kvm.c 103.6 KB
Newer Older
A
aliguori 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14
/*
 * QEMU KVM support
 *
 * Copyright (C) 2006-2008 Qumranet Technologies
 * Copyright IBM, Corp. 2008
 *
 * Authors:
 *  Anthony Liguori   <aliguori@us.ibm.com>
 *
 * This work is licensed under the terms of the GNU GPL, version 2 or later.
 * See the COPYING file in the top-level directory.
 *
 */

P
Peter Maydell 已提交
15
#include "qemu/osdep.h"
16
#include "qapi/error.h"
A
aliguori 已提交
17
#include <sys/ioctl.h>
18
#include <sys/utsname.h>
A
aliguori 已提交
19 20

#include <linux/kvm.h>
J
Jan Kiszka 已提交
21
#include <linux/kvm_para.h>
A
aliguori 已提交
22 23

#include "qemu-common.h"
24
#include "cpu.h"
25
#include "sysemu/sysemu.h"
26
#include "sysemu/hw_accel.h"
27
#include "sysemu/kvm_int.h"
28
#include "kvm_i386.h"
29
#include "hyperv.h"
30
#include "hyperv-proto.h"
31

32
#include "exec/gdbstub.h"
33 34
#include "qemu/host-utils.h"
#include "qemu/config-file.h"
35
#include "qemu/error-report.h"
P
Paolo Bonzini 已提交
36 37
#include "hw/i386/pc.h"
#include "hw/i386/apic.h"
38 39
#include "hw/i386/apic_internal.h"
#include "hw/i386/apic-msidef.h"
40
#include "hw/i386/intel_iommu.h"
41
#include "hw/i386/x86-iommu.h"
42

43
#include "exec/ioport.h"
44
#include "hw/pci/pci.h"
45
#include "hw/pci/msi.h"
46
#include "hw/pci/msix.h"
47
#include "migration/blocker.h"
48
#include "exec/memattrs.h"
49
#include "trace.h"
A
aliguori 已提交
50 51 52 53

//#define DEBUG_KVM

#ifdef DEBUG_KVM
54
#define DPRINTF(fmt, ...) \
A
aliguori 已提交
55 56
    do { fprintf(stderr, fmt, ## __VA_ARGS__); } while (0)
#else
57
#define DPRINTF(fmt, ...) \
A
aliguori 已提交
58 59 60
    do { } while (0)
#endif

61 62 63
#define MSR_KVM_WALL_CLOCK  0x11
#define MSR_KVM_SYSTEM_TIME 0x12

64 65 66
/* A 4096-byte buffer can hold the 8-byte kvm_msrs header, plus
 * 255 kvm_msr_entry structs */
#define MSR_BUF_SIZE 4096
67

68 69 70 71 72 73
const KVMCapabilityInfo kvm_arch_required_capabilities[] = {
    KVM_CAP_INFO(SET_TSS_ADDR),
    KVM_CAP_INFO(EXT_CPUID),
    KVM_CAP_INFO(MP_STATE),
    KVM_CAP_LAST_INFO
};
74

75 76
static bool has_msr_star;
static bool has_msr_hsave_pa;
77
static bool has_msr_tsc_aux;
78
static bool has_msr_tsc_adjust;
79
static bool has_msr_tsc_deadline;
80
static bool has_msr_feature_control;
A
Avi Kivity 已提交
81
static bool has_msr_misc_enable;
82
static bool has_msr_smbase;
L
Liu Jinsong 已提交
83
static bool has_msr_bndcfgs;
84
static int lm_capable_kernel;
85
static bool has_msr_hv_hypercall;
86
static bool has_msr_hv_crash;
87
static bool has_msr_hv_reset;
88
static bool has_msr_hv_vpindex;
89
static bool has_msr_hv_runtime;
90
static bool has_msr_hv_synic;
91
static bool has_msr_hv_stimer;
92
static bool has_msr_hv_frequencies;
93
static bool has_msr_xss;
94
static bool has_msr_spec_ctrl;
95

96 97 98
static uint32_t has_architectural_pmu_version;
static uint32_t num_architectural_pmu_gp_counters;
static uint32_t num_architectural_pmu_fixed_counters;
P
Paolo Bonzini 已提交
99

100 101 102 103
static int has_xsave;
static int has_xcrs;
static int has_pit_state2;

104 105
static bool has_msr_mcg_ext_ctl;

106 107
static struct kvm_cpuid2 *cpuid_cache;

108 109 110 111 112
int kvm_has_pit_state2(void)
{
    return has_pit_state2;
}

P
Paolo Bonzini 已提交
113 114 115 116 117
bool kvm_has_smm(void)
{
    return kvm_check_extension(kvm_state, KVM_CAP_X86_SMM);
}

118 119 120 121 122 123 124
bool kvm_has_adjust_clock_stable(void)
{
    int ret = kvm_check_extension(kvm_state, KVM_CAP_ADJUST_CLOCK);

    return (ret == KVM_CLOCK_TSC_STABLE);
}

125 126 127 128 129
bool kvm_allows_irq0_override(void)
{
    return !kvm_irqchip_in_kernel() || kvm_has_gsi_routing();
}

R
Radim Krčmář 已提交
130 131 132 133 134 135 136
static bool kvm_x2apic_api_set_flags(uint64_t flags)
{
    KVMState *s = KVM_STATE(current_machine->accelerator);

    return !kvm_vm_enable_cap(s, KVM_CAP_X2APIC_API, 0, flags);
}

137
#define MEMORIZE(fn, _result) \
138 139 140 141 142 143 144 145 146 147
    ({ \
        static bool _memorized; \
        \
        if (_memorized) { \
            return _result; \
        } \
        _memorized = true; \
        _result = fn; \
    })

148 149 150 151 152 153 154
static bool has_x2apic_api;

bool kvm_has_x2apic_api(void)
{
    return has_x2apic_api;
}

R
Radim Krčmář 已提交
155 156
bool kvm_enable_x2apic(void)
{
157 158
    return MEMORIZE(
             kvm_x2apic_api_set_flags(KVM_X2APIC_API_USE_32BIT_IDS |
159 160
                                      KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK),
             has_x2apic_api);
R
Radim Krčmář 已提交
161 162
}

163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185
static int kvm_get_tsc(CPUState *cs)
{
    X86CPU *cpu = X86_CPU(cs);
    CPUX86State *env = &cpu->env;
    struct {
        struct kvm_msrs info;
        struct kvm_msr_entry entries[1];
    } msr_data;
    int ret;

    if (env->tsc_valid) {
        return 0;
    }

    msr_data.info.nmsrs = 1;
    msr_data.entries[0].index = MSR_IA32_TSC;
    env->tsc_valid = !runstate_is_running();

    ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_MSRS, &msr_data);
    if (ret < 0) {
        return ret;
    }

186
    assert(ret == 1);
187 188 189 190
    env->tsc = msr_data.entries[0].data;
    return 0;
}

191
static inline void do_kvm_synchronize_tsc(CPUState *cpu, run_on_cpu_data arg)
192 193 194 195 196 197 198 199 200 201
{
    kvm_get_tsc(cpu);
}

void kvm_synchronize_all_tsc(void)
{
    CPUState *cpu;

    if (kvm_enabled()) {
        CPU_FOREACH(cpu) {
202
            run_on_cpu(cpu, do_kvm_synchronize_tsc, RUN_ON_CPU_NULL);
203 204 205 206
        }
    }
}

207 208 209 210 211 212
static struct kvm_cpuid2 *try_get_cpuid(KVMState *s, int max)
{
    struct kvm_cpuid2 *cpuid;
    int r, size;

    size = sizeof(*cpuid) + max * sizeof(*cpuid->entries);
213
    cpuid = g_malloc0(size);
214 215
    cpuid->nent = max;
    r = kvm_ioctl(s, KVM_GET_SUPPORTED_CPUID, cpuid);
216 217 218
    if (r == 0 && cpuid->nent >= max) {
        r = -E2BIG;
    }
219 220
    if (r < 0) {
        if (r == -E2BIG) {
221
            g_free(cpuid);
222 223 224 225 226 227 228 229 230 231
            return NULL;
        } else {
            fprintf(stderr, "KVM_GET_SUPPORTED_CPUID failed: %s\n",
                    strerror(-r));
            exit(1);
        }
    }
    return cpuid;
}

232 233 234 235 236 237 238
/* Run KVM_GET_SUPPORTED_CPUID ioctl(), allocating a buffer large enough
 * for all entries.
 */
static struct kvm_cpuid2 *get_supported_cpuid(KVMState *s)
{
    struct kvm_cpuid2 *cpuid;
    int max = 1;
239 240 241 242

    if (cpuid_cache != NULL) {
        return cpuid_cache;
    }
243 244 245
    while ((cpuid = try_get_cpuid(s, max)) == NULL) {
        max *= 2;
    }
246
    cpuid_cache = cpuid;
247 248 249
    return cpuid;
}

250
static const struct kvm_para_features {
251 252 253 254 255 256 257 258 259
    int cap;
    int feature;
} para_features[] = {
    { KVM_CAP_CLOCKSOURCE, KVM_FEATURE_CLOCKSOURCE },
    { KVM_CAP_NOP_IO_DELAY, KVM_FEATURE_NOP_IO_DELAY },
    { KVM_CAP_PV_MMU, KVM_FEATURE_MMU_OP },
    { KVM_CAP_ASYNC_PF, KVM_FEATURE_ASYNC_PF },
};

260
static int get_para_features(KVMState *s)
261 262 263
{
    int i, features = 0;

264
    for (i = 0; i < ARRAY_SIZE(para_features); i++) {
265
        if (kvm_check_extension(s, para_features[i].cap)) {
266 267 268 269 270 271 272
            features |= (1 << para_features[i].feature);
        }
    }

    return features;
}

273 274 275 276 277 278 279 280 281 282 283 284 285
static bool host_tsx_blacklisted(void)
{
    int family, model, stepping;\
    char vendor[CPUID_VENDOR_SZ + 1];

    host_vendor_fms(vendor, &family, &model, &stepping);

    /* Check if we are running on a Haswell host known to have broken TSX */
    return !strcmp(vendor, CPUID_VENDOR_INTEL) &&
           (family == 6) &&
           ((model == 63 && stepping < 4) ||
            model == 60 || model == 69 || model == 70);
}
286

287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308
/* Returns the value for a specific register on the cpuid entry
 */
static uint32_t cpuid_entry_get_reg(struct kvm_cpuid_entry2 *entry, int reg)
{
    uint32_t ret = 0;
    switch (reg) {
    case R_EAX:
        ret = entry->eax;
        break;
    case R_EBX:
        ret = entry->ebx;
        break;
    case R_ECX:
        ret = entry->ecx;
        break;
    case R_EDX:
        ret = entry->edx;
        break;
    }
    return ret;
}

309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325
/* Find matching entry for function/index on kvm_cpuid2 struct
 */
static struct kvm_cpuid_entry2 *cpuid_find_entry(struct kvm_cpuid2 *cpuid,
                                                 uint32_t function,
                                                 uint32_t index)
{
    int i;
    for (i = 0; i < cpuid->nent; ++i) {
        if (cpuid->entries[i].function == function &&
            cpuid->entries[i].index == index) {
            return &cpuid->entries[i];
        }
    }
    /* not found: */
    return NULL;
}

326
uint32_t kvm_arch_get_supported_cpuid(KVMState *s, uint32_t function,
327
                                      uint32_t index, int reg)
328 329 330 331
{
    struct kvm_cpuid2 *cpuid;
    uint32_t ret = 0;
    uint32_t cpuid_1_edx;
332
    bool found = false;
333

334
    cpuid = get_supported_cpuid(s);
335

336 337 338 339
    struct kvm_cpuid_entry2 *entry = cpuid_find_entry(cpuid, function, index);
    if (entry) {
        found = true;
        ret = cpuid_entry_get_reg(entry, reg);
340 341
    }

342 343
    /* Fixups for the data returned by KVM, below */

344 345 346
    if (function == 1 && reg == R_EDX) {
        /* KVM before 2.6.30 misreports the following features */
        ret |= CPUID_MTRR | CPUID_PAT | CPUID_MCE | CPUID_MCA;
347 348 349 350 351
    } else if (function == 1 && reg == R_ECX) {
        /* We can set the hypervisor flag, even if KVM does not return it on
         * GET_SUPPORTED_CPUID
         */
        ret |= CPUID_EXT_HYPERVISOR;
352 353 354 355 356 357 358 359
        /* tsc-deadline flag is not returned by GET_SUPPORTED_CPUID, but it
         * can be enabled if the kernel has KVM_CAP_TSC_DEADLINE_TIMER,
         * and the irqchip is in the kernel.
         */
        if (kvm_irqchip_in_kernel() &&
                kvm_check_extension(s, KVM_CAP_TSC_DEADLINE_TIMER)) {
            ret |= CPUID_EXT_TSC_DEADLINE_TIMER;
        }
360 361 362 363 364 365

        /* x2apic is reported by GET_SUPPORTED_CPUID, but it can't be enabled
         * without the in-kernel irqchip
         */
        if (!kvm_irqchip_in_kernel()) {
            ret &= ~CPUID_EXT_X2APIC;
366
        }
J
Jan Kiszka 已提交
367 368
    } else if (function == 6 && reg == R_EAX) {
        ret |= CPUID_6_EAX_ARAT; /* safe to allow because of emulated APIC */
369 370 371 372
    } else if (function == 7 && index == 0 && reg == R_EBX) {
        if (host_tsx_blacklisted()) {
            ret &= ~(CPUID_7_0_EBX_RTM | CPUID_7_0_EBX_HLE);
        }
373 374 375 376 377 378
    } else if (function == 0x80000001 && reg == R_EDX) {
        /* On Intel, kvm returns cpuid according to the Intel spec,
         * so add missing bits according to the AMD spec:
         */
        cpuid_1_edx = kvm_arch_get_supported_cpuid(s, 1, 0, R_EDX);
        ret |= cpuid_1_edx & CPUID_EXT2_AMD_ALIASES;
379 380 381 382 383 384 385
    } else if (function == KVM_CPUID_FEATURES && reg == R_EAX) {
        /* kvm_pv_unhalt is reported by GET_SUPPORTED_CPUID, but it can't
         * be enabled without the in-kernel irqchip
         */
        if (!kvm_irqchip_in_kernel()) {
            ret &= ~(1U << KVM_FEATURE_PV_UNHALT);
        }
386 387
    }

388
    /* fallback for older kernels */
389
    if ((function == KVM_CPUID_FEATURES) && !found) {
390
        ret = get_para_features(s);
391
    }
392 393

    return ret;
G
Gleb Natapov 已提交
394 395
}

396 397 398 399 400 401 402 403 404 405 406 407 408 409 410
typedef struct HWPoisonPage {
    ram_addr_t ram_addr;
    QLIST_ENTRY(HWPoisonPage) list;
} HWPoisonPage;

static QLIST_HEAD(, HWPoisonPage) hwpoison_page_list =
    QLIST_HEAD_INITIALIZER(hwpoison_page_list);

static void kvm_unpoison_all(void *param)
{
    HWPoisonPage *page, *next_page;

    QLIST_FOREACH_SAFE(page, &hwpoison_page_list, list, next_page) {
        QLIST_REMOVE(page, list);
        qemu_ram_remap(page->ram_addr, TARGET_PAGE_SIZE);
411
        g_free(page);
412 413 414 415 416 417 418 419 420 421 422 423
    }
}

static void kvm_hwpoison_page_add(ram_addr_t ram_addr)
{
    HWPoisonPage *page;

    QLIST_FOREACH(page, &hwpoison_page_list, list) {
        if (page->ram_addr == ram_addr) {
            return;
        }
    }
424
    page = g_new(HWPoisonPage, 1);
425 426 427 428
    page->ram_addr = ram_addr;
    QLIST_INSERT_HEAD(&hwpoison_page_list, page, list);
}

M
Marcelo Tosatti 已提交
429 430 431 432 433
static int kvm_get_mce_cap_supported(KVMState *s, uint64_t *mce_cap,
                                     int *max_banks)
{
    int r;

434
    r = kvm_check_extension(s, KVM_CAP_MCE);
M
Marcelo Tosatti 已提交
435 436 437 438 439 440 441
    if (r > 0) {
        *max_banks = r;
        return kvm_ioctl(s, KVM_X86_GET_MCE_CAP_SUPPORTED, mce_cap);
    }
    return -ENOSYS;
}

442
static void kvm_mce_inject(X86CPU *cpu, hwaddr paddr, int code)
M
Marcelo Tosatti 已提交
443
{
444
    CPUState *cs = CPU(cpu);
445
    CPUX86State *env = &cpu->env;
446 447 448
    uint64_t status = MCI_STATUS_VAL | MCI_STATUS_UC | MCI_STATUS_EN |
                      MCI_STATUS_MISCV | MCI_STATUS_ADDRV | MCI_STATUS_S;
    uint64_t mcg_status = MCG_STATUS_MCIP;
449
    int flags = 0;
M
Marcelo Tosatti 已提交
450

451 452 453 454 455 456
    if (code == BUS_MCEERR_AR) {
        status |= MCI_STATUS_AR | 0x134;
        mcg_status |= MCG_STATUS_EIPV;
    } else {
        status |= 0xc0;
        mcg_status |= MCG_STATUS_RIPV;
457
    }
458 459 460 461 462 463 464 465 466 467 468

    flags = cpu_x86_support_mca_broadcast(env) ? MCE_INJECT_BROADCAST : 0;
    /* We need to read back the value of MSR_EXT_MCG_CTL that was set by the
     * guest kernel back into env->mcg_ext_ctl.
     */
    cpu_synchronize_state(cs);
    if (env->mcg_ext_ctl & MCG_EXT_CTL_LMCE_EN) {
        mcg_status |= MCG_STATUS_LMCE;
        flags = 0;
    }

469
    cpu_x86_inject_mce(NULL, cpu, 9, status, mcg_status, paddr,
470
                       (MCM_ADDR_PHYS << 6) | 0xc, flags);
471 472 473 474 475 476 477 478
}

static void hardware_memory_error(void)
{
    fprintf(stderr, "Hardware memory error!\n");
    exit(1);
}

479
void kvm_arch_on_sigbus_vcpu(CPUState *c, int code, void *addr)
480
{
A
Andreas Färber 已提交
481 482
    X86CPU *cpu = X86_CPU(c);
    CPUX86State *env = &cpu->env;
483
    ram_addr_t ram_addr;
A
Avi Kivity 已提交
484
    hwaddr paddr;
485

P
Paolo Bonzini 已提交
486 487 488 489 490
    /* If we get an action required MCE, it has been injected by KVM
     * while the VM was running.  An action optional MCE instead should
     * be coming from the main thread, which qemu_init_sigbus identifies
     * as the "early kill" thread.
     */
491
    assert(code == BUS_MCEERR_AR || code == BUS_MCEERR_AO);
492 493

    if ((env->mcg_cap & MCG_SER_P) && addr) {
494
        ram_addr = qemu_ram_addr_from_host(addr);
495 496 497 498
        if (ram_addr != RAM_ADDR_INVALID &&
            kvm_physical_memory_addr_from_host(c->kvm_state, addr, &paddr)) {
            kvm_hwpoison_page_add(ram_addr);
            kvm_mce_inject(cpu, paddr, code);
499
            return;
500
        }
501 502 503

        fprintf(stderr, "Hardware memory error for memory used by "
                "QEMU itself instead of guest system!\n");
504
    }
505 506 507 508 509 510

    if (code == BUS_MCEERR_AR) {
        hardware_memory_error();
    }

    /* Hope we are lucky for AO MCE */
511 512
}

513
static int kvm_inject_mce_oldstyle(X86CPU *cpu)
514
{
515 516
    CPUX86State *env = &cpu->env;

