Commit | Line | Data |
---|---|---|
3b20eb23 | 1 | /* SPDX-License-Identifier: GPL-2.0-only */ |
6aa8b732 AK |
2 | /* |
3 | * vmx.h: VMX Architecture related definitions | |
4 | * Copyright (c) 2004, Intel Corporation. | |
5 | * | |
6aa8b732 AK |
6 | * A few random additions are: |
7 | * Copyright (C) 2006 Qumranet | |
8 | * Avi Kivity <avi@qumranet.com> | |
9 | * Yaniv Kamay <yaniv@qumranet.com> | |
6aa8b732 | 10 | */ |
af170c50 DH |
11 | #ifndef VMX_H |
12 | #define VMX_H | |
6aa8b732 | 13 | |
26bf264e | 14 | |
62cc6b9d | 15 | #include <linux/bitops.h> |
3367eeab | 16 | #include <linux/bug.h> |
19b95dba | 17 | #include <linux/types.h> |
3367eeab | 18 | |
af170c50 | 19 | #include <uapi/asm/vmx.h> |
8df71934 | 20 | #include <asm/trapnr.h> |
b39033f5 SC |
21 | #include <asm/vmxfeatures.h> |
22 | ||
23 | #define VMCS_CONTROL_BIT(x) BIT(VMX_FEATURE_##x & 0x1f) | |
19b95dba | 24 | |
8a70cc3d ED |
25 | /* |
26 | * Definitions of Primary Processor-Based VM-Execution Controls. | |
27 | */ | |
bcfcff64 PB |
28 | #define CPU_BASED_INTR_WINDOW_EXITING VMCS_CONTROL_BIT(INTR_WINDOW_EXITING) |
29 | #define CPU_BASED_USE_TSC_OFFSETTING VMCS_CONTROL_BIT(USE_TSC_OFFSETTING) | |
b39033f5 SC |
30 | #define CPU_BASED_HLT_EXITING VMCS_CONTROL_BIT(HLT_EXITING) |
31 | #define CPU_BASED_INVLPG_EXITING VMCS_CONTROL_BIT(INVLPG_EXITING) | |
32 | #define CPU_BASED_MWAIT_EXITING VMCS_CONTROL_BIT(MWAIT_EXITING) | |
33 | #define CPU_BASED_RDPMC_EXITING VMCS_CONTROL_BIT(RDPMC_EXITING) | |
34 | #define CPU_BASED_RDTSC_EXITING VMCS_CONTROL_BIT(RDTSC_EXITING) | |
35 | #define CPU_BASED_CR3_LOAD_EXITING VMCS_CONTROL_BIT(CR3_LOAD_EXITING) | |
36 | #define CPU_BASED_CR3_STORE_EXITING VMCS_CONTROL_BIT(CR3_STORE_EXITING) | |
1ad4e543 | 37 | #define CPU_BASED_ACTIVATE_TERTIARY_CONTROLS VMCS_CONTROL_BIT(TERTIARY_CONTROLS) |
b39033f5 SC |
38 | #define CPU_BASED_CR8_LOAD_EXITING VMCS_CONTROL_BIT(CR8_LOAD_EXITING) |
39 | #define CPU_BASED_CR8_STORE_EXITING VMCS_CONTROL_BIT(CR8_STORE_EXITING) | |
40 | #define CPU_BASED_TPR_SHADOW VMCS_CONTROL_BIT(VIRTUAL_TPR) | |
bcfcff64 | 41 | #define CPU_BASED_NMI_WINDOW_EXITING VMCS_CONTROL_BIT(NMI_WINDOW_EXITING) |
b39033f5 SC |
42 | #define CPU_BASED_MOV_DR_EXITING VMCS_CONTROL_BIT(MOV_DR_EXITING) |
43 | #define CPU_BASED_UNCOND_IO_EXITING VMCS_CONTROL_BIT(UNCOND_IO_EXITING) | |
44 | #define CPU_BASED_USE_IO_BITMAPS VMCS_CONTROL_BIT(USE_IO_BITMAPS) | |
45 | #define CPU_BASED_MONITOR_TRAP_FLAG VMCS_CONTROL_BIT(MONITOR_TRAP_FLAG) | |
46 | #define CPU_BASED_USE_MSR_BITMAPS VMCS_CONTROL_BIT(USE_MSR_BITMAPS) | |
47 | #define CPU_BASED_MONITOR_EXITING VMCS_CONTROL_BIT(MONITOR_EXITING) | |
48 | #define CPU_BASED_PAUSE_EXITING VMCS_CONTROL_BIT(PAUSE_EXITING) | |
49 | #define CPU_BASED_ACTIVATE_SECONDARY_CONTROLS VMCS_CONTROL_BIT(SEC_CONTROLS) | |
560b7ee1 JK |
50 | |
51 | #define CPU_BASED_ALWAYSON_WITHOUT_TRUE_MSR 0x0401e172 | |
52 | ||
8a70cc3d ED |
53 | /* |
54 | * Definitions of Secondary Processor-Based VM-Execution Controls. | |
55 | */ | |
b39033f5 SC |
56 | #define SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES VMCS_CONTROL_BIT(VIRT_APIC_ACCESSES) |
57 | #define SECONDARY_EXEC_ENABLE_EPT VMCS_CONTROL_BIT(EPT) | |
58 | #define SECONDARY_EXEC_DESC VMCS_CONTROL_BIT(DESC_EXITING) | |
7f3603b6 | 59 | #define SECONDARY_EXEC_ENABLE_RDTSCP VMCS_CONTROL_BIT(RDTSCP) |
b39033f5 SC |
60 | #define SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE VMCS_CONTROL_BIT(VIRTUAL_X2APIC) |
61 | #define SECONDARY_EXEC_ENABLE_VPID VMCS_CONTROL_BIT(VPID) | |
62 | #define SECONDARY_EXEC_WBINVD_EXITING VMCS_CONTROL_BIT(WBINVD_EXITING) | |
63 | #define SECONDARY_EXEC_UNRESTRICTED_GUEST VMCS_CONTROL_BIT(UNRESTRICTED_GUEST) | |
64 | #define SECONDARY_EXEC_APIC_REGISTER_VIRT VMCS_CONTROL_BIT(APIC_REGISTER_VIRT) | |
65 | #define SECONDARY_EXEC_VIRTUAL_INTR_DELIVERY VMCS_CONTROL_BIT(VIRT_INTR_DELIVERY) | |
