KVM: KVM Steal time guest/host interface
[linux-2.6-block.git] / include / linux / kvm_host.h
CommitLineData
edf88417
AK
1#ifndef __KVM_HOST_H
2#define __KVM_HOST_H
6aa8b732
AK
3
4/*
5 * This work is licensed under the terms of the GNU GPL, version 2. See
6 * the COPYING file in the top-level directory.
7 */
8
9#include <linux/types.h>
e56a7a28 10#include <linux/hardirq.h>
6aa8b732
AK
11#include <linux/list.h>
12#include <linux/mutex.h>
13#include <linux/spinlock.h>
06ff0d37
MR
14#include <linux/signal.h>
15#include <linux/sched.h>
6aa8b732 16#include <linux/mm.h>
15ad7146 17#include <linux/preempt.h>
0937c48d 18#include <linux/msi.h>
d89f5eff 19#include <linux/slab.h>
bd2b53b2 20#include <linux/rcupdate.h>
e8edc6e0 21#include <asm/signal.h>
6aa8b732 22
6aa8b732 23#include <linux/kvm.h>
102d8325 24#include <linux/kvm_para.h>
6aa8b732 25
edf88417 26#include <linux/kvm_types.h>
d77a39d9 27
edf88417 28#include <asm/kvm_host.h>
d657a98e 29
cef4dea0
AK
30#ifndef KVM_MMIO_SIZE
31#define KVM_MMIO_SIZE 8
32#endif
33
d9e368d6
AK
34/*
35 * vcpu->requests bit members
36 */
3176bc3e 37#define KVM_REQ_TLB_FLUSH 0
2f52d58c 38#define KVM_REQ_MIGRATE_TIMER 1
b209749f 39#define KVM_REQ_REPORT_TPR_ACCESS 2
2e53d63a 40#define KVM_REQ_MMU_RELOAD 3
71c4dfaf 41#define KVM_REQ_TRIPLE_FAULT 4
06e05645 42#define KVM_REQ_PENDING_TIMER 5
d7690175 43#define KVM_REQ_UNHALT 6
4731d4c7 44#define KVM_REQ_MMU_SYNC 7
34c238a1 45#define KVM_REQ_CLOCK_UPDATE 8
32f88400 46#define KVM_REQ_KICK 9
02daab21 47#define KVM_REQ_DEACTIVATE_FPU 10
3842d135 48#define KVM_REQ_EVENT 11
af585b92 49#define KVM_REQ_APF_HALT 12
6aa8b732 50
5550af4d
SY
51#define KVM_USERSPACE_IRQ_SOURCE_ID 0
52
6c474694 53struct kvm;
6aa8b732 54struct kvm_vcpu;
c16f862d 55extern struct kmem_cache *kvm_vcpu_cache;
6aa8b732 56
2eeb2e94
GH
57/*
58 * It would be nice to use something smarter than a linear search, TBD...
59 * Thankfully we dont expect many devices to register (famous last words :),
60 * so until then it will suffice. At least its abstracted so we can change
61 * in one place.
62 */
63struct kvm_io_bus {
64 int dev_count;
e80e2a60 65#define NR_IOBUS_DEVS 200
2eeb2e94
GH
66 struct kvm_io_device *devs[NR_IOBUS_DEVS];
67};
68
e93f8a0f
MT
69enum kvm_bus {
70 KVM_MMIO_BUS,
71 KVM_PIO_BUS,
72 KVM_NR_BUSES
73};
74
75int kvm_io_bus_write(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr,
76 int len, const void *val);
77int kvm_io_bus_read(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr, int len,
bda9020e 78 void *val);
e93f8a0f 79int kvm_io_bus_register_dev(struct kvm *kvm, enum kvm_bus bus_idx,
090b7aff 80 struct kvm_io_device *dev);
e93f8a0f
MT
81int kvm_io_bus_unregister_dev(struct kvm *kvm, enum kvm_bus bus_idx,
82 struct kvm_io_device *dev);
2eeb2e94 83
af585b92
GN
84#ifdef CONFIG_KVM_ASYNC_PF
85struct kvm_async_pf {
86 struct work_struct work;
87 struct list_head link;
88 struct list_head queue;
89 struct kvm_vcpu *vcpu;
90 struct mm_struct *mm;
91 gva_t gva;
92 unsigned long addr;
93 struct kvm_arch_async_pf arch;
94 struct page *page;
95 bool done;
96};
97
98void kvm_clear_async_pf_completion_queue(struct kvm_vcpu *vcpu);
99void kvm_check_async_pf_completion(struct kvm_vcpu *vcpu);
100int kvm_setup_async_pf(struct kvm_vcpu *vcpu, gva_t gva, gfn_t gfn,
