blob: 3a6461694fc2502be9d223fed57249cd0d051fe1 [file] [log] [blame]
Sean Christopherson453eafb2018-12-20 12:25:17 -08001/* SPDX-License-Identifier: GPL-2.0 */
2#include <linux/linkage.h>
3#include <asm/asm.h>
Sean Christopherson5e0781d2019-01-25 07:41:12 -08004#include <asm/bitsperlong.h>
5#include <asm/kvm_vcpu_regs.h>
Rick Edgecombef2fde6a2019-04-26 17:23:58 -07006#include <asm/nospec-branch.h>
Sean Christopherson535f7ef2020-09-15 12:15:04 -07007#include <asm/segment.h>
Sean Christopherson5e0781d2019-01-25 07:41:12 -08008
9#define WORD_SIZE (BITS_PER_LONG / 8)
10
11#define VCPU_RAX __VCPU_REGS_RAX * WORD_SIZE
12#define VCPU_RCX __VCPU_REGS_RCX * WORD_SIZE
13#define VCPU_RDX __VCPU_REGS_RDX * WORD_SIZE
14#define VCPU_RBX __VCPU_REGS_RBX * WORD_SIZE
15/* Intentionally omit RSP as it's context switched by hardware */
16#define VCPU_RBP __VCPU_REGS_RBP * WORD_SIZE
17#define VCPU_RSI __VCPU_REGS_RSI * WORD_SIZE
18#define VCPU_RDI __VCPU_REGS_RDI * WORD_SIZE
19
20#ifdef CONFIG_X86_64
21#define VCPU_R8 __VCPU_REGS_R8 * WORD_SIZE
22#define VCPU_R9 __VCPU_REGS_R9 * WORD_SIZE
23#define VCPU_R10 __VCPU_REGS_R10 * WORD_SIZE
24#define VCPU_R11 __VCPU_REGS_R11 * WORD_SIZE
25#define VCPU_R12 __VCPU_REGS_R12 * WORD_SIZE
26#define VCPU_R13 __VCPU_REGS_R13 * WORD_SIZE
27#define VCPU_R14 __VCPU_REGS_R14 * WORD_SIZE
28#define VCPU_R15 __VCPU_REGS_R15 * WORD_SIZE
29#endif
Sean Christopherson453eafb2018-12-20 12:25:17 -080030
Thomas Gleixner3ebccdf2020-07-08 21:51:57 +020031.section .noinstr.text, "ax"
Sean Christopherson453eafb2018-12-20 12:25:17 -080032
33/**
34 * vmx_vmenter - VM-Enter the current loaded VMCS
35 *
36 * %RFLAGS.ZF: !VMCS.LAUNCHED, i.e. controls VMLAUNCH vs. VMRESUME
37 *
38 * Returns:
39 * %RFLAGS.CF is set on VM-Fail Invalid
40 * %RFLAGS.ZF is set on VM-Fail Valid
41 * %RFLAGS.{CF,ZF} are cleared on VM-Success, i.e. VM-Exit
42 *
43 * Note that VMRESUME/VMLAUNCH fall-through and return directly if
44 * they VM-Fail, whereas a successful VM-Enter + VM-Exit will jump
45 * to vmx_vmexit.
46 */
Uros Bizjak150f17b2020-12-30 16:26:57 -080047SYM_FUNC_START_LOCAL(vmx_vmenter)
Sean Christopherson453eafb2018-12-20 12:25:17 -080048 /* EFLAGS.ZF is set if VMCS.LAUNCHED == 0 */
49 je 2f
50
511: vmresume
52 ret
53
542: vmlaunch
55 ret
56
573: cmpb $0, kvm_rebooting
Josh Poimboeuf19f2d8f2019-07-17 20:36:38 -050058 je 4f
59 ret
604: ud2
Sean Christopherson453eafb2018-12-20 12:25:17 -080061
Uros Bizjakda7e4232020-04-06 22:21:08 +020062 _ASM_EXTABLE(1b, 3b)
63 _ASM_EXTABLE(2b, 3b)
Sean Christopherson453eafb2018-12-20 12:25:17 -080064
Jiri Slaby6dcc5622019-10-11 13:51:04 +020065SYM_FUNC_END(vmx_vmenter)
Sean Christopherson453eafb2018-12-20 12:25:17 -080066
67/**
68 * vmx_vmexit - Handle a VMX VM-Exit
69 *
70 * Returns:
71 * %RFLAGS.{CF,ZF} are cleared on VM-Success, i.e. VM-Exit
72 *
73 * This is vmx_vmenter's partner in crime. On a VM-Exit, control will jump
74 * here after hardware loads the host's state, i.e. this is the destination
75 * referred to by VMCS.HOST_RIP.