66 | #define SECONDARY_EXEC_PAUSE_LOOP_EXITING VMCS_CONTROL_BIT(PAUSE_LOOP_EXITING) | |
67 | #define SECONDARY_EXEC_RDRAND_EXITING VMCS_CONTROL_BIT(RDRAND_EXITING) | |
68 | #define SECONDARY_EXEC_ENABLE_INVPCID VMCS_CONTROL_BIT(INVPCID) | |
69 | #define SECONDARY_EXEC_ENABLE_VMFUNC VMCS_CONTROL_BIT(VMFUNC) | |
70 | #define SECONDARY_EXEC_SHADOW_VMCS VMCS_CONTROL_BIT(SHADOW_VMCS) | |
71 | #define SECONDARY_EXEC_ENCLS_EXITING VMCS_CONTROL_BIT(ENCLS_EXITING) | |
72 | #define SECONDARY_EXEC_RDSEED_EXITING VMCS_CONTROL_BIT(RDSEED_EXITING) | |
73 | #define SECONDARY_EXEC_ENABLE_PML VMCS_CONTROL_BIT(PAGE_MOD_LOGGING) | |
74 | #define SECONDARY_EXEC_PT_CONCEAL_VMX VMCS_CONTROL_BIT(PT_CONCEAL_VMX) | |
662f6815 | 75 | #define SECONDARY_EXEC_ENABLE_XSAVES VMCS_CONTROL_BIT(XSAVES) |
b39033f5 SC |
76 | #define SECONDARY_EXEC_MODE_BASED_EPT_EXEC VMCS_CONTROL_BIT(MODE_BASED_EPT_EXEC) |
77 | #define SECONDARY_EXEC_PT_USE_GPA VMCS_CONTROL_BIT(PT_USE_GPA) | |
78 | #define SECONDARY_EXEC_TSC_SCALING VMCS_CONTROL_BIT(TSC_SCALING) | |
624e18f9 | 79 | #define SECONDARY_EXEC_ENABLE_USR_WAIT_PAUSE VMCS_CONTROL_BIT(USR_WAIT_PAUSE) |
fe6b6bc8 | 80 | #define SECONDARY_EXEC_BUS_LOCK_DETECTION VMCS_CONTROL_BIT(BUS_LOCK_DETECTION) |
2f4073e0 | 81 | #define SECONDARY_EXEC_NOTIFY_VM_EXITING VMCS_CONTROL_BIT(NOTIFY_VM_EXITING) |
6aa8b732 | 82 | |
d588bb9b CG |
83 | /* |
84 | * Definitions of Tertiary Processor-Based VM-Execution Controls. | |
85 | */ | |
86 | #define TERTIARY_EXEC_IPI_VIRT VMCS_CONTROL_BIT(IPI_VIRT) | |
87 | ||
b39033f5 SC |
88 | #define PIN_BASED_EXT_INTR_MASK VMCS_CONTROL_BIT(INTR_EXITING) |
89 | #define PIN_BASED_NMI_EXITING VMCS_CONTROL_BIT(NMI_EXITING) | |
90 | #define PIN_BASED_VIRTUAL_NMIS VMCS_CONTROL_BIT(VIRTUAL_NMIS) | |
91 | #define PIN_BASED_VMX_PREEMPTION_TIMER VMCS_CONTROL_BIT(PREEMPTION_TIMER) | |
92 | #define PIN_BASED_POSTED_INTR VMCS_CONTROL_BIT(POSTED_INTR) | |
6aa8b732 | 93 | |
eabeaacc JK |
94 | #define PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR 0x00000016 |
95 | ||
e4aa5288 | 96 | #define VM_EXIT_SAVE_DEBUG_CONTROLS 0x00000004 |
62b3ffb8 | 97 | #define VM_EXIT_HOST_ADDR_SPACE_SIZE 0x00000200 |
07c116d2 | 98 | #define VM_EXIT_LOAD_IA32_PERF_GLOBAL_CTRL 0x00001000 |
62b3ffb8 | 99 | #define VM_EXIT_ACK_INTR_ON_EXIT 0x00008000 |
468d472f SY |
100 | #define VM_EXIT_SAVE_IA32_PAT 0x00040000 |
101 | #define VM_EXIT_LOAD_IA32_PAT 0x00080000 | |
07c116d2 AK |
102 | #define VM_EXIT_SAVE_IA32_EFER 0x00100000 |
103 | #define VM_EXIT_LOAD_IA32_EFER 0x00200000 | |
104 | #define VM_EXIT_SAVE_VMX_PREEMPTION_TIMER 0x00400000 | |
da8999d3 | 105 | #define VM_EXIT_CLEAR_BNDCFGS 0x00800000 |
f99e3daf CP |
106 | #define VM_EXIT_PT_CONCEAL_PIP 0x01000000 |
107 | #define VM_EXIT_CLEAR_IA32_RTIT_CTL 0x02000000 | |
6aa8b732 | 108 | |
33fb20c3 JK |
109 | #define VM_EXIT_ALWAYSON_WITHOUT_TRUE_MSR 0x00036dff |
110 | ||
e4aa5288 | 111 | #define VM_ENTRY_LOAD_DEBUG_CONTROLS 0x00000004 |
62b3ffb8 YS |
112 | #define VM_ENTRY_IA32E_MODE 0x00000200 |
113 | #define VM_ENTRY_SMM 0x00000400 | |
114 | #define VM_ENTRY_DEACT_DUAL_MONITOR 0x00000800 | |
07c116d2 | 115 | #define VM_ENTRY_LOAD_IA32_PERF_GLOBAL_CTRL 0x00002000 |
468d472f | 116 | #define VM_ENTRY_LOAD_IA32_PAT 0x00004000 |
07c116d2 | 117 | #define VM_ENTRY_LOAD_IA32_EFER 0x00008000 |
da8999d3 | 118 | #define VM_ENTRY_LOAD_BNDCFGS 0x00010000 |
f99e3daf CP |
119 | #define VM_ENTRY_PT_CONCEAL_PIP 0x00020000 |
120 | #define VM_ENTRY_LOAD_IA32_RTIT_CTL 0x00040000 | |
62b3ffb8 | 121 | |
33fb20c3 JK |
122 | #define VM_ENTRY_ALWAYSON_WITHOUT_TRUE_MSR 0x000011ff |
123 | ||
0238ea91 | 124 | #define VMX_MISC_PREEMPTION_TIMER_RATE_MASK 0x0000001f |
c18911a2 | 125 | #define VMX_MISC_SAVE_EFER_LMA 0x00000020 |
6dfacadd | 126 | #define VMX_MISC_ACTIVITY_HLT 0x00000040 |
bf0cd88c | 127 | #define VMX_MISC_ACTIVITY_WAIT_SIPI 0x00000100 |
0447378a | 128 | #define VMX_MISC_ZERO_LEN_INS 0x40000000 |
