svm.c 95.9 KB
Newer Older
1 2 3 4 5 6
/*
 * Kernel-based Virtual Machine driver for Linux
 *
 * AMD SVM support
 *
 * Copyright (C) 2006 Qumranet, Inc.
7
 * Copyright 2010 Red Hat, Inc. and/or its affiliates.
8 9 10 11 12 13 14 15 16
 *
 * Authors:
 *   Yaniv Kamay  <yaniv@qumranet.com>
 *   Avi Kivity   <avi@qumranet.com>
 *
 * This work is licensed under the terms of the GNU GPL, version 2.  See
 * the COPYING file in the top-level directory.
 *
 */
17 18
#include <linux/kvm_host.h>

19
#include "irq.h"
20
#include "mmu.h"
21
#include "kvm_cache_regs.h"
22
#include "x86.h"
Avi Kivity's avatar
Avi Kivity committed
23

24
#include <linux/module.h>
25
#include <linux/kernel.h>
26 27
#include <linux/vmalloc.h>
#include <linux/highmem.h>
Alexey Dobriyan's avatar
Alexey Dobriyan committed
28
#include <linux/sched.h>
29
#include <linux/ftrace_event.h>
30
#include <linux/slab.h>
31

32
#include <asm/tlbflush.h>
Avi Kivity's avatar
Avi Kivity committed
33
#include <asm/desc.h>
34
#include <asm/kvm_para.h>
35

36
#include <asm/virtext.h>
37
#include "trace.h"
38

39 40
#define __ex(x) __kvm_handle_fault_on_reboot(x)

41 42 43 44 45 46 47 48 49
MODULE_AUTHOR("Qumranet");
MODULE_LICENSE("GPL");

#define IOPM_ALLOC_ORDER 2
#define MSRPM_ALLOC_ORDER 1

#define SEG_TYPE_LDT 2
#define SEG_TYPE_BUSY_TSS16 3

50 51 52 53 54
#define SVM_FEATURE_NPT            (1 <<  0)
#define SVM_FEATURE_LBRV           (1 <<  1)
#define SVM_FEATURE_SVML           (1 <<  2)
#define SVM_FEATURE_NRIP           (1 <<  3)
#define SVM_FEATURE_PAUSE_FILTER   (1 << 10)
55

56 57 58 59
#define NESTED_EXIT_HOST	0	/* Exit handled on host level */
#define NESTED_EXIT_DONE	1	/* Exit caused nested vmexit  */
#define NESTED_EXIT_CONTINUE	2	/* Further checks needed      */

60 61
#define DEBUGCTL_RESERVED_BITS (~(0x3fULL))

62 63
static bool erratum_383_found __read_mostly;

64 65 66 67 68 69 70 71 72 73 74 75
static const u32 host_save_user_msrs[] = {
#ifdef CONFIG_X86_64
	MSR_STAR, MSR_LSTAR, MSR_CSTAR, MSR_SYSCALL_MASK, MSR_KERNEL_GS_BASE,
	MSR_FS_BASE,
#endif
	MSR_IA32_SYSENTER_CS, MSR_IA32_SYSENTER_ESP, MSR_IA32_SYSENTER_EIP,
};

#define NR_HOST_SAVE_USER_MSRS ARRAY_SIZE(host_save_user_msrs)

struct kvm_vcpu;

76 77 78
struct nested_state {
	struct vmcb *hsave;
	u64 hsave_msr;
79
	u64 vm_cr_msr;
80 81 82 83 84 85 86
	u64 vmcb;

	/* These are the merged vectors */
	u32 *msrpm;

	/* gpa pointers to the real vectors */
	u64 vmcb_msrpm;
87
	u64 vmcb_iopm;
88

89 90 91
	/* A VMEXIT is required but not yet emulated */
	bool exit_required;

92 93 94 95 96 97 98 99
	/*
	 * If we vmexit during an instruction emulation we need this to restore
	 * the l1 guest rip after the emulation
	 */
	unsigned long vmexit_rip;
	unsigned long vmexit_rsp;
	unsigned long vmexit_rax;

100 101 102 103 104 105 106 107
	/* cache for intercepts of the guest */
	u16 intercept_cr_read;
	u16 intercept_cr_write;
	u16 intercept_dr_read;
	u16 intercept_dr_write;
	u32 intercept_exceptions;
	u64 intercept;

108 109
	/* Nested Paging related state */
	u64 nested_cr3;
110 111
};

112 113 114
#define MSRPM_OFFSETS	16
static u32 msrpm_offsets[MSRPM_OFFSETS] __read_mostly;

115 116 117 118 119 120 121 122 123 124 125 126
struct vcpu_svm {
	struct kvm_vcpu vcpu;
	struct vmcb *vmcb;
	unsigned long vmcb_pa;
	struct svm_cpu_data *svm_data;
	uint64_t asid_generation;
	uint64_t sysenter_esp;
	uint64_t sysenter_eip;

	u64 next_rip;

	u64 host_user_msrs[NR_HOST_SAVE_USER_MSRS];
127
	struct {
128 129 130
		u16 fs;
		u16 gs;
		u16 ldt;
131 132
		u64 gs_base;
	} host;
133 134 135

	u32 *msrpm;

136
	struct nested_state nested;
137 138

	bool nmi_singlestep;
139 140 141

	unsigned int3_injected;
	unsigned long int3_rip;
142
	u32 apf_reason;
143 144
};

145 146
#define MSR_INVALID			0xffffffffU

147 148 149 150
static struct svm_direct_access_msrs {
	u32 index;   /* Index of the MSR */
	bool always; /* True if intercept is always on */
} direct_access_msrs[] = {
Brian Gerst's avatar
Brian Gerst committed
151
	{ .index = MSR_STAR,				.always = true  },
152 153 154 155 156 157 158 159 160 161 162 163 164 165
	{ .index = MSR_IA32_SYSENTER_CS,		.always = true  },
#ifdef CONFIG_X86_64
	{ .index = MSR_GS_BASE,				.always = true  },
	{ .index = MSR_FS_BASE,				.always = true  },
	{ .index = MSR_KERNEL_GS_BASE,			.always = true  },
	{ .index = MSR_LSTAR,				.always = true  },
	{ .index = MSR_CSTAR,				.always = true  },
	{ .index = MSR_SYSCALL_MASK,			.always = true  },
#endif
	{ .index = MSR_IA32_LASTBRANCHFROMIP,		.always = false },
	{ .index = MSR_IA32_LASTBRANCHTOIP,		.always = false },
	{ .index = MSR_IA32_LASTINTFROMIP,		.always = false },
	{ .index = MSR_IA32_LASTINTTOIP,		.always = false },
	{ .index = MSR_INVALID,				.always = false },
166 167
};

168 169 170 171
/* enable NPT for AMD64 and X86 with PAE */
#if defined(CONFIG_X86_64) || defined(CONFIG_X86_PAE)
static bool npt_enabled = true;
#else
172
static bool npt_enabled;
173
#endif
174 175 176
static int npt = 1;

module_param(npt, int, S_IRUGO);
177

178
static int nested = 1;
179 180
module_param(nested, int, S_IRUGO);

181
static void svm_flush_tlb(struct kvm_vcpu *vcpu);
182
static void svm_complete_interrupts(struct vcpu_svm *svm);
183

184
static int nested_svm_exit_handled(struct vcpu_svm *svm);
185
static int nested_svm_intercept(struct vcpu_svm *svm);
186 187 188 189
static int nested_svm_vmexit(struct vcpu_svm *svm);
static int nested_svm_check_exception(struct vcpu_svm *svm, unsigned nr,
				      bool has_error_code, u32 error_code);

190 191
static inline struct vcpu_svm *to_svm(struct kvm_vcpu *vcpu)
{
192
	return container_of(vcpu, struct vcpu_svm, vcpu);
193 194
}

Alexander Graf's avatar
Alexander Graf committed
195 196
static inline bool is_nested(struct vcpu_svm *svm)
{
197
	return svm->nested.vmcb;
Alexander Graf's avatar
Alexander Graf committed
198 199
}

200 201 202 203 204 205 206 207 208 209 210 211 212 213 214
static inline void enable_gif(struct vcpu_svm *svm)
{
	svm->vcpu.arch.hflags |= HF_GIF_MASK;
}

static inline void disable_gif(struct vcpu_svm *svm)
{
	svm->vcpu.arch.hflags &= ~HF_GIF_MASK;
}

static inline bool gif_set(struct vcpu_svm *svm)
{
	return !!(svm->vcpu.arch.hflags & HF_GIF_MASK);
}

215
static unsigned long iopm_base;
216 217 218 219

struct kvm_ldttss_desc {
	u16 limit0;
	u16 base0;
220 221
	unsigned base1:8, type:5, dpl:2, p:1;
	unsigned limit1:4, zero0:3, g:1, base2:8;
222 223 224 225 226 227 228
	u32 base3;
	u32 zero1;
} __attribute__((packed));

struct svm_cpu_data {
	int cpu;

Avi Kivity's avatar
Avi Kivity committed
229 230 231
	u64 asid_generation;
	u32 max_asid;
	u32 next_asid;
232 233 234 235 236 237
	struct kvm_ldttss_desc *tss_desc;

	struct page *save_area;
};

static DEFINE_PER_CPU(struct svm_cpu_data *, svm_data);
238
static uint32_t svm_features;
239 240 241 242 243 244 245 246

struct svm_init_data {
	int cpu;
	int r;
};

static u32 msrpm_ranges[] = {0, 0xc0000000, 0xc0010000};

247
#define NUM_MSR_MAPS ARRAY_SIZE(msrpm_ranges)
248 249 250
#define MSRS_RANGE_SIZE 2048
#define MSRS_IN_RANGE (MSRS_RANGE_SIZE * 8 / 2)

251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271
static u32 svm_msrpm_offset(u32 msr)
{
	u32 offset;
	int i;

	for (i = 0; i < NUM_MSR_MAPS; i++) {
		if (msr < msrpm_ranges[i] ||
		    msr >= msrpm_ranges[i] + MSRS_IN_RANGE)
			continue;

		offset  = (msr - msrpm_ranges[i]) / 4; /* 4 msrs per u8 */
		offset += (i * MSRS_RANGE_SIZE);       /* add range offset */

		/* Now we have the u8 offset - but need the u32 offset */
		return offset / 4;
	}

	/* MSR not in any range */
	return MSR_INVALID;
}

272 273 274 275
#define MAX_INST_SIZE 15

static inline void clgi(void)
{
276
	asm volatile (__ex(SVM_CLGI));
277 278 279 280
}

static inline void stgi(void)
{
281
	asm volatile (__ex(SVM_STGI));
282 283 284 285
}

static inline void invlpga(unsigned long addr, u32 asid)
{
286
	asm volatile (__ex(SVM_INVLPGA) : : "a"(addr), "c"(asid));
287 288 289 290
}

static inline void force_new_asid(struct kvm_vcpu *vcpu)
{
291
	to_svm(vcpu)->asid_generation--;
292 293 294 295 296 297 298
}

static inline void flush_guest_tlb(struct kvm_vcpu *vcpu)
{
	force_new_asid(vcpu);
}

299 300 301 302 303 304 305 306 307
static int get_npt_level(void)
{
#ifdef CONFIG_X86_64
	return PT64_ROOT_LEVEL;
#else
	return PT32E_ROOT_LEVEL;
#endif
}

308 309
static void svm_set_efer(struct kvm_vcpu *vcpu, u64 efer)
{
310
	vcpu->arch.efer = efer;
311
	if (!npt_enabled && !(efer & EFER_LMA))
312
		efer &= ~EFER_LME;
313

314
	to_svm(vcpu)->vmcb->save.efer = efer | EFER_SVME;
315 316 317 318 319 320 321 322
}

static int is_external_interrupt(u32 info)
{
	info &= SVM_EVTINJ_TYPE_MASK | SVM_EVTINJ_VALID;
	return info == (SVM_EVTINJ_VALID | SVM_EVTINJ_TYPE_INTR);
}

323 324 325 326 327 328
static u32 svm_get_interrupt_shadow(struct kvm_vcpu *vcpu, int mask)
{
	struct vcpu_svm *svm = to_svm(vcpu);
	u32 ret = 0;

	if (svm->vmcb->control.int_state & SVM_INTERRUPT_SHADOW_MASK)
329
		ret |= KVM_X86_SHADOW_INT_STI | KVM_X86_SHADOW_INT_MOV_SS;
330 331 332 333 334 335 336 337 338 339 340 341 342 343
	return ret & mask;
}

static void svm_set_interrupt_shadow(struct kvm_vcpu *vcpu, int mask)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	if (mask == 0)
		svm->vmcb->control.int_state &= ~SVM_INTERRUPT_SHADOW_MASK;
	else
		svm->vmcb->control.int_state |= SVM_INTERRUPT_SHADOW_MASK;

}

344 345
static void skip_emulated_instruction(struct kvm_vcpu *vcpu)
{
346 347
	struct vcpu_svm *svm = to_svm(vcpu);

348 349 350
	if (svm->vmcb->control.next_rip != 0)
		svm->next_rip = svm->vmcb->control.next_rip;

351
	if (!svm->next_rip) {
352
		if (emulate_instruction(vcpu, 0, 0, EMULTYPE_SKIP) !=
353 354
				EMULATE_DONE)
			printk(KERN_DEBUG "%s: NOP\n", __func__);
355 356
		return;
	}
357 358 359
	if (svm->next_rip - kvm_rip_read(vcpu) > MAX_INST_SIZE)
		printk(KERN_ERR "%s: ip 0x%lx next 0x%llx\n",
		       __func__, kvm_rip_read(vcpu), svm->next_rip);
360

361
	kvm_rip_write(vcpu, svm->next_rip);
362
	svm_set_interrupt_shadow(vcpu, 0);
363 364
}

365
static void svm_queue_exception(struct kvm_vcpu *vcpu, unsigned nr,
366 367
				bool has_error_code, u32 error_code,
				bool reinject)
368 369 370
{
	struct vcpu_svm *svm = to_svm(vcpu);

371 372 373 374
	/*
	 * If we are within a nested VM we'd better #VMEXIT and let the guest
	 * handle the exception
	 */
375 376
	if (!reinject &&
	    nested_svm_check_exception(svm, nr, has_error_code, error_code))
377 378
		return;

379
	if (nr == BP_VECTOR && !static_cpu_has(X86_FEATURE_NRIPS)) {
380 381 382 383 384 385 386 387 388 389 390 391 392 393 394
		unsigned long rip, old_rip = kvm_rip_read(&svm->vcpu);

		/*
		 * For guest debugging where we have to reinject #BP if some
		 * INT3 is guest-owned:
		 * Emulate nRIP by moving RIP forward. Will fail if injection
		 * raises a fault that is not intercepted. Still better than
		 * failing in all cases.
		 */
		skip_emulated_instruction(&svm->vcpu);
		rip = kvm_rip_read(&svm->vcpu);
		svm->int3_rip = rip + svm->vmcb->save.cs.base;
		svm->int3_injected = rip - old_rip;
	}

395 396 397 398 399 400 401
	svm->vmcb->control.event_inj = nr
		| SVM_EVTINJ_VALID
		| (has_error_code ? SVM_EVTINJ_VALID_ERR : 0)
		| SVM_EVTINJ_TYPE_EXEPT;
	svm->vmcb->control.event_inj_err = error_code;
}

402 403 404 405 406 407
static void svm_init_erratum_383(void)
{
	u32 low, high;
	int err;
	u64 val;

408
	if (!cpu_has_amd_erratum(amd_erratum_383))
409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425
		return;

	/* Use _safe variants to not break nested virtualization */
	val = native_read_msr_safe(MSR_AMD64_DC_CFG, &err);
	if (err)
		return;

	val |= (1ULL << 47);

	low  = lower_32_bits(val);
	high = upper_32_bits(val);

	native_write_msr_safe(MSR_AMD64_DC_CFG, low, high);

	erratum_383_found = true;
}

426 427
static int has_svm(void)
{
428
	const char *msg;
429

430
	if (!cpu_has_svm(&msg)) {
431
		printk(KERN_INFO "has_svm: %s\n", msg);
432 433 434 435 436 437 438 439
		return 0;
	}

	return 1;
}

static void svm_hardware_disable(void *garbage)
{
440
	cpu_svm_disable();
441 442
}

443
static int svm_hardware_enable(void *garbage)
444 445
{

446
	struct svm_cpu_data *sd;
447
	uint64_t efer;
448
	struct desc_ptr gdt_descr;
449 450 451
	struct desc_struct *gdt;
	int me = raw_smp_processor_id();

452 453 454 455
	rdmsrl(MSR_EFER, efer);
	if (efer & EFER_SVME)
		return -EBUSY;

456
	if (!has_svm()) {
457 458
		printk(KERN_ERR "svm_hardware_enable: err EOPNOTSUPP on %d\n",
		       me);
459
		return -EINVAL;
460
	}
461
	sd = per_cpu(svm_data, me);
462

