blob: 1e19a4de441f43eec7f67fe36aafacbcbe1791d4 [file] [log] [blame]
Thomas Gleixner20c8ccb2019-06-04 10:11:32 +02001// SPDX-License-Identifier: GPL-2.0-only
Avi Kivity6aa8b732006-12-10 02:21:36 -08002/******************************************************************************
Avi Kivity56e82312009-08-12 15:04:37 +03003 * emulate.c
Avi Kivity6aa8b732006-12-10 02:21:36 -08004 *
5 * Generic x86 (32-bit and 64-bit) instruction decoder and emulator.
6 *
7 * Copyright (c) 2005 Keir Fraser
8 *
9 * Linux coding style, mod r/m decoder, segment base fixes, real-mode
Rusty Russelldcc07662007-07-17 23:16:56 +100010 * privileged instructions:
Avi Kivity6aa8b732006-12-10 02:21:36 -080011 *
12 * Copyright (C) 2006 Qumranet
Nicolas Kaiser9611c182010-10-06 14:23:22 +020013 * Copyright 2010 Red Hat, Inc. and/or its affiliates.
Avi Kivity6aa8b732006-12-10 02:21:36 -080014 *
15 * Avi Kivity <avi@qumranet.com>
16 * Yaniv Kamay <yaniv@qumranet.com>
17 *
Avi Kivity6aa8b732006-12-10 02:21:36 -080018 * From: xen-unstable 10676:af9809f51f81a3c43f276f00c81a52ef558afda4
19 */
20
Avi Kivityedf88412007-12-16 11:02:48 +020021#include <linux/kvm_host.h>
Marcelo Tosatti5fdbf972008-06-27 14:58:02 -030022#include "kvm_cache_regs.h"
Sean Christopherson2f728d62020-02-18 15:29:49 -080023#include "kvm_emulate.h"
Avi Kivityb7d491e2013-01-04 16:18:49 +020024#include <linux/stringify.h>
Nadav Amit3db176d2015-04-19 21:12:59 +030025#include <asm/debugreg.h>
Peter Zijlstra1a29b5b2018-01-25 10:58:13 +010026#include <asm/nospec-branch.h>
Avi Kivity6aa8b732006-12-10 02:21:36 -080027
Avi Kivity3eeb3282010-01-21 15:31:48 +020028#include "x86.h"
Gleb Natapov38ba30b2010-03-18 15:20:17 +020029#include "tss.h"
Yu Zhangd1cd3ce2017-08-24 20:27:53 +080030#include "mmu.h"
Arbel Moshe2d7921c2018-03-12 13:12:53 +020031#include "pmu.h"
Andre Przywarae99f0502009-06-17 15:50:33 +020032
Avi Kivity6aa8b732006-12-10 02:21:36 -080033/*
Avi Kivitya99455492011-09-13 10:45:41 +030034 * Operand types
35 */
Avi Kivityb1ea50b2011-09-13 10:45:42 +030036#define OpNone 0ull
37#define OpImplicit 1ull /* No generic decode */
38#define OpReg 2ull /* Register */
39#define OpMem 3ull /* Memory */
40#define OpAcc 4ull /* Accumulator: AL/AX/EAX/RAX */
41#define OpDI 5ull /* ES:DI/EDI/RDI */
42#define OpMem64 6ull /* Memory, 64-bit */
43#define OpImmUByte 7ull /* Zero-extended 8-bit immediate */
44#define OpDX 8ull /* DX register */
Avi Kivity4dd6a572011-09-13 10:45:43 +030045#define OpCL 9ull /* CL register (for shifts) */
46#define OpImmByte 10ull /* 8-bit sign extended immediate */
47#define OpOne 11ull /* Implied 1 */
Nadav Amit5e2c6882012-12-06 21:55:10 -020048#define OpImm 12ull /* Sign extended up to 32-bit immediate */
Avi Kivity0fe59122011-09-13 10:45:47 +030049#define OpMem16 13ull /* Memory operand (16-bit). */
50#define OpMem32 14ull /* Memory operand (32-bit). */
51#define OpImmU 15ull /* Immediate operand, zero extended */
52#define OpSI 16ull /* SI/ESI/RSI */
53#define OpImmFAddr 17ull /* Immediate far address */
54#define OpMemFAddr 18ull /* Far address in memory */
55#define OpImmU16 19ull /* Immediate operand, 16 bits, zero extended */
Avi Kivityc191a7a2011-09-13 10:45:49 +030056#define OpES 20ull /* ES */
57#define OpCS 21ull /* CS */
58#define OpSS 22ull /* SS */
59#define OpDS 23ull /* DS */
60#define OpFS 24ull /* FS */
61#define OpGS 25ull /* GS */
Avi Kivity28867ce2012-01-16 15:08:44 +020062#define OpMem8 26ull /* 8-bit zero extended memory operand */
Nadav Amit5e2c6882012-12-06 21:55:10 -020063#define OpImm64 27ull /* Sign extended 16/32/64-bit immediate */
Paolo Bonzini7fa57952013-05-09 11:32:50 +020064#define OpXLat 28ull /* memory at BX/EBX/RBX + zero-extended AL */
Avi Kivity820207c2013-02-09 11:31:45 +020065#define OpAccLo 29ull /* Low part of extended acc (AX/AX/EAX/RAX) */
66#define OpAccHi 30ull /* High part of extended acc (-/DX/EDX/RDX) */
Avi Kivitya99455492011-09-13 10:45:41 +030067
Avi Kivity0fe59122011-09-13 10:45:47 +030068#define OpBits 5 /* Width of operand field */
Avi Kivityb1ea50b2011-09-13 10:45:42 +030069#define OpMask ((1ull << OpBits) - 1)
Avi Kivitya99455492011-09-13 10:45:41 +030070
71/*
Avi Kivity6aa8b732006-12-10 02:21:36 -080072 * Opcode effective-address decode tables.
73 * Note that we only emulate instructions that have at least one memory
74 * operand (excluding implicit stack references). We assume that stack
75 * references and instruction fetches will never occur in special memory
76 * areas that require emulation. So, for example, 'mov <imm>,<reg>' need
77 * not be handled.
78 */
79
80/* Operand sizes: 8-bit operands or specified/overridden size. */
Avi Kivityab85b12b2010-07-29 15:11:49 +030081#define ByteOp (1<<0) /* 8-bit operands. */
Avi Kivity6aa8b732006-12-10 02:21:36 -080082/* Destination operand type. */
Avi Kivitya99455492011-09-13 10:45:41 +030083#define DstShift 1
84#define ImplicitOps (OpImplicit << DstShift)
85#define DstReg (OpReg << DstShift)
86#define DstMem (OpMem << DstShift)
87#define DstAcc (OpAcc << DstShift)
88#define DstDI (OpDI << DstShift)
89#define DstMem64 (OpMem64 << DstShift)
Nadav Amit16bebef2014-12-25 02:52:18 +020090#define DstMem16 (OpMem16 << DstShift)
Avi Kivitya99455492011-09-13 10:45:41 +030091#define DstImmUByte (OpImmUByte << DstShift)
92#define DstDX (OpDX << DstShift)
Avi Kivity820207c2013-02-09 11:31:45 +020093#define DstAccLo (OpAccLo << DstShift)
Avi Kivitya99455492011-09-13 10:45:41 +030094#define DstMask (OpMask << DstShift)
Avi Kivity6aa8b732006-12-10 02:21:36 -080095/* Source operand type. */
Avi Kivity0fe59122011-09-13 10:45:47 +030096#define SrcShift 6
97#define SrcNone (OpNone << SrcShift)
98#define SrcReg (OpReg << SrcShift)
99#define SrcMem (OpMem << SrcShift)
100#define SrcMem16 (OpMem16 << SrcShift)
101#define SrcMem32 (OpMem32 << SrcShift)
102#define SrcImm (OpImm << SrcShift)
103#define SrcImmByte (OpImmByte << SrcShift)
104#define SrcOne (OpOne << SrcShift)
105#define SrcImmUByte (OpImmUByte << SrcShift)
106#define SrcImmU (OpImmU << SrcShift)
107#define SrcSI (OpSI << SrcShift)
Paolo Bonzini7fa57952013-05-09 11:32:50 +0200108#define SrcXLat (OpXLat << SrcShift)
Avi Kivity0fe59122011-09-13 10:45:47 +0300109#define SrcImmFAddr (OpImmFAddr << SrcShift)
110#define SrcMemFAddr (OpMemFAddr << SrcShift)
111#define SrcAcc (OpAcc << SrcShift)
112#define SrcImmU16 (OpImmU16 << SrcShift)
Nadav Amit5e2c6882012-12-06 21:55:10 -0200113#define SrcImm64 (OpImm64 << SrcShift)
Avi Kivity0fe59122011-09-13 10:45:47 +0300114#define SrcDX (OpDX << SrcShift)
Avi Kivity28867ce2012-01-16 15:08:44 +0200115#define SrcMem8 (OpMem8 << SrcShift)
Avi Kivity820207c2013-02-09 11:31:45 +0200116#define SrcAccHi (OpAccHi << SrcShift)
Avi Kivity0fe59122011-09-13 10:45:47 +0300117#define SrcMask (OpMask << SrcShift)
Marcelo Tosatti221192b2011-05-30 15:23:14 -0300118#define BitOp (1<<11)
119#define MemAbs (1<<12) /* Memory operand is absolute displacement */
120#define String (1<<13) /* String instruction (rep capable) */
121#define Stack (1<<14) /* Stack instruction (push/pop) */
122#define GroupMask (7<<15) /* Opcode uses one of the group mechanisms */
123#define Group (1<<15) /* Bits 3:5 of modrm byte extend opcode */
124#define GroupDual (2<<15) /* Alternate decoding of mod == 3 */
125#define Prefix (3<<15) /* Instruction varies with 66/f2/f3 prefix */
126#define RMExt (4<<15) /* Opcode extension in ModRM r/m if mod == 3 */
Gleb Natapov045a2822012-12-20 16:57:43 +0200127#define Escape (5<<15) /* Escape to coprocessor instruction */
Nadav Amit39f062f2014-11-26 15:47:18 +0200128#define InstrDual (6<<15) /* Alternate instruction decoding of mod == 3 */
Nadav Amit2276b512015-01-26 09:32:24 +0200129#define ModeDual (7<<15) /* Different instruction for 32/64 bit */
Marcelo Tosatti221192b2011-05-30 15:23:14 -0300130#define Sse (1<<18) /* SSE Vector instruction */
Avi Kivity20c29ff2011-09-13 10:45:44 +0300131/* Generic ModRM decode. */
132#define ModRM (1<<19)
133/* Destination is only written; never read. */
134#define Mov (1<<20)
Mohammed Gamald8769fe2009-08-23 14:24:25 +0300135/* Misc flags */
Joerg Roedel8ea7d6a2011-04-04 12:39:26 +0200136#define Prot (1<<21) /* instruction generates #UD if not in prot-mode */
Borislav Petkovb51e9742013-09-22 16:44:52 +0200137#define EmulateOnUD (1<<22) /* Emulate if unsupported by the host */
Avi Kivity5a506b12010-08-01 15:10:29 +0300138#define NoAccess (1<<23) /* Don't access memory (lea/invlpg/verr etc) */
Avi Kivity7f9b4b72010-08-01 14:46:54 +0300139#define Op3264 (1<<24) /* Operand is 64b in long mode, 32b otherwise */
Avi Kivity047a4812010-07-26 14:37:47 +0300140#define Undefined (1<<25) /* No Such Instruction */
Gleb Natapovd380a5e2010-02-10 14:21:36 +0200141#define Lock (1<<26) /* lock prefix is allowed for the instruction */
Gleb Natapove92805a2010-02-10 14:21:35 +0200142#define Priv (1<<27) /* instruction generates #GP if current CPL != 0 */
Mohammed Gamald8769fe2009-08-23 14:24:25 +0300143#define No64 (1<<28)
Xiao Guangrongd5ae7ce2011-09-22 16:53:46 +0800144#define PageTable (1 << 29) /* instruction used to write page table */
Gleb Natapov0b789ee2013-04-11 11:59:55 +0300145#define NotImpl (1 << 30) /* instruction is not implemented */
Guillaume Thouvenin0dc8d102008-12-04 14:26:42 +0100146/* Source 2 operand type */
Gleb Natapov0b789ee2013-04-11 11:59:55 +0300147#define Src2Shift (31)
Avi Kivity4dd6a572011-09-13 10:45:43 +0300148#define Src2None (OpNone << Src2Shift)
Avi Kivityab2c5ce2013-02-09 11:31:46 +0200149#define Src2Mem (OpMem << Src2Shift)
Avi Kivity4dd6a572011-09-13 10:45:43 +0300150#define Src2CL (OpCL << Src2Shift)
151#define Src2ImmByte (OpImmByte << Src2Shift)
152#define Src2One (OpOne << Src2Shift)
153#define Src2Imm (OpImm << Src2Shift)
Avi Kivityc191a7a2011-09-13 10:45:49 +0300154#define Src2ES (OpES << Src2Shift)
155#define Src2CS (OpCS << Src2Shift)
156#define Src2SS (OpSS << Src2Shift)
157#define Src2DS (OpDS << Src2Shift)
158#define Src2FS (OpFS << Src2Shift)
159#define Src2GS (OpGS << Src2Shift)
Avi Kivity4dd6a572011-09-13 10:45:43 +0300160#define Src2Mask (OpMask << Src2Shift)
Avi Kivitycbe2c9d2012-04-09 18:40:02 +0300161#define Mmx ((u64)1 << 40) /* MMX Vector instruction */
Radim Krčmář48520182016-11-08 20:54:17 +0100162#define AlignMask ((u64)7 << 41)
Avi Kivity1c11b372012-04-09 18:39:59 +0300163#define Aligned ((u64)1 << 41) /* Explicitly aligned (e.g. MOVDQA) */
Radim Krčmář48520182016-11-08 20:54:17 +0100164#define Unaligned ((u64)2 << 41) /* Explicitly unaligned (e.g. MOVDQU) */
165#define Avx ((u64)3 << 41) /* Advanced Vector Extensions */
166#define Aligned16 ((u64)4 << 41) /* Aligned to 16 byte boundary (e.g. FXSAVE) */
Avi Kivitye28bbd42013-01-04 16:18:48 +0200167#define Fastop ((u64)1 << 44) /* Use opcode::u.fastop */
Avi Kivityb6744dc2013-01-04 16:18:50 +0200168#define NoWrite ((u64)1 << 45) /* No writeback */
Avi Kivityfb32b1e2013-02-09 11:31:44 +0200169#define SrcWrite ((u64)1 << 46) /* Write back src operand */
Nadav Amit9b88ae92014-05-25 23:05:21 +0300170#define NoMod ((u64)1 << 47) /* Mod field is ignored */
Paolo Bonzinid40a6892014-03-27 11:58:02 +0100171#define Intercept ((u64)1 << 48) /* Has valid intercept field */
172#define CheckPerm ((u64)1 << 49) /* Has valid check_perm field */
Nadav Amit68efa762014-06-18 17:19:35 +0300173#define PrivUD ((u64)1 << 51) /* #UD instead of #GP on CPL > 0 */
Nadav Amit58b70752014-10-24 11:35:09 +0300174#define NearBranch ((u64)1 << 52) /* Near branches */
Nadav Amited9aad22014-11-02 11:55:00 +0200175#define No16 ((u64)1 << 53) /* No 16 bit operand */
Nadav Amitab708092014-12-25 02:52:21 +0200176#define IncSP ((u64)1 << 54) /* SP is incremented before ModRM calc */
Tom Lendacky0f89b202016-12-14 14:59:23 -0500177#define TwoMemOp ((u64)1 << 55) /* Instruction has two memory operand */
Avi Kivity6aa8b732006-12-10 02:21:36 -0800178
Avi Kivity820207c2013-02-09 11:31:45 +0200179#define DstXacc (DstAccLo | SrcAccHi | SrcWrite)
Avi Kivity6aa8b732006-12-10 02:21:36 -0800180
Avi Kivityd0e53322010-07-29 15:11:54 +0300181#define X2(x...) x, x
182#define X3(x...) X2(x), x
183#define X4(x...) X2(x), X2(x)
184#define X5(x...) X4(x), x
185#define X6(x...) X4(x), X2(x)
186#define X7(x...) X4(x), X3(x)
187#define X8(x...) X4(x), X4(x)
188#define X16(x...) X8(x), X8(x)
Avi Kivity83babbc2010-07-26 14:37:39 +0300189
Avi Kivitye28bbd42013-01-04 16:18:48 +0200190#define NR_FASTOP (ilog2(sizeof(ulong)) + 1)
191#define FASTOP_SIZE 8
192
Avi Kivityd65b1de2010-07-29 15:11:35 +0300193struct opcode {
Avi Kivityb1ea50b2011-09-13 10:45:42 +0300194 u64 flags : 56;
195 u64 intercept : 8;
Avi Kivity120df892010-07-29 15:11:39 +0300196 union {
Avi Kivityef65c882010-07-29 15:11:51 +0300197 int (*execute)(struct x86_emulate_ctxt *ctxt);
Mathias Krausefd0a0d82012-08-30 01:30:15 +0200198 const struct opcode *group;
199 const struct group_dual *gdual;
200 const struct gprefix *gprefix;
Gleb Natapov045a2822012-12-20 16:57:43 +0200201 const struct escape *esc;
Nadav Amit39f062f2014-11-26 15:47:18 +0200202 const struct instr_dual *idual;
Nadav Amit2276b512015-01-26 09:32:24 +0200203 const struct mode_dual *mdual;
Avi Kivitye28bbd42013-01-04 16:18:48 +0200204 void (*fastop)(struct fastop *fake);
Avi Kivity120df892010-07-29 15:11:39 +0300205 } u;
Joerg Roedeld09beab2011-04-04 12:39:25 +0200206 int (*check_perm)(struct x86_emulate_ctxt *ctxt);
Avi Kivity120df892010-07-29 15:11:39 +0300207};
208
209struct group_dual {
210 struct opcode mod012[8];
211 struct opcode mod3[8];
Avi Kivityd65b1de2010-07-29 15:11:35 +0300212};
213
Avi Kivity0d7cdee2011-03-29 11:34:38 +0200214struct gprefix {
215 struct opcode pfx_no;
216 struct opcode pfx_66;
217 struct opcode pfx_f2;
218 struct opcode pfx_f3;
219};
220
Gleb Natapov045a2822012-12-20 16:57:43 +0200221struct escape {
222 struct opcode op[8];
223 struct opcode high[64];
224};
225
Nadav Amit39f062f2014-11-26 15:47:18 +0200226struct instr_dual {
227 struct opcode mod012;
228 struct opcode mod3;
229};
230
Nadav Amit2276b512015-01-26 09:32:24 +0200231struct mode_dual {
232 struct opcode mode32;
233 struct opcode mode64;
234};
235
Mohammed Gamal62bd4302010-07-28 12:38:40 +0300236#define EFLG_RESERVED_ZEROS_MASK 0xffc0802a
Mohammed Gamal62bd4302010-07-28 12:38:40 +0300237
Nadav Amit3dc4bc42014-12-25 02:52:19 +0200238enum x86_transfer_type {
239 X86_TRANSFER_NONE,
240 X86_TRANSFER_CALL_JMP,
241 X86_TRANSFER_RET,
242 X86_TRANSFER_TASK_SWITCH,
243};
244
Avi Kivitydd856ef2012-08-27 23:46:17 +0300245static ulong reg_read(struct x86_emulate_ctxt *ctxt, unsigned nr)
246{
247 if (!(ctxt->regs_valid & (1 << nr))) {
248 ctxt->regs_valid |= 1 << nr;
249 ctxt->_regs[nr] = ctxt->ops->read_gpr(ctxt, nr);
250 }
251 return ctxt->_regs[nr];
252}
253
254static ulong *reg_write(struct x86_emulate_ctxt *ctxt, unsigned nr)
255{
256 ctxt->regs_valid |= 1 << nr;
257 ctxt->regs_dirty |= 1 << nr;
258 return &ctxt->_regs[nr];
259}
260
261static ulong *reg_rmw(struct x86_emulate_ctxt *ctxt, unsigned nr)
262{
263 reg_read(ctxt, nr);
264 return reg_write(ctxt, nr);
265}
266
267static void writeback_registers(struct x86_emulate_ctxt *ctxt)
268{
269 unsigned reg;
270
271 for_each_set_bit(reg, (ulong *)&ctxt->regs_dirty, 16)
272 ctxt->ops->write_gpr(ctxt, reg, ctxt->_regs[reg]);
273}
274
275static void invalidate_registers(struct x86_emulate_ctxt *ctxt)
276{
277 ctxt->regs_dirty = 0;
278 ctxt->regs_valid = 0;
279}
280
Avi Kivity6aa8b732006-12-10 02:21:36 -0800281/*
Avi Kivity6aa8b732006-12-10 02:21:36 -0800282 * These EFLAGS bits are restored from saved value during emulation, and
283 * any changes are written back to the saved value after emulation.
284 */
Nadav Amit0efb0442015-03-29 16:33:03 +0300285#define EFLAGS_MASK (X86_EFLAGS_OF|X86_EFLAGS_SF|X86_EFLAGS_ZF|X86_EFLAGS_AF|\
286 X86_EFLAGS_PF|X86_EFLAGS_CF)
Avi Kivity6aa8b732006-12-10 02:21:36 -0800287
Avi Kivitydda96d82008-11-26 15:14:10 +0200288#ifdef CONFIG_X86_64
289#define ON64(x) x
290#else
291#define ON64(x)
292#endif
293
Qian Caib78a8552020-02-17 11:48:26 -0500294/*
295 * fastop functions have a special calling convention:
296 *
297 * dst: rax (in/out)
298 * src: rdx (in/out)
299 * src2: rcx (in)
300 * flags: rflags (in/out)
301 * ex: rsi (in:fastop pointer, out:zero if exception)
302 *
303 * Moreover, they are all exactly FASTOP_SIZE bytes long, so functions for
304 * different operand sizes can be reached by calculation, rather than a jump
305 * table (which would be bigger than the code).
306 */
Sean Christopherson3009afc2020-01-21 20:43:39 -0800307static int fastop(struct x86_emulate_ctxt *ctxt, fastop_t fop);
Avi Kivity4d758342013-01-19 19:51:55 +0200308
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500309#define __FOP_FUNC(name) \
Josh Poimboeuf1482a082016-01-21 16:49:29 -0600310 ".align " __stringify(FASTOP_SIZE) " \n\t" \
311 ".type " name ", @function \n\t" \
312 name ":\n\t"
313
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500314#define FOP_FUNC(name) \
315 __FOP_FUNC(#name)
316
317#define __FOP_RET(name) \
Peter Zijlstrac9a34c32021-11-10 11:01:16 +0100318 "11: " ASM_RET \
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500319 ".size " name ", .-" name "\n\t"
320
321#define FOP_RET(name) \
322 __FOP_RET(#name)
Avi Kivityb7d491e2013-01-04 16:18:49 +0200323
324#define FOP_START(op) \
325 extern void em_##op(struct fastop *fake); \
326 asm(".pushsection .text, \"ax\" \n\t" \
327 ".global em_" #op " \n\t" \
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500328 ".align " __stringify(FASTOP_SIZE) " \n\t" \
329 "em_" #op ":\n\t"
Avi Kivityb7d491e2013-01-04 16:18:49 +0200330
331#define FOP_END \
332 ".popsection")
333
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500334#define __FOPNOP(name) \
335 __FOP_FUNC(name) \
336 __FOP_RET(name)
337
Josh Poimboeuf1482a082016-01-21 16:49:29 -0600338#define FOPNOP() \
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500339 __FOPNOP(__stringify(__UNIQUE_ID(nop)))
Avi Kivity0bdea062013-01-19 19:51:50 +0200340
Avi Kivityb7d491e2013-01-04 16:18:49 +0200341#define FOP1E(op, dst) \
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500342 __FOP_FUNC(#op "_" #dst) \
343 "10: " #op " %" #dst " \n\t" \
344 __FOP_RET(#op "_" #dst)
Avi Kivityb8c0b6a2013-02-09 11:31:49 +0200345
346#define FOP1EEX(op, dst) \
Peter Zijlstrac9a34c32021-11-10 11:01:16 +0100347 FOP1E(op, dst) _ASM_EXTABLE_TYPE_REG(10b, 11b, EX_TYPE_ZERO_REG, %%esi)
Avi Kivityb7d491e2013-01-04 16:18:49 +0200348
349#define FASTOP1(op) \
350 FOP_START(op) \
351 FOP1E(op##b, al) \
352 FOP1E(op##w, ax) \
353 FOP1E(op##l, eax) \
354 ON64(FOP1E(op##q, rax)) \
355 FOP_END
356
Avi Kivityb9fa4092013-02-09 11:31:48 +0200357/* 1-operand, using src2 (for MUL/DIV r/m) */
358#define FASTOP1SRC2(op, name) \
359 FOP_START(name) \
360 FOP1E(op, cl) \
361 FOP1E(op, cx) \
362 FOP1E(op, ecx) \
363 ON64(FOP1E(op, rcx)) \
364 FOP_END
365
Avi Kivityb8c0b6a2013-02-09 11:31:49 +0200366/* 1-operand, using src2 (for MUL/DIV r/m), with exceptions */
367#define FASTOP1SRC2EX(op, name) \
368 FOP_START(name) \
369 FOP1EEX(op, cl) \
370 FOP1EEX(op, cx) \
371 FOP1EEX(op, ecx) \
372 ON64(FOP1EEX(op, rcx)) \
373 FOP_END
374
Avi Kivityf7857f32013-01-04 16:18:53 +0200375#define FOP2E(op, dst, src) \
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500376 __FOP_FUNC(#op "_" #dst "_" #src) \
377 #op " %" #src ", %" #dst " \n\t" \
378 __FOP_RET(#op "_" #dst "_" #src)
Avi Kivityf7857f32013-01-04 16:18:53 +0200379
380#define FASTOP2(op) \
381 FOP_START(op) \
Avi Kivity017da7b2013-02-09 11:31:47 +0200382 FOP2E(op##b, al, dl) \
383 FOP2E(op##w, ax, dx) \
384 FOP2E(op##l, eax, edx) \
385 ON64(FOP2E(op##q, rax, rdx)) \
Avi Kivityf7857f32013-01-04 16:18:53 +0200386 FOP_END
387
Avi Kivity11c363b2013-01-19 19:51:54 +0200388/* 2 operand, word only */
389#define FASTOP2W(op) \
390 FOP_START(op) \
391 FOPNOP() \
Avi Kivity017da7b2013-02-09 11:31:47 +0200392 FOP2E(op##w, ax, dx) \
393 FOP2E(op##l, eax, edx) \
394 ON64(FOP2E(op##q, rax, rdx)) \
Avi Kivity11c363b2013-01-19 19:51:54 +0200395 FOP_END
396
Avi Kivity007a3b52013-01-19 19:51:51 +0200397/* 2 operand, src is CL */
398#define FASTOP2CL(op) \
399 FOP_START(op) \
400 FOP2E(op##b, al, cl) \
401 FOP2E(op##w, ax, cl) \
402 FOP2E(op##l, eax, cl) \
403 ON64(FOP2E(op##q, rax, cl)) \
404 FOP_END
405
Nadav Amit5aca3722014-11-02 11:54:50 +0200406/* 2 operand, src and dest are reversed */
407#define FASTOP2R(op, name) \
408 FOP_START(name) \
409 FOP2E(op##b, dl, al) \
410 FOP2E(op##w, dx, ax) \
411 FOP2E(op##l, edx, eax) \
412 ON64(FOP2E(op##q, rdx, rax)) \
413 FOP_END
414
Avi Kivity0bdea062013-01-19 19:51:50 +0200415#define FOP3E(op, dst, src, src2) \
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500416 __FOP_FUNC(#op "_" #dst "_" #src "_" #src2) \
417 #op " %" #src2 ", %" #src ", %" #dst " \n\t"\
418 __FOP_RET(#op "_" #dst "_" #src "_" #src2)
Avi Kivity0bdea062013-01-19 19:51:50 +0200419
420/* 3-operand, word-only, src2=cl */
421#define FASTOP3WCL(op) \
422 FOP_START(op) \
423 FOPNOP() \
Avi Kivity017da7b2013-02-09 11:31:47 +0200424 FOP3E(op##w, ax, dx, cl) \
425 FOP3E(op##l, eax, edx, cl) \
426 ON64(FOP3E(op##q, rax, rdx, cl)) \
Avi Kivity0bdea062013-01-19 19:51:50 +0200427 FOP_END
428
Avi Kivity9ae9feb2013-01-19 19:51:52 +0200429/* Special case for SETcc - 1 instruction per cc */
Josh Poimboeuf1482a082016-01-21 16:49:29 -0600430#define FOP_SETCC(op) \
431 ".align 4 \n\t" \
432 ".type " #op ", @function \n\t" \
433 #op ": \n\t" \
434 #op " %al \n\t" \
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500435 __FOP_RET(#op)
Avi Kivity9ae9feb2013-01-19 19:51:52 +0200436
437FOP_START(setcc)
438FOP_SETCC(seto)
439FOP_SETCC(setno)
440FOP_SETCC(setc)
441FOP_SETCC(setnc)
442FOP_SETCC(setz)
443FOP_SETCC(setnz)
444FOP_SETCC(setbe)
445FOP_SETCC(setnbe)
446FOP_SETCC(sets)
447FOP_SETCC(setns)
448FOP_SETCC(setp)
449FOP_SETCC(setnp)
450FOP_SETCC(setl)
451FOP_SETCC(setnl)
452FOP_SETCC(setle)
453FOP_SETCC(setnle)
454FOP_END;
455
Josh Poimboeufd99a6ce2019-07-17 20:36:37 -0500456FOP_START(salc)
457FOP_FUNC(salc)
458"pushf; sbb %al, %al; popf \n\t"
459FOP_RET(salc)
Paolo Bonzini326f5782013-05-09 11:32:51 +0200460FOP_END;
461
Radim Krčmářaabba3c2016-11-08 20:54:18 +0100462/*
463 * XXX: inoutclob user must know where the argument is being expanded.
Masahiro Yamadae9666d12018-12-31 00:14:15 +0900464 * Relying on CONFIG_CC_HAS_ASM_GOTO would allow us to remove _fault.
Radim Krčmářaabba3c2016-11-08 20:54:18 +0100465 */
466#define asm_safe(insn, inoutclob...) \
467({ \
468 int _fault = 0; \
469 \
470 asm volatile("1:" insn "\n" \
471 "2:\n" \
Peter Zijlstrac9a34c32021-11-10 11:01:16 +0100472 _ASM_EXTABLE_TYPE_REG(1b, 2b, EX_TYPE_ONE_REG, %[_fault]) \
473 : [_fault] "+r"(_fault) inoutclob ); \
Radim Krčmářaabba3c2016-11-08 20:54:18 +0100474 \
475 _fault ? X86EMUL_UNHANDLEABLE : X86EMUL_CONTINUE; \
476})
477
Joerg Roedel8a76d7f2011-04-04 12:39:27 +0200478static int emulator_check_intercept(struct x86_emulate_ctxt *ctxt,
479 enum x86_intercept intercept,
480 enum x86_intercept_stage stage)
481{
482 struct x86_instruction_info info = {
483 .intercept = intercept,
Avi Kivity9dac77f2011-06-01 15:34:25 +0300484 .rep_prefix = ctxt->rep_prefix,
485 .modrm_mod = ctxt->modrm_mod,
486 .modrm_reg = ctxt->modrm_reg,
487 .modrm_rm = ctxt->modrm_rm,
488 .src_val = ctxt->src.val64,
Jan Kiszka6cbc5f52014-06-30 12:52:55 +0200489 .dst_val = ctxt->dst.val64,
Avi Kivity9dac77f2011-06-01 15:34:25 +0300490 .src_bytes = ctxt->src.bytes,
491 .dst_bytes = ctxt->dst.bytes,
492 .ad_bytes = ctxt->ad_bytes,
Joerg Roedel8a76d7f2011-04-04 12:39:27 +0200493 .next_rip = ctxt->eip,
494 };
495
Avi Kivity29535382011-04-20 13:37:53 +0300496 return ctxt->ops->intercept(ctxt, &info, stage);
Joerg Roedel8a76d7f2011-04-04 12:39:27 +0200497}
498
Avi Kivityf47cfa32012-06-07 17:49:24 +0300499static void assign_masked(ulong *dest, ulong src, ulong mask)
500{
501 *dest = (*dest & ~mask) | (src & mask);
502}
503
Nadav Amit6fd8e122015-03-30 15:39:20 +0300504static void assign_register(unsigned long *reg, u64 val, int bytes)
505{
506 /* The 4-byte case *is* correct: in 64-bit mode we zero-extend. */
507 switch (bytes) {
508 case 1:
509 *(u8 *)reg = (u8)val;
510 break;
511 case 2:
512 *(u16 *)reg = (u16)val;
513 break;
514 case 4:
515 *reg = (u32)val;
516 break; /* 64b: zero-extend */
517 case 8:
518 *reg = val;
519 break;
520 }
521}
522
Avi Kivity9dac77f2011-06-01 15:34:25 +0300523static inline unsigned long ad_mask(struct x86_emulate_ctxt *ctxt)
Harvey Harrisonddcb2882008-02-18 11:12:48 -0800524{
Avi Kivity9dac77f2011-06-01 15:34:25 +0300525 return (1UL << (ctxt->ad_bytes << 3)) - 1;
Harvey Harrisonddcb2882008-02-18 11:12:48 -0800526}
527
Avi Kivityf47cfa32012-06-07 17:49:24 +0300528static ulong stack_mask(struct x86_emulate_ctxt *ctxt)
529{
530 u16 sel;
531 struct desc_struct ss;
532
533 if (ctxt->mode == X86EMUL_MODE_PROT64)
534 return ~0UL;
535 ctxt->ops->get_segment(ctxt, &sel, &ss, NULL, VCPU_SREG_SS);
536 return ~0U >> ((ss.d ^ 1) * 16); /* d=0: 0xffff; d=1: 0xffffffff */
537}
538
Avi Kivity612e89f2012-06-12 20:03:23 +0300539static int stack_size(struct x86_emulate_ctxt *ctxt)
540{
541 return (__fls(stack_mask(ctxt)) + 1) >> 3;
542}
543
Avi Kivity6aa8b732006-12-10 02:21:36 -0800544/* Access/update address held in a register, based on addressing mode. */
Harvey Harrisone4706772008-02-19 07:40:38 -0800545static inline unsigned long
Avi Kivity9dac77f2011-06-01 15:34:25 +0300546address_mask(struct x86_emulate_ctxt *ctxt, unsigned long reg)
Harvey Harrisone4706772008-02-19 07:40:38 -0800547{
Avi Kivity9dac77f2011-06-01 15:34:25 +0300548 if (ctxt->ad_bytes == sizeof(unsigned long))
Harvey Harrisone4706772008-02-19 07:40:38 -0800549 return reg;
550 else
Avi Kivity9dac77f2011-06-01 15:34:25 +0300551 return reg & ad_mask(ctxt);
Harvey Harrisone4706772008-02-19 07:40:38 -0800552}
553
554static inline unsigned long
Paolo Bonzini01485a22014-11-19 18:25:08 +0100555register_address(struct x86_emulate_ctxt *ctxt, int reg)
Harvey Harrisone4706772008-02-19 07:40:38 -0800556{
Paolo Bonzini01485a22014-11-19 18:25:08 +0100557 return address_mask(ctxt, reg_read(ctxt, reg));
Harvey Harrisone4706772008-02-19 07:40:38 -0800558}
559
Avi Kivity5ad105e2012-08-19 14:34:31 +0300560static void masked_increment(ulong *reg, ulong mask, int inc)
561{
562 assign_masked(reg, *reg + inc, mask);
563}
564
Harvey Harrison7a9572752008-02-19 07:40:41 -0800565static inline void
Paolo Bonzini01485a22014-11-19 18:25:08 +0100566register_address_increment(struct x86_emulate_ctxt *ctxt, int reg, int inc)
Harvey Harrison7a9572752008-02-19 07:40:41 -0800567{
Nadav Amitee122a72015-04-28 13:06:00 +0300568 ulong *preg = reg_rmw(ctxt, reg);
Avi Kivity5ad105e2012-08-19 14:34:31 +0300569
Nadav Amitee122a72015-04-28 13:06:00 +0300570 assign_register(preg, *preg + inc, ctxt->ad_bytes);
Avi Kivity5ad105e2012-08-19 14:34:31 +0300571}
572
573static void rsp_increment(struct x86_emulate_ctxt *ctxt, int inc)
574{
Avi Kivitydd856ef2012-08-27 23:46:17 +0300575 masked_increment(reg_rmw(ctxt, VCPU_REGS_RSP), stack_mask(ctxt), inc);
Harvey Harrison7a9572752008-02-19 07:40:41 -0800576}
Avi Kivity6aa8b732006-12-10 02:21:36 -0800577
Avi Kivity56697682011-04-03 14:08:51 +0300578static u32 desc_limit_scaled(struct desc_struct *desc)
579{
580 u32 limit = get_desc_limit(desc);
581
582 return desc->g ? (limit << 12) | 0xfff : limit;
583}
584
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +0900585static unsigned long seg_base(struct x86_emulate_ctxt *ctxt, int seg)
Avi Kivity7a5b56d2008-06-22 16:22:51 +0300586{
587 if (ctxt->mode == X86EMUL_MODE_PROT64 && seg < VCPU_SREG_FS)
588 return 0;
589
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +0900590 return ctxt->ops->get_cached_segment_base(ctxt, seg);
Avi Kivity7a5b56d2008-06-22 16:22:51 +0300591}
592
Avi Kivity35d3d4a2010-11-22 17:53:25 +0200593static int emulate_exception(struct x86_emulate_ctxt *ctxt, int vec,
594 u32 error, bool valid)
Gleb Natapov54b84862010-04-28 19:15:44 +0300595{
Paolo Bonzinie0ad0b42014-08-20 10:08:23 +0200596 WARN_ON(vec > 0x1f);
Avi Kivityda9cb572010-11-22 17:53:21 +0200597 ctxt->exception.vector = vec;
598 ctxt->exception.error_code = error;
599 ctxt->exception.error_code_valid = valid;
Avi Kivity35d3d4a2010-11-22 17:53:25 +0200600 return X86EMUL_PROPAGATE_FAULT;
Gleb Natapov54b84862010-04-28 19:15:44 +0300601}
602
Joerg Roedel3b88e412011-04-04 12:39:29 +0200603static int emulate_db(struct x86_emulate_ctxt *ctxt)
604{
605 return emulate_exception(ctxt, DB_VECTOR, 0, false);
606}
607
Avi Kivity35d3d4a2010-11-22 17:53:25 +0200608static int emulate_gp(struct x86_emulate_ctxt *ctxt, int err)
Gleb Natapov54b84862010-04-28 19:15:44 +0300609{
Avi Kivity35d3d4a2010-11-22 17:53:25 +0200610 return emulate_exception(ctxt, GP_VECTOR, err, true);
Gleb Natapov54b84862010-04-28 19:15:44 +0300611}
612
Avi Kivity618ff152011-04-03 12:32:09 +0300613static int emulate_ss(struct x86_emulate_ctxt *ctxt, int err)
614{
615 return emulate_exception(ctxt, SS_VECTOR, err, true);
616}
617
Avi Kivity35d3d4a2010-11-22 17:53:25 +0200618static int emulate_ud(struct x86_emulate_ctxt *ctxt)
Gleb Natapov54b84862010-04-28 19:15:44 +0300619{
Avi Kivity35d3d4a2010-11-22 17:53:25 +0200620 return emulate_exception(ctxt, UD_VECTOR, 0, false);
Gleb Natapov54b84862010-04-28 19:15:44 +0300621}
622
Avi Kivity35d3d4a2010-11-22 17:53:25 +0200623static int emulate_ts(struct x86_emulate_ctxt *ctxt, int err)
Gleb Natapov54b84862010-04-28 19:15:44 +0300624{
Avi Kivity35d3d4a2010-11-22 17:53:25 +0200625 return emulate_exception(ctxt, TS_VECTOR, err, true);
Gleb Natapov54b84862010-04-28 19:15:44 +0300626}
627
Avi Kivity34d1f492010-08-26 11:59:01 +0300628static int emulate_de(struct x86_emulate_ctxt *ctxt)
629{
Avi Kivity35d3d4a2010-11-22 17:53:25 +0200630 return emulate_exception(ctxt, DE_VECTOR, 0, false);
Avi Kivity34d1f492010-08-26 11:59:01 +0300631}
632
Avi Kivity1253791d2011-03-29 11:41:27 +0200633static int emulate_nm(struct x86_emulate_ctxt *ctxt)
634{
635 return emulate_exception(ctxt, NM_VECTOR, 0, false);
636}
637
Avi Kivity1aa36612011-04-27 13:20:30 +0300638static u16 get_segment_selector(struct x86_emulate_ctxt *ctxt, unsigned seg)
639{
640 u16 selector;
641 struct desc_struct desc;
642
643 ctxt->ops->get_segment(ctxt, &selector, &desc, NULL, seg);
644 return selector;
645}
646
647static void set_segment_selector(struct x86_emulate_ctxt *ctxt, u16 selector,
648 unsigned seg)
649{
650 u16 dummy;
651 u32 base3;
652 struct desc_struct desc;
653
654 ctxt->ops->get_segment(ctxt, &dummy, &desc, &base3, seg);
655 ctxt->ops->set_segment(ctxt, selector, &desc, base3, seg);
656}
657
Sean Christophersonf0ed4762020-02-18 15:29:43 -0800658static inline u8 ctxt_virt_addr_bits(struct x86_emulate_ctxt *ctxt)
659{
660 return (ctxt->ops->get_cr(ctxt, 4) & X86_CR4_LA57) ? 57 : 48;
661}
662
663static inline bool emul_is_noncanonical_address(u64 la,
664 struct x86_emulate_ctxt *ctxt)
665{
666 return get_canonical(la, ctxt_virt_addr_bits(ctxt)) != la;
667}
668
Avi Kivity1c11b372012-04-09 18:39:59 +0300669/*
670 * x86 defines three classes of vector instructions: explicitly
671 * aligned, explicitly unaligned, and the rest, which change behaviour
672 * depending on whether they're AVX encoded or not.
673 *
674 * Also included is CMPXCHG16B which is not a vector instruction, yet it is
Radim Krčmářd3fe9592016-11-08 20:54:16 +0100675 * subject to the same check. FXSAVE and FXRSTOR are checked here too as their
676 * 512 bytes of data must be aligned to a 16 byte boundary.