f0b5105a | 129 | #define VMX_MISC_MSR_LIST_MULTIPLIER 512 |
c18911a2 | 130 | |
41ab9372 | 131 | /* VMFUNC functions */ |
b39033f5 SC |
132 | #define VMFUNC_CONTROL_BIT(x) BIT((VMX_FEATURE_##x & 0x1f) - 28) |
133 | ||
134 | #define VMX_VMFUNC_EPTP_SWITCHING VMFUNC_CONTROL_BIT(EPTP_SWITCHING) | |
41ab9372 BD |
135 | #define VMFUNC_EPTP_ENTRIES 512 |
136 | ||
62cc6b9d DM |
137 | static inline u32 vmx_basic_vmcs_revision_id(u64 vmx_basic) |
138 | { | |
139 | return vmx_basic & GENMASK_ULL(30, 0); | |
140 | } | |
141 | ||
142 | static inline u32 vmx_basic_vmcs_size(u64 vmx_basic) | |
143 | { | |
144 | return (vmx_basic & GENMASK_ULL(44, 32)) >> 32; | |
145 | } | |
146 | ||
147 | static inline int vmx_misc_preemption_timer_rate(u64 vmx_misc) | |
148 | { | |
149 | return vmx_misc & VMX_MISC_PREEMPTION_TIMER_RATE_MASK; | |
150 | } | |
151 | ||
152 | static inline int vmx_misc_cr3_count(u64 vmx_misc) | |
153 | { | |
154 | return (vmx_misc & GENMASK_ULL(24, 16)) >> 16; | |
155 | } | |
156 | ||
157 | static inline int vmx_misc_max_msr(u64 vmx_misc) | |
158 | { | |
159 | return (vmx_misc & GENMASK_ULL(27, 25)) >> 25; | |
160 | } | |
161 | ||
162 | static inline int vmx_misc_mseg_revid(u64 vmx_misc) | |
163 | { | |
164 | return (vmx_misc & GENMASK_ULL(63, 32)) >> 32; | |
165 | } | |
166 | ||
6aa8b732 AK |
167 | /* VMCS Encodings */ |
168 | enum vmcs_field { | |
2384d2b3 | 169 | VIRTUAL_PROCESSOR_ID = 0x00000000, |
01e439be | 170 | POSTED_INTR_NV = 0x00000002, |
d588bb9b | 171 | LAST_PID_POINTER_INDEX = 0x00000008, |
6aa8b732 AK |
172 | GUEST_ES_SELECTOR = 0x00000800, |
173 | GUEST_CS_SELECTOR = 0x00000802, | |
174 | GUEST_SS_SELECTOR = 0x00000804, | |
175 | GUEST_DS_SELECTOR = 0x00000806, | |
176 | GUEST_FS_SELECTOR = 0x00000808, | |
177 | GUEST_GS_SELECTOR = 0x0000080a, | |
178 | GUEST_LDTR_SELECTOR = 0x0000080c, | |
179 | GUEST_TR_SELECTOR = 0x0000080e, | |
c7c9c56c | 180 | GUEST_INTR_STATUS = 0x00000810, |
843e4330 | 181 | GUEST_PML_INDEX = 0x00000812, |
6aa8b732 AK |
182 | HOST_ES_SELECTOR = 0x00000c00, |
183 | HOST_CS_SELECTOR = 0x00000c02, | |
184 | HOST_SS_SELECTOR = 0x00000c04, | |
185 | HOST_DS_SELECTOR = 0x00000c06, | |
186 | HOST_FS_SELECTOR = 0x00000c08, | |
187 | HOST_GS_SELECTOR = 0x00000c0a, | |
188 | HOST_TR_SELECTOR = 0x00000c0c, | |
189 | IO_BITMAP_A = 0x00002000, | |
190 | IO_BITMAP_A_HIGH = 0x00002001, | |
191 | IO_BITMAP_B = 0x00002002, | |
192 | IO_BITMAP_B_HIGH = 0x00002003, | |
193 | MSR_BITMAP = 0x00002004, | |
194 | MSR_BITMAP_HIGH = 0x00002005, | |
195 | VM_EXIT_MSR_STORE_ADDR = 0x00002006, | |
196 | VM_EXIT_MSR_STORE_ADDR_HIGH = 0x00002007, | |
197 | VM_EXIT_MSR_LOAD_ADDR = 0x00002008, | |
198 | VM_EXIT_MSR_LOAD_ADDR_HIGH = 0x00002009, | |
199 | VM_ENTRY_MSR_LOAD_ADDR = 0x0000200a, | |
200 | VM_ENTRY_MSR_LOAD_ADDR_HIGH = 0x0000200b, | |
843e4330 KH |
201 | PML_ADDRESS = 0x0000200e, |
202 | PML_ADDRESS_HIGH = 0x0000200f, | |
6aa8b732 AK |
203 | TSC_OFFSET = 0x00002010, |
204 | TSC_OFFSET_HIGH = 0x00002011, | |
205 | VIRTUAL_APIC_PAGE_ADDR = 0x00002012, | |
206 | VIRTUAL_APIC_PAGE_ADDR_HIGH = 0x00002013, | |
f78e0e2e SY |
207 | APIC_ACCESS_ADDR = 0x00002014, |
208 | APIC_ACCESS_ADDR_HIGH = 0x00002015, | |
01e439be YZ |
209 | POSTED_INTR_DESC_ADDR = 0x00002016, |
210 | POSTED_INTR_DESC_ADDR_HIGH = 0x00002017, | |
2a499e49 BD |
211 | VM_FUNCTION_CONTROL = 0x00002018, |
212 | VM_FUNCTION_CONTROL_HIGH = 0x00002019, | |
d56f546d SY |
213 | EPT_POINTER = 0x0000201a, |
214 | EPT_POINTER_HIGH = 0x0000201b, | |
c7c9c56c YZ |
215 | EOI_EXIT_BITMAP0 = 0x0000201c, |
216 | EOI_EXIT_BITMAP0_HIGH = 0x0000201d, | |
217 | EOI_EXIT_BITMAP1 = 0x0000201e, | |
218 | EOI_EXIT_BITMAP1_HIGH = 0x0000201f, | |
219 | EOI_EXIT_BITMAP2 = 0x00002020, | |
220 | EOI_EXIT_BITMAP2_HIGH = 0x00002021, | |
221 | EOI_EXIT_BITMAP3 = 0x00002022, | |
222 | EOI_EXIT_BITMAP3_HIGH = 0x00002023, | |
41ab9372 BD |
223 | EPTP_LIST_ADDRESS = 0x00002024, |