76 */
Jiri Slaby6dcc5622019-10-11 13:51:04 +020077SYM_FUNC_START(vmx_vmexit)
Rick Edgecombef2fde6a2019-04-26 17:23:58 -070078#ifdef CONFIG_RETPOLINE
79 ALTERNATIVE "jmp .Lvmexit_skip_rsb", "", X86_FEATURE_RETPOLINE
80 /* Preserve guest's RAX, it's used to stuff the RSB. */
81 push %_ASM_AX
82
83 /* IMPORTANT: Stuff the RSB immediately after VM-Exit, before RET! */
84 FILL_RETURN_BUFFER %_ASM_AX, RSB_CLEAR_LOOPS, X86_FEATURE_RETPOLINE
85
Sean Christophersonc7cb2d62020-05-05 20:53:55 -070086 /* Clear RFLAGS.CF and RFLAGS.ZF to preserve VM-Exit, i.e. !VM-Fail. */
87 or $1, %_ASM_AX
88
Rick Edgecombef2fde6a2019-04-26 17:23:58 -070089 pop %_ASM_AX
90.Lvmexit_skip_rsb:
91#endif
Sean Christopherson453eafb2018-12-20 12:25:17 -080092 ret
Jiri Slaby6dcc5622019-10-11 13:51:04 +020093SYM_FUNC_END(vmx_vmexit)
Sean Christopherson5e0781d2019-01-25 07:41:12 -080094
95/**
Sean Christophersonee2fc632019-01-25 07:41:14 -080096 * __vmx_vcpu_run - Run a vCPU via a transition to VMX guest mode
Sean Christophersonb6852ae2019-08-15 13:09:31 -070097 * @vmx: struct vcpu_vmx * (forwarded to vmx_update_host_rsp)
Sean Christopherson5e0781d2019-01-25 07:41:12 -080098 * @regs: unsigned long * (to guest registers)
Sean Christopherson77df5492019-01-25 07:41:16 -080099 * @launched: %true if the VMCS has been launched
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800100 *
101 * Returns:
Sean Christophersone75c3c32019-01-25 07:41:17 -0800102 * 0 on VM-Exit, 1 on VM-Fail
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800103 */
Jiri Slaby6dcc5622019-10-11 13:51:04 +0200104SYM_FUNC_START(__vmx_vcpu_run)
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800105 push %_ASM_BP
106 mov %_ASM_SP, %_ASM_BP
Sean Christopherson3b895ef2019-01-25 07:41:18 -0800107#ifdef CONFIG_X86_64
108 push %r15
109 push %r14
110 push %r13
111 push %r12
112#else
113 push %edi
114 push %esi
115#endif
116 push %_ASM_BX
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800117
118 /*
119 * Save @regs, _ASM_ARG2 may be modified by vmx_update_host_rsp() and
120 * @regs is needed after VM-Exit to save the guest's register values.
121 */
122 push %_ASM_ARG2
123
Sean Christopherson77df5492019-01-25 07:41:16 -0800124 /* Copy @launched to BL, _ASM_ARG3 is volatile. */
125 mov %_ASM_ARG3B, %bl
126
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800127 /* Adjust RSP to account for the CALL to vmx_vmenter(). */
128 lea -WORD_SIZE(%_ASM_SP), %_ASM_ARG2
129 call vmx_update_host_rsp
130
Sean Christophersona62fd5a2019-01-25 07:41:15 -0800131 /* Load @regs to RAX. */
132 mov (%_ASM_SP), %_ASM_AX
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800133
134 /* Check if vmlaunch or vmresume is needed */
Uros Bizjak6c442212020-10-29 15:04:57 +0100135 testb %bl, %bl
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800136
137 /* Load guest registers. Don't clobber flags. */
Sean Christophersona62fd5a2019-01-25 07:41:15 -0800138 mov VCPU_RCX(%_ASM_AX), %_ASM_CX
139 mov VCPU_RDX(%_ASM_AX), %_ASM_DX
Uros Bizjakbb039112020-03-10 18:10:24 +0100140 mov VCPU_RBX(%_ASM_AX), %_ASM_BX