101 struct kvm_arch_async_pf *arch);
344d9588 102int kvm_async_pf_wakeup_all(struct kvm_vcpu *vcpu);
af585b92
GN
103#endif
104
6b7e2d09
XG
105enum {
106 OUTSIDE_GUEST_MODE,
107 IN_GUEST_MODE,
108 EXITING_GUEST_MODE
109};
110
d17fbbf7
ZX
111struct kvm_vcpu {
112 struct kvm *kvm;
31bb117e 113#ifdef CONFIG_PREEMPT_NOTIFIERS
d17fbbf7 114 struct preempt_notifier preempt_notifier;
31bb117e 115#endif
6b7e2d09 116 int cpu;
d17fbbf7 117 int vcpu_id;
6b7e2d09
XG
118 int srcu_idx;
119 int mode;
d17fbbf7 120 unsigned long requests;
d0bfb940 121 unsigned long guest_debug;
6b7e2d09
XG
122
123 struct mutex mutex;
124 struct kvm_run *run;
f656ce01 125
d17fbbf7 126 int fpu_active;
2acf923e 127 int guest_fpu_loaded, guest_xcr0_loaded;
d17fbbf7 128 wait_queue_head_t wq;
34bb10b7 129 struct pid *pid;
d17fbbf7
ZX
130 int sigset_active;
131 sigset_t sigset;
132 struct kvm_vcpu_stat stat;
133
34c16eec 134#ifdef CONFIG_HAS_IOMEM
d17fbbf7
ZX
135 int mmio_needed;
136 int mmio_read_completed;
137 int mmio_is_write;
138 int mmio_size;
cef4dea0
AK
139 int mmio_index;
140 unsigned char mmio_data[KVM_MMIO_SIZE];
6aa8b732 141 gpa_t mmio_phys_addr;
34c16eec 142#endif
1165f5fe 143
af585b92
GN
144#ifdef CONFIG_KVM_ASYNC_PF
145 struct {
146 u32 queued;
147 struct list_head queue;
148 struct list_head done;
149 spinlock_t lock;
150 } async_pf;
151#endif
152
d657a98e
ZX
153 struct kvm_vcpu_arch arch;
154};
155
6b7e2d09
XG
156static inline int kvm_vcpu_exiting_guest_mode(struct kvm_vcpu *vcpu)
157{
158 return cmpxchg(&vcpu->mode, IN_GUEST_MODE, EXITING_GUEST_MODE);
159}
160
660c22c4
TY
161/*
162 * Some of the bitops functions do not support too long bitmaps.
163 * This number must be determined not to exceed such limits.
164 */
165#define KVM_MEM_MAX_NR_PAGES ((1UL << 31) - 1)
166
d4dbf470
TY
167struct kvm_lpage_info {
168 unsigned long rmap_pde;
169 int write_count;
170};
171
6aa8b732
AK
172struct kvm_memory_slot {
173 gfn_t base_gfn;
174 unsigned long npages;
175 unsigned long flags;
290fc38d 176 unsigned long *rmap;
6aa8b732 177 unsigned long *dirty_bitmap;
515a0127 178 unsigned long *dirty_bitmap_head;
d4dbf470 179 struct kvm_lpage_info *lpage_info[KVM_NR_PAGE_SIZES - 1];
8a7ae055 180 unsigned long userspace_addr;
80b14b5b 181 int user_alloc;
e36d96f7 182 int id;
6aa8b732
AK
183};
184
87bf6e7d
TY
185static inline unsigned long kvm_dirty_bitmap_bytes(struct kvm_memory_slot *memslot)
186{
187 return ALIGN(memslot->npages, BITS_PER_LONG) / 8;
188}
189
399ec807
AK
190struct kvm_kernel_irq_routing_entry {
191 u32 gsi;
5116d8f6 192 u32 type;
4925663a 193 int (*set)(struct kvm_kernel_irq_routing_entry *e,
1a6e4a8c 194 struct kvm *kvm, int irq_source_id, int level);
399ec807
AK
195 union {
196 struct {
197 unsigned irqchip;
198 unsigned pin;
199 } irqchip;
79950e10 200 struct msi_msg msi;
399ec807 201 };
46e624b9
GN
202 struct hlist_node link;
203};
204
3e71f88b
GN
205#ifdef __KVM_HAVE_IOAPIC
206
46e624b9 207struct kvm_irq_routing_table {
3e71f88b 208 int chip[KVM_NR_IRQCHIPS][KVM_IOAPIC_NUM_PINS];
46e624b9
GN
209 struct kvm_kernel_irq_routing_entry *rt_entries;
210 u32 nr_rt_entries;
211 /*
212 * Array indexed by gsi. Each entry contains list of irq chips
213 * the gsi is connected to.
