Greg Kroah-Hartman | b244131 | 2017-11-01 15:07:57 +0100 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
Avi Kivity | 26eef70 | 2008-07-03 14:59:22 +0300 | [diff] [blame] | 2 | #ifndef ARCH_X86_KVM_X86_H |
| 3 | #define ARCH_X86_KVM_X86_H |
| 4 | |
| 5 | #include <linux/kvm_host.h> |
Uros Bizjak | 3f1a18b | 2020-10-29 14:56:00 +0100 | [diff] [blame] | 6 | #include <asm/mce.h> |
Marcelo Tosatti | 8d93c87 | 2016-06-20 22:28:02 -0300 | [diff] [blame] | 7 | #include <asm/pvclock.h> |
Avi Kivity | 3eeb328 | 2010-01-21 15:31:48 +0200 | [diff] [blame] | 8 | #include "kvm_cache_regs.h" |
Sean Christopherson | 2f728d6 | 2020-02-18 15:29:49 -0800 | [diff] [blame] | 9 | #include "kvm_emulate.h" |
Avi Kivity | 26eef70 | 2008-07-03 14:59:22 +0300 | [diff] [blame] | 10 | |
Sean Christopherson | 648fc8a | 2021-02-03 16:01:16 -0800 | [diff] [blame^] | 11 | #define KVM_NESTED_VMENTER_CONSISTENCY_CHECK(consistency_check) \ |
| 12 | ({ \ |
| 13 | bool failed = (consistency_check); \ |
| 14 | if (failed) \ |
| 15 | trace_kvm_nested_vmenter_failed(#consistency_check, 0); \ |
| 16 | failed; \ |
| 17 | }) |
| 18 | |
Babu Moger | c8e8871 | 2018-03-16 16:37:24 -0400 | [diff] [blame] | 19 | #define KVM_DEFAULT_PLE_GAP 128 |
| 20 | #define KVM_VMX_DEFAULT_PLE_WINDOW 4096 |
| 21 | #define KVM_DEFAULT_PLE_WINDOW_GROW 2 |
| 22 | #define KVM_DEFAULT_PLE_WINDOW_SHRINK 0 |
| 23 | #define KVM_VMX_DEFAULT_PLE_WINDOW_MAX UINT_MAX |
Babu Moger | 8566ac8 | 2018-03-16 16:37:26 -0400 | [diff] [blame] | 24 | #define KVM_SVM_DEFAULT_PLE_WINDOW_MAX USHRT_MAX |
| 25 | #define KVM_SVM_DEFAULT_PLE_WINDOW 3000 |
Babu Moger | c8e8871 | 2018-03-16 16:37:24 -0400 | [diff] [blame] | 26 | |
| 27 | static inline unsigned int __grow_ple_window(unsigned int val, |
| 28 | unsigned int base, unsigned int modifier, unsigned int max) |
| 29 | { |
| 30 | u64 ret = val; |
| 31 | |
| 32 | if (modifier < 1) |
| 33 | return base; |
| 34 | |
| 35 | if (modifier < base) |
| 36 | ret *= modifier; |
| 37 | else |
| 38 | ret += modifier; |
| 39 | |
| 40 | return min(ret, (u64)max); |
| 41 | } |
| 42 | |
| 43 | static inline unsigned int __shrink_ple_window(unsigned int val, |
| 44 | unsigned int base, unsigned int modifier, unsigned int min) |
| 45 | { |
| 46 | if (modifier < 1) |
| 47 | return base; |
| 48 | |
| 49 | if (modifier < base) |
| 50 | val /= modifier; |
| 51 | else |
| 52 | val -= modifier; |
| 53 | |
| 54 | return max(val, min); |
| 55 | } |
| 56 | |
Radim Krčmář | 7454570 | 2015-04-27 15:11:25 +0200 | [diff] [blame] | 57 | #define MSR_IA32_CR_PAT_DEFAULT 0x0007040600070406ULL |
| 58 | |
Avi Kivity | 26eef70 | 2008-07-03 14:59:22 +0300 | [diff] [blame] | 59 | static inline void kvm_clear_exception_queue(struct kvm_vcpu *vcpu) |
| 60 | { |
Liran Alon | 5c7d4f9 | 2017-11-19 18:25:43 +0200 | [diff] [blame] | 61 | vcpu->arch.exception.pending = false; |
Wanpeng Li | 664f8e2 | 2017-08-24 03:35:09 -0700 | [diff] [blame] | 62 | vcpu->arch.exception.injected = false; |
Avi Kivity | 26eef70 | 2008-07-03 14:59:22 +0300 | [diff] [blame] | 63 | } |
| 64 | |
Gleb Natapov | 66fd3f7 | 2009-05-11 13:35:50 +0300 | [diff] [blame] | 65 | static inline void kvm_queue_interrupt(struct kvm_vcpu *vcpu, u8 vector, |
| 66 | bool soft) |
Avi Kivity | 937a7ea | 2008-07-03 15:17:01 +0300 | [diff] [blame] | 67 | { |