517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539
    if (!kvm_has_vcpu_events() && env->exception_injected == EXCP12_MCHK) {
        unsigned int bank, bank_num = env->mcg_cap & 0xff;
        struct kvm_x86_mce mce;

        env->exception_injected = -1;

        /*
         * There must be at least one bank in use if an MCE is pending.
         * Find it and use its values for the event injection.
         */
        for (bank = 0; bank < bank_num; bank++) {
            if (env->mce_banks[bank * 4 + 1] & MCI_STATUS_VAL) {
                break;
            }
        }
        assert(bank < bank_num);

        mce.bank = bank;
        mce.status = env->mce_banks[bank * 4 + 1];
        mce.mcg_status = env->mcg_status;
        mce.addr = env->mce_banks[bank * 4 + 2];
        mce.misc = env->mce_banks[bank * 4 + 3];

540
        return kvm_vcpu_ioctl(CPU(cpu), KVM_X86_SET_MCE, &mce);
541 542 543 544
    }
    return 0;
}

545
static void cpu_update_state(void *opaque, int running, RunState state)
546
{
547
    CPUX86State *env = opaque;
548 549 550 551 552 553

    if (running) {
        env->tsc_valid = false;
    }
}

554
unsigned long kvm_arch_vcpu_id(CPUState *cs)
555
{
556
    X86CPU *cpu = X86_CPU(cs);
557
    return cpu->apic_id;
558 559
}

560 561 562 563 564 565 566 567 568 569 570 571
#ifndef KVM_CPUID_SIGNATURE_NEXT
#define KVM_CPUID_SIGNATURE_NEXT                0x40000100
#endif

static bool hyperv_hypercall_available(X86CPU *cpu)
{
    return cpu->hyperv_vapic ||
           (cpu->hyperv_spinlock_attempts != HYPERV_SPINLOCK_NEVER_RETRY);
}

static bool hyperv_enabled(X86CPU *cpu)
{
572 573 574
    CPUState *cs = CPU(cpu);
    return kvm_check_extension(cs->kvm_state, KVM_CAP_HYPERV) > 0 &&
           (hyperv_hypercall_available(cpu) ||
575
            cpu->hyperv_time  ||
576
            cpu->hyperv_relaxed_timing ||
577
            cpu->hyperv_crash ||
578
            cpu->hyperv_reset ||
579
            cpu->hyperv_vpindex ||
580
            cpu->hyperv_runtime ||
581 582
            cpu->hyperv_synic ||
            cpu->hyperv_stimer);
583 584
}

585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605
static int kvm_arch_set_tsc_khz(CPUState *cs)
{
    X86CPU *cpu = X86_CPU(cs);
    CPUX86State *env = &cpu->env;
    int r;

    if (!env->tsc_khz) {
        return 0;
    }

    r = kvm_check_extension(cs->kvm_state, KVM_CAP_TSC_CONTROL) ?
        kvm_vcpu_ioctl(cs, KVM_SET_TSC_KHZ, env->tsc_khz) :
        -ENOTSUP;
    if (r < 0) {
        /* When KVM_SET_TSC_KHZ fails, it's an error only if the current
         * TSC frequency doesn't match the one we want.
         */
        int cur_freq = kvm_check_extension(cs->kvm_state, KVM_CAP_GET_TSC_KHZ) ?
                       kvm_vcpu_ioctl(cs, KVM_GET_TSC_KHZ) :
                       -ENOTSUP;
        if (cur_freq <= 0 || cur_freq != env->tsc_khz) {
606 607 608 609
            warn_report("TSC frequency mismatch between "
                        "VM (%" PRId64 " kHz) and host (%d kHz), "
                        "and TSC scaling unavailable",
                        env->tsc_khz, cur_freq);
610 611 612 613 614 615 616
            return r;
        }
    }

    return 0;
}

617 618 619 620 621 622 623 624 625
static bool tsc_is_stable_and_known(CPUX86State *env)
{
    if (!env->tsc_khz) {
        return false;
    }
    return (env->features[FEAT_8000_0007_EDX] & CPUID_APM_INVTSC)
        || env->user_tsc_khz;
}

626 627 628 629 630
static int hyperv_handle_properties(CPUState *cs)
{
    X86CPU *cpu = X86_CPU(cs);
    CPUX86State *env = &cpu->env;

631 632 633 634 635
    if (cpu->hyperv_time &&
            kvm_check_extension(cs->kvm_state, KVM_CAP_HYPERV_TIME) <= 0) {
        cpu->hyperv_time = false;
    }

636
    if (cpu->hyperv_relaxed_timing) {
637
        env->features[FEAT_HYPERV_EAX] |= HV_HYPERCALL_AVAILABLE;
638 639
    }
    if (cpu->hyperv_vapic) {
640 641
        env->features[FEAT_HYPERV_EAX] |= HV_HYPERCALL_AVAILABLE;
        env->features[FEAT_HYPERV_EAX] |= HV_APIC_ACCESS_AVAILABLE;
642
    }
643
    if (cpu->hyperv_time) {
644 645 646
        env->features[FEAT_HYPERV_EAX] |= HV_HYPERCALL_AVAILABLE;
        env->features[FEAT_HYPERV_EAX] |= HV_TIME_REF_COUNT_AVAILABLE;
        env->features[FEAT_HYPERV_EAX] |= HV_REFERENCE_TSC_AVAILABLE;
647 648

        if (has_msr_hv_frequencies && tsc_is_stable_and_known(env)) {
649 650
            env->features[FEAT_HYPERV_EAX] |= HV_ACCESS_FREQUENCY_MSRS;
            env->features[FEAT_HYPERV_EDX] |= HV_FREQUENCY_MSRS_AVAILABLE;
651
        }
652 653
    }
    if (cpu->hyperv_crash && has_msr_hv_crash) {
654
        env->features[FEAT_HYPERV_EDX] |= HV_GUEST_CRASH_MSR_AVAILABLE;
655
    }
656
    env->features[FEAT_HYPERV_EDX] |= HV_CPU_DYNAMIC_PARTITIONING_AVAILABLE;
657
    if (cpu->hyperv_reset && has_msr_hv_reset) {
658
        env->features[FEAT_HYPERV_EAX] |= HV_RESET_AVAILABLE;
659 660
    }
    if (cpu->hyperv_vpindex && has_msr_hv_vpindex) {
661
        env->features[FEAT_HYPERV_EAX] |= HV_VP_INDEX_AVAILABLE;
662 663
    }
    if (cpu->hyperv_runtime && has_msr_hv_runtime) {
664
        env->features[FEAT_HYPERV_EAX] |= HV_VP_RUNTIME_AVAILABLE;
665 666 667 668 669 670 671 672
    }
    if (cpu->hyperv_synic) {
        if (!has_msr_hv_synic ||
            kvm_vcpu_enable_cap(cs, KVM_CAP_HYPERV_SYNIC, 0)) {
            fprintf(stderr, "Hyper-V SynIC is not supported by kernel\n");
            return -ENOSYS;
        }

673
        env->features[FEAT_HYPERV_EAX] |= HV_SYNIC_AVAILABLE;
674 675 676 677 678 679
    }
    if (cpu->hyperv_stimer) {
        if (!has_msr_hv_stimer) {
            fprintf(stderr, "Hyper-V timers aren't supported by kernel\n");
            return -ENOSYS;
        }
680
        env->features[FEAT_HYPERV_EAX] |= HV_SYNTIMERS_AVAILABLE;
681 682 683 684
    }
    return 0;
}

685 686
static Error *invtsc_mig_blocker;

687
#define KVM_MAX_CPUID_ENTRIES  100
688

A
Andreas Färber 已提交
689
int kvm_arch_init_vcpu(CPUState *cs)
A
aliguori 已提交
690 691
{
    struct {
692
        struct kvm_cpuid2 cpuid;
693
        struct kvm_cpuid_entry2 entries[KVM_MAX_CPUID_ENTRIES];
694
    } QEMU_PACKED cpuid_data;
A
Andreas Färber 已提交
695 696
    X86CPU *cpu = X86_CPU(cs);
    CPUX86State *env = &cpu->env;
697
    uint32_t limit, i, j, cpuid_i;
698
    uint32_t unused;
G
Gleb Natapov 已提交
699 700
    struct kvm_cpuid_entry2 *c;
    uint32_t signature[3];
701
    int kvm_base = KVM_CPUID_SIGNATURE;
702
    int r;
703
    Error *local_err = NULL;
A
aliguori 已提交
704

S
Stefan Weil 已提交
705 706
    memset(&cpuid_data, 0, sizeof(cpuid_data));

A
aliguori 已提交
707 708
    cpuid_i = 0;

709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727
    r = kvm_arch_set_tsc_khz(cs);
    if (r < 0) {
        goto fail;
    }

    /* vcpu's TSC frequency is either specified by user, or following
     * the value used by KVM if the former is not present. In the
     * latter case, we query it from KVM and record in env->tsc_khz,
     * so that vcpu's TSC frequency can be migrated later via this field.
     */
    if (!env->tsc_khz) {
        r = kvm_check_extension(cs->kvm_state, KVM_CAP_GET_TSC_KHZ) ?
            kvm_vcpu_ioctl(cs, KVM_GET_TSC_KHZ) :
            -ENOTSUP;
        if (r > 0) {
            env->tsc_khz = r;
        }
    }

G
Gleb Natapov 已提交
728
    /* Paravirtualization CPUIDs */
729 730
    if (hyperv_enabled(cpu)) {
        c = &cpuid_data.entries[cpuid_i++];
731
        c->function = HV_CPUID_VENDOR_AND_MAX_FUNCTIONS;
732 733 734 735 736 737 738 739 740 741 742 743
        if (!cpu->hyperv_vendor_id) {
            memcpy(signature, "Microsoft Hv", 12);
        } else {
            size_t len = strlen(cpu->hyperv_vendor_id);

            if (len > 12) {
                error_report("hv-vendor-id truncated to 12 characters");
                len = 12;
            }
            memset(signature, 0, 12);
            memcpy(signature, cpu->hyperv_vendor_id, len);
        }
744
        c->eax = HV_CPUID_MIN;
745 746 747
        c->ebx = signature[0];
        c->ecx = signature[1];
        c->edx = signature[2];
748

749
        c = &cpuid_data.entries[cpuid_i++];
750
        c->function = HV_CPUID_INTERFACE;
751 752
        memcpy(signature, "Hv#1\0\0\0\0\0\0\0\0", 12);
        c->eax = signature[0];
753 754 755
        c->ebx = 0;
        c->ecx = 0;
        c->edx = 0;
756 757

        c = &cpuid_data.entries[cpuid_i++];
758
        c->function = HV_CPUID_VERSION;
759 760 761 762
        c->eax = 0x00001bbc;
        c->ebx = 0x00060001;

        c = &cpuid_data.entries[cpuid_i++];
763
        c->function = HV_CPUID_FEATURES;
764 765 766
        r = hyperv_handle_properties(cs);
        if (r) {
            return r;
767
        }
768 769 770
        c->eax = env->features[FEAT_HYPERV_EAX];
        c->ebx = env->features[FEAT_HYPERV_EBX];
        c->edx = env->features[FEAT_HYPERV_EDX];
771

772
        c = &cpuid_data.entries[cpuid_i++];
773
        c->function = HV_CPUID_ENLIGHTMENT_INFO;
774
        if (cpu->hyperv_relaxed_timing) {
775
            c->eax |= HV_RELAXED_TIMING_RECOMMENDED;
776
        }
777
        if (cpu->hyperv_vapic) {
778
            c->eax |= HV_APIC_ACCESS_RECOMMENDED;
779
        }
780
        c->ebx = cpu->hyperv_spinlock_attempts;
781 782

        c = &cpuid_data.entries[cpuid_i++];
783
        c->function = HV_CPUID_IMPLEMENT_LIMITS;
784 785

        c->eax = cpu->hv_max_vps;
786 787
        c->ebx = 0x40;

788
        kvm_base = KVM_CPUID_SIGNATURE_NEXT;
789
        has_msr_hv_hypercall = true;
790 791
    }

792 793 794 795
    if (cpu->expose_kvm) {
        memcpy(signature, "KVMKVMKVM\0\0\0", 12);
        c = &cpuid_data.entries[cpuid_i++];
        c->function = KVM_CPUID_SIGNATURE | kvm_base;
796
        c->eax = KVM_CPUID_FEATURES | kvm_base;
797 798 799
        c->ebx = signature[0];
        c->ecx = signature[1];
        c->edx = signature[2];
800

801 802 803 804
        c = &cpuid_data.entries[cpuid_i++];
        c->function = KVM_CPUID_FEATURES | kvm_base;
        c->eax = env->features[FEAT_KVM];
    }
805

806
    cpu_x86_cpuid(env, 0, 0, &limit, &unused, &unused, &unused);
A
aliguori 已提交
807 808

    for (i = 0; i <= limit; i++) {
809 810 811 812
        if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
            fprintf(stderr, "unsupported level value: 0x%x\n", limit);
            abort();
        }
G
Gleb Natapov 已提交
813
        c = &cpuid_data.entries[cpuid_i++];
814 815

        switch (i) {
816 817 818 819 820
        case 2: {
            /* Keep reading function 2 till all the input is received */
            int times;

            c->function = i;
821 822 823 824
            c->flags = KVM_CPUID_FLAG_STATEFUL_FUNC |
                       KVM_CPUID_FLAG_STATE_READ_NEXT;
            cpu_x86_cpuid(env, i, 0, &c->eax, &c->ebx, &c->ecx, &c->edx);
            times = c->eax & 0xff;
825 826

            for (j = 1; j < times; ++j) {
827 828 829 830 831
                if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
                    fprintf(stderr, "cpuid_data is full, no space for "
                            "cpuid(eax:2):eax & 0xf = 0x%x\n", times);
                    abort();
                }
832
                c = &cpuid_data.entries[cpuid_i++];
833
                c->function = i;
834 835
                c->flags = KVM_CPUID_FLAG_STATEFUL_FUNC;
                cpu_x86_cpuid(env, i, 0, &c->eax, &c->ebx, &c->ecx, &c->edx);
836 837 838
            }
            break;
        }
839 840 841 842
        case 4:
        case 0xb:
        case 0xd:
            for (j = 0; ; j++) {
843 844 845
                if (i == 0xd && j == 64) {
                    break;
                }
846 847 848
                c->function = i;
                c->flags = KVM_CPUID_FLAG_SIGNIFCANT_INDEX;
                c->index = j;
849
                cpu_x86_cpuid(env, i, j, &c->eax, &c->ebx, &c->ecx, &c->edx);
850

851
                if (i == 4 && c->eax == 0) {
852
                    break;
853 854
                }
                if (i == 0xb && !(c->ecx & 0xff00)) {
855
                    break;
856 857
                }
                if (i == 0xd && c->eax == 0) {
858
                    continue;
859
                }
860 861 862 863 864
                if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
                    fprintf(stderr, "cpuid_data is full, no space for "
                            "cpuid(eax:0x%x,ecx:0x%x)\n", i, j);
                    abort();
                }
865
                c = &cpuid_data.entries[cpuid_i++];
866 867 868 869
            }
            break;
        default:
            c->function = i;
870 871
            c->flags = 0;
            cpu_x86_cpuid(env, i, 0, &c->eax, &c->ebx, &c->ecx, &c->edx);
872 873
            break;
        }
A
aliguori 已提交
874
    }
P
Paolo Bonzini 已提交
875 876

    if (limit >= 0x0a) {
877
        uint32_t eax, edx;
P
Paolo Bonzini 已提交
878

879 880 881 882 883
        cpu_x86_cpuid(env, 0x0a, 0, &eax, &unused, &unused, &edx);

        has_architectural_pmu_version = eax & 0xff;
        if (has_architectural_pmu_version > 0) {
            num_architectural_pmu_gp_counters = (eax & 0xff00) >> 8;
P
Paolo Bonzini 已提交
884 885 886 887 888

            /* Shouldn't be more than 32, since that's the number of bits
             * available in EBX to tell us _which_ counters are available.
             * Play it safe.
             */
889 890 891 892 893 894 895 896 897 898
            if (num_architectural_pmu_gp_counters > MAX_GP_COUNTERS) {
                num_architectural_pmu_gp_counters = MAX_GP_COUNTERS;
            }

            if (has_architectural_pmu_version > 1) {
                num_architectural_pmu_fixed_counters = edx & 0x1f;

                if (num_architectural_pmu_fixed_counters > MAX_FIXED_COUNTERS) {
                    num_architectural_pmu_fixed_counters = MAX_FIXED_COUNTERS;
                }
P
Paolo Bonzini 已提交
899 900 901 902
            }
        }
    }

903
    cpu_x86_cpuid(env, 0x80000000, 0, &limit, &unused, &unused, &unused);
A
aliguori 已提交
904 905

    for (i = 0x80000000; i <= limit; i++) {
906 907 908 909
        if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
            fprintf(stderr, "unsupported xlevel value: 0x%x\n", limit);
            abort();
        }
G
Gleb Natapov 已提交
910
        c = &cpuid_data.entries[cpuid_i++];
A
aliguori 已提交
911 912

        c->function = i;
913 914
        c->flags = 0;
        cpu_x86_cpuid(env, i, 0, &c->eax, &c->ebx, &c->ecx, &c->edx);
A
aliguori 已提交
915 916
    }

917 918 919 920 921
    /* Call Centaur's CPUID instructions they are supported. */
    if (env->cpuid_xlevel2 > 0) {
        cpu_x86_cpuid(env, 0xC0000000, 0, &limit, &unused, &unused, &unused);

        for (i = 0xC0000000; i <= limit; i++) {
922 923 924 925
            if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
                fprintf(stderr, "unsupported xlevel2 value: 0x%x\n", limit);
                abort();
            }
926 927 928 929 930 931 932 933
            c = &cpuid_data.entries[cpuid_i++];

            c->function = i;
            c->flags = 0;
            cpu_x86_cpuid(env, i, 0, &c->eax, &c->ebx, &c->ecx, &c->edx);
        }
    }

A
aliguori 已提交
934 935
    cpuid_data.cpuid.nent = cpuid_i;

M
Marcelo Tosatti 已提交
936
    if (((env->cpuid_version >> 8)&0xF) >= 6
937
        && (env->features[FEAT_1_EDX] & (CPUID_MCE | CPUID_MCA)) ==
938
           (CPUID_MCE | CPUID_MCA)
939
        && kvm_check_extension(cs->kvm_state, KVM_CAP_MCE) > 0) {
940
        uint64_t mcg_cap, unsupported_caps;
M
Marcelo Tosatti 已提交
941
        int banks;
J
Jan Kiszka 已提交
942
        int ret;
M
Marcelo Tosatti 已提交
943