463
	if (!sd) {
464
		printk(KERN_ERR "svm_hardware_enable: svm_data is NULL on %d\n",
465
		       me);
466
		return -EINVAL;
467 468
	}

469 470 471
	sd->asid_generation = 1;
	sd->max_asid = cpuid_ebx(SVM_CPUID_FUNC) - 1;
	sd->next_asid = sd->max_asid + 1;
472

473
	native_store_gdt(&gdt_descr);
474
	gdt = (struct desc_struct *)gdt_descr.address;
475
	sd->tss_desc = (struct kvm_ldttss_desc *)(gdt + GDT_ENTRY_TSS);
476

477
	wrmsrl(MSR_EFER, efer | EFER_SVME);
478

479
	wrmsrl(MSR_VM_HSAVE_PA, page_to_pfn(sd->save_area) << PAGE_SHIFT);
480

481 482
	svm_init_erratum_383();

483
	return 0;
484 485
}

486 487
static void svm_cpu_uninit(int cpu)
{
488
	struct svm_cpu_data *sd = per_cpu(svm_data, raw_smp_processor_id());
489

490
	if (!sd)
491 492 493
		return;

	per_cpu(svm_data, raw_smp_processor_id()) = NULL;
494 495
	__free_page(sd->save_area);
	kfree(sd);
496 497
}

498 499
static int svm_cpu_init(int cpu)
{
500
	struct svm_cpu_data *sd;
501 502
	int r;

503 504
	sd = kzalloc(sizeof(struct svm_cpu_data), GFP_KERNEL);
	if (!sd)
505
		return -ENOMEM;
506 507
	sd->cpu = cpu;
	sd->save_area = alloc_page(GFP_KERNEL);
508
	r = -ENOMEM;
509
	if (!sd->save_area)
510 511
		goto err_1;

512
	per_cpu(svm_data, cpu) = sd;
513 514 515 516

	return 0;

err_1:
517
	kfree(sd);
518 519 520 521
	return r;

}

522 523 524 525 526 527 528 529 530 531 532
static bool valid_msr_intercept(u32 index)
{
	int i;

	for (i = 0; direct_access_msrs[i].index != MSR_INVALID; i++)
		if (direct_access_msrs[i].index == index)
			return true;

	return false;
}

533 534
static void set_msr_interception(u32 *msrpm, unsigned msr,
				 int read, int write)
535
{
536 537 538
	u8 bit_read, bit_write;
	unsigned long tmp;
	u32 offset;
539

540 541 542 543 544 545
	/*
	 * If this warning triggers extend the direct_access_msrs list at the
	 * beginning of the file
	 */
	WARN_ON(!valid_msr_intercept(msr));

546 547 548 549 550 551 552 553 554 555 556
	offset    = svm_msrpm_offset(msr);
	bit_read  = 2 * (msr & 0x0f);
	bit_write = 2 * (msr & 0x0f) + 1;
	tmp       = msrpm[offset];

	BUG_ON(offset == MSR_INVALID);

	read  ? clear_bit(bit_read,  &tmp) : set_bit(bit_read,  &tmp);
	write ? clear_bit(bit_write, &tmp) : set_bit(bit_write, &tmp);

	msrpm[offset] = tmp;
557 558
}

559
static void svm_vcpu_init_msrpm(u32 *msrpm)
560 561 562
{
	int i;

563 564
	memset(msrpm, 0xff, PAGE_SIZE * (1 << MSRPM_ALLOC_ORDER));

565 566 567 568 569 570
	for (i = 0; direct_access_msrs[i].index != MSR_INVALID; i++) {
		if (!direct_access_msrs[i].always)
			continue;

		set_msr_interception(msrpm, direct_access_msrs[i].index, 1, 1);
	}
571 572
}

573 574 575 576 577 578 579 580
static void add_msr_offset(u32 offset)
{
	int i;

	for (i = 0; i < MSRPM_OFFSETS; ++i) {

		/* Offset already in list? */
		if (msrpm_offsets[i] == offset)
581
			return;
582 583 584 585 586 587 588 589 590

		/* Slot used by another offset? */
		if (msrpm_offsets[i] != MSR_INVALID)
			continue;

		/* Add offset to list */
		msrpm_offsets[i] = offset;

		return;
591
	}
592 593 594 595 596

	/*
	 * If this BUG triggers the msrpm_offsets table has an overflow. Just
	 * increase MSRPM_OFFSETS in this case.
	 */
597
	BUG();
598 599
}

600
static void init_msrpm_offsets(void)
601
{
602
	int i;
603

604 605 606 607 608 609 610 611 612 613
	memset(msrpm_offsets, 0xff, sizeof(msrpm_offsets));

	for (i = 0; direct_access_msrs[i].index != MSR_INVALID; i++) {
		u32 offset;

		offset = svm_msrpm_offset(direct_access_msrs[i].index);
		BUG_ON(offset == MSR_INVALID);

		add_msr_offset(offset);
	}
614 615
}

616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637
static void svm_enable_lbrv(struct vcpu_svm *svm)
{
	u32 *msrpm = svm->msrpm;

	svm->vmcb->control.lbr_ctl = 1;
	set_msr_interception(msrpm, MSR_IA32_LASTBRANCHFROMIP, 1, 1);
	set_msr_interception(msrpm, MSR_IA32_LASTBRANCHTOIP, 1, 1);
	set_msr_interception(msrpm, MSR_IA32_LASTINTFROMIP, 1, 1);
	set_msr_interception(msrpm, MSR_IA32_LASTINTTOIP, 1, 1);
}

static void svm_disable_lbrv(struct vcpu_svm *svm)
{
	u32 *msrpm = svm->msrpm;

	svm->vmcb->control.lbr_ctl = 0;
	set_msr_interception(msrpm, MSR_IA32_LASTBRANCHFROMIP, 0, 0);
	set_msr_interception(msrpm, MSR_IA32_LASTBRANCHTOIP, 0, 0);
	set_msr_interception(msrpm, MSR_IA32_LASTINTFROMIP, 0, 0);
	set_msr_interception(msrpm, MSR_IA32_LASTINTTOIP, 0, 0);
}

638 639 640 641
static __init int svm_hardware_setup(void)
{
	int cpu;
	struct page *iopm_pages;
642
	void *iopm_va;
643 644 645 646 647 648
	int r;

	iopm_pages = alloc_pages(GFP_KERNEL, IOPM_ALLOC_ORDER);

	if (!iopm_pages)
		return -ENOMEM;
649 650 651

	iopm_va = page_address(iopm_pages);
	memset(iopm_va, 0xff, PAGE_SIZE * (1 << IOPM_ALLOC_ORDER));
652 653
	iopm_base = page_to_pfn(iopm_pages) << PAGE_SHIFT;

654 655
	init_msrpm_offsets();

656 657 658
	if (boot_cpu_has(X86_FEATURE_NX))
		kvm_enable_efer_bits(EFER_NX);

Alexander Graf's avatar
Alexander Graf committed
659 660 661
	if (boot_cpu_has(X86_FEATURE_FXSR_OPT))
		kvm_enable_efer_bits(EFER_FFXSR);

662 663
	if (nested) {
		printk(KERN_INFO "kvm: Nested Virtualization enabled\n");
664
		kvm_enable_efer_bits(EFER_SVME | EFER_LMSLE);
665 666
	}

Zachary Amsden's avatar
Zachary Amsden committed
667
	for_each_possible_cpu(cpu) {
668 669
		r = svm_cpu_init(cpu);
		if (r)
670
			goto err;
671
	}
672 673 674

	svm_features = cpuid_edx(SVM_CPUID_FUNC);

675
	if (!boot_cpu_has(X86_FEATURE_NPT))
676 677
		npt_enabled = false;

678 679 680 681 682
	if (npt_enabled && !npt) {
		printk(KERN_INFO "kvm: Nested Paging disabled\n");
		npt_enabled = false;
	}

683
	if (npt_enabled) {
684
		printk(KERN_INFO "kvm: Nested Paging enabled\n");
685
		kvm_enable_tdp();
686 687
	} else
		kvm_disable_tdp();
688

689 690
	return 0;

691
err:
692 693 694 695 696 697 698
	__free_pages(iopm_pages, IOPM_ALLOC_ORDER);
	iopm_base = 0;
	return r;
}

static __exit void svm_hardware_unsetup(void)
{
699 700
	int cpu;

Zachary Amsden's avatar
Zachary Amsden committed
701
	for_each_possible_cpu(cpu)
702 703
		svm_cpu_uninit(cpu);

704
	__free_pages(pfn_to_page(iopm_base >> PAGE_SHIFT), IOPM_ALLOC_ORDER);
705
	iopm_base = 0;
706 707 708 709 710 711
}

static void init_seg(struct vmcb_seg *seg)
{
	seg->selector = 0;
	seg->attrib = SVM_SELECTOR_P_MASK | SVM_SELECTOR_S_MASK |
712
		      SVM_SELECTOR_WRITE_MASK; /* Read/Write Data Segment */
713 714 715 716 717 718 719 720 721 722 723 724
	seg->limit = 0xffff;
	seg->base = 0;
}

static void init_sys_seg(struct vmcb_seg *seg, uint32_t type)
{
	seg->selector = 0;
	seg->attrib = SVM_SELECTOR_P_MASK | type;
	seg->limit = 0xffff;
	seg->base = 0;
}

725 726 727 728 729 730 731 732 733 734 735 736 737 738
static void svm_write_tsc_offset(struct kvm_vcpu *vcpu, u64 offset)
{
	struct vcpu_svm *svm = to_svm(vcpu);
	u64 g_tsc_offset = 0;

	if (is_nested(svm)) {
		g_tsc_offset = svm->vmcb->control.tsc_offset -
			       svm->nested.hsave->control.tsc_offset;
		svm->nested.hsave->control.tsc_offset = offset;
	}

	svm->vmcb->control.tsc_offset = offset + g_tsc_offset;
}

Zachary Amsden's avatar
Zachary Amsden committed
739 740 741 742 743 744 745 746 747
static void svm_adjust_tsc_offset(struct kvm_vcpu *vcpu, s64 adjustment)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	svm->vmcb->control.tsc_offset += adjustment;
	if (is_nested(svm))
		svm->nested.hsave->control.tsc_offset += adjustment;
}

748
static void init_vmcb(struct vcpu_svm *svm)
749
{
750 751
	struct vmcb_control_area *control = &svm->vmcb->control;
	struct vmcb_save_area *save = &svm->vmcb->save;
752

753 754
	svm->vcpu.fpu_active = 1;

755
	control->intercept_cr_read =	INTERCEPT_CR0_MASK |
756
					INTERCEPT_CR3_MASK |
757
					INTERCEPT_CR4_MASK;
758

759
	control->intercept_cr_write =	INTERCEPT_CR0_MASK |
760
					INTERCEPT_CR3_MASK |
761 762
					INTERCEPT_CR4_MASK |
					INTERCEPT_CR8_MASK;
763

764
	control->intercept_dr_read =	INTERCEPT_DR0_MASK |
765 766
					INTERCEPT_DR1_MASK |
					INTERCEPT_DR2_MASK |
767 768 769 770 771
					INTERCEPT_DR3_MASK |
					INTERCEPT_DR4_MASK |
					INTERCEPT_DR5_MASK |
					INTERCEPT_DR6_MASK |
					INTERCEPT_DR7_MASK;
772

773
	control->intercept_dr_write =	INTERCEPT_DR0_MASK |
774 775 776
					INTERCEPT_DR1_MASK |
					INTERCEPT_DR2_MASK |
					INTERCEPT_DR3_MASK |
777
					INTERCEPT_DR4_MASK |
778
					INTERCEPT_DR5_MASK |
779
					INTERCEPT_DR6_MASK |
780 781
					INTERCEPT_DR7_MASK;

782
	control->intercept_exceptions = (1 << PF_VECTOR) |
783 784
					(1 << UD_VECTOR) |
					(1 << MC_VECTOR);
785 786


787
	control->intercept =	(1ULL << INTERCEPT_INTR) |
788
				(1ULL << INTERCEPT_NMI) |
789
				(1ULL << INTERCEPT_SMI) |
790
				(1ULL << INTERCEPT_SELECTIVE_CR0) |
791
				(1ULL << INTERCEPT_CPUID) |
792
				(1ULL << INTERCEPT_INVD) |
793
				(1ULL << INTERCEPT_HLT) |
Marcelo Tosatti's avatar
Marcelo Tosatti committed
794
				(1ULL << INTERCEPT_INVLPG) |
795 796 797 798
				(1ULL << INTERCEPT_INVLPGA) |
				(1ULL << INTERCEPT_IOIO_PROT) |
				(1ULL << INTERCEPT_MSR_PROT) |
				(1ULL << INTERCEPT_TASK_SWITCH) |
799
				(1ULL << INTERCEPT_SHUTDOWN) |
800 801 802 803 804 805
				(1ULL << INTERCEPT_VMRUN) |
				(1ULL << INTERCEPT_VMMCALL) |
				(1ULL << INTERCEPT_VMLOAD) |
				(1ULL << INTERCEPT_VMSAVE) |
				(1ULL << INTERCEPT_STGI) |
				(1ULL << INTERCEPT_CLGI) |
806
				(1ULL << INTERCEPT_SKINIT) |
807
				(1ULL << INTERCEPT_WBINVD) |
808 809
				(1ULL << INTERCEPT_MONITOR) |
				(1ULL << INTERCEPT_MWAIT);
810 811

	control->iopm_base_pa = iopm_base;
812
	control->msrpm_base_pa = __pa(svm->msrpm);
813 814 815 816 817 818 819 820 821 822 823 824 825
	control->int_ctl = V_INTR_MASKING_MASK;

	init_seg(&save->es);
	init_seg(&save->ss);
	init_seg(&save->ds);
	init_seg(&save->fs);
	init_seg(&save->gs);

	save->cs.selector = 0xf000;
	/* Executable/Readable Code Segment */
	save->cs.attrib = SVM_SELECTOR_READ_MASK | SVM_SELECTOR_P_MASK |
		SVM_SELECTOR_S_MASK | SVM_SELECTOR_CODE_MASK;
	save->cs.limit = 0xffff;
826 827 828 829 830 831 832
	/*
	 * cs.base should really be 0xffff0000, but vmx can't handle that, so
	 * be consistent with it.
	 *
	 * Replace when we have real mode working for vmx.
	 */
	save->cs.base = 0xf0000;
833 834 835 836 837 838 839

	save->gdtr.limit = 0xffff;
	save->idtr.limit = 0xffff;

	init_sys_seg(&save->ldtr, SEG_TYPE_LDT);
	init_sys_seg(&save->tr, SEG_TYPE_BUSY_TSS16);

840
	svm_set_efer(&svm->vcpu, 0);
Mike Day's avatar
Mike Day committed
841
	save->dr6 = 0xffff0ff0;
842 843 844
	save->dr7 = 0x400;
	save->rflags = 2;
	save->rip = 0x0000fff0;
845
	svm->vcpu.arch.regs[VCPU_REGS_RIP] = save->rip;
846

847 848
	/*
	 * This is the guest-visible cr0 value.
849
	 * svm_set_cr0() sets PG and WP and clears NW and CD on save->cr0.
850
	 */
851 852
	svm->vcpu.arch.cr0 = 0;
	(void)kvm_set_cr0(&svm->vcpu, X86_CR0_NW | X86_CR0_CD | X86_CR0_ET);
853

854
	save->cr4 = X86_CR4_PAE;
855
	/* rdx = ?? */
856 857 858 859

	if (npt_enabled) {
		/* Setup VMCB for Nested Paging */
		control->nested_ctl = 1;
Marcelo Tosatti's avatar
Marcelo Tosatti committed
860 861
		control->intercept &= ~((1ULL << INTERCEPT_TASK_SWITCH) |
					(1ULL << INTERCEPT_INVLPG));
862
		control->intercept_exceptions &= ~(1 << PF_VECTOR);
863 864
		control->intercept_cr_read &= ~INTERCEPT_CR3_MASK;
		control->intercept_cr_write &= ~INTERCEPT_CR3_MASK;
865 866 867 868
		save->g_pat = 0x0007040600070406ULL;
		save->cr3 = 0;
		save->cr4 = 0;
	}
869
	force_new_asid(&svm->vcpu);
870

871
	svm->nested.vmcb = 0;
872 873
	svm->vcpu.arch.hflags = 0;

874
	if (boot_cpu_has(X86_FEATURE_PAUSEFILTER)) {
875 876 877 878
		control->pause_filter_count = 3000;
		control->intercept |= (1ULL << INTERCEPT_PAUSE);
	}

879
	enable_gif(svm);
880 881
}

882
static int svm_vcpu_reset(struct kvm_vcpu *vcpu)
883 884 885
{
	struct vcpu_svm *svm = to_svm(vcpu);

