KVM: Remove arch specific components from the general code
[linux-2.6-block.git] / drivers / kvm / kvm.h
CommitLineData
6aa8b732
AK
1#ifndef __KVM_H
2#define __KVM_H
3
4/*
5 * This work is licensed under the terms of the GNU GPL, version 2. See
6 * the COPYING file in the top-level directory.
7 */
8
9#include <linux/types.h>
10#include <linux/list.h>
11#include <linux/mutex.h>
12#include <linux/spinlock.h>
06ff0d37
MR
13#include <linux/signal.h>
14#include <linux/sched.h>
6aa8b732 15#include <linux/mm.h>
e8edc6e0 16#include <asm/signal.h>
6aa8b732 17
6aa8b732 18#include <linux/kvm.h>
102d8325 19#include <linux/kvm_para.h>
6aa8b732 20
f802a307
RR
21#define CR3_PAE_RESERVED_BITS ((X86_CR3_PWT | X86_CR3_PCD) - 1)
22#define CR3_NONPAE_RESERVED_BITS ((PAGE_SIZE-1) & ~(X86_CR3_PWT | X86_CR3_PCD))
23#define CR3_L_MODE_RESERVED_BITS (CR3_NONPAE_RESERVED_BITS|0xFFFFFF0000000000ULL)
6aa8b732 24
6aa8b732 25#define KVM_GUEST_CR0_MASK \
707d92fa
RR
26 (X86_CR0_PG | X86_CR0_PE | X86_CR0_WP | X86_CR0_NE \
27 | X86_CR0_NW | X86_CR0_CD)
6aa8b732 28#define KVM_VM_CR0_ALWAYS_ON \
707d92fa
RR
29 (X86_CR0_PG | X86_CR0_PE | X86_CR0_WP | X86_CR0_NE | X86_CR0_TS \
30 | X86_CR0_MP)
6aa8b732 31#define KVM_GUEST_CR4_MASK \
66aee91a
RR
32 (X86_CR4_VME | X86_CR4_PSE | X86_CR4_PAE | X86_CR4_PGE | X86_CR4_VMXE)
33#define KVM_PMODE_VM_CR4_ALWAYS_ON (X86_CR4_PAE | X86_CR4_VMXE)
34#define KVM_RMODE_VM_CR4_ALWAYS_ON (X86_CR4_VME | X86_CR4_PAE | X86_CR4_VMXE)
6aa8b732
AK
35
36#define INVALID_PAGE (~(hpa_t)0)
37#define UNMAPPED_GVA (~(gpa_t)0)
38
ef9254df 39#define KVM_MAX_VCPUS 4
e8207547 40#define KVM_ALIAS_SLOTS 4
6aa8b732 41#define KVM_MEMORY_SLOTS 4
7494c0cc 42#define KVM_NUM_MMU_PAGES 1024
ebeace86
AK
43#define KVM_MIN_FREE_MMU_PAGES 5
44#define KVM_REFILL_PAGES 25
06465c5a 45#define KVM_MAX_CPUID_ENTRIES 40
6aa8b732
AK
46
47#define FX_IMAGE_SIZE 512
48#define FX_IMAGE_ALIGN 16
49#define FX_BUF_SIZE (2 * FX_IMAGE_SIZE + FX_IMAGE_ALIGN)
50
51#define DE_VECTOR 0
7807fa6c 52#define NM_VECTOR 7
6aa8b732
AK
53#define DF_VECTOR 8
54#define TS_VECTOR 10
55#define NP_VECTOR 11
56#define SS_VECTOR 12
57#define GP_VECTOR 13
58#define PF_VECTOR 14
59
60#define SELECTOR_TI_MASK (1 << 2)
61#define SELECTOR_RPL_MASK 0x03
62
63#define IOPL_SHIFT 12
64
039576c0
AK
65#define KVM_PIO_PAGE_OFFSET 1
66
d9e368d6
AK
67/*
68 * vcpu->requests bit members
69 */
70#define KVM_TLB_FLUSH 0
71
6aa8b732
AK
72/*
73 * Address types:
74 *
75 * gva - guest virtual address
76 * gpa - guest physical address
77 * gfn - guest frame number
78 * hva - host virtual address
79 * hpa - host physical address
80 * hfn - host frame number
