Commit | Line | Data |
---|---|---|
8373d25d SC |
1 | /* SPDX-License-Identifier: GPL-2.0 */ |
2 | #ifndef __KVM_X86_VMX_H | |
3 | #define __KVM_X86_VMX_H | |
4 | ||
5 | #include <linux/kvm_host.h> | |
6 | ||
7 | #include <asm/kvm.h> | |
f99e3daf | 8 | #include <asm/intel_pt.h> |
8373d25d SC |
9 | |
10 | #include "capabilities.h" | |
e5d03de5 | 11 | #include "kvm_cache_regs.h" |
8888cdd0 | 12 | #include "posted_intr.h" |
8373d25d | 13 | #include "vmcs.h" |
5a085326 | 14 | #include "vmx_ops.h" |
1dbf5d68 | 15 | #include "cpuid.h" |
8373d25d SC |
16 | |
17 | #define MSR_TYPE_R 1 | |
18 | #define MSR_TYPE_W 2 | |
19 | #define MSR_TYPE_RW 3 | |
20 | ||
21 | #define X2APIC_MSR(r) (APIC_BASE_MSR + ((r) >> 4)) | |
22 | ||
7d73710d | 23 | #ifdef CONFIG_X86_64 |
eb3db1b1 | 24 | #define MAX_NR_USER_RETURN_MSRS 7 |
7d73710d | 25 | #else |
eb3db1b1 | 26 | #define MAX_NR_USER_RETURN_MSRS 4 |
7d73710d JM |
27 | #endif |
28 | ||
ce833b23 | 29 | #define MAX_NR_LOADSTORE_MSRS 8 |
8373d25d SC |
30 | |
31 | struct vmx_msrs { | |
32 | unsigned int nr; | |
ce833b23 | 33 | struct vmx_msr_entry val[MAX_NR_LOADSTORE_MSRS]; |
8373d25d SC |
34 | }; |
35 | ||
eb3db1b1 | 36 | struct vmx_uret_msr { |
ee9d22e0 | 37 | bool load_into_hardware; |
8373d25d SC |
38 | u64 data; |
39 | u64 mask; | |
40 | }; | |
41 | ||
42 | enum segment_cache_field { | |
43 | SEG_FIELD_SEL = 0, | |
44 | SEG_FIELD_BASE = 1, | |
45 | SEG_FIELD_LIMIT = 2, | |
46 | SEG_FIELD_AR = 3, | |
47 | ||
48 | SEG_FIELD_NR = 4 | |
49 | }; | |
50 | ||
2ef444f1 CP |
51 | #define RTIT_ADDR_RANGE 4 |
52 | ||
53 | struct pt_ctx { | |
54 | u64 ctl; | |
55 | u64 status; | |
56 | u64 output_base; | |
57 | u64 output_mask; | |
58 | u64 cr3_match; | |
59 | u64 addr_a[RTIT_ADDR_RANGE]; | |
60 | u64 addr_b[RTIT_ADDR_RANGE]; | |
61 | }; | |
62 | ||
63 | struct pt_desc { | |
64 | u64 ctl_bitmask; | |
f4d3a902 | 65 | u32 num_address_ranges; |
2ef444f1 CP |
66 | u32 caps[PT_CPUID_REGS_NUM * PT_CPUID_LEAVES]; |
67 | struct pt_ctx host; | |
68 | struct pt_ctx guest; | |
69 | }; | |
8373d25d | 70 | |
8e533240 SC |
71 | union vmx_exit_reason { |
72 | struct { | |
73 | u32 basic : 16; | |
74 | u32 reserved16 : 1; | |
75 | u32 reserved17 : 1; | |
76 | u32 reserved18 : 1; | |
77 | u32 reserved19 : 1; | |
78 | u32 reserved20 : 1; | |
79 | u32 reserved21 : 1; | |
80 | u32 reserved22 : 1; | |
81 | u32 reserved23 : 1; | |
82 | u32 reserved24 : 1; | |
83 | u32 reserved25 : 1; | |
fe6b6bc8 | 84 | u32 bus_lock_detected : 1; |
8e533240 SC |
85 | u32 enclave_mode : 1; |
86 | u32 smi_pending_mtf : 1; | |
87 | u32 smi_from_vmx_root : 1; | |
88 | u32 reserved30 : 1; | |
89 | u32 failed_vmentry : 1; | |
90 | }; | |
91 | u32 full; | |
92 | }; | |
93 | ||
9c9520ce PB |
94 | #define vcpu_to_lbr_desc(vcpu) (&to_vmx(vcpu)->lbr_desc) |
95 | #define vcpu_to_lbr_records(vcpu) (&to_vmx(vcpu)->lbr_desc.records) | |
96 | ||
97 | bool intel_pmu_lbr_is_compatible(struct kvm_vcpu *vcpu); | |