Liran Alon | 04140b4 | 2018-03-23 03:01:31 +0300 | [diff] [blame] | 68 | vcpu->arch.interrupt.injected = true; |
Gleb Natapov | 66fd3f7 | 2009-05-11 13:35:50 +0300 | [diff] [blame] | 69 | vcpu->arch.interrupt.soft = soft; |
Avi Kivity | 937a7ea | 2008-07-03 15:17:01 +0300 | [diff] [blame] | 70 | vcpu->arch.interrupt.nr = vector; |
| 71 | } |
| 72 | |
| 73 | static inline void kvm_clear_interrupt_queue(struct kvm_vcpu *vcpu) |
| 74 | { |
Liran Alon | 04140b4 | 2018-03-23 03:01:31 +0300 | [diff] [blame] | 75 | vcpu->arch.interrupt.injected = false; |
Avi Kivity | 937a7ea | 2008-07-03 15:17:01 +0300 | [diff] [blame] | 76 | } |
| 77 | |
Gleb Natapov | 3298b75 | 2009-05-11 13:35:46 +0300 | [diff] [blame] | 78 | static inline bool kvm_event_needs_reinjection(struct kvm_vcpu *vcpu) |
| 79 | { |
Liran Alon | 04140b4 | 2018-03-23 03:01:31 +0300 | [diff] [blame] | 80 | return vcpu->arch.exception.injected || vcpu->arch.interrupt.injected || |
Gleb Natapov | 3298b75 | 2009-05-11 13:35:46 +0300 | [diff] [blame] | 81 | vcpu->arch.nmi_injected; |
| 82 | } |
Gleb Natapov | 66fd3f7 | 2009-05-11 13:35:50 +0300 | [diff] [blame] | 83 | |
| 84 | static inline bool kvm_exception_is_soft(unsigned int nr) |
| 85 | { |
| 86 | return (nr == BP_VECTOR) || (nr == OF_VECTOR); |
| 87 | } |
Gleb Natapov | fc61b80 | 2009-07-05 17:39:35 +0300 | [diff] [blame] | 88 | |
Avi Kivity | 3eeb328 | 2010-01-21 15:31:48 +0200 | [diff] [blame] | 89 | static inline bool is_protmode(struct kvm_vcpu *vcpu) |
| 90 | { |
| 91 | return kvm_read_cr0_bits(vcpu, X86_CR0_PE); |
| 92 | } |
| 93 | |
Avi Kivity | 836a1b3 | 2010-01-21 15:31:49 +0200 | [diff] [blame] | 94 | static inline int is_long_mode(struct kvm_vcpu *vcpu) |
| 95 | { |
| 96 | #ifdef CONFIG_X86_64 |
Avi Kivity | f6801df | 2010-01-21 15:31:50 +0200 | [diff] [blame] | 97 | return vcpu->arch.efer & EFER_LMA; |
Avi Kivity | 836a1b3 | 2010-01-21 15:31:49 +0200 | [diff] [blame] | 98 | #else |
| 99 | return 0; |
| 100 | #endif |
| 101 | } |
| 102 | |
Nadav Amit | 5777392 | 2014-06-18 17:19:23 +0300 | [diff] [blame] | 103 | static inline bool is_64_bit_mode(struct kvm_vcpu *vcpu) |
| 104 | { |
| 105 | int cs_db, cs_l; |
| 106 | |
| 107 | if (!is_long_mode(vcpu)) |
| 108 | return false; |
Jason Baron | b3646477 | 2021-01-14 22:27:56 -0500 | [diff] [blame] | 109 | static_call(kvm_x86_get_cs_db_l_bits)(vcpu, &cs_db, &cs_l); |
Nadav Amit | 5777392 | 2014-06-18 17:19:23 +0300 | [diff] [blame] | 110 | return cs_l; |
| 111 | } |
| 112 | |
Yu Zhang | 855feb6 | 2017-08-24 20:27:55 +0800 | [diff] [blame] | 113 | static inline bool is_la57_mode(struct kvm_vcpu *vcpu) |
| 114 | { |
| 115 | #ifdef CONFIG_X86_64 |
| 116 | return (vcpu->arch.efer & EFER_LMA) && |
| 117 | kvm_read_cr4_bits(vcpu, X86_CR4_LA57); |
| 118 | #else |
| 119 | return 0; |
| 120 | #endif |
| 121 | } |
| 122 | |
Marc Orr | 0447378 | 2018-06-20 17:21:29 -0700 | [diff] [blame] | 123 | static inline bool x86_exception_has_error_code(unsigned int vector) |
| 124 | { |
| 125 | static u32 exception_has_error_code = BIT(DF_VECTOR) | BIT(TS_VECTOR) | |
| 126 | BIT(NP_VECTOR) | BIT(SS_VECTOR) | BIT(GP_VECTOR) | |
| 127 | BIT(PF_VECTOR) | BIT(AC_VECTOR); |
| 128 | |
| 129 | return (1U << vector) & exception_has_error_code; |