944
        ret = kvm_get_mce_cap_supported(cs->kvm_state, &mcg_cap, &banks);
945 946 947
        if (ret < 0) {
            fprintf(stderr, "kvm_get_mce_cap_supported: %s", strerror(-ret));
            return ret;
M
Marcelo Tosatti 已提交
948
        }
949

950
        if (banks < (env->mcg_cap & MCG_CAP_BANKS_MASK)) {
951
            error_report("kvm: Unsupported MCE bank count (QEMU = %d, KVM = %d)",
952
                         (int)(env->mcg_cap & MCG_CAP_BANKS_MASK), banks);
953
            return -ENOTSUP;
954
        }
955

956 957
        unsupported_caps = env->mcg_cap & ~(mcg_cap | MCG_CAP_BANKS_MASK);
        if (unsupported_caps) {
958 959 960 961
            if (unsupported_caps & MCG_LMCE_P) {
                error_report("kvm: LMCE not supported");
                return -ENOTSUP;
            }
962 963
            warn_report("Unsupported MCG_CAP bits: 0x%" PRIx64,
                        unsupported_caps);
964 965
        }

966 967
        env->mcg_cap &= mcg_cap | MCG_CAP_BANKS_MASK;
        ret = kvm_vcpu_ioctl(cs, KVM_X86_SETUP_MCE, &env->mcg_cap);
968 969 970 971
        if (ret < 0) {
            fprintf(stderr, "KVM_X86_SETUP_MCE: %s", strerror(-ret));
            return ret;
        }
M
Marcelo Tosatti 已提交
972 973
    }

974 975
    qemu_add_vm_change_state_handler(cpu_update_state, env);

976 977 978 979 980 981
    c = cpuid_find_entry(&cpuid_data.cpuid, 1, 0);
    if (c) {
        has_msr_feature_control = !!(c->ecx & CPUID_EXT_VMX) ||
                                  !!(c->ecx & CPUID_EXT_SMX);
    }

982 983 984 985
    if (env->mcg_cap & MCG_LMCE_P) {
        has_msr_mcg_ext_ctl = has_msr_feature_control = true;
    }

986 987 988 989 990 991 992
    if (!env->user_tsc_khz) {
        if ((env->features[FEAT_8000_0007_EDX] & CPUID_APM_INVTSC) &&
            invtsc_mig_blocker == NULL) {
            /* for migration */
            error_setg(&invtsc_mig_blocker,
                       "State blocked by non-migratable CPU device"
                       " (invtsc flag)");
993 994 995 996 997 998
            r = migrate_add_blocker(invtsc_mig_blocker, &local_err);
            if (local_err) {
                error_report_err(local_err);
                error_free(invtsc_mig_blocker);
                goto fail;
            }
999 1000 1001
            /* for savevm */
            vmstate_x86_cpu.unmigratable = 1;
        }
1002 1003
    }

1004 1005 1006 1007 1008 1009
    if (cpu->vmware_cpuid_freq
        /* Guests depend on 0x40000000 to detect this feature, so only expose
         * it if KVM exposes leaf 0x40000000. (Conflicts with Hyper-V) */
        && cpu->expose_kvm
        && kvm_base == KVM_CPUID_SIGNATURE
        /* TSC clock must be stable and known for this feature. */
1010
        && tsc_is_stable_and_known(env)) {
1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031

        c = &cpuid_data.entries[cpuid_i++];
        c->function = KVM_CPUID_SIGNATURE | 0x10;
        c->eax = env->tsc_khz;
        /* LAPIC resolution of 1ns (freq: 1GHz) is hardcoded in KVM's
         * APIC_BUS_CYCLE_NS */
        c->ebx = 1000000;
        c->ecx = c->edx = 0;

        c = cpuid_find_entry(&cpuid_data.cpuid, kvm_base, 0);
        c->eax = MAX(c->eax, KVM_CPUID_SIGNATURE | 0x10);
    }

    cpuid_data.cpuid.nent = cpuid_i;

    cpuid_data.cpuid.padding = 0;
    r = kvm_vcpu_ioctl(cs, KVM_SET_CPUID2, &cpuid_data);
    if (r) {
        goto fail;
    }

1032
    if (has_xsave) {
1033 1034
        env->kvm_xsave_buf = qemu_memalign(4096, sizeof(struct kvm_xsave));
    }
1035
    cpu->kvm_msr_buf = g_malloc0(MSR_BUF_SIZE);
1036

1037 1038 1039
    if (!(env->features[FEAT_8000_0001_EDX] & CPUID_EXT2_RDTSCP)) {
        has_msr_tsc_aux = false;
    }
1040

1041
    return 0;
1042 1043 1044 1045

 fail:
    migrate_del_blocker(invtsc_mig_blocker);
    return r;
A
aliguori 已提交
1046 1047
}

1048
void kvm_arch_reset_vcpu(X86CPU *cpu)
J
Jan Kiszka 已提交
1049
{
A
Andreas Färber 已提交
1050
    CPUX86State *env = &cpu->env;
1051

J
Jan Kiszka 已提交
1052
    env->xcr0 = 1;
M
Marcelo Tosatti 已提交
1053
    if (kvm_irqchip_in_kernel()) {
1054
        env->mp_state = cpu_is_bsp(cpu) ? KVM_MP_STATE_RUNNABLE :
M
Marcelo Tosatti 已提交
1055 1056 1057 1058
                                          KVM_MP_STATE_UNINITIALIZED;
    } else {
        env->mp_state = KVM_MP_STATE_RUNNABLE;
    }
1059 1060 1061 1062 1063 1064 1065

    if (cpu->hyperv_synic) {
        int i;
        for (i = 0; i < ARRAY_SIZE(env->msr_hv_synic_sint); i++) {
            env->msr_hv_synic_sint[i] = HV_SINT_MASKED;
        }
    }
J
Jan Kiszka 已提交
1066 1067
}

1068 1069 1070 1071 1072 1073 1074 1075 1076 1077
void kvm_arch_do_init_vcpu(X86CPU *cpu)
{
    CPUX86State *env = &cpu->env;

    /* APs get directly into wait-for-SIPI state.  */
    if (env->mp_state == KVM_MP_STATE_UNINITIALIZED) {
        env->mp_state = KVM_MP_STATE_INIT_RECEIVED;
    }
}

1078
static int kvm_get_supported_msrs(KVMState *s)
A
aliguori 已提交
1079
{
M
Marcelo Tosatti 已提交
1080
    static int kvm_supported_msrs;
1081
    int ret = 0;
A
aliguori 已提交
1082 1083

    /* first time */
M
Marcelo Tosatti 已提交
1084
    if (kvm_supported_msrs == 0) {
A
aliguori 已提交
1085 1086
        struct kvm_msr_list msr_list, *kvm_msr_list;

M
Marcelo Tosatti 已提交
1087
        kvm_supported_msrs = -1;
A
aliguori 已提交
1088 1089 1090

        /* Obtain MSR list from KVM.  These are the MSRs that we must
         * save/restore */
A
aliguori 已提交
1091
        msr_list.nmsrs = 0;
1092
        ret = kvm_ioctl(s, KVM_GET_MSR_INDEX_LIST, &msr_list);
1093
        if (ret < 0 && ret != -E2BIG) {
1094
            return ret;
1095
        }
1096 1097
        /* Old kernel modules had a bug and could write beyond the provided
           memory. Allocate at least a safe amount of 1K. */
1098
        kvm_msr_list = g_malloc0(MAX(1024, sizeof(msr_list) +
1099 1100
                                              msr_list.nmsrs *
                                              sizeof(msr_list.indices[0])));
A
aliguori 已提交
1101

1102
        kvm_msr_list->nmsrs = msr_list.nmsrs;
1103
        ret = kvm_ioctl(s, KVM_GET_MSR_INDEX_LIST, kvm_msr_list);
A
aliguori 已提交
1104 1105 1106 1107
        if (ret >= 0) {
            int i;

            for (i = 0; i < kvm_msr_list->nmsrs; i++) {
1108 1109
                switch (kvm_msr_list->indices[i]) {
                case MSR_STAR:
1110
                    has_msr_star = true;
1111 1112
                    break;
                case MSR_VM_HSAVE_PA:
1113
                    has_msr_hsave_pa = true;
1114 1115
                    break;
                case MSR_TSC_AUX:
1116
                    has_msr_tsc_aux = true;
1117 1118
                    break;
                case MSR_TSC_ADJUST:
1119
                    has_msr_tsc_adjust = true;
1120 1121
                    break;
                case MSR_IA32_TSCDEADLINE:
1122
                    has_msr_tsc_deadline = true;
1123 1124
                    break;
                case MSR_IA32_SMBASE:
1125
                    has_msr_smbase = true;
1126 1127
                    break;
                case MSR_IA32_MISC_ENABLE:
A
Avi Kivity 已提交
1128
                    has_msr_misc_enable = true;
1129 1130
                    break;
                case MSR_IA32_BNDCFGS:
L
Liu Jinsong 已提交
1131
                    has_msr_bndcfgs = true;
1132 1133
                    break;
                case MSR_IA32_XSS:
1134
                    has_msr_xss = true;
L
Ladi Prosek 已提交
1135
                    break;
1136
                case HV_X64_MSR_CRASH_CTL:
1137
                    has_msr_hv_crash = true;
1138 1139
                    break;
                case HV_X64_MSR_RESET:
1140
                    has_msr_hv_reset = true;
1141 1142
                    break;
                case HV_X64_MSR_VP_INDEX:
1143
                    has_msr_hv_vpindex = true;
1144 1145
                    break;
                case HV_X64_MSR_VP_RUNTIME:
1146
                    has_msr_hv_runtime = true;
1147 1148
                    break;
                case HV_X64_MSR_SCONTROL:
1149
                    has_msr_hv_synic = true;
1150 1151
                    break;
                case HV_X64_MSR_STIMER0_CONFIG:
1152
                    has_msr_hv_stimer = true;
1153
                    break;
1154 1155 1156
                case HV_X64_MSR_TSC_FREQUENCY:
                    has_msr_hv_frequencies = true;
                    break;
1157 1158 1159
                case MSR_IA32_SPEC_CTRL:
                    has_msr_spec_ctrl = true;
                    break;
1160
                }
A
aliguori 已提交
1161 1162 1163
            }
        }

1164
        g_free(kvm_msr_list);
A
aliguori 已提交
1165 1166
    }

1167
    return ret;
A
aliguori 已提交
1168 1169
}

1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203
static Notifier smram_machine_done;
static KVMMemoryListener smram_listener;
static AddressSpace smram_address_space;
static MemoryRegion smram_as_root;
static MemoryRegion smram_as_mem;

static void register_smram_listener(Notifier *n, void *unused)
{
    MemoryRegion *smram =
        (MemoryRegion *) object_resolve_path("/machine/smram", NULL);

    /* Outer container... */
    memory_region_init(&smram_as_root, OBJECT(kvm_state), "mem-container-smram", ~0ull);
    memory_region_set_enabled(&smram_as_root, true);

    /* ... with two regions inside: normal system memory with low
     * priority, and...
     */
    memory_region_init_alias(&smram_as_mem, OBJECT(kvm_state), "mem-smram",
                             get_system_memory(), 0, ~0ull);
    memory_region_add_subregion_overlap(&smram_as_root, 0, &smram_as_mem, 0);
    memory_region_set_enabled(&smram_as_mem, true);

    if (smram) {
        /* ... SMRAM with higher priority */
        memory_region_add_subregion_overlap(&smram_as_root, 0, smram, 10);
        memory_region_set_enabled(smram, true);
    }

    address_space_init(&smram_address_space, &smram_as_root, "KVM-SMRAM");
    kvm_memory_listener_register(kvm_state, &smram_listener,
                                 &smram_address_space, 1);
}

1204
int kvm_arch_init(MachineState *ms, KVMState *s)
1205
{
1206
    uint64_t identity_base = 0xfffbc000;
J
Jan Kiszka 已提交
1207
    uint64_t shadow_mem;
1208
    int ret;
1209
    struct utsname utsname;
1210

1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222
#ifdef KVM_CAP_XSAVE
    has_xsave = kvm_check_extension(s, KVM_CAP_XSAVE);
#endif

#ifdef KVM_CAP_XCRS
    has_xcrs = kvm_check_extension(s, KVM_CAP_XCRS);
#endif

#ifdef KVM_CAP_PIT_STATE2
    has_pit_state2 = kvm_check_extension(s, KVM_CAP_PIT_STATE2);
#endif

1223
    ret = kvm_get_supported_msrs(s);
1224 1225 1226
    if (ret < 0) {
        return ret;
    }
1227 1228 1229 1230

    uname(&utsname);
    lm_capable_kernel = strcmp(utsname.machine, "x86_64") == 0;

J
Jes Sorensen 已提交
1231
    /*
1232 1233 1234 1235 1236 1237 1238 1239 1240
     * On older Intel CPUs, KVM uses vm86 mode to emulate 16-bit code directly.
     * In order to use vm86 mode, an EPT identity map and a TSS  are needed.
     * Since these must be part of guest physical memory, we need to allocate
     * them, both by setting their start addresses in the kernel and by
     * creating a corresponding e820 entry. We need 4 pages before the BIOS.
     *
     * Older KVM versions may not support setting the identity map base. In
     * that case we need to stick with the default, i.e. a 256K maximum BIOS
     * size.
J
Jes Sorensen 已提交
1241
     */
1242 1243 1244 1245 1246 1247 1248 1249
    if (kvm_check_extension(s, KVM_CAP_SET_IDENTITY_MAP_ADDR)) {
        /* Allows up to 16M BIOSes. */
        identity_base = 0xfeffc000;

        ret = kvm_vm_ioctl(s, KVM_SET_IDENTITY_MAP_ADDR, &identity_base);
        if (ret < 0) {
            return ret;
        }
J
Jes Sorensen 已提交
1250
    }
1251

1252 1253
    /* Set TSS base one page after EPT identity map. */
    ret = kvm_vm_ioctl(s, KVM_SET_TSS_ADDR, identity_base + 0x1000);
1254 1255 1256 1257
    if (ret < 0) {
        return ret;
    }

1258 1259
    /* Tell fw_cfg to notify the BIOS to reserve the range. */
    ret = e820_add_entry(identity_base, 0x4000, E820_RESERVED);
1260
    if (ret < 0) {
1261
        fprintf(stderr, "e820_add_entry() table is full\n");
1262 1263
        return ret;
    }
1264
    qemu_register_reset(kvm_unpoison_all, NULL);
1265

1266
    shadow_mem = machine_kvm_shadow_mem(ms);
1267 1268 1269 1270 1271
    if (shadow_mem != -1) {
        shadow_mem /= 4096;
        ret = kvm_vm_ioctl(s, KVM_SET_NR_MMU_PAGES, shadow_mem);
        if (ret < 0) {
            return ret;
J
Jan Kiszka 已提交
1272 1273
        }
    }
1274

1275 1276 1277
    if (kvm_check_extension(s, KVM_CAP_X86_SMM) &&
        object_dynamic_cast(OBJECT(ms), TYPE_PC_MACHINE) &&
        pc_machine_is_smm_enabled(PC_MACHINE(ms))) {
1278 1279 1280
        smram_machine_done.notify = register_smram_listener;
        qemu_add_machine_init_done_notifier(&smram_machine_done);
    }
1281
    return 0;
A
aliguori 已提交
1282
}
1283

A
aliguori 已提交
1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307
static void set_v8086_seg(struct kvm_segment *lhs, const SegmentCache *rhs)
{
    lhs->selector = rhs->selector;
    lhs->base = rhs->base;
    lhs->limit = rhs->limit;
    lhs->type = 3;
    lhs->present = 1;
    lhs->dpl = 3;
    lhs->db = 0;
    lhs->s = 1;
    lhs->l = 0;
    lhs->g = 0;
    lhs->avl = 0;
    lhs->unusable = 0;
}

static void set_seg(struct kvm_segment *lhs, const SegmentCache *rhs)
{
    unsigned flags = rhs->flags;
    lhs->selector = rhs->selector;
    lhs->base = rhs->base;
    lhs->limit = rhs->limit;
    lhs->type = (flags >> DESC_TYPE_SHIFT) & 15;
    lhs->present = (flags & DESC_P_MASK) != 0;
1308
    lhs->dpl = (flags >> DESC_DPL_SHIFT) & 3;
A
aliguori 已提交
1309 1310 1311 1312 1313
    lhs->db = (flags >> DESC_B_SHIFT) & 1;
    lhs->s = (flags & DESC_S_MASK) != 0;
    lhs->l = (flags >> DESC_L_SHIFT) & 1;
    lhs->g = (flags & DESC_G_MASK) != 0;
    lhs->avl = (flags & DESC_AVL_MASK) != 0;
1314
    lhs->unusable = !lhs->present;
1315
    lhs->padding = 0;
A
aliguori 已提交
1316 1317 1318 1319 1320 1321 1322
}

static void get_seg(SegmentCache *lhs, const struct kvm_segment *rhs)
{
    lhs->selector = rhs->selector;
    lhs->base = rhs->base;
    lhs->limit = rhs->limit;
1323 1324 1325 1326 1327 1328 1329 1330
    lhs->flags = (rhs->type << DESC_TYPE_SHIFT) |
                 ((rhs->present && !rhs->unusable) * DESC_P_MASK) |
                 (rhs->dpl << DESC_DPL_SHIFT) |
                 (rhs->db << DESC_B_SHIFT) |
                 (rhs->s * DESC_S_MASK) |
                 (rhs->l << DESC_L_SHIFT) |
                 (rhs->g * DESC_G_MASK) |
                 (rhs->avl * DESC_AVL_MASK);
A
aliguori 已提交
1331 1332 1333 1334
}

static void kvm_getput_reg(__u64 *kvm_reg, target_ulong *qemu_reg, int set)
{
1335
    if (set) {
A
aliguori 已提交
1336
        *kvm_reg = *qemu_reg;
1337
    } else {
A
aliguori 已提交
1338
        *qemu_reg = *kvm_reg;
1339
    }
A
aliguori 已提交
1340 1341
}

1342
static int kvm_getput_regs(X86CPU *cpu, int set)
A
aliguori 已提交
1343
{
1344
    CPUX86State *env = &cpu->env;
A
aliguori 已提交
1345 1346 1347 1348
    struct kvm_regs regs;
    int ret = 0;

    if (!set) {
1349
        ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_REGS, &regs);
1350
        if (ret < 0) {
A
aliguori 已提交
1351
            return ret;
1352
        }
A
aliguori 已提交
1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376
    }

    kvm_getput_reg(&regs.rax, &env->regs[R_EAX], set);
    kvm_getput_reg(&regs.rbx, &env->regs[R_EBX], set);
    kvm_getput_reg(&regs.rcx, &env->regs[R_ECX], set);
    kvm_getput_reg(&regs.rdx, &env->regs[R_EDX], set);
    kvm_getput_reg(&regs.rsi, &env->regs[R_ESI], set);
    kvm_getput_reg(&regs.rdi, &env->regs[R_EDI], set);
    kvm_getput_reg(&regs.rsp, &env->regs[R_ESP], set);
    kvm_getput_reg(&regs.rbp, &env->regs[R_EBP], set);
#ifdef TARGET_X86_64
    kvm_getput_reg(&regs.r8, &env->regs[8], set);
    kvm_getput_reg(&regs.r9, &env->regs[9], set);
    kvm_getput_reg(&regs.r10, &env->regs[10], set);
    kvm_getput_reg(&regs.r11, &env->regs[11], set);
    kvm_getput_reg(&regs.r12, &env->regs[12], set);
    kvm_getput_reg(&regs.r13, &env->regs[13], set);
    kvm_getput_reg(&regs.r14, &env->regs[14], set);
    kvm_getput_reg(&regs.r15, &env->regs[15], set);
#endif

    kvm_getput_reg(&regs.rflags, &env->eflags, set);
    kvm_getput_reg(&regs.rip, &env->eip, set);

