KVM: Move some x86 specific constants and structures to include/asm-x86
[linux-block.git] / arch / x86 / kvm / mmu.c
CommitLineData
6aa8b732
AK
1/*
2 * Kernel-based Virtual Machine driver for Linux
3 *
4 * This module enables machines with Intel VT-x extensions to run virtual
5 * machines without emulation or binary translation.
6 *
7 * MMU support
8 *
9 * Copyright (C) 2006 Qumranet, Inc.
10 *
11 * Authors:
12 * Yaniv Kamay <yaniv@qumranet.com>
13 * Avi Kivity <avi@qumranet.com>
14 *
15 * This work is licensed under the terms of the GNU GPL, version 2. See
16 * the COPYING file in the top-level directory.
17 *
18 */
e495606d
AK
19
20#include "vmx.h"
1d737c8a 21#include "mmu.h"
e495606d 22
edf88417 23#include <linux/kvm_host.h>
6aa8b732
AK
24#include <linux/types.h>
25#include <linux/string.h>
6aa8b732
AK
26#include <linux/mm.h>
27#include <linux/highmem.h>
28#include <linux/module.h>
448353ca 29#include <linux/swap.h>
05da4558 30#include <linux/hugetlb.h>
2f333bcb 31#include <linux/compiler.h>
6aa8b732 32
e495606d
AK
33#include <asm/page.h>
34#include <asm/cmpxchg.h>
4e542370 35#include <asm/io.h>
6aa8b732 36
18552672
JR
37/*
38 * When setting this variable to true it enables Two-Dimensional-Paging
39 * where the hardware walks 2 page tables:
40 * 1. the guest-virtual to guest-physical
41 * 2. while doing 1. it walks guest-physical to host-physical
42 * If the hardware supports that we don't need to do shadow paging.
43 */
2f333bcb 44bool tdp_enabled = false;
18552672 45
37a7d8b0
AK
46#undef MMU_DEBUG
47
48#undef AUDIT
49
50#ifdef AUDIT
51static void kvm_mmu_audit(struct kvm_vcpu *vcpu, const char *msg);
52#else
53static void kvm_mmu_audit(struct kvm_vcpu *vcpu, const char *msg) {}
54#endif
55
56#ifdef MMU_DEBUG
57
58#define pgprintk(x...) do { if (dbg) printk(x); } while (0)
59#define rmap_printk(x...) do { if (dbg) printk(x); } while (0)
60
61#else
62
63#define pgprintk(x...) do { } while (0)
64#define rmap_printk(x...) do { } while (0)
65
66#endif
67
68#if defined(MMU_DEBUG) || defined(AUDIT)
69static int dbg = 1;
70#endif
6aa8b732 71
d6c69ee9
YD
72#ifndef MMU_DEBUG
73#define ASSERT(x) do { } while (0)
74#else
6aa8b732
AK
75#define ASSERT(x) \
76 if (!(x)) { \
77 printk(KERN_WARNING "assertion failed %s:%d: %s\n", \
78 __FILE__, __LINE__, #x); \
79 }
d6c69ee9 80#endif
6aa8b732 81
cea0f0e7
AK
82#define PT64_PT_BITS 9
83#define PT64_ENT_PER_PAGE (1 << PT64_PT_BITS)
84#define PT32_PT_BITS 10
85#define PT32_ENT_PER_PAGE (1 << PT32_PT_BITS)
6aa8b732
AK
86
87#define PT_WRITABLE_SHIFT 1
88
89#define PT_PRESENT_MASK (1ULL << 0)
90#define PT_WRITABLE_MASK (1ULL << PT_WRITABLE_SHIFT)
91#define PT_USER_MASK (1ULL << 2)
92#define PT_PWT_MASK (1ULL << 3)
93#define PT_PCD_MASK (1ULL << 4)
94#define PT_ACCESSED_MASK (1ULL << 5)
95#define PT_DIRTY_MASK (1ULL << 6)
96#define PT_PAGE_SIZE_MASK (1ULL << 7)
97#define PT_PAT_MASK (1ULL << 7)
98#define PT_GLOBAL_MASK (1ULL << 8)
fe135d2c
AK
99#define PT64_NX_SHIFT 63
100#define PT64_NX_MASK (1ULL << PT64_NX_SHIFT)
6aa8b732
AK
101
102#define PT_PAT_SHIFT 7
103#define PT_DIR_PAT_SHIFT 12
104#define PT_DIR_PAT_MASK (1ULL << PT_DIR_PAT_SHIFT)
105
106#define PT32_DIR_PSE36_SIZE 4
107#define PT32_DIR_PSE36_SHIFT 13
d77c26fc
MD
108#define PT32_DIR_PSE36_MASK \
109 (((1ULL << PT32_DIR_PSE36_SIZE) - 1) << PT32_DIR_PSE36_SHIFT)
6aa8b732
AK
110
111
6aa8b732
AK
112#define PT_FIRST_AVAIL_BITS_SHIFT 9
113#define PT64_SECOND_AVAIL_BITS_SHIFT 52
114
6aa8b732
AK
115#define VALID_PAGE(x) ((x) != INVALID_PAGE)
116
117#define PT64_LEVEL_BITS 9
118
119#define PT64_LEVEL_SHIFT(level) \
d77c26fc 120 (PAGE_SHIFT + (level - 1) * PT64_LEVEL_BITS)
6aa8b732
AK
121
122#define PT64_LEVEL_MASK(level) \
123 (((1ULL << PT64_LEVEL_BITS) - 1) << PT64_LEVEL_SHIFT(level))
124
125#define PT64_INDEX(address, level)\
126 (((address) >> PT64_LEVEL_SHIFT(level)) & ((1 << PT64_LEVEL_BITS) - 1))
127
128
129#define PT32_LEVEL_BITS 10
130
131#define PT32_LEVEL_SHIFT(level) \
d77c26fc 132 (PAGE_SHIFT + (level - 1) * PT32_LEVEL_BITS)
6aa8b732
AK
133
134#define PT32_LEVEL_MASK(level) \
135 (((1ULL << PT32_LEVEL_BITS) - 1) << PT32_LEVEL_SHIFT(level))
136
137#define PT32_INDEX(address, level)\
138 (((address) >> PT32_LEVEL_SHIFT(level)) & ((1 << PT32_LEVEL_BITS) - 1))
139
140
27aba766 141#define PT64_BASE_ADDR_MASK (((1ULL << 52) - 1) & ~(u64)(PAGE_SIZE-1))
6aa8b732
AK
142#define PT64_DIR_BASE_ADDR_MASK \
143 (PT64_BASE_ADDR_MASK & ~((1ULL << (PAGE_SHIFT + PT64_LEVEL_BITS)) - 1))
144
145#define PT32_BASE_ADDR_MASK PAGE_MASK
146#define PT32_DIR_BASE_ADDR_MASK \
147 (PAGE_MASK & ~((1ULL << (PAGE_SHIFT + PT32_LEVEL_BITS)) - 1))
148
79539cec
AK
149#define PT64_PERM_MASK (PT_PRESENT_MASK | PT_WRITABLE_MASK | PT_USER_MASK \
150 | PT64_NX_MASK)
6aa8b732
AK
151
152#define PFERR_PRESENT_MASK (1U << 0)
153#define PFERR_WRITE_MASK (1U << 1)
154#define PFERR_USER_MASK (1U << 2)
73b1087e 155#define PFERR_FETCH_MASK (1U << 4)
6aa8b732
AK
156
157#define PT64_ROOT_LEVEL 4
158#define PT32_ROOT_LEVEL 2
159#define PT32E_ROOT_LEVEL 3
160
161#define PT_DIRECTORY_LEVEL 2
162#define PT_PAGE_TABLE_LEVEL 1
163
cd4a4e53
AK
164#define RMAP_EXT 4
165
fe135d2c
AK
166#define ACC_EXEC_MASK 1
167#define ACC_WRITE_MASK PT_WRITABLE_MASK
168#define ACC_USER_MASK PT_USER_MASK
169#define ACC_ALL (ACC_EXEC_MASK | ACC_WRITE_MASK | ACC_USER_MASK)
170
2f333bcb
MT
171struct kvm_pv_mmu_op_buffer {
172 void *ptr;
173 unsigned len;
174 unsigned processed;
175 char buf[512] __aligned(sizeof(long));
176};
177
cd4a4e53
AK
178struct kvm_rmap_desc {
179 u64 *shadow_ptes[RMAP_EXT];
180 struct kvm_rmap_desc *more;
181};
182
b5a33a75
AK
183static struct kmem_cache *pte_chain_cache;
184static struct kmem_cache *rmap_desc_cache;
d3d25b04 185static struct kmem_cache *mmu_page_header_cache;
b5a33a75 186
c7addb90
AK
187static u64 __read_mostly shadow_trap_nonpresent_pte;
188static u64 __read_mostly shadow_notrap_nonpresent_pte;
189
190void kvm_mmu_set_nonpresent_ptes(u64 trap_pte, u64 notrap_pte)
191{
192 shadow_trap_nonpresent_pte = trap_pte;
193 shadow_notrap_nonpresent_pte = notrap_pte;
194}
195EXPORT_SYMBOL_GPL(kvm_mmu_set_nonpresent_ptes);
196
6aa8b732
AK
197static int is_write_protection(struct kvm_vcpu *vcpu)
198{
ad312c7c 199 return vcpu->arch.cr0 & X86_CR0_WP;
6aa8b732
AK
200}
201
202static int is_cpuid_PSE36(void)
203{
204 return 1;
205}
206
73b1087e
AK
207static int is_nx(struct kvm_vcpu *vcpu)
208{
ad312c7c 209 return vcpu->arch.shadow_efer & EFER_NX;
73b1087e
AK
210}
211
6aa8b732
AK
212static int is_present_pte(unsigned long pte)
213{
214 return pte & PT_PRESENT_MASK;
215}
216
c7addb90
AK
217static int is_shadow_present_pte(u64 pte)
218{
c7addb90
AK
219 return pte != shadow_trap_nonpresent_pte
220 && pte != shadow_notrap_nonpresent_pte;
221}
222
05da4558
MT
223static int is_large_pte(u64 pte)
224{
225 return pte & PT_PAGE_SIZE_MASK;
226}
227
6aa8b732
AK
228static int is_writeble_pte(unsigned long pte)
229{
230 return pte & PT_WRITABLE_MASK;
231}
232
e3c5e7ec
AK
233static int is_dirty_pte(unsigned long pte)
234{
235 return pte & PT_DIRTY_MASK;
236}
237
cd4a4e53
AK
238static int is_rmap_pte(u64 pte)
239{
4b1a80fa 240 return is_shadow_present_pte(pte);
cd4a4e53
AK
241}
242
da928521
AK
243static gfn_t pse36_gfn_delta(u32 gpte)
244{
245 int shift = 32 - PT32_DIR_PSE36_SHIFT - PAGE_SHIFT;
246
247 return (gpte & PT32_DIR_PSE36_MASK) << shift;
248}
249
e663ee64
AK
250static void set_shadow_pte(u64 *sptep, u64 spte)
251{
252#ifdef CONFIG_X86_64
253 set_64bit((unsigned long *)sptep, spte);
254#else
255 set_64bit((unsigned long long *)sptep, spte);
256#endif
257}
258
e2dec939 259static int mmu_topup_memory_cache(struct kvm_mmu_memory_cache *cache,
2e3e5882 260 struct kmem_cache *base_cache, int min)
714b93da
AK
261{
262 void *obj;
263
264 if (cache->nobjs >= min)
e2dec939 265 return 0;
714b93da 266 while (cache->nobjs < ARRAY_SIZE(cache->objects)) {
2e3e5882 267 obj = kmem_cache_zalloc(base_cache, GFP_KERNEL);
714b93da 268 if (!obj)
e2dec939 269 return -ENOMEM;
714b93da
AK
270 cache->objects[cache->nobjs++] = obj;
271 }
e2dec939 272 return 0;
714b93da
AK
273}
274
275static void mmu_free_memory_cache(struct kvm_mmu_memory_cache *mc)
276{
277 while (mc->nobjs)
278 kfree(mc->objects[--mc->nobjs]);
279}
280
c1158e63 281static int mmu_topup_memory_cache_page(struct kvm_mmu_memory_cache *cache,
2e3e5882 282 int min)
c1158e63
AK
283{
284 struct page *page;
285
286 if (cache->nobjs >= min)
287 return 0;
288 while (cache->nobjs < ARRAY_SIZE(cache->objects)) {
2e3e5882 289 page = alloc_page(GFP_KERNEL);
c1158e63
AK
290 if (!page)
291 return -ENOMEM;
292 set_page_private(page, 0);
293 cache->objects[cache->nobjs++] = page_address(page);
294 }
295 return 0;
296}
297
298static void mmu_free_memory_cache_page(struct kvm_mmu_memory_cache *mc)
299{
300 while (mc->nobjs)
c4d198d5 301 free_page((unsigned long)mc->objects[--mc->nobjs]);
c1158e63
AK
302}
303
2e3e5882 304static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
714b93da 305{
e2dec939
AK
306 int r;
307
ad312c7c 308 r = mmu_topup_memory_cache(&vcpu->arch.mmu_pte_chain_cache,
2e3e5882 309 pte_chain_cache, 4);
e2dec939
AK
310 if (r)
311 goto out;
ad312c7c 312 r = mmu_topup_memory_cache(&vcpu->arch.mmu_rmap_desc_cache,
2e3e5882 313 rmap_desc_cache, 1);
d3d25b04
AK
314 if (r)
315 goto out;
ad312c7c 316 r = mmu_topup_memory_cache_page(&vcpu->arch.mmu_page_cache, 8);
d3d25b04
AK
317 if (r)
318 goto out;
ad312c7c 319 r = mmu_topup_memory_cache(&vcpu->arch.mmu_page_header_cache,
2e3e5882 320 mmu_page_header_cache, 4);
e2dec939
AK
321out:
322 return r;
714b93da
AK
323}
324
325static void mmu_free_memory_caches(struct kvm_vcpu *vcpu)
326{
ad312c7c
ZX
327 mmu_free_memory_cache(&vcpu->arch.mmu_pte_chain_cache);
328 mmu_free_memory_cache(&vcpu->arch.mmu_rmap_desc_cache);
329 mmu_free_memory_cache_page(&vcpu->arch.mmu_page_cache);
330 mmu_free_memory_cache(&vcpu->arch.mmu_page_header_cache);
714b93da
AK
331}
332
333static void *mmu_memory_cache_alloc(struct kvm_mmu_memory_cache *mc,
334 size_t size)
335{
336 void *p;
337
338 BUG_ON(!mc->nobjs);
339 p = mc->objects[--mc->nobjs];
340 memset(p, 0, size);
341 return p;
342}
343
714b93da
AK
344static struct kvm_pte_chain *mmu_alloc_pte_chain(struct kvm_vcpu *vcpu)
345{
ad312c7c 346 return mmu_memory_cache_alloc(&vcpu->arch.mmu_pte_chain_cache,
714b93da
AK
347 sizeof(struct kvm_pte_chain));
348}
349
90cb0529 350static void mmu_free_pte_chain(struct kvm_pte_chain *pc)
714b93da 351{
90cb0529 352 kfree(pc);
714b93da
AK
353}
354
355static struct kvm_rmap_desc *mmu_alloc_rmap_desc(struct kvm_vcpu *vcpu)
356{
ad312c7c 357 return mmu_memory_cache_alloc(&vcpu->arch.mmu_rmap_desc_cache,
714b93da
AK
358 sizeof(struct kvm_rmap_desc));
359}
360
90cb0529 361static void mmu_free_rmap_desc(struct kvm_rmap_desc *rd)
714b93da 362{
90cb0529 363 kfree(rd);
714b93da
AK
364}
365
05da4558
MT
366/*
367 * Return the pointer to the largepage write count for a given
368 * gfn, handling slots that are not large page aligned.