| 130 | } |
| 131 | |
Joerg Roedel | 6539e73 | 2010-09-10 17:30:50 +0200 | [diff] [blame] | 132 | static inline bool mmu_is_nested(struct kvm_vcpu *vcpu) |
| 133 | { |
| 134 | return vcpu->arch.walk_mmu == &vcpu->arch.nested_mmu; |
| 135 | } |
| 136 | |
Sean Christopherson | eeeb4f6 | 2020-03-20 14:28:20 -0700 | [diff] [blame] | 137 | static inline void kvm_vcpu_flush_tlb_current(struct kvm_vcpu *vcpu) |
| 138 | { |
| 139 | ++vcpu->stat.tlb_flush; |
Jason Baron | b3646477 | 2021-01-14 22:27:56 -0500 | [diff] [blame] | 140 | static_call(kvm_x86_tlb_flush_current)(vcpu); |
Sean Christopherson | eeeb4f6 | 2020-03-20 14:28:20 -0700 | [diff] [blame] | 141 | } |
| 142 | |
Avi Kivity | 836a1b3 | 2010-01-21 15:31:49 +0200 | [diff] [blame] | 143 | static inline int is_pae(struct kvm_vcpu *vcpu) |
| 144 | { |
| 145 | return kvm_read_cr4_bits(vcpu, X86_CR4_PAE); |
| 146 | } |
| 147 | |
| 148 | static inline int is_pse(struct kvm_vcpu *vcpu) |
| 149 | { |
| 150 | return kvm_read_cr4_bits(vcpu, X86_CR4_PSE); |
| 151 | } |
| 152 | |
| 153 | static inline int is_paging(struct kvm_vcpu *vcpu) |
| 154 | { |
Davidlohr Bueso | c36fc04 | 2012-03-08 12:45:54 +0100 | [diff] [blame] | 155 | return likely(kvm_read_cr0_bits(vcpu, X86_CR0_PG)); |
Avi Kivity | 836a1b3 | 2010-01-21 15:31:49 +0200 | [diff] [blame] | 156 | } |
| 157 | |
Paolo Bonzini | bf03d4f | 2019-06-06 18:52:44 +0200 | [diff] [blame] | 158 | static inline bool is_pae_paging(struct kvm_vcpu *vcpu) |
| 159 | { |
| 160 | return !is_long_mode(vcpu) && is_pae(vcpu) && is_paging(vcpu); |
| 161 | } |
| 162 | |
Yu Zhang | fd8cb43 | 2017-08-24 20:27:56 +0800 | [diff] [blame] | 163 | static inline u8 vcpu_virt_addr_bits(struct kvm_vcpu *vcpu) |
| 164 | { |
| 165 | return kvm_read_cr4_bits(vcpu, X86_CR4_LA57) ? 57 : 48; |
| 166 | } |
| 167 | |
Yu Zhang | fd8cb43 | 2017-08-24 20:27:56 +0800 | [diff] [blame] | 168 | static inline u64 get_canonical(u64 la, u8 vaddr_bits) |
| 169 | { |
| 170 | return ((int64_t)la << (64 - vaddr_bits)) >> (64 - vaddr_bits); |
| 171 | } |
| 172 | |
| 173 | static inline bool is_noncanonical_address(u64 la, struct kvm_vcpu *vcpu) |
| 174 | { |
Yu Zhang | fd8cb43 | 2017-08-24 20:27:56 +0800 | [diff] [blame] | 175 | return get_canonical(la, vcpu_virt_addr_bits(vcpu)) != la; |
Yu Zhang | fd8cb43 | 2017-08-24 20:27:56 +0800 | [diff] [blame] | 176 | } |
| 177 | |
Xiao Guangrong | bebb106 | 2011-07-12 03:23:20 +0800 | [diff] [blame] | 178 | static inline void vcpu_cache_mmio_info(struct kvm_vcpu *vcpu, |
| 179 | gva_t gva, gfn_t gfn, unsigned access) |
| 180 | { |
Sean Christopherson | ddfd173 | 2019-02-05 13:01:13 -0800 | [diff] [blame] | 181 | u64 gen = kvm_memslots(vcpu->kvm)->generation; |
| 182 | |
Sean Christopherson | 361209e | 2019-02-05 13:01:14 -0800 | [diff] [blame] | 183 | if (unlikely(gen & KVM_MEMSLOT_GEN_UPDATE_IN_PROGRESS)) |
Sean Christopherson | ddfd173 | 2019-02-05 13:01:13 -0800 | [diff] [blame] | 184 | return; |
| 185 | |
Paolo Bonzini | 9034e6e | 2017-08-17 18:36:58 +0200 | [diff] [blame] | 186 | /* |
| 187 | * If this is a shadow nested page table, the "GVA" is |
| 188 | * actually a nGPA. |
| 189 | */ |
| 190 | vcpu->arch.mmio_gva = mmu_is_nested(vcpu) ? 0 : gva & PAGE_MASK; |
Sean Christopherson | 871bd03 | 2019-08-01 13:35:21 -0700 | [diff] [blame] | 191 | vcpu->arch.mmio_access = access; |