886
	init_vmcb(svm);
887

888
	if (!kvm_vcpu_is_bsp(vcpu)) {
889
		kvm_rip_write(vcpu, 0);
890 891
		svm->vmcb->save.cs.base = svm->vcpu.arch.sipi_vector << 12;
		svm->vmcb->save.cs.selector = svm->vcpu.arch.sipi_vector << 8;
892
	}
893 894
	vcpu->arch.regs_avail = ~0;
	vcpu->arch.regs_dirty = ~0;
895 896

	return 0;
897 898
}

899
static struct kvm_vcpu *svm_create_vcpu(struct kvm *kvm, unsigned int id)
900
{
901
	struct vcpu_svm *svm;
902
	struct page *page;
903
	struct page *msrpm_pages;
Alexander Graf's avatar
Alexander Graf committed
904
	struct page *hsave_page;
Alexander Graf's avatar
Alexander Graf committed
905
	struct page *nested_msrpm_pages;
906
	int err;
907

908
	svm = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
909 910 911 912 913 914 915 916 917
	if (!svm) {
		err = -ENOMEM;
		goto out;
	}

	err = kvm_vcpu_init(&svm->vcpu, kvm, id);
	if (err)
		goto free_svm;

918
	err = -ENOMEM;
919
	page = alloc_page(GFP_KERNEL);
920
	if (!page)
921
		goto uninit;
922

923 924
	msrpm_pages = alloc_pages(GFP_KERNEL, MSRPM_ALLOC_ORDER);
	if (!msrpm_pages)
925
		goto free_page1;
Alexander Graf's avatar
Alexander Graf committed
926 927 928

	nested_msrpm_pages = alloc_pages(GFP_KERNEL, MSRPM_ALLOC_ORDER);
	if (!nested_msrpm_pages)
929
		goto free_page2;
930

Alexander Graf's avatar
Alexander Graf committed
931 932
	hsave_page = alloc_page(GFP_KERNEL);
	if (!hsave_page)
933 934
		goto free_page3;

935
	svm->nested.hsave = page_address(hsave_page);
Alexander Graf's avatar
Alexander Graf committed
936

937 938 939
	svm->msrpm = page_address(msrpm_pages);
	svm_vcpu_init_msrpm(svm->msrpm);

940
	svm->nested.msrpm = page_address(nested_msrpm_pages);
941
	svm_vcpu_init_msrpm(svm->nested.msrpm);
Alexander Graf's avatar
Alexander Graf committed
942

943 944 945 946
	svm->vmcb = page_address(page);
	clear_page(svm->vmcb);
	svm->vmcb_pa = page_to_pfn(page) << PAGE_SHIFT;
	svm->asid_generation = 0;
947
	init_vmcb(svm);
948
	kvm_write_tsc(&svm->vcpu, 0);
949

950 951 952 953
	err = fx_init(&svm->vcpu);
	if (err)
		goto free_page4;

954
	svm->vcpu.arch.apic_base = 0xfee00000 | MSR_IA32_APICBASE_ENABLE;
955
	if (kvm_vcpu_is_bsp(&svm->vcpu))
956
		svm->vcpu.arch.apic_base |= MSR_IA32_APICBASE_BSP;
957

958
	return &svm->vcpu;
959

960 961
free_page4:
	__free_page(hsave_page);
962 963 964 965 966 967
free_page3:
	__free_pages(nested_msrpm_pages, MSRPM_ALLOC_ORDER);
free_page2:
	__free_pages(msrpm_pages, MSRPM_ALLOC_ORDER);
free_page1:
	__free_page(page);
968 969 970
uninit:
	kvm_vcpu_uninit(&svm->vcpu);
free_svm:
971
	kmem_cache_free(kvm_vcpu_cache, svm);
972 973
out:
	return ERR_PTR(err);
974 975 976 977
}

static void svm_free_vcpu(struct kvm_vcpu *vcpu)
{
978 979
	struct vcpu_svm *svm = to_svm(vcpu);

980
	__free_page(pfn_to_page(svm->vmcb_pa >> PAGE_SHIFT));
981
	__free_pages(virt_to_page(svm->msrpm), MSRPM_ALLOC_ORDER);
982 983
	__free_page(virt_to_page(svm->nested.hsave));
	__free_pages(virt_to_page(svm->nested.msrpm), MSRPM_ALLOC_ORDER);
984
	kvm_vcpu_uninit(vcpu);
985
	kmem_cache_free(kvm_vcpu_cache, svm);
986 987
}

988
static void svm_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
989
{
990
	struct vcpu_svm *svm = to_svm(vcpu);
991
	int i;
992 993

	if (unlikely(cpu != vcpu->cpu)) {
994
		svm->asid_generation = 0;
995
	}
996

997 998 999
#ifdef CONFIG_X86_64
	rdmsrl(MSR_GS_BASE, to_svm(vcpu)->host.gs_base);
#endif
1000 1001 1002 1003
	savesegment(fs, svm->host.fs);
	savesegment(gs, svm->host.gs);
	svm->host.ldt = kvm_read_ldt();

1004
	for (i = 0; i < NR_HOST_SAVE_USER_MSRS; i++)
1005
		rdmsrl(host_save_user_msrs[i], svm->host_user_msrs[i]);
1006 1007 1008 1009
}

static void svm_vcpu_put(struct kvm_vcpu *vcpu)
{
1010
	struct vcpu_svm *svm = to_svm(vcpu);
1011 1012
	int i;

1013
	++vcpu->stat.host_state_reload;
1014 1015 1016 1017 1018 1019 1020 1021
	kvm_load_ldt(svm->host.ldt);
#ifdef CONFIG_X86_64
	loadsegment(fs, svm->host.fs);
	load_gs_index(svm->host.gs);
	wrmsrl(MSR_KERNEL_GS_BASE, current->thread.gs);
#else
	loadsegment(gs, svm->host.gs);
#endif
1022
	for (i = 0; i < NR_HOST_SAVE_USER_MSRS; i++)
1023
		wrmsrl(host_save_user_msrs[i], svm->host_user_msrs[i]);
1024 1025 1026 1027
}

static unsigned long svm_get_rflags(struct kvm_vcpu *vcpu)
{
1028
	return to_svm(vcpu)->vmcb->save.rflags;
1029 1030 1031 1032
}

static void svm_set_rflags(struct kvm_vcpu *vcpu, unsigned long rflags)
{
1033
	to_svm(vcpu)->vmcb->save.rflags = rflags;
1034 1035
}

Avi Kivity's avatar
Avi Kivity committed
1036 1037 1038 1039 1040
static void svm_cache_reg(struct kvm_vcpu *vcpu, enum kvm_reg reg)
{
	switch (reg) {
	case VCPU_EXREG_PDPTR:
		BUG_ON(!npt_enabled);
1041
		load_pdptrs(vcpu, vcpu->arch.walk_mmu, vcpu->arch.cr3);
Avi Kivity's avatar
Avi Kivity committed
1042 1043 1044 1045 1046 1047
		break;
	default:
		BUG();
	}
}

1048 1049 1050 1051 1052 1053 1054 1055 1056 1057
static void svm_set_vintr(struct vcpu_svm *svm)
{
	svm->vmcb->control.intercept |= 1ULL << INTERCEPT_VINTR;
}

static void svm_clear_vintr(struct vcpu_svm *svm)
{
	svm->vmcb->control.intercept &= ~(1ULL << INTERCEPT_VINTR);
}

1058 1059
static struct vmcb_seg *svm_seg(struct kvm_vcpu *vcpu, int seg)
{
1060
	struct vmcb_save_area *save = &to_svm(vcpu)->vmcb->save;
1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072

	switch (seg) {
	case VCPU_SREG_CS: return &save->cs;
	case VCPU_SREG_DS: return &save->ds;
	case VCPU_SREG_ES: return &save->es;
	case VCPU_SREG_FS: return &save->fs;
	case VCPU_SREG_GS: return &save->gs;
	case VCPU_SREG_SS: return &save->ss;
	case VCPU_SREG_TR: return &save->tr;
	case VCPU_SREG_LDTR: return &save->ldtr;
	}
	BUG();
Al Viro's avatar
Al Viro committed
1073
	return NULL;
1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098
}

static u64 svm_get_segment_base(struct kvm_vcpu *vcpu, int seg)
{
	struct vmcb_seg *s = svm_seg(vcpu, seg);

	return s->base;
}

static void svm_get_segment(struct kvm_vcpu *vcpu,
			    struct kvm_segment *var, int seg)
{
	struct vmcb_seg *s = svm_seg(vcpu, seg);

	var->base = s->base;
	var->limit = s->limit;
	var->selector = s->selector;
	var->type = s->attrib & SVM_SELECTOR_TYPE_MASK;
	var->s = (s->attrib >> SVM_SELECTOR_S_SHIFT) & 1;
	var->dpl = (s->attrib >> SVM_SELECTOR_DPL_SHIFT) & 3;
	var->present = (s->attrib >> SVM_SELECTOR_P_SHIFT) & 1;
	var->avl = (s->attrib >> SVM_SELECTOR_AVL_SHIFT) & 1;
	var->l = (s->attrib >> SVM_SELECTOR_L_SHIFT) & 1;
	var->db = (s->attrib >> SVM_SELECTOR_DB_SHIFT) & 1;
	var->g = (s->attrib >> SVM_SELECTOR_G_SHIFT) & 1;
1099

1100 1101
	/*
	 * AMD's VMCB does not have an explicit unusable field, so emulate it
1102 1103 1104 1105
	 * for cross vendor migration purposes by "not present"
	 */
	var->unusable = !var->present || (var->type == 0);

1106 1107 1108 1109 1110 1111 1112
	switch (seg) {
	case VCPU_SREG_CS:
		/*
		 * SVM always stores 0 for the 'G' bit in the CS selector in
		 * the VMCB on a VMEXIT. This hurts cross-vendor migration:
		 * Intel's VMENTRY has a check on the 'G' bit.
		 */
1113
		var->g = s->limit > 0xfffff;
1114 1115 1116 1117 1118 1119
		break;
	case VCPU_SREG_TR:
		/*
		 * Work around a bug where the busy flag in the tr selector
		 * isn't exposed
		 */
1120
		var->type |= 0x2;
1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135
		break;
	case VCPU_SREG_DS:
	case VCPU_SREG_ES:
	case VCPU_SREG_FS:
	case VCPU_SREG_GS:
		/*
		 * The accessed bit must always be set in the segment
		 * descriptor cache, although it can be cleared in the
		 * descriptor, the cached bit always remains at 1. Since
		 * Intel has a check on this, set it here to support
		 * cross-vendor migration.
		 */
		if (!var->unusable)
			var->type |= 0x1;
		break;
1136
	case VCPU_SREG_SS:
1137 1138
		/*
		 * On AMD CPUs sometimes the DB bit in the segment
1139 1140 1141 1142 1143 1144 1145
		 * descriptor is left as 1, although the whole segment has
		 * been made unusable. Clear it here to pass an Intel VMX
		 * entry check when cross vendor migrating.
		 */
		if (var->unusable)
			var->db = 0;
		break;
1146
	}
1147 1148
}

1149 1150 1151 1152 1153 1154 1155
static int svm_get_cpl(struct kvm_vcpu *vcpu)
{
	struct vmcb_save_area *save = &to_svm(vcpu)->vmcb->save;

	return save->cpl;
}

1156
static void svm_get_idt(struct kvm_vcpu *vcpu, struct desc_ptr *dt)
1157
{
1158 1159
	struct vcpu_svm *svm = to_svm(vcpu);

1160 1161
	dt->size = svm->vmcb->save.idtr.limit;
	dt->address = svm->vmcb->save.idtr.base;
1162 1163
}

1164
static void svm_set_idt(struct kvm_vcpu *vcpu, struct desc_ptr *dt)
1165
{
1166 1167
	struct vcpu_svm *svm = to_svm(vcpu);

1168 1169
	svm->vmcb->save.idtr.limit = dt->size;
	svm->vmcb->save.idtr.base = dt->address ;
1170 1171
}

1172
static void svm_get_gdt(struct kvm_vcpu *vcpu, struct desc_ptr *dt)
1173
{
1174 1175
	struct vcpu_svm *svm = to_svm(vcpu);

1176 1177
	dt->size = svm->vmcb->save.gdtr.limit;
	dt->address = svm->vmcb->save.gdtr.base;
1178 1179
}

1180
static void svm_set_gdt(struct kvm_vcpu *vcpu, struct desc_ptr *dt)
1181
{
1182 1183
	struct vcpu_svm *svm = to_svm(vcpu);

1184 1185
	svm->vmcb->save.gdtr.limit = dt->size;
	svm->vmcb->save.gdtr.base = dt->address ;
1186 1187
}

1188 1189 1190 1191
static void svm_decache_cr0_guest_bits(struct kvm_vcpu *vcpu)
{
}

1192
static void svm_decache_cr4_guest_bits(struct kvm_vcpu *vcpu)
1193 1194 1195
{
}

1196 1197
static void update_cr0_intercept(struct vcpu_svm *svm)
{
1198
	struct vmcb *vmcb = svm->vmcb;
1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209
	ulong gcr0 = svm->vcpu.arch.cr0;
	u64 *hcr0 = &svm->vmcb->save.cr0;

	if (!svm->vcpu.fpu_active)
		*hcr0 |= SVM_CR0_SELECTIVE_MASK;
	else
		*hcr0 = (*hcr0 & ~SVM_CR0_SELECTIVE_MASK)
			| (gcr0 & SVM_CR0_SELECTIVE_MASK);


	if (gcr0 == *hcr0 && svm->vcpu.fpu_active) {
1210 1211 1212 1213 1214 1215 1216 1217 1218 1219
		vmcb->control.intercept_cr_read &= ~INTERCEPT_CR0_MASK;
		vmcb->control.intercept_cr_write &= ~INTERCEPT_CR0_MASK;
		if (is_nested(svm)) {
			struct vmcb *hsave = svm->nested.hsave;

			hsave->control.intercept_cr_read  &= ~INTERCEPT_CR0_MASK;
			hsave->control.intercept_cr_write &= ~INTERCEPT_CR0_MASK;
			vmcb->control.intercept_cr_read  |= svm->nested.intercept_cr_read;
			vmcb->control.intercept_cr_write |= svm->nested.intercept_cr_write;
		}
1220 1221 1222
	} else {
		svm->vmcb->control.intercept_cr_read |= INTERCEPT_CR0_MASK;
		svm->vmcb->control.intercept_cr_write |= INTERCEPT_CR0_MASK;
1223 1224 1225 1226 1227 1228
		if (is_nested(svm)) {
			struct vmcb *hsave = svm->nested.hsave;

			hsave->control.intercept_cr_read |= INTERCEPT_CR0_MASK;
			hsave->control.intercept_cr_write |= INTERCEPT_CR0_MASK;
		}
1229 1230 1231
	}
}

1232 1233
static void svm_set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0)
{
1234 1235
	struct vcpu_svm *svm = to_svm(vcpu);

1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251
	if (is_nested(svm)) {
		/*
		 * We are here because we run in nested mode, the host kvm
		 * intercepts cr0 writes but the l1 hypervisor does not.
		 * But the L1 hypervisor may intercept selective cr0 writes.
		 * This needs to be checked here.
		 */
		unsigned long old, new;

		/* Remove bits that would trigger a real cr0 write intercept */
		old = vcpu->arch.cr0 & SVM_CR0_SELECTIVE_MASK;
		new = cr0 & SVM_CR0_SELECTIVE_MASK;

		if (old == new) {
			/* cr0 write with ts and mp unchanged */
			svm->vmcb->control.exit_code = SVM_EXIT_CR0_SEL_WRITE;
1252 1253 1254 1255
			if (nested_svm_exit_handled(svm) == NESTED_EXIT_DONE) {
				svm->nested.vmexit_rip = kvm_rip_read(vcpu);
				svm->nested.vmexit_rsp = kvm_register_read(vcpu, VCPU_REGS_RSP);
				svm->nested.vmexit_rax = kvm_register_read(vcpu, VCPU_REGS_RAX);
1256
				return;
1257
			}
1258 1259 1260
		}
	}

1261
#ifdef CONFIG_X86_64
1262
	if (vcpu->arch.efer & EFER_LME) {
1263
		if (!is_paging(vcpu) && (cr0 & X86_CR0_PG)) {
1264
			vcpu->arch.efer |= EFER_LMA;
1265
			svm->vmcb->save.efer |= EFER_LMA | EFER_LME;
1266 1267
		}