141 mov VCPU_RBP(%_ASM_AX), %_ASM_BP
Sean Christophersona62fd5a2019-01-25 07:41:15 -0800142 mov VCPU_RSI(%_ASM_AX), %_ASM_SI
143 mov VCPU_RDI(%_ASM_AX), %_ASM_DI
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800144#ifdef CONFIG_X86_64
Sean Christophersona62fd5a2019-01-25 07:41:15 -0800145 mov VCPU_R8 (%_ASM_AX), %r8
146 mov VCPU_R9 (%_ASM_AX), %r9
147 mov VCPU_R10(%_ASM_AX), %r10
148 mov VCPU_R11(%_ASM_AX), %r11
149 mov VCPU_R12(%_ASM_AX), %r12
150 mov VCPU_R13(%_ASM_AX), %r13
151 mov VCPU_R14(%_ASM_AX), %r14
152 mov VCPU_R15(%_ASM_AX), %r15
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800153#endif
Sean Christophersonb6852ae2019-08-15 13:09:31 -0700154 /* Load guest RAX. This kills the @regs pointer! */
Sean Christophersona62fd5a2019-01-25 07:41:15 -0800155 mov VCPU_RAX(%_ASM_AX), %_ASM_AX
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800156
157 /* Enter guest mode */
158 call vmx_vmenter
159
160 /* Jump on VM-Fail. */
161 jbe 2f
162
Sean Christophersona62fd5a2019-01-25 07:41:15 -0800163 /* Temporarily save guest's RAX. */
164 push %_ASM_AX
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800165
Sean Christophersona62fd5a2019-01-25 07:41:15 -0800166 /* Reload @regs to RAX. */
167 mov WORD_SIZE(%_ASM_SP), %_ASM_AX
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800168
Sean Christophersona62fd5a2019-01-25 07:41:15 -0800169 /* Save all guest registers, including RAX from the stack */
Uros Bizjakc16312f2020-04-27 22:50:35 +0200170 pop VCPU_RAX(%_ASM_AX)
171 mov %_ASM_CX, VCPU_RCX(%_ASM_AX)
172 mov %_ASM_DX, VCPU_RDX(%_ASM_AX)
173 mov %_ASM_BX, VCPU_RBX(%_ASM_AX)
174 mov %_ASM_BP, VCPU_RBP(%_ASM_AX)
175 mov %_ASM_SI, VCPU_RSI(%_ASM_AX)
176 mov %_ASM_DI, VCPU_RDI(%_ASM_AX)
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800177#ifdef CONFIG_X86_64
Sean Christophersona62fd5a2019-01-25 07:41:15 -0800178 mov %r8, VCPU_R8 (%_ASM_AX)
179 mov %r9, VCPU_R9 (%_ASM_AX)
180 mov %r10, VCPU_R10(%_ASM_AX)
181 mov %r11, VCPU_R11(%_ASM_AX)
182 mov %r12, VCPU_R12(%_ASM_AX)
183 mov %r13, VCPU_R13(%_ASM_AX)
184 mov %r14, VCPU_R14(%_ASM_AX)
185 mov %r15, VCPU_R15(%_ASM_AX)
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800186#endif
187
Sean Christophersone75c3c32019-01-25 07:41:17 -0800188 /* Clear RAX to indicate VM-Exit (as opposed to VM-Fail). */
189 xor %eax, %eax
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800190
191 /*
Sean Christophersone75c3c32019-01-25 07:41:17 -0800192 * Clear all general purpose registers except RSP and RAX to prevent
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800193 * speculative use of the guest's values, even those that are reloaded
194 * via the stack. In theory, an L1 cache miss when restoring registers
195 * could lead to speculative execution with the guest's values.
196 * Zeroing XORs are dirt cheap, i.e. the extra paranoia is essentially
Sean Christophersone75c3c32019-01-25 07:41:17 -0800197 * free. RSP and RAX are exempt as RSP is restored by hardware during
198 * VM-Exit and RAX is explicitly loaded with 0 or 1 to return VM-Fail.
