vmx.c 104.3 KB
Newer Older
A
Avi Kivity 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
/*
 * Kernel-based Virtual Machine driver for Linux
 *
 * This module enables machines with Intel VT-x extensions to run virtual
 * machines without emulation or binary translation.
 *
 * Copyright (C) 2006 Qumranet, Inc.
 *
 * Authors:
 *   Avi Kivity   <avi@qumranet.com>
 *   Yaniv Kamay  <yaniv@qumranet.com>
 *
 * This work is licensed under the terms of the GNU GPL, version 2.  See
 * the COPYING file in the top-level directory.
 *
 */

18
#include "irq.h"
19
#include "mmu.h"
A
Avi Kivity 已提交
20

21
#include <linux/kvm_host.h>
A
Avi Kivity 已提交
22
#include <linux/module.h>
23
#include <linux/kernel.h>
A
Avi Kivity 已提交
24 25
#include <linux/mm.h>
#include <linux/highmem.h>
A
Alexey Dobriyan 已提交
26
#include <linux/sched.h>
27
#include <linux/moduleparam.h>
28
#include <linux/ftrace_event.h>
29
#include "kvm_cache_regs.h"
30
#include "x86.h"
A
Avi Kivity 已提交
31

A
Avi Kivity 已提交
32
#include <asm/io.h>
A
Anthony Liguori 已提交
33
#include <asm/desc.h>
34
#include <asm/vmx.h>
35
#include <asm/virtext.h>
A
Andi Kleen 已提交
36
#include <asm/mce.h>
A
Avi Kivity 已提交
37

38 39
#include "trace.h"

40 41
#define __ex(x) __kvm_handle_fault_on_reboot(x)

A
Avi Kivity 已提交
42 43 44
MODULE_AUTHOR("Qumranet");
MODULE_LICENSE("GPL");

45
static int __read_mostly bypass_guest_pf = 1;
46
module_param(bypass_guest_pf, bool, S_IRUGO);
47

48
static int __read_mostly enable_vpid = 1;
49
module_param_named(vpid, enable_vpid, bool, 0444);
50

51
static int __read_mostly flexpriority_enabled = 1;
52
module_param_named(flexpriority, flexpriority_enabled, bool, S_IRUGO);
53

54
static int __read_mostly enable_ept = 1;
55
module_param_named(ept, enable_ept, bool, S_IRUGO);
S
Sheng Yang 已提交
56

57 58 59 60
static int __read_mostly enable_unrestricted_guest = 1;
module_param_named(unrestricted_guest,
			enable_unrestricted_guest, bool, S_IRUGO);

61
static int __read_mostly emulate_invalid_guest_state = 0;
62
module_param(emulate_invalid_guest_state, bool, S_IRUGO);
63

64 65 66 67 68 69 70
struct vmcs {
	u32 revision_id;
	u32 abort;
	char data[0];
};

struct vcpu_vmx {
R
Rusty Russell 已提交
71
	struct kvm_vcpu       vcpu;
72
	struct list_head      local_vcpus_link;
73
	unsigned long         host_rsp;
74
	int                   launched;
75
	u8                    fail;
76
	u32                   idt_vectoring_info;
77 78 79 80 81 82 83 84 85 86 87 88
	struct kvm_msr_entry *guest_msrs;
	struct kvm_msr_entry *host_msrs;
	int                   nmsrs;
	int                   save_nmsrs;
	int                   msr_offset_efer;
#ifdef CONFIG_X86_64
	int                   msr_offset_kernel_gs_base;
#endif
	struct vmcs          *vmcs;
	struct {
		int           loaded;
		u16           fs_sel, gs_sel, ldt_sel;
89 90
		int           gs_ldt_reload_needed;
		int           fs_reload_needed;
91
		int           guest_efer_loaded;
M
Mike Day 已提交
92
	} host_state;
93
	struct {
94 95 96 97 98 99 100 101
		int vm86_active;
		u8 save_iopl;
		struct kvm_save_segment {
			u16 selector;
			unsigned long base;
			u32 limit;
			u32 ar;
		} tr, es, ds, fs, gs;
102 103 104 105 106 107
		struct {
			bool pending;
			u8 vector;
			unsigned rip;
		} irq;
	} rmode;
108
	int vpid;
109
	bool emulation_required;
110
	enum emulation_result invalid_state_emulation_result;
111 112 113 114 115

	/* Support for vnmi-less CPUs */
	int soft_vnmi_blocked;
	ktime_t entry_time;
	s64 vnmi_blocked_time;
A
Andi Kleen 已提交
116
	u32 exit_reason;
117 118 119 120
};

static inline struct vcpu_vmx *to_vmx(struct kvm_vcpu *vcpu)
{
R
Rusty Russell 已提交
121
	return container_of(vcpu, struct vcpu_vmx, vcpu);
122 123
}

124
static int init_rmode(struct kvm *kvm);
125
static u64 construct_eptp(unsigned long root_hpa);
126

A
Avi Kivity 已提交
127 128
static DEFINE_PER_CPU(struct vmcs *, vmxarea);
static DEFINE_PER_CPU(struct vmcs *, current_vmcs);
129
static DEFINE_PER_CPU(struct list_head, vcpus_on_cpu);
A
Avi Kivity 已提交
130

131 132
static unsigned long *vmx_io_bitmap_a;
static unsigned long *vmx_io_bitmap_b;
133 134
static unsigned long *vmx_msr_bitmap_legacy;
static unsigned long *vmx_msr_bitmap_longmode;
135

136 137 138
static DECLARE_BITMAP(vmx_vpid_bitmap, VMX_NR_VPIDS);
static DEFINE_SPINLOCK(vmx_vpid_lock);

139
static struct vmcs_config {
A
Avi Kivity 已提交
140 141 142
	int size;
	int order;
	u32 revision_id;
143 144
	u32 pin_based_exec_ctrl;
	u32 cpu_based_exec_ctrl;
145
	u32 cpu_based_2nd_exec_ctrl;
146 147 148
	u32 vmexit_ctrl;
	u32 vmentry_ctrl;
} vmcs_config;
A
Avi Kivity 已提交
149

H
Hannes Eder 已提交
150
static struct vmx_capability {
S
Sheng Yang 已提交
151 152 153 154
	u32 ept;
	u32 vpid;
} vmx_capability;

A
Avi Kivity 已提交
155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178
#define VMX_SEGMENT_FIELD(seg)					\
	[VCPU_SREG_##seg] = {                                   \
		.selector = GUEST_##seg##_SELECTOR,		\
		.base = GUEST_##seg##_BASE,		   	\
		.limit = GUEST_##seg##_LIMIT,		   	\
		.ar_bytes = GUEST_##seg##_AR_BYTES,	   	\
	}

static struct kvm_vmx_segment_field {
	unsigned selector;
	unsigned base;
	unsigned limit;
	unsigned ar_bytes;
} kvm_vmx_segment_fields[] = {
	VMX_SEGMENT_FIELD(CS),
	VMX_SEGMENT_FIELD(DS),
	VMX_SEGMENT_FIELD(ES),
	VMX_SEGMENT_FIELD(FS),
	VMX_SEGMENT_FIELD(GS),
	VMX_SEGMENT_FIELD(SS),
	VMX_SEGMENT_FIELD(TR),
	VMX_SEGMENT_FIELD(LDTR),
};

A
Avi Kivity 已提交
179 180
static void ept_save_pdptrs(struct kvm_vcpu *vcpu);

181 182 183 184
/*
 * Keep MSR_K6_STAR at the end, as setup_msrs() will try to optimize it
 * away by decrementing the array size.
 */
A
Avi Kivity 已提交
185
static const u32 vmx_msr_index[] = {
186
#ifdef CONFIG_X86_64
A
Avi Kivity 已提交
187 188 189 190
	MSR_SYSCALL_MASK, MSR_LSTAR, MSR_CSTAR, MSR_KERNEL_GS_BASE,
#endif
	MSR_EFER, MSR_K6_STAR,
};
191
#define NR_VMX_MSR ARRAY_SIZE(vmx_msr_index)
A
Avi Kivity 已提交
192

193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208
static void load_msrs(struct kvm_msr_entry *e, int n)
{
	int i;

	for (i = 0; i < n; ++i)
		wrmsrl(e[i].index, e[i].data);
}

static void save_msrs(struct kvm_msr_entry *e, int n)
{
	int i;

	for (i = 0; i < n; ++i)
		rdmsrl(e[i].index, e[i].data);
}

A
Avi Kivity 已提交
209 210 211 212
static inline int is_page_fault(u32 intr_info)
{
	return (intr_info & (INTR_INFO_INTR_TYPE_MASK | INTR_INFO_VECTOR_MASK |
			     INTR_INFO_VALID_MASK)) ==
213
		(INTR_TYPE_HARD_EXCEPTION | PF_VECTOR | INTR_INFO_VALID_MASK);
A
Avi Kivity 已提交
214 215
}

216 217 218 219
static inline int is_no_device(u32 intr_info)
{
	return (intr_info & (INTR_INFO_INTR_TYPE_MASK | INTR_INFO_VECTOR_MASK |
			     INTR_INFO_VALID_MASK)) ==
220
		(INTR_TYPE_HARD_EXCEPTION | NM_VECTOR | INTR_INFO_VALID_MASK);
221 222
}

223 224 225 226
static inline int is_invalid_opcode(u32 intr_info)
{
	return (intr_info & (INTR_INFO_INTR_TYPE_MASK | INTR_INFO_VECTOR_MASK |
			     INTR_INFO_VALID_MASK)) ==
227
		(INTR_TYPE_HARD_EXCEPTION | UD_VECTOR | INTR_INFO_VALID_MASK);
228 229
}

A
Avi Kivity 已提交
230 231 232 233 234 235
static inline int is_external_interrupt(u32 intr_info)
{
	return (intr_info & (INTR_INFO_INTR_TYPE_MASK | INTR_INFO_VALID_MASK))
		== (INTR_TYPE_EXT_INTR | INTR_INFO_VALID_MASK);
}

A
Andi Kleen 已提交
236 237 238 239 240 241 242
static inline int is_machine_check(u32 intr_info)
{
	return (intr_info & (INTR_INFO_INTR_TYPE_MASK | INTR_INFO_VECTOR_MASK |
			     INTR_INFO_VALID_MASK)) ==
		(INTR_TYPE_HARD_EXCEPTION | MC_VECTOR | INTR_INFO_VALID_MASK);
}

S
Sheng Yang 已提交
243 244
static inline int cpu_has_vmx_msr_bitmap(void)
{
245
	return vmcs_config.cpu_based_exec_ctrl & CPU_BASED_USE_MSR_BITMAPS;
S
Sheng Yang 已提交
246 247
}

248 249
static inline int cpu_has_vmx_tpr_shadow(void)
{
250
	return vmcs_config.cpu_based_exec_ctrl & CPU_BASED_TPR_SHADOW;
251 252 253 254
}

static inline int vm_need_tpr_shadow(struct kvm *kvm)
{
255
	return (cpu_has_vmx_tpr_shadow()) && (irqchip_in_kernel(kvm));
256 257
}

258 259
static inline int cpu_has_secondary_exec_ctrls(void)
{
260 261
	return vmcs_config.cpu_based_exec_ctrl &
		CPU_BASED_ACTIVATE_SECONDARY_CONTROLS;
262 263
}

264
static inline bool cpu_has_vmx_virtualize_apic_accesses(void)
265
{
266 267 268 269 270 271 272 273
	return vmcs_config.cpu_based_2nd_exec_ctrl &
		SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
}

static inline bool cpu_has_vmx_flexpriority(void)
{
	return cpu_has_vmx_tpr_shadow() &&
		cpu_has_vmx_virtualize_apic_accesses();
274 275
}

276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295
static inline bool cpu_has_vmx_ept_execute_only(void)
{
	return !!(vmx_capability.ept & VMX_EPT_EXECUTE_ONLY_BIT);
}

static inline bool cpu_has_vmx_eptp_uncacheable(void)
{
	return !!(vmx_capability.ept & VMX_EPTP_UC_BIT);
}

static inline bool cpu_has_vmx_eptp_writeback(void)
{
	return !!(vmx_capability.ept & VMX_EPTP_WB_BIT);
}

static inline bool cpu_has_vmx_ept_2m_page(void)
{
	return !!(vmx_capability.ept & VMX_EPT_2MB_PAGE_BIT);
}

S
Sheng Yang 已提交
296 297
static inline int cpu_has_vmx_invept_individual_addr(void)
{
298
	return !!(vmx_capability.ept & VMX_EPT_EXTENT_INDIVIDUAL_BIT);
S
Sheng Yang 已提交
299 300 301 302
}

static inline int cpu_has_vmx_invept_context(void)
{
303
	return !!(vmx_capability.ept & VMX_EPT_EXTENT_CONTEXT_BIT);
S
Sheng Yang 已提交
304 305 306 307
}

static inline int cpu_has_vmx_invept_global(void)
{
308
	return !!(vmx_capability.ept & VMX_EPT_EXTENT_GLOBAL_BIT);
S
Sheng Yang 已提交
309 310 311 312
}

static inline int cpu_has_vmx_ept(void)
{
313 314
	return vmcs_config.cpu_based_2nd_exec_ctrl &
		SECONDARY_EXEC_ENABLE_EPT;
S
Sheng Yang 已提交
315 316
}

317 318 319 320 321 322
static inline int cpu_has_vmx_unrestricted_guest(void)
{
	return vmcs_config.cpu_based_2nd_exec_ctrl &
		SECONDARY_EXEC_UNRESTRICTED_GUEST;
}

323 324
static inline int vm_need_virtualize_apic_accesses(struct kvm *kvm)
{
325 326 327
	return flexpriority_enabled &&
		(cpu_has_vmx_virtualize_apic_accesses()) &&
		(irqchip_in_kernel(kvm));
328 329
}

330 331
static inline int cpu_has_vmx_vpid(void)
{
332 333
	return vmcs_config.cpu_based_2nd_exec_ctrl &
		SECONDARY_EXEC_ENABLE_VPID;
334 335
}

336 337 338 339 340
static inline int cpu_has_virtual_nmis(void)
{
	return vmcs_config.pin_based_exec_ctrl & PIN_BASED_VIRTUAL_NMIS;
}

341 342 343 344 345
static inline bool report_flexpriority(void)
{
	return flexpriority_enabled;
}

R
Rusty Russell 已提交
346
static int __find_msr_index(struct vcpu_vmx *vmx, u32 msr)
347 348 349
{
	int i;

350 351
	for (i = 0; i < vmx->nmsrs; ++i)
		if (vmx->guest_msrs[i].index == msr)
352 353 354 355
			return i;
	return -1;
}

356 357 358 359 360 361 362 363
static inline void __invvpid(int ext, u16 vpid, gva_t gva)
{
    struct {
	u64 vpid : 16;
	u64 rsvd : 48;
	u64 gva;
    } operand = { vpid, 0, gva };

364
    asm volatile (__ex(ASM_VMX_INVVPID)
365 366 367 368 369
		  /* CF==1 or ZF==1 --> rc = -1 */
		  "; ja 1f ; ud2 ; 1:"
		  : : "a"(&operand), "c"(ext) : "cc", "memory");
}

370 371 372 373 374 375
static inline void __invept(int ext, u64 eptp, gpa_t gpa)
{
	struct {
		u64 eptp, gpa;
	} operand = {eptp, gpa};

376
	asm volatile (__ex(ASM_VMX_INVEPT)
377 378 379 380 381
			/* CF==1 or ZF==1 --> rc = -1 */
			"; ja 1f ; ud2 ; 1:\n"
			: : "a" (&operand), "c" (ext) : "cc", "memory");
}

R
Rusty Russell 已提交
382
static struct kvm_msr_entry *find_msr_entry(struct vcpu_vmx *vmx, u32 msr)
383 384 385
{
	int i;

R
Rusty Russell 已提交
386
	i = __find_msr_index(vmx, msr);
387
	if (i >= 0)
388
		return &vmx->guest_msrs[i];
A
Al Viro 已提交
389
	return NULL;
390 391
}

A
Avi Kivity 已提交
392 393 394 395 396
static void vmcs_clear(struct vmcs *vmcs)
{
	u64 phys_addr = __pa(vmcs);
	u8 error;

397
	asm volatile (__ex(ASM_VMX_VMCLEAR_RAX) "; setna %0"
A
Avi Kivity 已提交
398 399 400 401 402 403 404 405 406
		      : "=g"(error) : "a"(&phys_addr), "m"(phys_addr)
		      : "cc", "memory");
	if (error)
		printk(KERN_ERR "kvm: vmclear fail: %p/%llx\n",
		       vmcs, phys_addr);
}

static void __vcpu_clear(void *arg)
{
R
Rusty Russell 已提交
407
	struct vcpu_vmx *vmx = arg;
408
	int cpu = raw_smp_processor_id();
A
Avi Kivity 已提交
409

R
Rusty Russell 已提交
410
	if (vmx->vcpu.cpu == cpu)
411 412
		vmcs_clear(vmx->vmcs);
	if (per_cpu(current_vmcs, cpu) == vmx->vmcs)
A
Avi Kivity 已提交
413
		per_cpu(current_vmcs, cpu) = NULL;
414
	rdtscll(vmx->vcpu.arch.host_tsc);
415 416 417
	list_del(&vmx->local_vcpus_link);
	vmx->vcpu.cpu = -1;
	vmx->launched = 0;
A
Avi Kivity 已提交
418 419
}

R
Rusty Russell 已提交
420
static void vcpu_clear(struct vcpu_vmx *vmx)
A
Avi Kivity 已提交
421
{
422 423
	if (vmx->vcpu.cpu == -1)
		return;
424
	smp_call_function_single(vmx->vcpu.cpu, __vcpu_clear, vmx, 1);
A
Avi Kivity 已提交
425 426
}

427 428 429 430 431 432 433 434
static inline void vpid_sync_vcpu_all(struct vcpu_vmx *vmx)
{
	if (vmx->vpid == 0)
		return;

	__invvpid(VMX_VPID_EXTENT_SINGLE_CONTEXT, vmx->vpid, 0);
}

435 436 437 438 439 440 441 442
static inline void ept_sync_global(void)
{
	if (cpu_has_vmx_invept_global())
		__invept(VMX_EPT_EXTENT_GLOBAL, 0, 0);
}

static inline void ept_sync_context(u64 eptp)
{
443
	if (enable_ept) {
444 445 446 447 448 449 450 451 452
		if (cpu_has_vmx_invept_context())
			__invept(VMX_EPT_EXTENT_CONTEXT, eptp, 0);
		else
			ept_sync_global();
	}
}

static inline void ept_sync_individual_addr(u64 eptp, gpa_t gpa)
{
453
	if (enable_ept) {
454 455 456 457 458 459 460 461
		if (cpu_has_vmx_invept_individual_addr())
			__invept(VMX_EPT_EXTENT_INDIVIDUAL_ADDR,
					eptp, gpa);
		else
			ept_sync_context(eptp);
	}
}

A
Avi Kivity 已提交
462 463 464 465
static unsigned long vmcs_readl(unsigned long field)
{
	unsigned long value;

466
	asm volatile (__ex(ASM_VMX_VMREAD_RDX_RAX)
A
Avi Kivity 已提交
467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482
		      : "=a"(value) : "d"(field) : "cc");
	return value;
}

static u16 vmcs_read16(unsigned long field)
{
	return vmcs_readl(field);
}

static u32 vmcs_read32(unsigned long field)
{
	return vmcs_readl(field);
}

static u64 vmcs_read64(unsigned long field)
{
483
#ifdef CONFIG_X86_64
A
Avi Kivity 已提交
484 485 486 487 488 489
	return vmcs_readl(field);
#else
	return vmcs_readl(field) | ((u64)vmcs_readl(field+1) << 32);
#endif
}

490 491 492 493 494 495 496
static noinline void vmwrite_error(unsigned long field, unsigned long value)
{
	printk(KERN_ERR "vmwrite error: reg %lx value %lx (err %d)\n",
	       field, value, vmcs_read32(VM_INSTRUCTION_ERROR));
	dump_stack();
}

A
Avi Kivity 已提交
497 498 499 500
static void vmcs_writel(unsigned long field, unsigned long value)
{
	u8 error;

501
	asm volatile (__ex(ASM_VMX_VMWRITE_RAX_RDX) "; setna %0"
M
Mike Day 已提交
502
		       : "=q"(error) : "a"(value), "d"(field) : "cc");
503 504
	if (unlikely(error))
		vmwrite_error(field, value);
A
Avi Kivity 已提交
505 506 507 508 509 510 511 512 513 514 515 516 517 518 519
}

static void vmcs_write16(unsigned long field, u16 value)
{
	vmcs_writel(field, value);
}

static void vmcs_write32(unsigned long field, u32 value)
{
	vmcs_writel(field, value);
}

static void vmcs_write64(unsigned long field, u64 value)
{
	vmcs_writel(field, value);
520
#ifndef CONFIG_X86_64
A
Avi Kivity 已提交
521 522 523 524 525
	asm volatile ("");
	vmcs_writel(field+1, value >> 32);
#endif
}

526 527 528 529 530 531 532 533 534 535
static void vmcs_clear_bits(unsigned long field, u32 mask)
{
	vmcs_writel(field, vmcs_readl(field) & ~mask);
}

static void vmcs_set_bits(unsigned long field, u32 mask)
{
	vmcs_writel(field, vmcs_readl(field) | mask);
}

536 537 538 539
static void update_exception_bitmap(struct kvm_vcpu *vcpu)
{
	u32 eb;

A
Andi Kleen 已提交
540
	eb = (1u << PF_VECTOR) | (1u << UD_VECTOR) | (1u << MC_VECTOR);
541 542
	if (!vcpu->fpu_active)
		eb |= 1u << NM_VECTOR;
J
Jan Kiszka 已提交
543 544 545 546 547 548 549
	if (vcpu->guest_debug & KVM_GUESTDBG_ENABLE) {
		if (vcpu->guest_debug &
		    (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP))
			eb |= 1u << DB_VECTOR;
		if (vcpu->guest_debug & KVM_GUESTDBG_USE_SW_BP)
			eb |= 1u << BP_VECTOR;
	}
550
	if (to_vmx(vcpu)->rmode.vm86_active)
551
		eb = ~0;
552
	if (enable_ept)
553
		eb &= ~(1u << PF_VECTOR); /* bypass_guest_pf = 0 */
554 555 556
	vmcs_write32(EXCEPTION_BITMAP, eb);
}

557 558 559 560 561 562
static void reload_tss(void)
{
	/*
	 * VT restores TR but not its size.  Useless.
	 */
	struct descriptor_table gdt;
563
	struct desc_struct *descs;
564

565
	kvm_get_gdt(&gdt);
566 567 568 569 570
	descs = (void *)gdt.base;
	descs[GDT_ENTRY_TSS].type = 9; /* available TSS */
	load_TR_desc();
}

R
Rusty Russell 已提交
571
static void load_transition_efer(struct vcpu_vmx *vmx)
572
{
573
	int efer_offset = vmx->msr_offset_efer;
574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592
	u64 host_efer = vmx->host_msrs[efer_offset].data;
	u64 guest_efer = vmx->guest_msrs[efer_offset].data;
	u64 ignore_bits;

	if (efer_offset < 0)
		return;
	/*
	 * NX is emulated; LMA and LME handled by hardware; SCE meaninless
	 * outside long mode
	 */
	ignore_bits = EFER_NX | EFER_SCE;
#ifdef CONFIG_X86_64
	ignore_bits |= EFER_LMA | EFER_LME;
	/* SCE is meaningful only in long mode on Intel */
	if (guest_efer & EFER_LMA)
		ignore_bits &= ~(u64)EFER_SCE;
#endif
	if ((guest_efer & ~ignore_bits) == (host_efer & ~ignore_bits))
		return;
593

