Merge branch 'kvm-ppc-next' of git://git.kernel.org/pub/scm/linux/kernel/git/paulus...
[linux-2.6-block.git] / arch / x86 / kvm / lapic.c
CommitLineData
97222cc8
ED
1
2/*
3 * Local APIC virtualization
4 *
5 * Copyright (C) 2006 Qumranet, Inc.
6 * Copyright (C) 2007 Novell
7 * Copyright (C) 2007 Intel
9611c187 8 * Copyright 2009 Red Hat, Inc. and/or its affiliates.
97222cc8
ED
9 *
10 * Authors:
11 * Dor Laor <dor.laor@qumranet.com>
12 * Gregory Haskins <ghaskins@novell.com>
13 * Yaozu (Eddie) Dong <eddie.dong@intel.com>
14 *
15 * Based on Xen 3.1 code, Copyright (c) 2004, Intel Corporation.
16 *
17 * This work is licensed under the terms of the GNU GPL, version 2. See
18 * the COPYING file in the top-level directory.
19 */
20
edf88417 21#include <linux/kvm_host.h>
97222cc8
ED
22#include <linux/kvm.h>
23#include <linux/mm.h>
24#include <linux/highmem.h>
25#include <linux/smp.h>
26#include <linux/hrtimer.h>
27#include <linux/io.h>
28#include <linux/module.h>
6f6d6a1a 29#include <linux/math64.h>
5a0e3ad6 30#include <linux/slab.h>
97222cc8
ED
31#include <asm/processor.h>
32#include <asm/msr.h>
33#include <asm/page.h>
34#include <asm/current.h>
35#include <asm/apicdef.h>
d0659d94 36#include <asm/delay.h>
60063497 37#include <linux/atomic.h>
c5cc421b 38#include <linux/jump_label.h>
5fdbf976 39#include "kvm_cache_regs.h"
97222cc8 40#include "irq.h"
229456fc 41#include "trace.h"
fc61b800 42#include "x86.h"
00b27a3e 43#include "cpuid.h"
5c919412 44#include "hyperv.h"
97222cc8 45
b682b814
MT
46#ifndef CONFIG_X86_64
47#define mod_64(x, y) ((x) - (y) * div64_u64(x, y))
48#else
49#define mod_64(x, y) ((x) % (y))
50#endif
51
97222cc8
ED
52#define PRId64 "d"
53#define PRIx64 "llx"
54#define PRIu64 "u"
55#define PRIo64 "o"
56
57#define APIC_BUS_CYCLE_NS 1
58
59/* #define apic_debug(fmt,arg...) printk(KERN_WARNING fmt,##arg) */
60#define apic_debug(fmt, arg...)
61
62#define APIC_LVT_NUM 6
63/* 14 is the version for Xeon and Pentium 8.4.8*/
64#define APIC_VERSION (0x14UL | ((APIC_LVT_NUM - 1) << 16))
65#define LAPIC_MMIO_LENGTH (1 << 12)
66/* followed define is not in apicdef.h */
67#define APIC_SHORT_MASK 0xc0000
68#define APIC_DEST_NOSHORT 0x0
69#define APIC_DEST_MASK 0x800
70#define MAX_APIC_VECTOR 256
ecba9a52 71#define APIC_VECTORS_PER_REG 32
97222cc8 72
394457a9
NA
73#define APIC_BROADCAST 0xFF
74#define X2APIC_BROADCAST 0xFFFFFFFFul
75
97222cc8
ED
76#define VEC_POS(v) ((v) & (32 - 1))
77#define REG_POS(v) (((v) >> 5) << 4)
ad312c7c 78
97222cc8
ED
79static inline void apic_set_reg(struct kvm_lapic *apic, int reg_off, u32 val)
80{
81 *((u32 *) (apic->regs + reg_off)) = val;
82}
83
a0c9a822
MT
84static inline int apic_test_vector(int vec, void *bitmap)
85{
86 return test_bit(VEC_POS(vec), (bitmap) + REG_POS(vec));
87}
88
10606919
YZ
89bool kvm_apic_pending_eoi(struct kvm_vcpu *vcpu, int vector)
90{
91 struct kvm_lapic *apic = vcpu->arch.apic;
92
93 return apic_test_vector(vector, apic->regs + APIC_ISR) ||
94 apic_test_vector(vector, apic->regs + APIC_IRR);
95}
96
97222cc8
ED
97static inline void apic_set_vector(int vec, void *bitmap)
98{
99 set_bit(VEC_POS(vec), (bitmap) + REG_POS(vec));
100}
101
102static inline void apic_clear_vector(int vec, void *bitmap)
103{
104 clear_bit(VEC_POS(vec), (bitmap) + REG_POS(vec));
105}
106
8680b94b
MT
107static inline int __apic_test_and_set_vector(int vec, void *bitmap)
108{
109 return __test_and_set_bit(VEC_POS(vec), (bitmap) + REG_POS(vec));
110}
111
112static inline int __apic_test_and_clear_vector(int vec, void *bitmap)
113{
114 return __test_and_clear_bit(VEC_POS(vec), (bitmap) + REG_POS(vec));
115}
116
c5cc421b 117struct static_key_deferred apic_hw_disabled __read_mostly;
f8c1ea10
GN
118struct static_key_deferred apic_sw_disabled __read_mostly;
119
97222cc8
ED
120static inline int apic_enabled(struct kvm_lapic *apic)
121{
c48f1496 122 return kvm_apic_sw_enabled(apic) && kvm_apic_hw_enabled(apic);
54e9818f
GN
123}
124
97222cc8
ED
125#define LVT_MASK \
126 (APIC_LVT_MASKED | APIC_SEND_PENDING | APIC_VECTOR_MASK)
127
128#define LINT_MASK \
129 (LVT_MASK | APIC_MODE_MASK | APIC_INPUT_POLARITY | \
130 APIC_LVT_REMOTE_IRR | APIC_LVT_LEVEL_TRIGGER)
131
3548a259
RK
132/* The logical map is definitely wrong if we have multiple
133 * modes at the same time. (Physical map is always right.)
134 */
135static inline bool kvm_apic_logical_map_valid(struct kvm_apic_map *map)
136{
137 return !(map->mode & (map->mode - 1));
138}
139
3b5a5ffa
RK
140static inline void
141apic_logical_id(struct kvm_apic_map *map, u32 dest_id, u16 *cid, u16 *lid)
142{
143 unsigned lid_bits;
144
145 BUILD_BUG_ON(KVM_APIC_MODE_XAPIC_CLUSTER != 4);
146 BUILD_BUG_ON(KVM_APIC_MODE_XAPIC_FLAT != 8);
147 BUILD_BUG_ON(KVM_APIC_MODE_X2APIC != 16);
148 lid_bits = map->mode;
149
150 *cid = dest_id >> lid_bits;
151 *lid = dest_id & ((1 << lid_bits) - 1);
152}
153
1e08ec4a
GN
154static void recalculate_apic_map(struct kvm *kvm)
155{
156 struct kvm_apic_map *new, *old = NULL;
157 struct kvm_vcpu *vcpu;
158 int i;
159
160 new = kzalloc(sizeof(struct kvm_apic_map), GFP_KERNEL);
161
162 mutex_lock(&kvm->arch.apic_map_lock);
163
164 if (!new)
165 goto out;
166
173beedc
NA
167 kvm_for_each_vcpu(i, vcpu, kvm) {
168 struct kvm_lapic *apic = vcpu->arch.apic;
169 u16 cid, lid;
25995e5b 170 u32 ldr, aid;
1e08ec4a 171
df04d1d1
RK
172 if (!kvm_apic_present(vcpu))
173 continue;
174
25995e5b 175 aid = kvm_apic_id(apic);
1e08ec4a 176 ldr = kvm_apic_get_reg(apic, APIC_LDR);
1e08ec4a 177
25995e5b
RK
178 if (aid < ARRAY_SIZE(new->phys_map))
179 new->phys_map[aid] = apic;
3548a259 180
3b5a5ffa
RK
181 if (apic_x2apic_mode(apic)) {
182 new->mode |= KVM_APIC_MODE_X2APIC;
183 } else if (ldr) {
184 ldr = GET_APIC_LOGICAL_ID(ldr);
185 if (kvm_apic_get_reg(apic, APIC_DFR) == APIC_DFR_FLAT)
186 new->mode |= KVM_APIC_MODE_XAPIC_FLAT;
187 else
188 new->mode |= KVM_APIC_MODE_XAPIC_CLUSTER;
189 }
190
191 if (!kvm_apic_logical_map_valid(new))
3548a259
RK
192 continue;
193
3b5a5ffa
RK
194 apic_logical_id(new, ldr, &cid, &lid);
195
25995e5b 196 if (lid && cid < ARRAY_SIZE(new->logical_map))
1e08ec4a
GN
197 new->logical_map[cid][ffs(lid) - 1] = apic;
198 }
199out:
200 old = rcu_dereference_protected(kvm->arch.apic_map,
201 lockdep_is_held(&kvm->arch.apic_map_lock));
202 rcu_assign_pointer(kvm->arch.apic_map, new);
203 mutex_unlock(&kvm->arch.apic_map_lock);
204
205 if (old)
206 kfree_rcu(old, rcu);
c7c9c56c 207
b053b2ae 208 kvm_make_scan_ioapic_request(kvm);
1e08ec4a
GN
209}
210
1e1b6c26
NA
211static inline void apic_set_spiv(struct kvm_lapic *apic, u32 val)
212{
e462755c 213 bool enabled = val & APIC_SPIV_APIC_ENABLED;
1e1b6c26
NA
214
215 apic_set_reg(apic, APIC_SPIV, val);
e462755c
RK
216
217 if (enabled != apic->sw_enabled) {
218 apic->sw_enabled = enabled;
219 if (enabled) {
1e1b6c26
NA
220 static_key_slow_dec_deferred(&apic_sw_disabled);
221 recalculate_apic_map(apic->vcpu->kvm);
222 } else
223 static_key_slow_inc(&apic_sw_disabled.key);
224 }
225}
226
1e08ec4a
GN
227static inline void kvm_apic_set_id(struct kvm_lapic *apic, u8 id)
228{
229 apic_set_reg(apic, APIC_ID, id << 24);
230 recalculate_apic_map(apic->vcpu->kvm);
231}
232
233static inline void kvm_apic_set_ldr(struct kvm_lapic *apic, u32 id)
234{
235 apic_set_reg(apic, APIC_LDR, id);
236 recalculate_apic_map(apic->vcpu->kvm);
237}
238
257b9a5f
RK
239static inline void kvm_apic_set_x2apic_id(struct kvm_lapic *apic, u8 id)
240{
241 u32 ldr = ((id >> 4) << 16) | (1 << (id & 0xf));
242
243 apic_set_reg(apic, APIC_ID, id << 24);
244 apic_set_reg(apic, APIC_LDR, ldr);
245 recalculate_apic_map(apic->vcpu->kvm);
246}
247
97222cc8
ED
248static inline int apic_lvt_enabled(struct kvm_lapic *apic, int lvt_type)
249{
c48f1496 250 return !(kvm_apic_get_reg(apic, lvt_type) & APIC_LVT_MASKED);
97222cc8
ED
251}
252
253static inline int apic_lvt_vector(struct kvm_lapic *apic, int lvt_type)
254{
c48f1496 255 return kvm_apic_get_reg(apic, lvt_type) & APIC_VECTOR_MASK;
97222cc8
ED
256}
257
a3e06bbe
LJ
258static inline int apic_lvtt_oneshot(struct kvm_lapic *apic)
259{
f30ebc31 260 return apic->lapic_timer.timer_mode == APIC_LVT_TIMER_ONESHOT;
a3e06bbe
LJ
261}
262
97222cc8
ED
263static inline int apic_lvtt_period(struct kvm_lapic *apic)
264{
f30ebc31 265 return apic->lapic_timer.timer_mode == APIC_LVT_TIMER_PERIODIC;
a3e06bbe
LJ
266}
267
268static inline int apic_lvtt_tscdeadline(struct kvm_lapic *apic)
269{
f30ebc31 270 return apic->lapic_timer.timer_mode == APIC_LVT_TIMER_TSCDEADLINE;
97222cc8
ED
271}
272
cc6e462c
JK
273static inline int apic_lvt_nmi_mode(u32 lvt_val)
274{
275 return (lvt_val & (APIC_MODE_MASK | APIC_LVT_MASKED)) == APIC_DM_NMI;
276}
277
fc61b800
GN
278void kvm_apic_set_version(struct kvm_vcpu *vcpu)
279{
280 struct kvm_lapic *apic = vcpu->arch.apic;
281 struct kvm_cpuid_entry2 *feat;
282 u32 v = APIC_VERSION;
283
bce87cce 284 if (!lapic_in_kernel(vcpu))
fc61b800
GN
285 return;
286
287 feat = kvm_find_cpuid_entry(apic->vcpu, 0x1, 0);
288 if (feat && (feat->ecx & (1 << (X86_FEATURE_X2APIC & 31))))
289 v |= APIC_LVR_DIRECTED_EOI;
290 apic_set_reg(apic, APIC_LVR, v);
291}
292
f1d24831 293static const unsigned int apic_lvt_mask[APIC_LVT_NUM] = {
a3e06bbe 294 LVT_MASK , /* part LVTT mask, timer mode mask added at runtime */
97222cc8
ED
295 LVT_MASK | APIC_MODE_MASK, /* LVTTHMR */
296 LVT_MASK | APIC_MODE_MASK, /* LVTPC */
297 LINT_MASK, LINT_MASK, /* LVT0-1 */
298 LVT_MASK /* LVTERR */
299};
300
301static int find_highest_vector(void *bitmap)
302{
ecba9a52
TY
303 int vec;
304 u32 *reg;
97222cc8 305
ecba9a52
TY
306 for (vec = MAX_APIC_VECTOR - APIC_VECTORS_PER_REG;
307 vec >= 0; vec -= APIC_VECTORS_PER_REG) {
308 reg = bitmap + REG_POS(vec);
309 if (*reg)
310 return fls(*reg) - 1 + vec;
311 }
97222cc8 312
ecba9a52 313 return -1;
97222cc8
ED
314}
315
8680b94b
MT
316static u8 count_vectors(void *bitmap)
317{
ecba9a52
TY
318 int vec;
319 u32 *reg;
8680b94b 320 u8 count = 0;
ecba9a52
TY
321
322 for (vec = 0; vec < MAX_APIC_VECTOR; vec += APIC_VECTORS_PER_REG) {
323 reg = bitmap + REG_POS(vec);
324 count += hweight32(*reg);
325 }
326
8680b94b
MT
327 return count;
328}
329
705699a1 330void __kvm_apic_update_irr(u32 *pir, void *regs)
a20ed54d
YZ
331{
332 u32 i, pir_val;
a20ed54d
YZ
333
334 for (i = 0; i <= 7; i++) {
335 pir_val = xchg(&pir[i], 0);
336 if (pir_val)
705699a1 337 *((u32 *)(regs + APIC_IRR + i * 0x10)) |= pir_val;
a20ed54d
YZ
338 }
339}
705699a1
WV
340EXPORT_SYMBOL_GPL(__kvm_apic_update_irr);
341
342void kvm_apic_update_irr(struct kvm_vcpu *vcpu, u32 *pir)
343{
344 struct kvm_lapic *apic = vcpu->arch.apic;
345
346 __kvm_apic_update_irr(pir, apic->regs);
c77f3fab
RK
347
348 kvm_make_request(KVM_REQ_EVENT, vcpu);
705699a1 349}
a20ed54d
YZ
350EXPORT_SYMBOL_GPL(kvm_apic_update_irr);
351
11f5cc05 352static inline void apic_set_irr(int vec, struct kvm_lapic *apic)
97222cc8 353{
11f5cc05 354 apic_set_vector(vec, apic->regs + APIC_IRR);
f210f757
NA
355 /*
356 * irr_pending must be true if any interrupt is pending; set it after
357 * APIC_IRR to avoid race with apic_clear_irr
358 */
359 apic->irr_pending = true;
97222cc8
ED
360}
361
33e4c686 362static inline int apic_search_irr(struct kvm_lapic *apic)
97222cc8 363{
33e4c686 364 return find_highest_vector(apic->regs + APIC_IRR);
97222cc8
ED
365}
366
367static inline int apic_find_highest_irr(struct kvm_lapic *apic)
368{
369 int result;
370
c7c9c56c
YZ
371 /*
372 * Note that irr_pending is just a hint. It will be always
373 * true with virtual interrupt delivery enabled.