1377
    if (set) {
1378
        ret = kvm_vcpu_ioctl(CPU(cpu), KVM_SET_REGS, &regs);
1379
    }
A
aliguori 已提交
1380 1381 1382 1383

    return ret;
}

1384
static int kvm_put_fpu(X86CPU *cpu)
A
aliguori 已提交
1385
{
1386
    CPUX86State *env = &cpu->env;
A
aliguori 已提交
1387 1388 1389 1390 1391 1392 1393
    struct kvm_fpu fpu;
    int i;

    memset(&fpu, 0, sizeof fpu);
    fpu.fsw = env->fpus & ~(7 << 11);
    fpu.fsw |= (env->fpstt & 7) << 11;
    fpu.fcw = env->fpuc;
1394 1395 1396
    fpu.last_opcode = env->fpop;
    fpu.last_ip = env->fpip;
    fpu.last_dp = env->fpdp;
1397 1398 1399
    for (i = 0; i < 8; ++i) {
        fpu.ftwx |= (!env->fptags[i]) << i;
    }
A
aliguori 已提交
1400
    memcpy(fpu.fpr, env->fpregs, sizeof env->fpregs);
1401
    for (i = 0; i < CPU_NB_REGS; i++) {
1402 1403
        stq_p(&fpu.xmm[i][0], env->xmm_regs[i].ZMM_Q(0));
        stq_p(&fpu.xmm[i][8], env->xmm_regs[i].ZMM_Q(1));
1404
    }
A
aliguori 已提交
1405 1406
    fpu.mxcsr = env->mxcsr;

1407
    return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_FPU, &fpu);
A
aliguori 已提交
1408 1409
}

1410 1411
#define XSAVE_FCW_FSW     0
#define XSAVE_FTW_FOP     1
1412 1413 1414 1415 1416 1417 1418
#define XSAVE_CWD_RIP     2
#define XSAVE_CWD_RDP     4
#define XSAVE_MXCSR       6
#define XSAVE_ST_SPACE    8
#define XSAVE_XMM_SPACE   40
#define XSAVE_XSTATE_BV   128
#define XSAVE_YMMH_SPACE  144
L
Liu Jinsong 已提交
1419 1420
#define XSAVE_BNDREGS     240
#define XSAVE_BNDCSR      256
C
Chao Peng 已提交
1421 1422 1423
#define XSAVE_OPMASK      272
#define XSAVE_ZMM_Hi256   288
#define XSAVE_Hi16_ZMM    416
1424
#define XSAVE_PKRU        672
1425

1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448
#define XSAVE_BYTE_OFFSET(word_offset) \
    ((word_offset) * sizeof(((struct kvm_xsave *)0)->region[0]))

#define ASSERT_OFFSET(word_offset, field) \
    QEMU_BUILD_BUG_ON(XSAVE_BYTE_OFFSET(word_offset) != \
                      offsetof(X86XSaveArea, field))

ASSERT_OFFSET(XSAVE_FCW_FSW, legacy.fcw);
ASSERT_OFFSET(XSAVE_FTW_FOP, legacy.ftw);
ASSERT_OFFSET(XSAVE_CWD_RIP, legacy.fpip);
ASSERT_OFFSET(XSAVE_CWD_RDP, legacy.fpdp);
ASSERT_OFFSET(XSAVE_MXCSR, legacy.mxcsr);
ASSERT_OFFSET(XSAVE_ST_SPACE, legacy.fpregs);
ASSERT_OFFSET(XSAVE_XMM_SPACE, legacy.xmm_regs);
ASSERT_OFFSET(XSAVE_XSTATE_BV, header.xstate_bv);
ASSERT_OFFSET(XSAVE_YMMH_SPACE, avx_state);
ASSERT_OFFSET(XSAVE_BNDREGS, bndreg_state);
ASSERT_OFFSET(XSAVE_BNDCSR, bndcsr_state);
ASSERT_OFFSET(XSAVE_OPMASK, opmask_state);
ASSERT_OFFSET(XSAVE_ZMM_Hi256, zmm_hi256_state);
ASSERT_OFFSET(XSAVE_Hi16_ZMM, hi16_zmm_state);
ASSERT_OFFSET(XSAVE_PKRU, pkru_state);

1449
static int kvm_put_xsave(X86CPU *cpu)
1450
{
1451
    CPUX86State *env = &cpu->env;
1452
    X86XSaveArea *xsave = env->kvm_xsave_buf;
1453

1454
    if (!has_xsave) {
1455
        return kvm_put_fpu(cpu);
1456
    }
1457
    x86_cpu_xsave_all_areas(cpu, xsave);
1458

1459
    return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_XSAVE, xsave);
1460 1461
}

1462
static int kvm_put_xcrs(X86CPU *cpu)
1463
{
1464
    CPUX86State *env = &cpu->env;
1465
    struct kvm_xcrs xcrs = {};
1466

1467
    if (!has_xcrs) {
1468
        return 0;
1469
    }
1470 1471 1472 1473 1474

    xcrs.nr_xcrs = 1;
    xcrs.flags = 0;
    xcrs.xcrs[0].xcr = 0;
    xcrs.xcrs[0].value = env->xcr0;
1475
    return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_XCRS, &xcrs);
1476 1477
}

1478
static int kvm_put_sregs(X86CPU *cpu)
A
aliguori 已提交
1479
{
1480
    CPUX86State *env = &cpu->env;
A
aliguori 已提交
1481 1482
    struct kvm_sregs sregs;

1483 1484 1485 1486 1487
    memset(sregs.interrupt_bitmap, 0, sizeof(sregs.interrupt_bitmap));
    if (env->interrupt_injected >= 0) {
        sregs.interrupt_bitmap[env->interrupt_injected / 64] |=
                (uint64_t)1 << (env->interrupt_injected % 64);
    }
A
aliguori 已提交
1488 1489

    if ((env->eflags & VM_MASK)) {
1490 1491 1492 1493 1494 1495
        set_v8086_seg(&sregs.cs, &env->segs[R_CS]);
        set_v8086_seg(&sregs.ds, &env->segs[R_DS]);
        set_v8086_seg(&sregs.es, &env->segs[R_ES]);
        set_v8086_seg(&sregs.fs, &env->segs[R_FS]);
        set_v8086_seg(&sregs.gs, &env->segs[R_GS]);
        set_v8086_seg(&sregs.ss, &env->segs[R_SS]);
A
aliguori 已提交
1496
    } else {
1497 1498 1499 1500 1501 1502
        set_seg(&sregs.cs, &env->segs[R_CS]);
        set_seg(&sregs.ds, &env->segs[R_DS]);
        set_seg(&sregs.es, &env->segs[R_ES]);
        set_seg(&sregs.fs, &env->segs[R_FS]);
        set_seg(&sregs.gs, &env->segs[R_GS]);
        set_seg(&sregs.ss, &env->segs[R_SS]);
A
aliguori 已提交
1503 1504 1505 1506 1507 1508 1509
    }

    set_seg(&sregs.tr, &env->tr);
    set_seg(&sregs.ldt, &env->ldt);

    sregs.idt.limit = env->idt.limit;
    sregs.idt.base = env->idt.base;
1510
    memset(sregs.idt.padding, 0, sizeof sregs.idt.padding);
A
aliguori 已提交
1511 1512
    sregs.gdt.limit = env->gdt.limit;
    sregs.gdt.base = env->gdt.base;
1513
    memset(sregs.gdt.padding, 0, sizeof sregs.gdt.padding);
A
aliguori 已提交
1514 1515 1516 1517 1518 1519

    sregs.cr0 = env->cr[0];
    sregs.cr2 = env->cr[2];
    sregs.cr3 = env->cr[3];
    sregs.cr4 = env->cr[4];

1520 1521
    sregs.cr8 = cpu_get_apic_tpr(cpu->apic_state);
    sregs.apic_base = cpu_get_apic_base(cpu->apic_state);
A
aliguori 已提交
1522 1523 1524

    sregs.efer = env->efer;

1525
    return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_SREGS, &sregs);
A
aliguori 已提交
1526 1527
}

1528 1529 1530 1531 1532
static void kvm_msr_buf_reset(X86CPU *cpu)
{
    memset(cpu->kvm_msr_buf, 0, MSR_BUF_SIZE);
}

1533 1534 1535 1536 1537 1538 1539 1540
static void kvm_msr_entry_add(X86CPU *cpu, uint32_t index, uint64_t value)
{
    struct kvm_msrs *msrs = cpu->kvm_msr_buf;
    void *limit = ((void *)msrs) + MSR_BUF_SIZE;
    struct kvm_msr_entry *entry = &msrs->entries[msrs->nmsrs];

    assert((void *)(entry + 1) <= limit);

1541 1542 1543
    entry->index = index;
    entry->reserved = 0;
    entry->data = value;
1544 1545 1546
    msrs->nmsrs++;
}

1547 1548 1549 1550 1551 1552 1553 1554
static int kvm_put_one_msr(X86CPU *cpu, int index, uint64_t value)
{
    kvm_msr_buf_reset(cpu);
    kvm_msr_entry_add(cpu, index, value);

    return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_MSRS, cpu->kvm_msr_buf);
}

1555 1556 1557 1558 1559 1560 1561 1562
void kvm_put_apicbase(X86CPU *cpu, uint64_t value)
{
    int ret;

    ret = kvm_put_one_msr(cpu, MSR_IA32_APICBASE, value);
    assert(ret == 1);
}

1563 1564 1565
static int kvm_put_tscdeadline_msr(X86CPU *cpu)
{
    CPUX86State *env = &cpu->env;
1566
    int ret;
1567 1568 1569 1570 1571

    if (!has_msr_tsc_deadline) {
        return 0;
    }

1572
    ret = kvm_put_one_msr(cpu, MSR_IA32_TSCDEADLINE, env->tsc_deadline);
1573 1574 1575 1576 1577 1578
    if (ret < 0) {
        return ret;
    }

    assert(ret == 1);
    return 0;
1579 1580
}

1581 1582 1583 1584 1585 1586 1587 1588
/*
 * Provide a separate write service for the feature control MSR in order to
 * kick the VCPU out of VMXON or even guest mode on reset. This has to be done
 * before writing any other state because forcibly leaving nested mode
 * invalidates the VCPU state.
 */
static int kvm_put_msr_feature_control(X86CPU *cpu)
{
1589 1590 1591 1592 1593
    int ret;

    if (!has_msr_feature_control) {
        return 0;
    }
1594

1595 1596
    ret = kvm_put_one_msr(cpu, MSR_IA32_FEATURE_CONTROL,
                          cpu->env.msr_ia32_feature_control);
1597 1598 1599 1600 1601 1602
    if (ret < 0) {
        return ret;
    }

    assert(ret == 1);
    return 0;
1603 1604
}

1605
static int kvm_put_msrs(X86CPU *cpu, int level)
A
aliguori 已提交
1606
{
1607
    CPUX86State *env = &cpu->env;
1608
    int i;
1609
    int ret;
A
aliguori 已提交
1610

1611 1612
    kvm_msr_buf_reset(cpu);

1613 1614 1615 1616
    kvm_msr_entry_add(cpu, MSR_IA32_SYSENTER_CS, env->sysenter_cs);
    kvm_msr_entry_add(cpu, MSR_IA32_SYSENTER_ESP, env->sysenter_esp);
    kvm_msr_entry_add(cpu, MSR_IA32_SYSENTER_EIP, env->sysenter_eip);
    kvm_msr_entry_add(cpu, MSR_PAT, env->pat);
1617
    if (has_msr_star) {
1618
        kvm_msr_entry_add(cpu, MSR_STAR, env->star);
1619
    }
1620
    if (has_msr_hsave_pa) {
1621
        kvm_msr_entry_add(cpu, MSR_VM_HSAVE_PA, env->vm_hsave);
1622
    }
1623
    if (has_msr_tsc_aux) {
1624
        kvm_msr_entry_add(cpu, MSR_TSC_AUX, env->tsc_aux);
1625
    }
1626
    if (has_msr_tsc_adjust) {
1627
        kvm_msr_entry_add(cpu, MSR_TSC_ADJUST, env->tsc_adjust);
1628
    }
A
Avi Kivity 已提交
1629
    if (has_msr_misc_enable) {
1630
        kvm_msr_entry_add(cpu, MSR_IA32_MISC_ENABLE,
A
Avi Kivity 已提交
1631 1632
                          env->msr_ia32_misc_enable);
    }
1633
    if (has_msr_smbase) {
1634
        kvm_msr_entry_add(cpu, MSR_IA32_SMBASE, env->smbase);
1635
    }
1636
    if (has_msr_bndcfgs) {
1637
        kvm_msr_entry_add(cpu, MSR_IA32_BNDCFGS, env->msr_bndcfgs);
1638
    }
1639
    if (has_msr_xss) {
1640
        kvm_msr_entry_add(cpu, MSR_IA32_XSS, env->xss);
1641
    }
1642 1643 1644
    if (has_msr_spec_ctrl) {
        kvm_msr_entry_add(cpu, MSR_IA32_SPEC_CTRL, env->spec_ctrl);
    }
A
aliguori 已提交
1645
#ifdef TARGET_X86_64
1646
    if (lm_capable_kernel) {
1647 1648 1649 1650
        kvm_msr_entry_add(cpu, MSR_CSTAR, env->cstar);
        kvm_msr_entry_add(cpu, MSR_KERNELGSBASE, env->kernelgsbase);
        kvm_msr_entry_add(cpu, MSR_FMASK, env->fmask);
        kvm_msr_entry_add(cpu, MSR_LSTAR, env->lstar);
1651
    }
A
aliguori 已提交
1652
#endif
1653

J
Jan Kiszka 已提交
1654
    /*
P
Paolo Bonzini 已提交
1655 1656
     * The following MSRs have side effects on the guest or are too heavy
     * for normal writeback. Limit them to reset or full state updates.
J
Jan Kiszka 已提交
1657 1658
     */
    if (level >= KVM_PUT_RESET_STATE) {
1659 1660 1661
        kvm_msr_entry_add(cpu, MSR_IA32_TSC, env->tsc);
        kvm_msr_entry_add(cpu, MSR_KVM_SYSTEM_TIME, env->system_time_msr);
        kvm_msr_entry_add(cpu, MSR_KVM_WALL_CLOCK, env->wall_clock_msr);
1662
        if (env->features[FEAT_KVM] & (1 << KVM_FEATURE_ASYNC_PF)) {
1663
            kvm_msr_entry_add(cpu, MSR_KVM_ASYNC_PF_EN, env->async_pf_en_msr);
1664
        }
1665
        if (env->features[FEAT_KVM] & (1 << KVM_FEATURE_PV_EOI)) {
1666
            kvm_msr_entry_add(cpu, MSR_KVM_PV_EOI_EN, env->pv_eoi_en_msr);
M
Michael S. Tsirkin 已提交
1667
        }
1668
        if (env->features[FEAT_KVM] & (1 << KVM_FEATURE_STEAL_TIME)) {
1669
            kvm_msr_entry_add(cpu, MSR_KVM_STEAL_TIME, env->steal_time_msr);
1670
        }
1671 1672 1673 1674 1675 1676
        if (has_architectural_pmu_version > 0) {
            if (has_architectural_pmu_version > 1) {
                /* Stop the counter.  */
                kvm_msr_entry_add(cpu, MSR_CORE_PERF_FIXED_CTR_CTRL, 0);
                kvm_msr_entry_add(cpu, MSR_CORE_PERF_GLOBAL_CTRL, 0);
            }
P
Paolo Bonzini 已提交
1677 1678

            /* Set the counter values.  */
1679
            for (i = 0; i < num_architectural_pmu_fixed_counters; i++) {
1680
                kvm_msr_entry_add(cpu, MSR_CORE_PERF_FIXED_CTR0 + i,
P
Paolo Bonzini 已提交
1681 1682
                                  env->msr_fixed_counters[i]);
            }
1683
            for (i = 0; i < num_architectural_pmu_gp_counters; i++) {
1684
                kvm_msr_entry_add(cpu, MSR_P6_PERFCTR0 + i,
P
Paolo Bonzini 已提交
1685
                                  env->msr_gp_counters[i]);
1686
                kvm_msr_entry_add(cpu, MSR_P6_EVNTSEL0 + i,
P
Paolo Bonzini 已提交
1687 1688
                                  env->msr_gp_evtsel[i]);
            }
1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700
            if (has_architectural_pmu_version > 1) {
                kvm_msr_entry_add(cpu, MSR_CORE_PERF_GLOBAL_STATUS,
                                  env->msr_global_status);
                kvm_msr_entry_add(cpu, MSR_CORE_PERF_GLOBAL_OVF_CTRL,
                                  env->msr_global_ovf_ctrl);

                /* Now start the PMU.  */
                kvm_msr_entry_add(cpu, MSR_CORE_PERF_FIXED_CTR_CTRL,
                                  env->msr_fixed_ctr_ctrl);
                kvm_msr_entry_add(cpu, MSR_CORE_PERF_GLOBAL_CTRL,
                                  env->msr_global_ctrl);
            }
P
Paolo Bonzini 已提交
1701
        }
1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716
        /*
         * Hyper-V partition-wide MSRs: to avoid clearing them on cpu hot-add,
         * only sync them to KVM on the first cpu
         */
        if (current_cpu == first_cpu) {
            if (has_msr_hv_hypercall) {
                kvm_msr_entry_add(cpu, HV_X64_MSR_GUEST_OS_ID,
                                  env->msr_hv_guest_os_id);
                kvm_msr_entry_add(cpu, HV_X64_MSR_HYPERCALL,
                                  env->msr_hv_hypercall);
            }
            if (cpu->hyperv_time) {
                kvm_msr_entry_add(cpu, HV_X64_MSR_REFERENCE_TSC,
                                  env->msr_hv_tsc);
            }
1717
        }
1718
        if (cpu->hyperv_vapic) {
1719
            kvm_msr_entry_add(cpu, HV_X64_MSR_APIC_ASSIST_PAGE,
1720
                              env->msr_hv_vapic);
1721
        }
1722 1723 1724
        if (has_msr_hv_crash) {
            int j;

1725
            for (j = 0; j < HV_CRASH_PARAMS; j++)
1726
                kvm_msr_entry_add(cpu, HV_X64_MSR_CRASH_P0 + j,
1727 1728
                                  env->msr_hv_crash_params[j]);

