Received: by 2002:ab2:69cc:0:b0:1fd:c486:4f03 with SMTP id n12csp55549lqp; Mon, 10 Jun 2024 18:17:44 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXygSCOOlOgauBCbOTp1rxnaSNosLJ5v283C7ra8DumiZ8ltr3QemVpH51R8doiNCPUbTQqhiTX+7EENwL+lOPQA37VcVmIEjeo0UlwVw== X-Google-Smtp-Source: AGHT+IERsMJ+xm736OBhR6l3p7P7c2jxADjYQnMz//qUQPd4jLpcWq9By2Jch8B7ptiodCizgJz9 X-Received: by 2002:a50:8d4f:0:b0:57c:6773:d9c1 with SMTP id 4fb4d7f45d1cf-57c6773de19mr4172251a12.39.1718068664079; Mon, 10 Jun 2024 18:17:44 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718068664; cv=pass; d=google.com; s=arc-20160816; b=XtRYVjWOixt9ha1m6hGy6LnpRlEQ0Xj9L0Yx03NiDVETjmuE+AykQURQzGTt2ih4h9 1T5B9xQMrttpdWvHhQO4Rpczu5EBAUH7GPBGme99Ju0fo6UX84OZ2Zw4HYAP1HOafkqZ q+FEARcXsVQEKhSDjL/tBqmn5lCEBcI++5n/UvyxuLQum4FzFNSm3el1wWII3g89JTud RatNeHDr1Exei31l1ndf/PHTV/B2khLPLI/djV9uB11fVa/80Lpib0M3l8/mwOI7T49o MFkoOowHmcP501CQqYwqTXEg1I10M5r9IharXTlymmHgVzIDJYj4hfAEPT0Afs4uE100 OWvw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:from:subject:message-id:references:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:in-reply-to:date :dkim-signature; bh=lD/LO/gxXCIGTZKmzDO3IySUcSGm5VYiE8jvdtRhgQQ=; fh=K+MGclpEfQjDj+gcd9AukNKrH01iKEEar4EMBtxxfco=; b=JqJ1RJOONTSqJTKS3R4X8W4dbkC3qQsjENU3IzDn4TpA0Ftdms7lETKJWS58+uckgl s25FgyljqrM6klyMaQ7s7yExrVIooZGJ3QHgL/vX9xFYLcft2E5HILXz6gMXmW3UULYJ H3W2dFu2AyvuC543RwhUrFJQXtjrrk5vrDBN7qrLEpoDeIP6MgfvX3AR3Ad4yQ25TrU5 KmBdGA08JXoIi7tW+0B+MKp8I+0gRig/0xjbe4UYOavwCG9DTXo5yd67FBdvEY9dOppr gha31YIL84VGXYpB0AYk1AcPzHun8rdxczuWpjO4oxJyAJfSHoNmTNivZwUfJV0YkNh0 48Kg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=okUFOnC5; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-209149-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-209149-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id 4fb4d7f45d1cf-57c7cf673acsi2030325a12.466.2024.06.10.18.17.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 10 Jun 2024 18:17:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-209149-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=okUFOnC5; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-209149-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-209149-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id BC8381F22A3D for ; Tue, 11 Jun 2024 01:17:43 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id D07BA9445; Tue, 11 Jun 2024 01:17:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="okUFOnC5" Received: from mail-pj1-f74.google.com (mail-pj1-f74.google.com [209.85.216.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2D4146FC5 for ; Tue, 11 Jun 2024 01:17:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.74 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718068649; cv=none; b=pkcbLdRbXO8zhZXPcmmyUFFAF5IjvpPFWUVA8qOrnUowZUG77/b86gsEnWrDuDI/y6yEVYcGGala4Rtqm9V6WEu8DlKL5dBYHOWmmdbcRS/15+JjvqjxsftAHeGia+GO24wJfDBVxCz2Al5W70fMJ+7L4JpIj0QM0/C2Muic1H0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718068649; c=relaxed/simple; bh=cDG4sBmtaLwX3BcWuqNAVreT/h9JlC27J2E+qHFs6b4=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=u/Jr+sLy2yi3rxe9AqD3ucv5Zq1ynSY1WRcB4+wYxjQVNS6/9DsnfGJYxp2wE0duURVP/dL6mWETA61noheY0i0XcymZvqHGwvNPnsssaCuo9xWdFn32CLeKujW3J8cxYWvEMJ5i4gajIhmWrRvV8g/0SRTgM+H8mUL8WyyAX/8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=okUFOnC5; arc=none smtp.client-ip=209.85.216.