224 | EPTP_LIST_ADDRESS_HIGH = 0x00002025, | |
89662e56 | 225 | VMREAD_BITMAP = 0x00002026, |
b348e793 | 226 | VMREAD_BITMAP_HIGH = 0x00002027, |
89662e56 | 227 | VMWRITE_BITMAP = 0x00002028, |
b348e793 | 228 | VMWRITE_BITMAP_HIGH = 0x00002029, |
f53cd63c WL |
229 | XSS_EXIT_BITMAP = 0x0000202C, |
230 | XSS_EXIT_BITMAP_HIGH = 0x0000202D, | |
802ec461 SC |
231 | ENCLS_EXITING_BITMAP = 0x0000202E, |
232 | ENCLS_EXITING_BITMAP_HIGH = 0x0000202F, | |
64903d61 HZ |
233 | TSC_MULTIPLIER = 0x00002032, |
234 | TSC_MULTIPLIER_HIGH = 0x00002033, | |
1ad4e543 RH |
235 | TERTIARY_VM_EXEC_CONTROL = 0x00002034, |
236 | TERTIARY_VM_EXEC_CONTROL_HIGH = 0x00002035, | |
d588bb9b CG |
237 | PID_POINTER_TABLE = 0x00002042, |
238 | PID_POINTER_TABLE_HIGH = 0x00002043, | |
d56f546d SY |
239 | GUEST_PHYSICAL_ADDRESS = 0x00002400, |
240 | GUEST_PHYSICAL_ADDRESS_HIGH = 0x00002401, | |
6aa8b732 AK |
241 | VMCS_LINK_POINTER = 0x00002800, |
242 | VMCS_LINK_POINTER_HIGH = 0x00002801, | |
243 | GUEST_IA32_DEBUGCTL = 0x00002802, | |
244 | GUEST_IA32_DEBUGCTL_HIGH = 0x00002803, | |
468d472f SY |
245 | GUEST_IA32_PAT = 0x00002804, |
246 | GUEST_IA32_PAT_HIGH = 0x00002805, | |
5dfa3d17 AK |
247 | GUEST_IA32_EFER = 0x00002806, |
248 | GUEST_IA32_EFER_HIGH = 0x00002807, | |
4704d0be NHE |
249 | GUEST_IA32_PERF_GLOBAL_CTRL = 0x00002808, |
250 | GUEST_IA32_PERF_GLOBAL_CTRL_HIGH= 0x00002809, | |
d56f546d SY |
251 | GUEST_PDPTR0 = 0x0000280a, |
252 | GUEST_PDPTR0_HIGH = 0x0000280b, | |
253 | GUEST_PDPTR1 = 0x0000280c, | |
254 | GUEST_PDPTR1_HIGH = 0x0000280d, | |
255 | GUEST_PDPTR2 = 0x0000280e, | |
256 | GUEST_PDPTR2_HIGH = 0x0000280f, | |
257 | GUEST_PDPTR3 = 0x00002810, | |
258 | GUEST_PDPTR3_HIGH = 0x00002811, | |
da8999d3 LJ |
259 | GUEST_BNDCFGS = 0x00002812, |
260 | GUEST_BNDCFGS_HIGH = 0x00002813, | |
f99e3daf CP |
261 | GUEST_IA32_RTIT_CTL = 0x00002814, |
262 | GUEST_IA32_RTIT_CTL_HIGH = 0x00002815, | |
468d472f SY |
263 | HOST_IA32_PAT = 0x00002c00, |
264 | HOST_IA32_PAT_HIGH = 0x00002c01, | |
5dfa3d17 AK |
265 | HOST_IA32_EFER = 0x00002c02, |
266 | HOST_IA32_EFER_HIGH = 0x00002c03, | |
4704d0be NHE |
267 | HOST_IA32_PERF_GLOBAL_CTRL = 0x00002c04, |
268 | HOST_IA32_PERF_GLOBAL_CTRL_HIGH = 0x00002c05, | |
6aa8b732 AK |
269 | PIN_BASED_VM_EXEC_CONTROL = 0x00004000, |
270 | CPU_BASED_VM_EXEC_CONTROL = 0x00004002, | |
271 | EXCEPTION_BITMAP = 0x00004004, | |
272 | PAGE_FAULT_ERROR_CODE_MASK = 0x00004006, | |
273 | PAGE_FAULT_ERROR_CODE_MATCH = 0x00004008, | |
274 | CR3_TARGET_COUNT = 0x0000400a, | |
275 | VM_EXIT_CONTROLS = 0x0000400c, | |
276 | VM_EXIT_MSR_STORE_COUNT = 0x0000400e, | |
277 | VM_EXIT_MSR_LOAD_COUNT = 0x00004010, | |
278 | VM_ENTRY_CONTROLS = 0x00004012, | |
279 | VM_ENTRY_MSR_LOAD_COUNT = 0x00004014, | |
280 | VM_ENTRY_INTR_INFO_FIELD = 0x00004016, | |
281 | VM_ENTRY_EXCEPTION_ERROR_CODE = 0x00004018, | |
282 | VM_ENTRY_INSTRUCTION_LEN = 0x0000401a, | |
283 | TPR_THRESHOLD = 0x0000401c, | |
284 | SECONDARY_VM_EXEC_CONTROL = 0x0000401e, | |
4b8d54f9 ZE |
285 | PLE_GAP = 0x00004020, |
286 | PLE_WINDOW = 0x00004022, | |
2f4073e0 | 287 | NOTIFY_WINDOW = 0x00004024, |
6aa8b732 AK |
288 | VM_INSTRUCTION_ERROR = 0x00004400, |
289 | VM_EXIT_REASON = 0x00004402, | |
290 | VM_EXIT_INTR_INFO = 0x00004404, | |
291 | VM_EXIT_INTR_ERROR_CODE = 0x00004406, | |
292 | IDT_VECTORING_INFO_FIELD = 0x00004408, | |
293 | IDT_VECTORING_ERROR_CODE = 0x0000440a, | |
294 | VM_EXIT_INSTRUCTION_LEN = 0x0000440c, | |
295 | VMX_INSTRUCTION_INFO = 0x0000440e, | |
296 | GUEST_ES_LIMIT = 0x00004800, | |
297 | GUEST_CS_LIMIT = 0x00004802, | |
298 | GUEST_SS_LIMIT = 0x00004804, | |
299 | GUEST_DS_LIMIT = 0x00004806, | |
300 | GUEST_FS_LIMIT = 0x00004808, | |
301 | GUEST_GS_LIMIT = 0x0000480a, | |
302 | GUEST_LDTR_LIMIT = 0x0000480c, | |
303 | GUEST_TR_LIMIT = 0x0000480e, | |
304 | GUEST_GDTR_LIMIT = 0x00004810, | |
305 | GUEST_IDTR_LIMIT = 0x00004812, | |