Avi Kivity1c11b372012-04-09 18:39:59 +0300677 */
Radim Krčmářd3fe9592016-11-08 20:54:16 +0100678static unsigned insn_alignment(struct x86_emulate_ctxt *ctxt, unsigned size)
Avi Kivity1c11b372012-04-09 18:39:59 +0300679{
Radim Krčmář48520182016-11-08 20:54:17 +0100680 u64 alignment = ctxt->d & AlignMask;
Avi Kivity1c11b372012-04-09 18:39:59 +0300681
Avi Kivity1c11b372012-04-09 18:39:59 +0300682 if (likely(size < 16))
Radim Krčmářd3fe9592016-11-08 20:54:16 +0100683 return 1;
Avi Kivity1c11b372012-04-09 18:39:59 +0300684
Radim Krčmář48520182016-11-08 20:54:17 +0100685 switch (alignment) {
686 case Unaligned:
687 case Avx:
Radim Krčmářd3fe9592016-11-08 20:54:16 +0100688 return 1;
Radim Krčmář48520182016-11-08 20:54:17 +0100689 case Aligned16:
Radim Krčmářd3fe9592016-11-08 20:54:16 +0100690 return 16;
Radim Krčmář48520182016-11-08 20:54:17 +0100691 case Aligned:
692 default:
Radim Krčmářd3fe9592016-11-08 20:54:16 +0100693 return size;
Radim Krčmář48520182016-11-08 20:54:17 +0100694 }
Avi Kivity1c11b372012-04-09 18:39:59 +0300695}
696
Paolo Bonzinid09155d2014-10-27 14:54:44 +0100697static __always_inline int __linearize(struct x86_emulate_ctxt *ctxt,
698 struct segmented_address addr,
699 unsigned *max_size, unsigned size,
700 bool write, bool fetch,
Nadav Amitd50eaa12014-11-19 17:43:11 +0200701 enum x86emul_mode mode, ulong *linear)
Avi Kivity52fd8b42011-04-03 12:33:12 +0300702{
Avi Kivity618ff152011-04-03 12:32:09 +0300703 struct desc_struct desc;
704 bool usable;
Avi Kivity52fd8b42011-04-03 12:33:12 +0300705 ulong la;
Avi Kivity618ff152011-04-03 12:32:09 +0300706 u32 lim;
Avi Kivity1aa36612011-04-27 13:20:30 +0300707 u16 sel;
Yu Zhangfd8cb432017-08-24 20:27:56 +0800708 u8 va_bits;
Avi Kivity52fd8b42011-04-03 12:33:12 +0300709
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +0900710 la = seg_base(ctxt, addr.seg) + addr.ea;
Paolo Bonzinifd56e152014-10-27 14:40:39 +0100711 *max_size = 0;
Nadav Amitd50eaa12014-11-19 17:43:11 +0200712 switch (mode) {
Avi Kivity618ff152011-04-03 12:32:09 +0300713 case X86EMUL_MODE_PROT64:
Paolo Bonzini0c1d77f2016-02-19 18:07:21 +0100714 *linear = la;
Yu Zhangfd8cb432017-08-24 20:27:56 +0800715 va_bits = ctxt_virt_addr_bits(ctxt);
716 if (get_canonical(la, va_bits) != la)
Nadav Amitabc7d8a2014-11-19 17:43:12 +0200717 goto bad;
Paolo Bonzinifd56e152014-10-27 14:40:39 +0100718
Yu Zhangfd8cb432017-08-24 20:27:56 +0800719 *max_size = min_t(u64, ~0u, (1ull << va_bits) - la);
Paolo Bonzinifd56e152014-10-27 14:40:39 +0100720 if (size > *max_size)
721 goto bad;
Avi Kivity618ff152011-04-03 12:32:09 +0300722 break;
723 default:
Paolo Bonzini0c1d77f2016-02-19 18:07:21 +0100724 *linear = la = (u32)la;
Avi Kivity1aa36612011-04-27 13:20:30 +0300725 usable = ctxt->ops->get_segment(ctxt, &sel, &desc, NULL,
726 addr.seg);
Avi Kivity618ff152011-04-03 12:32:09 +0300727 if (!usable)
728 goto bad;
Gleb Natapov58b78252012-12-11 15:14:12 +0200729 /* code segment in protected mode or read-only data segment */
730 if ((((ctxt->mode != X86EMUL_MODE_REAL) && (desc.type & 8))
731 || !(desc.type & 2)) && write)
Avi Kivity618ff152011-04-03 12:32:09 +0300732 goto bad;
733 /* unreadable code segment */
Nelson Elhage3d9b9382011-04-18 12:05:53 -0400734 if (!fetch && (desc.type & 8) && !(desc.type & 2))
Avi Kivity618ff152011-04-03 12:32:09 +0300735 goto bad;
736 lim = desc_limit_scaled(&desc);
Paolo Bonzini997b0412014-11-19 18:33:38 +0100737 if (!(desc.type & 8) && (desc.type & 4)) {
Guo Chaofc058682012-06-28 15:19:51 +0800738 /* expand-down segment */
Paolo Bonzinifd56e152014-10-27 14:40:39 +0100739 if (addr.ea <= lim)
Avi Kivity618ff152011-04-03 12:32:09 +0300740 goto bad;
741 lim = desc.d ? 0xffffffff : 0xffff;
Avi Kivity618ff152011-04-03 12:32:09 +0300742 }
Paolo Bonzini997b0412014-11-19 18:33:38 +0100743 if (addr.ea > lim)
744 goto bad;
Nadav Amitbac155312015-01-26 09:32:26 +0200745 if (lim == 0xffffffff)
746 *max_size = ~0u;
747 else {
748 *max_size = (u64)lim + 1 - addr.ea;
749 if (size > *max_size)
750 goto bad;
751 }
Avi Kivity618ff152011-04-03 12:32:09 +0300752 break;
753 }
Radim Krčmářd3fe9592016-11-08 20:54:16 +0100754 if (la & (insn_alignment(ctxt, size) - 1))
Avi Kivity1c11b372012-04-09 18:39:59 +0300755 return emulate_gp(ctxt, 0);
Avi Kivity52fd8b42011-04-03 12:33:12 +0300756 return X86EMUL_CONTINUE;
Avi Kivity618ff152011-04-03 12:32:09 +0300757bad:
758 if (addr.seg == VCPU_SREG_SS)
Paolo Bonzini36061892014-10-27 14:40:49 +0100759 return emulate_ss(ctxt, 0);
Avi Kivity618ff152011-04-03 12:32:09 +0300760 else
Paolo Bonzini36061892014-10-27 14:40:49 +0100761 return emulate_gp(ctxt, 0);
Avi Kivity52fd8b42011-04-03 12:33:12 +0300762}
763
Nelson Elhage3d9b9382011-04-18 12:05:53 -0400764static int linearize(struct x86_emulate_ctxt *ctxt,
765 struct segmented_address addr,
766 unsigned size, bool write,
767 ulong *linear)
768{
Paolo Bonzinifd56e152014-10-27 14:40:39 +0100769 unsigned max_size;
Nadav Amitd50eaa12014-11-19 17:43:11 +0200770 return __linearize(ctxt, addr, &max_size, size, write, false,
771 ctxt->mode, linear);
Nelson Elhage3d9b9382011-04-18 12:05:53 -0400772}
773
Nadav Amitd50eaa12014-11-19 17:43:11 +0200774static inline int assign_eip(struct x86_emulate_ctxt *ctxt, ulong dst,
775 enum x86emul_mode mode)
776{
777 ulong linear;
778 int rc;
779 unsigned max_size;
780 struct segmented_address addr = { .seg = VCPU_SREG_CS,
781 .ea = dst };
782
783 if (ctxt->op_bytes != sizeof(unsigned long))
784 addr.ea = dst & ((1UL << (ctxt->op_bytes << 3)) - 1);
785 rc = __linearize(ctxt, addr, &max_size, 1, false, true, mode, &linear);
786 if (rc == X86EMUL_CONTINUE)
787 ctxt->_eip = addr.ea;
788 return rc;
789}
790
791static inline int assign_eip_near(struct x86_emulate_ctxt *ctxt, ulong dst)
792{
793 return assign_eip(ctxt, dst, ctxt->mode);
794}
795
796static int assign_eip_far(struct x86_emulate_ctxt *ctxt, ulong dst,
797 const struct desc_struct *cs_desc)
798{
799 enum x86emul_mode mode = ctxt->mode;
Nadav Amit82268082015-01-26 09:32:27 +0200800 int rc;
Nadav Amitd50eaa12014-11-19 17:43:11 +0200801
802#ifdef CONFIG_X86_64
Nadav Amit82268082015-01-26 09:32:27 +0200803 if (ctxt->mode >= X86EMUL_MODE_PROT16) {
804 if (cs_desc->l) {
805 u64 efer = 0;
Nadav Amitd50eaa12014-11-19 17:43:11 +0200806
Nadav Amit82268082015-01-26 09:32:27 +0200807 ctxt->ops->get_msr(ctxt, MSR_EFER, &efer);
808 if (efer & EFER_LMA)
809 mode = X86EMUL_MODE_PROT64;
810 } else
811 mode = X86EMUL_MODE_PROT32; /* temporary value */
Nadav Amitd50eaa12014-11-19 17:43:11 +0200812 }
813#endif
814 if (mode == X86EMUL_MODE_PROT16 || mode == X86EMUL_MODE_PROT32)
815 mode = cs_desc->d ? X86EMUL_MODE_PROT32 : X86EMUL_MODE_PROT16;
Nadav Amit82268082015-01-26 09:32:27 +0200816 rc = assign_eip(ctxt, dst, mode);
817 if (rc == X86EMUL_CONTINUE)
818 ctxt->mode = mode;
819 return rc;
Nadav Amitd50eaa12014-11-19 17:43:11 +0200820}
821
822static inline int jmp_rel(struct x86_emulate_ctxt *ctxt, int rel)
823{
824 return assign_eip_near(ctxt, ctxt->_eip + rel);
825}
Nelson Elhage3d9b9382011-04-18 12:05:53 -0400826
Paolo Bonzini79367a62018-06-06 16:43:02 +0200827static int linear_read_system(struct x86_emulate_ctxt *ctxt, ulong linear,
828 void *data, unsigned size)
829{
Paolo Bonzini3c9fa242018-06-06 17:38:09 +0200830 return ctxt->ops->read_std(ctxt, linear, data, size, &ctxt->exception, true);
Paolo Bonzini79367a62018-06-06 16:43:02 +0200831}
832
833static int linear_write_system(struct x86_emulate_ctxt *ctxt,
834 ulong linear, void *data,
835 unsigned int size)
836{
Paolo Bonzini3c9fa242018-06-06 17:38:09 +0200837 return ctxt->ops->write_std(ctxt, linear, data, size, &ctxt->exception, true);
Paolo Bonzini79367a62018-06-06 16:43:02 +0200838}
839
Avi Kivity3ca3ac42011-03-31 16:52:26 +0200840static int segmented_read_std(struct x86_emulate_ctxt *ctxt,
841 struct segmented_address addr,
842 void *data,
843 unsigned size)
844{
Avi Kivity9fa088f2011-03-31 18:54:30 +0200845 int rc;
846 ulong linear;
847
Avi Kivity83b87952011-04-03 11:31:19 +0300848 rc = linearize(ctxt, addr, size, false, &linear);
Avi Kivity9fa088f2011-03-31 18:54:30 +0200849 if (rc != X86EMUL_CONTINUE)
850 return rc;
Paolo Bonzini3c9fa242018-06-06 17:38:09 +0200851 return ctxt->ops->read_std(ctxt, linear, data, size, &ctxt->exception, false);
Avi Kivity3ca3ac42011-03-31 16:52:26 +0200852}
853
Steve Rutherford129a72a2017-01-11 18:28:29 -0800854static int segmented_write_std(struct x86_emulate_ctxt *ctxt,
855 struct segmented_address addr,
856 void *data,
857 unsigned int size)
858{
859 int rc;
860 ulong linear;
861
862 rc = linearize(ctxt, addr, size, true, &linear);
863 if (rc != X86EMUL_CONTINUE)
864 return rc;
Paolo Bonzini3c9fa242018-06-06 17:38:09 +0200865 return ctxt->ops->write_std(ctxt, linear, data, size, &ctxt->exception, false);
Steve Rutherford129a72a2017-01-11 18:28:29 -0800866}
867
Takuya Yoshikawa807941b2011-07-30 18:00:17 +0900868/*
Paolo Bonzini285ca9e2014-05-06 12:24:32 +0200869 * Prefetch the remaining bytes of the instruction without crossing page
Takuya Yoshikawa807941b2011-07-30 18:00:17 +0900870 * boundary if they are not in fetch_cache yet.
871 */
Paolo Bonzini9506d572014-05-06 13:05:25 +0200872static int __do_insn_fetch_bytes(struct x86_emulate_ctxt *ctxt, int op_size)
Avi Kivity62266862007-11-20 13:15:52 +0200873{
Avi Kivity62266862007-11-20 13:15:52 +0200874 int rc;
Paolo Bonzinifd56e152014-10-27 14:40:39 +0100875 unsigned size, max_size;
Paolo Bonzini285ca9e2014-05-06 12:24:32 +0200876 unsigned long linear;
Paolo Bonzini17052f12014-05-06 16:33:01 +0200877 int cur_size = ctxt->fetch.end - ctxt->fetch.data;
Paolo Bonzini285ca9e2014-05-06 12:24:32 +0200878 struct segmented_address addr = { .seg = VCPU_SREG_CS,
Paolo Bonzini17052f12014-05-06 16:33:01 +0200879 .ea = ctxt->eip + cur_size };
880
Paolo Bonzinifd56e152014-10-27 14:40:39 +0100881 /*
882 * We do not know exactly how many bytes will be needed, and
883 * __linearize is expensive, so fetch as much as possible. We
884 * just have to avoid going beyond the 15 byte limit, the end
885 * of the segment, or the end of the page.
886 *
887 * __linearize is called with size 0 so that it does not do any
888 * boundary check itself. Instead, we use max_size to check
889 * against op_size.
890 */
Nadav Amitd50eaa12014-11-19 17:43:11 +0200891 rc = __linearize(ctxt, addr, &max_size, 0, false, true, ctxt->mode,
892 &linear);
Paolo Bonzini719d5a92014-06-19 11:37:06 +0200893 if (unlikely(rc != X86EMUL_CONTINUE))
894 return rc;
895
Paolo Bonzinifd56e152014-10-27 14:40:39 +0100896 size = min_t(unsigned, 15UL ^ cur_size, max_size);
Paolo Bonzini719d5a92014-06-19 11:37:06 +0200897 size = min_t(unsigned, size, PAGE_SIZE - offset_in_page(linear));
Paolo Bonzini5cfc7e02014-05-06 13:05:25 +0200898
899 /*
900 * One instruction can only straddle two pages,
901 * and one has been loaded at the beginning of
902 * x86_decode_insn. So, if not enough bytes
903 * still, we must have hit the 15-byte boundary.
904 */
905 if (unlikely(size < op_size))
Paolo Bonzinifd56e152014-10-27 14:40:39 +0100906 return emulate_gp(ctxt, 0);
907
Paolo Bonzini17052f12014-05-06 16:33:01 +0200908 rc = ctxt->ops->fetch(ctxt, linear, ctxt->fetch.end,
Paolo Bonzini285ca9e2014-05-06 12:24:32 +0200909 size, &ctxt->exception);
910 if (unlikely(rc != X86EMUL_CONTINUE))
911 return rc;
Paolo Bonzini17052f12014-05-06 16:33:01 +0200912 ctxt->fetch.end += size;
Takuya Yoshikawa3e2815e2010-02-12 15:53:59 +0900913 return X86EMUL_CONTINUE;
Avi Kivity62266862007-11-20 13:15:52 +0200914}
915
Paolo Bonzini9506d572014-05-06 13:05:25 +0200916static __always_inline int do_insn_fetch_bytes(struct x86_emulate_ctxt *ctxt,
917 unsigned size)
Avi Kivity62266862007-11-20 13:15:52 +0200918{
Nadav Amit08da44a2014-10-03 01:10:04 +0300919 unsigned done_size = ctxt->fetch.end - ctxt->fetch.ptr;
920
921 if (unlikely(done_size < size))
922 return __do_insn_fetch_bytes(ctxt, size - done_size);
Paolo Bonzini9506d572014-05-06 13:05:25 +0200923 else
924 return X86EMUL_CONTINUE;
Avi Kivity62266862007-11-20 13:15:52 +0200925}
926
Takuya Yoshikawa67cbc902011-05-15 00:54:58 +0900927/* Fetch next part of the instruction being emulated. */
Takuya Yoshikawae85a1082011-07-30 18:01:26 +0900928#define insn_fetch(_type, _ctxt) \
Paolo Bonzini9506d572014-05-06 13:05:25 +0200929({ _type _x; \
Paolo Bonzini9506d572014-05-06 13:05:25 +0200930 \
931 rc = do_insn_fetch_bytes(_ctxt, sizeof(_type)); \
Takuya Yoshikawa67cbc902011-05-15 00:54:58 +0900932 if (rc != X86EMUL_CONTINUE) \
933 goto done; \
Paolo Bonzini9506d572014-05-06 13:05:25 +0200934 ctxt->_eip += sizeof(_type); \
Nick Desaulniers8616abc2017-06-27 19:37:14 -0700935 memcpy(&_x, ctxt->fetch.ptr, sizeof(_type)); \
Paolo Bonzini17052f12014-05-06 16:33:01 +0200936 ctxt->fetch.ptr += sizeof(_type); \
Paolo Bonzini9506d572014-05-06 13:05:25 +0200937 _x; \
Takuya Yoshikawa67cbc902011-05-15 00:54:58 +0900938})
939
Takuya Yoshikawa807941b2011-07-30 18:00:17 +0900940#define insn_fetch_arr(_arr, _size, _ctxt) \
Paolo Bonzini9506d572014-05-06 13:05:25 +0200941({ \
Paolo Bonzini9506d572014-05-06 13:05:25 +0200942 rc = do_insn_fetch_bytes(_ctxt, _size); \
Takuya Yoshikawa67cbc902011-05-15 00:54:58 +0900943 if (rc != X86EMUL_CONTINUE) \
944 goto done; \
Paolo Bonzini9506d572014-05-06 13:05:25 +0200945 ctxt->_eip += (_size); \
Paolo Bonzini17052f12014-05-06 16:33:01 +0200946 memcpy(_arr, ctxt->fetch.ptr, _size); \
947 ctxt->fetch.ptr += (_size); \
Takuya Yoshikawa67cbc902011-05-15 00:54:58 +0900948})
949
Rusty Russell1e3c5cb2007-07-17 23:16:11 +1000950/*
951 * Given the 'reg' portion of a ModRM byte, and a register block, return a
952 * pointer into the block that addresses the relevant register.
953 * @highbyte_regs specifies whether to decode AH,CH,DH,BH.
954 */
Avi Kivitydd856ef2012-08-27 23:46:17 +0300955static void *decode_register(struct x86_emulate_ctxt *ctxt, u8 modrm_reg,
Gleb Natapovaa9ac1a2013-11-04 15:52:41 +0200956 int byteop)
Avi Kivity6aa8b732006-12-10 02:21:36 -0800957{
958 void *p;
Gleb Natapovaa9ac1a2013-11-04 15:52:41 +0200959 int highbyte_regs = (ctxt->rex_prefix == 0) && byteop;
Avi Kivity6aa8b732006-12-10 02:21:36 -0800960
Avi Kivity6aa8b732006-12-10 02:21:36 -0800961 if (highbyte_regs && modrm_reg >= 4 && modrm_reg < 8)
Avi Kivitydd856ef2012-08-27 23:46:17 +0300962 p = (unsigned char *)reg_rmw(ctxt, modrm_reg & 3) + 1;
963 else
964 p = reg_rmw(ctxt, modrm_reg);
Avi Kivity6aa8b732006-12-10 02:21:36 -0800965 return p;
966}
967
968static int read_descriptor(struct x86_emulate_ctxt *ctxt,
Avi Kivity90de84f2010-11-17 15:28:21 +0200969 struct segmented_address addr,
Avi Kivity6aa8b732006-12-10 02:21:36 -0800970 u16 *size, unsigned long *address, int op_bytes)
971{
972 int rc;
973
974 if (op_bytes == 2)
975 op_bytes = 3;
976 *address = 0;
Avi Kivity3ca3ac42011-03-31 16:52:26 +0200977 rc = segmented_read_std(ctxt, addr, size, 2);
Takuya Yoshikawa1b30eaa2010-02-12 15:57:56 +0900978 if (rc != X86EMUL_CONTINUE)
Avi Kivity6aa8b732006-12-10 02:21:36 -0800979 return rc;
Avi Kivity30b31ab2010-11-17 15:28:22 +0200980 addr.ea += 2;
Avi Kivity3ca3ac42011-03-31 16:52:26 +0200981 rc = segmented_read_std(ctxt, addr, address, op_bytes);
Avi Kivity6aa8b732006-12-10 02:21:36 -0800982 return rc;
983}
984
Avi Kivity34b77652013-01-19 19:51:56 +0200985FASTOP2(add);
986FASTOP2(or);
987FASTOP2(adc);
988FASTOP2(sbb);
989FASTOP2(and);
990FASTOP2(sub);
991FASTOP2(xor);
992FASTOP2(cmp);
993FASTOP2(test);
994
Avi Kivityb9fa4092013-02-09 11:31:48 +0200995FASTOP1SRC2(mul, mul_ex);
996FASTOP1SRC2(imul, imul_ex);
Avi Kivityb8c0b6a2013-02-09 11:31:49 +0200997FASTOP1SRC2EX(div, div_ex);
998FASTOP1SRC2EX(idiv, idiv_ex);
Avi Kivityb9fa4092013-02-09 11:31:48 +0200999
Avi Kivity34b77652013-01-19 19:51:56 +02001000FASTOP3WCL(shld);
1001FASTOP3WCL(shrd);
1002
1003FASTOP2W(imul);
1004
1005FASTOP1(not);
1006FASTOP1(neg);
1007FASTOP1(inc);
1008FASTOP1(dec);
1009
1010FASTOP2CL(rol);
1011FASTOP2CL(ror);
1012FASTOP2CL(rcl);
1013FASTOP2CL(rcr);
1014FASTOP2CL(shl);
1015FASTOP2CL(shr);
1016FASTOP2CL(sar);
1017
1018FASTOP2W(bsf);
1019FASTOP2W(bsr);
1020FASTOP2W(bt);
1021FASTOP2W(bts);
1022FASTOP2W(btr);
1023FASTOP2W(btc);
1024
Avi Kivitye47a5f52013-02-09 11:31:51 +02001025FASTOP2(xadd);
1026
Nadav Amit5aca3722014-11-02 11:54:50 +02001027FASTOP2R(cmp, cmp_r);
1028
Nadav Amit900efe22015-03-30 15:39:21 +03001029static int em_bsf_c(struct x86_emulate_ctxt *ctxt)
1030{
1031 /* If src is zero, do not writeback, but update flags */
1032 if (ctxt->src.val == 0)
1033 ctxt->dst.type = OP_NONE;
1034 return fastop(ctxt, em_bsf);
1035}
1036
1037static int em_bsr_c(struct x86_emulate_ctxt *ctxt)
1038{
1039 /* If src is zero, do not writeback, but update flags */
1040 if (ctxt->src.val == 0)
1041 ctxt->dst.type = OP_NONE;
1042 return fastop(ctxt, em_bsr);
1043}
1044
Josh Poimboeufcb7390f2016-01-22 10:16:12 -06001045static __always_inline u8 test_cc(unsigned int condition, unsigned long flags)
Nitin A Kamblebbe9abb2007-09-15 10:23:07 +03001046{
Avi Kivity9ae9feb2013-01-19 19:51:52 +02001047 u8 rc;
1048 void (*fop)(void) = (void *)em_setcc + 4 * (condition & 0xf);
Nitin A Kamblebbe9abb2007-09-15 10:23:07 +03001049
Avi Kivity9ae9feb2013-01-19 19:51:52 +02001050 flags = (flags & EFLAGS_MASK) | X86_EFLAGS_IF;
Peter Zijlstra1a29b5b2018-01-25 10:58:13 +01001051 asm("push %[flags]; popf; " CALL_NOSPEC
1052 : "=a"(rc) : [thunk_target]"r"(fop), [flags]"r"(flags));
Avi Kivity9ae9feb2013-01-19 19:51:52 +02001053 return rc;
Nitin A Kamblebbe9abb2007-09-15 10:23:07 +03001054}
1055
Avi Kivity91ff3cb2010-08-01 12:53:09 +03001056static void fetch_register_operand(struct operand *op)
1057{
1058 switch (op->bytes) {
1059 case 1:
1060 op->val = *(u8 *)op->addr.reg;
1061 break;
1062 case 2:
1063 op->val = *(u16 *)op->addr.reg;
1064 break;
1065 case 4:
1066 op->val = *(u32 *)op->addr.reg;
1067 break;
1068 case 8:
1069 op->val = *(u64 *)op->addr.reg;
1070 break;
1071 }
1072}
1073
Gleb Natapov045a2822012-12-20 16:57:43 +02001074static int em_fninit(struct x86_emulate_ctxt *ctxt)
1075{
1076 if (ctxt->ops->get_cr(ctxt, 0) & (X86_CR0_TS | X86_CR0_EM))
1077 return emulate_nm(ctxt);
1078
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001079 kvm_fpu_get();
Gleb Natapov045a2822012-12-20 16:57:43 +02001080 asm volatile("fninit");
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001081 kvm_fpu_put();
Gleb Natapov045a2822012-12-20 16:57:43 +02001082 return X86EMUL_CONTINUE;
1083}
1084
1085static int em_fnstcw(struct x86_emulate_ctxt *ctxt)
1086{
1087 u16 fcw;
1088
1089 if (ctxt->ops->get_cr(ctxt, 0) & (X86_CR0_TS | X86_CR0_EM))
1090 return emulate_nm(ctxt);
1091
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001092 kvm_fpu_get();
Gleb Natapov045a2822012-12-20 16:57:43 +02001093 asm volatile("fnstcw %0": "+m"(fcw));
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001094 kvm_fpu_put();
Gleb Natapov045a2822012-12-20 16:57:43 +02001095
Gleb Natapov045a2822012-12-20 16:57:43 +02001096 ctxt->dst.val = fcw;
1097
1098 return X86EMUL_CONTINUE;
1099}
1100
1101static int em_fnstsw(struct x86_emulate_ctxt *ctxt)
1102{
1103 u16 fsw;
1104
1105 if (ctxt->ops->get_cr(ctxt, 0) & (X86_CR0_TS | X86_CR0_EM))
1106 return emulate_nm(ctxt);
1107
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001108 kvm_fpu_get();
Gleb Natapov045a2822012-12-20 16:57:43 +02001109 asm volatile("fnstsw %0": "+m"(fsw));
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001110 kvm_fpu_put();
Gleb Natapov045a2822012-12-20 16:57:43 +02001111
Gleb Natapov045a2822012-12-20 16:57:43 +02001112 ctxt->dst.val = fsw;
1113
1114 return X86EMUL_CONTINUE;
1115}
1116
Avi Kivity1253791d2011-03-29 11:41:27 +02001117static void decode_register_operand(struct x86_emulate_ctxt *ctxt,
Avi Kivity2adb5ad2012-01-16 15:08:45 +02001118 struct operand *op)
Avi Kivity3c118e22007-10-31 10:27:04 +02001119{
Avi Kivity9dac77f2011-06-01 15:34:25 +03001120 unsigned reg = ctxt->modrm_reg;
Avi Kivity33615aa2007-10-31 11:15:56 +02001121
Avi Kivity9dac77f2011-06-01 15:34:25 +03001122 if (!(ctxt->d & ModRM))
1123 reg = (ctxt->b & 7) | ((ctxt->rex_prefix & 1) << 3);
Avi Kivity1253791d2011-03-29 11:41:27 +02001124
Avi Kivity9dac77f2011-06-01 15:34:25 +03001125 if (ctxt->d & Sse) {
Avi Kivity1253791d2011-03-29 11:41:27 +02001126 op->type = OP_XMM;
1127 op->bytes = 16;
1128 op->addr.xmm = reg;
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001129 kvm_read_sse_reg(reg, &op->vec_val);
Avi Kivity1253791d2011-03-29 11:41:27 +02001130 return;
1131 }
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03001132 if (ctxt->d & Mmx) {
1133 reg &= 7;
1134 op->type = OP_MM;
1135 op->bytes = 8;
1136 op->addr.mm = reg;
1137 return;
1138 }
Avi Kivity1253791d2011-03-29 11:41:27 +02001139
Avi Kivity3c118e22007-10-31 10:27:04 +02001140 op->type = OP_REG;
Gleb Natapov6d4d85e2013-11-04 15:52:42 +02001141 op->bytes = (ctxt->d & ByteOp) ? 1 : ctxt->op_bytes;
1142 op->addr.reg = decode_register(ctxt, reg, ctxt->d & ByteOp);
1143
Avi Kivity91ff3cb2010-08-01 12:53:09 +03001144 fetch_register_operand(op);
Avi Kivity3c118e22007-10-31 10:27:04 +02001145 op->orig_val = op->val;
1146}
1147
Avi Kivitya6e34072012-06-10 17:15:39 +03001148static void adjust_modrm_seg(struct x86_emulate_ctxt *ctxt, int base_reg)
1149{
1150 if (base_reg == VCPU_REGS_RSP || base_reg == VCPU_REGS_RBP)
1151 ctxt->modrm_seg = VCPU_SREG_SS;
1152}
1153
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001154static int decode_modrm(struct x86_emulate_ctxt *ctxt,
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001155 struct operand *op)
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001156{
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001157 u8 sib;
Bandan Das02357bd2014-04-16 12:46:11 -04001158 int index_reg, base_reg, scale;
Takuya Yoshikawa3e2815e2010-02-12 15:53:59 +09001159 int rc = X86EMUL_CONTINUE;
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001160 ulong modrm_ea = 0;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001161
Bandan Das02357bd2014-04-16 12:46:11 -04001162 ctxt->modrm_reg = ((ctxt->rex_prefix << 1) & 8); /* REX.R */
1163 index_reg = (ctxt->rex_prefix << 2) & 8; /* REX.X */
1164 base_reg = (ctxt->rex_prefix << 3) & 8; /* REX.B */
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001165
Bandan Das02357bd2014-04-16 12:46:11 -04001166 ctxt->modrm_mod = (ctxt->modrm & 0xc0) >> 6;
Avi Kivity9dac77f2011-06-01 15:34:25 +03001167 ctxt->modrm_reg |= (ctxt->modrm & 0x38) >> 3;
Bandan Das02357bd2014-04-16 12:46:11 -04001168 ctxt->modrm_rm = base_reg | (ctxt->modrm & 0x07);
Avi Kivity9dac77f2011-06-01 15:34:25 +03001169 ctxt->modrm_seg = VCPU_SREG_DS;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001170
Nadav Amit9b88ae92014-05-25 23:05:21 +03001171 if (ctxt->modrm_mod == 3 || (ctxt->d & NoMod)) {
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001172 op->type = OP_REG;
Avi Kivity9dac77f2011-06-01 15:34:25 +03001173 op->bytes = (ctxt->d & ByteOp) ? 1 : ctxt->op_bytes;
Paolo Bonzini8acb42072013-05-30 16:35:55 +02001174 op->addr.reg = decode_register(ctxt, ctxt->modrm_rm,
Gleb Natapovaa9ac1a2013-11-04 15:52:41 +02001175 ctxt->d & ByteOp);
Avi Kivity9dac77f2011-06-01 15:34:25 +03001176 if (ctxt->d & Sse) {
Avi Kivity1253791d2011-03-29 11:41:27 +02001177 op->type = OP_XMM;
1178 op->bytes = 16;
Avi Kivity9dac77f2011-06-01 15:34:25 +03001179 op->addr.xmm = ctxt->modrm_rm;
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001180 kvm_read_sse_reg(ctxt->modrm_rm, &op->vec_val);
Avi Kivity1253791d2011-03-29 11:41:27 +02001181 return rc;
1182 }
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03001183 if (ctxt->d & Mmx) {
1184 op->type = OP_MM;
1185 op->bytes = 8;
Paolo Bonzinibdc90722014-05-06 14:03:29 +02001186 op->addr.mm = ctxt->modrm_rm & 7;
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03001187 return rc;
1188 }
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001189 fetch_register_operand(op);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001190 return rc;
1191 }
1192
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001193 op->type = OP_MEM;
1194
Avi Kivity9dac77f2011-06-01 15:34:25 +03001195 if (ctxt->ad_bytes == 2) {
Avi Kivitydd856ef2012-08-27 23:46:17 +03001196 unsigned bx = reg_read(ctxt, VCPU_REGS_RBX);
1197 unsigned bp = reg_read(ctxt, VCPU_REGS_RBP);
1198 unsigned si = reg_read(ctxt, VCPU_REGS_RSI);
1199 unsigned di = reg_read(ctxt, VCPU_REGS_RDI);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001200
1201 /* 16-bit ModR/M decode. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03001202 switch (ctxt->modrm_mod) {
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001203 case 0:
Avi Kivity9dac77f2011-06-01 15:34:25 +03001204 if (ctxt->modrm_rm == 6)
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001205 modrm_ea += insn_fetch(u16, ctxt);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001206 break;
1207 case 1:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001208 modrm_ea += insn_fetch(s8, ctxt);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001209 break;
1210 case 2:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001211 modrm_ea += insn_fetch(u16, ctxt);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001212 break;
1213 }
Avi Kivity9dac77f2011-06-01 15:34:25 +03001214 switch (ctxt->modrm_rm) {
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001215 case 0:
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001216 modrm_ea += bx + si;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001217 break;
1218 case 1:
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001219 modrm_ea += bx + di;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001220 break;
1221 case 2:
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001222 modrm_ea += bp + si;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001223 break;
1224 case 3:
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001225 modrm_ea += bp + di;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001226 break;
1227 case 4:
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001228 modrm_ea += si;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001229 break;
1230 case 5:
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001231 modrm_ea += di;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001232 break;
1233 case 6:
Avi Kivity9dac77f2011-06-01 15:34:25 +03001234 if (ctxt->modrm_mod != 0)
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001235 modrm_ea += bp;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001236 break;
1237 case 7:
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001238 modrm_ea += bx;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001239 break;
1240 }
Avi Kivity9dac77f2011-06-01 15:34:25 +03001241 if (ctxt->modrm_rm == 2 || ctxt->modrm_rm == 3 ||
1242 (ctxt->modrm_rm == 6 && ctxt->modrm_mod != 0))
1243 ctxt->modrm_seg = VCPU_SREG_SS;
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001244 modrm_ea = (u16)modrm_ea;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001245 } else {
1246 /* 32/64-bit ModR/M decode. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03001247 if ((ctxt->modrm_rm & 7) == 4) {
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001248 sib = insn_fetch(u8, ctxt);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001249 index_reg |= (sib >> 3) & 7;
1250 base_reg |= sib & 7;
1251 scale = sib >> 6;
1252
Avi Kivity9dac77f2011-06-01 15:34:25 +03001253 if ((base_reg & 7) == 5 && ctxt->modrm_mod == 0)
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001254 modrm_ea += insn_fetch(s32, ctxt);
Avi Kivitya6e34072012-06-10 17:15:39 +03001255 else {
Avi Kivitydd856ef2012-08-27 23:46:17 +03001256 modrm_ea += reg_read(ctxt, base_reg);
Avi Kivitya6e34072012-06-10 17:15:39 +03001257 adjust_modrm_seg(ctxt, base_reg);
Nadav Amitab708092014-12-25 02:52:21 +02001258 /* Increment ESP on POP [ESP] */
1259 if ((ctxt->d & IncSP) &&
1260 base_reg == VCPU_REGS_RSP)
1261 modrm_ea += ctxt->op_bytes;
Avi Kivitya6e34072012-06-10 17:15:39 +03001262 }
Avi Kivitydc71d0f2008-06-15 21:23:17 -07001263 if (index_reg != 4)
Avi Kivitydd856ef2012-08-27 23:46:17 +03001264 modrm_ea += reg_read(ctxt, index_reg) << scale;
Avi Kivity9dac77f2011-06-01 15:34:25 +03001265 } else if ((ctxt->modrm_rm & 7) == 5 && ctxt->modrm_mod == 0) {
Nadav Amit5b38ab82014-11-02 11:54:41 +02001266 modrm_ea += insn_fetch(s32, ctxt);
Avi Kivity84411d82008-06-15 21:53:26 -07001267 if (ctxt->mode == X86EMUL_MODE_PROT64)
Avi Kivity9dac77f2011-06-01 15:34:25 +03001268 ctxt->rip_relative = 1;
Avi Kivitya6e34072012-06-10 17:15:39 +03001269 } else {
1270 base_reg = ctxt->modrm_rm;
Avi Kivitydd856ef2012-08-27 23:46:17 +03001271 modrm_ea += reg_read(ctxt, base_reg);
Avi Kivitya6e34072012-06-10 17:15:39 +03001272 adjust_modrm_seg(ctxt, base_reg);
1273 }
Avi Kivity9dac77f2011-06-01 15:34:25 +03001274 switch (ctxt->modrm_mod) {
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001275 case 1:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001276 modrm_ea += insn_fetch(s8, ctxt);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001277 break;
1278 case 2:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001279 modrm_ea += insn_fetch(s32, ctxt);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001280 break;
1281 }
1282 }
Avi Kivity90de84f2010-11-17 15:28:21 +02001283 op->addr.mem.ea = modrm_ea;
Bandan Das41061cd2014-04-16 12:46:14 -04001284 if (ctxt->ad_bytes != 8)
1285 ctxt->memop.addr.mem.ea = (u32)ctxt->memop.addr.mem.ea;
1286
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001287done:
1288 return rc;
1289}
1290
1291static int decode_abs(struct x86_emulate_ctxt *ctxt,
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001292 struct operand *op)
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001293{
Takuya Yoshikawa3e2815e2010-02-12 15:53:59 +09001294 int rc = X86EMUL_CONTINUE;
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001295
Avi Kivity2dbd0dd2010-08-01 15:40:19 +03001296 op->type = OP_MEM;
Avi Kivity9dac77f2011-06-01 15:34:25 +03001297 switch (ctxt->ad_bytes) {
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001298 case 2:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001299 op->addr.mem.ea = insn_fetch(u16, ctxt);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001300 break;
1301 case 4:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001302 op->addr.mem.ea = insn_fetch(u32, ctxt);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001303 break;
1304 case 8:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09001305 op->addr.mem.ea = insn_fetch(u64, ctxt);
Avi Kivity1c73ef6652007-11-01 06:31:28 +02001306 break;
1307 }
1308done:
1309 return rc;
1310}
1311
Avi Kivity9dac77f2011-06-01 15:34:25 +03001312static void fetch_bit_operand(struct x86_emulate_ctxt *ctxt)
Wei Yongjun35c843c2010-08-09 11:34:56 +08001313{
Sheng Yang7129eec2010-09-28 16:33:32 +08001314 long sv = 0, mask;
Wei Yongjun35c843c2010-08-09 11:34:56 +08001315
Avi Kivity9dac77f2011-06-01 15:34:25 +03001316 if (ctxt->dst.type == OP_MEM && ctxt->src.type == OP_REG) {
Nadav Amit7dec5602014-06-15 16:12:57 +03001317 mask = ~((long)ctxt->dst.bytes * 8 - 1);
Wei Yongjun35c843c2010-08-09 11:34:56 +08001318
Avi Kivity9dac77f2011-06-01 15:34:25 +03001319 if (ctxt->src.bytes == 2)
1320 sv = (s16)ctxt->src.val & (s16)mask;
1321 else if (ctxt->src.bytes == 4)
1322 sv = (s32)ctxt->src.val & (s32)mask;
Nadav Amit7dec5602014-06-15 16:12:57 +03001323 else
1324 sv = (s64)ctxt->src.val & (s64)mask;
Wei Yongjun35c843c2010-08-09 11:34:56 +08001325
Nadav Amit1c1c35a2014-11-19 17:43:09 +02001326 ctxt->dst.addr.mem.ea = address_mask(ctxt,
1327 ctxt->dst.addr.mem.ea + (sv >> 3));
Wei Yongjun35c843c2010-08-09 11:34:56 +08001328 }
Wei Yongjunba7ff2b2010-08-09 11:39:14 +08001329
1330 /* only subword offset */
Avi Kivity9dac77f2011-06-01 15:34:25 +03001331 ctxt->src.val &= (ctxt->dst.bytes << 3) - 1;
Wei Yongjun35c843c2010-08-09 11:34:56 +08001332}
1333
Gleb Natapov9de41572010-04-28 19:15:22 +03001334static int read_emulated(struct x86_emulate_ctxt *ctxt,
Gleb Natapov9de41572010-04-28 19:15:22 +03001335 unsigned long addr, void *dest, unsigned size)
1336{
1337 int rc;
Avi Kivity9dac77f2011-06-01 15:34:25 +03001338 struct read_cache *mc = &ctxt->mem_read;
Gleb Natapov9de41572010-04-28 19:15:22 +03001339
Xiao Guangrongf23b0702012-07-26 13:12:22 +08001340 if (mc->pos < mc->end)
1341 goto read_cached;
Gleb Natapov9de41572010-04-28 19:15:22 +03001342
Xiao Guangrongf23b0702012-07-26 13:12:22 +08001343 WARN_ON((mc->end + size) >= sizeof(mc->data));
Gleb Natapov9de41572010-04-28 19:15:22 +03001344
Xiao Guangrongf23b0702012-07-26 13:12:22 +08001345 rc = ctxt->ops->read_emulated(ctxt, addr, mc->data + mc->end, size,
1346 &ctxt->exception);
1347 if (rc != X86EMUL_CONTINUE)
1348 return rc;
1349
1350 mc->end += size;
1351
1352read_cached:
1353 memcpy(dest, mc->data + mc->pos, size);
1354 mc->pos += size;
Gleb Natapov9de41572010-04-28 19:15:22 +03001355 return X86EMUL_CONTINUE;
1356}
1357
Avi Kivity3ca3ac42011-03-31 16:52:26 +02001358static int segmented_read(struct x86_emulate_ctxt *ctxt,
1359 struct segmented_address addr,
1360 void *data,
1361 unsigned size)
1362{
Avi Kivity9fa088f2011-03-31 18:54:30 +02001363 int rc;
1364 ulong linear;
1365
Avi Kivity83b87952011-04-03 11:31:19 +03001366 rc = linearize(ctxt, addr, size, false, &linear);
Avi Kivity9fa088f2011-03-31 18:54:30 +02001367 if (rc != X86EMUL_CONTINUE)
1368 return rc;
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09001369 return read_emulated(ctxt, linear, data, size);
Avi Kivity3ca3ac42011-03-31 16:52:26 +02001370}
1371
1372static int segmented_write(struct x86_emulate_ctxt *ctxt,
1373 struct segmented_address addr,
1374 const void *data,
1375 unsigned size)
1376{
Avi Kivity9fa088f2011-03-31 18:54:30 +02001377 int rc;
1378 ulong linear;
1379
Avi Kivity83b87952011-04-03 11:31:19 +03001380 rc = linearize(ctxt, addr, size, true, &linear);
Avi Kivity9fa088f2011-03-31 18:54:30 +02001381 if (rc != X86EMUL_CONTINUE)
1382 return rc;
Avi Kivity0f65dd72011-04-20 13:37:53 +03001383 return ctxt->ops->write_emulated(ctxt, linear, data, size,
1384 &ctxt->exception);
Avi Kivity3ca3ac42011-03-31 16:52:26 +02001385}
1386
1387static int segmented_cmpxchg(struct x86_emulate_ctxt *ctxt,
1388 struct segmented_address addr,
1389 const void *orig_data, const void *data,
1390 unsigned size)
1391{
Avi Kivity9fa088f2011-03-31 18:54:30 +02001392 int rc;
1393 ulong linear;
1394
Avi Kivity83b87952011-04-03 11:31:19 +03001395 rc = linearize(ctxt, addr, size, true, &linear);
Avi Kivity9fa088f2011-03-31 18:54:30 +02001396 if (rc != X86EMUL_CONTINUE)
1397 return rc;
Avi Kivity0f65dd72011-04-20 13:37:53 +03001398 return ctxt->ops->cmpxchg_emulated(ctxt, linear, orig_data, data,
1399 size, &ctxt->exception);
Avi Kivity3ca3ac42011-03-31 16:52:26 +02001400}
1401
Gleb Natapov7b262e92010-03-18 15:20:27 +02001402static int pio_in_emulated(struct x86_emulate_ctxt *ctxt,
Gleb Natapov7b262e92010-03-18 15:20:27 +02001403 unsigned int size, unsigned short port,
1404 void *dest)
1405{
Avi Kivity9dac77f2011-06-01 15:34:25 +03001406 struct read_cache *rc = &ctxt->io_read;
Gleb Natapov7b262e92010-03-18 15:20:27 +02001407
1408 if (rc->pos == rc->end) { /* refill pio read ahead */
Gleb Natapov7b262e92010-03-18 15:20:27 +02001409 unsigned int in_page, n;
Avi Kivity9dac77f2011-06-01 15:34:25 +03001410 unsigned int count = ctxt->rep_prefix ?
Avi Kivitydd856ef2012-08-27 23:46:17 +03001411 address_mask(ctxt, reg_read(ctxt, VCPU_REGS_RCX)) : 1;
Nadav Amit0efb0442015-03-29 16:33:03 +03001412 in_page = (ctxt->eflags & X86_EFLAGS_DF) ?
Avi Kivitydd856ef2012-08-27 23:46:17 +03001413 offset_in_page(reg_read(ctxt, VCPU_REGS_RDI)) :
1414 PAGE_SIZE - offset_in_page(reg_read(ctxt, VCPU_REGS_RDI));
Mark Rustadb55a8142014-07-25 06:27:05 -07001415 n = min3(in_page, (unsigned int)sizeof(rc->data) / size, count);
Gleb Natapov7b262e92010-03-18 15:20:27 +02001416 if (n == 0)
1417 n = 1;
1418 rc->pos = rc->end = 0;
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09001419 if (!ctxt->ops->pio_in_emulated(ctxt, size, port, rc->data, n))
Gleb Natapov7b262e92010-03-18 15:20:27 +02001420 return 0;
1421 rc->end = n * size;
1422 }
1423
Nadav Amite6e39f02014-04-18 03:35:10 +03001424 if (ctxt->rep_prefix && (ctxt->d & String) &&
Nadav Amit0efb0442015-03-29 16:33:03 +03001425 !(ctxt->eflags & X86_EFLAGS_DF)) {
Gleb Natapovb3356bf2012-09-03 15:24:29 +03001426 ctxt->dst.data = rc->data + rc->pos;
1427 ctxt->dst.type = OP_MEM_STR;
1428 ctxt->dst.count = (rc->end - rc->pos) / size;
1429 rc->pos = rc->end;
1430 } else {
1431 memcpy(dest, rc->data + rc->pos, size);
1432 rc->pos += size;
1433 }
Gleb Natapov7b262e92010-03-18 15:20:27 +02001434 return 1;
1435}
1436
Kevin Wolf7f3d35f2012-02-08 14:34:38 +01001437static int read_interrupt_descriptor(struct x86_emulate_ctxt *ctxt,
1438 u16 index, struct desc_struct *desc)
1439{
1440 struct desc_ptr dt;
1441 ulong addr;
1442
1443 ctxt->ops->get_idt(ctxt, &dt);
1444
1445 if (dt.size < index * 8 + 7)
1446 return emulate_gp(ctxt, index << 3 | 0x2);
1447
1448 addr = dt.address + index * 8;
Jordan Borgner0e96f312018-10-28 12:58:28 +00001449 return linear_read_system(ctxt, addr, desc, sizeof(*desc));
Kevin Wolf7f3d35f2012-02-08 14:34:38 +01001450}
1451
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001452static void get_descriptor_table_ptr(struct x86_emulate_ctxt *ctxt,
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001453 u16 selector, struct desc_ptr *dt)
1454{
Mathias Krause0225fb52012-08-30 01:30:16 +02001455 const struct x86_emulate_ops *ops = ctxt->ops;
Nadav Amit2eedcac2014-06-02 18:34:05 +03001456 u32 base3 = 0;
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09001457
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001458 if (selector & 1 << 2) {
1459 struct desc_struct desc;
Avi Kivity1aa36612011-04-27 13:20:30 +03001460 u16 sel;
1461
Jordan Borgner0e96f312018-10-28 12:58:28 +00001462 memset(dt, 0, sizeof(*dt));
Nadav Amit2eedcac2014-06-02 18:34:05 +03001463 if (!ops->get_segment(ctxt, &sel, &desc, &base3,
1464 VCPU_SREG_LDTR))
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001465 return;
1466
1467 dt->size = desc_limit_scaled(&desc); /* what if limit > 65535? */
Nadav Amit2eedcac2014-06-02 18:34:05 +03001468 dt->address = get_desc_base(&desc) | ((u64)base3 << 32);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001469 } else
Avi Kivity4bff1e862011-04-20 13:37:53 +03001470 ops->get_gdt(ctxt, dt);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001471}
1472
Nadav Amitedccda72014-12-25 02:52:23 +02001473static int get_descriptor_ptr(struct x86_emulate_ctxt *ctxt,
1474 u16 selector, ulong *desc_addr_p)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001475{
1476 struct desc_ptr dt;
1477 u16 index = selector >> 3;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001478 ulong addr;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001479
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09001480 get_descriptor_table_ptr(ctxt, selector, &dt);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001481
Avi Kivity35d3d4a2010-11-22 17:53:25 +02001482 if (dt.size < index * 8 + 7)
1483 return emulate_gp(ctxt, selector & 0xfffc);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001484
1485 addr = dt.address + index * 8;
Nadav Amitedccda72014-12-25 02:52:23 +02001486
1487#ifdef CONFIG_X86_64
1488 if (addr >> 32 != 0) {
1489 u64 efer = 0;
1490
1491 ctxt->ops->get_msr(ctxt, MSR_EFER, &efer);
1492 if (!(efer & EFER_LMA))
1493 addr &= (u32)-1;
1494 }
1495#endif
1496
1497 *desc_addr_p = addr;
1498 return X86EMUL_CONTINUE;
1499}
1500
1501/* allowed just for 8 bytes segments */
1502static int read_segment_descriptor(struct x86_emulate_ctxt *ctxt,
1503 u16 selector, struct desc_struct *desc,
1504 ulong *desc_addr_p)
1505{
1506 int rc;
1507
1508 rc = get_descriptor_ptr(ctxt, selector, desc_addr_p);
1509 if (rc != X86EMUL_CONTINUE)
1510 return rc;
1511
Paolo Bonzini79367a62018-06-06 16:43:02 +02001512 return linear_read_system(ctxt, *desc_addr_p, desc, sizeof(*desc));
Nadav Amitedccda72014-12-25 02:52:23 +02001513}
1514
1515/* allowed just for 8 bytes segments */
1516static int write_segment_descriptor(struct x86_emulate_ctxt *ctxt,
1517 u16 selector, struct desc_struct *desc)
1518{
1519 int rc;
1520 ulong addr;
1521
1522 rc = get_descriptor_ptr(ctxt, selector, &addr);
1523 if (rc != X86EMUL_CONTINUE)
1524 return rc;
1525
Jordan Borgner0e96f312018-10-28 12:58:28 +00001526 return linear_write_system(ctxt, addr, desc, sizeof(*desc));
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001527}
1528
Paolo Bonzini2356aae2014-05-15 17:56:57 +02001529static int __load_segment_descriptor(struct x86_emulate_ctxt *ctxt,
Nadav Amitd1442d82014-09-18 22:39:39 +03001530 u16 selector, int seg, u8 cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02001531 enum x86_transfer_type transfer,
Nadav Amitd1442d82014-09-18 22:39:39 +03001532 struct desc_struct *desc)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001533{
Avi Kivity869be992012-06-13 16:30:53 +03001534 struct desc_struct seg_desc, old_desc;
Paolo Bonzini2356aae2014-05-15 17:56:57 +02001535 u8 dpl, rpl;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001536 unsigned err_vec = GP_VECTOR;
1537 u32 err_code = 0;
1538 bool null_selector = !(selector & ~0x3); /* 0000-0003 are null */
Avi Kivitye9194642012-06-13 16:29:39 +03001539 ulong desc_addr;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001540 int ret;
Avi Kivity03ebebe2012-08-21 17:07:04 +03001541 u16 dummy;
Nadav Amite37a75a2014-06-02 18:34:04 +03001542 u32 base3 = 0;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001543
Jordan Borgner0e96f312018-10-28 12:58:28 +00001544 memset(&seg_desc, 0, sizeof(seg_desc));
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001545
Kevin Wolff8da94e2013-04-11 14:06:03 +02001546 if (ctxt->mode == X86EMUL_MODE_REAL) {
1547 /* set real mode segment descriptor (keep limit etc. for
1548 * unreal mode) */
Avi Kivity03ebebe2012-08-21 17:07:04 +03001549 ctxt->ops->get_segment(ctxt, &dummy, &seg_desc, NULL, seg);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001550 set_desc_base(&seg_desc, selector << 4);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001551 goto load;
Kevin Wolff8da94e2013-04-11 14:06:03 +02001552 } else if (seg <= VCPU_SREG_GS && ctxt->mode == X86EMUL_MODE_VM86) {
1553 /* VM86 needs a clean new segment descriptor */
1554 set_desc_base(&seg_desc, selector << 4);
1555 set_desc_limit(&seg_desc, 0xffff);
1556 seg_desc.type = 3;
1557 seg_desc.p = 1;
1558 seg_desc.s = 1;
1559 seg_desc.dpl = 3;
1560 goto load;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001561 }
1562
Avi Kivity79d5b4c2012-06-07 17:03:42 +03001563 rpl = selector & 3;
Avi Kivity79d5b4c2012-06-07 17:03:42 +03001564
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001565 /* TR should be in GDT only */
1566 if (seg == VCPU_SREG_TR && (selector & (1 << 2)))
1567 goto exception;
1568
Paolo Bonzini33ab9112017-01-12 15:02:32 +01001569 /* NULL selector is not valid for TR, CS and (except for long mode) SS */
1570 if (null_selector) {
1571 if (seg == VCPU_SREG_CS || seg == VCPU_SREG_TR)
1572 goto exception;
1573
1574 if (seg == VCPU_SREG_SS) {
1575 if (ctxt->mode != X86EMUL_MODE_PROT64 || rpl != cpl)
1576 goto exception;
1577
1578 /*
1579 * ctxt->ops->set_segment expects the CPL to be in
1580 * SS.DPL, so fake an expand-up 32-bit data segment.
