On 05/19/20 23:50, Lendacky, Thomas wrote:
> BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
> 
> Under SEV-ES, a MSR_PROT intercept generates a #VC exception. VMGEXIT must
> be used to allow the hypervisor to handle this intercept.
> 
> Add support to construct the required GHCB values to support an MSR_PROT
> NAE event. Parse the instruction that generated the #VC exception to
> determine whether it is RDMSR or WRMSR, setting the required register
> register values in the GHCB and creating the proper SW_EXIT_INFO1 value in
> the GHCB.
> 
> Cc: Jordan Justen <jordan.l.jus...@intel.com>
> Cc: Laszlo Ersek <ler...@redhat.com>
> Cc: Ard Biesheuvel <ard.biesheu...@arm.com>
> Signed-off-by: Tom Lendacky <thomas.lenda...@amd.com>
> ---
>  .../Library/VmgExitLib/X64/VmgExitVcHandler.c | 63 +++++++++++++++++++
>  1 file changed, 63 insertions(+)
> 
> diff --git a/OvmfPkg/Library/VmgExitLib/X64/VmgExitVcHandler.c 
> b/OvmfPkg/Library/VmgExitLib/X64/VmgExitVcHandler.c
> index 2f62795edf61..1c6b472a47c4 100644
> --- a/OvmfPkg/Library/VmgExitLib/X64/VmgExitVcHandler.c
> +++ b/OvmfPkg/Library/VmgExitLib/X64/VmgExitVcHandler.c
> @@ -411,6 +411,65 @@ UnsupportedExit (
>    return Status;
>  }
>  
> +/**
> +  Handle an MSR event.
> +
> +  Use the VMGEXIT instruction to handle either a RDMSR or WRMSR event.
> +
> +  @param[in, out] Ghcb             Pointer to the Guest-Hypervisor 
> Communication
> +                                   Block
> +  @param[in, out] Regs             x64 processor context
> +  @param[in]      InstructionData  Instruction parsing context
> +
> +  @retval 0                        Event handled successfully
> +  @retval Others                   New exception value to propagate
> +
> +**/
> +STATIC
> +UINT64
> +MsrExit (
> +  IN OUT GHCB                     *Ghcb,
> +  IN OUT EFI_SYSTEM_CONTEXT_X64   *Regs,
> +  IN     SEV_ES_INSTRUCTION_DATA  *InstructionData
> +  )
> +{
> +  UINT64  ExitInfo1, Status;
> +
> +  ExitInfo1 = 0;
> +
> +  switch (*(InstructionData->OpCodes + 1)) {
> +  case 0x30: // WRMSR

This comment looks great!

> +    ExitInfo1 = 1;
> +    Ghcb->SaveArea.Rax = Regs->Rax;
> +    GhcbSetRegValid (Ghcb, GhcbRax);
> +    Ghcb->SaveArea.Rdx = Regs->Rdx;
> +    GhcbSetRegValid (Ghcb, GhcbRdx);
> +    /* Fallthrough */

(1) This comment is very appreciated (I vaguely remember that the coding
style actually requires it), but we're supposed to put it like this:

    //
    // fall through
    //

(See: "git grep -B1 -A1 -i 'fall through'".)

> +  case 0x32: // RDMSR
> +    Ghcb->SaveArea.Rcx = Regs->Rcx;
> +    GhcbSetRegValid (Ghcb, GhcbRcx);
> +    break;
> +  default:
> +    return UnsupportedExit (Ghcb, Regs, InstructionData);
> +  }
> +
> +  Status = VmgExit (Ghcb, SVM_EXIT_MSR, ExitInfo1, 0);
> +  if (Status) {

(2) As usual, please check (Status > 0) or (Status != 0) explicitly.

Acked-by: Laszlo Ersek <ler...@redhat.com>

Thanks
Laszlo

> +    return Status;
> +  }
> +
> +  if (!ExitInfo1) {
> +    if (!GhcbIsRegValid (Ghcb, GhcbRax) ||
> +        !GhcbIsRegValid (Ghcb, GhcbRdx)) {
> +      return UnsupportedExit (Ghcb, Regs, InstructionData);
> +    }
> +    Regs->Rax = Ghcb->SaveArea.Rax;
> +    Regs->Rdx = Ghcb->SaveArea.Rdx;
> +  }
> +
> +  return 0;
> +}
> +
>  #define IOIO_TYPE_STR       (1 << 2)
>  #define IOIO_TYPE_IN        1
>  #define IOIO_TYPE_INS       (IOIO_TYPE_IN | IOIO_TYPE_STR)
> @@ -743,6 +802,10 @@ VmgExitHandleVc (
>      NaeExit = IoioExit;
>      break;
>  
> +  case SVM_EXIT_MSR:
> +    NaeExit = MsrExit;
> +    break;
> +
>    default:
>      NaeExit = UnsupportedExit;
>    }
> 


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.

View/Reply Online (#60111): https://edk2.groups.io/g/devel/message/60111
Mute This Topic: https://groups.io/mt/74336570/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to