306 | GUEST_ES_AR_BYTES = 0x00004814, | |
307 | GUEST_CS_AR_BYTES = 0x00004816, | |
308 | GUEST_SS_AR_BYTES = 0x00004818, | |
309 | GUEST_DS_AR_BYTES = 0x0000481a, | |
310 | GUEST_FS_AR_BYTES = 0x0000481c, | |
311 | GUEST_GS_AR_BYTES = 0x0000481e, | |
312 | GUEST_LDTR_AR_BYTES = 0x00004820, | |
313 | GUEST_TR_AR_BYTES = 0x00004822, | |
314 | GUEST_INTERRUPTIBILITY_INFO = 0x00004824, | |
e779ce9d | 315 | GUEST_ACTIVITY_STATE = 0x00004826, |
6aa8b732 | 316 | GUEST_SYSENTER_CS = 0x0000482A, |
0238ea91 | 317 | VMX_PREEMPTION_TIMER_VALUE = 0x0000482E, |
6aa8b732 AK |
318 | HOST_IA32_SYSENTER_CS = 0x00004c00, |
319 | CR0_GUEST_HOST_MASK = 0x00006000, | |
320 | CR4_GUEST_HOST_MASK = 0x00006002, | |
321 | CR0_READ_SHADOW = 0x00006004, | |
322 | CR4_READ_SHADOW = 0x00006006, | |
323 | CR3_TARGET_VALUE0 = 0x00006008, | |
324 | CR3_TARGET_VALUE1 = 0x0000600a, | |
325 | CR3_TARGET_VALUE2 = 0x0000600c, | |
326 | CR3_TARGET_VALUE3 = 0x0000600e, | |
327 | EXIT_QUALIFICATION = 0x00006400, | |
328 | GUEST_LINEAR_ADDRESS = 0x0000640a, | |
329 | GUEST_CR0 = 0x00006800, | |
330 | GUEST_CR3 = 0x00006802, | |
331 | GUEST_CR4 = 0x00006804, | |
332 | GUEST_ES_BASE = 0x00006806, | |
333 | GUEST_CS_BASE = 0x00006808, | |
334 | GUEST_SS_BASE = 0x0000680a, | |
335 | GUEST_DS_BASE = 0x0000680c, | |
336 | GUEST_FS_BASE = 0x0000680e, | |
337 | GUEST_GS_BASE = 0x00006810, | |
338 | GUEST_LDTR_BASE = 0x00006812, | |
339 | GUEST_TR_BASE = 0x00006814, | |
340 | GUEST_GDTR_BASE = 0x00006816, | |
341 | GUEST_IDTR_BASE = 0x00006818, | |
342 | GUEST_DR7 = 0x0000681a, | |
343 | GUEST_RSP = 0x0000681c, | |
344 | GUEST_RIP = 0x0000681e, | |
345 | GUEST_RFLAGS = 0x00006820, | |
346 | GUEST_PENDING_DBG_EXCEPTIONS = 0x00006822, | |
347 | GUEST_SYSENTER_ESP = 0x00006824, | |
348 | GUEST_SYSENTER_EIP = 0x00006826, | |
349 | HOST_CR0 = 0x00006c00, | |
350 | HOST_CR3 = 0x00006c02, | |
351 | HOST_CR4 = 0x00006c04, | |
352 | HOST_FS_BASE = 0x00006c06, | |
353 | HOST_GS_BASE = 0x00006c08, | |
354 | HOST_TR_BASE = 0x00006c0a, | |
355 | HOST_GDTR_BASE = 0x00006c0c, | |
356 | HOST_IDTR_BASE = 0x00006c0e, | |
357 | HOST_IA32_SYSENTER_ESP = 0x00006c10, | |
358 | HOST_IA32_SYSENTER_EIP = 0x00006c12, | |
359 | HOST_RSP = 0x00006c14, | |
360 | HOST_RIP = 0x00006c16, | |
361 | }; | |
362 | ||
6aa8b732 AK |
363 | /* |
364 | * Interruption-information format | |
365 | */ | |
366 | #define INTR_INFO_VECTOR_MASK 0xff /* 7:0 */ | |
367 | #define INTR_INFO_INTR_TYPE_MASK 0x700 /* 10:8 */ | |
2e11384c | 368 | #define INTR_INFO_DELIVER_CODE_MASK 0x800 /* 11 */ |
f08864b4 | 369 | #define INTR_INFO_UNBLOCK_NMI 0x1000 /* 12 */ |
6aa8b732 | 370 | #define INTR_INFO_VALID_MASK 0x80000000 /* 31 */ |
f08864b4 | 371 | #define INTR_INFO_RESVD_BITS_MASK 0x7ffff000 |
6aa8b732 AK |
372 | |
373 | #define VECTORING_INFO_VECTOR_MASK INTR_INFO_VECTOR_MASK | |
374 | #define VECTORING_INFO_TYPE_MASK INTR_INFO_INTR_TYPE_MASK | |
2e11384c | 375 | #define VECTORING_INFO_DELIVER_CODE_MASK INTR_INFO_DELIVER_CODE_MASK |
6aa8b732 AK |
376 | #define VECTORING_INFO_VALID_MASK INTR_INFO_VALID_MASK |
377 | ||
8df71934 XL |
378 | #define INTR_TYPE_EXT_INTR (EVENT_TYPE_EXTINT << 8) /* external interrupt */ |
379 | #define INTR_TYPE_RESERVED (EVENT_TYPE_RESERVED << 8) /* reserved */ | |
380 | #define INTR_TYPE_NMI_INTR (EVENT_TYPE_NMI << 8) /* NMI */ | |
381 | #define INTR_TYPE_HARD_EXCEPTION (EVENT_TYPE_HWEXC << 8) /* processor exception */ | |
382 | #define INTR_TYPE_SOFT_INTR (EVENT_TYPE_SWINT << 8) /* software interrupt */ | |
383 | #define INTR_TYPE_PRIV_SW_EXCEPTION (EVENT_TYPE_PRIV_SWEXC << 8) /* ICE breakpoint */ | |
384 | #define INTR_TYPE_SOFT_EXCEPTION (EVENT_TYPE_SWEXC << 8) /* software exception */ | |
385 | #define INTR_TYPE_OTHER_EVENT (EVENT_TYPE_OTHER << 8) /* other event */ | |
6aa8b732 | 386 | |
f08864b4 SY |
387 | /* GUEST_INTERRUPTIBILITY_INFO flags. */ |