1581 */
1582 seg_desc.type = 3;
1583 seg_desc.p = 1;
1584 seg_desc.s = 1;
1585 seg_desc.dpl = cpl;
1586 seg_desc.d = 1;
1587 seg_desc.g = 1;
1588 }
1589
1590 /* Skip all following checks */
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001591 goto load;
Paolo Bonzini33ab9112017-01-12 15:02:32 +01001592 }
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001593
Avi Kivitye9194642012-06-13 16:29:39 +03001594 ret = read_segment_descriptor(ctxt, selector, &seg_desc, &desc_addr);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001595 if (ret != X86EMUL_CONTINUE)
1596 return ret;
1597
1598 err_code = selector & 0xfffc;
Nadav Amit3dc4bc42014-12-25 02:52:19 +02001599 err_vec = (transfer == X86_TRANSFER_TASK_SWITCH) ? TS_VECTOR :
1600 GP_VECTOR;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001601
Guo Chaofc058682012-06-28 15:19:51 +08001602 /* can't load system descriptor into segment selector */
Nadav Amit3dc4bc42014-12-25 02:52:19 +02001603 if (seg <= VCPU_SREG_GS && !seg_desc.s) {
1604 if (transfer == X86_TRANSFER_CALL_JMP)
1605 return X86EMUL_UNHANDLEABLE;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001606 goto exception;
Nadav Amit3dc4bc42014-12-25 02:52:19 +02001607 }
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001608
1609 if (!seg_desc.p) {
1610 err_vec = (seg == VCPU_SREG_SS) ? SS_VECTOR : NP_VECTOR;
1611 goto exception;
1612 }
1613
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001614 dpl = seg_desc.dpl;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001615
1616 switch (seg) {
1617 case VCPU_SREG_SS:
1618 /*
1619 * segment is not a writable data segment or segment
1620 * selector's RPL != CPL or segment selector's RPL != CPL
1621 */
1622 if (rpl != cpl || (seg_desc.type & 0xa) != 0x2 || dpl != cpl)
1623 goto exception;
1624 break;
1625 case VCPU_SREG_CS:
1626 if (!(seg_desc.type & 8))
1627 goto exception;
1628
1629 if (seg_desc.type & 4) {
1630 /* conforming */
1631 if (dpl > cpl)
1632 goto exception;
1633 } else {
1634 /* nonconforming */
1635 if (rpl > cpl || dpl != cpl)
1636 goto exception;
1637 }
Nadav Amit040c8dc2014-09-18 22:39:43 +03001638 /* in long-mode d/b must be clear if l is set */
1639 if (seg_desc.d && seg_desc.l) {
1640 u64 efer = 0;
1641
1642 ctxt->ops->get_msr(ctxt, MSR_EFER, &efer);
1643 if (efer & EFER_LMA)
1644 goto exception;
1645 }
1646
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001647 /* CS(RPL) <- CPL */
1648 selector = (selector & 0xfffc) | cpl;
1649 break;
1650 case VCPU_SREG_TR:
1651 if (seg_desc.s || (seg_desc.type != 1 && seg_desc.type != 9))
1652 goto exception;
Avi Kivity869be992012-06-13 16:30:53 +03001653 old_desc = seg_desc;
1654 seg_desc.type |= 2; /* busy */
1655 ret = ctxt->ops->cmpxchg_emulated(ctxt, desc_addr, &old_desc, &seg_desc,
1656 sizeof(seg_desc), &ctxt->exception);
1657 if (ret != X86EMUL_CONTINUE)
1658 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001659 break;
1660 case VCPU_SREG_LDTR:
1661 if (seg_desc.s || seg_desc.type != 2)
1662 goto exception;
1663 break;
1664 default: /* DS, ES, FS, or GS */
1665 /*
1666 * segment is not a data or readable code segment or
1667 * ((segment is a data or nonconforming code segment)
1668 * and (both RPL and CPL > DPL))
1669 */
1670 if ((seg_desc.type & 0xa) == 0x8 ||
1671 (((seg_desc.type & 0xc) != 0xc) &&
1672 (rpl > dpl && cpl > dpl)))
1673 goto exception;
1674 break;
1675 }
1676
1677 if (seg_desc.s) {
1678 /* mark segment as accessed */
Nadav Amite2cefa72014-12-25 02:52:22 +02001679 if (!(seg_desc.type & 1)) {
1680 seg_desc.type |= 1;
1681 ret = write_segment_descriptor(ctxt, selector,
1682 &seg_desc);
1683 if (ret != X86EMUL_CONTINUE)
1684 return ret;
1685 }
Nadav Amite37a75a2014-06-02 18:34:04 +03001686 } else if (ctxt->mode == X86EMUL_MODE_PROT64) {
Paolo Bonzini79367a62018-06-06 16:43:02 +02001687 ret = linear_read_system(ctxt, desc_addr+8, &base3, sizeof(base3));
Nadav Amite37a75a2014-06-02 18:34:04 +03001688 if (ret != X86EMUL_CONTINUE)
1689 return ret;
Yu Zhangfd8cb432017-08-24 20:27:56 +08001690 if (emul_is_noncanonical_address(get_desc_base(&seg_desc) |
1691 ((u64)base3 << 32), ctxt))
Nadav Amit9a9abf62014-11-02 11:54:56 +02001692 return emulate_gp(ctxt, 0);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001693 }
1694load:
Nadav Amite37a75a2014-06-02 18:34:04 +03001695 ctxt->ops->set_segment(ctxt, selector, &seg_desc, base3, seg);
Nadav Amitd1442d82014-09-18 22:39:39 +03001696 if (desc)
1697 *desc = seg_desc;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001698 return X86EMUL_CONTINUE;
1699exception:
Paolo Bonzini592f0852014-08-20 10:05:08 +02001700 return emulate_exception(ctxt, err_vec, err_code, true);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02001701}
1702
Paolo Bonzini2356aae2014-05-15 17:56:57 +02001703static int load_segment_descriptor(struct x86_emulate_ctxt *ctxt,
1704 u16 selector, int seg)
1705{
1706 u8 cpl = ctxt->ops->cpl(ctxt);
Paolo Bonzini33ab9112017-01-12 15:02:32 +01001707
1708 /*
1709 * None of MOV, POP and LSS can load a NULL selector in CPL=3, but
1710 * they can load it at CPL<3 (Intel's manual says only LSS can,
1711 * but it's wrong).
1712 *
1713 * However, the Intel manual says that putting IST=1/DPL=3 in
1714 * an interrupt gate will result in SS=3 (the AMD manual instead
1715 * says it doesn't), so allow SS=3 in __load_segment_descriptor
1716 * and only forbid it here.
1717 */
1718 if (seg == VCPU_SREG_SS && selector == 3 &&
1719 ctxt->mode == X86EMUL_MODE_PROT64)
1720 return emulate_exception(ctxt, GP_VECTOR, 0, true);
1721
Nadav Amit3dc4bc42014-12-25 02:52:19 +02001722 return __load_segment_descriptor(ctxt, selector, seg, cpl,
1723 X86_TRANSFER_NONE, NULL);
Paolo Bonzini2356aae2014-05-15 17:56:57 +02001724}
1725
Wei Yongjun31be40b2010-08-17 09:17:30 +08001726static void write_register_operand(struct operand *op)
1727{
Nadav Amit6fd8e122015-03-30 15:39:20 +03001728 return assign_register(op->addr.reg, op->val, op->bytes);
Wei Yongjun31be40b2010-08-17 09:17:30 +08001729}
1730
Avi Kivityfb32b1e2013-02-09 11:31:44 +02001731static int writeback(struct x86_emulate_ctxt *ctxt, struct operand *op)
Wei Yongjunc37eda12010-06-15 09:03:33 +08001732{
Avi Kivityfb32b1e2013-02-09 11:31:44 +02001733 switch (op->type) {
Wei Yongjunc37eda12010-06-15 09:03:33 +08001734 case OP_REG:
Avi Kivityfb32b1e2013-02-09 11:31:44 +02001735 write_register_operand(op);
Wei Yongjunc37eda12010-06-15 09:03:33 +08001736 break;
1737 case OP_MEM:
Avi Kivity9dac77f2011-06-01 15:34:25 +03001738 if (ctxt->lock_prefix)
Paolo Bonzinif5f87df2014-04-01 13:23:24 +02001739 return segmented_cmpxchg(ctxt,
1740 op->addr.mem,
1741 &op->orig_val,
1742 &op->val,
1743 op->bytes);
1744 else
1745 return segmented_write(ctxt,
Avi Kivityfb32b1e2013-02-09 11:31:44 +02001746 op->addr.mem,
Avi Kivityfb32b1e2013-02-09 11:31:44 +02001747 &op->val,
1748 op->bytes);
Wei Yongjunc37eda12010-06-15 09:03:33 +08001749 break;
Gleb Natapovb3356bf2012-09-03 15:24:29 +03001750 case OP_MEM_STR:
Paolo Bonzinif5f87df2014-04-01 13:23:24 +02001751 return segmented_write(ctxt,
1752 op->addr.mem,
1753 op->data,
1754 op->bytes * op->count);
Gleb Natapovb3356bf2012-09-03 15:24:29 +03001755 break;
Avi Kivity1253791d2011-03-29 11:41:27 +02001756 case OP_XMM:
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001757 kvm_write_sse_reg(op->addr.xmm, &op->vec_val);
Avi Kivity1253791d2011-03-29 11:41:27 +02001758 break;
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03001759 case OP_MM:
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02001760 kvm_write_mmx_reg(op->addr.mm, &op->mm_val);
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03001761 break;
Wei Yongjunc37eda12010-06-15 09:03:33 +08001762 case OP_NONE:
1763 /* no writeback */
1764 break;
1765 default:
1766 break;
1767 }
1768 return X86EMUL_CONTINUE;
1769}
1770
Avi Kivity51ddff52012-06-12 20:19:40 +03001771static int push(struct x86_emulate_ctxt *ctxt, void *data, int bytes)
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02001772{
Takuya Yoshikawa4179bb02011-04-13 00:29:09 +09001773 struct segmented_address addr;
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02001774
Avi Kivity5ad105e2012-08-19 14:34:31 +03001775 rsp_increment(ctxt, -bytes);
Avi Kivitydd856ef2012-08-27 23:46:17 +03001776 addr.ea = reg_read(ctxt, VCPU_REGS_RSP) & stack_mask(ctxt);
Takuya Yoshikawa4179bb02011-04-13 00:29:09 +09001777 addr.seg = VCPU_SREG_SS;
1778
Avi Kivity51ddff52012-06-12 20:19:40 +03001779 return segmented_write(ctxt, addr, data, bytes);
1780}
1781
1782static int em_push(struct x86_emulate_ctxt *ctxt)
1783{
Takuya Yoshikawa4179bb02011-04-13 00:29:09 +09001784 /* Disable writeback. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03001785 ctxt->dst.type = OP_NONE;
Avi Kivity51ddff52012-06-12 20:19:40 +03001786 return push(ctxt, &ctxt->src.val, ctxt->op_bytes);
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02001787}
1788
Avi Kivityfaa5a3a2008-11-27 17:36:41 +02001789static int emulate_pop(struct x86_emulate_ctxt *ctxt,
Avi Kivity350f69d2009-01-05 11:12:40 +02001790 void *dest, int len)
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02001791{
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02001792 int rc;
Avi Kivity90de84f2010-11-17 15:28:21 +02001793 struct segmented_address addr;
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02001794
Avi Kivitydd856ef2012-08-27 23:46:17 +03001795 addr.ea = reg_read(ctxt, VCPU_REGS_RSP) & stack_mask(ctxt);
Avi Kivity90de84f2010-11-17 15:28:21 +02001796 addr.seg = VCPU_SREG_SS;
Avi Kivity3ca3ac42011-03-31 16:52:26 +02001797 rc = segmented_read(ctxt, addr, dest, len);
Takuya Yoshikawab60d5132010-01-20 16:47:21 +09001798 if (rc != X86EMUL_CONTINUE)
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02001799 return rc;
1800
Avi Kivity5ad105e2012-08-19 14:34:31 +03001801 rsp_increment(ctxt, len);
Avi Kivityfaa5a3a2008-11-27 17:36:41 +02001802 return rc;
1803}
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02001804
Takuya Yoshikawac54fe502011-04-23 18:49:40 +09001805static int em_pop(struct x86_emulate_ctxt *ctxt)
1806{
Avi Kivity9dac77f2011-06-01 15:34:25 +03001807 return emulate_pop(ctxt, &ctxt->dst.val, ctxt->op_bytes);
Takuya Yoshikawac54fe502011-04-23 18:49:40 +09001808}
1809
Gleb Natapovd4c6a152010-02-10 14:21:34 +02001810static int emulate_popf(struct x86_emulate_ctxt *ctxt,
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09001811 void *dest, int len)
Gleb Natapovd4c6a152010-02-10 14:21:34 +02001812{
1813 int rc;
1814 unsigned long val, change_mask;
Nadav Amit0efb0442015-03-29 16:33:03 +03001815 int iopl = (ctxt->eflags & X86_EFLAGS_IOPL) >> X86_EFLAGS_IOPL_BIT;
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09001816 int cpl = ctxt->ops->cpl(ctxt);
Gleb Natapovd4c6a152010-02-10 14:21:34 +02001817
Takuya Yoshikawa3b9be3b2011-05-02 02:27:55 +09001818 rc = emulate_pop(ctxt, &val, len);
Gleb Natapovd4c6a152010-02-10 14:21:34 +02001819 if (rc != X86EMUL_CONTINUE)
1820 return rc;
1821
Nadav Amit0efb0442015-03-29 16:33:03 +03001822 change_mask = X86_EFLAGS_CF | X86_EFLAGS_PF | X86_EFLAGS_AF |
1823 X86_EFLAGS_ZF | X86_EFLAGS_SF | X86_EFLAGS_OF |
1824 X86_EFLAGS_TF | X86_EFLAGS_DF | X86_EFLAGS_NT |
1825 X86_EFLAGS_AC | X86_EFLAGS_ID;
Gleb Natapovd4c6a152010-02-10 14:21:34 +02001826
1827 switch(ctxt->mode) {
1828 case X86EMUL_MODE_PROT64:
1829 case X86EMUL_MODE_PROT32:
1830 case X86EMUL_MODE_PROT16:
1831 if (cpl == 0)
Nadav Amit0efb0442015-03-29 16:33:03 +03001832 change_mask |= X86_EFLAGS_IOPL;
Gleb Natapovd4c6a152010-02-10 14:21:34 +02001833 if (cpl <= iopl)
Nadav Amit0efb0442015-03-29 16:33:03 +03001834 change_mask |= X86_EFLAGS_IF;
Gleb Natapovd4c6a152010-02-10 14:21:34 +02001835 break;
1836 case X86EMUL_MODE_VM86:
Avi Kivity35d3d4a2010-11-22 17:53:25 +02001837 if (iopl < 3)
1838 return emulate_gp(ctxt, 0);
Nadav Amit0efb0442015-03-29 16:33:03 +03001839 change_mask |= X86_EFLAGS_IF;
Gleb Natapovd4c6a152010-02-10 14:21:34 +02001840 break;
1841 default: /* real mode */
Nadav Amit0efb0442015-03-29 16:33:03 +03001842 change_mask |= (X86_EFLAGS_IOPL | X86_EFLAGS_IF);
Gleb Natapovd4c6a152010-02-10 14:21:34 +02001843 break;
1844 }
1845
1846 *(unsigned long *)dest =
1847 (ctxt->eflags & ~change_mask) | (val & change_mask);
1848
1849 return rc;
1850}
1851
Takuya Yoshikawa62aaa2f2011-04-23 18:52:56 +09001852static int em_popf(struct x86_emulate_ctxt *ctxt)
1853{
Avi Kivity9dac77f2011-06-01 15:34:25 +03001854 ctxt->dst.type = OP_REG;
1855 ctxt->dst.addr.reg = &ctxt->eflags;
1856 ctxt->dst.bytes = ctxt->op_bytes;
1857 return emulate_popf(ctxt, &ctxt->dst.val, ctxt->op_bytes);
Takuya Yoshikawa62aaa2f2011-04-23 18:52:56 +09001858}
1859
Avi Kivity612e89f2012-06-12 20:03:23 +03001860static int em_enter(struct x86_emulate_ctxt *ctxt)
1861{
1862 int rc;
1863 unsigned frame_size = ctxt->src.val;
1864 unsigned nesting_level = ctxt->src2.val & 31;
Avi Kivitydd856ef2012-08-27 23:46:17 +03001865 ulong rbp;
Avi Kivity612e89f2012-06-12 20:03:23 +03001866
1867 if (nesting_level)
1868 return X86EMUL_UNHANDLEABLE;
1869
Avi Kivitydd856ef2012-08-27 23:46:17 +03001870 rbp = reg_read(ctxt, VCPU_REGS_RBP);
1871 rc = push(ctxt, &rbp, stack_size(ctxt));
Avi Kivity612e89f2012-06-12 20:03:23 +03001872 if (rc != X86EMUL_CONTINUE)
1873 return rc;
Avi Kivitydd856ef2012-08-27 23:46:17 +03001874 assign_masked(reg_rmw(ctxt, VCPU_REGS_RBP), reg_read(ctxt, VCPU_REGS_RSP),
Avi Kivity612e89f2012-06-12 20:03:23 +03001875 stack_mask(ctxt));
Avi Kivitydd856ef2012-08-27 23:46:17 +03001876 assign_masked(reg_rmw(ctxt, VCPU_REGS_RSP),
1877 reg_read(ctxt, VCPU_REGS_RSP) - frame_size,
Avi Kivity612e89f2012-06-12 20:03:23 +03001878 stack_mask(ctxt));
1879 return X86EMUL_CONTINUE;
1880}
1881
Avi Kivityf47cfa32012-06-07 17:49:24 +03001882static int em_leave(struct x86_emulate_ctxt *ctxt)
1883{
Avi Kivitydd856ef2012-08-27 23:46:17 +03001884 assign_masked(reg_rmw(ctxt, VCPU_REGS_RSP), reg_read(ctxt, VCPU_REGS_RBP),
Avi Kivityf47cfa32012-06-07 17:49:24 +03001885 stack_mask(ctxt));
Avi Kivitydd856ef2012-08-27 23:46:17 +03001886 return emulate_pop(ctxt, reg_rmw(ctxt, VCPU_REGS_RBP), ctxt->op_bytes);
Avi Kivityf47cfa32012-06-07 17:49:24 +03001887}
1888
Avi Kivity1cd196e2011-09-13 10:45:51 +03001889static int em_push_sreg(struct x86_emulate_ctxt *ctxt)
Mohammed Gamal0934ac92009-08-23 14:24:24 +03001890{
Avi Kivity1cd196e2011-09-13 10:45:51 +03001891 int seg = ctxt->src2.val;
1892
Avi Kivity9dac77f2011-06-01 15:34:25 +03001893 ctxt->src.val = get_segment_selector(ctxt, seg);
Nadav Amit0fcc2072014-11-02 11:54:51 +02001894 if (ctxt->op_bytes == 4) {
1895 rsp_increment(ctxt, -2);
1896 ctxt->op_bytes = 2;
1897 }
Mohammed Gamal0934ac92009-08-23 14:24:24 +03001898
Takuya Yoshikawa4487b3b2011-04-13 00:31:23 +09001899 return em_push(ctxt);
Mohammed Gamal0934ac92009-08-23 14:24:24 +03001900}
1901
Avi Kivity1cd196e2011-09-13 10:45:51 +03001902static int em_pop_sreg(struct x86_emulate_ctxt *ctxt)
Mohammed Gamal0934ac92009-08-23 14:24:24 +03001903{
Avi Kivity1cd196e2011-09-13 10:45:51 +03001904 int seg = ctxt->src2.val;
Mohammed Gamal0934ac92009-08-23 14:24:24 +03001905 unsigned long selector;
1906 int rc;
1907
Nadav Amit3313bc42014-12-25 02:52:17 +02001908 rc = emulate_pop(ctxt, &selector, 2);
Takuya Yoshikawa1b30eaa2010-02-12 15:57:56 +09001909 if (rc != X86EMUL_CONTINUE)
Mohammed Gamal0934ac92009-08-23 14:24:24 +03001910 return rc;
1911
Paolo Bonzinia5457e72014-06-05 17:29:34 +02001912 if (ctxt->modrm_reg == VCPU_SREG_SS)
1913 ctxt->interruptibility = KVM_X86_SHADOW_INT_MOV_SS;
Nadav Amit3313bc42014-12-25 02:52:17 +02001914 if (ctxt->op_bytes > 2)
1915 rsp_increment(ctxt, ctxt->op_bytes - 2);
Paolo Bonzinia5457e72014-06-05 17:29:34 +02001916
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09001917 rc = load_segment_descriptor(ctxt, (u16)selector, seg);
Mohammed Gamal0934ac92009-08-23 14:24:24 +03001918 return rc;
1919}
1920
Takuya Yoshikawab96a7fa2011-04-23 18:51:07 +09001921static int em_pusha(struct x86_emulate_ctxt *ctxt)
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001922{
Avi Kivitydd856ef2012-08-27 23:46:17 +03001923 unsigned long old_esp = reg_read(ctxt, VCPU_REGS_RSP);
Wei Yongjunc37eda12010-06-15 09:03:33 +08001924 int rc = X86EMUL_CONTINUE;
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001925 int reg = VCPU_REGS_RAX;
1926
1927 while (reg <= VCPU_REGS_RDI) {
1928 (reg == VCPU_REGS_RSP) ?
Avi Kivitydd856ef2012-08-27 23:46:17 +03001929 (ctxt->src.val = old_esp) : (ctxt->src.val = reg_read(ctxt, reg));
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001930
Takuya Yoshikawa4487b3b2011-04-13 00:31:23 +09001931 rc = em_push(ctxt);
Wei Yongjunc37eda12010-06-15 09:03:33 +08001932 if (rc != X86EMUL_CONTINUE)
1933 return rc;
1934
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001935 ++reg;
1936 }
Wei Yongjunc37eda12010-06-15 09:03:33 +08001937
Wei Yongjunc37eda12010-06-15 09:03:33 +08001938 return rc;
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001939}
1940
Takuya Yoshikawa62aaa2f2011-04-23 18:52:56 +09001941static int em_pushf(struct x86_emulate_ctxt *ctxt)
1942{
Nadav Amit0efb0442015-03-29 16:33:03 +03001943 ctxt->src.val = (unsigned long)ctxt->eflags & ~X86_EFLAGS_VM;
Takuya Yoshikawa62aaa2f2011-04-23 18:52:56 +09001944 return em_push(ctxt);
1945}
1946
Takuya Yoshikawab96a7fa2011-04-23 18:51:07 +09001947static int em_popa(struct x86_emulate_ctxt *ctxt)
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001948{
Takuya Yoshikawa1b30eaa2010-02-12 15:57:56 +09001949 int rc = X86EMUL_CONTINUE;
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001950 int reg = VCPU_REGS_RDI;
Nadav Amit6fd8e122015-03-30 15:39:20 +03001951 u32 val;
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001952
1953 while (reg >= VCPU_REGS_RAX) {
1954 if (reg == VCPU_REGS_RSP) {
Avi Kivity5ad105e2012-08-19 14:34:31 +03001955 rsp_increment(ctxt, ctxt->op_bytes);
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001956 --reg;
1957 }
1958
Nadav Amit6fd8e122015-03-30 15:39:20 +03001959 rc = emulate_pop(ctxt, &val, ctxt->op_bytes);
Takuya Yoshikawa1b30eaa2010-02-12 15:57:56 +09001960 if (rc != X86EMUL_CONTINUE)
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001961 break;
Nadav Amit6fd8e122015-03-30 15:39:20 +03001962 assign_register(reg_rmw(ctxt, reg), val, ctxt->op_bytes);
Mohammed Gamalabcf14b2009-09-01 15:28:11 +02001963 --reg;
1964 }
1965 return rc;
1966}
1967
Avi Kivitydd856ef2012-08-27 23:46:17 +03001968static int __emulate_int_real(struct x86_emulate_ctxt *ctxt, int irq)
Mohammed Gamal6e154e52010-08-04 14:38:06 +03001969{
Mathias Krause0225fb52012-08-30 01:30:16 +02001970 const struct x86_emulate_ops *ops = ctxt->ops;
Avi Kivity5c56e1c2010-08-17 11:17:51 +03001971 int rc;
Mohammed Gamal6e154e52010-08-04 14:38:06 +03001972 struct desc_ptr dt;
1973 gva_t cs_addr;
1974 gva_t eip_addr;
1975 u16 cs, eip;
Mohammed Gamal6e154e52010-08-04 14:38:06 +03001976
1977 /* TODO: Add limit checks */
Avi Kivity9dac77f2011-06-01 15:34:25 +03001978 ctxt->src.val = ctxt->eflags;
Takuya Yoshikawa4487b3b2011-04-13 00:31:23 +09001979 rc = em_push(ctxt);
Avi Kivity5c56e1c2010-08-17 11:17:51 +03001980 if (rc != X86EMUL_CONTINUE)
1981 return rc;
Mohammed Gamal6e154e52010-08-04 14:38:06 +03001982
Nadav Amit0efb0442015-03-29 16:33:03 +03001983 ctxt->eflags &= ~(X86_EFLAGS_IF | X86_EFLAGS_TF | X86_EFLAGS_AC);
Mohammed Gamal6e154e52010-08-04 14:38:06 +03001984
Avi Kivity9dac77f2011-06-01 15:34:25 +03001985 ctxt->src.val = get_segment_selector(ctxt, VCPU_SREG_CS);
Takuya Yoshikawa4487b3b2011-04-13 00:31:23 +09001986 rc = em_push(ctxt);
Avi Kivity5c56e1c2010-08-17 11:17:51 +03001987 if (rc != X86EMUL_CONTINUE)
1988 return rc;
Mohammed Gamal6e154e52010-08-04 14:38:06 +03001989
Avi Kivity9dac77f2011-06-01 15:34:25 +03001990 ctxt->src.val = ctxt->_eip;
Takuya Yoshikawa4487b3b2011-04-13 00:31:23 +09001991 rc = em_push(ctxt);
Avi Kivity5c56e1c2010-08-17 11:17:51 +03001992 if (rc != X86EMUL_CONTINUE)
1993 return rc;
1994
Avi Kivity4bff1e862011-04-20 13:37:53 +03001995 ops->get_idt(ctxt, &dt);
Mohammed Gamal6e154e52010-08-04 14:38:06 +03001996
1997 eip_addr = dt.address + (irq << 2);
1998 cs_addr = dt.address + (irq << 2) + 2;
1999
Paolo Bonzini79367a62018-06-06 16:43:02 +02002000 rc = linear_read_system(ctxt, cs_addr, &cs, 2);
Mohammed Gamal6e154e52010-08-04 14:38:06 +03002001 if (rc != X86EMUL_CONTINUE)
2002 return rc;
2003
Paolo Bonzini79367a62018-06-06 16:43:02 +02002004 rc = linear_read_system(ctxt, eip_addr, &eip, 2);
Mohammed Gamal6e154e52010-08-04 14:38:06 +03002005 if (rc != X86EMUL_CONTINUE)
2006 return rc;
2007
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002008 rc = load_segment_descriptor(ctxt, cs, VCPU_SREG_CS);
Mohammed Gamal6e154e52010-08-04 14:38:06 +03002009 if (rc != X86EMUL_CONTINUE)
2010 return rc;
2011
Avi Kivity9dac77f2011-06-01 15:34:25 +03002012 ctxt->_eip = eip;
Mohammed Gamal6e154e52010-08-04 14:38:06 +03002013
2014 return rc;
2015}
2016
Avi Kivitydd856ef2012-08-27 23:46:17 +03002017int emulate_int_real(struct x86_emulate_ctxt *ctxt, int irq)
2018{
2019 int rc;
2020
2021 invalidate_registers(ctxt);
2022 rc = __emulate_int_real(ctxt, irq);
2023 if (rc == X86EMUL_CONTINUE)
2024 writeback_registers(ctxt);
2025 return rc;
2026}
2027
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002028static int emulate_int(struct x86_emulate_ctxt *ctxt, int irq)
Mohammed Gamal6e154e52010-08-04 14:38:06 +03002029{
2030 switch(ctxt->mode) {
2031 case X86EMUL_MODE_REAL:
Avi Kivitydd856ef2012-08-27 23:46:17 +03002032 return __emulate_int_real(ctxt, irq);
Mohammed Gamal6e154e52010-08-04 14:38:06 +03002033 case X86EMUL_MODE_VM86:
2034 case X86EMUL_MODE_PROT16:
2035 case X86EMUL_MODE_PROT32:
2036 case X86EMUL_MODE_PROT64:
2037 default:
2038 /* Protected mode interrupts unimplemented yet */
2039 return X86EMUL_UNHANDLEABLE;
2040 }
2041}
2042
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002043static int emulate_iret_real(struct x86_emulate_ctxt *ctxt)
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002044{
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002045 int rc = X86EMUL_CONTINUE;
2046 unsigned long temp_eip = 0;
2047 unsigned long temp_eflags = 0;
2048 unsigned long cs = 0;
Nadav Amit0efb0442015-03-29 16:33:03 +03002049 unsigned long mask = X86_EFLAGS_CF | X86_EFLAGS_PF | X86_EFLAGS_AF |
2050 X86_EFLAGS_ZF | X86_EFLAGS_SF | X86_EFLAGS_TF |
2051 X86_EFLAGS_IF | X86_EFLAGS_DF | X86_EFLAGS_OF |
2052 X86_EFLAGS_IOPL | X86_EFLAGS_NT | X86_EFLAGS_RF |
2053 X86_EFLAGS_AC | X86_EFLAGS_ID |
Wanpeng Li35fd68a2015-04-08 14:08:14 +08002054 X86_EFLAGS_FIXED;
Nadav Amit0efb0442015-03-29 16:33:03 +03002055 unsigned long vm86_mask = X86_EFLAGS_VM | X86_EFLAGS_VIF |
2056 X86_EFLAGS_VIP;
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002057
2058 /* TODO: Add stack limit check */
2059
Avi Kivity9dac77f2011-06-01 15:34:25 +03002060 rc = emulate_pop(ctxt, &temp_eip, ctxt->op_bytes);
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002061
2062 if (rc != X86EMUL_CONTINUE)
2063 return rc;
2064
Avi Kivity35d3d4a2010-11-22 17:53:25 +02002065 if (temp_eip & ~0xffff)
2066 return emulate_gp(ctxt, 0);
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002067
Avi Kivity9dac77f2011-06-01 15:34:25 +03002068 rc = emulate_pop(ctxt, &cs, ctxt->op_bytes);
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002069
2070 if (rc != X86EMUL_CONTINUE)
2071 return rc;
2072
Avi Kivity9dac77f2011-06-01 15:34:25 +03002073 rc = emulate_pop(ctxt, &temp_eflags, ctxt->op_bytes);
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002074
2075 if (rc != X86EMUL_CONTINUE)
2076 return rc;
2077
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002078 rc = load_segment_descriptor(ctxt, (u16)cs, VCPU_SREG_CS);
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002079
2080 if (rc != X86EMUL_CONTINUE)
2081 return rc;
2082
Avi Kivity9dac77f2011-06-01 15:34:25 +03002083 ctxt->_eip = temp_eip;
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002084
Avi Kivity9dac77f2011-06-01 15:34:25 +03002085 if (ctxt->op_bytes == 4)
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002086 ctxt->eflags = ((temp_eflags & mask) | (ctxt->eflags & vm86_mask));
Avi Kivity9dac77f2011-06-01 15:34:25 +03002087 else if (ctxt->op_bytes == 2) {
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002088 ctxt->eflags &= ~0xffff;
2089 ctxt->eflags |= temp_eflags;
2090 }
2091
2092 ctxt->eflags &= ~EFLG_RESERVED_ZEROS_MASK; /* Clear reserved zeros */
Wanpeng Li35fd68a2015-04-08 14:08:14 +08002093 ctxt->eflags |= X86_EFLAGS_FIXED;
Nadav Amit801806d2015-01-26 09:32:23 +02002094 ctxt->ops->set_nmi_mask(ctxt, false);
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002095
2096 return rc;
2097}
2098
Takuya Yoshikawae01991e2011-05-29 21:55:10 +09002099static int em_iret(struct x86_emulate_ctxt *ctxt)
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002100{
2101 switch(ctxt->mode) {
2102 case X86EMUL_MODE_REAL:
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002103 return emulate_iret_real(ctxt);
Mohammed Gamal62bd4302010-07-28 12:38:40 +03002104 case X86EMUL_MODE_VM86:
2105 case X86EMUL_MODE_PROT16:
2106 case X86EMUL_MODE_PROT32:
2107 case X86EMUL_MODE_PROT64:
2108 default:
2109 /* iret from protected mode unimplemented yet */
2110 return X86EMUL_UNHANDLEABLE;
2111 }
2112}
2113
Takuya Yoshikawad2f62762011-05-02 02:30:48 +09002114static int em_jmp_far(struct x86_emulate_ctxt *ctxt)
2115{
Takuya Yoshikawad2f62762011-05-02 02:30:48 +09002116 int rc;
Radim Krčmář2117d532016-11-23 21:15:00 +01002117 unsigned short sel;
2118 struct desc_struct new_desc;
Nadav Amitd1442d82014-09-18 22:39:39 +03002119 u8 cpl = ctxt->ops->cpl(ctxt);
2120
Avi Kivity9dac77f2011-06-01 15:34:25 +03002121 memcpy(&sel, ctxt->src.valptr + ctxt->op_bytes, 2);
Takuya Yoshikawad2f62762011-05-02 02:30:48 +09002122
Nadav Amit3dc4bc42014-12-25 02:52:19 +02002123 rc = __load_segment_descriptor(ctxt, sel, VCPU_SREG_CS, cpl,
2124 X86_TRANSFER_CALL_JMP,
Nadav Amitd1442d82014-09-18 22:39:39 +03002125 &new_desc);
Takuya Yoshikawad2f62762011-05-02 02:30:48 +09002126 if (rc != X86EMUL_CONTINUE)
2127 return rc;
2128
Nadav Amitd50eaa12014-11-19 17:43:11 +02002129 rc = assign_eip_far(ctxt, ctxt->src.val, &new_desc);
Radim Krčmář2117d532016-11-23 21:15:00 +01002130 /* Error handling is not implemented. */
2131 if (rc != X86EMUL_CONTINUE)
2132 return X86EMUL_UNHANDLEABLE;
2133
Nadav Amitd1442d82014-09-18 22:39:39 +03002134 return rc;
Takuya Yoshikawad2f62762011-05-02 02:30:48 +09002135}
2136
Nadav Amitf7784042014-09-18 22:39:41 +03002137static int em_jmp_abs(struct x86_emulate_ctxt *ctxt)
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02002138{
Nadav Amitf7784042014-09-18 22:39:41 +03002139 return assign_eip_near(ctxt, ctxt->src.val);
2140}
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02002141
Nadav Amitf7784042014-09-18 22:39:41 +03002142static int em_call_near_abs(struct x86_emulate_ctxt *ctxt)
2143{
2144 int rc;
2145 long int old_eip;
2146
2147 old_eip = ctxt->_eip;
2148 rc = assign_eip_near(ctxt, ctxt->src.val);
2149 if (rc != X86EMUL_CONTINUE)
2150 return rc;
2151 ctxt->src.val = old_eip;
2152 rc = em_push(ctxt);
Takuya Yoshikawa4179bb02011-04-13 00:29:09 +09002153 return rc;
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02002154}
2155
Takuya Yoshikawae0dac402011-12-06 18:07:27 +09002156static int em_cmpxchg8b(struct x86_emulate_ctxt *ctxt)
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02002157{
Avi Kivity9dac77f2011-06-01 15:34:25 +03002158 u64 old = ctxt->dst.orig_val64;
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02002159
Nadav Amitaaa05f22014-06-02 18:34:10 +03002160 if (ctxt->dst.bytes == 16)
2161 return X86EMUL_UNHANDLEABLE;
2162
Avi Kivitydd856ef2012-08-27 23:46:17 +03002163 if (((u32) (old >> 0) != (u32) reg_read(ctxt, VCPU_REGS_RAX)) ||
2164 ((u32) (old >> 32) != (u32) reg_read(ctxt, VCPU_REGS_RDX))) {
2165 *reg_write(ctxt, VCPU_REGS_RAX) = (u32) (old >> 0);
2166 *reg_write(ctxt, VCPU_REGS_RDX) = (u32) (old >> 32);
Nadav Amit0efb0442015-03-29 16:33:03 +03002167 ctxt->eflags &= ~X86_EFLAGS_ZF;
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02002168 } else {
Avi Kivitydd856ef2012-08-27 23:46:17 +03002169 ctxt->dst.val64 = ((u64)reg_read(ctxt, VCPU_REGS_RCX) << 32) |
2170 (u32) reg_read(ctxt, VCPU_REGS_RBX);
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02002171
Nadav Amit0efb0442015-03-29 16:33:03 +03002172 ctxt->eflags |= X86_EFLAGS_ZF;
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02002173 }
Takuya Yoshikawa1b30eaa2010-02-12 15:57:56 +09002174 return X86EMUL_CONTINUE;
Laurent Vivier8cdbd2c2007-09-24 11:10:54 +02002175}
2176
Takuya Yoshikawaebda02c2011-05-29 22:00:22 +09002177static int em_ret(struct x86_emulate_ctxt *ctxt)
2178{
Nadav Amit234f3ce2014-09-18 22:39:38 +03002179 int rc;
2180 unsigned long eip;
2181
2182 rc = emulate_pop(ctxt, &eip, ctxt->op_bytes);
2183 if (rc != X86EMUL_CONTINUE)
2184 return rc;
2185
2186 return assign_eip_near(ctxt, eip);
Takuya Yoshikawaebda02c2011-05-29 22:00:22 +09002187}
2188
Takuya Yoshikawae01991e2011-05-29 21:55:10 +09002189static int em_ret_far(struct x86_emulate_ctxt *ctxt)
Avi Kivitya77ab5e2009-01-05 13:27:34 +02002190{
Avi Kivitya77ab5e2009-01-05 13:27:34 +02002191 int rc;
Nadav Amitd1442d82014-09-18 22:39:39 +03002192 unsigned long eip, cs;
Nadav Amit9e8919a2014-06-15 16:12:59 +03002193 int cpl = ctxt->ops->cpl(ctxt);
Radim Krčmář2117d532016-11-23 21:15:00 +01002194 struct desc_struct new_desc;
Nadav Amitd1442d82014-09-18 22:39:39 +03002195
2196 rc = emulate_pop(ctxt, &eip, ctxt->op_bytes);
Takuya Yoshikawa1b30eaa2010-02-12 15:57:56 +09002197 if (rc != X86EMUL_CONTINUE)
Avi Kivitya77ab5e2009-01-05 13:27:34 +02002198 return rc;
Avi Kivity9dac77f2011-06-01 15:34:25 +03002199 rc = emulate_pop(ctxt, &cs, ctxt->op_bytes);
Takuya Yoshikawa1b30eaa2010-02-12 15:57:56 +09002200 if (rc != X86EMUL_CONTINUE)
Avi Kivitya77ab5e2009-01-05 13:27:34 +02002201 return rc;
Nadav Amit9e8919a2014-06-15 16:12:59 +03002202 /* Outer-privilege level return is not implemented */
2203 if (ctxt->mode >= X86EMUL_MODE_PROT16 && (cs & 3) > cpl)
2204 return X86EMUL_UNHANDLEABLE;
Nadav Amit3dc4bc42014-12-25 02:52:19 +02002205 rc = __load_segment_descriptor(ctxt, (u16)cs, VCPU_SREG_CS, cpl,
2206 X86_TRANSFER_RET,
Nadav Amitd1442d82014-09-18 22:39:39 +03002207 &new_desc);
2208 if (rc != X86EMUL_CONTINUE)
2209 return rc;
Nadav Amitd50eaa12014-11-19 17:43:11 +02002210 rc = assign_eip_far(ctxt, eip, &new_desc);
Radim Krčmář2117d532016-11-23 21:15:00 +01002211 /* Error handling is not implemented. */
2212 if (rc != X86EMUL_CONTINUE)
2213 return X86EMUL_UNHANDLEABLE;
2214
Avi Kivitya77ab5e2009-01-05 13:27:34 +02002215 return rc;
2216}
2217
Bruce Rogers32611072013-09-09 09:40:20 -06002218static int em_ret_far_imm(struct x86_emulate_ctxt *ctxt)
2219{
2220 int rc;
2221
2222 rc = em_ret_far(ctxt);
2223 if (rc != X86EMUL_CONTINUE)
2224 return rc;
2225 rsp_increment(ctxt, ctxt->src.val);
2226 return X86EMUL_CONTINUE;
2227}
2228
Takuya Yoshikawae940b5c2011-11-22 15:20:47 +09002229static int em_cmpxchg(struct x86_emulate_ctxt *ctxt)
2230{
2231 /* Save real source value, then compare EAX against destination. */
Nadav Amit37c564f2014-06-02 18:34:07 +03002232 ctxt->dst.orig_val = ctxt->dst.val;
2233 ctxt->dst.val = reg_read(ctxt, VCPU_REGS_RAX);
Takuya Yoshikawae940b5c2011-11-22 15:20:47 +09002234 ctxt->src.orig_val = ctxt->src.val;
Nadav Amit37c564f2014-06-02 18:34:07 +03002235 ctxt->src.val = ctxt->dst.orig_val;
Avi Kivity158de572013-01-19 19:51:57 +02002236 fastop(ctxt, em_cmp);
Takuya Yoshikawae940b5c2011-11-22 15:20:47 +09002237
Nadav Amit0efb0442015-03-29 16:33:03 +03002238 if (ctxt->eflags & X86_EFLAGS_ZF) {
Nadav Amit2fcf5c82015-01-26 09:32:21 +02002239 /* Success: write back to memory; no update of EAX */
2240 ctxt->src.type = OP_NONE;
Takuya Yoshikawae940b5c2011-11-22 15:20:47 +09002241 ctxt->dst.val = ctxt->src.orig_val;
2242 } else {
2243 /* Failure: write the value we saw to EAX. */
Nadav Amit2fcf5c82015-01-26 09:32:21 +02002244 ctxt->src.type = OP_REG;
2245 ctxt->src.addr.reg = reg_rmw(ctxt, VCPU_REGS_RAX);
2246 ctxt->src.val = ctxt->dst.orig_val;
2247 /* Create write-cycle to dest by writing the same value */
Nadav Amit37c564f2014-06-02 18:34:07 +03002248 ctxt->dst.val = ctxt->dst.orig_val;
Takuya Yoshikawae940b5c2011-11-22 15:20:47 +09002249 }
2250 return X86EMUL_CONTINUE;
2251}
2252
Avi Kivityd4b43252011-09-13 10:45:50 +03002253static int em_lseg(struct x86_emulate_ctxt *ctxt)
Wei Yongjun09b5f4d2010-08-23 14:56:54 +08002254{
Avi Kivityd4b43252011-09-13 10:45:50 +03002255 int seg = ctxt->src2.val;
Wei Yongjun09b5f4d2010-08-23 14:56:54 +08002256 unsigned short sel;
2257 int rc;
2258
Avi Kivity9dac77f2011-06-01 15:34:25 +03002259 memcpy(&sel, ctxt->src.valptr + ctxt->op_bytes, 2);
Wei Yongjun09b5f4d2010-08-23 14:56:54 +08002260
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002261 rc = load_segment_descriptor(ctxt, sel, seg);
Wei Yongjun09b5f4d2010-08-23 14:56:54 +08002262 if (rc != X86EMUL_CONTINUE)
2263 return rc;
2264
Avi Kivity9dac77f2011-06-01 15:34:25 +03002265 ctxt->dst.val = ctxt->src.val;
Wei Yongjun09b5f4d2010-08-23 14:56:54 +08002266 return rc;
2267}
2268
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002269static int emulator_has_longmode(struct x86_emulate_ctxt *ctxt)
2270{
Sean Christophersonb68f3cc2019-04-02 08:10:48 -07002271#ifdef CONFIG_X86_64
Sean Christopherson5ae78e92019-12-17 13:32:38 -08002272 return ctxt->ops->guest_has_long_mode(ctxt);
Sean Christophersonb68f3cc2019-04-02 08:10:48 -07002273#else
2274 return false;
2275#endif
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002276}
2277
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002278static void rsm_set_desc_flags(struct desc_struct *desc, u32 flags)
2279{
2280 desc->g = (flags >> 23) & 1;
2281 desc->d = (flags >> 22) & 1;
2282 desc->l = (flags >> 21) & 1;
2283 desc->avl = (flags >> 20) & 1;
2284 desc->p = (flags >> 15) & 1;
2285 desc->dpl = (flags >> 13) & 3;
2286 desc->s = (flags >> 12) & 1;
2287 desc->type = (flags >> 8) & 15;
2288}
2289
Sean Christophersoned193212019-04-02 08:03:09 -07002290static int rsm_load_seg_32(struct x86_emulate_ctxt *ctxt, const char *smstate,
2291 int n)
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002292{
2293 struct desc_struct desc;
2294 int offset;
2295 u16 selector;
2296
Sean Christophersoned193212019-04-02 08:03:09 -07002297 selector = GET_SMSTATE(u32, smstate, 0x7fa8 + n * 4);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002298
2299 if (n < 3)
2300 offset = 0x7f84 + n * 12;
2301 else
2302 offset = 0x7f2c + (n - 3) * 12;
2303
Sean Christophersoned193212019-04-02 08:03:09 -07002304 set_desc_base(&desc, GET_SMSTATE(u32, smstate, offset + 8));
2305 set_desc_limit(&desc, GET_SMSTATE(u32, smstate, offset + 4));
2306 rsm_set_desc_flags(&desc, GET_SMSTATE(u32, smstate, offset));
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002307 ctxt->ops->set_segment(ctxt, selector, &desc, 0, n);
2308 return X86EMUL_CONTINUE;
2309}
2310
Sean Christophersonb68f3cc2019-04-02 08:10:48 -07002311#ifdef CONFIG_X86_64
Sean Christophersoned193212019-04-02 08:03:09 -07002312static int rsm_load_seg_64(struct x86_emulate_ctxt *ctxt, const char *smstate,
2313 int n)
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002314{
2315 struct desc_struct desc;
2316 int offset;
2317 u16 selector;
2318 u32 base3;
2319
2320 offset = 0x7e00 + n * 16;
2321
Sean Christophersoned193212019-04-02 08:03:09 -07002322 selector = GET_SMSTATE(u16, smstate, offset);
2323 rsm_set_desc_flags(&desc, GET_SMSTATE(u16, smstate, offset + 2) << 8);
2324 set_desc_limit(&desc, GET_SMSTATE(u32, smstate, offset + 4));
2325 set_desc_base(&desc, GET_SMSTATE(u32, smstate, offset + 8));
2326 base3 = GET_SMSTATE(u32, smstate, offset + 12);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002327
2328 ctxt->ops->set_segment(ctxt, selector, &desc, base3, n);
2329 return X86EMUL_CONTINUE;
2330}
Sean Christophersonb68f3cc2019-04-02 08:10:48 -07002331#endif
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002332
2333static int rsm_enter_protected_mode(struct x86_emulate_ctxt *ctxt,
Paolo Bonzinifae1a3e2017-12-21 00:49:14 +01002334 u64 cr0, u64 cr3, u64 cr4)
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002335{
2336 int bad;
Paolo Bonzinifae1a3e2017-12-21 00:49:14 +01002337 u64 pcid;
2338
2339 /* In order to later set CR4.PCIDE, CR3[11:0] must be zero. */
2340 pcid = 0;
2341 if (cr4 & X86_CR4_PCIDE) {
2342 pcid = cr3 & 0xfff;
2343 cr3 &= ~0xfff;
2344 }
2345
2346 bad = ctxt->ops->set_cr(ctxt, 3, cr3);
2347 if (bad)
2348 return X86EMUL_UNHANDLEABLE;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002349
2350 /*
2351 * First enable PAE, long mode needs it before CR0.PG = 1 is set.
