Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp59774pxb; Wed, 22 Sep 2021 15:57:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxqlO6obS9meVv5AvuTHl4WZSJ5EVvmYaPpPQzWN3aaU8t5xUChWit0rF97ZA0tbSFaFZgU X-Received: by 2002:a50:c31c:: with SMTP id a28mr2075470edb.384.1632351442697; Wed, 22 Sep 2021 15:57:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632351442; cv=none; d=google.com; s=arc-20160816; b=FlSmCVwgkBQxmmwueVpctjmcCLsWoHeMJFY4PZBfqfazNpaKQazQ1EdRYqO694mHLB DxymM0vDvwCVfAA6sh7uVnaCXbzZtU8E0/xO78jLaKBmo8GezEZT2XY8yvQhbyT+B0Zd RTaHsJfK+ncJCgonQSaFbk4PLN3MjW22kfsgycjVfPb6KPUMgY1uuy8O2JoiLYgrmbGH vjqX0JystSaLZoKEQyCX8WoH1sND/T1caUCopwn9DOO6nhMHH1ARM56T6QafFG+ZI9w2 RiWfE4ssa4GZFmp9a7nvGfgMb/tLSu6+5jEY28Ma0vFJ/Kwnr88X7ckdiTJifeo0Gq87 9mYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=x+wxBDNO36JsMhH2L3lIaWJk6PRGsTPsHAnqcFYhrmY=; b=KfetLC9rJZhE/qibGT0rKsQc1nxvLqO8rqc3Axrelk13xjz+yrs92eVlY8ut7yz3lC J7VCJSHZ3u+PnmVXoHp7HcmmrymPqi6bQsQ4cVhx25zZVMX9oZY/Cvsw4H2jqeAMxfE9 RdMwmWWGoUF6yOHoGCzjTzJApil0XenVO/7kpgZ0BMkX3nsmdwurkeaP1EjxsCXVKrmc weCVRPou1hUxoWyXjRf4JsfZn+/rb2r2bYOmDQcyb9X7GIBA1Cz9g5L2x2uV9QhlY5Ew 31l2TFSMNdaXrlQb5hKYuXJ15qtcPRHoaI/BSB668OzlzuYDZsOGza7zBBKxGIkeJcm5 hBIg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gv43si4262283ejc.88.2021.09.22.15.56.56; Wed, 22 Sep 2021 15:57:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238418AbhIVW4v (ORCPT + 99 others); Wed, 22 Sep 2021 18:56:51 -0400 Received: from mga01.intel.com ([192.55.52.88]:10397 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238369AbhIVW4Z (ORCPT ); Wed, 22 Sep 2021 18:56:25 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10115"; a="246164386" X-IronPort-AV: E=Sophos;i="5.85,315,1624345200"; d="scan'208";a="246164386" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Sep 2021 15:54:52 -0700 X-IronPort-AV: E=Sophos;i="5.85,315,1624345200"; d="scan'208";a="653457365" Received: from mnamagi-mobl1.gar.corp.intel.com (HELO skuppusw-desk1.amr.corp.intel.com) ([10.254.34.84]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Sep 2021 15:54:51 -0700 From: Kuppuswamy Sathyanarayanan To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H . Peter Anvin" Cc: Dave Hansen , Tony Luck , Dan Williams , Andi Kleen , Kirill Shutemov , Sean Christopherson , Kuppuswamy Sathyanarayanan , linux-kernel@vger.kernel.org Subject: [PATCH v6 07/10] x86/insn-eval: Introduce insn_decode_mmio() Date: Wed, 22 Sep 2021 15:52:36 -0700 Message-Id: <20210922225239.3501262-8-sathyanarayanan.kuppuswamy@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210922225239.3501262-1-sathyanarayanan.kuppuswamy@linux.intel.com> References: <20210922225239.3501262-1-sathyanarayanan.kuppuswamy@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Kirill A. Shutemov" In preparation for sharing MMIO instruction decode between SEV-ES and TDX, factor out the common decode into a new insn_decode_mmio() helper. For regular virtual machine, MMIO is handled by the VMM and KVM emulates instructions that caused MMIO. But, this model doesn't work for a secure VMs (like SEV or TDX) as VMM doesn't have access to the guest memory and register state. So, for TDX or SEV VMM needs assistance in handling