1729
            kvm_msr_entry_add(cpu, HV_X64_MSR_CRASH_CTL, HV_CRASH_CTL_NOTIFY);
1730
        }
1731
        if (has_msr_hv_runtime) {
1732
            kvm_msr_entry_add(cpu, HV_X64_MSR_VP_RUNTIME, env->msr_hv_runtime);
1733
        }
1734 1735 1736
        if (cpu->hyperv_synic) {
            int j;

1737 1738
            kvm_msr_entry_add(cpu, HV_X64_MSR_SVERSION, HV_SYNIC_VERSION);

1739
            kvm_msr_entry_add(cpu, HV_X64_MSR_SCONTROL,
1740
                              env->msr_hv_synic_control);
1741
            kvm_msr_entry_add(cpu, HV_X64_MSR_SIEFP,
1742
                              env->msr_hv_synic_evt_page);
1743
            kvm_msr_entry_add(cpu, HV_X64_MSR_SIMP,
1744 1745 1746
                              env->msr_hv_synic_msg_page);

            for (j = 0; j < ARRAY_SIZE(env->msr_hv_synic_sint); j++) {
1747
                kvm_msr_entry_add(cpu, HV_X64_MSR_SINT0 + j,
1748 1749 1750
                                  env->msr_hv_synic_sint[j]);
            }
        }
1751 1752 1753 1754
        if (has_msr_hv_stimer) {
            int j;

            for (j = 0; j < ARRAY_SIZE(env->msr_hv_stimer_config); j++) {
1755
                kvm_msr_entry_add(cpu, HV_X64_MSR_STIMER0_CONFIG + j * 2,
1756 1757 1758 1759
                                env->msr_hv_stimer_config[j]);
            }

            for (j = 0; j < ARRAY_SIZE(env->msr_hv_stimer_count); j++) {
1760
                kvm_msr_entry_add(cpu, HV_X64_MSR_STIMER0_COUNT + j * 2,
1761 1762 1763
                                env->msr_hv_stimer_count[j]);
            }
        }
1764
        if (env->features[FEAT_1_EDX] & CPUID_MTRR) {
1765 1766
            uint64_t phys_mask = MAKE_64BIT_MASK(0, cpu->phys_bits);

1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778
            kvm_msr_entry_add(cpu, MSR_MTRRdefType, env->mtrr_deftype);
            kvm_msr_entry_add(cpu, MSR_MTRRfix64K_00000, env->mtrr_fixed[0]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix16K_80000, env->mtrr_fixed[1]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix16K_A0000, env->mtrr_fixed[2]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix4K_C0000, env->mtrr_fixed[3]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix4K_C8000, env->mtrr_fixed[4]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix4K_D0000, env->mtrr_fixed[5]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix4K_D8000, env->mtrr_fixed[6]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix4K_E0000, env->mtrr_fixed[7]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix4K_E8000, env->mtrr_fixed[8]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix4K_F0000, env->mtrr_fixed[9]);
            kvm_msr_entry_add(cpu, MSR_MTRRfix4K_F8000, env->mtrr_fixed[10]);
1779
            for (i = 0; i < MSR_MTRRcap_VCNT; i++) {
1780 1781 1782 1783 1784 1785
                /* The CPU GPs if we write to a bit above the physical limit of
                 * the host CPU (and KVM emulates that)
                 */
                uint64_t mask = env->mtrr_var[i].mask;
                mask &= phys_mask;

1786 1787
                kvm_msr_entry_add(cpu, MSR_MTRRphysBase(i),
                                  env->mtrr_var[i].base);
1788
                kvm_msr_entry_add(cpu, MSR_MTRRphysMask(i), mask);
1789 1790
            }
        }
1791 1792 1793

        /* Note: MSR_IA32_FEATURE_CONTROL is written separately, see
         *       kvm_put_msr_feature_control. */
1794
    }
1795
    if (env->mcg_cap) {
H
Hidetoshi Seto 已提交
1796
        int i;
1797

1798 1799
        kvm_msr_entry_add(cpu, MSR_MCG_STATUS, env->mcg_status);
        kvm_msr_entry_add(cpu, MSR_MCG_CTL, env->mcg_ctl);
1800 1801 1802
        if (has_msr_mcg_ext_ctl) {
            kvm_msr_entry_add(cpu, MSR_MCG_EXT_CTL, env->mcg_ext_ctl);
        }
1803
        for (i = 0; i < (env->mcg_cap & 0xff) * 4; i++) {
1804
            kvm_msr_entry_add(cpu, MSR_MC0_CTL + i, env->mce_banks[i]);
1805 1806
        }
    }
1807

1808
    ret = kvm_vcpu_ioctl(CPU(cpu), KVM_SET_MSRS, cpu->kvm_msr_buf);
1809 1810 1811
    if (ret < 0) {
        return ret;
    }
A
aliguori 已提交
1812

1813 1814 1815 1816 1817 1818
    if (ret < cpu->kvm_msr_buf->nmsrs) {
        struct kvm_msr_entry *e = &cpu->kvm_msr_buf->entries[ret];
        error_report("error: failed to set MSR 0x%" PRIx32 " to 0x%" PRIx64,
                     (uint32_t)e->index, (uint64_t)e->data);
    }

1819
    assert(ret == cpu->kvm_msr_buf->nmsrs);
1820
    return 0;
A
aliguori 已提交
1821 1822 1823
}


1824
static int kvm_get_fpu(X86CPU *cpu)
A
aliguori 已提交
1825
{
1826
    CPUX86State *env = &cpu->env;
A
aliguori 已提交
1827 1828 1829
    struct kvm_fpu fpu;
    int i, ret;

1830
    ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_FPU, &fpu);
1831
    if (ret < 0) {
A
aliguori 已提交
1832
        return ret;
1833
    }
A
aliguori 已提交
1834 1835 1836 1837

    env->fpstt = (fpu.fsw >> 11) & 7;
    env->fpus = fpu.fsw;
    env->fpuc = fpu.fcw;
1838 1839 1840
    env->fpop = fpu.last_opcode;
    env->fpip = fpu.last_ip;
    env->fpdp = fpu.last_dp;
1841 1842 1843
    for (i = 0; i < 8; ++i) {
        env->fptags[i] = !((fpu.ftwx >> i) & 1);
    }
A
aliguori 已提交
1844
    memcpy(env->fpregs, fpu.fpr, sizeof env->fpregs);
1845
    for (i = 0; i < CPU_NB_REGS; i++) {
1846 1847
        env->xmm_regs[i].ZMM_Q(0) = ldq_p(&fpu.xmm[i][0]);
        env->xmm_regs[i].ZMM_Q(1) = ldq_p(&fpu.xmm[i][8]);
1848
    }
A
aliguori 已提交
1849 1850 1851 1852 1853
    env->mxcsr = fpu.mxcsr;

    return 0;
}

1854
static int kvm_get_xsave(X86CPU *cpu)
1855
{
1856
    CPUX86State *env = &cpu->env;
1857
    X86XSaveArea *xsave = env->kvm_xsave_buf;
1858
    int ret;
1859

1860
    if (!has_xsave) {
1861
        return kvm_get_fpu(cpu);
1862
    }
1863

1864
    ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_XSAVE, xsave);
1865
    if (ret < 0) {
1866
        return ret;
1867
    }
1868
    x86_cpu_xrstor_all_areas(cpu, xsave);
1869 1870 1871 1872

    return 0;
}

1873
static int kvm_get_xcrs(X86CPU *cpu)
1874
{
1875
    CPUX86State *env = &cpu->env;
1876 1877 1878
    int i, ret;
    struct kvm_xcrs xcrs;

1879
    if (!has_xcrs) {
1880
        return 0;
1881
    }
1882

1883
    ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_XCRS, &xcrs);
1884
    if (ret < 0) {
1885
        return ret;
1886
    }
1887

1888
    for (i = 0; i < xcrs.nr_xcrs; i++) {
1889
        /* Only support xcr0 now */
P
Paolo Bonzini 已提交
1890 1891
        if (xcrs.xcrs[i].xcr == 0) {
            env->xcr0 = xcrs.xcrs[i].value;
1892 1893
            break;
        }
1894
    }
1895 1896 1897
    return 0;
}

1898
static int kvm_get_sregs(X86CPU *cpu)
A
aliguori 已提交
1899
{
1900
    CPUX86State *env = &cpu->env;
A
aliguori 已提交
1901
    struct kvm_sregs sregs;
1902
    int bit, i, ret;
A
aliguori 已提交
1903

1904
    ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_SREGS, &sregs);
1905
    if (ret < 0) {
A
aliguori 已提交
1906
        return ret;
1907
    }
A
aliguori 已提交
1908

1909 1910 1911 1912 1913 1914 1915 1916 1917 1918
    /* There can only be one pending IRQ set in the bitmap at a time, so try
       to find it and save its number instead (-1 for none). */
    env->interrupt_injected = -1;
    for (i = 0; i < ARRAY_SIZE(sregs.interrupt_bitmap); i++) {
        if (sregs.interrupt_bitmap[i]) {
            bit = ctz64(sregs.interrupt_bitmap[i]);
            env->interrupt_injected = i * 64 + bit;
            break;
        }
    }
A
aliguori 已提交
1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940

    get_seg(&env->segs[R_CS], &sregs.cs);
    get_seg(&env->segs[R_DS], &sregs.ds);
    get_seg(&env->segs[R_ES], &sregs.es);
    get_seg(&env->segs[R_FS], &sregs.fs);
    get_seg(&env->segs[R_GS], &sregs.gs);
    get_seg(&env->segs[R_SS], &sregs.ss);

    get_seg(&env->tr, &sregs.tr);
    get_seg(&env->ldt, &sregs.ldt);

    env->idt.limit = sregs.idt.limit;
    env->idt.base = sregs.idt.base;
    env->gdt.limit = sregs.gdt.limit;
    env->gdt.base = sregs.gdt.base;

    env->cr[0] = sregs.cr0;
    env->cr[2] = sregs.cr2;
    env->cr[3] = sregs.cr3;
    env->cr[4] = sregs.cr4;

    env->efer = sregs.efer;
1941 1942

    /* changes to apic base and cr8/tpr are read back via kvm_arch_post_run */
1943
    x86_update_hflags(env);
A
aliguori 已提交
1944 1945 1946 1947

    return 0;
}

1948
static int kvm_get_msrs(X86CPU *cpu)
A
aliguori 已提交
1949
{
1950
    CPUX86State *env = &cpu->env;
1951
    struct kvm_msr_entry *msrs = cpu->kvm_msr_buf->entries;
1952
    int ret, i;
1953
    uint64_t mtrr_top_bits;
A
aliguori 已提交
1954

1955 1956
    kvm_msr_buf_reset(cpu);

1957 1958 1959 1960
    kvm_msr_entry_add(cpu, MSR_IA32_SYSENTER_CS, 0);
    kvm_msr_entry_add(cpu, MSR_IA32_SYSENTER_ESP, 0);
    kvm_msr_entry_add(cpu, MSR_IA32_SYSENTER_EIP, 0);
    kvm_msr_entry_add(cpu, MSR_PAT, 0);
1961
    if (has_msr_star) {
1962
        kvm_msr_entry_add(cpu, MSR_STAR, 0);
1963
    }
1964
    if (has_msr_hsave_pa) {
1965
        kvm_msr_entry_add(cpu, MSR_VM_HSAVE_PA, 0);
1966
    }
1967
    if (has_msr_tsc_aux) {
1968
        kvm_msr_entry_add(cpu, MSR_TSC_AUX, 0);
1969
    }
1970
    if (has_msr_tsc_adjust) {
1971
        kvm_msr_entry_add(cpu, MSR_TSC_ADJUST, 0);
1972
    }
1973
    if (has_msr_tsc_deadline) {
1974
        kvm_msr_entry_add(cpu, MSR_IA32_TSCDEADLINE, 0);
1975
    }
A
Avi Kivity 已提交
1976
    if (has_msr_misc_enable) {
1977
        kvm_msr_entry_add(cpu, MSR_IA32_MISC_ENABLE, 0);
A
Avi Kivity 已提交
1978
    }
1979
    if (has_msr_smbase) {
1980
        kvm_msr_entry_add(cpu, MSR_IA32_SMBASE, 0);
1981
    }
1982
    if (has_msr_feature_control) {
1983
        kvm_msr_entry_add(cpu, MSR_IA32_FEATURE_CONTROL, 0);
1984
    }
L
Liu Jinsong 已提交
1985
    if (has_msr_bndcfgs) {
1986
        kvm_msr_entry_add(cpu, MSR_IA32_BNDCFGS, 0);
L
Liu Jinsong 已提交
1987
    }
1988
    if (has_msr_xss) {
1989
        kvm_msr_entry_add(cpu, MSR_IA32_XSS, 0);
1990
    }
1991 1992 1993
    if (has_msr_spec_ctrl) {
        kvm_msr_entry_add(cpu, MSR_IA32_SPEC_CTRL, 0);
    }
1994

1995 1996

    if (!env->tsc_valid) {
1997
        kvm_msr_entry_add(cpu, MSR_IA32_TSC, 0);
1998
        env->tsc_valid = !runstate_is_running();
1999 2000
    }

A
aliguori 已提交
2001
#ifdef TARGET_X86_64
2002
    if (lm_capable_kernel) {
2003 2004 2005 2006
        kvm_msr_entry_add(cpu, MSR_CSTAR, 0);
        kvm_msr_entry_add(cpu, MSR_KERNELGSBASE, 0);
        kvm_msr_entry_add(cpu, MSR_FMASK, 0);
        kvm_msr_entry_add(cpu, MSR_LSTAR, 0);
2007
    }
A
aliguori 已提交
2008
#endif
2009 2010
    kvm_msr_entry_add(cpu, MSR_KVM_SYSTEM_TIME, 0);
    kvm_msr_entry_add(cpu, MSR_KVM_WALL_CLOCK, 0);
2011
    if (env->features[FEAT_KVM] & (1 << KVM_FEATURE_ASYNC_PF)) {
2012
        kvm_msr_entry_add(cpu, MSR_KVM_ASYNC_PF_EN, 0);
2013
    }
2014
    if (env->features[FEAT_KVM] & (1 << KVM_FEATURE_PV_EOI)) {
2015
        kvm_msr_entry_add(cpu, MSR_KVM_PV_EOI_EN, 0);
M
Michael S. Tsirkin 已提交
2016
    }
2017
    if (env->features[FEAT_KVM] & (1 << KVM_FEATURE_STEAL_TIME)) {
2018
        kvm_msr_entry_add(cpu, MSR_KVM_STEAL_TIME, 0);
2019
    }
2020 2021 2022 2023 2024 2025 2026 2027
    if (has_architectural_pmu_version > 0) {
        if (has_architectural_pmu_version > 1) {
            kvm_msr_entry_add(cpu, MSR_CORE_PERF_FIXED_CTR_CTRL, 0);
            kvm_msr_entry_add(cpu, MSR_CORE_PERF_GLOBAL_CTRL, 0);
            kvm_msr_entry_add(cpu, MSR_CORE_PERF_GLOBAL_STATUS, 0);
            kvm_msr_entry_add(cpu, MSR_CORE_PERF_GLOBAL_OVF_CTRL, 0);
        }
        for (i = 0; i < num_architectural_pmu_fixed_counters; i++) {
2028
            kvm_msr_entry_add(cpu, MSR_CORE_PERF_FIXED_CTR0 + i, 0);
P
Paolo Bonzini 已提交
2029
        }
2030
        for (i = 0; i < num_architectural_pmu_gp_counters; i++) {
2031 2032
            kvm_msr_entry_add(cpu, MSR_P6_PERFCTR0 + i, 0);
            kvm_msr_entry_add(cpu, MSR_P6_EVNTSEL0 + i, 0);
P
Paolo Bonzini 已提交
2033 2034
        }
    }
2035

2036
    if (env->mcg_cap) {
2037 2038
        kvm_msr_entry_add(cpu, MSR_MCG_STATUS, 0);
        kvm_msr_entry_add(cpu, MSR_MCG_CTL, 0);
2039 2040 2041
        if (has_msr_mcg_ext_ctl) {
            kvm_msr_entry_add(cpu, MSR_MCG_EXT_CTL, 0);
        }
2042
        for (i = 0; i < (env->mcg_cap & 0xff) * 4; i++) {
2043
            kvm_msr_entry_add(cpu, MSR_MC0_CTL + i, 0);
2044
        }
2045 2046
    }

2047
    if (has_msr_hv_hypercall) {
2048 2049
        kvm_msr_entry_add(cpu, HV_X64_MSR_HYPERCALL, 0);
        kvm_msr_entry_add(cpu, HV_X64_MSR_GUEST_OS_ID, 0);
2050
    }
2051
    if (cpu->hyperv_vapic) {
2052
        kvm_msr_entry_add(cpu, HV_X64_MSR_APIC_ASSIST_PAGE, 0);
2053
    }
2054
    if (cpu->hyperv_time) {
2055
        kvm_msr_entry_add(cpu, HV_X64_MSR_REFERENCE_TSC, 0);
2056
    }
2057 2058 2059
    if (has_msr_hv_crash) {
        int j;

2060
        for (j = 0; j < HV_CRASH_PARAMS; j++) {
2061
            kvm_msr_entry_add(cpu, HV_X64_MSR_CRASH_P0 + j, 0);
2062 2063
        }
    }
2064
    if (has_msr_hv_runtime) {
2065
        kvm_msr_entry_add(cpu, HV_X64_MSR_VP_RUNTIME, 0);
2066
    }
2067 2068 2069
    if (cpu->hyperv_synic) {
        uint32_t msr;

2070 2071 2072
        kvm_msr_entry_add(cpu, HV_X64_MSR_SCONTROL, 0);
        kvm_msr_entry_add(cpu, HV_X64_MSR_SIEFP, 0);
        kvm_msr_entry_add(cpu, HV_X64_MSR_SIMP, 0);
2073
        for (msr = HV_X64_MSR_SINT0; msr <= HV_X64_MSR_SINT15; msr++) {
2074
            kvm_msr_entry_add(cpu, msr, 0);
2075 2076
        }
    }
2077 2078 2079 2080 2081
    if (has_msr_hv_stimer) {
        uint32_t msr;

        for (msr = HV_X64_MSR_STIMER0_CONFIG; msr <= HV_X64_MSR_STIMER3_COUNT;
             msr++) {
2082
            kvm_msr_entry_add(cpu, msr, 0);
2083 2084
        }
    }
2085
    if (env->features[FEAT_1_EDX] & CPUID_MTRR) {
2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097
        kvm_msr_entry_add(cpu, MSR_MTRRdefType, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix64K_00000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix16K_80000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix16K_A0000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix4K_C0000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix4K_C8000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix4K_D0000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix4K_D8000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix4K_E0000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix4K_E8000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix4K_F0000, 0);
        kvm_msr_entry_add(cpu, MSR_MTRRfix4K_F8000, 0);
2098
        for (i = 0; i < MSR_MTRRcap_VCNT; i++) {
2099 2100
            kvm_msr_entry_add(cpu, MSR_MTRRphysBase(i), 0);
            kvm_msr_entry_add(cpu, MSR_MTRRphysMask(i), 0);
2101 2102
        }
    }
2103

2104
    ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_MSRS, cpu->kvm_msr_buf);
2105
    if (ret < 0) {
A
aliguori 已提交
2106
        return ret;
2107
    }
A
aliguori 已提交
2108