214 */
215 struct hlist_head map[0];
399ec807
AK
216};
217
3e71f88b
GN
218#else
219
220struct kvm_irq_routing_table {};
221
222#endif
223
46a26bf5
MT
224struct kvm_memslots {
225 int nmemslots;
49c7754c 226 u64 generation;
46a26bf5
MT
227 struct kvm_memory_slot memslots[KVM_MEMORY_SLOTS +
228 KVM_PRIVATE_MEM_SLOTS];
229};
230
6aa8b732 231struct kvm {
aaee2c94 232 spinlock_t mmu_lock;
79fac95e 233 struct mutex slots_lock;
6d4e4c4f 234 struct mm_struct *mm; /* userspace tied to this vm */
46a26bf5 235 struct kvm_memslots *memslots;
bc6678a3 236 struct srcu_struct srcu;
73880c80
GN
237#ifdef CONFIG_KVM_APIC_ARCHITECTURE
238 u32 bsp_vcpu_id;
c5af89b6 239 struct kvm_vcpu *bsp_vcpu;
73880c80 240#endif
fb3f0f51 241 struct kvm_vcpu *vcpus[KVM_MAX_VCPUS];
73880c80 242 atomic_t online_vcpus;
217ece61 243 int last_boosted_vcpu;
133de902 244 struct list_head vm_list;
60eead79 245 struct mutex lock;
e93f8a0f 246 struct kvm_io_bus *buses[KVM_NR_BUSES];
721eecbf
GH
247#ifdef CONFIG_HAVE_KVM_EVENTFD
248 struct {
249 spinlock_t lock;
250 struct list_head items;
251 } irqfds;
d34e6b17 252 struct list_head ioeventfds;
721eecbf 253#endif
ba1389b7 254 struct kvm_vm_stat stat;
d69fb81f 255 struct kvm_arch arch;
d39f13b0 256 atomic_t users_count;
5f94c174
LV
257#ifdef KVM_COALESCED_MMIO_PAGE_OFFSET
258 struct kvm_coalesced_mmio_dev *coalesced_mmio_dev;
259 struct kvm_coalesced_mmio_ring *coalesced_mmio_ring;
260#endif
e930bffe 261
60eead79 262 struct mutex irq_lock;
75858a84 263#ifdef CONFIG_HAVE_KVM_IRQCHIP
bd2b53b2
MT
264 /*
265 * Update side is protected by irq_lock and,
266 * if configured, irqfds.lock.
267 */
4b6a2872 268 struct kvm_irq_routing_table __rcu *irq_routing;
75858a84 269 struct hlist_head mask_notifier_list;
136bdfee 270 struct hlist_head irq_ack_notifier_list;
75858a84
AK
271#endif
272
e930bffe
AA
273#ifdef KVM_ARCH_WANT_MMU_NOTIFIER
274 struct mmu_notifier mmu_notifier;
275 unsigned long mmu_notifier_seq;
276 long mmu_notifier_count;
277#endif
5c663a15 278 long tlbs_dirty;
6aa8b732
AK
279};
280
f0242478
RR
281/* The guest did something we don't support. */
282#define pr_unimpl(vcpu, fmt, ...) \
283 do { \
284 if (printk_ratelimit()) \
285 printk(KERN_ERR "kvm: %i: cpu%i " fmt, \
286 current->tgid, (vcpu)->vcpu_id , ## __VA_ARGS__); \
d77c26fc 287 } while (0)
f0242478 288
6aa8b732
AK
289#define kvm_printf(kvm, fmt ...) printk(KERN_DEBUG fmt)
290#define vcpu_printf(vcpu, fmt...) kvm_printf(vcpu->kvm, fmt)
291
988a2cae
GN
292static inline struct kvm_vcpu *kvm_get_vcpu(struct kvm *kvm, int i)
293{
294 smp_rmb();
295 return kvm->vcpus[i];
296}
297
298#define kvm_for_each_vcpu(idx, vcpup, kvm) \
b42fc3cb
JM
299 for (idx = 0; \
300 idx < atomic_read(&kvm->online_vcpus) && \
301 (vcpup = kvm_get_vcpu(kvm, idx)) != NULL; \
302 idx++)
988a2cae 303
fb3f0f51
RR
304int kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id);
305void kvm_vcpu_uninit(struct kvm_vcpu *vcpu);
306
313a3dc7
CO
307void vcpu_load(struct kvm_vcpu *vcpu);
308void vcpu_put(struct kvm_vcpu *vcpu);
309
0ee75bea 310int kvm_init(void *opaque, unsigned vcpu_size, unsigned vcpu_align,
c16f862d 311 struct module *module);
cb498ea2 312void kvm_exit(void);
6aa8b732 313
d39f13b0
IE
314void kvm_get_kvm(struct kvm *kvm);
315void kvm_put_kvm(struct kvm *kvm);
316
90d83dc3
LJ
317static inline struct kvm_memslots *kvm_memslots(struct kvm *kvm)
318{
319 return rcu_dereference_check(kvm->memslots,
320 srcu_read_lock_held(&kvm->srcu)