369 */
370static int *slot_largepage_idx(gfn_t gfn, struct kvm_memory_slot *slot)
371{
372 unsigned long idx;
373
374 idx = (gfn / KVM_PAGES_PER_HPAGE) -
375 (slot->base_gfn / KVM_PAGES_PER_HPAGE);
376 return &slot->lpage_info[idx].write_count;
377}
378
379static void account_shadowed(struct kvm *kvm, gfn_t gfn)
380{
381 int *write_count;
382
383 write_count = slot_largepage_idx(gfn, gfn_to_memslot(kvm, gfn));
384 *write_count += 1;
385 WARN_ON(*write_count > KVM_PAGES_PER_HPAGE);
386}
387
388static void unaccount_shadowed(struct kvm *kvm, gfn_t gfn)
389{
390 int *write_count;
391
392 write_count = slot_largepage_idx(gfn, gfn_to_memslot(kvm, gfn));
393 *write_count -= 1;
394 WARN_ON(*write_count < 0);
395}
396
397static int has_wrprotected_page(struct kvm *kvm, gfn_t gfn)
398{
399 struct kvm_memory_slot *slot = gfn_to_memslot(kvm, gfn);
400 int *largepage_idx;
401
402 if (slot) {
403 largepage_idx = slot_largepage_idx(gfn, slot);
404 return *largepage_idx;
405 }
406
407 return 1;
408}
409
410static int host_largepage_backed(struct kvm *kvm, gfn_t gfn)
411{
412 struct vm_area_struct *vma;
413 unsigned long addr;
414
415 addr = gfn_to_hva(kvm, gfn);
416 if (kvm_is_error_hva(addr))
417 return 0;
418
419 vma = find_vma(current->mm, addr);
420 if (vma && is_vm_hugetlb_page(vma))
421 return 1;
422
423 return 0;
424}
425
426static int is_largepage_backed(struct kvm_vcpu *vcpu, gfn_t large_gfn)
427{
428 struct kvm_memory_slot *slot;
429
430 if (has_wrprotected_page(vcpu->kvm, large_gfn))
431 return 0;
432
433 if (!host_largepage_backed(vcpu->kvm, large_gfn))
434 return 0;
435
436 slot = gfn_to_memslot(vcpu->kvm, large_gfn);
437 if (slot && slot->dirty_bitmap)
438 return 0;
439
440 return 1;
441}
442
290fc38d
IE
443/*
444 * Take gfn and return the reverse mapping to it.
445 * Note: gfn must be unaliased before this function get called
446 */
447
05da4558 448static unsigned long *gfn_to_rmap(struct kvm *kvm, gfn_t gfn, int lpage)
290fc38d
IE
449{
450 struct kvm_memory_slot *slot;
05da4558 451 unsigned long idx;
290fc38d
IE
452
453 slot = gfn_to_memslot(kvm, gfn);
05da4558
MT
454 if (!lpage)
455 return &slot->rmap[gfn - slot->base_gfn];
456
457 idx = (gfn / KVM_PAGES_PER_HPAGE) -
458 (slot->base_gfn / KVM_PAGES_PER_HPAGE);
459
460 return &slot->lpage_info[idx].rmap_pde;
290fc38d
IE
461}
462
cd4a4e53
AK
463/*
464 * Reverse mapping data structures:
465 *
290fc38d
IE
466 * If rmapp bit zero is zero, then rmapp point to the shadw page table entry
467 * that points to page_address(page).
cd4a4e53 468 *
290fc38d
IE
469 * If rmapp bit zero is one, (then rmap & ~1) points to a struct kvm_rmap_desc
470 * containing more mappings.
cd4a4e53 471 */
05da4558 472static void rmap_add(struct kvm_vcpu *vcpu, u64 *spte, gfn_t gfn, int lpage)
cd4a4e53 473{
4db35314 474 struct kvm_mmu_page *sp;
cd4a4e53 475 struct kvm_rmap_desc *desc;
290fc38d 476 unsigned long *rmapp;
cd4a4e53
AK
477 int i;
478
479 if (!is_rmap_pte(*spte))
480 return;
290fc38d 481 gfn = unalias_gfn(vcpu->kvm, gfn);
4db35314
AK
482 sp = page_header(__pa(spte));
483 sp->gfns[spte - sp->spt] = gfn;
05da4558 484 rmapp = gfn_to_rmap(vcpu->kvm, gfn, lpage);
290fc38d 485 if (!*rmapp) {
cd4a4e53 486 rmap_printk("rmap_add: %p %llx 0->1\n", spte, *spte);
290fc38d
IE
487 *rmapp = (unsigned long)spte;
488 } else if (!(*rmapp & 1)) {
cd4a4e53 489 rmap_printk("rmap_add: %p %llx 1->many\n", spte, *spte);
714b93da 490 desc = mmu_alloc_rmap_desc(vcpu);
290fc38d 491 desc->shadow_ptes[0] = (u64 *)*rmapp;
cd4a4e53 492 desc->shadow_ptes[1] = spte;
290fc38d 493 *rmapp = (unsigned long)desc | 1;
cd4a4e53
AK
494 } else {
495 rmap_printk("rmap_add: %p %llx many->many\n", spte, *spte);
290fc38d 496 desc = (struct kvm_rmap_desc *)(*rmapp & ~1ul);
cd4a4e53
AK
497 while (desc->shadow_ptes[RMAP_EXT-1] && desc->more)
498 desc = desc->more;
499 if (desc->shadow_ptes[RMAP_EXT-1]) {
714b93da 500 desc->more = mmu_alloc_rmap_desc(vcpu);
cd4a4e53
AK
501 desc = desc->more;
502 }
503 for (i = 0; desc->shadow_ptes[i]; ++i)
504 ;
505 desc->shadow_ptes[i] = spte;
506 }
507}
508
290fc38d 509static void rmap_desc_remove_entry(unsigned long *rmapp,
cd4a4e53
AK
510 struct kvm_rmap_desc *desc,
511 int i,
512 struct kvm_rmap_desc *prev_desc)
513{
514 int j;
515
516 for (j = RMAP_EXT - 1; !desc->shadow_ptes[j] && j > i; --j)
517 ;
518 desc->shadow_ptes[i] = desc->shadow_ptes[j];
11718b4d 519 desc->shadow_ptes[j] = NULL;
cd4a4e53
AK
520 if (j != 0)
521 return;
522 if (!prev_desc && !desc->more)
290fc38d 523 *rmapp = (unsigned long)desc->shadow_ptes[0];
cd4a4e53
AK
524 else
525 if (prev_desc)
526 prev_desc->more = desc->more;
527 else
290fc38d 528 *rmapp = (unsigned long)desc->more | 1;
90cb0529 529 mmu_free_rmap_desc(desc);
cd4a4e53
AK
530}
531
290fc38d 532static void rmap_remove(struct kvm *kvm, u64 *spte)
cd4a4e53 533{
cd4a4e53
AK
534 struct kvm_rmap_desc *desc;
535 struct kvm_rmap_desc *prev_desc;
4db35314 536 struct kvm_mmu_page *sp;
76c35c6e 537 struct page *page;
290fc38d 538 unsigned long *rmapp;
cd4a4e53
AK
539 int i;
540
541 if (!is_rmap_pte(*spte))
542 return;
4db35314 543 sp = page_header(__pa(spte));
76c35c6e 544 page = pfn_to_page((*spte & PT64_BASE_ADDR_MASK) >> PAGE_SHIFT);
448353ca 545 mark_page_accessed(page);
b4231d61 546 if (is_writeble_pte(*spte))
76c35c6e 547 kvm_release_page_dirty(page);
b4231d61 548 else
76c35c6e 549 kvm_release_page_clean(page);
05da4558 550 rmapp = gfn_to_rmap(kvm, sp->gfns[spte - sp->spt], is_large_pte(*spte));
290fc38d 551 if (!*rmapp) {
cd4a4e53
AK
552 printk(KERN_ERR "rmap_remove: %p %llx 0->BUG\n", spte, *spte);
553 BUG();
290fc38d 554 } else if (!(*rmapp & 1)) {
cd4a4e53 555 rmap_printk("rmap_remove: %p %llx 1->0\n", spte, *spte);
290fc38d 556 if ((u64 *)*rmapp != spte) {
cd4a4e53
AK
557 printk(KERN_ERR "rmap_remove: %p %llx 1->BUG\n",
558 spte, *spte);
559 BUG();
560 }
290fc38d 561 *rmapp = 0;
cd4a4e53
AK
562 } else {
563 rmap_printk("rmap_remove: %p %llx many->many\n", spte, *spte);
290fc38d 564 desc = (struct kvm_rmap_desc *)(*rmapp & ~1ul);
cd4a4e53
AK
565 prev_desc = NULL;
566 while (desc) {
567 for (i = 0; i < RMAP_EXT && desc->shadow_ptes[i]; ++i)
568 if (desc->shadow_ptes[i] == spte) {
290fc38d 569 rmap_desc_remove_entry(rmapp,
714b93da 570 desc, i,
cd4a4e53
AK
571 prev_desc);
572 return;
573 }
574 prev_desc = desc;
575 desc = desc->more;
576 }
577 BUG();
578 }
579}
580
98348e95 581static u64 *rmap_next(struct kvm *kvm, unsigned long *rmapp, u64 *spte)
374cbac0 582{
374cbac0 583 struct kvm_rmap_desc *desc;
98348e95
IE
584 struct kvm_rmap_desc *prev_desc;
585 u64 *prev_spte;
586 int i;
587
588 if (!*rmapp)
589 return NULL;
590 else if (!(*rmapp & 1)) {
591 if (!spte)
592 return (u64 *)*rmapp;
593 return NULL;
594 }
595 desc = (struct kvm_rmap_desc *)(*rmapp & ~1ul);
596 prev_desc = NULL;
597 prev_spte = NULL;
598 while (desc) {
599 for (i = 0; i < RMAP_EXT && desc->shadow_ptes[i]; ++i) {
600 if (prev_spte == spte)
601 return desc->shadow_ptes[i];
602 prev_spte = desc->shadow_ptes[i];
603 }
604 desc = desc->more;
605 }
606 return NULL;
607}
608
609static void rmap_write_protect(struct kvm *kvm, u64 gfn)
610{
290fc38d 611 unsigned long *rmapp;
374cbac0 612 u64 *spte;
caa5b8a5 613 int write_protected = 0;
374cbac0 614
4a4c9924 615 gfn = unalias_gfn(kvm, gfn);
05da4558 616 rmapp = gfn_to_rmap(kvm, gfn, 0);
374cbac0 617
98348e95
IE
618 spte = rmap_next(kvm, rmapp, NULL);
619 while (spte) {
374cbac0 620 BUG_ON(!spte);
374cbac0 621 BUG_ON(!(*spte & PT_PRESENT_MASK));
374cbac0 622 rmap_printk("rmap_write_protect: spte %p %llx\n", spte, *spte);
caa5b8a5 623 if (is_writeble_pte(*spte)) {
9647c14c 624 set_shadow_pte(spte, *spte & ~PT_WRITABLE_MASK);
caa5b8a5
ED
625 write_protected = 1;
626 }
9647c14c 627 spte = rmap_next(kvm, rmapp, spte);
374cbac0 628 }
05da4558
MT
629 /* check for huge page mappings */
630 rmapp = gfn_to_rmap(kvm, gfn, 1);
631 spte = rmap_next(kvm, rmapp, NULL);
632 while (spte) {
633 BUG_ON(!spte);
634 BUG_ON(!(*spte & PT_PRESENT_MASK));
635 BUG_ON((*spte & (PT_PAGE_SIZE_MASK|PT_PRESENT_MASK)) != (PT_PAGE_SIZE_MASK|PT_PRESENT_MASK));
636 pgprintk("rmap_write_protect(large): spte %p %llx %lld\n", spte, *spte, gfn);
637 if (is_writeble_pte(*spte)) {
638 rmap_remove(kvm, spte);
639 --kvm->stat.lpages;
640 set_shadow_pte(spte, shadow_trap_nonpresent_pte);
641 write_protected = 1;
642 }
643 spte = rmap_next(kvm, rmapp, spte);
644 }
645
caa5b8a5
ED
646 if (write_protected)
647 kvm_flush_remote_tlbs(kvm);
05da4558
MT
648
649 account_shadowed(kvm, gfn);
374cbac0
AK
650}
651
d6c69ee9 652#ifdef MMU_DEBUG
47ad8e68 653static int is_empty_shadow_page(u64 *spt)
6aa8b732 654{
139bdb2d
AK
655 u64 *pos;
656 u64 *end;
657
47ad8e68 658 for (pos = spt, end = pos + PAGE_SIZE / sizeof(u64); pos != end; pos++)
d196e343 659 if (*pos != shadow_trap_nonpresent_pte) {
