Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp22477912rwd; Fri, 30 Jun 2023 08:28:40 -0700 (PDT) X-Google-Smtp-Source: APBJJlGHvbWgKH491n3qznxmxwfH9uKJT9bitNA/Ni0pfobP6myoWGfFdMP8zybue33RC6fdFoPC X-Received: by 2002:a17:90b:1d85:b0:262:c3b3:f8fa with SMTP id pf5-20020a17090b1d8500b00262c3b3f8famr2006025pjb.39.1688138920420; Fri, 30 Jun 2023 08:28:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688138920; cv=none; d=google.com; s=arc-20160816; b=P+HBenK9kthnEJiTogg5N+M0oS5D8O+es8lTgbSal/PxjoIBwFAz6FknPHCE9Z6tDh +qBBxrlXw63shRTUo3LpqG66e3oYquwoB+DoINWd08kgNZdeQdBI7uns+mUGqLA0OUDx VAu3aSM8UGQS37cHMr5tV9e1swhe9Mhm8fK+QNjaaUSorAc4FmTQTGWvtEvKtFOJC8Hn fbzYPwsx+mNpPAGD8GzjcBmuebOx3+lFfeeviubeWeb5O5INUe/vExtBGE9hNueZt8EO melNlOkjb2wogDLOrcriSuVi4g4znEjCkx5+mb7vLkfuKjJtQDQNB6Rez8QfKWBqzVOL 1/Sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=W6sjO6kMUAzQUdib394q0FOg+FPBU//DVwrbnuX1BOI=; fh=fOk9OZUSMbB51fwCyVJ/Xtma0ffyyGr1tqaCo5fi3/8=; b=GW11kXqkTaAqXytc7xy9WzGXhd13o2qeA968QKpcwRIcamdDOdYriKRgMt3t1Vgl6j isE8v0jGa69VXecxyResbUcvqwQY0RQGXPkWdgViG61YXrIZtDEKbcffjFQQ5kLwv7sX Mp/3zz/FEk49Ln7ncWIeETytpVWRLRXnshH/EXR6bDP5KJBIwJxxIgB8DzPE2zAbmI/C 6fyZtRMeQNtiEx4Fo98uss/r6obQpzLkkTKR33+3AtTKsL+afX7oxBN0EE7p1fVEFxQA HXZW7s8DRe5EandCzoJd2UusJmeqC02YmmfiQPojodxjPn44CnzTEmE9QWVInVBC3AnZ Thow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=DRkzwZdn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t190-20020a6381c7000000b00545a181d157si13300401pgd.51.2023.06.30.08.28.27; Fri, 30 Jun 2023 08:28:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=DRkzwZdn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232590AbjF3PPE (ORCPT + 99 others); Fri, 30 Jun 2023 11:15:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34608 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232538AbjF3POx (ORCPT ); Fri, 30 Jun 2023 11:14:53 -0400 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9A4762728; Fri, 30 Jun 2023 08:14:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=W6sjO6kMUAzQUdib394q0FOg+FPBU//DVwrbnuX1BOI=; b=DRkzwZdnOgjRI8VZ00V7KPTI+Z t7+XBmemrUnsGULbnPANM4lpiDmXojlLYDkxt2fvFP3mZmdO8s4skmtu//QjxY+6F8eBEd/6VW7P2 HF+pwfelAvfbwg56kv1FegIcEAvpYp/hudtWSpnSRrrEq8rnLclZW7RNf5vHwFLhNP3SsYsiEjwYT XXIDBNgeyJi2vLb5iHYLjRctT/ZUbdwSlsMyr6oSX35RzSfr/Rn6j9+y8NW0YOD8x7np7KlwFYkpI Fk/myStHYRF3ob8qImCsfS542js3IGtMiAl3A2/McroOYmtCnv8wG9Il9Zg7c2R/Dg+Dd44BHtAhw o09lJbrw==; Received: from j130084.upc-j.chello.nl ([24.132.130.84] helo=noisy.programming.kicks-ass.net) by casper.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux)) id 1qFFpQ-005nkP-7n; Fri, 30 Jun 2023 15:14:32 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id B8B71300164; Fri, 30 Jun 2023 17:14:30 +0200 (CEST) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id 9C63F24810094; Fri, 30 Jun 2023 17:14:30 +0200 (CEST) Date: Fri, 30 Jun 2023 17:14:30 +0200 From: Peter Zijlstra To: "Huang, Kai" Cc: "kvm@vger.kernel.org" , "Raj, Ashok" , "Hansen, Dave" , "david@redhat.com" , "bagasdotme@gmail.com" , "Luck, Tony" , "ak@linux.intel.com" , "Wysocki, Rafael J" , "linux-kernel@vger.kernel.org" , "Christopherson,, Sean" , "mingo@redhat.com" , "pbonzini@redhat.com" , "linux-mm@kvack.org" , "tglx@linutronix.de" , "kirill.shutemov@linux.intel.com" , "Chatre, Reinette" , "Yamahata, Isaku" , "nik.borisov@suse.com" , "hpa@zytor.com" , "Shahar, Sagi" , "imammedo@redhat.com" , "bp@alien8.de" , "Gao, Chao" , "Brown, Len" , "sathyanarayanan.kuppuswamy@linux.intel.com" , "Huang, Ying" , "Williams, Dan J" , "x86@kernel.org" Subject: Re: [PATCH v12 20/22] x86/virt/tdx: Allow SEAMCALL to handle #UD and #GP Message-ID: <20230630151430.GC2534364@hirez.programming.kicks-ass.net> References: <20230628152900.GI2438817@hirez.programming.kicks-ass.net> <20230628203823.GR38236@hirez.programming.kicks-ass.net> <42e13ccf7f27a68c0dd64640eed378c38ef40967.camel@intel.com> <20230630100659.GF2533791@hirez.programming.kicks-ass.net> <20230630102141.GA2534364@hirez.programming.kicks-ass.net> <20230630120650.GB2534364@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230630120650.GB2534364@hirez.programming.kicks-ass.net> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 30, 2023 at 02:06:50PM +0200, Peter Zijlstra wrote: > /* > * Used for input/output registers values of the TDCALL and SEAMCALL > * instructions when requesting services from the TDX module. > * > * This is a software only structure and not part of the TDX module/VMM ABI. > */ > struct tdx_module_args { > /* callee-clobbered */ > u64 rdx; > u64 rcx; > u64 r8; > u64 r9; > /* extra callee-clobbered */ > u64 r10; > u64 r11; > /* callee-saved + rdi/rsi */ > u64 rdi; > u64 rsi; > u64 rbx; > u64 r12; > u64 r13; > u64 r14; > u64 r15; > }; > > > > /* > * TDX_MODULE_CALL - common helper macro for both > * TDCALL and SEAMCALL instructions. > * > * TDCALL - used by TDX guests to make requests to the > * TDX module and hypercalls to the VMM. > * > * SEAMCALL - used by TDX hosts to make requests to the > * TDX module. > * > *------------------------------------------------------------------------- > * TDCALL/SEAMCALL ABI: > *------------------------------------------------------------------------- > * Input Registers: > * > * RAX - Leaf number. > * RCX,RDX,R8-R11 - Leaf specific input registers. > * RDI,RSI,RBX,R11-R15 - VP.VMCALL VP.ENTER > * > * Output Registers: > * > * RAX - instruction error code. > * RCX,RDX,R8-R11 - Leaf specific output registers. > * RDI,RSI,RBX,R12-R15 - VP.VMCALL VP.ENTER > * > *------------------------------------------------------------------------- > * > * So while the common core (RAX,RCX,RDX,R8-R11) fits nicely in the > * callee-clobbered registers and even leaves RDI,RSI free to act as a base > * pointer some rare leafs (VP.VMCALL, VP.ENTER) make a giant mess of things. > * > * For simplicity, assume that anything that needs the callee-saved regs also > * tramples on RDI,RSI. This isn't strictly true, see for example