linux/arch/x86/kvm/x86.h
<<
>>
Prefs
   1#ifndef ARCH_X86_KVM_X86_H
   2#define ARCH_X86_KVM_X86_H
   3
   4#include <asm/processor.h>
   5#include <asm/mwait.h>
   6#include <linux/kvm_host.h>
   7#include <asm/pvclock.h>
   8#include "kvm_cache_regs.h"
   9
  10#define MSR_IA32_CR_PAT_DEFAULT  0x0007040600070406ULL
  11
  12static inline void kvm_clear_exception_queue(struct kvm_vcpu *vcpu)
  13{
  14        vcpu->arch.exception.pending = false;
  15}
  16
  17static inline void kvm_queue_interrupt(struct kvm_vcpu *vcpu, u8 vector,
  18        bool soft)
  19{
  20        vcpu->arch.interrupt.pending = true;
  21        vcpu->arch.interrupt.soft = soft;
  22        vcpu->arch.interrupt.nr = vector;
  23}
  24
  25static inline void kvm_clear_interrupt_queue(struct kvm_vcpu *vcpu)
  26{
  27        vcpu->arch.interrupt.pending = false;
  28}
  29
  30static inline bool kvm_event_needs_reinjection(struct kvm_vcpu *vcpu)
  31{
  32        return vcpu->arch.exception.pending || vcpu->arch.interrupt.pending ||
  33                vcpu->arch.nmi_injected;
  34}
  35
  36static inline bool kvm_exception_is_soft(unsigned int nr)
  37{
  38        return (nr == BP_VECTOR) || (nr == OF_VECTOR);
  39}
  40
  41static inline bool is_protmode(struct kvm_vcpu *vcpu)
  42{
  43        return kvm_read_cr0_bits(vcpu, X86_CR0_PE);
  44}
  45
  46static inline int is_long_mode(struct kvm_vcpu *vcpu)
  47{
  48#ifdef CONFIG_X86_64
  49        return vcpu->arch.efer & EFER_LMA;
  50#else
  51        return 0;
  52#endif
  53}
  54
  55static inline bool is_64_bit_mode(struct kvm_vcpu *vcpu)
  56{
  57        int cs_db, cs_l;
  58
  59        if (!is_long_mode(vcpu))
  60                return false;
  61        kvm_x86_ops->get_cs_db_l_bits(vcpu, &cs_db, &cs_l);
  62        return cs_l;
  63}
  64
  65static inline bool mmu_is_nested(struct kvm_vcpu *vcpu)
  66{
  67        return vcpu->arch.walk_mmu == &vcpu->arch.nested_mmu;
  68}
  69
  70static inline int is_pae(struct kvm_vcpu *vcpu)
  71{
  72        return kvm_read_cr4_bits(vcpu, X86_CR4_PAE);
  73}
  74
  75static inline int is_pse(struct kvm_vcpu *vcpu)
  76{
  77        return kvm_read_cr4_bits(vcpu, X86_CR4_PSE);
  78}
  79
  80static inline int is_paging(struct kvm_vcpu *vcpu)
  81{
  82        return likely(kvm_read_cr0_bits(vcpu, X86_CR0_PG));
  83}
  84
  85static inline u32 bit(int bitno)
  86{
  87        return 1 << (bitno & 31);
  88}
  89
  90static inline void vcpu_cache_mmio_info(struct kvm_vcpu *vcpu,
  91                                        gva_t gva, gfn_t gfn, unsigned access)
  92{
  93        vcpu->arch.mmio_gva = gva & PAGE_MASK;
  94        vcpu->arch.access = access;
  95        vcpu->arch.mmio_gfn = gfn;
  96        vcpu->arch.mmio_gen = kvm_memslots(vcpu->kvm)->generation;
  97}
  98
  99static inline bool vcpu_match_mmio_gen(struct kvm_vcpu *vcpu)
 100{
 101        return vcpu->arch.mmio_gen == kvm_memslots(vcpu->kvm)->generation;
 102}
 103
 104/*
 105 * Clear the mmio cache info for the given gva. If gva is MMIO_GVA_ANY, we
 106 * clear all mmio cache info.