c6462363 | 98 | bool intel_pmu_lbr_is_enabled(struct kvm_vcpu *vcpu); |
9c9520ce | 99 | |
8e12911b | 100 | int intel_pmu_create_guest_lbr_event(struct kvm_vcpu *vcpu); |
1b5ac322 | 101 | void vmx_passthrough_lbr_msrs(struct kvm_vcpu *vcpu); |
8e12911b | 102 | |
9c9520ce PB |
103 | struct lbr_desc { |
104 | /* Basic info about guest LBR records. */ | |
105 | struct x86_pmu_lbr records; | |
8e12911b LX |
106 | |
107 | /* | |
108 | * Emulate LBR feature via passthrough LBR registers when the | |
109 | * per-vcpu guest LBR event is scheduled on the current pcpu. | |
110 | * | |
111 | * The records may be inaccurate if the host reclaims the LBR. | |
112 | */ | |
113 | struct perf_event *event; | |
9254beaa LX |
114 | |
115 | /* True if LBRs are marked as not intercepted in the MSR bitmap */ | |
116 | bool msr_passthrough; | |
9c9520ce PB |
117 | }; |
118 | ||
8373d25d SC |
119 | /* |
120 | * The nested_vmx structure is part of vcpu_vmx, and holds information we need | |
121 | * for correct emulation of VMX (i.e., nested VMX) on this vcpu. | |
122 | */ | |
123 | struct nested_vmx { | |
124 | /* Has the level1 guest done vmxon? */ | |
125 | bool vmxon; | |
126 | gpa_t vmxon_ptr; | |
127 | bool pml_full; | |
128 | ||
129 | /* The guest-physical address of the current VMCS L1 keeps for L2 */ | |
130 | gpa_t current_vmptr; | |
131 | /* | |
132 | * Cache of the guest's VMCS, existing outside of guest memory. | |
133 | * Loaded from guest memory during VMPTRLD. Flushed to guest | |
134 | * memory during VMCLEAR and VMPTRLD. | |
135 | */ | |
136 | struct vmcs12 *cached_vmcs12; | |
137 | /* | |
138 | * Cache of the guest's shadow VMCS, existing outside of guest | |
139 | * memory. Loaded from guest memory during VM entry. Flushed | |
140 | * to guest memory during VM exit. | |
141 | */ | |
142 | struct vmcs12 *cached_shadow_vmcs12; | |
7952d769 | 143 | |
297d597a DW |
144 | /* |
145 | * GPA to HVA cache for accessing vmcs12->vmcs_link_pointer | |
146 | */ | |
147 | struct gfn_to_hva_cache shadow_vmcs12_cache; | |
148 | ||
cee66664 DW |
149 | /* |
150 | * GPA to HVA cache for VMCS12 | |
151 | */ | |
152 | struct gfn_to_hva_cache vmcs12_cache; | |
153 | ||
8373d25d SC |
154 | /* |
155 | * Indicates if the shadow vmcs or enlightened vmcs must be updated | |
156 | * with the data held by struct vmcs12. | |
157 | */ | |
3731905e | 158 | bool need_vmcs12_to_shadow_sync; |
8373d25d SC |
159 | bool dirty_vmcs12; |
160 | ||
ed2a4800 VK |
161 | /* |
162 | * Indicates whether MSR bitmap for L2 needs to be rebuilt due to | |
163 | * changes in MSR bitmap for L1 or switching to a different L2. Note, | |
164 | * this flag can only be used reliably in conjunction with a paravirt L1 | |
165 | * which informs L0 whether any changes to MSR bitmap for L2 were done | |
166 | * on its side. | |
167 | */ | |
168 | bool force_msr_bitmap_recalc; | |
169 | ||
7952d769 SC |
170 | /* |
171 | * Indicates lazily loaded guest state has not yet been decached from | |