2352 * Then enable protected mode. However, PCID cannot be enabled
2353 * if EFER.LMA=0, so set it separately.
2354 */
2355 bad = ctxt->ops->set_cr(ctxt, 4, cr4 & ~X86_CR4_PCIDE);
2356 if (bad)
2357 return X86EMUL_UNHANDLEABLE;
2358
2359 bad = ctxt->ops->set_cr(ctxt, 0, cr0);
2360 if (bad)
2361 return X86EMUL_UNHANDLEABLE;
2362
2363 if (cr4 & X86_CR4_PCIDE) {
2364 bad = ctxt->ops->set_cr(ctxt, 4, cr4);
2365 if (bad)
2366 return X86EMUL_UNHANDLEABLE;
Paolo Bonzinifae1a3e2017-12-21 00:49:14 +01002367 if (pcid) {
2368 bad = ctxt->ops->set_cr(ctxt, 3, cr3 | pcid);
2369 if (bad)
2370 return X86EMUL_UNHANDLEABLE;
2371 }
2372
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002373 }
2374
2375 return X86EMUL_CONTINUE;
2376}
2377
Sean Christophersoned193212019-04-02 08:03:09 -07002378static int rsm_load_state_32(struct x86_emulate_ctxt *ctxt,
2379 const char *smstate)
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002380{
2381 struct desc_struct desc;
2382 struct desc_ptr dt;
2383 u16 selector;
Paolo Bonzinifae1a3e2017-12-21 00:49:14 +01002384 u32 val, cr0, cr3, cr4;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002385 int i;
2386
Sean Christophersoned193212019-04-02 08:03:09 -07002387 cr0 = GET_SMSTATE(u32, smstate, 0x7ffc);
2388 cr3 = GET_SMSTATE(u32, smstate, 0x7ff8);
2389 ctxt->eflags = GET_SMSTATE(u32, smstate, 0x7ff4) | X86_EFLAGS_FIXED;
2390 ctxt->_eip = GET_SMSTATE(u32, smstate, 0x7ff0);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002391
2392 for (i = 0; i < 8; i++)
Sean Christophersoned193212019-04-02 08:03:09 -07002393 *reg_write(ctxt, i) = GET_SMSTATE(u32, smstate, 0x7fd0 + i * 4);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002394
Sean Christophersoned193212019-04-02 08:03:09 -07002395 val = GET_SMSTATE(u32, smstate, 0x7fcc);
Maxim Levitsky37f66bb2020-08-27 20:11:44 +03002396
Sean Christopherson16d51632021-02-04 17:24:57 -08002397 if (ctxt->ops->set_dr(ctxt, 6, val))
Maxim Levitsky37f66bb2020-08-27 20:11:44 +03002398 return X86EMUL_UNHANDLEABLE;
2399
Sean Christophersoned193212019-04-02 08:03:09 -07002400 val = GET_SMSTATE(u32, smstate, 0x7fc8);
Maxim Levitsky37f66bb2020-08-27 20:11:44 +03002401
Sean Christopherson16d51632021-02-04 17:24:57 -08002402 if (ctxt->ops->set_dr(ctxt, 7, val))
Maxim Levitsky37f66bb2020-08-27 20:11:44 +03002403 return X86EMUL_UNHANDLEABLE;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002404
Sean Christophersoned193212019-04-02 08:03:09 -07002405 selector = GET_SMSTATE(u32, smstate, 0x7fc4);
2406 set_desc_base(&desc, GET_SMSTATE(u32, smstate, 0x7f64));
2407 set_desc_limit(&desc, GET_SMSTATE(u32, smstate, 0x7f60));
2408 rsm_set_desc_flags(&desc, GET_SMSTATE(u32, smstate, 0x7f5c));
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002409 ctxt->ops->set_segment(ctxt, selector, &desc, 0, VCPU_SREG_TR);
2410
Sean Christophersoned193212019-04-02 08:03:09 -07002411 selector = GET_SMSTATE(u32, smstate, 0x7fc0);
2412 set_desc_base(&desc, GET_SMSTATE(u32, smstate, 0x7f80));
2413 set_desc_limit(&desc, GET_SMSTATE(u32, smstate, 0x7f7c));
2414 rsm_set_desc_flags(&desc, GET_SMSTATE(u32, smstate, 0x7f78));
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002415 ctxt->ops->set_segment(ctxt, selector, &desc, 0, VCPU_SREG_LDTR);
2416
Sean Christophersoned193212019-04-02 08:03:09 -07002417 dt.address = GET_SMSTATE(u32, smstate, 0x7f74);
2418 dt.size = GET_SMSTATE(u32, smstate, 0x7f70);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002419 ctxt->ops->set_gdt(ctxt, &dt);
2420
Sean Christophersoned193212019-04-02 08:03:09 -07002421 dt.address = GET_SMSTATE(u32, smstate, 0x7f58);
2422 dt.size = GET_SMSTATE(u32, smstate, 0x7f54);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002423 ctxt->ops->set_idt(ctxt, &dt);
2424
2425 for (i = 0; i < 6; i++) {
Sean Christophersoned193212019-04-02 08:03:09 -07002426 int r = rsm_load_seg_32(ctxt, smstate, i);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002427 if (r != X86EMUL_CONTINUE)
2428 return r;
2429 }
2430
Sean Christophersoned193212019-04-02 08:03:09 -07002431 cr4 = GET_SMSTATE(u32, smstate, 0x7f14);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002432
Sean Christophersoned193212019-04-02 08:03:09 -07002433 ctxt->ops->set_smbase(ctxt, GET_SMSTATE(u32, smstate, 0x7ef8));
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002434
Paolo Bonzinifae1a3e2017-12-21 00:49:14 +01002435 return rsm_enter_protected_mode(ctxt, cr0, cr3, cr4);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002436}
2437
Sean Christophersonb68f3cc2019-04-02 08:10:48 -07002438#ifdef CONFIG_X86_64
Sean Christophersoned193212019-04-02 08:03:09 -07002439static int rsm_load_state_64(struct x86_emulate_ctxt *ctxt,
2440 const char *smstate)
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002441{
2442 struct desc_struct desc;
2443 struct desc_ptr dt;
Paolo Bonzinifae1a3e2017-12-21 00:49:14 +01002444 u64 val, cr0, cr3, cr4;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002445 u32 base3;
2446 u16 selector;
Paolo Bonzinib10d92a2015-10-14 15:25:52 +02002447 int i, r;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002448
2449 for (i = 0; i < 16; i++)
Sean Christophersoned193212019-04-02 08:03:09 -07002450 *reg_write(ctxt, i) = GET_SMSTATE(u64, smstate, 0x7ff8 - i * 8);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002451
Sean Christophersoned193212019-04-02 08:03:09 -07002452 ctxt->_eip = GET_SMSTATE(u64, smstate, 0x7f78);
2453 ctxt->eflags = GET_SMSTATE(u32, smstate, 0x7f70) | X86_EFLAGS_FIXED;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002454
Sean Christopherson26443122021-02-04 17:24:58 -08002455 val = GET_SMSTATE(u64, smstate, 0x7f68);
Maxim Levitsky37f66bb2020-08-27 20:11:44 +03002456
Sean Christopherson16d51632021-02-04 17:24:57 -08002457 if (ctxt->ops->set_dr(ctxt, 6, val))
Maxim Levitsky37f66bb2020-08-27 20:11:44 +03002458 return X86EMUL_UNHANDLEABLE;
2459
Sean Christopherson26443122021-02-04 17:24:58 -08002460 val = GET_SMSTATE(u64, smstate, 0x7f60);
Maxim Levitsky37f66bb2020-08-27 20:11:44 +03002461
Sean Christopherson16d51632021-02-04 17:24:57 -08002462 if (ctxt->ops->set_dr(ctxt, 7, val))
Maxim Levitsky37f66bb2020-08-27 20:11:44 +03002463 return X86EMUL_UNHANDLEABLE;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002464
Sean Christophersoned193212019-04-02 08:03:09 -07002465 cr0 = GET_SMSTATE(u64, smstate, 0x7f58);
2466 cr3 = GET_SMSTATE(u64, smstate, 0x7f50);
2467 cr4 = GET_SMSTATE(u64, smstate, 0x7f48);
2468 ctxt->ops->set_smbase(ctxt, GET_SMSTATE(u32, smstate, 0x7f00));
2469 val = GET_SMSTATE(u64, smstate, 0x7ed0);
Maxim Levitsky37f66bb2020-08-27 20:11:44 +03002470
2471 if (ctxt->ops->set_msr(ctxt, MSR_EFER, val & ~EFER_LMA))
2472 return X86EMUL_UNHANDLEABLE;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002473
Sean Christophersoned193212019-04-02 08:03:09 -07002474 selector = GET_SMSTATE(u32, smstate, 0x7e90);
2475 rsm_set_desc_flags(&desc, GET_SMSTATE(u32, smstate, 0x7e92) << 8);
2476 set_desc_limit(&desc, GET_SMSTATE(u32, smstate, 0x7e94));
2477 set_desc_base(&desc, GET_SMSTATE(u32, smstate, 0x7e98));
2478 base3 = GET_SMSTATE(u32, smstate, 0x7e9c);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002479 ctxt->ops->set_segment(ctxt, selector, &desc, base3, VCPU_SREG_TR);
2480
Sean Christophersoned193212019-04-02 08:03:09 -07002481 dt.size = GET_SMSTATE(u32, smstate, 0x7e84);
2482 dt.address = GET_SMSTATE(u64, smstate, 0x7e88);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002483 ctxt->ops->set_idt(ctxt, &dt);
2484
Sean Christophersoned193212019-04-02 08:03:09 -07002485 selector = GET_SMSTATE(u32, smstate, 0x7e70);
2486 rsm_set_desc_flags(&desc, GET_SMSTATE(u32, smstate, 0x7e72) << 8);
2487 set_desc_limit(&desc, GET_SMSTATE(u32, smstate, 0x7e74));
2488 set_desc_base(&desc, GET_SMSTATE(u32, smstate, 0x7e78));
2489 base3 = GET_SMSTATE(u32, smstate, 0x7e7c);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002490 ctxt->ops->set_segment(ctxt, selector, &desc, base3, VCPU_SREG_LDTR);
2491
Sean Christophersoned193212019-04-02 08:03:09 -07002492 dt.size = GET_SMSTATE(u32, smstate, 0x7e64);
2493 dt.address = GET_SMSTATE(u64, smstate, 0x7e68);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002494 ctxt->ops->set_gdt(ctxt, &dt);
2495
Paolo Bonzinifae1a3e2017-12-21 00:49:14 +01002496 r = rsm_enter_protected_mode(ctxt, cr0, cr3, cr4);
Paolo Bonzinib10d92a2015-10-14 15:25:52 +02002497 if (r != X86EMUL_CONTINUE)
2498 return r;
2499
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002500 for (i = 0; i < 6; i++) {
Sean Christophersoned193212019-04-02 08:03:09 -07002501 r = rsm_load_seg_64(ctxt, smstate, i);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002502 if (r != X86EMUL_CONTINUE)
2503 return r;
2504 }
2505
Paolo Bonzinib10d92a2015-10-14 15:25:52 +02002506 return X86EMUL_CONTINUE;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002507}
Sean Christophersonb68f3cc2019-04-02 08:10:48 -07002508#endif
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002509
Paolo Bonzini64d60672015-05-07 11:36:11 +02002510static int em_rsm(struct x86_emulate_ctxt *ctxt)
2511{
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002512 unsigned long cr0, cr4, efer;
Sean Christophersoned193212019-04-02 08:03:09 -07002513 char buf[512];
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002514 u64 smbase;
2515 int ret;
2516
Ladi Prosek6ed071f2017-04-25 16:42:44 +02002517 if ((ctxt->ops->get_hflags(ctxt) & X86EMUL_SMM_MASK) == 0)
Paolo Bonzini64d60672015-05-07 11:36:11 +02002518 return emulate_ud(ctxt);
2519
Sean Christophersoned193212019-04-02 08:03:09 -07002520 smbase = ctxt->ops->get_smbase(ctxt);
2521
2522 ret = ctxt->ops->read_phys(ctxt, smbase + 0xfe00, buf, sizeof(buf));
2523 if (ret != X86EMUL_CONTINUE)
2524 return X86EMUL_UNHANDLEABLE;
2525
Sean Christopherson9ec19492019-04-02 08:03:11 -07002526 if ((ctxt->ops->get_hflags(ctxt) & X86EMUL_SMM_INSIDE_NMI_MASK) == 0)
2527 ctxt->ops->set_nmi_mask(ctxt, false);
2528
Sean Christophersonedce4652021-06-09 11:56:13 -07002529 ctxt->ops->exiting_smm(ctxt);
Sean Christopherson9ec19492019-04-02 08:03:11 -07002530
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002531 /*
2532 * Get back to real mode, to prepare a safe state in which to load
Paolo Bonzini89651a32015-11-03 13:43:05 +01002533 * CR0/CR3/CR4/EFER. It's all a bit more complicated if the vCPU
2534 * supports long mode.
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002535 */
Paolo Bonzini89651a32015-11-03 13:43:05 +01002536 if (emulator_has_longmode(ctxt)) {
2537 struct desc_struct cs_desc;
2538
2539 /* Zero CR4.PCIDE before CR0.PG. */
Sean Christopherson8f4dc2e2019-04-02 08:10:47 -07002540 cr4 = ctxt->ops->get_cr(ctxt, 4);
2541 if (cr4 & X86_CR4_PCIDE)
Paolo Bonzini89651a32015-11-03 13:43:05 +01002542 ctxt->ops->set_cr(ctxt, 4, cr4 & ~X86_CR4_PCIDE);
Paolo Bonzini89651a32015-11-03 13:43:05 +01002543
2544 /* A 32-bit code segment is required to clear EFER.LMA. */
2545 memset(&cs_desc, 0, sizeof(cs_desc));
2546 cs_desc.type = 0xb;
2547 cs_desc.s = cs_desc.g = cs_desc.p = 1;
2548 ctxt->ops->set_segment(ctxt, 0, &cs_desc, 0, VCPU_SREG_CS);
2549 }
2550
2551 /* For the 64-bit case, this will clear EFER.LMA. */
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002552 cr0 = ctxt->ops->get_cr(ctxt, 0);
2553 if (cr0 & X86_CR0_PE)
2554 ctxt->ops->set_cr(ctxt, 0, cr0 & ~(X86_CR0_PG | X86_CR0_PE));
Paolo Bonzini89651a32015-11-03 13:43:05 +01002555
Sean Christopherson8f4dc2e2019-04-02 08:10:47 -07002556 if (emulator_has_longmode(ctxt)) {
2557 /* Clear CR4.PAE before clearing EFER.LME. */
2558 cr4 = ctxt->ops->get_cr(ctxt, 4);
2559 if (cr4 & X86_CR4_PAE)
2560 ctxt->ops->set_cr(ctxt, 4, cr4 & ~X86_CR4_PAE);
Paolo Bonzini89651a32015-11-03 13:43:05 +01002561
Sean Christopherson8f4dc2e2019-04-02 08:10:47 -07002562 /* And finally go back to 32-bit mode. */
2563 efer = 0;
2564 ctxt->ops->set_msr(ctxt, MSR_EFER, efer);
2565 }
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002566
Ladi Prosek0234bf82017-10-11 16:54:40 +02002567 /*
Sean Christophersonecc513e2021-06-09 11:56:19 -07002568 * Give leave_smm() a chance to make ISA-specific changes to the vCPU
2569 * state (e.g. enter guest mode) before loading state from the SMM
Ladi Prosek0234bf82017-10-11 16:54:40 +02002570 * state-save area.
2571 */
Sean Christophersonecc513e2021-06-09 11:56:19 -07002572 if (ctxt->ops->leave_smm(ctxt, buf))
Sean Christopherson25b17222021-06-09 11:56:12 -07002573 goto emulate_shutdown;
Ladi Prosek0234bf82017-10-11 16:54:40 +02002574
Sean Christophersonb68f3cc2019-04-02 08:10:48 -07002575#ifdef CONFIG_X86_64
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002576 if (emulator_has_longmode(ctxt))
Sean Christophersoned193212019-04-02 08:03:09 -07002577 ret = rsm_load_state_64(ctxt, buf);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002578 else
Sean Christophersonb68f3cc2019-04-02 08:10:48 -07002579#endif
Sean Christophersoned193212019-04-02 08:03:09 -07002580 ret = rsm_load_state_32(ctxt, buf);
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002581
Sean Christopherson25b17222021-06-09 11:56:12 -07002582 if (ret != X86EMUL_CONTINUE)
2583 goto emulate_shutdown;
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002584
Sean Christopherson01281162021-06-09 11:56:18 -07002585 /*
2586 * Note, the ctxt->ops callbacks are responsible for handling side
2587 * effects when writing MSRs and CRs, e.g. MMU context resets, CPUID
2588 * runtime updates, etc... If that changes, e.g. this flow is moved
2589 * out of the emulator to make it look more like enter_smm(), then
2590 * those side effects need to be explicitly handled for both success
2591 * and shutdown.
2592 */
Paolo Bonzini660a5d52015-05-05 11:50:23 +02002593 return X86EMUL_CONTINUE;
Sean Christopherson25b17222021-06-09 11:56:12 -07002594
2595emulate_shutdown:
2596 ctxt->ops->triple_fault(ctxt);
2597 return X86EMUL_CONTINUE;
Paolo Bonzini64d60672015-05-07 11:36:11 +02002598}
2599
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002600static void
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002601setup_syscalls_segments(struct x86_emulate_ctxt *ctxt,
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002602 struct desc_struct *cs, struct desc_struct *ss)
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002603{
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002604 cs->l = 0; /* will be adjusted later */
Gleb Natapov79168fd2010-04-28 19:15:30 +03002605 set_desc_base(cs, 0); /* flat segment */
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002606 cs->g = 1; /* 4kb granularity */
Gleb Natapov79168fd2010-04-28 19:15:30 +03002607 set_desc_limit(cs, 0xfffff); /* 4GB limit */
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002608 cs->type = 0x0b; /* Read, Execute, Accessed */
2609 cs->s = 1;
2610 cs->dpl = 0; /* will be adjusted later */
Gleb Natapov79168fd2010-04-28 19:15:30 +03002611 cs->p = 1;
2612 cs->d = 1;
Gleb Natapov99245b52012-07-25 15:49:42 +03002613 cs->avl = 0;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002614
Gleb Natapov79168fd2010-04-28 19:15:30 +03002615 set_desc_base(ss, 0); /* flat segment */
2616 set_desc_limit(ss, 0xfffff); /* 4GB limit */
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002617 ss->g = 1; /* 4kb granularity */
2618 ss->s = 1;
2619 ss->type = 0x03; /* Read/Write, Accessed */
Gleb Natapov79168fd2010-04-28 19:15:30 +03002620 ss->d = 1; /* 32bit stack segment */
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002621 ss->dpl = 0;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002622 ss->p = 1;
Gleb Natapov99245b52012-07-25 15:49:42 +03002623 ss->l = 0;
2624 ss->avl = 0;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002625}
2626
Avi Kivity1a18a692012-02-01 12:23:21 +02002627static bool vendor_intel(struct x86_emulate_ctxt *ctxt)
2628{
2629 u32 eax, ebx, ecx, edx;
2630
2631 eax = ecx = 0;
Sean Christophersonf91af512020-03-04 17:34:37 -08002632 ctxt->ops->get_cpuid(ctxt, &eax, &ebx, &ecx, &edx, true);
Sean Christopherson15608ed2020-03-04 17:34:32 -08002633 return is_guest_vendor_intel(ebx, ecx, edx);
Avi Kivity1a18a692012-02-01 12:23:21 +02002634}
2635
Stephan Bärwolfc2226fc2012-01-12 16:43:04 +01002636static bool em_syscall_is_enabled(struct x86_emulate_ctxt *ctxt)
2637{
Mathias Krause0225fb52012-08-30 01:30:16 +02002638 const struct x86_emulate_ops *ops = ctxt->ops;
Stephan Bärwolfc2226fc2012-01-12 16:43:04 +01002639 u32 eax, ebx, ecx, edx;
2640
2641 /*
2642 * syscall should always be enabled in longmode - so only become
2643 * vendor specific (cpuid) if other modes are active...
2644 */
2645 if (ctxt->mode == X86EMUL_MODE_PROT64)
2646 return true;
2647
2648 eax = 0x00000000;
2649 ecx = 0x00000000;
Sean Christophersonf91af512020-03-04 17:34:37 -08002650 ops->get_cpuid(ctxt, &eax, &ebx, &ecx, &edx, true);
Avi Kivity0017f932012-06-07 14:10:16 +03002651 /*
Sean Christopherson15608ed2020-03-04 17:34:32 -08002652 * remark: Intel CPUs only support "syscall" in 64bit longmode. Also a
2653 * 64bit guest with a 32bit compat-app running will #UD !! While this
2654 * behaviour can be fixed (by emulating) into AMD response - CPUs of
2655 * AMD can't behave like Intel.
Avi Kivity0017f932012-06-07 14:10:16 +03002656 */
Sean Christopherson15608ed2020-03-04 17:34:32 -08002657 if (is_guest_vendor_intel(ebx, ecx, edx))
Avi Kivity0017f932012-06-07 14:10:16 +03002658 return false;
Stephan Bärwolfc2226fc2012-01-12 16:43:04 +01002659
Sean Christopherson15608ed2020-03-04 17:34:32 -08002660 if (is_guest_vendor_amd(ebx, ecx, edx) ||
2661 is_guest_vendor_hygon(ebx, ecx, edx))
Pu Wenb8f4abb2018-09-23 17:36:31 +08002662 return true;
2663
2664 /*
2665 * default: (not Intel, not AMD, not Hygon), apply Intel's
2666 * stricter rules...
2667 */
Stephan Bärwolfc2226fc2012-01-12 16:43:04 +01002668 return false;
2669}
2670
Takuya Yoshikawae01991e2011-05-29 21:55:10 +09002671static int em_syscall(struct x86_emulate_ctxt *ctxt)
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002672{
Mathias Krause0225fb52012-08-30 01:30:16 +02002673 const struct x86_emulate_ops *ops = ctxt->ops;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002674 struct desc_struct cs, ss;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002675 u64 msr_data;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002676 u16 cs_sel, ss_sel;
Avi Kivityc2ad2bb2011-04-20 15:21:35 +03002677 u64 efer = 0;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002678
2679 /* syscall is not available in real mode */
Gleb Natapov2e901c42010-03-18 15:20:12 +02002680 if (ctxt->mode == X86EMUL_MODE_REAL ||
Avi Kivity35d3d4a2010-11-22 17:53:25 +02002681 ctxt->mode == X86EMUL_MODE_VM86)
2682 return emulate_ud(ctxt);
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002683
Stephan Bärwolfc2226fc2012-01-12 16:43:04 +01002684 if (!(em_syscall_is_enabled(ctxt)))
2685 return emulate_ud(ctxt);
2686
Avi Kivityc2ad2bb2011-04-20 15:21:35 +03002687 ops->get_msr(ctxt, MSR_EFER, &efer);
Stephan Bärwolfc2226fc2012-01-12 16:43:04 +01002688 if (!(efer & EFER_SCE))
2689 return emulate_ud(ctxt);
2690
Miaohe Lin5b4ce932019-11-09 16:58:54 +08002691 setup_syscalls_segments(ctxt, &cs, &ss);
Avi Kivity717746e2011-04-20 13:37:53 +03002692 ops->get_msr(ctxt, MSR_STAR, &msr_data);
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002693 msr_data >>= 32;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002694 cs_sel = (u16)(msr_data & 0xfffc);
2695 ss_sel = (u16)(msr_data + 8);
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002696
Avi Kivityc2ad2bb2011-04-20 15:21:35 +03002697 if (efer & EFER_LMA) {
Gleb Natapov79168fd2010-04-28 19:15:30 +03002698 cs.d = 0;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002699 cs.l = 1;
2700 }
Avi Kivity1aa36612011-04-27 13:20:30 +03002701 ops->set_segment(ctxt, cs_sel, &cs, 0, VCPU_SREG_CS);
2702 ops->set_segment(ctxt, ss_sel, &ss, 0, VCPU_SREG_SS);
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002703
Avi Kivitydd856ef2012-08-27 23:46:17 +03002704 *reg_write(ctxt, VCPU_REGS_RCX) = ctxt->_eip;
Avi Kivityc2ad2bb2011-04-20 15:21:35 +03002705 if (efer & EFER_LMA) {
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002706#ifdef CONFIG_X86_64
Nadav Amit6c6cb692014-07-21 14:37:30 +03002707 *reg_write(ctxt, VCPU_REGS_R11) = ctxt->eflags;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002708
Avi Kivity717746e2011-04-20 13:37:53 +03002709 ops->get_msr(ctxt,
Gleb Natapov3fb1b5d2010-04-28 19:15:28 +03002710 ctxt->mode == X86EMUL_MODE_PROT64 ?
2711 MSR_LSTAR : MSR_CSTAR, &msr_data);
Avi Kivity9dac77f2011-06-01 15:34:25 +03002712 ctxt->_eip = msr_data;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002713
Avi Kivity717746e2011-04-20 13:37:53 +03002714 ops->get_msr(ctxt, MSR_SYSCALL_MASK, &msr_data);
Nadav Amit6c6cb692014-07-21 14:37:30 +03002715 ctxt->eflags &= ~msr_data;
Wanpeng Li35fd68a2015-04-08 14:08:14 +08002716 ctxt->eflags |= X86_EFLAGS_FIXED;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002717#endif
2718 } else {
2719 /* legacy mode */
Avi Kivity717746e2011-04-20 13:37:53 +03002720 ops->get_msr(ctxt, MSR_STAR, &msr_data);
Avi Kivity9dac77f2011-06-01 15:34:25 +03002721 ctxt->_eip = (u32)msr_data;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002722
Nadav Amit0efb0442015-03-29 16:33:03 +03002723 ctxt->eflags &= ~(X86_EFLAGS_VM | X86_EFLAGS_IF);
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002724 }
2725
Paolo Bonzinic8401dd2017-06-07 15:13:14 +02002726 ctxt->tf = (ctxt->eflags & X86_EFLAGS_TF) != 0;
Takuya Yoshikawae54cfa92010-02-18 12:15:02 +02002727 return X86EMUL_CONTINUE;
Andre Przywarae66bb2c2009-06-18 12:56:00 +02002728}
2729
Takuya Yoshikawae01991e2011-05-29 21:55:10 +09002730static int em_sysenter(struct x86_emulate_ctxt *ctxt)
Andre Przywara8c604352009-06-18 12:56:01 +02002731{
Mathias Krause0225fb52012-08-30 01:30:16 +02002732 const struct x86_emulate_ops *ops = ctxt->ops;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002733 struct desc_struct cs, ss;
Andre Przywara8c604352009-06-18 12:56:01 +02002734 u64 msr_data;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002735 u16 cs_sel, ss_sel;
Avi Kivityc2ad2bb2011-04-20 15:21:35 +03002736 u64 efer = 0;
Andre Przywara8c604352009-06-18 12:56:01 +02002737
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002738 ops->get_msr(ctxt, MSR_EFER, &efer);
Gleb Natapova0044752010-02-10 14:21:31 +02002739 /* inject #GP if in real mode */
Avi Kivity35d3d4a2010-11-22 17:53:25 +02002740 if (ctxt->mode == X86EMUL_MODE_REAL)
2741 return emulate_gp(ctxt, 0);
Andre Przywara8c604352009-06-18 12:56:01 +02002742
Avi Kivity1a18a692012-02-01 12:23:21 +02002743 /*
2744 * Not recognized on AMD in compat mode (but is recognized in legacy
2745 * mode).
2746 */
Nadav Amitf3747372015-01-01 23:11:11 +02002747 if ((ctxt->mode != X86EMUL_MODE_PROT64) && (efer & EFER_LMA)
Avi Kivity1a18a692012-02-01 12:23:21 +02002748 && !vendor_intel(ctxt))
2749 return emulate_ud(ctxt);
2750
Nadav Amitb2c9d432014-11-02 11:55:01 +02002751 /* sysenter/sysexit have not been tested in 64bit mode. */
Avi Kivity35d3d4a2010-11-22 17:53:25 +02002752 if (ctxt->mode == X86EMUL_MODE_PROT64)
Nadav Amitb2c9d432014-11-02 11:55:01 +02002753 return X86EMUL_UNHANDLEABLE;
Andre Przywara8c604352009-06-18 12:56:01 +02002754
Avi Kivity717746e2011-04-20 13:37:53 +03002755 ops->get_msr(ctxt, MSR_IA32_SYSENTER_CS, &msr_data);
Nadav Amitf3747372015-01-01 23:11:11 +02002756 if ((msr_data & 0xfffc) == 0x0)
2757 return emulate_gp(ctxt, 0);
Andre Przywara8c604352009-06-18 12:56:01 +02002758
Miaohe Lin5b4ce932019-11-09 16:58:54 +08002759 setup_syscalls_segments(ctxt, &cs, &ss);
Nadav Amit0efb0442015-03-29 16:33:03 +03002760 ctxt->eflags &= ~(X86_EFLAGS_VM | X86_EFLAGS_IF);
Nadav Amitb32a9912015-03-29 16:33:04 +03002761 cs_sel = (u16)msr_data & ~SEGMENT_RPL_MASK;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002762 ss_sel = cs_sel + 8;
Nadav Amitf3747372015-01-01 23:11:11 +02002763 if (efer & EFER_LMA) {
Gleb Natapov79168fd2010-04-28 19:15:30 +03002764 cs.d = 0;
Andre Przywara8c604352009-06-18 12:56:01 +02002765 cs.l = 1;
2766 }
2767
Avi Kivity1aa36612011-04-27 13:20:30 +03002768 ops->set_segment(ctxt, cs_sel, &cs, 0, VCPU_SREG_CS);
2769 ops->set_segment(ctxt, ss_sel, &ss, 0, VCPU_SREG_SS);
Andre Przywara8c604352009-06-18 12:56:01 +02002770
Avi Kivity717746e2011-04-20 13:37:53 +03002771 ops->get_msr(ctxt, MSR_IA32_SYSENTER_EIP, &msr_data);
Nadav Amitf3747372015-01-01 23:11:11 +02002772 ctxt->_eip = (efer & EFER_LMA) ? msr_data : (u32)msr_data;
Andre Przywara8c604352009-06-18 12:56:01 +02002773
Avi Kivity717746e2011-04-20 13:37:53 +03002774 ops->get_msr(ctxt, MSR_IA32_SYSENTER_ESP, &msr_data);
Nadav Amitf3747372015-01-01 23:11:11 +02002775 *reg_write(ctxt, VCPU_REGS_RSP) = (efer & EFER_LMA) ? msr_data :
2776 (u32)msr_data;
Sean Christopherson943dea82021-02-02 08:55:46 -08002777 if (efer & EFER_LMA)
2778 ctxt->mode = X86EMUL_MODE_PROT64;
Andre Przywara8c604352009-06-18 12:56:01 +02002779
Takuya Yoshikawae54cfa92010-02-18 12:15:02 +02002780 return X86EMUL_CONTINUE;
Andre Przywara8c604352009-06-18 12:56:01 +02002781}
2782
Takuya Yoshikawae01991e2011-05-29 21:55:10 +09002783static int em_sysexit(struct x86_emulate_ctxt *ctxt)
Andre Przywara4668f052009-06-18 12:56:02 +02002784{
Mathias Krause0225fb52012-08-30 01:30:16 +02002785 const struct x86_emulate_ops *ops = ctxt->ops;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002786 struct desc_struct cs, ss;
Nadav Amit234f3ce2014-09-18 22:39:38 +03002787 u64 msr_data, rcx, rdx;
Andre Przywara4668f052009-06-18 12:56:02 +02002788 int usermode;
Xiao Guangrong1249b962011-05-15 23:25:10 +08002789 u16 cs_sel = 0, ss_sel = 0;
Andre Przywara4668f052009-06-18 12:56:02 +02002790
Gleb Natapova0044752010-02-10 14:21:31 +02002791 /* inject #GP if in real mode or Virtual 8086 mode */
2792 if (ctxt->mode == X86EMUL_MODE_REAL ||
Avi Kivity35d3d4a2010-11-22 17:53:25 +02002793 ctxt->mode == X86EMUL_MODE_VM86)
2794 return emulate_gp(ctxt, 0);
Andre Przywara4668f052009-06-18 12:56:02 +02002795
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002796 setup_syscalls_segments(ctxt, &cs, &ss);
Andre Przywara4668f052009-06-18 12:56:02 +02002797
Avi Kivity9dac77f2011-06-01 15:34:25 +03002798 if ((ctxt->rex_prefix & 0x8) != 0x0)
Andre Przywara4668f052009-06-18 12:56:02 +02002799 usermode = X86EMUL_MODE_PROT64;
2800 else
2801 usermode = X86EMUL_MODE_PROT32;
2802
Nadav Amit234f3ce2014-09-18 22:39:38 +03002803 rcx = reg_read(ctxt, VCPU_REGS_RCX);
2804 rdx = reg_read(ctxt, VCPU_REGS_RDX);
2805
Andre Przywara4668f052009-06-18 12:56:02 +02002806 cs.dpl = 3;
2807 ss.dpl = 3;
Avi Kivity717746e2011-04-20 13:37:53 +03002808 ops->get_msr(ctxt, MSR_IA32_SYSENTER_CS, &msr_data);
Andre Przywara4668f052009-06-18 12:56:02 +02002809 switch (usermode) {
2810 case X86EMUL_MODE_PROT32:
Gleb Natapov79168fd2010-04-28 19:15:30 +03002811 cs_sel = (u16)(msr_data + 16);
Avi Kivity35d3d4a2010-11-22 17:53:25 +02002812 if ((msr_data & 0xfffc) == 0x0)
2813 return emulate_gp(ctxt, 0);
Gleb Natapov79168fd2010-04-28 19:15:30 +03002814 ss_sel = (u16)(msr_data + 24);
Nadav Amitbf0b6822014-09-18 22:39:45 +03002815 rcx = (u32)rcx;
2816 rdx = (u32)rdx;
Andre Przywara4668f052009-06-18 12:56:02 +02002817 break;
2818 case X86EMUL_MODE_PROT64:
Gleb Natapov79168fd2010-04-28 19:15:30 +03002819 cs_sel = (u16)(msr_data + 32);
Avi Kivity35d3d4a2010-11-22 17:53:25 +02002820 if (msr_data == 0x0)
2821 return emulate_gp(ctxt, 0);
Gleb Natapov79168fd2010-04-28 19:15:30 +03002822 ss_sel = cs_sel + 8;
2823 cs.d = 0;
Andre Przywara4668f052009-06-18 12:56:02 +02002824 cs.l = 1;
Yu Zhangfd8cb432017-08-24 20:27:56 +08002825 if (emul_is_noncanonical_address(rcx, ctxt) ||
2826 emul_is_noncanonical_address(rdx, ctxt))
Nadav Amit234f3ce2014-09-18 22:39:38 +03002827 return emulate_gp(ctxt, 0);
Andre Przywara4668f052009-06-18 12:56:02 +02002828 break;
2829 }
Nadav Amitb32a9912015-03-29 16:33:04 +03002830 cs_sel |= SEGMENT_RPL_MASK;
2831 ss_sel |= SEGMENT_RPL_MASK;
Andre Przywara4668f052009-06-18 12:56:02 +02002832
Avi Kivity1aa36612011-04-27 13:20:30 +03002833 ops->set_segment(ctxt, cs_sel, &cs, 0, VCPU_SREG_CS);
2834 ops->set_segment(ctxt, ss_sel, &ss, 0, VCPU_SREG_SS);
Andre Przywara4668f052009-06-18 12:56:02 +02002835
Nadav Amit234f3ce2014-09-18 22:39:38 +03002836 ctxt->_eip = rdx;
2837 *reg_write(ctxt, VCPU_REGS_RSP) = rcx;
Andre Przywara4668f052009-06-18 12:56:02 +02002838
Takuya Yoshikawae54cfa92010-02-18 12:15:02 +02002839 return X86EMUL_CONTINUE;
Andre Przywara4668f052009-06-18 12:56:02 +02002840}
2841
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002842static bool emulator_bad_iopl(struct x86_emulate_ctxt *ctxt)
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002843{
2844 int iopl;
2845 if (ctxt->mode == X86EMUL_MODE_REAL)
2846 return false;
2847 if (ctxt->mode == X86EMUL_MODE_VM86)
2848 return true;
Nadav Amit0efb0442015-03-29 16:33:03 +03002849 iopl = (ctxt->eflags & X86_EFLAGS_IOPL) >> X86_EFLAGS_IOPL_BIT;
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002850 return ctxt->ops->cpl(ctxt) > iopl;
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002851}
2852
Liran Alon9a29d4492018-03-12 13:12:48 +02002853#define VMWARE_PORT_VMPORT (0x5658)
2854#define VMWARE_PORT_VMRPC (0x5659)
2855
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002856static bool emulator_io_port_access_allowed(struct x86_emulate_ctxt *ctxt,
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002857 u16 port, u16 len)
2858{
Mathias Krause0225fb52012-08-30 01:30:16 +02002859 const struct x86_emulate_ops *ops = ctxt->ops;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002860 struct desc_struct tr_seg;
Gleb Natapov5601d052011-03-07 14:55:06 +02002861 u32 base3;
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002862 int r;
Avi Kivity1aa36612011-04-27 13:20:30 +03002863 u16 tr, io_bitmap_ptr, perm, bit_idx = port & 0x7;
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002864 unsigned mask = (1 << len) - 1;
Gleb Natapov5601d052011-03-07 14:55:06 +02002865 unsigned long base;
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002866
Liran Alon9a29d4492018-03-12 13:12:48 +02002867 /*
2868 * VMware allows access to these ports even if denied
2869 * by TSS I/O permission bitmap. Mimic behavior.
2870 */
2871 if (enable_vmware_backdoor &&
2872 ((port == VMWARE_PORT_VMPORT) || (port == VMWARE_PORT_VMRPC)))
2873 return true;
2874
Avi Kivity1aa36612011-04-27 13:20:30 +03002875 ops->get_segment(ctxt, &tr, &tr_seg, &base3, VCPU_SREG_TR);
Gleb Natapov79168fd2010-04-28 19:15:30 +03002876 if (!tr_seg.p)
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002877 return false;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002878 if (desc_limit_scaled(&tr_seg) < 103)
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002879 return false;
Gleb Natapov5601d052011-03-07 14:55:06 +02002880 base = get_desc_base(&tr_seg);
2881#ifdef CONFIG_X86_64
2882 base |= ((u64)base3) << 32;
2883#endif
Paolo Bonzini3c9fa242018-06-06 17:38:09 +02002884 r = ops->read_std(ctxt, base + 102, &io_bitmap_ptr, 2, NULL, true);
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002885 if (r != X86EMUL_CONTINUE)
2886 return false;
Gleb Natapov79168fd2010-04-28 19:15:30 +03002887 if (io_bitmap_ptr + port/8 > desc_limit_scaled(&tr_seg))
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002888 return false;
Paolo Bonzini3c9fa242018-06-06 17:38:09 +02002889 r = ops->read_std(ctxt, base + io_bitmap_ptr + port/8, &perm, 2, NULL, true);
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002890 if (r != X86EMUL_CONTINUE)
2891 return false;
2892 if ((perm >> bit_idx) & mask)
2893 return false;
2894 return true;
2895}
2896
2897static bool emulator_io_permited(struct x86_emulate_ctxt *ctxt,
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002898 u16 port, u16 len)
2899{
Gleb Natapov4fc40f02010-08-02 12:47:51 +03002900 if (ctxt->perm_ok)
2901 return true;
2902
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09002903 if (emulator_bad_iopl(ctxt))
2904 if (!emulator_io_port_access_allowed(ctxt, port, len))
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002905 return false;
Gleb Natapov4fc40f02010-08-02 12:47:51 +03002906
2907 ctxt->perm_ok = true;
2908
Gleb Natapovf850e2e2010-02-10 14:21:33 +02002909 return true;
2910}
2911
Nadav Amit428e3d02015-04-28 13:06:01 +03002912static void string_registers_quirk(struct x86_emulate_ctxt *ctxt)
2913{
2914 /*
2915 * Intel CPUs mask the counter and pointers in quite strange
2916 * manner when ECX is zero due to REP-string optimizations.