b8688d51 660 printk(KERN_ERR "%s: %p %llx\n", __func__,
139bdb2d 661 pos, *pos);
6aa8b732 662 return 0;
139bdb2d 663 }
6aa8b732
AK
664 return 1;
665}
d6c69ee9 666#endif
6aa8b732 667
4db35314 668static void kvm_mmu_free_page(struct kvm *kvm, struct kvm_mmu_page *sp)
260746c0 669{
4db35314
AK
670 ASSERT(is_empty_shadow_page(sp->spt));
671 list_del(&sp->link);
672 __free_page(virt_to_page(sp->spt));
673 __free_page(virt_to_page(sp->gfns));
674 kfree(sp);
f05e70ac 675 ++kvm->arch.n_free_mmu_pages;
260746c0
AK
676}
677
cea0f0e7
AK
678static unsigned kvm_page_table_hashfn(gfn_t gfn)
679{
1ae0a13d 680 return gfn & ((1 << KVM_MMU_HASH_SHIFT) - 1);
cea0f0e7
AK
681}
682
25c0de2c
AK
683static struct kvm_mmu_page *kvm_mmu_alloc_page(struct kvm_vcpu *vcpu,
684 u64 *parent_pte)
6aa8b732 685{
4db35314 686 struct kvm_mmu_page *sp;
6aa8b732 687
ad312c7c
ZX
688 sp = mmu_memory_cache_alloc(&vcpu->arch.mmu_page_header_cache, sizeof *sp);
689 sp->spt = mmu_memory_cache_alloc(&vcpu->arch.mmu_page_cache, PAGE_SIZE);
690 sp->gfns = mmu_memory_cache_alloc(&vcpu->arch.mmu_page_cache, PAGE_SIZE);
4db35314 691 set_page_private(virt_to_page(sp->spt), (unsigned long)sp);
f05e70ac 692 list_add(&sp->link, &vcpu->kvm->arch.active_mmu_pages);
4db35314
AK
693 ASSERT(is_empty_shadow_page(sp->spt));
694 sp->slot_bitmap = 0;
695 sp->multimapped = 0;
696 sp->parent_pte = parent_pte;
f05e70ac 697 --vcpu->kvm->arch.n_free_mmu_pages;
4db35314 698 return sp;
6aa8b732
AK
699}
700
714b93da 701static void mmu_page_add_parent_pte(struct kvm_vcpu *vcpu,
4db35314 702 struct kvm_mmu_page *sp, u64 *parent_pte)
cea0f0e7
AK
703{
704 struct kvm_pte_chain *pte_chain;
705 struct hlist_node *node;
706 int i;
707
708 if (!parent_pte)
709 return;
4db35314
AK
710 if (!sp->multimapped) {
711 u64 *old = sp->parent_pte;
cea0f0e7
AK
712
713 if (!old) {
4db35314 714 sp->parent_pte = parent_pte;
cea0f0e7
AK
715 return;
716 }
4db35314 717 sp->multimapped = 1;
714b93da 718 pte_chain = mmu_alloc_pte_chain(vcpu);
4db35314
AK
719 INIT_HLIST_HEAD(&sp->parent_ptes);
720 hlist_add_head(&pte_chain->link, &sp->parent_ptes);
cea0f0e7
AK
721 pte_chain->parent_ptes[0] = old;
722 }
4db35314 723 hlist_for_each_entry(pte_chain, node, &sp->parent_ptes, link) {
cea0f0e7
AK
724 if (pte_chain->parent_ptes[NR_PTE_CHAIN_ENTRIES-1])
725 continue;
726 for (i = 0; i < NR_PTE_CHAIN_ENTRIES; ++i)
727 if (!pte_chain->parent_ptes[i]) {
728 pte_chain->parent_ptes[i] = parent_pte;
729 return;
730 }
731 }
714b93da 732 pte_chain = mmu_alloc_pte_chain(vcpu);
cea0f0e7 733 BUG_ON(!pte_chain);
4db35314 734 hlist_add_head(&pte_chain->link, &sp->parent_ptes);
cea0f0e7
AK
735 pte_chain->parent_ptes[0] = parent_pte;
736}
737
4db35314 738static void mmu_page_remove_parent_pte(struct kvm_mmu_page *sp,
cea0f0e7
AK
739 u64 *parent_pte)
740{
741 struct kvm_pte_chain *pte_chain;
742 struct hlist_node *node;
743 int i;
744
4db35314
AK
745 if (!sp->multimapped) {
746 BUG_ON(sp->parent_pte != parent_pte);
747 sp->parent_pte = NULL;
cea0f0e7
AK
748 return;
749 }
4db35314 750 hlist_for_each_entry(pte_chain, node, &sp->parent_ptes, link)
cea0f0e7
AK
751 for (i = 0; i < NR_PTE_CHAIN_ENTRIES; ++i) {
752 if (!pte_chain->parent_ptes[i])
753 break;
754 if (pte_chain->parent_ptes[i] != parent_pte)
755 continue;
697fe2e2
AK
756 while (i + 1 < NR_PTE_CHAIN_ENTRIES
757 && pte_chain->parent_ptes[i + 1]) {
cea0f0e7
AK
758 pte_chain->parent_ptes[i]
759 = pte_chain->parent_ptes[i + 1];
760 ++i;
761 }
762 pte_chain->parent_ptes[i] = NULL;
697fe2e2
AK
763 if (i == 0) {
764 hlist_del(&pte_chain->link);
90cb0529 765 mmu_free_pte_chain(pte_chain);
4db35314
AK
766 if (hlist_empty(&sp->parent_ptes)) {
767 sp->multimapped = 0;
768 sp->parent_pte = NULL;
697fe2e2
AK
769 }
770 }
cea0f0e7
AK
771 return;
772 }
773 BUG();
774}
775
4db35314 776static struct kvm_mmu_page *kvm_mmu_lookup_page(struct kvm *kvm, gfn_t gfn)
cea0f0e7
AK
777{
778 unsigned index;
779 struct hlist_head *bucket;
4db35314 780 struct kvm_mmu_page *sp;
cea0f0e7
AK
781 struct hlist_node *node;
782
b8688d51 783 pgprintk("%s: looking for gfn %lx\n", __func__, gfn);
1ae0a13d 784 index = kvm_page_table_hashfn(gfn);
f05e70ac 785 bucket = &kvm->arch.mmu_page_hash[index];
4db35314 786 hlist_for_each_entry(sp, node, bucket, hash_link)
2e53d63a
MT
787 if (sp->gfn == gfn && !sp->role.metaphysical
788 && !sp->role.invalid) {
cea0f0e7 789 pgprintk("%s: found role %x\n",
b8688d51 790 __func__, sp->role.word);
4db35314 791 return sp;
cea0f0e7
AK
792 }
793 return NULL;
794}
795
796static struct kvm_mmu_page *kvm_mmu_get_page(struct kvm_vcpu *vcpu,
797 gfn_t gfn,
798 gva_t gaddr,
799 unsigned level,
800 int metaphysical,
41074d07 801 unsigned access,
f7d9c7b7 802 u64 *parent_pte)
cea0f0e7
AK
803{
804 union kvm_mmu_page_role role;
805 unsigned index;
806 unsigned quadrant;
807 struct hlist_head *bucket;
4db35314 808 struct kvm_mmu_page *sp;
cea0f0e7
AK
809 struct hlist_node *node;
810
811 role.word = 0;
ad312c7c 812 role.glevels = vcpu->arch.mmu.root_level;
cea0f0e7
AK
813 role.level = level;
814 role.metaphysical = metaphysical;
41074d07 815 role.access = access;
ad312c7c 816 if (vcpu->arch.mmu.root_level <= PT32_ROOT_LEVEL) {
cea0f0e7
AK
817 quadrant = gaddr >> (PAGE_SHIFT + (PT64_PT_BITS * level));
818 quadrant &= (1 << ((PT32_PT_BITS - PT64_PT_BITS) * level)) - 1;
819 role.quadrant = quadrant;
820 }
b8688d51 821 pgprintk("%s: looking gfn %lx role %x\n", __func__,
cea0f0e7 822 gfn, role.word);
1ae0a13d 823 index = kvm_page_table_hashfn(gfn);
f05e70ac 824 bucket = &vcpu->kvm->arch.mmu_page_hash[index];
4db35314
AK
825 hlist_for_each_entry(sp, node, bucket, hash_link)
826 if (sp->gfn == gfn && sp->role.word == role.word) {
827 mmu_page_add_parent_pte(vcpu, sp, parent_pte);
b8688d51 828 pgprintk("%s: found\n", __func__);
4db35314 829 return sp;
cea0f0e7 830 }
dfc5aa00 831 ++vcpu->kvm->stat.mmu_cache_miss;
4db35314
AK
832 sp = kvm_mmu_alloc_page(vcpu, parent_pte);
833 if (!sp)
834 return sp;
b8688d51 835 pgprintk("%s: adding gfn %lx role %x\n", __func__, gfn, role.word);
4db35314
AK
836 sp->gfn = gfn;
837 sp->role = role;
838 hlist_add_head(&sp->hash_link, bucket);
ad312c7c 839 vcpu->arch.mmu.prefetch_page(vcpu, sp);
374cbac0 840 if (!metaphysical)
4a4c9924 841 rmap_write_protect(vcpu->kvm, gfn);
4db35314 842 return sp;
cea0f0e7
AK
843}
844
90cb0529 845static void kvm_mmu_page_unlink_children(struct kvm *kvm,
4db35314 846 struct kvm_mmu_page *sp)
a436036b 847{
697fe2e2
AK
848 unsigned i;
849 u64 *pt;
850 u64 ent;
851
4db35314 852 pt = sp->spt;
697fe2e2 853
4db35314 854 if (sp->role.level == PT_PAGE_TABLE_LEVEL) {
697fe2e2 855 for (i = 0; i < PT64_ENT_PER_PAGE; ++i) {
c7addb90 856 if (is_shadow_present_pte(pt[i]))
290fc38d 857 rmap_remove(kvm, &pt[i]);
c7addb90 858 pt[i] = shadow_trap_nonpresent_pte;
697fe2e2 859 }
90cb0529 860 kvm_flush_remote_tlbs(kvm);
697fe2e2
AK
861 return;
862 }
863
864 for (i = 0; i < PT64_ENT_PER_PAGE; ++i) {
865 ent = pt[i];
866
05da4558
MT
867 if (is_shadow_present_pte(ent)) {
868 if (!is_large_pte(ent)) {
869 ent &= PT64_BASE_ADDR_MASK;
870 mmu_page_remove_parent_pte(page_header(ent),
871 &pt[i]);
872 } else {
873 --kvm->stat.lpages;
874 rmap_remove(kvm, &pt[i]);
875 }
876 }
c7addb90 877 pt[i] = shadow_trap_nonpresent_pte;
697fe2e2 878 }
90cb0529 879 kvm_flush_remote_tlbs(kvm);
a436036b
AK
880}
881
4db35314 882static void kvm_mmu_put_page(struct kvm_mmu_page *sp, u64 *parent_pte)
cea0f0e7 883{
4db35314 884 mmu_page_remove_parent_pte(sp, parent_pte);
a436036b
AK
885}
886
12b7d28f
AK
887static void kvm_mmu_reset_last_pte_updated(struct kvm *kvm)
888{
889 int i;
890
891 for (i = 0; i < KVM_MAX_VCPUS; ++i)
892 if (kvm->vcpus[i])
ad312c7c 893 kvm->vcpus[i]->arch.last_pte_updated = NULL;
12b7d28f
AK
894}
895
4db35314 896static void kvm_mmu_zap_page(struct kvm *kvm, struct kvm_mmu_page *sp)
a436036b
AK
897{
898 u64 *parent_pte;
899
4cee5764 900 ++kvm->stat.mmu_shadow_zapped;
4db35314
AK
901 while (sp->multimapped || sp->parent_pte) {
902 if (!sp->multimapped)
903 parent_pte = sp->parent_pte;
a436036b
AK
904 else {
905 struct kvm_pte_chain *chain;
906
4db35314 907 chain = container_of(sp->parent_ptes.first,
a436036b
AK
908 struct kvm_pte_chain, link);
909 parent_pte = chain->parent_ptes[0];
910 }
697fe2e2 911 BUG_ON(!parent_pte);
4db35314 912 kvm_mmu_put_page(sp, parent_pte);
c7addb90 913 set_shadow_pte(parent_pte, shadow_trap_nonpresent_pte);
a436036b 914 }
4db35314
AK
915 kvm_mmu_page_unlink_children(kvm, sp);
916 if (!sp->root_count) {
05da4558
MT
917 if (!sp->role.metaphysical)
918 unaccount_shadowed(kvm, sp->gfn);
4db35314
AK
919 hlist_del(&sp->hash_link);
920 kvm_mmu_free_page(kvm, sp);
2e53d63a 921 } else {
f05e70ac 922 list_move(&sp->link, &kvm->arch.active_mmu_pages);
2e53d63a
MT
923 sp->role.invalid = 1;
924 kvm_reload_remote_mmus(kvm);
925 }
12b7d28f 926 kvm_mmu_reset_last_pte_updated(kvm);
a436036b
AK
927}