172 | * vmcs02. | |
173 | */ | |
174 | bool need_sync_vmcs02_to_vmcs12_rare; | |
175 | ||
8373d25d SC |
176 | /* |
177 | * vmcs02 has been initialized, i.e. state that is constant for | |
178 | * vmcs02 has been written to the backing VMCS. Initialization | |
179 | * is delayed until L1 actually attempts to run a nested VM. | |
180 | */ | |
181 | bool vmcs02_initialized; | |
182 | ||
183 | bool change_vmcs01_virtual_apic_mode; | |
1196cb97 | 184 | bool reload_vmcs01_apic_access_page; |
a85863c2 | 185 | bool update_vmcs01_cpu_dirty_logging; |
8373d25d SC |
186 | |
187 | /* | |
188 | * Enlightened VMCS has been enabled. It does not mean that L1 has to | |
189 | * use it. However, VMX features available to L1 will be limited based | |
190 | * on what the enlightened VMCS supports. | |
191 | */ | |
192 | bool enlightened_vmcs_enabled; | |
193 | ||
194 | /* L2 must run next, and mustn't decide to exit to L1. */ | |
195 | bool nested_run_pending; | |
196 | ||
5ef8acbd OU |
197 | /* Pending MTF VM-exit into L1. */ |
198 | bool mtf_pending; | |
199 | ||
8373d25d SC |
200 | struct loaded_vmcs vmcs02; |
201 | ||
202 | /* | |
203 | * Guest pages referred to in the vmcs02 with host-physical | |
204 | * pointers, so we must keep them pinned while L2 runs. | |
205 | */ | |
206 | struct page *apic_access_page; | |
96c66e87 | 207 | struct kvm_host_map virtual_apic_map; |
3278e049 | 208 | struct kvm_host_map pi_desc_map; |
31f0b6c4 KA |
209 | |
210 | struct kvm_host_map msr_bitmap_map; | |
211 | ||
8373d25d SC |
212 | struct pi_desc *pi_desc; |
213 | bool pi_pending; | |
214 | u16 posted_intr_nv; | |
215 | ||
216 | struct hrtimer preemption_timer; | |
850448f3 PS |
217 | u64 preemption_timer_deadline; |
218 | bool has_preemption_timer_deadline; | |
8373d25d SC |
219 | bool preemption_timer_expired; |
220 | ||
221 | /* to migrate it to L2 if VM_ENTRY_LOAD_DEBUG_CONTROLS is off */ | |
222 | u64 vmcs01_debugctl; | |
223 | u64 vmcs01_guest_bndcfgs; | |
224 | ||
02d496cf LA |
225 | /* to migrate it to L1 if L2 writes to L1's CR8 directly */ |
226 | int l1_tpr_threshold; | |
227 | ||
8373d25d SC |
228 | u16 vpid02; |
229 | u16 last_vpid; | |
230 | ||
231 | struct nested_vmx_msrs msrs; | |
232 | ||
233 | /* SMM related state */ | |
234 | struct { | |
235 | /* in VMX operation on SMM entry? */ | |
236 | bool vmxon; | |
237 | /* in guest mode on SMM entry? */ | |
238 | bool guest_mode; | |
239 | } smm; | |
240 | ||
241 | gpa_t hv_evmcs_vmptr; | |
dee9c049 | 242 | struct kvm_host_map hv_evmcs_map; |
8373d25d SC |
243 | struct hv_enlightened_vmcs *hv_evmcs; |
244 | }; | |
245 | ||
246 | struct vcpu_vmx { | |
247 | struct kvm_vcpu vcpu; | |
8373d25d | 248 | u8 fail; |
84ec8d2d | 249 | u8 x2apic_msr_bitmap_mode; |
b464f57e PB |
250 | |
251 | /* | |
252 | * If true, host state has been stored in vmx->loaded_vmcs for | |
253 | * the CPU registers that only need to be switched when transitioning | |