2917 */
2918#ifdef CONFIG_X86_64
2919 if (ctxt->ad_bytes != 4 || !vendor_intel(ctxt))
2920 return;
2921
2922 *reg_write(ctxt, VCPU_REGS_RCX) = 0;
2923
2924 switch (ctxt->b) {
2925 case 0xa4: /* movsb */
2926 case 0xa5: /* movsd/w */
2927 *reg_rmw(ctxt, VCPU_REGS_RSI) &= (u32)-1;
Gustavo A. R. Silvadf561f662020-08-23 17:36:59 -05002928 fallthrough;
Nadav Amit428e3d02015-04-28 13:06:01 +03002929 case 0xaa: /* stosb */
2930 case 0xab: /* stosd/w */
2931 *reg_rmw(ctxt, VCPU_REGS_RDI) &= (u32)-1;
2932 }
2933#endif
2934}
2935
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002936static void save_state_to_tss16(struct x86_emulate_ctxt *ctxt,
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002937 struct tss_segment_16 *tss)
2938{
Avi Kivity9dac77f2011-06-01 15:34:25 +03002939 tss->ip = ctxt->_eip;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002940 tss->flag = ctxt->eflags;
Avi Kivitydd856ef2012-08-27 23:46:17 +03002941 tss->ax = reg_read(ctxt, VCPU_REGS_RAX);
2942 tss->cx = reg_read(ctxt, VCPU_REGS_RCX);
2943 tss->dx = reg_read(ctxt, VCPU_REGS_RDX);
2944 tss->bx = reg_read(ctxt, VCPU_REGS_RBX);
2945 tss->sp = reg_read(ctxt, VCPU_REGS_RSP);
2946 tss->bp = reg_read(ctxt, VCPU_REGS_RBP);
2947 tss->si = reg_read(ctxt, VCPU_REGS_RSI);
2948 tss->di = reg_read(ctxt, VCPU_REGS_RDI);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002949
Avi Kivity1aa36612011-04-27 13:20:30 +03002950 tss->es = get_segment_selector(ctxt, VCPU_SREG_ES);
2951 tss->cs = get_segment_selector(ctxt, VCPU_SREG_CS);
2952 tss->ss = get_segment_selector(ctxt, VCPU_SREG_SS);
2953 tss->ds = get_segment_selector(ctxt, VCPU_SREG_DS);
2954 tss->ldt = get_segment_selector(ctxt, VCPU_SREG_LDTR);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002955}
2956
2957static int load_state_from_tss16(struct x86_emulate_ctxt *ctxt,
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002958 struct tss_segment_16 *tss)
2959{
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002960 int ret;
Paolo Bonzini2356aae2014-05-15 17:56:57 +02002961 u8 cpl;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002962
Avi Kivity9dac77f2011-06-01 15:34:25 +03002963 ctxt->_eip = tss->ip;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002964 ctxt->eflags = tss->flag | 2;
Avi Kivitydd856ef2012-08-27 23:46:17 +03002965 *reg_write(ctxt, VCPU_REGS_RAX) = tss->ax;
2966 *reg_write(ctxt, VCPU_REGS_RCX) = tss->cx;
2967 *reg_write(ctxt, VCPU_REGS_RDX) = tss->dx;
2968 *reg_write(ctxt, VCPU_REGS_RBX) = tss->bx;
2969 *reg_write(ctxt, VCPU_REGS_RSP) = tss->sp;
2970 *reg_write(ctxt, VCPU_REGS_RBP) = tss->bp;
2971 *reg_write(ctxt, VCPU_REGS_RSI) = tss->si;
2972 *reg_write(ctxt, VCPU_REGS_RDI) = tss->di;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002973
2974 /*
2975 * SDM says that segment selectors are loaded before segment
2976 * descriptors
2977 */
Avi Kivity1aa36612011-04-27 13:20:30 +03002978 set_segment_selector(ctxt, tss->ldt, VCPU_SREG_LDTR);
2979 set_segment_selector(ctxt, tss->es, VCPU_SREG_ES);
2980 set_segment_selector(ctxt, tss->cs, VCPU_SREG_CS);
2981 set_segment_selector(ctxt, tss->ss, VCPU_SREG_SS);
2982 set_segment_selector(ctxt, tss->ds, VCPU_SREG_DS);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002983
Paolo Bonzini2356aae2014-05-15 17:56:57 +02002984 cpl = tss->cs & 3;
2985
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002986 /*
Guo Chaofc058682012-06-28 15:19:51 +08002987 * Now load segment descriptors. If fault happens at this stage
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002988 * it is handled in a context of new task
2989 */
Nadav Amitd1442d82014-09-18 22:39:39 +03002990 ret = __load_segment_descriptor(ctxt, tss->ldt, VCPU_SREG_LDTR, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02002991 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002992 if (ret != X86EMUL_CONTINUE)
2993 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03002994 ret = __load_segment_descriptor(ctxt, tss->es, VCPU_SREG_ES, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02002995 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02002996 if (ret != X86EMUL_CONTINUE)
2997 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03002998 ret = __load_segment_descriptor(ctxt, tss->cs, VCPU_SREG_CS, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02002999 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003000 if (ret != X86EMUL_CONTINUE)
3001 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03003002 ret = __load_segment_descriptor(ctxt, tss->ss, VCPU_SREG_SS, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003003 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003004 if (ret != X86EMUL_CONTINUE)
3005 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03003006 ret = __load_segment_descriptor(ctxt, tss->ds, VCPU_SREG_DS, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003007 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003008 if (ret != X86EMUL_CONTINUE)
3009 return ret;
3010
3011 return X86EMUL_CONTINUE;
3012}
3013
3014static int task_switch_16(struct x86_emulate_ctxt *ctxt,
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003015 u16 tss_selector, u16 old_tss_sel,
3016 ulong old_tss_base, struct desc_struct *new_desc)
3017{
3018 struct tss_segment_16 tss_seg;
3019 int ret;
Avi Kivitybcc55cb2010-11-22 17:53:22 +02003020 u32 new_tss_base = get_desc_base(new_desc);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003021
Jordan Borgner0e96f312018-10-28 12:58:28 +00003022 ret = linear_read_system(ctxt, old_tss_base, &tss_seg, sizeof(tss_seg));
Avi Kivitydb297e32010-11-22 17:53:24 +02003023 if (ret != X86EMUL_CONTINUE)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003024 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003025
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09003026 save_state_to_tss16(ctxt, &tss_seg);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003027
Jordan Borgner0e96f312018-10-28 12:58:28 +00003028 ret = linear_write_system(ctxt, old_tss_base, &tss_seg, sizeof(tss_seg));
Avi Kivitydb297e32010-11-22 17:53:24 +02003029 if (ret != X86EMUL_CONTINUE)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003030 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003031
Jordan Borgner0e96f312018-10-28 12:58:28 +00003032 ret = linear_read_system(ctxt, new_tss_base, &tss_seg, sizeof(tss_seg));
Avi Kivitydb297e32010-11-22 17:53:24 +02003033 if (ret != X86EMUL_CONTINUE)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003034 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003035
3036 if (old_tss_sel != 0xffff) {
3037 tss_seg.prev_task_link = old_tss_sel;
3038
Paolo Bonzini79367a62018-06-06 16:43:02 +02003039 ret = linear_write_system(ctxt, new_tss_base,
3040 &tss_seg.prev_task_link,
Jordan Borgner0e96f312018-10-28 12:58:28 +00003041 sizeof(tss_seg.prev_task_link));
Avi Kivitydb297e32010-11-22 17:53:24 +02003042 if (ret != X86EMUL_CONTINUE)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003043 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003044 }
3045
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09003046 return load_state_from_tss16(ctxt, &tss_seg);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003047}
3048
3049static void save_state_to_tss32(struct x86_emulate_ctxt *ctxt,
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003050 struct tss_segment_32 *tss)
3051{
Nadav Amit5c7411e2014-04-07 18:37:47 +03003052 /* CR3 and ldt selector are not saved intentionally */
Avi Kivity9dac77f2011-06-01 15:34:25 +03003053 tss->eip = ctxt->_eip;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003054 tss->eflags = ctxt->eflags;
Avi Kivitydd856ef2012-08-27 23:46:17 +03003055 tss->eax = reg_read(ctxt, VCPU_REGS_RAX);
3056 tss->ecx = reg_read(ctxt, VCPU_REGS_RCX);
3057 tss->edx = reg_read(ctxt, VCPU_REGS_RDX);
3058 tss->ebx = reg_read(ctxt, VCPU_REGS_RBX);
3059 tss->esp = reg_read(ctxt, VCPU_REGS_RSP);
3060 tss->ebp = reg_read(ctxt, VCPU_REGS_RBP);
3061 tss->esi = reg_read(ctxt, VCPU_REGS_RSI);
3062 tss->edi = reg_read(ctxt, VCPU_REGS_RDI);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003063
Avi Kivity1aa36612011-04-27 13:20:30 +03003064 tss->es = get_segment_selector(ctxt, VCPU_SREG_ES);
3065 tss->cs = get_segment_selector(ctxt, VCPU_SREG_CS);
3066 tss->ss = get_segment_selector(ctxt, VCPU_SREG_SS);
3067 tss->ds = get_segment_selector(ctxt, VCPU_SREG_DS);
3068 tss->fs = get_segment_selector(ctxt, VCPU_SREG_FS);
3069 tss->gs = get_segment_selector(ctxt, VCPU_SREG_GS);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003070}
3071
3072static int load_state_from_tss32(struct x86_emulate_ctxt *ctxt,
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003073 struct tss_segment_32 *tss)
3074{
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003075 int ret;
Paolo Bonzini2356aae2014-05-15 17:56:57 +02003076 u8 cpl;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003077
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09003078 if (ctxt->ops->set_cr(ctxt, 3, tss->cr3))
Avi Kivity35d3d4a2010-11-22 17:53:25 +02003079 return emulate_gp(ctxt, 0);
Avi Kivity9dac77f2011-06-01 15:34:25 +03003080 ctxt->_eip = tss->eip;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003081 ctxt->eflags = tss->eflags | 2;
Kevin Wolf4cee4792012-02-08 14:34:41 +01003082
3083 /* General purpose registers */
Avi Kivitydd856ef2012-08-27 23:46:17 +03003084 *reg_write(ctxt, VCPU_REGS_RAX) = tss->eax;
3085 *reg_write(ctxt, VCPU_REGS_RCX) = tss->ecx;
3086 *reg_write(ctxt, VCPU_REGS_RDX) = tss->edx;
3087 *reg_write(ctxt, VCPU_REGS_RBX) = tss->ebx;
3088 *reg_write(ctxt, VCPU_REGS_RSP) = tss->esp;
3089 *reg_write(ctxt, VCPU_REGS_RBP) = tss->ebp;
3090 *reg_write(ctxt, VCPU_REGS_RSI) = tss->esi;
3091 *reg_write(ctxt, VCPU_REGS_RDI) = tss->edi;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003092
3093 /*
3094 * SDM says that segment selectors are loaded before segment
Paolo Bonzini2356aae2014-05-15 17:56:57 +02003095 * descriptors. This is important because CPL checks will
3096 * use CS.RPL.
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003097 */
Avi Kivity1aa36612011-04-27 13:20:30 +03003098 set_segment_selector(ctxt, tss->ldt_selector, VCPU_SREG_LDTR);
3099 set_segment_selector(ctxt, tss->es, VCPU_SREG_ES);
3100 set_segment_selector(ctxt, tss->cs, VCPU_SREG_CS);
3101 set_segment_selector(ctxt, tss->ss, VCPU_SREG_SS);
3102 set_segment_selector(ctxt, tss->ds, VCPU_SREG_DS);
3103 set_segment_selector(ctxt, tss->fs, VCPU_SREG_FS);
3104 set_segment_selector(ctxt, tss->gs, VCPU_SREG_GS);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003105
3106 /*
Kevin Wolf4cee4792012-02-08 14:34:41 +01003107 * If we're switching between Protected Mode and VM86, we need to make
3108 * sure to update the mode before loading the segment descriptors so
3109 * that the selectors are interpreted correctly.
Kevin Wolf4cee4792012-02-08 14:34:41 +01003110 */
Paolo Bonzini2356aae2014-05-15 17:56:57 +02003111 if (ctxt->eflags & X86_EFLAGS_VM) {
Kevin Wolf4cee4792012-02-08 14:34:41 +01003112 ctxt->mode = X86EMUL_MODE_VM86;
Paolo Bonzini2356aae2014-05-15 17:56:57 +02003113 cpl = 3;
3114 } else {
Kevin Wolf4cee4792012-02-08 14:34:41 +01003115 ctxt->mode = X86EMUL_MODE_PROT32;
Paolo Bonzini2356aae2014-05-15 17:56:57 +02003116 cpl = tss->cs & 3;
3117 }
Kevin Wolf4cee4792012-02-08 14:34:41 +01003118
3119 /*
Ingo Molnard9f6e122021-03-18 15:28:01 +01003120 * Now load segment descriptors. If fault happens at this stage
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003121 * it is handled in a context of new task
3122 */
Nadav Amitd1442d82014-09-18 22:39:39 +03003123 ret = __load_segment_descriptor(ctxt, tss->ldt_selector, VCPU_SREG_LDTR,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003124 cpl, X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003125 if (ret != X86EMUL_CONTINUE)
3126 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03003127 ret = __load_segment_descriptor(ctxt, tss->es, VCPU_SREG_ES, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003128 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003129 if (ret != X86EMUL_CONTINUE)
3130 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03003131 ret = __load_segment_descriptor(ctxt, tss->cs, VCPU_SREG_CS, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003132 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003133 if (ret != X86EMUL_CONTINUE)
3134 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03003135 ret = __load_segment_descriptor(ctxt, tss->ss, VCPU_SREG_SS, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003136 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003137 if (ret != X86EMUL_CONTINUE)
3138 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03003139 ret = __load_segment_descriptor(ctxt, tss->ds, VCPU_SREG_DS, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003140 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003141 if (ret != X86EMUL_CONTINUE)
3142 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03003143 ret = __load_segment_descriptor(ctxt, tss->fs, VCPU_SREG_FS, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003144 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003145 if (ret != X86EMUL_CONTINUE)
3146 return ret;
Nadav Amitd1442d82014-09-18 22:39:39 +03003147 ret = __load_segment_descriptor(ctxt, tss->gs, VCPU_SREG_GS, cpl,
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003148 X86_TRANSFER_TASK_SWITCH, NULL);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003149
Eugene Korenevsky2f729b12015-03-29 01:27:17 +03003150 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003151}
3152
3153static int task_switch_32(struct x86_emulate_ctxt *ctxt,
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003154 u16 tss_selector, u16 old_tss_sel,
3155 ulong old_tss_base, struct desc_struct *new_desc)
3156{
3157 struct tss_segment_32 tss_seg;
3158 int ret;
Avi Kivitybcc55cb2010-11-22 17:53:22 +02003159 u32 new_tss_base = get_desc_base(new_desc);
Nadav Amit5c7411e2014-04-07 18:37:47 +03003160 u32 eip_offset = offsetof(struct tss_segment_32, eip);
3161 u32 ldt_sel_offset = offsetof(struct tss_segment_32, ldt_selector);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003162
Jordan Borgner0e96f312018-10-28 12:58:28 +00003163 ret = linear_read_system(ctxt, old_tss_base, &tss_seg, sizeof(tss_seg));
Avi Kivitydb297e32010-11-22 17:53:24 +02003164 if (ret != X86EMUL_CONTINUE)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003165 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003166
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09003167 save_state_to_tss32(ctxt, &tss_seg);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003168
Nadav Amit5c7411e2014-04-07 18:37:47 +03003169 /* Only GP registers and segment selectors are saved */
Paolo Bonzini79367a62018-06-06 16:43:02 +02003170 ret = linear_write_system(ctxt, old_tss_base + eip_offset, &tss_seg.eip,
3171 ldt_sel_offset - eip_offset);
Avi Kivitydb297e32010-11-22 17:53:24 +02003172 if (ret != X86EMUL_CONTINUE)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003173 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003174
Jordan Borgner0e96f312018-10-28 12:58:28 +00003175 ret = linear_read_system(ctxt, new_tss_base, &tss_seg, sizeof(tss_seg));
Avi Kivitydb297e32010-11-22 17:53:24 +02003176 if (ret != X86EMUL_CONTINUE)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003177 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003178
3179 if (old_tss_sel != 0xffff) {
3180 tss_seg.prev_task_link = old_tss_sel;
3181
Paolo Bonzini79367a62018-06-06 16:43:02 +02003182 ret = linear_write_system(ctxt, new_tss_base,
3183 &tss_seg.prev_task_link,
Jordan Borgner0e96f312018-10-28 12:58:28 +00003184 sizeof(tss_seg.prev_task_link));
Avi Kivitydb297e32010-11-22 17:53:24 +02003185 if (ret != X86EMUL_CONTINUE)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003186 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003187 }
3188
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09003189 return load_state_from_tss32(ctxt, &tss_seg);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003190}
3191
3192static int emulator_do_task_switch(struct x86_emulate_ctxt *ctxt,
Kevin Wolf7f3d35f2012-02-08 14:34:38 +01003193 u16 tss_selector, int idt_index, int reason,
Jan Kiszkae269fb22010-04-14 15:51:09 +02003194 bool has_error_code, u32 error_code)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003195{
Mathias Krause0225fb52012-08-30 01:30:16 +02003196 const struct x86_emulate_ops *ops = ctxt->ops;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003197 struct desc_struct curr_tss_desc, next_tss_desc;
3198 int ret;
Avi Kivity1aa36612011-04-27 13:20:30 +03003199 u16 old_tss_sel = get_segment_selector(ctxt, VCPU_SREG_TR);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003200 ulong old_tss_base =
Avi Kivity4bff1e862011-04-20 13:37:53 +03003201 ops->get_cached_segment_base(ctxt, VCPU_SREG_TR);
Gleb Natapovceffb452010-03-18 15:20:19 +02003202 u32 desc_limit;
Nadav Amit3db176d2015-04-19 21:12:59 +03003203 ulong desc_addr, dr7;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003204
3205 /* FIXME: old_tss_base == ~0 ? */
3206
Avi Kivitye9194642012-06-13 16:29:39 +03003207 ret = read_segment_descriptor(ctxt, tss_selector, &next_tss_desc, &desc_addr);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003208 if (ret != X86EMUL_CONTINUE)
3209 return ret;
Avi Kivitye9194642012-06-13 16:29:39 +03003210 ret = read_segment_descriptor(ctxt, old_tss_sel, &curr_tss_desc, &desc_addr);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003211 if (ret != X86EMUL_CONTINUE)
3212 return ret;
3213
3214 /* FIXME: check that next_tss_desc is tss */
3215
Kevin Wolf7f3d35f2012-02-08 14:34:38 +01003216 /*
3217 * Check privileges. The three cases are task switch caused by...
3218 *
3219 * 1. jmp/call/int to task gate: Check against DPL of the task gate
3220 * 2. Exception/IRQ/iret: No check is performed
Nadav Amit2c2ca2d2014-11-02 11:54:57 +02003221 * 3. jmp/call to TSS/task-gate: No check is performed since the
3222 * hardware checks it before exiting.
Kevin Wolf7f3d35f2012-02-08 14:34:38 +01003223 */
3224 if (reason == TASK_SWITCH_GATE) {
3225 if (idt_index != -1) {
3226 /* Software interrupts */
3227 struct desc_struct task_gate_desc;
3228 int dpl;
3229
3230 ret = read_interrupt_descriptor(ctxt, idt_index,
3231 &task_gate_desc);
3232 if (ret != X86EMUL_CONTINUE)
3233 return ret;
3234
3235 dpl = task_gate_desc.dpl;
3236 if ((tss_selector & 3) > dpl || ops->cpl(ctxt) > dpl)
3237 return emulate_gp(ctxt, (idt_index << 3) | 0x2);
3238 }
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003239 }
3240
Gleb Natapovceffb452010-03-18 15:20:19 +02003241 desc_limit = desc_limit_scaled(&next_tss_desc);
3242 if (!next_tss_desc.p ||
3243 ((desc_limit < 0x67 && (next_tss_desc.type & 8)) ||
3244 desc_limit < 0x2b)) {
Paolo Bonzini592f0852014-08-20 10:05:08 +02003245 return emulate_ts(ctxt, tss_selector & 0xfffc);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003246 }
3247
3248 if (reason == TASK_SWITCH_IRET || reason == TASK_SWITCH_JMP) {
3249 curr_tss_desc.type &= ~(1 << 1); /* clear busy flag */
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09003250 write_segment_descriptor(ctxt, old_tss_sel, &curr_tss_desc);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003251 }
3252
3253 if (reason == TASK_SWITCH_IRET)
3254 ctxt->eflags = ctxt->eflags & ~X86_EFLAGS_NT;
3255
3256 /* set back link to prev task only if NT bit is set in eflags
Guo Chaofc058682012-06-28 15:19:51 +08003257 note that old_tss_sel is not used after this point */
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003258 if (reason != TASK_SWITCH_CALL && reason != TASK_SWITCH_GATE)
3259 old_tss_sel = 0xffff;
3260
3261 if (next_tss_desc.type & 8)
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09003262 ret = task_switch_32(ctxt, tss_selector, old_tss_sel,
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003263 old_tss_base, &next_tss_desc);
3264 else
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09003265 ret = task_switch_16(ctxt, tss_selector, old_tss_sel,
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003266 old_tss_base, &next_tss_desc);
Jan Kiszka0760d442010-04-14 15:50:57 +02003267 if (ret != X86EMUL_CONTINUE)
3268 return ret;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003269
3270 if (reason == TASK_SWITCH_CALL || reason == TASK_SWITCH_GATE)
3271 ctxt->eflags = ctxt->eflags | X86_EFLAGS_NT;
3272
3273 if (reason != TASK_SWITCH_IRET) {
3274 next_tss_desc.type |= (1 << 1); /* set busy flag */
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09003275 write_segment_descriptor(ctxt, tss_selector, &next_tss_desc);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003276 }
3277
Avi Kivity717746e2011-04-20 13:37:53 +03003278 ops->set_cr(ctxt, 0, ops->get_cr(ctxt, 0) | X86_CR0_TS);
Avi Kivity1aa36612011-04-27 13:20:30 +03003279 ops->set_segment(ctxt, tss_selector, &next_tss_desc, 0, VCPU_SREG_TR);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003280
Jan Kiszkae269fb22010-04-14 15:51:09 +02003281 if (has_error_code) {
Avi Kivity9dac77f2011-06-01 15:34:25 +03003282 ctxt->op_bytes = ctxt->ad_bytes = (next_tss_desc.type & 8) ? 4 : 2;
3283 ctxt->lock_prefix = 0;
3284 ctxt->src.val = (unsigned long) error_code;
Takuya Yoshikawa4487b3b2011-04-13 00:31:23 +09003285 ret = em_push(ctxt);
Jan Kiszkae269fb22010-04-14 15:51:09 +02003286 }
3287
Nadav Amit3db176d2015-04-19 21:12:59 +03003288 ops->get_dr(ctxt, 7, &dr7);
3289 ops->set_dr(ctxt, 7, dr7 & ~(DR_LOCAL_ENABLE_MASK | DR_LOCAL_SLOWDOWN));
3290
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003291 return ret;
3292}
3293
3294int emulator_task_switch(struct x86_emulate_ctxt *ctxt,
Kevin Wolf7f3d35f2012-02-08 14:34:38 +01003295 u16 tss_selector, int idt_index, int reason,
Jan Kiszkae269fb22010-04-14 15:51:09 +02003296 bool has_error_code, u32 error_code)
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003297{
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003298 int rc;
3299
Avi Kivitydd856ef2012-08-27 23:46:17 +03003300 invalidate_registers(ctxt);
Avi Kivity9dac77f2011-06-01 15:34:25 +03003301 ctxt->_eip = ctxt->eip;
3302 ctxt->dst.type = OP_NONE;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003303
Kevin Wolf7f3d35f2012-02-08 14:34:38 +01003304 rc = emulator_do_task_switch(ctxt, tss_selector, idt_index, reason,
Jan Kiszkae269fb22010-04-14 15:51:09 +02003305 has_error_code, error_code);
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003306
Avi Kivitydd856ef2012-08-27 23:46:17 +03003307 if (rc == X86EMUL_CONTINUE) {
Avi Kivity9dac77f2011-06-01 15:34:25 +03003308 ctxt->eip = ctxt->_eip;
Avi Kivitydd856ef2012-08-27 23:46:17 +03003309 writeback_registers(ctxt);
3310 }
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003311
Gleb Natapova0c0ab22011-03-28 16:57:49 +02003312 return (rc == X86EMUL_UNHANDLEABLE) ? EMULATION_FAILED : EMULATION_OK;
Gleb Natapov38ba30b2010-03-18 15:20:17 +02003313}
3314
Gleb Natapovf3bd64c2012-09-03 15:24:28 +03003315static void string_addr_inc(struct x86_emulate_ctxt *ctxt, int reg,
3316 struct operand *op)
Gleb Natapova682e352010-03-18 15:20:21 +02003317{
Nadav Amit0efb0442015-03-29 16:33:03 +03003318 int df = (ctxt->eflags & X86_EFLAGS_DF) ? -op->count : op->count;
Gleb Natapova682e352010-03-18 15:20:21 +02003319
Paolo Bonzini01485a22014-11-19 18:25:08 +01003320 register_address_increment(ctxt, reg, df * op->bytes);
3321 op->addr.mem.ea = register_address(ctxt, reg);
Gleb Natapova682e352010-03-18 15:20:21 +02003322}
3323
Avi Kivity7af04fc2010-08-18 14:16:35 +03003324static int em_das(struct x86_emulate_ctxt *ctxt)
3325{
Avi Kivity7af04fc2010-08-18 14:16:35 +03003326 u8 al, old_al;
3327 bool af, cf, old_cf;
3328
3329 cf = ctxt->eflags & X86_EFLAGS_CF;
Avi Kivity9dac77f2011-06-01 15:34:25 +03003330 al = ctxt->dst.val;
Avi Kivity7af04fc2010-08-18 14:16:35 +03003331
3332 old_al = al;
3333 old_cf = cf;
3334 cf = false;
3335 af = ctxt->eflags & X86_EFLAGS_AF;
3336 if ((al & 0x0f) > 9 || af) {
3337 al -= 6;
3338 cf = old_cf | (al >= 250);
3339 af = true;
3340 } else {
3341 af = false;
3342 }
3343 if (old_al > 0x99 || old_cf) {
3344 al -= 0x60;
3345 cf = true;
3346 }
3347
Avi Kivity9dac77f2011-06-01 15:34:25 +03003348 ctxt->dst.val = al;
Avi Kivity7af04fc2010-08-18 14:16:35 +03003349 /* Set PF, ZF, SF */
Avi Kivity9dac77f2011-06-01 15:34:25 +03003350 ctxt->src.type = OP_IMM;
3351 ctxt->src.val = 0;
3352 ctxt->src.bytes = 1;
Avi Kivity158de572013-01-19 19:51:57 +02003353 fastop(ctxt, em_or);
Avi Kivity7af04fc2010-08-18 14:16:35 +03003354 ctxt->eflags &= ~(X86_EFLAGS_AF | X86_EFLAGS_CF);
3355 if (cf)
3356 ctxt->eflags |= X86_EFLAGS_CF;
3357 if (af)
3358 ctxt->eflags |= X86_EFLAGS_AF;
3359 return X86EMUL_CONTINUE;
3360}
3361
Paolo Bonzinia035d5c62013-05-09 11:32:49 +02003362static int em_aam(struct x86_emulate_ctxt *ctxt)
3363{
3364 u8 al, ah;
3365
3366 if (ctxt->src.val == 0)
3367 return emulate_de(ctxt);
3368
3369 al = ctxt->dst.val & 0xff;
3370 ah = al / ctxt->src.val;
3371 al %= ctxt->src.val;
3372
3373 ctxt->dst.val = (ctxt->dst.val & 0xffff0000) | al | (ah << 8);
3374
3375 /* Set PF, ZF, SF */
3376 ctxt->src.type = OP_IMM;
3377 ctxt->src.val = 0;
3378 ctxt->src.bytes = 1;
3379 fastop(ctxt, em_or);
3380
3381 return X86EMUL_CONTINUE;
3382}
3383
Gleb Natapov7f662272012-12-10 11:42:30 +02003384static int em_aad(struct x86_emulate_ctxt *ctxt)
3385{
3386 u8 al = ctxt->dst.val & 0xff;
3387 u8 ah = (ctxt->dst.val >> 8) & 0xff;
3388
3389 al = (al + (ah * ctxt->src.val)) & 0xff;
3390
3391 ctxt->dst.val = (ctxt->dst.val & 0xffff0000) | al;
3392
Gleb Natapovf583c292013-02-13 17:50:39 +02003393 /* Set PF, ZF, SF */
3394 ctxt->src.type = OP_IMM;
3395 ctxt->src.val = 0;
3396 ctxt->src.bytes = 1;
3397 fastop(ctxt, em_or);
Gleb Natapov7f662272012-12-10 11:42:30 +02003398
3399 return X86EMUL_CONTINUE;
3400}
3401
Takuya Yoshikawad4ddafc2011-11-22 15:18:35 +09003402static int em_call(struct x86_emulate_ctxt *ctxt)
3403{
Nadav Amit234f3ce2014-09-18 22:39:38 +03003404 int rc;
Takuya Yoshikawad4ddafc2011-11-22 15:18:35 +09003405 long rel = ctxt->src.val;
3406
3407 ctxt->src.val = (unsigned long)ctxt->_eip;
Nadav Amit234f3ce2014-09-18 22:39:38 +03003408 rc = jmp_rel(ctxt, rel);
3409 if (rc != X86EMUL_CONTINUE)
3410 return rc;
Takuya Yoshikawad4ddafc2011-11-22 15:18:35 +09003411 return em_push(ctxt);
3412}
3413
Avi Kivity0ef753b2010-08-18 14:51:45 +03003414static int em_call_far(struct x86_emulate_ctxt *ctxt)
3415{
Avi Kivity0ef753b2010-08-18 14:51:45 +03003416 u16 sel, old_cs;
3417 ulong old_eip;
3418 int rc;
Nadav Amitd1442d82014-09-18 22:39:39 +03003419 struct desc_struct old_desc, new_desc;
3420 const struct x86_emulate_ops *ops = ctxt->ops;
3421 int cpl = ctxt->ops->cpl(ctxt);
Nadav Amit82268082015-01-26 09:32:27 +02003422 enum x86emul_mode prev_mode = ctxt->mode;
Avi Kivity0ef753b2010-08-18 14:51:45 +03003423
Avi Kivity9dac77f2011-06-01 15:34:25 +03003424 old_eip = ctxt->_eip;
Nadav Amitd1442d82014-09-18 22:39:39 +03003425 ops->get_segment(ctxt, &old_cs, &old_desc, NULL, VCPU_SREG_CS);
Avi Kivity0ef753b2010-08-18 14:51:45 +03003426
Avi Kivity9dac77f2011-06-01 15:34:25 +03003427 memcpy(&sel, ctxt->src.valptr + ctxt->op_bytes, 2);
Nadav Amit3dc4bc42014-12-25 02:52:19 +02003428 rc = __load_segment_descriptor(ctxt, sel, VCPU_SREG_CS, cpl,
3429 X86_TRANSFER_CALL_JMP, &new_desc);
Nadav Amitd1442d82014-09-18 22:39:39 +03003430 if (rc != X86EMUL_CONTINUE)
Nadav Amit80976db2014-12-25 02:52:20 +02003431 return rc;
Avi Kivity0ef753b2010-08-18 14:51:45 +03003432
Nadav Amitd50eaa12014-11-19 17:43:11 +02003433 rc = assign_eip_far(ctxt, ctxt->src.val, &new_desc);
Nadav Amitd1442d82014-09-18 22:39:39 +03003434 if (rc != X86EMUL_CONTINUE)
3435 goto fail;
Avi Kivity0ef753b2010-08-18 14:51:45 +03003436
Avi Kivity9dac77f2011-06-01 15:34:25 +03003437 ctxt->src.val = old_cs;
Takuya Yoshikawa4487b3b2011-04-13 00:31:23 +09003438 rc = em_push(ctxt);
Avi Kivity0ef753b2010-08-18 14:51:45 +03003439 if (rc != X86EMUL_CONTINUE)
Nadav Amitd1442d82014-09-18 22:39:39 +03003440 goto fail;
Avi Kivity0ef753b2010-08-18 14:51:45 +03003441
Avi Kivity9dac77f2011-06-01 15:34:25 +03003442 ctxt->src.val = old_eip;
Nadav Amitd1442d82014-09-18 22:39:39 +03003443 rc = em_push(ctxt);
3444 /* If we failed, we tainted the memory, but the very least we should
3445 restore cs */
Nadav Amit82268082015-01-26 09:32:27 +02003446 if (rc != X86EMUL_CONTINUE) {
3447 pr_warn_once("faulting far call emulation tainted memory\n");
Nadav Amitd1442d82014-09-18 22:39:39 +03003448 goto fail;
Nadav Amit82268082015-01-26 09:32:27 +02003449 }
Nadav Amitd1442d82014-09-18 22:39:39 +03003450 return rc;
3451fail:
3452 ops->set_segment(ctxt, old_cs, &old_desc, 0, VCPU_SREG_CS);
Nadav Amit82268082015-01-26 09:32:27 +02003453 ctxt->mode = prev_mode;
Nadav Amitd1442d82014-09-18 22:39:39 +03003454 return rc;
3455
Avi Kivity0ef753b2010-08-18 14:51:45 +03003456}
3457
Avi Kivity40ece7c2010-08-18 15:12:09 +03003458static int em_ret_near_imm(struct x86_emulate_ctxt *ctxt)
3459{
Avi Kivity40ece7c2010-08-18 15:12:09 +03003460 int rc;
Nadav Amit234f3ce2014-09-18 22:39:38 +03003461 unsigned long eip;
Avi Kivity40ece7c2010-08-18 15:12:09 +03003462
Nadav Amit234f3ce2014-09-18 22:39:38 +03003463 rc = emulate_pop(ctxt, &eip, ctxt->op_bytes);
3464 if (rc != X86EMUL_CONTINUE)
3465 return rc;
3466 rc = assign_eip_near(ctxt, eip);
Avi Kivity40ece7c2010-08-18 15:12:09 +03003467 if (rc != X86EMUL_CONTINUE)
3468 return rc;
Avi Kivity5ad105e2012-08-19 14:34:31 +03003469 rsp_increment(ctxt, ctxt->src.val);
Avi Kivity40ece7c2010-08-18 15:12:09 +03003470 return X86EMUL_CONTINUE;
3471}
3472
Takuya Yoshikawae4f973a2011-05-29 21:59:09 +09003473static int em_xchg(struct x86_emulate_ctxt *ctxt)
3474{
Takuya Yoshikawae4f973a2011-05-29 21:59:09 +09003475 /* Write back the register source. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03003476 ctxt->src.val = ctxt->dst.val;
3477 write_register_operand(&ctxt->src);
Takuya Yoshikawae4f973a2011-05-29 21:59:09 +09003478
3479 /* Write back the memory destination with implicit LOCK prefix. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03003480 ctxt->dst.val = ctxt->src.orig_val;
3481 ctxt->lock_prefix = 1;
Takuya Yoshikawae4f973a2011-05-29 21:59:09 +09003482 return X86EMUL_CONTINUE;
3483}
3484
Avi Kivityf3a1b9f2010-08-18 18:25:25 +03003485static int em_imul_3op(struct x86_emulate_ctxt *ctxt)
3486{
Avi Kivity9dac77f2011-06-01 15:34:25 +03003487 ctxt->dst.val = ctxt->src2.val;
Avi Kivity4d758342013-01-19 19:51:55 +02003488 return fastop(ctxt, em_imul);
Avi Kivityf3a1b9f2010-08-18 18:25:25 +03003489}
3490
Avi Kivity61429142010-08-19 15:13:00 +03003491static int em_cwd(struct x86_emulate_ctxt *ctxt)
3492{
Avi Kivity9dac77f2011-06-01 15:34:25 +03003493 ctxt->dst.type = OP_REG;
3494 ctxt->dst.bytes = ctxt->src.bytes;
Avi Kivitydd856ef2012-08-27 23:46:17 +03003495 ctxt->dst.addr.reg = reg_rmw(ctxt, VCPU_REGS_RDX);
Avi Kivity9dac77f2011-06-01 15:34:25 +03003496 ctxt->dst.val = ~((ctxt->src.val >> (ctxt->src.bytes * 8 - 1)) - 1);
Avi Kivity61429142010-08-19 15:13:00 +03003497
3498 return X86EMUL_CONTINUE;
3499}
3500
Paolo Bonzinifb6d4d32016-07-12 11:04:26 +02003501static int em_rdpid(struct x86_emulate_ctxt *ctxt)
3502{
3503 u64 tsc_aux = 0;
3504
3505 if (ctxt->ops->get_msr(ctxt, MSR_TSC_AUX, &tsc_aux))
Robert Hooa9e2e0a2020-08-28 10:23:42 +08003506 return emulate_ud(ctxt);
Paolo Bonzinifb6d4d32016-07-12 11:04:26 +02003507 ctxt->dst.val = tsc_aux;
3508 return X86EMUL_CONTINUE;
3509}
3510
Avi Kivity48bb5d32010-08-18 18:54:34 +03003511static int em_rdtsc(struct x86_emulate_ctxt *ctxt)
3512{
Avi Kivity48bb5d32010-08-18 18:54:34 +03003513 u64 tsc = 0;
3514
Avi Kivity717746e2011-04-20 13:37:53 +03003515 ctxt->ops->get_msr(ctxt, MSR_IA32_TSC, &tsc);
Avi Kivitydd856ef2012-08-27 23:46:17 +03003516 *reg_write(ctxt, VCPU_REGS_RAX) = (u32)tsc;
3517 *reg_write(ctxt, VCPU_REGS_RDX) = tsc >> 32;
Avi Kivity48bb5d32010-08-18 18:54:34 +03003518 return X86EMUL_CONTINUE;
3519}
3520
Avi Kivity222d21a2011-11-10 14:57:30 +02003521static int em_rdpmc(struct x86_emulate_ctxt *ctxt)
3522{
3523 u64 pmc;
3524
Avi Kivitydd856ef2012-08-27 23:46:17 +03003525 if (ctxt->ops->read_pmc(ctxt, reg_read(ctxt, VCPU_REGS_RCX), &pmc))
Avi Kivity222d21a2011-11-10 14:57:30 +02003526 return emulate_gp(ctxt, 0);
Avi Kivitydd856ef2012-08-27 23:46:17 +03003527 *reg_write(ctxt, VCPU_REGS_RAX) = (u32)pmc;
3528 *reg_write(ctxt, VCPU_REGS_RDX) = pmc >> 32;
Avi Kivity222d21a2011-11-10 14:57:30 +02003529 return X86EMUL_CONTINUE;
3530}
3531
Avi Kivityb9eac5f2010-08-03 14:46:56 +03003532static int em_mov(struct x86_emulate_ctxt *ctxt)
3533{
Paolo Bonzini54cfdb32014-03-27 11:36:25 +01003534 memcpy(ctxt->dst.valptr, ctxt->src.valptr, sizeof(ctxt->src.valptr));
Avi Kivityb9eac5f2010-08-03 14:46:56 +03003535 return X86EMUL_CONTINUE;
3536}
3537
Borislav Petkov84cffe42013-10-29 12:54:56 +01003538static int em_movbe(struct x86_emulate_ctxt *ctxt)
3539{
Borislav Petkov84cffe42013-10-29 12:54:56 +01003540 u16 tmp;
3541
Sean Christopherson5ae78e92019-12-17 13:32:38 -08003542 if (!ctxt->ops->guest_has_movbe(ctxt))
Borislav Petkov84cffe42013-10-29 12:54:56 +01003543 return emulate_ud(ctxt);
3544
3545 switch (ctxt->op_bytes) {
3546 case 2:
3547 /*
3548 * From MOVBE definition: "...When the operand size is 16 bits,
3549 * the upper word of the destination register remains unchanged
3550 * ..."
3551 *
3552 * Both casting ->valptr and ->val to u16 breaks strict aliasing
3553 * rules so we have to do the operation almost per hand.