81 */
82
83typedef unsigned long gva_t;
84typedef u64 gpa_t;
85typedef unsigned long gfn_t;
86
87typedef unsigned long hva_t;
88typedef u64 hpa_t;
89typedef unsigned long hfn_t;
90
cea0f0e7
AK
91#define NR_PTE_CHAIN_ENTRIES 5
92
93struct kvm_pte_chain {
94 u64 *parent_ptes[NR_PTE_CHAIN_ENTRIES];
95 struct hlist_node link;
96};
97
98/*
99 * kvm_mmu_page_role, below, is defined as:
100 *
101 * bits 0:3 - total guest paging levels (2-4, or zero for real mode)
102 * bits 4:7 - page table level for this shadow (1-4)
103 * bits 8:9 - page table quadrant for 2-level guests
104 * bit 16 - "metaphysical" - gfn is not a real page (huge page/real mode)
d55e2cb2 105 * bits 17:19 - "access" - the user, writable, and nx bits of a huge page pde
cea0f0e7
AK
106 */
107union kvm_mmu_page_role {
108 unsigned word;
109 struct {
110 unsigned glevels : 4;
111 unsigned level : 4;
112 unsigned quadrant : 2;
113 unsigned pad_for_nice_hex_output : 6;
114 unsigned metaphysical : 1;
d55e2cb2 115 unsigned hugepage_access : 3;
cea0f0e7
AK
116 };
117};
118
6aa8b732
AK
119struct kvm_mmu_page {
120 struct list_head link;
cea0f0e7
AK
121 struct hlist_node hash_link;
122
123 /*
124 * The following two entries are used to key the shadow page in the
125 * hash table.
126 */
127 gfn_t gfn;
128 union kvm_mmu_page_role role;
129
47ad8e68 130 u64 *spt;
6aa8b732
AK
131 unsigned long slot_bitmap; /* One bit set per slot which has memory
132 * in this shadow page.
133 */
cea0f0e7 134 int multimapped; /* More than one parent_pte? */
3bb65a22 135 int root_count; /* Currently serving as active root */
cea0f0e7
AK
136 union {
137 u64 *parent_pte; /* !multimapped */
138 struct hlist_head parent_ptes; /* multimapped, kvm_pte_chain */
139 };
6aa8b732
AK
140};
141
6aa8b732
AK
142struct kvm_vcpu;
143
144/*
145 * x86 supports 3 paging modes (4-level 64-bit, 3-level 64-bit, and 2-level
146 * 32-bit). The kvm_mmu structure abstracts the details of the current mmu
147 * mode.
148 */
149struct kvm_mmu {
150 void (*new_cr3)(struct kvm_vcpu *vcpu);
151 int (*page_fault)(struct kvm_vcpu *vcpu, gva_t gva, u32 err);
6aa8b732
AK
152 void (*free)(struct kvm_vcpu *vcpu);
153 gpa_t (*gva_to_gpa)(struct kvm_vcpu *vcpu, gva_t gva);
154 hpa_t root_hpa;
155 int root_level;
156 int shadow_root_level;
17ac10ad
AK
157
158 u64 *pae_root;
6aa8b732
AK
159};
160
714b93da
AK
161#define KVM_NR_MEM_OBJS 20
162
163struct kvm_mmu_memory_cache {
164 int nobjs;
165 void *objects[KVM_NR_MEM_OBJS];
166};
167
168/*
169 * We don't want allocation failures within the mmu code, so we preallocate
170 * enough memory for a single page fault in a cache.