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800199 */
Uros Bizjakbb039112020-03-10 18:10:24 +01002001: xor %ecx, %ecx
Sean Christopherson4f44c4e2019-01-25 07:41:20 -0800201 xor %edx, %edx
Uros Bizjakbb039112020-03-10 18:10:24 +0100202 xor %ebx, %ebx
203 xor %ebp, %ebp
Sean Christopherson4f44c4e2019-01-25 07:41:20 -0800204 xor %esi, %esi
205 xor %edi, %edi
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800206#ifdef CONFIG_X86_64
207 xor %r8d, %r8d
208 xor %r9d, %r9d
209 xor %r10d, %r10d
210 xor %r11d, %r11d
211 xor %r12d, %r12d
212 xor %r13d, %r13d
213 xor %r14d, %r14d
214 xor %r15d, %r15d
215#endif
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800216
217 /* "POP" @regs. */
218 add $WORD_SIZE, %_ASM_SP
Sean Christopherson3b895ef2019-01-25 07:41:18 -0800219 pop %_ASM_BX
220
221#ifdef CONFIG_X86_64
222 pop %r12
223 pop %r13
224 pop %r14
225 pop %r15
226#else
227 pop %esi
228 pop %edi
229#endif
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800230 pop %_ASM_BP
231 ret
232
233 /* VM-Fail. Out-of-line to avoid a taken Jcc after VM-Exit. */
Sean Christophersone75c3c32019-01-25 07:41:17 -08002342: mov $1, %eax
Sean Christopherson5e0781d2019-01-25 07:41:12 -0800235 jmp 1b
Jiri Slaby6dcc5622019-10-11 13:51:04 +0200236SYM_FUNC_END(__vmx_vcpu_run)
Sean Christopherson842f4be2020-03-26 09:07:12 -0700237
Thomas Gleixner3ebccdf2020-07-08 21:51:57 +0200238
239.section .text, "ax"
240
Sean Christopherson842f4be2020-03-26 09:07:12 -0700241/**
242 * vmread_error_trampoline - Trampoline from inline asm to vmread_error()
243 * @field: VMCS field encoding that failed
244 * @fault: %true if the VMREAD faulted, %false if it failed
245
246 * Save and restore volatile registers across a call to vmread_error(). Note,
247 * all parameters are passed on the stack.
248 */
249SYM_FUNC_START(vmread_error_trampoline)
250 push %_ASM_BP
251 mov %_ASM_SP, %_ASM_BP
252
253 push %_ASM_AX
254 push %_ASM_CX
255 push %_ASM_DX
256#ifdef CONFIG_X86_64
257 push %rdi
258 push %rsi
259 push %r8
260 push %r9
261 push %r10
262 push %r11
263#endif
264#ifdef CONFIG_X86_64
265 /* Load @field and @fault to arg1 and arg2 respectively. */
266 mov 3*WORD_SIZE(%rbp), %_ASM_ARG2
267 mov 2*WORD_SIZE(%rbp), %_ASM_ARG1
268#else
269 /* Parameters are passed on the stack for 32-bit (see asmlinkage). */
270 push 3*WORD_SIZE(%ebp)
271 push 2*WORD_SIZE(%ebp)
272#endif
273
274 call vmread_error
275
276#ifndef CONFIG_X86_64
277 add $8, %esp
278#endif
279
280 /* Zero out @fault, which will be popped into the result register. */
281 _ASM_MOV $0, 3*WORD_SIZE(%_ASM_BP)
282
283#ifdef CONFIG_X86_64
284 pop %r11
285 pop %r10
286 pop %r9
287 pop %r8
288 pop %rsi
289 pop %rdi
290#endif
291 pop %_ASM_DX
292 pop %_ASM_CX
293 pop %_ASM_AX
294 pop %_ASM_BP
295
296 ret
297SYM_FUNC_END(vmread_error_trampoline)
Sean Christopherson535f7ef2020-09-15 12:15:04 -0700298
299SYM_FUNC_START(vmx_do_interrupt_nmi_irqoff)
300 /*
301 * Unconditionally create a stack frame, getting the correct RSP on the
302 * stack (for x86-64) would take two instructions anyways, and RBP can
303 * be used to restore RSP to make objtool happy (see below).
304 */
305 push %_ASM_BP
306 mov %_ASM_SP, %_ASM_BP
307
308#ifdef CONFIG_X86_64
309 /*
310 * Align RSP to a 16-byte boundary (to emulate CPU behavior) before
311 * creating the synthetic interrupt stack frame for the IRQ/NMI.
312 */
313 and $-16, %rsp
314 push $__KERNEL_DS
315 push %rbp
316#endif
317 pushf
318 push $__KERNEL_CS
319 CALL_NOSPEC _ASM_ARG1
320
321 /*
322 * "Restore" RSP from RBP, even though IRET has already unwound RSP to
323 * the correct value. objtool doesn't know the callee will IRET and,
324 * without the explicit restore, thinks the stack is getting walloped.
325 * Using an unwind hint is problematic due to x86-64's dynamic alignment.
326 */
327 mov %_ASM_BP, %_ASM_SP
328 pop %_ASM_BP
329 ret
330SYM_FUNC_END(vmx_do_interrupt_nmi_irqoff)