Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3840549pxj; Mon, 24 May 2021 16:33:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyFGymX9p+t0vIfC/TRXhs91Q6mTQdtpNsC8tiPx1aX5SaCcjukTlNPPx1qO5AF03SPBLex X-Received: by 2002:aa7:c0d0:: with SMTP id j16mr27946718edp.324.1621899221368; Mon, 24 May 2021 16:33:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621899221; cv=none; d=google.com; s=arc-20160816; b=oGmlKPYAvCF9w2ZjjOWiDB1caTnZQYO40tvzXZom7wGSgpKrbUBNnLN1Edk7RNXVLw RfExrUfJspuas445Xxz+XKJsG6AWtDoQdM9AZPe5ssMl7XsC2Iw1h+ejqri3Ef9yhuu3 qF81U/c80A43rhgDp4a1OdmKkDJWy3QXWR5RjZIJz7lsE8DoykX6CkLwnlMkXlNhSlE3 ZhXquhJm8OWpJxLr76JmbxzscnIXGAlNg6WLz3cNs8nlsCImVLQE6Ss323+Lff/53QbG Q2OyEEPxa1t+t+Lo0d+U3vpdQnFjZJxQcm6nNQq93gmKLtGhr5t1o6/WE8lY4M/QFH8q S42g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=gQV/9jwlc1DTbb267uYHE1R/bAmnxGttG1sqK7GH9SQ=; b=EXFXLB4oTwSZFL6p7XD70m3ZZ6E+yCHeSBaz8YeQTPe0v36d839t4NaclTOfpqO8FP ww3VwvY9fXgAilpe8290H23knLEDKGTzN0RldcbKWC7QPCa1eP7G0FqfCpJ2pM3w9Z6r PjP067oPZBYBmcC6tiJbfrCs3bZbqU7VTWjDNTS3FAIl+nM1NVpoqee5miiEGJLBHucH 29JeJFhTgM0vceFRcUP5/M3kcS8uCUmRxN1bM0/Ul2ItI32395WmpyRibrqIFF05MbyE P6XrJkvquKZS+Wz/c9TUC7Z1FaOXIjRCtX8Qtb+sb0aJHjEJrEEMYU39ibDl3IzR3dR8 ByQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o15si14761292ejb.65.2021.05.24.16.33.18; Mon, 24 May 2021 16:33:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229547AbhEXXd4 (ORCPT + 99 others); Mon, 24 May 2021 19:33:56 -0400 Received: from mga09.intel.com ([134.134.136.24]:39314 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229539AbhEXXdx (ORCPT ); Mon, 24 May 2021 19:33:53 -0400 IronPort-SDR: PywwgtOaZtIt5Mm593VgHVvpNpLvuqHA08g9bT+xskBIn+qN46PTcixCZbB4S9BCYNzUxKQfsG LLjpIJ5ub3Vw== X-IronPort-AV: E=McAfee;i="6200,9189,9994"; a="202074821" X-IronPort-AV: E=Sophos;i="5.82,327,1613462400"; d="scan'208";a="202074821" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 May 2021 16:32:23 -0700 IronPort-SDR: 7uMNqZ775dr+DK5pjuHABDlJJ0Ul037vTPBqrt9w2+zwa54c8TRZ3iufdyjGAWJkzKNHsahpw9 blS0xPtmnteA== X-IronPort-AV: E=Sophos;i="5.82,327,1613462400"; d="scan'208";a="476126860" Received: from eyoukerh-mobl.ger.corp.intel.com (HELO skuppusw-desk1.amr.corp.intel.com) ([10.254.2.69]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 May 2021 16:32:22 -0700 From: Kuppuswamy Sathyanarayanan To: Peter Zijlstra , Andy Lutomirski , Dave Hansen Cc: Tony Luck , Andi Kleen , Kirill Shutemov , Kuppuswamy Sathyanarayanan , Dan Williams , Raj Ashok , Sean Christopherson , Kuppuswamy Sathyanarayanan , linux-kernel@vger.kernel.org Subject: [RFC v2-fix-v2 1/2] x86/tdx: Handle MWAIT and MONITOR Date: Mon, 24 May 2021 16:32:10 -0700 Message-Id: <20210524233211.802033-1-sathyanarayanan.kuppuswamy@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <37ad50ca-f568-4c62-56e2-9e9b1f34084c@linux.intel.com> References: <37ad50ca-f568-4c62-56e2-9e9b1f34084c@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When running as a TDX guest, there are a number of existing, privileged instructions that do not work. If the guest kernel uses these instructions, the hardware generates a #VE. You can find the list of unsupported instructions in Intel Trust Domain Extensions (Intel® TDX) Module specification, sec 9.2.2 and in Guest-Host Communication Interface (GHCI) Specification for Intel TDX, sec 2.4.1. To prevent TD guests from using MWAIT/MONITOR instructions, the CPUID flags for these instructions are already disabled by the TDX module.      After the above mentioned preventive measures, if TD guests still execute these instructions, add appropriate warning message (WARN_ONCE()) in #VE handler. This handling behavior is same as KVM (which also treats MWAIT/MONITOR as nops with warning once in unsupported platforms). Signed-off-by: Kuppuswamy Sathyanarayanan Reviewed-by: Andi Kleen --- Changes since RFC v2: * Moved WBINVD related changes to a new patch. * Fixed commit log as per review comments. arch/x86/kernel/tdx.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/arch/x86/kernel/tdx.c b/arch/x86/kernel/tdx.c index 3e961fdfdae0..3800c7cbace3 100644 --- a/arch/x86/kernel/tdx.c +++ b/arch/x86/kernel/tdx.c @@ -511,6 +511,14 @@ int tdg_handle_virtualization_exception(struct pt_regs *regs, case EXIT_REASON_EPT_VIOLATION: ve->instr_len = tdg_handle_mmio(regs, ve); break; + case EXIT_REASON_MONITOR_INSTRUCTION: + case EXIT_REASON_MWAIT_INSTRUCTION: + /* + * Something in the kernel used MONITOR or MWAIT despite + * X86_FEATURE_MWAIT being cleared for TDX guests. + */ + WARN_ONCE(1, "TD Guest used unsupported MWAIT/MONITOR instruction\n"); + break; default: pr_warn("Unexpected #VE: %lld\n", ve->exit_reason); return -EFAULT; -- 2.25.1