171 */
6aa8b732
AK
172struct kvm_guest_debug {
173 int enabled;
174 unsigned long bp[4];
175 int singlestep;
176};
177
178enum {
179 VCPU_REGS_RAX = 0,
180 VCPU_REGS_RCX = 1,
181 VCPU_REGS_RDX = 2,
182 VCPU_REGS_RBX = 3,
183 VCPU_REGS_RSP = 4,
184 VCPU_REGS_RBP = 5,
185 VCPU_REGS_RSI = 6,
186 VCPU_REGS_RDI = 7,
05b3e0c2 187#ifdef CONFIG_X86_64
6aa8b732
AK
188 VCPU_REGS_R8 = 8,
189 VCPU_REGS_R9 = 9,
190 VCPU_REGS_R10 = 10,
191 VCPU_REGS_R11 = 11,
192 VCPU_REGS_R12 = 12,
193 VCPU_REGS_R13 = 13,
194 VCPU_REGS_R14 = 14,
195 VCPU_REGS_R15 = 15,
196#endif
197 NR_VCPU_REGS
198};
199
200enum {
201 VCPU_SREG_CS,
202 VCPU_SREG_DS,
203 VCPU_SREG_ES,
204 VCPU_SREG_FS,
205 VCPU_SREG_GS,
206 VCPU_SREG_SS,
207 VCPU_SREG_TR,
208 VCPU_SREG_LDTR,
209};
210
039576c0
AK
211struct kvm_pio_request {
212 unsigned long count;
213 int cur_count;
214 struct page *guest_pages[2];
215 unsigned guest_page_offset;
216 int in;
74906345 217 int port;
039576c0
AK
218 int size;
219 int string;
220 int down;
221 int rep;
222};
223
1165f5fe
AK
224struct kvm_stat {
225 u32 pf_fixed;
226 u32 pf_guest;
227 u32 tlb_flush;
228 u32 invlpg;
229
230 u32 exits;
231 u32 io_exits;
232 u32 mmio_exits;
233 u32 signal_exits;
234 u32 irq_window_exits;
235 u32 halt_exits;
236 u32 request_irq_exits;
237 u32 irq_exits;
e6adf283 238 u32 light_exits;
2cc51560 239 u32 efer_reload;
1165f5fe
AK
240};
241
2eeb2e94
GH
242struct kvm_io_device {
243 void (*read)(struct kvm_io_device *this,
244 gpa_t addr,
245 int len,
246 void *val);
247 void (*write)(struct kvm_io_device *this,
248 gpa_t addr,
249 int len,
250 const void *val);
251 int (*in_range)(struct kvm_io_device *this, gpa_t addr);
252 void (*destructor)(struct kvm_io_device *this);
253
254 void *private;
255};
256
257static inline void kvm_iodevice_read(struct kvm_io_device *dev,
258 gpa_t addr,
259 int len,
260 void *val)
261{
262 dev->read(dev, addr, len, val);
263}
264
265static inline void kvm_iodevice_write(struct kvm_io_device *dev,
266 gpa_t addr,
267 int len,
268 const void *val)
269{
270 dev->write(dev, addr, len, val);
271}
272
273static inline int kvm_iodevice_inrange(struct kvm_io_device *dev, gpa_t addr)
274{
275 return dev->in_range(dev, addr);
276}
277
278static inline void kvm_iodevice_destructor(struct kvm_io_device *dev)
279{
74906345
ED
280 if (dev->destructor)
281 dev->destructor(dev);
2eeb2e94
GH
282}
283
284/*
285 * It would be nice to use something smarter than a linear search, TBD...
286 * Thankfully we dont expect many devices to register (famous last words :),
287 * so until then it will suffice. At least its abstracted so we can change
288 * in one place.