3554 */
3555 tmp = (u16)ctxt->src.val;
3556 ctxt->dst.val &= ~0xffffUL;
3557 ctxt->dst.val |= (unsigned long)swab16(tmp);
3558 break;
3559 case 4:
3560 ctxt->dst.val = swab32((u32)ctxt->src.val);
3561 break;
3562 case 8:
3563 ctxt->dst.val = swab64(ctxt->src.val);
3564 break;
3565 default:
Paolo Bonzini592f0852014-08-20 10:05:08 +02003566 BUG();
Borislav Petkov84cffe42013-10-29 12:54:56 +01003567 }
3568 return X86EMUL_CONTINUE;
3569}
3570
Takuya Yoshikawabc00f8d2011-11-22 15:19:19 +09003571static int em_cr_write(struct x86_emulate_ctxt *ctxt)
3572{
3573 if (ctxt->ops->set_cr(ctxt, ctxt->modrm_reg, ctxt->src.val))
3574 return emulate_gp(ctxt, 0);
3575
3576 /* Disable writeback. */
3577 ctxt->dst.type = OP_NONE;
3578 return X86EMUL_CONTINUE;
3579}
3580
3581static int em_dr_write(struct x86_emulate_ctxt *ctxt)
3582{
3583 unsigned long val;
3584
3585 if (ctxt->mode == X86EMUL_MODE_PROT64)
3586 val = ctxt->src.val & ~0ULL;
3587 else
3588 val = ctxt->src.val & ~0U;
3589
3590 /* #UD condition is already handled. */
3591 if (ctxt->ops->set_dr(ctxt, ctxt->modrm_reg, val) < 0)
3592 return emulate_gp(ctxt, 0);
3593
3594 /* Disable writeback. */
3595 ctxt->dst.type = OP_NONE;
3596 return X86EMUL_CONTINUE;
3597}
3598
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09003599static int em_wrmsr(struct x86_emulate_ctxt *ctxt)
3600{
Alexander Graf1ae09952020-09-25 16:34:16 +02003601 u64 msr_index = reg_read(ctxt, VCPU_REGS_RCX);
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09003602 u64 msr_data;
Alexander Graf1ae09952020-09-25 16:34:16 +02003603 int r;
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09003604
Avi Kivitydd856ef2012-08-27 23:46:17 +03003605 msr_data = (u32)reg_read(ctxt, VCPU_REGS_RAX)
3606 | ((u64)reg_read(ctxt, VCPU_REGS_RDX) << 32);
Alexander Graf1ae09952020-09-25 16:34:16 +02003607 r = ctxt->ops->set_msr(ctxt, msr_index, msr_data);
3608
3609 if (r == X86EMUL_IO_NEEDED)
3610 return r;
3611
Maxim Levitsky7dffeca2020-10-01 14:29:52 +03003612 if (r > 0)
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09003613 return emulate_gp(ctxt, 0);
3614
Maxim Levitsky7dffeca2020-10-01 14:29:52 +03003615 return r < 0 ? X86EMUL_UNHANDLEABLE : X86EMUL_CONTINUE;
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09003616}
3617
3618static int em_rdmsr(struct x86_emulate_ctxt *ctxt)
3619{
Alexander Graf1ae09952020-09-25 16:34:16 +02003620 u64 msr_index = reg_read(ctxt, VCPU_REGS_RCX);
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09003621 u64 msr_data;
Alexander Graf1ae09952020-09-25 16:34:16 +02003622 int r;
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09003623
Alexander Graf1ae09952020-09-25 16:34:16 +02003624 r = ctxt->ops->get_msr(ctxt, msr_index, &msr_data);
3625
3626 if (r == X86EMUL_IO_NEEDED)
3627 return r;
3628
3629 if (r)
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09003630 return emulate_gp(ctxt, 0);
3631
Avi Kivitydd856ef2012-08-27 23:46:17 +03003632 *reg_write(ctxt, VCPU_REGS_RAX) = (u32)msr_data;
3633 *reg_write(ctxt, VCPU_REGS_RDX) = msr_data >> 32;
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09003634 return X86EMUL_CONTINUE;
3635}
3636
Paolo Bonzinidd307d02016-07-12 10:35:51 +02003637static int em_store_sreg(struct x86_emulate_ctxt *ctxt, int segment)
3638{
3639 if (segment > VCPU_SREG_GS &&
3640 (ctxt->ops->get_cr(ctxt, 4) & X86_CR4_UMIP) &&
3641 ctxt->ops->cpl(ctxt) > 0)
3642 return emulate_gp(ctxt, 0);
3643
3644 ctxt->dst.val = get_segment_selector(ctxt, segment);
3645 if (ctxt->dst.bytes == 4 && ctxt->dst.type == OP_MEM)
3646 ctxt->dst.bytes = 2;
3647 return X86EMUL_CONTINUE;
3648}
3649
Takuya Yoshikawa1bd5f462011-05-29 22:01:33 +09003650static int em_mov_rm_sreg(struct x86_emulate_ctxt *ctxt)
3651{
Avi Kivity9dac77f2011-06-01 15:34:25 +03003652 if (ctxt->modrm_reg > VCPU_SREG_GS)
Takuya Yoshikawa1bd5f462011-05-29 22:01:33 +09003653 return emulate_ud(ctxt);
3654
Paolo Bonzinidd307d02016-07-12 10:35:51 +02003655 return em_store_sreg(ctxt, ctxt->modrm_reg);
Takuya Yoshikawa1bd5f462011-05-29 22:01:33 +09003656}
3657
3658static int em_mov_sreg_rm(struct x86_emulate_ctxt *ctxt)
3659{
Avi Kivity9dac77f2011-06-01 15:34:25 +03003660 u16 sel = ctxt->src.val;
Takuya Yoshikawa1bd5f462011-05-29 22:01:33 +09003661
Avi Kivity9dac77f2011-06-01 15:34:25 +03003662 if (ctxt->modrm_reg == VCPU_SREG_CS || ctxt->modrm_reg > VCPU_SREG_GS)
Takuya Yoshikawa1bd5f462011-05-29 22:01:33 +09003663 return emulate_ud(ctxt);
3664
Avi Kivity9dac77f2011-06-01 15:34:25 +03003665 if (ctxt->modrm_reg == VCPU_SREG_SS)
Takuya Yoshikawa1bd5f462011-05-29 22:01:33 +09003666 ctxt->interruptibility = KVM_X86_SHADOW_INT_MOV_SS;
3667
3668 /* Disable writeback. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03003669 ctxt->dst.type = OP_NONE;
3670 return load_segment_descriptor(ctxt, sel, ctxt->modrm_reg);
Takuya Yoshikawa1bd5f462011-05-29 22:01:33 +09003671}
3672
Paolo Bonzinidd307d02016-07-12 10:35:51 +02003673static int em_sldt(struct x86_emulate_ctxt *ctxt)
3674{
3675 return em_store_sreg(ctxt, VCPU_SREG_LDTR);
3676}
3677
Avi Kivitya14e5792012-06-13 12:28:33 +03003678static int em_lldt(struct x86_emulate_ctxt *ctxt)
3679{
3680 u16 sel = ctxt->src.val;
3681
3682 /* Disable writeback. */
3683 ctxt->dst.type = OP_NONE;
3684 return load_segment_descriptor(ctxt, sel, VCPU_SREG_LDTR);
3685}
3686
Paolo Bonzinidd307d02016-07-12 10:35:51 +02003687static int em_str(struct x86_emulate_ctxt *ctxt)
3688{
3689 return em_store_sreg(ctxt, VCPU_SREG_TR);
3690}
3691
Avi Kivity80890002012-06-13 16:33:29 +03003692static int em_ltr(struct x86_emulate_ctxt *ctxt)
3693{
3694 u16 sel = ctxt->src.val;
3695
3696 /* Disable writeback. */
3697 ctxt->dst.type = OP_NONE;
3698 return load_segment_descriptor(ctxt, sel, VCPU_SREG_TR);
3699}
3700
Avi Kivity38503912011-03-31 18:48:09 +02003701static int em_invlpg(struct x86_emulate_ctxt *ctxt)
3702{
Avi Kivity9fa088f2011-03-31 18:54:30 +02003703 int rc;
3704 ulong linear;
3705
Avi Kivity9dac77f2011-06-01 15:34:25 +03003706 rc = linearize(ctxt, ctxt->src.addr.mem, 1, false, &linear);
Avi Kivity9fa088f2011-03-31 18:54:30 +02003707 if (rc == X86EMUL_CONTINUE)
Avi Kivity3cb16fe2011-04-20 15:38:44 +03003708 ctxt->ops->invlpg(ctxt, linear);
Avi Kivity38503912011-03-31 18:48:09 +02003709 /* Disable writeback. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03003710 ctxt->dst.type = OP_NONE;
Avi Kivity38503912011-03-31 18:48:09 +02003711 return X86EMUL_CONTINUE;
3712}
3713
Avi Kivity2d04a052011-04-20 15:32:49 +03003714static int em_clts(struct x86_emulate_ctxt *ctxt)
3715{
3716 ulong cr0;
3717
3718 cr0 = ctxt->ops->get_cr(ctxt, 0);
3719 cr0 &= ~X86_CR0_TS;
3720 ctxt->ops->set_cr(ctxt, 0, cr0);
3721 return X86EMUL_CONTINUE;
3722}
3723
Jan Kiszkab34a8052015-03-09 20:27:43 +01003724static int em_hypercall(struct x86_emulate_ctxt *ctxt)
Avi Kivity26d05cc2011-04-21 12:07:59 +03003725{
Nadav Amit0f54a322014-08-29 11:26:55 +03003726 int rc = ctxt->ops->fix_hypercall(ctxt);
Avi Kivity26d05cc2011-04-21 12:07:59 +03003727
Avi Kivity26d05cc2011-04-21 12:07:59 +03003728 if (rc != X86EMUL_CONTINUE)
3729 return rc;
3730
3731 /* Let the processor re-execute the fixed hypercall */
Avi Kivity9dac77f2011-06-01 15:34:25 +03003732 ctxt->_eip = ctxt->eip;
Avi Kivity26d05cc2011-04-21 12:07:59 +03003733 /* Disable writeback. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03003734 ctxt->dst.type = OP_NONE;
Avi Kivity26d05cc2011-04-21 12:07:59 +03003735 return X86EMUL_CONTINUE;
3736}
3737
Avi Kivity96051572012-06-10 17:21:18 +03003738static int emulate_store_desc_ptr(struct x86_emulate_ctxt *ctxt,
3739 void (*get)(struct x86_emulate_ctxt *ctxt,
3740 struct desc_ptr *ptr))
3741{
3742 struct desc_ptr desc_ptr;
3743
Paolo Bonziniae3e61e2016-07-12 10:36:41 +02003744 if ((ctxt->ops->get_cr(ctxt, 4) & X86_CR4_UMIP) &&
3745 ctxt->ops->cpl(ctxt) > 0)
3746 return emulate_gp(ctxt, 0);
3747
Avi Kivity96051572012-06-10 17:21:18 +03003748 if (ctxt->mode == X86EMUL_MODE_PROT64)
3749 ctxt->op_bytes = 8;
3750 get(ctxt, &desc_ptr);
3751 if (ctxt->op_bytes == 2) {
3752 ctxt->op_bytes = 4;
3753 desc_ptr.address &= 0x00ffffff;
3754 }
3755 /* Disable writeback. */
3756 ctxt->dst.type = OP_NONE;
Steve Rutherford129a72a2017-01-11 18:28:29 -08003757 return segmented_write_std(ctxt, ctxt->dst.addr.mem,
3758 &desc_ptr, 2 + ctxt->op_bytes);
Avi Kivity96051572012-06-10 17:21:18 +03003759}
3760
3761static int em_sgdt(struct x86_emulate_ctxt *ctxt)
3762{
3763 return emulate_store_desc_ptr(ctxt, ctxt->ops->get_gdt);
3764}
3765
3766static int em_sidt(struct x86_emulate_ctxt *ctxt)
3767{
3768 return emulate_store_desc_ptr(ctxt, ctxt->ops->get_idt);
3769}
3770
Nadav Amit5b7f6a1e2014-11-02 11:54:55 +02003771static int em_lgdt_lidt(struct x86_emulate_ctxt *ctxt, bool lgdt)
Avi Kivity26d05cc2011-04-21 12:07:59 +03003772{
Avi Kivity26d05cc2011-04-21 12:07:59 +03003773 struct desc_ptr desc_ptr;
3774 int rc;
3775
Avi Kivity510425f2012-06-07 17:04:36 +03003776 if (ctxt->mode == X86EMUL_MODE_PROT64)
3777 ctxt->op_bytes = 8;
Avi Kivity9dac77f2011-06-01 15:34:25 +03003778 rc = read_descriptor(ctxt, ctxt->src.addr.mem,
Avi Kivity26d05cc2011-04-21 12:07:59 +03003779 &desc_ptr.size, &desc_ptr.address,
Avi Kivity9dac77f2011-06-01 15:34:25 +03003780 ctxt->op_bytes);
Avi Kivity26d05cc2011-04-21 12:07:59 +03003781 if (rc != X86EMUL_CONTINUE)
3782 return rc;
Nadav Amit9a9abf62014-11-02 11:54:56 +02003783 if (ctxt->mode == X86EMUL_MODE_PROT64 &&
Yu Zhangfd8cb432017-08-24 20:27:56 +08003784 emul_is_noncanonical_address(desc_ptr.address, ctxt))
Nadav Amit9a9abf62014-11-02 11:54:56 +02003785 return emulate_gp(ctxt, 0);
Nadav Amit5b7f6a1e2014-11-02 11:54:55 +02003786 if (lgdt)
3787 ctxt->ops->set_gdt(ctxt, &desc_ptr);
3788 else
3789 ctxt->ops->set_idt(ctxt, &desc_ptr);
Avi Kivity26d05cc2011-04-21 12:07:59 +03003790 /* Disable writeback. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03003791 ctxt->dst.type = OP_NONE;
Avi Kivity26d05cc2011-04-21 12:07:59 +03003792 return X86EMUL_CONTINUE;
3793}
3794
Nadav Amit5b7f6a1e2014-11-02 11:54:55 +02003795static int em_lgdt(struct x86_emulate_ctxt *ctxt)
3796{
3797 return em_lgdt_lidt(ctxt, true);
3798}
3799
Avi Kivity26d05cc2011-04-21 12:07:59 +03003800static int em_lidt(struct x86_emulate_ctxt *ctxt)
3801{
Nadav Amit5b7f6a1e2014-11-02 11:54:55 +02003802 return em_lgdt_lidt(ctxt, false);
Avi Kivity26d05cc2011-04-21 12:07:59 +03003803}
3804
3805static int em_smsw(struct x86_emulate_ctxt *ctxt)
3806{
Paolo Bonziniae3e61e2016-07-12 10:36:41 +02003807 if ((ctxt->ops->get_cr(ctxt, 4) & X86_CR4_UMIP) &&
3808 ctxt->ops->cpl(ctxt) > 0)
3809 return emulate_gp(ctxt, 0);
3810
Nadav Amit32e94d02014-06-02 18:34:11 +03003811 if (ctxt->dst.type == OP_MEM)
3812 ctxt->dst.bytes = 2;
Avi Kivity9dac77f2011-06-01 15:34:25 +03003813 ctxt->dst.val = ctxt->ops->get_cr(ctxt, 0);
Avi Kivity26d05cc2011-04-21 12:07:59 +03003814 return X86EMUL_CONTINUE;
3815}
3816
3817static int em_lmsw(struct x86_emulate_ctxt *ctxt)
3818{
Avi Kivity26d05cc2011-04-21 12:07:59 +03003819 ctxt->ops->set_cr(ctxt, 0, (ctxt->ops->get_cr(ctxt, 0) & ~0x0eul)
Avi Kivity9dac77f2011-06-01 15:34:25 +03003820 | (ctxt->src.val & 0x0f));
3821 ctxt->dst.type = OP_NONE;
Avi Kivity26d05cc2011-04-21 12:07:59 +03003822 return X86EMUL_CONTINUE;
3823}
3824
Takuya Yoshikawad06e03a2011-05-29 22:04:08 +09003825static int em_loop(struct x86_emulate_ctxt *ctxt)
3826{
Nadav Amit234f3ce2014-09-18 22:39:38 +03003827 int rc = X86EMUL_CONTINUE;
3828
Paolo Bonzini01485a22014-11-19 18:25:08 +01003829 register_address_increment(ctxt, VCPU_REGS_RCX, -1);
Avi Kivitydd856ef2012-08-27 23:46:17 +03003830 if ((address_mask(ctxt, reg_read(ctxt, VCPU_REGS_RCX)) != 0) &&
Avi Kivity9dac77f2011-06-01 15:34:25 +03003831 (ctxt->b == 0xe2 || test_cc(ctxt->b ^ 0x5, ctxt->eflags)))
Nadav Amit234f3ce2014-09-18 22:39:38 +03003832 rc = jmp_rel(ctxt, ctxt->src.val);
Takuya Yoshikawad06e03a2011-05-29 22:04:08 +09003833
Nadav Amit234f3ce2014-09-18 22:39:38 +03003834 return rc;
Takuya Yoshikawad06e03a2011-05-29 22:04:08 +09003835}
3836
3837static int em_jcxz(struct x86_emulate_ctxt *ctxt)
3838{
Nadav Amit234f3ce2014-09-18 22:39:38 +03003839 int rc = X86EMUL_CONTINUE;
Takuya Yoshikawad06e03a2011-05-29 22:04:08 +09003840
Nadav Amit234f3ce2014-09-18 22:39:38 +03003841 if (address_mask(ctxt, reg_read(ctxt, VCPU_REGS_RCX)) == 0)
3842 rc = jmp_rel(ctxt, ctxt->src.val);
3843
3844 return rc;
Takuya Yoshikawad06e03a2011-05-29 22:04:08 +09003845}
3846
Takuya Yoshikawad7841a42011-11-22 15:16:54 +09003847static int em_in(struct x86_emulate_ctxt *ctxt)
3848{
3849 if (!pio_in_emulated(ctxt, ctxt->dst.bytes, ctxt->src.val,
3850 &ctxt->dst.val))
3851 return X86EMUL_IO_NEEDED;
3852
3853 return X86EMUL_CONTINUE;
3854}
3855
3856static int em_out(struct x86_emulate_ctxt *ctxt)
3857{
3858 ctxt->ops->pio_out_emulated(ctxt, ctxt->src.bytes, ctxt->dst.val,
3859 &ctxt->src.val, 1);
3860 /* Disable writeback. */
3861 ctxt->dst.type = OP_NONE;
3862 return X86EMUL_CONTINUE;
3863}
3864
Takuya Yoshikawaf411e6c2011-05-29 22:05:15 +09003865static int em_cli(struct x86_emulate_ctxt *ctxt)
3866{
3867 if (emulator_bad_iopl(ctxt))
3868 return emulate_gp(ctxt, 0);
3869
3870 ctxt->eflags &= ~X86_EFLAGS_IF;
3871 return X86EMUL_CONTINUE;
3872}
3873
3874static int em_sti(struct x86_emulate_ctxt *ctxt)
3875{
3876 if (emulator_bad_iopl(ctxt))
3877 return emulate_gp(ctxt, 0);
3878
3879 ctxt->interruptibility = KVM_X86_SHADOW_INT_STI;
3880 ctxt->eflags |= X86_EFLAGS_IF;
3881 return X86EMUL_CONTINUE;
3882}
3883
Avi Kivity6d6eede2012-06-07 14:11:36 +03003884static int em_cpuid(struct x86_emulate_ctxt *ctxt)
3885{
3886 u32 eax, ebx, ecx, edx;
Kyle Hueydb2336a2017-03-20 01:16:28 -07003887 u64 msr = 0;
3888
3889 ctxt->ops->get_msr(ctxt, MSR_MISC_FEATURES_ENABLES, &msr);
3890 if (msr & MSR_MISC_FEATURES_ENABLES_CPUID_FAULT &&
3891 ctxt->ops->cpl(ctxt)) {
3892 return emulate_gp(ctxt, 0);
3893 }
Avi Kivity6d6eede2012-06-07 14:11:36 +03003894
Avi Kivitydd856ef2012-08-27 23:46:17 +03003895 eax = reg_read(ctxt, VCPU_REGS_RAX);
3896 ecx = reg_read(ctxt, VCPU_REGS_RCX);
Sean Christophersonf91af512020-03-04 17:34:37 -08003897 ctxt->ops->get_cpuid(ctxt, &eax, &ebx, &ecx, &edx, false);
Avi Kivitydd856ef2012-08-27 23:46:17 +03003898 *reg_write(ctxt, VCPU_REGS_RAX) = eax;
3899 *reg_write(ctxt, VCPU_REGS_RBX) = ebx;
3900 *reg_write(ctxt, VCPU_REGS_RCX) = ecx;
3901 *reg_write(ctxt, VCPU_REGS_RDX) = edx;
Avi Kivity6d6eede2012-06-07 14:11:36 +03003902 return X86EMUL_CONTINUE;
3903}
3904
Paolo Bonzini98f73632013-10-31 11:19:42 +01003905static int em_sahf(struct x86_emulate_ctxt *ctxt)
3906{
3907 u32 flags;
3908
Nadav Amit0efb0442015-03-29 16:33:03 +03003909 flags = X86_EFLAGS_CF | X86_EFLAGS_PF | X86_EFLAGS_AF | X86_EFLAGS_ZF |
3910 X86_EFLAGS_SF;
Paolo Bonzini98f73632013-10-31 11:19:42 +01003911 flags &= *reg_rmw(ctxt, VCPU_REGS_RAX) >> 8;
3912
3913 ctxt->eflags &= ~0xffUL;
3914 ctxt->eflags |= flags | X86_EFLAGS_FIXED;
3915 return X86EMUL_CONTINUE;
3916}
3917
Avi Kivity2dd7caa2012-06-11 13:09:07 +03003918static int em_lahf(struct x86_emulate_ctxt *ctxt)
3919{
Avi Kivitydd856ef2012-08-27 23:46:17 +03003920 *reg_rmw(ctxt, VCPU_REGS_RAX) &= ~0xff00UL;
3921 *reg_rmw(ctxt, VCPU_REGS_RAX) |= (ctxt->eflags & 0xff) << 8;
Avi Kivity2dd7caa2012-06-11 13:09:07 +03003922 return X86EMUL_CONTINUE;
3923}
3924
Avi Kivity92998362012-06-13 12:25:06 +03003925static int em_bswap(struct x86_emulate_ctxt *ctxt)
3926{
3927 switch (ctxt->op_bytes) {
3928#ifdef CONFIG_X86_64
3929 case 8:
3930 asm("bswap %0" : "+r"(ctxt->dst.val));
3931 break;
3932#endif
3933 default:
3934 asm("bswap %0" : "+r"(*(u32 *)&ctxt->dst.val));
3935 break;
3936 }
3937 return X86EMUL_CONTINUE;
3938}
3939
Nadav Amit13e457e2014-10-13 13:04:13 +03003940static int em_clflush(struct x86_emulate_ctxt *ctxt)
3941{
3942 /* emulating clflush regardless of cpuid */
3943 return X86EMUL_CONTINUE;
3944}
3945
David Edmondson51b958e2020-11-03 12:04:00 +00003946static int em_clflushopt(struct x86_emulate_ctxt *ctxt)
3947{
3948 /* emulating clflushopt regardless of cpuid */
3949 return X86EMUL_CONTINUE;
3950}
3951
Nadav Amit2276b512015-01-26 09:32:24 +02003952static int em_movsxd(struct x86_emulate_ctxt *ctxt)
3953{
3954 ctxt->dst.val = (s32) ctxt->src.val;
3955 return X86EMUL_CONTINUE;
3956}
3957
Radim Krčmář283c95d2016-11-09 19:07:06 +01003958static int check_fxsr(struct x86_emulate_ctxt *ctxt)
3959{
Sean Christopherson5ae78e92019-12-17 13:32:38 -08003960 if (!ctxt->ops->guest_has_fxsr(ctxt))
Radim Krčmář283c95d2016-11-09 19:07:06 +01003961 return emulate_ud(ctxt);
3962
3963 if (ctxt->ops->get_cr(ctxt, 0) & (X86_CR0_TS | X86_CR0_EM))
3964 return emulate_nm(ctxt);
3965
3966 /*
3967 * Don't emulate a case that should never be hit, instead of working
3968 * around a lack of fxsave64/fxrstor64 on old compilers.
3969 */
3970 if (ctxt->mode >= X86EMUL_MODE_PROT64)
3971 return X86EMUL_UNHANDLEABLE;
3972
3973 return X86EMUL_CONTINUE;
3974}
3975
3976/*
Nick Desaulniers9d643f62017-05-30 20:08:38 -07003977 * Hardware doesn't save and restore XMM 0-7 without CR4.OSFXSR, but does save
3978 * and restore MXCSR.
3979 */
3980static size_t __fxstate_size(int nregs)
3981{
3982 return offsetof(struct fxregs_state, xmm_space[0]) + nregs * 16;
3983}
3984
3985static inline size_t fxstate_size(struct x86_emulate_ctxt *ctxt)
3986{
3987 bool cr4_osfxsr;
3988 if (ctxt->mode == X86EMUL_MODE_PROT64)
3989 return __fxstate_size(16);
3990
3991 cr4_osfxsr = ctxt->ops->get_cr(ctxt, 4) & X86_CR4_OSFXSR;
3992 return __fxstate_size(cr4_osfxsr ? 8 : 0);
3993}
3994
3995/*
Radim Krčmář283c95d2016-11-09 19:07:06 +01003996 * FXSAVE and FXRSTOR have 4 different formats depending on execution mode,
3997 * 1) 16 bit mode
3998 * 2) 32 bit mode
3999 * - like (1), but FIP and FDP (foo) are only 16 bit. At least Intel CPUs
4000 * preserve whole 32 bit values, though, so (1) and (2) are the same wrt.
4001 * save and restore
4002 * 3) 64-bit mode with REX.W prefix
4003 * - like (2), but XMM 8-15 are being saved and restored
4004 * 4) 64-bit mode without REX.W prefix
4005 * - like (3), but FIP and FDP are 64 bit
4006 *
4007 * Emulation uses (3) for (1) and (2) and preserves XMM 8-15 to reach the
4008 * desired result. (4) is not emulated.
4009 *
4010 * Note: Guest and host CPUID.(EAX=07H,ECX=0H):EBX[bit 13] (deprecate FPU CS
4011 * and FPU DS) should match.
4012 */
4013static int em_fxsave(struct x86_emulate_ctxt *ctxt)
4014{
4015 struct fxregs_state fx_state;
Radim Krčmář283c95d2016-11-09 19:07:06 +01004016 int rc;
4017
4018 rc = check_fxsr(ctxt);
4019 if (rc != X86EMUL_CONTINUE)
4020 return rc;
4021
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02004022 kvm_fpu_get();
Sean Christophersona7baead2020-01-17 11:30:50 -08004023
Radim Krčmář283c95d2016-11-09 19:07:06 +01004024 rc = asm_safe("fxsave %[fx]", , [fx] "+m"(fx_state));
4025
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02004026 kvm_fpu_put();
Sean Christophersona7baead2020-01-17 11:30:50 -08004027
Radim Krčmář283c95d2016-11-09 19:07:06 +01004028 if (rc != X86EMUL_CONTINUE)
4029 return rc;
4030
Nick Desaulniers9d643f62017-05-30 20:08:38 -07004031 return segmented_write_std(ctxt, ctxt->memop.addr.mem, &fx_state,
4032 fxstate_size(ctxt));
Radim Krčmář283c95d2016-11-09 19:07:06 +01004033}
4034
David Hildenbrand4d772cb2017-11-07 18:04:05 +01004035/*
4036 * FXRSTOR might restore XMM registers not provided by the guest. Fill
4037 * in the host registers (via FXSAVE) instead, so they won't be modified.
4038 * (preemption has to stay disabled until FXRSTOR).
4039 *
4040 * Use noinline to keep the stack for other functions called by callers small.
4041 */
4042static noinline int fxregs_fixup(struct fxregs_state *fx_state,
4043 const size_t used_size)
4044{
4045 struct fxregs_state fx_tmp;
4046 int rc;
4047
4048 rc = asm_safe("fxsave %[fx]", , [fx] "+m"(fx_tmp));
4049 memcpy((void *)fx_state + used_size, (void *)&fx_tmp + used_size,
4050 __fxstate_size(16) - used_size);
4051
4052 return rc;
4053}
4054
Radim Krčmář283c95d2016-11-09 19:07:06 +01004055static int em_fxrstor(struct x86_emulate_ctxt *ctxt)
4056{
4057 struct fxregs_state fx_state;
4058 int rc;
Nick Desaulniers9d643f62017-05-30 20:08:38 -07004059 size_t size;
Radim Krčmář283c95d2016-11-09 19:07:06 +01004060
4061 rc = check_fxsr(ctxt);
4062 if (rc != X86EMUL_CONTINUE)
4063 return rc;
4064
David Hildenbrand4d772cb2017-11-07 18:04:05 +01004065 size = fxstate_size(ctxt);
4066 rc = segmented_read_std(ctxt, ctxt->memop.addr.mem, &fx_state, size);
4067 if (rc != X86EMUL_CONTINUE)
4068 return rc;
4069
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02004070 kvm_fpu_get();
Sean Christophersona7baead2020-01-17 11:30:50 -08004071
Nick Desaulniers9d643f62017-05-30 20:08:38 -07004072 if (size < __fxstate_size(16)) {
David Hildenbrand4d772cb2017-11-07 18:04:05 +01004073 rc = fxregs_fixup(&fx_state, size);
Nick Desaulniers9d643f62017-05-30 20:08:38 -07004074 if (rc != X86EMUL_CONTINUE)
4075 goto out;
4076 }
4077
Nick Desaulniers9d643f62017-05-30 20:08:38 -07004078 if (fx_state.mxcsr >> 16) {
4079 rc = emulate_gp(ctxt, 0);
4080 goto out;
4081 }
Radim Krčmář283c95d2016-11-09 19:07:06 +01004082
4083 if (rc == X86EMUL_CONTINUE)
4084 rc = asm_safe("fxrstor %[fx]", : [fx] "m"(fx_state));
4085
Nick Desaulniers9d643f62017-05-30 20:08:38 -07004086out:
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02004087 kvm_fpu_put();
Sean Christophersona7baead2020-01-17 11:30:50 -08004088
Radim Krčmář283c95d2016-11-09 19:07:06 +01004089 return rc;
4090}
4091
Vitaly Kuznetsov02d41602019-08-13 15:53:32 +02004092static int em_xsetbv(struct x86_emulate_ctxt *ctxt)
4093{
4094 u32 eax, ecx, edx;
4095
4096 eax = reg_read(ctxt, VCPU_REGS_RAX);
4097 edx = reg_read(ctxt, VCPU_REGS_RDX);
4098 ecx = reg_read(ctxt, VCPU_REGS_RCX);
4099
4100 if (ctxt->ops->set_xcr(ctxt, ecx, ((u64)edx << 32) | eax))
4101 return emulate_gp(ctxt, 0);
4102
4103 return X86EMUL_CONTINUE;
4104}
4105
Joerg Roedelcfec82c2011-04-04 12:39:28 +02004106static bool valid_cr(int nr)
4107{
4108 switch (nr) {
4109 case 0:
4110 case 2 ... 4:
4111 case 8:
4112 return true;
4113 default:
4114 return false;
4115 }
4116}
4117
Sean Christophersond0fe7b62021-04-21 19:21:20 -07004118static int check_cr_access(struct x86_emulate_ctxt *ctxt)
Joerg Roedelcfec82c2011-04-04 12:39:28 +02004119{
Avi Kivity9dac77f2011-06-01 15:34:25 +03004120 if (!valid_cr(ctxt->modrm_reg))
Joerg Roedelcfec82c2011-04-04 12:39:28 +02004121 return emulate_ud(ctxt);
4122
4123 return X86EMUL_CONTINUE;
4124}
4125
Joerg Roedel3b88e412011-04-04 12:39:29 +02004126static int check_dr7_gd(struct x86_emulate_ctxt *ctxt)
4127{
4128 unsigned long dr7;
4129
Avi Kivity717746e2011-04-20 13:37:53 +03004130 ctxt->ops->get_dr(ctxt, 7, &dr7);
Joerg Roedel3b88e412011-04-04 12:39:29 +02004131
4132 /* Check if DR7.Global_Enable is set */
4133 return dr7 & (1 << 13);
4134}
4135
4136static int check_dr_read(struct x86_emulate_ctxt *ctxt)
4137{
Avi Kivity9dac77f2011-06-01 15:34:25 +03004138 int dr = ctxt->modrm_reg;
Joerg Roedel3b88e412011-04-04 12:39:29 +02004139 u64 cr4;
4140
4141 if (dr > 7)
4142 return emulate_ud(ctxt);
4143
Avi Kivity717746e2011-04-20 13:37:53 +03004144 cr4 = ctxt->ops->get_cr(ctxt, 4);
Joerg Roedel3b88e412011-04-04 12:39:29 +02004145 if ((cr4 & X86_CR4_DE) && (dr == 4 || dr == 5))
4146 return emulate_ud(ctxt);
4147
Nadav Amit6d2a0522014-11-02 11:54:43 +02004148 if (check_dr7_gd(ctxt)) {
4149 ulong dr6;
4150
4151 ctxt->ops->get_dr(ctxt, 6, &dr6);
Liran Alon1fc5d1942019-06-06 01:54:47 +03004152 dr6 &= ~DR_TRAP_BITS;
Chenyi Qiang9a3ecd52021-02-02 17:04:31 +08004153 dr6 |= DR6_BD | DR6_ACTIVE_LOW;
Nadav Amit6d2a0522014-11-02 11:54:43 +02004154 ctxt->ops->set_dr(ctxt, 6, dr6);
Joerg Roedel3b88e412011-04-04 12:39:29 +02004155 return emulate_db(ctxt);
Nadav Amit6d2a0522014-11-02 11:54:43 +02004156 }
Joerg Roedel3b88e412011-04-04 12:39:29 +02004157
4158 return X86EMUL_CONTINUE;
4159}
4160
4161static int check_dr_write(struct x86_emulate_ctxt *ctxt)
4162{
Avi Kivity9dac77f2011-06-01 15:34:25 +03004163 u64 new_val = ctxt->src.val64;
4164 int dr = ctxt->modrm_reg;
Joerg Roedel3b88e412011-04-04 12:39:29 +02004165
4166 if ((dr == 6 || dr == 7) && (new_val & 0xffffffff00000000ULL))
4167 return emulate_gp(ctxt, 0);
4168
4169 return check_dr_read(ctxt);
4170}
4171
Joerg Roedel01de8b02011-04-04 12:39:31 +02004172static int check_svme(struct x86_emulate_ctxt *ctxt)
4173{
Radim Krčmář92ceb762017-05-18 19:37:32 +02004174 u64 efer = 0;
Joerg Roedel01de8b02011-04-04 12:39:31 +02004175
Avi Kivity717746e2011-04-20 13:37:53 +03004176 ctxt->ops->get_msr(ctxt, MSR_EFER, &efer);
Joerg Roedel01de8b02011-04-04 12:39:31 +02004177
4178 if (!(efer & EFER_SVME))
4179 return emulate_ud(ctxt);
4180
4181 return X86EMUL_CONTINUE;
4182}
4183
4184static int check_svme_pa(struct x86_emulate_ctxt *ctxt)
4185{
Avi Kivitydd856ef2012-08-27 23:46:17 +03004186 u64 rax = reg_read(ctxt, VCPU_REGS_RAX);
Joerg Roedel01de8b02011-04-04 12:39:31 +02004187
4188 /* Valid physical address? */
Randy Dunlapd4224442011-04-21 09:09:22 -07004189 if (rax & 0xffff000000000000ULL)
Joerg Roedel01de8b02011-04-04 12:39:31 +02004190 return emulate_gp(ctxt, 0);
4191
4192 return check_svme(ctxt);
4193}
4194
Joerg Roedeld7eb8202011-04-04 12:39:32 +02004195static int check_rdtsc(struct x86_emulate_ctxt *ctxt)
4196{
Avi Kivity717746e2011-04-20 13:37:53 +03004197 u64 cr4 = ctxt->ops->get_cr(ctxt, 4);
Joerg Roedeld7eb8202011-04-04 12:39:32 +02004198
Avi Kivity717746e2011-04-20 13:37:53 +03004199 if (cr4 & X86_CR4_TSD && ctxt->ops->cpl(ctxt))
Hou Wenlonge9337c82021-08-18 11:36:31 +08004200 return emulate_gp(ctxt, 0);
Joerg Roedeld7eb8202011-04-04 12:39:32 +02004201
4202 return X86EMUL_CONTINUE;
4203}
4204
Joerg Roedel80612522011-04-04 12:39:33 +02004205static int check_rdpmc(struct x86_emulate_ctxt *ctxt)
4206{
Avi Kivity717746e2011-04-20 13:37:53 +03004207 u64 cr4 = ctxt->ops->get_cr(ctxt, 4);
Avi Kivitydd856ef2012-08-27 23:46:17 +03004208 u64 rcx = reg_read(ctxt, VCPU_REGS_RCX);
Joerg Roedel80612522011-04-04 12:39:33 +02004209
Arbel Moshe2d7921c2018-03-12 13:12:53 +02004210 /*
4211 * VMware allows access to these Pseduo-PMCs even when read via RDPMC
4212 * in Ring3 when CR4.PCE=0.
4213 */
4214 if (enable_vmware_backdoor && is_vmware_backdoor_pmc(rcx))
4215 return X86EMUL_CONTINUE;
4216
Wanpeng Li9ae7f6c2021-10-20 03:13:56 -07004217 /*
4218 * If CR4.PCE is set, the SDM requires CPL=0 or CR0.PE=0. The CR0.PE
4219 * check however is unnecessary because CPL is always 0 outside
4220 * protected mode.
4221 */
Avi Kivity717746e2011-04-20 13:37:53 +03004222 if ((!(cr4 & X86_CR4_PCE) && ctxt->ops->cpl(ctxt)) ||
Nadav Amit67f4d422014-06-02 18:34:09 +03004223 ctxt->ops->check_pmc(ctxt, rcx))
Joerg Roedel80612522011-04-04 12:39:33 +02004224 return emulate_gp(ctxt, 0);
4225
4226 return X86EMUL_CONTINUE;
4227}
4228
Joerg Roedelf6511932011-04-04 12:39:35 +02004229static int check_perm_in(struct x86_emulate_ctxt *ctxt)
4230{
Avi Kivity9dac77f2011-06-01 15:34:25 +03004231 ctxt->dst.bytes = min(ctxt->dst.bytes, 4u);
4232 if (!emulator_io_permited(ctxt, ctxt->src.val, ctxt->dst.bytes))
Joerg Roedelf6511932011-04-04 12:39:35 +02004233 return emulate_gp(ctxt, 0);
4234
4235 return X86EMUL_CONTINUE;
4236}
4237
4238static int check_perm_out(struct x86_emulate_ctxt *ctxt)
4239{
Avi Kivity9dac77f2011-06-01 15:34:25 +03004240 ctxt->src.bytes = min(ctxt->src.bytes, 4u);
4241 if (!emulator_io_permited(ctxt, ctxt->dst.val, ctxt->src.bytes))
Joerg Roedelf6511932011-04-04 12:39:35 +02004242 return emulate_gp(ctxt, 0);
4243
4244 return X86EMUL_CONTINUE;
4245}
4246
Avi Kivity73fba5f2010-07-29 15:11:53 +03004247#define D(_y) { .flags = (_y) }
Paolo Bonzinid40a6892014-03-27 11:58:02 +01004248#define DI(_y, _i) { .flags = (_y)|Intercept, .intercept = x86_intercept_##_i }
4249#define DIP(_y, _i, _p) { .flags = (_y)|Intercept|CheckPerm, \
4250 .intercept = x86_intercept_##_i, .check_perm = (_p) }
Gleb Natapov0b789ee2013-04-11 11:59:55 +03004251#define N D(NotImpl)
Joerg Roedel01de8b02011-04-04 12:39:31 +02004252#define EXT(_f, _e) { .flags = ((_f) | RMExt), .u.group = (_e) }
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004253#define G(_f, _g) { .flags = ((_f) | Group | ModRM), .u.group = (_g) }
4254#define GD(_f, _g) { .flags = ((_f) | GroupDual | ModRM), .u.gdual = (_g) }
Nadav Amit39f062f2014-11-26 15:47:18 +02004255#define ID(_f, _i) { .flags = ((_f) | InstrDual | ModRM), .u.idual = (_i) }
Nadav Amit2276b512015-01-26 09:32:24 +02004256#define MD(_f, _m) { .flags = ((_f) | ModeDual), .u.mdual = (_m) }
Gleb Natapov045a2822012-12-20 16:57:43 +02004257#define E(_f, _e) { .flags = ((_f) | Escape | ModRM), .u.esc = (_e) }
Avi Kivity73fba5f2010-07-29 15:11:53 +03004258#define I(_f, _e) { .flags = (_f), .u.execute = (_e) }
Avi Kivitye28bbd42013-01-04 16:18:48 +02004259#define F(_f, _e) { .flags = (_f) | Fastop, .u.fastop = (_e) }
Avi Kivityc4f035c2011-04-04 12:39:22 +02004260#define II(_f, _e, _i) \
Paolo Bonzinid40a6892014-03-27 11:58:02 +01004261 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i }
Joerg Roedeld09beab2011-04-04 12:39:25 +02004262#define IIP(_f, _e, _i, _p) \
Paolo Bonzinid40a6892014-03-27 11:58:02 +01004263 { .flags = (_f)|Intercept|CheckPerm, .u.execute = (_e), \
4264 .intercept = x86_intercept_##_i, .check_perm = (_p) }
Avi Kivityaa97bb42010-01-20 18:09:23 +02004265#define GP(_f, _g) { .flags = ((_f) | Prefix), .u.gprefix = (_g) }
Avi Kivity73fba5f2010-07-29 15:11:53 +03004266
Avi Kivity8d8f4e92010-08-26 11:56:06 +03004267#define D2bv(_f) D((_f) | ByteOp), D(_f)
Joerg Roedelf6511932011-04-04 12:39:35 +02004268#define D2bvIP(_f, _i, _p) DIP((_f) | ByteOp, _i, _p), DIP(_f, _i, _p)
Avi Kivity8d8f4e92010-08-26 11:56:06 +03004269#define I2bv(_f, _e) I((_f) | ByteOp, _e), I(_f, _e)
Avi Kivityf7857f32013-01-04 16:18:53 +02004270#define F2bv(_f, _e) F((_f) | ByteOp, _e), F(_f, _e)
Takuya Yoshikawad7841a42011-11-22 15:16:54 +09004271#define I2bvIP(_f, _e, _i, _p) \
4272 IIP((_f) | ByteOp, _e, _i, _p), IIP(_f, _e, _i, _p)
Avi Kivity8d8f4e92010-08-26 11:56:06 +03004273
Avi Kivityfb864fb2013-01-04 16:18:54 +02004274#define F6ALU(_f, _e) F2bv((_f) | DstMem | SrcReg | ModRM, _e), \
4275 F2bv(((_f) | DstReg | SrcMem | ModRM) & ~Lock, _e), \
4276 F2bv(((_f) & ~Lock) | DstAcc | SrcImm, _e)
Avi Kivity6230f7f2010-08-26 18:34:55 +03004277
Nadav Amit0f54a322014-08-29 11:26:55 +03004278static const struct opcode group7_rm0[] = {
4279 N,
Jan Kiszkab34a8052015-03-09 20:27:43 +01004280 I(SrcNone | Priv | EmulateOnUD, em_hypercall),
Nadav Amit0f54a322014-08-29 11:26:55 +03004281 N, N, N, N, N, N,
4282};
4283
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004284static const struct opcode group7_rm1[] = {
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004285 DI(SrcNone | Priv, monitor),
4286 DI(SrcNone | Priv, mwait),
Joerg Roedeld7eb8202011-04-04 12:39:32 +02004287 N, N, N, N, N, N,
4288};
4289
Vitaly Kuznetsov02d41602019-08-13 15:53:32 +02004290static const struct opcode group7_rm2[] = {
4291 N,
4292 II(ImplicitOps | Priv, em_xsetbv, xsetbv),
4293 N, N, N, N, N, N,
4294};
4295
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004296static const struct opcode group7_rm3[] = {
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004297 DIP(SrcNone | Prot | Priv, vmrun, check_svme_pa),
Jan Kiszkab34a8052015-03-09 20:27:43 +01004298 II(SrcNone | Prot | EmulateOnUD, em_hypercall, vmmcall),
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004299 DIP(SrcNone | Prot | Priv, vmload, check_svme_pa),
4300 DIP(SrcNone | Prot | Priv, vmsave, check_svme_pa),
4301 DIP(SrcNone | Prot | Priv, stgi, check_svme),
4302 DIP(SrcNone | Prot | Priv, clgi, check_svme),
4303 DIP(SrcNone | Prot | Priv, skinit, check_svme),
4304 DIP(SrcNone | Prot | Priv, invlpga, check_svme),
Joerg Roedel01de8b02011-04-04 12:39:31 +02004305};
Avi Kivity6230f7f2010-08-26 18:34:55 +03004306
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004307static const struct opcode group7_rm7[] = {
Joerg Roedeld7eb8202011-04-04 12:39:32 +02004308 N,
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004309 DIP(SrcNone, rdtscp, check_rdtsc),
Joerg Roedeld7eb8202011-04-04 12:39:32 +02004310 N, N, N, N, N, N,
4311};
Takuya Yoshikawad67fc272011-04-23 18:48:02 +09004312
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004313static const struct opcode group1[] = {
Avi Kivityfb864fb2013-01-04 16:18:54 +02004314 F(Lock, em_add),
4315 F(Lock | PageTable, em_or),
4316 F(Lock, em_adc),
4317 F(Lock, em_sbb),
4318 F(Lock | PageTable, em_and),
4319 F(Lock, em_sub),
4320 F(Lock, em_xor),
4321 F(NoWrite, em_cmp),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004322};
4323
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004324static const struct opcode group1A[] = {
Tom Lendacky0f89b202016-12-14 14:59:23 -05004325 I(DstMem | SrcNone | Mov | Stack | IncSP | TwoMemOp, em_pop), N, N, N, N, N, N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004326};
4327
Avi Kivity007a3b52013-01-19 19:51:51 +02004328static const struct opcode group2[] = {
4329 F(DstMem | ModRM, em_rol),
4330 F(DstMem | ModRM, em_ror),
4331 F(DstMem | ModRM, em_rcl),
4332 F(DstMem | ModRM, em_rcr),
4333 F(DstMem | ModRM, em_shl),
4334 F(DstMem | ModRM, em_shr),
4335 F(DstMem | ModRM, em_shl),
4336 F(DstMem | ModRM, em_sar),
4337};
4338
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004339static const struct opcode group3[] = {
Avi Kivityfb864fb2013-01-04 16:18:54 +02004340 F(DstMem | SrcImm | NoWrite, em_test),
4341 F(DstMem | SrcImm | NoWrite, em_test),
Avi Kivity45a14672013-01-04 16:18:52 +02004342 F(DstMem | SrcNone | Lock, em_not),
4343 F(DstMem | SrcNone | Lock, em_neg),
Avi Kivityb9fa4092013-02-09 11:31:48 +02004344 F(DstXacc | Src2Mem, em_mul_ex),
4345 F(DstXacc | Src2Mem, em_imul_ex),
Avi Kivityb8c0b6a2013-02-09 11:31:49 +02004346 F(DstXacc | Src2Mem, em_div_ex),
4347 F(DstXacc | Src2Mem, em_idiv_ex),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004348};
4349
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004350static const struct opcode group4[] = {
Avi Kivity95413dc2013-01-19 19:51:53 +02004351 F(ByteOp | DstMem | SrcNone | Lock, em_inc),
4352 F(ByteOp | DstMem | SrcNone | Lock, em_dec),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004353 N, N, N, N, N, N,
4354};
4355
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004356static const struct opcode group5[] = {
Avi Kivity95413dc2013-01-19 19:51:53 +02004357 F(DstMem | SrcNone | Lock, em_inc),
4358 F(DstMem | SrcNone | Lock, em_dec),
Nadav Amit58b70752014-10-24 11:35:09 +03004359 I(SrcMem | NearBranch, em_call_near_abs),
Nadav Amitacac6f892015-05-03 20:22:57 +03004360 I(SrcMemFAddr | ImplicitOps, em_call_far),
Nadav Amit58b70752014-10-24 11:35:09 +03004361 I(SrcMem | NearBranch, em_jmp_abs),
Nadav Amitf7784042014-09-18 22:39:41 +03004362 I(SrcMemFAddr | ImplicitOps, em_jmp_far),
Tom Lendacky0f89b202016-12-14 14:59:23 -05004363 I(SrcMem | Stack | TwoMemOp, em_push), D(Undefined),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004364};
4365
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004366static const struct opcode group6[] = {
Paolo Bonzinidd307d02016-07-12 10:35:51 +02004367 II(Prot | DstMem, em_sldt, sldt),
4368 II(Prot | DstMem, em_str, str),
Avi Kivitya14e5792012-06-13 12:28:33 +03004369 II(Prot | Priv | SrcMem16, em_lldt, lldt),
Avi Kivity80890002012-06-13 16:33:29 +03004370 II(Prot | Priv | SrcMem16, em_ltr, ltr),
Joerg Roedeldee6bb72011-04-04 12:39:30 +02004371 N, N, N, N,
4372};
4373
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004374static const struct group_dual group7 = { {
Nadav Amit606b1c32014-06-02 18:34:06 +03004375 II(Mov | DstMem, em_sgdt, sgdt),
4376 II(Mov | DstMem, em_sidt, sidt),
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004377 II(SrcMem | Priv, em_lgdt, lgdt),
4378 II(SrcMem | Priv, em_lidt, lidt),
4379 II(SrcNone | DstMem | Mov, em_smsw, smsw), N,
4380 II(SrcMem16 | Mov | Priv, em_lmsw, lmsw),
4381 II(SrcMem | ByteOp | Priv | NoAccess, em_invlpg, invlpg),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004382}, {
Nadav Amit0f54a322014-08-29 11:26:55 +03004383 EXT(0, group7_rm0),
Avi Kivity5ef39c72011-04-21 12:21:50 +03004384 EXT(0, group7_rm1),
Vitaly Kuznetsov02d41602019-08-13 15:53:32 +02004385 EXT(0, group7_rm2),
4386 EXT(0, group7_rm3),
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004387 II(SrcNone | DstMem | Mov, em_smsw, smsw), N,
4388 II(SrcMem16 | Mov | Priv, em_lmsw, lmsw),
4389 EXT(0, group7_rm7),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004390} };
4391
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004392static const struct opcode group8[] = {
Avi Kivity73fba5f2010-07-29 15:11:53 +03004393 N, N, N, N,
Avi Kivity11c363b2013-01-19 19:51:54 +02004394 F(DstMem | SrcImmByte | NoWrite, em_bt),
4395 F(DstMem | SrcImmByte | Lock | PageTable, em_bts),
4396 F(DstMem | SrcImmByte | Lock, em_btr),
4397 F(DstMem | SrcImmByte | Lock | PageTable, em_btc),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004398};
4399
Paolo Bonzinifb6d4d32016-07-12 11:04:26 +02004400/*
4401 * The "memory" destination is actually always a register, since we come
4402 * from the register case of group9.