MMIO. It induces exception in the guest. Guest has to decode the instruction and handle it on its own. The code is based on the current SEV MMIO implementation. Signed-off-by: Kirill A. Shutemov Reviewed-by: Andi Kleen Reviewed-by: Tony Luck Signed-off-by: Kuppuswamy Sathyanarayanan --- Changes since v5: * None Changes since v4: * None Changes since v3: * None Changes since v2: * None arch/x86/include/asm/insn-eval.h | 12 +++++ arch/x86/lib/insn-eval.c | 82 ++++++++++++++++++++++++++++++++ 2 files changed, 94 insertions(+) diff --git a/arch/x86/include/asm/insn-eval.h b/arch/x86/include/asm/insn-eval.h index 041f399153b9..4a4ca7e7be66 100644 --- a/arch/x86/include/asm/insn-eval.h +++ b/arch/x86/include/asm/insn-eval.h @@ -29,4 +29,16 @@ int insn_fetch_from_user_inatomic(struct pt_regs *regs, bool insn_decode_from_regs(struct insn *insn, struct pt_regs *regs, unsigned char buf[MAX_INSN_SIZE], int buf_size); +enum mmio_type { + MMIO_DECODE_FAILED, + MMIO_WRITE, + MMIO_WRITE_IMM, + MMIO_READ, + MMIO_READ_ZERO_EXTEND, + MMIO_READ_SIGN_EXTEND, + MMIO_MOVS, +}; + +enum mmio_type insn_decode_mmio(struct insn *insn, int *bytes); + #endif /* _ASM_X86_INSN_EVAL_H */ diff --git a/arch/x86/lib/insn-eval.c b/arch/x86/lib/insn-eval.c index fbaa3fa24bde..2ab29d8d6731 100644 --- a/arch/x86/lib/insn-eval.c +++ b/arch/x86/lib/insn-eval.c @@ -1559,3 +1559,85 @@ bool insn_decode_from_regs(struct insn *insn, struct pt_regs *regs, return true; } + +/** + * insn_decode_mmio() - Decode a MMIO instruction + * @insn: Structure to store decoded instruction + * @bytes: Returns size of memory operand + * + * Decodes instruction that used for Memory-mapped I/O. + * + * Returns: + * + * Type of the instruction. Size of the memory operand is stored in + * @bytes. If decode failed, MMIO_DECODE_FAILED returned. + */ +enum mmio_type insn_decode_mmio(struct insn *insn, int *bytes) +{ + int type = MMIO_DECODE_FAILED; + + *bytes = 0; + + insn_get_opcode(insn); + switch (insn->opcode.bytes[0]) { + case 0x88: /* MOV m8,r8 */ + *bytes = 1; + fallthrough; + case 0x89: /* MOV m16/m32/m64, r16/m32/m64 */ + if (!*bytes) + *bytes = insn->opnd_bytes; + type = MMIO_WRITE; + break; + + case 0xc6: /* MOV m8, imm8 */ + *bytes = 1; + fallthrough; + case 0xc7: /* MOV m16/m32/m64, imm16/imm32/imm64 */ + if (!*bytes) + *bytes = insn->opnd_bytes; + type = MMIO_WRITE_IMM; + break; + + case 0x8a: /* MOV r8, m8 */ + *bytes = 1; + fallthrough; + case 0x8b: /* MOV r16/r32/r64, m16/m32/m64 */ + if (!*bytes) + *bytes = insn->opnd_bytes; + type = MMIO_READ; + break; + + case 0xa4: /* MOVS m8, m8 */ + *bytes = 1; + fallthrough; + case 0xa5: /* MOVS m16/m32/m64, m16/m32/m64 */ + if (!*bytes) + *bytes = insn->opnd_bytes; + type = MMIO_MOVS; + break; + + case 0x0f: /* Two-byte instruction */ + switch (insn->opcode.bytes[1]) { + case 0xb6: /* MOVZX r16/r32/r64, m8 */ + *bytes = 1; + fallthrough; + case 0xb7: /* MOVZX r32/r64, m16 */ + if (!*bytes) + *bytes = 2; + type = MMIO_READ_ZERO_EXTEND; + break; + + case 0xbe: /* MOVSX r16/r32/r64, m8 */ + *bytes = 1; + fallthrough; + case 0xbf: /* MOVSX r32/r64, m16 */ + if (!*bytes) + *bytes = 2; + type = MMIO_READ_SIGN_EXTEND; + break; + } + break; + } + + return type; +} -- 2.25.1