594 595 596 597
	vmx->host_state.guest_efer_loaded = 1;
	guest_efer &= ~ignore_bits;
	guest_efer |= host_efer & ignore_bits;
	wrmsrl(MSR_EFER, guest_efer);
R
Rusty Russell 已提交
598
	vmx->vcpu.stat.efer_reload++;
599 600
}

601 602 603 604 605 606 607 608
static void reload_host_efer(struct vcpu_vmx *vmx)
{
	if (vmx->host_state.guest_efer_loaded) {
		vmx->host_state.guest_efer_loaded = 0;
		load_msrs(vmx->host_msrs + vmx->msr_offset_efer, 1);
	}
}

609
static void vmx_save_host_state(struct kvm_vcpu *vcpu)
610
{
611 612
	struct vcpu_vmx *vmx = to_vmx(vcpu);

613
	if (vmx->host_state.loaded)
614 615
		return;

616
	vmx->host_state.loaded = 1;
617 618 619 620
	/*
	 * Set host fs and gs selectors.  Unfortunately, 22.2.3 does not
	 * allow segment selectors with cpl > 0 or ti == 1.
	 */
621
	vmx->host_state.ldt_sel = kvm_read_ldt();
622
	vmx->host_state.gs_ldt_reload_needed = vmx->host_state.ldt_sel;
623
	vmx->host_state.fs_sel = kvm_read_fs();
624
	if (!(vmx->host_state.fs_sel & 7)) {
625
		vmcs_write16(HOST_FS_SELECTOR, vmx->host_state.fs_sel);
626 627
		vmx->host_state.fs_reload_needed = 0;
	} else {
628
		vmcs_write16(HOST_FS_SELECTOR, 0);
629
		vmx->host_state.fs_reload_needed = 1;
630
	}
631
	vmx->host_state.gs_sel = kvm_read_gs();
632 633
	if (!(vmx->host_state.gs_sel & 7))
		vmcs_write16(HOST_GS_SELECTOR, vmx->host_state.gs_sel);
634 635
	else {
		vmcs_write16(HOST_GS_SELECTOR, 0);
636
		vmx->host_state.gs_ldt_reload_needed = 1;
637 638 639 640 641 642
	}

#ifdef CONFIG_X86_64
	vmcs_writel(HOST_FS_BASE, read_msr(MSR_FS_BASE));
	vmcs_writel(HOST_GS_BASE, read_msr(MSR_GS_BASE));
#else
643 644
	vmcs_writel(HOST_FS_BASE, segment_base(vmx->host_state.fs_sel));
	vmcs_writel(HOST_GS_BASE, segment_base(vmx->host_state.gs_sel));
645
#endif
646 647

#ifdef CONFIG_X86_64
M
Mike Day 已提交
648
	if (is_long_mode(&vmx->vcpu))
649 650
		save_msrs(vmx->host_msrs +
			  vmx->msr_offset_kernel_gs_base, 1);
M
Mike Day 已提交
651

652
#endif
653
	load_msrs(vmx->guest_msrs, vmx->save_nmsrs);
654
	load_transition_efer(vmx);
655 656
}

657
static void __vmx_load_host_state(struct vcpu_vmx *vmx)
658
{
659
	unsigned long flags;
660

661
	if (!vmx->host_state.loaded)
662 663
		return;

664
	++vmx->vcpu.stat.host_state_reload;
665
	vmx->host_state.loaded = 0;
666
	if (vmx->host_state.fs_reload_needed)
667
		kvm_load_fs(vmx->host_state.fs_sel);
668
	if (vmx->host_state.gs_ldt_reload_needed) {
669
		kvm_load_ldt(vmx->host_state.ldt_sel);
670 671 672 673
		/*
		 * If we have to reload gs, we must take care to
		 * preserve our gs base.
		 */
674
		local_irq_save(flags);
675
		kvm_load_gs(vmx->host_state.gs_sel);
676 677 678
#ifdef CONFIG_X86_64
		wrmsrl(MSR_GS_BASE, vmcs_readl(HOST_GS_BASE));
#endif
679
		local_irq_restore(flags);
680
	}
681
	reload_tss();
682 683
	save_msrs(vmx->guest_msrs, vmx->save_nmsrs);
	load_msrs(vmx->host_msrs, vmx->save_nmsrs);
684
	reload_host_efer(vmx);
685 686
}

687 688 689 690 691 692 693
static void vmx_load_host_state(struct vcpu_vmx *vmx)
{
	preempt_disable();
	__vmx_load_host_state(vmx);
	preempt_enable();
}

A
Avi Kivity 已提交
694 695 696 697
/*
 * Switches to specified vcpu, until a matching vcpu_put(), but assumes
 * vcpu mutex is already taken.
 */
698
static void vmx_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
A
Avi Kivity 已提交
699
{
700 701
	struct vcpu_vmx *vmx = to_vmx(vcpu);
	u64 phys_addr = __pa(vmx->vmcs);
702
	u64 tsc_this, delta, new_offset;
A
Avi Kivity 已提交
703

704
	if (vcpu->cpu != cpu) {
R
Rusty Russell 已提交
705
		vcpu_clear(vmx);
M
Marcelo Tosatti 已提交
706
		kvm_migrate_timers(vcpu);
707
		vpid_sync_vcpu_all(vmx);
708 709 710 711
		local_irq_disable();
		list_add(&vmx->local_vcpus_link,
			 &per_cpu(vcpus_on_cpu, cpu));
		local_irq_enable();
712
	}
A
Avi Kivity 已提交
713

714
	if (per_cpu(current_vmcs, cpu) != vmx->vmcs) {
A
Avi Kivity 已提交
715 716
		u8 error;

717
		per_cpu(current_vmcs, cpu) = vmx->vmcs;
718
		asm volatile (__ex(ASM_VMX_VMPTRLD_RAX) "; setna %0"
A
Avi Kivity 已提交
719 720 721 722
			      : "=g"(error) : "a"(&phys_addr), "m"(phys_addr)
			      : "cc");
		if (error)
			printk(KERN_ERR "kvm: vmptrld %p/%llx fail\n",
723
			       vmx->vmcs, phys_addr);
A
Avi Kivity 已提交
724 725 726 727 728 729 730 731 732 733 734
	}

	if (vcpu->cpu != cpu) {
		struct descriptor_table dt;
		unsigned long sysenter_esp;

		vcpu->cpu = cpu;
		/*
		 * Linux uses per-cpu TSS and GDT, so set these when switching
		 * processors.
		 */
735 736
		vmcs_writel(HOST_TR_BASE, kvm_read_tr_base()); /* 22.2.4 */
		kvm_get_gdt(&dt);
A
Avi Kivity 已提交
737 738 739 740
		vmcs_writel(HOST_GDTR_BASE, dt.base);   /* 22.2.4 */

		rdmsrl(MSR_IA32_SYSENTER_ESP, sysenter_esp);
		vmcs_writel(HOST_IA32_SYSENTER_ESP, sysenter_esp); /* 22.2.3 */
741 742 743 744 745

		/*
		 * Make sure the time stamp counter is monotonous.
		 */
		rdtscll(tsc_this);
746 747 748 749 750
		if (tsc_this < vcpu->arch.host_tsc) {
			delta = vcpu->arch.host_tsc - tsc_this;
			new_offset = vmcs_read64(TSC_OFFSET) + delta;
			vmcs_write64(TSC_OFFSET, new_offset);
		}
A
Avi Kivity 已提交
751 752 753 754 755
	}
}

static void vmx_vcpu_put(struct kvm_vcpu *vcpu)
{
756
	__vmx_load_host_state(to_vmx(vcpu));
A
Avi Kivity 已提交
757 758
}

759 760 761 762 763
static void vmx_fpu_activate(struct kvm_vcpu *vcpu)
{
	if (vcpu->fpu_active)
		return;
	vcpu->fpu_active = 1;
764
	vmcs_clear_bits(GUEST_CR0, X86_CR0_TS);
765
	if (vcpu->arch.cr0 & X86_CR0_TS)
766
		vmcs_set_bits(GUEST_CR0, X86_CR0_TS);
767 768 769 770 771 772 773 774
	update_exception_bitmap(vcpu);
}

static void vmx_fpu_deactivate(struct kvm_vcpu *vcpu)
{
	if (!vcpu->fpu_active)
		return;
	vcpu->fpu_active = 0;
775
	vmcs_set_bits(GUEST_CR0, X86_CR0_TS);
776 777 778
	update_exception_bitmap(vcpu);
}

A
Avi Kivity 已提交
779 780 781 782 783 784 785
static unsigned long vmx_get_rflags(struct kvm_vcpu *vcpu)
{
	return vmcs_readl(GUEST_RFLAGS);
}

static void vmx_set_rflags(struct kvm_vcpu *vcpu, unsigned long rflags)
{
786
	if (to_vmx(vcpu)->rmode.vm86_active)
787
		rflags |= X86_EFLAGS_IOPL | X86_EFLAGS_VM;
A
Avi Kivity 已提交
788 789 790
	vmcs_writel(GUEST_RFLAGS, rflags);
}

791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819
static u32 vmx_get_interrupt_shadow(struct kvm_vcpu *vcpu, int mask)
{
	u32 interruptibility = vmcs_read32(GUEST_INTERRUPTIBILITY_INFO);
	int ret = 0;

	if (interruptibility & GUEST_INTR_STATE_STI)
		ret |= X86_SHADOW_INT_STI;
	if (interruptibility & GUEST_INTR_STATE_MOV_SS)
		ret |= X86_SHADOW_INT_MOV_SS;

	return ret & mask;
}

static void vmx_set_interrupt_shadow(struct kvm_vcpu *vcpu, int mask)
{
	u32 interruptibility_old = vmcs_read32(GUEST_INTERRUPTIBILITY_INFO);
	u32 interruptibility = interruptibility_old;

	interruptibility &= ~(GUEST_INTR_STATE_STI | GUEST_INTR_STATE_MOV_SS);

	if (mask & X86_SHADOW_INT_MOV_SS)
		interruptibility |= GUEST_INTR_STATE_MOV_SS;
	if (mask & X86_SHADOW_INT_STI)
		interruptibility |= GUEST_INTR_STATE_STI;

	if ((interruptibility != interruptibility_old))
		vmcs_write32(GUEST_INTERRUPTIBILITY_INFO, interruptibility);
}

A
Avi Kivity 已提交
820 821 822 823
static void skip_emulated_instruction(struct kvm_vcpu *vcpu)
{
	unsigned long rip;

824
	rip = kvm_rip_read(vcpu);
A
Avi Kivity 已提交
825
	rip += vmcs_read32(VM_EXIT_INSTRUCTION_LEN);
826
	kvm_rip_write(vcpu, rip);
A
Avi Kivity 已提交
827

828 829
	/* skipping an emulated instruction also counts */
	vmx_set_interrupt_shadow(vcpu, 0);
A
Avi Kivity 已提交
830 831
}

832 833 834
static void vmx_queue_exception(struct kvm_vcpu *vcpu, unsigned nr,
				bool has_error_code, u32 error_code)
{
835
	struct vcpu_vmx *vmx = to_vmx(vcpu);
836
	u32 intr_info = nr | INTR_INFO_VALID_MASK;
837

838
	if (has_error_code) {
839
		vmcs_write32(VM_ENTRY_EXCEPTION_ERROR_CODE, error_code);
840 841
		intr_info |= INTR_INFO_DELIVER_CODE_MASK;
	}
842

843
	if (vmx->rmode.vm86_active) {
844 845 846
		vmx->rmode.irq.pending = true;
		vmx->rmode.irq.vector = nr;
		vmx->rmode.irq.rip = kvm_rip_read(vcpu);
847 848 849
		if (kvm_exception_is_soft(nr))
			vmx->rmode.irq.rip +=
				vmx->vcpu.arch.event_exit_inst_len;
850 851
		intr_info |= INTR_TYPE_SOFT_INTR;
		vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info);
852 853 854 855 856
		vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1);
		kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1);
		return;
	}

857 858 859
	if (kvm_exception_is_soft(nr)) {
		vmcs_write32(VM_ENTRY_INSTRUCTION_LEN,
			     vmx->vcpu.arch.event_exit_inst_len);
860 861 862 863 864
		intr_info |= INTR_TYPE_SOFT_EXCEPTION;
	} else
		intr_info |= INTR_TYPE_HARD_EXCEPTION;

	vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info);
865 866
}

867 868 869
/*
 * Swap MSR entry in host/guest MSR entry array.
 */
870
#ifdef CONFIG_X86_64
R
Rusty Russell 已提交
871
static void move_msr_up(struct vcpu_vmx *vmx, int from, int to)
872
{
873 874 875 876 877 878 879 880
	struct kvm_msr_entry tmp;

	tmp = vmx->guest_msrs[to];
	vmx->guest_msrs[to] = vmx->guest_msrs[from];
	vmx->guest_msrs[from] = tmp;
	tmp = vmx->host_msrs[to];
	vmx->host_msrs[to] = vmx->host_msrs[from];
	vmx->host_msrs[from] = tmp;
881
}
882
#endif
883

884 885 886 887 888
/*
 * Set up the vmcs to automatically save and restore system
 * msrs.  Don't touch the 64-bit msrs if the guest is in legacy
 * mode, as fiddling with msrs is very expensive.
 */
R
Rusty Russell 已提交
889
static void setup_msrs(struct vcpu_vmx *vmx)
890
{
891
	int save_nmsrs;
892
	unsigned long *msr_bitmap;
893

894
	vmx_load_host_state(vmx);
895 896
	save_nmsrs = 0;
#ifdef CONFIG_X86_64
R
Rusty Russell 已提交
897
	if (is_long_mode(&vmx->vcpu)) {
898 899
		int index;

R
Rusty Russell 已提交
900
		index = __find_msr_index(vmx, MSR_SYSCALL_MASK);
901
		if (index >= 0)
R
Rusty Russell 已提交
902 903
			move_msr_up(vmx, index, save_nmsrs++);
		index = __find_msr_index(vmx, MSR_LSTAR);
904
		if (index >= 0)
R
Rusty Russell 已提交
905 906
			move_msr_up(vmx, index, save_nmsrs++);
		index = __find_msr_index(vmx, MSR_CSTAR);
907
		if (index >= 0)
R
Rusty Russell 已提交
908 909
			move_msr_up(vmx, index, save_nmsrs++);
		index = __find_msr_index(vmx, MSR_KERNEL_GS_BASE);
910
		if (index >= 0)
R
Rusty Russell 已提交
911
			move_msr_up(vmx, index, save_nmsrs++);
912 913 914 915
		/*
		 * MSR_K6_STAR is only needed on long mode guests, and only
		 * if efer.sce is enabled.
		 */
R
Rusty Russell 已提交
916
		index = __find_msr_index(vmx, MSR_K6_STAR);
917
		if ((index >= 0) && (vmx->vcpu.arch.shadow_efer & EFER_SCE))
R
Rusty Russell 已提交
918
			move_msr_up(vmx, index, save_nmsrs++);
919 920
	}
#endif
921
	vmx->save_nmsrs = save_nmsrs;
922

923
#ifdef CONFIG_X86_64
924
	vmx->msr_offset_kernel_gs_base =
R
Rusty Russell 已提交
925
		__find_msr_index(vmx, MSR_KERNEL_GS_BASE);
926
#endif
R
Rusty Russell 已提交
927
	vmx->msr_offset_efer = __find_msr_index(vmx, MSR_EFER);
928 929 930 931 932 933 934 935 936

	if (cpu_has_vmx_msr_bitmap()) {
		if (is_long_mode(&vmx->vcpu))
			msr_bitmap = vmx_msr_bitmap_longmode;
		else
			msr_bitmap = vmx_msr_bitmap_legacy;

		vmcs_write64(MSR_BITMAP, __pa(msr_bitmap));
	}
937 938
}

A
Avi Kivity 已提交
939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955
/*
 * reads and returns guest's timestamp counter "register"
 * guest_tsc = host_tsc + tsc_offset    -- 21.3
 */
static u64 guest_read_tsc(void)
{
	u64 host_tsc, tsc_offset;

	rdtscll(host_tsc);
	tsc_offset = vmcs_read64(TSC_OFFSET);
	return host_tsc + tsc_offset;
}

/*
 * writes 'guest_tsc' into guest's timestamp counter "register"
 * guest_tsc = host_tsc + tsc_offset ==> tsc_offset = guest_tsc - host_tsc
 */
956
static void guest_write_tsc(u64 guest_tsc, u64 host_tsc)
A
Avi Kivity 已提交
957 958 959 960 961 962 963 964 965 966 967 968
{
	vmcs_write64(TSC_OFFSET, guest_tsc - host_tsc);
}

/*
 * Reads an msr value (of 'msr_index') into 'pdata'.
 * Returns 0 on success, non-0 otherwise.
 * Assumes vcpu_load() was already called.
 */
static int vmx_get_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 *pdata)
{
	u64 data;
969
	struct kvm_msr_entry *msr;
A
Avi Kivity 已提交
970 971 972 973 974 975 976

	if (!pdata) {
		printk(KERN_ERR "BUG: get_msr called with NULL pdata\n");
		return -EINVAL;
	}

	switch (msr_index) {
977
#ifdef CONFIG_X86_64
A
Avi Kivity 已提交
978 979 980 981 982 983 984
	case MSR_FS_BASE:
		data = vmcs_readl(GUEST_FS_BASE);
		break;
	case MSR_GS_BASE:
		data = vmcs_readl(GUEST_GS_BASE);
		break;
	case MSR_EFER:
985
		return kvm_get_msr_common(vcpu, msr_index, pdata);
A
Avi Kivity 已提交
986
#endif
987
	case MSR_IA32_TSC:
A
Avi Kivity 已提交
988 989 990 991 992 993
		data = guest_read_tsc();
		break;
	case MSR_IA32_SYSENTER_CS:
		data = vmcs_read32(GUEST_SYSENTER_CS);
		break;
	case MSR_IA32_SYSENTER_EIP:
A
Avi Kivity 已提交
994
		data = vmcs_readl(GUEST_SYSENTER_EIP);
A
Avi Kivity 已提交
995 996
		break;
	case MSR_IA32_SYSENTER_ESP:
A
Avi Kivity 已提交
997
		data = vmcs_readl(GUEST_SYSENTER_ESP);
A
Avi Kivity 已提交
998 999
		break;
	default:
1000
		vmx_load_host_state(to_vmx(vcpu));
R
Rusty Russell 已提交
1001
		msr = find_msr_entry(to_vmx(vcpu), msr_index);
1002 1003 1004
		if (msr) {
			data = msr->data;
			break;
A
Avi Kivity 已提交
1005
		}
1006
		return kvm_get_msr_common(vcpu, msr_index, pdata);
A
Avi Kivity 已提交
1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019
	}

	*pdata = data;
	return 0;
}

/*
 * Writes msr value into into the appropriate "register".
 * Returns 0 on success, non-0 otherwise.
 * Assumes vcpu_load() was already called.
 */
static int vmx_set_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 data)
{
1020 1021
	struct vcpu_vmx *vmx = to_vmx(vcpu);
	struct kvm_msr_entry *msr;
1022
	u64 host_tsc;
1023 1024
	int ret = 0;

A
Avi Kivity 已提交
1025
	switch (msr_index) {
1026
	case MSR_EFER:
1027
		vmx_load_host_state(vmx);
1028 1029
		ret = kvm_set_msr_common(vcpu, msr_index, data);
		break;
1030
#ifdef CONFIG_X86_64
A
Avi Kivity 已提交
1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041
	case MSR_FS_BASE:
		vmcs_writel(GUEST_FS_BASE, data);
		break;
	case MSR_GS_BASE:
		vmcs_writel(GUEST_GS_BASE, data);
		break;
#endif
	case MSR_IA32_SYSENTER_CS:
		vmcs_write32(GUEST_SYSENTER_CS, data);
		break;
	case MSR_IA32_SYSENTER_EIP:
A
Avi Kivity 已提交
1042
		vmcs_writel(GUEST_SYSENTER_EIP, data);
A
Avi Kivity 已提交
1043 1044
		break;
	case MSR_IA32_SYSENTER_ESP:
A
Avi Kivity 已提交
1045
		vmcs_writel(GUEST_SYSENTER_ESP, data);
A
Avi Kivity 已提交
1046
		break;
1047
	case MSR_IA32_TSC:
1048 1049
		rdtscll(host_tsc);
		guest_write_tsc(data, host_tsc);
A
Avi Kivity 已提交
1050
		break;
S
Sheng Yang 已提交
1051 1052 1053 1054 1055 1056 1057
	case MSR_IA32_CR_PAT:
		if (vmcs_config.vmentry_ctrl & VM_ENTRY_LOAD_IA32_PAT) {
			vmcs_write64(GUEST_IA32_PAT, data);
			vcpu->arch.pat = data;
			break;
		}
		/* Otherwise falls through to kvm_set_msr_common */
A
Avi Kivity 已提交
1058
	default:
1059
		vmx_load_host_state(vmx);
R
Rusty Russell 已提交
1060
		msr = find_msr_entry(vmx, msr_index);
1061 1062 1063
		if (msr) {
			msr->data = data;
			break;
A
Avi Kivity 已提交
1064
		}
1065
		ret = kvm_set_msr_common(vcpu, msr_index, data);
A
Avi Kivity 已提交
1066 1067
	}

1068
	return ret;
A
Avi Kivity 已提交
1069 1070
}

1071
static void vmx_cache_reg(struct kvm_vcpu *vcpu, enum kvm_reg reg)
A
Avi Kivity 已提交
1072
{
1073 1074 1075 1076 1077 1078 1079 1080
	__set_bit(reg, (unsigned long *)&vcpu->arch.regs_avail);
	switch (reg) {
	case VCPU_REGS_RSP:
		vcpu->arch.regs[VCPU_REGS_RSP] = vmcs_readl(GUEST_RSP);
		break;
	case VCPU_REGS_RIP:
		vcpu->arch.regs[VCPU_REGS_RIP] = vmcs_readl(GUEST_RIP);
		break;
A
Avi Kivity 已提交
1081 1082 1083 1084
	case VCPU_EXREG_PDPTR:
		if (enable_ept)
			ept_save_pdptrs(vcpu);
		break;
1085 1086 1087
	default:
		break;
	}
A
Avi Kivity 已提交
1088 1089
}

J
Jan Kiszka 已提交
1090
static int set_guest_debug(struct kvm_vcpu *vcpu, struct kvm_guest_debug *dbg)
A
Avi Kivity 已提交
1091
{
J
Jan Kiszka 已提交
1092 1093
	int old_debug = vcpu->guest_debug;
	unsigned long flags;
A
Avi Kivity 已提交
1094

J
Jan Kiszka 已提交
1095 1096 1097
	vcpu->guest_debug = dbg->control;
	if (!(vcpu->guest_debug & KVM_GUESTDBG_ENABLE))
		vcpu->guest_debug = 0;
A
Avi Kivity 已提交
1098

1099 1100 1101 1102 1103
	if (vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP)
		vmcs_writel(GUEST_DR7, dbg->arch.debugreg[7]);
	else
		vmcs_writel(GUEST_DR7, vcpu->arch.dr7);

J
Jan Kiszka 已提交
1104 1105 1106 1107
	flags = vmcs_readl(GUEST_RFLAGS);
	if (vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP)
		flags |= X86_EFLAGS_TF | X86_EFLAGS_RF;
	else if (old_debug & KVM_GUESTDBG_SINGLESTEP)
A
Avi Kivity 已提交
1108
		flags &= ~(X86_EFLAGS_TF | X86_EFLAGS_RF);
J
Jan Kiszka 已提交
1109
	vmcs_writel(GUEST_RFLAGS, flags);
A
Avi Kivity 已提交
1110