Xiao Guangrong | bebb106 | 2011-07-12 03:23:20 +0800 | [diff] [blame] | 192 | vcpu->arch.mmio_gfn = gfn; |
Sean Christopherson | ddfd173 | 2019-02-05 13:01:13 -0800 | [diff] [blame] | 193 | vcpu->arch.mmio_gen = gen; |
David Matlack | 56f17dd | 2014-08-18 15:46:07 -0700 | [diff] [blame] | 194 | } |
| 195 | |
| 196 | static inline bool vcpu_match_mmio_gen(struct kvm_vcpu *vcpu) |
| 197 | { |
| 198 | return vcpu->arch.mmio_gen == kvm_memslots(vcpu->kvm)->generation; |
Xiao Guangrong | bebb106 | 2011-07-12 03:23:20 +0800 | [diff] [blame] | 199 | } |
| 200 | |
| 201 | /* |
David Matlack | 56f17dd | 2014-08-18 15:46:07 -0700 | [diff] [blame] | 202 | * Clear the mmio cache info for the given gva. If gva is MMIO_GVA_ANY, we |
| 203 | * clear all mmio cache info. |
Xiao Guangrong | bebb106 | 2011-07-12 03:23:20 +0800 | [diff] [blame] | 204 | */ |
David Matlack | 56f17dd | 2014-08-18 15:46:07 -0700 | [diff] [blame] | 205 | #define MMIO_GVA_ANY (~(gva_t)0) |
| 206 | |
Xiao Guangrong | bebb106 | 2011-07-12 03:23:20 +0800 | [diff] [blame] | 207 | static inline void vcpu_clear_mmio_info(struct kvm_vcpu *vcpu, gva_t gva) |
| 208 | { |
David Matlack | 56f17dd | 2014-08-18 15:46:07 -0700 | [diff] [blame] | 209 | if (gva != MMIO_GVA_ANY && vcpu->arch.mmio_gva != (gva & PAGE_MASK)) |
Xiao Guangrong | bebb106 | 2011-07-12 03:23:20 +0800 | [diff] [blame] | 210 | return; |
| 211 | |
| 212 | vcpu->arch.mmio_gva = 0; |
| 213 | } |
| 214 | |
| 215 | static inline bool vcpu_match_mmio_gva(struct kvm_vcpu *vcpu, unsigned long gva) |
| 216 | { |
David Matlack | 56f17dd | 2014-08-18 15:46:07 -0700 | [diff] [blame] | 217 | if (vcpu_match_mmio_gen(vcpu) && vcpu->arch.mmio_gva && |
| 218 | vcpu->arch.mmio_gva == (gva & PAGE_MASK)) |
Xiao Guangrong | bebb106 | 2011-07-12 03:23:20 +0800 | [diff] [blame] | 219 | return true; |
| 220 | |
| 221 | return false; |
| 222 | } |
| 223 | |
| 224 | static inline bool vcpu_match_mmio_gpa(struct kvm_vcpu *vcpu, gpa_t gpa) |
| 225 | { |
David Matlack | 56f17dd | 2014-08-18 15:46:07 -0700 | [diff] [blame] | 226 | if (vcpu_match_mmio_gen(vcpu) && vcpu->arch.mmio_gfn && |
| 227 | vcpu->arch.mmio_gfn == gpa >> PAGE_SHIFT) |
Xiao Guangrong | bebb106 | 2011-07-12 03:23:20 +0800 | [diff] [blame] | 228 | return true; |
| 229 | |
| 230 | return false; |
| 231 | } |
| 232 | |
Sean Christopherson | 489cbcf | 2019-09-27 14:45:20 -0700 | [diff] [blame] | 233 | static inline unsigned long kvm_register_readl(struct kvm_vcpu *vcpu, int reg) |
Nadav Amit | 5777392 | 2014-06-18 17:19:23 +0300 | [diff] [blame] | 234 | { |
| 235 | unsigned long val = kvm_register_read(vcpu, reg); |
| 236 | |
| 237 | return is_64_bit_mode(vcpu) ? val : (u32)val; |
| 238 | } |
| 239 | |
Nadav Amit | 27e6fb5 | 2014-06-18 17:19:26 +0300 | [diff] [blame] | 240 | static inline void kvm_register_writel(struct kvm_vcpu *vcpu, |
Sean Christopherson | 489cbcf | 2019-09-27 14:45:20 -0700 | [diff] [blame] | 241 | int reg, unsigned long val) |
Nadav Amit | 27e6fb5 | 2014-06-18 17:19:26 +0300 | [diff] [blame] | 242 | { |
| 243 | if (!is_64_bit_mode(vcpu)) |
| 244 | val = (u32)val; |
| 245 | return kvm_register_write(vcpu, reg, val); |
| 246 | } |
| 247 | |