Mike Day's avatar
Mike Day committed
1268
		if (is_paging(vcpu) && !(cr0 & X86_CR0_PG)) {
1269
			vcpu->arch.efer &= ~EFER_LMA;
1270
			svm->vmcb->save.efer &= ~(EFER_LMA | EFER_LME);
1271 1272 1273
		}
	}
#endif
1274
	vcpu->arch.cr0 = cr0;
1275 1276 1277

	if (!npt_enabled)
		cr0 |= X86_CR0_PG | X86_CR0_WP;
1278 1279

	if (!vcpu->fpu_active)
1280
		cr0 |= X86_CR0_TS;
1281 1282 1283 1284 1285 1286
	/*
	 * re-enable caching here because the QEMU bios
	 * does not do it - this results in some delay at
	 * reboot
	 */
	cr0 &= ~(X86_CR0_CD | X86_CR0_NW);
1287
	svm->vmcb->save.cr0 = cr0;
1288
	update_cr0_intercept(svm);
1289 1290 1291 1292
}

static void svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4)
{
1293
	unsigned long host_cr4_mce = read_cr4() & X86_CR4_MCE;
1294 1295 1296 1297
	unsigned long old_cr4 = to_svm(vcpu)->vmcb->save.cr4;

	if (npt_enabled && ((old_cr4 ^ cr4) & X86_CR4_PGE))
		force_new_asid(vcpu);
1298

1299 1300 1301
	vcpu->arch.cr4 = cr4;
	if (!npt_enabled)
		cr4 |= X86_CR4_PAE;
1302
	cr4 |= host_cr4_mce;
1303
	to_svm(vcpu)->vmcb->save.cr4 = cr4;
1304 1305 1306 1307 1308
}

static void svm_set_segment(struct kvm_vcpu *vcpu,
			    struct kvm_segment *var, int seg)
{
1309
	struct vcpu_svm *svm = to_svm(vcpu);
1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327
	struct vmcb_seg *s = svm_seg(vcpu, seg);

	s->base = var->base;
	s->limit = var->limit;
	s->selector = var->selector;
	if (var->unusable)
		s->attrib = 0;
	else {
		s->attrib = (var->type & SVM_SELECTOR_TYPE_MASK);
		s->attrib |= (var->s & 1) << SVM_SELECTOR_S_SHIFT;
		s->attrib |= (var->dpl & 3) << SVM_SELECTOR_DPL_SHIFT;
		s->attrib |= (var->present & 1) << SVM_SELECTOR_P_SHIFT;
		s->attrib |= (var->avl & 1) << SVM_SELECTOR_AVL_SHIFT;
		s->attrib |= (var->l & 1) << SVM_SELECTOR_L_SHIFT;
		s->attrib |= (var->db & 1) << SVM_SELECTOR_DB_SHIFT;
		s->attrib |= (var->g & 1) << SVM_SELECTOR_G_SHIFT;
	}
	if (seg == VCPU_SREG_CS)
1328 1329
		svm->vmcb->save.cpl
			= (svm->vmcb->save.cs.attrib
1330 1331 1332 1333
			   >> SVM_SELECTOR_DPL_SHIFT) & 3;

}

1334
static void update_db_intercept(struct kvm_vcpu *vcpu)
1335
{
Jan Kiszka's avatar
Jan Kiszka committed
1336 1337 1338 1339
	struct vcpu_svm *svm = to_svm(vcpu);

	svm->vmcb->control.intercept_exceptions &=
		~((1 << DB_VECTOR) | (1 << BP_VECTOR));
1340

1341
	if (svm->nmi_singlestep)
1342 1343
		svm->vmcb->control.intercept_exceptions |= (1 << DB_VECTOR);

Jan Kiszka's avatar
Jan Kiszka committed
1344 1345 1346 1347 1348 1349 1350 1351 1352 1353
	if (vcpu->guest_debug & KVM_GUESTDBG_ENABLE) {
		if (vcpu->guest_debug &
		    (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP))
			svm->vmcb->control.intercept_exceptions |=
				1 << DB_VECTOR;
		if (vcpu->guest_debug & KVM_GUESTDBG_USE_SW_BP)
			svm->vmcb->control.intercept_exceptions |=
				1 << BP_VECTOR;
	} else
		vcpu->guest_debug = 0;
1354 1355
}

1356
static void svm_guest_debug(struct kvm_vcpu *vcpu, struct kvm_guest_debug *dbg)
1357 1358 1359
{
	struct vcpu_svm *svm = to_svm(vcpu);

1360 1361 1362 1363 1364
	if (vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP)
		svm->vmcb->save.dr7 = dbg->arch.debugreg[7];
	else
		svm->vmcb->save.dr7 = vcpu->arch.dr7;

1365
	update_db_intercept(vcpu);
1366 1367
}

1368
static void new_asid(struct vcpu_svm *svm, struct svm_cpu_data *sd)
1369
{
1370 1371 1372
	if (sd->next_asid > sd->max_asid) {
		++sd->asid_generation;
		sd->next_asid = 1;
1373
		svm->vmcb->control.tlb_ctl = TLB_CONTROL_FLUSH_ALL_ASID;
1374 1375
	}

1376 1377
	svm->asid_generation = sd->asid_generation;
	svm->vmcb->control.asid = sd->next_asid++;
1378 1379
}

1380
static void svm_set_dr7(struct kvm_vcpu *vcpu, unsigned long value)
1381
{
1382 1383
	struct vcpu_svm *svm = to_svm(vcpu);

1384
	svm->vmcb->save.dr7 = value;
1385 1386
}

1387
static int pf_interception(struct vcpu_svm *svm)
1388
{
1389
	u64 fault_address = svm->vmcb->control.exit_info_2;
1390
	u32 error_code;
1391
	int r = 1;
1392

1393 1394 1395
	switch (svm->apf_reason) {
	default:
		error_code = svm->vmcb->control.exit_info_1;
1396

1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415
		trace_kvm_page_fault(fault_address, error_code);
		if (!npt_enabled && kvm_event_needs_reinjection(&svm->vcpu))
			kvm_mmu_unprotect_page_virt(&svm->vcpu, fault_address);
		r = kvm_mmu_page_fault(&svm->vcpu, fault_address, error_code);
		break;
	case KVM_PV_REASON_PAGE_NOT_PRESENT:
		svm->apf_reason = 0;
		local_irq_disable();
		kvm_async_pf_task_wait(fault_address);
		local_irq_enable();
		break;
	case KVM_PV_REASON_PAGE_READY:
		svm->apf_reason = 0;
		local_irq_disable();
		kvm_async_pf_task_wake(fault_address);
		local_irq_enable();
		break;
	}
	return r;
1416 1417
}

1418
static int db_interception(struct vcpu_svm *svm)
Jan Kiszka's avatar
Jan Kiszka committed
1419
{
1420 1421
	struct kvm_run *kvm_run = svm->vcpu.run;

Jan Kiszka's avatar
Jan Kiszka committed
1422
	if (!(svm->vcpu.guest_debug &
1423
	      (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP)) &&
1424
		!svm->nmi_singlestep) {
Jan Kiszka's avatar
Jan Kiszka committed
1425 1426 1427
		kvm_queue_exception(&svm->vcpu, DB_VECTOR);
		return 1;
	}
1428

1429 1430
	if (svm->nmi_singlestep) {
		svm->nmi_singlestep = false;
1431 1432 1433 1434 1435 1436 1437
		if (!(svm->vcpu.guest_debug & KVM_GUESTDBG_SINGLESTEP))
			svm->vmcb->save.rflags &=
				~(X86_EFLAGS_TF | X86_EFLAGS_RF);
		update_db_intercept(&svm->vcpu);
	}

	if (svm->vcpu.guest_debug &
1438
	    (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP)) {
1439 1440 1441 1442 1443 1444 1445 1446
		kvm_run->exit_reason = KVM_EXIT_DEBUG;
		kvm_run->debug.arch.pc =
			svm->vmcb->save.cs.base + svm->vmcb->save.rip;
		kvm_run->debug.arch.exception = DB_VECTOR;
		return 0;
	}

	return 1;
Jan Kiszka's avatar
Jan Kiszka committed
1447 1448
}

1449
static int bp_interception(struct vcpu_svm *svm)
Jan Kiszka's avatar
Jan Kiszka committed
1450
{
1451 1452
	struct kvm_run *kvm_run = svm->vcpu.run;

Jan Kiszka's avatar
Jan Kiszka committed
1453 1454 1455 1456 1457 1458
	kvm_run->exit_reason = KVM_EXIT_DEBUG;
	kvm_run->debug.arch.pc = svm->vmcb->save.cs.base + svm->vmcb->save.rip;
	kvm_run->debug.arch.exception = BP_VECTOR;
	return 0;
}

1459
static int ud_interception(struct vcpu_svm *svm)
1460 1461 1462
{
	int er;

1463
	er = emulate_instruction(&svm->vcpu, 0, 0, EMULTYPE_TRAP_UD);
1464
	if (er != EMULATE_DONE)
1465
		kvm_queue_exception(&svm->vcpu, UD_VECTOR);
1466 1467 1468
	return 1;
}

Avi Kivity's avatar
Avi Kivity committed
1469
static void svm_fpu_activate(struct kvm_vcpu *vcpu)
1470
{
Avi Kivity's avatar
Avi Kivity committed
1471
	struct vcpu_svm *svm = to_svm(vcpu);
1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482
	u32 excp;

	if (is_nested(svm)) {
		u32 h_excp, n_excp;

		h_excp  = svm->nested.hsave->control.intercept_exceptions;
		n_excp  = svm->nested.intercept_exceptions;
		h_excp &= ~(1 << NM_VECTOR);
		excp    = h_excp | n_excp;
	} else {
		excp  = svm->vmcb->control.intercept_exceptions;
1483
		excp &= ~(1 << NM_VECTOR);
1484 1485 1486 1487
	}

	svm->vmcb->control.intercept_exceptions = excp;

Rusty Russell's avatar
Rusty Russell committed
1488
	svm->vcpu.fpu_active = 1;
1489
	update_cr0_intercept(svm);
Avi Kivity's avatar
Avi Kivity committed
1490
}
1491

Avi Kivity's avatar
Avi Kivity committed
1492 1493 1494
static int nm_interception(struct vcpu_svm *svm)
{
	svm_fpu_activate(&svm->vcpu);
1495
	return 1;
1496 1497
}

1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536
static bool is_erratum_383(void)
{
	int err, i;
	u64 value;

	if (!erratum_383_found)
		return false;

	value = native_read_msr_safe(MSR_IA32_MC0_STATUS, &err);
	if (err)
		return false;

	/* Bit 62 may or may not be set for this mce */
	value &= ~(1ULL << 62);

	if (value != 0xb600000000010015ULL)
		return false;

	/* Clear MCi_STATUS registers */
	for (i = 0; i < 6; ++i)
		native_write_msr_safe(MSR_IA32_MCx_STATUS(i), 0, 0);

	value = native_read_msr_safe(MSR_IA32_MCG_STATUS, &err);
	if (!err) {
		u32 low, high;

		value &= ~(1ULL << 2);
		low    = lower_32_bits(value);
		high   = upper_32_bits(value);

		native_write_msr_safe(MSR_IA32_MCG_STATUS, low, high);
	}

	/* Flush tlb to evict multi-match entries */
	__flush_tlb_all();

	return true;
}

1537
static void svm_handle_mce(struct vcpu_svm *svm)
1538
{
1539 1540 1541 1542 1543 1544 1545
	if (is_erratum_383()) {
		/*
		 * Erratum 383 triggered. Guest state is corrupt so kill the
		 * guest.
		 */
		pr_err("KVM: Guest triggered AMD Erratum 383\n");

1546
		kvm_make_request(KVM_REQ_TRIPLE_FAULT, &svm->vcpu);
1547 1548 1549 1550

		return;
	}

1551 1552 1553 1554 1555 1556 1557 1558
	/*
	 * On an #MC intercept the MCE handler is not called automatically in
	 * the host. So do it by hand here.
	 */
	asm volatile (
		"int $0x12\n");
	/* not sure if we ever come back to this point */

1559 1560 1561 1562 1563
	return;
}

static int mc_interception(struct vcpu_svm *svm)
{
1564 1565 1566
	return 1;
}

1567
static int shutdown_interception(struct vcpu_svm *svm)
1568
{
1569 1570
	struct kvm_run *kvm_run = svm->vcpu.run;

1571 1572 1573 1574
	/*
	 * VMCB is undefined after a SHUTDOWN intercept
	 * so reinitialize it.
	 */
1575
	clear_page(svm->vmcb);
1576
	init_vmcb(svm);
1577 1578 1579 1580 1581

	kvm_run->exit_reason = KVM_EXIT_SHUTDOWN;
	return 0;
}

1582
static int io_interception(struct vcpu_svm *svm)
1583
{
1584
	struct kvm_vcpu *vcpu = &svm->vcpu;
Mike Day's avatar
Mike Day committed
1585
	u32 io_info = svm->vmcb->control.exit_info_1; /* address size bug? */
1586
	int size, in, string;
1587
	unsigned port;
1588

Rusty Russell's avatar
Rusty Russell committed
1589
	++svm->vcpu.stat.io_exits;
1590
	string = (io_info & SVM_IOIO_STR_MASK) != 0;
1591
	in = (io_info & SVM_IOIO_TYPE_MASK) != 0;
1592
	if (string || in)
1593
		return emulate_instruction(vcpu, 0, 0, 0) == EMULATE_DONE;
1594

1595 1596
	port = io_info >> 16;
	size = (io_info & SVM_IOIO_SIZE_MASK) >> SVM_IOIO_SIZE_SHIFT;
1597
	svm->next_rip = svm->vmcb->control.exit_info_2;
1598
	skip_emulated_instruction(&svm->vcpu);
1599 1600

	return kvm_fast_pio_out(vcpu, size, port);
1601 1602
}

1603
static int nmi_interception(struct vcpu_svm *svm)
1604 1605 1606 1607
{
	return 1;
}

1608
static int intr_interception(struct vcpu_svm *svm)
1609 1610 1611 1612 1613
{
	++svm->vcpu.stat.irq_exits;
	return 1;
}

1614
static int nop_on_interception(struct vcpu_svm *svm)
1615 1616 1617 1618
{
	return 1;
}

1619
static int halt_interception(struct vcpu_svm *svm)
1620
{
1621
	svm->next_rip = kvm_rip_read(&svm->vcpu) + 1;
Rusty Russell's avatar
Rusty Russell committed
1622 1623
	skip_emulated_instruction(&svm->vcpu);
	return kvm_emulate_halt(&svm->vcpu);
1624 1625
}

1626
static int vmmcall_interception(struct vcpu_svm *svm)
1627
{
1628
	svm->next_rip = kvm_rip_read(&svm->vcpu) + 3;
Rusty Russell's avatar
Rusty Russell committed
1629
	skip_emulated_instruction(&svm->vcpu);
1630 1631
	kvm_emulate_hypercall(&svm->vcpu);
	return 1;
1632 1633
}

1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661
static unsigned long nested_svm_get_tdp_cr3(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	return svm->nested.nested_cr3;
}

static void nested_svm_set_tdp_cr3(struct kvm_vcpu *vcpu,
				   unsigned long root)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	svm->vmcb->control.nested_cr3 = root;
	force_new_asid(vcpu);
}

static void nested_svm_inject_npf_exit(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	svm->vmcb->control.exit_code = SVM_EXIT_NPF;
	svm->vmcb->control.exit_code_hi = 0;
	svm->vmcb->control.exit_info_1 = vcpu->arch.fault.error_code;
	svm->vmcb->control.exit_info_2 = vcpu->arch.fault.address;

	nested_svm_vmexit(svm);
}

1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681
static int nested_svm_init_mmu_context(struct kvm_vcpu *vcpu)
{
	int r;

	r = kvm_init_shadow_mmu(vcpu, &vcpu->arch.mmu);

	vcpu->arch.mmu.set_cr3           = nested_svm_set_tdp_cr3;
	vcpu->arch.mmu.get_cr3           = nested_svm_get_tdp_cr3;
	vcpu->arch.mmu.inject_page_fault = nested_svm_inject_npf_exit;
	vcpu->arch.mmu.shadow_root_level = get_npt_level();
	vcpu->arch.walk_mmu              = &vcpu->arch.nested_mmu;

	return r;
}

static void nested_svm_uninit_mmu_context(struct kvm_vcpu *vcpu)
{
	vcpu->arch.walk_mmu = &vcpu->arch.mmu;
}

1682 1683
static int nested_svm_check_permissions(struct vcpu_svm *svm)
{
1684
	if (!(svm->vcpu.arch.efer & EFER_SVME)
1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697
	    || !is_paging(&svm->vcpu)) {
		kvm_queue_exception(&svm->vcpu, UD_VECTOR);
		return 1;
	}

	if (svm->vmcb->save.cpl) {
		kvm_inject_gp(&svm->vcpu, 0);
		return 1;
	}

       return 0;
}

1698 1699 1700
static int nested_svm_check_exception(struct vcpu_svm *svm, unsigned nr,
				      bool has_error_code, u32 error_code)
{
1701 1702
	int vmexit;

1703 1704
	if (!is_nested(svm))
		return 0;
1705

1706 1707 1708 1709 1710
	svm->vmcb->control.exit_code = SVM_EXIT_EXCP_BASE + nr;
	svm->vmcb->control.exit_code_hi = 0;
	svm->vmcb->control.exit_info_1 = error_code;
	svm->vmcb->control.exit_info_2 = svm->vcpu.arch.cr2;