254 | * to/from the kernel, and the registers have been loaded with guest | |
255 | * values. If false, host state is loaded in the CPU registers | |
256 | * and vmx->loaded_vmcs->host_state is invalid. | |
257 | */ | |
258 | bool guest_state_loaded; | |
259 | ||
5addc235 | 260 | unsigned long exit_qualification; |
8373d25d SC |
261 | u32 exit_intr_info; |
262 | u32 idt_vectoring_info; | |
263 | ulong rflags; | |
70f932ec | 264 | |
b6194b94 SC |
265 | /* |
266 | * User return MSRs are always emulated when enabled in the guest, but | |
267 | * only loaded into hardware when necessary, e.g. SYSCALL #UDs outside | |
268 | * of 64-bit mode or if EFER.SCE=1, thus the SYSCALL MSRs don't need to | |
269 | * be loaded into hardware if those conditions aren't met. | |
b6194b94 | 270 | */ |
eb3db1b1 | 271 | struct vmx_uret_msr guest_uret_msrs[MAX_NR_USER_RETURN_MSRS]; |
658ece84 | 272 | bool guest_uret_msrs_loaded; |
8373d25d SC |
273 | #ifdef CONFIG_X86_64 |
274 | u64 msr_host_kernel_gs_base; | |
275 | u64 msr_guest_kernel_gs_base; | |
276 | #endif | |
277 | ||
8373d25d | 278 | u64 spec_ctrl; |
6e3ba4ab | 279 | u32 msr_ia32_umwait_control; |
8373d25d | 280 | |
8373d25d SC |
281 | /* |
282 | * loaded_vmcs points to the VMCS currently used in this vcpu. For a | |
283 | * non-nested (L1) guest, it always points to vmcs01. For a nested | |
b464f57e | 284 | * guest (L2), it points to a different VMCS. |
8373d25d SC |
285 | */ |
286 | struct loaded_vmcs vmcs01; | |
287 | struct loaded_vmcs *loaded_vmcs; | |
c9afc58c | 288 | |
8373d25d SC |
289 | struct msr_autoload { |
290 | struct vmx_msrs guest; | |
291 | struct vmx_msrs host; | |
292 | } msr_autoload; | |
293 | ||
662f1d1d AL |
294 | struct msr_autostore { |
295 | struct vmx_msrs guest; | |
296 | } msr_autostore; | |
297 | ||
8373d25d SC |
298 | struct { |
299 | int vm86_active; | |
300 | ulong save_rflags; | |
301 | struct kvm_segment segs[8]; | |
302 | } rmode; | |
303 | struct { | |
304 | u32 bitmask; /* 4 bits per segment (1 bit per field) */ | |
305 | struct kvm_save_segment { | |
306 | u16 selector; | |
307 | unsigned long base; | |
308 | u32 limit; | |
309 | u32 ar; | |
310 | } seg[8]; | |
311 | } segment_cache; | |
312 | int vpid; | |
313 | bool emulation_required; | |
314 | ||
8e533240 | 315 | union vmx_exit_reason exit_reason; |
8373d25d SC |
316 | |
317 | /* Posted interrupt descriptor */ | |
318 | struct pi_desc pi_desc; | |
319 | ||
12a8eee5 SC |
320 | /* Used if this vCPU is waiting for PI notification wakeup. */ |
321 | struct list_head pi_wakeup_list; | |
322 | ||
8373d25d SC |
323 | /* Support for a guest hypervisor (nested VMX) */ |
324 | struct nested_vmx nested; | |
325 | ||
326 | /* Dynamic PLE window. */ | |
c5c5d6fa | 327 | unsigned int ple_window; |
8373d25d SC |
328 | bool ple_window_dirty; |
329 | ||
330 | bool req_immediate_exit; | |
331 | ||
332 | /* Support for PML */ | |
333 | #define PML_ENTITY_NUM 512 | |
