From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C4642C4332F for ; Fri, 8 Oct 2021 18:06:29 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 7707361039 for ; Fri, 8 Oct 2021 18:06:29 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 7707361039 Authentication-Results: mail.kernel.org; dmarc=fail (p=quarantine dis=none) header.from=amd.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id 872EE940020; Fri, 8 Oct 2021 14:06:08 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 7AD2B940008; Fri, 8 Oct 2021 14:06:08 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 6275B940020; Fri, 8 Oct 2021 14:06:08 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0120.hostedemail.com [216.40.44.120]) by kanga.kvack.org (Postfix) with ESMTP id 4D991940008 for ; Fri, 8 Oct 2021 14:06:08 -0400 (EDT) Received: from smtpin01.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay01.hostedemail.com (Postfix) with ESMTP id 0FD0918404087 for ; Fri, 8 Oct 2021 18:06:08 +0000 (UTC) X-FDA: 78674049216.01.D5E4AC6 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on2077.outbound.protection.outlook.com [40.107.94.77]) by imf18.hostedemail.com (Postfix) with ESMTP id 5456240039D4 for ; Fri, 8 Oct 2021 18:06:07 +0000 (UTC) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QVkPbeHNoiptEXl4i+dS8qeT3qwBADcpzhnpxxyRDFCJOVqWcAoXrULjMGv6aG7VWF4o2HRnDvtej0iWmnr3RW0T3ppeYr5a34tqZHSnaTA36NyqBF5oQJfnzjXVPe/ICaamRWh5Rctqj21Vn2z4bq73E2UhXwAeG4vMVj0scw1BNl7CksmkWaDzba5FxuMz1w8uXgOpCa40ArjZaBSRfPB1cD8fKTWJNP0qaCyhmjQxzDWoLk7bIxCtiMjc+U+rojF8RkUumumz5SUiw+d+OoA0Rb+A8oza77b6IimyhbySE0GOqvVclDsKWdj/WmrRorGJwQYVMouFwbf3OIt52A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MZC1ELFT5sLbu2sH3g1K5XG4as5f6VW2VApG8NVi2wk=; b=Mla61apAQTxAt5aQhF7lLLaFPap5YAalWI9uoT+eDKtkODK0KyfAifcg5qQREjOsfe9LHSSq0Zm5LOjf7y/K14u9HDj8F5a/LGsUDg8x8/1HlEVSg8etoG+KcyrCKXwK1qVpnc7Z71gDDGCt+3nMnAoubgN0/lnO4tLaVhm/wcsK62OpujwyVjwsLhfAaTg4z0269QGgkrOkbGFlDlcXYDtV2R9+ErSwPv+YSOY93lr7UWIVp2RlBv5MkUKO0zNKDpx/ZUbmqka8rFhhYBM3G+1NMHINTu8e8LnhLdIkJtI9pJqPCnoq8GjSh+0oHYWEdLNZeTJOVbIRe6JNPtGTyA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MZC1ELFT5sLbu2sH3g1K5XG4as5f6VW2VApG8NVi2wk=; b=enYyUE+pney8CpfHvC/HYFMhS77QYaOfvw8bpqn4EwTz9WRf2M2ieRstoZ0fSKanmCjf8NtFC7PmA9mPX9V9XP7CFX+0zfr+iH6LarA4b3zJhKh1zn/azc+Z4otA/sOp3s+hNrkO5sNUC/jj+GFl2T/tyJv1boeSWs3WBIymurs= Received: from CO2PR04CA0129.namprd04.prod.outlook.com (2603:10b6:104:7::31) by BN6PR12MB1202.namprd12.prod.outlook.com (2603:10b6:404:1c::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4587.18; Fri, 8 Oct 2021 18:05:57 +0000 Received: from CO1NAM11FT026.eop-nam11.prod.protection.outlook.com (2603:10b6:104:7:cafe::4a) by CO2PR04CA0129.outlook.office365.com (2603:10b6:104:7::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4587.18 via Frontend Transport; Fri, 8 Oct 2021 18:05:57 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; Received: from SATLEXMB04.amd.com (165.204.84.17) by CO1NAM11FT026.mail.protection.outlook.com (10.13.175.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.4587.18 via Frontend Transport; Fri, 8 Oct 2021 18:05:57 +0000 Received: from sbrijesh-desktop.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.8; Fri, 8 Oct 2021 13:05:54 -0500 From: Brijesh Singh To: , , , , , , CC: Thomas Gleixner , Ingo Molnar , Joerg Roedel , Tom Lendacky , "H. Peter Anvin" , Ard Biesheuvel , Paolo Bonzini , Sean Christopherson , "Vitaly Kuznetsov" , Jim Mattson , "Andy Lutomirski" , Dave Hansen , Sergio Lopez , Peter Gonda , "Peter Zijlstra" , Srinivas Pandruvada , David Rientjes , Dov Murik , Tobin Feldman-Fitzthum , Borislav Petkov , Michael Roth , Vlastimil Babka , "Kirill A . Shutemov" , Andi Kleen , "Dr . David Alan Gilbert" , , , , Brijesh Singh Subject: [PATCH v6 26/42] x86/sev: move MSR-based VMGEXITs for CPUID to helper Date: Fri, 8 Oct 2021 13:04:37 -0500 Message-ID: <20211008180453.462291-27-brijesh.singh@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20211008180453.462291-1-brijesh.singh@amd.com> References: <20211008180453.462291-1-brijesh.singh@amd.