928
82ce2c96
IE
929/*
930 * Changing the number of mmu pages allocated to the vm
931 * Note: if kvm_nr_mmu_pages is too small, you will get dead lock
932 */
933void kvm_mmu_change_mmu_pages(struct kvm *kvm, unsigned int kvm_nr_mmu_pages)
934{
935 /*
936 * If we set the number of mmu pages to be smaller be than the
937 * number of actived pages , we must to free some mmu pages before we
938 * change the value
939 */
940
f05e70ac 941 if ((kvm->arch.n_alloc_mmu_pages - kvm->arch.n_free_mmu_pages) >
82ce2c96 942 kvm_nr_mmu_pages) {
f05e70ac
ZX
943 int n_used_mmu_pages = kvm->arch.n_alloc_mmu_pages
944 - kvm->arch.n_free_mmu_pages;
82ce2c96
IE
945
946 while (n_used_mmu_pages > kvm_nr_mmu_pages) {
947 struct kvm_mmu_page *page;
948
f05e70ac 949 page = container_of(kvm->arch.active_mmu_pages.prev,
82ce2c96
IE
950 struct kvm_mmu_page, link);
951 kvm_mmu_zap_page(kvm, page);
952 n_used_mmu_pages--;
953 }
f05e70ac 954 kvm->arch.n_free_mmu_pages = 0;
82ce2c96
IE
955 }
956 else
f05e70ac
ZX
957 kvm->arch.n_free_mmu_pages += kvm_nr_mmu_pages
958 - kvm->arch.n_alloc_mmu_pages;
82ce2c96 959
f05e70ac 960 kvm->arch.n_alloc_mmu_pages = kvm_nr_mmu_pages;
82ce2c96
IE
961}
962
f67a46f4 963static int kvm_mmu_unprotect_page(struct kvm *kvm, gfn_t gfn)
a436036b
AK
964{
965 unsigned index;
966 struct hlist_head *bucket;
4db35314 967 struct kvm_mmu_page *sp;
a436036b
AK
968 struct hlist_node *node, *n;
969 int r;
970
b8688d51 971 pgprintk("%s: looking for gfn %lx\n", __func__, gfn);
a436036b 972 r = 0;
1ae0a13d 973 index = kvm_page_table_hashfn(gfn);
f05e70ac 974 bucket = &kvm->arch.mmu_page_hash[index];
4db35314
AK
975 hlist_for_each_entry_safe(sp, node, n, bucket, hash_link)
976 if (sp->gfn == gfn && !sp->role.metaphysical) {
b8688d51 977 pgprintk("%s: gfn %lx role %x\n", __func__, gfn,
4db35314
AK
978 sp->role.word);
979 kvm_mmu_zap_page(kvm, sp);
a436036b
AK
980 r = 1;
981 }
982 return r;
cea0f0e7
AK
983}
984
f67a46f4 985static void mmu_unshadow(struct kvm *kvm, gfn_t gfn)
97a0a01e 986{
4db35314 987 struct kvm_mmu_page *sp;
97a0a01e 988
4db35314 989 while ((sp = kvm_mmu_lookup_page(kvm, gfn)) != NULL) {
b8688d51 990 pgprintk("%s: zap %lx %x\n", __func__, gfn, sp->role.word);
4db35314 991 kvm_mmu_zap_page(kvm, sp);
97a0a01e
AK
992 }
993}
994
38c335f1 995static void page_header_update_slot(struct kvm *kvm, void *pte, gfn_t gfn)
6aa8b732 996{
38c335f1 997 int slot = memslot_id(kvm, gfn_to_memslot(kvm, gfn));
4db35314 998 struct kvm_mmu_page *sp = page_header(__pa(pte));
6aa8b732 999
4db35314 1000 __set_bit(slot, &sp->slot_bitmap);
6aa8b732
AK
1001}
1002
039576c0
AK
1003struct page *gva_to_page(struct kvm_vcpu *vcpu, gva_t gva)
1004{
72dc67a6
IE
1005 struct page *page;
1006
ad312c7c 1007 gpa_t gpa = vcpu->arch.mmu.gva_to_gpa(vcpu, gva);
039576c0
AK
1008
1009 if (gpa == UNMAPPED_GVA)
1010 return NULL;
72dc67a6
IE
1011
1012 down_read(&current->mm->mmap_sem);
1013 page = gfn_to_page(vcpu->kvm, gpa >> PAGE_SHIFT);
1014 up_read(&current->mm->mmap_sem);
1015
1016 return page;
039576c0
AK
1017}
1018
1c4f1fd6
AK
1019static void mmu_set_spte(struct kvm_vcpu *vcpu, u64 *shadow_pte,
1020 unsigned pt_access, unsigned pte_access,
1021 int user_fault, int write_fault, int dirty,
05da4558 1022 int *ptwrite, int largepage, gfn_t gfn,
947da538 1023 struct page *page, bool speculative)
1c4f1fd6
AK
1024{
1025 u64 spte;
15aaa819 1026 int was_rmapped = 0;
75e68e60 1027 int was_writeble = is_writeble_pte(*shadow_pte);
15aaa819 1028 hfn_t host_pfn = (*shadow_pte & PT64_BASE_ADDR_MASK) >> PAGE_SHIFT;
1c4f1fd6 1029
bc750ba8 1030 pgprintk("%s: spte %llx access %x write_fault %d"
1c4f1fd6 1031 " user_fault %d gfn %lx\n",
b8688d51 1032 __func__, *shadow_pte, pt_access,
1c4f1fd6
AK
1033 write_fault, user_fault, gfn);
1034
15aaa819 1035 if (is_rmap_pte(*shadow_pte)) {
05da4558
MT
1036 /*
1037 * If we overwrite a PTE page pointer with a 2MB PMD, unlink
1038 * the parent of the now unreachable PTE.
1039 */
1040 if (largepage && !is_large_pte(*shadow_pte)) {
1041 struct kvm_mmu_page *child;
1042 u64 pte = *shadow_pte;
1043
1044 child = page_header(pte & PT64_BASE_ADDR_MASK);
1045 mmu_page_remove_parent_pte(child, shadow_pte);
1046 } else if (host_pfn != page_to_pfn(page)) {
15aaa819
MT
1047 pgprintk("hfn old %lx new %lx\n",
1048 host_pfn, page_to_pfn(page));
1049 rmap_remove(vcpu->kvm, shadow_pte);
05da4558
MT
1050 } else {
1051 if (largepage)
1052 was_rmapped = is_large_pte(*shadow_pte);
1053 else
1054 was_rmapped = 1;
15aaa819 1055 }
15aaa819
MT
1056 }
1057
1c4f1fd6
AK
1058 /*
1059 * We don't set the accessed bit, since we sometimes want to see
1060 * whether the guest actually used the pte (in order to detect
1061 * demand paging).
1062 */
1063 spte = PT_PRESENT_MASK | PT_DIRTY_MASK;
947da538
AK
1064 if (!speculative)
1065 pte_access |= PT_ACCESSED_MASK;
1c4f1fd6
AK
1066 if (!dirty)
1067 pte_access &= ~ACC_WRITE_MASK;
1068 if (!(pte_access & ACC_EXEC_MASK))
1069 spte |= PT64_NX_MASK;
1070
1c4f1fd6
AK
1071 spte |= PT_PRESENT_MASK;
1072 if (pte_access & ACC_USER_MASK)
1073 spte |= PT_USER_MASK;
05da4558
MT
1074 if (largepage)
1075 spte |= PT_PAGE_SIZE_MASK;
1c4f1fd6 1076
1c4f1fd6
AK
1077 spte |= page_to_phys(page);
1078
1079 if ((pte_access & ACC_WRITE_MASK)
1080 || (write_fault && !is_write_protection(vcpu) && !user_fault)) {
1081 struct kvm_mmu_page *shadow;
1082
1083 spte |= PT_WRITABLE_MASK;
1084 if (user_fault) {
1085 mmu_unshadow(vcpu->kvm, gfn);
1086 goto unshadowed;
1087 }
1088
1089 shadow = kvm_mmu_lookup_page(vcpu->kvm, gfn);
05da4558
MT
1090 if (shadow ||
1091 (largepage && has_wrprotected_page(vcpu->kvm, gfn))) {
1c4f1fd6 1092 pgprintk("%s: found shadow page for %lx, marking ro\n",
b8688d51 1093 __func__, gfn);
1c4f1fd6
AK
1094 pte_access &= ~ACC_WRITE_MASK;
1095 if (is_writeble_pte(spte)) {
1096 spte &= ~PT_WRITABLE_MASK;
1097 kvm_x86_ops->tlb_flush(vcpu);
1098 }
1099 if (write_fault)
1100 *ptwrite = 1;
1101 }
1102 }
1103
1104unshadowed:
1105
1106 if (pte_access & ACC_WRITE_MASK)
1107 mark_page_dirty(vcpu->kvm, gfn);
1108
b8688d51 1109 pgprintk("%s: setting spte %llx\n", __func__, spte);
05da4558
MT
1110 pgprintk("instantiating %s PTE (%s) at %d (%llx) addr %llx\n",
1111 (spte&PT_PAGE_SIZE_MASK)? "2MB" : "4kB",
1112 (spte&PT_WRITABLE_MASK)?"RW":"R", gfn, spte, shadow_pte);
1c4f1fd6 1113 set_shadow_pte(shadow_pte, spte);
05da4558
MT
1114 if (!was_rmapped && (spte & PT_PAGE_SIZE_MASK)
1115 && (spte & PT_PRESENT_MASK))
1116 ++vcpu->kvm->stat.lpages;
1117
1c4f1fd6
AK
1118 page_header_update_slot(vcpu->kvm, shadow_pte, gfn);
1119 if (!was_rmapped) {
05da4558 1120 rmap_add(vcpu, shadow_pte, gfn, largepage);
1c4f1fd6
AK
1121 if (!is_rmap_pte(*shadow_pte))
1122 kvm_release_page_clean(page);
75e68e60
IE
1123 } else {
1124 if (was_writeble)
1125 kvm_release_page_dirty(page);
1126 else
1127 kvm_release_page_clean(page);
1c4f1fd6 1128 }
1c4f1fd6 1129 if (!ptwrite || !*ptwrite)
ad312c7c 1130 vcpu->arch.last_pte_updated = shadow_pte;
1c4f1fd6
AK
1131}
1132
6aa8b732
AK
1133static void nonpaging_new_cr3(struct kvm_vcpu *vcpu)
1134{
1135}
1136
4d9976bb 1137static int __direct_map(struct kvm_vcpu *vcpu, gpa_t v, int write,
05da4558
MT
1138 int largepage, gfn_t gfn, struct page *page,
1139 int level)
6aa8b732 1140{
ad312c7c 1141 hpa_t table_addr = vcpu->arch.mmu.root_hpa;
e833240f 1142 int pt_write = 0;
6aa8b732
AK
1143
1144 for (; ; level--) {
1145 u32 index = PT64_INDEX(v, level);
1146 u64 *table;
1147
1148 ASSERT(VALID_PAGE(table_addr));
1149 table = __va(table_addr);
1150
1151 if (level == 1) {
e833240f 1152 mmu_set_spte(vcpu, &table[index], ACC_ALL, ACC_ALL,
947da538 1153 0, write, 1, &pt_write, 0, gfn, page, false);
05da4558
MT
1154 return pt_write;
1155 }
1156
1157 if (largepage && level == 2) {
1158 mmu_set_spte(vcpu, &table[index], ACC_ALL, ACC_ALL,
947da538 1159 0, write, 1, &pt_write, 1, gfn, page, false);
d196e343 1160 return pt_write;
6aa8b732
AK
1161 }
1162
c7addb90 1163 if (table[index] == shadow_trap_nonpresent_pte) {
25c0de2c 1164 struct kvm_mmu_page *new_table;
cea0f0e7 1165 gfn_t pseudo_gfn;
6aa8b732 1166
cea0f0e7
AK
1167 pseudo_gfn = (v & PT64_DIR_BASE_ADDR_MASK)
1168 >> PAGE_SHIFT;
1169 new_table = kvm_mmu_get_page(vcpu, pseudo_gfn,
1170 v, level - 1,
f7d9c7b7 1171 1, ACC_ALL, &table[index]);
25c0de2c 1172 if (!new_table) {
6aa8b732 1173 pgprintk("nonpaging_map: ENOMEM\n");
d7824fff 1174 kvm_release_page_clean(page);
6aa8b732
AK
1175 return -ENOMEM;
1176 }
1177
47ad8e68 1178 table[index] = __pa(new_table->spt) | PT_PRESENT_MASK
25c0de2c 1179 | PT_WRITABLE_MASK | PT_USER_MASK;
6aa8b732
AK
1180 }
1181 table_addr = table[index] & PT64_BASE_ADDR_MASK;
1182 }
1183}
1184
10589a46
MT
1185static int nonpaging_map(struct kvm_vcpu *vcpu, gva_t v, int write, gfn_t gfn)
1186{
1187 int r;
05da4558 1188 int largepage = 0;
10589a46 1189
aaee2c94
MT
1190 struct page *page;
1191