321 || lockdep_is_held(&kvm->slots_lock));
322}
323
6aa8b732
AK
324#define HPA_MSB ((sizeof(hpa_t) * 8) - 1)
325#define HPA_ERR_MASK ((hpa_t)1 << HPA_MSB)
326static inline int is_error_hpa(hpa_t hpa) { return hpa >> HPA_MSB; }
6aa8b732 327
cea7bb21 328extern struct page *bad_page;
35149e21 329extern pfn_t bad_pfn;
6aa8b732 330
cea7bb21 331int is_error_page(struct page *page);
35149e21 332int is_error_pfn(pfn_t pfn);
bf998156 333int is_hwpoison_pfn(pfn_t pfn);
edba23e5 334int is_fault_pfn(pfn_t pfn);
f9d46eb0 335int kvm_is_error_hva(unsigned long addr);
210c7c4d
IE
336int kvm_set_memory_region(struct kvm *kvm,
337 struct kvm_userspace_memory_region *mem,
338 int user_alloc);
f78e0e2e
SY
339int __kvm_set_memory_region(struct kvm *kvm,
340 struct kvm_userspace_memory_region *mem,
341 int user_alloc);
f7784b8e
MT
342int kvm_arch_prepare_memory_region(struct kvm *kvm,
343 struct kvm_memory_slot *memslot,
344 struct kvm_memory_slot old,
345 struct kvm_userspace_memory_region *mem,
346 int user_alloc);
347void kvm_arch_commit_memory_region(struct kvm *kvm,
0de10343
ZX
348 struct kvm_userspace_memory_region *mem,
349 struct kvm_memory_slot old,
350 int user_alloc);
54dee993 351void kvm_disable_largepages(void);
34d4cb8f 352void kvm_arch_flush_shadow(struct kvm *kvm);
a983fb23 353
48987781
XG
354int gfn_to_page_many_atomic(struct kvm *kvm, gfn_t gfn, struct page **pages,
355 int nr_pages);
356
954bbbc2 357struct page *gfn_to_page(struct kvm *kvm, gfn_t gfn);
05da4558 358unsigned long gfn_to_hva(struct kvm *kvm, gfn_t gfn);
b4231d61
IE
359void kvm_release_page_clean(struct page *page);
360void kvm_release_page_dirty(struct page *page);
35149e21
AL
361void kvm_set_page_dirty(struct page *page);
362void kvm_set_page_accessed(struct page *page);
363
887c08ac 364pfn_t hva_to_pfn_atomic(struct kvm *kvm, unsigned long addr);
365fb3fd 365pfn_t gfn_to_pfn_atomic(struct kvm *kvm, gfn_t gfn);
612819c3
MT
366pfn_t gfn_to_pfn_async(struct kvm *kvm, gfn_t gfn, bool *async,
367 bool write_fault, bool *writable);
35149e21 368pfn_t gfn_to_pfn(struct kvm *kvm, gfn_t gfn);
612819c3
MT
369pfn_t gfn_to_pfn_prot(struct kvm *kvm, gfn_t gfn, bool write_fault,
370 bool *writable);
506f0d6f
MT
371pfn_t gfn_to_pfn_memslot(struct kvm *kvm,
372 struct kvm_memory_slot *slot, gfn_t gfn);
35149e21
AL
373void kvm_release_pfn_dirty(pfn_t);
374void kvm_release_pfn_clean(pfn_t pfn);
375void kvm_set_pfn_dirty(pfn_t pfn);
376void kvm_set_pfn_accessed(pfn_t pfn);
377void kvm_get_pfn(pfn_t pfn);
378
195aefde
IE
379int kvm_read_guest_page(struct kvm *kvm, gfn_t gfn, void *data, int offset,
380 int len);
7ec54588
MT
381int kvm_read_guest_atomic(struct kvm *kvm, gpa_t gpa, void *data,
382 unsigned long len);
195aefde 383int kvm_read_guest(struct kvm *kvm, gpa_t gpa, void *data, unsigned long len);
e03b644f
GN
384int kvm_read_guest_cached(struct kvm *kvm, struct gfn_to_hva_cache *ghc,
385 void *data, unsigned long len);
195aefde
IE
386int kvm_write_guest_page(struct kvm *kvm, gfn_t gfn, const void *data,
387 int offset, int len);
388int kvm_write_guest(struct kvm *kvm, gpa_t gpa, const void *data,
389 unsigned long len);
49c7754c
GN
390int kvm_write_guest_cached(struct kvm *kvm, struct gfn_to_hva_cache *ghc,
391 void *data, unsigned long len);
392int kvm_gfn_to_hva_cache_init(struct kvm *kvm, struct gfn_to_hva_cache *ghc,
393 gpa_t gpa);
195aefde
IE
394int kvm_clear_guest_page(struct kvm *kvm, gfn_t gfn, int offset, int len);