Paolo Bonzini | 41dbc6b | 2015-07-23 08:22:45 +0200 | [diff] [blame] | 248 | static inline bool kvm_check_has_quirk(struct kvm *kvm, u64 quirk) |
| 249 | { |
| 250 | return !(kvm->arch.disabled_quirks & quirk); |
| 251 | } |
| 252 | |
Liran Alon | 27cbe7d | 2019-11-11 11:16:40 +0200 | [diff] [blame] | 253 | static inline bool kvm_vcpu_latch_init(struct kvm_vcpu *vcpu) |
| 254 | { |
Jason Baron | b3646477 | 2021-01-14 22:27:56 -0500 | [diff] [blame] | 255 | return is_smm(vcpu) || static_call(kvm_x86_apic_init_signal_blocked)(vcpu); |
Liran Alon | 27cbe7d | 2019-11-11 11:16:40 +0200 | [diff] [blame] | 256 | } |
| 257 | |
Joao Martins | 629b534 | 2018-06-28 15:06:43 -0400 | [diff] [blame] | 258 | void kvm_write_wall_clock(struct kvm *kvm, gpa_t wall_clock, int sec_hi_ofs); |
Sean Christopherson | 9497e1f | 2019-08-27 14:40:36 -0700 | [diff] [blame] | 259 | void kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq, int inc_eip); |
Zhang, Yanmin | ff9d07a | 2010-04-19 13:32:45 +0800 | [diff] [blame] | 260 | |
Will Auld | 8fe8ab4 | 2012-11-29 12:42:12 -0800 | [diff] [blame] | 261 | void kvm_write_tsc(struct kvm_vcpu *vcpu, struct msr_data *msr); |
Paolo Bonzini | 108b249 | 2016-09-01 14:21:03 +0200 | [diff] [blame] | 262 | u64 get_kvmclock_ns(struct kvm *kvm); |
Zachary Amsden | 99e3e30 | 2010-08-19 22:07:17 -1000 | [diff] [blame] | 263 | |
Paolo Bonzini | ce14e868a | 2018-06-06 17:37:49 +0200 | [diff] [blame] | 264 | int kvm_read_guest_virt(struct kvm_vcpu *vcpu, |
Nadav Har'El | 064aea7 | 2011-05-25 23:04:56 +0300 | [diff] [blame] | 265 | gva_t addr, void *val, unsigned int bytes, |
| 266 | struct x86_exception *exception); |
| 267 | |
Paolo Bonzini | ce14e868a | 2018-06-06 17:37:49 +0200 | [diff] [blame] | 268 | int kvm_write_guest_virt_system(struct kvm_vcpu *vcpu, |
Nadav Har'El | 6a4d755 | 2011-05-25 23:08:00 +0300 | [diff] [blame] | 269 | gva_t addr, void *val, unsigned int bytes, |
| 270 | struct x86_exception *exception); |
| 271 | |
Wanpeng Li | 082d06e | 2018-04-03 16:28:48 -0700 | [diff] [blame] | 272 | int handle_ud(struct kvm_vcpu *vcpu); |
| 273 | |
Jim Mattson | da998b4 | 2018-10-16 14:29:22 -0700 | [diff] [blame] | 274 | void kvm_deliver_exception_payload(struct kvm_vcpu *vcpu); |
| 275 | |
Xiao Guangrong | 19efffa | 2015-06-15 16:55:31 +0800 | [diff] [blame] | 276 | void kvm_vcpu_mtrr_init(struct kvm_vcpu *vcpu); |
Xiao Guangrong | ff53604 | 2015-06-15 16:55:22 +0800 | [diff] [blame] | 277 | u8 kvm_mtrr_get_guest_memory_type(struct kvm_vcpu *vcpu, gfn_t gfn); |
Nadav Amit | 4566654 | 2014-09-18 22:39:44 +0300 | [diff] [blame] | 278 | bool kvm_mtrr_valid(struct kvm_vcpu *vcpu, u32 msr, u64 data); |
Xiao Guangrong | ff53604 | 2015-06-15 16:55:22 +0800 | [diff] [blame] | 279 | int kvm_mtrr_set_msr(struct kvm_vcpu *vcpu, u32 msr, u64 data); |
| 280 | int kvm_mtrr_get_msr(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata); |
Xiao Guangrong | 6a39bbc | 2015-06-15 16:55:35 +0800 | [diff] [blame] | 281 | bool kvm_mtrr_check_gfn_range_consistency(struct kvm_vcpu *vcpu, gfn_t gfn, |
| 282 | int page_num); |
Feng Wu | 52004014 | 2016-01-25 16:53:33 +0800 | [diff] [blame] | 283 | bool kvm_vector_hashing_enabled(void); |
Mohammed Gamal | 8978614 | 2020-07-10 17:48:03 +0200 | [diff] [blame] | 284 | void kvm_fixup_and_inject_pf_error(struct kvm_vcpu *vcpu, gva_t gva, u16 error_code); |
