svm.h 17.7 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
// SPDX-License-Identifier: GPL-2.0-only
/*
 * Kernel-based Virtual Machine driver for Linux
 *
 * AMD SVM support
 *
 * Copyright (C) 2006 Qumranet, Inc.
 * Copyright 2010 Red Hat, Inc. and/or its affiliates.
 *
 * Authors:
 *   Yaniv Kamay  <yaniv@qumranet.com>
 *   Avi Kivity   <avi@qumranet.com>
 */

#ifndef __SVM_SVM_H
#define __SVM_SVM_H

#include <linux/kvm_types.h>
#include <linux/kvm_host.h>
20
#include <linux/bits.h>
21 22

#include <asm/svm.h>
23
#include <asm/sev-common.h>
24

25 26
#define __sme_page_pa(x) __sme_set(page_to_pfn(x) << PAGE_SHIFT)

27 28 29
#define	IOPM_SIZE PAGE_SIZE * 3
#define	MSRPM_SIZE PAGE_SIZE * 2

30
#define MAX_DIRECT_ACCESS_MSRS	20
31 32 33
#define MSRPM_OFFSETS	16
extern u32 msrpm_offsets[MSRPM_OFFSETS] __read_mostly;
extern bool npt_enabled;
34
extern bool intercept_smi;
35

36 37 38 39 40
/*
 * Clean bits in VMCB.
 * VMCB_ALL_CLEAN_MASK might also need to
 * be updated if this enum is modified.
 */
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
enum {
	VMCB_INTERCEPTS, /* Intercept vectors, TSC offset,
			    pause filter count */
	VMCB_PERM_MAP,   /* IOPM Base and MSRPM Base */
	VMCB_ASID,	 /* ASID */
	VMCB_INTR,	 /* int_ctl, int_vector */
	VMCB_NPT,        /* npt_en, nCR3, gPAT */
	VMCB_CR,	 /* CR0, CR3, CR4, EFER */
	VMCB_DR,         /* DR6, DR7 */
	VMCB_DT,         /* GDT, IDT */
	VMCB_SEG,        /* CS, DS, SS, ES, CPL */
	VMCB_CR2,        /* CR2 only */
	VMCB_LBR,        /* DBGCTL, BR_FROM, BR_TO, LAST_EX_FROM, LAST_EX_TO */
	VMCB_AVIC,       /* AVIC APIC_BAR, AVIC APIC_BACKING_PAGE,
			  * AVIC PHYSICAL_TABLE pointer,
			  * AVIC LOGICAL_TABLE pointer
			  */
58
	VMCB_SW = 31,    /* Reserved for hypervisor/software use */
59 60
};

61 62 63 64 65 66 67 68
#define VMCB_ALL_CLEAN_MASK (					\
	(1U << VMCB_INTERCEPTS) | (1U << VMCB_PERM_MAP) |	\
	(1U << VMCB_ASID) | (1U << VMCB_INTR) |			\
	(1U << VMCB_NPT) | (1U << VMCB_CR) | (1U << VMCB_DR) |	\
	(1U << VMCB_DT) | (1U << VMCB_SEG) | (1U << VMCB_CR2) |	\
	(1U << VMCB_LBR) | (1U << VMCB_AVIC) |			\
	(1U << VMCB_SW))

69 70 71 72 73
/* TPR and CR2 are always written before VMRUN */
#define VMCB_ALWAYS_DIRTY_MASK	((1U << VMCB_INTR) | (1U << VMCB_CR2))

struct kvm_sev_info {
	bool active;		/* SEV enabled guest */
74
	bool es_active;		/* SEV-ES enabled guest */
75 76 77 78 79
	unsigned int asid;	/* ASID used for this guest */
	unsigned int handle;	/* SEV firmware handle */
	int fd;			/* SEV device fd */
	unsigned long pages_locked; /* Number of pages locked */
	struct list_head regions_list;  /* List of registered regions */
80
	u64 ap_jump_table;	/* SEV-ES AP Jump Table address */
81
	struct kvm *enc_context_owner; /* Owner of copied encryption context */
82
	unsigned long num_mirrored_vms; /* Number of VMs sharing this ASID */
83
	struct misc_cg *misc_cg; /* For misc cgroup accounting */
84
	atomic_t migration_in_progress;
85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
};

struct kvm_svm {
	struct kvm kvm;