334 | struct page *pml_pg; | |
335 | ||
336 | /* apic deadline value in host tsc */ | |
337 | u64 hv_deadline_tsc; | |
338 | ||
8373d25d SC |
339 | unsigned long host_debugctlmsr; |
340 | ||
341 | /* | |
342 | * Only bits masked by msr_ia32_feature_control_valid_bits can be set in | |
32ad73db | 343 | * msr_ia32_feature_control. FEAT_CTL_LOCKED is always included |
8373d25d SC |
344 | * in msr_ia32_feature_control_valid_bits. |
345 | */ | |
346 | u64 msr_ia32_feature_control; | |
347 | u64 msr_ia32_feature_control_valid_bits; | |
8f102445 SC |
348 | /* SGX Launch Control public key hash */ |
349 | u64 msr_ia32_sgxlepubkeyhash[4]; | |
350 | ||
2ef444f1 | 351 | struct pt_desc pt_desc; |
9c9520ce | 352 | struct lbr_desc lbr_desc; |
3eb90017 AG |
353 | |
354 | /* Save desired MSR intercept (read: pass-through) state */ | |
b5274b1b | 355 | #define MAX_POSSIBLE_PASSTHROUGH_MSRS 15 |
3eb90017 AG |
356 | struct { |
357 | DECLARE_BITMAP(read, MAX_POSSIBLE_PASSTHROUGH_MSRS); | |
358 | DECLARE_BITMAP(write, MAX_POSSIBLE_PASSTHROUGH_MSRS); | |
359 | } shadow_msr_intercept; | |
8373d25d SC |
360 | }; |
361 | ||
8373d25d SC |
362 | struct kvm_vmx { |
363 | struct kvm kvm; | |
364 | ||
365 | unsigned int tss_addr; | |
366 | bool ept_identity_pagetable_done; | |
367 | gpa_t ept_identity_map_addr; | |
8373d25d SC |
368 | }; |
369 | ||
7c97fcb3 | 370 | bool nested_vmx_allowed(struct kvm_vcpu *vcpu); |
5c911bef SC |
371 | void vmx_vcpu_load_vmcs(struct kvm_vcpu *vcpu, int cpu, |
372 | struct loaded_vmcs *buddy); | |
97b7ead3 SC |
373 | int allocate_vpid(void); |
374 | void free_vpid(int vpid); | |
375 | void vmx_set_constant_host_state(struct vcpu_vmx *vmx); | |
376 | void vmx_prepare_switch_to_guest(struct kvm_vcpu *vcpu); | |
a9f2705e LJ |
377 | void vmx_set_vmcs_host_state(struct vmcs_host_state *host, unsigned long cr3, |
378 | u16 fs_sel, u16 gs_sel, | |
379 | unsigned long fs_base, unsigned long gs_base); | |
97b7ead3 | 380 | int vmx_get_cpl(struct kvm_vcpu *vcpu); |
dbab610a | 381 | bool vmx_emulation_required(struct kvm_vcpu *vcpu); |
97b7ead3 SC |
382 | unsigned long vmx_get_rflags(struct kvm_vcpu *vcpu); |
383 | void vmx_set_rflags(struct kvm_vcpu *vcpu, unsigned long rflags); | |
384 | u32 vmx_get_interrupt_shadow(struct kvm_vcpu *vcpu); | |
385 | void vmx_set_interrupt_shadow(struct kvm_vcpu *vcpu, int mask); | |
72f211ec | 386 | int vmx_set_efer(struct kvm_vcpu *vcpu, u64 efer); |
97b7ead3 | 387 | void vmx_set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0); |
c2fe3cd4 | 388 | void vmx_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4); |
97b7ead3 SC |
389 | void set_cr4_guest_host_mask(struct vcpu_vmx *vmx); |
390 | void ept_save_pdptrs(struct kvm_vcpu *vcpu); | |
391 | void vmx_get_segment(struct kvm_vcpu *vcpu, struct kvm_segment *var, int seg); | |
816be9e9 | 392 | void __vmx_set_segment(struct kvm_vcpu *vcpu, struct kvm_segment *var, int seg); |