374 */
33e4c686
GN
375 if (!apic->irr_pending)
376 return -1;
377
d62caabb
AS
378 if (apic->vcpu->arch.apicv_active)
379 kvm_x86_ops->sync_pir_to_irr(apic->vcpu);
33e4c686 380 result = apic_search_irr(apic);
97222cc8
ED
381 ASSERT(result == -1 || result >= 16);
382
383 return result;
384}
385
33e4c686
GN
386static inline void apic_clear_irr(int vec, struct kvm_lapic *apic)
387{
56cc2406
WL
388 struct kvm_vcpu *vcpu;
389
390 vcpu = apic->vcpu;
391
d62caabb 392 if (unlikely(vcpu->arch.apicv_active)) {
56cc2406 393 /* try to update RVI */
f210f757 394 apic_clear_vector(vec, apic->regs + APIC_IRR);
56cc2406 395 kvm_make_request(KVM_REQ_EVENT, vcpu);
f210f757
NA
396 } else {
397 apic->irr_pending = false;
398 apic_clear_vector(vec, apic->regs + APIC_IRR);
399 if (apic_search_irr(apic) != -1)
400 apic->irr_pending = true;
56cc2406 401 }
33e4c686
GN
402}
403
8680b94b
MT
404static inline void apic_set_isr(int vec, struct kvm_lapic *apic)
405{
56cc2406
WL
406 struct kvm_vcpu *vcpu;
407
408 if (__apic_test_and_set_vector(vec, apic->regs + APIC_ISR))
409 return;
410
411 vcpu = apic->vcpu;
fc57ac2c 412
8680b94b 413 /*
56cc2406
WL
414 * With APIC virtualization enabled, all caching is disabled
415 * because the processor can modify ISR under the hood. Instead
416 * just set SVI.
8680b94b 417 */
d62caabb 418 if (unlikely(vcpu->arch.apicv_active))
56cc2406
WL
419 kvm_x86_ops->hwapic_isr_update(vcpu->kvm, vec);
420 else {
421 ++apic->isr_count;
422 BUG_ON(apic->isr_count > MAX_APIC_VECTOR);
423 /*
424 * ISR (in service register) bit is set when injecting an interrupt.
425 * The highest vector is injected. Thus the latest bit set matches
426 * the highest bit in ISR.
427 */
428 apic->highest_isr_cache = vec;
429 }
8680b94b
MT
430}
431
fc57ac2c
PB
432static inline int apic_find_highest_isr(struct kvm_lapic *apic)
433{
434 int result;
435
436 /*
437 * Note that isr_count is always 1, and highest_isr_cache
438 * is always -1, with APIC virtualization enabled.
439 */
440 if (!apic->isr_count)
441 return -1;
442 if (likely(apic->highest_isr_cache != -1))
443 return apic->highest_isr_cache;
444
445 result = find_highest_vector(apic->regs + APIC_ISR);
446 ASSERT(result == -1 || result >= 16);
447
448 return result;
449}
450
8680b94b
MT
451static inline void apic_clear_isr(int vec, struct kvm_lapic *apic)
452{
fc57ac2c
PB
453 struct kvm_vcpu *vcpu;
454 if (!__apic_test_and_clear_vector(vec, apic->regs + APIC_ISR))
455 return;
456
457 vcpu = apic->vcpu;
458
459 /*
460 * We do get here for APIC virtualization enabled if the guest
461 * uses the Hyper-V APIC enlightenment. In this case we may need
462 * to trigger a new interrupt delivery by writing the SVI field;
463 * on the other hand isr_count and highest_isr_cache are unused
464 * and must be left alone.
465 */
d62caabb 466 if (unlikely(vcpu->arch.apicv_active))
fc57ac2c
PB
467 kvm_x86_ops->hwapic_isr_update(vcpu->kvm,
468 apic_find_highest_isr(apic));
469 else {
8680b94b 470 --apic->isr_count;
fc57ac2c
PB
471 BUG_ON(apic->isr_count < 0);
472 apic->highest_isr_cache = -1;
473 }
8680b94b
MT
474}
475
6e5d865c
YS
476int kvm_lapic_find_highest_irr(struct kvm_vcpu *vcpu)
477{
33e4c686
GN
478 /* This may race with setting of irr in __apic_accept_irq() and
479 * value returned may be wrong, but kvm_vcpu_kick() in __apic_accept_irq
480 * will cause vmexit immediately and the value will be recalculated
481 * on the next vmentry.
482 */
f8543d6a 483 return apic_find_highest_irr(vcpu->arch.apic);
6e5d865c 484}
6e5d865c 485
6da7e3f6 486static int __apic_accept_irq(struct kvm_lapic *apic, int delivery_mode,
b4f2225c
YZ
487 int vector, int level, int trig_mode,
488 unsigned long *dest_map);
6da7e3f6 489
b4f2225c
YZ
490int kvm_apic_set_irq(struct kvm_vcpu *vcpu, struct kvm_lapic_irq *irq,
491 unsigned long *dest_map)
97222cc8 492{
ad312c7c 493 struct kvm_lapic *apic = vcpu->arch.apic;
8be5453f 494
58c2dde1 495 return __apic_accept_irq(apic, irq->delivery_mode, irq->vector,
b4f2225c 496 irq->level, irq->trig_mode, dest_map);
97222cc8
ED
497}
498
ae7a2a3f
MT
499static int pv_eoi_put_user(struct kvm_vcpu *vcpu, u8 val)
500{
501
502 return kvm_write_guest_cached(vcpu->kvm, &vcpu->arch.pv_eoi.data, &val,
503 sizeof(val));
504}
505
506static int pv_eoi_get_user(struct kvm_vcpu *vcpu, u8 *val)
507{
508
509 return kvm_read_guest_cached(vcpu->kvm, &vcpu->arch.pv_eoi.data, val,
510 sizeof(*val));
511}
512
513static inline bool pv_eoi_enabled(struct kvm_vcpu *vcpu)
514{
515 return vcpu->arch.pv_eoi.msr_val & KVM_MSR_ENABLED;
516}
517
518static bool pv_eoi_get_pending(struct kvm_vcpu *vcpu)
519{
520 u8 val;
521 if (pv_eoi_get_user(vcpu, &val) < 0)
522 apic_debug("Can't read EOI MSR value: 0x%llx\n",
96893977 523 (unsigned long long)vcpu->arch.pv_eoi.msr_val);
ae7a2a3f
MT
524 return val & 0x1;
525}
526
527static void pv_eoi_set_pending(struct kvm_vcpu *vcpu)
528{
529 if (pv_eoi_put_user(vcpu, KVM_PV_EOI_ENABLED) < 0) {
530 apic_debug("Can't set EOI MSR value: 0x%llx\n",
96893977 531 (unsigned long long)vcpu->arch.pv_eoi.msr_val);
ae7a2a3f
MT
532 return;
533 }
534 __set_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention);
535}
536
537static void pv_eoi_clr_pending(struct kvm_vcpu *vcpu)
538{
539 if (pv_eoi_put_user(vcpu, KVM_PV_EOI_DISABLED) < 0) {
540 apic_debug("Can't clear EOI MSR value: 0x%llx\n",
96893977 541 (unsigned long long)vcpu->arch.pv_eoi.msr_val);
ae7a2a3f
MT
542 return;
543 }
544 __clear_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention);
545}
546
97222cc8
ED
547static void apic_update_ppr(struct kvm_lapic *apic)
548{
3842d135 549 u32 tpr, isrv, ppr, old_ppr;
97222cc8
ED
550 int isr;
551
c48f1496
GN
552 old_ppr = kvm_apic_get_reg(apic, APIC_PROCPRI);
553 tpr = kvm_apic_get_reg(apic, APIC_TASKPRI);
97222cc8
ED
554 isr = apic_find_highest_isr(apic);
555 isrv = (isr != -1) ? isr : 0;
556
557 if ((tpr & 0xf0) >= (isrv & 0xf0))
558 ppr = tpr & 0xff;
559 else
560 ppr = isrv & 0xf0;
561
562 apic_debug("vlapic %p, ppr 0x%x, isr 0x%x, isrv 0x%x",
563 apic, ppr, isr, isrv);
564
3842d135
AK
565 if (old_ppr != ppr) {
566 apic_set_reg(apic, APIC_PROCPRI, ppr);
83bcacb1
AK
567 if (ppr < old_ppr)
568 kvm_make_request(KVM_REQ_EVENT, apic->vcpu);
3842d135 569 }
97222cc8
ED
570}
571
572static void apic_set_tpr(struct kvm_lapic *apic, u32 tpr)
573{
574 apic_set_reg(apic, APIC_TASKPRI, tpr);
575 apic_update_ppr(apic);
576}
577
03d2249e 578static bool kvm_apic_broadcast(struct kvm_lapic *apic, u32 mda)
394457a9 579{
03d2249e
RK
580 if (apic_x2apic_mode(apic))
581 return mda == X2APIC_BROADCAST;
582
583 return GET_APIC_DEST_FIELD(mda) == APIC_BROADCAST;
394457a9
NA
584}
585
03d2249e 586static bool kvm_apic_match_physical_addr(struct kvm_lapic *apic, u32 mda)
97222cc8 587{
03d2249e
RK
588 if (kvm_apic_broadcast(apic, mda))
589 return true;
590
591 if (apic_x2apic_mode(apic))
592 return mda == kvm_apic_id(apic);
593
594 return mda == SET_APIC_DEST_FIELD(kvm_apic_id(apic));
97222cc8
ED
595}
596
52c233a4 597static bool kvm_apic_match_logical_addr(struct kvm_lapic *apic, u32 mda)
97222cc8 598{
0105d1a5
GN
599 u32 logical_id;
600
394457a9 601 if (kvm_apic_broadcast(apic, mda))
9368b567 602 return true;
394457a9 603
9368b567 604 logical_id = kvm_apic_get_reg(apic, APIC_LDR);
97222cc8 605
9368b567 606 if (apic_x2apic_mode(apic))
8a395363
RK
607 return ((logical_id >> 16) == (mda >> 16))
608 && (logical_id & mda & 0xffff) != 0;
97222cc8 609
9368b567 610 logical_id = GET_APIC_LOGICAL_ID(logical_id);
03d2249e 611 mda = GET_APIC_DEST_FIELD(mda);
97222cc8 612
c48f1496 613 switch (kvm_apic_get_reg(apic, APIC_DFR)) {
97222cc8 614 case APIC_DFR_FLAT:
9368b567 615 return (logical_id & mda) != 0;
97222cc8 616 case APIC_DFR_CLUSTER:
9368b567
RK
617 return ((logical_id >> 4) == (mda >> 4))
618 && (logical_id & mda & 0xf) != 0;
97222cc8 619 default:
7712de87 620 apic_debug("Bad DFR vcpu %d: %08x\n",
c48f1496 621 apic->vcpu->vcpu_id, kvm_apic_get_reg(apic, APIC_DFR));
9368b567 622 return false;
97222cc8 623 }
97222cc8
ED
624}
625
03d2249e
RK
626/* KVM APIC implementation has two quirks
627 * - dest always begins at 0 while xAPIC MDA has offset 24,
628 * - IOxAPIC messages have to be delivered (directly) to x2APIC.