2109 2110 2111 2112 2113 2114
    if (ret < cpu->kvm_msr_buf->nmsrs) {
        struct kvm_msr_entry *e = &cpu->kvm_msr_buf->entries[ret];
        error_report("error: failed to get MSR 0x%" PRIx32,
                     (uint32_t)e->index);
    }

2115
    assert(ret == cpu->kvm_msr_buf->nmsrs);
2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139
    /*
     * MTRR masks: Each mask consists of 5 parts
     * a  10..0: must be zero
     * b  11   : valid bit
     * c n-1.12: actual mask bits
     * d  51..n: reserved must be zero
     * e  63.52: reserved must be zero
     *
     * 'n' is the number of physical bits supported by the CPU and is
     * apparently always <= 52.   We know our 'n' but don't know what
     * the destinations 'n' is; it might be smaller, in which case
     * it masks (c) on loading. It might be larger, in which case
     * we fill 'd' so that d..c is consistent irrespetive of the 'n'
     * we're migrating to.
     */

    if (cpu->fill_mtrr_mask) {
        QEMU_BUILD_BUG_ON(TARGET_PHYS_ADDR_SPACE_BITS > 52);
        assert(cpu->phys_bits <= TARGET_PHYS_ADDR_SPACE_BITS);
        mtrr_top_bits = MAKE_64BIT_MASK(cpu->phys_bits, 52 - cpu->phys_bits);
    } else {
        mtrr_top_bits = 0;
    }

A
aliguori 已提交
2140
    for (i = 0; i < ret; i++) {
P
Paolo Bonzini 已提交
2141 2142
        uint32_t index = msrs[i].index;
        switch (index) {
A
aliguori 已提交
2143 2144 2145 2146 2147 2148 2149 2150 2151
        case MSR_IA32_SYSENTER_CS:
            env->sysenter_cs = msrs[i].data;
            break;
        case MSR_IA32_SYSENTER_ESP:
            env->sysenter_esp = msrs[i].data;
            break;
        case MSR_IA32_SYSENTER_EIP:
            env->sysenter_eip = msrs[i].data;
            break;
2152 2153 2154
        case MSR_PAT:
            env->pat = msrs[i].data;
            break;
A
aliguori 已提交
2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174
        case MSR_STAR:
            env->star = msrs[i].data;
            break;
#ifdef TARGET_X86_64
        case MSR_CSTAR:
            env->cstar = msrs[i].data;
            break;
        case MSR_KERNELGSBASE:
            env->kernelgsbase = msrs[i].data;
            break;
        case MSR_FMASK:
            env->fmask = msrs[i].data;
            break;
        case MSR_LSTAR:
            env->lstar = msrs[i].data;
            break;
#endif
        case MSR_IA32_TSC:
            env->tsc = msrs[i].data;
            break;
2175 2176 2177
        case MSR_TSC_AUX:
            env->tsc_aux = msrs[i].data;
            break;
2178 2179 2180
        case MSR_TSC_ADJUST:
            env->tsc_adjust = msrs[i].data;
            break;
2181 2182 2183
        case MSR_IA32_TSCDEADLINE:
            env->tsc_deadline = msrs[i].data;
            break;
2184 2185 2186
        case MSR_VM_HSAVE_PA:
            env->vm_hsave = msrs[i].data;
            break;
2187 2188 2189 2190 2191 2192
        case MSR_KVM_SYSTEM_TIME:
            env->system_time_msr = msrs[i].data;
            break;
        case MSR_KVM_WALL_CLOCK:
            env->wall_clock_msr = msrs[i].data;
            break;
2193 2194 2195 2196 2197 2198
        case MSR_MCG_STATUS:
            env->mcg_status = msrs[i].data;
            break;
        case MSR_MCG_CTL:
            env->mcg_ctl = msrs[i].data;
            break;
2199 2200 2201
        case MSR_MCG_EXT_CTL:
            env->mcg_ext_ctl = msrs[i].data;
            break;
A
Avi Kivity 已提交
2202 2203 2204
        case MSR_IA32_MISC_ENABLE:
            env->msr_ia32_misc_enable = msrs[i].data;
            break;
2205 2206 2207
        case MSR_IA32_SMBASE:
            env->smbase = msrs[i].data;
            break;
2208 2209
        case MSR_IA32_FEATURE_CONTROL:
            env->msr_ia32_feature_control = msrs[i].data;
2210
            break;
L
Liu Jinsong 已提交
2211 2212 2213
        case MSR_IA32_BNDCFGS:
            env->msr_bndcfgs = msrs[i].data;
            break;
2214 2215 2216
        case MSR_IA32_XSS:
            env->xss = msrs[i].data;
            break;
2217 2218 2219 2220 2221
        default:
            if (msrs[i].index >= MSR_MC0_CTL &&
                msrs[i].index < MSR_MC0_CTL + (env->mcg_cap & 0xff) * 4) {
                env->mce_banks[msrs[i].index - MSR_MC0_CTL] = msrs[i].data;
            }
H
Hidetoshi Seto 已提交
2222
            break;
2223 2224 2225
        case MSR_KVM_ASYNC_PF_EN:
            env->async_pf_en_msr = msrs[i].data;
            break;
M
Michael S. Tsirkin 已提交
2226 2227 2228
        case MSR_KVM_PV_EOI_EN:
            env->pv_eoi_en_msr = msrs[i].data;
            break;
2229 2230 2231
        case MSR_KVM_STEAL_TIME:
            env->steal_time_msr = msrs[i].data;
            break;
P
Paolo Bonzini 已提交
2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252
        case MSR_CORE_PERF_FIXED_CTR_CTRL:
            env->msr_fixed_ctr_ctrl = msrs[i].data;
            break;
        case MSR_CORE_PERF_GLOBAL_CTRL:
            env->msr_global_ctrl = msrs[i].data;
            break;
        case MSR_CORE_PERF_GLOBAL_STATUS:
            env->msr_global_status = msrs[i].data;
            break;
        case MSR_CORE_PERF_GLOBAL_OVF_CTRL:
            env->msr_global_ovf_ctrl = msrs[i].data;
            break;
        case MSR_CORE_PERF_FIXED_CTR0 ... MSR_CORE_PERF_FIXED_CTR0 + MAX_FIXED_COUNTERS - 1:
            env->msr_fixed_counters[index - MSR_CORE_PERF_FIXED_CTR0] = msrs[i].data;
            break;
        case MSR_P6_PERFCTR0 ... MSR_P6_PERFCTR0 + MAX_GP_COUNTERS - 1:
            env->msr_gp_counters[index - MSR_P6_PERFCTR0] = msrs[i].data;
            break;
        case MSR_P6_EVNTSEL0 ... MSR_P6_EVNTSEL0 + MAX_GP_COUNTERS - 1:
            env->msr_gp_evtsel[index - MSR_P6_EVNTSEL0] = msrs[i].data;
            break;
2253 2254 2255 2256 2257 2258
        case HV_X64_MSR_HYPERCALL:
            env->msr_hv_hypercall = msrs[i].data;
            break;
        case HV_X64_MSR_GUEST_OS_ID:
            env->msr_hv_guest_os_id = msrs[i].data;
            break;
2259 2260 2261
        case HV_X64_MSR_APIC_ASSIST_PAGE:
            env->msr_hv_vapic = msrs[i].data;
            break;
2262 2263 2264
        case HV_X64_MSR_REFERENCE_TSC:
            env->msr_hv_tsc = msrs[i].data;
            break;
2265 2266 2267
        case HV_X64_MSR_CRASH_P0 ... HV_X64_MSR_CRASH_P4:
            env->msr_hv_crash_params[index - HV_X64_MSR_CRASH_P0] = msrs[i].data;
            break;
2268 2269 2270
        case HV_X64_MSR_VP_RUNTIME:
            env->msr_hv_runtime = msrs[i].data;
            break;
2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281
        case HV_X64_MSR_SCONTROL:
            env->msr_hv_synic_control = msrs[i].data;
            break;
        case HV_X64_MSR_SIEFP:
            env->msr_hv_synic_evt_page = msrs[i].data;
            break;
        case HV_X64_MSR_SIMP:
            env->msr_hv_synic_msg_page = msrs[i].data;
            break;
        case HV_X64_MSR_SINT0 ... HV_X64_MSR_SINT15:
            env->msr_hv_synic_sint[index - HV_X64_MSR_SINT0] = msrs[i].data;
2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295
            break;
        case HV_X64_MSR_STIMER0_CONFIG:
        case HV_X64_MSR_STIMER1_CONFIG:
        case HV_X64_MSR_STIMER2_CONFIG:
        case HV_X64_MSR_STIMER3_CONFIG:
            env->msr_hv_stimer_config[(index - HV_X64_MSR_STIMER0_CONFIG)/2] =
                                msrs[i].data;
            break;
        case HV_X64_MSR_STIMER0_COUNT:
        case HV_X64_MSR_STIMER1_COUNT:
        case HV_X64_MSR_STIMER2_COUNT:
        case HV_X64_MSR_STIMER3_COUNT:
            env->msr_hv_stimer_count[(index - HV_X64_MSR_STIMER0_COUNT)/2] =
                                msrs[i].data;
2296
            break;
2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334
        case MSR_MTRRdefType:
            env->mtrr_deftype = msrs[i].data;
            break;
        case MSR_MTRRfix64K_00000:
            env->mtrr_fixed[0] = msrs[i].data;
            break;
        case MSR_MTRRfix16K_80000:
            env->mtrr_fixed[1] = msrs[i].data;
            break;
        case MSR_MTRRfix16K_A0000:
            env->mtrr_fixed[2] = msrs[i].data;
            break;
        case MSR_MTRRfix4K_C0000:
            env->mtrr_fixed[3] = msrs[i].data;
            break;
        case MSR_MTRRfix4K_C8000:
            env->mtrr_fixed[4] = msrs[i].data;
            break;
        case MSR_MTRRfix4K_D0000:
            env->mtrr_fixed[5] = msrs[i].data;
            break;
        case MSR_MTRRfix4K_D8000:
            env->mtrr_fixed[6] = msrs[i].data;
            break;
        case MSR_MTRRfix4K_E0000:
            env->mtrr_fixed[7] = msrs[i].data;
            break;
        case MSR_MTRRfix4K_E8000:
            env->mtrr_fixed[8] = msrs[i].data;
            break;
        case MSR_MTRRfix4K_F0000:
            env->mtrr_fixed[9] = msrs[i].data;
            break;
        case MSR_MTRRfix4K_F8000:
            env->mtrr_fixed[10] = msrs[i].data;
            break;
        case MSR_MTRRphysBase(0) ... MSR_MTRRphysMask(MSR_MTRRcap_VCNT - 1):
            if (index & 1) {
2335 2336
                env->mtrr_var[MSR_MTRRphysIndex(index)].mask = msrs[i].data |
                                                               mtrr_top_bits;
2337 2338 2339 2340
            } else {
                env->mtrr_var[MSR_MTRRphysIndex(index)].base = msrs[i].data;
            }
            break;
2341 2342 2343
        case MSR_IA32_SPEC_CTRL:
            env->spec_ctrl = msrs[i].data;
            break;
A
aliguori 已提交
2344 2345 2346 2347 2348 2349
        }
    }

    return 0;
}

2350
static int kvm_put_mp_state(X86CPU *cpu)
2351
{
2352
    struct kvm_mp_state mp_state = { .mp_state = cpu->env.mp_state };
2353

2354
    return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_MP_STATE, &mp_state);
2355 2356
}

2357
static int kvm_get_mp_state(X86CPU *cpu)
2358
{
2359
    CPUState *cs = CPU(cpu);
2360
    CPUX86State *env = &cpu->env;
2361 2362 2363
    struct kvm_mp_state mp_state;
    int ret;

2364
    ret = kvm_vcpu_ioctl(cs, KVM_GET_MP_STATE, &mp_state);
2365 2366 2367 2368
    if (ret < 0) {
        return ret;
    }
    env->mp_state = mp_state.mp_state;
2369
    if (kvm_irqchip_in_kernel()) {
2370
        cs->halted = (mp_state.mp_state == KVM_MP_STATE_HALTED);
2371
    }
2372 2373 2374
    return 0;
}

2375
static int kvm_get_apic(X86CPU *cpu)
2376
{
2377
    DeviceState *apic = cpu->apic_state;
2378 2379 2380
    struct kvm_lapic_state kapic;
    int ret;

2381
    if (apic && kvm_irqchip_in_kernel()) {
2382
        ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_LAPIC, &kapic);
2383 2384 2385 2386 2387 2388 2389 2390 2391
        if (ret < 0) {
            return ret;
        }

        kvm_get_apic_state(apic, &kapic);
    }
    return 0;
}

2392
static int kvm_put_vcpu_events(X86CPU *cpu, int level)
2393
{
2394
    CPUState *cs = CPU(cpu);
2395
    CPUX86State *env = &cpu->env;
2396
    struct kvm_vcpu_events events = {};
2397 2398 2399 2400 2401

    if (!kvm_has_vcpu_events()) {
        return 0;
    }

2402 2403
    events.exception.injected = (env->exception_injected >= 0);
    events.exception.nr = env->exception_injected;
2404 2405
    events.exception.has_error_code = env->has_error_code;
    events.exception.error_code = env->error_code;
2406
    events.exception.pad = 0;
2407 2408 2409 2410 2411 2412 2413 2414

    events.interrupt.injected = (env->interrupt_injected >= 0);
    events.interrupt.nr = env->interrupt_injected;
    events.interrupt.soft = env->soft_interrupt;

    events.nmi.injected = env->nmi_injected;
    events.nmi.pending = env->nmi_pending;
    events.nmi.masked = !!(env->hflags2 & HF2_NMI_MASK);
2415
    events.nmi.pad = 0;
2416 2417

    events.sipi_vector = env->sipi_vector;
2418
    events.flags = 0;
2419

2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434
    if (has_msr_smbase) {
        events.smi.smm = !!(env->hflags & HF_SMM_MASK);
        events.smi.smm_inside_nmi = !!(env->hflags2 & HF2_SMM_INSIDE_NMI_MASK);
        if (kvm_irqchip_in_kernel()) {
            /* As soon as these are moved to the kernel, remove them
             * from cs->interrupt_request.
             */
            events.smi.pending = cs->interrupt_request & CPU_INTERRUPT_SMI;
            events.smi.latched_init = cs->interrupt_request & CPU_INTERRUPT_INIT;
            cs->interrupt_request &= ~(CPU_INTERRUPT_INIT | CPU_INTERRUPT_SMI);
        } else {
            /* Keep these in cs->interrupt_request.  */
            events.smi.pending = 0;
            events.smi.latched_init = 0;
        }
2435 2436 2437 2438 2439 2440
        /* Stop SMI delivery on old machine types to avoid a reboot
         * on an inward migration of an old VM.
         */
        if (!cpu->kvm_no_smi_migration) {
            events.flags |= KVM_VCPUEVENT_VALID_SMM;
        }
2441 2442
    }

2443
    if (level >= KVM_PUT_RESET_STATE) {
2444 2445 2446 2447
        events.flags |= KVM_VCPUEVENT_VALID_NMI_PENDING;
        if (env->mp_state == KVM_MP_STATE_SIPI_RECEIVED) {
            events.flags |= KVM_VCPUEVENT_VALID_SIPI_VECTOR;
        }
2448
    }
2449

2450
    return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_VCPU_EVENTS, &events);
2451 2452
}

2453
static int kvm_get_vcpu_events(X86CPU *cpu)
2454
{
2455
    CPUX86State *env = &cpu->env;
2456 2457 2458 2459 2460 2461 2462
    struct kvm_vcpu_events events;
    int ret;

    if (!kvm_has_vcpu_events()) {
        return 0;
    }

2463
    memset(&events, 0, sizeof(events));
2464
    ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_VCPU_EVENTS, &events);
2465 2466 2467
    if (ret < 0) {
       return ret;
    }
2468
    env->exception_injected =
2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484
       events.exception.injected ? events.exception.nr : -1;
    env->has_error_code = events.exception.has_error_code;
    env->error_code = events.exception.error_code;

    env->interrupt_injected =
        events.interrupt.injected ? events.interrupt.nr : -1;
    env->soft_interrupt = events.interrupt.soft;

    env->nmi_injected = events.nmi.injected;
    env->nmi_pending = events.nmi.pending;
    if (events.nmi.masked) {
        env->hflags2 |= HF2_NMI_MASK;
    } else {
        env->hflags2 &= ~HF2_NMI_MASK;
    }

2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507
    if (events.flags & KVM_VCPUEVENT_VALID_SMM) {
        if (events.smi.smm) {
            env->hflags |= HF_SMM_MASK;
        } else {
            env->hflags &= ~HF_SMM_MASK;
        }
        if (events.smi.pending) {
            cpu_interrupt(CPU(cpu), CPU_INTERRUPT_SMI);
        } else {
            cpu_reset_interrupt(CPU(cpu), CPU_INTERRUPT_SMI);
        }
        if (events.smi.smm_inside_nmi) {
            env->hflags2 |= HF2_SMM_INSIDE_NMI_MASK;
        } else {
            env->hflags2 &= ~HF2_SMM_INSIDE_NMI_MASK;
        }
        if (events.smi.latched_init) {
            cpu_interrupt(CPU(cpu), CPU_INTERRUPT_INIT);
        } else {
            cpu_reset_interrupt(CPU(cpu), CPU_INTERRUPT_INIT);
        }
    }

2508 2509 2510 2511 2512
    env->sipi_vector = events.sipi_vector;

    return 0;
}

2513
static int kvm_guest_debug_workarounds(X86CPU *cpu)
2514
{
2515
    CPUState *cs = CPU(cpu);
2516
    CPUX86State *env = &cpu->env;
2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537
    int ret = 0;
    unsigned long reinject_trap = 0;

    if (!kvm_has_vcpu_events()) {
        if (env->exception_injected == 1) {
            reinject_trap = KVM_GUESTDBG_INJECT_DB;
        } else if (env->exception_injected == 3) {
            reinject_trap = KVM_GUESTDBG_INJECT_BP;
        }
        env->exception_injected = -1;
    }

    /*
     * Kernels before KVM_CAP_X86_ROBUST_SINGLESTEP overwrote flags.TF
     * injected via SET_GUEST_DEBUG while updating GP regs. Work around this
     * by updating the debug state once again if single-stepping is on.
     * Another reason to call kvm_update_guest_debug here is a pending debug
     * trap raise by the guest. On kernels without SET_VCPU_EVENTS we have to
     * reinject them via SET_GUEST_DEBUG.
     */
    if (reinject_trap ||
2538
        (!kvm_has_robust_singlestep() && cs->singlestep_enabled)) {
2539
        ret = kvm_update_guest_debug(cs, reinject_trap);
2540 2541 2542 2543
    }
    return ret;
}

2544
static int kvm_put_debugregs(X86CPU *cpu)
2545
{
2546
    CPUX86State *env = &cpu->env;
2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560
    struct kvm_debugregs dbgregs;
    int i;

    if (!kvm_has_debugregs()) {
        return 0;
    }

    for (i = 0; i < 4; i++) {
        dbgregs.db[i] = env->dr[i];
    }
    dbgregs.dr6 = env->dr[6];
    dbgregs.dr7 = env->dr[7];
    dbgregs.flags = 0;