1111
	update_exception_bitmap(vcpu);
A
Avi Kivity 已提交
1112 1113 1114 1115 1116 1117

	return 0;
}

static __init int cpu_has_kvm_support(void)
{
1118
	return cpu_has_vmx();
A
Avi Kivity 已提交
1119 1120 1121 1122 1123 1124 1125
}

static __init int vmx_disabled_by_bios(void)
{
	u64 msr;

	rdmsrl(MSR_IA32_FEATURE_CONTROL, msr);
1126 1127 1128
	return (msr & (FEATURE_CONTROL_LOCKED |
		       FEATURE_CONTROL_VMXON_ENABLED))
	    == FEATURE_CONTROL_LOCKED;
1129
	/* locked but not enabled */
A
Avi Kivity 已提交
1130 1131
}

A
Avi Kivity 已提交
1132
static void hardware_enable(void *garbage)
A
Avi Kivity 已提交
1133 1134 1135 1136 1137
{
	int cpu = raw_smp_processor_id();
	u64 phys_addr = __pa(per_cpu(vmxarea, cpu));
	u64 old;

1138
	INIT_LIST_HEAD(&per_cpu(vcpus_on_cpu, cpu));
A
Avi Kivity 已提交
1139
	rdmsrl(MSR_IA32_FEATURE_CONTROL, old);
1140 1141 1142 1143
	if ((old & (FEATURE_CONTROL_LOCKED |
		    FEATURE_CONTROL_VMXON_ENABLED))
	    != (FEATURE_CONTROL_LOCKED |
		FEATURE_CONTROL_VMXON_ENABLED))
A
Avi Kivity 已提交
1144
		/* enable and lock */
1145
		wrmsrl(MSR_IA32_FEATURE_CONTROL, old |
1146 1147
		       FEATURE_CONTROL_LOCKED |
		       FEATURE_CONTROL_VMXON_ENABLED);
1148
	write_cr4(read_cr4() | X86_CR4_VMXE); /* FIXME: not cpu hotplug safe */
1149 1150
	asm volatile (ASM_VMX_VMXON_RAX
		      : : "a"(&phys_addr), "m"(phys_addr)
A
Avi Kivity 已提交
1151 1152 1153
		      : "memory", "cc");
}

1154 1155 1156 1157 1158 1159 1160 1161 1162 1163
static void vmclear_local_vcpus(void)
{
	int cpu = raw_smp_processor_id();
	struct vcpu_vmx *vmx, *n;

	list_for_each_entry_safe(vmx, n, &per_cpu(vcpus_on_cpu, cpu),
				 local_vcpus_link)
		__vcpu_clear(vmx);
}

1164 1165 1166 1167 1168

/* Just like cpu_vmxoff(), but with the __kvm_handle_fault_on_reboot()
 * tricks.
 */
static void kvm_cpu_vmxoff(void)
A
Avi Kivity 已提交
1169
{
1170
	asm volatile (__ex(ASM_VMX_VMXOFF) : : : "cc");
1171
	write_cr4(read_cr4() & ~X86_CR4_VMXE);
A
Avi Kivity 已提交
1172 1173
}

1174 1175 1176 1177 1178 1179
static void hardware_disable(void *garbage)
{
	vmclear_local_vcpus();
	kvm_cpu_vmxoff();
}

1180
static __init int adjust_vmx_controls(u32 ctl_min, u32 ctl_opt,
M
Mike Day 已提交
1181
				      u32 msr, u32 *result)
1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192
{
	u32 vmx_msr_low, vmx_msr_high;
	u32 ctl = ctl_min | ctl_opt;

	rdmsr(msr, vmx_msr_low, vmx_msr_high);

	ctl &= vmx_msr_high; /* bit == 0 in high word ==> must be zero */
	ctl |= vmx_msr_low;  /* bit == 1 in low word  ==> must be one  */

	/* Ensure minimum (required) set of control bits are supported. */
	if (ctl_min & ~ctl)
Y
Yang, Sheng 已提交
1193
		return -EIO;
1194 1195 1196 1197 1198

	*result = ctl;
	return 0;
}

Y
Yang, Sheng 已提交
1199
static __init int setup_vmcs_config(struct vmcs_config *vmcs_conf)
A
Avi Kivity 已提交
1200 1201
{
	u32 vmx_msr_low, vmx_msr_high;
S
Sheng Yang 已提交
1202
	u32 min, opt, min2, opt2;
1203 1204
	u32 _pin_based_exec_control = 0;
	u32 _cpu_based_exec_control = 0;
1205
	u32 _cpu_based_2nd_exec_control = 0;
1206 1207 1208 1209
	u32 _vmexit_control = 0;
	u32 _vmentry_control = 0;

	min = PIN_BASED_EXT_INTR_MASK | PIN_BASED_NMI_EXITING;
1210
	opt = PIN_BASED_VIRTUAL_NMIS;
1211 1212
	if (adjust_vmx_controls(min, opt, MSR_IA32_VMX_PINBASED_CTLS,
				&_pin_based_exec_control) < 0)
Y
Yang, Sheng 已提交
1213
		return -EIO;
1214 1215 1216 1217 1218 1219

	min = CPU_BASED_HLT_EXITING |
#ifdef CONFIG_X86_64
	      CPU_BASED_CR8_LOAD_EXITING |
	      CPU_BASED_CR8_STORE_EXITING |
#endif
S
Sheng Yang 已提交
1220 1221
	      CPU_BASED_CR3_LOAD_EXITING |
	      CPU_BASED_CR3_STORE_EXITING |
1222 1223
	      CPU_BASED_USE_IO_BITMAPS |
	      CPU_BASED_MOV_DR_EXITING |
M
Marcelo Tosatti 已提交
1224 1225
	      CPU_BASED_USE_TSC_OFFSETING |
	      CPU_BASED_INVLPG_EXITING;
1226
	opt = CPU_BASED_TPR_SHADOW |
S
Sheng Yang 已提交
1227
	      CPU_BASED_USE_MSR_BITMAPS |
1228
	      CPU_BASED_ACTIVATE_SECONDARY_CONTROLS;
1229 1230
	if (adjust_vmx_controls(min, opt, MSR_IA32_VMX_PROCBASED_CTLS,
				&_cpu_based_exec_control) < 0)
Y
Yang, Sheng 已提交
1231
		return -EIO;
1232 1233 1234 1235 1236
#ifdef CONFIG_X86_64
	if ((_cpu_based_exec_control & CPU_BASED_TPR_SHADOW))
		_cpu_based_exec_control &= ~CPU_BASED_CR8_LOAD_EXITING &
					   ~CPU_BASED_CR8_STORE_EXITING;
#endif
1237
	if (_cpu_based_exec_control & CPU_BASED_ACTIVATE_SECONDARY_CONTROLS) {
S
Sheng Yang 已提交
1238 1239
		min2 = 0;
		opt2 = SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES |
1240
			SECONDARY_EXEC_WBINVD_EXITING |
S
Sheng Yang 已提交
1241
			SECONDARY_EXEC_ENABLE_VPID |
1242 1243
			SECONDARY_EXEC_ENABLE_EPT |
			SECONDARY_EXEC_UNRESTRICTED_GUEST;
S
Sheng Yang 已提交
1244 1245
		if (adjust_vmx_controls(min2, opt2,
					MSR_IA32_VMX_PROCBASED_CTLS2,
1246 1247 1248 1249 1250 1251 1252 1253
					&_cpu_based_2nd_exec_control) < 0)
			return -EIO;
	}
#ifndef CONFIG_X86_64
	if (!(_cpu_based_2nd_exec_control &
				SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES))
		_cpu_based_exec_control &= ~CPU_BASED_TPR_SHADOW;
#endif
S
Sheng Yang 已提交
1254
	if (_cpu_based_2nd_exec_control & SECONDARY_EXEC_ENABLE_EPT) {
M
Marcelo Tosatti 已提交
1255 1256
		/* CR3 accesses and invlpg don't need to cause VM Exits when EPT
		   enabled */
S
Sheng Yang 已提交
1257
		min &= ~(CPU_BASED_CR3_LOAD_EXITING |
M
Marcelo Tosatti 已提交
1258 1259
			 CPU_BASED_CR3_STORE_EXITING |
			 CPU_BASED_INVLPG_EXITING);
S
Sheng Yang 已提交
1260 1261 1262 1263 1264 1265
		if (adjust_vmx_controls(min, opt, MSR_IA32_VMX_PROCBASED_CTLS,
					&_cpu_based_exec_control) < 0)
			return -EIO;
		rdmsr(MSR_IA32_VMX_EPT_VPID_CAP,
		      vmx_capability.ept, vmx_capability.vpid);
	}
1266 1267 1268 1269 1270

	min = 0;
#ifdef CONFIG_X86_64
	min |= VM_EXIT_HOST_ADDR_SPACE_SIZE;
#endif
S
Sheng Yang 已提交
1271
	opt = VM_EXIT_SAVE_IA32_PAT | VM_EXIT_LOAD_IA32_PAT;
1272 1273
	if (adjust_vmx_controls(min, opt, MSR_IA32_VMX_EXIT_CTLS,
				&_vmexit_control) < 0)
Y
Yang, Sheng 已提交
1274
		return -EIO;
1275

S
Sheng Yang 已提交
1276 1277
	min = 0;
	opt = VM_ENTRY_LOAD_IA32_PAT;
1278 1279
	if (adjust_vmx_controls(min, opt, MSR_IA32_VMX_ENTRY_CTLS,
				&_vmentry_control) < 0)
Y
Yang, Sheng 已提交
1280
		return -EIO;
A
Avi Kivity 已提交
1281

N
Nguyen Anh Quynh 已提交
1282
	rdmsr(MSR_IA32_VMX_BASIC, vmx_msr_low, vmx_msr_high);
1283 1284 1285

	/* IA-32 SDM Vol 3B: VMCS size is never greater than 4kB. */
	if ((vmx_msr_high & 0x1fff) > PAGE_SIZE)
Y
Yang, Sheng 已提交
1286
		return -EIO;
1287 1288 1289 1290

#ifdef CONFIG_X86_64
	/* IA-32 SDM Vol 3B: 64-bit CPUs always have VMX_BASIC_MSR[48]==0. */
	if (vmx_msr_high & (1u<<16))
Y
Yang, Sheng 已提交
1291
		return -EIO;
1292 1293 1294 1295
#endif

	/* Require Write-Back (WB) memory type for VMCS accesses. */
	if (((vmx_msr_high >> 18) & 15) != 6)
Y
Yang, Sheng 已提交
1296
		return -EIO;
1297

Y
Yang, Sheng 已提交
1298 1299 1300
	vmcs_conf->size = vmx_msr_high & 0x1fff;
	vmcs_conf->order = get_order(vmcs_config.size);
	vmcs_conf->revision_id = vmx_msr_low;
1301

Y
Yang, Sheng 已提交
1302 1303
	vmcs_conf->pin_based_exec_ctrl = _pin_based_exec_control;
	vmcs_conf->cpu_based_exec_ctrl = _cpu_based_exec_control;
1304
	vmcs_conf->cpu_based_2nd_exec_ctrl = _cpu_based_2nd_exec_control;
Y
Yang, Sheng 已提交
1305 1306
	vmcs_conf->vmexit_ctrl         = _vmexit_control;
	vmcs_conf->vmentry_ctrl        = _vmentry_control;
1307 1308

	return 0;
N
Nguyen Anh Quynh 已提交
1309
}
A
Avi Kivity 已提交
1310 1311 1312 1313 1314 1315 1316

static struct vmcs *alloc_vmcs_cpu(int cpu)
{
	int node = cpu_to_node(cpu);
	struct page *pages;
	struct vmcs *vmcs;

1317
	pages = alloc_pages_exact_node(node, GFP_KERNEL, vmcs_config.order);
A
Avi Kivity 已提交
1318 1319 1320
	if (!pages)
		return NULL;
	vmcs = page_address(pages);
1321 1322
	memset(vmcs, 0, vmcs_config.size);
	vmcs->revision_id = vmcs_config.revision_id; /* vmcs revision id */
A
Avi Kivity 已提交
1323 1324 1325 1326 1327
	return vmcs;
}

static struct vmcs *alloc_vmcs(void)
{
1328
	return alloc_vmcs_cpu(raw_smp_processor_id());
A
Avi Kivity 已提交
1329 1330 1331 1332
}

static void free_vmcs(struct vmcs *vmcs)
{
1333
	free_pages((unsigned long)vmcs, vmcs_config.order);
A
Avi Kivity 已提交
1334 1335
}

1336
static void free_kvm_area(void)
A
Avi Kivity 已提交
1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363
{
	int cpu;

	for_each_online_cpu(cpu)
		free_vmcs(per_cpu(vmxarea, cpu));
}

static __init int alloc_kvm_area(void)
{
	int cpu;

	for_each_online_cpu(cpu) {
		struct vmcs *vmcs;

		vmcs = alloc_vmcs_cpu(cpu);
		if (!vmcs) {
			free_kvm_area();
			return -ENOMEM;
		}

		per_cpu(vmxarea, cpu) = vmcs;
	}
	return 0;
}

static __init int hardware_setup(void)
{
Y
Yang, Sheng 已提交
1364 1365
	if (setup_vmcs_config(&vmcs_config) < 0)
		return -EIO;
1366 1367 1368 1369

	if (boot_cpu_has(X86_FEATURE_NX))
		kvm_enable_efer_bits(EFER_NX);

S
Sheng Yang 已提交
1370 1371 1372
	if (!cpu_has_vmx_vpid())
		enable_vpid = 0;

1373
	if (!cpu_has_vmx_ept()) {
S
Sheng Yang 已提交
1374
		enable_ept = 0;
1375 1376 1377 1378 1379
		enable_unrestricted_guest = 0;
	}

	if (!cpu_has_vmx_unrestricted_guest())
		enable_unrestricted_guest = 0;
S
Sheng Yang 已提交
1380 1381 1382 1383

	if (!cpu_has_vmx_flexpriority())
		flexpriority_enabled = 0;

1384 1385 1386
	if (!cpu_has_vmx_tpr_shadow())
		kvm_x86_ops->update_cr8_intercept = NULL;

1387 1388 1389
	if (enable_ept && !cpu_has_vmx_ept_2m_page())
		kvm_disable_largepages();

A
Avi Kivity 已提交
1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401
	return alloc_kvm_area();
}

static __exit void hardware_unsetup(void)
{
	free_kvm_area();
}

static void fix_pmode_dataseg(int seg, struct kvm_save_segment *save)
{
	struct kvm_vmx_segment_field *sf = &kvm_vmx_segment_fields[seg];

1402
	if (vmcs_readl(sf->base) == save->base && (save->base & AR_S_MASK)) {
A
Avi Kivity 已提交
1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416
		vmcs_write16(sf->selector, save->selector);
		vmcs_writel(sf->base, save->base);
		vmcs_write32(sf->limit, save->limit);
		vmcs_write32(sf->ar_bytes, save->ar);
	} else {
		u32 dpl = (vmcs_read16(sf->selector) & SELECTOR_RPL_MASK)
			<< AR_DPL_SHIFT;
		vmcs_write32(sf->ar_bytes, 0x93 | dpl);
	}
}

static void enter_pmode(struct kvm_vcpu *vcpu)
{
	unsigned long flags;
1417
	struct vcpu_vmx *vmx = to_vmx(vcpu);
A
Avi Kivity 已提交
1418

1419
	vmx->emulation_required = 1;
1420
	vmx->rmode.vm86_active = 0;
A
Avi Kivity 已提交
1421

1422 1423 1424
	vmcs_writel(GUEST_TR_BASE, vmx->rmode.tr.base);
	vmcs_write32(GUEST_TR_LIMIT, vmx->rmode.tr.limit);
	vmcs_write32(GUEST_TR_AR_BYTES, vmx->rmode.tr.ar);
A
Avi Kivity 已提交
1425 1426

	flags = vmcs_readl(GUEST_RFLAGS);
1427
	flags &= ~(X86_EFLAGS_IOPL | X86_EFLAGS_VM);
1428
	flags |= (vmx->rmode.save_iopl << IOPL_SHIFT);
A
Avi Kivity 已提交
1429 1430
	vmcs_writel(GUEST_RFLAGS, flags);

1431 1432
	vmcs_writel(GUEST_CR4, (vmcs_readl(GUEST_CR4) & ~X86_CR4_VME) |
			(vmcs_readl(CR4_READ_SHADOW) & X86_CR4_VME));
A
Avi Kivity 已提交
1433 1434 1435

	update_exception_bitmap(vcpu);

1436 1437 1438
	if (emulate_invalid_guest_state)
		return;

1439 1440 1441 1442
	fix_pmode_dataseg(VCPU_SREG_ES, &vmx->rmode.es);
	fix_pmode_dataseg(VCPU_SREG_DS, &vmx->rmode.ds);
	fix_pmode_dataseg(VCPU_SREG_GS, &vmx->rmode.gs);
	fix_pmode_dataseg(VCPU_SREG_FS, &vmx->rmode.fs);
A
Avi Kivity 已提交
1443 1444 1445 1446 1447 1448 1449 1450 1451

	vmcs_write16(GUEST_SS_SELECTOR, 0);
	vmcs_write32(GUEST_SS_AR_BYTES, 0x93);

	vmcs_write16(GUEST_CS_SELECTOR,
		     vmcs_read16(GUEST_CS_SELECTOR) & ~SELECTOR_RPL_MASK);
	vmcs_write32(GUEST_CS_AR_BYTES, 0x9b);
}

M
Mike Day 已提交
1452
static gva_t rmode_tss_base(struct kvm *kvm)
A
Avi Kivity 已提交
1453
{
1454
	if (!kvm->arch.tss_addr) {
1455 1456 1457 1458
		gfn_t base_gfn = kvm->memslots[0].base_gfn +
				 kvm->memslots[0].npages - 3;
		return base_gfn << PAGE_SHIFT;
	}
1459
	return kvm->arch.tss_addr;
A
Avi Kivity 已提交
1460 1461 1462 1463 1464 1465 1466 1467 1468 1469
}

static void fix_rmode_seg(int seg, struct kvm_save_segment *save)
{
	struct kvm_vmx_segment_field *sf = &kvm_vmx_segment_fields[seg];

	save->selector = vmcs_read16(sf->selector);
	save->base = vmcs_readl(sf->base);
	save->limit = vmcs_read32(sf->limit);
	save->ar = vmcs_read32(sf->ar_bytes);
1470 1471
	vmcs_write16(sf->selector, save->base >> 4);
	vmcs_write32(sf->base, save->base & 0xfffff);
A
Avi Kivity 已提交
1472 1473 1474 1475 1476 1477 1478
	vmcs_write32(sf->limit, 0xffff);
	vmcs_write32(sf->ar_bytes, 0xf3);
}

static void enter_rmode(struct kvm_vcpu *vcpu)
{
	unsigned long flags;
1479
	struct vcpu_vmx *vmx = to_vmx(vcpu);
A
Avi Kivity 已提交
1480

1481 1482 1483
	if (enable_unrestricted_guest)
		return;

1484
	vmx->emulation_required = 1;
1485
	vmx->rmode.vm86_active = 1;
A
Avi Kivity 已提交
1486

1487
	vmx->rmode.tr.base = vmcs_readl(GUEST_TR_BASE);
A
Avi Kivity 已提交
1488 1489
	vmcs_writel(GUEST_TR_BASE, rmode_tss_base(vcpu->kvm));

1490
	vmx->rmode.tr.limit = vmcs_read32(GUEST_TR_LIMIT);
A
Avi Kivity 已提交
1491 1492
	vmcs_write32(GUEST_TR_LIMIT, RMODE_TSS_SIZE - 1);

1493
	vmx->rmode.tr.ar = vmcs_read32(GUEST_TR_AR_BYTES);
A
Avi Kivity 已提交
1494 1495 1496
	vmcs_write32(GUEST_TR_AR_BYTES, 0x008b);

	flags = vmcs_readl(GUEST_RFLAGS);
1497
	vmx->rmode.save_iopl
1498
		= (flags & X86_EFLAGS_IOPL) >> IOPL_SHIFT;
A
Avi Kivity 已提交
1499

1500
	flags |= X86_EFLAGS_IOPL | X86_EFLAGS_VM;
A
Avi Kivity 已提交
1501 1502

	vmcs_writel(GUEST_RFLAGS, flags);
1503
	vmcs_writel(GUEST_CR4, vmcs_readl(GUEST_CR4) | X86_CR4_VME);
A
Avi Kivity 已提交
1504 1505
	update_exception_bitmap(vcpu);

1506 1507 1508
	if (emulate_invalid_guest_state)
		goto continue_rmode;

A
Avi Kivity 已提交
1509 1510 1511 1512 1513
	vmcs_write16(GUEST_SS_SELECTOR, vmcs_readl(GUEST_SS_BASE) >> 4);
	vmcs_write32(GUEST_SS_LIMIT, 0xffff);
	vmcs_write32(GUEST_SS_AR_BYTES, 0xf3);

	vmcs_write32(GUEST_CS_AR_BYTES, 0xf3);
1514
	vmcs_write32(GUEST_CS_LIMIT, 0xffff);
1515 1516
	if (vmcs_readl(GUEST_CS_BASE) == 0xffff0000)
		vmcs_writel(GUEST_CS_BASE, 0xf0000);
A
Avi Kivity 已提交
1517 1518
	vmcs_write16(GUEST_CS_SELECTOR, vmcs_readl(GUEST_CS_BASE) >> 4);

1519 1520 1521 1522
	fix_rmode_seg(VCPU_SREG_ES, &vmx->rmode.es);
	fix_rmode_seg(VCPU_SREG_DS, &vmx->rmode.ds);
	fix_rmode_seg(VCPU_SREG_GS, &vmx->rmode.gs);
	fix_rmode_seg(VCPU_SREG_FS, &vmx->rmode.fs);
1523

1524
continue_rmode:
1525
	kvm_mmu_reset_context(vcpu);
1526
	init_rmode(vcpu->kvm);
A
Avi Kivity 已提交
1527 1528
}

1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551
static void vmx_set_efer(struct kvm_vcpu *vcpu, u64 efer)
{
	struct vcpu_vmx *vmx = to_vmx(vcpu);
	struct kvm_msr_entry *msr = find_msr_entry(vmx, MSR_EFER);

	vcpu->arch.shadow_efer = efer;
	if (!msr)
		return;
	if (efer & EFER_LMA) {
		vmcs_write32(VM_ENTRY_CONTROLS,
			     vmcs_read32(VM_ENTRY_CONTROLS) |
			     VM_ENTRY_IA32E_MODE);
		msr->data = efer;
	} else {
		vmcs_write32(VM_ENTRY_CONTROLS,
			     vmcs_read32(VM_ENTRY_CONTROLS) &
			     ~VM_ENTRY_IA32E_MODE);

		msr->data = efer & ~EFER_LME;
	}
	setup_msrs(vmx);
}

1552
#ifdef CONFIG_X86_64
A
Avi Kivity 已提交
1553 1554 1555 1556 1557 1558 1559 1560

static void enter_lmode(struct kvm_vcpu *vcpu)
{
	u32 guest_tr_ar;

	guest_tr_ar = vmcs_read32(GUEST_TR_AR_BYTES);
	if ((guest_tr_ar & AR_TYPE_MASK) != AR_TYPE_BUSY_64_TSS) {
		printk(KERN_DEBUG "%s: tss fixup for long mode. \n",
1561
		       __func__);
A
Avi Kivity 已提交
1562 1563 1564 1565
		vmcs_write32(GUEST_TR_AR_BYTES,
			     (guest_tr_ar & ~AR_TYPE_MASK)
			     | AR_TYPE_BUSY_64_TSS);
	}
1566
	vcpu->arch.shadow_efer |= EFER_LMA;
1567
	vmx_set_efer(vcpu, vcpu->arch.shadow_efer);
A
Avi Kivity 已提交
1568 1569 1570 1571
}

static void exit_lmode(struct kvm_vcpu *vcpu)
{
1572
	vcpu->arch.shadow_efer &= ~EFER_LMA;
A
Avi Kivity 已提交
1573 1574 1575

	vmcs_write32(VM_ENTRY_CONTROLS,
		     vmcs_read32(VM_ENTRY_CONTROLS)
1576
		     & ~VM_ENTRY_IA32E_MODE);
A
Avi Kivity 已提交
1577 1578 1579 1580
}