629 */
630static u32 kvm_apic_mda(unsigned int dest_id, struct kvm_lapic *source,
631 struct kvm_lapic *target)
632{
633 bool ipi = source != NULL;
634 bool x2apic_mda = apic_x2apic_mode(ipi ? source : target);
635
636 if (!ipi && dest_id == APIC_BROADCAST && x2apic_mda)
637 return X2APIC_BROADCAST;
638
639 return x2apic_mda ? dest_id : SET_APIC_DEST_FIELD(dest_id);
640}
641
52c233a4 642bool kvm_apic_match_dest(struct kvm_vcpu *vcpu, struct kvm_lapic *source,
394457a9 643 int short_hand, unsigned int dest, int dest_mode)
97222cc8 644{
ad312c7c 645 struct kvm_lapic *target = vcpu->arch.apic;
03d2249e 646 u32 mda = kvm_apic_mda(dest, source, target);
97222cc8
ED
647
648 apic_debug("target %p, source %p, dest 0x%x, "
343f94fe 649 "dest_mode 0x%x, short_hand 0x%x\n",
97222cc8
ED
650 target, source, dest, dest_mode, short_hand);
651
bd371396 652 ASSERT(target);
97222cc8
ED
653 switch (short_hand) {
654 case APIC_DEST_NOSHORT:
3697f302 655 if (dest_mode == APIC_DEST_PHYSICAL)
03d2249e 656 return kvm_apic_match_physical_addr(target, mda);
343f94fe 657 else
03d2249e 658 return kvm_apic_match_logical_addr(target, mda);
97222cc8 659 case APIC_DEST_SELF:
9368b567 660 return target == source;
97222cc8 661 case APIC_DEST_ALLINC:
9368b567 662 return true;
97222cc8 663 case APIC_DEST_ALLBUT:
9368b567 664 return target != source;
97222cc8 665 default:
7712de87
JK
666 apic_debug("kvm: apic: Bad dest shorthand value %x\n",
667 short_hand);
9368b567 668 return false;
97222cc8 669 }
97222cc8
ED
670}
671
52004014
FW
672int kvm_vector_to_index(u32 vector, u32 dest_vcpus,
673 const unsigned long *bitmap, u32 bitmap_size)
674{
675 u32 mod;
676 int i, idx = -1;
677
678 mod = vector % dest_vcpus;
679
680 for (i = 0; i <= mod; i++) {
681 idx = find_next_bit(bitmap, bitmap_size, idx + 1);
682 BUG_ON(idx == bitmap_size);
683 }
684
685 return idx;
686}
687
4efd805f
RK
688static void kvm_apic_disabled_lapic_found(struct kvm *kvm)
689{
690 if (!kvm->arch.disabled_lapic_found) {
691 kvm->arch.disabled_lapic_found = true;
692 printk(KERN_INFO
693 "Disabled LAPIC found during irq injection\n");
694 }
695}
696
1e08ec4a 697bool kvm_irq_delivery_to_apic_fast(struct kvm *kvm, struct kvm_lapic *src,
b4f2225c 698 struct kvm_lapic_irq *irq, int *r, unsigned long *dest_map)
1e08ec4a
GN
699{
700 struct kvm_apic_map *map;
701 unsigned long bitmap = 1;
702 struct kvm_lapic **dst;
703 int i;
bea15428 704 bool ret, x2apic_ipi;
1e08ec4a
GN
705
706 *r = -1;
707
708 if (irq->shorthand == APIC_DEST_SELF) {
b4f2225c 709 *r = kvm_apic_set_irq(src->vcpu, irq, dest_map);
1e08ec4a
GN
710 return true;
711 }
712
713 if (irq->shorthand)
714 return false;
715
bea15428 716 x2apic_ipi = src && apic_x2apic_mode(src);
9ea369b0
RK
717 if (irq->dest_id == (x2apic_ipi ? X2APIC_BROADCAST : APIC_BROADCAST))
718 return false;
719
bea15428 720 ret = true;
1e08ec4a
GN
721 rcu_read_lock();
722 map = rcu_dereference(kvm->arch.apic_map);
723
bea15428
PB
724 if (!map) {
725 ret = false;
1e08ec4a 726 goto out;
bea15428 727 }
698f9755 728
3697f302 729 if (irq->dest_mode == APIC_DEST_PHYSICAL) {
fa834e91
RK
730 if (irq->dest_id >= ARRAY_SIZE(map->phys_map))
731 goto out;
732
733 dst = &map->phys_map[irq->dest_id];
1e08ec4a 734 } else {
3548a259
RK
735 u16 cid;
736
737 if (!kvm_apic_logical_map_valid(map)) {
738 ret = false;
739 goto out;
740 }
741
3b5a5ffa 742 apic_logical_id(map, irq->dest_id, &cid, (u16 *)&bitmap);
45c3094a
RK
743
744 if (cid >= ARRAY_SIZE(map->logical_map))
745 goto out;
1e08ec4a 746
45c3094a 747 dst = map->logical_map[cid];
1e08ec4a 748
52004014
FW
749 if (!kvm_lowest_prio_delivery(irq))
750 goto set_irq;
751
752 if (!kvm_vector_hashing_enabled()) {
1e08ec4a
GN
753 int l = -1;
754 for_each_set_bit(i, &bitmap, 16) {
755 if (!dst[i])
756 continue;
757 if (l < 0)
758 l = i;
52004014
FW
759 else if (kvm_apic_compare_prio(dst[i]->vcpu,
760 dst[l]->vcpu) < 0)
1e08ec4a
GN
761 l = i;
762 }
1e08ec4a 763 bitmap = (l >= 0) ? 1 << l : 0;
52004014
FW
764 } else {
765 int idx;
766 unsigned int dest_vcpus;
767
768 dest_vcpus = hweight16(bitmap);
769 if (dest_vcpus == 0)
770 goto out;
771
772 idx = kvm_vector_to_index(irq->vector,
773 dest_vcpus, &bitmap, 16);
774
4efd805f
RK
775 if (!dst[idx]) {
776 kvm_apic_disabled_lapic_found(kvm);
52004014
FW
777 goto out;
778 }
779
780 bitmap = (idx >= 0) ? 1 << idx : 0;
1e08ec4a
GN
781 }
782 }
783
52004014 784set_irq:
1e08ec4a
GN
785 for_each_set_bit(i, &bitmap, 16) {
786 if (!dst[i])
787 continue;
788 if (*r < 0)
789 *r = 0;
b4f2225c 790 *r += kvm_apic_set_irq(dst[i]->vcpu, irq, dest_map);
1e08ec4a 791 }
1e08ec4a
GN
792out:
793 rcu_read_unlock();
794 return ret;
795}
796
6228a0da
FW
797/*
798 * This routine tries to handler interrupts in posted mode, here is how
799 * it deals with different cases:
800 * - For single-destination interrupts, handle it in posted mode
801 * - Else if vector hashing is enabled and it is a lowest-priority
802 * interrupt, handle it in posted mode and use the following mechanism
803 * to find the destinaiton vCPU.
804 * 1. For lowest-priority interrupts, store all the possible
805 * destination vCPUs in an array.
806 * 2. Use "guest vector % max number of destination vCPUs" to find
807 * the right destination vCPU in the array for the lowest-priority
808 * interrupt.
809 * - Otherwise, use remapped mode to inject the interrupt.
810 */
8feb4a04
FW
811bool kvm_intr_is_single_vcpu_fast(struct kvm *kvm, struct kvm_lapic_irq *irq,
812 struct kvm_vcpu **dest_vcpu)
813{
814 struct kvm_apic_map *map;
815 bool ret = false;
816 struct kvm_lapic *dst = NULL;
817
818 if (irq->shorthand)
819 return false;
820
821 rcu_read_lock();
822 map = rcu_dereference(kvm->arch.apic_map);
823
824 if (!map)
825 goto out;
826
827 if (irq->dest_mode == APIC_DEST_PHYSICAL) {
828 if (irq->dest_id == 0xFF)
829 goto out;
830
831 if (irq->dest_id >= ARRAY_SIZE(map->phys_map))
832 goto out;
833
834 dst = map->phys_map[irq->dest_id];
835 if (dst && kvm_apic_present(dst->vcpu))
836 *dest_vcpu = dst->vcpu;
837 else
838 goto out;
839 } else {
840 u16 cid;
841 unsigned long bitmap = 1;
842 int i, r = 0;
843
844 if (!kvm_apic_logical_map_valid(map))
845 goto out;
846
847 apic_logical_id(map, irq->dest_id, &cid, (u16 *)&bitmap);
848
849 if (cid >= ARRAY_SIZE(map->logical_map))
850 goto out;
851
6228a0da
FW
852 if (kvm_vector_hashing_enabled() &&
853 kvm_lowest_prio_delivery(irq)) {
854 int idx;
855 unsigned int dest_vcpus;
856
857 dest_vcpus = hweight16(bitmap);
858 if (dest_vcpus == 0)
8feb4a04 859 goto out;
8feb4a04 860
6228a0da
FW
861 idx = kvm_vector_to_index(irq->vector, dest_vcpus,
862 &bitmap, 16);
863
6228a0da 864 dst = map->logical_map[cid][idx];
4efd805f
RK
865 if (!dst) {
866 kvm_apic_disabled_lapic_found(kvm);
6228a0da
FW
867 goto out;
868 }
869
8feb4a04 870 *dest_vcpu = dst->vcpu;
6228a0da
FW
871 } else {
872 for_each_set_bit(i, &bitmap, 16) {
873 dst = map->logical_map[cid][i];
874 if (++r == 2)
875 goto out;
876 }
877
878 if (dst && kvm_apic_present(dst->vcpu))
879 *dest_vcpu = dst->vcpu;
880 else
881 goto out;
882 }
8feb4a04
FW
883 }
884
885 ret = true;
886out:
887 rcu_read_unlock();
888 return ret;
889}
890
97222cc8
ED
891/*
892 * Add a pending IRQ into lapic.
893 * Return 1 if successfully added and 0 if discarded.