	/* Struct members for AVIC */
	u32 avic_vm_id;
	struct page *avic_logical_id_table_page;
	struct page *avic_physical_id_table_page;
	struct hlist_node hnode;

	struct kvm_sev_info sev_info;
};

struct kvm_vcpu;

101 102 103
struct kvm_vmcb_info {
	struct vmcb *ptr;
	unsigned long pa;
104
	int cpu;
105
	uint64_t asid_generation;
106 107
};

108 109 110 111 112 113 114 115 116
struct vmcb_save_area_cached {
	u64 efer;
	u64 cr4;
	u64 cr3;
	u64 cr0;
	u64 dr7;
	u64 dr6;
};

117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141
struct vmcb_ctrl_area_cached {
	u32 intercepts[MAX_INTERCEPT];
	u16 pause_filter_thresh;
	u16 pause_filter_count;
	u64 iopm_base_pa;
	u64 msrpm_base_pa;
	u64 tsc_offset;
	u32 asid;
	u8 tlb_ctl;
	u32 int_ctl;
	u32 int_vector;
	u32 int_state;
	u32 exit_code;
	u32 exit_code_hi;
	u64 exit_info_1;
	u64 exit_info_2;
	u32 exit_int_info;
	u32 exit_int_info_err;
	u64 nested_ctl;
	u32 event_inj;
	u32 event_inj_err;
	u64 nested_cr3;
	u64 virt_ext;
};

142
struct svm_nested_state {
143
	struct kvm_vmcb_info vmcb02;
144 145
	u64 hsave_msr;
	u64 vm_cr_msr;
146
	u64 vmcb12_gpa;
147
	u64 last_vmcb12_gpa;
148 149 150 151

	/* These are the merged vectors */
	u32 *msrpm;

152 153 154 155
	/* A VMRUN has started but has not yet been performed, so
	 * we cannot inject a nested vmexit yet.  */
	bool nested_run_pending;

156
	/* cache for control fields of the guest */
157
	struct vmcb_ctrl_area_cached ctl;
158

159 160 161 162 163 164
	/*
	 * Note: this struct is not kept up-to-date while L2 runs; it is only
	 * valid within nested_svm_vmrun.
	 */
	struct vmcb_save_area_cached save;

165
	bool initialized;
166 167
};

168 169 170 171 172 173 174 175 176
struct vcpu_sev_es_state {
	/* SEV-ES support */
	struct vmcb_save_area *vmsa;
	struct ghcb *ghcb;
	struct kvm_host_map ghcb_map;
	bool received_first_sipi;

	/* SEV-ES scratch area support */
	void *ghcb_sa;
177
	u32 ghcb_sa_len;
178 179 180 181
	bool ghcb_sa_sync;
	bool ghcb_sa_free;
};

182 183
struct vcpu_svm {
	struct kvm_vcpu vcpu;
184
	/* vmcb always points at current_vmcb->ptr, it's purely a shorthand. */
185
	struct vmcb *vmcb;
186 187
	struct kvm_vmcb_info vmcb01;
	struct kvm_vmcb_info *current_vmcb;
188
	struct svm_cpu_data *svm_data;
C
Cathy Avery 已提交
189
	u32 asid;
190 191
	u32 sysenter_esp_hi;
	u32 sysenter_eip_hi;
192 193 194 195 196 197 198
	uint64_t tsc_aux;

	u64 msr_decfg;

	u64 next_rip;

	u64 spec_ctrl;
199 200

	u64 tsc_ratio_msr;
201 202 203 204 205 206 207 208 209 210 211
	/*
	 * Contains guest-controlled bits of VIRT_SPEC_CTRL, which will be
	 * translated into the appropriate L2_CFG bits on the host to
	 * perform speculative control.
	 */
	u64 virt_spec_ctrl;

	u32 *msrpm;

	ulong nmi_iret_rip;

