - if (unlikely(data->backup_ghcb_active)) - return NULL; + if (unlikely(data->backup_ghcb_active)) { + /* + * Backup-GHCB is also already in use. There is no way + * to continue here so just kill the machine. To make + * panic() work, mark GHCBs inactive so that messages + * can be printed out. + */ + data->ghcb_active = false; + data->backup_ghcb_active = false; + + panic("Unable to handle #VC exception! GHCB and Backup GHCB are already in use"); + } /* Mark backup_ghcb active before writing to it */ data->backup_ghcb_active = true; @@ -1284,7 +1294,6 @@ static __always_inline bool on_vc_fallback_stack(struct pt_regs *regs) */ DEFINE_IDTENTRY_VC_SAFE_STACK(exc_vmm_communication) { - struct sev_es_runtime_data *data = this_cpu_read(runtime_data); irqentry_state_t irq_state; struct ghcb_state state; struct es_em_ctxt ctxt; @@ -1310,16 +1319,6 @@ DEFINE_IDTENTRY_VC_SAFE_STACK(exc_vmm_communication) */ ghcb = sev_es_get_ghcb(&state); - if (!ghcb) { - /* - * Mark GHCBs inactive so that panic() is able to print the - * message. - */ - data->ghcb_active = false; - data->backup_ghcb_active = false; - - panic("Unable to handle #VC exception! GHCB and Backup GHCB are already in use"); - } vc_ghcb_invalidate(ghcb); result = vc_init_em_ctxt(&ctxt, regs, error_code); -- 2.31.1