EXPORT.MEM. > */ > .macro TDX_MODULE_CALL host:req ret:req saved:0 > FRAME_BEGIN > > movq %rdi, %rax > > movq TDX_MODULE_rcx(%rsi), %rcx > movq TDX_MODULE_rdx(%rsi), %rdx > movq TDX_MODULE_r8(%rsi), %r8 > movq TDX_MODULE_r9(%rsi), %r9 > movq TDX_MODULE_r10(%rsi), %r10 > movq TDX_MODULE_r11(%rsi), %r11 > > .if \saved > pushq rbx > pushq r12 > pushq r13 > pushq r14 > pushq r15 > > movq TDX_MODULE_rbx(%rsi), %rbx > movq TDX_MODULE_r12(%rsi), %r12 > movq TDX_MODULE_r13(%rsi), %r13 > movq TDX_MODULE_r14(%rsi), %r14 > movq TDX_MODULE_r15(%rsi), %r15 > > /* VP.VMCALL and VP.ENTER */ > .if \ret > pushq %rsi > .endif > movq TDX_MODULE_rdi(%rsi), %rdi > movq TDX_MODULE_rsi(%rsi), %rsi > .endif > > .Lcall: > .if \host > seamcall > /* > * SEAMCALL instruction is essentially a VMExit from VMX root > * mode to SEAM VMX root mode. VMfailInvalid (CF=1) indicates > * that the targeted SEAM firmware is not loaded or disabled, > * or P-SEAMLDR is busy with another SEAMCALL. RAX is not > * changed in this case. > */ > jc .Lseamfail > > .if \saved && \ret > /* > * VP.ENTER clears RSI on output, use it to restore state. > */ > popq %rsi > xor %edi,%edi > movq %rdi, TDX_MODULE_rdi(%rsi) > movq %rdi, TDX_MODULE_rsi(%rsi) > .endif > .else > tdcall > > /* > * RAX!=0 indicates a failure, assume no return values. > */ > testq %rax, %rax > jne .Lerror > > .if \saved && \ret > /* > * Since RAX==0, it can be used as a scratch register to restore state. > * > * [ assumes \saved implies \ret ] This comment is wrong. As should be obvious from the condition above. > */ > popq %rax > movq %rdi, TDX_MODULE_rdi(%rax) > movq %rsi, TDX_MODULE_rsi(%rax) > movq %rax, %rsi > xor %eax, %eax; > .endif > .endif // \host > > .if \ret > /* RSI is restored */ > movq %rcx, TDX_MODULE_rcx(%rsi) > movq %rdx, TDX_MODULE_rdx(%rsi) > movq %r8, TDX_MODULE_r8(%rsi) > movq %r9, TDX_MODULE_r9(%rsi) > movq %r10, TDX_MODULE_r10(%rsi) > movq %r11, TDX_MODULE_r11(%rsi) > .if \saved > movq %rbx, TDX_MODULE_rbx(%rsi) > movq %r12, TDX_MODULE_r12(%rsi) > movq %r13, TDX_MODULE_r13(%rsi) > movq %r14, TDX_MODULE_r14(%rsi) > movq %r15, TDX_MODULE_r15(%rsi) > .endif > .endif // \ret > > .Lout: > .if \saved > popq %r15 > popq %r14 > popq %r13 > popq %r12 > popq %rbx > .endif > FRAME_END > RET > > /* > * Error and exception handling at .Lcall. Ignore \ret on failure. > */ > .Lerror: > .if \saved && \ret > popq %rsi > .endif > jmp .Lout > > .if \host > .Lseamfail: > /* > * Set RAX to TDX_SEAMCALL_VMFAILINVALID for VMfailInvalid. > * This value will never be used as actual SEAMCALL error code as > * it is from the Reserved status code class. > */ > movq $TDX_SEAMCALL_VMFAILINVALID, %rax > jmp .Lerror > > .Lfault: > /* > * SEAMCALL caused #GP or #UD. Per _ASM_EXTABLE_FAULT() RAX > * contains the trap number, convert to a TDX error code by > * setting the high word to TDX_SW_ERROR. > */ > mov $TDX_SW_ERROR, %rdi > or %rdi, %rax > jmp .Lerror > > _ASM_EXTABLE_FAULT(.Lcall, .Lfault) > .endif > .endm