289 */
290struct kvm_io_bus {
291 int dev_count;
292#define NR_IOBUS_DEVS 6
293 struct kvm_io_device *devs[NR_IOBUS_DEVS];
294};
295
296void kvm_io_bus_init(struct kvm_io_bus *bus);
297void kvm_io_bus_destroy(struct kvm_io_bus *bus);
298struct kvm_io_device *kvm_io_bus_find_dev(struct kvm_io_bus *bus, gpa_t addr);
299void kvm_io_bus_register_dev(struct kvm_io_bus *bus,
300 struct kvm_io_device *dev);
301
6aa8b732 302struct kvm_vcpu {
a2fa3e9f 303 int valid;
6aa8b732 304 struct kvm *kvm;
dad3795d 305 int vcpu_id;
a2fa3e9f 306 void *_priv;
6aa8b732
AK
307 struct mutex mutex;
308 int cpu;
0cc5064d 309 u64 host_tsc;
9a2bb7f4 310 struct kvm_run *run;
c1150d8c 311 int interrupt_window_open;
d9e368d6
AK
312 int guest_mode;
313 unsigned long requests;
6aa8b732 314 unsigned long irq_summary; /* bit vector: 1 per word in irq_pending */
9eb829ce 315 DECLARE_BITMAP(irq_pending, KVM_NR_INTERRUPTS);
6aa8b732
AK
316 unsigned long regs[NR_VCPU_REGS]; /* for rsp: vcpu_load_rsp_rip() */
317 unsigned long rip; /* needs vcpu_load_rsp_rip() */
318
319 unsigned long cr0;
320 unsigned long cr2;
321 unsigned long cr3;
102d8325
IM
322 gpa_t para_state_gpa;
323 struct page *para_state_page;
324 gpa_t hypercall_gpa;
6aa8b732
AK
325 unsigned long cr4;
326 unsigned long cr8;
1342d353 327 u64 pdptrs[4]; /* pae */
6aa8b732
AK
328 u64 shadow_efer;
329 u64 apic_base;
6f00e68f 330 u64 ia32_misc_enable_msr;
6aa8b732 331
6aa8b732
AK
332 struct kvm_mmu mmu;
333
714b93da
AK
334 struct kvm_mmu_memory_cache mmu_pte_chain_cache;
335 struct kvm_mmu_memory_cache mmu_rmap_desc_cache;
d3d25b04
AK
336 struct kvm_mmu_memory_cache mmu_page_cache;
337 struct kvm_mmu_memory_cache mmu_page_header_cache;
714b93da 338
86a5ba02
AK
339 gfn_t last_pt_write_gfn;
340 int last_pt_write_count;
341
6aa8b732
AK
342 struct kvm_guest_debug guest_debug;
343
344 char fx_buf[FX_BUF_SIZE];
345 char *host_fx_image;
346 char *guest_fx_image;
7807fa6c 347 int fpu_active;
7702fd1f 348 int guest_fpu_loaded;
6aa8b732
AK
349
350 int mmio_needed;
351 int mmio_read_completed;
352 int mmio_is_write;
353 int mmio_size;
354 unsigned char mmio_data[8];
355 gpa_t mmio_phys_addr;
e7df56e4 356 gva_t mmio_fault_cr2;
039576c0
AK
357 struct kvm_pio_request pio;
358 void *pio_data;
6aa8b732 359
1961d276
AK
360 int sigset_active;
361 sigset_t sigset;
362
1165f5fe
AK
363 struct kvm_stat stat;
364
6aa8b732
AK
365 struct {
366 int active;
367 u8 save_iopl;
368 struct kvm_save_segment {
369 u16 selector;
370 unsigned long base;
371 u32 limit;
372 u32 ar;
373 } tr, es, ds, fs, gs;
374 } rmode;
72d6e5a0 375 int halt_request; /* real mode on Intel only */
06465c5a
AK
376
377 int cpuid_nent;
378 struct kvm_cpuid_entry cpuid_entries[KVM_MAX_CPUID_ENTRIES];
6aa8b732
AK
379};
380
e8207547
AK
381struct kvm_mem_alias {
382 gfn_t base_gfn;
383 unsigned long npages;
384 gfn_t target_gfn;
385};
386
6aa8b732
AK
387struct kvm_memory_slot {
388 gfn_t base_gfn;
389 unsigned long npages;
390 unsigned long flags;
391 struct page **phys_mem;
392 unsigned long *dirty_bitmap;
393};
394
395struct kvm {
396 spinlock_t lock; /* protects everything except vcpus */
e8207547
AK
397 int naliases;
398 struct kvm_mem_alias aliases[KVM_ALIAS_SLOTS];
6aa8b732
AK
399 int nmemslots;
400 struct kvm_memory_slot memslots[KVM_MEMORY_SLOTS];
cea0f0e7
AK
401 /*
402 * Hash table of struct kvm_mmu_page.
