Received: by 2002:a05:6a10:3150:0:0:0:0 with SMTP id m16csp718432pxc; Thu, 7 Apr 2022 20:27:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxKIjloDeob1xqAw6KSQfCqgdFds5PIjlLTISVUmcwbZxLl6PrYMStYZQI+yF7TNVehSW7Q X-Received: by 2002:a17:903:18c:b0:154:9ee:cedc with SMTP id z12-20020a170903018c00b0015409eecedcmr17505365plg.123.1649388452873; Thu, 07 Apr 2022 20:27:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649388452; cv=none; d=google.com; s=arc-20160816; b=rc0RzbhJPMFNHu55M/yeSaACIvJzlgdh/v+A8LGqswHWLQAFgI4wU8A8/4DRUx2Dv/ IxXukuX7HbDq1HV2dm18b0+8+91Hx+G/qtZVJrZ4CmtoV+93XZfLORGCdX+hmJmm89N7 CChAesONmwFUBDt4XYR1QlaF4yHjAADYWzZ2K+fWSn0F1fpdRg/cg6ej+oS6QiWLzrPj vHrGoQL9rIpPj7gcgqLpqjwi9bg6KLA4G3WSWeaqFEAOdp6LOW3s9/LHzJJKr3beGcgU mbER8DRvJRZ41sL5/qLmf7GNPL4GhgdmowHwqq1NItZiDSdSqTADAMlepNwHh+CWwhN+ Wp4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=LW5/xk09U35y47kU1iT/IUull86sczJ/HfaSdnlo37k=; b=eDDtLHjuA7Z10gHIW7yohESYoEwdTTW6ghyiQxW5wy227g+RdmylB3tGTTz8D8S+U6 D60oKE6Ycfq1orJLPfNgAnwJstxrIjEw68tvHZYLTrkG7QaDZep/hgNhYc0JKZqObtJk s66NWSbjBw/YkTlcYW3kUoOjn9o/HEwIh+be712pMVt77EIu0c8skTOHid14DGvcBxDn ZS02epUYsmN7poM+FWs/qCaWyS9kXlYoHE+ZDDmIPKpxyNAakCidgGoByJJeg3NUNY0J 0eA3QLJ8wlV3p2nX539dxLnqFjALkWiPMr+9tBQq4QO4OE2QHR4iieYlrrhTRuRdKHJY DoMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=RyYsDEgs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id j5-20020a17090a734500b001c9fe7a87cesi3483062pjs.105.2022.04.07.20.27.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Apr 2022 20:27:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=RyYsDEgs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id EDC8E1E460F; Thu, 7 Apr 2022 19:56:17 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233797AbiDHC6E (ORCPT + 99 others); Thu, 7 Apr 2022 22:58:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57580 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231958AbiDHC56 (ORCPT ); Thu, 7 Apr 2022 22:57:58 -0400 Received: from mail-pl1-x62b.google.com (mail-pl1-x62b.google.com [IPv6:2607:f8b0:4864:20::62b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3DD153221F7 for ; Thu, 7 Apr 2022 19:55:55 -0700 (PDT) Received: by mail-pl1-x62b.google.com with SMTP id be5so766028plb.13 for ; Thu, 07 Apr 2022 19:55:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=LW5/xk09U35y47kU1iT/IUull86sczJ/HfaSdnlo37k=; b=RyYsDEgszfeN0rvSoEnttHXduQn54BRTMC1/1VGHwKuIGsFOVZ5u4P6Ylu8l/yGNzE yhXE7NzJ8MIyckX+PWwWxooQ0I3pxbeUcNAVltOC0unkA3KSuGxclYr/DVd212HZjdoK X8pjgIU3i8brFM0vAYF/gHjc1+8Vynj3oDOJq2HIPqY+Qcd2Ea8lCCuWlff3ia62GmAr ob6cE4TwVaHZgKeUBFyFUXKzF9u9+ae+8wk5VGwogWEfV1AjwfPohzf+Cvs/Uqq045WQ Xdfa0N+mfW3mBbs9wjchwgFT97ifkLLXxJu6RijjMlPrzxBBFnqFFs4UUvjyXpyYX+sK iOAA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=LW5/xk09U35y47kU1iT/IUull86sczJ/HfaSdnlo37k=; b=zlcQm1MEFAdq0RjoKJVyzoS4bSoHH8C77YFa5Vd6m2E8gkEhMC569i+ohxt9FCDdao H/oVI65ULiZvFC4DQyqA8MHmDhgB/qTbrXhE9U/F2pEKuohc1kdQnFvbpE/qTkbWJ7iS RleD8vnnMm+hkvIIPbpM3YhDRgEJWC4H1/YyT4uxNahVpyYKzBUlMx90sHvDo2iwKXfa /DkS/ORJemduGf3M3K+iVI87tqyIDoYL3LAEWCeSJoZ0LyaLLq3XJnYU1jlPTr1ePRSJ JSDC9cRF6R/QqkFqLkdtscgQYPN4TOVCxRaDWakM5w0fHfVG03J6VbzfJEho9DigLfpo yqAg== X-Gm-Message-State: AOAM533JRFhUeX15OcGJZsJ+uXSSxV6m4uIlvbu7jccEYV2J7Z68GV1C iZSuYyofjMpEu8F51RYb7SvRNw== X-Received: by 2002:a17:902:dace:b0:156:cdab:2c56 with SMTP id q14-20020a170902dace00b00156cdab2c56mr16729364plx.80.1649386554542; Thu, 07 Apr 2022 19:55:54 -0700 (PDT) Received: from google.com (157.214.185.35.bc.googleusercontent.com. [35.185.214.157]) by smtp.gmail.com with ESMTPSA id nm11-20020a17090b19cb00b001cb0d587a7esm3750225pjb.46.2022.04.07.19.55.