e83bc09c | 393 | u64 construct_eptp(struct kvm_vcpu *vcpu, hpa_t root_hpa, int root_level); |
2ba4493a | 394 | |
b33bb78a | 395 | bool vmx_guest_inject_ac(struct kvm_vcpu *vcpu); |
b6a7cc35 | 396 | void vmx_update_exception_bitmap(struct kvm_vcpu *vcpu); |
1b660b6b SC |
397 | bool vmx_nmi_blocked(struct kvm_vcpu *vcpu); |
398 | bool vmx_interrupt_blocked(struct kvm_vcpu *vcpu); | |
97b7ead3 SC |
399 | bool vmx_get_nmi_mask(struct kvm_vcpu *vcpu); |
400 | void vmx_set_nmi_mask(struct kvm_vcpu *vcpu, bool masked); | |
401 | void vmx_set_virtual_apic_mode(struct kvm_vcpu *vcpu); | |
d85a8034 | 402 | struct vmx_uret_msr *vmx_find_uret_msr(struct vcpu_vmx *vmx, u32 msr); |
476c9bd8 | 403 | void pt_update_intercept_for_msr(struct kvm_vcpu *vcpu); |
4d259965 | 404 | void vmx_update_host_rsp(struct vcpu_vmx *vmx, unsigned long host_rsp); |
150f17bf | 405 | bool __vmx_vcpu_run(struct vcpu_vmx *vmx, unsigned long *regs, bool launched); |
a128a934 | 406 | int vmx_find_loadstore_msr_slot(struct vmx_msrs *m, u32 msr); |
43fea4e4 | 407 | void vmx_ept_load_pdptrs(struct kvm_vcpu *vcpu); |
e23f6d49 SC |
408 | |
409 | void vmx_disable_intercept_for_msr(struct kvm_vcpu *vcpu, u32 msr, int type); | |
410 | void vmx_enable_intercept_for_msr(struct kvm_vcpu *vcpu, u32 msr, int type); | |
411 | ||
307a94c7 IS |
412 | u64 vmx_get_l2_tsc_offset(struct kvm_vcpu *vcpu); |
413 | u64 vmx_get_l2_tsc_multiplier(struct kvm_vcpu *vcpu); | |
414 | ||
e23f6d49 SC |
415 | static inline void vmx_set_intercept_for_msr(struct kvm_vcpu *vcpu, u32 msr, |
416 | int type, bool value) | |
417 | { | |
418 | if (value) | |
419 | vmx_enable_intercept_for_msr(vcpu, msr, type); | |
420 | else | |
421 | vmx_disable_intercept_for_msr(vcpu, msr, type); | |
422 | } | |
423 | ||
a85863c2 | 424 | void vmx_update_cpu_dirty_logging(struct kvm_vcpu *vcpu); |
97b7ead3 | 425 | |
0cacb80b SC |
426 | /* |
427 | * Note, early Intel manuals have the write-low and read-high bitmap offsets | |
428 | * the wrong way round. The bitmaps control MSRs 0x00000000-0x00001fff and | |
429 | * 0xc0000000-0xc0001fff. The former (low) uses bytes 0-0x3ff for reads and | |
430 | * 0x800-0xbff for writes. The latter (high) uses 0x400-0x7ff for reads and | |
431 | * 0xc00-0xfff for writes. MSRs not covered by either of the ranges always | |
432 | * VM-Exit. | |
433 | */ | |
434 | #define __BUILD_VMX_MSR_BITMAP_HELPER(rtype, action, bitop, access, base) \ | |
435 | static inline rtype vmx_##action##_msr_bitmap_##access(unsigned long *bitmap, \ | |
436 | u32 msr) \ | |
437 | { \ | |
438 | int f = sizeof(unsigned long); \ | |
439 | \ | |
440 | if (msr <= 0x1fff) \ | |
441 | return bitop##_bit(msr, bitmap + base / f); \ | |
442 | else if ((msr >= 0xc0000000) && (msr <= 0xc0001fff)) \ | |
443 | return bitop##_bit(msr & 0x1fff, bitmap + (base + 0x400) / f); \ | |
444 | return (rtype)true; \ | |
67f4b996 | 445 | } |
0cacb80b SC |
446 | #define BUILD_VMX_MSR_BITMAP_HELPERS(ret_type, action, bitop) \ |