1711 1712 1713 1714 1715
	vmexit = nested_svm_intercept(svm);
	if (vmexit == NESTED_EXIT_DONE)
		svm->nested.exit_required = true;

	return vmexit;
1716 1717
}

1718 1719
/* This function returns true if it is save to enable the irq window */
static inline bool nested_svm_intr(struct vcpu_svm *svm)
1720
{
1721
	if (!is_nested(svm))
1722
		return true;
1723

1724
	if (!(svm->vcpu.arch.hflags & HF_VINTR_MASK))
1725
		return true;
1726

1727
	if (!(svm->vcpu.arch.hflags & HF_HIF_MASK))
1728
		return false;
1729

1730 1731 1732 1733 1734 1735 1736 1737
	/*
	 * if vmexit was already requested (by intercepted exception
	 * for instance) do not overwrite it with "external interrupt"
	 * vmexit.
	 */
	if (svm->nested.exit_required)
		return false;

1738 1739 1740
	svm->vmcb->control.exit_code   = SVM_EXIT_INTR;
	svm->vmcb->control.exit_info_1 = 0;
	svm->vmcb->control.exit_info_2 = 0;
1741

1742 1743 1744 1745 1746 1747 1748 1749
	if (svm->nested.intercept & 1ULL) {
		/*
		 * The #vmexit can't be emulated here directly because this
		 * code path runs with irqs and preemtion disabled. A
		 * #vmexit emulation might sleep. Only signal request for
		 * the #vmexit here.
		 */
		svm->nested.exit_required = true;
1750
		trace_kvm_nested_intr_vmexit(svm->vmcb->save.rip);
1751
		return false;
1752 1753
	}

1754
	return true;
1755 1756
}

1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769
/* This function returns true if it is save to enable the nmi window */
static inline bool nested_svm_nmi(struct vcpu_svm *svm)
{
	if (!is_nested(svm))
		return true;

	if (!(svm->nested.intercept & (1ULL << INTERCEPT_NMI)))
		return true;

	svm->vmcb->control.exit_code = SVM_EXIT_NMI;
	svm->nested.exit_required = true;

	return false;
1770 1771
}

1772
static void *nested_svm_map(struct vcpu_svm *svm, u64 gpa, struct page **_page)
1773 1774 1775
{
	struct page *page;

1776 1777
	might_sleep();

1778 1779 1780 1781
	page = gfn_to_page(svm->vcpu.kvm, gpa >> PAGE_SHIFT);
	if (is_error_page(page))
		goto error;

1782 1783 1784
	*_page = page;

	return kmap(page);
1785 1786 1787 1788 1789 1790 1791 1792

error:
	kvm_release_page_clean(page);
	kvm_inject_gp(&svm->vcpu, 0);

	return NULL;
}

1793
static void nested_svm_unmap(struct page *page)
1794
{
1795
	kunmap(page);
1796 1797 1798
	kvm_release_page_dirty(page);
}

1799 1800 1801 1802 1803
static int nested_svm_intercept_ioio(struct vcpu_svm *svm)
{
	unsigned port;
	u8 val, bit;
	u64 gpa;
1804

1805 1806
	if (!(svm->nested.intercept & (1ULL << INTERCEPT_IOIO_PROT)))
		return NESTED_EXIT_HOST;
1807

1808 1809 1810 1811 1812 1813 1814 1815 1816
	port = svm->vmcb->control.exit_info_1 >> 16;
	gpa  = svm->nested.vmcb_iopm + (port / 8);
	bit  = port % 8;
	val  = 0;

	if (kvm_read_guest(svm->vcpu.kvm, gpa, &val, 1))
		val &= (1 << bit);

	return val ? NESTED_EXIT_DONE : NESTED_EXIT_HOST;
1817 1818
}

1819
static int nested_svm_exit_handled_msr(struct vcpu_svm *svm)
1820
{
1821 1822
	u32 offset, msr, value;
	int write, mask;
1823

1824
	if (!(svm->nested.intercept & (1ULL << INTERCEPT_MSR_PROT)))
1825
		return NESTED_EXIT_HOST;
1826

1827 1828 1829 1830
	msr    = svm->vcpu.arch.regs[VCPU_REGS_RCX];
	offset = svm_msrpm_offset(msr);
	write  = svm->vmcb->control.exit_info_1 & 1;
	mask   = 1 << ((2 * (msr & 0xf)) + write);
1831

1832 1833
	if (offset == MSR_INVALID)
		return NESTED_EXIT_DONE;
1834

1835 1836
	/* Offset is in 32 bit units but need in 8 bit units */
	offset *= 4;
1837

1838 1839
	if (kvm_read_guest(svm->vcpu.kvm, svm->nested.vmcb_msrpm + offset, &value, 4))
		return NESTED_EXIT_DONE;
1840

1841
	return (value & mask) ? NESTED_EXIT_DONE : NESTED_EXIT_HOST;
1842 1843
}

1844
static int nested_svm_exit_special(struct vcpu_svm *svm)
1845 1846
{
	u32 exit_code = svm->vmcb->control.exit_code;
1847

1848 1849 1850
	switch (exit_code) {
	case SVM_EXIT_INTR:
	case SVM_EXIT_NMI:
1851
	case SVM_EXIT_EXCP_BASE + MC_VECTOR:
1852 1853
		return NESTED_EXIT_HOST;
	case SVM_EXIT_NPF:
1854
		/* For now we are always handling NPFs when using them */
1855 1856 1857 1858
		if (npt_enabled)
			return NESTED_EXIT_HOST;
		break;
	case SVM_EXIT_EXCP_BASE + PF_VECTOR:
1859 1860
		/* When we're shadowing, trap PFs, but not async PF */
		if (!npt_enabled && svm->apf_reason == 0)
1861 1862
			return NESTED_EXIT_HOST;
		break;
1863 1864 1865
	case SVM_EXIT_EXCP_BASE + NM_VECTOR:
		nm_interception(svm);
		break;
1866 1867
	default:
		break;
1868 1869
	}

1870 1871 1872 1873 1874 1875
	return NESTED_EXIT_CONTINUE;
}

/*
 * If this function returns true, this #vmexit was already handled
 */
1876
static int nested_svm_intercept(struct vcpu_svm *svm)
1877 1878 1879 1880
{
	u32 exit_code = svm->vmcb->control.exit_code;
	int vmexit = NESTED_EXIT_HOST;

1881
	switch (exit_code) {
1882
	case SVM_EXIT_MSR:
1883
		vmexit = nested_svm_exit_handled_msr(svm);
1884
		break;
1885 1886 1887
	case SVM_EXIT_IOIO:
		vmexit = nested_svm_intercept_ioio(svm);
		break;
1888 1889
	case SVM_EXIT_READ_CR0 ... SVM_EXIT_READ_CR8: {
		u32 cr_bits = 1 << (exit_code - SVM_EXIT_READ_CR0);
1890
		if (svm->nested.intercept_cr_read & cr_bits)
1891
			vmexit = NESTED_EXIT_DONE;
1892 1893 1894 1895
		break;
	}
	case SVM_EXIT_WRITE_CR0 ... SVM_EXIT_WRITE_CR8: {
		u32 cr_bits = 1 << (exit_code - SVM_EXIT_WRITE_CR0);
1896
		if (svm->nested.intercept_cr_write & cr_bits)
1897
			vmexit = NESTED_EXIT_DONE;
1898 1899 1900 1901
		break;
	}
	case SVM_EXIT_READ_DR0 ... SVM_EXIT_READ_DR7: {
		u32 dr_bits = 1 << (exit_code - SVM_EXIT_READ_DR0);
1902
		if (svm->nested.intercept_dr_read & dr_bits)
1903
			vmexit = NESTED_EXIT_DONE;
1904 1905 1906 1907
		break;
	}
	case SVM_EXIT_WRITE_DR0 ... SVM_EXIT_WRITE_DR7: {
		u32 dr_bits = 1 << (exit_code - SVM_EXIT_WRITE_DR0);
1908
		if (svm->nested.intercept_dr_write & dr_bits)
1909
			vmexit = NESTED_EXIT_DONE;
1910 1911 1912 1913
		break;
	}
	case SVM_EXIT_EXCP_BASE ... SVM_EXIT_EXCP_BASE + 0x1f: {
		u32 excp_bits = 1 << (exit_code - SVM_EXIT_EXCP_BASE);
1914
		if (svm->nested.intercept_exceptions & excp_bits)
1915
			vmexit = NESTED_EXIT_DONE;
1916 1917 1918 1919
		/* async page fault always cause vmexit */
		else if ((exit_code == SVM_EXIT_EXCP_BASE + PF_VECTOR) &&
			 svm->apf_reason != 0)
			vmexit = NESTED_EXIT_DONE;
1920 1921
		break;
	}
1922 1923 1924 1925
	case SVM_EXIT_ERR: {
		vmexit = NESTED_EXIT_DONE;
		break;
	}
1926 1927
	default: {
		u64 exit_bits = 1ULL << (exit_code - SVM_EXIT_INTR);
1928
		if (svm->nested.intercept & exit_bits)
1929
			vmexit = NESTED_EXIT_DONE;
1930 1931 1932
	}
	}

1933 1934 1935 1936 1937 1938 1939 1940 1941 1942
	return vmexit;
}

static int nested_svm_exit_handled(struct vcpu_svm *svm)
{
	int vmexit;

	vmexit = nested_svm_intercept(svm);

	if (vmexit == NESTED_EXIT_DONE)
1943 1944 1945
		nested_svm_vmexit(svm);

	return vmexit;
1946 1947
}

1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979
static inline void copy_vmcb_control_area(struct vmcb *dst_vmcb, struct vmcb *from_vmcb)
{
	struct vmcb_control_area *dst  = &dst_vmcb->control;
	struct vmcb_control_area *from = &from_vmcb->control;

	dst->intercept_cr_read    = from->intercept_cr_read;
	dst->intercept_cr_write   = from->intercept_cr_write;
	dst->intercept_dr_read    = from->intercept_dr_read;
	dst->intercept_dr_write   = from->intercept_dr_write;
	dst->intercept_exceptions = from->intercept_exceptions;
	dst->intercept            = from->intercept;
	dst->iopm_base_pa         = from->iopm_base_pa;
	dst->msrpm_base_pa        = from->msrpm_base_pa;
	dst->tsc_offset           = from->tsc_offset;
	dst->asid                 = from->asid;
	dst->tlb_ctl              = from->tlb_ctl;
	dst->int_ctl              = from->int_ctl;
	dst->int_vector           = from->int_vector;
	dst->int_state            = from->int_state;
	dst->exit_code            = from->exit_code;
	dst->exit_code_hi         = from->exit_code_hi;
	dst->exit_info_1          = from->exit_info_1;
	dst->exit_info_2          = from->exit_info_2;
	dst->exit_int_info        = from->exit_int_info;
	dst->exit_int_info_err    = from->exit_int_info_err;
	dst->nested_ctl           = from->nested_ctl;
	dst->event_inj            = from->event_inj;
	dst->event_inj_err        = from->event_inj_err;
	dst->nested_cr3           = from->nested_cr3;
	dst->lbr_ctl              = from->lbr_ctl;
}

1980
static int nested_svm_vmexit(struct vcpu_svm *svm)
1981
{
1982
	struct vmcb *nested_vmcb;
1983
	struct vmcb *hsave = svm->nested.hsave;
1984
	struct vmcb *vmcb = svm->vmcb;
1985
	struct page *page;
1986

1987 1988 1989 1990 1991 1992
	trace_kvm_nested_vmexit_inject(vmcb->control.exit_code,
				       vmcb->control.exit_info_1,
				       vmcb->control.exit_info_2,
				       vmcb->control.exit_int_info,
				       vmcb->control.exit_int_info_err);

1993
	nested_vmcb = nested_svm_map(svm, svm->nested.vmcb, &page);
1994 1995 1996
	if (!nested_vmcb)
		return 1;

1997 1998 1999
	/* Exit nested SVM mode */
	svm->nested.vmcb = 0;

2000
	/* Give the current vmcb to the guest */
2001 2002 2003 2004 2005 2006 2007 2008
	disable_gif(svm);

	nested_vmcb->save.es     = vmcb->save.es;
	nested_vmcb->save.cs     = vmcb->save.cs;
	nested_vmcb->save.ss     = vmcb->save.ss;
	nested_vmcb->save.ds     = vmcb->save.ds;
	nested_vmcb->save.gdtr   = vmcb->save.gdtr;
	nested_vmcb->save.idtr   = vmcb->save.idtr;
2009
	nested_vmcb->save.efer   = svm->vcpu.arch.efer;
2010
	nested_vmcb->save.cr0    = kvm_read_cr0(&svm->vcpu);
2011
	nested_vmcb->save.cr3    = svm->vcpu.arch.cr3;
2012
	nested_vmcb->save.cr2    = vmcb->save.cr2;
2013
	nested_vmcb->save.cr4    = svm->vcpu.arch.cr4;
2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030
	nested_vmcb->save.rflags = vmcb->save.rflags;
	nested_vmcb->save.rip    = vmcb->save.rip;
	nested_vmcb->save.rsp    = vmcb->save.rsp;
	nested_vmcb->save.rax    = vmcb->save.rax;
	nested_vmcb->save.dr7    = vmcb->save.dr7;
	nested_vmcb->save.dr6    = vmcb->save.dr6;
	nested_vmcb->save.cpl    = vmcb->save.cpl;

	nested_vmcb->control.int_ctl           = vmcb->control.int_ctl;
	nested_vmcb->control.int_vector        = vmcb->control.int_vector;
	nested_vmcb->control.int_state         = vmcb->control.int_state;
	nested_vmcb->control.exit_code         = vmcb->control.exit_code;
	nested_vmcb->control.exit_code_hi      = vmcb->control.exit_code_hi;
	nested_vmcb->control.exit_info_1       = vmcb->control.exit_info_1;
	nested_vmcb->control.exit_info_2       = vmcb->control.exit_info_2;
	nested_vmcb->control.exit_int_info     = vmcb->control.exit_int_info;
	nested_vmcb->control.exit_int_info_err = vmcb->control.exit_int_info_err;
2031
	nested_vmcb->control.next_rip          = vmcb->control.next_rip;
2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047

	/*
	 * If we emulate a VMRUN/#VMEXIT in the same host #vmexit cycle we have
	 * to make sure that we do not lose injected events. So check event_inj
	 * here and copy it to exit_int_info if it is valid.
	 * Exit_int_info and event_inj can't be both valid because the case
	 * below only happens on a VMRUN instruction intercept which has
	 * no valid exit_int_info set.
	 */
	if (vmcb->control.event_inj & SVM_EVTINJ_VALID) {
		struct vmcb_control_area *nc = &nested_vmcb->control;

		nc->exit_int_info     = vmcb->control.event_inj;
		nc->exit_int_info_err = vmcb->control.event_inj_err;
	}

2048 2049 2050
	nested_vmcb->control.tlb_ctl           = 0;
	nested_vmcb->control.event_inj         = 0;
	nested_vmcb->control.event_inj_err     = 0;
2051 2052 2053 2054 2055 2056

	/* We always set V_INTR_MASKING and remember the old value in hflags */
	if (!(svm->vcpu.arch.hflags & HF_VINTR_MASK))
		nested_vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;

	/* Restore the original control entries */
2057
	copy_vmcb_control_area(vmcb, hsave);
2058

2059 2060
	kvm_clear_exception_queue(&svm->vcpu);
	kvm_clear_interrupt_queue(&svm->vcpu);
2061

2062 2063
	svm->nested.nested_cr3 = 0;

2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078
	/* Restore selected save entries */
	svm->vmcb->save.es = hsave->save.es;
	svm->vmcb->save.cs = hsave->save.cs;
	svm->vmcb->save.ss = hsave->save.ss;
	svm->vmcb->save.ds = hsave->save.ds;
	svm->vmcb->save.gdtr = hsave->save.gdtr;
	svm->vmcb->save.idtr = hsave->save.idtr;
	svm->vmcb->save.rflags = hsave->save.rflags;
	svm_set_efer(&svm->vcpu, hsave->save.efer);
	svm_set_cr0(&svm->vcpu, hsave->save.cr0 | X86_CR0_PE);
	svm_set_cr4(&svm->vcpu, hsave->save.cr4);
	if (npt_enabled) {
		svm->vmcb->save.cr3 = hsave->save.cr3;
		svm->vcpu.arch.cr3 = hsave->save.cr3;
	} else {
2079
		(void)kvm_set_cr3(&svm->vcpu, hsave->save.cr3);
2080 2081 2082 2083 2084 2085 2086 2087
	}
	kvm_register_write(&svm->vcpu, VCPU_REGS_RAX, hsave->save.rax);
	kvm_register_write(&svm->vcpu, VCPU_REGS_RSP, hsave->save.rsp);
	kvm_register_write(&svm->vcpu, VCPU_REGS_RIP, hsave->save.rip);
	svm->vmcb->save.dr7 = 0;
	svm->vmcb->save.cpl = 0;
	svm->vmcb->control.exit_int_info = 0;

