From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.7 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 22F0EC636C8 for ; Tue, 20 Jul 2021 03:52:57 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 00A2960041 for ; Tue, 20 Jul 2021 03:52:56 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348146AbhGTDMF (ORCPT ); Mon, 19 Jul 2021 23:12:05 -0400 Received: from mga03.intel.com ([134.134.136.65]:24179 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1348359AbhGTDJg (ORCPT ); Mon, 19 Jul 2021 23:09:36 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10050"; a="211229338" X-IronPort-AV: E=Sophos;i="5.84,254,1620716400"; d="scan'208";a="211229338" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jul 2021 20:49:26 -0700 X-IronPort-AV: E=Sophos;i="5.84,254,1620716400"; d="scan'208";a="661006638" Received: from ywei11-mobl1.amr.corp.intel.com (HELO skuppusw-desk1.amr.corp.intel.com) ([10.251.138.31]) by fmsmga005-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jul 2021 20:49:25 -0700 From: Kuppuswamy Sathyanarayanan To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Peter Zijlstra , Andy Lutomirski Cc: Peter H Anvin , Dave Hansen , Tony Luck , Dan Williams , Andi Kleen , Kirill Shutemov , Sean Christopherson , Kuppuswamy Sathyanarayanan , x86@kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 04/10] x86/tdx: Handle early IO operations Date: Mon, 19 Jul 2021 20:48:55 -0700 Message-Id: <20210720034901.2120205-5-sathyanarayanan.kuppuswamy@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210720034901.2120205-1-sathyanarayanan.kuppuswamy@linux.intel.com> References: <20210720034901.2120205-1-sathyanarayanan.kuppuswamy@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andi Kleen Add an early #VE handler to convert early port IOs into TDCALLs. TDX cannot do port IO directly. The TDX module triggers a #VE exception to let the guest kernel to emulate port I/O, by converting them into TDCALLs to call the host. To support port IO in early boot code, add a minimal support in early exception handlers. This is similar to what AMD SEV does. This is mainly to support early_printk's serial driver, as well as potentially the VGA driver (although it is expected not to be used). The early handler only does IO calls and nothing else, and anything that goes wrong results in a normal early exception panic. It cannot share the code paths with the normal #VE handler because it needs to avoid using trace calls or printk. This early handler allows us to use the normal in*/out* macros without patching them for every driver. Since, there is no expectation that early port IO is performance critical, the #VE emulation cost is worth the simplicity benefit of not patching out port IO usage in early code. There are also no concerns with nesting, since there should be no NMIs this early. Signed-off-by: Andi Kleen Reviewed-by: Dan Williams Reviewed-by: Andi Kleen Signed-off-by: Kuppuswamy Sathyanarayanan --- Changes since v2: * None Changes since v1: * Renamed tdx_early_io() to tdg_early_io(). arch/x86/include/asm/tdx.h | 4 +++ arch/x86/kernel/head64.c | 3 ++ arch/x86/kernel/tdx.c | 56 ++++++++++++++++++++++++++++++++++++++ 3 files changed, 63 insertions(+) diff --git a/arch/x86/include/asm/tdx.h b/arch/x86/include/asm/tdx.h index 25946b4e8595..72154d3f63c2 100644 --- a/arch/x86/include/asm/tdx.h +++ b/arch/x86/include/asm/tdx.h @@ -75,6 +75,8 @@ unsigned long tdg_get_ve_info(struct ve_info *ve); int tdg_handle_virtualization_exception(struct pt_regs *regs, struct ve_info *ve); +bool tdg_early_handle_ve(struct pt_regs *regs); + /* * To support I/O port access in decompressor or early kernel init * code, since #VE exception handler cannot be used, use paravirt @@ -141,6 +143,8 @@ static inline void tdx_early_init(void) { }; static inline bool tdx_prot_guest_has(unsigned long flag) { return false; } +static inline bool tdg_early_handle_ve(struct pt_regs *regs) { return false; } + #endif /* CONFIG_INTEL_TDX_GUEST */ #ifdef CONFIG_INTEL_TDX_GUEST_KVM diff --git a/arch/x86/kernel/head64.c b/arch/x86/kernel/head64.c index d1a4942ae160..323ce7f156f5 100644 --- a/arch/x86/kernel/head64.c +++ b/arch/x86/kernel/head64.c @@ -410,6 +410,9 @@ void __init do_early_exception(struct pt_regs *regs, int trapnr) trapnr == X86_TRAP_VC && handle_vc_boot_ghcb(regs)) return; + if (trapnr == X86_TRAP_VE && tdg_early_handle_ve(regs)) + return; + early_fixup_exception(regs, trapnr); } diff --git a/arch/x86/kernel/tdx.c b/arch/x86/kernel/tdx.c index 7847771ba701..549d10d1f27d 100644 --- a/arch/x86/kernel/tdx.c +++ b/arch/x86/kernel/tdx.c @@ -13,6 +13,11 @@ #define TDINFO 1 #define TDGETVEINFO 3 +#define VE_IS_IO_OUT(exit_qual) (((exit_qual) & 8) ? 0 : 1) +#define VE_GET_IO_SIZE(exit_qual) (((exit_qual) & 7) + 1) +#define VE_GET_PORT_NUM(exit_qual) ((exit_qual) >> 16) +#define VE_IS_IO_STRING(exit_qual) ((exit_qual) & 16 ? 1 : 0) + static struct { unsigned int gpa_width; unsigned long attributes; @@ -230,6 +235,57 @@ int tdg_handle_virtualization_exception(struct pt_regs *regs, return ret; } +/* + * Handle early IO, mainly for early printks serial output. + * This avoids anything that doesn't work early on, like tracing + * or printks, by calling the low level functions directly. Any + * problems are handled by falling back to a standard early exception. + * + * Assumes the IO instruction was using ax, which is enforced + * by the standard io.h macros. + */ +static __init bool tdg_early_io(struct pt_regs *regs, u32 exit_qual) +{ + struct tdx_hypercall_output outh; + int out = VE_IS_IO_OUT(exit_qual); + int size = VE_GET_IO_SIZE(exit_qual); + int port = VE_GET_PORT_NUM(exit_qual); + u64 mask = GENMASK(8 * size, 0); + bool string = VE_IS_IO_STRING(exit_qual); + int ret; + + /* I/O strings ops are unrolled at build time. */ + if (string) + return 0; + + ret = _tdx_hypercall(EXIT_REASON_IO_INSTRUCTION, size, out, port, + regs->ax, &outh); + if (!out && !ret) { + regs->ax &= ~mask; + regs->ax |= outh.r11 & mask; + } + + return !ret; +} + +/* + * Early #VE exception handler. Just used to handle port IOs + * for early_printk. If anything goes wrong handle it like + * a normal early exception. + */ +__init bool tdg_early_handle_ve(struct pt_regs *regs) +{ + struct ve_info ve; + + if (tdg_get_ve_info(&ve)) + return false; + + if (ve.exit_reason == EXIT_REASON_IO_INSTRUCTION) + return tdg_early_io(regs, ve.exit_qual); + + return false; +} + void __init tdx_early_init(void) { if (!cpuid_has_tdx_guest()) -- 2.25.1