#endif

1581 1582 1583
static void vmx_flush_tlb(struct kvm_vcpu *vcpu)
{
	vpid_sync_vcpu_all(to_vmx(vcpu));
1584
	if (enable_ept)
1585
		ept_sync_context(construct_eptp(vcpu->arch.mmu.root_hpa));
1586 1587
}

1588
static void vmx_decache_cr4_guest_bits(struct kvm_vcpu *vcpu)
1589
{
1590 1591
	vcpu->arch.cr4 &= KVM_GUEST_CR4_MASK;
	vcpu->arch.cr4 |= vmcs_readl(GUEST_CR4) & ~KVM_GUEST_CR4_MASK;
1592 1593
}

1594 1595
static void ept_load_pdptrs(struct kvm_vcpu *vcpu)
{
A
Avi Kivity 已提交
1596 1597 1598 1599
	if (!test_bit(VCPU_EXREG_PDPTR,
		      (unsigned long *)&vcpu->arch.regs_dirty))
		return;

1600 1601 1602 1603 1604 1605 1606 1607
	if (is_paging(vcpu) && is_pae(vcpu) && !is_long_mode(vcpu)) {
		vmcs_write64(GUEST_PDPTR0, vcpu->arch.pdptrs[0]);
		vmcs_write64(GUEST_PDPTR1, vcpu->arch.pdptrs[1]);
		vmcs_write64(GUEST_PDPTR2, vcpu->arch.pdptrs[2]);
		vmcs_write64(GUEST_PDPTR3, vcpu->arch.pdptrs[3]);
	}
}

1608 1609 1610 1611 1612 1613 1614 1615
static void ept_save_pdptrs(struct kvm_vcpu *vcpu)
{
	if (is_paging(vcpu) && is_pae(vcpu) && !is_long_mode(vcpu)) {
		vcpu->arch.pdptrs[0] = vmcs_read64(GUEST_PDPTR0);
		vcpu->arch.pdptrs[1] = vmcs_read64(GUEST_PDPTR1);
		vcpu->arch.pdptrs[2] = vmcs_read64(GUEST_PDPTR2);
		vcpu->arch.pdptrs[3] = vmcs_read64(GUEST_PDPTR3);
	}
A
Avi Kivity 已提交
1616 1617 1618 1619 1620

	__set_bit(VCPU_EXREG_PDPTR,
		  (unsigned long *)&vcpu->arch.regs_avail);
	__set_bit(VCPU_EXREG_PDPTR,
		  (unsigned long *)&vcpu->arch.regs_dirty);
1621 1622
}

1623 1624 1625 1626 1627 1628 1629 1630 1631
static void vmx_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4);

static void ept_update_paging_mode_cr0(unsigned long *hw_cr0,
					unsigned long cr0,
					struct kvm_vcpu *vcpu)
{
	if (!(cr0 & X86_CR0_PG)) {
		/* From paging/starting to nonpaging */
		vmcs_write32(CPU_BASED_VM_EXEC_CONTROL,
1632
			     vmcs_read32(CPU_BASED_VM_EXEC_CONTROL) |
1633 1634 1635 1636 1637 1638 1639 1640
			     (CPU_BASED_CR3_LOAD_EXITING |
			      CPU_BASED_CR3_STORE_EXITING));
		vcpu->arch.cr0 = cr0;
		vmx_set_cr4(vcpu, vcpu->arch.cr4);
		*hw_cr0 &= ~X86_CR0_WP;
	} else if (!is_paging(vcpu)) {
		/* From nonpaging to paging */
		vmcs_write32(CPU_BASED_VM_EXEC_CONTROL,
1641
			     vmcs_read32(CPU_BASED_VM_EXEC_CONTROL) &
1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660
			     ~(CPU_BASED_CR3_LOAD_EXITING |
			       CPU_BASED_CR3_STORE_EXITING));
		vcpu->arch.cr0 = cr0;
		vmx_set_cr4(vcpu, vcpu->arch.cr4);
		if (!(vcpu->arch.cr0 & X86_CR0_WP))
			*hw_cr0 &= ~X86_CR0_WP;
	}
}

static void ept_update_paging_mode_cr4(unsigned long *hw_cr4,
					struct kvm_vcpu *vcpu)
{
	if (!is_paging(vcpu)) {
		*hw_cr4 &= ~X86_CR4_PAE;
		*hw_cr4 |= X86_CR4_PSE;
	} else if (!(vcpu->arch.cr4 & X86_CR4_PAE))
		*hw_cr4 &= ~X86_CR4_PAE;
}

A
Avi Kivity 已提交
1661 1662
static void vmx_set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0)
{
1663
	struct vcpu_vmx *vmx = to_vmx(vcpu);
1664 1665 1666 1667 1668 1669 1670
	unsigned long hw_cr0;

	if (enable_unrestricted_guest)
		hw_cr0 = (cr0 & ~KVM_GUEST_CR0_MASK_UNRESTRICTED_GUEST)
			| KVM_VM_CR0_ALWAYS_ON_UNRESTRICTED_GUEST;
	else
		hw_cr0 = (cr0 & ~KVM_GUEST_CR0_MASK) | KVM_VM_CR0_ALWAYS_ON;
1671

1672 1673
	vmx_fpu_deactivate(vcpu);

1674
	if (vmx->rmode.vm86_active && (cr0 & X86_CR0_PE))
A
Avi Kivity 已提交
1675 1676
		enter_pmode(vcpu);

1677
	if (!vmx->rmode.vm86_active && !(cr0 & X86_CR0_PE))
A
Avi Kivity 已提交
1678 1679
		enter_rmode(vcpu);

1680
#ifdef CONFIG_X86_64
1681
	if (vcpu->arch.shadow_efer & EFER_LME) {
1682
		if (!is_paging(vcpu) && (cr0 & X86_CR0_PG))
A
Avi Kivity 已提交
1683
			enter_lmode(vcpu);
1684
		if (is_paging(vcpu) && !(cr0 & X86_CR0_PG))
A
Avi Kivity 已提交
1685 1686 1687 1688
			exit_lmode(vcpu);
	}
#endif

1689
	if (enable_ept)
1690 1691
		ept_update_paging_mode_cr0(&hw_cr0, cr0, vcpu);

A
Avi Kivity 已提交
1692
	vmcs_writel(CR0_READ_SHADOW, cr0);
1693
	vmcs_writel(GUEST_CR0, hw_cr0);
1694
	vcpu->arch.cr0 = cr0;
1695

1696
	if (!(cr0 & X86_CR0_TS) || !(cr0 & X86_CR0_PE))
1697
		vmx_fpu_activate(vcpu);
A
Avi Kivity 已提交
1698 1699
}

1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711
static u64 construct_eptp(unsigned long root_hpa)
{
	u64 eptp;

	/* TODO write the value reading from MSR */
	eptp = VMX_EPT_DEFAULT_MT |
		VMX_EPT_DEFAULT_GAW << VMX_EPT_GAW_EPTP_SHIFT;
	eptp |= (root_hpa & PAGE_MASK);

	return eptp;
}

A
Avi Kivity 已提交
1712 1713
static void vmx_set_cr3(struct kvm_vcpu *vcpu, unsigned long cr3)
{
1714 1715 1716 1717
	unsigned long guest_cr3;
	u64 eptp;

	guest_cr3 = cr3;
1718
	if (enable_ept) {
1719 1720 1721
		eptp = construct_eptp(cr3);
		vmcs_write64(EPT_POINTER, eptp);
		guest_cr3 = is_paging(vcpu) ? vcpu->arch.cr3 :
1722
			vcpu->kvm->arch.ept_identity_map_addr;
1723 1724
	}

1725
	vmx_flush_tlb(vcpu);
1726
	vmcs_writel(GUEST_CR3, guest_cr3);
1727
	if (vcpu->arch.cr0 & X86_CR0_PE)
1728
		vmx_fpu_deactivate(vcpu);
A
Avi Kivity 已提交
1729 1730 1731 1732
}

static void vmx_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4)
{
1733
	unsigned long hw_cr4 = cr4 | (to_vmx(vcpu)->rmode.vm86_active ?
1734 1735
		    KVM_RMODE_VM_CR4_ALWAYS_ON : KVM_PMODE_VM_CR4_ALWAYS_ON);

1736
	vcpu->arch.cr4 = cr4;
1737
	if (enable_ept)
1738 1739 1740 1741
		ept_update_paging_mode_cr4(&hw_cr4, vcpu);

	vmcs_writel(CR4_READ_SHADOW, cr4);
	vmcs_writel(GUEST_CR4, hw_cr4);
A
Avi Kivity 已提交
1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760
}

static u64 vmx_get_segment_base(struct kvm_vcpu *vcpu, int seg)
{
	struct kvm_vmx_segment_field *sf = &kvm_vmx_segment_fields[seg];

	return vmcs_readl(sf->base);
}

static void vmx_get_segment(struct kvm_vcpu *vcpu,
			    struct kvm_segment *var, int seg)
{
	struct kvm_vmx_segment_field *sf = &kvm_vmx_segment_fields[seg];
	u32 ar;

	var->base = vmcs_readl(sf->base);
	var->limit = vmcs_read32(sf->limit);
	var->selector = vmcs_read16(sf->selector);
	ar = vmcs_read32(sf->ar_bytes);
1761
	if ((ar & AR_UNUSABLE_MASK) && !emulate_invalid_guest_state)
A
Avi Kivity 已提交
1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773
		ar = 0;
	var->type = ar & 15;
	var->s = (ar >> 4) & 1;
	var->dpl = (ar >> 5) & 3;
	var->present = (ar >> 7) & 1;
	var->avl = (ar >> 12) & 1;
	var->l = (ar >> 13) & 1;
	var->db = (ar >> 14) & 1;
	var->g = (ar >> 15) & 1;
	var->unusable = (ar >> 16) & 1;
}

1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787
static int vmx_get_cpl(struct kvm_vcpu *vcpu)
{
	struct kvm_segment kvm_seg;

	if (!(vcpu->arch.cr0 & X86_CR0_PE)) /* if real mode */
		return 0;

	if (vmx_get_rflags(vcpu) & X86_EFLAGS_VM) /* if virtual 8086 */
		return 3;

	vmx_get_segment(vcpu, &kvm_seg, VCPU_SREG_CS);
	return kvm_seg.selector & 3;
}

1788
static u32 vmx_segment_access_rights(struct kvm_segment *var)
A
Avi Kivity 已提交
1789 1790 1791
{
	u32 ar;

1792
	if (var->unusable)
A
Avi Kivity 已提交
1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803
		ar = 1 << 16;
	else {
		ar = var->type & 15;
		ar |= (var->s & 1) << 4;
		ar |= (var->dpl & 3) << 5;
		ar |= (var->present & 1) << 7;
		ar |= (var->avl & 1) << 12;
		ar |= (var->l & 1) << 13;
		ar |= (var->db & 1) << 14;
		ar |= (var->g & 1) << 15;
	}
1804 1805
	if (ar == 0) /* a 0 value means unusable */
		ar = AR_UNUSABLE_MASK;
1806 1807 1808 1809 1810 1811 1812

	return ar;
}

static void vmx_set_segment(struct kvm_vcpu *vcpu,
			    struct kvm_segment *var, int seg)
{
1813
	struct vcpu_vmx *vmx = to_vmx(vcpu);
1814 1815 1816
	struct kvm_vmx_segment_field *sf = &kvm_vmx_segment_fields[seg];
	u32 ar;

1817 1818 1819 1820 1821
	if (vmx->rmode.vm86_active && seg == VCPU_SREG_TR) {
		vmx->rmode.tr.selector = var->selector;
		vmx->rmode.tr.base = var->base;
		vmx->rmode.tr.limit = var->limit;
		vmx->rmode.tr.ar = vmx_segment_access_rights(var);
1822 1823 1824 1825 1826
		return;
	}
	vmcs_writel(sf->base, var->base);
	vmcs_write32(sf->limit, var->limit);
	vmcs_write16(sf->selector, var->selector);
1827
	if (vmx->rmode.vm86_active && var->s) {
1828 1829 1830 1831 1832 1833 1834 1835
		/*
		 * Hack real-mode segments into vm86 compatibility.
		 */
		if (var->base == 0xffff0000 && var->selector == 0xf000)
			vmcs_writel(sf->base, 0xf0000);
		ar = 0xf3;
	} else
		ar = vmx_segment_access_rights(var);
1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850

	/*
	 *   Fix the "Accessed" bit in AR field of segment registers for older
	 * qemu binaries.
	 *   IA32 arch specifies that at the time of processor reset the
	 * "Accessed" bit in the AR field of segment registers is 1. And qemu
	 * is setting it to 0 in the usedland code. This causes invalid guest
	 * state vmexit when "unrestricted guest" mode is turned on.
	 *    Fix for this setup issue in cpu_reset is being pushed in the qemu
	 * tree. Newer qemu binaries with that qemu fix would not need this
	 * kvm hack.
	 */
	if (enable_unrestricted_guest && (seg != VCPU_SREG_LDTR))
		ar |= 0x1; /* Accessed */

A
Avi Kivity 已提交
1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885
	vmcs_write32(sf->ar_bytes, ar);
}

static void vmx_get_cs_db_l_bits(struct kvm_vcpu *vcpu, int *db, int *l)
{
	u32 ar = vmcs_read32(GUEST_CS_AR_BYTES);

	*db = (ar >> 14) & 1;
	*l = (ar >> 13) & 1;
}

static void vmx_get_idt(struct kvm_vcpu *vcpu, struct descriptor_table *dt)
{
	dt->limit = vmcs_read32(GUEST_IDTR_LIMIT);
	dt->base = vmcs_readl(GUEST_IDTR_BASE);
}

static void vmx_set_idt(struct kvm_vcpu *vcpu, struct descriptor_table *dt)
{
	vmcs_write32(GUEST_IDTR_LIMIT, dt->limit);
	vmcs_writel(GUEST_IDTR_BASE, dt->base);
}

static void vmx_get_gdt(struct kvm_vcpu *vcpu, struct descriptor_table *dt)
{
	dt->limit = vmcs_read32(GUEST_GDTR_LIMIT);
	dt->base = vmcs_readl(GUEST_GDTR_BASE);
}

static void vmx_set_gdt(struct kvm_vcpu *vcpu, struct descriptor_table *dt)
{
	vmcs_write32(GUEST_GDTR_LIMIT, dt->limit);
	vmcs_writel(GUEST_GDTR_BASE, dt->base);
}

1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911
static bool rmode_segment_valid(struct kvm_vcpu *vcpu, int seg)
{
	struct kvm_segment var;
	u32 ar;

	vmx_get_segment(vcpu, &var, seg);
	ar = vmx_segment_access_rights(&var);

	if (var.base != (var.selector << 4))
		return false;
	if (var.limit != 0xffff)
		return false;
	if (ar != 0xf3)
		return false;

	return true;
}

static bool code_segment_valid(struct kvm_vcpu *vcpu)
{
	struct kvm_segment cs;
	unsigned int cs_rpl;

	vmx_get_segment(vcpu, &cs, VCPU_SREG_CS);
	cs_rpl = cs.selector & SELECTOR_RPL_MASK;

1912 1913
	if (cs.unusable)
		return false;
1914 1915 1916 1917
	if (~cs.type & (AR_TYPE_CODE_MASK|AR_TYPE_ACCESSES_MASK))
		return false;
	if (!cs.s)
		return false;
1918
	if (cs.type & AR_TYPE_WRITEABLE_MASK) {
1919 1920
		if (cs.dpl > cs_rpl)
			return false;
1921
	} else {
1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939
		if (cs.dpl != cs_rpl)
			return false;
	}
	if (!cs.present)
		return false;

	/* TODO: Add Reserved field check, this'll require a new member in the kvm_segment_field structure */
	return true;
}

static bool stack_segment_valid(struct kvm_vcpu *vcpu)
{
	struct kvm_segment ss;
	unsigned int ss_rpl;

	vmx_get_segment(vcpu, &ss, VCPU_SREG_SS);
	ss_rpl = ss.selector & SELECTOR_RPL_MASK;

1940 1941 1942
	if (ss.unusable)
		return true;
	if (ss.type != 3 && ss.type != 7)
1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961
		return false;
	if (!ss.s)
		return false;
	if (ss.dpl != ss_rpl) /* DPL != RPL */
		return false;
	if (!ss.present)
		return false;

	return true;
}

static bool data_segment_valid(struct kvm_vcpu *vcpu, int seg)
{
	struct kvm_segment var;
	unsigned int rpl;

	vmx_get_segment(vcpu, &var, seg);
	rpl = var.selector & SELECTOR_RPL_MASK;

1962 1963
	if (var.unusable)
		return true;
1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984
	if (!var.s)
		return false;
	if (!var.present)
		return false;
	if (~var.type & (AR_TYPE_CODE_MASK|AR_TYPE_WRITEABLE_MASK)) {
		if (var.dpl < rpl) /* DPL < RPL */
			return false;
	}

	/* TODO: Add other members to kvm_segment_field to allow checking for other access
	 * rights flags
	 */
	return true;
}

static bool tr_valid(struct kvm_vcpu *vcpu)
{
	struct kvm_segment tr;

	vmx_get_segment(vcpu, &tr, VCPU_SREG_TR);

1985 1986
	if (tr.unusable)
		return false;
1987 1988
	if (tr.selector & SELECTOR_TI_MASK)	/* TI = 1 */
		return false;
1989
	if (tr.type != 3 && tr.type != 11) /* TODO: Check if guest is in IA32e mode */
1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002
		return false;
	if (!tr.present)
		return false;

	return true;
}

static bool ldtr_valid(struct kvm_vcpu *vcpu)
{
	struct kvm_segment ldtr;

	vmx_get_segment(vcpu, &ldtr, VCPU_SREG_LDTR);

2003 2004
	if (ldtr.unusable)
		return true;
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075
	if (ldtr.selector & SELECTOR_TI_MASK)	/* TI = 1 */
		return false;
	if (ldtr.type != 2)
		return false;
	if (!ldtr.present)
		return false;

	return true;
}

static bool cs_ss_rpl_check(struct kvm_vcpu *vcpu)
{
	struct kvm_segment cs, ss;

	vmx_get_segment(vcpu, &cs, VCPU_SREG_CS);
	vmx_get_segment(vcpu, &ss, VCPU_SREG_SS);

	return ((cs.selector & SELECTOR_RPL_MASK) ==
		 (ss.selector & SELECTOR_RPL_MASK));
}

/*
 * Check if guest state is valid. Returns true if valid, false if
 * not.
 * We assume that registers are always usable
 */
static bool guest_state_valid(struct kvm_vcpu *vcpu)
{
	/* real mode guest state checks */
	if (!(vcpu->arch.cr0 & X86_CR0_PE)) {
		if (!rmode_segment_valid(vcpu, VCPU_SREG_CS))
			return false;
		if (!rmode_segment_valid(vcpu, VCPU_SREG_SS))
			return false;
		if (!rmode_segment_valid(vcpu, VCPU_SREG_DS))
			return false;
		if (!rmode_segment_valid(vcpu, VCPU_SREG_ES))
			return false;
		if (!rmode_segment_valid(vcpu, VCPU_SREG_FS))
			return false;
		if (!rmode_segment_valid(vcpu, VCPU_SREG_GS))
			return false;
	} else {
	/* protected mode guest state checks */
		if (!cs_ss_rpl_check(vcpu))
			return false;
		if (!code_segment_valid(vcpu))
			return false;
		if (!stack_segment_valid(vcpu))
			return false;
		if (!data_segment_valid(vcpu, VCPU_SREG_DS))
			return false;
		if (!data_segment_valid(vcpu, VCPU_SREG_ES))
			return false;
		if (!data_segment_valid(vcpu, VCPU_SREG_FS))
			return false;
		if (!data_segment_valid(vcpu, VCPU_SREG_GS))
			return false;
		if (!tr_valid(vcpu))
			return false;
		if (!ldtr_valid(vcpu))
			return false;
	}
	/* TODO:
	 * - Add checks on RIP
	 * - Add checks on RFLAGS
	 */

	return true;
}

M
Mike Day 已提交
2076
static int init_rmode_tss(struct kvm *kvm)
A
Avi Kivity 已提交
2077 2078
{
	gfn_t fn = rmode_tss_base(kvm) >> PAGE_SHIFT;
2079
	u16 data = 0;
2080
	int ret = 0;
2081
	int r;
A
Avi Kivity 已提交
2082

2083 2084
	r = kvm_clear_guest_page(kvm, fn, 0, PAGE_SIZE);
	if (r < 0)
2085
		goto out;
2086
	data = TSS_BASE_SIZE + TSS_REDIRECTION_SIZE;
2087 2088
	r = kvm_write_guest_page(kvm, fn++, &data,
			TSS_IOPB_BASE_OFFSET, sizeof(u16));
2089
	if (r < 0)
2090
		goto out;
2091 2092
	r = kvm_clear_guest_page(kvm, fn++, 0, PAGE_SIZE);
	if (r < 0)
2093
		goto out;
2094 2095
	r = kvm_clear_guest_page(kvm, fn, 0, PAGE_SIZE);
	if (r < 0)
2096
		goto out;
2097
	data = ~0;
2098 2099 2100
	r = kvm_write_guest_page(kvm, fn, &data,
				 RMODE_TSS_SIZE - 2 * PAGE_SIZE - 1,
				 sizeof(u8));
2101
	if (r < 0)
2102 2103 2104 2105 2106
		goto out;

	ret = 1;
out:
	return ret;
A
Avi Kivity 已提交
2107 2108
}

2109 2110 2111 2112 2113 2114
static int init_rmode_identity_map(struct kvm *kvm)
{
	int i, r, ret;
	pfn_t identity_map_pfn;
	u32 tmp;

2115
	if (!enable_ept)
2116 2117 2118 2119 2120 2121 2122 2123 2124
		return 1;
	if (unlikely(!kvm->arch.ept_identity_pagetable)) {
		printk(KERN_ERR "EPT: identity-mapping pagetable "
			"haven't been allocated!\n");
		return 0;
	}
	if (likely(kvm->arch.ept_identity_pagetable_done))
		return 1;
	ret = 0;
2125
	identity_map_pfn = kvm->arch.ept_identity_map_addr >> PAGE_SHIFT;
2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143
	r = kvm_clear_guest_page(kvm, identity_map_pfn, 0, PAGE_SIZE);
	if (r < 0)
		goto out;
	/* Set up identity-mapping pagetable for EPT in real mode */
	for (i = 0; i < PT32_ENT_PER_PAGE; i++) {
		tmp = (i << 22) + (_PAGE_PRESENT | _PAGE_RW | _PAGE_USER |
			_PAGE_ACCESSED | _PAGE_DIRTY | _PAGE_PSE);
		r = kvm_write_guest_page(kvm, identity_map_pfn,
				&tmp, i * sizeof(tmp), sizeof(tmp));
		if (r < 0)
			goto out;
	}
	kvm->arch.ept_identity_pagetable_done = true;
	ret = 1;
out:
	return ret;
}