2088
	nested_svm_unmap(page);
2089

2090
	nested_svm_uninit_mmu_context(&svm->vcpu);
2091 2092 2093 2094 2095
	kvm_mmu_reset_context(&svm->vcpu);
	kvm_mmu_load(&svm->vcpu);

	return 0;
}
Alexander Graf's avatar
Alexander Graf committed
2096

2097
static bool nested_svm_vmrun_msrpm(struct vcpu_svm *svm)
Alexander Graf's avatar
Alexander Graf committed
2098
{
2099 2100 2101 2102 2103
	/*
	 * This function merges the msr permission bitmaps of kvm and the
	 * nested vmcb. It is omptimized in that it only merges the parts where
	 * the kvm msr permission bitmap may contain zero bits
	 */
Alexander Graf's avatar
Alexander Graf committed
2104
	int i;
2105

2106 2107
	if (!(svm->nested.intercept & (1ULL << INTERCEPT_MSR_PROT)))
		return true;
2108

2109 2110 2111
	for (i = 0; i < MSRPM_OFFSETS; i++) {
		u32 value, p;
		u64 offset;
2112

2113 2114
		if (msrpm_offsets[i] == 0xffffffff)
			break;
Alexander Graf's avatar
Alexander Graf committed
2115

2116 2117
		p      = msrpm_offsets[i];
		offset = svm->nested.vmcb_msrpm + (p * 4);
2118 2119 2120 2121 2122 2123

		if (kvm_read_guest(svm->vcpu.kvm, offset, &value, 4))
			return false;

		svm->nested.msrpm[p] = svm->msrpm[p] | value;
	}
Alexander Graf's avatar
Alexander Graf committed
2124

2125
	svm->vmcb->control.msrpm_base_pa = __pa(svm->nested.msrpm);
2126 2127

	return true;
Alexander Graf's avatar
Alexander Graf committed
2128 2129
}

2130 2131 2132 2133 2134
static bool nested_vmcb_checks(struct vmcb *vmcb)
{
	if ((vmcb->control.intercept & (1ULL << INTERCEPT_VMRUN)) == 0)
		return false;

2135 2136 2137
	if (vmcb->control.asid == 0)
		return false;

2138 2139 2140
	if (vmcb->control.nested_ctl && !npt_enabled)
		return false;

2141 2142 2143
	return true;
}

2144
static bool nested_svm_vmrun(struct vcpu_svm *svm)
Alexander Graf's avatar
Alexander Graf committed
2145
{
2146
	struct vmcb *nested_vmcb;
2147
	struct vmcb *hsave = svm->nested.hsave;
2148
	struct vmcb *vmcb = svm->vmcb;
2149
	struct page *page;
2150
	u64 vmcb_gpa;
Alexander Graf's avatar
Alexander Graf committed
2151

2152
	vmcb_gpa = svm->vmcb->save.rax;
Alexander Graf's avatar
Alexander Graf committed
2153

2154
	nested_vmcb = nested_svm_map(svm, svm->vmcb->save.rax, &page);
2155 2156 2157
	if (!nested_vmcb)
		return false;

2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168
	if (!nested_vmcb_checks(nested_vmcb)) {
		nested_vmcb->control.exit_code    = SVM_EXIT_ERR;
		nested_vmcb->control.exit_code_hi = 0;
		nested_vmcb->control.exit_info_1  = 0;
		nested_vmcb->control.exit_info_2  = 0;

		nested_svm_unmap(page);

		return false;
	}

2169
	trace_kvm_nested_vmrun(svm->vmcb->save.rip, vmcb_gpa,
2170 2171 2172 2173 2174
			       nested_vmcb->save.rip,
			       nested_vmcb->control.int_ctl,
			       nested_vmcb->control.event_inj,
			       nested_vmcb->control.nested_ctl);

2175 2176 2177 2178 2179
	trace_kvm_nested_intercepts(nested_vmcb->control.intercept_cr_read,
				    nested_vmcb->control.intercept_cr_write,
				    nested_vmcb->control.intercept_exceptions,
				    nested_vmcb->control.intercept);

Alexander Graf's avatar
Alexander Graf committed
2180
	/* Clear internal status */
2181 2182
	kvm_clear_exception_queue(&svm->vcpu);
	kvm_clear_interrupt_queue(&svm->vcpu);
Alexander Graf's avatar
Alexander Graf committed
2183

2184 2185 2186 2187
	/*
	 * Save the old vmcb, so we don't need to pick what we save, but can
	 * restore everything when a VMEXIT occurs
	 */
2188 2189 2190 2191 2192 2193
	hsave->save.es     = vmcb->save.es;
	hsave->save.cs     = vmcb->save.cs;
	hsave->save.ss     = vmcb->save.ss;
	hsave->save.ds     = vmcb->save.ds;
	hsave->save.gdtr   = vmcb->save.gdtr;
	hsave->save.idtr   = vmcb->save.idtr;
2194
	hsave->save.efer   = svm->vcpu.arch.efer;
2195
	hsave->save.cr0    = kvm_read_cr0(&svm->vcpu);
2196 2197
	hsave->save.cr4    = svm->vcpu.arch.cr4;
	hsave->save.rflags = vmcb->save.rflags;
2198
	hsave->save.rip    = kvm_rip_read(&svm->vcpu);
2199 2200 2201 2202 2203 2204 2205
	hsave->save.rsp    = vmcb->save.rsp;
	hsave->save.rax    = vmcb->save.rax;
	if (npt_enabled)
		hsave->save.cr3    = vmcb->save.cr3;
	else
		hsave->save.cr3    = svm->vcpu.arch.cr3;

2206
	copy_vmcb_control_area(hsave, vmcb);
Alexander Graf's avatar
Alexander Graf committed
2207 2208 2209 2210 2211 2212

	if (svm->vmcb->save.rflags & X86_EFLAGS_IF)
		svm->vcpu.arch.hflags |= HF_HIF_MASK;
	else
		svm->vcpu.arch.hflags &= ~HF_HIF_MASK;

2213 2214 2215 2216 2217 2218
	if (nested_vmcb->control.nested_ctl) {
		kvm_mmu_unload(&svm->vcpu);
		svm->nested.nested_cr3 = nested_vmcb->control.nested_cr3;
		nested_svm_init_mmu_context(&svm->vcpu);
	}

Alexander Graf's avatar
Alexander Graf committed
2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232
	/* Load the nested guest state */
	svm->vmcb->save.es = nested_vmcb->save.es;
	svm->vmcb->save.cs = nested_vmcb->save.cs;
	svm->vmcb->save.ss = nested_vmcb->save.ss;
	svm->vmcb->save.ds = nested_vmcb->save.ds;
	svm->vmcb->save.gdtr = nested_vmcb->save.gdtr;
	svm->vmcb->save.idtr = nested_vmcb->save.idtr;
	svm->vmcb->save.rflags = nested_vmcb->save.rflags;
	svm_set_efer(&svm->vcpu, nested_vmcb->save.efer);
	svm_set_cr0(&svm->vcpu, nested_vmcb->save.cr0);
	svm_set_cr4(&svm->vcpu, nested_vmcb->save.cr4);
	if (npt_enabled) {
		svm->vmcb->save.cr3 = nested_vmcb->save.cr3;
		svm->vcpu.arch.cr3 = nested_vmcb->save.cr3;
2233
	} else
2234
		(void)kvm_set_cr3(&svm->vcpu, nested_vmcb->save.cr3);
2235 2236 2237 2238

	/* Guest paging mode is active - reset mmu */
	kvm_mmu_reset_context(&svm->vcpu);

2239
	svm->vmcb->save.cr2 = svm->vcpu.arch.cr2 = nested_vmcb->save.cr2;
Alexander Graf's avatar
Alexander Graf committed
2240 2241 2242
	kvm_register_write(&svm->vcpu, VCPU_REGS_RAX, nested_vmcb->save.rax);
	kvm_register_write(&svm->vcpu, VCPU_REGS_RSP, nested_vmcb->save.rsp);
	kvm_register_write(&svm->vcpu, VCPU_REGS_RIP, nested_vmcb->save.rip);
2243

Alexander Graf's avatar
Alexander Graf committed
2244 2245 2246 2247 2248 2249 2250 2251
	/* In case we don't even reach vcpu_run, the fields are not updated */
	svm->vmcb->save.rax = nested_vmcb->save.rax;
	svm->vmcb->save.rsp = nested_vmcb->save.rsp;
	svm->vmcb->save.rip = nested_vmcb->save.rip;
	svm->vmcb->save.dr7 = nested_vmcb->save.dr7;
	svm->vmcb->save.dr6 = nested_vmcb->save.dr6;
	svm->vmcb->save.cpl = nested_vmcb->save.cpl;

2252
	svm->nested.vmcb_msrpm = nested_vmcb->control.msrpm_base_pa & ~0x0fffULL;
2253
	svm->nested.vmcb_iopm  = nested_vmcb->control.iopm_base_pa  & ~0x0fffULL;
Alexander Graf's avatar
Alexander Graf committed
2254

2255 2256 2257 2258 2259 2260 2261 2262
	/* cache intercepts */
	svm->nested.intercept_cr_read    = nested_vmcb->control.intercept_cr_read;
	svm->nested.intercept_cr_write   = nested_vmcb->control.intercept_cr_write;
	svm->nested.intercept_dr_read    = nested_vmcb->control.intercept_dr_read;
	svm->nested.intercept_dr_write   = nested_vmcb->control.intercept_dr_write;
	svm->nested.intercept_exceptions = nested_vmcb->control.intercept_exceptions;
	svm->nested.intercept            = nested_vmcb->control.intercept;

Alexander Graf's avatar
Alexander Graf committed
2263 2264 2265 2266 2267 2268 2269
	force_new_asid(&svm->vcpu);
	svm->vmcb->control.int_ctl = nested_vmcb->control.int_ctl | V_INTR_MASKING_MASK;
	if (nested_vmcb->control.int_ctl & V_INTR_MASKING_MASK)
		svm->vcpu.arch.hflags |= HF_VINTR_MASK;
	else
		svm->vcpu.arch.hflags &= ~HF_VINTR_MASK;

2270 2271 2272 2273 2274 2275
	if (svm->vcpu.arch.hflags & HF_VINTR_MASK) {
		/* We only want the cr8 intercept bits of the guest */
		svm->vmcb->control.intercept_cr_read &= ~INTERCEPT_CR8_MASK;
		svm->vmcb->control.intercept_cr_write &= ~INTERCEPT_CR8_MASK;
	}

2276 2277 2278
	/* We don't want to see VMMCALLs from a nested guest */
	svm->vmcb->control.intercept &= ~(1ULL << INTERCEPT_VMMCALL);

2279 2280 2281 2282
	/*
	 * We don't want a nested guest to be more powerful than the guest, so
	 * all intercepts are ORed
	 */
2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296
	svm->vmcb->control.intercept_cr_read |=
		nested_vmcb->control.intercept_cr_read;
	svm->vmcb->control.intercept_cr_write |=
		nested_vmcb->control.intercept_cr_write;
	svm->vmcb->control.intercept_dr_read |=
		nested_vmcb->control.intercept_dr_read;
	svm->vmcb->control.intercept_dr_write |=
		nested_vmcb->control.intercept_dr_write;
	svm->vmcb->control.intercept_exceptions |=
		nested_vmcb->control.intercept_exceptions;

	svm->vmcb->control.intercept |= nested_vmcb->control.intercept;

	svm->vmcb->control.lbr_ctl = nested_vmcb->control.lbr_ctl;
Alexander Graf's avatar
Alexander Graf committed
2297 2298 2299 2300 2301 2302
	svm->vmcb->control.int_vector = nested_vmcb->control.int_vector;
	svm->vmcb->control.int_state = nested_vmcb->control.int_state;
	svm->vmcb->control.tsc_offset += nested_vmcb->control.tsc_offset;
	svm->vmcb->control.event_inj = nested_vmcb->control.event_inj;
	svm->vmcb->control.event_inj_err = nested_vmcb->control.event_inj_err;

2303
	nested_svm_unmap(page);
2304

2305 2306
	/* nested_vmcb is our indicator if nested SVM is activated */
	svm->nested.vmcb = vmcb_gpa;
2307

2308
	enable_gif(svm);
Alexander Graf's avatar
Alexander Graf committed
2309

2310
	return true;
Alexander Graf's avatar
Alexander Graf committed
2311 2312
}

2313
static void nested_svm_vmloadsave(struct vmcb *from_vmcb, struct vmcb *to_vmcb)
2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328
{
	to_vmcb->save.fs = from_vmcb->save.fs;
	to_vmcb->save.gs = from_vmcb->save.gs;
	to_vmcb->save.tr = from_vmcb->save.tr;
	to_vmcb->save.ldtr = from_vmcb->save.ldtr;
	to_vmcb->save.kernel_gs_base = from_vmcb->save.kernel_gs_base;
	to_vmcb->save.star = from_vmcb->save.star;
	to_vmcb->save.lstar = from_vmcb->save.lstar;
	to_vmcb->save.cstar = from_vmcb->save.cstar;
	to_vmcb->save.sfmask = from_vmcb->save.sfmask;
	to_vmcb->save.sysenter_cs = from_vmcb->save.sysenter_cs;
	to_vmcb->save.sysenter_esp = from_vmcb->save.sysenter_esp;
	to_vmcb->save.sysenter_eip = from_vmcb->save.sysenter_eip;
}

2329
static int vmload_interception(struct vcpu_svm *svm)
2330
{
2331
	struct vmcb *nested_vmcb;
2332
	struct page *page;
2333

2334 2335 2336 2337 2338 2339
	if (nested_svm_check_permissions(svm))
		return 1;

	svm->next_rip = kvm_rip_read(&svm->vcpu) + 3;
	skip_emulated_instruction(&svm->vcpu);

2340
	nested_vmcb = nested_svm_map(svm, svm->vmcb->save.rax, &page);
2341 2342 2343 2344
	if (!nested_vmcb)
		return 1;

	nested_svm_vmloadsave(nested_vmcb, svm->vmcb);
2345
	nested_svm_unmap(page);
2346 2347 2348 2349

	return 1;
}

2350
static int vmsave_interception(struct vcpu_svm *svm)
2351
{
2352
	struct vmcb *nested_vmcb;
2353
	struct page *page;
2354

2355 2356 2357 2358 2359 2360
	if (nested_svm_check_permissions(svm))
		return 1;

	svm->next_rip = kvm_rip_read(&svm->vcpu) + 3;
	skip_emulated_instruction(&svm->vcpu);

2361
	nested_vmcb = nested_svm_map(svm, svm->vmcb->save.rax, &page);
2362 2363 2364 2365
	if (!nested_vmcb)
		return 1;

	nested_svm_vmloadsave(svm->vmcb, nested_vmcb);
2366
	nested_svm_unmap(page);
2367 2368 2369 2370

	return 1;
}

2371
static int vmrun_interception(struct vcpu_svm *svm)
Alexander Graf's avatar
Alexander Graf committed
2372 2373 2374 2375
{
	if (nested_svm_check_permissions(svm))
		return 1;

2376 2377
	/* Save rip after vmrun instruction */
	kvm_rip_write(&svm->vcpu, kvm_rip_read(&svm->vcpu) + 3);
Alexander Graf's avatar
Alexander Graf committed
2378

2379
	if (!nested_svm_vmrun(svm))
Alexander Graf's avatar
Alexander Graf committed
2380 2381
		return 1;

2382
	if (!nested_svm_vmrun_msrpm(svm))
2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394
		goto failed;

	return 1;

failed:

	svm->vmcb->control.exit_code    = SVM_EXIT_ERR;
	svm->vmcb->control.exit_code_hi = 0;
	svm->vmcb->control.exit_info_1  = 0;
	svm->vmcb->control.exit_info_2  = 0;

	nested_svm_vmexit(svm);
Alexander Graf's avatar
Alexander Graf committed
2395 2396 2397 2398

	return 1;
}

2399
static int stgi_interception(struct vcpu_svm *svm)
2400 2401 2402 2403 2404 2405
{
	if (nested_svm_check_permissions(svm))
		return 1;

	svm->next_rip = kvm_rip_read(&svm->vcpu) + 3;
	skip_emulated_instruction(&svm->vcpu);
2406
	kvm_make_request(KVM_REQ_EVENT, &svm->vcpu);
2407

2408
	enable_gif(svm);
2409 2410 2411 2412

	return 1;
}

2413
static int clgi_interception(struct vcpu_svm *svm)
2414 2415 2416 2417 2418 2419 2420
{
	if (nested_svm_check_permissions(svm))
		return 1;

	svm->next_rip = kvm_rip_read(&svm->vcpu) + 3;
	skip_emulated_instruction(&svm->vcpu);