Wei Huang | 4aa2691 | 2021-01-26 03:18:28 -0500 | [diff] [blame] | 285 | int x86_decode_emulated_instruction(struct kvm_vcpu *vcpu, int emulation_type, |
| 286 | void *insn, int insn_len); |
Sean Christopherson | 736c291 | 2019-12-06 15:57:14 -0800 | [diff] [blame] | 287 | int x86_emulate_instruction(struct kvm_vcpu *vcpu, gpa_t cr2_or_gpa, |
Sean Christopherson | c60658d | 2018-08-23 13:56:53 -0700 | [diff] [blame] | 288 | int emulation_type, void *insn, int insn_len); |
Wanpeng Li | 404d5d7 | 2020-04-28 14:23:25 +0800 | [diff] [blame] | 289 | fastpath_t handle_fastpath_set_msr_irqoff(struct kvm_vcpu *vcpu); |
Nadav Amit | 4566654 | 2014-09-18 22:39:44 +0300 | [diff] [blame] | 290 | |
Avi Kivity | 00b27a3 | 2011-11-23 16:30:32 +0200 | [diff] [blame] | 291 | extern u64 host_xcr0; |
Sean Christopherson | cfc4818 | 2020-03-02 15:56:23 -0800 | [diff] [blame] | 292 | extern u64 supported_xcr0; |
Tom Lendacky | 8613777 | 2020-12-10 11:10:07 -0600 | [diff] [blame] | 293 | extern u64 host_xss; |
Paolo Bonzini | 408e9a3 | 2020-03-05 16:11:56 +0100 | [diff] [blame] | 294 | extern u64 supported_xss; |
Paolo Bonzini | 4ff4173 | 2014-02-24 12:15:16 +0100 | [diff] [blame] | 295 | |
Sean Christopherson | 615a4ae | 2020-03-02 15:56:25 -0800 | [diff] [blame] | 296 | static inline bool kvm_mpx_supported(void) |
| 297 | { |
| 298 | return (supported_xcr0 & (XFEATURE_MASK_BNDREGS | XFEATURE_MASK_BNDCSR)) |
| 299 | == (XFEATURE_MASK_BNDREGS | XFEATURE_MASK_BNDCSR); |
| 300 | } |
| 301 | |
Marcelo Tosatti | 9ed96e8 | 2014-01-06 12:00:02 -0200 | [diff] [blame] | 302 | extern unsigned int min_timer_period_us; |
| 303 | |
Liran Alon | c4ae60e | 2018-03-12 13:12:47 +0200 | [diff] [blame] | 304 | extern bool enable_vmware_backdoor; |
| 305 | |
Wanpeng Li | 0c5f81d | 2019-07-06 09:26:51 +0800 | [diff] [blame] | 306 | extern int pi_inject_timer; |
| 307 | |
Gleb Natapov | 54e9818 | 2012-08-05 15:58:32 +0300 | [diff] [blame] | 308 | extern struct static_key kvm_no_apic_vcpu; |
Paolo Bonzini | b51012d | 2016-01-22 11:39:22 +0100 | [diff] [blame] | 309 | |
Like Xu | d855066 | 2021-01-08 09:36:55 +0800 | [diff] [blame] | 310 | extern bool report_ignored_msrs; |
| 311 | |
Marcelo Tosatti | 8d93c87 | 2016-06-20 22:28:02 -0300 | [diff] [blame] | 312 | static inline u64 nsec_to_cycles(struct kvm_vcpu *vcpu, u64 nsec) |
| 313 | { |
| 314 | return pvclock_scale_delta(nsec, vcpu->arch.virtual_tsc_mult, |
| 315 | vcpu->arch.virtual_tsc_shift); |
| 316 | } |
| 317 | |
Paolo Bonzini | b51012d | 2016-01-22 11:39:22 +0100 | [diff] [blame] | 318 | /* Same "calling convention" as do_div: |
| 319 | * - divide (n << 32) by base |
| 320 | * - put result in n |
| 321 | * - return remainder |
| 322 | */ |
| 323 | #define do_shl32_div32(n, base) \ |
| 324 | ({ \ |
| 325 | u32 __quot, __rem; \ |
| 326 | asm("divl %2" : "=a" (__quot), "=d" (__rem) \ |
| 327 | : "rm" (base), "0" (0), "1" ((u32) n)); \ |
| 328 | n = __quot; \ |
| 329 | __rem; \ |
| 330 | }) |
| 331 | |
Wanpeng Li | 4d5422c | 2018-03-12 04:53:02 -0700 | [diff] [blame] | 332 | static inline bool kvm_mwait_in_guest(struct kvm *kvm) |
Michael S. Tsirkin | 668fffa | 2017-04-21 12:27:17 +0200 | [diff] [blame] | 333 | { |