388 | #define GUEST_INTR_STATE_STI 0x00000001 | |
389 | #define GUEST_INTR_STATE_MOV_SS 0x00000002 | |
390 | #define GUEST_INTR_STATE_SMI 0x00000004 | |
391 | #define GUEST_INTR_STATE_NMI 0x00000008 | |
3c0c2ad1 | 392 | #define GUEST_INTR_STATE_ENCLAVE_INTR 0x00000010 |
f08864b4 | 393 | |
443381a8 AL |
394 | /* GUEST_ACTIVITY_STATE flags */ |
395 | #define GUEST_ACTIVITY_ACTIVE 0 | |
396 | #define GUEST_ACTIVITY_HLT 1 | |
397 | #define GUEST_ACTIVITY_SHUTDOWN 2 | |
398 | #define GUEST_ACTIVITY_WAIT_SIPI 3 | |
399 | ||
6aa8b732 AK |
400 | /* |
401 | * Exit Qualifications for MOV for Control Register Access | |
402 | */ | |
d77c26fc | 403 | #define CONTROL_REG_ACCESS_NUM 0x7 /* 2:0, number of control reg.*/ |
6aa8b732 | 404 | #define CONTROL_REG_ACCESS_TYPE 0x30 /* 5:4, access type */ |
d77c26fc | 405 | #define CONTROL_REG_ACCESS_REG 0xf00 /* 10:8, general purpose reg. */ |
6aa8b732 AK |
406 | #define LMSW_SOURCE_DATA_SHIFT 16 |
407 | #define LMSW_SOURCE_DATA (0xFFFF << LMSW_SOURCE_DATA_SHIFT) /* 16:31 lmsw source */ | |
408 | #define REG_EAX (0 << 8) | |
409 | #define REG_ECX (1 << 8) | |
410 | #define REG_EDX (2 << 8) | |
411 | #define REG_EBX (3 << 8) | |
412 | #define REG_ESP (4 << 8) | |
413 | #define REG_EBP (5 << 8) | |
414 | #define REG_ESI (6 << 8) | |
415 | #define REG_EDI (7 << 8) | |
416 | #define REG_R8 (8 << 8) | |
417 | #define REG_R9 (9 << 8) | |
418 | #define REG_R10 (10 << 8) | |
419 | #define REG_R11 (11 << 8) | |
420 | #define REG_R12 (12 << 8) | |
421 | #define REG_R13 (13 << 8) | |
422 | #define REG_R14 (14 << 8) | |
423 | #define REG_R15 (15 << 8) | |
424 | ||
425 | /* | |
426 | * Exit Qualifications for MOV for Debug Register Access | |
427 | */ | |
d77c26fc | 428 | #define DEBUG_REG_ACCESS_NUM 0x7 /* 2:0, number of debug reg. */ |
6aa8b732 AK |
429 | #define DEBUG_REG_ACCESS_TYPE 0x10 /* 4, direction of access */ |
430 | #define TYPE_MOV_TO_DR (0 << 4) | |
431 | #define TYPE_MOV_FROM_DR (1 << 4) | |
42dbaa5a | 432 | #define DEBUG_REG_ACCESS_REG(eq) (((eq) >> 8) & 0xf) /* 11:8, general purpose reg. */ |
6aa8b732 AK |
433 | |
434 | ||
58fbbf26 KT |
435 | /* |
436 | * Exit Qualifications for APIC-Access | |
437 | */ | |
438 | #define APIC_ACCESS_OFFSET 0xfff /* 11:0, offset within the APIC page */ | |
439 | #define APIC_ACCESS_TYPE 0xf000 /* 15:12, access type */ | |
440 | #define TYPE_LINEAR_APIC_INST_READ (0 << 12) | |
441 | #define TYPE_LINEAR_APIC_INST_WRITE (1 << 12) | |
442 | #define TYPE_LINEAR_APIC_INST_FETCH (2 << 12) | |
443 | #define TYPE_LINEAR_APIC_EVENT (3 << 12) | |
444 | #define TYPE_PHYSICAL_APIC_EVENT (10 << 12) | |
445 | #define TYPE_PHYSICAL_APIC_INST (15 << 12) | |
446 | ||
4d283ec9 AL |
447 | /* segment AR in VMCS -- these are different from what LAR reports */ |
448 | #define VMX_SEGMENT_AR_L_MASK (1 << 13) | |
6aa8b732 | 449 | |
4d283ec9 AL |
450 | #define VMX_AR_TYPE_ACCESSES_MASK 1 |
451 | #define VMX_AR_TYPE_READABLE_MASK (1 << 1) | |
452 | #define VMX_AR_TYPE_WRITEABLE_MASK (1 << 2) | |
453 | #define VMX_AR_TYPE_CODE_MASK (1 << 3) | |
454 | #define VMX_AR_TYPE_MASK 0x0f | |
455 | #define VMX_AR_TYPE_BUSY_64_TSS 11 | |
456 | #define VMX_AR_TYPE_BUSY_32_TSS 11 | |
457 | #define VMX_AR_TYPE_BUSY_16_TSS 3 | |
458 | #define VMX_AR_TYPE_LDT 2 | |
6aa8b732 | 459 | |
4d283ec9 AL |
460 | #define VMX_AR_UNUSABLE_MASK (1 << 16) |
461 | #define VMX_AR_S_MASK (1 << 4) | |
462 | #define VMX_AR_P_MASK (1 << 7) | |
463 | #define VMX_AR_L_MASK (1 << 13) | |
464 | #define VMX_AR_DB_MASK (1 << 14) | |
465 | #define VMX_AR_G_MASK (1 << 15) | |
466 | #define VMX_AR_DPL_SHIFT 5 | |
467 | #define VMX_AR_DPL(ar) (((ar) >> VMX_AR_DPL_SHIFT) & 3) | |
6aa8b732 | 468 | |
4d283ec9 | 469 | #define VMX_AR_RESERVD_MASK 0xfffe0f00 |
6aa8b732 | 470 | |
bbacc0c1 AW |
471 | #define TSS_PRIVATE_MEMSLOT (KVM_USER_MEM_SLOTS + 0) |
472 | #define APIC_ACCESS_PAGE_PRIVATE_MEMSLOT (KVM_USER_MEM_SLOTS + 1) | |