395int kvm_clear_guest(struct kvm *kvm, gpa_t gpa, unsigned long len);
6aa8b732 396struct kvm_memory_slot *gfn_to_memslot(struct kvm *kvm, gfn_t gfn);
e0d62c7f 397int kvm_is_visible_gfn(struct kvm *kvm, gfn_t gfn);
8f0b1ab6 398unsigned long kvm_host_page_size(struct kvm *kvm, gfn_t gfn);
6aa8b732 399void mark_page_dirty(struct kvm *kvm, gfn_t gfn);
49c7754c
GN
400void mark_page_dirty_in_slot(struct kvm *kvm, struct kvm_memory_slot *memslot,
401 gfn_t gfn);
6aa8b732 402
8776e519 403void kvm_vcpu_block(struct kvm_vcpu *vcpu);
d255f4f2 404void kvm_vcpu_on_spin(struct kvm_vcpu *vcpu);
6aa8b732 405void kvm_resched(struct kvm_vcpu *vcpu);
7702fd1f
AK
406void kvm_load_guest_fpu(struct kvm_vcpu *vcpu);
407void kvm_put_guest_fpu(struct kvm_vcpu *vcpu);
a4ee1ca4 408
d9e368d6 409void kvm_flush_remote_tlbs(struct kvm *kvm);
2e53d63a 410void kvm_reload_remote_mmus(struct kvm *kvm);
6aa8b732 411
043405e1
CO
412long kvm_arch_dev_ioctl(struct file *filp,
413 unsigned int ioctl, unsigned long arg);
313a3dc7
CO
414long kvm_arch_vcpu_ioctl(struct file *filp,
415 unsigned int ioctl, unsigned long arg);
018d00d2
ZX
416
417int kvm_dev_ioctl_check_extension(long ext);
418
5bb064dc
ZX
419int kvm_get_dirty_log(struct kvm *kvm,
420 struct kvm_dirty_log *log, int *is_dirty);
421int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
422 struct kvm_dirty_log *log);
423
1fe779f8
CO
424int kvm_vm_ioctl_set_memory_region(struct kvm *kvm,
425 struct
426 kvm_userspace_memory_region *mem,
427 int user_alloc);
428long kvm_arch_vm_ioctl(struct file *filp,
429 unsigned int ioctl, unsigned long arg);
313a3dc7 430
d0752060
HB
431int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu);
432int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu);
433
8b006791
ZX
434int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
435 struct kvm_translation *tr);
436
b6c7a5dc
HB
437int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs);
438int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs);
439int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
440 struct kvm_sregs *sregs);
441int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
442 struct kvm_sregs *sregs);
62d9f0db
MT
443int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
444 struct kvm_mp_state *mp_state);
445int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
446 struct kvm_mp_state *mp_state);
d0bfb940
JK
447int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
448 struct kvm_guest_debug *dbg);
b6c7a5dc
HB
449int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run);
450
f8c16bba
ZX
451int kvm_arch_init(void *opaque);
452void kvm_arch_exit(void);
043405e1 453
e9b11c17
ZX
454int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu);
455void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu);
456
457void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
458void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
459void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu);
460struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, unsigned int id);
26e5215f 461int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu);
d40ccc62 462void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu);
e9b11c17
ZX
463
464int kvm_arch_vcpu_reset(struct kvm_vcpu *vcpu);
10474ae8 465int kvm_arch_hardware_enable(void *garbage);
e9b11c17
ZX
466void kvm_arch_hardware_disable(void *garbage);
467int kvm_arch_hardware_setup(void);
468void kvm_arch_hardware_unsetup(void);