447 | __BUILD_VMX_MSR_BITMAP_HELPER(ret_type, action, bitop, read, 0x0) \ | |
448 | __BUILD_VMX_MSR_BITMAP_HELPER(ret_type, action, bitop, write, 0x800) | |
67f4b996 | 449 | |
0cacb80b SC |
450 | BUILD_VMX_MSR_BITMAP_HELPERS(bool, test, test) |
451 | BUILD_VMX_MSR_BITMAP_HELPERS(void, clear, __clear) | |
452 | BUILD_VMX_MSR_BITMAP_HELPERS(void, set, __set) | |
67f4b996 | 453 | |
89b0c9f5 SC |
454 | static inline u8 vmx_get_rvi(void) |
455 | { | |
456 | return vmcs_read16(GUEST_INTR_STATUS) & 0xff; | |
457 | } | |
458 | ||
70f932ec | 459 | #define BUILD_CONTROLS_SHADOW(lname, uname) \ |
70f932ec SC |
460 | static inline void lname##_controls_set(struct vcpu_vmx *vmx, u32 val) \ |
461 | { \ | |
09e226cf SC |
462 | if (vmx->loaded_vmcs->controls_shadow.lname != val) { \ |
463 | vmcs_write32(uname, val); \ | |
464 | vmx->loaded_vmcs->controls_shadow.lname = val; \ | |
465 | } \ | |
70f932ec | 466 | } \ |
389ab252 SC |
467 | static inline u32 __##lname##_controls_get(struct loaded_vmcs *vmcs) \ |
468 | { \ | |
469 | return vmcs->controls_shadow.lname; \ | |
470 | } \ | |
70f932ec SC |
471 | static inline u32 lname##_controls_get(struct vcpu_vmx *vmx) \ |
472 | { \ | |
389ab252 | 473 | return __##lname##_controls_get(vmx->loaded_vmcs); \ |
70f932ec SC |
474 | } \ |
475 | static inline void lname##_controls_setbit(struct vcpu_vmx *vmx, u32 val) \ | |
476 | { \ | |
477 | lname##_controls_set(vmx, lname##_controls_get(vmx) | val); \ | |
478 | } \ | |
479 | static inline void lname##_controls_clearbit(struct vcpu_vmx *vmx, u32 val) \ | |
480 | { \ | |
481 | lname##_controls_set(vmx, lname##_controls_get(vmx) & ~val); \ | |
89b0c9f5 | 482 | } |
70f932ec SC |
483 | BUILD_CONTROLS_SHADOW(vm_entry, VM_ENTRY_CONTROLS) |
484 | BUILD_CONTROLS_SHADOW(vm_exit, VM_EXIT_CONTROLS) | |
c5f2c766 | 485 | BUILD_CONTROLS_SHADOW(pin, PIN_BASED_VM_EXEC_CONTROL) |
2183f564 | 486 | BUILD_CONTROLS_SHADOW(exec, CPU_BASED_VM_EXEC_CONTROL) |
fe7f895d | 487 | BUILD_CONTROLS_SHADOW(secondary_exec, SECONDARY_VM_EXEC_CONTROL) |
89b0c9f5 | 488 | |
41e68b69 PB |
489 | /* |
490 | * VMX_REGS_LAZY_LOAD_SET - The set of registers that will be updated in the | |
491 | * cache on demand. Other registers not listed here are synced to | |
492 | * the cache immediately after VM-Exit. | |
493 | */ | |
494 | #define VMX_REGS_LAZY_LOAD_SET ((1 << VCPU_REGS_RIP) | \ | |
495 | (1 << VCPU_REGS_RSP) | \ | |
496 | (1 << VCPU_EXREG_RFLAGS) | \ | |
497 | (1 << VCPU_EXREG_PDPTR) | \ | |
498 | (1 << VCPU_EXREG_SEGMENTS) | \ | |
499 | (1 << VCPU_EXREG_CR0) | \ | |
500 | (1 << VCPU_EXREG_CR3) | \ | |
501 | (1 << VCPU_EXREG_CR4) | \ | |
502 | (1 << VCPU_EXREG_EXIT_INFO_1) | \ | |
503 | (1 << VCPU_EXREG_EXIT_INFO_2)) | |
e5d03de5 | 504 | |
8373d25d SC |
505 | static inline struct kvm_vmx *to_kvm_vmx(struct kvm *kvm) |
506 | { | |
507 | return container_of(kvm, struct kvm_vmx, kvm); | |
508 | } | |
509 | ||
510 | static inline struct vcpu_vmx *to_vmx(struct kvm_vcpu *vcpu) | |