2561
    return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_DEBUGREGS, &dbgregs);
2562 2563
}

2564
static int kvm_get_debugregs(X86CPU *cpu)
2565
{
2566
    CPUX86State *env = &cpu->env;
2567 2568 2569 2570 2571 2572 2573
    struct kvm_debugregs dbgregs;
    int i, ret;

    if (!kvm_has_debugregs()) {
        return 0;
    }

2574
    ret = kvm_vcpu_ioctl(CPU(cpu), KVM_GET_DEBUGREGS, &dbgregs);
2575
    if (ret < 0) {
2576
        return ret;
2577 2578 2579 2580 2581 2582 2583 2584 2585 2586
    }
    for (i = 0; i < 4; i++) {
        env->dr[i] = dbgregs.db[i];
    }
    env->dr[4] = env->dr[6] = dbgregs.dr6;
    env->dr[5] = env->dr[7] = dbgregs.dr7;

    return 0;
}

A
Andreas Färber 已提交
2587
int kvm_arch_put_registers(CPUState *cpu, int level)
A
aliguori 已提交
2588
{
A
Andreas Färber 已提交
2589
    X86CPU *x86_cpu = X86_CPU(cpu);
A
aliguori 已提交
2590 2591
    int ret;

2592
    assert(cpu_is_stopped(cpu) || qemu_cpu_is_self(cpu));
2593

2594
    if (level >= KVM_PUT_RESET_STATE) {
2595 2596 2597 2598 2599 2600
        ret = kvm_put_msr_feature_control(x86_cpu);
        if (ret < 0) {
            return ret;
        }
    }

2601 2602 2603 2604 2605 2606 2607 2608 2609
    if (level == KVM_PUT_FULL_STATE) {
        /* We don't check for kvm_arch_set_tsc_khz() errors here,
         * because TSC frequency mismatch shouldn't abort migration,
         * unless the user explicitly asked for a more strict TSC
         * setting (e.g. using an explicit "tsc-freq" option).
         */
        kvm_arch_set_tsc_khz(cpu);
    }

2610
    ret = kvm_getput_regs(x86_cpu, 1);
2611
    if (ret < 0) {
A
aliguori 已提交
2612
        return ret;
2613
    }
2614
    ret = kvm_put_xsave(x86_cpu);
2615
    if (ret < 0) {
2616
        return ret;
2617
    }
2618
    ret = kvm_put_xcrs(x86_cpu);
2619
    if (ret < 0) {
A
aliguori 已提交
2620
        return ret;
2621
    }
2622
    ret = kvm_put_sregs(x86_cpu);
2623
    if (ret < 0) {
A
aliguori 已提交
2624
        return ret;
2625
    }
2626
    /* must be before kvm_put_msrs */
2627
    ret = kvm_inject_mce_oldstyle(x86_cpu);
2628 2629 2630
    if (ret < 0) {
        return ret;
    }
2631
    ret = kvm_put_msrs(x86_cpu, level);
2632
    if (ret < 0) {
A
aliguori 已提交
2633
        return ret;
2634
    }
2635 2636 2637 2638
    ret = kvm_put_vcpu_events(x86_cpu, level);
    if (ret < 0) {
        return ret;
    }
2639
    if (level >= KVM_PUT_RESET_STATE) {
2640
        ret = kvm_put_mp_state(x86_cpu);
2641
        if (ret < 0) {
2642 2643
            return ret;
        }
2644
    }
2645 2646 2647 2648 2649

    ret = kvm_put_tscdeadline_msr(x86_cpu);
    if (ret < 0) {
        return ret;
    }
2650
    ret = kvm_put_debugregs(x86_cpu);
2651
    if (ret < 0) {
2652
        return ret;
2653
    }
2654
    /* must be last */
2655
    ret = kvm_guest_debug_workarounds(x86_cpu);
2656
    if (ret < 0) {
2657
        return ret;
2658
    }
A
aliguori 已提交
2659 2660 2661
    return 0;
}

A
Andreas Färber 已提交
2662
int kvm_arch_get_registers(CPUState *cs)
A
aliguori 已提交
2663
{
A
Andreas Färber 已提交
2664
    X86CPU *cpu = X86_CPU(cs);
A
aliguori 已提交
2665 2666
    int ret;

A
Andreas Färber 已提交
2667
    assert(cpu_is_stopped(cs) || qemu_cpu_is_self(cs));
2668

2669
    ret = kvm_get_vcpu_events(cpu);
2670
    if (ret < 0) {
2671
        goto out;
2672
    }
2673 2674 2675 2676 2677
    /*
     * KVM_GET_MPSTATE can modify CS and RIP, call it before
     * KVM_GET_REGS and KVM_GET_SREGS.
     */
    ret = kvm_get_mp_state(cpu);
2678
    if (ret < 0) {
2679
        goto out;
2680
    }
2681
    ret = kvm_getput_regs(cpu, 0);
2682
    if (ret < 0) {
2683
        goto out;
2684
    }
2685
    ret = kvm_get_xsave(cpu);
2686
    if (ret < 0) {
2687
        goto out;
2688
    }
2689
    ret = kvm_get_xcrs(cpu);
2690
    if (ret < 0) {
2691
        goto out;
2692
    }
2693
    ret = kvm_get_sregs(cpu);
2694
    if (ret < 0) {
2695
        goto out;
2696
    }
2697
    ret = kvm_get_msrs(cpu);
2698
    if (ret < 0) {
2699
        goto out;
2700
    }
2701
    ret = kvm_get_apic(cpu);
2702
    if (ret < 0) {
2703
        goto out;
2704
    }
2705
    ret = kvm_get_debugregs(cpu);
2706
    if (ret < 0) {
2707
        goto out;
2708
    }
2709 2710 2711 2712
    ret = 0;
 out:
    cpu_sync_bndcs_hflags(&cpu->env);
    return ret;
A
aliguori 已提交
2713 2714
}

A
Andreas Färber 已提交
2715
void kvm_arch_pre_run(CPUState *cpu, struct kvm_run *run)
A
aliguori 已提交
2716
{
A
Andreas Färber 已提交
2717 2718
    X86CPU *x86_cpu = X86_CPU(cpu);
    CPUX86State *env = &x86_cpu->env;
2719 2720
    int ret;

2721
    /* Inject NMI */
2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743
    if (cpu->interrupt_request & (CPU_INTERRUPT_NMI | CPU_INTERRUPT_SMI)) {
        if (cpu->interrupt_request & CPU_INTERRUPT_NMI) {
            qemu_mutex_lock_iothread();
            cpu->interrupt_request &= ~CPU_INTERRUPT_NMI;
            qemu_mutex_unlock_iothread();
            DPRINTF("injected NMI\n");
            ret = kvm_vcpu_ioctl(cpu, KVM_NMI);
            if (ret < 0) {
                fprintf(stderr, "KVM: injection failed, NMI lost (%s)\n",
                        strerror(-ret));
            }
        }
        if (cpu->interrupt_request & CPU_INTERRUPT_SMI) {
            qemu_mutex_lock_iothread();
            cpu->interrupt_request &= ~CPU_INTERRUPT_SMI;
            qemu_mutex_unlock_iothread();
            DPRINTF("injected SMI\n");
            ret = kvm_vcpu_ioctl(cpu, KVM_SMI);
            if (ret < 0) {
                fprintf(stderr, "KVM: injection failed, SMI lost (%s)\n",
                        strerror(-ret));
            }
2744
        }
2745 2746
    }

2747
    if (!kvm_pic_in_kernel()) {
2748 2749 2750
        qemu_mutex_lock_iothread();
    }

2751 2752 2753 2754 2755
    /* Force the VCPU out of its inner loop to process any INIT requests
     * or (for userspace APIC, but it is cheap to combine the checks here)
     * pending TPR access reports.
     */
    if (cpu->interrupt_request & (CPU_INTERRUPT_INIT | CPU_INTERRUPT_TPR)) {
2756 2757 2758 2759 2760 2761 2762
        if ((cpu->interrupt_request & CPU_INTERRUPT_INIT) &&
            !(env->hflags & HF_SMM_MASK)) {
            cpu->exit_request = 1;
        }
        if (cpu->interrupt_request & CPU_INTERRUPT_TPR) {
            cpu->exit_request = 1;
        }
2763
    }
A
aliguori 已提交
2764

2765
    if (!kvm_pic_in_kernel()) {
2766 2767
        /* Try to inject an interrupt if the guest can accept it */
        if (run->ready_for_interrupt_injection &&
2768
            (cpu->interrupt_request & CPU_INTERRUPT_HARD) &&
2769 2770 2771
            (env->eflags & IF_MASK)) {
            int irq;

2772
            cpu->interrupt_request &= ~CPU_INTERRUPT_HARD;
2773 2774 2775 2776 2777 2778
            irq = cpu_get_pic_interrupt(env);
            if (irq >= 0) {
                struct kvm_interrupt intr;

                intr.irq = irq;
                DPRINTF("injected interrupt %d\n", irq);
2779
                ret = kvm_vcpu_ioctl(cpu, KVM_INTERRUPT, &intr);
2780 2781 2782 2783 2784
                if (ret < 0) {
                    fprintf(stderr,
                            "KVM: injection failed, interrupt lost (%s)\n",
                            strerror(-ret));
                }
2785 2786
            }
        }
A
aliguori 已提交
2787

2788 2789 2790 2791
        /* If we have an interrupt but the guest is not ready to receive an
         * interrupt, request an interrupt window exit.  This will
         * cause a return to userspace as soon as the guest is ready to
         * receive interrupts. */
2792
        if ((cpu->interrupt_request & CPU_INTERRUPT_HARD)) {
2793 2794 2795 2796 2797 2798
            run->request_interrupt_window = 1;
        } else {
            run->request_interrupt_window = 0;
        }

        DPRINTF("setting tpr\n");
2799
        run->cr8 = cpu_get_apic_tpr(x86_cpu->apic_state);
2800 2801

        qemu_mutex_unlock_iothread();
2802
    }
A
aliguori 已提交
2803 2804
}

2805
MemTxAttrs kvm_arch_post_run(CPUState *cpu, struct kvm_run *run)
A
aliguori 已提交
2806
{
A
Andreas Färber 已提交
2807 2808 2809
    X86CPU *x86_cpu = X86_CPU(cpu);
    CPUX86State *env = &x86_cpu->env;

2810 2811 2812
    if (run->flags & KVM_RUN_X86_SMM) {
        env->hflags |= HF_SMM_MASK;
    } else {
P
Paolo Bonzini 已提交
2813
        env->hflags &= ~HF_SMM_MASK;
2814
    }
2815
    if (run->if_flag) {
A
aliguori 已提交
2816
        env->eflags |= IF_MASK;
2817
    } else {
A
aliguori 已提交
2818
        env->eflags &= ~IF_MASK;
2819
    }
2820 2821 2822 2823 2824 2825

    /* We need to protect the apic state against concurrent accesses from
     * different threads in case the userspace irqchip is used. */
    if (!kvm_irqchip_in_kernel()) {
        qemu_mutex_lock_iothread();
    }
2826 2827
    cpu_set_apic_tpr(x86_cpu->apic_state, run->cr8);
    cpu_set_apic_base(x86_cpu->apic_state, run->apic_base);
2828 2829 2830
    if (!kvm_irqchip_in_kernel()) {
        qemu_mutex_unlock_iothread();
    }
2831
    return cpu_get_mem_attrs(env);
A
aliguori 已提交
2832 2833
}

A
Andreas Färber 已提交
2834
int kvm_arch_process_async_events(CPUState *cs)
M
Marcelo Tosatti 已提交
2835
{
A
Andreas Färber 已提交
2836 2837
    X86CPU *cpu = X86_CPU(cs);
    CPUX86State *env = &cpu->env;
2838

2839
    if (cs->interrupt_request & CPU_INTERRUPT_MCE) {
2840 2841 2842
        /* We must not raise CPU_INTERRUPT_MCE if it's not supported. */
        assert(env->mcg_cap);

2843
        cs->interrupt_request &= ~CPU_INTERRUPT_MCE;
2844

2845
        kvm_cpu_synchronize_state(cs);
2846 2847 2848

        if (env->exception_injected == EXCP08_DBLE) {
            /* this means triple fault */
2849
            qemu_system_reset_request(SHUTDOWN_CAUSE_GUEST_RESET);
2850
            cs->exit_request = 1;
2851 2852 2853 2854 2855
            return 0;
        }
        env->exception_injected = EXCP12_MCHK;
        env->has_error_code = 0;

2856
        cs->halted = 0;
2857 2858 2859 2860 2861
        if (kvm_irqchip_in_kernel() && env->mp_state == KVM_MP_STATE_HALTED) {
            env->mp_state = KVM_MP_STATE_RUNNABLE;
        }
    }

2862 2863
    if ((cs->interrupt_request & CPU_INTERRUPT_INIT) &&
        !(env->hflags & HF_SMM_MASK)) {
2864 2865 2866 2867
        kvm_cpu_synchronize_state(cs);
        do_cpu_init(cpu);
    }

2868 2869 2870 2871
    if (kvm_irqchip_in_kernel()) {
        return 0;
    }

2872 2873
    if (cs->interrupt_request & CPU_INTERRUPT_POLL) {
        cs->interrupt_request &= ~CPU_INTERRUPT_POLL;
2874
        apic_poll_irq(cpu->apic_state);
2875
    }
2876
    if (((cs->interrupt_request & CPU_INTERRUPT_HARD) &&
2877
         (env->eflags & IF_MASK)) ||
2878 2879
        (cs->interrupt_request & CPU_INTERRUPT_NMI)) {
        cs->halted = 0;
2880
    }
2881
    if (cs->interrupt_request & CPU_INTERRUPT_SIPI) {
2882
        kvm_cpu_synchronize_state(cs);
2883
        do_cpu_sipi(cpu);
M
Marcelo Tosatti 已提交
2884
    }
2885 2886
    if (cs->interrupt_request & CPU_INTERRUPT_TPR) {
        cs->interrupt_request &= ~CPU_INTERRUPT_TPR;
2887
        kvm_cpu_synchronize_state(cs);
2888
        apic_handle_tpr_access_report(cpu->apic_state, env->eip,
2889 2890
                                      env->tpr_access_type);
    }
M
Marcelo Tosatti 已提交
2891

2892
    return cs->halted;
M
Marcelo Tosatti 已提交
2893 2894
}

2895
static int kvm_handle_halt(X86CPU *cpu)
A
aliguori 已提交
2896
{
2897
    CPUState *cs = CPU(cpu);
2898 2899
    CPUX86State *env = &cpu->env;

2900
    if (!((cs->interrupt_request & CPU_INTERRUPT_HARD) &&
A
aliguori 已提交
2901
          (env->eflags & IF_MASK)) &&
2902 2903
        !(cs->interrupt_request & CPU_INTERRUPT_NMI)) {
        cs->halted = 1;
2904
        return EXCP_HLT;
A
aliguori 已提交
2905 2906
    }

2907
    return 0;
A
aliguori 已提交
2908 2909
}

A
Andreas Färber 已提交
2910
static int kvm_handle_tpr_access(X86CPU *cpu)
2911
{
A
Andreas Färber 已提交
2912 2913
    CPUState *cs = CPU(cpu);
    struct kvm_run *run = cs->kvm_run;
2914

2915
    apic_handle_tpr_access_report(cpu->apic_state, run->tpr_access.rip,
2916 2917 2918 2919 2920
                                  run->tpr_access.is_write ? TPR_ACCESS_WRITE
                                                           : TPR_ACCESS_READ);
    return 1;
}

2921
int kvm_arch_insert_sw_breakpoint(CPUState *cs, struct kvm_sw_breakpoint *bp)
2922
{
2923
    static const uint8_t int3 = 0xcc;
2924

2925 2926
    if (cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)&bp->saved_insn, 1, 0) ||
        cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)&int3, 1, 1)) {
2927
        return -EINVAL;
2928
    }
2929 2930 2931
    return 0;
}

2932
int kvm_arch_remove_sw_breakpoint(CPUState *cs, struct kvm_sw_breakpoint *bp)
2933 2934 2935
{
    uint8_t int3;

2936 2937
    if (cpu_memory_rw_debug(cs, bp->pc, &int3, 1, 0) || int3 != 0xcc ||
        cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)&bp->saved_insn, 1, 1)) {
2938
        return -EINVAL;
2939
    }
2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 2953 2954
    return 0;
}

static struct {
    target_ulong addr;
    int len;
    int type;
} hw_breakpoint[4];

static int nb_hw_breakpoint;

static int find_hw_breakpoint(target_ulong addr, int len, int type)
{
    int n;

2955
    for (n = 0; n < nb_hw_breakpoint; n++) {
2956
        if (hw_breakpoint[n].addr == addr && hw_breakpoint[n].type == type &&
2957
            (hw_breakpoint[n].len == len || len == -1)) {
2958
            return n;
2959 2960
        }
    }
2961 2962 2963 2964 2965 2966 2967 2968 2969 2970 2971 2972 2973 2974 2975 2976 2977 2978
    return -1;
}

int kvm_arch_insert_hw_breakpoint(target_ulong addr,
                                  target_ulong len, int type)
{
    switch (type) {
    case GDB_BREAKPOINT_HW:
        len = 1;
        break;
    case GDB_WATCHPOINT_WRITE:
    case GDB_WATCHPOINT_ACCESS:
        switch (len) {
        case 1:
            break;
        case 2:
        case 4:
        case 8:
2979
            if (addr & (len - 1)) {
2980
                return -EINVAL;
2981
            }
2982 2983 2984 2985 2986 2987 2988 2989 2990
            break;
        default:
            return -EINVAL;
        }
        break;
    default:
        return -ENOSYS;
    }

2991
    if (nb_hw_breakpoint == 4) {
2992
        return -ENOBUFS;
2993 2994
    }
    if (find_hw_breakpoint(addr, len, type) >= 0) {
2995
        return -EEXIST;
2996
    }
2997 2998 2999 3000 3001 3002 3003 3004 3005 3006 3007 3008 3009 3010
    hw_breakpoint[nb_hw_breakpoint].addr = addr;
    hw_breakpoint[nb_hw_breakpoint].len = len;
    hw_breakpoint[nb_hw_breakpoint].type = type;
    nb_hw_breakpoint++;

    return 0;
}

int kvm_arch_remove_hw_breakpoint(target_ulong addr,
                                  target_ulong len, int type)
{
    int n;

    n = find_hw_breakpoint(addr, (type == GDB_BREAKPOINT_HW) ? 1 : len, type);
3011
    if (n < 0) {
3012
        return -ENOENT;
3013
    }
3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026
    nb_hw_breakpoint--;
    hw_breakpoint[n] = hw_breakpoint[nb_hw_breakpoint];

    return 0;
}

void kvm_arch_remove_all_hw_breakpoints(void)
{
    nb_hw_breakpoint = 0;
}

static CPUWatchpoint hw_watchpoint;