Wanpeng Li | 4d5422c | 2018-03-12 04:53:02 -0700 | [diff] [blame] | 334 | return kvm->arch.mwait_in_guest; |
Michael S. Tsirkin | 668fffa | 2017-04-21 12:27:17 +0200 | [diff] [blame] | 335 | } |
| 336 | |
Wanpeng Li | caa057a | 2018-03-12 04:53:03 -0700 | [diff] [blame] | 337 | static inline bool kvm_hlt_in_guest(struct kvm *kvm) |
| 338 | { |
| 339 | return kvm->arch.hlt_in_guest; |
| 340 | } |
| 341 | |
Wanpeng Li | b31c114 | 2018-03-12 04:53:04 -0700 | [diff] [blame] | 342 | static inline bool kvm_pause_in_guest(struct kvm *kvm) |
| 343 | { |
| 344 | return kvm->arch.pause_in_guest; |
| 345 | } |
| 346 | |
Wanpeng Li | b517006 | 2019-05-21 14:06:53 +0800 | [diff] [blame] | 347 | static inline bool kvm_cstate_in_guest(struct kvm *kvm) |
| 348 | { |
| 349 | return kvm->arch.cstate_in_guest; |
| 350 | } |
| 351 | |
Andi Kleen | dd60d21 | 2017-07-25 17:20:32 -0700 | [diff] [blame] | 352 | DECLARE_PER_CPU(struct kvm_vcpu *, current_vcpu); |
| 353 | |
| 354 | static inline void kvm_before_interrupt(struct kvm_vcpu *vcpu) |
| 355 | { |
| 356 | __this_cpu_write(current_vcpu, vcpu); |
| 357 | } |
| 358 | |
| 359 | static inline void kvm_after_interrupt(struct kvm_vcpu *vcpu) |
| 360 | { |
| 361 | __this_cpu_write(current_vcpu, NULL); |
| 362 | } |
| 363 | |
Paolo Bonzini | 674ea35 | 2019-04-10 11:41:40 +0200 | [diff] [blame] | 364 | |
| 365 | static inline bool kvm_pat_valid(u64 data) |
| 366 | { |
| 367 | if (data & 0xF8F8F8F8F8F8F8F8ull) |
| 368 | return false; |
| 369 | /* 0, 1, 4, 5, 6, 7 are valid values. */ |
| 370 | return (data | ((data & 0x0202020202020202ull) << 1)) == data; |
| 371 | } |
| 372 | |
Sean Christopherson | 9b5e853 | 2020-01-24 15:07:22 -0800 | [diff] [blame] | 373 | static inline bool kvm_dr7_valid(u64 data) |
Krish Sadhukhan | b91991b | 2020-01-15 19:54:32 -0500 | [diff] [blame] | 374 | { |
| 375 | /* Bits [63:32] are reserved */ |
| 376 | return !(data >> 32); |
| 377 | } |
Krish Sadhukhan | f5f6145 | 2020-05-22 18:19:51 -0400 | [diff] [blame] | 378 | static inline bool kvm_dr6_valid(u64 data) |
| 379 | { |
| 380 | /* Bits [63:32] are reserved */ |
| 381 | return !(data >> 32); |
| 382 | } |
Krish Sadhukhan | b91991b | 2020-01-15 19:54:32 -0500 | [diff] [blame] | 383 | |
Uros Bizjak | 3f1a18b | 2020-10-29 14:56:00 +0100 | [diff] [blame] | 384 | /* |
| 385 | * Trigger machine check on the host. We assume all the MSRs are already set up |
| 386 | * by the CPU and that we still run on the same CPU as the MCE occurred on. |
| 387 | * We pass a fake environment to the machine check handler because we want |
| 388 | * the guest to be always treated like user space, no matter what context |
| 389 | * it used internally. |
| 390 | */ |
| 391 | static inline void kvm_machine_check(void) |
| 392 | { |
| 393 | #if defined(CONFIG_X86_MCE) |
| 394 | struct pt_regs regs = { |
| 395 | .cs = 3, /* Fake ring 3 no matter what the guest ran on */ |
| 396 | .flags = X86_EFLAGS_IF, |
| 397 | }; |
| 398 | |
| 399 | do_machine_check(®s); |
| 400 | #endif |
| 401 | } |
| 402 | |
Aaron Lewis | 139a12c | 2019-10-21 16:30:25 -0700 | [diff] [blame] | 403 | void kvm_load_guest_xsave_state(struct kvm_vcpu *vcpu); |
| 404 | void kvm_load_host_xsave_state(struct kvm_vcpu *vcpu); |
Maxim Levitsky | 841c2be | 2020-07-08 14:57:31 +0300 | [diff] [blame] | 405 | int kvm_spec_ctrl_test_value(u64 value); |