473 | #define IDENTITY_PAGETABLE_PRIVATE_MEMSLOT (KVM_USER_MEM_SLOTS + 2) | |
f78e0e2e | 474 | |
2384d2b3 | 475 | #define VMX_NR_VPIDS (1 << 16) |
63f3ac48 | 476 | #define VMX_VPID_EXTENT_INDIVIDUAL_ADDR 0 |
2384d2b3 SY |
477 | #define VMX_VPID_EXTENT_SINGLE_CONTEXT 1 |
478 | #define VMX_VPID_EXTENT_ALL_CONTEXT 2 | |
63f3ac48 | 479 | #define VMX_VPID_EXTENT_SINGLE_NON_GLOBAL 3 |
2384d2b3 | 480 | |
d56f546d SY |
481 | #define VMX_EPT_EXTENT_CONTEXT 1 |
482 | #define VMX_EPT_EXTENT_GLOBAL 2 | |
bfd0a56b | 483 | #define VMX_EPT_EXTENT_SHIFT 24 |
e799794e MT |
484 | |
485 | #define VMX_EPT_EXECUTE_ONLY_BIT (1ull) | |
486 | #define VMX_EPT_PAGE_WALK_4_BIT (1ull << 6) | |
855feb67 | 487 | #define VMX_EPT_PAGE_WALK_5_BIT (1ull << 7) |
e799794e MT |
488 | #define VMX_EPTP_UC_BIT (1ull << 8) |
489 | #define VMX_EPTP_WB_BIT (1ull << 14) | |
490 | #define VMX_EPT_2MB_PAGE_BIT (1ull << 16) | |
878403b7 | 491 | #define VMX_EPT_1GB_PAGE_BIT (1ull << 17) |
bfd0a56b | 492 | #define VMX_EPT_INVEPT_BIT (1ull << 20) |
2b3c5cbc | 493 | #define VMX_EPT_AD_BIT (1ull << 21) |
d56f546d SY |
494 | #define VMX_EPT_EXTENT_CONTEXT_BIT (1ull << 25) |
495 | #define VMX_EPT_EXTENT_GLOBAL_BIT (1ull << 26) | |
e799794e | 496 | |
99b83ac8 | 497 | #define VMX_VPID_INVVPID_BIT (1ull << 0) /* (32 - 32) */ |
63f3ac48 | 498 | #define VMX_VPID_EXTENT_INDIVIDUAL_ADDR_BIT (1ull << 8) /* (40 - 32) */ |
518c8aee | 499 | #define VMX_VPID_EXTENT_SINGLE_CONTEXT_BIT (1ull << 9) /* (41 - 32) */ |
b9d762fa | 500 | #define VMX_VPID_EXTENT_GLOBAL_CONTEXT_BIT (1ull << 10) /* (42 - 32) */ |
63f3ac48 | 501 | #define VMX_VPID_EXTENT_SINGLE_NON_GLOBAL_BIT (1ull << 11) /* (43 - 32) */ |
518c8aee | 502 | |
1439442c | 503 | #define VMX_EPT_MT_EPTE_SHIFT 3 |
bb97a016 DH |
504 | #define VMX_EPTP_PWL_MASK 0x38ull |
505 | #define VMX_EPTP_PWL_4 0x18ull | |
855feb67 | 506 | #define VMX_EPTP_PWL_5 0x20ull |
bb97a016 DH |
507 | #define VMX_EPTP_AD_ENABLE_BIT (1ull << 6) |
508 | #define VMX_EPTP_MT_MASK 0x7ull | |
509 | #define VMX_EPTP_MT_WB 0x6ull | |
510 | #define VMX_EPTP_MT_UC 0x0ull | |
1439442c SY |
511 | #define VMX_EPT_READABLE_MASK 0x1ull |
512 | #define VMX_EPT_WRITABLE_MASK 0x2ull | |
513 | #define VMX_EPT_EXECUTABLE_MASK 0x4ull | |
a19a6d11 | 514 | #define VMX_EPT_IPAT_BIT (1ull << 6) |
37f0e8fe JS |
515 | #define VMX_EPT_ACCESS_BIT (1ull << 8) |
516 | #define VMX_EPT_DIRTY_BIT (1ull << 9) | |
f160c7b7 JS |
517 | #define VMX_EPT_RWX_MASK (VMX_EPT_READABLE_MASK | \ |
518 | VMX_EPT_WRITABLE_MASK | \ | |
519 | VMX_EPT_EXECUTABLE_MASK) | |
520 | #define VMX_EPT_MT_MASK (7ull << VMX_EPT_MT_EPTE_SHIFT) | |
37f0e8fe | 521 | |
bb1fcc70 SC |
522 | static inline u8 vmx_eptp_page_walk_level(u64 eptp) |
523 | { | |
524 | u64 encoded_level = eptp & VMX_EPTP_PWL_MASK; | |
525 | ||
526 | if (encoded_level == VMX_EPTP_PWL_5) | |
527 | return 5; | |
528 | ||
529 | /* @eptp must be pre-validated by the caller. */ | |
530 | WARN_ON_ONCE(encoded_level != VMX_EPTP_PWL_4); | |
531 | return 4; | |
532 | } | |
533 | ||
37f0e8fe | 534 | /* The mask to use to trigger an EPT Misconfiguration in order to track MMIO */ |
f160c7b7 JS |
535 | #define VMX_EPT_MISCONFIG_WX_VALUE (VMX_EPT_WRITABLE_MASK | \ |
536 | VMX_EPT_EXECUTABLE_MASK) | |
d56f546d | 537 | |
b7ebfb05 SY |
538 | #define VMX_EPT_IDENTITY_PAGETABLE_ADDR 0xfffbc000ul |
539 | ||
19b95dba AK |
540 | struct vmx_msr_entry { |
541 | u32 index; | |
542 | u32 reserved; | |
543 | u64 value; | |
544 | } __aligned(16); | |
eca70fc5 | 545 | |
7c177938 NHE |
546 | /* |
547 | * Exit Qualifications for entry failure during or after loading guest state | |
548 | */ | |
68cda40d SC |
549 | enum vm_entry_failure_code { |
550 | ENTRY_FAIL_DEFAULT = 0, | |
551 | ENTRY_FAIL_PDPTE = 2, | |
552 | ENTRY_FAIL_NMI = 3, | |
553 | ENTRY_FAIL_VMCS_LINK_PTR = 4, | |
554 | }; | |
7c177938 | 555 | |
27959a44 JS |
556 | /* |
557 | * Exit Qualifications for EPT Violations | |
