Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1288026pxb; Fri, 21 Jan 2022 14:26:19 -0800 (PST) X-Google-Smtp-Source: ABdhPJyHzLSSz4JTlq989J0NToCBuFNLr90iF8jb9JsEVyX7W5SOZ7aPJqfQTQ9DRzumVxYrXO13 X-Received: by 2002:a17:90b:388c:: with SMTP id mu12mr2693660pjb.240.1642803979409; Fri, 21 Jan 2022 14:26:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642803979; cv=none; d=google.com; s=arc-20160816; b=eZvRrd4TIio4i0tXOQFSK4wnsDDXyusBYIFAAiA8tpmYn2P6vwBlLJFyPs0Oc3qCm4 1b0c7IFZFroWrF9rs127RbqgfInfaHdOyrEkxA6PR3JcLgoUOzo0hj8+vXWXCA9Fmoql 0w8wEbL+h9CiIU71rdJvaZ2KV6gZu5qzIdxqH//2jeSlsuINgslOtMeGVDk0PYG4P4WQ 9B/3CeC5AVodTFBi1GvpPmT82HgUxtikCfDCklrb573cNhL4naWzowoj2umKYW2OiTCs TtHjTNLYtBQYF73smQ26awZsvqqNk9wkTiRThfXB5shXHTXZLgeCgGYY37kdGEXtxq55 3COQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=X+dlhCbZ1T5bEOv35DYnl7QCyW3kKdcFIjuIjbSmC1g=; b=xd3BVdBiAzXXM6aiIyGSxc5b8t+BdWJR00ZUc4NPcQ1echsUitQowI9352T2DJG4Yc SDmAIb1GkCre5YazbapR8xupYbzaFgDAWe0KdrOC9wlKMqpRQVIucUhrdxZNdoXLqIp9 /RTqjp77VwixVk1xVcdj7lePb97h054EcI9bT4zSRo6DHs6aCYEj8KlfbKpsnsJZkMGa l6zDUqa9BWJWu6Y4bNgeyJ+FC+rLAhq49pyf1ih+/btSCw01l5+WFlr1JH7I1/r0C6ae e71Qb5499Wqednoce+f/ulDtLNnk1mQlyBREI+rf6RVZ+Fn+N8fPFWWVjSJuuLd/N0M0 l5wA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=St3JnP6Q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s4si7081976plq.117.2022.01.21.14.26.05; Fri, 21 Jan 2022 14:26:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=St3JnP6Q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347546AbiATREW (ORCPT + 99 others); Thu, 20 Jan 2022 12:04:22 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40048 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347408AbiATREQ (ORCPT ); Thu, 20 Jan 2022 12:04:16 -0500 Received: from mail-pf1-x429.google.com (mail-pf1-x429.google.com [IPv6:2607:f8b0:4864:20::429]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 95D5EC061574 for ; Thu, 20 Jan 2022 09:04:16 -0800 (PST) Received: by mail-pf1-x429.google.com with SMTP id 128so6125719pfe.12 for ; Thu, 20 Jan 2022 09:04:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=X+dlhCbZ1T5bEOv35DYnl7QCyW3kKdcFIjuIjbSmC1g=; b=St3JnP6QUs2HRDevifufDbBMbF0cWX2WnRDleOvqov0iUtvDBmX+Fb1SteYzmz+sEq /bFyQ7jeNbQIjcpNeMGkfGM0bMw2XgcMVKd5VQe47fXv2k+as7+Iok3mRNyMHYZaYPSj uVECXjRj6XczcuM7iwuNuiLizJWgY4WEQ9SN+MfF+avoFFN0e0OuVJqN0jN6aDg8gcuv ROIdN+/QWovhjXk9+7/90qv/SYD4IX3D3h1e3z3eqSr6Fi2t2gvYED6Fvjyss5+ngs24 KVK4/TdXAU1yQjYHFBFYiPCTb2Ocj08DKDYs9jKoEwIrFZBzsxA12ihbVFEQl0OhC96g X2AA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=X+dlhCbZ1T5bEOv35DYnl7QCyW3kKdcFIjuIjbSmC1g=; b=saXHvDYmZUgybhgPN8QTiVPIv2JoHvf8E/a6WKMAzo9Uhvcn/WZ7wK+fZJSwkeSIEt dd8/eFL4UGAROxSbIHgxeupgnt4En9+unBJTYhEF3VbhERhXYbJFgjE8KgHj+pqgXjKb qM3mOcL/C+sJs0qocj/zgEKwUKYLecX1QjsznXdJyrQ1TptS5doMciI7H8m2B66hZLpk 2uvts6A7IidTrJpiDT/h0BEwc5o9cbJs+qQXONdxYtaGx+rU6eptFBKPGbkW3oE0fF2w s6JucSS3bHNI7PQh5eizVSc7bgvOqMOVzZWKm6kTFpHuZIcMRNjSANZSdl2krNLErfYv 8/7A== X-Gm-Message-State: AOAM533M0gGj6xqx5cjonUq9pVjW69RcWJQ2OABZkTIA/DXtbnSbsDGH NyU4wtRowLIzj0E0Pt7vze9orw== X-Received: by 2002:a63:f508:: with SMTP id w8mr17788070pgh.152.1642698255953; Thu, 20 Jan 2022 09:04:15 -0800 (PST) Received: from google.com (157.214.185.35.bc.googleusercontent.com. [35.185.214.157]) by smtp.gmail.com with ESMTPSA id h14sm4366518pfh.95.2022.01.20.09.04.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 20 Jan 2022 09:04:15 -0800 (PST) Date: Thu, 20 Jan 2022 17:04:11 +0000 From: Sean Christopherson To: Liam Merwick Cc: Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Tom Lendacky , Brijesh Singh Subject: Re: [PATCH 6/9] KVM: SVM: WARN if KVM attempts emulation on #UD or #GP for SEV guests Message-ID: References: <20220120010719.711476-1-seanjc@google.com> <20220120010719.711476-7-seanjc@google.com> <483ed34e-3125-7efb-1178-22f02173667a@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <483ed34e-3125-7efb-1178-22f02173667a@oracle.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 20, 2022, Liam Merwick wrote: > On 20/01/2022 01:07, Sean Christopherson wrote: > > WARN if KVM attempts to emulate in response to #UD or #GP for SEV guests, > > i.e. if KVM intercepts #UD or #GP, as emulation on any fault except #NPF > > is impossible since KVM cannot read guest private memory to get the code > > stream, and the CPU's DecodeAssists feature only provides the instruction > > bytes on #NPF. > > > > Signed-off-by: Sean Christopherson > > --- > > arch/x86/kvm/svm/svm.c | 3 +++ > > 1 file changed, 3 insertions(+) > > > > diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c > > index 994224ae2731..ed2ca875b84b 100644 > > --- a/arch/x86/kvm/svm/svm.c > > +++ b/arch/x86/kvm/svm/svm.c > > @@ -4267,6 +4267,9 @@ static bool svm_can_emulate_instruction(struct kvm_vcpu *vcpu, int emul_type, > > if (!sev_guest(vcpu->kvm)) > > return true; > > + /* #UD and #GP should never be intercepted for SEV guests. */ > > + WARN_ON_ONCE(emul_type & (EMULTYPE_TRAP_UD | EMULTYPE_VMWARE_GP)); > > What about EMULTYPE_TRAP_UD_FORCED? Hmm, yeah, it's worth adding, there's no additional cost. I was thinking it was a modifier to EMULTYPE_TRAP_UD, but it's a replacement specifically to bypass the EmulateOnUD check (which I should have remembered since I added the type...).