212
	struct svm_nested_state nested;
213 214 215 216 217 218 219 220

	bool nmi_singlestep;
	u64 nmi_singlestep_guest_rflags;

	unsigned int3_injected;
	unsigned long int3_rip;

	/* cached guest cpuid flags for faster access */
221 222
	bool nrips_enabled                : 1;
	bool tsc_scaling_enabled          : 1;
223 224 225 226 227 228 229 230 231 232 233 234 235 236 237

	u32 ldr_reg;
	u32 dfr_reg;
	struct page *avic_backing_page;
	u64 *avic_physical_id_cache;
	bool avic_is_running;

	/*
	 * Per-vcpu list of struct amd_svm_iommu_ir:
	 * This is used mainly to store interrupt remapping information used
	 * when update the vcpu affinity. This avoids the need to scan for
	 * IRTE and try to match ga_tag in the IOMMU driver.
	 */
	struct list_head ir_list;
	spinlock_t ir_list_lock;
238 239 240 241 242 243

	/* Save desired MSR intercept (read: pass-through) state */
	struct {
		DECLARE_BITMAP(read, MAX_DIRECT_ACCESS_MSRS);
		DECLARE_BITMAP(write, MAX_DIRECT_ACCESS_MSRS);
	} shadow_msr_intercept;
244

245
	struct vcpu_sev_es_state sev_es;
246 247

	bool guest_state_loaded;
248 249
};

250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267
struct svm_cpu_data {
	int cpu;

	u64 asid_generation;
	u32 max_asid;
	u32 next_asid;
	u32 min_asid;
	struct kvm_ldttss_desc *tss_desc;

	struct page *save_area;
	struct vmcb *current_vmcb;

	/* index = sev_asid, value = vmcb pointer */
	struct vmcb **sev_vmcbs;
};

DECLARE_PER_CPU(struct svm_cpu_data *, svm_data);

268 269
void recalc_intercepts(struct vcpu_svm *svm);

270
static __always_inline struct kvm_svm *to_kvm_svm(struct kvm *kvm)
271 272 273 274
{
	return container_of(kvm, struct kvm_svm, kvm);
}

275
static __always_inline bool sev_guest(struct kvm *kvm)
276 277 278 279 280 281 282 283 284 285
{
#ifdef CONFIG_KVM_AMD_SEV
	struct kvm_sev_info *sev = &to_kvm_svm(kvm)->sev_info;

	return sev->active;
#else
	return false;
#endif
}

286
static __always_inline bool sev_es_guest(struct kvm *kvm)
287 288 289 290
{
#ifdef CONFIG_KVM_AMD_SEV
	struct kvm_sev_info *sev = &to_kvm_svm(kvm)->sev_info;

291
	return sev->es_active && !WARN_ON_ONCE(!sev->active);
292 293 294 295 296
#else
	return false;
#endif
}

297
static inline void vmcb_mark_all_dirty(struct vmcb *vmcb)
298 299 300 301
{
	vmcb->control.clean = 0;
}

302
static inline void vmcb_mark_all_clean(struct vmcb *vmcb)
303
{
304
	vmcb->control.clean = VMCB_ALL_CLEAN_MASK
305 306 307
			       & ~VMCB_ALWAYS_DIRTY_MASK;
}

308 309 310 311 312
static inline bool vmcb_is_clean(struct vmcb *vmcb, int bit)
{
	return (vmcb->control.clean & (1 << bit));
}

313
static inline void vmcb_mark_dirty(struct vmcb *vmcb, int bit)
314 315 316 317
{
	vmcb->control.clean &= ~(1 << bit);
}