894 */
895static int __apic_accept_irq(struct kvm_lapic *apic, int delivery_mode,
b4f2225c
YZ
896 int vector, int level, int trig_mode,
897 unsigned long *dest_map)
97222cc8 898{
6da7e3f6 899 int result = 0;
c5ec1534 900 struct kvm_vcpu *vcpu = apic->vcpu;
97222cc8 901
a183b638
PB
902 trace_kvm_apic_accept_irq(vcpu->vcpu_id, delivery_mode,
903 trig_mode, vector);
97222cc8 904 switch (delivery_mode) {
97222cc8 905 case APIC_DM_LOWEST:
e1035715
GN
906 vcpu->arch.apic_arb_prio++;
907 case APIC_DM_FIXED:
bdaffe1d
PB
908 if (unlikely(trig_mode && !level))
909 break;
910
97222cc8
ED
911 /* FIXME add logic for vcpu on reset */
912 if (unlikely(!apic_enabled(apic)))
913 break;
914
11f5cc05
JK
915 result = 1;
916
b4f2225c
YZ
917 if (dest_map)
918 __set_bit(vcpu->vcpu_id, dest_map);
a5d36f82 919
bdaffe1d
PB
920 if (apic_test_vector(vector, apic->regs + APIC_TMR) != !!trig_mode) {
921 if (trig_mode)
922 apic_set_vector(vector, apic->regs + APIC_TMR);
923 else
924 apic_clear_vector(vector, apic->regs + APIC_TMR);
925 }
926
d62caabb 927 if (vcpu->arch.apicv_active)
5a71785d 928 kvm_x86_ops->deliver_posted_interrupt(vcpu, vector);
11f5cc05
JK
929 else {
930 apic_set_irr(vector, apic);
5a71785d
YZ
931
932 kvm_make_request(KVM_REQ_EVENT, vcpu);
933 kvm_vcpu_kick(vcpu);
934 }
97222cc8
ED
935 break;
936
937 case APIC_DM_REMRD:
24d2166b
R
938 result = 1;
939 vcpu->arch.pv.pv_unhalted = 1;
940 kvm_make_request(KVM_REQ_EVENT, vcpu);
941 kvm_vcpu_kick(vcpu);
97222cc8
ED
942 break;
943
944 case APIC_DM_SMI:
64d60670
PB
945 result = 1;
946 kvm_make_request(KVM_REQ_SMI, vcpu);
947 kvm_vcpu_kick(vcpu);
97222cc8 948 break;
3419ffc8 949
97222cc8 950 case APIC_DM_NMI:
6da7e3f6 951 result = 1;
3419ffc8 952 kvm_inject_nmi(vcpu);
26df99c6 953 kvm_vcpu_kick(vcpu);
97222cc8
ED
954 break;
955
956 case APIC_DM_INIT:
a52315e1 957 if (!trig_mode || level) {
6da7e3f6 958 result = 1;
66450a21
JK
959 /* assumes that there are only KVM_APIC_INIT/SIPI */
960 apic->pending_events = (1UL << KVM_APIC_INIT);
961 /* make sure pending_events is visible before sending
962 * the request */
963 smp_wmb();
3842d135 964 kvm_make_request(KVM_REQ_EVENT, vcpu);
c5ec1534
HQ
965 kvm_vcpu_kick(vcpu);
966 } else {
1b10bf31
JK
967 apic_debug("Ignoring de-assert INIT to vcpu %d\n",
968 vcpu->vcpu_id);
c5ec1534 969 }
97222cc8
ED
970 break;
971
972 case APIC_DM_STARTUP:
1b10bf31
JK
973 apic_debug("SIPI to vcpu %d vector 0x%02x\n",
974 vcpu->vcpu_id, vector);
66450a21
JK
975 result = 1;
976 apic->sipi_vector = vector;
977 /* make sure sipi_vector is visible for the receiver */
978 smp_wmb();
979 set_bit(KVM_APIC_SIPI, &apic->pending_events);
980 kvm_make_request(KVM_REQ_EVENT, vcpu);
981 kvm_vcpu_kick(vcpu);
97222cc8
ED
982 break;
983
23930f95
JK
984 case APIC_DM_EXTINT:
985 /*
986 * Should only be called by kvm_apic_local_deliver() with LVT0,
987 * before NMI watchdog was enabled. Already handled by
988 * kvm_apic_accept_pic_intr().
989 */
990 break;
991
97222cc8
ED
992 default:
993 printk(KERN_ERR "TODO: unsupported delivery mode %x\n",
994 delivery_mode);
995 break;
996 }
997 return result;
998}
999
e1035715 1000int kvm_apic_compare_prio(struct kvm_vcpu *vcpu1, struct kvm_vcpu *vcpu2)
8be5453f 1001{
e1035715 1002 return vcpu1->arch.apic_arb_prio - vcpu2->arch.apic_arb_prio;
8be5453f
ZX
1003}
1004
3bb345f3
PB
1005static bool kvm_ioapic_handles_vector(struct kvm_lapic *apic, int vector)
1006{
6308630b 1007 return test_bit(vector, apic->vcpu->arch.ioapic_handled_vectors);
3bb345f3
PB
1008}
1009
c7c9c56c
YZ
1010static void kvm_ioapic_send_eoi(struct kvm_lapic *apic, int vector)
1011{
7543a635
SR
1012 int trigger_mode;
1013
1014 /* Eoi the ioapic only if the ioapic doesn't own the vector. */
1015 if (!kvm_ioapic_handles_vector(apic, vector))
1016 return;
3bb345f3 1017
7543a635
SR
1018 /* Request a KVM exit to inform the userspace IOAPIC. */
1019 if (irqchip_split(apic->vcpu->kvm)) {
1020 apic->vcpu->arch.pending_ioapic_eoi = vector;
1021 kvm_make_request(KVM_REQ_IOAPIC_EOI_EXIT, apic->vcpu);
1022 return;
c7c9c56c 1023 }
7543a635
SR
1024
1025 if (apic_test_vector(vector, apic->regs + APIC_TMR))
1026 trigger_mode = IOAPIC_LEVEL_TRIG;
1027 else
1028 trigger_mode = IOAPIC_EDGE_TRIG;
1029
1030 kvm_ioapic_update_eoi(apic->vcpu, vector, trigger_mode);
c7c9c56c
YZ
1031}
1032
ae7a2a3f 1033static int apic_set_eoi(struct kvm_lapic *apic)
97222cc8
ED
1034{
1035 int vector = apic_find_highest_isr(apic);
ae7a2a3f
MT
1036
1037 trace_kvm_eoi(apic, vector);
1038
97222cc8
ED
1039 /*
1040 * Not every write EOI will has corresponding ISR,
1041 * one example is when Kernel check timer on setup_IO_APIC
1042 */
1043 if (vector == -1)
ae7a2a3f 1044 return vector;
97222cc8 1045
8680b94b 1046 apic_clear_isr(vector, apic);
97222cc8
ED
1047 apic_update_ppr(apic);
1048
5c919412
AS
1049 if (test_bit(vector, vcpu_to_synic(apic->vcpu)->vec_bitmap))
1050 kvm_hv_synic_send_eoi(apic->vcpu, vector);
1051
c7c9c56c 1052 kvm_ioapic_send_eoi(apic, vector);
3842d135 1053 kvm_make_request(KVM_REQ_EVENT, apic->vcpu);
ae7a2a3f 1054 return vector;
97222cc8
ED
1055}
1056
c7c9c56c
YZ
1057/*
1058 * this interface assumes a trap-like exit, which has already finished
1059 * desired side effect including vISR and vPPR update.
1060 */
1061void kvm_apic_set_eoi_accelerated(struct kvm_vcpu *vcpu, int vector)
1062{
1063 struct kvm_lapic *apic = vcpu->arch.apic;
1064
1065 trace_kvm_eoi(apic, vector);
1066
1067 kvm_ioapic_send_eoi(apic, vector);
1068 kvm_make_request(KVM_REQ_EVENT, apic->vcpu);
1069}
1070EXPORT_SYMBOL_GPL(kvm_apic_set_eoi_accelerated);
1071
97222cc8
ED
1072static void apic_send_ipi(struct kvm_lapic *apic)
1073{
c48f1496
GN
1074 u32 icr_low = kvm_apic_get_reg(apic, APIC_ICR);
1075 u32 icr_high = kvm_apic_get_reg(apic, APIC_ICR2);
58c2dde1 1076 struct kvm_lapic_irq irq;
97222cc8 1077
58c2dde1
GN
1078 irq.vector = icr_low & APIC_VECTOR_MASK;
1079 irq.delivery_mode = icr_low & APIC_MODE_MASK;
1080 irq.dest_mode = icr_low & APIC_DEST_MASK;
b7cb2231 1081 irq.level = (icr_low & APIC_INT_ASSERT) != 0;
58c2dde1
GN
1082 irq.trig_mode = icr_low & APIC_INT_LEVELTRIG;
1083 irq.shorthand = icr_low & APIC_SHORT_MASK;
93bbf0b8 1084 irq.msi_redir_hint = false;
0105d1a5
GN
1085 if (apic_x2apic_mode(apic))
1086 irq.dest_id = icr_high;
1087 else
1088 irq.dest_id = GET_APIC_DEST_FIELD(icr_high);
97222cc8 1089
1000ff8d
GN
1090 trace_kvm_apic_ipi(icr_low, irq.dest_id);
1091
97222cc8
ED
1092 apic_debug("icr_high 0x%x, icr_low 0x%x, "
1093 "short_hand 0x%x, dest 0x%x, trig_mode 0x%x, level 0x%x, "
93bbf0b8
JS
1094 "dest_mode 0x%x, delivery_mode 0x%x, vector 0x%x, "
1095 "msi_redir_hint 0x%x\n",
9b5843dd 1096 icr_high, icr_low, irq.shorthand, irq.dest_id,
58c2dde1 1097 irq.trig_mode, irq.level, irq.dest_mode, irq.delivery_mode,
93bbf0b8 1098 irq.vector, irq.msi_redir_hint);
58c2dde1 1099
b4f2225c 1100 kvm_irq_delivery_to_apic(apic->vcpu->kvm, apic, &irq, NULL);
97222cc8
ED
1101}
1102
1103static u32 apic_get_tmcct(struct kvm_lapic *apic)
1104{
b682b814
MT
1105 ktime_t remaining;
1106 s64 ns;
9da8f4e8 1107 u32 tmcct;
97222cc8
ED
1108
1109 ASSERT(apic != NULL);
1110
9da8f4e8 1111 /* if initial count is 0, current count should also be 0 */
b963a22e
AH
1112 if (kvm_apic_get_reg(apic, APIC_TMICT) == 0 ||
1113 apic->lapic_timer.period == 0)
9da8f4e8
KP
1114 return 0;
1115
ace15464 1116 remaining = hrtimer_get_remaining(&apic->lapic_timer.timer);
b682b814
MT
1117 if (ktime_to_ns(remaining) < 0)
1118 remaining = ktime_set(0, 0);
1119
d3c7b77d
MT
1120 ns = mod_64(ktime_to_ns(remaining), apic->lapic_timer.period);
1121 tmcct = div64_u64(ns,
1122 (APIC_BUS_CYCLE_NS * apic->divide_count));
97222cc8
ED
1123
1124 return tmcct;
1125}
1126
b209749f
AK
1127static void __report_tpr_access(struct kvm_lapic *apic, bool write)
1128{
1129 struct kvm_vcpu *vcpu = apic->vcpu;
1130 struct kvm_run *run = vcpu->run;
1131
a8eeb04a 1132 kvm_make_request(KVM_REQ_REPORT_TPR_ACCESS, vcpu);
5fdbf976 1133 run->tpr_access.rip = kvm_rip_read(vcpu);
b209749f
AK
1134 run->tpr_access.is_write = write;
1135}
1136
1137static inline void report_tpr_access(struct kvm_lapic *apic, bool write)
1138{
1139 if (apic->vcpu->arch.tpr_access_reporting)
1140 __report_tpr_access(apic, write);
1141}
1142
97222cc8
ED
1143static u32 __apic_read(struct kvm_lapic *apic, unsigned int offset)
1144{
1145 u32 val = 0;
1146
1147 if (offset >= LAPIC_MMIO_LENGTH)
1148 return 0;
1149
1150 switch (offset) {
0105d1a5
GN
1151 case APIC_ID:
1152 if (apic_x2apic_mode(apic))
1153 val = kvm_apic_id(apic);
1154 else
1155 val = kvm_apic_id(apic) << 24;
1156 break;
97222cc8 1157 case APIC_ARBPRI:
7712de87 1158 apic_debug("Access APIC ARBPRI register which is for P6\n");
97222cc8
ED
1159 break;
1160
1161 case APIC_TMCCT: /* Timer CCR */
a3e06bbe
LJ
1162 if (apic_lvtt_tscdeadline(apic))
1163 return 0;
1164
97222cc8
ED
1165 val = apic_get_tmcct(apic);
1166 break;
4a4541a4
AK
1167 case APIC_PROCPRI:
1168 apic_update_ppr(apic);
c48f1496 1169 val = kvm_apic_get_reg(apic, offset);
4a4541a4 1170 break;
b209749f
AK
1171 case APIC_TASKPRI:
1172 report_tpr_access(apic, false);
1173 /* fall thru */
97222cc8 1174 default:
c48f1496 1175 val = kvm_apic_get_reg(apic, offset);
97222cc8
ED
1176 break;
1177 }
1178
1179 return val;
1180}
1181
d76685c4
GH
1182static inline struct kvm_lapic *to_lapic(struct kvm_io_device *dev)
1183{
1184 return container_of(dev, struct kvm_lapic, dev);
1185}
1186
0105d1a5
GN
1187static int apic_reg_read(struct kvm_lapic *apic, u32 offset, int len,
1188 void *data)
97222cc8 1189{
97222cc8
ED
1190 unsigned char alignment = offset & 0xf;
1191 u32 result;
d5b0b5b1 1192 /* this bitmask has a bit cleared for each reserved register */
0105d1a5 1193 static const u64 rmask = 0x43ff01ffffffe70cULL;
97222cc8
ED
1194
1195 if ((alignment + len) > 4) {
4088bb3c
GN
1196 apic_debug("KVM_APIC_READ: alignment error %x %d\n",
1197 offset, len);
0105d1a5 1198 return 1;
97222cc8 1199 }
0105d1a5
GN
1200
1201 if (offset > 0x3f0 || !(rmask & (1ULL << (offset >> 4)))) {
4088bb3c
GN
1202 apic_debug("KVM_APIC_READ: read reserved register %x\n",
1203 offset);
0105d1a5
GN
1204 return 1;
1205 }
1206
97222cc8
ED
1207 result = __apic_read(apic, offset & ~0xf);
1208
229456fc
MT
1209 trace_kvm_apic_read(offset, result);
1210
97222cc8
ED
1211 switch (len) {
1212 case 1:
1213 case 2:
1214 case 4:
1215 memcpy(data, (char *)&result + alignment, len);
1216 break;
1217 default:
1218 printk(KERN_ERR "Local APIC read with len = %x, "
1219 "should be 1,2, or 4 instead\n", len);
1220 break;
1221 }
bda9020e 1222 return 0;
97222cc8
ED
1223}
1224
0105d1a5
GN
1225static int apic_mmio_in_range(struct kvm_lapic *apic, gpa_t addr)
1226{
c48f1496 1227 return kvm_apic_hw_enabled(apic) &&
0105d1a5
GN
1228 addr >= apic->base_address &&
1229 addr < apic->base_address + LAPIC_MMIO_LENGTH;
1230}
1231
e32edf4f 1232static int apic_mmio_read(struct kvm_vcpu *vcpu, struct kvm_io_device *this,
0105d1a5
GN
1233 gpa_t address, int len, void *data)
1234{
1235 struct kvm_lapic *apic = to_lapic(this);
1236 u32 offset = address - apic->base_address;
1237
1238 if (!apic_mmio_in_range(apic, address))
1239 return -EOPNOTSUPP;
1240
1241 apic_reg_read(apic, offset, len, data);
1242
1243 return 0;
1244}
1245
97222cc8
ED
1246static void update_divide_count(struct kvm_lapic *apic)
1247{
1248 u32 tmp1, tmp2, tdcr;
1249
c48f1496 1250 tdcr = kvm_apic_get_reg(apic, APIC_TDCR);
97222cc8
ED
1251 tmp1 = tdcr & 0xf;
1252 tmp2 = ((tmp1 & 0x3) | ((tmp1 & 0x8) >> 1)) + 1;
d3c7b77d 1253 apic->divide_count = 0x1 << (tmp2 & 0x7);
97222cc8
ED
1254
1255 apic_debug("timer divide count is 0x%x\n",
9b5843dd 1256 apic->divide_count);
97222cc8
ED
1257}
1258
b6ac0695
RK
1259static void apic_update_lvtt(struct kvm_lapic *apic)
1260{
1261 u32 timer_mode = kvm_apic_get_reg(apic, APIC_LVTT) &
1262 apic->lapic_timer.timer_mode_mask;
1263
1264 if (apic->lapic_timer.timer_mode != timer_mode) {
1265 apic->lapic_timer.timer_mode = timer_mode;
1266 hrtimer_cancel(&apic->lapic_timer.timer);
1267 }
1268}
1269
5d87db71
RK
1270static void apic_timer_expired(struct kvm_lapic *apic)
1271{
1272 struct kvm_vcpu *vcpu = apic->vcpu;
1273 wait_queue_head_t *q = &vcpu->wq;
d0659d94 1274 struct kvm_timer *ktimer = &apic->lapic_timer;
5d87db71 1275
5d87db71
RK
1276 if (atomic_read(&apic->lapic_timer.pending))
1277 return;
1278
1279 atomic_inc(&apic->lapic_timer.pending);
bab5bb39 1280 kvm_set_pending_timer(vcpu);
5d87db71
RK
1281
1282 if (waitqueue_active(q))
1283 wake_up_interruptible(q);
d0659d94
MT
1284
1285 if (apic_lvtt_tscdeadline(apic))
1286 ktimer->expired_tscdeadline = ktimer->tscdeadline;
1287}
1288
1289/*
1290 * On APICv, this test will cause a busy wait
1291 * during a higher-priority task.