72dc67a6
IE
1192 down_read(&vcpu->kvm->slots_lock);
1193
aaee2c94 1194 down_read(&current->mm->mmap_sem);
05da4558
MT
1195 if (is_largepage_backed(vcpu, gfn & ~(KVM_PAGES_PER_HPAGE-1))) {
1196 gfn &= ~(KVM_PAGES_PER_HPAGE-1);
1197 largepage = 1;
1198 }
1199
aaee2c94 1200 page = gfn_to_page(vcpu->kvm, gfn);
72dc67a6 1201 up_read(&current->mm->mmap_sem);
aaee2c94 1202
d196e343
AK
1203 /* mmio */
1204 if (is_error_page(page)) {
1205 kvm_release_page_clean(page);
1206 up_read(&vcpu->kvm->slots_lock);
1207 return 1;
1208 }
1209
aaee2c94 1210 spin_lock(&vcpu->kvm->mmu_lock);
eb787d10 1211 kvm_mmu_free_some_pages(vcpu);
05da4558
MT
1212 r = __direct_map(vcpu, v, write, largepage, gfn, page,
1213 PT32E_ROOT_LEVEL);
aaee2c94
MT
1214 spin_unlock(&vcpu->kvm->mmu_lock);
1215
72dc67a6 1216 up_read(&vcpu->kvm->slots_lock);
aaee2c94 1217
10589a46
MT
1218 return r;
1219}
1220
1221
c7addb90
AK
1222static void nonpaging_prefetch_page(struct kvm_vcpu *vcpu,
1223 struct kvm_mmu_page *sp)
1224{
1225 int i;
1226
1227 for (i = 0; i < PT64_ENT_PER_PAGE; ++i)
1228 sp->spt[i] = shadow_trap_nonpresent_pte;
1229}
1230
17ac10ad
AK
1231static void mmu_free_roots(struct kvm_vcpu *vcpu)
1232{
1233 int i;
4db35314 1234 struct kvm_mmu_page *sp;
17ac10ad 1235
ad312c7c 1236 if (!VALID_PAGE(vcpu->arch.mmu.root_hpa))
7b53aa56 1237 return;
aaee2c94 1238 spin_lock(&vcpu->kvm->mmu_lock);
17ac10ad 1239#ifdef CONFIG_X86_64
ad312c7c
ZX
1240 if (vcpu->arch.mmu.shadow_root_level == PT64_ROOT_LEVEL) {
1241 hpa_t root = vcpu->arch.mmu.root_hpa;
17ac10ad 1242
4db35314
AK
1243 sp = page_header(root);
1244 --sp->root_count;
2e53d63a
MT
1245 if (!sp->root_count && sp->role.invalid)
1246 kvm_mmu_zap_page(vcpu->kvm, sp);
ad312c7c 1247 vcpu->arch.mmu.root_hpa = INVALID_PAGE;
aaee2c94 1248 spin_unlock(&vcpu->kvm->mmu_lock);
17ac10ad
AK
1249 return;
1250 }
1251#endif
1252 for (i = 0; i < 4; ++i) {
ad312c7c 1253 hpa_t root = vcpu->arch.mmu.pae_root[i];
17ac10ad 1254
417726a3 1255 if (root) {
417726a3 1256 root &= PT64_BASE_ADDR_MASK;
4db35314
AK
1257 sp = page_header(root);
1258 --sp->root_count;
2e53d63a
MT
1259 if (!sp->root_count && sp->role.invalid)
1260 kvm_mmu_zap_page(vcpu->kvm, sp);
417726a3 1261 }
ad312c7c 1262 vcpu->arch.mmu.pae_root[i] = INVALID_PAGE;
17ac10ad 1263 }
aaee2c94 1264 spin_unlock(&vcpu->kvm->mmu_lock);
ad312c7c 1265 vcpu->arch.mmu.root_hpa = INVALID_PAGE;
17ac10ad
AK
1266}
1267
1268static void mmu_alloc_roots(struct kvm_vcpu *vcpu)
1269{
1270 int i;
cea0f0e7 1271 gfn_t root_gfn;
4db35314 1272 struct kvm_mmu_page *sp;
fb72d167 1273 int metaphysical = 0;
3bb65a22 1274
ad312c7c 1275 root_gfn = vcpu->arch.cr3 >> PAGE_SHIFT;
17ac10ad
AK
1276
1277#ifdef CONFIG_X86_64
ad312c7c
ZX
1278 if (vcpu->arch.mmu.shadow_root_level == PT64_ROOT_LEVEL) {
1279 hpa_t root = vcpu->arch.mmu.root_hpa;
17ac10ad
AK
1280
1281 ASSERT(!VALID_PAGE(root));
fb72d167
JR
1282 if (tdp_enabled)
1283 metaphysical = 1;
4db35314 1284 sp = kvm_mmu_get_page(vcpu, root_gfn, 0,
fb72d167
JR
1285 PT64_ROOT_LEVEL, metaphysical,
1286 ACC_ALL, NULL);
4db35314
AK
1287 root = __pa(sp->spt);
1288 ++sp->root_count;
ad312c7c 1289 vcpu->arch.mmu.root_hpa = root;
17ac10ad
AK
1290 return;
1291 }
1292#endif
fb72d167
JR
1293 metaphysical = !is_paging(vcpu);
1294 if (tdp_enabled)
1295 metaphysical = 1;
17ac10ad 1296 for (i = 0; i < 4; ++i) {
ad312c7c 1297 hpa_t root = vcpu->arch.mmu.pae_root[i];
17ac10ad
AK
1298
1299 ASSERT(!VALID_PAGE(root));
ad312c7c
ZX
1300 if (vcpu->arch.mmu.root_level == PT32E_ROOT_LEVEL) {
1301 if (!is_present_pte(vcpu->arch.pdptrs[i])) {
1302 vcpu->arch.mmu.pae_root[i] = 0;
417726a3
AK
1303 continue;
1304 }
ad312c7c
ZX
1305 root_gfn = vcpu->arch.pdptrs[i] >> PAGE_SHIFT;
1306 } else if (vcpu->arch.mmu.root_level == 0)
cea0f0e7 1307 root_gfn = 0;
4db35314 1308 sp = kvm_mmu_get_page(vcpu, root_gfn, i << 30,
fb72d167 1309 PT32_ROOT_LEVEL, metaphysical,
f7d9c7b7 1310 ACC_ALL, NULL);
4db35314
AK
1311 root = __pa(sp->spt);
1312 ++sp->root_count;
ad312c7c 1313 vcpu->arch.mmu.pae_root[i] = root | PT_PRESENT_MASK;
17ac10ad 1314 }
ad312c7c 1315 vcpu->arch.mmu.root_hpa = __pa(vcpu->arch.mmu.pae_root);
17ac10ad
AK
1316}
1317
6aa8b732
AK
1318static gpa_t nonpaging_gva_to_gpa(struct kvm_vcpu *vcpu, gva_t vaddr)
1319{
1320 return vaddr;
1321}
1322
1323static int nonpaging_page_fault(struct kvm_vcpu *vcpu, gva_t gva,
3f3e7124 1324 u32 error_code)
6aa8b732 1325{
e833240f 1326 gfn_t gfn;
e2dec939 1327 int r;
6aa8b732 1328
b8688d51 1329 pgprintk("%s: gva %lx error %x\n", __func__, gva, error_code);
e2dec939
AK
1330 r = mmu_topup_memory_caches(vcpu);
1331 if (r)
1332 return r;
714b93da 1333
6aa8b732 1334 ASSERT(vcpu);
ad312c7c 1335 ASSERT(VALID_PAGE(vcpu->arch.mmu.root_hpa));
6aa8b732 1336
e833240f 1337 gfn = gva >> PAGE_SHIFT;
6aa8b732 1338
e833240f
AK
1339 return nonpaging_map(vcpu, gva & PAGE_MASK,
1340 error_code & PFERR_WRITE_MASK, gfn);
6aa8b732
AK
1341}
1342
fb72d167
JR
1343static int tdp_page_fault(struct kvm_vcpu *vcpu, gva_t gpa,
1344 u32 error_code)
1345{
1346 struct page *page;
1347 int r;
05da4558
MT
1348 int largepage = 0;
1349 gfn_t gfn = gpa >> PAGE_SHIFT;
fb72d167
JR
1350
1351 ASSERT(vcpu);
1352 ASSERT(VALID_PAGE(vcpu->arch.mmu.root_hpa));
1353
1354 r = mmu_topup_memory_caches(vcpu);
1355 if (r)
1356 return r;
1357
1358 down_read(&current->mm->mmap_sem);
05da4558
MT
1359 if (is_largepage_backed(vcpu, gfn & ~(KVM_PAGES_PER_HPAGE-1))) {
1360 gfn &= ~(KVM_PAGES_PER_HPAGE-1);
1361 largepage = 1;
1362 }
1363 page = gfn_to_page(vcpu->kvm, gfn);
fb72d167
JR
1364 if (is_error_page(page)) {
1365 kvm_release_page_clean(page);
1366 up_read(&current->mm->mmap_sem);
1367 return 1;
1368 }
1369 spin_lock(&vcpu->kvm->mmu_lock);
1370 kvm_mmu_free_some_pages(vcpu);
1371 r = __direct_map(vcpu, gpa, error_code & PFERR_WRITE_MASK,
05da4558 1372 largepage, gfn, page, TDP_ROOT_LEVEL);
fb72d167
JR
1373 spin_unlock(&vcpu->kvm->mmu_lock);
1374 up_read(&current->mm->mmap_sem);
1375
1376 return r;
1377}
1378
6aa8b732
AK
1379static void nonpaging_free(struct kvm_vcpu *vcpu)
1380{
17ac10ad 1381 mmu_free_roots(vcpu);
6aa8b732
AK
1382}
1383
1384static int nonpaging_init_context(struct kvm_vcpu *vcpu)
1385{
ad312c7c 1386 struct kvm_mmu *context = &vcpu->arch.mmu;
6aa8b732
AK
1387
1388 context->new_cr3 = nonpaging_new_cr3;
1389 context->page_fault = nonpaging_page_fault;
6aa8b732
AK
1390 context->gva_to_gpa = nonpaging_gva_to_gpa;
1391 context->free = nonpaging_free;
c7addb90 1392 context->prefetch_page = nonpaging_prefetch_page;
cea0f0e7 1393 context->root_level = 0;
6aa8b732 1394 context->shadow_root_level = PT32E_ROOT_LEVEL;
17c3ba9d 1395 context->root_hpa = INVALID_PAGE;
6aa8b732
AK
1396 return 0;
1397}
1398
d835dfec 1399void kvm_mmu_flush_tlb(struct kvm_vcpu *vcpu)
6aa8b732 1400{
1165f5fe 1401 ++vcpu->stat.tlb_flush;
cbdd1bea 1402 kvm_x86_ops->tlb_flush(vcpu);
6aa8b732
AK
1403}
1404
1405static void paging_new_cr3(struct kvm_vcpu *vcpu)
1406{
b8688d51 1407 pgprintk("%s: cr3 %lx\n", __func__, vcpu->arch.cr3);
cea0f0e7 1408 mmu_free_roots(vcpu);
6aa8b732
AK
1409}
1410
6aa8b732
AK
1411static void inject_page_fault(struct kvm_vcpu *vcpu,
1412 u64 addr,
1413 u32 err_code)
1414{
c3c91fee 1415 kvm_inject_page_fault(vcpu, addr, err_code);
6aa8b732
AK
1416}
1417
6aa8b732
AK
1418static void paging_free(struct kvm_vcpu *vcpu)
1419{
1420 nonpaging_free(vcpu);
1421}
1422
1423#define PTTYPE 64
1424#include "paging_tmpl.h"
1425#undef PTTYPE
1426
1427#define PTTYPE 32
1428#include "paging_tmpl.h"
1429#undef PTTYPE
1430
17ac10ad 1431static int paging64_init_context_common(struct kvm_vcpu *vcpu, int level)
6aa8b732 1432{
ad312c7c 1433 struct kvm_mmu *context = &vcpu->arch.mmu;
6aa8b732
AK
1434
1435 ASSERT(is_pae(vcpu));
1436 context->new_cr3 = paging_new_cr3;
1437 context->page_fault = paging64_page_fault;
6aa8b732 1438 context->gva_to_gpa = paging64_gva_to_gpa;
c7addb90 1439 context->prefetch_page = paging64_prefetch_page;
6aa8b732 1440 context->free = paging_free;
17ac10ad
AK
1441 context->root_level = level;
1442 context->shadow_root_level = level;
17c3ba9d 1443 context->root_hpa = INVALID_PAGE;
6aa8b732
AK
1444 return 0;
1445}
1446
17ac10ad
AK
1447static int paging64_init_context(struct kvm_vcpu *vcpu)
1448{
1449 return paging64_init_context_common(vcpu, PT64_ROOT_LEVEL);
1450}
1451
6aa8b732
AK
1452static int paging32_init_context(struct kvm_vcpu *vcpu)
1453{
ad312c7c 1454 struct kvm_mmu *context = &vcpu->arch.mmu;
6aa8b732
AK
1455
1456 context->new_cr3 = paging_new_cr3;
1457 context->page_fault = paging32_page_fault;
6aa8b732
AK
1458 context->gva_to_gpa = paging32_gva_to_gpa;
1459 context->free = paging_free;
c7addb90 1460 context->prefetch_page = paging32_prefetch_page;
6aa8b732
AK
1461 context->root_level = PT32_ROOT_LEVEL;
1462 context->shadow_root_level = PT32E_ROOT_LEVEL;
17c3ba9d 1463 context->root_hpa = INVALID_PAGE;
6aa8b732