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Apr 2022 19:55:53 -0700 (PDT) Date: Fri, 8 Apr 2022 02:55:50 +0000 From: Sean Christopherson To: Peter Gonda Cc: kvm@vger.kernel.org, Paolo Bonzini , linux-kernel@vger.kernel.org Subject: Re: [PATCH v4.1] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES Message-ID: References: <20220407210233.782250-1-pgonda@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220407210233.782250-1-pgonda@google.com> X-Spam-Status: No, score=-9.5 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED,USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 07, 2022, Peter Gonda wrote: > If an SEV-ES guest requests termination, exit to userspace with > KVM_EXIT_SYSTEM_EVENT and a dedicated SEV_TERM type instead of -EINVAL > so that userspace can take appropriate action. > > See AMD's GHCB spec section '4.1.13 Termination Request' for more details. Maybe it'll be obvious by the lack of compilation errors, but the changelog should call out the flags => ndata+data shenanigans, otherwise this looks like ABI breakage. > Suggested-by: Sean Christopherson > Suggested-by: Paolo Bonzini > Cc: kvm@vger.kernel.org > Cc: linux-kernel@vger.kernel.org > Signed-off-by: Peter Gonda > > --- > V4 > * Updated to Sean and Paolo's suggestion of reworking the > kvm_run.system_event struct to ndata and data fields to fix the > padding. > * 4.1 Updated commit description > > V3 > * Add Documentation/ update. > * Updated other KVM_EXIT_SHUTDOWN exits to clear ndata and set reason > to KVM_SHUTDOWN_REQ. > > V2 > * Add KVM_CAP_EXIT_SHUTDOWN_REASON check for KVM_CHECK_EXTENSION. > > Tested by making an SEV-ES guest call sev_es_terminate() with hardcoded > reason code set and reason code and then observing the codes from the > userspace VMM in the kvm_run.shutdown.data fields. > > --- > arch/x86/kvm/svm/sev.c | 9 +++++++-- > include/uapi/linux/kvm.h | 5 ++++- > 2 files changed, 11 insertions(+), 3 deletions(-) > > diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c > index 75fa6dd268f0..1a080f3f09d8 100644 > --- a/arch/x86/kvm/svm/sev.c > +++ b/arch/x86/kvm/svm/sev.c > @@ -2735,8 +2735,13 @@ static int sev_handle_vmgexit_msr_protocol(struct vcpu_svm *svm) > pr_info("SEV-ES guest requested termination: %#llx:%#llx\n", > reason_set, reason_code); > > - ret = -EINVAL; > - break; > + vcpu->run->exit_reason = KVM_EXIT_SYSTEM_EVENT; > + vcpu->run->system_event.type = KVM_SYSTEM_EVENT_SEV_TERM | > + KVM_SYSTEM_EVENT_NDATA_VALID; > + vcpu->run->system_event.ndata = 1; > + vcpu->run->system_event.data[1] = control->ghcb_gpa; > + > + return 0; Kinda silly, but ret = 0; break; would be better so that this flows through the tracepoint. I wouldn't care much if it didn't result in an unpaired "entry" tracepoint (and I still don't care that much...). > } > default: > /* Error, keep GHCB MSR value as-is */ > diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h > index 8616af85dc5d..dd1d8167e71f 100644 > --- a/include/uapi/linux/kvm.h > +++ b/include/uapi/linux/kvm.h > @@ -444,8 +444,11 @@ struct kvm_run { > #define KVM_SYSTEM_EVENT_SHUTDOWN 1 > #define KVM_SYSTEM_EVENT_RESET 2 > #define KVM_SYSTEM_EVENT_CRASH 3 > +#define KVM_SYSTEM_EVENT_SEV_TERM 4 > +#define KVM_SYSTEM_EVENT_NDATA_VALID (1u << 31) > __u32 type; > - __u64 flags; > + __u32 ndata; > + __u64 data[16]; > } system_event; > /* KVM_EXIT_S390_STSI */ > struct { > -- > 2.35.1.1178.g4f1659d476-goog >