318 319 320 321 322
static inline bool vmcb_is_dirty(struct vmcb *vmcb, int bit)
{
        return !test_bit(bit, (unsigned long *)&vmcb->control.clean);
}

P
Peter Zijlstra 已提交
323
static __always_inline struct vcpu_svm *to_svm(struct kvm_vcpu *vcpu)
324 325 326 327
{
	return container_of(vcpu, struct vcpu_svm, vcpu);
}

328 329 330 331 332 333 334 335 336 337
/*
 * Only the PDPTRs are loaded on demand into the shadow MMU.  All other
 * fields are synchronized in handle_exit, because accessing the VMCB is cheap.
 *
 * CR3 might be out of date in the VMCB but it is not marked dirty; instead,
 * KVM_REQ_LOAD_MMU_PGD is always requested when the cached vcpu->arch.cr3
 * is changed.  svm_load_mmu_pgd() then syncs the new CR3 value into the VMCB.
 */
#define SVM_REGS_LAZY_LOAD_SET	(1 << VCPU_EXREG_PDPTR)

338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355
static inline void vmcb_set_intercept(struct vmcb_control_area *control, u32 bit)
{
	WARN_ON_ONCE(bit >= 32 * MAX_INTERCEPT);
	__set_bit(bit, (unsigned long *)&control->intercepts);
}

static inline void vmcb_clr_intercept(struct vmcb_control_area *control, u32 bit)
{
	WARN_ON_ONCE(bit >= 32 * MAX_INTERCEPT);
	__clear_bit(bit, (unsigned long *)&control->intercepts);
}

static inline bool vmcb_is_intercept(struct vmcb_control_area *control, u32 bit)
{
	WARN_ON_ONCE(bit >= 32 * MAX_INTERCEPT);
	return test_bit(bit, (unsigned long *)&control->intercepts);
}

356 357 358 359 360 361
static inline bool vmcb12_is_intercept(struct vmcb_ctrl_area_cached *control, u32 bit)
{
	WARN_ON_ONCE(bit >= 32 * MAX_INTERCEPT);
	return test_bit(bit, (unsigned long *)&control->intercepts);
}

362 363
static inline void set_dr_intercepts(struct vcpu_svm *svm)
{
364
	struct vmcb *vmcb = svm->vmcb01.ptr;
365

366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382
	if (!sev_es_guest(svm->vcpu.kvm)) {
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR0_READ);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR1_READ);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR2_READ);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR3_READ);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR4_READ);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR5_READ);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR6_READ);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR0_WRITE);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR1_WRITE);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR2_WRITE);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR3_WRITE);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR4_WRITE);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR5_WRITE);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR6_WRITE);
	}

383 384
	vmcb_set_intercept(&vmcb->control, INTERCEPT_DR7_READ);
	vmcb_set_intercept(&vmcb->control, INTERCEPT_DR7_WRITE);
385 386 387 388 389 390

	recalc_intercepts(svm);
}

static inline void clr_dr_intercepts(struct vcpu_svm *svm)
{
391
	struct vmcb *vmcb = svm->vmcb01.ptr;
392

393
	vmcb->control.intercepts[INTERCEPT_DR] = 0;
394

395 396 397 398 399 400
	/* DR7 access must remain intercepted for an SEV-ES guest */
	if (sev_es_guest(svm->vcpu.kvm)) {
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR7_READ);
		vmcb_set_intercept(&vmcb->control, INTERCEPT_DR7_WRITE);
	}

401 402 403
	recalc_intercepts(svm);
}

404
static inline void set_exception_intercept(struct vcpu_svm *svm, u32 bit)
405
{
406
	struct vmcb *vmcb = svm->vmcb01.ptr;
407