Sean Christopherson | ee69c92 | 2020-10-06 18:44:16 -0700 | [diff] [blame] | 406 | bool kvm_is_valid_cr4(struct kvm_vcpu *vcpu, unsigned long cr4); |
Babu Moger | 3f3393b | 2020-09-11 14:29:05 -0500 | [diff] [blame] | 407 | int kvm_handle_memory_failure(struct kvm_vcpu *vcpu, int r, |
| 408 | struct x86_exception *e); |
Babu Moger | 9715092 | 2020-09-11 14:29:12 -0500 | [diff] [blame] | 409 | int kvm_handle_invpcid(struct kvm_vcpu *vcpu, unsigned long type, gva_t gva); |
Alexander Graf | 51de815 | 2020-09-25 16:34:17 +0200 | [diff] [blame] | 410 | bool kvm_msr_allowed(struct kvm_vcpu *vcpu, u32 index, u32 type); |
Paolo Bonzini | 674ea35 | 2019-04-10 11:41:40 +0200 | [diff] [blame] | 411 | |
Maxim Levitsky | cc4cb01 | 2020-11-01 13:55:23 +0200 | [diff] [blame] | 412 | /* |
| 413 | * Internal error codes that are used to indicate that MSR emulation encountered |
| 414 | * an error that should result in #GP in the guest, unless userspace |
| 415 | * handles it. |
| 416 | */ |
| 417 | #define KVM_MSR_RET_INVALID 2 /* in-kernel MSR emulation #GP condition */ |
| 418 | #define KVM_MSR_RET_FILTERED 3 /* #GP due to userspace MSR filter */ |
Peter Xu | 6abe9c1 | 2020-06-22 18:04:41 -0400 | [diff] [blame] | 419 | |
Krish Sadhukhan | b899c13 | 2020-07-08 00:39:55 +0000 | [diff] [blame] | 420 | #define __cr4_reserved_bits(__cpu_has, __c) \ |
| 421 | ({ \ |
| 422 | u64 __reserved_bits = CR4_RESERVED_BITS; \ |
| 423 | \ |
| 424 | if (!__cpu_has(__c, X86_FEATURE_XSAVE)) \ |
| 425 | __reserved_bits |= X86_CR4_OSXSAVE; \ |
| 426 | if (!__cpu_has(__c, X86_FEATURE_SMEP)) \ |
| 427 | __reserved_bits |= X86_CR4_SMEP; \ |
| 428 | if (!__cpu_has(__c, X86_FEATURE_SMAP)) \ |
| 429 | __reserved_bits |= X86_CR4_SMAP; \ |
| 430 | if (!__cpu_has(__c, X86_FEATURE_FSGSBASE)) \ |
| 431 | __reserved_bits |= X86_CR4_FSGSBASE; \ |
| 432 | if (!__cpu_has(__c, X86_FEATURE_PKU)) \ |
| 433 | __reserved_bits |= X86_CR4_PKE; \ |
| 434 | if (!__cpu_has(__c, X86_FEATURE_LA57)) \ |
| 435 | __reserved_bits |= X86_CR4_LA57; \ |
| 436 | if (!__cpu_has(__c, X86_FEATURE_UMIP)) \ |
| 437 | __reserved_bits |= X86_CR4_UMIP; \ |
Paolo Bonzini | 53efe52 | 2020-07-08 07:02:50 -0400 | [diff] [blame] | 438 | if (!__cpu_has(__c, X86_FEATURE_VMX)) \ |
| 439 | __reserved_bits |= X86_CR4_VMXE; \ |
Vitaly Kuznetsov | 4683d75 | 2021-02-01 15:28:43 +0100 | [diff] [blame] | 440 | if (!__cpu_has(__c, X86_FEATURE_PCID)) \ |
| 441 | __reserved_bits |= X86_CR4_PCIDE; \ |
Krish Sadhukhan | b899c13 | 2020-07-08 00:39:55 +0000 | [diff] [blame] | 442 | __reserved_bits; \ |
| 443 | }) |
| 444 | |
Tom Lendacky | 8f423a8 | 2020-12-10 11:09:53 -0600 | [diff] [blame] | 445 | int kvm_sev_es_mmio_write(struct kvm_vcpu *vcpu, gpa_t src, unsigned int bytes, |
| 446 | void *dst); |
| 447 | int kvm_sev_es_mmio_read(struct kvm_vcpu *vcpu, gpa_t src, unsigned int bytes, |
| 448 | void *dst); |
Tom Lendacky | 7ed9abf | 2020-12-10 11:09:54 -0600 | [diff] [blame] | 449 | int kvm_sev_es_string_io(struct kvm_vcpu *vcpu, unsigned int size, |
| 450 | unsigned int port, void *data, unsigned int count, |
| 451 | int in); |
Tom Lendacky | 8f423a8 | 2020-12-10 11:09:53 -0600 | [diff] [blame] | 452 | |
Avi Kivity | 26eef70 | 2008-07-03 14:59:22 +0300 | [diff] [blame] | 453 | #endif |