AK
1464 return 0;
1465}
1466
1467static int paging32E_init_context(struct kvm_vcpu *vcpu)
1468{
17ac10ad 1469 return paging64_init_context_common(vcpu, PT32E_ROOT_LEVEL);
6aa8b732
AK
1470}
1471
fb72d167
JR
1472static int init_kvm_tdp_mmu(struct kvm_vcpu *vcpu)
1473{
1474 struct kvm_mmu *context = &vcpu->arch.mmu;
1475
1476 context->new_cr3 = nonpaging_new_cr3;
1477 context->page_fault = tdp_page_fault;
1478 context->free = nonpaging_free;
1479 context->prefetch_page = nonpaging_prefetch_page;
1480 context->shadow_root_level = TDP_ROOT_LEVEL;
1481 context->root_hpa = INVALID_PAGE;
1482
1483 if (!is_paging(vcpu)) {
1484 context->gva_to_gpa = nonpaging_gva_to_gpa;
1485 context->root_level = 0;
1486 } else if (is_long_mode(vcpu)) {
1487 context->gva_to_gpa = paging64_gva_to_gpa;
1488 context->root_level = PT64_ROOT_LEVEL;
1489 } else if (is_pae(vcpu)) {
1490 context->gva_to_gpa = paging64_gva_to_gpa;
1491 context->root_level = PT32E_ROOT_LEVEL;
1492 } else {
1493 context->gva_to_gpa = paging32_gva_to_gpa;
1494 context->root_level = PT32_ROOT_LEVEL;
1495 }
1496
1497 return 0;
1498}
1499
1500static int init_kvm_softmmu(struct kvm_vcpu *vcpu)
6aa8b732
AK
1501{
1502 ASSERT(vcpu);
ad312c7c 1503 ASSERT(!VALID_PAGE(vcpu->arch.mmu.root_hpa));
6aa8b732
AK
1504
1505 if (!is_paging(vcpu))
1506 return nonpaging_init_context(vcpu);
a9058ecd 1507 else if (is_long_mode(vcpu))
6aa8b732
AK
1508 return paging64_init_context(vcpu);
1509 else if (is_pae(vcpu))
1510 return paging32E_init_context(vcpu);
1511 else
1512 return paging32_init_context(vcpu);
1513}
1514
fb72d167
JR
1515static int init_kvm_mmu(struct kvm_vcpu *vcpu)
1516{
1517 if (tdp_enabled)
1518 return init_kvm_tdp_mmu(vcpu);
1519 else
1520 return init_kvm_softmmu(vcpu);
1521}
1522
6aa8b732
AK
1523static void destroy_kvm_mmu(struct kvm_vcpu *vcpu)
1524{
1525 ASSERT(vcpu);
ad312c7c
ZX
1526 if (VALID_PAGE(vcpu->arch.mmu.root_hpa)) {
1527 vcpu->arch.mmu.free(vcpu);
1528 vcpu->arch.mmu.root_hpa = INVALID_PAGE;
6aa8b732
AK
1529 }
1530}
1531
1532int kvm_mmu_reset_context(struct kvm_vcpu *vcpu)
17c3ba9d
AK
1533{
1534 destroy_kvm_mmu(vcpu);
1535 return init_kvm_mmu(vcpu);
1536}
8668a3c4 1537EXPORT_SYMBOL_GPL(kvm_mmu_reset_context);
17c3ba9d
AK
1538
1539int kvm_mmu_load(struct kvm_vcpu *vcpu)
6aa8b732 1540{
714b93da
AK
1541 int r;
1542
e2dec939 1543 r = mmu_topup_memory_caches(vcpu);
17c3ba9d
AK
1544 if (r)
1545 goto out;
aaee2c94 1546 spin_lock(&vcpu->kvm->mmu_lock);
eb787d10 1547 kvm_mmu_free_some_pages(vcpu);
17c3ba9d 1548 mmu_alloc_roots(vcpu);
aaee2c94 1549 spin_unlock(&vcpu->kvm->mmu_lock);
ad312c7c 1550 kvm_x86_ops->set_cr3(vcpu, vcpu->arch.mmu.root_hpa);
17c3ba9d 1551 kvm_mmu_flush_tlb(vcpu);
714b93da
AK
1552out:
1553 return r;
6aa8b732 1554}
17c3ba9d
AK
1555EXPORT_SYMBOL_GPL(kvm_mmu_load);
1556
1557void kvm_mmu_unload(struct kvm_vcpu *vcpu)
1558{
1559 mmu_free_roots(vcpu);
1560}
6aa8b732 1561
09072daf 1562static void mmu_pte_write_zap_pte(struct kvm_vcpu *vcpu,
4db35314 1563 struct kvm_mmu_page *sp,
ac1b714e
AK
1564 u64 *spte)
1565{
1566 u64 pte;
1567 struct kvm_mmu_page *child;
1568
1569 pte = *spte;
c7addb90 1570 if (is_shadow_present_pte(pte)) {
05da4558
MT
1571 if (sp->role.level == PT_PAGE_TABLE_LEVEL ||
1572 is_large_pte(pte))
290fc38d 1573 rmap_remove(vcpu->kvm, spte);
ac1b714e
AK
1574 else {
1575 child = page_header(pte & PT64_BASE_ADDR_MASK);
90cb0529 1576 mmu_page_remove_parent_pte(child, spte);
ac1b714e
AK
1577 }
1578 }
c7addb90 1579 set_shadow_pte(spte, shadow_trap_nonpresent_pte);
05da4558
MT
1580 if (is_large_pte(pte))
1581 --vcpu->kvm->stat.lpages;
ac1b714e
AK
1582}
1583
0028425f 1584static void mmu_pte_write_new_pte(struct kvm_vcpu *vcpu,
4db35314 1585 struct kvm_mmu_page *sp,
0028425f 1586 u64 *spte,
489f1d65 1587 const void *new)
0028425f 1588{
05da4558
MT
1589 if ((sp->role.level != PT_PAGE_TABLE_LEVEL)
1590 && !vcpu->arch.update_pte.largepage) {
4cee5764 1591 ++vcpu->kvm->stat.mmu_pde_zapped;
0028425f 1592 return;
4cee5764 1593 }
0028425f 1594
4cee5764 1595 ++vcpu->kvm->stat.mmu_pte_updated;
4db35314 1596 if (sp->role.glevels == PT32_ROOT_LEVEL)
489f1d65 1597 paging32_update_pte(vcpu, sp, spte, new);
0028425f 1598 else
489f1d65 1599 paging64_update_pte(vcpu, sp, spte, new);
0028425f
AK
1600}
1601
79539cec
AK
1602static bool need_remote_flush(u64 old, u64 new)
1603{
1604 if (!is_shadow_present_pte(old))
1605 return false;
1606 if (!is_shadow_present_pte(new))
1607 return true;
1608 if ((old ^ new) & PT64_BASE_ADDR_MASK)
1609 return true;
1610 old ^= PT64_NX_MASK;
1611 new ^= PT64_NX_MASK;
1612 return (old & ~new & PT64_PERM_MASK) != 0;
1613}
1614
1615static void mmu_pte_write_flush_tlb(struct kvm_vcpu *vcpu, u64 old, u64 new)
1616{
1617 if (need_remote_flush(old, new))
1618 kvm_flush_remote_tlbs(vcpu->kvm);
1619 else
1620 kvm_mmu_flush_tlb(vcpu);
1621}
1622
12b7d28f
AK
1623static bool last_updated_pte_accessed(struct kvm_vcpu *vcpu)
1624{
ad312c7c 1625 u64 *spte = vcpu->arch.last_pte_updated;
12b7d28f
AK
1626
1627 return !!(spte && (*spte & PT_ACCESSED_MASK));
1628}
1629
d7824fff
AK
1630static void mmu_guess_page_from_pte_write(struct kvm_vcpu *vcpu, gpa_t gpa,
1631 const u8 *new, int bytes)
1632{
1633 gfn_t gfn;
1634 int r;
1635 u64 gpte = 0;
72dc67a6 1636 struct page *page;
d7824fff 1637
05da4558
MT
1638 vcpu->arch.update_pte.largepage = 0;
1639
d7824fff
AK
1640 if (bytes != 4 && bytes != 8)
1641 return;
1642
1643 /*
1644 * Assume that the pte write on a page table of the same type
1645 * as the current vcpu paging mode. This is nearly always true
1646 * (might be false while changing modes). Note it is verified later
1647 * by update_pte().
1648 */
1649 if (is_pae(vcpu)) {
1650 /* Handle a 32-bit guest writing two halves of a 64-bit gpte */
1651 if ((bytes == 4) && (gpa % 4 == 0)) {
1652 r = kvm_read_guest(vcpu->kvm, gpa & ~(u64)7, &gpte, 8);
1653 if (r)
1654 return;
1655 memcpy((void *)&gpte + (gpa % 8), new, 4);
1656 } else if ((bytes == 8) && (gpa % 8 == 0)) {
1657 memcpy((void *)&gpte, new, 8);
1658 }
1659 } else {
1660 if ((bytes == 4) && (gpa % 4 == 0))
1661 memcpy((void *)&gpte, new, 4);
1662 }
1663 if (!is_present_pte(gpte))
1664 return;
1665 gfn = (gpte & PT64_BASE_ADDR_MASK) >> PAGE_SHIFT;
72dc67a6 1666
05da4558
MT
1667 down_read(&current->mm->mmap_sem);
1668 if (is_large_pte(gpte) && is_largepage_backed(vcpu, gfn)) {
1669 gfn &= ~(KVM_PAGES_PER_HPAGE-1);
1670 vcpu->arch.update_pte.largepage = 1;
1671 }
72dc67a6 1672 page = gfn_to_page(vcpu->kvm, gfn);
05da4558 1673 up_read(&current->mm->mmap_sem);
72dc67a6 1674
d196e343
AK
1675 if (is_error_page(page)) {
1676 kvm_release_page_clean(page);
1677 return;
1678 }
d7824fff 1679 vcpu->arch.update_pte.gfn = gfn;
e48bb497 1680 vcpu->arch.update_pte.page = page;
d7824fff
AK
1681}
1682
09072daf 1683void kvm_mmu_pte_write(struct kvm_vcpu *vcpu, gpa_t gpa,
fe551881 1684 const u8 *new, int bytes)
da4a00f0 1685{
9b7a0325 1686 gfn_t gfn = gpa >> PAGE_SHIFT;
4db35314 1687 struct kvm_mmu_page *sp;
0e7bc4b9 1688 struct hlist_node *node, *n;
9b7a0325
AK
1689 struct hlist_head *bucket;
1690 unsigned index;
489f1d65 1691 u64 entry, gentry;
9b7a0325 1692 u64 *spte;
9b7a0325 1693 unsigned offset = offset_in_page(gpa);
0e7bc4b9 1694 unsigned pte_size;
9b7a0325 1695 unsigned page_offset;
0e7bc4b9 1696 unsigned misaligned;
fce0657f 1697 unsigned quadrant;
9b7a0325 1698 int level;
86a5ba02 1699 int flooded = 0;
ac1b714e 1700 int npte;
489f1d65 1701 int r;
9b7a0325 1702
b8688d51 1703 pgprintk("%s: gpa %llx bytes %d\n", __func__, gpa, bytes);
d7824fff 1704 mmu_guess_page_from_pte_write(vcpu, gpa, new, bytes);
aaee2c94 1705 spin_lock(&vcpu->kvm->mmu_lock);
eb787d10 1706 kvm_mmu_free_some_pages(vcpu);
4cee5764 1707 ++vcpu->kvm->stat.mmu_pte_write;
c7addb90 1708 kvm_mmu_audit(vcpu, "pre pte write");
ad312c7c 1709 if (gfn == vcpu->arch.last_pt_write_gfn
12b7d28f 1710 && !last_updated_pte_accessed(vcpu)) {
ad312c7c
ZX
1711 ++vcpu->arch.last_pt_write_count;
1712 if (vcpu->arch.last_pt_write_count >= 3)
86a5ba02
AK
1713 flooded = 1;
1714 } else {
ad312c7c
ZX
1715 vcpu->arch.last_pt_write_gfn = gfn;
1716 vcpu->arch.last_pt_write_count = 1;
1717 vcpu->arch.last_pte_updated = NULL;
86a5ba02 1718 }
1ae0a13d 1719 index = kvm_page_table_hashfn(gfn);
f05e70ac 1720 bucket = &vcpu->kvm->arch.mmu_page_hash[index];
4db35314
AK
1721 hlist_for_each_entry_safe(sp, node, n, bucket, hash_link) {
1722 if (sp->gfn != gfn || sp->role.metaphysical)
9b7a0325 1723 continue;
4db35314 1724 pte_size = sp->role.glevels == PT32_ROOT_LEVEL ? 4 : 8;
0e7bc4b9 1725 misaligned = (offset ^ (offset + bytes - 1)) & ~(pte_size - 1);
e925c5ba 1726 misaligned |= bytes < 4;
86a5ba02 1727 if (misaligned || flooded) {
0e7bc4b9
AK
1728 /*
1729 * Misaligned accesses are too much trouble to fix
1730 * up; also, they usually indicate a page is not used
1731 * as a page table.