1292 */
1293
1294static bool lapic_timer_int_injected(struct kvm_vcpu *vcpu)
1295{
1296 struct kvm_lapic *apic = vcpu->arch.apic;
1297 u32 reg = kvm_apic_get_reg(apic, APIC_LVTT);
1298
1299 if (kvm_apic_hw_enabled(apic)) {
1300 int vec = reg & APIC_VECTOR_MASK;
f9339860 1301 void *bitmap = apic->regs + APIC_ISR;
d0659d94 1302
d62caabb 1303 if (vcpu->arch.apicv_active)
f9339860
MT
1304 bitmap = apic->regs + APIC_IRR;
1305
1306 if (apic_test_vector(vec, bitmap))
1307 return true;
d0659d94
MT
1308 }
1309 return false;
1310}
1311
1312void wait_lapic_expire(struct kvm_vcpu *vcpu)
1313{
1314 struct kvm_lapic *apic = vcpu->arch.apic;
1315 u64 guest_tsc, tsc_deadline;
1316
bce87cce 1317 if (!lapic_in_kernel(vcpu))
d0659d94
MT
1318 return;
1319
1320 if (apic->lapic_timer.expired_tscdeadline == 0)
1321 return;
1322
1323 if (!lapic_timer_int_injected(vcpu))
1324 return;
1325
1326 tsc_deadline = apic->lapic_timer.expired_tscdeadline;
1327 apic->lapic_timer.expired_tscdeadline = 0;
4ba76538 1328 guest_tsc = kvm_read_l1_tsc(vcpu, rdtsc());
6c19b753 1329 trace_kvm_wait_lapic_expire(vcpu->vcpu_id, guest_tsc - tsc_deadline);
d0659d94
MT
1330
1331 /* __delay is delay_tsc whenever the hardware has TSC, thus always. */
1332 if (guest_tsc < tsc_deadline)
1333 __delay(tsc_deadline - guest_tsc);
5d87db71
RK
1334}
1335
97222cc8
ED
1336static void start_apic_timer(struct kvm_lapic *apic)
1337{
a3e06bbe 1338 ktime_t now;
d0659d94 1339
d3c7b77d 1340 atomic_set(&apic->lapic_timer.pending, 0);
0b975a3c 1341
a3e06bbe 1342 if (apic_lvtt_period(apic) || apic_lvtt_oneshot(apic)) {
d5b0b5b1 1343 /* lapic timer in oneshot or periodic mode */
a3e06bbe 1344 now = apic->lapic_timer.timer.base->get_time();
c48f1496 1345 apic->lapic_timer.period = (u64)kvm_apic_get_reg(apic, APIC_TMICT)
a3e06bbe
LJ
1346 * APIC_BUS_CYCLE_NS * apic->divide_count;
1347
1348 if (!apic->lapic_timer.period)
1349 return;
1350 /*
1351 * Do not allow the guest to program periodic timers with small
1352 * interval, since the hrtimers are not throttled by the host
1353 * scheduler.
1354 */
1355 if (apic_lvtt_period(apic)) {
1356 s64 min_period = min_timer_period_us * 1000LL;
1357
1358 if (apic->lapic_timer.period < min_period) {
1359 pr_info_ratelimited(
1360 "kvm: vcpu %i: requested %lld ns "
1361 "lapic timer period limited to %lld ns\n",
1362 apic->vcpu->vcpu_id,
1363 apic->lapic_timer.period, min_period);
1364 apic->lapic_timer.period = min_period;
1365 }
9bc5791d 1366 }
0b975a3c 1367
a3e06bbe
LJ
1368 hrtimer_start(&apic->lapic_timer.timer,
1369 ktime_add_ns(now, apic->lapic_timer.period),
1370 HRTIMER_MODE_ABS);
97222cc8 1371
a3e06bbe 1372 apic_debug("%s: bus cycle is %" PRId64 "ns, now 0x%016"
97222cc8
ED
1373 PRIx64 ", "
1374 "timer initial count 0x%x, period %lldns, "
b8688d51 1375 "expire @ 0x%016" PRIx64 ".\n", __func__,
97222cc8 1376 APIC_BUS_CYCLE_NS, ktime_to_ns(now),
c48f1496 1377 kvm_apic_get_reg(apic, APIC_TMICT),
d3c7b77d 1378 apic->lapic_timer.period,
97222cc8 1379 ktime_to_ns(ktime_add_ns(now,
d3c7b77d 1380 apic->lapic_timer.period)));
a3e06bbe
LJ
1381 } else if (apic_lvtt_tscdeadline(apic)) {
1382 /* lapic timer in tsc deadline mode */
1383 u64 guest_tsc, tscdeadline = apic->lapic_timer.tscdeadline;
1384 u64 ns = 0;
d0659d94 1385 ktime_t expire;
a3e06bbe 1386 struct kvm_vcpu *vcpu = apic->vcpu;
cc578287 1387 unsigned long this_tsc_khz = vcpu->arch.virtual_tsc_khz;
a3e06bbe
LJ
1388 unsigned long flags;
1389
1390 if (unlikely(!tscdeadline || !this_tsc_khz))
1391 return;
1392
1393 local_irq_save(flags);
1394
1395 now = apic->lapic_timer.timer.base->get_time();
4ba76538 1396 guest_tsc = kvm_read_l1_tsc(vcpu, rdtsc());
a3e06bbe
LJ
1397 if (likely(tscdeadline > guest_tsc)) {
1398 ns = (tscdeadline - guest_tsc) * 1000000ULL;
1399 do_div(ns, this_tsc_khz);
d0659d94
MT
1400 expire = ktime_add_ns(now, ns);
1401 expire = ktime_sub_ns(expire, lapic_timer_advance_ns);
1e0ad70c 1402 hrtimer_start(&apic->lapic_timer.timer,
d0659d94 1403 expire, HRTIMER_MODE_ABS);
1e0ad70c
RK
1404 } else
1405 apic_timer_expired(apic);
a3e06bbe
LJ
1406
1407 local_irq_restore(flags);
1408 }
97222cc8
ED
1409}
1410
cc6e462c
JK
1411static void apic_manage_nmi_watchdog(struct kvm_lapic *apic, u32 lvt0_val)
1412{
59fd1323 1413 bool lvt0_in_nmi_mode = apic_lvt_nmi_mode(lvt0_val);
cc6e462c 1414
59fd1323
RK
1415 if (apic->lvt0_in_nmi_mode != lvt0_in_nmi_mode) {
1416 apic->lvt0_in_nmi_mode = lvt0_in_nmi_mode;
1417 if (lvt0_in_nmi_mode) {
cc6e462c
JK
1418 apic_debug("Receive NMI setting on APIC_LVT0 "
1419 "for cpu %d\n", apic->vcpu->vcpu_id);
42720138 1420 atomic_inc(&apic->vcpu->kvm->arch.vapics_in_nmi_mode);
59fd1323
RK
1421 } else
1422 atomic_dec(&apic->vcpu->kvm->arch.vapics_in_nmi_mode);
1423 }
cc6e462c
JK
1424}
1425
0105d1a5 1426static int apic_reg_write(struct kvm_lapic *apic, u32 reg, u32 val)
97222cc8 1427{
0105d1a5 1428 int ret = 0;
97222cc8 1429
0105d1a5 1430 trace_kvm_apic_write(reg, val);
97222cc8 1431
0105d1a5 1432 switch (reg) {
97222cc8 1433 case APIC_ID: /* Local APIC ID */
0105d1a5 1434 if (!apic_x2apic_mode(apic))
1e08ec4a 1435 kvm_apic_set_id(apic, val >> 24);
0105d1a5
GN
1436 else
1437 ret = 1;
97222cc8
ED
1438 break;
1439
1440 case APIC_TASKPRI:
b209749f 1441 report_tpr_access(apic, true);
97222cc8
ED
1442 apic_set_tpr(apic, val & 0xff);
1443 break;
1444
1445 case APIC_EOI:
1446 apic_set_eoi(apic);
1447 break;
1448
1449 case APIC_LDR:
0105d1a5 1450 if (!apic_x2apic_mode(apic))
1e08ec4a 1451 kvm_apic_set_ldr(apic, val & APIC_LDR_MASK);
0105d1a5
GN
1452 else
1453 ret = 1;
97222cc8
ED
1454 break;
1455
1456 case APIC_DFR:
1e08ec4a 1457 if (!apic_x2apic_mode(apic)) {
0105d1a5 1458 apic_set_reg(apic, APIC_DFR, val | 0x0FFFFFFF);
1e08ec4a
GN
1459 recalculate_apic_map(apic->vcpu->kvm);
1460 } else
0105d1a5 1461 ret = 1;
97222cc8
ED
1462 break;
1463
fc61b800
GN
1464 case APIC_SPIV: {
1465 u32 mask = 0x3ff;
c48f1496 1466 if (kvm_apic_get_reg(apic, APIC_LVR) & APIC_LVR_DIRECTED_EOI)
fc61b800 1467 mask |= APIC_SPIV_DIRECTED_EOI;
f8c1ea10 1468 apic_set_spiv(apic, val & mask);
97222cc8
ED
1469 if (!(val & APIC_SPIV_APIC_ENABLED)) {
1470 int i;
1471 u32 lvt_val;
1472
1473 for (i = 0; i < APIC_LVT_NUM; i++) {
c48f1496 1474 lvt_val = kvm_apic_get_reg(apic,
97222cc8
ED
1475 APIC_LVTT + 0x10 * i);
1476 apic_set_reg(apic, APIC_LVTT + 0x10 * i,
1477 lvt_val | APIC_LVT_MASKED);
1478 }
b6ac0695 1479 apic_update_lvtt(apic);
d3c7b77d 1480 atomic_set(&apic->lapic_timer.pending, 0);
97222cc8
ED
1481
1482 }
1483 break;
fc61b800 1484 }
97222cc8
ED
1485 case APIC_ICR:
1486 /* No delay here, so we always clear the pending bit */
1487 apic_set_reg(apic, APIC_ICR, val & ~(1 << 12));
1488 apic_send_ipi(apic);
1489 break;
1490
1491 case APIC_ICR2:
0105d1a5
GN
1492 if (!apic_x2apic_mode(apic))
1493 val &= 0xff000000;
1494 apic_set_reg(apic, APIC_ICR2, val);
97222cc8
ED
1495 break;
1496
23930f95 1497 case APIC_LVT0:
cc6e462c 1498 apic_manage_nmi_watchdog(apic, val);
97222cc8
ED
1499 case APIC_LVTTHMR:
1500 case APIC_LVTPC:
97222cc8
ED
1501 case APIC_LVT1:
1502 case APIC_LVTERR:
1503 /* TODO: Check vector */
c48f1496 1504 if (!kvm_apic_sw_enabled(apic))
97222cc8
ED
1505 val |= APIC_LVT_MASKED;
1506
0105d1a5
GN
1507 val &= apic_lvt_mask[(reg - APIC_LVTT) >> 4];
1508 apic_set_reg(apic, reg, val);
97222cc8
ED
1509
1510 break;
1511
b6ac0695 1512 case APIC_LVTT:
c48f1496 1513 if (!kvm_apic_sw_enabled(apic))
a3e06bbe
LJ
1514 val |= APIC_LVT_MASKED;
1515 val &= (apic_lvt_mask[0] | apic->lapic_timer.timer_mode_mask);
1516 apic_set_reg(apic, APIC_LVTT, val);
b6ac0695 1517 apic_update_lvtt(apic);
a3e06bbe
LJ
1518 break;
1519
97222cc8 1520 case APIC_TMICT:
a3e06bbe
LJ
1521 if (apic_lvtt_tscdeadline(apic))
1522 break;
1523
d3c7b77d 1524 hrtimer_cancel(&apic->lapic_timer.timer);
97222cc8
ED
1525 apic_set_reg(apic, APIC_TMICT, val);
1526 start_apic_timer(apic);
0105d1a5 1527 break;
97222cc8
ED
1528
1529 case APIC_TDCR:
1530 if (val & 4)
7712de87 1531 apic_debug("KVM_WRITE:TDCR %x\n", val);
97222cc8
ED
1532 apic_set_reg(apic, APIC_TDCR, val);
1533 update_divide_count(apic);
1534 break;
1535
0105d1a5
GN
1536 case APIC_ESR:
1537 if (apic_x2apic_mode(apic) && val != 0) {
7712de87 1538 apic_debug("KVM_WRITE:ESR not zero %x\n", val);
