Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp4936530pxb; Tue, 5 Oct 2021 13:42:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw0+puZzgyjdmCoyIYOKKdpBLZug5SDfNxGI4ygrUx3h7keiqqtavftWpHLx6w+TtiSYbuR X-Received: by 2002:a62:3287:0:b0:439:bfec:8374 with SMTP id y129-20020a623287000000b00439bfec8374mr33822928pfy.15.1633466574338; Tue, 05 Oct 2021 13:42:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633466574; cv=none; d=google.com; s=arc-20160816; b=x/Xua2zHiEXBeuzs3ScyZIxWdlirGEsUlB4qx2S46/brJBh5DupM/wCozZzZcZyvJf W/9aME/ysnBhVK8mo9wiuJ9bRC5ACt+BwmweJnJFj8tNXgKsZ1/3eVXIKS2xUyhjjSpr Mlq2dvZ5JWqW7kAGosXZnxdpX6pzI6737lFHc3wEu2eTG5wVBfpj/mYXrxXPvZNYGXEU ivz2y+x3qCP2yvWCRTOzmw5GIWQW58P9c/u8CZWg3sduA6vsntAx06W4K6NNZDjJBzv+ h5WO8xHkOYUucYbS2ENfINEQoU8wpiOXRj6MNakHfhuxgmaGexfd3R0DLupOw3w+Xopt GPFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=bcL18rmJeFhLsMhE0szHD71sCE1dlpN5hpkPmIZrQB4=; b=KimLj4xDXdi1RqoywWgqjVp14GfCLTcw1Dn5OBmZzTa1DaBjDAhESkqiTGNvcyKqvo 55C0lWysRdgBRr00twqlIzB9Omw3MiAd7N2N/2rlFRXiMaqmt5bXyYOmg6OpAZbbl9G5 VF2w5RvORSusyNo61dFezcrOIBNhwkWvFISOFXF9kxG2K4ITcx3T8ZDzYATy53WYGl1h t82jlOGOCyUgaWXm50iE69ZDtFv7qLIKdxuuZnFTzJDRYOaslm3d0WhiwQQ1LSsCfgKG YjJ0SNs3agLOnjvY5nMYAizPuKDUxoTfz5vtsebDP6GDtcOHcRlb0qRCiLnpxy9W/RKt tbOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w194si23576616pfd.360.2021.10.05.13.42.40; Tue, 05 Oct 2021 13:42:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231159AbhJEUnt (ORCPT + 99 others); Tue, 5 Oct 2021 16:43:49 -0400 Received: from mga07.intel.com ([134.134.136.100]:11157 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229920AbhJEUns (ORCPT ); Tue, 5 Oct 2021 16:43:48 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10128"; a="289354584" X-IronPort-AV: E=Sophos;i="5.85,349,1624345200"; d="scan'208";a="289354584" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Oct 2021 13:41:57 -0700 X-IronPort-AV: E=Sophos;i="5.85,349,1624345200"; d="scan'208";a="523979450" Received: from alyee-mobl.amr.corp.intel.com (HELO skuppusw-desk1.amr.corp.intel.com) ([10.254.5.222]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Oct 2021 13:41:56 -0700 From: Kuppuswamy Sathyanarayanan To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, Paolo Bonzini , David Hildenbrand , Andrea Arcangeli , Josh Poimboeuf , "H . Peter Anvin" Cc: Dave Hansen , Tony Luck , Dan Williams , Andi Kleen , Kirill Shutemov , Sean Christopherson , Kuppuswamy Sathyanarayanan , linux-kernel@vger.kernel.org Subject: [PATCH v7 00/10] Add TDX Guest Support (#VE handler support) Date: Tue, 5 Oct 2021 13:41:26 -0700 Message-Id: <20211005204136.1812078-1-sathyanarayanan.kuppuswamy@linux.intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi All, Intel's Trust Domain Extensions (TDX) protect guest VMs from malicious hosts and some physical attacks. This series adds #VE handler support, for port I/O, MMIO and MWAIT/MONITOR features in TDX guest. This series is the continuation of the patch series titled "Add TDX Guest Support (Initial support)" which added initial support for TDX guests. You can find the patchset in the following link. [set 1, v8] - https://lore.kernel.org/lkml/20211005025205.1784480-1-sathyanarayanan.kuppuswamy@linux.intel.com/ Also please note that this series alone is not necessarily fully functional. You can find TDX related documents in the following link. https://software.intel.com/content/www/br/pt/develop/articles/intel-trust-domain-extensions.html Changes since v6: * Included section titles in spec references Changes since v5: * Rebased on top of v5.15-rc1. * Rebased on top of Tom Landeckys latest CC support patches. Changes since v4: * Renamed tdg_ prefix to tdx_. * Rest of changelogs are included in patches in-line. Changes since v3: * Rebased on top of Tom Lendacky protected guest changes. * Rest of changelogs are included in patches in-line. Changes since v2: * Rebased on top of v5.14-rc1. * Rest of changelogs are included in patches in-line. Changes since v1: * Rebased on top of TDX guest set 1 patches (which had some core API changes). * Moved "x86/tdx: Add early_is_tdx_guest() interface" patch from set 1 patch series to this patchset (since it is only used in early I/O support case). * Rest of changelogs are included in patches in-line. Andi Kleen (1): x86/tdx: Handle early IO operations Kirill A. Shutemov (6): x86/io: Allow to override inX() and outX() implementation x86/tdx: Handle port I/O x86/insn-eval: Introduce insn_get_modrm_reg_ptr() x86/insn-eval: Introduce insn_decode_mmio() x86/sev-es: Use insn_decode_mmio() for MMIO implementation x86/tdx: Handle in-kernel MMIO Kuppuswamy Sathyanarayanan (3): x86/tdx: Add early_is_tdx_guest() interface x86/tdx: Handle port I/O in decompression code x86/tdx: Handle MWAIT and MONITOR arch/x86/boot/compressed/Makefile | 2 + arch/x86/boot/compressed/tdcall.S | 3 + arch/x86/boot/compressed/tdx.c | 31 +++++ arch/x86/boot/cpuflags.c | 12 +- arch/x86/boot/cpuflags.h | 2 + arch/x86/include/asm/insn-eval.h | 13 ++ arch/x86/include/asm/io.h | 24 +++- arch/x86/include/asm/tdx.h | 64 +++++++++ arch/x86/kernel/cpu/intel.c | 1 + arch/x86/kernel/head64.c | 3 + arch/x86/kernel/sev.c | 171 ++++++------------------ arch/x86/kernel/tdx.c | 211 ++++++++++++++++++++++++++++++ arch/x86/lib/insn-eval.c | 102 +++++++++++++++ include/linux/cc_platform.h | 11 ++ 14 files changed, 511 insertions(+), 139 deletions(-) create mode 100644 arch/x86/boot/compressed/tdcall.S create mode 100644 arch/x86/boot/compressed/tdx.c -- 2.25.1