From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E6AACC4338F for ; Wed, 4 Aug 2021 19:19:32 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id C69DC60F58 for ; Wed, 4 Aug 2021 19:19:32 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234316AbhHDTTo (ORCPT ); Wed, 4 Aug 2021 15:19:44 -0400 Received: from mga18.intel.com ([134.134.136.126]:32885 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229609AbhHDTTn (ORCPT ); Wed, 4 Aug 2021 15:19:43 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10066"; a="201177509" X-IronPort-AV: E=Sophos;i="5.84,295,1620716400"; d="scan'208";a="201177509" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Aug 2021 12:19:29 -0700 X-IronPort-AV: E=Sophos;i="5.84,295,1620716400"; d="scan'208";a="467228209" Received: from mjkendri-mobl.amr.corp.intel.com (HELO skuppusw-desk1.amr.corp.intel.com) ([10.254.17.117]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Aug 2021 12:19:28 -0700 From: Kuppuswamy Sathyanarayanan To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Peter Zijlstra , Andy Lutomirski Cc: Peter H Anvin , Dave Hansen , Tony Luck , Dan Williams , Andi Kleen , Kirill Shutemov , Sean Christopherson , Kuppuswamy Sathyanarayanan , x86@kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v4 00/10] Add TDX Guest Support (#VE handler support) Date: Wed, 4 Aug 2021 12:18:45 -0700 Message-Id: <20210804191855.2901927-1-sathyanarayanan.kuppuswamy@linux.intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi All, Intel's Trust Domain Extensions (TDX) protect guest VMs from malicious hosts and some physical attacks. This series adds #VE handler support, for port I/O, MMIO and MWAIT/MONITOR features in TDX guest. This series is the continuation of the patch series titled "Add TDX Guest Support (Initial support)" which added initial support for TDX guests. You can find the patchset in the following link. [set 1, v5] - https://lore.kernel.org/patchwork/project/lkml/list/?series=510805 Also please note that this series alone is not necessarily fully functional. You can find TDX related documents in the following link. https://software.intel.com/content/www/br/pt/develop/articles/intel-trust-domain-extensions.html Changes since v3: * Rebased on top of Tom Lendacky protected guest changes. * Rest of changelogs are included in patches in-line. Changes since v2: * Rebased on top of v5.14-rc1. * Rest of changelogs are included in patches in-line. Changes since v1: * Rebased on top of TDX guest set 1 patches (which had some core API changes). * Moved "x86/tdx: Add early_is_tdx_guest() interface" patch from set 1 patch series to this patchset (since it is only used in early I/O support case). * Rest of changelogs are included in patches in-line. Andi Kleen (1): x86/tdx: Handle early IO operations Kirill A. Shutemov (6): x86/io: Allow to override inX() and outX() implementation x86/tdx: Handle port I/O x86/insn-eval: Introduce insn_get_modrm_reg_ptr() x86/insn-eval: Introduce insn_decode_mmio() x86/sev-es: Use insn_decode_mmio() for MMIO implementation x86/tdx: Handle in-kernel MMIO Kuppuswamy Sathyanarayanan (3): x86/tdx: Add early_is_tdx_guest() interface x86/tdx: Handle port I/O in decompression code x86/tdx: Handle MWAIT and MONITOR arch/x86/boot/compressed/Makefile | 2 + arch/x86/boot/compressed/tdcall.S | 3 + arch/x86/boot/compressed/tdx.c | 31 +++++ arch/x86/boot/cpuflags.c | 12 +- arch/x86/boot/cpuflags.h | 2 + arch/x86/include/asm/insn-eval.h | 13 ++ arch/x86/include/asm/io.h | 23 +++- arch/x86/include/asm/tdx.h | 66 ++++++++++ arch/x86/kernel/head64.c | 3 + arch/x86/kernel/sev.c | 171 ++++++------------------- arch/x86/kernel/tdx.c | 205 ++++++++++++++++++++++++++++++ arch/x86/lib/insn-eval.c | 102 +++++++++++++++ include/linux/protected_guest.h | 1 + 13 files changed, 495 insertions(+), 139 deletions(-) create mode 100644 arch/x86/boot/compressed/tdcall.S create mode 100644 arch/x86/boot/compressed/tdx.c -- 2.25.1