0105d1a5
GN
1539 ret = 1;
1540 }
1541 break;
1542
1543 case APIC_SELF_IPI:
1544 if (apic_x2apic_mode(apic)) {
1545 apic_reg_write(apic, APIC_ICR, 0x40000 | (val & 0xff));
1546 } else
1547 ret = 1;
1548 break;
97222cc8 1549 default:
0105d1a5 1550 ret = 1;
97222cc8
ED
1551 break;
1552 }
0105d1a5
GN
1553 if (ret)
1554 apic_debug("Local APIC Write to read-only register %x\n", reg);
1555 return ret;
1556}
1557
e32edf4f 1558static int apic_mmio_write(struct kvm_vcpu *vcpu, struct kvm_io_device *this,
0105d1a5
GN
1559 gpa_t address, int len, const void *data)
1560{
1561 struct kvm_lapic *apic = to_lapic(this);
1562 unsigned int offset = address - apic->base_address;
1563 u32 val;
1564
1565 if (!apic_mmio_in_range(apic, address))
1566 return -EOPNOTSUPP;
1567
1568 /*
1569 * APIC register must be aligned on 128-bits boundary.
1570 * 32/64/128 bits registers must be accessed thru 32 bits.
1571 * Refer SDM 8.4.1
1572 */
1573 if (len != 4 || (offset & 0xf)) {
1574 /* Don't shout loud, $infamous_os would cause only noise. */
1575 apic_debug("apic write: bad size=%d %lx\n", len, (long)address);
756975bb 1576 return 0;
0105d1a5
GN
1577 }
1578
1579 val = *(u32*)data;
1580
1581 /* too common printing */
1582 if (offset != APIC_EOI)
1583 apic_debug("%s: offset 0x%x with length 0x%x, and value is "
1584 "0x%x\n", __func__, offset, len, val);
1585
1586 apic_reg_write(apic, offset & 0xff0, val);
1587
bda9020e 1588 return 0;
97222cc8
ED
1589}
1590
58fbbf26
KT
1591void kvm_lapic_set_eoi(struct kvm_vcpu *vcpu)
1592{
f8543d6a 1593 apic_reg_write(vcpu->arch.apic, APIC_EOI, 0);
58fbbf26
KT
1594}
1595EXPORT_SYMBOL_GPL(kvm_lapic_set_eoi);
1596
83d4c286
YZ
1597/* emulate APIC access in a trap manner */
1598void kvm_apic_write_nodecode(struct kvm_vcpu *vcpu, u32 offset)
1599{
1600 u32 val = 0;
1601
1602 /* hw has done the conditional check and inst decode */
1603 offset &= 0xff0;
1604
1605 apic_reg_read(vcpu->arch.apic, offset, 4, &val);
1606
1607 /* TODO: optimize to just emulate side effect w/o one more write */
1608 apic_reg_write(vcpu->arch.apic, offset, val);
1609}
1610EXPORT_SYMBOL_GPL(kvm_apic_write_nodecode);
1611
d589444e 1612void kvm_free_lapic(struct kvm_vcpu *vcpu)
97222cc8 1613{
f8c1ea10
GN
1614 struct kvm_lapic *apic = vcpu->arch.apic;
1615
ad312c7c 1616 if (!vcpu->arch.apic)
97222cc8
ED
1617 return;
1618
f8c1ea10 1619 hrtimer_cancel(&apic->lapic_timer.timer);
97222cc8 1620
c5cc421b
GN
1621 if (!(vcpu->arch.apic_base & MSR_IA32_APICBASE_ENABLE))
1622 static_key_slow_dec_deferred(&apic_hw_disabled);
1623
e462755c 1624 if (!apic->sw_enabled)
f8c1ea10 1625 static_key_slow_dec_deferred(&apic_sw_disabled);
97222cc8 1626
f8c1ea10
GN
1627 if (apic->regs)
1628 free_page((unsigned long)apic->regs);
1629
1630 kfree(apic);
97222cc8
ED
1631}
1632
1633/*
1634 *----------------------------------------------------------------------
1635 * LAPIC interface
1636 *----------------------------------------------------------------------
1637 */
1638
a3e06bbe
LJ
1639u64 kvm_get_lapic_tscdeadline_msr(struct kvm_vcpu *vcpu)
1640{
1641 struct kvm_lapic *apic = vcpu->arch.apic;
a3e06bbe 1642
bce87cce 1643 if (!lapic_in_kernel(vcpu) || apic_lvtt_oneshot(apic) ||
54e9818f 1644 apic_lvtt_period(apic))
a3e06bbe
LJ
1645 return 0;
1646
1647 return apic->lapic_timer.tscdeadline;
1648}
1649
1650void kvm_set_lapic_tscdeadline_msr(struct kvm_vcpu *vcpu, u64 data)
1651{
1652 struct kvm_lapic *apic = vcpu->arch.apic;
a3e06bbe 1653
bce87cce 1654 if (!lapic_in_kernel(vcpu) || apic_lvtt_oneshot(apic) ||
54e9818f 1655 apic_lvtt_period(apic))
a3e06bbe
LJ
1656 return;
1657
1658 hrtimer_cancel(&apic->lapic_timer.timer);
1659 apic->lapic_timer.tscdeadline = data;
1660 start_apic_timer(apic);
1661}
1662
97222cc8
ED
1663void kvm_lapic_set_tpr(struct kvm_vcpu *vcpu, unsigned long cr8)
1664{
ad312c7c 1665 struct kvm_lapic *apic = vcpu->arch.apic;
97222cc8 1666
b93463aa 1667 apic_set_tpr(apic, ((cr8 & 0x0f) << 4)
c48f1496 1668 | (kvm_apic_get_reg(apic, APIC_TASKPRI) & 4));
97222cc8
ED
1669}
1670
1671u64 kvm_lapic_get_cr8(struct kvm_vcpu *vcpu)
1672{
97222cc8
ED
1673 u64 tpr;
1674
c48f1496 1675 tpr = (u64) kvm_apic_get_reg(vcpu->arch.apic, APIC_TASKPRI);
97222cc8
ED
1676
1677 return (tpr & 0xf0) >> 4;
1678}
1679
1680void kvm_lapic_set_base(struct kvm_vcpu *vcpu, u64 value)
1681{
8d14695f 1682 u64 old_value = vcpu->arch.apic_base;
ad312c7c 1683 struct kvm_lapic *apic = vcpu->arch.apic;
97222cc8
ED
1684
1685 if (!apic) {
1686 value |= MSR_IA32_APICBASE_BSP;
ad312c7c 1687 vcpu->arch.apic_base = value;
97222cc8
ED
1688 return;
1689 }
c5af89b6 1690
e66d2ae7
JK
1691 vcpu->arch.apic_base = value;
1692
c5cc421b 1693 /* update jump label if enable bit changes */
0dce7cd6 1694 if ((old_value ^ value) & MSR_IA32_APICBASE_ENABLE) {
c5cc421b
GN
1695 if (value & MSR_IA32_APICBASE_ENABLE)
1696 static_key_slow_dec_deferred(&apic_hw_disabled);
1697 else
1698 static_key_slow_inc(&apic_hw_disabled.key);
1e08ec4a 1699 recalculate_apic_map(vcpu->kvm);
c5cc421b
GN
1700 }
1701
8d14695f
YZ
1702 if ((old_value ^ value) & X2APIC_ENABLE) {
1703 if (value & X2APIC_ENABLE) {
257b9a5f 1704 kvm_apic_set_x2apic_id(apic, vcpu->vcpu_id);
8d14695f
YZ
1705 kvm_x86_ops->set_virtual_x2apic_mode(vcpu, true);
1706 } else
1707 kvm_x86_ops->set_virtual_x2apic_mode(vcpu, false);
0105d1a5 1708 }
8d14695f 1709
ad312c7c 1710 apic->base_address = apic->vcpu->arch.apic_base &
97222cc8
ED
1711 MSR_IA32_APICBASE_BASE;
1712
db324fe6
NA
1713 if ((value & MSR_IA32_APICBASE_ENABLE) &&
1714 apic->base_address != APIC_DEFAULT_PHYS_BASE)
1715 pr_warn_once("APIC base relocation is unsupported by KVM");
1716
97222cc8
ED
1717 /* with FSB delivery interrupt, we can restart APIC functionality */
1718 apic_debug("apic base msr is 0x%016" PRIx64 ", and base address is "
ad312c7c 1719 "0x%lx.\n", apic->vcpu->arch.apic_base, apic->base_address);
97222cc8
ED
1720
1721}
1722
d28bc9dd 1723void kvm_lapic_reset(struct kvm_vcpu *vcpu, bool init_event)
97222cc8
ED
1724{
1725 struct kvm_lapic *apic;
1726 int i;
1727
b8688d51 1728 apic_debug("%s\n", __func__);
97222cc8
ED
1729
1730 ASSERT(vcpu);
ad312c7c 1731 apic = vcpu->arch.apic;
97222cc8
ED
1732 ASSERT(apic != NULL);
1733
1734 /* Stop the timer in case it's a reset to an active apic */
d3c7b77d 1735 hrtimer_cancel(&apic->lapic_timer.timer);
97222cc8 1736
d28bc9dd
NA
1737 if (!init_event)
1738 kvm_apic_set_id(apic, vcpu->vcpu_id);
fc61b800 1739 kvm_apic_set_version(apic->vcpu);
97222cc8
ED
1740
1741 for (i = 0; i < APIC_LVT_NUM; i++)
1742 apic_set_reg(apic, APIC_LVTT + 0x10 * i, APIC_LVT_MASKED);
b6ac0695 1743 apic_update_lvtt(apic);
0da029ed 1744 if (kvm_check_has_quirk(vcpu->kvm, KVM_X86_QUIRK_LINT0_REENABLED))
90de4a18
NA
1745 apic_set_reg(apic, APIC_LVT0,
1746 SET_APIC_DELIVERY_MODE(0, APIC_MODE_EXTINT));
59fd1323 1747 apic_manage_nmi_watchdog(apic, kvm_apic_get_reg(apic, APIC_LVT0));
97222cc8
ED
1748
1749 apic_set_reg(apic, APIC_DFR, 0xffffffffU);
f8c1ea10 1750 apic_set_spiv(apic, 0xff);
97222cc8 1751 apic_set_reg(apic, APIC_TASKPRI, 0);
c028dd6b
RK
1752 if (!apic_x2apic_mode(apic))
1753 kvm_apic_set_ldr(apic, 0);
97222cc8
ED
1754 apic_set_reg(apic, APIC_ESR, 0);
1755 apic_set_reg(apic, APIC_ICR, 0);
1756 apic_set_reg(apic, APIC_ICR2, 0);
1757 apic_set_reg(apic, APIC_TDCR, 0);
1758 apic_set_reg(apic, APIC_TMICT, 0);
1759 for (i = 0; i < 8; i++) {
1760 apic_set_reg(apic, APIC_IRR + 0x10 * i, 0);
1761 apic_set_reg(apic, APIC_ISR + 0x10 * i, 0);
1762 apic_set_reg(apic, APIC_TMR + 0x10 * i, 0);
1763 }
d62caabb
AS
1764 apic->irr_pending = vcpu->arch.apicv_active;
1765 apic->isr_count = vcpu->arch.apicv_active ? 1 : 0;
8680b94b 1766 apic->highest_isr_cache = -1;
b33ac88b 1767 update_divide_count(apic);
d3c7b77d 1768 atomic_set(&apic->lapic_timer.pending, 0);
c5af89b6 1769 if (kvm_vcpu_is_bsp(vcpu))
5dbc8f3f
GN
1770 kvm_lapic_set_base(vcpu,
1771 vcpu->arch.apic_base | MSR_IA32_APICBASE_BSP);
ae7a2a3f 1772 vcpu->arch.pv_eoi.msr_val = 0;
97222cc8
ED
1773 apic_update_ppr(apic);
1774
e1035715 1775 vcpu->arch.apic_arb_prio = 0;
41383771 1776 vcpu->arch.apic_attention = 0;
e1035715 1777
98eff52a 1778 apic_debug("%s: vcpu=%p, id=%d, base_msr="