2421
	disable_gif(svm);
2422 2423 2424 2425 2426 2427 2428 2429

	/* After a CLGI no interrupts should come */
	svm_clear_vintr(svm);
	svm->vmcb->control.int_ctl &= ~V_IRQ_MASK;

	return 1;
}

2430
static int invlpga_interception(struct vcpu_svm *svm)
Alexander Graf's avatar
Alexander Graf committed
2431 2432 2433
{
	struct kvm_vcpu *vcpu = &svm->vcpu;

2434 2435 2436
	trace_kvm_invlpga(svm->vmcb->save.rip, vcpu->arch.regs[VCPU_REGS_RCX],
			  vcpu->arch.regs[VCPU_REGS_RAX]);

Alexander Graf's avatar
Alexander Graf committed
2437 2438 2439 2440 2441 2442 2443 2444
	/* Let's treat INVLPGA the same as INVLPG (can be optimized!) */
	kvm_mmu_invlpg(vcpu, vcpu->arch.regs[VCPU_REGS_RAX]);

	svm->next_rip = kvm_rip_read(&svm->vcpu) + 3;
	skip_emulated_instruction(&svm->vcpu);
	return 1;
}

2445 2446 2447 2448 2449 2450 2451 2452
static int skinit_interception(struct vcpu_svm *svm)
{
	trace_kvm_skinit(svm->vmcb->save.rip, svm->vcpu.arch.regs[VCPU_REGS_RAX]);

	kvm_queue_exception(&svm->vcpu, UD_VECTOR);
	return 1;
}

2453
static int invalid_op_interception(struct vcpu_svm *svm)
2454
{
2455
	kvm_queue_exception(&svm->vcpu, UD_VECTOR);
2456 2457 2458
	return 1;
}

2459
static int task_switch_interception(struct vcpu_svm *svm)
2460
{
2461
	u16 tss_selector;
2462 2463 2464
	int reason;
	int int_type = svm->vmcb->control.exit_int_info &
		SVM_EXITINTINFO_TYPE_MASK;
2465
	int int_vec = svm->vmcb->control.exit_int_info & SVM_EVTINJ_VEC_MASK;
2466 2467 2468 2469
	uint32_t type =
		svm->vmcb->control.exit_int_info & SVM_EXITINTINFO_TYPE_MASK;
	uint32_t idt_v =
		svm->vmcb->control.exit_int_info & SVM_EXITINTINFO_VALID;
2470 2471
	bool has_error_code = false;
	u32 error_code = 0;
2472 2473

	tss_selector = (u16)svm->vmcb->control.exit_info_1;
2474

2475 2476
	if (svm->vmcb->control.exit_info_2 &
	    (1ULL << SVM_EXITINFOSHIFT_TS_REASON_IRET))
2477 2478 2479 2480
		reason = TASK_SWITCH_IRET;
	else if (svm->vmcb->control.exit_info_2 &
		 (1ULL << SVM_EXITINFOSHIFT_TS_REASON_JMP))
		reason = TASK_SWITCH_JMP;
2481
	else if (idt_v)
2482 2483 2484 2485
		reason = TASK_SWITCH_GATE;
	else
		reason = TASK_SWITCH_CALL;

2486 2487 2488 2489 2490 2491
	if (reason == TASK_SWITCH_GATE) {
		switch (type) {
		case SVM_EXITINTINFO_TYPE_NMI:
			svm->vcpu.arch.nmi_injected = false;
			break;
		case SVM_EXITINTINFO_TYPE_EXEPT:
2492 2493 2494 2495 2496 2497
			if (svm->vmcb->control.exit_info_2 &
			    (1ULL << SVM_EXITINFOSHIFT_TS_HAS_ERROR_CODE)) {
				has_error_code = true;
				error_code =
					(u32)svm->vmcb->control.exit_info_2;
			}
2498 2499 2500 2501 2502 2503 2504 2505 2506
			kvm_clear_exception_queue(&svm->vcpu);
			break;
		case SVM_EXITINTINFO_TYPE_INTR:
			kvm_clear_interrupt_queue(&svm->vcpu);
			break;
		default:
			break;
		}
	}
2507

2508 2509 2510
	if (reason != TASK_SWITCH_GATE ||
	    int_type == SVM_EXITINTINFO_TYPE_SOFT ||
	    (int_type == SVM_EXITINTINFO_TYPE_EXEPT &&
2511 2512
	     (int_vec == OF_VECTOR || int_vec == BP_VECTOR)))
		skip_emulated_instruction(&svm->vcpu);
2513

2514 2515 2516 2517 2518 2519 2520 2521
	if (kvm_task_switch(&svm->vcpu, tss_selector, reason,
				has_error_code, error_code) == EMULATE_FAIL) {
		svm->vcpu.run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
		svm->vcpu.run->internal.suberror = KVM_INTERNAL_ERROR_EMULATION;
		svm->vcpu.run->internal.ndata = 0;
		return 0;
	}
	return 1;
2522 2523
}

2524
static int cpuid_interception(struct vcpu_svm *svm)
2525
{
2526
	svm->next_rip = kvm_rip_read(&svm->vcpu) + 2;
Rusty Russell's avatar
Rusty Russell committed
2527
	kvm_emulate_cpuid(&svm->vcpu);
2528
	return 1;
2529 2530
}

2531
static int iret_interception(struct vcpu_svm *svm)
2532 2533
{
	++svm->vcpu.stat.nmi_window_exits;
2534
	svm->vmcb->control.intercept &= ~(1ULL << INTERCEPT_IRET);
2535
	svm->vcpu.arch.hflags |= HF_IRET_MASK;
2536 2537 2538
	return 1;
}

2539
static int invlpg_interception(struct vcpu_svm *svm)
Marcelo Tosatti's avatar
Marcelo Tosatti committed
2540
{
2541
	return emulate_instruction(&svm->vcpu, 0, 0, 0) == EMULATE_DONE;
Marcelo Tosatti's avatar
Marcelo Tosatti committed
2542 2543
}

2544
static int emulate_on_interception(struct vcpu_svm *svm)
2545
{
2546
	return emulate_instruction(&svm->vcpu, 0, 0, 0) == EMULATE_DONE;
2547 2548
}

2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565
static int cr0_write_interception(struct vcpu_svm *svm)
{
	struct kvm_vcpu *vcpu = &svm->vcpu;
	int r;

	r = emulate_instruction(&svm->vcpu, 0, 0, 0);

	if (svm->nested.vmexit_rip) {
		kvm_register_write(vcpu, VCPU_REGS_RIP, svm->nested.vmexit_rip);
		kvm_register_write(vcpu, VCPU_REGS_RSP, svm->nested.vmexit_rsp);
		kvm_register_write(vcpu, VCPU_REGS_RAX, svm->nested.vmexit_rax);
		svm->nested.vmexit_rip = 0;
	}

	return r == EMULATE_DONE;
}

2566
static int cr8_write_interception(struct vcpu_svm *svm)
2567
{
2568 2569
	struct kvm_run *kvm_run = svm->vcpu.run;

2570 2571
	u8 cr8_prev = kvm_get_cr8(&svm->vcpu);
	/* instruction emulation calls kvm_set_cr8() */
2572
	emulate_instruction(&svm->vcpu, 0, 0, 0);
2573 2574
	if (irqchip_in_kernel(svm->vcpu.kvm)) {
		svm->vmcb->control.intercept_cr_write &= ~INTERCEPT_CR8_MASK;
2575
		return 1;
2576
	}
2577 2578
	if (cr8_prev <= kvm_get_cr8(&svm->vcpu))
		return 1;
2579 2580 2581 2582
	kvm_run->exit_reason = KVM_EXIT_SET_TPR;
	return 0;
}

2583 2584
static int svm_get_msr(struct kvm_vcpu *vcpu, unsigned ecx, u64 *data)
{
2585 2586
	struct vcpu_svm *svm = to_svm(vcpu);

2587
	switch (ecx) {
2588
	case MSR_IA32_TSC: {
2589
		u64 tsc_offset;
2590

2591 2592 2593 2594 2595 2596
		if (is_nested(svm))
			tsc_offset = svm->nested.hsave->control.tsc_offset;
		else
			tsc_offset = svm->vmcb->control.tsc_offset;

		*data = tsc_offset + native_read_tsc();
2597 2598
		break;
	}
Brian Gerst's avatar
Brian Gerst committed
2599
	case MSR_STAR:
2600
		*data = svm->vmcb->save.star;
2601
		break;
2602
#ifdef CONFIG_X86_64
2603
	case MSR_LSTAR:
2604
		*data = svm->vmcb->save.lstar;
2605 2606
		break;
	case MSR_CSTAR:
2607
		*data = svm->vmcb->save.cstar;
2608 2609
		break;
	case MSR_KERNEL_GS_BASE:
2610
		*data = svm->vmcb->save.kernel_gs_base;
2611 2612
		break;
	case MSR_SYSCALL_MASK:
2613
		*data = svm->vmcb->save.sfmask;
2614 2615 2616
		break;
#endif
	case MSR_IA32_SYSENTER_CS:
2617
		*data = svm->vmcb->save.sysenter_cs;
2618 2619
		break;
	case MSR_IA32_SYSENTER_EIP:
2620
		*data = svm->sysenter_eip;
2621 2622
		break;
	case MSR_IA32_SYSENTER_ESP:
2623
		*data = svm->sysenter_esp;
2624
		break;
2625 2626 2627 2628 2629
	/*
	 * Nobody will change the following 5 values in the VMCB so we can
	 * safely return them on rdmsr. They will always be 0 until LBRV is
	 * implemented.
	 */
2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644
	case MSR_IA32_DEBUGCTLMSR:
		*data = svm->vmcb->save.dbgctl;
		break;
	case MSR_IA32_LASTBRANCHFROMIP:
		*data = svm->vmcb->save.br_from;
		break;
	case MSR_IA32_LASTBRANCHTOIP:
		*data = svm->vmcb->save.br_to;
		break;
	case MSR_IA32_LASTINTFROMIP:
		*data = svm->vmcb->save.last_excp_from;
		break;
	case MSR_IA32_LASTINTTOIP:
		*data = svm->vmcb->save.last_excp_to;
		break;
Alexander Graf's avatar
Alexander Graf committed
2645
	case MSR_VM_HSAVE_PA:
2646
		*data = svm->nested.hsave_msr;
Alexander Graf's avatar
Alexander Graf committed
2647
		break;
2648
	case MSR_VM_CR:
2649
		*data = svm->nested.vm_cr_msr;
2650
		break;
2651 2652 2653
	case MSR_IA32_UCODE_REV:
		*data = 0x01000065;
		break;
2654
	default:
2655
		return kvm_get_msr_common(vcpu, ecx, data);
2656 2657 2658 2659
	}
	return 0;
}

2660
static int rdmsr_interception(struct vcpu_svm *svm)
2661
{
2662
	u32 ecx = svm->vcpu.arch.regs[VCPU_REGS_RCX];
2663 2664
	u64 data;

2665 2666
	if (svm_get_msr(&svm->vcpu, ecx, &data)) {
		trace_kvm_msr_read_ex(ecx);
2667
		kvm_inject_gp(&svm->vcpu, 0);
2668
	} else {
2669
		trace_kvm_msr_read(ecx, data);
2670

2671
		svm->vcpu.arch.regs[VCPU_REGS_RAX] = data & 0xffffffff;
2672
		svm->vcpu.arch.regs[VCPU_REGS_RDX] = data >> 32;
2673
		svm->next_rip = kvm_rip_read(&svm->vcpu) + 2;
Rusty Russell's avatar
Rusty Russell committed
2674
		skip_emulated_instruction(&svm->vcpu);
2675 2676 2677 2678
	}
	return 1;
}

2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703
static int svm_set_vm_cr(struct kvm_vcpu *vcpu, u64 data)
{
	struct vcpu_svm *svm = to_svm(vcpu);
	int svm_dis, chg_mask;

	if (data & ~SVM_VM_CR_VALID_MASK)
		return 1;

	chg_mask = SVM_VM_CR_VALID_MASK;

	if (svm->nested.vm_cr_msr & SVM_VM_CR_SVM_DIS_MASK)
		chg_mask &= ~(SVM_VM_CR_SVM_LOCK_MASK | SVM_VM_CR_SVM_DIS_MASK);

	svm->nested.vm_cr_msr &= ~chg_mask;
	svm->nested.vm_cr_msr |= (data & chg_mask);

	svm_dis = svm->nested.vm_cr_msr & SVM_VM_CR_SVM_DIS_MASK;

	/* check for svm_disable while efer.svme is set */
	if (svm_dis && (vcpu->arch.efer & EFER_SVME))
		return 1;

	return 0;
}

2704 2705
static int svm_set_msr(struct kvm_vcpu *vcpu, unsigned ecx, u64 data)
{
2706 2707
	struct vcpu_svm *svm = to_svm(vcpu);

2708
	switch (ecx) {
2709
	case MSR_IA32_TSC:
2710
		kvm_write_tsc(vcpu, data);
2711
		break;
Brian Gerst's avatar
Brian Gerst committed
2712
	case MSR_STAR:
2713
		svm->vmcb->save.star = data;
2714
		break;
2715
#ifdef CONFIG_X86_64
2716
	case MSR_LSTAR:
2717
		svm->vmcb->save.lstar = data;
2718 2719
		break;
	case MSR_CSTAR:
2720
		svm->vmcb->save.cstar = data;
2721 2722
		break;
	case MSR_KERNEL_GS_BASE:
2723
		svm->vmcb->save.kernel_gs_base = data;
2724 2725
		break;
	case MSR_SYSCALL_MASK:
2726
		svm->vmcb->save.sfmask = data;
2727 2728 2729
		break;
#endif
	case MSR_IA32_SYSENTER_CS:
2730
		svm->vmcb->save.sysenter_cs = data;
2731 2732
		break;
	case MSR_IA32_SYSENTER_EIP:
2733
		svm->sysenter_eip = data;
2734
		svm->vmcb->save.sysenter_eip = data;
2735 2736
		break;
	case MSR_IA32_SYSENTER_ESP:
2737
		svm->sysenter_esp = data;
2738
		svm->vmcb->save.sysenter_esp = data;
2739
		break;
2740
	case MSR_IA32_DEBUGCTLMSR:
2741
		if (!boot_cpu_has(X86_FEATURE_LBRV)) {
2742
			pr_unimpl(vcpu, "%s: MSR_IA32_DEBUGCTL 0x%llx, nop\n",
2743
					__func__, data);
2744 2745 2746 2747 2748 2749 2750 2751 2752 2753
			break;
		}
		if (data & DEBUGCTL_RESERVED_BITS)
			return 1;

		svm->vmcb->save.dbgctl = data;
		if (data & (1ULL<<0))
			svm_enable_lbrv(svm);
		else
			svm_disable_lbrv(svm);
2754
		break;
Alexander Graf's avatar
Alexander Graf committed
2755
	case MSR_VM_HSAVE_PA:
2756
		svm->nested.hsave_msr = data;
2757
		break;
2758
	case MSR_VM_CR:
2759
		return svm_set_vm_cr(vcpu, data);
2760 2761 2762
	case MSR_VM_IGNNE:
		pr_unimpl(vcpu, "unimplemented wrmsr: 0x%x data 0x%llx\n", ecx, data);
		break;
2763
	default:
2764
		return kvm_set_msr_common(vcpu, ecx, data);
2765 2766 2767 2768
	}
	return 0;
}

2769
static int wrmsr_interception(struct vcpu_svm *svm)
2770
{
2771
	u32 ecx = svm->vcpu.arch.regs[VCPU_REGS_RCX];
2772
	u64 data = (svm->vcpu.arch.regs[VCPU_REGS_RAX] & -1u)
2773
		| ((u64)(svm->vcpu.arch.regs[VCPU_REGS_RDX] & -1u) << 32);
2774 2775


2776
	svm->next_rip = kvm_rip_read(&svm->vcpu) + 2;
2777 2778
	if (svm_set_msr(&svm->vcpu, ecx, data)) {
		trace_kvm_msr_write_ex(ecx, data);
2779
		kvm_inject_gp(&svm->vcpu, 0);
2780 2781
	} else {
		trace_kvm_msr_write(ecx, data);
Rusty Russell's avatar
Rusty Russell committed
2782
		skip_emulated_instruction(&svm->vcpu);
2783
	}
2784 2785 2786
	return 1;
}

2787
static int msr_interception(struct vcpu_svm *svm)
2788
{
Rusty Russell's avatar
Rusty Russell committed
2789
	if (svm->vmcb->control.exit_info_1)
2790
		return wrmsr_interception(svm);
2791
	else
2792
		return rdmsr_interception(svm);
2793 2794
}

2795
static int interrupt_window_interception(struct vcpu_svm *svm)
2796
{
2797 2798
	struct kvm_run *kvm_run = svm->vcpu.run;