A
Avi Kivity 已提交
2144 2145 2146
static void seg_setup(int seg)
{
	struct kvm_vmx_segment_field *sf = &kvm_vmx_segment_fields[seg];
2147
	unsigned int ar;
A
Avi Kivity 已提交
2148 2149 2150 2151

	vmcs_write16(sf->selector, 0);
	vmcs_writel(sf->base, 0);
	vmcs_write32(sf->limit, 0xffff);
2152 2153 2154 2155 2156 2157 2158 2159
	if (enable_unrestricted_guest) {
		ar = 0x93;
		if (seg == VCPU_SREG_CS)
			ar |= 0x08; /* code segment */
	} else
		ar = 0xf3;

	vmcs_write32(sf->ar_bytes, ar);
A
Avi Kivity 已提交
2160 2161
}

2162 2163 2164 2165 2166
static int alloc_apic_access_page(struct kvm *kvm)
{
	struct kvm_userspace_memory_region kvm_userspace_mem;
	int r = 0;

2167
	down_write(&kvm->slots_lock);
2168
	if (kvm->arch.apic_access_page)
2169 2170 2171 2172 2173 2174 2175 2176
		goto out;
	kvm_userspace_mem.slot = APIC_ACCESS_PAGE_PRIVATE_MEMSLOT;
	kvm_userspace_mem.flags = 0;
	kvm_userspace_mem.guest_phys_addr = 0xfee00000ULL;
	kvm_userspace_mem.memory_size = PAGE_SIZE;
	r = __kvm_set_memory_region(kvm, &kvm_userspace_mem, 0);
	if (r)
		goto out;
2177

2178
	kvm->arch.apic_access_page = gfn_to_page(kvm, 0xfee00);
2179
out:
2180
	up_write(&kvm->slots_lock);
2181 2182 2183
	return r;
}

2184 2185 2186 2187 2188 2189 2190 2191 2192 2193
static int alloc_identity_pagetable(struct kvm *kvm)
{
	struct kvm_userspace_memory_region kvm_userspace_mem;
	int r = 0;

	down_write(&kvm->slots_lock);
	if (kvm->arch.ept_identity_pagetable)
		goto out;
	kvm_userspace_mem.slot = IDENTITY_PAGETABLE_PRIVATE_MEMSLOT;
	kvm_userspace_mem.flags = 0;
2194 2195
	kvm_userspace_mem.guest_phys_addr =
		kvm->arch.ept_identity_map_addr;
2196 2197 2198 2199 2200 2201
	kvm_userspace_mem.memory_size = PAGE_SIZE;
	r = __kvm_set_memory_region(kvm, &kvm_userspace_mem, 0);
	if (r)
		goto out;

	kvm->arch.ept_identity_pagetable = gfn_to_page(kvm,
2202
			kvm->arch.ept_identity_map_addr >> PAGE_SHIFT);
2203 2204 2205 2206 2207
out:
	up_write(&kvm->slots_lock);
	return r;
}

2208 2209 2210 2211 2212
static void allocate_vpid(struct vcpu_vmx *vmx)
{
	int vpid;

	vmx->vpid = 0;
2213
	if (!enable_vpid)
2214 2215 2216 2217 2218 2219 2220 2221 2222 2223
		return;
	spin_lock(&vmx_vpid_lock);
	vpid = find_first_zero_bit(vmx_vpid_bitmap, VMX_NR_VPIDS);
	if (vpid < VMX_NR_VPIDS) {
		vmx->vpid = vpid;
		__set_bit(vpid, vmx_vpid_bitmap);
	}
	spin_unlock(&vmx_vpid_lock);
}

2224
static void __vmx_disable_intercept_for_msr(unsigned long *msr_bitmap, u32 msr)
S
Sheng Yang 已提交
2225
{
2226
	int f = sizeof(unsigned long);
S
Sheng Yang 已提交
2227 2228 2229 2230 2231 2232 2233 2234 2235 2236

	if (!cpu_has_vmx_msr_bitmap())
		return;

	/*
	 * See Intel PRM Vol. 3, 20.6.9 (MSR-Bitmap Address). Early manuals
	 * have the write-low and read-high bitmap offsets the wrong way round.
	 * We can control MSRs 0x00000000-0x00001fff and 0xc0000000-0xc0001fff.
	 */
	if (msr <= 0x1fff) {
2237 2238
		__clear_bit(msr, msr_bitmap + 0x000 / f); /* read-low */
		__clear_bit(msr, msr_bitmap + 0x800 / f); /* write-low */
S
Sheng Yang 已提交
2239 2240
	} else if ((msr >= 0xc0000000) && (msr <= 0xc0001fff)) {
		msr &= 0x1fff;
2241 2242
		__clear_bit(msr, msr_bitmap + 0x400 / f); /* read-high */
		__clear_bit(msr, msr_bitmap + 0xc00 / f); /* write-high */
S
Sheng Yang 已提交
2243 2244 2245
	}
}

2246 2247 2248 2249 2250 2251 2252
static void vmx_disable_intercept_for_msr(u32 msr, bool longmode_only)
{
	if (!longmode_only)
		__vmx_disable_intercept_for_msr(vmx_msr_bitmap_legacy, msr);
	__vmx_disable_intercept_for_msr(vmx_msr_bitmap_longmode, msr);
}

A
Avi Kivity 已提交
2253 2254 2255
/*
 * Sets up the vmcs for emulated real mode.
 */
R
Rusty Russell 已提交
2256
static int vmx_vcpu_setup(struct vcpu_vmx *vmx)
A
Avi Kivity 已提交
2257
{
S
Sheng Yang 已提交
2258
	u32 host_sysenter_cs, msr_low, msr_high;
A
Avi Kivity 已提交
2259
	u32 junk;
2260
	u64 host_pat, tsc_this, tsc_base;
A
Avi Kivity 已提交
2261 2262 2263
	unsigned long a;
	struct descriptor_table dt;
	int i;
2264
	unsigned long kvm_vmx_return;
2265
	u32 exec_control;
A
Avi Kivity 已提交
2266 2267

	/* I/O */
2268 2269
	vmcs_write64(IO_BITMAP_A, __pa(vmx_io_bitmap_a));
	vmcs_write64(IO_BITMAP_B, __pa(vmx_io_bitmap_b));
A
Avi Kivity 已提交
2270

S
Sheng Yang 已提交
2271
	if (cpu_has_vmx_msr_bitmap())
2272
		vmcs_write64(MSR_BITMAP, __pa(vmx_msr_bitmap_legacy));
S
Sheng Yang 已提交
2273

A
Avi Kivity 已提交
2274 2275 2276
	vmcs_write64(VMCS_LINK_POINTER, -1ull); /* 22.3.1.5 */

	/* Control */
2277 2278
	vmcs_write32(PIN_BASED_VM_EXEC_CONTROL,
		vmcs_config.pin_based_exec_ctrl);
2279 2280 2281 2282 2283 2284 2285 2286 2287

	exec_control = vmcs_config.cpu_based_exec_ctrl;
	if (!vm_need_tpr_shadow(vmx->vcpu.kvm)) {
		exec_control &= ~CPU_BASED_TPR_SHADOW;
#ifdef CONFIG_X86_64
		exec_control |= CPU_BASED_CR8_STORE_EXITING |
				CPU_BASED_CR8_LOAD_EXITING;
#endif
	}
2288
	if (!enable_ept)
S
Sheng Yang 已提交
2289
		exec_control |= CPU_BASED_CR3_STORE_EXITING |
2290 2291
				CPU_BASED_CR3_LOAD_EXITING  |
				CPU_BASED_INVLPG_EXITING;
2292
	vmcs_write32(CPU_BASED_VM_EXEC_CONTROL, exec_control);
A
Avi Kivity 已提交
2293

2294 2295 2296 2297 2298
	if (cpu_has_secondary_exec_ctrls()) {
		exec_control = vmcs_config.cpu_based_2nd_exec_ctrl;
		if (!vm_need_virtualize_apic_accesses(vmx->vcpu.kvm))
			exec_control &=
				~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
2299 2300
		if (vmx->vpid == 0)
			exec_control &= ~SECONDARY_EXEC_ENABLE_VPID;
2301
		if (!enable_ept)
S
Sheng Yang 已提交
2302
			exec_control &= ~SECONDARY_EXEC_ENABLE_EPT;
2303 2304
		if (!enable_unrestricted_guest)
			exec_control &= ~SECONDARY_EXEC_UNRESTRICTED_GUEST;
2305 2306
		vmcs_write32(SECONDARY_VM_EXEC_CONTROL, exec_control);
	}
2307

2308 2309
	vmcs_write32(PAGE_FAULT_ERROR_CODE_MASK, !!bypass_guest_pf);
	vmcs_write32(PAGE_FAULT_ERROR_CODE_MATCH, !!bypass_guest_pf);
A
Avi Kivity 已提交
2310 2311 2312 2313 2314 2315 2316 2317 2318
	vmcs_write32(CR3_TARGET_COUNT, 0);           /* 22.2.1 */

	vmcs_writel(HOST_CR0, read_cr0());  /* 22.2.3 */
	vmcs_writel(HOST_CR4, read_cr4());  /* 22.2.3, 22.2.5 */
	vmcs_writel(HOST_CR3, read_cr3());  /* 22.2.3  FIXME: shadow tables */

	vmcs_write16(HOST_CS_SELECTOR, __KERNEL_CS);  /* 22.2.4 */
	vmcs_write16(HOST_DS_SELECTOR, __KERNEL_DS);  /* 22.2.4 */
	vmcs_write16(HOST_ES_SELECTOR, __KERNEL_DS);  /* 22.2.4 */
2319 2320
	vmcs_write16(HOST_FS_SELECTOR, kvm_read_fs());    /* 22.2.4 */
	vmcs_write16(HOST_GS_SELECTOR, kvm_read_gs());    /* 22.2.4 */
A
Avi Kivity 已提交
2321
	vmcs_write16(HOST_SS_SELECTOR, __KERNEL_DS);  /* 22.2.4 */
2322
#ifdef CONFIG_X86_64
A
Avi Kivity 已提交
2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333
	rdmsrl(MSR_FS_BASE, a);
	vmcs_writel(HOST_FS_BASE, a); /* 22.2.4 */
	rdmsrl(MSR_GS_BASE, a);
	vmcs_writel(HOST_GS_BASE, a); /* 22.2.4 */
#else
	vmcs_writel(HOST_FS_BASE, 0); /* 22.2.4 */
	vmcs_writel(HOST_GS_BASE, 0); /* 22.2.4 */
#endif

	vmcs_write16(HOST_TR_SELECTOR, GDT_ENTRY_TSS*8);  /* 22.2.4 */

2334
	kvm_get_idt(&dt);
A
Avi Kivity 已提交
2335 2336
	vmcs_writel(HOST_IDTR_BASE, dt.base);   /* 22.2.4 */

M
Mike Day 已提交
2337
	asm("mov $.Lkvm_vmx_return, %0" : "=r"(kvm_vmx_return));
2338
	vmcs_writel(HOST_RIP, kvm_vmx_return); /* 22.2.5 */
2339 2340 2341
	vmcs_write32(VM_EXIT_MSR_STORE_COUNT, 0);
	vmcs_write32(VM_EXIT_MSR_LOAD_COUNT, 0);
	vmcs_write32(VM_ENTRY_MSR_LOAD_COUNT, 0);
A
Avi Kivity 已提交
2342 2343 2344 2345 2346 2347 2348 2349

	rdmsr(MSR_IA32_SYSENTER_CS, host_sysenter_cs, junk);
	vmcs_write32(HOST_IA32_SYSENTER_CS, host_sysenter_cs);
	rdmsrl(MSR_IA32_SYSENTER_ESP, a);
	vmcs_writel(HOST_IA32_SYSENTER_ESP, a);   /* 22.2.3 */
	rdmsrl(MSR_IA32_SYSENTER_EIP, a);
	vmcs_writel(HOST_IA32_SYSENTER_EIP, a);   /* 22.2.3 */

S
Sheng Yang 已提交
2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363
	if (vmcs_config.vmexit_ctrl & VM_EXIT_LOAD_IA32_PAT) {
		rdmsr(MSR_IA32_CR_PAT, msr_low, msr_high);
		host_pat = msr_low | ((u64) msr_high << 32);
		vmcs_write64(HOST_IA32_PAT, host_pat);
	}
	if (vmcs_config.vmentry_ctrl & VM_ENTRY_LOAD_IA32_PAT) {
		rdmsr(MSR_IA32_CR_PAT, msr_low, msr_high);
		host_pat = msr_low | ((u64) msr_high << 32);
		/* Write the default value follow host pat */
		vmcs_write64(GUEST_IA32_PAT, host_pat);
		/* Keep arch.pat sync with GUEST_IA32_PAT */
		vmx->vcpu.arch.pat = host_pat;
	}

A
Avi Kivity 已提交
2364 2365 2366 2367
	for (i = 0; i < NR_VMX_MSR; ++i) {
		u32 index = vmx_msr_index[i];
		u32 data_low, data_high;
		u64 data;
2368
		int j = vmx->nmsrs;
A
Avi Kivity 已提交
2369 2370 2371

		if (rdmsr_safe(index, &data_low, &data_high) < 0)
			continue;
2372 2373
		if (wrmsr_safe(index, data_low, data_high) < 0)
			continue;
A
Avi Kivity 已提交
2374
		data = data_low | ((u64)data_high << 32);
2375 2376 2377 2378 2379
		vmx->host_msrs[j].index = index;
		vmx->host_msrs[j].reserved = 0;
		vmx->host_msrs[j].data = data;
		vmx->guest_msrs[j] = vmx->host_msrs[j];
		++vmx->nmsrs;
A
Avi Kivity 已提交
2380 2381
	}

2382
	vmcs_write32(VM_EXIT_CONTROLS, vmcs_config.vmexit_ctrl);
A
Avi Kivity 已提交
2383 2384

	/* 22.2.1, 20.8.1 */
2385 2386
	vmcs_write32(VM_ENTRY_CONTROLS, vmcs_config.vmentry_ctrl);

2387 2388 2389
	vmcs_writel(CR0_GUEST_HOST_MASK, ~0UL);
	vmcs_writel(CR4_GUEST_HOST_MASK, KVM_GUEST_CR4_MASK);

2390 2391 2392 2393 2394 2395
	tsc_base = vmx->vcpu.kvm->arch.vm_init_tsc;
	rdtscll(tsc_this);
	if (tsc_this < vmx->vcpu.kvm->arch.vm_init_tsc)
		tsc_base = tsc_this;

	guest_write_tsc(0, tsc_base);
2396

2397 2398 2399
	return 0;
}

2400 2401 2402 2403 2404 2405 2406 2407 2408
static int init_rmode(struct kvm *kvm)
{
	if (!init_rmode_tss(kvm))
		return 0;
	if (!init_rmode_identity_map(kvm))
		return 0;
	return 1;
}

2409 2410 2411 2412 2413 2414
static int vmx_vcpu_reset(struct kvm_vcpu *vcpu)
{
	struct vcpu_vmx *vmx = to_vmx(vcpu);
	u64 msr;
	int ret;

2415
	vcpu->arch.regs_avail = ~((1 << VCPU_REGS_RIP) | (1 << VCPU_REGS_RSP));
2416
	down_read(&vcpu->kvm->slots_lock);
2417
	if (!init_rmode(vmx->vcpu.kvm)) {
2418 2419 2420 2421
		ret = -ENOMEM;
		goto out;
	}

2422
	vmx->rmode.vm86_active = 0;
2423

2424 2425
	vmx->soft_vnmi_blocked = 0;

2426
	vmx->vcpu.arch.regs[VCPU_REGS_RDX] = get_rdx_init_val();
2427
	kvm_set_cr8(&vmx->vcpu, 0);
2428
	msr = 0xfee00000 | MSR_IA32_APICBASE_ENABLE;
2429
	if (kvm_vcpu_is_bsp(&vmx->vcpu))
2430 2431 2432 2433 2434
		msr |= MSR_IA32_APICBASE_BSP;
	kvm_set_apic_base(&vmx->vcpu, msr);

	fx_init(&vmx->vcpu);

2435
	seg_setup(VCPU_SREG_CS);
2436 2437 2438 2439
	/*
	 * GUEST_CS_BASE should really be 0xffff0000, but VT vm86 mode
	 * insists on having GUEST_CS_BASE == GUEST_CS_SELECTOR << 4.  Sigh.
	 */
2440
	if (kvm_vcpu_is_bsp(&vmx->vcpu)) {
2441 2442 2443
		vmcs_write16(GUEST_CS_SELECTOR, 0xf000);
		vmcs_writel(GUEST_CS_BASE, 0x000f0000);
	} else {
2444 2445
		vmcs_write16(GUEST_CS_SELECTOR, vmx->vcpu.arch.sipi_vector << 8);
		vmcs_writel(GUEST_CS_BASE, vmx->vcpu.arch.sipi_vector << 12);
2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468
	}

	seg_setup(VCPU_SREG_DS);
	seg_setup(VCPU_SREG_ES);
	seg_setup(VCPU_SREG_FS);
	seg_setup(VCPU_SREG_GS);
	seg_setup(VCPU_SREG_SS);

	vmcs_write16(GUEST_TR_SELECTOR, 0);
	vmcs_writel(GUEST_TR_BASE, 0);
	vmcs_write32(GUEST_TR_LIMIT, 0xffff);
	vmcs_write32(GUEST_TR_AR_BYTES, 0x008b);

	vmcs_write16(GUEST_LDTR_SELECTOR, 0);
	vmcs_writel(GUEST_LDTR_BASE, 0);
	vmcs_write32(GUEST_LDTR_LIMIT, 0xffff);
	vmcs_write32(GUEST_LDTR_AR_BYTES, 0x00082);

	vmcs_write32(GUEST_SYSENTER_CS, 0);
	vmcs_writel(GUEST_SYSENTER_ESP, 0);
	vmcs_writel(GUEST_SYSENTER_EIP, 0);

	vmcs_writel(GUEST_RFLAGS, 0x02);
2469
	if (kvm_vcpu_is_bsp(&vmx->vcpu))
2470
		kvm_rip_write(vcpu, 0xfff0);
2471
	else
2472 2473
		kvm_rip_write(vcpu, 0);
	kvm_register_write(vcpu, VCPU_REGS_RSP, 0);
2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491

	vmcs_writel(GUEST_DR7, 0x400);

	vmcs_writel(GUEST_GDTR_BASE, 0);
	vmcs_write32(GUEST_GDTR_LIMIT, 0xffff);

	vmcs_writel(GUEST_IDTR_BASE, 0);
	vmcs_write32(GUEST_IDTR_LIMIT, 0xffff);

	vmcs_write32(GUEST_ACTIVITY_STATE, 0);
	vmcs_write32(GUEST_INTERRUPTIBILITY_INFO, 0);
	vmcs_write32(GUEST_PENDING_DBG_EXCEPTIONS, 0);

	/* Special registers */
	vmcs_write64(GUEST_IA32_DEBUGCTL, 0);

	setup_msrs(vmx);

A
Avi Kivity 已提交
2492 2493
	vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, 0);  /* 22.2.1 */

2494 2495 2496 2497
	if (cpu_has_vmx_tpr_shadow()) {
		vmcs_write64(VIRTUAL_APIC_PAGE_ADDR, 0);
		if (vm_need_tpr_shadow(vmx->vcpu.kvm))
			vmcs_write64(VIRTUAL_APIC_PAGE_ADDR,
2498
				page_to_phys(vmx->vcpu.arch.apic->regs_page));
2499 2500 2501 2502 2503
		vmcs_write32(TPR_THRESHOLD, 0);
	}

	if (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm))
		vmcs_write64(APIC_ACCESS_ADDR,
2504
			     page_to_phys(vmx->vcpu.kvm->arch.apic_access_page));
A
Avi Kivity 已提交
2505

2506 2507 2508
	if (vmx->vpid != 0)
		vmcs_write16(VIRTUAL_PROCESSOR_ID, vmx->vpid);

2509 2510
	vmx->vcpu.arch.cr0 = 0x60000010;
	vmx_set_cr0(&vmx->vcpu, vmx->vcpu.arch.cr0); /* enter rmode */
R
Rusty Russell 已提交
2511 2512 2513 2514
	vmx_set_cr4(&vmx->vcpu, 0);
	vmx_set_efer(&vmx->vcpu, 0);
	vmx_fpu_activate(&vmx->vcpu);
	update_exception_bitmap(&vmx->vcpu);
A
Avi Kivity 已提交
2515

2516 2517
	vpid_sync_vcpu_all(vmx);

2518
	ret = 0;
A
Avi Kivity 已提交
2519

2520 2521 2522
	/* HACK: Don't enable emulation on guest boot/reset */
	vmx->emulation_required = 0;

A
Avi Kivity 已提交
2523
out:
2524
	up_read(&vcpu->kvm->slots_lock);
A
Avi Kivity 已提交
2525 2526 2527
	return ret;
}

2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550
static void enable_irq_window(struct kvm_vcpu *vcpu)
{
	u32 cpu_based_vm_exec_control;

	cpu_based_vm_exec_control = vmcs_read32(CPU_BASED_VM_EXEC_CONTROL);
	cpu_based_vm_exec_control |= CPU_BASED_VIRTUAL_INTR_PENDING;
	vmcs_write32(CPU_BASED_VM_EXEC_CONTROL, cpu_based_vm_exec_control);
}

static void enable_nmi_window(struct kvm_vcpu *vcpu)
{
	u32 cpu_based_vm_exec_control;

	if (!cpu_has_virtual_nmis()) {
		enable_irq_window(vcpu);
		return;
	}

	cpu_based_vm_exec_control = vmcs_read32(CPU_BASED_VM_EXEC_CONTROL);
	cpu_based_vm_exec_control |= CPU_BASED_VIRTUAL_NMI_PENDING;
	vmcs_write32(CPU_BASED_VM_EXEC_CONTROL, cpu_based_vm_exec_control);
}

2551
static void vmx_inject_irq(struct kvm_vcpu *vcpu)
2552
{
2553
	struct vcpu_vmx *vmx = to_vmx(vcpu);
2554 2555
	uint32_t intr;
	int irq = vcpu->arch.interrupt.nr;
2556

2557
	trace_kvm_inj_virq(irq);
F
Feng (Eric) Liu 已提交
2558

2559
	++vcpu->stat.irq_injections;
2560
	if (vmx->rmode.vm86_active) {
2561 2562
		vmx->rmode.irq.pending = true;
		vmx->rmode.irq.vector = irq;
2563
		vmx->rmode.irq.rip = kvm_rip_read(vcpu);
2564 2565 2566
		if (vcpu->arch.interrupt.soft)
			vmx->rmode.irq.rip +=
				vmx->vcpu.arch.event_exit_inst_len;
2567 2568 2569
		vmcs_write32(VM_ENTRY_INTR_INFO_FIELD,
			     irq | INTR_TYPE_SOFT_INTR | INTR_INFO_VALID_MASK);
		vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1);
2570
		kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1);
2571 2572
		return;
	}
2573 2574 2575 2576 2577 2578 2579 2580
	intr = irq | INTR_INFO_VALID_MASK;
	if (vcpu->arch.interrupt.soft) {
		intr |= INTR_TYPE_SOFT_INTR;
		vmcs_write32(VM_ENTRY_INSTRUCTION_LEN,
			     vmx->vcpu.arch.event_exit_inst_len);
	} else
		intr |= INTR_TYPE_EXT_INTR;
	vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr);
2581 2582
}

2583 2584
static void vmx_inject_nmi(struct kvm_vcpu *vcpu)
{
J
Jan Kiszka 已提交
2585 2586
	struct vcpu_vmx *vmx = to_vmx(vcpu);