b8688d51 1779 "0x%016" PRIx64 ", base_address=0x%0lx.\n", __func__,
97222cc8 1780 vcpu, kvm_apic_id(apic),
ad312c7c 1781 vcpu->arch.apic_base, apic->base_address);
97222cc8
ED
1782}
1783
97222cc8
ED
1784/*
1785 *----------------------------------------------------------------------
1786 * timer interface
1787 *----------------------------------------------------------------------
1788 */
1b9778da 1789
2a6eac96 1790static bool lapic_is_periodic(struct kvm_lapic *apic)
97222cc8 1791{
d3c7b77d 1792 return apic_lvtt_period(apic);
97222cc8
ED
1793}
1794
3d80840d
MT
1795int apic_has_pending_timer(struct kvm_vcpu *vcpu)
1796{
54e9818f 1797 struct kvm_lapic *apic = vcpu->arch.apic;
3d80840d 1798
1e3161b4 1799 if (apic_enabled(apic) && apic_lvt_enabled(apic, APIC_LVTT))
54e9818f 1800 return atomic_read(&apic->lapic_timer.pending);
3d80840d
MT
1801
1802 return 0;
1803}
1804
89342082 1805int kvm_apic_local_deliver(struct kvm_lapic *apic, int lvt_type)
1b9778da 1806{
c48f1496 1807 u32 reg = kvm_apic_get_reg(apic, lvt_type);
23930f95 1808 int vector, mode, trig_mode;
23930f95 1809
c48f1496 1810 if (kvm_apic_hw_enabled(apic) && !(reg & APIC_LVT_MASKED)) {
23930f95
JK
1811 vector = reg & APIC_VECTOR_MASK;
1812 mode = reg & APIC_MODE_MASK;
1813 trig_mode = reg & APIC_LVT_LEVEL_TRIGGER;
b4f2225c
YZ
1814 return __apic_accept_irq(apic, mode, vector, 1, trig_mode,
1815 NULL);
23930f95
JK
1816 }
1817 return 0;
1818}
1b9778da 1819
8fdb2351 1820void kvm_apic_nmi_wd_deliver(struct kvm_vcpu *vcpu)
23930f95 1821{
8fdb2351
JK
1822 struct kvm_lapic *apic = vcpu->arch.apic;
1823
1824 if (apic)
1825 kvm_apic_local_deliver(apic, APIC_LVT0);
1b9778da
ED
1826}
1827
d76685c4
GH
1828static const struct kvm_io_device_ops apic_mmio_ops = {
1829 .read = apic_mmio_read,
1830 .write = apic_mmio_write,
d76685c4
GH
1831};
1832
e9d90d47
AK
1833static enum hrtimer_restart apic_timer_fn(struct hrtimer *data)
1834{
1835 struct kvm_timer *ktimer = container_of(data, struct kvm_timer, timer);
2a6eac96 1836 struct kvm_lapic *apic = container_of(ktimer, struct kvm_lapic, lapic_timer);
e9d90d47 1837
5d87db71 1838 apic_timer_expired(apic);
e9d90d47 1839
2a6eac96 1840 if (lapic_is_periodic(apic)) {
e9d90d47
AK
1841 hrtimer_add_expires_ns(&ktimer->timer, ktimer->period);
1842 return HRTIMER_RESTART;
1843 } else
1844 return HRTIMER_NORESTART;
1845}
1846
97222cc8
ED
1847int kvm_create_lapic(struct kvm_vcpu *vcpu)
1848{
1849 struct kvm_lapic *apic;
1850
1851 ASSERT(vcpu != NULL);
1852 apic_debug("apic_init %d\n", vcpu->vcpu_id);
1853
1854 apic = kzalloc(sizeof(*apic), GFP_KERNEL);
1855 if (!apic)
1856 goto nomem;
1857
ad312c7c 1858 vcpu->arch.apic = apic;
97222cc8 1859
afc20184
TY
1860 apic->regs = (void *)get_zeroed_page(GFP_KERNEL);
1861 if (!apic->regs) {
97222cc8
ED
1862 printk(KERN_ERR "malloc apic regs error for vcpu %x\n",
1863 vcpu->vcpu_id);
d589444e 1864 goto nomem_free_apic;
97222cc8 1865 }
97222cc8
ED
1866 apic->vcpu = vcpu;
1867
d3c7b77d
MT
1868 hrtimer_init(&apic->lapic_timer.timer, CLOCK_MONOTONIC,
1869 HRTIMER_MODE_ABS);
e9d90d47 1870 apic->lapic_timer.timer.function = apic_timer_fn;
d3c7b77d 1871
c5cc421b
GN
1872 /*
1873 * APIC is created enabled. This will prevent kvm_lapic_set_base from
1874 * thinking that APIC satet has changed.
1875 */
1876 vcpu->arch.apic_base = MSR_IA32_APICBASE_ENABLE;
6aed64a8
GN
1877 kvm_lapic_set_base(vcpu,
1878 APIC_DEFAULT_PHYS_BASE | MSR_IA32_APICBASE_ENABLE);
97222cc8 1879
f8c1ea10 1880 static_key_slow_inc(&apic_sw_disabled.key); /* sw disabled at reset */
d28bc9dd 1881 kvm_lapic_reset(vcpu, false);
d76685c4 1882 kvm_iodevice_init(&apic->dev, &apic_mmio_ops);
97222cc8
ED
1883
1884 return 0;
d589444e
RR
1885nomem_free_apic:
1886 kfree(apic);
97222cc8 1887nomem:
97222cc8
ED
1888 return -ENOMEM;
1889}
97222cc8
ED
1890
1891int kvm_apic_has_interrupt(struct kvm_vcpu *vcpu)
1892{
ad312c7c 1893 struct kvm_lapic *apic = vcpu->arch.apic;
97222cc8
ED
1894 int highest_irr;
1895
f8543d6a 1896 if (!apic_enabled(apic))
97222cc8
ED
1897 return -1;
1898
6e5d865c 1899 apic_update_ppr(apic);
97222cc8
ED
1900 highest_irr = apic_find_highest_irr(apic);
1901 if ((highest_irr == -1) ||
c48f1496 1902 ((highest_irr & 0xF0) <= kvm_apic_get_reg(apic, APIC_PROCPRI)))
97222cc8
ED
1903 return -1;
1904 return highest_irr;
1905}
1906
40487c68
QH
1907int kvm_apic_accept_pic_intr(struct kvm_vcpu *vcpu)
1908{
c48f1496 1909 u32 lvt0 = kvm_apic_get_reg(vcpu->arch.apic, APIC_LVT0);
40487c68
QH
1910 int r = 0;
1911
c48f1496 1912 if (!kvm_apic_hw_enabled(vcpu->arch.apic))
e7dca5c0
CL
1913 r = 1;
1914 if ((lvt0 & APIC_LVT_MASKED) == 0 &&
1915 GET_APIC_DELIVERY_MODE(lvt0) == APIC_MODE_EXTINT)
1916 r = 1;
40487c68
QH
1917 return r;
1918}
1919
1b9778da
ED
1920void kvm_inject_apic_timer_irqs(struct kvm_vcpu *vcpu)
1921{
ad312c7c 1922 struct kvm_lapic *apic = vcpu->arch.apic;
1b9778da 1923
54e9818f 1924 if (atomic_read(&apic->lapic_timer.pending) > 0) {
f1ed0450 1925 kvm_apic_local_deliver(apic, APIC_LVTT);
fae0ba21
NA
1926 if (apic_lvtt_tscdeadline(apic))
1927 apic->lapic_timer.tscdeadline = 0;
f1ed0450 1928 atomic_set(&apic->lapic_timer.pending, 0);
1b9778da
ED
1929 }
1930}
1931
97222cc8
ED
1932int kvm_get_apic_interrupt(struct kvm_vcpu *vcpu)
1933{
1934 int vector = kvm_apic_has_interrupt(vcpu);
ad312c7c 1935 struct kvm_lapic *apic = vcpu->arch.apic;
97222cc8
ED
1936
1937 if (vector == -1)
1938 return -1;
1939
56cc2406
WL
1940 /*
1941 * We get here even with APIC virtualization enabled, if doing
1942 * nested virtualization and L1 runs with the "acknowledge interrupt
1943 * on exit" mode. Then we cannot inject the interrupt via RVI,
1944 * because the process would deliver it through the IDT.
1945 */
1946
8680b94b 1947 apic_set_isr(vector, apic);
97222cc8
ED
1948 apic_update_ppr(apic);
1949 apic_clear_irr(vector, apic);
5c919412
AS
1950
1951 if (test_bit(vector, vcpu_to_synic(vcpu)->auto_eoi_bitmap)) {
1952 apic_clear_isr(vector, apic);
1953 apic_update_ppr(apic);
1954 }
1955
97222cc8
ED
1956 return vector;
1957}
96ad2cc6 1958
64eb0620
GN
1959void kvm_apic_post_state_restore(struct kvm_vcpu *vcpu,
1960 struct kvm_lapic_state *s)
96ad2cc6 1961{
ad312c7c 1962 struct kvm_lapic *apic = vcpu->arch.apic;
96ad2cc6 1963
5dbc8f3f 1964 kvm_lapic_set_base(vcpu, vcpu->arch.apic_base);
64eb0620
GN
1965 /* set SPIV separately to get count of SW disabled APICs right */
1966 apic_set_spiv(apic, *((u32 *)(s->regs + APIC_SPIV)));
1967 memcpy(vcpu->arch.apic->regs, s->regs, sizeof *s);
1e08ec4a
GN
1968 /* call kvm_apic_set_id() to put apic into apic_map */
1969 kvm_apic_set_id(apic, kvm_apic_id(apic));
fc61b800
GN
1970 kvm_apic_set_version(vcpu);
1971
96ad2cc6 1972 apic_update_ppr(apic);
d3c7b77d 1973 hrtimer_cancel(&apic->lapic_timer.timer);
b6ac0695 1974 apic_update_lvtt(apic);
db138562 1975 apic_manage_nmi_watchdog(apic, kvm_apic_get_reg(apic, APIC_LVT0));
96ad2cc6
ED
1976 update_divide_count(apic);
1977 start_apic_timer(apic);
6e24a6ef 1978 apic->irr_pending = true;
d62caabb 1979 apic->isr_count = vcpu->arch.apicv_active ?
c7c9c56c 1980 1 : count_vectors(apic->regs + APIC_ISR);
8680b94b 1981 apic->highest_isr_cache = -1;
d62caabb 1982 if (vcpu->arch.apicv_active) {
4114c27d
WW
1983 kvm_x86_ops->hwapic_irr_update(vcpu,
1984 apic_find_highest_irr(apic));
b4eef9b3
TC
1985 kvm_x86_ops->hwapic_isr_update(vcpu->kvm,
1986 apic_find_highest_isr(apic));
d62caabb 1987 }
3842d135 1988 kvm_make_request(KVM_REQ_EVENT, vcpu);
49df6397
SR
1989 if (ioapic_in_kernel(vcpu->kvm))
1990 kvm_rtc_eoi_tracking_restore_one(vcpu);
0669a510
RK
1991
1992 vcpu->arch.apic_arb_prio = 0;
96ad2cc6 1993}
a3d7f85f 1994
2f52d58c 1995void __kvm_migrate_apic_timer(struct kvm_vcpu *vcpu)
a3d7f85f 1996{
a3d7f85f
ED
1997 struct hrtimer *timer;
1998
bce87cce 1999 if (!lapic_in_kernel(vcpu))
a3d7f85f
ED
2000 return;
2001
54e9818f 2002 timer = &vcpu->arch.apic->lapic_timer.timer;
a3d7f85f 2003 if (hrtimer_cancel(timer))
beb20d52 2004 hrtimer_start_expires(timer, HRTIMER_MODE_ABS);
a3d7f85f 2005}
b93463aa 2006
ae7a2a3f
MT
2007/*
2008 * apic_sync_pv_eoi_from_guest - called on vmexit or cancel interrupt
2009 *
2010 * Detect whether guest triggered PV EOI since the
2011 * last entry. If yes, set EOI on guests's behalf.