403 */
6aa8b732 404 struct list_head active_mmu_pages;
ebeace86 405 int n_free_mmu_pages;
cea0f0e7 406 struct hlist_head mmu_page_hash[KVM_NUM_MMU_PAGES];
39c3b86e 407 int nvcpus;
6aa8b732
AK
408 struct kvm_vcpu vcpus[KVM_MAX_VCPUS];
409 int memory_config_version;
410 int busy;
cd4a4e53 411 unsigned long rmap_overflow;
133de902 412 struct list_head vm_list;
bccf2150 413 struct file *filp;
2eeb2e94 414 struct kvm_io_bus mmio_bus;
74906345 415 struct kvm_io_bus pio_bus;
6aa8b732
AK
416};
417
6aa8b732
AK
418struct descriptor_table {
419 u16 limit;
420 unsigned long base;
421} __attribute__((packed));
422
423struct kvm_arch_ops {
424 int (*cpu_has_kvm_support)(void); /* __init */
425 int (*disabled_by_bios)(void); /* __init */
426 void (*hardware_enable)(void *dummy); /* __init */
427 void (*hardware_disable)(void *dummy);
428 int (*hardware_setup)(void); /* __init */
429 void (*hardware_unsetup)(void); /* __exit */
430
431 int (*vcpu_create)(struct kvm_vcpu *vcpu);
432 void (*vcpu_free)(struct kvm_vcpu *vcpu);
433
bccf2150 434 void (*vcpu_load)(struct kvm_vcpu *vcpu);
6aa8b732 435 void (*vcpu_put)(struct kvm_vcpu *vcpu);
774c47f1 436 void (*vcpu_decache)(struct kvm_vcpu *vcpu);
6aa8b732
AK
437
438 int (*set_guest_debug)(struct kvm_vcpu *vcpu,
439 struct kvm_debug_guest *dbg);
440 int (*get_msr)(struct kvm_vcpu *vcpu, u32 msr_index, u64 *pdata);
441 int (*set_msr)(struct kvm_vcpu *vcpu, u32 msr_index, u64 data);
442 u64 (*get_segment_base)(struct kvm_vcpu *vcpu, int seg);
443 void (*get_segment)(struct kvm_vcpu *vcpu,
444 struct kvm_segment *var, int seg);
445 void (*set_segment)(struct kvm_vcpu *vcpu,
446 struct kvm_segment *var, int seg);
6aa8b732 447 void (*get_cs_db_l_bits)(struct kvm_vcpu *vcpu, int *db, int *l);
25c4c276 448 void (*decache_cr4_guest_bits)(struct kvm_vcpu *vcpu);
6aa8b732 449 void (*set_cr0)(struct kvm_vcpu *vcpu, unsigned long cr0);
6aa8b732
AK
450 void (*set_cr3)(struct kvm_vcpu *vcpu, unsigned long cr3);
451 void (*set_cr4)(struct kvm_vcpu *vcpu, unsigned long cr4);
452 void (*set_efer)(struct kvm_vcpu *vcpu, u64 efer);
453 void (*get_idt)(struct kvm_vcpu *vcpu, struct descriptor_table *dt);
454 void (*set_idt)(struct kvm_vcpu *vcpu, struct descriptor_table *dt);
455 void (*get_gdt)(struct kvm_vcpu *vcpu, struct descriptor_table *dt);
456 void (*set_gdt)(struct kvm_vcpu *vcpu, struct descriptor_table *dt);
457 unsigned long (*get_dr)(struct kvm_vcpu *vcpu, int dr);
458 void (*set_dr)(struct kvm_vcpu *vcpu, int dr, unsigned long value,
459 int *exception);
460 void (*cache_regs)(struct kvm_vcpu *vcpu);
461 void (*decache_regs)(struct kvm_vcpu *vcpu);
462 unsigned long (*get_rflags)(struct kvm_vcpu *vcpu);
463 void (*set_rflags)(struct kvm_vcpu *vcpu, unsigned long rflags);
464
465 void (*invlpg)(struct kvm_vcpu *vcpu, gva_t addr);
466 void (*tlb_flush)(struct kvm_vcpu *vcpu);
467 void (*inject_page_fault)(struct kvm_vcpu *vcpu,