86a5ba02
AK
1732 *
1733 * If we're seeing too many writes to a page,
1734 * it may no longer be a page table, or we may be
1735 * forking, in which case it is better to unmap the
1736 * page.
0e7bc4b9
AK
1737 */
1738 pgprintk("misaligned: gpa %llx bytes %d role %x\n",
4db35314
AK
1739 gpa, bytes, sp->role.word);
1740 kvm_mmu_zap_page(vcpu->kvm, sp);
4cee5764 1741 ++vcpu->kvm->stat.mmu_flooded;
0e7bc4b9
AK
1742 continue;
1743 }
9b7a0325 1744 page_offset = offset;
4db35314 1745 level = sp->role.level;
ac1b714e 1746 npte = 1;
4db35314 1747 if (sp->role.glevels == PT32_ROOT_LEVEL) {
ac1b714e
AK
1748 page_offset <<= 1; /* 32->64 */
1749 /*
1750 * A 32-bit pde maps 4MB while the shadow pdes map
1751 * only 2MB. So we need to double the offset again
1752 * and zap two pdes instead of one.
1753 */
1754 if (level == PT32_ROOT_LEVEL) {
6b8d0f9b 1755 page_offset &= ~7; /* kill rounding error */
ac1b714e
AK
1756 page_offset <<= 1;
1757 npte = 2;
1758 }
fce0657f 1759 quadrant = page_offset >> PAGE_SHIFT;
9b7a0325 1760 page_offset &= ~PAGE_MASK;
4db35314 1761 if (quadrant != sp->role.quadrant)
fce0657f 1762 continue;
9b7a0325 1763 }
4db35314 1764 spte = &sp->spt[page_offset / sizeof(*spte)];
489f1d65
DE
1765 if ((gpa & (pte_size - 1)) || (bytes < pte_size)) {
1766 gentry = 0;
1767 r = kvm_read_guest_atomic(vcpu->kvm,
1768 gpa & ~(u64)(pte_size - 1),
1769 &gentry, pte_size);
1770 new = (const void *)&gentry;
1771 if (r < 0)
1772 new = NULL;
1773 }
ac1b714e 1774 while (npte--) {
79539cec 1775 entry = *spte;
4db35314 1776 mmu_pte_write_zap_pte(vcpu, sp, spte);
489f1d65
DE
1777 if (new)
1778 mmu_pte_write_new_pte(vcpu, sp, spte, new);
79539cec 1779 mmu_pte_write_flush_tlb(vcpu, entry, *spte);
ac1b714e 1780 ++spte;
9b7a0325 1781 }
9b7a0325 1782 }
c7addb90 1783 kvm_mmu_audit(vcpu, "post pte write");
aaee2c94 1784 spin_unlock(&vcpu->kvm->mmu_lock);
d7824fff
AK
1785 if (vcpu->arch.update_pte.page) {
1786 kvm_release_page_clean(vcpu->arch.update_pte.page);
1787 vcpu->arch.update_pte.page = NULL;
1788 }
da4a00f0
AK
1789}
1790
a436036b
AK
1791int kvm_mmu_unprotect_page_virt(struct kvm_vcpu *vcpu, gva_t gva)
1792{
10589a46
MT
1793 gpa_t gpa;
1794 int r;
a436036b 1795
72dc67a6 1796 down_read(&vcpu->kvm->slots_lock);
10589a46 1797 gpa = vcpu->arch.mmu.gva_to_gpa(vcpu, gva);
72dc67a6 1798 up_read(&vcpu->kvm->slots_lock);
10589a46 1799
aaee2c94 1800 spin_lock(&vcpu->kvm->mmu_lock);
10589a46 1801 r = kvm_mmu_unprotect_page(vcpu->kvm, gpa >> PAGE_SHIFT);
aaee2c94 1802 spin_unlock(&vcpu->kvm->mmu_lock);
10589a46 1803 return r;
a436036b
AK
1804}
1805
22d95b12 1806void __kvm_mmu_free_some_pages(struct kvm_vcpu *vcpu)
ebeace86 1807{
f05e70ac 1808 while (vcpu->kvm->arch.n_free_mmu_pages < KVM_REFILL_PAGES) {
4db35314 1809 struct kvm_mmu_page *sp;
ebeace86 1810
f05e70ac 1811 sp = container_of(vcpu->kvm->arch.active_mmu_pages.prev,
4db35314
AK
1812 struct kvm_mmu_page, link);
1813 kvm_mmu_zap_page(vcpu->kvm, sp);
4cee5764 1814 ++vcpu->kvm->stat.mmu_recycled;
ebeace86
AK
1815 }
1816}
ebeace86 1817
3067714c
AK
1818int kvm_mmu_page_fault(struct kvm_vcpu *vcpu, gva_t cr2, u32 error_code)
1819{
1820 int r;
1821 enum emulation_result er;
1822
ad312c7c 1823 r = vcpu->arch.mmu.page_fault(vcpu, cr2, error_code);
3067714c
AK
1824 if (r < 0)
1825 goto out;
1826
1827 if (!r) {
1828 r = 1;
1829 goto out;
1830 }
1831
b733bfb5
AK
1832 r = mmu_topup_memory_caches(vcpu);
1833 if (r)
1834 goto out;
1835
3067714c 1836 er = emulate_instruction(vcpu, vcpu->run, cr2, error_code, 0);
3067714c
AK
1837
1838 switch (er) {
1839 case EMULATE_DONE:
1840 return 1;
1841 case EMULATE_DO_MMIO:
1842 ++vcpu->stat.mmio_exits;
1843 return 0;
1844 case EMULATE_FAIL:
1845 kvm_report_emulation_failure(vcpu, "pagetable");
1846 return 1;
1847 default:
1848 BUG();
1849 }
1850out:
3067714c
AK
1851 return r;
1852}
1853EXPORT_SYMBOL_GPL(kvm_mmu_page_fault);
1854
18552672
JR
1855void kvm_enable_tdp(void)
1856{
1857 tdp_enabled = true;
1858}
1859EXPORT_SYMBOL_GPL(kvm_enable_tdp);
1860
6aa8b732
AK
1861static void free_mmu_pages(struct kvm_vcpu *vcpu)
1862{
4db35314 1863 struct kvm_mmu_page *sp;
6aa8b732 1864
f05e70ac
ZX
1865 while (!list_empty(&vcpu->kvm->arch.active_mmu_pages)) {
1866 sp = container_of(vcpu->kvm->arch.active_mmu_pages.next,
4db35314
AK
1867 struct kvm_mmu_page, link);
1868 kvm_mmu_zap_page(vcpu->kvm, sp);
f51234c2 1869 }
ad312c7c 1870 free_page((unsigned long)vcpu->arch.mmu.pae_root);
6aa8b732
AK
1871}
1872
1873static int alloc_mmu_pages(struct kvm_vcpu *vcpu)
1874{
17ac10ad 1875 struct page *page;
6aa8b732
AK
1876 int i;
1877
1878 ASSERT(vcpu);
1879
f05e70ac
ZX
1880 if (vcpu->kvm->arch.n_requested_mmu_pages)
1881 vcpu->kvm->arch.n_free_mmu_pages =
1882 vcpu->kvm->arch.n_requested_mmu_pages;
82ce2c96 1883 else
f05e70ac
ZX
1884 vcpu->kvm->arch.n_free_mmu_pages =
1885 vcpu->kvm->arch.n_alloc_mmu_pages;
17ac10ad
AK
1886 /*
1887 * When emulating 32-bit mode, cr3 is only 32 bits even on x86_64.
1888 * Therefore we need to allocate shadow page tables in the first
1889 * 4GB of memory, which happens to fit the DMA32 zone.
1890 */
1891 page = alloc_page(GFP_KERNEL | __GFP_DMA32);
1892 if (!page)
1893 goto error_1;
ad312c7c 1894 vcpu->arch.mmu.pae_root = page_address(page);
17ac10ad 1895 for (i = 0; i < 4; ++i)
ad312c7c 1896 vcpu->arch.mmu.pae_root[i] = INVALID_PAGE;
17ac10ad 1897
6aa8b732
AK
1898 return 0;
1899
1900error_1:
1901 free_mmu_pages(vcpu);
1902 return -ENOMEM;
1903}
1904
8018c27b 1905int kvm_mmu_create(struct kvm_vcpu *vcpu)
6aa8b732 1906{
6aa8b732 1907 ASSERT(vcpu);
ad312c7c 1908 ASSERT(!VALID_PAGE(vcpu->arch.mmu.root_hpa));
6aa8b732 1909
8018c27b
IM
1910 return alloc_mmu_pages(vcpu);
1911}
6aa8b732 1912
8018c27b
IM
1913int kvm_mmu_setup(struct kvm_vcpu *vcpu)
1914{
1915 ASSERT(vcpu);
ad312c7c 1916 ASSERT(!VALID_PAGE(vcpu->arch.mmu.root_hpa));
2c264957 1917
8018c27b 1918 return init_kvm_mmu(vcpu);
6aa8b732
AK
1919}
1920
1921void kvm_mmu_destroy(struct kvm_vcpu *vcpu)
1922{
1923 ASSERT(vcpu);
1924
1925 destroy_kvm_mmu(vcpu);
1926 free_mmu_pages(vcpu);
714b93da 1927 mmu_free_memory_caches(vcpu);
6aa8b732
AK
1928}
1929
90cb0529 1930void kvm_mmu_slot_remove_write_access(struct kvm *kvm, int slot)
6aa8b732 1931{
4db35314 1932 struct kvm_mmu_page *sp;
6aa8b732 1933
f05e70ac 1934 list_for_each_entry(sp, &kvm->arch.active_mmu_pages, link) {
6aa8b732
AK
1935 int i;
1936 u64 *pt;
1937
4db35314 1938 if (!test_bit(slot, &sp->slot_bitmap))
6aa8b732
AK
1939 continue;
1940
4db35314 1941 pt = sp->spt;
6aa8b732
AK
1942 for (i = 0; i < PT64_ENT_PER_PAGE; ++i)
1943 /* avoid RMW */
9647c14c 1944 if (pt[i] & PT_WRITABLE_MASK)
6aa8b732 1945 pt[i] &= ~PT_WRITABLE_MASK;
6aa8b732
AK
1946 }
1947}
37a7d8b0 1948
90cb0529 1949void kvm_mmu_zap_all(struct kvm *kvm)
e0fa826f 1950{
4db35314 1951 struct kvm_mmu_page *sp, *node;
e0fa826f 1952
aaee2c94 1953 spin_lock(&kvm->mmu_lock);
f05e70ac 1954 list_for_each_entry_safe(sp, node, &kvm->arch.active_mmu_pages, link)
4db35314 1955 kvm_mmu_zap_page(kvm, sp);
aaee2c94 1956 spin_unlock(&kvm->mmu_lock);
e0fa826f 1957
90cb0529 1958 kvm_flush_remote_tlbs(kvm);
e0fa826f
DL
1959}
1960
b5a33a75
AK
1961void kvm_mmu_module_exit(void)
1962{
1963 if (pte_chain_cache)
1964 kmem_cache_destroy(pte_chain_cache);
1965 if (rmap_desc_cache)
1966 kmem_cache_destroy(rmap_desc_cache);
d3d25b04
AK
1967 if (mmu_page_header_cache)
1968 kmem_cache_destroy(mmu_page_header_cache);
b5a33a75
AK
1969}
1970
1971int kvm_mmu_module_init(void)
1972{
1973 pte_chain_cache = kmem_cache_create("kvm_pte_chain",
1974 sizeof(struct kvm_pte_chain),
20c2df83 1975 0, 0, NULL);
b5a33a75
AK
1976 if (!pte_chain_cache)
1977 goto nomem;
1978 rmap_desc_cache = kmem_cache_create("kvm_rmap_desc",
1979 sizeof(struct kvm_rmap_desc),
20c2df83 1980 0, 0, NULL);
b5a33a75
AK
1981 if (!rmap_desc_cache)
1982 goto nomem;
1983
d3d25b04
AK
1984 mmu_page_header_cache = kmem_cache_create("kvm_mmu_page_header",
1985 sizeof(struct kvm_mmu_page),
20c2df83 1986 0, 0, NULL);
d3d25b04
AK
1987 if (!mmu_page_header_cache)
1988 goto nomem;
1989
b5a33a75
AK
1990 return 0;
1991
1992nomem:
1993 kvm_mmu_module_exit();
1994 return -ENOMEM;
1995}
1996
3ad82a7e
ZX
1997/*
1998 * Caculate mmu pages needed for kvm.
