From patchwork Thu Jan 12 10:14:00 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Kirill A. Shutemov" X-Patchwork-Id: 3903 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:4e01:0:0:0:0:0 with SMTP id p1csp3801666wrt; Thu, 12 Jan 2023 02:16:51 -0800 (PST) X-Google-Smtp-Source: AMrXdXsfMeAHEo4VZIaBs7asiVat9m76yUMgI7kxhz+12lU61tA5nTDCAJ2NTtkOycL6pfB6qln1 X-Received: by 2002:a05:6402:1c0f:b0:499:8849:5fb6 with SMTP id ck15-20020a0564021c0f00b0049988495fb6mr12285825edb.30.1673518611560; Thu, 12 Jan 2023 02:16:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673518611; cv=none; d=google.com; s=arc-20160816; b=fqTmGpb1e92wKmA7e2AUaNWXQpL+Fi8gUH1I5qpvh3CFFmFleAYPF8irYoqHJfO//o mUznoi9bBdSZHgmgJYd2j2AtX62xFbSEtlBIuRKas0PIJbQ2OpdPGoOLvSUF2yKgbKmK j4qdaUsEHbSmO17u7DJMNGdNggvQ5yCGXhgP8RBd+yUn0cQXHV13Tmi5CUzc1/rI4F98 Q8VgSFSwsGpeb8trhvT4IBq74ZhpRo0KA8vdZ8p8tv9gmCXh/4ZSMMIogkZPswV2M7Mn jvXWZj7xFIdzvl+s0qdxEkQV4c2AObysbFMFSXKdW6vzxoudVKtFpT3sjqlWmBpQ2Qm/ W4Aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=3q9IXyKX4eoW3RRY48GDEGnQkSYd5O1JV6a/SdtRlt0=; b=NYMur3ayEBGFDoo/NFgYW1G1R/XFjang1PxK3DLWjWc10ubNK7oWWksrYsfxx5jOHZ WT1L8JRZ+YuWNk68Bv3wJmkNXcIuXHV1TCfp6KGhVnP0OB33tK+Uq7eMPNs9GpqKO/Ra vekj3MNxLRsLZZGuuN/HohHDA3uaGrN4nRu/MUnhxHu9GTZP51lBo88UB7/RV/wlqxiK iSvDWORSd4BylMlccBlX//a0D5gaSlRw0Hh34jT8IVIIbhhg0839lYrmSV1RTLs2ZVWh cXz+xg8jFkKvO4baTbHxtfsJTOeVH866Jnthpxe6NSHBUm8nj12gow2XTe02snHmQoaB TaxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=fVC+WnOk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v17-20020a056402185100b00469fd4323a4si15844953edy.246.2023.01.12.02.16.26; Thu, 12 Jan 2023 02:16:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=fVC+WnOk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239987AbjALKQI (ORCPT + 99 others); Thu, 12 Jan 2023 05:16:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46452 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229666AbjALKO6 (ORCPT ); Thu, 12 Jan 2023 05:14:58 -0500 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0BE555FE3 for ; Thu, 12 Jan 2023 02:14:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673518460; x=1705054460; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=lSP+h+laxvUqeKdHg46PtrH3Xip8ADgfReT4ZBovqNw=; b=fVC+WnOkbE0Ucu0MePlvGszyS+4KBforEPcCrrfqReoS0G8ew+hKASoa +SLsRwQyl0Hylno+dEOyuswJeJj+WS3Tdr6grYLiVgQUo+XkH97kUbMvZ LPbeymaN2NCgO8d/s6C7N12dzrm6FSjcDWdOWJRYN0j9hP5REPPY9EwCB xzuYyMKUe7OlmBY23Ftc1dnDgc4XpKHc4Qd3qi7mvg82b1ihd7vSV05II Ils/VKRs5BYR0p7g8lKrDQ7/DDu6D85UdjrPShpCia3X93x+X/TMBBGeR A+PzHRKSTjwGNgl/Xs6djUrkjTOCV0FC3YfcsUqbx4UR6cEDUHBWNxjP6 g==; X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="350892148" X-IronPort-AV: E=Sophos;i="5.96,319,1665471600"; d="scan'208";a="350892148" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Jan 2023 02:14:18 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="659722891" X-IronPort-AV: E=Sophos;i="5.96,319,1665471600"; d="scan'208";a="659722891" Received: from glieseu-mobl.ger.corp.intel.com (HELO box.shutemov.name) ([10.252.52.1]) by fmsmga007-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Jan 2023 02:14:16 -0800 Received: by box.shutemov.name (Postfix, from userid 1000) id 76330109AF0; Thu, 12 Jan 2023 13:14:13 +0300 (+03) From: "Kirill A. Shutemov" To: Dave Hansen , Borislav Petkov , Andy Lutomirski Cc: Kuppuswamy Sathyanarayanan , Thomas Gleixner , Elena Reshetova , x86@kernel.org, linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: [PATCHv2 0/7] x86/tdx: Changes for TDX guest initialization Date: Thu, 12 Jan 2023 13:14:00 +0300 Message-Id: <20230112101407.24327-1-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.38.2 MIME-Version: 1.0 X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1754811451736842217?= X-GMAIL-MSGID: =?utf-8?q?1754811451736842217?= Several changes to TDX initialization: - Make early panic message visible to user; - Relax SEPT_VE_DISABLE for debug TD. It helps to investigate bugs resulting in access of unaccepted memory. - Make sure NOTIFY_ENABLES is off to eliminate possible source of random #VE. The patchset makes use of ReportFatalError TDVMCALL. The definition of the TDVMCALL has changed in recent GHCI update[1]. It now requires more arguments handled by __tdx_hypercall(). The patch that expands __tdx_hypercall() is the same as the patch included in TDX guest enabling for Hyper-V. [1] https://cdrdv2.intel.com/v1/dl/getContent/726790 v2: - Split the first patch; - Intoduce is_private_gpa(); - Apply Reviewed-by from Dave; Kirill A. Shutemov (7): x86/tdx: Fix typo in comment in __tdx_hypercall() x86/tdx: Add more registers to struct tdx_hypercall_args x86/tdx: Refactor __tdx_hypercall() to allow pass down more arguments x86/tdx: Expand __tdx_hypercall() to handle more arguments x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE x86/tdx: Relax SEPT_VE_DISABLE check for debug TD x86/tdx: Disable NOTIFY_ENABLES arch/x86/coco/tdx/tdcall.S | 83 ++++++++++++++++++++++--------- arch/x86/coco/tdx/tdx.c | 62 ++++++++++++++++++++++- arch/x86/include/asm/shared/tdx.h | 6 +++ arch/x86/kernel/asm-offsets.c | 6 +++ 4 files changed, 131 insertions(+), 26 deletions(-)