Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp226749pxj; Wed, 26 May 2021 21:25:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyVG9lb00qlzl71eLrDQjV5/AHafwDLxSU7Uc4Srb7V0XszGPFef98aSYmckoMtxumAm1fi X-Received: by 2002:a5d:814d:: with SMTP id f13mr1291342ioo.203.1622089530133; Wed, 26 May 2021 21:25:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622089530; cv=none; d=google.com; s=arc-20160816; b=k4h12mXm9lJGveRMZDH2evI64P1Ips+hdp37TuroyemEMbHWwrJ9X3swF2YqRJKqRX fvB7gL38djzfgRJRR2EBzxb09BE+aa2LUXM23Wk2ehTEvXoM4nXwsEiQYoZVnfrdiVRz rJmWB71WaXKF7coMOezQoRrfHmVByZYqAAxAwbiUaBrbTSpc7K8JbXxh/01aRTmD/s6U Pt3yspX2XL3cpX8W85jAFZlfvf01wW3LMj1Ivq+a9sDOrbi6tN2WO1Nq6xXFNyoMZxI1 +pbWAw4VGtV9cbO//oQOmWtDyaPkM9KgGy2RDiPdEBTLnn9euqfGWtE40JVl5qq/dLgl lDrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=SHoPMR5ILcdFiKl/tffMKAT8vAQVKf76F+wiYYWeZkg=; b=BpRD6ybQ4zbtbNZNQVqTYXuzXEdsSiOtfOrYQnuQc3nl8phgOp2x6aQK6a4KDPphZD Oi+8o1Auyqf50+AaJJaCtABT2Jouh5G1kylU15eiTw+LQlQy+m2LkPidaMv3+zsti1qF Q3TUjAws/gtiAviYDVQ2ldufpoX0/wX76JJCZ+J2S/2MNNyfdBNVtKjiN6u7DxteYaM7 PSeX32E+h5VOOggT7IItasNcqOVqvGG52w8wFKYLOi7+q8E+QKBjz621YI99t+D2nl2X KxuSI2AkUhVqmmVCozXS7bFf0labMGcQXG+1iToAGkcCXPRdQsqWKEuSojFna7AJaKtr iJ/g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j2si1469894jak.119.2021.05.26.21.25.04; Wed, 26 May 2021 21:25:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229816AbhE0EZt (ORCPT + 99 others); Thu, 27 May 2021 00:25:49 -0400 Received: from mga01.intel.com ([192.55.52.88]:41864 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229675AbhE0EZq (ORCPT ); Thu, 27 May 2021 00:25:46 -0400 IronPort-SDR: LCKMCBrvYqydX8Q9b4wb2P0qJayOvyHlf93i85jYQ2GtTwOm6nEWRWgvfWIRP7D1wmsC8vLzoT 92ou07Ri2p0w== X-IronPort-AV: E=McAfee;i="6200,9189,9996"; a="223844425" X-IronPort-AV: E=Sophos;i="5.82,333,1613462400"; d="scan'208";a="223844425" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 May 2021 21:24:13 -0700 IronPort-SDR: ehVV0ofn/ghzP1WEnMlc3MJ3I19+z9z4No/B6jG0b9UBi+pn7R9m0ZxRSjGFyigr0SPfGSQ9+N d57xX3MZhxOQ== X-IronPort-AV: E=Sophos;i="5.82,333,1613462400"; d="scan'208";a="480391414" Received: from skgangad-mobl.amr.corp.intel.com (HELO skuppusw-desk1.amr.corp.intel.com) ([10.254.33.45]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 May 2021 21:24:13 -0700 From: Kuppuswamy Sathyanarayanan To: Peter Zijlstra , Andy Lutomirski , Dave Hansen , Tony Luck , Dan Williams Cc: Andi Kleen , Kirill Shutemov , Kuppuswamy Sathyanarayanan , Raj Ashok , Sean Christopherson , Kuppuswamy Sathyanarayanan , linux-kernel@vger.kernel.org Subject: [RFC v2-fix-v1 2/3] x86/tdx: Handle early IO operations Date: Wed, 26 May 2021 21:23:55 -0700 Message-Id: <20210527042356.3983284-3-sathyanarayanan.kuppuswamy@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210527042356.3983284-1-sathyanarayanan.kuppuswamy@linux.intel.com> References: <20210527042356.3983284-1-sathyanarayanan.kuppuswamy@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andi Kleen Add an early #VE handler to convert early port IOs into TDCALLs. TDX cannot do port IO directly. The TDX module triggers a #VE exception to let the guest kernel to emulate operations like IO ports, by converting them into TDCALLs to call the host. A fully featured #VE handler support for port IO will be added later in this patch set (in patch titled "x86/tdx: Handle port I/O). But it can be used only at later point in the boot process. So to support port IO in early boot code, add a minimal support in early exception handler. This is similar to what AMD SEV does. This is mainly to support early_printk's serial driver, as well as potentially the VGA driver (although it is expected not to be used). The early handler only does IO calls and nothing else, and anything that goes wrong results