Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp1408577pxy; Mon, 2 Aug 2021 00:20:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzQH/JG94yOf026alj9YmuQw8J3eKMYuifuBS5xr9bjawQil5HpJvk4K1GjYmu/I65o0yIv X-Received: by 2002:a05:6e02:1b88:: with SMTP id h8mr340187ili.48.1627888814138; Mon, 02 Aug 2021 00:20:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627888814; cv=none; d=google.com; s=arc-20160816; b=rdd1gVKAFreYEMjwWbIgh6L7r4nYlnPoInD1bWBR5iQn6GdQj07Fjxb5SdSIyCmsSI TAEpH6STmUj2oztQUbaRheABdXFJfhgY8a7Nu8RfpJEQhL66xZh93DsFavlE+cHHwk2l M/f1GI/FVd3k4fFkDM1XlYrTGv5m7ufJq/FjfM/RzbKjYVNpIEn5KIpXOWyV3+trugtz zbS6+tGrmnUebiVXscBfJ4ZZ3Tc+s3hIceSsUBwgu9Zl/+BuvfGYqU2g5MHAX0OsznVB SX2qGd5kvHwg+Zt+pGZDOdPVZqKUrII5HyPZPw3HcJn1FSg2sGYdXk0TzrmcunvkuHyV W1sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:from:references :in-reply-to:subject:cc:to:dkim-signature; bh=WBgQhr7+uwTed/8uhlgXLoHO+0NWliI4QXXIGZ4PZXU=; b=bKQRly8tPkO0scAOXEKbtcEo/0pWvww9clT30Jd8lKtHdxP6lNB2Rl3GxnH46WUC0O +OiYUS4fgIORJsG0spCiGDnX/YLnMDLu0b9uZWg7LMgcuvG/xIAfVAhIt1JoQJvdnUN3 Q5Lez9fF2v89tNDoyvEuyVAOtCSAOhcNo2qRm4Y0/C60HaO6L9wgZT2lgSLlmCJaCvWj Dd1z6u8zPubvUfgrWP0Mtv/9YKYqBPhDezD72/2NMc4gkluUieXFb2nFmNd74qB8SStt v5Vm1q11/dyn1xXMA7w18EZYEgj+yAL/XJGRSNfJtE/ulNhDeGkNUN02zlnZURV1OmMP ooBA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b="mR12apI/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g15si1449101jan.75.2021.08.02.00.20.03; Mon, 02 Aug 2021 00:20:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b="mR12apI/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232127AbhHBHSe (ORCPT + 99 others); Mon, 2 Aug 2021 03:18:34 -0400 Received: from wforward3-smtp.messagingengine.com ([64.147.123.22]:46001 "EHLO wforward3-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231649AbhHBHSd (ORCPT ); Mon, 2 Aug 2021 03:18:33 -0400 Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailforward.west.internal (Postfix) with ESMTP id 211651AC00CC; Mon, 2 Aug 2021 03:18:20 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute5.internal (MEProxy); Mon, 02 Aug 2021 03:18:21 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=WBgQhr 7+uwTed/8uhlgXLoHO+0NWliI4QXXIGZ4PZXU=; b=mR12apI/NAdLtGleYVSnlK m3YmcjnAWdIvUTs11/BuFxCQALMND+8duWD6j1W4nIhUPkfSQJ6xRVZpenOzZH1s y6rYi50/P9xI0uIVKxnp7T+WHZw75jNW6QWwkyX5/gtWTDQbC4wI7RBwOFdutp5a HA7R6h55ZlUxeeEPwImvd4HIy3d93G722BxZzurA7gjv06eHRI9QtRCIFxo74qJ1 5tKuaoHZhzL+4C9phvIaBJmagOuuDYQF1x6pK/0MYxwWCOJ6jNgUo8bQMtnrB9C7 J5K21h3/v8YSU6IlT6uOCEEUOkJCiplkyIISYkzk3TqIMiZAAR954DG2VjXTum/w == X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvtddriedugdellecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefvufgjfhfhfffkgggtsehttdertddttddtnecuhfhrohhmpeffrghvihguucfg ughmohhnughsohhnuceoughmvgesughmvgdrohhrgheqnecuggftrfgrthhtvghrnhephf ekgeeutddvgeffffetheejvdejieetgfefgfffudegffffgeduheegteegleeknecuvehl uhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepughmvgesughmvg drohhrgh X-ME-Proxy: Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 2 Aug 2021 03:18:16 -0400 (EDT) Received: from localhost (disaster-area.hh.sledj.net [local]) by disaster-area.hh.sledj.net (OpenSMTPD) with ESMTPA id 5a5976c4; Mon, 2 Aug 2021 07:18:15 +0000 (UTC) To: Sean Christopherson Cc: linux-kernel@vger.kernel.org, Thomas Gleixner , Joerg Roedel , Ingo Molnar , Jim Mattson , kvm@vger.kernel.org, Borislav Petkov , David Matlack , Paolo Bonzini , "H. Peter Anvin" , x86@kernel.org, Wanpeng Li , Vitaly Kuznetsov Subject: Re: [PATCH v3 3/3] KVM: x86: SGX must obey the KVM_INTERNAL_ERROR_EMULATION protocol In-Reply-To: References: <20210729133931.1129696-1-david.edmondson@oracle.com> <20210729133931.1129696-4-david.edmondson@oracle.com> From: David Edmondson Date: Mon, 02 Aug 2021 08:18:15 +0100 Message-ID: MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Friday, 2021-07-30 at 22:17:02 GMT, Sean Christopherson wrote: > On Thu, Jul 29, 2021, David Edmondson wrote: >> When passing the failing address and size out to user space, SGX must >> ensure not to trample on the earlier fields of the emulation_failure >> sub-union of struct kvm_run. >> >> Signed-off-by: David Edmondson >> --- >> arch/x86/kvm/vmx/sgx.c | 8 +++----- >> 1 file changed, 3 insertions(+), 5 deletions(-) >> >> diff --git a/arch/x86/kvm/vmx/sgx.c b/arch/x86/kvm/vmx/sgx.c >> index 6693ebdc0770..63fb93163383 100644 >> --- a/arch/x86/kvm/vmx/sgx.c >> +++ b/arch/x86/kvm/vmx/sgx.c >> @@ -53,11 +53,9 @@ static int sgx_get_encls_gva(struct kvm_vcpu *vcpu, unsigned long offset, >> static void sgx_handle_emulation_failure(struct kvm_vcpu *vcpu, u64 addr, >> unsigned int size) >> { >> - vcpu->run->exit_reason = KVM_EXIT_INTERNAL_ERROR; >> - vcpu->run->internal.suberror = KVM_INTERNAL_ERROR_EMULATION; >> - vcpu->run->internal.ndata = 2; >> - vcpu->run->internal.data[0] = addr; >> - vcpu->run->internal.data[1] = size; >> + uint64_t data[2] = { addr, size }; >> + >> + kvm_prepare_emulation_failure_exit(vcpu, false, data, sizeof(data)); > > Assuming we go with my suggestion to have kvm_prepare_emulation_failure_exit() > capture the exit reason/info, it's probably worth converting all the > KVM_EXIT_INTERNAL_ERROR paths in sgx.c, even though the others don't clobber flags. Okay.