408 409
	WARN_ON_ONCE(bit >= 32);
	vmcb_set_intercept(&vmcb->control, INTERCEPT_EXCEPTION_OFFSET + bit);
410 411 412 413

	recalc_intercepts(svm);
}

414
static inline void clr_exception_intercept(struct vcpu_svm *svm, u32 bit)
415
{
416
	struct vmcb *vmcb = svm->vmcb01.ptr;
417

418 419
	WARN_ON_ONCE(bit >= 32);
	vmcb_clr_intercept(&vmcb->control, INTERCEPT_EXCEPTION_OFFSET + bit);
420 421 422 423

	recalc_intercepts(svm);
}

424
static inline void svm_set_intercept(struct vcpu_svm *svm, int bit)
425
{
426
	struct vmcb *vmcb = svm->vmcb01.ptr;
427

428
	vmcb_set_intercept(&vmcb->control, bit);
429 430 431 432

	recalc_intercepts(svm);
}

433
static inline void svm_clr_intercept(struct vcpu_svm *svm, int bit)
434
{
435
	struct vmcb *vmcb = svm->vmcb01.ptr;
436

437
	vmcb_clr_intercept(&vmcb->control, bit);
438 439 440 441

	recalc_intercepts(svm);
}

442
static inline bool svm_is_intercept(struct vcpu_svm *svm, int bit)
443
{
444
	return vmcb_is_intercept(&svm->vmcb->control, bit);
445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476
}

static inline bool vgif_enabled(struct vcpu_svm *svm)
{
	return !!(svm->vmcb->control.int_ctl & V_GIF_ENABLE_MASK);
}

static inline void enable_gif(struct vcpu_svm *svm)
{
	if (vgif_enabled(svm))
		svm->vmcb->control.int_ctl |= V_GIF_MASK;
	else
		svm->vcpu.arch.hflags |= HF_GIF_MASK;
}

static inline void disable_gif(struct vcpu_svm *svm)
{
	if (vgif_enabled(svm))
		svm->vmcb->control.int_ctl &= ~V_GIF_MASK;
	else
		svm->vcpu.arch.hflags &= ~HF_GIF_MASK;
}

static inline bool gif_set(struct vcpu_svm *svm)
{
	if (vgif_enabled(svm))
		return !!(svm->vmcb->control.int_ctl & V_GIF_MASK);
	else
		return !!(svm->vcpu.arch.hflags & HF_GIF_MASK);
}

/* svm.c */
477
#define MSR_INVALID				0xffffffffU
478

479
extern bool dump_invalid_vmcb;
480

481
u32 svm_msrpm_offset(u32 msr);
482 483 484 485
u32 *svm_vcpu_alloc_msrpm(void);
void svm_vcpu_init_msrpm(struct kvm_vcpu *vcpu, u32 *msrpm);
void svm_vcpu_free_msrpm(u32 *msrpm);

486
int svm_set_efer(struct kvm_vcpu *vcpu, u64 efer);
487
void svm_set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0);
488
void svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4);
489
void svm_flush_tlb(struct kvm_vcpu *vcpu);
490
void disable_nmi_singlestep(struct vcpu_svm *svm);
491 492 493
bool svm_smi_blocked(struct kvm_vcpu *vcpu);
bool svm_nmi_blocked(struct kvm_vcpu *vcpu);
bool svm_interrupt_blocked(struct kvm_vcpu *vcpu);
P
Paolo Bonzini 已提交
494
void svm_set_gif(struct vcpu_svm *svm, bool value);
495
int svm_invoke_exit_handler(struct kvm_vcpu *vcpu, u64 exit_code);
496 497
void set_msr_interception(struct kvm_vcpu *vcpu, u32 *msrpm, u32 msr,
			  int read, int write);
498 499 500 501 502 503 504

/* nested.c */

#define NESTED_EXIT_HOST	0	/* Exit handled on host level */
#define NESTED_EXIT_DONE	1	/* Exit caused nested vmexit  */
#define NESTED_EXIT_CONTINUE	2	/* Further checks needed      */