469void kvm_arch_check_processor_compat(void *rtn);
1d737c8a 470int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu);
e9b11c17 471
d19a9cd2
ZX
472void kvm_free_physmem(struct kvm *kvm);
473
d89f5eff
JK
474#ifndef __KVM_HAVE_ARCH_VM_ALLOC
475static inline struct kvm *kvm_arch_alloc_vm(void)
476{
477 return kzalloc(sizeof(struct kvm), GFP_KERNEL);
478}
479
480static inline void kvm_arch_free_vm(struct kvm *kvm)
481{
482 kfree(kvm);
483}
484#endif
485
486int kvm_arch_init_vm(struct kvm *kvm);
d19a9cd2 487void kvm_arch_destroy_vm(struct kvm *kvm);
8a98f664 488void kvm_free_all_assigned_devices(struct kvm *kvm);
ad8ba2cd 489void kvm_arch_sync_events(struct kvm *kvm);
e9b11c17 490
3d80840d 491int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu);
5736199a 492void kvm_vcpu_kick(struct kvm_vcpu *vcpu);
682c59a3 493
c77fb9dc
XZ
494int kvm_is_mmio_pfn(pfn_t pfn);
495
62c476c7
BAY
496struct kvm_irq_ack_notifier {
497 struct hlist_node link;
498 unsigned gsi;
499 void (*irq_acked)(struct kvm_irq_ack_notifier *kian);
500};
501
502struct kvm_assigned_dev_kernel {
503 struct kvm_irq_ack_notifier ack_notifier;
62c476c7
BAY
504 struct list_head list;
505 int assigned_dev_id;
ab9f4ecb 506 int host_segnr;
62c476c7
BAY
507 int host_busnr;
508 int host_devfn;
c1e01514 509 unsigned int entries_nr;
62c476c7 510 int host_irq;
defaf158 511 bool host_irq_disabled;
c1e01514 512 struct msix_entry *host_msix_entries;
62c476c7 513 int guest_irq;
0645211c 514 struct msix_entry *guest_msix_entries;
4f906c19 515 unsigned long irq_requested_type;
5550af4d 516 int irq_source_id;
b653574a 517 int flags;
62c476c7
BAY
518 struct pci_dev *dev;
519 struct kvm *kvm;
0645211c 520 spinlock_t intx_lock;
1e001d49 521 char irq_name[32];
f8fcfd77 522 struct pci_saved_state *pci_saved_state;
62c476c7 523};
75858a84
AK
524
525struct kvm_irq_mask_notifier {
526 void (*func)(struct kvm_irq_mask_notifier *kimn, bool masked);
527 int irq;
528 struct hlist_node link;
529};
530
531void kvm_register_irq_mask_notifier(struct kvm *kvm, int irq,
532 struct kvm_irq_mask_notifier *kimn);
533void kvm_unregister_irq_mask_notifier(struct kvm *kvm, int irq,
534 struct kvm_irq_mask_notifier *kimn);
4a994358
GN
535void kvm_fire_mask_notifiers(struct kvm *kvm, unsigned irqchip, unsigned pin,
536 bool mask);
75858a84 537
46e624b9
GN
538#ifdef __KVM_HAVE_IOAPIC
539void kvm_get_intr_delivery_bitmask(struct kvm_ioapic *ioapic,
540 union kvm_ioapic_redirect_entry *entry,
541 unsigned long *deliver_bitmask);
542#endif
543int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level);
bd2b53b2
MT
544int kvm_set_msi(struct kvm_kernel_irq_routing_entry *irq_entry, struct kvm *kvm,
545 int irq_source_id, int level);
44882eed 546void kvm_notify_acked_irq(struct kvm *kvm, unsigned irqchip, unsigned pin);
3de42dc0
XZ
547void kvm_register_irq_ack_notifier(struct kvm *kvm,
548 struct kvm_irq_ack_notifier *kian);
fa40a821
MT
549void kvm_unregister_irq_ack_notifier(struct kvm *kvm,
550 struct kvm_irq_ack_notifier *kian);
5550af4d
SY
551int kvm_request_irq_source_id(struct kvm *kvm);
552void kvm_free_irq_source_id(struct kvm *kvm, int irq_source_id);
62c476c7 553
522c68c4
SY
554/* For vcpu->arch.iommu_flags */
555#define KVM_IOMMU_CACHE_COHERENCY 0x1
556
19de40a8 557#ifdef CONFIG_IOMMU_API
3ad26d81 558int kvm_iommu_map_pages(struct kvm *kvm, struct kvm_memory_slot *slot);
260782bc 559int kvm_iommu_map_guest(struct kvm *kvm);
62c476c7 560int kvm_iommu_unmap_guest(struct kvm *kvm);