3027
static int kvm_handle_debug(X86CPU *cpu,
B
Blue Swirl 已提交
3028
                            struct kvm_debug_exit_arch *arch_info)
3029
{
3030
    CPUState *cs = CPU(cpu);
3031
    CPUX86State *env = &cpu->env;
3032
    int ret = 0;
3033 3034 3035 3036
    int n;

    if (arch_info->exception == 1) {
        if (arch_info->dr6 & (1 << 14)) {
3037
            if (cs->singlestep_enabled) {
3038
                ret = EXCP_DEBUG;
3039
            }
3040
        } else {
3041 3042
            for (n = 0; n < 4; n++) {
                if (arch_info->dr6 & (1 << n)) {
3043 3044
                    switch ((arch_info->dr7 >> (16 + n*4)) & 0x3) {
                    case 0x0:
3045
                        ret = EXCP_DEBUG;
3046 3047
                        break;
                    case 0x1:
3048
                        ret = EXCP_DEBUG;
3049
                        cs->watchpoint_hit = &hw_watchpoint;
3050 3051 3052 3053
                        hw_watchpoint.vaddr = hw_breakpoint[n].addr;
                        hw_watchpoint.flags = BP_MEM_WRITE;
                        break;
                    case 0x3:
3054
                        ret = EXCP_DEBUG;
3055
                        cs->watchpoint_hit = &hw_watchpoint;
3056 3057 3058 3059
                        hw_watchpoint.vaddr = hw_breakpoint[n].addr;
                        hw_watchpoint.flags = BP_MEM_ACCESS;
                        break;
                    }
3060 3061
                }
            }
3062
        }
3063
    } else if (kvm_find_sw_breakpoint(cs, arch_info->pc)) {
3064
        ret = EXCP_DEBUG;
3065
    }
3066
    if (ret == 0) {
3067
        cpu_synchronize_state(cs);
B
Blue Swirl 已提交
3068
        assert(env->exception_injected == -1);
3069

3070
        /* pass to guest */
B
Blue Swirl 已提交
3071 3072
        env->exception_injected = arch_info->exception;
        env->has_error_code = 0;
3073
    }
3074

3075
    return ret;
3076 3077
}

A
Andreas Färber 已提交
3078
void kvm_arch_update_guest_debug(CPUState *cpu, struct kvm_guest_debug *dbg)
3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089
{
    const uint8_t type_code[] = {
        [GDB_BREAKPOINT_HW] = 0x0,
        [GDB_WATCHPOINT_WRITE] = 0x1,
        [GDB_WATCHPOINT_ACCESS] = 0x3
    };
    const uint8_t len_code[] = {
        [1] = 0x0, [2] = 0x1, [4] = 0x3, [8] = 0x2
    };
    int n;

3090
    if (kvm_sw_breakpoints_active(cpu)) {
3091
        dbg->control |= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_USE_SW_BP;
3092
    }
3093 3094 3095 3096 3097 3098 3099
    if (nb_hw_breakpoint > 0) {
        dbg->control |= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_USE_HW_BP;
        dbg->arch.debugreg[7] = 0x0600;
        for (n = 0; n < nb_hw_breakpoint; n++) {
            dbg->arch.debugreg[n] = hw_breakpoint[n].addr;
            dbg->arch.debugreg[7] |= (2 << (n * 2)) |
                (type_code[hw_breakpoint[n].type] << (16 + n*4)) |
3100
                ((uint32_t)len_code[hw_breakpoint[n].len] << (18 + n*4));
3101 3102 3103
        }
    }
}
3104

3105 3106 3107 3108 3109 3110 3111 3112 3113 3114
static bool host_supports_vmx(void)
{
    uint32_t ecx, unused;

    host_cpuid(1, 0, &unused, &unused, &ecx, &unused);
    return ecx & CPUID_EXT_VMX;
}

#define VMX_INVALID_GUEST_STATE 0x80000021

A
Andreas Färber 已提交
3115
int kvm_arch_handle_exit(CPUState *cs, struct kvm_run *run)
3116
{
A
Andreas Färber 已提交
3117
    X86CPU *cpu = X86_CPU(cs);
3118 3119 3120 3121 3122 3123
    uint64_t code;
    int ret;

    switch (run->exit_reason) {
    case KVM_EXIT_HLT:
        DPRINTF("handle_hlt\n");
3124
        qemu_mutex_lock_iothread();
3125
        ret = kvm_handle_halt(cpu);
3126
        qemu_mutex_unlock_iothread();
3127 3128 3129 3130
        break;
    case KVM_EXIT_SET_TPR:
        ret = 0;
        break;
3131
    case KVM_EXIT_TPR_ACCESS:
3132
        qemu_mutex_lock_iothread();
A
Andreas Färber 已提交
3133
        ret = kvm_handle_tpr_access(cpu);
3134
        qemu_mutex_unlock_iothread();
3135
        break;
3136 3137 3138 3139 3140 3141
    case KVM_EXIT_FAIL_ENTRY:
        code = run->fail_entry.hardware_entry_failure_reason;
        fprintf(stderr, "KVM: entry failed, hardware error 0x%" PRIx64 "\n",
                code);
        if (host_supports_vmx() && code == VMX_INVALID_GUEST_STATE) {
            fprintf(stderr,
V
Vagrant Cascadian 已提交
3142
                    "\nIf you're running a guest on an Intel machine without "
3143 3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157
                        "unrestricted mode\n"
                    "support, the failure can be most likely due to the guest "
                        "entering an invalid\n"
                    "state for Intel VT. For example, the guest maybe running "
                        "in big real mode\n"
                    "which is not supported on less recent Intel processors."
                        "\n\n");
        }
        ret = -1;
        break;
    case KVM_EXIT_EXCEPTION:
        fprintf(stderr, "KVM: exception %d exit (error code 0x%x)\n",
                run->ex.exception, run->ex.error_code);
        ret = -1;
        break;
3158 3159
    case KVM_EXIT_DEBUG:
        DPRINTF("kvm_exit_debug\n");
3160
        qemu_mutex_lock_iothread();
3161
        ret = kvm_handle_debug(cpu, &run->debug.arch);
3162
        qemu_mutex_unlock_iothread();
3163
        break;
3164 3165 3166
    case KVM_EXIT_HYPERV:
        ret = kvm_hv_handle_exit(cpu, &run->hyperv);
        break;
3167 3168 3169 3170
    case KVM_EXIT_IOAPIC_EOI:
        ioapic_eoi_broadcast(run->eoi.vector);
        ret = 0;
        break;
3171 3172 3173 3174 3175 3176 3177 3178 3179
    default:
        fprintf(stderr, "KVM: unknown exit reason %d\n", run->exit_reason);
        ret = -1;
        break;
    }

    return ret;
}

A
Andreas Färber 已提交
3180
bool kvm_arch_stop_on_emulation_error(CPUState *cs)
3181
{
A
Andreas Färber 已提交
3182 3183 3184
    X86CPU *cpu = X86_CPU(cs);
    CPUX86State *env = &cpu->env;

3185
    kvm_cpu_synchronize_state(cs);
3186 3187
    return !(env->cr[0] & CR0_PE_MASK) ||
           ((env->segs[R_CS].selector  & 3) != 3);
3188
}
3189 3190 3191 3192 3193 3194 3195 3196 3197 3198

void kvm_arch_init_irq_routing(KVMState *s)
{
    if (!kvm_check_extension(s, KVM_CAP_IRQ_ROUTING)) {
        /* If kernel can't do irq routing, interrupt source
         * override 0->2 cannot be set up as required by HPET.
         * So we have to disable it.
         */
        no_hpet = 1;
    }
3199
    /* We know at this point that we're using the in-kernel
3200
     * irqchip, so we can use irqfds, and on x86 we know
3201
     * we can use msi via irqfd and GSI routing.
3202
     */
3203
    kvm_msi_via_irqfd_allowed = true;
3204
    kvm_gsi_routing_allowed = true;
3205 3206 3207 3208 3209 3210 3211

    if (kvm_irqchip_is_split()) {
        int i;

        /* If the ioapic is in QEMU and the lapics are in KVM, reserve
           MSI routes for signaling interrupts to the local apics. */
        for (i = 0; i < IOAPIC_NUM_PINS; i++) {
3212
            if (kvm_irqchip_add_msi_route(s, 0, NULL) < 0) {
3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225
                error_report("Could not enable split IRQ mode.");
                exit(1);
            }
        }
    }
}

int kvm_arch_irqchip_create(MachineState *ms, KVMState *s)
{
    int ret;
    if (machine_kernel_irqchip_split(ms)) {
        ret = kvm_vm_enable_cap(s, KVM_CAP_SPLIT_IRQCHIP, 0, 24);
        if (ret) {
3226
            error_report("Could not enable split irqchip mode: %s",
3227 3228 3229 3230 3231 3232 3233 3234 3235 3236
                         strerror(-ret));
            exit(1);
        } else {
            DPRINTF("Enabled KVM_CAP_SPLIT_IRQCHIP\n");
            kvm_split_irqchip = true;
            return 1;
        }
    } else {
        return 0;
    }
3237
}
3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308 3309 3310 3311 3312 3313 3314 3315 3316 3317 3318 3319 3320 3321 3322 3323 3324 3325 3326 3327 3328 3329 3330 3331 3332 3333 3334 3335 3336 3337 3338 3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376 3377

/* Classic KVM device assignment interface. Will remain x86 only. */
int kvm_device_pci_assign(KVMState *s, PCIHostDeviceAddress *dev_addr,
                          uint32_t flags, uint32_t *dev_id)
{
    struct kvm_assigned_pci_dev dev_data = {
        .segnr = dev_addr->domain,
        .busnr = dev_addr->bus,
        .devfn = PCI_DEVFN(dev_addr->slot, dev_addr->function),
        .flags = flags,
    };
    int ret;

    dev_data.assigned_dev_id =
        (dev_addr->domain << 16) | (dev_addr->bus << 8) | dev_data.devfn;

    ret = kvm_vm_ioctl(s, KVM_ASSIGN_PCI_DEVICE, &dev_data);
    if (ret < 0) {
        return ret;
    }

    *dev_id = dev_data.assigned_dev_id;

    return 0;
}

int kvm_device_pci_deassign(KVMState *s, uint32_t dev_id)
{
    struct kvm_assigned_pci_dev dev_data = {
        .assigned_dev_id = dev_id,
    };

    return kvm_vm_ioctl(s, KVM_DEASSIGN_PCI_DEVICE, &dev_data);
}

static int kvm_assign_irq_internal(KVMState *s, uint32_t dev_id,
                                   uint32_t irq_type, uint32_t guest_irq)
{
    struct kvm_assigned_irq assigned_irq = {
        .assigned_dev_id = dev_id,
        .guest_irq = guest_irq,
        .flags = irq_type,
    };

    if (kvm_check_extension(s, KVM_CAP_ASSIGN_DEV_IRQ)) {
        return kvm_vm_ioctl(s, KVM_ASSIGN_DEV_IRQ, &assigned_irq);
    } else {
        return kvm_vm_ioctl(s, KVM_ASSIGN_IRQ, &assigned_irq);
    }
}

int kvm_device_intx_assign(KVMState *s, uint32_t dev_id, bool use_host_msi,
                           uint32_t guest_irq)
{
    uint32_t irq_type = KVM_DEV_IRQ_GUEST_INTX |
        (use_host_msi ? KVM_DEV_IRQ_HOST_MSI : KVM_DEV_IRQ_HOST_INTX);

    return kvm_assign_irq_internal(s, dev_id, irq_type, guest_irq);
}

int kvm_device_intx_set_mask(KVMState *s, uint32_t dev_id, bool masked)
{
    struct kvm_assigned_pci_dev dev_data = {
        .assigned_dev_id = dev_id,
        .flags = masked ? KVM_DEV_ASSIGN_MASK_INTX : 0,
    };

    return kvm_vm_ioctl(s, KVM_ASSIGN_SET_INTX_MASK, &dev_data);
}

static int kvm_deassign_irq_internal(KVMState *s, uint32_t dev_id,
                                     uint32_t type)
{
    struct kvm_assigned_irq assigned_irq = {
        .assigned_dev_id = dev_id,
        .flags = type,
    };

    return kvm_vm_ioctl(s, KVM_DEASSIGN_DEV_IRQ, &assigned_irq);
}

int kvm_device_intx_deassign(KVMState *s, uint32_t dev_id, bool use_host_msi)
{
    return kvm_deassign_irq_internal(s, dev_id, KVM_DEV_IRQ_GUEST_INTX |
        (use_host_msi ? KVM_DEV_IRQ_HOST_MSI : KVM_DEV_IRQ_HOST_INTX));
}

int kvm_device_msi_assign(KVMState *s, uint32_t dev_id, int virq)
{
    return kvm_assign_irq_internal(s, dev_id, KVM_DEV_IRQ_HOST_MSI |
                                              KVM_DEV_IRQ_GUEST_MSI, virq);
}

int kvm_device_msi_deassign(KVMState *s, uint32_t dev_id)
{
    return kvm_deassign_irq_internal(s, dev_id, KVM_DEV_IRQ_GUEST_MSI |
                                                KVM_DEV_IRQ_HOST_MSI);
}

bool kvm_device_msix_supported(KVMState *s)
{
    /* The kernel lacks a corresponding KVM_CAP, so we probe by calling
     * KVM_ASSIGN_SET_MSIX_NR with an invalid parameter. */
    return kvm_vm_ioctl(s, KVM_ASSIGN_SET_MSIX_NR, NULL) == -EFAULT;
}

int kvm_device_msix_init_vectors(KVMState *s, uint32_t dev_id,
                                 uint32_t nr_vectors)
{
    struct kvm_assigned_msix_nr msix_nr = {
        .assigned_dev_id = dev_id,
        .entry_nr = nr_vectors,
    };

    return kvm_vm_ioctl(s, KVM_ASSIGN_SET_MSIX_NR, &msix_nr);
}

int kvm_device_msix_set_vector(KVMState *s, uint32_t dev_id, uint32_t vector,
                               int virq)
{
    struct kvm_assigned_msix_entry msix_entry = {
        .assigned_dev_id = dev_id,
        .gsi = virq,
        .entry = vector,
    };

    return kvm_vm_ioctl(s, KVM_ASSIGN_SET_MSIX_ENTRY, &msix_entry);
}

int kvm_device_msix_assign(KVMState *s, uint32_t dev_id)
{
    return kvm_assign_irq_internal(s, dev_id, KVM_DEV_IRQ_HOST_MSIX |
                                              KVM_DEV_IRQ_GUEST_MSIX, 0);
}

int kvm_device_msix_deassign(KVMState *s, uint32_t dev_id)
{
    return kvm_deassign_irq_internal(s, dev_id, KVM_DEV_IRQ_GUEST_MSIX |
                                                KVM_DEV_IRQ_HOST_MSIX);
}
3378 3379

int kvm_arch_fixup_msi_route(struct kvm_irq_routing_entry *route,
3380
                             uint64_t address, uint32_t data, PCIDevice *dev)
3381
{
3382 3383 3384 3385 3386 3387 3388 3389 3390 3391 3392 3393 3394 3395 3396 3397 3398 3399 3400 3401 3402 3403 3404 3405 3406
    X86IOMMUState *iommu = x86_iommu_get_default();

    if (iommu) {
        int ret;
        MSIMessage src, dst;
        X86IOMMUClass *class = X86_IOMMU_GET_CLASS(iommu);

        src.address = route->u.msi.address_hi;
        src.address <<= VTD_MSI_ADDR_HI_SHIFT;
        src.address |= route->u.msi.address_lo;
        src.data = route->u.msi.data;

        ret = class->int_remap(iommu, &src, &dst, dev ? \
                               pci_requester_id(dev) : \
                               X86_IOMMU_SID_INVALID);
        if (ret) {
            trace_kvm_x86_fixup_msi_error(route->gsi);
            return 1;
        }

        route->u.msi.address_hi = dst.address >> VTD_MSI_ADDR_HI_SHIFT;
        route->u.msi.address_lo = dst.address & VTD_MSI_ADDR_LO_MASK;
        route->u.msi.data = dst.data;
    }

3407 3408
    return 0;
}
3409

3410 3411 3412 3413 3414 3415 3416 3417 3418 3419 3420 3421 3422
typedef struct MSIRouteEntry MSIRouteEntry;

struct MSIRouteEntry {
    PCIDevice *dev;             /* Device pointer */
    int vector;                 /* MSI/MSIX vector index */
    int virq;                   /* Virtual IRQ index */
    QLIST_ENTRY(MSIRouteEntry) list;
};

/* List of used GSI routes */
static QLIST_HEAD(, MSIRouteEntry) msi_route_list = \
    QLIST_HEAD_INITIALIZER(msi_route_list);

3423 3424 3425 3426 3427 3428
static void kvm_update_msi_routes_all(void *private, bool global,
                                      uint32_t index, uint32_t mask)
{
    int cnt = 0;
    MSIRouteEntry *entry;
    MSIMessage msg;
3429 3430
    PCIDevice *dev;

3431 3432 3433
    /* TODO: explicit route update */
    QLIST_FOREACH(entry, &msi_route_list, list) {
        cnt++;
3434 3435 3436 3437 3438 3439
        dev = entry->dev;
        if (!msix_enabled(dev) && !msi_enabled(dev)) {
            continue;
        }
        msg = pci_get_msi_message(dev, entry->vector);
        kvm_irqchip_update_msi_route(kvm_state, entry->virq, msg, dev);
3440
    }
3441
    kvm_irqchip_commit_routes(kvm_state);
3442 3443 3444
    trace_kvm_x86_update_msi_routes(cnt);
}

3445 3446 3447
int kvm_arch_add_msi_route_post(struct kvm_irq_routing_entry *route,
                                int vector, PCIDevice *dev)
{
3448
    static bool notify_list_inited = false;
3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461 3462 3463 3464
    MSIRouteEntry *entry;

    if (!dev) {
        /* These are (possibly) IOAPIC routes only used for split
         * kernel irqchip mode, while what we are housekeeping are
         * PCI devices only. */
        return 0;
    }

    entry = g_new0(MSIRouteEntry, 1);
    entry->dev = dev;
    entry->vector = vector;
    entry->virq = route->gsi;
    QLIST_INSERT_HEAD(&msi_route_list, entry, list);

    trace_kvm_x86_add_msi_route(route->gsi);
3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476

    if (!notify_list_inited) {
        /* For the first time we do add route, add ourselves into
         * IOMMU's IEC notify list if needed. */
        X86IOMMUState *iommu = x86_iommu_get_default();
        if (iommu) {
            x86_iommu_iec_register_notifier(iommu,
                                            kvm_update_msi_routes_all,
                                            NULL);
        }
        notify_list_inited = true;
    }
3477 3478 3479 3480 3481 3482 3483 3484 3485 3486
    return 0;
}

int kvm_arch_release_virq_post(int virq)
{
    MSIRouteEntry *entry, *next;
    QLIST_FOREACH_SAFE(entry, &msi_route_list, list, next) {
        if (entry->virq == virq) {
            trace_kvm_x86_remove_msi_route(virq);
            QLIST_REMOVE(entry, list);
L
linzhecheng 已提交
3487
            g_free(entry);
3488 3489 3490
            break;
        }
    }
3491 3492
    return 0;
}
3493 3494 3495 3496 3497

int kvm_arch_msi_data_to_gsi(uint32_t data)
{
    abort();
}