 107 */
 108#define MMIO_GVA_ANY (~(gva_t)0)
 109
 110static inline void vcpu_clear_mmio_info(struct kvm_vcpu *vcpu, gva_t gva)
 111{
 112        if (gva != MMIO_GVA_ANY && vcpu->arch.mmio_gva != (gva & PAGE_MASK))
 113                return;
 114
 115        vcpu->arch.mmio_gva = 0;
 116}
 117
 118static inline bool vcpu_match_mmio_gva(struct kvm_vcpu *vcpu, unsigned long gva)
 119{
 120        if (vcpu_match_mmio_gen(vcpu) && vcpu->arch.mmio_gva &&
 121              vcpu->arch.mmio_gva == (gva & PAGE_MASK))
 122                return true;
 123
 124        return false;
 125}
 126
 127static inline bool vcpu_match_mmio_gpa(struct kvm_vcpu *vcpu, gpa_t gpa)
 128{
 129        if (vcpu_match_mmio_gen(vcpu) && vcpu->arch.mmio_gfn &&
 130              vcpu->arch.mmio_gfn == gpa >> PAGE_SHIFT)
 131                return true;
 132
 133        return false;
 134}
 135
 136static inline unsigned long kvm_register_readl(struct kvm_vcpu *vcpu,
 137                                               enum kvm_reg reg)
 138{
 139        unsigned long val = kvm_register_read(vcpu, reg);
 140
 141        return is_64_bit_mode(vcpu) ? val : (u32)val;
 142}
 143
 144static inline void kvm_register_writel(struct kvm_vcpu *vcpu,
 145                                       enum kvm_reg reg,
 146                                       unsigned long val)
 147{
 148        if (!is_64_bit_mode(vcpu))
 149                val = (u32)val;
 150        return kvm_register_write(vcpu, reg, val);
 151}
 152
 153static inline bool kvm_check_has_quirk(struct kvm *kvm, u64 quirk)
 154{
 155        return !(kvm->arch.disabled_quirks & quirk);
 156}
 157
 158void kvm_before_handle_nmi(struct kvm_vcpu *vcpu);
 159void kvm_after_handle_nmi(struct kvm_vcpu *vcpu);
 160void kvm_set_pending_timer(struct kvm_vcpu *vcpu);
 161int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq, int inc_eip);
 162
 163void kvm_write_tsc(struct kvm_vcpu *vcpu, struct msr_data *msr);
 164u64 get_kvmclock_ns(struct kvm *kvm);
 165
 166int kvm_read_guest_virt(struct x86_emulate_ctxt *ctxt,
 167        gva_t addr, void *val, unsigned int bytes,
 168        struct x86_exception *exception);
 169
 170int kvm_write_guest_virt_system(struct x86_emulate_ctxt *ctxt,
 171        gva_t addr, void *val, unsigned int bytes,
 172        struct x86_exception *exception);
 173
 174void kvm_vcpu_mtrr_init(struct kvm_vcpu *vcpu);
 175u8 kvm_mtrr_get_guest_memory_type(struct kvm_vcpu *vcpu, gfn_t gfn);
 176bool kvm_mtrr_valid(struct kvm_vcpu *vcpu, u32 msr, u64 data);
 177int kvm_mtrr_set_msr(struct kvm_vcpu *vcpu, u32 msr, u64 data);
 178int kvm_mtrr_get_msr(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata);
 179bool kvm_mtrr_check_gfn_range_consistency(struct kvm_vcpu *vcpu, gfn_t gfn,
 180                                          int page_num);
 181bool kvm_vector_hashing_enabled(void);
 182
 183#define KVM_SUPPORTED_XCR0     (XFEATURE_MASK_FP | XFEATURE_MASK_SSE \
 184                                | XFEATURE_MASK_YMM | XFEATURE_MASK_BNDREGS \
 185                                | XFEATURE_MASK_BNDCSR | XFEATURE_MASK_AVX512 \
 186                                | XFEATURE_MASK_PKRU)
 187extern u64 host_xcr0;
 188
 189extern u64 kvm_supported_xcr0(void);
 190
 191extern unsigned int min_timer_period_us;
 192
 193extern unsigned int lapic_timer_advance_ns;
 194
 195extern struct static_key kvm_no_apic_vcpu;
 196
 197static inline u64 nsec_to_cycles(struct kvm_vcpu *vcpu, u64 nsec)
 198{
 199        return pvclock_scale_delta(nsec, vcpu->arch.virtual_tsc_mult,
 200                                   vcpu->arch.virtual_tsc_shift);
 201}
 202
 203/* Same "calling convention" as do_div:
 204 * - divide (n << 32) by base
 205 * - put result in n
 206 * - return remainder
 207 */
 208#define do_shl32_div32(n, base)                                 \
 209        ({                                                      \
 210            u32 __quot, __rem;                                  \
 211            asm("divl %2" : "=a" (__quot), "=d" (__rem)         \
 212                        : "rm" (base), "0" (0), "1" ((u32) n)); \
 213            n = __quot;                                         \
 214            __rem;                                              \
 215         })
 216
 217static inline bool kvm_mwait_in_guest(void)
 218{
 219        unsigned int eax, ebx, ecx, edx;
 220
 221        if (!cpu_has(&boot_cpu_data, X86_FEATURE_MWAIT))
 222                return false;
 223
 224        switch (boot_cpu_data.x86_vendor) {
 225        case X86_VENDOR_AMD:
 226                /* All AMD CPUs have a working MWAIT implementation */
 227                return true;
 228        case X86_VENDOR_INTEL:
 229                /* Handle Intel below */
 230                break;
 231        default:
 232                return false;
 233        }
 234
 235        /*
 236         * Intel CPUs without CPUID5_ECX_INTERRUPT_BREAK are problematic as
 237         * they would allow guest to stop the CPU completely by disabling
 238         * interrupts then invoking MWAIT.
 239         */
 240        if (boot_cpu_data.cpuid_level < CPUID_MWAIT_LEAF)
 241                return false;
 242
 243        cpuid(CPUID_MWAIT_LEAF, &eax, &ebx, &ecx, &edx);
 244
 245        if (!(ecx & CPUID5_ECX_INTERRUPT_BREAK))
 246                return false;
 247
 248        return true;
 249}
 250
 251#endif
 252