Received: by 2002:a05:6a10:6d25:0:0:0:0 with SMTP id gq37csp1959028pxb; Mon, 13 Sep 2021 08:59:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwxqtXh4dUI6o1Rm4ej9JdA6ll6/EmbttI4RM3xkZ9ZqwmPEqgbndlcEkpiT/BxfWJVc47/ X-Received: by 2002:a92:c683:: with SMTP id o3mr3036297ilg.0.1631548772727; Mon, 13 Sep 2021 08:59:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631548772; cv=none; d=google.com; s=arc-20160816; b=IgoXQRvJZn1NUkr0F7zTX4pW+RXpvSi9wiPEZy/Z2PUW6Gi0FxxwR8/6Clo17wG9EG QSzrVpIXf/nGvgHcpfNdWkqNVCceCDBg2ondCLgwo2kX19FShXZ37TG4g0gutWZ9hGRV Q/KWogXzikBhbNZ/d7SfXBHfEh96Z2BUJufX1IH8/1bYbHULRA4nQS9NUCglazpW8CS4 bZE3iWsSy7ZZA9Wj7fvEC1TgZ9brehQdNX8uNLAt1zihafhqIefzeRFVOKSWZEbGo9Z8 uso0lWmTqg6x7njHnJKSlK/mPL5gaTxsSRLWpzXoXUMR6ZbjSKHDGltdV4ftXi6MqjIn p+gA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=E/xbhz2Xq0XGnnGJfBRfii6VXnJwEAJvz1sd/999cLI=; b=wsT9eVsHZ0mQSbI+xVymxIGsPoDKUsOLllEqPv5H3pOUDLxuq3Igyf7swP2sZPkFPs wvMN5MY9AZDv0bQacsaOZQhfA0aH2j/1i9aOvH7WC7cdrcOzdJMubD2KcYJNTcucXQyh qHT/sq4xjVRq1HzVpWvApxWrWrdHqGAmDURPs7JN81NC/wBLJBnOHUX65qPNnB99SL+3 FaFPdzNaNxg8gtlnPVOb3k5KVOzCqdlqUs1iOvisidkVlXpvDLyWWxkrGD5VxDori+QE MmO0DPJeEW9m60zQEkjFYbFUTFnldxmK2RDFR1P5rMuofY8CIR3W1HjVYbHCSjQr/Ov0 STmQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v3si7486591jat.11.2021.09.13.08.59.21; Mon, 13 Sep 2021 08:59:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345503AbhIMP6Z (ORCPT + 99 others); Mon, 13 Sep 2021 11:58:25 -0400 Received: from 8bytes.org ([81.169.241.247]:56962 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245366AbhIMP5j (ORCPT ); Mon, 13 Sep 2021 11:57:39 -0400 Received: from cap.home.8bytes.org (p549ad441.dip0.t-ipconnect.de [84.154.212.65]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by theia.8bytes.org (Postfix) with ESMTPSA id 555131074; Mon, 13 Sep 2021 17:56:20 +0200 (CEST) From: Joerg Roedel To: x86@kernel.org Cc: Eric Biederman , kexec@lists.infradead.org, Joerg Roedel , hpa@zytor.com, Andy Lutomirski , Dave Hansen , Peter Zijlstra , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , David Rientjes , Cfir Cohen , Erdem Aktas , Masami Hiramatsu , Mike Stunes , Sean Christopherson , Martin Radev , Arvind Sankar , Joerg Roedel , linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: [PATCH v2 06/12] x86/sev: Cache AP Jump Table Address Date: Mon, 13 Sep 2021 17:55:57 +0200 Message-Id: <20210913155603.28383-7-joro@8bytes.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210913155603.28383-1-joro@8bytes.org> References: <20210913155603.28383-1-joro@8bytes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Store the physical address of the AP Jump Table in kernel memory so that it does not need to be fetched from the Hypervisor again. Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev.c | 26 ++++++++++++++------------ 1 file changed, 14 insertions(+), 12 deletions(-) diff --git a/arch/x86/kernel/sev.c b/arch/x86/kernel/sev.c index 5d3422e8b25e..eedba56b6bac 100644 --- a/arch/x86/kernel/sev.c +++ b/arch/x86/kernel/sev.c @@ -42,6 +42,9 @@ static struct ghcb boot_ghcb_page __bss_decrypted __aligned(PAGE_SIZE); */ static struct ghcb __initdata *boot_ghcb; +/* Cached AP Jump Table Address */ +static phys_addr_t sev_es_jump_table_pa; + /* #VC handler runtime per-CPU data */ struct sev_es_runtime_data { struct ghcb ghcb_page; @@ -546,12 +549,14 @@ void noinstr __sev_es_nmi_complete(void) __sev_put_ghcb(&state); } -static u64 get_jump_table_addr(void) +static phys_addr_t get_jump_table_addr(void) { struct ghcb_state state; unsigned long flags; struct ghcb *ghcb; - u64 ret = 0; + + if (sev_es_jump_table_pa) + return sev_es_jump_table_pa; local_irq_save(flags); @@ -567,39 +572,36 @@ static u64 get_jump_table_addr(void) if (ghcb_sw_exit_info_1_is_valid(ghcb) && ghcb_sw_exit_info_2_is_valid(ghcb)) - ret = ghcb->save.sw_exit_info_2; + sev_es_jump_table_pa = (phys_addr_t)ghcb->save.sw_exit_info_2; __sev_put_ghcb(&state); local_irq_restore(flags); - return ret; + return sev_es_jump_table_pa; } int sev_es_setup_ap_jump_table(struct real_mode_header *rmh) { u16 startup_cs, startup_ip; - phys_addr_t jump_table_pa; - u64 jump_table_addr; u16 __iomem *jump_table; + phys_addr_t pa; - jump_table_addr = get_jump_table_addr(); + pa = get_jump_table_addr(); /* On UP guests there is no jump table so this is not a failure */ - if (!jump_table_addr) + if (!pa) return 0; /* Check if AP Jump Table is page-aligned */ - if (jump_table_addr & ~PAGE_MASK) + if (pa & ~PAGE_MASK) return -EINVAL; - jump_table_pa = jump_table_addr & PAGE_MASK; - startup_cs = (u16)(rmh->trampoline_start >> 4); startup_ip = (u16)(rmh->sev_es_trampoline_start - rmh->trampoline_start); - jump_table = ioremap_encrypted(jump_table_pa, PAGE_SIZE); + jump_table = ioremap_encrypted(pa, PAGE_SIZE); if (!jump_table) return -EIO; -- 2.33.0