2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599
	if (!cpu_has_virtual_nmis()) {
		/*
		 * Tracking the NMI-blocked state in software is built upon
		 * finding the next open IRQ window. This, in turn, depends on
		 * well-behaving guests: They have to keep IRQs disabled at
		 * least as long as the NMI handler runs. Otherwise we may
		 * cause NMI nesting, maybe breaking the guest. But as this is
		 * highly unlikely, we can live with the residual risk.
		 */
		vmx->soft_vnmi_blocked = 1;
		vmx->vnmi_blocked_time = 0;
	}

2600
	++vcpu->stat.nmi_injections;
2601
	if (vmx->rmode.vm86_active) {
J
Jan Kiszka 已提交
2602 2603 2604 2605 2606 2607 2608 2609 2610 2611
		vmx->rmode.irq.pending = true;
		vmx->rmode.irq.vector = NMI_VECTOR;
		vmx->rmode.irq.rip = kvm_rip_read(vcpu);
		vmcs_write32(VM_ENTRY_INTR_INFO_FIELD,
			     NMI_VECTOR | INTR_TYPE_SOFT_INTR |
			     INTR_INFO_VALID_MASK);
		vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1);
		kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1);
		return;
	}
2612 2613 2614 2615
	vmcs_write32(VM_ENTRY_INTR_INFO_FIELD,
			INTR_TYPE_NMI_INTR | INTR_INFO_VALID_MASK | NMI_VECTOR);
}

2616
static int vmx_nmi_allowed(struct kvm_vcpu *vcpu)
2617
{
2618
	if (!cpu_has_virtual_nmis() && to_vmx(vcpu)->soft_vnmi_blocked)
2619
		return 0;
2620

2621 2622 2623
	return	!(vmcs_read32(GUEST_INTERRUPTIBILITY_INFO) &
			(GUEST_INTR_STATE_STI | GUEST_INTR_STATE_MOV_SS |
				GUEST_INTR_STATE_NMI));
2624 2625
}

2626 2627
static int vmx_interrupt_allowed(struct kvm_vcpu *vcpu)
{
2628 2629 2630
	return (vmcs_readl(GUEST_RFLAGS) & X86_EFLAGS_IF) &&
		!(vmcs_read32(GUEST_INTERRUPTIBILITY_INFO) &
			(GUEST_INTR_STATE_STI | GUEST_INTR_STATE_MOV_SS));
2631 2632
}

2633 2634 2635 2636
static int vmx_set_tss_addr(struct kvm *kvm, unsigned int addr)
{
	int ret;
	struct kvm_userspace_memory_region tss_mem = {
2637
		.slot = TSS_PRIVATE_MEMSLOT,
2638 2639 2640 2641 2642 2643 2644 2645
		.guest_phys_addr = addr,
		.memory_size = PAGE_SIZE * 3,
		.flags = 0,
	};

	ret = kvm_set_memory_region(kvm, &tss_mem, 0);
	if (ret)
		return ret;
2646
	kvm->arch.tss_addr = addr;
2647 2648 2649
	return 0;
}

A
Avi Kivity 已提交
2650 2651 2652
static int handle_rmode_exception(struct kvm_vcpu *vcpu,
				  int vec, u32 err_code)
{
2653 2654 2655 2656 2657
	/*
	 * Instruction with address size override prefix opcode 0x67
	 * Cause the #SS fault with 0 error code in VM86 mode.
	 */
	if (((vec == GP_VECTOR) || (vec == SS_VECTOR)) && err_code == 0)
2658
		if (emulate_instruction(vcpu, NULL, 0, 0, 0) == EMULATE_DONE)
A
Avi Kivity 已提交
2659
			return 1;
2660 2661 2662 2663 2664 2665 2666
	/*
	 * Forward all other exceptions that are valid in real mode.
	 * FIXME: Breaks guest debugging in real mode, needs to be fixed with
	 *        the required debugging infrastructure rework.
	 */
	switch (vec) {
	case DB_VECTOR:
J
Jan Kiszka 已提交
2667 2668 2669 2670 2671
		if (vcpu->guest_debug &
		    (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP))
			return 0;
		kvm_queue_exception(vcpu, vec);
		return 1;
2672
	case BP_VECTOR:
J
Jan Kiszka 已提交
2673 2674 2675 2676
		if (vcpu->guest_debug & KVM_GUESTDBG_USE_SW_BP)
			return 0;
		/* fall through */
	case DE_VECTOR:
2677 2678 2679 2680 2681 2682 2683 2684 2685 2686
	case OF_VECTOR:
	case BR_VECTOR:
	case UD_VECTOR:
	case DF_VECTOR:
	case SS_VECTOR:
	case GP_VECTOR:
	case MF_VECTOR:
		kvm_queue_exception(vcpu, vec);
		return 1;
	}
A
Avi Kivity 已提交
2687 2688 2689
	return 0;
}

A
Andi Kleen 已提交
2690 2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714
/*
 * Trigger machine check on the host. We assume all the MSRs are already set up
 * by the CPU and that we still run on the same CPU as the MCE occurred on.
 * We pass a fake environment to the machine check handler because we want
 * the guest to be always treated like user space, no matter what context
 * it used internally.
 */
static void kvm_machine_check(void)
{
#if defined(CONFIG_X86_MCE) && defined(CONFIG_X86_64)
	struct pt_regs regs = {
		.cs = 3, /* Fake ring 3 no matter what the guest ran on */
		.flags = X86_EFLAGS_IF,
	};

	do_machine_check(&regs, 0);
#endif
}

static int handle_machine_check(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
	/* already handled by vcpu_run */
	return 1;
}

A
Avi Kivity 已提交
2715 2716
static int handle_exception(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
2717
	struct vcpu_vmx *vmx = to_vmx(vcpu);
J
Jan Kiszka 已提交
2718
	u32 intr_info, ex_no, error_code;
2719
	unsigned long cr2, rip, dr6;
A
Avi Kivity 已提交
2720 2721 2722
	u32 vect_info;
	enum emulation_result er;

2723
	vect_info = vmx->idt_vectoring_info;
A
Avi Kivity 已提交
2724 2725
	intr_info = vmcs_read32(VM_EXIT_INTR_INFO);

A
Andi Kleen 已提交
2726 2727 2728
	if (is_machine_check(intr_info))
		return handle_machine_check(vcpu, kvm_run);

A
Avi Kivity 已提交
2729
	if ((vect_info & VECTORING_INFO_VALID_MASK) &&
M
Mike Day 已提交
2730
						!is_page_fault(intr_info))
A
Avi Kivity 已提交
2731
		printk(KERN_ERR "%s: unexpected, vectoring info 0x%x "
2732
		       "intr info 0x%x\n", __func__, vect_info, intr_info);
A
Avi Kivity 已提交
2733

2734
	if ((intr_info & INTR_INFO_INTR_TYPE_MASK) == INTR_TYPE_NMI_INTR)
2735
		return 1;  /* already handled by vmx_vcpu_run() */
2736 2737

	if (is_no_device(intr_info)) {
2738
		vmx_fpu_activate(vcpu);
2739 2740 2741
		return 1;
	}

2742
	if (is_invalid_opcode(intr_info)) {
2743
		er = emulate_instruction(vcpu, kvm_run, 0, 0, EMULTYPE_TRAP_UD);
2744
		if (er != EMULATE_DONE)
2745
			kvm_queue_exception(vcpu, UD_VECTOR);
2746 2747 2748
		return 1;
	}

A
Avi Kivity 已提交
2749
	error_code = 0;
2750
	rip = kvm_rip_read(vcpu);
2751
	if (intr_info & INTR_INFO_DELIVER_CODE_MASK)
A
Avi Kivity 已提交
2752 2753
		error_code = vmcs_read32(VM_EXIT_INTR_ERROR_CODE);
	if (is_page_fault(intr_info)) {
2754
		/* EPT won't cause page fault directly */
2755
		if (enable_ept)
2756
			BUG();
A
Avi Kivity 已提交
2757
		cr2 = vmcs_readl(EXIT_QUALIFICATION);
2758 2759
		trace_kvm_page_fault(cr2, error_code);

2760
		if (kvm_event_needs_reinjection(vcpu))
2761
			kvm_mmu_unprotect_page_virt(vcpu, cr2);
2762
		return kvm_mmu_page_fault(vcpu, cr2, error_code);
A
Avi Kivity 已提交
2763 2764
	}

2765
	if (vmx->rmode.vm86_active &&
A
Avi Kivity 已提交
2766
	    handle_rmode_exception(vcpu, intr_info & INTR_INFO_VECTOR_MASK,
2767
								error_code)) {
2768 2769
		if (vcpu->arch.halt_request) {
			vcpu->arch.halt_request = 0;
2770 2771
			return kvm_emulate_halt(vcpu);
		}
A
Avi Kivity 已提交
2772
		return 1;
2773
	}
A
Avi Kivity 已提交
2774

J
Jan Kiszka 已提交
2775
	ex_no = intr_info & INTR_INFO_VECTOR_MASK;
2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788
	switch (ex_no) {
	case DB_VECTOR:
		dr6 = vmcs_readl(EXIT_QUALIFICATION);
		if (!(vcpu->guest_debug &
		      (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP))) {
			vcpu->arch.dr6 = dr6 | DR6_FIXED_1;
			kvm_queue_exception(vcpu, DB_VECTOR);
			return 1;
		}
		kvm_run->debug.arch.dr6 = dr6 | DR6_FIXED_1;
		kvm_run->debug.arch.dr7 = vmcs_readl(GUEST_DR7);
		/* fall through */
	case BP_VECTOR:
A
Avi Kivity 已提交
2789
		kvm_run->exit_reason = KVM_EXIT_DEBUG;
J
Jan Kiszka 已提交
2790 2791
		kvm_run->debug.arch.pc = vmcs_readl(GUEST_CS_BASE) + rip;
		kvm_run->debug.arch.exception = ex_no;
2792 2793
		break;
	default:
J
Jan Kiszka 已提交
2794 2795 2796
		kvm_run->exit_reason = KVM_EXIT_EXCEPTION;
		kvm_run->ex.exception = ex_no;
		kvm_run->ex.error_code = error_code;
2797
		break;
A
Avi Kivity 已提交
2798 2799 2800 2801 2802 2803 2804
	}
	return 0;
}

static int handle_external_interrupt(struct kvm_vcpu *vcpu,
				     struct kvm_run *kvm_run)
{
A
Avi Kivity 已提交
2805
	++vcpu->stat.irq_exits;
A
Avi Kivity 已提交
2806 2807 2808
	return 1;
}

2809 2810 2811 2812 2813
static int handle_triple_fault(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
	kvm_run->exit_reason = KVM_EXIT_SHUTDOWN;
	return 0;
}
A
Avi Kivity 已提交
2814 2815 2816

static int handle_io(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
2817
	unsigned long exit_qualification;
2818
	int size, in, string;
2819
	unsigned port;
A
Avi Kivity 已提交
2820

A
Avi Kivity 已提交
2821
	++vcpu->stat.io_exits;
2822
	exit_qualification = vmcs_readl(EXIT_QUALIFICATION);
2823
	string = (exit_qualification & 16) != 0;
2824 2825

	if (string) {
2826 2827
		if (emulate_instruction(vcpu,
					kvm_run, 0, 0, 0) == EMULATE_DO_MMIO)
2828 2829 2830 2831 2832 2833
			return 0;
		return 1;
	}

	size = (exit_qualification & 7) + 1;
	in = (exit_qualification & 8) != 0;
2834
	port = exit_qualification >> 16;
2835

2836
	skip_emulated_instruction(vcpu);
L
Laurent Vivier 已提交
2837
	return kvm_emulate_pio(vcpu, kvm_run, in, size, port);
A
Avi Kivity 已提交
2838 2839
}

I
Ingo Molnar 已提交
2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850
static void
vmx_patch_hypercall(struct kvm_vcpu *vcpu, unsigned char *hypercall)
{
	/*
	 * Patch in the VMCALL instruction:
	 */
	hypercall[0] = 0x0f;
	hypercall[1] = 0x01;
	hypercall[2] = 0xc1;
}

A
Avi Kivity 已提交
2851 2852
static int handle_cr(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
2853
	unsigned long exit_qualification, val;
A
Avi Kivity 已提交
2854 2855 2856
	int cr;
	int reg;

2857
	exit_qualification = vmcs_readl(EXIT_QUALIFICATION);
A
Avi Kivity 已提交
2858 2859 2860 2861
	cr = exit_qualification & 15;
	reg = (exit_qualification >> 8) & 15;
	switch ((exit_qualification >> 4) & 3) {
	case 0: /* mov to cr */
2862 2863
		val = kvm_register_read(vcpu, reg);
		trace_kvm_cr_write(cr, val);
A
Avi Kivity 已提交
2864 2865
		switch (cr) {
		case 0:
2866
			kvm_set_cr0(vcpu, val);
A
Avi Kivity 已提交
2867 2868 2869
			skip_emulated_instruction(vcpu);
			return 1;
		case 3:
2870
			kvm_set_cr3(vcpu, val);
A
Avi Kivity 已提交
2871 2872 2873
			skip_emulated_instruction(vcpu);
			return 1;
		case 4:
2874
			kvm_set_cr4(vcpu, val);
A
Avi Kivity 已提交
2875 2876
			skip_emulated_instruction(vcpu);
			return 1;
2877 2878 2879 2880 2881 2882 2883 2884 2885 2886 2887 2888
		case 8: {
				u8 cr8_prev = kvm_get_cr8(vcpu);
				u8 cr8 = kvm_register_read(vcpu, reg);
				kvm_set_cr8(vcpu, cr8);
				skip_emulated_instruction(vcpu);
				if (irqchip_in_kernel(vcpu->kvm))
					return 1;
				if (cr8_prev <= cr8)
					return 1;
				kvm_run->exit_reason = KVM_EXIT_SET_TPR;
				return 0;
			}
A
Avi Kivity 已提交
2889 2890
		};
		break;
2891
	case 2: /* clts */
2892
		vmx_fpu_deactivate(vcpu);
2893 2894
		vcpu->arch.cr0 &= ~X86_CR0_TS;
		vmcs_writel(CR0_READ_SHADOW, vcpu->arch.cr0);
2895
		vmx_fpu_activate(vcpu);
2896 2897
		skip_emulated_instruction(vcpu);
		return 1;
A
Avi Kivity 已提交
2898 2899 2900
	case 1: /*mov from cr*/
		switch (cr) {
		case 3:
2901
			kvm_register_write(vcpu, reg, vcpu->arch.cr3);
2902
			trace_kvm_cr_read(cr, vcpu->arch.cr3);
A
Avi Kivity 已提交
2903 2904 2905
			skip_emulated_instruction(vcpu);
			return 1;
		case 8:
2906 2907 2908
			val = kvm_get_cr8(vcpu);
			kvm_register_write(vcpu, reg, val);
			trace_kvm_cr_read(cr, val);
A
Avi Kivity 已提交
2909 2910 2911 2912 2913
			skip_emulated_instruction(vcpu);
			return 1;
		}
		break;
	case 3: /* lmsw */
2914
		kvm_lmsw(vcpu, (exit_qualification >> LMSW_SOURCE_DATA_SHIFT) & 0x0f);
A
Avi Kivity 已提交
2915 2916 2917 2918 2919 2920 2921

		skip_emulated_instruction(vcpu);
		return 1;
	default:
		break;
	}
	kvm_run->exit_reason = 0;
2922
	pr_unimpl(vcpu, "unhandled control register: op %d cr %d\n",
A
Avi Kivity 已提交
2923 2924 2925 2926 2927 2928
	       (int)(exit_qualification >> 4) & 3, cr);
	return 0;
}

static int handle_dr(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
2929
	unsigned long exit_qualification;
A
Avi Kivity 已提交
2930 2931 2932
	unsigned long val;
	int dr, reg;

2933 2934 2935 2936 2937 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 2953 2954 2955 2956 2957
	dr = vmcs_readl(GUEST_DR7);
	if (dr & DR7_GD) {
		/*
		 * As the vm-exit takes precedence over the debug trap, we
		 * need to emulate the latter, either for the host or the
		 * guest debugging itself.
		 */
		if (vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP) {
			kvm_run->debug.arch.dr6 = vcpu->arch.dr6;
			kvm_run->debug.arch.dr7 = dr;
			kvm_run->debug.arch.pc =
				vmcs_readl(GUEST_CS_BASE) +
				vmcs_readl(GUEST_RIP);
			kvm_run->debug.arch.exception = DB_VECTOR;
			kvm_run->exit_reason = KVM_EXIT_DEBUG;
			return 0;
		} else {
			vcpu->arch.dr7 &= ~DR7_GD;
			vcpu->arch.dr6 |= DR6_BD;
			vmcs_writel(GUEST_DR7, vcpu->arch.dr7);
			kvm_queue_exception(vcpu, DB_VECTOR);
			return 1;
		}
	}

2958
	exit_qualification = vmcs_readl(EXIT_QUALIFICATION);
2959 2960 2961
	dr = exit_qualification & DEBUG_REG_ACCESS_NUM;
	reg = DEBUG_REG_ACCESS_REG(exit_qualification);
	if (exit_qualification & TYPE_MOV_FROM_DR) {
A
Avi Kivity 已提交
2962
		switch (dr) {
2963 2964 2965
		case 0 ... 3:
			val = vcpu->arch.db[dr];
			break;
A
Avi Kivity 已提交
2966
		case 6:
2967
			val = vcpu->arch.dr6;
A
Avi Kivity 已提交
2968 2969
			break;
		case 7:
2970
			val = vcpu->arch.dr7;
A
Avi Kivity 已提交
2971 2972 2973 2974
			break;
		default:
			val = 0;
		}
2975
		kvm_register_write(vcpu, reg, val);
A
Avi Kivity 已提交
2976
	} else {
2977 2978 2979 2980 2981 2982 2983 2984 2985 2986 2987 2988 2989 2990 2991 2992 2993 2994 2995 2996 2997 2998 2999 3000 3001 3002 3003 3004 3005 3006 3007
		val = vcpu->arch.regs[reg];
		switch (dr) {
		case 0 ... 3:
			vcpu->arch.db[dr] = val;
			if (!(vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP))
				vcpu->arch.eff_db[dr] = val;
			break;
		case 4 ... 5:
			if (vcpu->arch.cr4 & X86_CR4_DE)
				kvm_queue_exception(vcpu, UD_VECTOR);
			break;
		case 6:
			if (val & 0xffffffff00000000ULL) {
				kvm_queue_exception(vcpu, GP_VECTOR);
				break;
			}
			vcpu->arch.dr6 = (val & DR6_VOLATILE) | DR6_FIXED_1;
			break;
		case 7:
			if (val & 0xffffffff00000000ULL) {
				kvm_queue_exception(vcpu, GP_VECTOR);
				break;
			}
			vcpu->arch.dr7 = (val & DR7_VOLATILE) | DR7_FIXED_1;
			if (!(vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP)) {
				vmcs_writel(GUEST_DR7, vcpu->arch.dr7);
				vcpu->arch.switch_db_regs =
					(val & DR7_BP_EN_MASK);
			}
			break;
		}
A
Avi Kivity 已提交
3008 3009 3010 3011 3012 3013 3014
	}
	skip_emulated_instruction(vcpu);
	return 1;
}

static int handle_cpuid(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
3015 3016
	kvm_emulate_cpuid(vcpu);
	return 1;
A
Avi Kivity 已提交
3017 3018 3019 3020
}

static int handle_rdmsr(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
3021
	u32 ecx = vcpu->arch.regs[VCPU_REGS_RCX];
A
Avi Kivity 已提交
3022 3023 3024
	u64 data;

	if (vmx_get_msr(vcpu, ecx, &data)) {
3025
		kvm_inject_gp(vcpu, 0);
A
Avi Kivity 已提交
3026 3027 3028
		return 1;
	}

3029
	trace_kvm_msr_read(ecx, data);
F
Feng (Eric) Liu 已提交
3030

A
Avi Kivity 已提交
3031
	/* FIXME: handling of bits 32:63 of rax, rdx */
3032 3033
	vcpu->arch.regs[VCPU_REGS_RAX] = data & -1u;
	vcpu->arch.regs[VCPU_REGS_RDX] = (data >> 32) & -1u;
A
Avi Kivity 已提交
3034 3035 3036 3037 3038 3039
	skip_emulated_instruction(vcpu);
	return 1;
}

static int handle_wrmsr(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
3040 3041 3042
	u32 ecx = vcpu->arch.regs[VCPU_REGS_RCX];
	u64 data = (vcpu->arch.regs[VCPU_REGS_RAX] & -1u)
		| ((u64)(vcpu->arch.regs[VCPU_REGS_RDX] & -1u) << 32);
A
Avi Kivity 已提交
3043

3044
	trace_kvm_msr_write(ecx, data);
F
Feng (Eric) Liu 已提交
3045

A
Avi Kivity 已提交
3046
	if (vmx_set_msr(vcpu, ecx, data) != 0) {
3047
		kvm_inject_gp(vcpu, 0);
A
Avi Kivity 已提交
3048 3049 3050 3051 3052 3053 3054
		return 1;
	}

	skip_emulated_instruction(vcpu);
	return 1;
}

3055 3056 3057 3058 3059 3060
static int handle_tpr_below_threshold(struct kvm_vcpu *vcpu,
				      struct kvm_run *kvm_run)
{
	return 1;
}

A
Avi Kivity 已提交
3061 3062 3063
static int handle_interrupt_window(struct kvm_vcpu *vcpu,
				   struct kvm_run *kvm_run)
{
3064 3065 3066 3067 3068 3069
	u32 cpu_based_vm_exec_control;

	/* clear pending irq */
	cpu_based_vm_exec_control = vmcs_read32(CPU_BASED_VM_EXEC_CONTROL);
	cpu_based_vm_exec_control &= ~CPU_BASED_VIRTUAL_INTR_PENDING;
	vmcs_write32(CPU_BASED_VM_EXEC_CONTROL, cpu_based_vm_exec_control);
F
Feng (Eric) Liu 已提交
3070

3071
	++vcpu->stat.irq_window_exits;
F
Feng (Eric) Liu 已提交
3072

3073 3074 3075 3076
	/*
	 * If the user space waits to inject interrupts, exit as soon as
	 * possible
	 */
3077 3078 3079
	if (!irqchip_in_kernel(vcpu->kvm) &&
	    kvm_run->request_interrupt_window &&
	    !kvm_cpu_has_interrupt(vcpu)) {
3080 3081 3082
		kvm_run->exit_reason = KVM_EXIT_IRQ_WINDOW_OPEN;
		return 0;
	}
A
Avi Kivity 已提交
3083 3084 3085 3086 3087 3088
	return 1;
}

static int handle_halt(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
	skip_emulated_instruction(vcpu);
3089
	return kvm_emulate_halt(vcpu);
A
Avi Kivity 已提交
3090 3091
}

3092 3093
static int handle_vmcall(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
3094
	skip_emulated_instruction(vcpu);
3095 3096
	kvm_emulate_hypercall(vcpu);
	return 1;
3097 3098
}

3099 3100 3101 3102 3103 3104
static int handle_vmx_insn(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
	kvm_queue_exception(vcpu, UD_VECTOR);
	return 1;
}

M
Marcelo Tosatti 已提交
3105 3106
static int handle_invlpg(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
3107
	unsigned long exit_qualification = vmcs_readl(EXIT_QUALIFICATION);
M
Marcelo Tosatti 已提交
3108 3109 3110 3111 3112 3113

	kvm_mmu_invlpg(vcpu, exit_qualification);
	skip_emulated_instruction(vcpu);
	return 1;
}

E
Eddie Dong 已提交
3114 3115 3116 3117 3118 3119 3120
static int handle_wbinvd(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
	skip_emulated_instruction(vcpu);
	/* TODO: Add support for VT-d/pass-through device */
	return 1;
}