260782bc
WH
561int kvm_assign_device(struct kvm *kvm,
562 struct kvm_assigned_dev_kernel *assigned_dev);
0a920356
WH
563int kvm_deassign_device(struct kvm *kvm,
564 struct kvm_assigned_dev_kernel *assigned_dev);
19de40a8 565#else /* CONFIG_IOMMU_API */
62c476c7 566static inline int kvm_iommu_map_pages(struct kvm *kvm,
d7a79b6c 567 struct kvm_memory_slot *slot)
62c476c7
BAY
568{
569 return 0;
570}
571
260782bc 572static inline int kvm_iommu_map_guest(struct kvm *kvm)
62c476c7
BAY
573{
574 return -ENODEV;
575}
576
577static inline int kvm_iommu_unmap_guest(struct kvm *kvm)
578{
579 return 0;
580}
260782bc
WH
581
582static inline int kvm_assign_device(struct kvm *kvm,
583 struct kvm_assigned_dev_kernel *assigned_dev)
584{
585 return 0;
586}
0a920356
WH
587
588static inline int kvm_deassign_device(struct kvm *kvm,
589 struct kvm_assigned_dev_kernel *assigned_dev)
590{
591 return 0;
592}
19de40a8 593#endif /* CONFIG_IOMMU_API */
62c476c7 594
d172fcd3
LV
595static inline void kvm_guest_enter(void)
596{
8fa22068 597 BUG_ON(preemptible());
e56a7a28 598 account_system_vtime(current);
d172fcd3 599 current->flags |= PF_VCPU;
8fa22068
GN
600 /* KVM does not hold any references to rcu protected data when it
601 * switches CPU into a guest mode. In fact switching to a guest mode
602 * is very similar to exiting to userspase from rcu point of view. In
603 * addition CPU may stay in a guest mode for quite a long time (up to
604 * one time slice). Lets treat guest mode as quiescent state, just like
605 * we do with user-mode execution.
606 */
607 rcu_virt_note_context_switch(smp_processor_id());
d172fcd3
LV
608}
609
610static inline void kvm_guest_exit(void)
611{
e56a7a28 612 account_system_vtime(current);
d172fcd3
LV
613 current->flags &= ~PF_VCPU;
614}
615
0ee8dcb8
XG
616static inline int memslot_id(struct kvm *kvm, gfn_t gfn)
617{
618 return gfn_to_memslot(kvm, gfn)->id;
619}
620
887c08ac
XG
621static inline unsigned long gfn_to_hva_memslot(struct kvm_memory_slot *slot,
622 gfn_t gfn)
623{
624 return slot->userspace_addr + (gfn - slot->base_gfn) * PAGE_SIZE;
625}
626
1755fbcc
AK
627static inline gpa_t gfn_to_gpa(gfn_t gfn)
628{
629 return (gpa_t)gfn << PAGE_SHIFT;
630}
6aa8b732 631
c30a358d
JR
632static inline gfn_t gpa_to_gfn(gpa_t gpa)
633{
634 return (gfn_t)(gpa >> PAGE_SHIFT);
635}
636
62c476c7
BAY
637static inline hpa_t pfn_to_hpa(pfn_t pfn)
638{
639 return (hpa_t)pfn << PAGE_SHIFT;
640}
641
2f599714 642static inline void kvm_migrate_timers(struct kvm_vcpu *vcpu)
2f52d58c
AK
643{
644 set_bit(KVM_REQ_MIGRATE_TIMER, &vcpu->requests);
645}
646
ba1389b7
AK
647enum kvm_stat_kind {
648 KVM_STAT_VM,
649 KVM_STAT_VCPU,
650};
651
417bc304
HB
652struct kvm_stats_debugfs_item {
653 const char *name;
654 int offset;
ba1389b7 655 enum kvm_stat_kind kind;
417bc304
HB
656 struct dentry *dentry;
657};
658extern struct kvm_stats_debugfs_item debugfs_entries[];
76f7c879 659extern struct dentry *kvm_debugfs_dir;
d4c9ff2d 660
e930bffe
AA
661#ifdef KVM_ARCH_WANT_MMU_NOTIFIER
662static inline int mmu_notifier_retry(struct kvm_vcpu *vcpu, unsigned long mmu_seq)
663{
664 if (unlikely(vcpu->kvm->mmu_notifier_count))
665 return 1;
666 /*
667 * Both reads happen under the mmu_lock and both values are
668 * modified under mmu_lock, so there's no need of smb_rmb()
669 * here in between, otherwise mmu_notifier_count should be
670 * read before mmu_notifier_seq, see
671 * mmu_notifier_invalidate_range_end write side.