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: ff95202d-840a-4b6f-b792-08d98a864740 X-MS-TrafficTypeDiagnostic: BN6PR12MB1202: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:4303; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(36840700001)(46966006)(5660300002)(83380400001)(7696005)(6666004)(2906002)(508600001)(8676002)(36756003)(7406005)(7416002)(4326008)(16526019)(186003)(1076003)(8936002)(81166007)(82310400003)(26005)(47076005)(110136005)(36860700001)(54906003)(44832011)(86362001)(70586007)(426003)(316002)(336012)(356005)(70206006)(2616005)(36900700001)(2101003);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Oct 2021 18:05:57.3771 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ff95202d-840a-4b6f-b792-08d98a864740 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CO1NAM11FT026.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1202 X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: 5456240039D4 X-Stat-Signature: 7zf35tp41ad1xduk43y5g5rszpm7z39o Authentication-Results: imf18.hostedemail.com; dkim=pass header.d=amd.com header.s=selector1 header.b=enYyUE+p; spf=pass (imf18.hostedemail.com: domain of brijesh.singh@amd.com designates 40.107.94.77 as permitted sender) smtp.mailfrom=brijesh.singh@amd.com; dmarc=pass (policy=quarantine) header.from=amd.com X-HE-Tag: 1633716367-535555 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Michael Roth This code will also be used later for SEV-SNP-validated CPUID code in some cases, so move it to a common helper. Signed-off-by: Michael Roth Signed-off-by: Brijesh Singh --- arch/x86/kernel/sev-shared.c | 84 +++++++++++++++++++++++++----------- 1 file changed, 58 insertions(+), 26 deletions(-) diff --git a/arch/x86/kernel/sev-shared.c b/arch/x86/kernel/sev-shared.c index 2b53b622108f..402b19f1c75d 100644 --- a/arch/x86/kernel/sev-shared.c +++ b/arch/x86/kernel/sev-shared.c @@ -193,6 +193,58 @@ static enum es_result sev_es_ghcb_hv_call(struct ghc= b *ghcb, return ret; } =20 +static int sev_cpuid_hv(u32 func, u32 subfunc, u32 *eax, u32 *ebx, + u32 *ecx, u32 *edx) +{ + u64 val; + + if (eax) { + sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(func, GHCB_CPUID_REQ_EAX)); + VMGEXIT(); + val =3D sev_es_rd_ghcb_msr(); + + if (GHCB_RESP_CODE(val) !=3D GHCB_MSR_CPUID_RESP) + return -EIO; + + *eax =3D (val >> 32); + } + + if (ebx) { + sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(func, GHCB_CPUID_REQ_EBX)); + VMGEXIT(); + val =3D sev_es_rd_ghcb_msr(); + + if (GHCB_RESP_CODE(val) !=3D GHCB_MSR_CPUID_RESP) + return -EIO; + + *ebx =3D (val >> 32); + } + + if (ecx) { + sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(func, GHCB_CPUID_REQ_ECX)); + VMGEXIT(); + val =3D sev_es_rd_ghcb_msr(); + + if (GHCB_RESP_CODE(val) !=3D GHCB_MSR_CPUID_RESP) + return -EIO; + + *ecx =3D (val >> 32); + } + + if (edx) { + sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(func, GHCB_CPUID_REQ_EDX)); + VMGEXIT(); + val =3D sev_es_rd_ghcb_msr(); + + if (GHCB_RESP_CODE(val) !=3D GHCB_MSR_CPUID_RESP) + return -EIO; + + *edx =3D (val >> 32); + } + + return 0; +} + /* * Boot VC Handler - This is the first VC handler during boot, there is = no GHCB * page yet, so it only supports the MSR based communication with the @@ -201,7 +253,7 @@ static enum es_result sev_es_ghcb_hv_call(struct ghcb= *ghcb, void __init do_vc_no_ghcb(struct pt_regs *regs, unsigned long exit_code) { unsigned int fn =3D lower_bits(regs->ax, 32); - unsigned long val; + u32 eax, ebx, ecx, edx; =20 /* Only CPUID is supported via MSR protocol */ if (exit_code !=3D SVM_EXIT_CPUID) @@ -221,33 +273,13 @@ void __init do_vc_no_ghcb(struct pt_regs *regs, uns= igned long exit_code) sev_status =3D (hi << 32) | lo; } =20 - sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(fn, GHCB_CPUID_REQ_EAX)); - VMGEXIT(); - val =3D sev_es_rd_ghcb_msr(); - if (GHCB_RESP_CODE(val) !=3D GHCB_MSR_CPUID_RESP) + if (sev_cpuid_hv(fn, 0, &eax, &ebx, &ecx, &edx)) goto fail; - regs->ax =3D val >> 32; =20 - sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(fn, GHCB_CPUID_REQ_EBX)); - VMGEXIT(); - val =3D sev_es_rd_ghcb_msr(); - if (GHCB_RESP_CODE(val) !=3D GHCB_MSR_CPUID_RESP) - goto fail; - regs->bx =3D val >> 32; - - sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(fn, GHCB_CPUID_REQ_ECX)); - VMGEXIT(); - val =3D sev_es_rd_ghcb_msr(); - if (GHCB_RESP_CODE(val) !=3D GHCB_MSR_CPUID_RESP) - goto fail; - regs->cx =3D val >> 32; - - sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(fn, GHCB_CPUID_REQ_EDX)); - VMGEXIT(); - val =3D sev_es_rd_ghcb_msr(); - if (GHCB_RESP_CODE(val) !=3D GHCB_MSR_CPUID_RESP) - goto fail; - regs->dx =3D val >> 32; + regs->ax =3D eax; + regs->bx =3D ebx; + regs->cx =3D ecx; + regs->dx =3D edx; =20 /* * This is a VC handler and the #VC is only raised when SEV-ES is --=20 2.25.1