3121 3122
static int handle_apic_access(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
3123
	unsigned long exit_qualification;
3124 3125 3126
	enum emulation_result er;
	unsigned long offset;

3127
	exit_qualification = vmcs_readl(EXIT_QUALIFICATION);
3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140
	offset = exit_qualification & 0xffful;

	er = emulate_instruction(vcpu, kvm_run, 0, 0, 0);

	if (er !=  EMULATE_DONE) {
		printk(KERN_ERR
		       "Fail to handle apic access vmexit! Offset is 0x%lx\n",
		       offset);
		return -ENOTSUPP;
	}
	return 1;
}

3141 3142
static int handle_task_switch(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
J
Jan Kiszka 已提交
3143
	struct vcpu_vmx *vmx = to_vmx(vcpu);
3144 3145
	unsigned long exit_qualification;
	u16 tss_selector;
3146 3147 3148 3149
	int reason, type, idt_v;

	idt_v = (vmx->idt_vectoring_info & VECTORING_INFO_VALID_MASK);
	type = (vmx->idt_vectoring_info & VECTORING_INFO_TYPE_MASK);
3150 3151 3152 3153

	exit_qualification = vmcs_readl(EXIT_QUALIFICATION);

	reason = (u32)exit_qualification >> 30;
3154 3155 3156 3157 3158 3159 3160 3161 3162
	if (reason == TASK_SWITCH_GATE && idt_v) {
		switch (type) {
		case INTR_TYPE_NMI_INTR:
			vcpu->arch.nmi_injected = false;
			if (cpu_has_virtual_nmis())
				vmcs_set_bits(GUEST_INTERRUPTIBILITY_INFO,
					      GUEST_INTR_STATE_NMI);
			break;
		case INTR_TYPE_EXT_INTR:
3163
		case INTR_TYPE_SOFT_INTR:
3164 3165 3166 3167 3168 3169 3170 3171 3172
			kvm_clear_interrupt_queue(vcpu);
			break;
		case INTR_TYPE_HARD_EXCEPTION:
		case INTR_TYPE_SOFT_EXCEPTION:
			kvm_clear_exception_queue(vcpu);
			break;
		default:
			break;
		}
J
Jan Kiszka 已提交
3173
	}
3174 3175
	tss_selector = exit_qualification;

3176 3177 3178 3179 3180
	if (!idt_v || (type != INTR_TYPE_HARD_EXCEPTION &&
		       type != INTR_TYPE_EXT_INTR &&
		       type != INTR_TYPE_NMI_INTR))
		skip_emulated_instruction(vcpu);

3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192
	if (!kvm_task_switch(vcpu, tss_selector, reason))
		return 0;

	/* clear all local breakpoint enable flags */
	vmcs_writel(GUEST_DR7, vmcs_readl(GUEST_DR7) & ~55);

	/*
	 * TODO: What about debug traps on tss switch?
	 *       Are we supposed to inject them and update dr6?
	 */

	return 1;
3193 3194
}

3195 3196
static int handle_ept_violation(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
3197
	unsigned long exit_qualification;
3198 3199 3200
	gpa_t gpa;
	int gla_validity;

3201
	exit_qualification = vmcs_readl(EXIT_QUALIFICATION);
3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212

	if (exit_qualification & (1 << 6)) {
		printk(KERN_ERR "EPT: GPA exceeds GAW!\n");
		return -ENOTSUPP;
	}

	gla_validity = (exit_qualification >> 7) & 0x3;
	if (gla_validity != 0x3 && gla_validity != 0x1 && gla_validity != 0) {
		printk(KERN_ERR "EPT: Handling EPT violation failed!\n");
		printk(KERN_ERR "EPT: GPA: 0x%lx, GVA: 0x%lx\n",
			(long unsigned int)vmcs_read64(GUEST_PHYSICAL_ADDRESS),
3213
			vmcs_readl(GUEST_LINEAR_ADDRESS));
3214 3215 3216
		printk(KERN_ERR "EPT: Exit qualification is 0x%lx\n",
			(long unsigned int)exit_qualification);
		kvm_run->exit_reason = KVM_EXIT_UNKNOWN;
3217 3218
		kvm_run->hw.hardware_exit_reason = EXIT_REASON_EPT_VIOLATION;
		return 0;
3219 3220 3221
	}

	gpa = vmcs_read64(GUEST_PHYSICAL_ADDRESS);
3222
	trace_kvm_page_fault(gpa, exit_qualification);
3223
	return kvm_mmu_page_fault(vcpu, gpa & PAGE_MASK, 0);
3224 3225
}

3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308
static u64 ept_rsvd_mask(u64 spte, int level)
{
	int i;
	u64 mask = 0;

	for (i = 51; i > boot_cpu_data.x86_phys_bits; i--)
		mask |= (1ULL << i);

	if (level > 2)
		/* bits 7:3 reserved */
		mask |= 0xf8;
	else if (level == 2) {
		if (spte & (1ULL << 7))
			/* 2MB ref, bits 20:12 reserved */
			mask |= 0x1ff000;
		else
			/* bits 6:3 reserved */
			mask |= 0x78;
	}

	return mask;
}

static void ept_misconfig_inspect_spte(struct kvm_vcpu *vcpu, u64 spte,
				       int level)
{
	printk(KERN_ERR "%s: spte 0x%llx level %d\n", __func__, spte, level);

	/* 010b (write-only) */
	WARN_ON((spte & 0x7) == 0x2);

	/* 110b (write/execute) */
	WARN_ON((spte & 0x7) == 0x6);

	/* 100b (execute-only) and value not supported by logical processor */
	if (!cpu_has_vmx_ept_execute_only())
		WARN_ON((spte & 0x7) == 0x4);

	/* not 000b */
	if ((spte & 0x7)) {
		u64 rsvd_bits = spte & ept_rsvd_mask(spte, level);

		if (rsvd_bits != 0) {
			printk(KERN_ERR "%s: rsvd_bits = 0x%llx\n",
					 __func__, rsvd_bits);
			WARN_ON(1);
		}

		if (level == 1 || (level == 2 && (spte & (1ULL << 7)))) {
			u64 ept_mem_type = (spte & 0x38) >> 3;

			if (ept_mem_type == 2 || ept_mem_type == 3 ||
			    ept_mem_type == 7) {
				printk(KERN_ERR "%s: ept_mem_type=0x%llx\n",
						__func__, ept_mem_type);
				WARN_ON(1);
			}
		}
	}
}

static int handle_ept_misconfig(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
	u64 sptes[4];
	int nr_sptes, i;
	gpa_t gpa;

	gpa = vmcs_read64(GUEST_PHYSICAL_ADDRESS);

	printk(KERN_ERR "EPT: Misconfiguration.\n");
	printk(KERN_ERR "EPT: GPA: 0x%llx\n", gpa);

	nr_sptes = kvm_mmu_get_spte_hierarchy(vcpu, gpa, sptes);

	for (i = PT64_ROOT_LEVEL; i > PT64_ROOT_LEVEL - nr_sptes; --i)
		ept_misconfig_inspect_spte(vcpu, sptes[i-1], i);

	kvm_run->exit_reason = KVM_EXIT_UNKNOWN;
	kvm_run->hw.hardware_exit_reason = EXIT_REASON_EPT_MISCONFIG;

	return 0;
}

3309 3310 3311 3312 3313 3314 3315 3316 3317 3318 3319 3320 3321
static int handle_nmi_window(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
	u32 cpu_based_vm_exec_control;

	/* clear pending NMI */
	cpu_based_vm_exec_control = vmcs_read32(CPU_BASED_VM_EXEC_CONTROL);
	cpu_based_vm_exec_control &= ~CPU_BASED_VIRTUAL_NMI_PENDING;
	vmcs_write32(CPU_BASED_VM_EXEC_CONTROL, cpu_based_vm_exec_control);
	++vcpu->stat.nmi_window_exits;

	return 1;
}

3322 3323 3324
static void handle_invalid_guest_state(struct kvm_vcpu *vcpu,
				struct kvm_run *kvm_run)
{
3325 3326
	struct vcpu_vmx *vmx = to_vmx(vcpu);
	enum emulation_result err = EMULATE_DONE;
3327 3328

	local_irq_enable();
3329
	preempt_enable();
3330 3331 3332 3333

	while (!guest_state_valid(vcpu)) {
		err = emulate_instruction(vcpu, kvm_run, 0, 0, 0);

3334 3335 3336 3337 3338
		if (err == EMULATE_DO_MMIO)
			break;

		if (err != EMULATE_DONE) {
			kvm_report_emulation_failure(vcpu, "emulation failure");
3339
			break;
3340 3341 3342 3343 3344 3345 3346 3347 3348
		}

		if (signal_pending(current))
			break;
		if (need_resched())
			schedule();
	}

	preempt_disable();
3349
	local_irq_disable();
3350 3351

	vmx->invalid_state_emulation_result = err;
3352 3353
}

A
Avi Kivity 已提交
3354 3355 3356 3357 3358 3359 3360 3361 3362
/*
 * The exit handlers return 1 if the exit was handled fully and guest execution
 * may resume.  Otherwise they set the kvm_run parameter to indicate what needs
 * to be done to userspace and return 0.
 */
static int (*kvm_vmx_exit_handlers[])(struct kvm_vcpu *vcpu,
				      struct kvm_run *kvm_run) = {
	[EXIT_REASON_EXCEPTION_NMI]           = handle_exception,
	[EXIT_REASON_EXTERNAL_INTERRUPT]      = handle_external_interrupt,
3363
	[EXIT_REASON_TRIPLE_FAULT]            = handle_triple_fault,
3364
	[EXIT_REASON_NMI_WINDOW]	      = handle_nmi_window,
A
Avi Kivity 已提交
3365 3366 3367 3368 3369 3370 3371 3372
	[EXIT_REASON_IO_INSTRUCTION]          = handle_io,
	[EXIT_REASON_CR_ACCESS]               = handle_cr,
	[EXIT_REASON_DR_ACCESS]               = handle_dr,
	[EXIT_REASON_CPUID]                   = handle_cpuid,
	[EXIT_REASON_MSR_READ]                = handle_rdmsr,
	[EXIT_REASON_MSR_WRITE]               = handle_wrmsr,
	[EXIT_REASON_PENDING_INTERRUPT]       = handle_interrupt_window,
	[EXIT_REASON_HLT]                     = handle_halt,
M
Marcelo Tosatti 已提交
3373
	[EXIT_REASON_INVLPG]		      = handle_invlpg,
3374
	[EXIT_REASON_VMCALL]                  = handle_vmcall,
3375 3376 3377 3378 3379 3380 3381 3382 3383
	[EXIT_REASON_VMCLEAR]	              = handle_vmx_insn,
	[EXIT_REASON_VMLAUNCH]                = handle_vmx_insn,
	[EXIT_REASON_VMPTRLD]                 = handle_vmx_insn,
	[EXIT_REASON_VMPTRST]                 = handle_vmx_insn,
	[EXIT_REASON_VMREAD]                  = handle_vmx_insn,
	[EXIT_REASON_VMRESUME]                = handle_vmx_insn,
	[EXIT_REASON_VMWRITE]                 = handle_vmx_insn,
	[EXIT_REASON_VMOFF]                   = handle_vmx_insn,
	[EXIT_REASON_VMON]                    = handle_vmx_insn,
3384 3385
	[EXIT_REASON_TPR_BELOW_THRESHOLD]     = handle_tpr_below_threshold,
	[EXIT_REASON_APIC_ACCESS]             = handle_apic_access,
E
Eddie Dong 已提交
3386
	[EXIT_REASON_WBINVD]                  = handle_wbinvd,
3387
	[EXIT_REASON_TASK_SWITCH]             = handle_task_switch,
A
Andi Kleen 已提交
3388
	[EXIT_REASON_MCE_DURING_VMENTRY]      = handle_machine_check,
3389 3390
	[EXIT_REASON_EPT_VIOLATION]	      = handle_ept_violation,
	[EXIT_REASON_EPT_MISCONFIG]           = handle_ept_misconfig,
A
Avi Kivity 已提交
3391 3392 3393
};

static const int kvm_vmx_max_exit_handlers =
3394
	ARRAY_SIZE(kvm_vmx_exit_handlers);
A
Avi Kivity 已提交
3395 3396 3397 3398 3399

/*
 * The guest has exited.  See if we can fix it or if we need userspace
 * assistance.
 */
3400
static int vmx_handle_exit(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu)
A
Avi Kivity 已提交
3401
{
3402
	struct vcpu_vmx *vmx = to_vmx(vcpu);
A
Andi Kleen 已提交
3403
	u32 exit_reason = vmx->exit_reason;
3404
	u32 vectoring_info = vmx->idt_vectoring_info;
3405

3406
	trace_kvm_exit(exit_reason, kvm_rip_read(vcpu));
F
Feng (Eric) Liu 已提交
3407

3408 3409
	/* If we need to emulate an MMIO from handle_invalid_guest_state
	 * we just return 0 */
3410 3411 3412
	if (vmx->emulation_required && emulate_invalid_guest_state) {
		if (guest_state_valid(vcpu))
			vmx->emulation_required = 0;
3413
		return vmx->invalid_state_emulation_result != EMULATE_DO_MMIO;
3414
	}
3415

3416 3417
	/* Access CR3 don't cause VMExit in paging mode, so we need
	 * to sync with guest real CR3. */
A
Avi Kivity 已提交
3418
	if (enable_ept && is_paging(vcpu))
3419 3420
		vcpu->arch.cr3 = vmcs_readl(GUEST_CR3);

3421 3422 3423 3424 3425 3426
	if (unlikely(vmx->fail)) {
		kvm_run->exit_reason = KVM_EXIT_FAIL_ENTRY;
		kvm_run->fail_entry.hardware_entry_failure_reason
			= vmcs_read32(VM_INSTRUCTION_ERROR);
		return 0;
	}
A
Avi Kivity 已提交
3427

M
Mike Day 已提交
3428
	if ((vectoring_info & VECTORING_INFO_VALID_MASK) &&
3429
			(exit_reason != EXIT_REASON_EXCEPTION_NMI &&
J
Jan Kiszka 已提交
3430 3431 3432 3433 3434
			exit_reason != EXIT_REASON_EPT_VIOLATION &&
			exit_reason != EXIT_REASON_TASK_SWITCH))
		printk(KERN_WARNING "%s: unexpected, valid vectoring info "
		       "(0x%x) and exit reason is 0x%x\n",
		       __func__, vectoring_info, exit_reason);
3435 3436

	if (unlikely(!cpu_has_virtual_nmis() && vmx->soft_vnmi_blocked)) {
3437
		if (vmx_interrupt_allowed(vcpu)) {
3438 3439
			vmx->soft_vnmi_blocked = 0;
		} else if (vmx->vnmi_blocked_time > 1000000000LL &&
3440
			   vcpu->arch.nmi_pending) {
3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453
			/*
			 * This CPU don't support us in finding the end of an
			 * NMI-blocked window if the guest runs with IRQs
			 * disabled. So we pull the trigger after 1 s of
			 * futile waiting, but inform the user about this.
			 */
			printk(KERN_WARNING "%s: Breaking out of NMI-blocked "
			       "state on VCPU %d after 1 s timeout\n",
			       __func__, vcpu->vcpu_id);
			vmx->soft_vnmi_blocked = 0;
		}
	}

A
Avi Kivity 已提交
3454 3455 3456 3457 3458 3459 3460 3461 3462 3463
	if (exit_reason < kvm_vmx_max_exit_handlers
	    && kvm_vmx_exit_handlers[exit_reason])
		return kvm_vmx_exit_handlers[exit_reason](vcpu, kvm_run);
	else {
		kvm_run->exit_reason = KVM_EXIT_UNKNOWN;
		kvm_run->hw.hardware_exit_reason = exit_reason;
	}
	return 0;
}

3464
static void update_cr8_intercept(struct kvm_vcpu *vcpu, int tpr, int irr)
3465
{
3466
	if (irr == -1 || tpr < irr) {
3467 3468 3469 3470
		vmcs_write32(TPR_THRESHOLD, 0);
		return;
	}

3471
	vmcs_write32(TPR_THRESHOLD, irr);
3472 3473
}

3474 3475 3476
static void vmx_complete_interrupts(struct vcpu_vmx *vmx)
{
	u32 exit_intr_info;
3477
	u32 idt_vectoring_info = vmx->idt_vectoring_info;
3478 3479
	bool unblock_nmi;
	u8 vector;
3480 3481
	int type;
	bool idtv_info_valid;
3482 3483

	exit_intr_info = vmcs_read32(VM_EXIT_INTR_INFO);
3484

A
Andi Kleen 已提交
3485 3486 3487 3488 3489 3490 3491 3492
	vmx->exit_reason = vmcs_read32(VM_EXIT_REASON);

	/* Handle machine checks before interrupts are enabled */
	if ((vmx->exit_reason == EXIT_REASON_MCE_DURING_VMENTRY)
	    || (vmx->exit_reason == EXIT_REASON_EXCEPTION_NMI
		&& is_machine_check(exit_intr_info)))
		kvm_machine_check();

3493 3494
	/* We need to handle NMIs before interrupts are enabled */
	if ((exit_intr_info & INTR_INFO_INTR_TYPE_MASK) == INTR_TYPE_NMI_INTR &&
3495
	    (exit_intr_info & INTR_INFO_VALID_MASK))
3496 3497 3498 3499
		asm("int $2");

	idtv_info_valid = idt_vectoring_info & VECTORING_INFO_VALID_MASK;

3500 3501 3502 3503
	if (cpu_has_virtual_nmis()) {
		unblock_nmi = (exit_intr_info & INTR_INFO_UNBLOCK_NMI) != 0;
		vector = exit_intr_info & INTR_INFO_VECTOR_MASK;
		/*
3504
		 * SDM 3: 27.7.1.2 (September 2008)
3505 3506
		 * Re-set bit "block by NMI" before VM entry if vmexit caused by
		 * a guest IRET fault.
3507 3508 3509 3510 3511
		 * SDM 3: 23.2.2 (September 2008)
		 * Bit 12 is undefined in any of the following cases:
		 *  If the VM exit sets the valid bit in the IDT-vectoring
		 *   information field.
		 *  If the VM exit is due to a double fault.
3512
		 */
3513 3514
		if ((exit_intr_info & INTR_INFO_VALID_MASK) && unblock_nmi &&
		    vector != DF_VECTOR && !idtv_info_valid)
3515 3516
			vmcs_set_bits(GUEST_INTERRUPTIBILITY_INFO,
				      GUEST_INTR_STATE_NMI);
3517 3518 3519
	} else if (unlikely(vmx->soft_vnmi_blocked))
		vmx->vnmi_blocked_time +=
			ktime_to_ns(ktime_sub(ktime_get(), vmx->entry_time));
3520

3521 3522 3523 3524 3525 3526 3527
	vmx->vcpu.arch.nmi_injected = false;
	kvm_clear_exception_queue(&vmx->vcpu);
	kvm_clear_interrupt_queue(&vmx->vcpu);

	if (!idtv_info_valid)
		return;

3528 3529
	vector = idt_vectoring_info & VECTORING_INFO_VECTOR_MASK;
	type = idt_vectoring_info & VECTORING_INFO_TYPE_MASK;
3530

3531
	switch (type) {
3532 3533
	case INTR_TYPE_NMI_INTR:
		vmx->vcpu.arch.nmi_injected = true;
3534
		/*
3535
		 * SDM 3: 27.7.1.2 (September 2008)
3536 3537
		 * Clear bit "block by NMI" before VM entry if a NMI
		 * delivery faulted.
3538
		 */
3539 3540 3541 3542
		vmcs_clear_bits(GUEST_INTERRUPTIBILITY_INFO,
				GUEST_INTR_STATE_NMI);
		break;
	case INTR_TYPE_SOFT_EXCEPTION:
3543 3544 3545 3546
		vmx->vcpu.arch.event_exit_inst_len =
			vmcs_read32(VM_EXIT_INSTRUCTION_LEN);
		/* fall through */
	case INTR_TYPE_HARD_EXCEPTION:
3547
		if (idt_vectoring_info & VECTORING_INFO_DELIVER_CODE_MASK) {
3548 3549
			u32 err = vmcs_read32(IDT_VECTORING_ERROR_CODE);
			kvm_queue_exception_e(&vmx->vcpu, vector, err);
3550 3551
		} else
			kvm_queue_exception(&vmx->vcpu, vector);
3552
		break;
3553 3554 3555 3556
	case INTR_TYPE_SOFT_INTR:
		vmx->vcpu.arch.event_exit_inst_len =
			vmcs_read32(VM_EXIT_INSTRUCTION_LEN);
		/* fall through */
3557
	case INTR_TYPE_EXT_INTR:
3558 3559
		kvm_queue_interrupt(&vmx->vcpu, vector,
			type == INTR_TYPE_SOFT_INTR);
3560 3561 3562
		break;
	default:
		break;
3563
	}
3564 3565
}

3566 3567 3568 3569 3570 3571 3572 3573 3574
/*
 * Failure to inject an interrupt should give us the information
 * in IDT_VECTORING_INFO_FIELD.  However, if the failure occurs
 * when fetching the interrupt redirection bitmap in the real-mode
 * tss, this doesn't happen.  So we do it ourselves.
 */
static void fixup_rmode_irq(struct vcpu_vmx *vmx)
{
	vmx->rmode.irq.pending = 0;
3575
	if (kvm_rip_read(&vmx->vcpu) + 1 != vmx->rmode.irq.rip)
3576
		return;
3577
	kvm_rip_write(&vmx->vcpu, vmx->rmode.irq.rip);
3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588
	if (vmx->idt_vectoring_info & VECTORING_INFO_VALID_MASK) {
		vmx->idt_vectoring_info &= ~VECTORING_INFO_TYPE_MASK;
		vmx->idt_vectoring_info |= INTR_TYPE_EXT_INTR;
		return;
	}
	vmx->idt_vectoring_info =
		VECTORING_INFO_VALID_MASK
		| INTR_TYPE_EXT_INTR
		| vmx->rmode.irq.vector;
}

3589 3590 3591 3592 3593 3594 3595 3596
#ifdef CONFIG_X86_64
#define R "r"
#define Q "q"
#else
#define R "e"
#define Q "l"
#endif

3597
static void vmx_vcpu_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
A
Avi Kivity 已提交
3598
{
3599
	struct vcpu_vmx *vmx = to_vmx(vcpu);
3600

3601 3602 3603 3604
	if (enable_ept && is_paging(vcpu)) {
		vmcs_writel(GUEST_CR3, vcpu->arch.cr3);
		ept_load_pdptrs(vcpu);
	}
3605 3606 3607 3608
	/* Record the guest's net vcpu time for enforced NMI injections. */
	if (unlikely(!cpu_has_virtual_nmis() && vmx->soft_vnmi_blocked))
		vmx->entry_time = ktime_get();

3609 3610 3611 3612 3613 3614
	/* Handle invalid guest state instead of entering VMX */
	if (vmx->emulation_required && emulate_invalid_guest_state) {
		handle_invalid_guest_state(vcpu, kvm_run);
		return;
	}

3615 3616 3617 3618 3619
	if (test_bit(VCPU_REGS_RSP, (unsigned long *)&vcpu->arch.regs_dirty))
		vmcs_writel(GUEST_RSP, vcpu->arch.regs[VCPU_REGS_RSP]);
	if (test_bit(VCPU_REGS_RIP, (unsigned long *)&vcpu->arch.regs_dirty))
		vmcs_writel(GUEST_RIP, vcpu->arch.regs[VCPU_REGS_RIP]);