468 unsigned long addr, u32 err_code);
469
470 void (*inject_gp)(struct kvm_vcpu *vcpu, unsigned err_code);
471
472 int (*run)(struct kvm_vcpu *vcpu, struct kvm_run *run);
473 int (*vcpu_setup)(struct kvm_vcpu *vcpu);
474 void (*skip_emulated_instruction)(struct kvm_vcpu *vcpu);
102d8325
IM
475 void (*patch_hypercall)(struct kvm_vcpu *vcpu,
476 unsigned char *hypercall_addr);
6aa8b732
AK
477};
478
6aa8b732
AK
479extern struct kvm_arch_ops *kvm_arch_ops;
480
481#define kvm_printf(kvm, fmt ...) printk(KERN_DEBUG fmt)
482#define vcpu_printf(vcpu, fmt...) kvm_printf(vcpu->kvm, fmt)
483
484int kvm_init_arch(struct kvm_arch_ops *ops, struct module *module);
485void kvm_exit_arch(void);
486
b5a33a75
AK
487int kvm_mmu_module_init(void);
488void kvm_mmu_module_exit(void);
489
6aa8b732 490void kvm_mmu_destroy(struct kvm_vcpu *vcpu);
8018c27b
IM
491int kvm_mmu_create(struct kvm_vcpu *vcpu);
492int kvm_mmu_setup(struct kvm_vcpu *vcpu);
6aa8b732
AK
493
494int kvm_mmu_reset_context(struct kvm_vcpu *vcpu);
90cb0529
AK
495void kvm_mmu_slot_remove_write_access(struct kvm *kvm, int slot);
496void kvm_mmu_zap_all(struct kvm *kvm);
6aa8b732
AK
497
498hpa_t gpa_to_hpa(struct kvm_vcpu *vcpu, gpa_t gpa);
499#define HPA_MSB ((sizeof(hpa_t) * 8) - 1)
500#define HPA_ERR_MASK ((hpa_t)1 << HPA_MSB)
501static inline int is_error_hpa(hpa_t hpa) { return hpa >> HPA_MSB; }
502hpa_t gva_to_hpa(struct kvm_vcpu *vcpu, gva_t gva);
039576c0 503struct page *gva_to_page(struct kvm_vcpu *vcpu, gva_t gva);
6aa8b732
AK
504
505void kvm_emulator_want_group7_invlpg(void);
506
507extern hpa_t bad_page_address;
508
954bbbc2 509struct page *gfn_to_page(struct kvm *kvm, gfn_t gfn);
6aa8b732
AK
510struct kvm_memory_slot *gfn_to_memslot(struct kvm *kvm, gfn_t gfn);
511void mark_page_dirty(struct kvm *kvm, gfn_t gfn);
512
513enum emulation_result {
514 EMULATE_DONE, /* no further processing */
515 EMULATE_DO_MMIO, /* kvm_run filled with mmio request */
516 EMULATE_FAIL, /* can't emulate this instruction */
517};
518
519int emulate_instruction(struct kvm_vcpu *vcpu, struct kvm_run *run,
520 unsigned long cr2, u16 error_code);
521void realmode_lgdt(struct kvm_vcpu *vcpu, u16 size, unsigned long address);
522void realmode_lidt(struct kvm_vcpu *vcpu, u16 size, unsigned long address);
523void realmode_lmsw(struct kvm_vcpu *vcpu, unsigned long msw,
524 unsigned long *rflags);
525
526unsigned long realmode_get_cr(struct kvm_vcpu *vcpu, int cr);
527void realmode_set_cr(struct kvm_vcpu *vcpu, int cr, unsigned long value,
528 unsigned long *rflags);
35f3f286
AK
529int kvm_get_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 *data);
530int kvm_set_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 data);
6aa8b732
AK
531
532struct x86_emulate_ctxt;
533
039576c0
AK
534int kvm_setup_pio(struct kvm_vcpu *vcpu, struct kvm_run *run, int in,
535 int size, unsigned long count, int string, int down,
536 gva_t address, int rep, unsigned port);