2012 * Clear PV EOI in guest memory in any case.
2013 */
2014static void apic_sync_pv_eoi_from_guest(struct kvm_vcpu *vcpu,
2015 struct kvm_lapic *apic)
2016{
2017 bool pending;
2018 int vector;
2019 /*
2020 * PV EOI state is derived from KVM_APIC_PV_EOI_PENDING in host
2021 * and KVM_PV_EOI_ENABLED in guest memory as follows:
2022 *
2023 * KVM_APIC_PV_EOI_PENDING is unset:
2024 * -> host disabled PV EOI.
2025 * KVM_APIC_PV_EOI_PENDING is set, KVM_PV_EOI_ENABLED is set:
2026 * -> host enabled PV EOI, guest did not execute EOI yet.
2027 * KVM_APIC_PV_EOI_PENDING is set, KVM_PV_EOI_ENABLED is unset:
2028 * -> host enabled PV EOI, guest executed EOI.
2029 */
2030 BUG_ON(!pv_eoi_enabled(vcpu));
2031 pending = pv_eoi_get_pending(vcpu);
2032 /*
2033 * Clear pending bit in any case: it will be set again on vmentry.
2034 * While this might not be ideal from performance point of view,
2035 * this makes sure pv eoi is only enabled when we know it's safe.
2036 */
2037 pv_eoi_clr_pending(vcpu);
2038 if (pending)
2039 return;
2040 vector = apic_set_eoi(apic);
2041 trace_kvm_pv_eoi(apic, vector);
2042}
2043
b93463aa
AK
2044void kvm_lapic_sync_from_vapic(struct kvm_vcpu *vcpu)
2045{
2046 u32 data;
b93463aa 2047
ae7a2a3f
MT
2048 if (test_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention))
2049 apic_sync_pv_eoi_from_guest(vcpu, vcpu->arch.apic);
2050
41383771 2051 if (!test_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention))
b93463aa
AK
2052 return;
2053
603242a8
NK
2054 if (kvm_read_guest_cached(vcpu->kvm, &vcpu->arch.apic->vapic_cache, &data,
2055 sizeof(u32)))
2056 return;
b93463aa
AK
2057
2058 apic_set_tpr(vcpu->arch.apic, data & 0xff);
2059}
2060
ae7a2a3f
MT
2061/*
2062 * apic_sync_pv_eoi_to_guest - called before vmentry
2063 *
2064 * Detect whether it's safe to enable PV EOI and
2065 * if yes do so.
2066 */
2067static void apic_sync_pv_eoi_to_guest(struct kvm_vcpu *vcpu,
2068 struct kvm_lapic *apic)
2069{
2070 if (!pv_eoi_enabled(vcpu) ||
2071 /* IRR set or many bits in ISR: could be nested. */
2072 apic->irr_pending ||
2073 /* Cache not set: could be safe but we don't bother. */
2074 apic->highest_isr_cache == -1 ||
2075 /* Need EOI to update ioapic. */
3bb345f3 2076 kvm_ioapic_handles_vector(apic, apic->highest_isr_cache)) {
ae7a2a3f
MT
2077 /*
2078 * PV EOI was disabled by apic_sync_pv_eoi_from_guest
2079 * so we need not do anything here.
2080 */
2081 return;
2082 }
2083
2084 pv_eoi_set_pending(apic->vcpu);
2085}
2086
b93463aa
AK
2087void kvm_lapic_sync_to_vapic(struct kvm_vcpu *vcpu)
2088{
2089 u32 data, tpr;
2090 int max_irr, max_isr;
ae7a2a3f 2091 struct kvm_lapic *apic = vcpu->arch.apic;
b93463aa 2092
ae7a2a3f
MT
2093 apic_sync_pv_eoi_to_guest(vcpu, apic);
2094
41383771 2095 if (!test_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention))
b93463aa
AK
2096 return;
2097
c48f1496 2098 tpr = kvm_apic_get_reg(apic, APIC_TASKPRI) & 0xff;
b93463aa
AK
2099 max_irr = apic_find_highest_irr(apic);
2100 if (max_irr < 0)
2101 max_irr = 0;
2102 max_isr = apic_find_highest_isr(apic);
2103 if (max_isr < 0)
2104 max_isr = 0;
2105 data = (tpr & 0xff) | ((max_isr & 0xf0) << 8) | (max_irr << 24);
2106
fda4e2e8
AH
2107 kvm_write_guest_cached(vcpu->kvm, &vcpu->arch.apic->vapic_cache, &data,
2108 sizeof(u32));
b93463aa
AK
2109}
2110
fda4e2e8 2111int kvm_lapic_set_vapic_addr(struct kvm_vcpu *vcpu, gpa_t vapic_addr)
b93463aa 2112{
fda4e2e8
AH
2113 if (vapic_addr) {
2114 if (kvm_gfn_to_hva_cache_init(vcpu->kvm,
2115 &vcpu->arch.apic->vapic_cache,
2116 vapic_addr, sizeof(u32)))
2117 return -EINVAL;
41383771 2118 __set_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention);
fda4e2e8 2119 } else {
41383771 2120 __clear_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention);
fda4e2e8
AH
2121 }
2122
2123 vcpu->arch.apic->vapic_addr = vapic_addr;
2124 return 0;
b93463aa 2125}
0105d1a5
GN
2126
2127int kvm_x2apic_msr_write(struct kvm_vcpu *vcpu, u32 msr, u64 data)
2128{
2129 struct kvm_lapic *apic = vcpu->arch.apic;
2130 u32 reg = (msr - APIC_BASE_MSR) << 4;
2131
35754c98 2132 if (!lapic_in_kernel(vcpu) || !apic_x2apic_mode(apic))
0105d1a5
GN
2133 return 1;
2134
c69d3d9b
NA
2135 if (reg == APIC_ICR2)
2136 return 1;
2137
0105d1a5 2138 /* if this is ICR write vector before command */
decdc283 2139 if (reg == APIC_ICR)
0105d1a5
GN
2140 apic_reg_write(apic, APIC_ICR2, (u32)(data >> 32));
2141 return apic_reg_write(apic, reg, (u32)data);
2142}
2143
2144int kvm_x2apic_msr_read(struct kvm_vcpu *vcpu, u32 msr, u64 *data)
2145{
2146 struct kvm_lapic *apic = vcpu->arch.apic;
2147 u32 reg = (msr - APIC_BASE_MSR) << 4, low, high = 0;
2148
35754c98 2149 if (!lapic_in_kernel(vcpu) || !apic_x2apic_mode(apic))
0105d1a5
GN
2150 return 1;
2151
c69d3d9b
NA
2152 if (reg == APIC_DFR || reg == APIC_ICR2) {
2153 apic_debug("KVM_APIC_READ: read x2apic reserved register %x\n",
2154 reg);
2155 return 1;
2156 }
2157
0105d1a5
GN
2158 if (apic_reg_read(apic, reg, 4, &low))
2159 return 1;
decdc283 2160 if (reg == APIC_ICR)
0105d1a5
GN
2161 apic_reg_read(apic, APIC_ICR2, 4, &high);
2162
2163 *data = (((u64)high) << 32) | low;
2164
2165 return 0;
2166}
10388a07
GN
2167
2168int kvm_hv_vapic_msr_write(struct kvm_vcpu *vcpu, u32 reg, u64 data)
2169{
2170 struct kvm_lapic *apic = vcpu->arch.apic;
2171
bce87cce 2172 if (!lapic_in_kernel(vcpu))
10388a07
GN
2173 return 1;
2174
2175 /* if this is ICR write vector before command */
2176 if (reg == APIC_ICR)
2177 apic_reg_write(apic, APIC_ICR2, (u32)(data >> 32));
2178 return apic_reg_write(apic, reg, (u32)data);
2179}
2180
2181int kvm_hv_vapic_msr_read(struct kvm_vcpu *vcpu, u32 reg, u64 *data)
2182{
2183 struct kvm_lapic *apic = vcpu->arch.apic;
2184 u32 low, high = 0;
2185
bce87cce 2186 if (!lapic_in_kernel(vcpu))
10388a07
GN
2187 return 1;
2188
2189 if (apic_reg_read(apic, reg, 4, &low))
2190 return 1;
2191 if (reg == APIC_ICR)
2192 apic_reg_read(apic, APIC_ICR2, 4, &high);
2193
2194 *data = (((u64)high) << 32) | low;
2195
2196 return 0;
2197}
ae7a2a3f
MT
2198
2199int kvm_lapic_enable_pv_eoi(struct kvm_vcpu *vcpu, u64 data)
2200{
2201 u64 addr = data & ~KVM_MSR_ENABLED;
2202 if (!IS_ALIGNED(addr, 4))
2203 return 1;
2204
2205 vcpu->arch.pv_eoi.msr_val = data;
2206 if (!pv_eoi_enabled(vcpu))
2207 return 0;
2208 return kvm_gfn_to_hva_cache_init(vcpu->kvm, &vcpu->arch.pv_eoi.data,
8f964525 2209 addr, sizeof(u8));
ae7a2a3f 2210}
c5cc421b 2211
66450a21
JK
2212void kvm_apic_accept_events(struct kvm_vcpu *vcpu)
2213{
2214 struct kvm_lapic *apic = vcpu->arch.apic;
2b4a273b 2215 u8 sipi_vector;
299018f4 2216 unsigned long pe;
66450a21 2217
bce87cce 2218 if (!lapic_in_kernel(vcpu) || !apic->pending_events)
66450a21
JK
2219 return;
2220
cd7764fe
PB
2221 /*
2222 * INITs are latched while in SMM. Because an SMM CPU cannot
2223 * be in KVM_MP_STATE_INIT_RECEIVED state, just eat SIPIs
2224 * and delay processing of INIT until the next RSM.
2225 */
2226 if (is_smm(vcpu)) {
2227 WARN_ON_ONCE(vcpu->arch.mp_state == KVM_MP_STATE_INIT_RECEIVED);
2228 if (test_bit(KVM_APIC_SIPI, &apic->pending_events))
2229 clear_bit(KVM_APIC_SIPI, &apic->pending_events);
2230 return;
2231 }
299018f4 2232
cd7764fe 2233 pe = xchg(&apic->pending_events, 0);
299018f4 2234 if (test_bit(KVM_APIC_INIT, &pe)) {
d28bc9dd
NA
2235 kvm_lapic_reset(vcpu, true);
2236 kvm_vcpu_reset(vcpu, true);
66450a21
JK
2237 if (kvm_vcpu_is_bsp(apic->vcpu))
2238 vcpu->arch.mp_state = KVM_MP_STATE_RUNNABLE;
2239 else
2240 vcpu->arch.mp_state = KVM_MP_STATE_INIT_RECEIVED;
2241 }
299018f4 2242 if (test_bit(KVM_APIC_SIPI, &pe) &&
66450a21
JK
2243 vcpu->arch.mp_state == KVM_MP_STATE_INIT_RECEIVED) {
2244 /* evaluate pending_events before reading the vector */
2245 smp_rmb();
2246 sipi_vector = apic->sipi_vector;
98eff52a 2247 apic_debug("vcpu %d received sipi with vector # %x\n",
66450a21
JK
2248 vcpu->vcpu_id, sipi_vector);
2249 kvm_vcpu_deliver_sipi_vector(vcpu, sipi_vector);
2250 vcpu->arch.mp_state = KVM_MP_STATE_RUNNABLE;
2251 }
2252}
2253
c5cc421b
GN
2254void kvm_lapic_init(void)
2255{
2256 /* do not patch jump label more than once per second */
2257 jump_label_rate_limit(&apic_hw_disabled, HZ);
f8c1ea10 2258 jump_label_rate_limit(&apic_sw_disabled, HZ);
c5cc421b 2259}