1999 */
2000unsigned int kvm_mmu_calculate_mmu_pages(struct kvm *kvm)
2001{
2002 int i;
2003 unsigned int nr_mmu_pages;
2004 unsigned int nr_pages = 0;
2005
2006 for (i = 0; i < kvm->nmemslots; i++)
2007 nr_pages += kvm->memslots[i].npages;
2008
2009 nr_mmu_pages = nr_pages * KVM_PERMILLE_MMU_PAGES / 1000;
2010 nr_mmu_pages = max(nr_mmu_pages,
2011 (unsigned int) KVM_MIN_ALLOC_MMU_PAGES);
2012
2013 return nr_mmu_pages;
2014}
2015
2f333bcb
MT
2016static void *pv_mmu_peek_buffer(struct kvm_pv_mmu_op_buffer *buffer,
2017 unsigned len)
2018{
2019 if (len > buffer->len)
2020 return NULL;
2021 return buffer->ptr;
2022}
2023
2024static void *pv_mmu_read_buffer(struct kvm_pv_mmu_op_buffer *buffer,
2025 unsigned len)
2026{
2027 void *ret;
2028
2029 ret = pv_mmu_peek_buffer(buffer, len);
2030 if (!ret)
2031 return ret;
2032 buffer->ptr += len;
2033 buffer->len -= len;
2034 buffer->processed += len;
2035 return ret;
2036}
2037
2038static int kvm_pv_mmu_write(struct kvm_vcpu *vcpu,
2039 gpa_t addr, gpa_t value)
2040{
2041 int bytes = 8;
2042 int r;
2043
2044 if (!is_long_mode(vcpu) && !is_pae(vcpu))
2045 bytes = 4;
2046
2047 r = mmu_topup_memory_caches(vcpu);
2048 if (r)
2049 return r;
2050
2051 if (!__emulator_write_phys(vcpu, addr, &value, bytes))
2052 return -EFAULT;
2053
2054 return 1;
2055}
2056
2057static int kvm_pv_mmu_flush_tlb(struct kvm_vcpu *vcpu)
2058{
2059 kvm_x86_ops->tlb_flush(vcpu);
2060 return 1;
2061}
2062
2063static int kvm_pv_mmu_release_pt(struct kvm_vcpu *vcpu, gpa_t addr)
2064{
2065 spin_lock(&vcpu->kvm->mmu_lock);
2066 mmu_unshadow(vcpu->kvm, addr >> PAGE_SHIFT);
2067 spin_unlock(&vcpu->kvm->mmu_lock);
2068 return 1;
2069}
2070
2071static int kvm_pv_mmu_op_one(struct kvm_vcpu *vcpu,
2072 struct kvm_pv_mmu_op_buffer *buffer)
2073{
2074 struct kvm_mmu_op_header *header;
2075
2076 header = pv_mmu_peek_buffer(buffer, sizeof *header);
2077 if (!header)
2078 return 0;
2079 switch (header->op) {
2080 case KVM_MMU_OP_WRITE_PTE: {
2081 struct kvm_mmu_op_write_pte *wpte;
2082
2083 wpte = pv_mmu_read_buffer(buffer, sizeof *wpte);
2084 if (!wpte)
2085 return 0;
2086 return kvm_pv_mmu_write(vcpu, wpte->pte_phys,
2087 wpte->pte_val);
2088 }
2089 case KVM_MMU_OP_FLUSH_TLB: {
2090 struct kvm_mmu_op_flush_tlb *ftlb;
2091
2092 ftlb = pv_mmu_read_buffer(buffer, sizeof *ftlb);
2093 if (!ftlb)
2094 return 0;
2095 return kvm_pv_mmu_flush_tlb(vcpu);
2096 }
2097 case KVM_MMU_OP_RELEASE_PT: {
2098 struct kvm_mmu_op_release_pt *rpt;
2099
2100 rpt = pv_mmu_read_buffer(buffer, sizeof *rpt);
2101 if (!rpt)
2102 return 0;
2103 return kvm_pv_mmu_release_pt(vcpu, rpt->pt_phys);
2104 }
2105 default: return 0;
2106 }
2107}
2108
2109int kvm_pv_mmu_op(struct kvm_vcpu *vcpu, unsigned long bytes,
2110 gpa_t addr, unsigned long *ret)
2111{
2112 int r;
2113 struct kvm_pv_mmu_op_buffer buffer;
2114
2115 down_read(&vcpu->kvm->slots_lock);
2116 down_read(&current->mm->mmap_sem);
2117
2118 buffer.ptr = buffer.buf;
2119 buffer.len = min_t(unsigned long, bytes, sizeof buffer.buf);
2120 buffer.processed = 0;
2121
2122 r = kvm_read_guest(vcpu->kvm, addr, buffer.buf, buffer.len);
2123 if (r)
2124 goto out;
2125
2126 while (buffer.len) {
2127 r = kvm_pv_mmu_op_one(vcpu, &buffer);
2128 if (r < 0)
2129 goto out;
2130 if (r == 0)
2131 break;
2132 }
2133
2134 r = 1;
2135out:
2136 *ret = buffer.processed;
2137 up_read(&current->mm->mmap_sem);
2138 up_read(&vcpu->kvm->slots_lock);
2139 return r;
2140}
2141
37a7d8b0
AK
2142#ifdef AUDIT
2143
2144static const char *audit_msg;
2145
2146static gva_t canonicalize(gva_t gva)
2147{
2148#ifdef CONFIG_X86_64
2149 gva = (long long)(gva << 16) >> 16;
2150#endif
2151 return gva;
2152}
2153
2154static void audit_mappings_page(struct kvm_vcpu *vcpu, u64 page_pte,
2155 gva_t va, int level)
2156{
2157 u64 *pt = __va(page_pte & PT64_BASE_ADDR_MASK);
2158 int i;
2159 gva_t va_delta = 1ul << (PAGE_SHIFT + 9 * (level - 1));
2160
2161 for (i = 0; i < PT64_ENT_PER_PAGE; ++i, va += va_delta) {
2162 u64 ent = pt[i];
2163
c7addb90 2164 if (ent == shadow_trap_nonpresent_pte)
37a7d8b0
AK
2165 continue;
2166
2167 va = canonicalize(va);
c7addb90
AK
2168 if (level > 1) {
2169 if (ent == shadow_notrap_nonpresent_pte)
2170 printk(KERN_ERR "audit: (%s) nontrapping pte"
2171 " in nonleaf level: levels %d gva %lx"
2172 " level %d pte %llx\n", audit_msg,
ad312c7c 2173 vcpu->arch.mmu.root_level, va, level, ent);
c7addb90 2174
37a7d8b0 2175 audit_mappings_page(vcpu, ent, va, level - 1);
c7addb90 2176 } else {
ad312c7c 2177 gpa_t gpa = vcpu->arch.mmu.gva_to_gpa(vcpu, va);
1d28f5f4
AK
2178 struct page *page = gpa_to_page(vcpu, gpa);
2179 hpa_t hpa = page_to_phys(page);
37a7d8b0 2180
c7addb90 2181 if (is_shadow_present_pte(ent)
37a7d8b0 2182 && (ent & PT64_BASE_ADDR_MASK) != hpa)
c7addb90
AK
2183 printk(KERN_ERR "xx audit error: (%s) levels %d"
2184 " gva %lx gpa %llx hpa %llx ent %llx %d\n",
ad312c7c 2185 audit_msg, vcpu->arch.mmu.root_level,
d77c26fc
MD
2186 va, gpa, hpa, ent,
2187 is_shadow_present_pte(ent));
c7addb90
AK
2188 else if (ent == shadow_notrap_nonpresent_pte
2189 && !is_error_hpa(hpa))
2190 printk(KERN_ERR "audit: (%s) notrap shadow,"
2191 " valid guest gva %lx\n", audit_msg, va);
b4231d61 2192 kvm_release_page_clean(page);
c7addb90 2193
37a7d8b0
AK
2194 }
2195 }
2196}
2197
2198static void audit_mappings(struct kvm_vcpu *vcpu)
2199{
1ea252af 2200 unsigned i;
37a7d8b0 2201
ad312c7c
ZX
2202 if (vcpu->arch.mmu.root_level == 4)
2203 audit_mappings_page(vcpu, vcpu->arch.mmu.root_hpa, 0, 4);
37a7d8b0
AK
2204 else
2205 for (i = 0; i < 4; ++i)
ad312c7c 2206 if (vcpu->arch.mmu.pae_root[i] & PT_PRESENT_MASK)
37a7d8b0 2207 audit_mappings_page(vcpu,
ad312c7c 2208 vcpu->arch.mmu.pae_root[i],
37a7d8b0
AK
2209 i << 30,
2210 2);
2211}
2212
2213static int count_rmaps(struct kvm_vcpu *vcpu)
2214{
2215 int nmaps = 0;
2216 int i, j, k;
2217
2218 for (i = 0; i < KVM_MEMORY_SLOTS; ++i) {
2219 struct kvm_memory_slot *m = &vcpu->kvm->memslots[i];
2220 struct kvm_rmap_desc *d;
2221
2222 for (j = 0; j < m->npages; ++j) {
290fc38d 2223 unsigned long *rmapp = &m->rmap[j];
37a7d8b0 2224
290fc38d 2225 if (!*rmapp)
37a7d8b0 2226 continue;
290fc38d 2227 if (!(*rmapp & 1)) {
37a7d8b0
AK
2228 ++nmaps;
2229 continue;
2230 }
290fc38d 2231 d = (struct kvm_rmap_desc *)(*rmapp & ~1ul);
37a7d8b0
AK
2232 while (d) {
2233 for (k = 0; k < RMAP_EXT; ++k)
2234 if (d->shadow_ptes[k])
2235 ++nmaps;
2236 else
2237 break;
2238 d = d->more;
2239 }
2240 }
2241 }
2242 return nmaps;
2243}
2244
2245static int count_writable_mappings(struct kvm_vcpu *vcpu)
2246{
2247 int nmaps = 0;
4db35314 2248 struct kvm_mmu_page *sp;
37a7d8b0
AK
2249 int i;
2250
f05e70ac 2251 list_for_each_entry(sp, &vcpu->kvm->arch.active_mmu_pages, link) {
4db35314 2252 u64 *pt = sp->spt;
37a7d8b0 2253
4db35314 2254 if (sp->role.level != PT_PAGE_TABLE_LEVEL)
37a7d8b0
AK
2255 continue;
2256
2257 for (i = 0; i < PT64_ENT_PER_PAGE; ++i) {
2258 u64 ent = pt[i];
2259
2260 if (!(ent & PT_PRESENT_MASK))
2261 continue;
2262 if (!(ent & PT_WRITABLE_MASK))
2263 continue;
2264 ++nmaps;
2265 }
2266 }
2267 return nmaps;
2268}
2269
2270static void audit_rmap(struct kvm_vcpu *vcpu)
2271{
2272 int n_rmap = count_rmaps(vcpu);
2273 int n_actual = count_writable_mappings(vcpu);
2274
2275 if (n_rmap != n_actual)
2276 printk(KERN_ERR "%s: (%s) rmap %d actual %d\n",
b8688d51 2277 __func__, audit_msg, n_rmap, n_actual);
37a7d8b0
AK
2278}
2279
2280static void audit_write_protection(struct kvm_vcpu *vcpu)
2281{
4db35314 2282 struct kvm_mmu_page *sp;
290fc38d
IE
2283 struct kvm_memory_slot *slot;
2284 unsigned long *rmapp;
2285 gfn_t gfn;
37a7d8b0 2286
f05e70ac 2287 list_for_each_entry(sp, &vcpu->kvm->arch.active_mmu_pages, link) {
4db35314 2288 if (sp->role.metaphysical)
37a7d8b0
AK
2289 continue;
2290
4db35314
AK
2291 slot = gfn_to_memslot(vcpu->kvm, sp->gfn);
2292 gfn = unalias_gfn(vcpu->kvm, sp->gfn);
290fc38d
IE
2293 rmapp = &slot->rmap[gfn - slot->base_gfn];
2294 if (*rmapp)
37a7d8b0
AK
2295 printk(KERN_ERR "%s: (%s) shadow page has writable"
2296 " mappings: gfn %lx role %x\n",
b8688d51 2297 __func__, audit_msg, sp->gfn,
4db35314 2298 sp->role.word);
37a7d8b0
AK
2299 }
2300}
2301
2302static void kvm_mmu_audit(struct kvm_vcpu *vcpu, const char *msg)
2303{
2304 int olddbg = dbg;
2305
2306 dbg = 0;
2307 audit_msg = msg;
2308 audit_rmap(vcpu);
2309 audit_write_protection(vcpu);
2310 audit_mappings(vcpu);
2311 dbg = olddbg;
2312}
2313
2314#endif