505
static inline bool nested_svm_virtualize_tpr(struct kvm_vcpu *vcpu)
506
{
P
Paolo Bonzini 已提交
507 508 509
	struct vcpu_svm *svm = to_svm(vcpu);

	return is_guest_mode(vcpu) && (svm->nested.ctl.int_ctl & V_INTR_MASKING_MASK);
510 511
}

512 513
static inline bool nested_exit_on_smi(struct vcpu_svm *svm)
{
514
	return vmcb12_is_intercept(&svm->nested.ctl, INTERCEPT_SMI);
515 516
}

517 518
static inline bool nested_exit_on_intr(struct vcpu_svm *svm)
{
519
	return vmcb12_is_intercept(&svm->nested.ctl, INTERCEPT_INTR);
520 521
}

522 523
static inline bool nested_exit_on_nmi(struct vcpu_svm *svm)
{
524
	return vmcb12_is_intercept(&svm->nested.ctl, INTERCEPT_NMI);
525 526
}

527 528
int enter_svm_guest_mode(struct kvm_vcpu *vcpu,
			 u64 vmcb_gpa, struct vmcb *vmcb12, bool from_vmrun);
529
void svm_leave_nested(struct vcpu_svm *svm);
530 531
void svm_free_nested(struct vcpu_svm *svm);
int svm_allocate_nested(struct vcpu_svm *svm);
532
int nested_svm_vmrun(struct kvm_vcpu *vcpu);
533 534 535
void svm_copy_vmrun_state(struct vmcb_save_area *to_save,
			  struct vmcb_save_area *from_save);
void svm_copy_vmloadsave_state(struct vmcb *to_vmcb, struct vmcb *from_vmcb);
536
int nested_svm_vmexit(struct vcpu_svm *svm);
537 538 539 540 541 542 543 544 545

static inline int nested_svm_simple_vmexit(struct vcpu_svm *svm, u32 exit_code)
{
	svm->vmcb->control.exit_code   = exit_code;
	svm->vmcb->control.exit_info_1 = 0;
	svm->vmcb->control.exit_info_2 = 0;
	return nested_svm_vmexit(svm);
}

546
int nested_svm_exit_handled(struct vcpu_svm *svm);
547
int nested_svm_check_permissions(struct kvm_vcpu *vcpu);
548 549 550
int nested_svm_check_exception(struct vcpu_svm *svm, unsigned nr,
			       bool has_error_code, u32 error_code);
int nested_svm_exit_special(struct vcpu_svm *svm);
551 552
void nested_svm_update_tsc_ratio_msr(struct kvm_vcpu *vcpu);
void svm_write_tsc_multiplier(struct kvm_vcpu *vcpu, u64 multiplier);
553 554
void nested_copy_vmcb_control_to_cache(struct vcpu_svm *svm,
				       struct vmcb_control_area *control);
555 556
void nested_copy_vmcb_save_to_cache(struct vcpu_svm *svm,
				    struct vmcb_save_area *save);
557
void nested_sync_control_from_vmcb02(struct vcpu_svm *svm);
558 559
void nested_vmcb02_compute_g_pat(struct vcpu_svm *svm);
void svm_switch_vmcb(struct vcpu_svm *svm, struct kvm_vmcb_info *target_vmcb);
560

561 562
extern struct kvm_x86_nested_ops svm_nested_ops;

563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579
/* avic.c */

#define AVIC_LOGICAL_ID_ENTRY_GUEST_PHYSICAL_ID_MASK	(0xFF)
#define AVIC_LOGICAL_ID_ENTRY_VALID_BIT			31
#define AVIC_LOGICAL_ID_ENTRY_VALID_MASK		(1 << 31)

#define AVIC_PHYSICAL_ID_ENTRY_HOST_PHYSICAL_ID_MASK	(0xFFULL)
#define AVIC_PHYSICAL_ID_ENTRY_BACKING_PAGE_MASK	(0xFFFFFFFFFFULL << 12)
#define AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK		(1ULL << 62)
#define AVIC_PHYSICAL_ID_ENTRY_VALID_MASK		(1ULL << 63)