4403 */
4404static const struct gprefix pfx_0f_c7_7 = {
Sean Christopherson2183de42021-05-04 10:17:23 -07004405 N, N, N, II(DstMem | ModRM | Op3264 | EmulateOnUD, em_rdpid, rdpid),
Paolo Bonzinifb6d4d32016-07-12 11:04:26 +02004406};
4407
4408
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004409static const struct group_dual group9 = { {
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004410 N, I(DstMem64 | Lock | PageTable, em_cmpxchg8b), N, N, N, N, N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004411}, {
Paolo Bonzinifb6d4d32016-07-12 11:04:26 +02004412 N, N, N, N, N, N, N,
4413 GP(0, &pfx_0f_c7_7),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004414} };
4415
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004416static const struct opcode group11[] = {
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004417 I(DstMem | SrcImm | Mov | PageTable, em_mov),
Xiao Guangrongd5ae7ce2011-09-22 16:53:46 +08004418 X7(D(Undefined)),
Avi Kivitya4d4a7c2010-08-03 15:05:46 +03004419};
4420
Nadav Amit13e457e2014-10-13 13:04:13 +03004421static const struct gprefix pfx_0f_ae_7 = {
David Edmondson51b958e2020-11-03 12:04:00 +00004422 I(SrcMem | ByteOp, em_clflush), I(SrcMem | ByteOp, em_clflushopt), N, N,
Nadav Amit13e457e2014-10-13 13:04:13 +03004423};
4424
4425static const struct group_dual group15 = { {
Radim Krčmář283c95d2016-11-09 19:07:06 +01004426 I(ModRM | Aligned16, em_fxsave),
4427 I(ModRM | Aligned16, em_fxrstor),
4428 N, N, N, N, N, GP(0, &pfx_0f_ae_7),
Nadav Amit13e457e2014-10-13 13:04:13 +03004429}, {
4430 N, N, N, N, N, N, N, N,
4431} };
4432
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004433static const struct gprefix pfx_0f_6f_0f_7f = {
Avi Kivitye5971752012-04-09 18:40:03 +03004434 I(Mmx, em_mov), I(Sse | Aligned, em_mov), N, I(Sse | Unaligned, em_mov),
Avi Kivityaa97bb42010-01-20 18:09:23 +02004435};
4436
Nadav Amit39f062f2014-11-26 15:47:18 +02004437static const struct instr_dual instr_dual_0f_2b = {
4438 I(0, em_mov), N
4439};
4440
Paolo Bonzinid5b77062014-07-14 12:54:48 +02004441static const struct gprefix pfx_0f_2b = {
Nadav Amit39f062f2014-11-26 15:47:18 +02004442 ID(0, &instr_dual_0f_2b), ID(0, &instr_dual_0f_2b), N, N,
Avi Kivity3e114eb2012-04-09 18:40:01 +03004443};
4444
Stefan Fritsch29916962018-04-01 17:54:44 +02004445static const struct gprefix pfx_0f_10_0f_11 = {
4446 I(Unaligned, em_mov), I(Unaligned, em_mov), N, N,
4447};
4448
Igor Mammedov27ce8252014-03-15 21:01:59 +01004449static const struct gprefix pfx_0f_28_0f_29 = {
Igor Mammedov6fec27d2014-03-15 21:02:00 +01004450 I(Aligned, em_mov), I(Aligned, em_mov), N, N,
Igor Mammedov27ce8252014-03-15 21:01:59 +01004451};
4452
Alex Williamson0a370272014-07-11 11:56:31 -06004453static const struct gprefix pfx_0f_e7 = {
4454 N, I(Sse, em_mov), N, N,
4455};
4456
Gleb Natapov045a2822012-12-20 16:57:43 +02004457static const struct escape escape_d9 = { {
Nadav Amit16bebef2014-12-25 02:52:18 +02004458 N, N, N, N, N, N, N, I(DstMem16 | Mov, em_fnstcw),
Gleb Natapov045a2822012-12-20 16:57:43 +02004459}, {
4460 /* 0xC0 - 0xC7 */
4461 N, N, N, N, N, N, N, N,
4462 /* 0xC8 - 0xCF */
4463 N, N, N, N, N, N, N, N,
4464 /* 0xD0 - 0xC7 */
4465 N, N, N, N, N, N, N, N,
4466 /* 0xD8 - 0xDF */
4467 N, N, N, N, N, N, N, N,
4468 /* 0xE0 - 0xE7 */
4469 N, N, N, N, N, N, N, N,
4470 /* 0xE8 - 0xEF */
4471 N, N, N, N, N, N, N, N,
4472 /* 0xF0 - 0xF7 */
4473 N, N, N, N, N, N, N, N,
4474 /* 0xF8 - 0xFF */
4475 N, N, N, N, N, N, N, N,
4476} };
4477
4478static const struct escape escape_db = { {
4479 N, N, N, N, N, N, N, N,
4480}, {
4481 /* 0xC0 - 0xC7 */
4482 N, N, N, N, N, N, N, N,
4483 /* 0xC8 - 0xCF */
4484 N, N, N, N, N, N, N, N,
4485 /* 0xD0 - 0xC7 */
4486 N, N, N, N, N, N, N, N,
4487 /* 0xD8 - 0xDF */
4488 N, N, N, N, N, N, N, N,
4489 /* 0xE0 - 0xE7 */
4490 N, N, N, I(ImplicitOps, em_fninit), N, N, N, N,
4491 /* 0xE8 - 0xEF */
4492 N, N, N, N, N, N, N, N,
4493 /* 0xF0 - 0xF7 */
4494 N, N, N, N, N, N, N, N,
4495 /* 0xF8 - 0xFF */
4496 N, N, N, N, N, N, N, N,
4497} };
4498
4499static const struct escape escape_dd = { {
Nadav Amit16bebef2014-12-25 02:52:18 +02004500 N, N, N, N, N, N, N, I(DstMem16 | Mov, em_fnstsw),
Gleb Natapov045a2822012-12-20 16:57:43 +02004501}, {
4502 /* 0xC0 - 0xC7 */
4503 N, N, N, N, N, N, N, N,
4504 /* 0xC8 - 0xCF */
4505 N, N, N, N, N, N, N, N,
4506 /* 0xD0 - 0xC7 */
4507 N, N, N, N, N, N, N, N,
4508 /* 0xD8 - 0xDF */
4509 N, N, N, N, N, N, N, N,
4510 /* 0xE0 - 0xE7 */
4511 N, N, N, N, N, N, N, N,
4512 /* 0xE8 - 0xEF */
4513 N, N, N, N, N, N, N, N,
4514 /* 0xF0 - 0xF7 */
4515 N, N, N, N, N, N, N, N,
4516 /* 0xF8 - 0xFF */
4517 N, N, N, N, N, N, N, N,
4518} };
4519
Nadav Amit39f062f2014-11-26 15:47:18 +02004520static const struct instr_dual instr_dual_0f_c3 = {
4521 I(DstMem | SrcReg | ModRM | No16 | Mov, em_mov), N
4522};
4523
Nadav Amit2276b512015-01-26 09:32:24 +02004524static const struct mode_dual mode_dual_63 = {
4525 N, I(DstReg | SrcMem32 | ModRM | Mov, em_movsxd)
4526};
4527
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004528static const struct opcode opcode_table[256] = {
Avi Kivity73fba5f2010-07-29 15:11:53 +03004529 /* 0x00 - 0x07 */
Avi Kivityfb864fb2013-01-04 16:18:54 +02004530 F6ALU(Lock, em_add),
Avi Kivity1cd196e2011-09-13 10:45:51 +03004531 I(ImplicitOps | Stack | No64 | Src2ES, em_push_sreg),
4532 I(ImplicitOps | Stack | No64 | Src2ES, em_pop_sreg),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004533 /* 0x08 - 0x0F */
Avi Kivityfb864fb2013-01-04 16:18:54 +02004534 F6ALU(Lock | PageTable, em_or),
Avi Kivity1cd196e2011-09-13 10:45:51 +03004535 I(ImplicitOps | Stack | No64 | Src2CS, em_push_sreg),
4536 N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004537 /* 0x10 - 0x17 */
Avi Kivityfb864fb2013-01-04 16:18:54 +02004538 F6ALU(Lock, em_adc),
Avi Kivity1cd196e2011-09-13 10:45:51 +03004539 I(ImplicitOps | Stack | No64 | Src2SS, em_push_sreg),
4540 I(ImplicitOps | Stack | No64 | Src2SS, em_pop_sreg),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004541 /* 0x18 - 0x1F */
Avi Kivityfb864fb2013-01-04 16:18:54 +02004542 F6ALU(Lock, em_sbb),
Avi Kivity1cd196e2011-09-13 10:45:51 +03004543 I(ImplicitOps | Stack | No64 | Src2DS, em_push_sreg),
4544 I(ImplicitOps | Stack | No64 | Src2DS, em_pop_sreg),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004545 /* 0x20 - 0x27 */
Avi Kivityfb864fb2013-01-04 16:18:54 +02004546 F6ALU(Lock | PageTable, em_and), N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004547 /* 0x28 - 0x2F */
Avi Kivityfb864fb2013-01-04 16:18:54 +02004548 F6ALU(Lock, em_sub), N, I(ByteOp | DstAcc | No64, em_das),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004549 /* 0x30 - 0x37 */
Avi Kivityfb864fb2013-01-04 16:18:54 +02004550 F6ALU(Lock, em_xor), N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004551 /* 0x38 - 0x3F */
Avi Kivityfb864fb2013-01-04 16:18:54 +02004552 F6ALU(NoWrite, em_cmp), N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004553 /* 0x40 - 0x4F */
Avi Kivity95413dc2013-01-19 19:51:53 +02004554 X8(F(DstReg, em_inc)), X8(F(DstReg, em_dec)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004555 /* 0x50 - 0x57 */
Avi Kivity63540382010-07-29 15:11:55 +03004556 X8(I(SrcReg | Stack, em_push)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004557 /* 0x58 - 0x5F */
Takuya Yoshikawac54fe502011-04-23 18:49:40 +09004558 X8(I(DstReg | Stack, em_pop)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004559 /* 0x60 - 0x67 */
Takuya Yoshikawab96a7fa2011-04-23 18:51:07 +09004560 I(ImplicitOps | Stack | No64, em_pusha),
4561 I(ImplicitOps | Stack | No64, em_popa),
Nadav Amit2276b512015-01-26 09:32:24 +02004562 N, MD(ModRM, &mode_dual_63),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004563 N, N, N, N,
4564 /* 0x68 - 0x6F */
Avi Kivityd46164d2010-08-18 19:29:33 +03004565 I(SrcImm | Mov | Stack, em_push),
4566 I(DstReg | SrcMem | ModRM | Src2Imm, em_imul_3op),
Avi Kivityf3a1b9f2010-08-18 18:25:25 +03004567 I(SrcImmByte | Mov | Stack, em_push),
4568 I(DstReg | SrcMem | ModRM | Src2ImmByte, em_imul_3op),
Gleb Natapovb3356bf2012-09-03 15:24:29 +03004569 I2bvIP(DstDI | SrcDX | Mov | String | Unaligned, em_in, ins, check_perm_in), /* insb, insw/insd */
Takuya Yoshikawa2b5e97e2011-11-23 12:27:39 +09004570 I2bvIP(SrcSI | DstDX | String, em_out, outs, check_perm_out), /* outsb, outsw/outsd */
Avi Kivity73fba5f2010-07-29 15:11:53 +03004571 /* 0x70 - 0x7F */
Nadav Amit58b70752014-10-24 11:35:09 +03004572 X16(D(SrcImmByte | NearBranch)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004573 /* 0x80 - 0x87 */
Takuya Yoshikawa1c2545b2012-04-30 17:46:31 +09004574 G(ByteOp | DstMem | SrcImm, group1),
4575 G(DstMem | SrcImm, group1),
4576 G(ByteOp | DstMem | SrcImm | No64, group1),
4577 G(DstMem | SrcImmByte, group1),
Avi Kivityfb864fb2013-01-04 16:18:54 +02004578 F2bv(DstMem | SrcReg | ModRM | NoWrite, em_test),
Xiao Guangrongd5ae7ce2011-09-22 16:53:46 +08004579 I2bv(DstMem | SrcReg | ModRM | Lock | PageTable, em_xchg),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004580 /* 0x88 - 0x8F */
Xiao Guangrongd5ae7ce2011-09-22 16:53:46 +08004581 I2bv(DstMem | SrcReg | ModRM | Mov | PageTable, em_mov),
Avi Kivityb9eac5f2010-08-03 14:46:56 +03004582 I2bv(DstReg | SrcMem | ModRM | Mov, em_mov),
Xiao Guangrongd5ae7ce2011-09-22 16:53:46 +08004583 I(DstMem | SrcNone | ModRM | Mov | PageTable, em_mov_rm_sreg),
Takuya Yoshikawa1bd5f462011-05-29 22:01:33 +09004584 D(ModRM | SrcMem | NoAccess | DstReg),
4585 I(ImplicitOps | SrcMem16 | ModRM, em_mov_sreg_rm),
4586 G(0, group1A),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004587 /* 0x90 - 0x97 */
Joerg Roedelbf608f82011-04-04 12:39:34 +02004588 DI(SrcAcc | DstReg, pause), X7(D(SrcAcc | DstReg)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004589 /* 0x98 - 0x9F */
Avi Kivity61429142010-08-19 15:13:00 +03004590 D(DstAcc | SrcNone), I(ImplicitOps | SrcAcc, em_cwd),
Wei Yongjuncc4feed2010-08-25 14:10:53 +08004591 I(SrcImmFAddr | No64, em_call_far), N,
Takuya Yoshikawa62aaa2f2011-04-23 18:52:56 +09004592 II(ImplicitOps | Stack, em_pushf, pushf),
Paolo Bonzini98f73632013-10-31 11:19:42 +01004593 II(ImplicitOps | Stack, em_popf, popf),
4594 I(ImplicitOps, em_sahf), I(ImplicitOps, em_lahf),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004595 /* 0xA0 - 0xA7 */
Avi Kivityb9eac5f2010-08-03 14:46:56 +03004596 I2bv(DstAcc | SrcMem | Mov | MemAbs, em_mov),
Xiao Guangrongd5ae7ce2011-09-22 16:53:46 +08004597 I2bv(DstMem | SrcAcc | Mov | MemAbs | PageTable, em_mov),
Tom Lendacky0f89b202016-12-14 14:59:23 -05004598 I2bv(SrcSI | DstDI | Mov | String | TwoMemOp, em_mov),
4599 F2bv(SrcSI | DstDI | String | NoWrite | TwoMemOp, em_cmp_r),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004600 /* 0xA8 - 0xAF */
Avi Kivityfb864fb2013-01-04 16:18:54 +02004601 F2bv(DstAcc | SrcImm | NoWrite, em_test),
Avi Kivityb9eac5f2010-08-03 14:46:56 +03004602 I2bv(SrcAcc | DstDI | Mov | String, em_mov),
4603 I2bv(SrcSI | DstAcc | Mov | String, em_mov),
Nadav Amit5aca3722014-11-02 11:54:50 +02004604 F2bv(SrcAcc | DstDI | String | NoWrite, em_cmp_r),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004605 /* 0xB0 - 0xB7 */
Avi Kivityb9eac5f2010-08-03 14:46:56 +03004606 X8(I(ByteOp | DstReg | SrcImm | Mov, em_mov)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004607 /* 0xB8 - 0xBF */
Nadav Amit5e2c6882012-12-06 21:55:10 -02004608 X8(I(DstReg | SrcImm64 | Mov, em_mov)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004609 /* 0xC0 - 0xC7 */
Avi Kivity007a3b52013-01-19 19:51:51 +02004610 G(ByteOp | Src2ImmByte, group2), G(Src2ImmByte, group2),
Nadav Amit58b70752014-10-24 11:35:09 +03004611 I(ImplicitOps | NearBranch | SrcImmU16, em_ret_near_imm),
4612 I(ImplicitOps | NearBranch, em_ret),
Avi Kivityd4b43252011-09-13 10:45:50 +03004613 I(DstReg | SrcMemFAddr | ModRM | No64 | Src2ES, em_lseg),
4614 I(DstReg | SrcMemFAddr | ModRM | No64 | Src2DS, em_lseg),
Avi Kivitya4d4a7c2010-08-03 15:05:46 +03004615 G(ByteOp, group11), G(0, group11),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004616 /* 0xC8 - 0xCF */
Avi Kivity612e89f2012-06-12 20:03:23 +03004617 I(Stack | SrcImmU16 | Src2ImmByte, em_enter), I(Stack, em_leave),
Nadav Amit16794aa2015-01-26 09:32:22 +02004618 I(ImplicitOps | SrcImmU16, em_ret_far_imm),
4619 I(ImplicitOps, em_ret_far),
Avi Kivity3c6e2762011-04-04 12:39:23 +02004620 D(ImplicitOps), DI(SrcImmByte, intn),
Takuya Yoshikawadb5b0762011-05-29 21:56:26 +09004621 D(ImplicitOps | No64), II(ImplicitOps, em_iret, iret),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004622 /* 0xD0 - 0xD7 */
Avi Kivity007a3b52013-01-19 19:51:51 +02004623 G(Src2One | ByteOp, group2), G(Src2One, group2),
4624 G(Src2CL | ByteOp, group2), G(Src2CL, group2),
Paolo Bonzinia035d5c62013-05-09 11:32:49 +02004625 I(DstAcc | SrcImmUByte | No64, em_aam),
Paolo Bonzini326f5782013-05-09 11:32:51 +02004626 I(DstAcc | SrcImmUByte | No64, em_aad),
4627 F(DstAcc | ByteOp | No64, em_salc),
Paolo Bonzini7fa57952013-05-09 11:32:50 +02004628 I(DstAcc | SrcXLat | ByteOp, em_mov),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004629 /* 0xD8 - 0xDF */
Gleb Natapov045a2822012-12-20 16:57:43 +02004630 N, E(0, &escape_d9), N, E(0, &escape_db), N, E(0, &escape_dd), N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004631 /* 0xE0 - 0xE7 */
Nadav Amit58b70752014-10-24 11:35:09 +03004632 X3(I(SrcImmByte | NearBranch, em_loop)),
4633 I(SrcImmByte | NearBranch, em_jcxz),
Takuya Yoshikawad7841a42011-11-22 15:16:54 +09004634 I2bvIP(SrcImmUByte | DstAcc, em_in, in, check_perm_in),
4635 I2bvIP(SrcAcc | DstImmUByte, em_out, out, check_perm_out),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004636 /* 0xE8 - 0xEF */
Nadav Amit58b70752014-10-24 11:35:09 +03004637 I(SrcImm | NearBranch, em_call), D(SrcImm | ImplicitOps | NearBranch),
4638 I(SrcImmFAddr | No64, em_jmp_far),
4639 D(SrcImmByte | ImplicitOps | NearBranch),
Takuya Yoshikawad7841a42011-11-22 15:16:54 +09004640 I2bvIP(SrcDX | DstAcc, em_in, in, check_perm_in),
4641 I2bvIP(SrcAcc | DstDX, em_out, out, check_perm_out),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004642 /* 0xF0 - 0xF7 */
Joerg Roedelbf608f82011-04-04 12:39:34 +02004643 N, DI(ImplicitOps, icebp), N, N,
Avi Kivity3c6e2762011-04-04 12:39:23 +02004644 DI(ImplicitOps | Priv, hlt), D(ImplicitOps),
4645 G(ByteOp, group3), G(0, group3),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004646 /* 0xF8 - 0xFF */
Takuya Yoshikawaf411e6c2011-05-29 22:05:15 +09004647 D(ImplicitOps), D(ImplicitOps),
4648 I(ImplicitOps, em_cli), I(ImplicitOps, em_sti),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004649 D(ImplicitOps), D(ImplicitOps), G(0, group4), G(0, group5),
4650};
4651
Mathias Krausefd0a0d82012-08-30 01:30:15 +02004652static const struct opcode twobyte_table[256] = {
Avi Kivity73fba5f2010-07-29 15:11:53 +03004653 /* 0x00 - 0x0F */
Joerg Roedeldee6bb72011-04-04 12:39:30 +02004654 G(0, group6), GD(0, &group7), N, N,
Borislav Petkovb51e9742013-09-22 16:44:52 +02004655 N, I(ImplicitOps | EmulateOnUD, em_syscall),
Takuya Yoshikawadb5b0762011-05-29 21:56:26 +09004656 II(ImplicitOps | Priv, em_clts, clts), N,
Avi Kivity3c6e2762011-04-04 12:39:23 +02004657 DI(ImplicitOps | Priv, invd), DI(ImplicitOps | Priv, wbinvd), N, N,
Nadav Amit3f6f1482014-10-13 13:04:14 +03004658 N, D(ImplicitOps | ModRM | SrcMem | NoAccess), N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004659 /* 0x10 - 0x1F */
Stefan Fritsch29916962018-04-01 17:54:44 +02004660 GP(ModRM | DstReg | SrcMem | Mov | Sse, &pfx_0f_10_0f_11),
4661 GP(ModRM | DstMem | SrcReg | Mov | Sse, &pfx_0f_10_0f_11),
4662 N, N, N, N, N, N,
Paolo Bonzini34d26182020-05-15 12:18:14 -04004663 D(ImplicitOps | ModRM | SrcMem | NoAccess), /* 4 * prefetch + 4 * reserved NOP */
4664 D(ImplicitOps | ModRM | SrcMem | NoAccess), N, N,
4665 D(ImplicitOps | ModRM | SrcMem | NoAccess), /* 8 * reserved NOP */
4666 D(ImplicitOps | ModRM | SrcMem | NoAccess), /* 8 * reserved NOP */
4667 D(ImplicitOps | ModRM | SrcMem | NoAccess), /* 8 * reserved NOP */
4668 D(ImplicitOps | ModRM | SrcMem | NoAccess), /* NOP + 7 * reserved NOP */
Avi Kivity73fba5f2010-07-29 15:11:53 +03004669 /* 0x20 - 0x2F */
Sean Christophersond0fe7b62021-04-21 19:21:20 -07004670 DIP(ModRM | DstMem | Priv | Op3264 | NoMod, cr_read, check_cr_access),
Nadav Amit9b88ae92014-05-25 23:05:21 +03004671 DIP(ModRM | DstMem | Priv | Op3264 | NoMod, dr_read, check_dr_read),
4672 IIP(ModRM | SrcMem | Priv | Op3264 | NoMod, em_cr_write, cr_write,
Sean Christophersond0fe7b62021-04-21 19:21:20 -07004673 check_cr_access),
Nadav Amit9b88ae92014-05-25 23:05:21 +03004674 IIP(ModRM | SrcMem | Priv | Op3264 | NoMod, em_dr_write, dr_write,
4675 check_dr_write),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004676 N, N, N, N,
Igor Mammedov27ce8252014-03-15 21:01:59 +01004677 GP(ModRM | DstReg | SrcMem | Mov | Sse, &pfx_0f_28_0f_29),
4678 GP(ModRM | DstMem | SrcReg | Mov | Sse, &pfx_0f_28_0f_29),
Paolo Bonzinid5b77062014-07-14 12:54:48 +02004679 N, GP(ModRM | DstMem | SrcReg | Mov | Sse, &pfx_0f_2b),
Avi Kivity3e114eb2012-04-09 18:40:01 +03004680 N, N, N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004681 /* 0x30 - 0x3F */
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09004682 II(ImplicitOps | Priv, em_wrmsr, wrmsr),
Joerg Roedel80612522011-04-04 12:39:33 +02004683 IIP(ImplicitOps, em_rdtsc, rdtsc, check_rdtsc),
Takuya Yoshikawae1e210b2011-11-22 15:20:03 +09004684 II(ImplicitOps | Priv, em_rdmsr, rdmsr),
Avi Kivity222d21a2011-11-10 14:57:30 +02004685 IIP(ImplicitOps, em_rdpmc, rdpmc, check_rdpmc),
Borislav Petkovb51e9742013-09-22 16:44:52 +02004686 I(ImplicitOps | EmulateOnUD, em_sysenter),
4687 I(ImplicitOps | Priv | EmulateOnUD, em_sysexit),
Avi Kivityd8671622011-02-01 16:32:03 +02004688 N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004689 N, N, N, N, N, N, N, N,
4690 /* 0x40 - 0x4F */
Nadav Amit140bad82014-06-15 16:13:00 +03004691 X16(D(DstReg | SrcMem | ModRM)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004692 /* 0x50 - 0x5F */
4693 N, N, N, N, N, N, N, N, N, N, N, N, N, N, N, N,
4694 /* 0x60 - 0x6F */
Avi Kivityaa97bb42010-01-20 18:09:23 +02004695 N, N, N, N,
4696 N, N, N, N,
4697 N, N, N, N,
4698 N, N, N, GP(SrcMem | DstReg | ModRM | Mov, &pfx_0f_6f_0f_7f),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004699 /* 0x70 - 0x7F */
Avi Kivityaa97bb42010-01-20 18:09:23 +02004700 N, N, N, N,
4701 N, N, N, N,
4702 N, N, N, N,
4703 N, N, N, GP(SrcReg | DstMem | ModRM | Mov, &pfx_0f_6f_0f_7f),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004704 /* 0x80 - 0x8F */
Nadav Amit58b70752014-10-24 11:35:09 +03004705 X16(D(SrcImm | NearBranch)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004706 /* 0x90 - 0x9F */
Wei Yongjunee45b582010-08-06 17:10:07 +08004707 X16(D(ByteOp | DstMem | SrcNone | ModRM| Mov)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004708 /* 0xA0 - 0xA7 */
Avi Kivity1cd196e2011-09-13 10:45:51 +03004709 I(Stack | Src2FS, em_push_sreg), I(Stack | Src2FS, em_pop_sreg),
Avi Kivity11c363b2013-01-19 19:51:54 +02004710 II(ImplicitOps, em_cpuid, cpuid),
4711 F(DstMem | SrcReg | ModRM | BitOp | NoWrite, em_bt),
Avi Kivity0bdea062013-01-19 19:51:50 +02004712 F(DstMem | SrcReg | Src2ImmByte | ModRM, em_shld),
4713 F(DstMem | SrcReg | Src2CL | ModRM, em_shld), N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004714 /* 0xA8 - 0xAF */
Avi Kivity1cd196e2011-09-13 10:45:51 +03004715 I(Stack | Src2GS, em_push_sreg), I(Stack | Src2GS, em_pop_sreg),
Paolo Bonzini89651a32015-11-03 13:43:05 +01004716 II(EmulateOnUD | ImplicitOps, em_rsm, rsm),
Avi Kivity11c363b2013-01-19 19:51:54 +02004717 F(DstMem | SrcReg | ModRM | BitOp | Lock | PageTable, em_bts),
Avi Kivity0bdea062013-01-19 19:51:50 +02004718 F(DstMem | SrcReg | Src2ImmByte | ModRM, em_shrd),
4719 F(DstMem | SrcReg | Src2CL | ModRM, em_shrd),
Nadav Amit13e457e2014-10-13 13:04:13 +03004720 GD(0, &group15), F(DstReg | SrcMem | ModRM, em_imul),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004721 /* 0xB0 - 0xB7 */
Nadav Amit2fcf5c82015-01-26 09:32:21 +02004722 I2bv(DstMem | SrcReg | ModRM | Lock | PageTable | SrcWrite, em_cmpxchg),
Avi Kivityd4b43252011-09-13 10:45:50 +03004723 I(DstReg | SrcMemFAddr | ModRM | Src2SS, em_lseg),
Avi Kivity11c363b2013-01-19 19:51:54 +02004724 F(DstMem | SrcReg | ModRM | BitOp | Lock, em_btr),
Avi Kivityd4b43252011-09-13 10:45:50 +03004725 I(DstReg | SrcMemFAddr | ModRM | Src2FS, em_lseg),
4726 I(DstReg | SrcMemFAddr | ModRM | Src2GS, em_lseg),
Avi Kivity2adb5ad2012-01-16 15:08:45 +02004727 D(DstReg | SrcMem8 | ModRM | Mov), D(DstReg | SrcMem16 | ModRM | Mov),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004728 /* 0xB8 - 0xBF */
4729 N, N,
Takuya Yoshikawace7faab2011-11-22 15:17:48 +09004730 G(BitOp, group8),
Avi Kivity11c363b2013-01-19 19:51:54 +02004731 F(DstMem | SrcReg | ModRM | BitOp | Lock | PageTable, em_btc),
Nadav Amit900efe22015-03-30 15:39:21 +03004732 I(DstReg | SrcMem | ModRM, em_bsf_c),
4733 I(DstReg | SrcMem | ModRM, em_bsr_c),
Avi Kivity2adb5ad2012-01-16 15:08:45 +02004734 D(DstReg | SrcMem8 | ModRM | Mov), D(DstReg | SrcMem16 | ModRM | Mov),
Avi Kivity92998362012-06-13 12:25:06 +03004735 /* 0xC0 - 0xC7 */
Avi Kivitye47a5f52013-02-09 11:31:51 +02004736 F2bv(DstMem | SrcReg | ModRM | SrcWrite | Lock, em_xadd),
Nadav Amit39f062f2014-11-26 15:47:18 +02004737 N, ID(0, &instr_dual_0f_c3),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004738 N, N, N, GD(0, &group9),
Avi Kivity92998362012-06-13 12:25:06 +03004739 /* 0xC8 - 0xCF */
4740 X8(I(DstReg, em_bswap)),
Avi Kivity73fba5f2010-07-29 15:11:53 +03004741 /* 0xD0 - 0xDF */
4742 N, N, N, N, N, N, N, N, N, N, N, N, N, N, N, N,
4743 /* 0xE0 - 0xEF */
Alex Williamson0a370272014-07-11 11:56:31 -06004744 N, N, N, N, N, N, N, GP(SrcReg | DstMem | ModRM | Mov, &pfx_0f_e7),
4745 N, N, N, N, N, N, N, N,
Avi Kivity73fba5f2010-07-29 15:11:53 +03004746 /* 0xF0 - 0xFF */
4747 N, N, N, N, N, N, N, N, N, N, N, N, N, N, N, N
4748};
4749
Nadav Amit39f062f2014-11-26 15:47:18 +02004750static const struct instr_dual instr_dual_0f_38_f0 = {
4751 I(DstReg | SrcMem | Mov, em_movbe), N
4752};
4753
4754static const struct instr_dual instr_dual_0f_38_f1 = {
4755 I(DstMem | SrcReg | Mov, em_movbe), N
4756};
4757
Borislav Petkov0bc5eed2013-10-29 12:54:10 +01004758static const struct gprefix three_byte_0f_38_f0 = {
Nadav Amit39f062f2014-11-26 15:47:18 +02004759 ID(0, &instr_dual_0f_38_f0), N, N, N
Borislav Petkov0bc5eed2013-10-29 12:54:10 +01004760};
4761
4762static const struct gprefix three_byte_0f_38_f1 = {
Nadav Amit39f062f2014-11-26 15:47:18 +02004763 ID(0, &instr_dual_0f_38_f1), N, N, N
Borislav Petkov0bc5eed2013-10-29 12:54:10 +01004764};
4765
4766/*
4767 * Insns below are selected by the prefix which indexed by the third opcode
4768 * byte.
4769 */
4770static const struct opcode opcode_map_0f_38[256] = {
4771 /* 0x00 - 0x7f */
4772 X16(N), X16(N), X16(N), X16(N), X16(N), X16(N), X16(N), X16(N),
Borislav Petkov84cffe42013-10-29 12:54:56 +01004773 /* 0x80 - 0xef */
4774 X16(N), X16(N), X16(N), X16(N), X16(N), X16(N), X16(N),
4775 /* 0xf0 - 0xf1 */
Nadav Amit53bb4f72014-12-07 11:49:42 +02004776 GP(EmulateOnUD | ModRM, &three_byte_0f_38_f0),
4777 GP(EmulateOnUD | ModRM, &three_byte_0f_38_f1),
Borislav Petkov84cffe42013-10-29 12:54:56 +01004778 /* 0xf2 - 0xff */
4779 N, N, X4(N), X8(N)
Borislav Petkov0bc5eed2013-10-29 12:54:10 +01004780};
4781
Avi Kivity73fba5f2010-07-29 15:11:53 +03004782#undef D
4783#undef N
4784#undef G
4785#undef GD
4786#undef I
Avi Kivityaa97bb42010-01-20 18:09:23 +02004787#undef GP
Joerg Roedel01de8b02011-04-04 12:39:31 +02004788#undef EXT
Nadav Amit2276b512015-01-26 09:32:24 +02004789#undef MD
Nadav Amit2b42fce2015-01-26 09:32:25 +02004790#undef ID
Avi Kivity73fba5f2010-07-29 15:11:53 +03004791
Avi Kivity8d8f4e92010-08-26 11:56:06 +03004792#undef D2bv
Joerg Roedelf6511932011-04-04 12:39:35 +02004793#undef D2bvIP
Avi Kivity8d8f4e92010-08-26 11:56:06 +03004794#undef I2bv
Takuya Yoshikawad7841a42011-11-22 15:16:54 +09004795#undef I2bvIP
Takuya Yoshikawad67fc272011-04-23 18:48:02 +09004796#undef I6ALU
Avi Kivity8d8f4e92010-08-26 11:56:06 +03004797
Avi Kivity9dac77f2011-06-01 15:34:25 +03004798static unsigned imm_size(struct x86_emulate_ctxt *ctxt)
Avi Kivity39f21ee2010-08-18 19:20:21 +03004799{
4800 unsigned size;
4801
Avi Kivity9dac77f2011-06-01 15:34:25 +03004802 size = (ctxt->d & ByteOp) ? 1 : ctxt->op_bytes;
Avi Kivity39f21ee2010-08-18 19:20:21 +03004803 if (size == 8)
4804 size = 4;
4805 return size;
4806}
4807
4808static int decode_imm(struct x86_emulate_ctxt *ctxt, struct operand *op,
4809 unsigned size, bool sign_extension)
4810{
Avi Kivity39f21ee2010-08-18 19:20:21 +03004811 int rc = X86EMUL_CONTINUE;
4812
4813 op->type = OP_IMM;
4814 op->bytes = size;
Avi Kivity9dac77f2011-06-01 15:34:25 +03004815 op->addr.mem.ea = ctxt->_eip;
Avi Kivity39f21ee2010-08-18 19:20:21 +03004816 /* NB. Immediates are sign-extended as necessary. */
4817 switch (op->bytes) {
4818 case 1:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09004819 op->val = insn_fetch(s8, ctxt);
Avi Kivity39f21ee2010-08-18 19:20:21 +03004820 break;
4821 case 2:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09004822 op->val = insn_fetch(s16, ctxt);
Avi Kivity39f21ee2010-08-18 19:20:21 +03004823 break;
4824 case 4:
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09004825 op->val = insn_fetch(s32, ctxt);
Avi Kivity39f21ee2010-08-18 19:20:21 +03004826 break;
Nadav Amit5e2c6882012-12-06 21:55:10 -02004827 case 8:
4828 op->val = insn_fetch(s64, ctxt);
4829 break;
Avi Kivity39f21ee2010-08-18 19:20:21 +03004830 }
4831 if (!sign_extension) {
4832 switch (op->bytes) {
4833 case 1:
4834 op->val &= 0xff;
4835 break;
4836 case 2:
4837 op->val &= 0xffff;
4838 break;
4839 case 4:
4840 op->val &= 0xffffffff;
4841 break;
4842 }
4843 }
4844done:
4845 return rc;
4846}
4847
Avi Kivitya99455492011-09-13 10:45:41 +03004848static int decode_operand(struct x86_emulate_ctxt *ctxt, struct operand *op,
4849 unsigned d)
4850{
4851 int rc = X86EMUL_CONTINUE;
4852
4853 switch (d) {
4854 case OpReg:
Avi Kivity2adb5ad2012-01-16 15:08:45 +02004855 decode_register_operand(ctxt, op);
Avi Kivitya99455492011-09-13 10:45:41 +03004856 break;
4857 case OpImmUByte:
Avi Kivity608aabe2011-09-13 10:45:45 +03004858 rc = decode_imm(ctxt, op, 1, false);
Avi Kivitya99455492011-09-13 10:45:41 +03004859 break;
4860 case OpMem:
Avi Kivity41ddf972011-09-13 10:45:48 +03004861 ctxt->memop.bytes = (ctxt->d & ByteOp) ? 1 : ctxt->op_bytes;
Avi Kivity0fe59122011-09-13 10:45:47 +03004862 mem_common:
Avi Kivitya99455492011-09-13 10:45:41 +03004863 *op = ctxt->memop;
4864 ctxt->memopp = op;
Paolo Bonzini96888972014-04-01 14:54:19 +02004865 if (ctxt->d & BitOp)
Avi Kivitya99455492011-09-13 10:45:41 +03004866 fetch_bit_operand(ctxt);
4867 op->orig_val = op->val;
4868 break;
Avi Kivity41ddf972011-09-13 10:45:48 +03004869 case OpMem64:
Nadav Amitaaa05f22014-06-02 18:34:10 +03004870 ctxt->memop.bytes = (ctxt->op_bytes == 8) ? 16 : 8;
Avi Kivity41ddf972011-09-13 10:45:48 +03004871 goto mem_common;
Avi Kivitya99455492011-09-13 10:45:41 +03004872 case OpAcc:
4873 op->type = OP_REG;
4874 op->bytes = (ctxt->d & ByteOp) ? 1 : ctxt->op_bytes;
Avi Kivitydd856ef2012-08-27 23:46:17 +03004875 op->addr.reg = reg_rmw(ctxt, VCPU_REGS_RAX);
Avi Kivitya99455492011-09-13 10:45:41 +03004876 fetch_register_operand(op);
4877 op->orig_val = op->val;
4878 break;
Avi Kivity820207c2013-02-09 11:31:45 +02004879 case OpAccLo:
4880 op->type = OP_REG;
4881 op->bytes = (ctxt->d & ByteOp) ? 2 : ctxt->op_bytes;
4882 op->addr.reg = reg_rmw(ctxt, VCPU_REGS_RAX);
4883 fetch_register_operand(op);
4884 op->orig_val = op->val;
4885 break;
4886 case OpAccHi:
4887 if (ctxt->d & ByteOp) {
4888 op->type = OP_NONE;
4889 break;
4890 }
4891 op->type = OP_REG;
4892 op->bytes = ctxt->op_bytes;
4893 op->addr.reg = reg_rmw(ctxt, VCPU_REGS_RDX);
4894 fetch_register_operand(op);
4895 op->orig_val = op->val;
4896 break;
Avi Kivitya99455492011-09-13 10:45:41 +03004897 case OpDI:
4898 op->type = OP_MEM;
4899 op->bytes = (ctxt->d & ByteOp) ? 1 : ctxt->op_bytes;
4900 op->addr.mem.ea =
Paolo Bonzini01485a22014-11-19 18:25:08 +01004901 register_address(ctxt, VCPU_REGS_RDI);
Avi Kivitya99455492011-09-13 10:45:41 +03004902 op->addr.mem.seg = VCPU_SREG_ES;
4903 op->val = 0;
Gleb Natapovb3356bf2012-09-03 15:24:29 +03004904 op->count = 1;
Avi Kivitya99455492011-09-13 10:45:41 +03004905 break;
4906 case OpDX:
4907 op->type = OP_REG;
4908 op->bytes = 2;
Avi Kivitydd856ef2012-08-27 23:46:17 +03004909 op->addr.reg = reg_rmw(ctxt, VCPU_REGS_RDX);
Avi Kivitya99455492011-09-13 10:45:41 +03004910 fetch_register_operand(op);
4911 break;
Avi Kivity4dd6a572011-09-13 10:45:43 +03004912 case OpCL:
Nadav Amitd29b9d72014-11-02 11:54:47 +02004913 op->type = OP_IMM;
Avi Kivity4dd6a572011-09-13 10:45:43 +03004914 op->bytes = 1;
Avi Kivitydd856ef2012-08-27 23:46:17 +03004915 op->val = reg_read(ctxt, VCPU_REGS_RCX) & 0xff;
Avi Kivity4dd6a572011-09-13 10:45:43 +03004916 break;
4917 case OpImmByte:
4918 rc = decode_imm(ctxt, op, 1, true);
4919 break;
4920 case OpOne:
Nadav Amitd29b9d72014-11-02 11:54:47 +02004921 op->type = OP_IMM;
Avi Kivity4dd6a572011-09-13 10:45:43 +03004922 op->bytes = 1;
4923 op->val = 1;
4924 break;
4925 case OpImm:
4926 rc = decode_imm(ctxt, op, imm_size(ctxt), true);
4927 break;
Nadav Amit5e2c6882012-12-06 21:55:10 -02004928 case OpImm64:
4929 rc = decode_imm(ctxt, op, ctxt->op_bytes, true);
4930 break;
Avi Kivity28867ce2012-01-16 15:08:44 +02004931 case OpMem8:
4932 ctxt->memop.bytes = 1;
Gleb Natapov660696d2013-04-24 13:38:36 +03004933 if (ctxt->memop.type == OP_REG) {
Gleb Natapovaa9ac1a2013-11-04 15:52:41 +02004934 ctxt->memop.addr.reg = decode_register(ctxt,
4935 ctxt->modrm_rm, true);
Gleb Natapov660696d2013-04-24 13:38:36 +03004936 fetch_register_operand(&ctxt->memop);
4937 }
Avi Kivity28867ce2012-01-16 15:08:44 +02004938 goto mem_common;
Avi Kivity0fe59122011-09-13 10:45:47 +03004939 case OpMem16:
4940 ctxt->memop.bytes = 2;
4941 goto mem_common;
4942 case OpMem32:
4943 ctxt->memop.bytes = 4;
4944 goto mem_common;
4945 case OpImmU16:
4946 rc = decode_imm(ctxt, op, 2, false);
4947 break;
4948 case OpImmU:
4949 rc = decode_imm(ctxt, op, imm_size(ctxt), false);
4950 break;
4951 case OpSI:
4952 op->type = OP_MEM;
4953 op->bytes = (ctxt->d & ByteOp) ? 1 : ctxt->op_bytes;
4954 op->addr.mem.ea =
Paolo Bonzini01485a22014-11-19 18:25:08 +01004955 register_address(ctxt, VCPU_REGS_RSI);
Bandan Das573e80f2014-04-16 12:46:13 -04004956 op->addr.mem.seg = ctxt->seg_override;
Avi Kivity0fe59122011-09-13 10:45:47 +03004957 op->val = 0;
Gleb Natapovb3356bf2012-09-03 15:24:29 +03004958 op->count = 1;
Avi Kivity0fe59122011-09-13 10:45:47 +03004959 break;
Paolo Bonzini7fa57952013-05-09 11:32:50 +02004960 case OpXLat:
4961 op->type = OP_MEM;
4962 op->bytes = (ctxt->d & ByteOp) ? 1 : ctxt->op_bytes;
4963 op->addr.mem.ea =
Paolo Bonzini01485a22014-11-19 18:25:08 +01004964 address_mask(ctxt,
Paolo Bonzini7fa57952013-05-09 11:32:50 +02004965 reg_read(ctxt, VCPU_REGS_RBX) +
4966 (reg_read(ctxt, VCPU_REGS_RAX) & 0xff));
Bandan Das573e80f2014-04-16 12:46:13 -04004967 op->addr.mem.seg = ctxt->seg_override;
Paolo Bonzini7fa57952013-05-09 11:32:50 +02004968 op->val = 0;
4969 break;
Avi Kivity0fe59122011-09-13 10:45:47 +03004970 case OpImmFAddr:
4971 op->type = OP_IMM;
4972 op->addr.mem.ea = ctxt->_eip;
4973 op->bytes = ctxt->op_bytes + 2;
4974 insn_fetch_arr(op->valptr, op->bytes, ctxt);
4975 break;
4976 case OpMemFAddr:
4977 ctxt->memop.bytes = ctxt->op_bytes + 2;
4978 goto mem_common;
Avi Kivityc191a7a2011-09-13 10:45:49 +03004979 case OpES:
Nadav Amitd29b9d72014-11-02 11:54:47 +02004980 op->type = OP_IMM;
Avi Kivityc191a7a2011-09-13 10:45:49 +03004981 op->val = VCPU_SREG_ES;
4982 break;
4983 case OpCS:
Nadav Amitd29b9d72014-11-02 11:54:47 +02004984 op->type = OP_IMM;
Avi Kivityc191a7a2011-09-13 10:45:49 +03004985 op->val = VCPU_SREG_CS;
4986 break;
4987 case OpSS:
Nadav Amitd29b9d72014-11-02 11:54:47 +02004988 op->type = OP_IMM;
Avi Kivityc191a7a2011-09-13 10:45:49 +03004989 op->val = VCPU_SREG_SS;
4990 break;
4991 case OpDS:
Nadav Amitd29b9d72014-11-02 11:54:47 +02004992 op->type = OP_IMM;
Avi Kivityc191a7a2011-09-13 10:45:49 +03004993 op->val = VCPU_SREG_DS;
4994 break;
4995 case OpFS:
Nadav Amitd29b9d72014-11-02 11:54:47 +02004996 op->type = OP_IMM;
Avi Kivityc191a7a2011-09-13 10:45:49 +03004997 op->val = VCPU_SREG_FS;
4998 break;
4999 case OpGS:
Nadav Amitd29b9d72014-11-02 11:54:47 +02005000 op->type = OP_IMM;
Avi Kivityc191a7a2011-09-13 10:45:49 +03005001 op->val = VCPU_SREG_GS;
5002 break;
Avi Kivitya99455492011-09-13 10:45:41 +03005003 case OpImplicit:
5004 /* Special instructions do their own operand decoding. */
5005 default:
5006 op->type = OP_NONE; /* Disable writeback. */
5007 break;
5008 }
5009
5010done:
5011 return rc;
5012}
5013
Wanpeng Lib35491e2021-05-27 17:01:37 -07005014int x86_decode_insn(struct x86_emulate_ctxt *ctxt, void *insn, int insn_len, int emulation_type)
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005015{
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005016 int rc = X86EMUL_CONTINUE;
5017 int mode = ctxt->mode;
Avi Kivity46561642011-04-24 14:09:59 +03005018 int def_op_bytes, def_ad_bytes, goffset, simd_prefix;
Avi Kivity0d7cdee2011-03-29 11:34:38 +02005019 bool op_prefix = false;
Bandan Das573e80f2014-04-16 12:46:13 -04005020 bool has_seg_override = false;
Avi Kivity46561642011-04-24 14:09:59 +03005021 struct opcode opcode;
Wanpeng Li3853be22017-11-05 16:54:47 -08005022 u16 dummy;
5023 struct desc_struct desc;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005024
Avi Kivityf09ed832011-09-13 10:45:40 +03005025 ctxt->memop.type = OP_NONE;
5026 ctxt->memopp = NULL;
Avi Kivity9dac77f2011-06-01 15:34:25 +03005027 ctxt->_eip = ctxt->eip;
Paolo Bonzini17052f12014-05-06 16:33:01 +02005028 ctxt->fetch.ptr = ctxt->fetch.data;
5029 ctxt->fetch.end = ctxt->fetch.data + insn_len;
Borislav Petkov1ce19dc2013-09-22 16:44:51 +02005030 ctxt->opcode_len = 1;
Vitaly Kuznetsov342993f2020-03-03 15:33:15 +01005031 ctxt->intercept = x86_intercept_none;
Andre Przywaradc25e892010-12-21 11:12:07 +01005032 if (insn_len > 0)
Avi Kivity9dac77f2011-06-01 15:34:25 +03005033 memcpy(ctxt->fetch.data, insn, insn_len);
Paolo Bonzini285ca9e2014-05-06 12:24:32 +02005034 else {
Paolo Bonzini9506d572014-05-06 13:05:25 +02005035 rc = __do_insn_fetch_bytes(ctxt, 1);
Paolo Bonzini285ca9e2014-05-06 12:24:32 +02005036 if (rc != X86EMUL_CONTINUE)
Sean Christopherson016cd752019-08-15 09:20:32 -07005037 goto done;
Paolo Bonzini285ca9e2014-05-06 12:24:32 +02005038 }
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005039
5040 switch (mode) {
5041 case X86EMUL_MODE_REAL:
5042 case X86EMUL_MODE_VM86:
Wanpeng Li3853be22017-11-05 16:54:47 -08005043 def_op_bytes = def_ad_bytes = 2;
5044 ctxt->ops->get_segment(ctxt, &dummy, &desc, NULL, VCPU_SREG_CS);
5045 if (desc.d)
5046 def_op_bytes = def_ad_bytes = 4;
5047 break;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005048 case X86EMUL_MODE_PROT16:
5049 def_op_bytes = def_ad_bytes = 2;
5050 break;
5051 case X86EMUL_MODE_PROT32:
5052 def_op_bytes = def_ad_bytes = 4;
5053 break;
5054#ifdef CONFIG_X86_64
5055 case X86EMUL_MODE_PROT64:
5056 def_op_bytes = 4;
5057 def_ad_bytes = 8;
5058 break;
5059#endif
5060 default:
Takuya Yoshikawa1d2887e2011-07-30 18:03:34 +09005061 return EMULATION_FAILED;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005062 }
5063
Avi Kivity9dac77f2011-06-01 15:34:25 +03005064 ctxt->op_bytes = def_op_bytes;
5065 ctxt->ad_bytes = def_ad_bytes;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005066
5067 /* Legacy prefixes. */
5068 for (;;) {
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09005069 switch (ctxt->b = insn_fetch(u8, ctxt)) {
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005070 case 0x66: /* operand-size override */
Avi Kivity0d7cdee2011-03-29 11:34:38 +02005071 op_prefix = true;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005072 /* switch between 2/4 bytes */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005073 ctxt->op_bytes = def_op_bytes ^ 6;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005074 break;
5075 case 0x67: /* address-size override */
5076 if (mode == X86EMUL_MODE_PROT64)
5077 /* switch between 4/8 bytes */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005078 ctxt->ad_bytes = def_ad_bytes ^ 12;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005079 else
5080 /* switch between 2/4 bytes */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005081 ctxt->ad_bytes = def_ad_bytes ^ 6;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005082 break;
5083 case 0x26: /* ES override */
Marios Pomonis125ffc52019-12-11 12:47:50 -08005084 has_seg_override = true;
5085 ctxt->seg_override = VCPU_SREG_ES;
5086 break;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005087 case 0x2e: /* CS override */
Marios Pomonis125ffc52019-12-11 12:47:50 -08005088 has_seg_override = true;
5089 ctxt->seg_override = VCPU_SREG_CS;
5090 break;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005091 case 0x36: /* SS override */
Marios Pomonis125ffc52019-12-11 12:47:50 -08005092 has_seg_override = true;
5093 ctxt->seg_override = VCPU_SREG_SS;
5094 break;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005095 case 0x3e: /* DS override */
Bandan Das573e80f2014-04-16 12:46:13 -04005096 has_seg_override = true;
Marios Pomonis125ffc52019-12-11 12:47:50 -08005097 ctxt->seg_override = VCPU_SREG_DS;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005098 break;
5099 case 0x64: /* FS override */
Marios Pomonis125ffc52019-12-11 12:47:50 -08005100 has_seg_override = true;
5101 ctxt->seg_override = VCPU_SREG_FS;
5102 break;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005103 case 0x65: /* GS override */
Bandan Das573e80f2014-04-16 12:46:13 -04005104 has_seg_override = true;
Marios Pomonis125ffc52019-12-11 12:47:50 -08005105 ctxt->seg_override = VCPU_SREG_GS;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005106 break;
5107 case 0x40 ... 0x4f: /* REX */
5108 if (mode != X86EMUL_MODE_PROT64)
5109 goto done_prefixes;
Avi Kivity9dac77f2011-06-01 15:34:25 +03005110 ctxt->rex_prefix = ctxt->b;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005111 continue;
5112 case 0xf0: /* LOCK */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005113 ctxt->lock_prefix = 1;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005114 break;
5115 case 0xf2: /* REPNE/REPNZ */
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005116 case 0xf3: /* REP/REPE/REPZ */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005117 ctxt->rep_prefix = ctxt->b;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005118 break;
5119 default:
5120 goto done_prefixes;
5121 }
5122
5123 /* Any legacy prefix after a REX prefix nullifies its effect. */
5124
Avi Kivity9dac77f2011-06-01 15:34:25 +03005125 ctxt->rex_prefix = 0;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005126 }
5127
5128done_prefixes:
5129
5130 /* REX prefix. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005131 if (ctxt->rex_prefix & 8)
5132 ctxt->op_bytes = 8; /* REX.W */
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005133
5134 /* Opcode byte(s). */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005135 opcode = opcode_table[ctxt->b];
Wei Yongjund3ad6242010-08-05 16:34:39 +08005136 /* Two-byte opcode? */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005137 if (ctxt->b == 0x0f) {
Borislav Petkov1ce19dc2013-09-22 16:44:51 +02005138 ctxt->opcode_len = 2;
Takuya Yoshikawae85a1082011-07-30 18:01:26 +09005139 ctxt->b = insn_fetch(u8, ctxt);
Avi Kivity9dac77f2011-06-01 15:34:25 +03005140 opcode = twobyte_table[ctxt->b];
Borislav Petkov0bc5eed2013-10-29 12:54:10 +01005141
5142 /* 0F_38 opcode map */
5143 if (ctxt->b == 0x38) {
5144 ctxt->opcode_len = 3;
5145 ctxt->b = insn_fetch(u8, ctxt);
5146 opcode = opcode_map_0f_38[ctxt->b];
5147 }
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005148 }
Avi Kivity9dac77f2011-06-01 15:34:25 +03005149 ctxt->d = opcode.flags;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005150
Takuya Yoshikawa9f4260e2012-04-30 17:48:25 +09005151 if (ctxt->d & ModRM)
5152 ctxt->modrm = insn_fetch(u8, ctxt);
5153
Nadav Amit7fe864d2014-06-02 18:34:03 +03005154 /* vex-prefix instructions are not implemented */
5155 if (ctxt->opcode_len == 1 && (ctxt->b == 0xc5 || ctxt->b == 0xc4) &&
Nadav Amitd14cb5d2014-11-02 11:54:58 +02005156 (mode == X86EMUL_MODE_PROT64 || (ctxt->modrm & 0xc0) == 0xc0)) {
Nadav Amit7fe864d2014-06-02 18:34:03 +03005157 ctxt->d = NotImpl;
5158 }
5159
Avi Kivity9dac77f2011-06-01 15:34:25 +03005160 while (ctxt->d & GroupMask) {
5161 switch (ctxt->d & GroupMask) {
Avi Kivity46561642011-04-24 14:09:59 +03005162 case Group:
Avi Kivity9dac77f2011-06-01 15:34:25 +03005163 goffset = (ctxt->modrm >> 3) & 7;
Avi Kivity46561642011-04-24 14:09:59 +03005164 opcode = opcode.u.group[goffset];
5165 break;
5166 case GroupDual:
Avi Kivity9dac77f2011-06-01 15:34:25 +03005167 goffset = (ctxt->modrm >> 3) & 7;
5168 if ((ctxt->modrm >> 6) == 3)
Avi Kivity46561642011-04-24 14:09:59 +03005169 opcode = opcode.u.gdual->mod3[goffset];
5170 else
5171 opcode = opcode.u.gdual->mod012[goffset];
5172 break;
5173 case RMExt:
Avi Kivity9dac77f2011-06-01 15:34:25 +03005174 goffset = ctxt->modrm & 7;
Joerg Roedel01de8b02011-04-04 12:39:31 +02005175 opcode = opcode.u.group[goffset];
Avi Kivity46561642011-04-24 14:09:59 +03005176 break;
5177 case Prefix:
Avi Kivity9dac77f2011-06-01 15:34:25 +03005178 if (ctxt->rep_prefix && op_prefix)
Takuya Yoshikawa1d2887e2011-07-30 18:03:34 +09005179 return EMULATION_FAILED;
Avi Kivity9dac77f2011-06-01 15:34:25 +03005180 simd_prefix = op_prefix ? 0x66 : ctxt->rep_prefix;
Avi Kivity46561642011-04-24 14:09:59 +03005181 switch (simd_prefix) {
5182 case 0x00: opcode = opcode.u.gprefix->pfx_no; break;
5183 case 0x66: opcode = opcode.u.gprefix->pfx_66; break;
5184 case 0xf2: opcode = opcode.u.gprefix->pfx_f2; break;
5185 case 0xf3: opcode = opcode.u.gprefix->pfx_f3; break;
5186 }
5187 break;
Gleb Natapov045a2822012-12-20 16:57:43 +02005188 case Escape:
Marios Pomonis3c9053a22019-12-11 12:47:41 -08005189 if (ctxt->modrm > 0xbf) {
5190 size_t size = ARRAY_SIZE(opcode.u.esc->high);
5191 u32 index = array_index_nospec(
5192 ctxt->modrm - 0xc0, size);
5193
5194 opcode = opcode.u.esc->high[index];
5195 } else {
Gleb Natapov045a2822012-12-20 16:57:43 +02005196 opcode = opcode.u.esc->op[(ctxt->modrm >> 3) & 7];
Marios Pomonis3c9053a22019-12-11 12:47:41 -08005197 }
Gleb Natapov045a2822012-12-20 16:57:43 +02005198 break;
Nadav Amit39f062f2014-11-26 15:47:18 +02005199 case InstrDual:
5200 if ((ctxt->modrm >> 6) == 3)
5201 opcode = opcode.u.idual->mod3;
5202 else
5203 opcode = opcode.u.idual->mod012;
5204 break;
Nadav Amit2276b512015-01-26 09:32:24 +02005205 case ModeDual:
5206 if (ctxt->mode == X86EMUL_MODE_PROT64)
5207 opcode = opcode.u.mdual->mode64;
5208 else
5209 opcode = opcode.u.mdual->mode32;
5210 break;
Avi Kivity46561642011-04-24 14:09:59 +03005211 default:
Takuya Yoshikawa1d2887e2011-07-30 18:03:34 +09005212 return EMULATION_FAILED;
Avi Kivity0d7cdee2011-03-29 11:34:38 +02005213 }
Avi Kivity46561642011-04-24 14:09:59 +03005214
Avi Kivityb1ea50b2011-09-13 10:45:42 +03005215 ctxt->d &= ~(u64)GroupMask;
Avi Kivity9dac77f2011-06-01 15:34:25 +03005216 ctxt->d |= opcode.flags;
Avi Kivity0d7cdee2011-03-29 11:34:38 +02005217 }
5218
Paolo Bonzinie24186e2014-03-27 12:00:57 +01005219 /* Unrecognised? */
5220 if (ctxt->d == 0)
5221 return EMULATION_FAILED;
5222
Avi Kivity9dac77f2011-06-01 15:34:25 +03005223 ctxt->execute = opcode.u.execute;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005224
Wanpeng Lib35491e2021-05-27 17:01:37 -07005225 if (unlikely(emulation_type & EMULTYPE_TRAP_UD) &&
5226 likely(!(ctxt->d & EmulateOnUD)))
Nadav Amit3a6095a2014-08-13 16:50:13 +03005227 return EMULATION_FAILED;
5228
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005229 if (unlikely(ctxt->d &
Nadav Amited9aad22014-11-02 11:55:00 +02005230 (NotImpl|Stack|Op3264|Sse|Mmx|Intercept|CheckPerm|NearBranch|
5231 No16))) {
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005232 /*
5233 * These are copied unconditionally here, and checked unconditionally
5234 * in x86_emulate_insn.