in a normal early exception panic. It cannot share the code paths with the normal #VE handler because it needs to avoid using trace calls or printk. This early handler allows us to use the normal in*/out* macros without patching them for every driver. We don't expect IO port IO to be performance critical at all, so an extra #VE exception is no problem. There are also no concerns with nesting, since there should be no NMIs this early. Signed-off-by: Andi Kleen --- arch/x86/include/asm/tdx.h | 6 ++++ arch/x86/kernel/head64.c | 4 +++ arch/x86/kernel/tdx.c | 59 ++++++++++++++++++++++++++++++++++++++ 3 files changed, 69 insertions(+) diff --git a/arch/x86/include/asm/tdx.h b/arch/x86/include/asm/tdx.h index 53f844200909..e880a9dd40d3 100644 --- a/arch/x86/include/asm/tdx.h +++ b/arch/x86/include/asm/tdx.h @@ -72,6 +72,7 @@ u64 __tdx_hypercall(u64 fn, u64 r12, u64 r13, u64 r14, u64 r15, struct tdx_hypercall_output *out); bool tdx_protected_guest_has(unsigned long flag); +bool tdg_early_handle_ve(struct pt_regs *regs); #else // !CONFIG_INTEL_TDX_GUEST @@ -87,6 +88,11 @@ static inline bool tdx_protected_guest_has(unsigned long flag) return false; } +static inline bool tdg_early_handle_ve(struct pt_regs *regs) +{ + return false; +} + #endif /* CONFIG_INTEL_TDX_GUEST */ #ifdef CONFIG_INTEL_TDX_GUEST_KVM diff --git a/arch/x86/kernel/head64.c b/arch/x86/kernel/head64.c index 75f2401cb5db..23d1ff4626aa 100644 --- a/arch/x86/kernel/head64.c +++ b/arch/x86/kernel/head64.c @@ -410,6 +410,10 @@ void __init do_early_exception(struct pt_regs *regs, int trapnr) trapnr == X86_TRAP_VC && handle_vc_boot_ghcb(regs)) return; + if (IS_ENABLED(CONFIG_INTEL_TDX_GUEST) && + trapnr == X86_TRAP_VE && tdg_early_handle_ve(regs)) + return; + early_fixup_exception(regs, trapnr); } diff --git a/arch/x86/kernel/tdx.c b/arch/x86/kernel/tdx.c index 858e7f3d8f36..ca3442b7accf 100644 --- a/arch/x86/kernel/tdx.c +++ b/arch/x86/kernel/tdx.c @@ -13,6 +13,10 @@ #define TDINFO 1 #define TDGETVEINFO 3 +#define VE_GET_IO_TYPE(exit_qual) (((exit_qual) & 8) ? 0 : 1) +#define VE_GET_IO_SIZE(exit_qual) (((exit_qual) & 7) + 1) +#define VE_GET_PORT_NUM(exit_qual) ((exit_qual) >> 16) + static struct { unsigned int gpa_width; unsigned long attributes; @@ -256,6 +260,61 @@ int tdg_handle_virtualization_exception(struct pt_regs *regs, return ret; } +/* + * Handle early IO, mainly for early printks serial output. + * This avoids anything that doesn't work early on, like tracing + * or printks, by calling the low level functions directly. Any + * problems are handled by falling back to a standard early exception. + * + * Assumes the IO instruction was using ax, which is enforced + * by the standard io.h macros. + */ +static __init bool tdx_early_io(struct ve_info *ve, struct pt_regs *regs) +{ + struct tdx_hypercall_output outh; + int out = VE_GET_IO_TYPE(ve->exit_qual); + int size = VE_GET_IO_SIZE(ve->exit_qual); + int port = VE_GET_PORT_NUM(ve->exit_qual); + int ret; + + if (out) { + ret = __tdx_hypercall(EXIT_REASON_IO_INSTRUCTION, + size, 1, port, + regs->ax, + &outh); + } else { + u64 mask = GENMASK(8 * size, 0); + + ret = __tdx_hypercall(EXIT_REASON_IO_INSTRUCTION, + size, 0, port, + regs->ax, &outh); + if (!ret) { + regs->ax &= ~mask; + regs->ax |= outh.r11 & mask; + } + } + + return !ret; +} + +/* + * Early #VE exception handler. Just used to handle port IOs + * for early_printk. If anything goes wrong handle it like + * a normal early exception. + */ +__init bool tdg_early_handle_ve(struct pt_regs *regs) +{ + struct ve_info ve; + + if (tdg_get_ve_info(&ve)) + return false; + + if (ve.exit_reason == EXIT_REASON_IO_INSTRUCTION) + return tdx_early_io(&ve, regs); + + return false; +} + void __init tdx_early_init(void) { if (!cpuid_has_tdx_guest()) -- 2.25.1