#define VMCB_AVIC_APIC_BAR_MASK		0xFFFFFFFFFF000ULL

int avic_ga_log_notifier(u32 ga_tag);
void avic_vm_destroy(struct kvm *kvm);
int avic_vm_init(struct kvm *kvm);
void avic_init_vmcb(struct vcpu_svm *svm);
580 581
int avic_incomplete_ipi_interception(struct kvm_vcpu *vcpu);
int avic_unaccelerated_access_interception(struct kvm_vcpu *vcpu);
582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598
int avic_init_vcpu(struct vcpu_svm *svm);
void avic_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
void avic_vcpu_put(struct kvm_vcpu *vcpu);
void avic_post_state_restore(struct kvm_vcpu *vcpu);
void svm_set_virtual_apic_mode(struct kvm_vcpu *vcpu);
void svm_refresh_apicv_exec_ctrl(struct kvm_vcpu *vcpu);
bool svm_check_apicv_inhibit_reasons(ulong bit);
void svm_load_eoi_exitmap(struct kvm_vcpu *vcpu, u64 *eoi_exit_bitmap);
void svm_hwapic_irr_update(struct kvm_vcpu *vcpu, int max_irr);
void svm_hwapic_isr_update(struct kvm_vcpu *vcpu, int max_isr);
int svm_deliver_avic_intr(struct kvm_vcpu *vcpu, int vec);
bool svm_dy_apicv_has_pending_interrupt(struct kvm_vcpu *vcpu);
int svm_update_pi_irte(struct kvm *kvm, unsigned int host_irq,
		       uint32_t guest_irq, bool set);
void svm_vcpu_blocking(struct kvm_vcpu *vcpu);
void svm_vcpu_unblocking(struct kvm_vcpu *vcpu);

599 600
/* sev.c */

601 602 603
#define GHCB_VERSION_MAX	1ULL
#define GHCB_VERSION_MIN	1ULL

604

605 606 607 608 609 610 611 612
extern unsigned int max_sev_asid;

void sev_vm_destroy(struct kvm *kvm);
int svm_mem_enc_op(struct kvm *kvm, void __user *argp);
int svm_register_enc_region(struct kvm *kvm,
			    struct kvm_enc_region *range);
int svm_unregister_enc_region(struct kvm *kvm,
			      struct kvm_enc_region *range);
613
int svm_vm_copy_asid_from(struct kvm *kvm, unsigned int source_fd);
614
int svm_vm_migrate_from(struct kvm *kvm, unsigned int source_fd);
615
void pre_sev_run(struct vcpu_svm *svm, int cpu);
616
void __init sev_set_cpu_caps(void);
617
void __init sev_hardware_setup(void);
618
void sev_hardware_teardown(void);
619
int sev_cpu_init(struct svm_cpu_data *sd);
620
void sev_free_vcpu(struct kvm_vcpu *vcpu);
621
int sev_handle_vmgexit(struct kvm_vcpu *vcpu);
622
int sev_es_string_io(struct vcpu_svm *svm, int size, unsigned int port, int in);
623
void sev_es_init_vmcb(struct vcpu_svm *svm);
624
void sev_es_vcpu_reset(struct vcpu_svm *svm);
625
void sev_vcpu_deliver_sipi_vector(struct kvm_vcpu *vcpu, u8 vector);
626
void sev_es_prepare_guest_switch(struct vcpu_svm *svm, unsigned int cpu);
627
void sev_es_unmap_ghcb(struct vcpu_svm *svm);
628

629 630 631 632 633
/* vmenter.S */

void __svm_sev_es_vcpu_run(unsigned long vmcb_pa);
void __svm_vcpu_run(unsigned long vmcb_pa, unsigned long *regs);

634
#endif