672 */
673 if (vcpu->kvm->mmu_notifier_seq != mmu_seq)
674 return 1;
675 return 0;
676}
677#endif
678
399ec807
AK
679#ifdef CONFIG_HAVE_KVM_IRQCHIP
680
681#define KVM_MAX_IRQ_ROUTES 1024
682
683int kvm_setup_default_irq_routing(struct kvm *kvm);
684int kvm_set_irq_routing(struct kvm *kvm,
685 const struct kvm_irq_routing_entry *entries,
686 unsigned nr,
687 unsigned flags);
688void kvm_free_irq_routing(struct kvm *kvm);
689
690#else
691
692static inline void kvm_free_irq_routing(struct kvm *kvm) {}
693
694#endif
695
721eecbf
GH
696#ifdef CONFIG_HAVE_KVM_EVENTFD
697
d34e6b17 698void kvm_eventfd_init(struct kvm *kvm);
721eecbf
GH
699int kvm_irqfd(struct kvm *kvm, int fd, int gsi, int flags);
700void kvm_irqfd_release(struct kvm *kvm);
bd2b53b2 701void kvm_irq_routing_update(struct kvm *, struct kvm_irq_routing_table *);
d34e6b17 702int kvm_ioeventfd(struct kvm *kvm, struct kvm_ioeventfd *args);
721eecbf
GH
703
704#else
705
d34e6b17 706static inline void kvm_eventfd_init(struct kvm *kvm) {}
bd2b53b2 707
721eecbf
GH
708static inline int kvm_irqfd(struct kvm *kvm, int fd, int gsi, int flags)
709{
710 return -EINVAL;
711}
712
713static inline void kvm_irqfd_release(struct kvm *kvm) {}
bd2b53b2 714
27923eb1 715#ifdef CONFIG_HAVE_KVM_IRQCHIP
bd2b53b2
MT
716static inline void kvm_irq_routing_update(struct kvm *kvm,
717 struct kvm_irq_routing_table *irq_rt)
718{
719 rcu_assign_pointer(kvm->irq_routing, irq_rt);
720}
27923eb1 721#endif
bd2b53b2 722
d34e6b17
GH
723static inline int kvm_ioeventfd(struct kvm *kvm, struct kvm_ioeventfd *args)
724{
725 return -ENOSYS;
726}
721eecbf
GH
727
728#endif /* CONFIG_HAVE_KVM_EVENTFD */
729
73880c80 730#ifdef CONFIG_KVM_APIC_ARCHITECTURE
c5af89b6
GN
731static inline bool kvm_vcpu_is_bsp(struct kvm_vcpu *vcpu)
732{
d3efc8ef 733 return vcpu->kvm->bsp_vcpu_id == vcpu->vcpu_id;
c5af89b6 734}
6aa8b732 735#endif
bfd99ff5
AK
736
737#ifdef __KVM_HAVE_DEVICE_ASSIGNMENT
738
739long kvm_vm_ioctl_assigned_device(struct kvm *kvm, unsigned ioctl,
740 unsigned long arg);
741
742#else
743
744static inline long kvm_vm_ioctl_assigned_device(struct kvm *kvm, unsigned ioctl,
745 unsigned long arg)
746{
747 return -ENOTTY;
748}
749
73880c80 750#endif
bfd99ff5 751
a8eeb04a
AK
752static inline void kvm_make_request(int req, struct kvm_vcpu *vcpu)
753{
754 set_bit(req, &vcpu->requests);
755}
756
a8eeb04a
AK
757static inline bool kvm_check_request(int req, struct kvm_vcpu *vcpu)
758{
0719837c
AK
759 if (test_bit(req, &vcpu->requests)) {
760 clear_bit(req, &vcpu->requests);
761 return true;
762 } else {
763 return false;
764 }
a8eeb04a
AK
765}
766
bfd99ff5
AK
767#endif
768