511 | { | |
512 | return container_of(vcpu, struct vcpu_vmx, vcpu); | |
513 | } | |
514 | ||
5addc235 SC |
515 | static inline unsigned long vmx_get_exit_qual(struct kvm_vcpu *vcpu) |
516 | { | |
517 | struct vcpu_vmx *vmx = to_vmx(vcpu); | |
518 | ||
519 | if (!kvm_register_is_available(vcpu, VCPU_EXREG_EXIT_INFO_1)) { | |
520 | kvm_register_mark_available(vcpu, VCPU_EXREG_EXIT_INFO_1); | |
521 | vmx->exit_qualification = vmcs_readl(EXIT_QUALIFICATION); | |
522 | } | |
523 | return vmx->exit_qualification; | |
524 | } | |
525 | ||
87915858 SC |
526 | static inline u32 vmx_get_intr_info(struct kvm_vcpu *vcpu) |
527 | { | |
528 | struct vcpu_vmx *vmx = to_vmx(vcpu); | |
529 | ||
530 | if (!kvm_register_is_available(vcpu, VCPU_EXREG_EXIT_INFO_2)) { | |
531 | kvm_register_mark_available(vcpu, VCPU_EXREG_EXIT_INFO_2); | |
532 | vmx->exit_intr_info = vmcs_read32(VM_EXIT_INTR_INFO); | |
533 | } | |
534 | return vmx->exit_intr_info; | |
535 | } | |
536 | ||
41836839 | 537 | struct vmcs *alloc_vmcs_cpu(bool shadow, int cpu, gfp_t flags); |
89b0c9f5 SC |
538 | void free_vmcs(struct vmcs *vmcs); |
539 | int alloc_loaded_vmcs(struct loaded_vmcs *loaded_vmcs); | |
540 | void free_loaded_vmcs(struct loaded_vmcs *loaded_vmcs); | |
89b0c9f5 SC |
541 | void loaded_vmcs_clear(struct loaded_vmcs *loaded_vmcs); |
542 | ||
543 | static inline struct vmcs *alloc_vmcs(bool shadow) | |
544 | { | |
41836839 BG |
545 | return alloc_vmcs_cpu(shadow, raw_smp_processor_id(), |
546 | GFP_KERNEL_ACCOUNT); | |
89b0c9f5 SC |
547 | } |
548 | ||
6e3ba4ab TX |
549 | static inline bool vmx_has_waitpkg(struct vcpu_vmx *vmx) |
550 | { | |
7b9cae02 | 551 | return secondary_exec_controls_get(vmx) & |
6e3ba4ab TX |
552 | SECONDARY_EXEC_ENABLE_USR_WAIT_PAUSE; |
553 | } | |
554 | ||
a0c13434 PB |
555 | static inline bool vmx_need_pf_intercept(struct kvm_vcpu *vcpu) |
556 | { | |
b96e6506 MG |
557 | if (!enable_ept) |
558 | return true; | |
559 | ||
560 | return allow_smaller_maxphyaddr && cpuid_maxphyaddr(vcpu) < boot_cpu_data.x86_phys_bits; | |
a0c13434 PB |
561 | } |
562 | ||
bddd82d1 KS |
563 | static inline bool is_unrestricted_guest(struct kvm_vcpu *vcpu) |
564 | { | |
565 | return enable_unrestricted_guest && (!is_guest_mode(vcpu) || | |
566 | (secondary_exec_controls_get(to_vmx(vcpu)) & | |
567 | SECONDARY_EXEC_UNRESTRICTED_GUEST)); | |
568 | } | |
569 | ||
2ba4493a SC |
570 | bool __vmx_guest_state_valid(struct kvm_vcpu *vcpu); |
571 | static inline bool vmx_guest_state_valid(struct kvm_vcpu *vcpu) | |
572 | { | |
573 | return is_unrestricted_guest(vcpu) || __vmx_guest_state_valid(vcpu); | |
574 | } | |
575 | ||
0702a3cb | 576 | void dump_vmcs(struct kvm_vcpu *vcpu); |
69090810 | 577 | |
329bd56c VS |
578 | static inline int vmx_get_instr_info_reg2(u32 vmx_instr_info) |
579 | { | |
580 | return (vmx_instr_info >> 28) & 0xf; | |
581 | } | |
582 | ||
8373d25d | 583 | #endif /* __KVM_X86_VMX_H */ |