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Received: by mail-pj1-f74.google.com with SMTP id 98e67ed59e1d1-2c2dfa5cfa5so2378613a91.0 for ; Mon, 10 Jun 2024 18:17:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1718068646; x=1718673446; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=lD/LO/gxXCIGTZKmzDO3IySUcSGm5VYiE8jvdtRhgQQ=; b=okUFOnC5kQPxvERe3gp1C9v8dcFAFH/DpCyD5cqahTmZW9If8wno8KTBmLyKgjfO2a s412FXhgyXXreAcq9Ot1nF7g5LKP1HZXs+SpBf9IMioUrlJ8tOcARhgW+g/JJbYe8v/7 b5hP1L44HQwt9S+C8v2ZESy+MLKA4NBCnH39WdgbMuRP2SO7h44eBQxr5ijzux2iFd/y jJ/JPlX4c/YNekGgqc87OQAx6z4T34RFQaIxbU242nSd6GJvqpivwL1lam7bWgeJRJTb LNRHGsqoviW6o6Fn0Oo8+hJzotLYIVo3xZg8slxLlY9TO2tthQnYZQOBqwpNO+E/gHKg Oteg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718068646; x=1718673446; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=lD/LO/gxXCIGTZKmzDO3IySUcSGm5VYiE8jvdtRhgQQ=; b=OGpTG4sjV+fvi3OF1buI2zyDcp4bztCJUxMK8F/YAg5hYoM3Rtr4erX4L3i8ldQDs2 hfRux69sVB6Nv0au3fWFbcgXggzw6VR8uGCNrq8329V5om5M6LjPqr+KZtWc6Irlr0Sv +53L2E/kjH+MolOlRj9KfSh2Kyc37RQv6IMgrVeoGNPaH5jAxmpgXNLHbboQJ2EvL0d8 5NNBPDV/LiQAHYY8INztFW9levMgTXUrRR4FfUNZDyEKFa1uoi7YvGDTYJu5U0N9k62V ZDTZMJ+fg1LjfoJm6AnkWo+mC0mP3VKzWq7MoUiZj40vW2eRKrO9wypKnJtnIDP5K6KV bCGA== X-Forwarded-Encrypted: i=1; AJvYcCXqpcawCdpq2k88qcJbROYgii/qWpScoWC9MgAWeJykuIwq1aAi8ZddLC19qOMcfpHzh8uXjTjr/nFdtD9Nte2FQCfe5j9J///SKZL1 X-Gm-Message-State: AOJu0YwYA7Oi5f/37RhWefh5f5qrej6YjdH8PKugxWrSJDU4og1RZlrS exDdWinqcTnDxgq05gwy8P3WiImBYDhkOLCTkULK9PR0bMnlcYg9CQtxZFn1xKoz3ZW1kRbiDvX MYg== X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a17:90b:807:b0:2c3:2e2:8391 with SMTP id 98e67ed59e1d1-2c302e283cdmr13494a91.0.1718068646422; Mon, 10 Jun 2024 18:17:26 -0700 (PDT) Date: Mon, 10 Jun 2024 18:17:24 -0700 In-Reply-To: <20240509075423.156858-2-weijiang.yang@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20240509075423.156858-1-weijiang.yang@intel.com> <20240509075423.156858-2-weijiang.yang@intel.com> Message-ID: Subject: Re: [RFC PATCH 2/2] KVM: x86: Enable guest SSP read/write interface with new uAPIs From: Sean Christopherson To: Yang Weijiang Cc: pbonzini@redhat.com, mlevitsk@redhat.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="us-ascii" On Thu, May 09, 2024, Yang Weijiang wrote: > Enable guest shadow stack pointer(SSP) access interface with new uAPIs. > CET guest SSP is HW register which has corresponding VMCS field to save > /restore guest values when VM-{Exit,Entry} happens. KVM handles SSP as > a synthetic MSR for userspace access. > > Use a translation helper to set up mapping for SSP synthetic index and > KVM-internal MSR index so that userspace doesn't need to take care of > KVM's management for synthetic MSRs and avoid conflicts. > > Suggested-by: Sean Christopherson > Signed-off-by: Yang Weijiang > --- > arch/x86/include/uapi/asm/kvm.h | 3 +++ > arch/x86/kvm/x86.c | 7 +++++++ > arch/x86/kvm/x86.h | 10 ++++++++++ > 3 files changed, 20 insertions(+) > > diff --git a/arch/x86/include/uapi/asm/kvm.h b/arch/x86/include/uapi/asm/kvm.h > index ca2a47a85fa1..81c8d9ea2e58 100644 > --- a/arch/x86/include/uapi/asm/kvm.h > +++ b/arch/x86/include/uapi/asm/kvm.h > @@ -420,6 +420,9 @@ struct kvm_x86_reg_id { > __u16 rsvd16; > }; > > +/* KVM synthetic MSR index staring from 0 */ > +#define MSR_KVM_GUEST_SSP 0 Do we want to have "SYNTHETIC" in the name? E.g. to try and differentiate from KVM's paravirtual MSRs? Hmm, but the PV MSRs are synthetic too. Maybe it's the MSR part that's bad, e.g. the whole point of these shenanigans is to let KVM use its internal MSR framework without exposing those details to userspace. So rather than, KVM_X86_REG_SYNTHETIC_MSR, what if we go with KVM_X86_REG_SYNTHETIC? And then this becomes something like KVM_SYNTHETIC_GUEST_SSP? Aha! And then to prepare for a future where we add synthetic registers that aren't routed through the MSR framework (which seems unlikely, but its trivially easy to handle, so why not): static int kvm_translate_synthetic_reg(struct kvm_x86_reg_id *reg) { switch (reg->index) { case MSR_KVM_GUEST_SSP: reg->type = KVM_X86_REG_MSR; reg->index = MSR_KVM_INTERNAL_GUEST_SSP; break; default: return -EINVAL; } return 0; } and then the caller would have slightly different ordering: if (id->type == KVM_X86_REG_SYNTHETIC_MSR) { r = kvm_translate_synthetic_msr(&id->index); if (r) break; } r = -EINVAL; if (id->type != KVM_X86_REG_MSR) break;