558 | */ | |
ab22a473 JS |
559 | #define EPT_VIOLATION_ACC_READ_BIT 0 |
560 | #define EPT_VIOLATION_ACC_WRITE_BIT 1 | |
561 | #define EPT_VIOLATION_ACC_INSTR_BIT 2 | |
ca2a7c22 | 562 | #define EPT_VIOLATION_RWX_SHIFT 3 |
aecce510 | 563 | #define EPT_VIOLATION_GVA_IS_VALID_BIT 7 |
ae1e2d10 | 564 | #define EPT_VIOLATION_GVA_TRANSLATED_BIT 8 |
ab22a473 JS |
565 | #define EPT_VIOLATION_ACC_READ (1 << EPT_VIOLATION_ACC_READ_BIT) |
566 | #define EPT_VIOLATION_ACC_WRITE (1 << EPT_VIOLATION_ACC_WRITE_BIT) | |
567 | #define EPT_VIOLATION_ACC_INSTR (1 << EPT_VIOLATION_ACC_INSTR_BIT) | |
ca2a7c22 | 568 | #define EPT_VIOLATION_RWX_MASK (VMX_EPT_RWX_MASK << EPT_VIOLATION_RWX_SHIFT) |
aecce510 | 569 | #define EPT_VIOLATION_GVA_IS_VALID (1 << EPT_VIOLATION_GVA_IS_VALID_BIT) |
ae1e2d10 | 570 | #define EPT_VIOLATION_GVA_TRANSLATED (1 << EPT_VIOLATION_GVA_TRANSLATED_BIT) |
27959a44 | 571 | |
2f4073e0 TX |
572 | /* |
573 | * Exit Qualifications for NOTIFY VM EXIT | |
574 | */ | |
575 | #define NOTIFY_VM_CONTEXT_INVALID BIT(0) | |
576 | ||
0140caea NHE |
577 | /* |
578 | * VM-instruction error numbers | |
579 | */ | |
580 | enum vm_instruction_error_number { | |
581 | VMXERR_VMCALL_IN_VMX_ROOT_OPERATION = 1, | |
582 | VMXERR_VMCLEAR_INVALID_ADDRESS = 2, | |
583 | VMXERR_VMCLEAR_VMXON_POINTER = 3, | |
584 | VMXERR_VMLAUNCH_NONCLEAR_VMCS = 4, | |
585 | VMXERR_VMRESUME_NONLAUNCHED_VMCS = 5, | |
586 | VMXERR_VMRESUME_AFTER_VMXOFF = 6, | |
587 | VMXERR_ENTRY_INVALID_CONTROL_FIELD = 7, | |
588 | VMXERR_ENTRY_INVALID_HOST_STATE_FIELD = 8, | |
589 | VMXERR_VMPTRLD_INVALID_ADDRESS = 9, | |
590 | VMXERR_VMPTRLD_VMXON_POINTER = 10, | |
591 | VMXERR_VMPTRLD_INCORRECT_VMCS_REVISION_ID = 11, | |
592 | VMXERR_UNSUPPORTED_VMCS_COMPONENT = 12, | |
593 | VMXERR_VMWRITE_READ_ONLY_VMCS_COMPONENT = 13, | |
594 | VMXERR_VMXON_IN_VMX_ROOT_OPERATION = 15, | |
595 | VMXERR_ENTRY_INVALID_EXECUTIVE_VMCS_POINTER = 16, | |
596 | VMXERR_ENTRY_NONLAUNCHED_EXECUTIVE_VMCS = 17, | |
597 | VMXERR_ENTRY_EXECUTIVE_VMCS_POINTER_NOT_VMXON_POINTER = 18, | |
598 | VMXERR_VMCALL_NONCLEAR_VMCS = 19, | |
599 | VMXERR_VMCALL_INVALID_VM_EXIT_CONTROL_FIELDS = 20, | |
600 | VMXERR_VMCALL_INCORRECT_MSEG_REVISION_ID = 22, | |
601 | VMXERR_VMXOFF_UNDER_DUAL_MONITOR_TREATMENT_OF_SMIS_AND_SMM = 23, | |
602 | VMXERR_VMCALL_INVALID_SMM_MONITOR_FEATURES = 24, | |
603 | VMXERR_ENTRY_INVALID_VM_EXECUTION_CONTROL_FIELDS_IN_EXECUTIVE_VMCS = 25, | |
604 | VMXERR_ENTRY_EVENTS_BLOCKED_BY_MOV_SS = 26, | |
605 | VMXERR_INVALID_OPERAND_TO_INVEPT_INVVPID = 28, | |
606 | }; | |
607 | ||
380e0055 SC |
608 | /* |
609 | * VM-instruction errors that can be encountered on VM-Enter, used to trace | |
610 | * nested VM-Enter failures reported by hardware. Errors unique to VM-Enter | |
611 | * from a SMI Transfer Monitor are not included as things have gone seriously | |
612 | * sideways if we get one of those... | |
613 | */ | |
614 | #define VMX_VMENTER_INSTRUCTION_ERRORS \ | |
615 | { VMXERR_VMLAUNCH_NONCLEAR_VMCS, "VMLAUNCH_NONCLEAR_VMCS" }, \ | |
616 | { VMXERR_VMRESUME_NONLAUNCHED_VMCS, "VMRESUME_NONLAUNCHED_VMCS" }, \ | |
617 | { VMXERR_VMRESUME_AFTER_VMXOFF, "VMRESUME_AFTER_VMXOFF" }, \ | |
618 | { VMXERR_ENTRY_INVALID_CONTROL_FIELD, "VMENTRY_INVALID_CONTROL_FIELD" }, \ | |
619 | { VMXERR_ENTRY_INVALID_HOST_STATE_FIELD, "VMENTRY_INVALID_HOST_STATE_FIELD" }, \ | |
620 | { VMXERR_ENTRY_EVENTS_BLOCKED_BY_MOV_SS, "VMENTRY_EVENTS_BLOCKED_BY_MOV_SS" } | |
621 | ||
72c6d2db TG |
622 | enum vmx_l1d_flush_state { |
623 | VMENTER_L1D_FLUSH_AUTO, | |
624 | VMENTER_L1D_FLUSH_NEVER, | |
625 | VMENTER_L1D_FLUSH_COND, | |
626 | VMENTER_L1D_FLUSH_ALWAYS, | |
a7b9020b | 627 | VMENTER_L1D_FLUSH_EPT_DISABLED, |
8e0b2b91 | 628 | VMENTER_L1D_FLUSH_NOT_REQUIRED, |
72c6d2db TG |
629 | }; |
630 | ||
631 | extern enum vmx_l1d_flush_state l1tf_vmx_mitigation; | |
632 | ||
6aa8b732 | 633 | #endif |