06465c5a 537void kvm_emulate_cpuid(struct kvm_vcpu *vcpu);
d3bef15f 538int kvm_emulate_halt(struct kvm_vcpu *vcpu);
6aa8b732
AK
539int emulate_invlpg(struct kvm_vcpu *vcpu, gva_t address);
540int emulate_clts(struct kvm_vcpu *vcpu);
541int emulator_get_dr(struct x86_emulate_ctxt* ctxt, int dr,
542 unsigned long *dest);
543int emulator_set_dr(struct x86_emulate_ctxt *ctxt, int dr,
544 unsigned long value);
545
546void set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0);
547void set_cr3(struct kvm_vcpu *vcpu, unsigned long cr0);
548void set_cr4(struct kvm_vcpu *vcpu, unsigned long cr0);
549void set_cr8(struct kvm_vcpu *vcpu, unsigned long cr0);
550void lmsw(struct kvm_vcpu *vcpu, unsigned long msw);
551
3bab1f5d
AK
552int kvm_get_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata);
553int kvm_set_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 data);
6aa8b732
AK
554
555void fx_init(struct kvm_vcpu *vcpu);
556
6aa8b732 557void kvm_resched(struct kvm_vcpu *vcpu);
7702fd1f
AK
558void kvm_load_guest_fpu(struct kvm_vcpu *vcpu);
559void kvm_put_guest_fpu(struct kvm_vcpu *vcpu);
d9e368d6 560void kvm_flush_remote_tlbs(struct kvm *kvm);
6aa8b732
AK
561
562int kvm_read_guest(struct kvm_vcpu *vcpu,
563 gva_t addr,
564 unsigned long size,
565 void *dest);
566
567int kvm_write_guest(struct kvm_vcpu *vcpu,
568 gva_t addr,
569 unsigned long size,
570 void *data);
571
572unsigned long segment_base(u16 selector);
573
09072daf 574void kvm_mmu_pte_write(struct kvm_vcpu *vcpu, gpa_t gpa,
fe551881 575 const u8 *new, int bytes);
a436036b 576int kvm_mmu_unprotect_page_virt(struct kvm_vcpu *vcpu, gva_t gva);
22d95b12 577void __kvm_mmu_free_some_pages(struct kvm_vcpu *vcpu);
17c3ba9d
AK
578int kvm_mmu_load(struct kvm_vcpu *vcpu);
579void kvm_mmu_unload(struct kvm_vcpu *vcpu);
ebeace86 580
270fd9b9
AK
581int kvm_hypercall(struct kvm_vcpu *vcpu, struct kvm_run *run);
582
ebeace86
AK
583static inline int kvm_mmu_page_fault(struct kvm_vcpu *vcpu, gva_t gva,
584 u32 error_code)
585{
ebeace86
AK
586 return vcpu->mmu.page_fault(vcpu, gva, error_code);
587}
da4a00f0 588
22d95b12
AK
589static inline void kvm_mmu_free_some_pages(struct kvm_vcpu *vcpu)
590{
591 if (unlikely(vcpu->kvm->n_free_mmu_pages < KVM_MIN_FREE_MMU_PAGES))
592 __kvm_mmu_free_some_pages(vcpu);
593}
594
17c3ba9d
AK
595static inline int kvm_mmu_reload(struct kvm_vcpu *vcpu)
596{
597 if (likely(vcpu->mmu.root_hpa != INVALID_PAGE))
598 return 0;
599
600 return kvm_mmu_load(vcpu);
601}
602
a9058ecd
AK
603static inline int is_long_mode(struct kvm_vcpu *vcpu)
604{
605#ifdef CONFIG_X86_64
606 return vcpu->shadow_efer & EFER_LME;
607#else
608 return 0;
609#endif
610}
611
6aa8b732
AK
612static inline int is_pae(struct kvm_vcpu *vcpu)
613{
66aee91a 614 return vcpu->cr4 & X86_CR4_PAE;
6aa8b732
AK
615}
616
617static inline int is_pse(struct kvm_vcpu *vcpu)
618{
66aee91a 619 return vcpu->cr4 & X86_CR4_PSE;
