ccp/sev-dev.c is the software layer in psp that allows KVM to manage SEV/ES/SNP enabled VMs. Since psp API provides only primitive sev command invocation, KVM has to do extra processing that are specific only to psp with KVM level wrapper function. sev_bind_asid is such a KVM function that literally wraps around sev_guest_activate in psp with extra steps like psp data structure creation and error processing: invoking sev_guest_decommission on activation failure. Since sev_bind_asid code logic is purely psp specific, putting it into psp layer should make it more robust, since KVM does not have to worry about error handling for all asid binding callsites. So replace the KVM pointer in sev_bind_asid with primitive arguments: asid and handle; slightly change the name to sev_guest_bind_asid make it consistent with other psp APIs; add the error handling code inside sev_guest_bind_asid and; put it into the sev-dev.c. No functional change intended. Cc: Alper Gun <alpergun@xxxxxxxxxx> Cc: Borislav Petkov <bp@xxxxxxxxx> Cc: Brijesh Singh <brijesh.singh@xxxxxxx> Cc: David Rienjes <rientjes@xxxxxxxxxx> Cc: Marc Orr <marcorr@xxxxxxxxxx> Cc: John Allen <john.allen@xxxxxxx> Cc: Peter Gonda <pgonda@xxxxxxxxxx> Cc: Sean Christopherson <seanjc@xxxxxxxxxx> Cc: Tom Lendacky <thomas.lendacky@xxxxxxx> Cc: Vipin Sharma <vipinsh@xxxxxxxxxx> Acked-by: Brijesh Singh <brijesh.singh@xxxxxxx> Signed-off-by: Mingwei Zhang <mizhang@xxxxxxxxxx> --- arch/x86/kvm/svm/sev.c | 26 ++++---------------------- drivers/crypto/ccp/sev-dev.c | 15 +++++++++++++++ include/linux/psp-sev.h | 19 +++++++++++++++++++ 3 files changed, 38 insertions(+), 22 deletions(-) diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index b8b26a9c5369..157962aa4aff 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -252,20 +252,6 @@ static int sev_guest_init(struct kvm *kvm, struct kvm_sev_cmd *argp) return ret; } -static int sev_bind_asid(struct kvm *kvm, unsigned int handle, int *error) -{ - struct sev_data_activate activate; - int asid = sev_get_asid(kvm); - int ret; - - /* activate ASID on the given handle */ - activate.handle = handle; - activate.asid = asid; - ret = sev_guest_activate(&activate, error); - - return ret; -} - static int __sev_issue_cmd(int fd, int id, void *data, int *error) { struct fd f; @@ -336,11 +322,9 @@ static int sev_launch_start(struct kvm *kvm, struct kvm_sev_cmd *argp) goto e_free_session; /* Bind ASID to this guest */ - ret = sev_bind_asid(kvm, start.handle, error); - if (ret) { - sev_guest_decommission(start.handle, NULL); + ret = sev_guest_bind_asid(sev_get_asid(kvm), start.handle, error); + if (ret) goto e_free_session; - } /* return handle to userspace */ params.handle = start.handle; @@ -1385,11 +1369,9 @@ static int sev_receive_start(struct kvm *kvm, struct kvm_sev_cmd *argp) goto e_free_session; /* Bind ASID to this guest */ - ret = sev_bind_asid(kvm, start.handle, error); - if (ret) { - sev_guest_decommission(start.handle, NULL); + ret = sev_guest_bind_asid(sev_get_asid(kvm), start.handle, error); + if (ret) goto e_free_session; - } params.handle = start.handle; if (copy_to_user((void __user *)(uintptr_t)argp->data, diff --git a/drivers/crypto/ccp/sev-dev.c b/drivers/crypto/ccp/sev-dev.c index e2d49bedc0ef..325e79360d9e 100644 --- a/drivers/crypto/ccp/sev-dev.c +++ b/drivers/crypto/ccp/sev-dev.c @@ -903,6 +903,21 @@ int sev_guest_activate(struct sev_data_activate *data, int *error) } EXPORT_SYMBOL_GPL(sev_guest_activate); +int sev_guest_bind_asid(int asid, unsigned int handle, int *error) +{ + struct sev_data_activate activate; + int ret; + + /* activate ASID on the given handle */ + activate.handle = handle; + activate.asid = asid; + ret = sev_guest_activate(&activate, error); + if (ret) + sev_guest_decommission(handle, NULL); + return ret; +} +EXPORT_SYMBOL_GPL(sev_guest_bind_asid); + int sev_guest_decommission(unsigned int handle, int *error) { struct sev_data_decommission decommission; diff --git a/include/linux/psp-sev.h b/include/linux/psp-sev.h index 6c0f2f451c89..be50446ff3f1 100644 --- a/include/linux/psp-sev.h +++ b/include/linux/psp-sev.h @@ -595,6 +595,22 @@ int sev_guest_deactivate(struct sev_data_deactivate *data, int *error); */ int sev_guest_activate(struct sev_data_activate *data, int *error); +/** + * sev_guest_bind_asid - bind an ASID with VM and does decommission on failure + * + * @asid: current ASID of the VM + * @handle: handle of the VM to retrieve status + * @sev_ret: sev command return code + * + * Returns: + * 0 if the sev successfully processed the command + * -%ENODEV if the sev device is not available + * -%ENOTSUPP if the sev does not support SEV + * -%ETIMEDOUT if the sev command timed out + * -%EIO if the sev returned a non-zero return code + */ +int sev_guest_bind_asid(int asid, unsigned int handle, int *error); + /** * sev_guest_df_flush - perform SEV DF_FLUSH command * @@ -643,6 +659,9 @@ sev_guest_decommission(unsigned int handle, int *error) { return -ENODEV; } static inline int sev_guest_activate(struct sev_data_activate *data, int *error) { return -ENODEV; } +static inline int +sev_guest_bind_asid(int asid, unsigned int handle, int *error) { return -ENODEV; } + static inline int sev_guest_df_flush(int *error) { return -ENODEV; } static inline int -- 2.33.0.rc1.237.g0d66db33f3-goog