3620 3621 3622 3623 3624 3625 3626 3627
	/* When single-stepping over STI and MOV SS, we must clear the
	 * corresponding interruptibility bits in the guest state. Otherwise
	 * vmentry fails as it then expects bit 14 (BS) in pending debug
	 * exceptions being set, but that's not correct for the guest debugging
	 * case. */
	if (vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP)
		vmx_set_interrupt_shadow(vcpu, 0);

3628 3629 3630 3631 3632
	/*
	 * Loading guest fpu may have cleared host cr0.ts
	 */
	vmcs_writel(HOST_CR0, read_cr0());

3633 3634
	set_debugreg(vcpu->arch.dr6, 6);

M
Mike Day 已提交
3635
	asm(
A
Avi Kivity 已提交
3636
		/* Store host registers */
3637 3638
		"push %%"R"dx; push %%"R"bp;"
		"push %%"R"cx \n\t"
3639 3640 3641
		"cmp %%"R"sp, %c[host_rsp](%0) \n\t"
		"je 1f \n\t"
		"mov %%"R"sp, %c[host_rsp](%0) \n\t"
3642
		__ex(ASM_VMX_VMWRITE_RSP_RDX) "\n\t"
3643
		"1: \n\t"
3644 3645 3646 3647 3648 3649 3650
		/* Reload cr2 if changed */
		"mov %c[cr2](%0), %%"R"ax \n\t"
		"mov %%cr2, %%"R"dx \n\t"
		"cmp %%"R"ax, %%"R"dx \n\t"
		"je 2f \n\t"
		"mov %%"R"ax, %%cr2 \n\t"
		"2: \n\t"
A
Avi Kivity 已提交
3651
		/* Check if vmlaunch of vmresume is needed */
3652
		"cmpl $0, %c[launched](%0) \n\t"
A
Avi Kivity 已提交
3653
		/* Load guest registers.  Don't clobber flags. */
3654 3655 3656 3657 3658 3659
		"mov %c[rax](%0), %%"R"ax \n\t"
		"mov %c[rbx](%0), %%"R"bx \n\t"
		"mov %c[rdx](%0), %%"R"dx \n\t"
		"mov %c[rsi](%0), %%"R"si \n\t"
		"mov %c[rdi](%0), %%"R"di \n\t"
		"mov %c[rbp](%0), %%"R"bp \n\t"
3660
#ifdef CONFIG_X86_64
3661 3662 3663 3664 3665 3666 3667 3668
		"mov %c[r8](%0),  %%r8  \n\t"
		"mov %c[r9](%0),  %%r9  \n\t"
		"mov %c[r10](%0), %%r10 \n\t"
		"mov %c[r11](%0), %%r11 \n\t"
		"mov %c[r12](%0), %%r12 \n\t"
		"mov %c[r13](%0), %%r13 \n\t"
		"mov %c[r14](%0), %%r14 \n\t"
		"mov %c[r15](%0), %%r15 \n\t"
A
Avi Kivity 已提交
3669
#endif
3670 3671
		"mov %c[rcx](%0), %%"R"cx \n\t" /* kills %0 (ecx) */

A
Avi Kivity 已提交
3672
		/* Enter guest mode */
3673
		"jne .Llaunched \n\t"
3674
		__ex(ASM_VMX_VMLAUNCH) "\n\t"
3675
		"jmp .Lkvm_vmx_return \n\t"
3676
		".Llaunched: " __ex(ASM_VMX_VMRESUME) "\n\t"
3677
		".Lkvm_vmx_return: "
A
Avi Kivity 已提交
3678
		/* Save guest registers, load host registers, keep flags */
3679 3680 3681 3682 3683 3684 3685 3686
		"xchg %0,     (%%"R"sp) \n\t"
		"mov %%"R"ax, %c[rax](%0) \n\t"
		"mov %%"R"bx, %c[rbx](%0) \n\t"
		"push"Q" (%%"R"sp); pop"Q" %c[rcx](%0) \n\t"
		"mov %%"R"dx, %c[rdx](%0) \n\t"
		"mov %%"R"si, %c[rsi](%0) \n\t"
		"mov %%"R"di, %c[rdi](%0) \n\t"
		"mov %%"R"bp, %c[rbp](%0) \n\t"
3687
#ifdef CONFIG_X86_64
3688 3689 3690 3691 3692 3693 3694 3695
		"mov %%r8,  %c[r8](%0) \n\t"
		"mov %%r9,  %c[r9](%0) \n\t"
		"mov %%r10, %c[r10](%0) \n\t"
		"mov %%r11, %c[r11](%0) \n\t"
		"mov %%r12, %c[r12](%0) \n\t"
		"mov %%r13, %c[r13](%0) \n\t"
		"mov %%r14, %c[r14](%0) \n\t"
		"mov %%r15, %c[r15](%0) \n\t"
A
Avi Kivity 已提交
3696
#endif
3697 3698 3699 3700
		"mov %%cr2, %%"R"ax   \n\t"
		"mov %%"R"ax, %c[cr2](%0) \n\t"

		"pop  %%"R"bp; pop  %%"R"bp; pop  %%"R"dx \n\t"
3701 3702 3703 3704
		"setbe %c[fail](%0) \n\t"
	      : : "c"(vmx), "d"((unsigned long)HOST_RSP),
		[launched]"i"(offsetof(struct vcpu_vmx, launched)),
		[fail]"i"(offsetof(struct vcpu_vmx, fail)),
3705
		[host_rsp]"i"(offsetof(struct vcpu_vmx, host_rsp)),
3706 3707 3708 3709 3710 3711 3712
		[rax]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_RAX])),
		[rbx]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_RBX])),
		[rcx]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_RCX])),
		[rdx]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_RDX])),
		[rsi]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_RSI])),
		[rdi]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_RDI])),
		[rbp]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_RBP])),
3713
#ifdef CONFIG_X86_64
3714 3715 3716 3717 3718 3719 3720 3721
		[r8]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_R8])),
		[r9]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_R9])),
		[r10]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_R10])),
		[r11]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_R11])),
		[r12]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_R12])),
		[r13]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_R13])),
		[r14]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_R14])),
		[r15]"i"(offsetof(struct vcpu_vmx, vcpu.arch.regs[VCPU_REGS_R15])),
A
Avi Kivity 已提交
3722
#endif
3723
		[cr2]"i"(offsetof(struct vcpu_vmx, vcpu.arch.cr2))
3724
	      : "cc", "memory"
3725
		, R"bx", R"di", R"si"
3726 3727 3728 3729
#ifdef CONFIG_X86_64
		, "r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15"
#endif
	      );
A
Avi Kivity 已提交
3730

A
Avi Kivity 已提交
3731 3732
	vcpu->arch.regs_avail = ~((1 << VCPU_REGS_RIP) | (1 << VCPU_REGS_RSP)
				  | (1 << VCPU_EXREG_PDPTR));
3733 3734
	vcpu->arch.regs_dirty = 0;

3735 3736
	get_debugreg(vcpu->arch.dr6, 6);

3737
	vmx->idt_vectoring_info = vmcs_read32(IDT_VECTORING_INFO_FIELD);
3738 3739
	if (vmx->rmode.irq.pending)
		fixup_rmode_irq(vmx);
3740

M
Mike Day 已提交
3741
	asm("mov %0, %%ds; mov %0, %%es" : : "r"(__USER_DS));
3742
	vmx->launched = 1;
3743

3744
	vmx_complete_interrupts(vmx);
A
Avi Kivity 已提交
3745 3746
}

3747 3748 3749
#undef R
#undef Q

A
Avi Kivity 已提交
3750 3751
static void vmx_free_vmcs(struct kvm_vcpu *vcpu)
{
3752 3753 3754
	struct vcpu_vmx *vmx = to_vmx(vcpu);

	if (vmx->vmcs) {
3755
		vcpu_clear(vmx);
3756 3757
		free_vmcs(vmx->vmcs);
		vmx->vmcs = NULL;
A
Avi Kivity 已提交
3758 3759 3760 3761 3762
	}
}

static void vmx_free_vcpu(struct kvm_vcpu *vcpu)
{
R
Rusty Russell 已提交
3763 3764
	struct vcpu_vmx *vmx = to_vmx(vcpu);

3765 3766 3767 3768
	spin_lock(&vmx_vpid_lock);
	if (vmx->vpid != 0)
		__clear_bit(vmx->vpid, vmx_vpid_bitmap);
	spin_unlock(&vmx_vpid_lock);
A
Avi Kivity 已提交
3769
	vmx_free_vmcs(vcpu);
R
Rusty Russell 已提交
3770 3771 3772
	kfree(vmx->host_msrs);
	kfree(vmx->guest_msrs);
	kvm_vcpu_uninit(vcpu);
3773
	kmem_cache_free(kvm_vcpu_cache, vmx);
A
Avi Kivity 已提交
3774 3775
}

R
Rusty Russell 已提交
3776
static struct kvm_vcpu *vmx_create_vcpu(struct kvm *kvm, unsigned int id)
A
Avi Kivity 已提交
3777
{
R
Rusty Russell 已提交
3778
	int err;
3779
	struct vcpu_vmx *vmx = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
3780
	int cpu;
A
Avi Kivity 已提交
3781

3782
	if (!vmx)
R
Rusty Russell 已提交
3783 3784
		return ERR_PTR(-ENOMEM);

3785 3786
	allocate_vpid(vmx);

R
Rusty Russell 已提交
3787 3788 3789
	err = kvm_vcpu_init(&vmx->vcpu, kvm, id);
	if (err)
		goto free_vcpu;
3790

3791
	vmx->guest_msrs = kmalloc(PAGE_SIZE, GFP_KERNEL);
R
Rusty Russell 已提交
3792 3793 3794 3795
	if (!vmx->guest_msrs) {
		err = -ENOMEM;
		goto uninit_vcpu;
	}
3796

3797 3798
	vmx->host_msrs = kmalloc(PAGE_SIZE, GFP_KERNEL);
	if (!vmx->host_msrs)
R
Rusty Russell 已提交
3799
		goto free_guest_msrs;
3800

3801 3802
	vmx->vmcs = alloc_vmcs();
	if (!vmx->vmcs)
R
Rusty Russell 已提交
3803
		goto free_msrs;
3804 3805 3806

	vmcs_clear(vmx->vmcs);

3807 3808
	cpu = get_cpu();
	vmx_vcpu_load(&vmx->vcpu, cpu);
R
Rusty Russell 已提交
3809
	err = vmx_vcpu_setup(vmx);
R
Rusty Russell 已提交
3810
	vmx_vcpu_put(&vmx->vcpu);
3811
	put_cpu();
R
Rusty Russell 已提交
3812 3813
	if (err)
		goto free_vmcs;
3814 3815 3816
	if (vm_need_virtualize_apic_accesses(kvm))
		if (alloc_apic_access_page(kvm) != 0)
			goto free_vmcs;
R
Rusty Russell 已提交
3817

3818 3819 3820 3821
	if (enable_ept) {
		if (!kvm->arch.ept_identity_map_addr)
			kvm->arch.ept_identity_map_addr =
				VMX_EPT_IDENTITY_PAGETABLE_ADDR;
3822 3823
		if (alloc_identity_pagetable(kvm) != 0)
			goto free_vmcs;
3824
	}
3825

R
Rusty Russell 已提交
3826 3827 3828 3829 3830 3831 3832 3833 3834 3835 3836
	return &vmx->vcpu;

free_vmcs:
	free_vmcs(vmx->vmcs);
free_msrs:
	kfree(vmx->host_msrs);
free_guest_msrs:
	kfree(vmx->guest_msrs);
uninit_vcpu:
	kvm_vcpu_uninit(&vmx->vcpu);
free_vcpu:
3837
	kmem_cache_free(kvm_vcpu_cache, vmx);
R
Rusty Russell 已提交
3838
	return ERR_PTR(err);
A
Avi Kivity 已提交
3839 3840
}

Y
Yang, Sheng 已提交
3841 3842 3843 3844 3845 3846 3847 3848 3849 3850 3851 3852 3853 3854
static void __init vmx_check_processor_compat(void *rtn)
{
	struct vmcs_config vmcs_conf;

	*(int *)rtn = 0;
	if (setup_vmcs_config(&vmcs_conf) < 0)
		*(int *)rtn = -EIO;
	if (memcmp(&vmcs_config, &vmcs_conf, sizeof(struct vmcs_config)) != 0) {
		printk(KERN_ERR "kvm: CPU %d feature inconsistency!\n",
				smp_processor_id());
		*(int *)rtn = -EIO;
	}
}

3855 3856 3857 3858 3859
static int get_ept_level(void)
{
	return VMX_EPT_DEFAULT_GAW + 1;
}

3860
static u64 vmx_get_mt_mask(struct kvm_vcpu *vcpu, gfn_t gfn, bool is_mmio)
S
Sheng Yang 已提交
3861
{
3862 3863
	u64 ret;

3864 3865 3866 3867 3868 3869 3870 3871 3872 3873 3874
	/* For VT-d and EPT combination
	 * 1. MMIO: always map as UC
	 * 2. EPT with VT-d:
	 *   a. VT-d without snooping control feature: can't guarantee the
	 *	result, try to trust guest.
	 *   b. VT-d with snooping control feature: snooping control feature of
	 *	VT-d engine can guarantee the cache correctness. Just set it
	 *	to WB to keep consistent with host. So the same as item 3.
	 * 3. EPT without VT-d: always map as WB and set IGMT=1 to keep
	 *    consistent with host MTRR
	 */
3875 3876
	if (is_mmio)
		ret = MTRR_TYPE_UNCACHABLE << VMX_EPT_MT_EPTE_SHIFT;
3877 3878 3879 3880
	else if (vcpu->kvm->arch.iommu_domain &&
		!(vcpu->kvm->arch.iommu_flags & KVM_IOMMU_CACHE_COHERENCY))
		ret = kvm_get_guest_memory_type(vcpu, gfn) <<
		      VMX_EPT_MT_EPTE_SHIFT;
3881
	else
3882 3883
		ret = (MTRR_TYPE_WRBACK << VMX_EPT_MT_EPTE_SHIFT)
			| VMX_EPT_IGMT_BIT;
3884 3885

	return ret;
S
Sheng Yang 已提交
3886 3887
}

3888 3889 3890 3891 3892 3893 3894 3895 3896 3897 3898 3899 3900 3901 3902 3903 3904 3905 3906 3907 3908 3909 3910
static const struct trace_print_flags vmx_exit_reasons_str[] = {
	{ EXIT_REASON_EXCEPTION_NMI,           "exception" },
	{ EXIT_REASON_EXTERNAL_INTERRUPT,      "ext_irq" },
	{ EXIT_REASON_TRIPLE_FAULT,            "triple_fault" },
	{ EXIT_REASON_NMI_WINDOW,              "nmi_window" },
	{ EXIT_REASON_IO_INSTRUCTION,          "io_instruction" },
	{ EXIT_REASON_CR_ACCESS,               "cr_access" },
	{ EXIT_REASON_DR_ACCESS,               "dr_access" },
	{ EXIT_REASON_CPUID,                   "cpuid" },
	{ EXIT_REASON_MSR_READ,                "rdmsr" },
	{ EXIT_REASON_MSR_WRITE,               "wrmsr" },
	{ EXIT_REASON_PENDING_INTERRUPT,       "interrupt_window" },
	{ EXIT_REASON_HLT,                     "halt" },
	{ EXIT_REASON_INVLPG,                  "invlpg" },
	{ EXIT_REASON_VMCALL,                  "hypercall" },
	{ EXIT_REASON_TPR_BELOW_THRESHOLD,     "tpr_below_thres" },
	{ EXIT_REASON_APIC_ACCESS,             "apic_access" },
	{ EXIT_REASON_WBINVD,                  "wbinvd" },
	{ EXIT_REASON_TASK_SWITCH,             "task_switch" },
	{ EXIT_REASON_EPT_VIOLATION,           "ept_violation" },
	{ -1, NULL }
};

3911
static struct kvm_x86_ops vmx_x86_ops = {
A
Avi Kivity 已提交
3912 3913 3914 3915
	.cpu_has_kvm_support = cpu_has_kvm_support,
	.disabled_by_bios = vmx_disabled_by_bios,
	.hardware_setup = hardware_setup,
	.hardware_unsetup = hardware_unsetup,
Y
Yang, Sheng 已提交
3916
	.check_processor_compatibility = vmx_check_processor_compat,
A
Avi Kivity 已提交
3917 3918
	.hardware_enable = hardware_enable,
	.hardware_disable = hardware_disable,
3919
	.cpu_has_accelerated_tpr = report_flexpriority,
A
Avi Kivity 已提交
3920 3921 3922

	.vcpu_create = vmx_create_vcpu,
	.vcpu_free = vmx_free_vcpu,
3923
	.vcpu_reset = vmx_vcpu_reset,
A
Avi Kivity 已提交
3924

3925
	.prepare_guest_switch = vmx_save_host_state,
A
Avi Kivity 已提交
3926 3927 3928 3929 3930 3931 3932 3933 3934
	.vcpu_load = vmx_vcpu_load,
	.vcpu_put = vmx_vcpu_put,

	.set_guest_debug = set_guest_debug,
	.get_msr = vmx_get_msr,
	.set_msr = vmx_set_msr,
	.get_segment_base = vmx_get_segment_base,
	.get_segment = vmx_get_segment,
	.set_segment = vmx_set_segment,
3935
	.get_cpl = vmx_get_cpl,
A
Avi Kivity 已提交
3936
	.get_cs_db_l_bits = vmx_get_cs_db_l_bits,
3937
	.decache_cr4_guest_bits = vmx_decache_cr4_guest_bits,
A
Avi Kivity 已提交
3938 3939 3940 3941 3942 3943 3944 3945
	.set_cr0 = vmx_set_cr0,
	.set_cr3 = vmx_set_cr3,
	.set_cr4 = vmx_set_cr4,
	.set_efer = vmx_set_efer,
	.get_idt = vmx_get_idt,
	.set_idt = vmx_set_idt,
	.get_gdt = vmx_get_gdt,
	.set_gdt = vmx_set_gdt,
3946
	.cache_reg = vmx_cache_reg,
A
Avi Kivity 已提交
3947 3948 3949 3950 3951 3952
	.get_rflags = vmx_get_rflags,
	.set_rflags = vmx_set_rflags,

	.tlb_flush = vmx_flush_tlb,

	.run = vmx_vcpu_run,
3953
	.handle_exit = vmx_handle_exit,
A
Avi Kivity 已提交
3954
	.skip_emulated_instruction = skip_emulated_instruction,
3955 3956
	.set_interrupt_shadow = vmx_set_interrupt_shadow,
	.get_interrupt_shadow = vmx_get_interrupt_shadow,
I
Ingo Molnar 已提交
3957
	.patch_hypercall = vmx_patch_hypercall,
E
Eddie Dong 已提交
3958
	.set_irq = vmx_inject_irq,
3959
	.set_nmi = vmx_inject_nmi,
3960
	.queue_exception = vmx_queue_exception,
3961
	.interrupt_allowed = vmx_interrupt_allowed,
3962 3963 3964 3965 3966
	.nmi_allowed = vmx_nmi_allowed,
	.enable_nmi_window = enable_nmi_window,
	.enable_irq_window = enable_irq_window,
	.update_cr8_intercept = update_cr8_intercept,

3967
	.set_tss_addr = vmx_set_tss_addr,
3968
	.get_tdp_level = get_ept_level,
3969
	.get_mt_mask = vmx_get_mt_mask,
3970 3971

	.exit_reasons_str = vmx_exit_reasons_str,
A
Avi Kivity 已提交
3972 3973 3974 3975
};

static int __init vmx_init(void)
{
3976 3977
	int r;

3978
	vmx_io_bitmap_a = (unsigned long *)__get_free_page(GFP_KERNEL);
3979 3980 3981
	if (!vmx_io_bitmap_a)
		return -ENOMEM;

3982
	vmx_io_bitmap_b = (unsigned long *)__get_free_page(GFP_KERNEL);
3983 3984 3985 3986 3987
	if (!vmx_io_bitmap_b) {
		r = -ENOMEM;
		goto out;
	}

3988 3989
	vmx_msr_bitmap_legacy = (unsigned long *)__get_free_page(GFP_KERNEL);
	if (!vmx_msr_bitmap_legacy) {
S
Sheng Yang 已提交
3990 3991 3992 3993
		r = -ENOMEM;
		goto out1;
	}

3994 3995 3996 3997 3998 3999
	vmx_msr_bitmap_longmode = (unsigned long *)__get_free_page(GFP_KERNEL);
	if (!vmx_msr_bitmap_longmode) {
		r = -ENOMEM;
		goto out2;
	}

4000 4001 4002 4003
	/*
	 * Allow direct access to the PC debug port (it is often used for I/O
	 * delays, but the vmexits simply slow things down).
	 */
4004 4005
	memset(vmx_io_bitmap_a, 0xff, PAGE_SIZE);
	clear_bit(0x80, vmx_io_bitmap_a);
4006

4007
	memset(vmx_io_bitmap_b, 0xff, PAGE_SIZE);
4008

4009 4010
	memset(vmx_msr_bitmap_legacy, 0xff, PAGE_SIZE);
	memset(vmx_msr_bitmap_longmode, 0xff, PAGE_SIZE);
S
Sheng Yang 已提交
4011

4012 4013
	set_bit(0, vmx_vpid_bitmap); /* 0 is reserved for host */

4014
	r = kvm_init(&vmx_x86_ops, sizeof(struct vcpu_vmx), THIS_MODULE);
4015
	if (r)
4016
		goto out3;
S
Sheng Yang 已提交
4017

4018 4019 4020 4021 4022 4023
	vmx_disable_intercept_for_msr(MSR_FS_BASE, false);
	vmx_disable_intercept_for_msr(MSR_GS_BASE, false);
	vmx_disable_intercept_for_msr(MSR_KERNEL_GS_BASE, true);
	vmx_disable_intercept_for_msr(MSR_IA32_SYSENTER_CS, false);
	vmx_disable_intercept_for_msr(MSR_IA32_SYSENTER_ESP, false);
	vmx_disable_intercept_for_msr(MSR_IA32_SYSENTER_EIP, false);
4024

4025
	if (enable_ept) {
4026
		bypass_guest_pf = 0;
4027
		kvm_mmu_set_base_ptes(VMX_EPT_READABLE_MASK |
4028
			VMX_EPT_WRITABLE_MASK);
4029
		kvm_mmu_set_mask_ptes(0ull, 0ull, 0ull, 0ull,
4030
				VMX_EPT_EXECUTABLE_MASK);
4031 4032 4033
		kvm_enable_tdp();
	} else
		kvm_disable_tdp();
4034

4035 4036 4037
	if (bypass_guest_pf)
		kvm_mmu_set_nonpresent_ptes(~0xffeull, 0ull);

4038 4039
	ept_sync_global();

4040 4041
	return 0;

4042 4043
out3:
	free_page((unsigned long)vmx_msr_bitmap_longmode);
S
Sheng Yang 已提交
4044
out2:
4045
	free_page((unsigned long)vmx_msr_bitmap_legacy);
4046
out1:
4047
	free_page((unsigned long)vmx_io_bitmap_b);
4048
out:
4049
	free_page((unsigned long)vmx_io_bitmap_a);
4050
	return r;
A
Avi Kivity 已提交
4051 4052 4053 4054
}

static void __exit vmx_exit(void)
{
4055 4056
	free_page((unsigned long)vmx_msr_bitmap_legacy);
	free_page((unsigned long)vmx_msr_bitmap_longmode);
4057 4058
	free_page((unsigned long)vmx_io_bitmap_b);
	free_page((unsigned long)vmx_io_bitmap_a);
4059

4060
	kvm_exit();
A
Avi Kivity 已提交
4061 4062 4063 4064
}

module_init(vmx_init)
module_exit(vmx_exit)