6aa8b732
AK
620}
621
622static inline int is_paging(struct kvm_vcpu *vcpu)
623{
707d92fa 624 return vcpu->cr0 & X86_CR0_PG;
6aa8b732
AK
625}
626
627static inline int memslot_id(struct kvm *kvm, struct kvm_memory_slot *slot)
628{
629 return slot - kvm->memslots;
630}
631
632static inline struct kvm_mmu_page *page_header(hpa_t shadow_page)
633{
634 struct page *page = pfn_to_page(shadow_page >> PAGE_SHIFT);
635
5972e953 636 return (struct kvm_mmu_page *)page_private(page);
6aa8b732
AK
637}
638
639static inline u16 read_fs(void)
640{
641 u16 seg;
642 asm ("mov %%fs, %0" : "=g"(seg));
643 return seg;
644}
645
646static inline u16 read_gs(void)
647{
648 u16 seg;
649 asm ("mov %%gs, %0" : "=g"(seg));
650 return seg;
651}
652
653static inline u16 read_ldt(void)
654{
655 u16 ldt;
656 asm ("sldt %0" : "=g"(ldt));
657 return ldt;
658}
659
660static inline void load_fs(u16 sel)
661{
662 asm ("mov %0, %%fs" : : "rm"(sel));
663}
664
665static inline void load_gs(u16 sel)
666{
667 asm ("mov %0, %%gs" : : "rm"(sel));
668}
669
670#ifndef load_ldt
671static inline void load_ldt(u16 sel)
672{
a0610ddf 673 asm ("lldt %0" : : "rm"(sel));
6aa8b732
AK
674}
675#endif
676
677static inline void get_idt(struct descriptor_table *table)
678{
679 asm ("sidt %0" : "=m"(*table));
680}
681
682static inline void get_gdt(struct descriptor_table *table)
683{
684 asm ("sgdt %0" : "=m"(*table));
685}
686
687static inline unsigned long read_tr_base(void)
688{
689 u16 tr;
690 asm ("str %0" : "=g"(tr));
691 return segment_base(tr);
692}
693
05b3e0c2 694#ifdef CONFIG_X86_64
6aa8b732
AK
695static inline unsigned long read_msr(unsigned long msr)
696{
697 u64 value;
698
699 rdmsrl(msr, value);
700 return value;
701}
702#endif
703
704static inline void fx_save(void *image)
705{
706 asm ("fxsave (%0)":: "r" (image));
707}
708
709static inline void fx_restore(void *image)
710{
711 asm ("fxrstor (%0)":: "r" (image));
712}
713
714static inline void fpu_init(void)
715{
716 asm ("finit");
717}
718
719static inline u32 get_rdx_init_val(void)
720{
721 return 0x600; /* P6 family */
722}
723
724#define ASM_VMX_VMCLEAR_RAX ".byte 0x66, 0x0f, 0xc7, 0x30"
725#define ASM_VMX_VMLAUNCH ".byte 0x0f, 0x01, 0xc2"
726#define ASM_VMX_VMRESUME ".byte 0x0f, 0x01, 0xc3"
727#define ASM_VMX_VMPTRLD_RAX ".byte 0x0f, 0xc7, 0x30"
728#define ASM_VMX_VMREAD_RDX_RAX ".byte 0x0f, 0x78, 0xd0"
729#define ASM_VMX_VMWRITE_RAX_RDX ".byte 0x0f, 0x79, 0xd0"
730#define ASM_VMX_VMWRITE_RSP_RDX ".byte 0x0f, 0x79, 0xd4"
731#define ASM_VMX_VMXOFF ".byte 0x0f, 0x01, 0xc4"
732#define ASM_VMX_VMXON_RAX ".byte 0xf3, 0x0f, 0xc7, 0x30"
733
734#define MSR_IA32_TIME_STAMP_COUNTER 0x010
735
736#define TSS_IOPB_BASE_OFFSET 0x66
737#define TSS_BASE_SIZE 0x68
738#define TSS_IOPB_SIZE (65536 / 8)
739#define TSS_REDIRECTION_SIZE (256 / 8)
740#define RMODE_TSS_SIZE (TSS_BASE_SIZE + TSS_REDIRECTION_SIZE + TSS_IOPB_SIZE + 1)
741
6aa8b732 742#endif