5235 */
5236 ctxt->check_perm = opcode.check_perm;
5237 ctxt->intercept = opcode.intercept;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005238
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005239 if (ctxt->d & NotImpl)
5240 return EMULATION_FAILED;
Avi Kivityd8671622011-02-01 16:32:03 +02005241
Nadav Amit58b70752014-10-24 11:35:09 +03005242 if (mode == X86EMUL_MODE_PROT64) {
5243 if (ctxt->op_bytes == 4 && (ctxt->d & Stack))
5244 ctxt->op_bytes = 8;
5245 else if (ctxt->d & NearBranch)
5246 ctxt->op_bytes = 8;
5247 }
Avi Kivity7f9b4b72010-08-01 14:46:54 +03005248
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005249 if (ctxt->d & Op3264) {
5250 if (mode == X86EMUL_MODE_PROT64)
5251 ctxt->op_bytes = 8;
5252 else
5253 ctxt->op_bytes = 4;
5254 }
5255
Nadav Amited9aad22014-11-02 11:55:00 +02005256 if ((ctxt->d & No16) && ctxt->op_bytes == 2)
5257 ctxt->op_bytes = 4;
5258
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005259 if (ctxt->d & Sse)
5260 ctxt->op_bytes = 16;
5261 else if (ctxt->d & Mmx)
5262 ctxt->op_bytes = 8;
5263 }
Avi Kivity1253791d2011-03-29 11:41:27 +02005264
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005265 /* ModRM and SIB bytes. */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005266 if (ctxt->d & ModRM) {
Avi Kivityf09ed832011-09-13 10:45:40 +03005267 rc = decode_modrm(ctxt, &ctxt->memop);
Bandan Das573e80f2014-04-16 12:46:13 -04005268 if (!has_seg_override) {
5269 has_seg_override = true;
5270 ctxt->seg_override = ctxt->modrm_seg;
5271 }
Avi Kivity9dac77f2011-06-01 15:34:25 +03005272 } else if (ctxt->d & MemAbs)
Avi Kivityf09ed832011-09-13 10:45:40 +03005273 rc = decode_abs(ctxt, &ctxt->memop);
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005274 if (rc != X86EMUL_CONTINUE)
5275 goto done;
5276
Bandan Das573e80f2014-04-16 12:46:13 -04005277 if (!has_seg_override)
5278 ctxt->seg_override = VCPU_SREG_DS;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005279
Bandan Das573e80f2014-04-16 12:46:13 -04005280 ctxt->memop.addr.mem.seg = ctxt->seg_override;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005281
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005282 /*
5283 * Decode and fetch the source operand: register, memory
5284 * or immediate.
5285 */
Avi Kivity0fe59122011-09-13 10:45:47 +03005286 rc = decode_operand(ctxt, &ctxt->src, (ctxt->d >> SrcShift) & OpMask);
Avi Kivity39f21ee2010-08-18 19:20:21 +03005287 if (rc != X86EMUL_CONTINUE)
5288 goto done;
5289
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005290 /*
5291 * Decode and fetch the second source operand: register, memory
5292 * or immediate.
5293 */
Avi Kivity4dd6a572011-09-13 10:45:43 +03005294 rc = decode_operand(ctxt, &ctxt->src2, (ctxt->d >> Src2Shift) & OpMask);
Avi Kivity39f21ee2010-08-18 19:20:21 +03005295 if (rc != X86EMUL_CONTINUE)
5296 goto done;
5297
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005298 /* Decode and fetch the destination operand: register or memory. */
Avi Kivitya99455492011-09-13 10:45:41 +03005299 rc = decode_operand(ctxt, &ctxt->dst, (ctxt->d >> DstShift) & OpMask);
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005300
Owen Hofmannd9092f52016-10-27 11:25:52 -07005301 if (ctxt->rip_relative && likely(ctxt->memopp))
Nadav Amit1c1c35a2014-11-19 17:43:09 +02005302 ctxt->memopp->addr.mem.ea = address_mask(ctxt,
5303 ctxt->memopp->addr.mem.ea + ctxt->_eip);
Avi Kivitycb16c342011-06-19 19:21:11 +03005304
Paolo Bonzinia430c912014-10-23 14:54:14 +02005305done:
Jan Dakinevichc8848ce2019-08-27 13:07:08 +00005306 if (rc == X86EMUL_PROPAGATE_FAULT)
5307 ctxt->have_exception = true;
Takuya Yoshikawa1d2887e2011-07-30 18:03:34 +09005308 return (rc != X86EMUL_CONTINUE) ? EMULATION_FAILED : EMULATION_OK;
Avi Kivitydde7e6d122010-07-29 15:11:52 +03005309}
5310
Xiao Guangrong1cb3f3a2011-09-22 17:02:48 +08005311bool x86_page_table_writing_insn(struct x86_emulate_ctxt *ctxt)
5312{
5313 return ctxt->d & PageTable;
5314}
5315
Gleb Natapov3e2f65d2010-08-25 12:47:42 +03005316static bool string_insn_completed(struct x86_emulate_ctxt *ctxt)
5317{
Gleb Natapov3e2f65d2010-08-25 12:47:42 +03005318 /* The second termination condition only applies for REPE
5319 * and REPNE. Test if the repeat string operation prefix is
5320 * REPE/REPZ or REPNE/REPNZ and if it's the case it tests the
5321 * corresponding termination condition according to:
5322 * - if REPE/REPZ and ZF = 0 then done
5323 * - if REPNE/REPNZ and ZF = 1 then done
5324 */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005325 if (((ctxt->b == 0xa6) || (ctxt->b == 0xa7) ||
5326 (ctxt->b == 0xae) || (ctxt->b == 0xaf))
5327 && (((ctxt->rep_prefix == REPE_PREFIX) &&
Nadav Amit0efb0442015-03-29 16:33:03 +03005328 ((ctxt->eflags & X86_EFLAGS_ZF) == 0))
Avi Kivity9dac77f2011-06-01 15:34:25 +03005329 || ((ctxt->rep_prefix == REPNE_PREFIX) &&
Nadav Amit0efb0442015-03-29 16:33:03 +03005330 ((ctxt->eflags & X86_EFLAGS_ZF) == X86_EFLAGS_ZF))))
Gleb Natapov3e2f65d2010-08-25 12:47:42 +03005331 return true;
5332
5333 return false;
5334}
5335
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03005336static int flush_pending_x87_faults(struct x86_emulate_ctxt *ctxt)
5337{
Radim Krčmářaabba3c2016-11-08 20:54:18 +01005338 int rc;
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03005339
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02005340 kvm_fpu_get();
Radim Krčmářaabba3c2016-11-08 20:54:18 +01005341 rc = asm_safe("fwait");
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02005342 kvm_fpu_put();
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03005343
Radim Krčmářaabba3c2016-11-08 20:54:18 +01005344 if (unlikely(rc != X86EMUL_CONTINUE))
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03005345 return emulate_exception(ctxt, MF_VECTOR, 0, false);
5346
5347 return X86EMUL_CONTINUE;
5348}
5349
Sean Christophersonc0a21c32020-01-17 11:30:52 -08005350static void fetch_possible_mmx_operand(struct operand *op)
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03005351{
5352 if (op->type == OP_MM)
Siddharth Chandrasekaran43e51462021-05-26 10:56:08 +02005353 kvm_read_mmx_reg(op->addr.mm, &op->mm_val);
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03005354}
5355
Sean Christopherson3009afc2020-01-21 20:43:39 -08005356static int fastop(struct x86_emulate_ctxt *ctxt, fastop_t fop)
Avi Kivitye28bbd42013-01-04 16:18:48 +02005357{
5358 ulong flags = (ctxt->eflags & EFLAGS_MASK) | X86_EFLAGS_IF;
Josh Poimboeuf4548f632016-03-09 12:59:50 -06005359
Avi Kivityb9fa4092013-02-09 11:31:48 +02005360 if (!(ctxt->d & ByteOp))
5361 fop += __ffs(ctxt->dst.bytes) * FASTOP_SIZE;
Josh Poimboeuf4548f632016-03-09 12:59:50 -06005362
Peter Zijlstra1a29b5b2018-01-25 10:58:13 +01005363 asm("push %[flags]; popf; " CALL_NOSPEC " ; pushf; pop %[flags]\n"
Avi Kivityb8c0b6a2013-02-09 11:31:49 +02005364 : "+a"(ctxt->dst.val), "+d"(ctxt->src.val), [flags]"+D"(flags),
Peter Zijlstra1a29b5b2018-01-25 10:58:13 +01005365 [thunk_target]"+S"(fop), ASM_CALL_CONSTRAINT
Avi Kivityb8c0b6a2013-02-09 11:31:49 +02005366 : "c"(ctxt->src2.val));
Josh Poimboeuf4548f632016-03-09 12:59:50 -06005367
Avi Kivitye28bbd42013-01-04 16:18:48 +02005368 ctxt->eflags = (ctxt->eflags & ~EFLAGS_MASK) | (flags & EFLAGS_MASK);
Avi Kivityb8c0b6a2013-02-09 11:31:49 +02005369 if (!fop) /* exception is returned in fop variable */
5370 return emulate_de(ctxt);
Avi Kivitye28bbd42013-01-04 16:18:48 +02005371 return X86EMUL_CONTINUE;
5372}
Avi Kivitydd856ef2012-08-27 23:46:17 +03005373
Bandan Das14985072014-04-16 12:46:09 -04005374void init_decode_cache(struct x86_emulate_ctxt *ctxt)
5375{
Bandan Das573e80f2014-04-16 12:46:13 -04005376 memset(&ctxt->rip_relative, 0,
5377 (void *)&ctxt->modrm - (void *)&ctxt->rip_relative);
Bandan Das14985072014-04-16 12:46:09 -04005378
Bandan Das14985072014-04-16 12:46:09 -04005379 ctxt->io_read.pos = 0;
5380 ctxt->io_read.end = 0;
Bandan Das14985072014-04-16 12:46:09 -04005381 ctxt->mem_read.end = 0;
5382}
5383
Takuya Yoshikawa7b105ca2011-05-15 01:00:52 +09005384int x86_emulate_insn(struct x86_emulate_ctxt *ctxt)
Laurent Vivier8b4caf62007-09-18 11:27:19 +02005385{
Mathias Krause0225fb52012-08-30 01:30:16 +02005386 const struct x86_emulate_ops *ops = ctxt->ops;
Takuya Yoshikawa1b30eaa2010-02-12 15:57:56 +09005387 int rc = X86EMUL_CONTINUE;
Avi Kivity9dac77f2011-06-01 15:34:25 +03005388 int saved_dst_type = ctxt->dst.type;
Ladi Prosek6ed071f2017-04-25 16:42:44 +02005389 unsigned emul_flags;
Laurent Vivier8b4caf62007-09-18 11:27:19 +02005390
Avi Kivity9dac77f2011-06-01 15:34:25 +03005391 ctxt->mem_read.pos = 0;
Glauber Costa310b5d32009-05-12 16:21:06 -04005392
Gleb Natapovd380a5e2010-02-10 14:21:36 +02005393 /* LOCK prefix is allowed only with some instructions */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005394 if (ctxt->lock_prefix && (!(ctxt->d & Lock) || ctxt->dst.type != OP_MEM)) {
Avi Kivity35d3d4a2010-11-22 17:53:25 +02005395 rc = emulate_ud(ctxt);
Gleb Natapovd380a5e2010-02-10 14:21:36 +02005396 goto done;
5397 }
5398
Avi Kivity9dac77f2011-06-01 15:34:25 +03005399 if ((ctxt->d & SrcMask) == SrcMemFAddr && ctxt->src.type != OP_MEM) {
Avi Kivity35d3d4a2010-11-22 17:53:25 +02005400 rc = emulate_ud(ctxt);
Avi Kivity081bca02010-08-26 11:06:15 +03005401 goto done;
5402 }
5403
Ladi Prosek6ed071f2017-04-25 16:42:44 +02005404 emul_flags = ctxt->ops->get_hflags(ctxt);
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005405 if (unlikely(ctxt->d &
5406 (No64|Undefined|Sse|Mmx|Intercept|CheckPerm|Priv|Prot|String))) {
5407 if ((ctxt->mode == X86EMUL_MODE_PROT64 && (ctxt->d & No64)) ||
5408 (ctxt->d & Undefined)) {
5409 rc = emulate_ud(ctxt);
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03005410 goto done;
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005411 }
Avi Kivitycbe2c9d2012-04-09 18:40:02 +03005412
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005413 if (((ctxt->d & (Sse|Mmx)) && ((ops->get_cr(ctxt, 0) & X86_CR0_EM)))
5414 || ((ctxt->d & Sse) && !(ops->get_cr(ctxt, 4) & X86_CR4_OSFXSR))) {
5415 rc = emulate_ud(ctxt);
Avi Kivityc4f035c2011-04-04 12:39:22 +02005416 goto done;
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005417 }
Avi Kivityc4f035c2011-04-04 12:39:22 +02005418
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005419 if ((ctxt->d & (Sse|Mmx)) && (ops->get_cr(ctxt, 0) & X86_CR0_TS)) {
5420 rc = emulate_nm(ctxt);
Joerg Roedeld09beab2011-04-04 12:39:25 +02005421 goto done;
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005422 }
Joerg Roedeld09beab2011-04-04 12:39:25 +02005423
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005424 if (ctxt->d & Mmx) {
5425 rc = flush_pending_x87_faults(ctxt);
5426 if (rc != X86EMUL_CONTINUE)
5427 goto done;
5428 /*
5429 * Now that we know the fpu is exception safe, we can fetch
5430 * operands from it.
5431 */
Sean Christophersonc0a21c32020-01-17 11:30:52 -08005432 fetch_possible_mmx_operand(&ctxt->src);
5433 fetch_possible_mmx_operand(&ctxt->src2);
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005434 if (!(ctxt->d & Mov))
Sean Christophersonc0a21c32020-01-17 11:30:52 -08005435 fetch_possible_mmx_operand(&ctxt->dst);
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005436 }
Avi Kivityc4f035c2011-04-04 12:39:22 +02005437
Ladi Prosek6ed071f2017-04-25 16:42:44 +02005438 if (unlikely(emul_flags & X86EMUL_GUEST_MASK) && ctxt->intercept) {
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005439 rc = emulator_check_intercept(ctxt, ctxt->intercept,
5440 X86_ICPT_PRE_EXCEPT);
5441 if (rc != X86EMUL_CONTINUE)
5442 goto done;
5443 }
5444
Nadav Amit64a38292014-12-10 11:19:04 +02005445 /* Instruction can only be executed in protected mode */
5446 if ((ctxt->d & Prot) && ctxt->mode < X86EMUL_MODE_PROT16) {
5447 rc = emulate_ud(ctxt);
5448 goto done;
5449 }
5450
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005451 /* Privileged instruction can be executed only in CPL=0 */
5452 if ((ctxt->d & Priv) && ops->cpl(ctxt)) {
Nadav Amit68efa762014-06-18 17:19:35 +03005453 if (ctxt->d & PrivUD)
5454 rc = emulate_ud(ctxt);
5455 else
5456 rc = emulate_gp(ctxt, 0);
Avi Kivityb9fa9d62007-11-27 19:05:37 +02005457 goto done;
5458 }
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005459
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005460 /* Do instruction specific permission checks */
Bandan Das685bbf42014-04-16 12:46:10 -04005461 if (ctxt->d & CheckPerm) {
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005462 rc = ctxt->check_perm(ctxt);
5463 if (rc != X86EMUL_CONTINUE)
5464 goto done;
5465 }
5466
Ladi Prosek6ed071f2017-04-25 16:42:44 +02005467 if (unlikely(emul_flags & X86EMUL_GUEST_MASK) && (ctxt->d & Intercept)) {
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005468 rc = emulator_check_intercept(ctxt, ctxt->intercept,
5469 X86_ICPT_POST_EXCEPT);
5470 if (rc != X86EMUL_CONTINUE)
5471 goto done;
5472 }
5473
5474 if (ctxt->rep_prefix && (ctxt->d & String)) {
5475 /* All REP prefixes have the same first termination condition */
5476 if (address_mask(ctxt, reg_read(ctxt, VCPU_REGS_RCX)) == 0) {
Nadav Amit428e3d02015-04-28 13:06:01 +03005477 string_registers_quirk(ctxt);
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005478 ctxt->eip = ctxt->_eip;
Nadav Amit0efb0442015-03-29 16:33:03 +03005479 ctxt->eflags &= ~X86_EFLAGS_RF;
Paolo Bonzinid40a6892014-03-27 11:58:02 +01005480 goto done;
5481 }
5482 }
Avi Kivityb9fa9d62007-11-27 19:05:37 +02005483 }
5484
Avi Kivity9dac77f2011-06-01 15:34:25 +03005485 if ((ctxt->src.type == OP_MEM) && !(ctxt->d & NoAccess)) {
5486 rc = segmented_read(ctxt, ctxt->src.addr.mem,
5487 ctxt->src.valptr, ctxt->src.bytes);
Takuya Yoshikawab60d5132010-01-20 16:47:21 +09005488 if (rc != X86EMUL_CONTINUE)
Laurent Vivier8b4caf62007-09-18 11:27:19 +02005489 goto done;
Avi Kivity9dac77f2011-06-01 15:34:25 +03005490 ctxt->src.orig_val64 = ctxt->src.val64;
Laurent Vivier8b4caf62007-09-18 11:27:19 +02005491 }
5492
Avi Kivity9dac77f2011-06-01 15:34:25 +03005493 if (ctxt->src2.type == OP_MEM) {
5494 rc = segmented_read(ctxt, ctxt->src2.addr.mem,
5495 &ctxt->src2.val, ctxt->src2.bytes);
Gleb Natapove35b7b92010-02-25 16:36:42 +02005496 if (rc != X86EMUL_CONTINUE)
5497 goto done;
5498 }
5499
Avi Kivity9dac77f2011-06-01 15:34:25 +03005500 if ((ctxt->d & DstMask) == ImplicitOps)
Laurent Vivier8b4caf62007-09-18 11:27:19 +02005501 goto special_insn;
5502
5503
Avi Kivity9dac77f2011-06-01 15:34:25 +03005504 if ((ctxt->dst.type == OP_MEM) && !(ctxt->d & Mov)) {
Gleb Natapov69f55cb2010-03-18 15:20:20 +02005505 /* optimisation - avoid slow emulated read if Mov */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005506 rc = segmented_read(ctxt, ctxt->dst.addr.mem,
5507 &ctxt->dst.val, ctxt->dst.bytes);
Nadav Amitc205fb72014-12-25 02:52:16 +02005508 if (rc != X86EMUL_CONTINUE) {
Paolo Bonzinid44e1212015-02-09 10:02:05 +01005509 if (!(ctxt->d & NoWrite) &&
5510 rc == X86EMUL_PROPAGATE_FAULT &&
Nadav Amitc205fb72014-12-25 02:52:16 +02005511 ctxt->exception.vector == PF_VECTOR)
5512 ctxt->exception.error_code |= PFERR_WRITE_MASK;
Gleb Natapov69f55cb2010-03-18 15:20:20 +02005513 goto done;
Nadav Amitc205fb72014-12-25 02:52:16 +02005514 }
Avi Kivity038e51d2007-01-22 20:40:40 -08005515 }
Paolo Bonzini4ff6f8e2015-02-12 17:04:47 +01005516 /* Copy full 64-bit value for CMPXCHG8B. */
5517 ctxt->dst.orig_val64 = ctxt->dst.val64;
Avi Kivity038e51d2007-01-22 20:40:40 -08005518
Avi Kivity018a98d2007-11-27 19:30:56 +02005519special_insn:
5520
Ladi Prosek6ed071f2017-04-25 16:42:44 +02005521 if (unlikely(emul_flags & X86EMUL_GUEST_MASK) && (ctxt->d & Intercept)) {
Avi Kivity9dac77f2011-06-01 15:34:25 +03005522 rc = emulator_check_intercept(ctxt, ctxt->intercept,
Joerg Roedel8a76d7f2011-04-04 12:39:27 +02005523 X86_ICPT_POST_MEMACCESS);
Avi Kivityc4f035c2011-04-04 12:39:22 +02005524 if (rc != X86EMUL_CONTINUE)
5525 goto done;
5526 }
5527
Nadav Amitb9a1ecb2014-07-24 14:51:23 +03005528 if (ctxt->rep_prefix && (ctxt->d & String))
Nadav Amit0efb0442015-03-29 16:33:03 +03005529 ctxt->eflags |= X86_EFLAGS_RF;
Nadav Amitb9a1ecb2014-07-24 14:51:23 +03005530 else
Nadav Amit0efb0442015-03-29 16:33:03 +03005531 ctxt->eflags &= ~X86_EFLAGS_RF;
Nadav Amit4467c3f2014-07-21 14:37:29 +03005532
Avi Kivity9dac77f2011-06-01 15:34:25 +03005533 if (ctxt->execute) {
Sean Christopherson3009afc2020-01-21 20:43:39 -08005534 if (ctxt->d & Fastop)
Qian Caib78a8552020-02-17 11:48:26 -05005535 rc = fastop(ctxt, ctxt->fop);
Sean Christopherson3009afc2020-01-21 20:43:39 -08005536 else
Miaohe Lin52db3692020-01-22 11:21:44 +08005537 rc = ctxt->execute(ctxt);
Avi Kivityef65c882010-07-29 15:11:51 +03005538 if (rc != X86EMUL_CONTINUE)
5539 goto done;
5540 goto writeback;
5541 }
5542
Borislav Petkov1ce19dc2013-09-22 16:44:51 +02005543 if (ctxt->opcode_len == 2)
Avi Kivity6aa8b732006-12-10 02:21:36 -08005544 goto twobyte_insn;
Borislav Petkov0bc5eed2013-10-29 12:54:10 +01005545 else if (ctxt->opcode_len == 3)
5546 goto threebyte_insn;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005547
Avi Kivity9dac77f2011-06-01 15:34:25 +03005548 switch (ctxt->b) {
Gleb Natapovb2833e32009-04-12 13:36:30 +03005549 case 0x70 ... 0x7f: /* jcc (short) */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005550 if (test_cc(ctxt->b, ctxt->eflags))
Nadav Amit234f3ce2014-09-18 22:39:38 +03005551 rc = jmp_rel(ctxt, ctxt->src.val);
Avi Kivity018a98d2007-11-27 19:30:56 +02005552 break;
Nitin A Kamble7e0b54b2007-09-15 10:35:36 +03005553 case 0x8d: /* lea r16/r32, m */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005554 ctxt->dst.val = ctxt->src.addr.mem.ea;
Nitin A Kamble7e0b54b2007-09-15 10:35:36 +03005555 break;
Avi Kivity3d9e77d2010-08-01 12:41:59 +03005556 case 0x90 ... 0x97: /* nop / xchg reg, rax */
Avi Kivitydd856ef2012-08-27 23:46:17 +03005557 if (ctxt->dst.addr.reg == reg_rmw(ctxt, VCPU_REGS_RAX))
Nadav Amita825f5c2014-06-15 16:13:01 +03005558 ctxt->dst.type = OP_NONE;
5559 else
5560 rc = em_xchg(ctxt);
Takuya Yoshikawae4f973a2011-05-29 21:59:09 +09005561 break;
Wei Yongjune8b6fa72010-08-18 16:43:13 +08005562 case 0x98: /* cbw/cwde/cdqe */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005563 switch (ctxt->op_bytes) {
5564 case 2: ctxt->dst.val = (s8)ctxt->dst.val; break;
5565 case 4: ctxt->dst.val = (s16)ctxt->dst.val; break;
5566 case 8: ctxt->dst.val = (s32)ctxt->dst.val; break;
Wei Yongjune8b6fa72010-08-18 16:43:13 +08005567 }
5568 break;
Mohammed Gamal6e154e52010-08-04 14:38:06 +03005569 case 0xcc: /* int3 */
Takuya Yoshikawa5c5df762011-05-29 22:02:55 +09005570 rc = emulate_int(ctxt, 3);
5571 break;
Mohammed Gamal6e154e52010-08-04 14:38:06 +03005572 case 0xcd: /* int n */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005573 rc = emulate_int(ctxt, ctxt->src.val);
Mohammed Gamal6e154e52010-08-04 14:38:06 +03005574 break;
5575 case 0xce: /* into */
Nadav Amit0efb0442015-03-29 16:33:03 +03005576 if (ctxt->eflags & X86_EFLAGS_OF)
Takuya Yoshikawa5c5df762011-05-29 22:02:55 +09005577 rc = emulate_int(ctxt, 4);
Mohammed Gamal6e154e52010-08-04 14:38:06 +03005578 break;
Nitin A Kamble1a52e052007-09-18 16:34:25 -07005579 case 0xe9: /* jmp rel */
Takuya Yoshikawadb5b0762011-05-29 21:56:26 +09005580 case 0xeb: /* jmp rel short */
Nadav Amit234f3ce2014-09-18 22:39:38 +03005581 rc = jmp_rel(ctxt, ctxt->src.val);
Avi Kivity9dac77f2011-06-01 15:34:25 +03005582 ctxt->dst.type = OP_NONE; /* Disable writeback. */
Nitin A Kamble1a52e052007-09-18 16:34:25 -07005583 break;
Avi Kivity111de5d2007-11-27 19:14:21 +02005584 case 0xf4: /* hlt */
Avi Kivity6c3287f2011-04-20 15:43:05 +03005585 ctxt->ops->halt(ctxt);
Mohammed Gamal19fdfa02008-07-06 16:51:26 +03005586 break;
Avi Kivity111de5d2007-11-27 19:14:21 +02005587 case 0xf5: /* cmc */
5588 /* complement carry flag from eflags reg */
Nadav Amit0efb0442015-03-29 16:33:03 +03005589 ctxt->eflags ^= X86_EFLAGS_CF;
Avi Kivity111de5d2007-11-27 19:14:21 +02005590 break;
5591 case 0xf8: /* clc */
Nadav Amit0efb0442015-03-29 16:33:03 +03005592 ctxt->eflags &= ~X86_EFLAGS_CF;
Avi Kivity111de5d2007-11-27 19:14:21 +02005593 break;
Mohammed Gamal8744aa92010-08-05 15:42:49 +03005594 case 0xf9: /* stc */
Nadav Amit0efb0442015-03-29 16:33:03 +03005595 ctxt->eflags |= X86_EFLAGS_CF;
Mohammed Gamal8744aa92010-08-05 15:42:49 +03005596 break;
Mohammed Gamalfb4616f2008-09-01 04:52:24 +03005597 case 0xfc: /* cld */
Nadav Amit0efb0442015-03-29 16:33:03 +03005598 ctxt->eflags &= ~X86_EFLAGS_DF;
Mohammed Gamalfb4616f2008-09-01 04:52:24 +03005599 break;
5600 case 0xfd: /* std */
Nadav Amit0efb0442015-03-29 16:33:03 +03005601 ctxt->eflags |= X86_EFLAGS_DF;
Mohammed Gamalfb4616f2008-09-01 04:52:24 +03005602 break;
Avi Kivity91269b82010-07-25 14:51:16 +03005603 default:
5604 goto cannot_emulate;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005605 }
Avi Kivity018a98d2007-11-27 19:30:56 +02005606
Avi Kivity7d9ddae2010-08-30 17:12:28 +03005607 if (rc != X86EMUL_CONTINUE)
5608 goto done;
5609
Avi Kivity018a98d2007-11-27 19:30:56 +02005610writeback:
Avi Kivityfb32b1e2013-02-09 11:31:44 +02005611 if (ctxt->d & SrcWrite) {
5612 BUG_ON(ctxt->src.type == OP_MEM || ctxt->src.type == OP_MEM_STR);
5613 rc = writeback(ctxt, &ctxt->src);
5614 if (rc != X86EMUL_CONTINUE)
5615 goto done;
5616 }
Nadav Amitee212292014-06-15 16:12:58 +03005617 if (!(ctxt->d & NoWrite)) {
5618 rc = writeback(ctxt, &ctxt->dst);
5619 if (rc != X86EMUL_CONTINUE)
5620 goto done;
5621 }
Avi Kivity018a98d2007-11-27 19:30:56 +02005622
Gleb Natapov5cd21912010-03-18 15:20:26 +02005623 /*
5624 * restore dst type in case the decoding will be reused
5625 * (happens for string instruction )
5626 */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005627 ctxt->dst.type = saved_dst_type;
Gleb Natapov5cd21912010-03-18 15:20:26 +02005628
Avi Kivity9dac77f2011-06-01 15:34:25 +03005629 if ((ctxt->d & SrcMask) == SrcSI)
Gleb Natapovf3bd64c2012-09-03 15:24:28 +03005630 string_addr_inc(ctxt, VCPU_REGS_RSI, &ctxt->src);
Gleb Natapova682e352010-03-18 15:20:21 +02005631
Avi Kivity9dac77f2011-06-01 15:34:25 +03005632 if ((ctxt->d & DstMask) == DstDI)
Gleb Natapovf3bd64c2012-09-03 15:24:28 +03005633 string_addr_inc(ctxt, VCPU_REGS_RDI, &ctxt->dst);
Gleb Natapovd9271122010-03-18 15:20:22 +02005634
Avi Kivity9dac77f2011-06-01 15:34:25 +03005635 if (ctxt->rep_prefix && (ctxt->d & String)) {
Gleb Natapovb3356bf2012-09-03 15:24:29 +03005636 unsigned int count;
Avi Kivity9dac77f2011-06-01 15:34:25 +03005637 struct read_cache *r = &ctxt->io_read;
Gleb Natapovb3356bf2012-09-03 15:24:29 +03005638 if ((ctxt->d & SrcMask) == SrcSI)
5639 count = ctxt->src.count;
5640 else
5641 count = ctxt->dst.count;
Paolo Bonzini01485a22014-11-19 18:25:08 +01005642 register_address_increment(ctxt, VCPU_REGS_RCX, -count);
Gleb Natapov3e2f65d2010-08-25 12:47:42 +03005643
Gleb Natapovd2ddd1c2010-08-25 12:47:43 +03005644 if (!string_insn_completed(ctxt)) {
5645 /*
5646 * Re-enter guest when pio read ahead buffer is empty
5647 * or, if it is not used, after each 1024 iteration.
5648 */
Avi Kivitydd856ef2012-08-27 23:46:17 +03005649 if ((r->end != 0 || reg_read(ctxt, VCPU_REGS_RCX) & 0x3ff) &&
Gleb Natapovd2ddd1c2010-08-25 12:47:43 +03005650 (r->end == 0 || r->end != r->pos)) {
5651 /*
5652 * Reset read cache. Usually happens before
5653 * decode, but since instruction is restarted
5654 * we have to do it here.
5655 */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005656 ctxt->mem_read.end = 0;
Avi Kivitydd856ef2012-08-27 23:46:17 +03005657 writeback_registers(ctxt);
Gleb Natapovd2ddd1c2010-08-25 12:47:43 +03005658 return EMULATION_RESTART;
5659 }
5660 goto done; /* skip rip writeback */
Avi Kivity0fa6ccb2010-08-17 11:22:17 +03005661 }
Nadav Amit0efb0442015-03-29 16:33:03 +03005662 ctxt->eflags &= ~X86_EFLAGS_RF;
Gleb Natapov5cd21912010-03-18 15:20:26 +02005663 }
Gleb Natapovd2ddd1c2010-08-25 12:47:43 +03005664
Avi Kivity9dac77f2011-06-01 15:34:25 +03005665 ctxt->eip = ctxt->_eip;
Paolo Bonzinifede8072020-04-27 11:55:59 -04005666 if (ctxt->mode != X86EMUL_MODE_PROT64)
5667 ctxt->eip = (u32)ctxt->_eip;
Avi Kivity018a98d2007-11-27 19:30:56 +02005668
5669done:
Paolo Bonzinie0ad0b42014-08-20 10:08:23 +02005670 if (rc == X86EMUL_PROPAGATE_FAULT) {
5671 WARN_ON(ctxt->exception.vector > 0x1f);
Avi Kivityda9cb572010-11-22 17:53:21 +02005672 ctxt->have_exception = true;
Paolo Bonzinie0ad0b42014-08-20 10:08:23 +02005673 }
Joerg Roedel775fde82011-04-04 12:39:24 +02005674 if (rc == X86EMUL_INTERCEPTED)
5675 return EMULATION_INTERCEPTED;
5676
Avi Kivitydd856ef2012-08-27 23:46:17 +03005677 if (rc == X86EMUL_CONTINUE)
5678 writeback_registers(ctxt);
5679
Gleb Natapovd2ddd1c2010-08-25 12:47:43 +03005680 return (rc == X86EMUL_UNHANDLEABLE) ? EMULATION_FAILED : EMULATION_OK;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005681
5682twobyte_insn:
Avi Kivity9dac77f2011-06-01 15:34:25 +03005683 switch (ctxt->b) {
Avi Kivity018a98d2007-11-27 19:30:56 +02005684 case 0x09: /* wbinvd */
Clemens Nosscfb22372011-04-21 21:16:05 +02005685 (ctxt->ops->wbinvd)(ctxt);
Sheng Yangf5f48ee2010-06-30 12:25:15 +08005686 break;
5687 case 0x08: /* invd */
Avi Kivity018a98d2007-11-27 19:30:56 +02005688 case 0x0d: /* GrpP (prefetch) */
5689 case 0x18: /* Grp16 (prefetch/nop) */
Paolo Bonzini103f98e2013-05-30 13:22:39 +02005690 case 0x1f: /* nop */
Avi Kivity018a98d2007-11-27 19:30:56 +02005691 break;
5692 case 0x20: /* mov cr, reg */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005693 ctxt->dst.val = ops->get_cr(ctxt, ctxt->modrm_reg);
Avi Kivity018a98d2007-11-27 19:30:56 +02005694 break;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005695 case 0x21: /* mov from dr to reg */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005696 ops->get_dr(ctxt, ctxt->modrm_reg, &ctxt->dst.val);
Avi Kivity6aa8b732006-12-10 02:21:36 -08005697 break;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005698 case 0x40 ... 0x4f: /* cmov */
Nadav Amit140bad82014-06-15 16:13:00 +03005699 if (test_cc(ctxt->b, ctxt->eflags))
5700 ctxt->dst.val = ctxt->src.val;
Nadav Amitb91aa142015-03-30 15:39:19 +03005701 else if (ctxt->op_bytes != 4)
Avi Kivity9dac77f2011-06-01 15:34:25 +03005702 ctxt->dst.type = OP_NONE; /* no writeback */
Avi Kivity6aa8b732006-12-10 02:21:36 -08005703 break;
Gleb Natapovb2833e32009-04-12 13:36:30 +03005704 case 0x80 ... 0x8f: /* jnz rel, etc*/
Avi Kivity9dac77f2011-06-01 15:34:25 +03005705 if (test_cc(ctxt->b, ctxt->eflags))
Nadav Amit234f3ce2014-09-18 22:39:38 +03005706 rc = jmp_rel(ctxt, ctxt->src.val);
Avi Kivity018a98d2007-11-27 19:30:56 +02005707 break;
Wei Yongjunee45b582010-08-06 17:10:07 +08005708 case 0x90 ... 0x9f: /* setcc r/m8 */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005709 ctxt->dst.val = test_cc(ctxt->b, ctxt->eflags);
Wei Yongjunee45b582010-08-06 17:10:07 +08005710 break;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005711 case 0xb6 ... 0xb7: /* movzx */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005712 ctxt->dst.bytes = ctxt->op_bytes;
Avi Kivity361cad22012-06-11 19:40:15 +03005713 ctxt->dst.val = (ctxt->src.bytes == 1) ? (u8) ctxt->src.val
Avi Kivity9dac77f2011-06-01 15:34:25 +03005714 : (u16) ctxt->src.val;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005715 break;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005716 case 0xbe ... 0xbf: /* movsx */
Avi Kivity9dac77f2011-06-01 15:34:25 +03005717 ctxt->dst.bytes = ctxt->op_bytes;
Avi Kivity361cad22012-06-11 19:40:15 +03005718 ctxt->dst.val = (ctxt->src.bytes == 1) ? (s8) ctxt->src.val :
Avi Kivity9dac77f2011-06-01 15:34:25 +03005719 (s16) ctxt->src.val;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005720 break;
Avi Kivity91269b82010-07-25 14:51:16 +03005721 default:
5722 goto cannot_emulate;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005723 }
Avi Kivity7d9ddae2010-08-30 17:12:28 +03005724
Borislav Petkov0bc5eed2013-10-29 12:54:10 +01005725threebyte_insn:
5726
Avi Kivity7d9ddae2010-08-30 17:12:28 +03005727 if (rc != X86EMUL_CONTINUE)
5728 goto done;
5729
Avi Kivity6aa8b732006-12-10 02:21:36 -08005730 goto writeback;
5731
5732cannot_emulate:
Gleb Natapova0c0ab22011-03-28 16:57:49 +02005733 return EMULATION_FAILED;
Avi Kivity6aa8b732006-12-10 02:21:36 -08005734}
Avi Kivitydd856ef2012-08-27 23:46:17 +03005735
5736void emulator_invalidate_register_cache(struct x86_emulate_ctxt *ctxt)
5737{
5738 invalidate_registers(ctxt);
5739}
5740
5741void emulator_writeback_register_cache(struct x86_emulate_ctxt *ctxt)
5742{
5743 writeback_registers(ctxt);
5744}
Tom Lendacky0f89b202016-12-14 14:59:23 -05005745
5746bool emulator_can_use_gpa(struct x86_emulate_ctxt *ctxt)
5747{
5748 if (ctxt->rep_prefix && (ctxt->d & String))
5749 return false;
5750
5751 if (ctxt->d & TwoMemOp)
5752 return false;
5753
5754 return true;
5755}