2799
	kvm_make_request(KVM_REQ_EVENT, &svm->vcpu);
2800
	svm_clear_vintr(svm);
2801
	svm->vmcb->control.int_ctl &= ~V_IRQ_MASK;
2802 2803 2804 2805
	/*
	 * If the user space waits to inject interrupts, exit as soon as
	 * possible
	 */
2806 2807 2808
	if (!irqchip_in_kernel(svm->vcpu.kvm) &&
	    kvm_run->request_interrupt_window &&
	    !kvm_cpu_has_interrupt(&svm->vcpu)) {
Rusty Russell's avatar
Rusty Russell committed
2809
		++svm->vcpu.stat.irq_window_exits;
2810 2811 2812 2813 2814 2815 2816
		kvm_run->exit_reason = KVM_EXIT_IRQ_WINDOW_OPEN;
		return 0;
	}

	return 1;
}

2817 2818 2819 2820 2821 2822
static int pause_interception(struct vcpu_svm *svm)
{
	kvm_vcpu_on_spin(&(svm->vcpu));
	return 1;
}

2823
static int (*svm_exit_handlers[])(struct vcpu_svm *svm) = {
2824 2825 2826 2827
	[SVM_EXIT_READ_CR0]			= emulate_on_interception,
	[SVM_EXIT_READ_CR3]			= emulate_on_interception,
	[SVM_EXIT_READ_CR4]			= emulate_on_interception,
	[SVM_EXIT_READ_CR8]			= emulate_on_interception,
2828
	[SVM_EXIT_CR0_SEL_WRITE]		= emulate_on_interception,
2829
	[SVM_EXIT_WRITE_CR0]			= cr0_write_interception,
2830 2831 2832 2833
	[SVM_EXIT_WRITE_CR3]			= emulate_on_interception,
	[SVM_EXIT_WRITE_CR4]			= emulate_on_interception,
	[SVM_EXIT_WRITE_CR8]			= cr8_write_interception,
	[SVM_EXIT_READ_DR0]			= emulate_on_interception,
2834 2835 2836
	[SVM_EXIT_READ_DR1]			= emulate_on_interception,
	[SVM_EXIT_READ_DR2]			= emulate_on_interception,
	[SVM_EXIT_READ_DR3]			= emulate_on_interception,
2837 2838 2839 2840
	[SVM_EXIT_READ_DR4]			= emulate_on_interception,
	[SVM_EXIT_READ_DR5]			= emulate_on_interception,
	[SVM_EXIT_READ_DR6]			= emulate_on_interception,
	[SVM_EXIT_READ_DR7]			= emulate_on_interception,
2841 2842 2843 2844
	[SVM_EXIT_WRITE_DR0]			= emulate_on_interception,
	[SVM_EXIT_WRITE_DR1]			= emulate_on_interception,
	[SVM_EXIT_WRITE_DR2]			= emulate_on_interception,
	[SVM_EXIT_WRITE_DR3]			= emulate_on_interception,
2845
	[SVM_EXIT_WRITE_DR4]			= emulate_on_interception,
2846
	[SVM_EXIT_WRITE_DR5]			= emulate_on_interception,
2847
	[SVM_EXIT_WRITE_DR6]			= emulate_on_interception,
2848
	[SVM_EXIT_WRITE_DR7]			= emulate_on_interception,
Jan Kiszka's avatar
Jan Kiszka committed
2849 2850
	[SVM_EXIT_EXCP_BASE + DB_VECTOR]	= db_interception,
	[SVM_EXIT_EXCP_BASE + BP_VECTOR]	= bp_interception,
2851
	[SVM_EXIT_EXCP_BASE + UD_VECTOR]	= ud_interception,
2852 2853 2854 2855
	[SVM_EXIT_EXCP_BASE + PF_VECTOR]	= pf_interception,
	[SVM_EXIT_EXCP_BASE + NM_VECTOR]	= nm_interception,
	[SVM_EXIT_EXCP_BASE + MC_VECTOR]	= mc_interception,
	[SVM_EXIT_INTR]				= intr_interception,
2856
	[SVM_EXIT_NMI]				= nmi_interception,
2857 2858
	[SVM_EXIT_SMI]				= nop_on_interception,
	[SVM_EXIT_INIT]				= nop_on_interception,
2859
	[SVM_EXIT_VINTR]			= interrupt_window_interception,
2860
	[SVM_EXIT_CPUID]			= cpuid_interception,
2861
	[SVM_EXIT_IRET]                         = iret_interception,
2862
	[SVM_EXIT_INVD]                         = emulate_on_interception,
2863
	[SVM_EXIT_PAUSE]			= pause_interception,
2864
	[SVM_EXIT_HLT]				= halt_interception,
Marcelo Tosatti's avatar
Marcelo Tosatti committed
2865
	[SVM_EXIT_INVLPG]			= invlpg_interception,
Alexander Graf's avatar
Alexander Graf committed
2866
	[SVM_EXIT_INVLPGA]			= invlpga_interception,
2867
	[SVM_EXIT_IOIO]				= io_interception,
2868 2869
	[SVM_EXIT_MSR]				= msr_interception,
	[SVM_EXIT_TASK_SWITCH]			= task_switch_interception,
2870
	[SVM_EXIT_SHUTDOWN]			= shutdown_interception,
Alexander Graf's avatar
Alexander Graf committed
2871
	[SVM_EXIT_VMRUN]			= vmrun_interception,
2872
	[SVM_EXIT_VMMCALL]			= vmmcall_interception,
2873 2874
	[SVM_EXIT_VMLOAD]			= vmload_interception,
	[SVM_EXIT_VMSAVE]			= vmsave_interception,
2875 2876
	[SVM_EXIT_STGI]				= stgi_interception,
	[SVM_EXIT_CLGI]				= clgi_interception,
2877
	[SVM_EXIT_SKINIT]			= skinit_interception,
2878
	[SVM_EXIT_WBINVD]                       = emulate_on_interception,
2879 2880
	[SVM_EXIT_MONITOR]			= invalid_op_interception,
	[SVM_EXIT_MWAIT]			= invalid_op_interception,
2881
	[SVM_EXIT_NPF]				= pf_interception,
2882 2883
};

2884 2885 2886 2887 2888 2889 2890 2891 2892 2893 2894 2895 2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 2907 2908 2909 2910 2911 2912 2913 2914 2915 2916 2917 2918 2919 2920 2921 2922 2923 2924 2925 2926 2927 2928 2929 2930 2931 2932 2933 2934 2935 2936 2937 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 2953 2954 2955 2956 2957 2958 2959 2960 2961 2962 2963 2964 2965 2966 2967 2968 2969 2970 2971 2972 2973 2974 2975 2976
void dump_vmcb(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);
	struct vmcb_control_area *control = &svm->vmcb->control;
	struct vmcb_save_area *save = &svm->vmcb->save;

	pr_err("VMCB Control Area:\n");
	pr_err("cr_read:            %04x\n", control->intercept_cr_read);
	pr_err("cr_write:           %04x\n", control->intercept_cr_write);
	pr_err("dr_read:            %04x\n", control->intercept_dr_read);
	pr_err("dr_write:           %04x\n", control->intercept_dr_write);
	pr_err("exceptions:         %08x\n", control->intercept_exceptions);
	pr_err("intercepts:         %016llx\n", control->intercept);
	pr_err("pause filter count: %d\n", control->pause_filter_count);
	pr_err("iopm_base_pa:       %016llx\n", control->iopm_base_pa);
	pr_err("msrpm_base_pa:      %016llx\n", control->msrpm_base_pa);
	pr_err("tsc_offset:         %016llx\n", control->tsc_offset);
	pr_err("asid:               %d\n", control->asid);
	pr_err("tlb_ctl:            %d\n", control->tlb_ctl);
	pr_err("int_ctl:            %08x\n", control->int_ctl);
	pr_err("int_vector:         %08x\n", control->int_vector);
	pr_err("int_state:          %08x\n", control->int_state);
	pr_err("exit_code:          %08x\n", control->exit_code);
	pr_err("exit_info1:         %016llx\n", control->exit_info_1);
	pr_err("exit_info2:         %016llx\n", control->exit_info_2);
	pr_err("exit_int_info:      %08x\n", control->exit_int_info);
	pr_err("exit_int_info_err:  %08x\n", control->exit_int_info_err);
	pr_err("nested_ctl:         %lld\n", control->nested_ctl);
	pr_err("nested_cr3:         %016llx\n", control->nested_cr3);
	pr_err("event_inj:          %08x\n", control->event_inj);
	pr_err("event_inj_err:      %08x\n", control->event_inj_err);
	pr_err("lbr_ctl:            %lld\n", control->lbr_ctl);
	pr_err("next_rip:           %016llx\n", control->next_rip);
	pr_err("VMCB State Save Area:\n");
	pr_err("es:   s: %04x a: %04x l: %08x b: %016llx\n",
		save->es.selector, save->es.attrib,
		save->es.limit, save->es.base);
	pr_err("cs:   s: %04x a: %04x l: %08x b: %016llx\n",
		save->cs.selector, save->cs.attrib,
		save->cs.limit, save->cs.base);
	pr_err("ss:   s: %04x a: %04x l: %08x b: %016llx\n",
		save->ss.selector, save->ss.attrib,
		save->ss.limit, save->ss.base);
	pr_err("ds:   s: %04x a: %04x l: %08x b: %016llx\n",
		save->ds.selector, save->ds.attrib,
		save->ds.limit, save->ds.base);
	pr_err("fs:   s: %04x a: %04x l: %08x b: %016llx\n",
		save->fs.selector, save->fs.attrib,
		save->fs.limit, save->fs.base);
	pr_err("gs:   s: %04x a: %04x l: %08x b: %016llx\n",
		save->gs.selector, save->gs.attrib,
		save->gs.limit, save->gs.base);
	pr_err("gdtr: s: %04x a: %04x l: %08x b: %016llx\n",
		save->gdtr.selector, save->gdtr.attrib,
		save->gdtr.limit, save->gdtr.base);
	pr_err("ldtr: s: %04x a: %04x l: %08x b: %016llx\n",
		save->ldtr.selector, save->ldtr.attrib,
		save->ldtr.limit, save->ldtr.base);
	pr_err("idtr: s: %04x a: %04x l: %08x b: %016llx\n",
		save->idtr.selector, save->idtr.attrib,
		save->idtr.limit, save->idtr.base);
	pr_err("tr:   s: %04x a: %04x l: %08x b: %016llx\n",
		save->tr.selector, save->tr.attrib,
		save->tr.limit, save->tr.base);
	pr_err("cpl:            %d                efer:         %016llx\n",
		save->cpl, save->efer);
	pr_err("cr0:            %016llx cr2:          %016llx\n",
		save->cr0, save->cr2);
	pr_err("cr3:            %016llx cr4:          %016llx\n",
		save->cr3, save->cr4);
	pr_err("dr6:            %016llx dr7:          %016llx\n",
		save->dr6, save->dr7);
	pr_err("rip:            %016llx rflags:       %016llx\n",
		save->rip, save->rflags);
	pr_err("rsp:            %016llx rax:          %016llx\n",
		save->rsp, save->rax);
	pr_err("star:           %016llx lstar:        %016llx\n",
		save->star, save->lstar);
	pr_err("cstar:          %016llx sfmask:       %016llx\n",
		save->cstar, save->sfmask);
	pr_err("kernel_gs_base: %016llx sysenter_cs:  %016llx\n",
		save->kernel_gs_base, save->sysenter_cs);
	pr_err("sysenter_esp:   %016llx sysenter_eip: %016llx\n",
		save->sysenter_esp, save->sysenter_eip);
	pr_err("gpat:           %016llx dbgctl:       %016llx\n",
		save->g_pat, save->dbgctl);
	pr_err("br_from:        %016llx br_to:        %016llx\n",
		save->br_from, save->br_to);
	pr_err("excp_from:      %016llx excp_to:      %016llx\n",
		save->last_excp_from, save->last_excp_to);

}

2977 2978 2979 2980 2981 2982 2983 2984
static void svm_get_exit_info(struct kvm_vcpu *vcpu, u64 *info1, u64 *info2)
{
	struct vmcb_control_area *control = &to_svm(vcpu)->vmcb->control;

	*info1 = control->exit_info_1;
	*info2 = control->exit_info_2;
}

2985
static int handle_exit(struct kvm_vcpu *vcpu)
2986
{
2987
	struct vcpu_svm *svm = to_svm(vcpu);
2988
	struct kvm_run *kvm_run = vcpu->run;
2989
	u32 exit_code = svm->vmcb->control.exit_code;
2990

2991
	trace_kvm_exit(exit_code, vcpu, KVM_ISA_SVM);
2992

2993 2994 2995 2996
	if (!(svm->vmcb->control.intercept_cr_write & INTERCEPT_CR0_MASK))
		vcpu->arch.cr0 = svm->vmcb->save.cr0;
	if (npt_enabled)
		vcpu->arch.cr3 = svm->vmcb->save.cr3;
2997

2998 2999 3000 3001 3002 3003 3004
	if (unlikely(svm->nested.exit_required)) {
		nested_svm_vmexit(svm);
		svm->nested.exit_required = false;

		return 1;
	}

3005
	if (is_nested(svm)) {
3006 3007
		int vmexit;

3008 3009 3010 3011 3012 3013
		trace_kvm_nested_vmexit(svm->vmcb->save.rip, exit_code,
					svm->vmcb->control.exit_info_1,
					svm->vmcb->control.exit_info_2,
					svm->vmcb->control.exit_int_info,
					svm->vmcb->control.exit_int_info_err);

3014 3015 3016 3017 3018 3019
		vmexit = nested_svm_exit_special(svm);

		if (vmexit == NESTED_EXIT_CONTINUE)
			vmexit = nested_svm_exit_handled(svm);

		if (vmexit == NESTED_EXIT_DONE)
3020 3021 3022
			return 1;
	}

3023 3024
	svm_complete_interrupts(svm);

3025 3026 3027 3028
	if (svm->vmcb->control.exit_code == SVM_EXIT_ERR) {
		kvm_run->exit_reason = KVM_EXIT_FAIL_ENTRY;
		kvm_run->fail_entry.hardware_entry_failure_reason
			= svm->vmcb->control.exit_code;
3029 3030
		pr_err("KVM: FAILED VMRUN WITH VMCB:\n");
		dump_vmcb(vcpu);
3031 3032 3033
		return 0;
	}

3034
	if (is_external_interrupt(svm->vmcb->control.exit_int_info) &&
3035
	    exit_code != SVM_EXIT_EXCP_BASE + PF_VECTOR &&
3036 3037
	    exit_code != SVM_EXIT_NPF && exit_code != SVM_EXIT_TASK_SWITCH &&
	    exit_code != SVM_EXIT_INTR && exit_code != SVM_EXIT_NMI)
3038 3039
		printk(KERN_ERR "%s: unexpected exit_ini_info 0x%x "
		       "exit_code 0x%x\n",
3040
		       __func__, svm->vmcb->control.exit_int_info,
3041 3042
		       exit_code);

3043
	if (exit_code >= ARRAY_SIZE(svm_exit_handlers)
3044
	    || !svm_exit_handlers[exit_code]) {
3045
		kvm_run->exit_reason = KVM_EXIT_UNKNOWN;
3046
		kvm_run->hw.hardware_exit_reason = exit_code;
3047 3048 3049
		return 0;
	}

3050
	return svm_exit_handlers[exit_code](svm);
3051 3052 3053 3054 3055 3056
}

static void reload_tss(struct kvm_vcpu *vcpu)
{
	int cpu = raw_smp_processor_id();

3057 3058
	struct svm_cpu_data *sd = per_cpu(svm_data, cpu);
	sd->tss_desc->type = 9; /* available 32/64-bit TSS */
3059 3060 3061
	load_TR_desc();
}

Rusty Russell's avatar
Rusty Russell committed
3062
static void pre_svm_run(struct vcpu_svm *svm)
3063 3064 3065
{
	int cpu = raw_smp_processor_id();

3066
	struct svm_cpu_data *sd = per_cpu(svm_data, cpu);
3067

3068
	svm->vmcb->control.tlb_ctl = TLB_CONTROL_DO_NOTHING;
3069
	/* FIXME: handle wraparound of asid_generation */
3070 3071
	if (svm->asid_generation != sd->asid_generation)
		new_asid(svm, sd);
3072 3073
}

3074 3075 3076 3077 3078 3079
static void svm_inject_nmi(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	svm->vmcb->control.event_inj = SVM_EVTINJ_VALID | SVM_EVTINJ_TYPE_NMI;
	vcpu->arch.hflags |= HF_NMI_MASK;
3080
	svm->vmcb->control.intercept |= (1ULL << INTERCEPT_IRET);
3081 3082
	++vcpu->stat.nmi_injections;
}
3083

3084
static inline void svm_inject_irq(struct vcpu_svm *svm, int irq)
3085 3086 3087
{
	struct vmcb_control_area *control;

Rusty Russell's avatar
Rusty Russell committed
3088
	control = &svm->vmcb->control;
3089
	control->int_vector = irq;
3090 3091 3092 3093 3094
	control->int_ctl &= ~V_INTR_PRIO_MASK;
	control->int_ctl |= V_IRQ_MASK |
		((/*control->int_vector >> 4*/ 0xf) << V_INTR_PRIO_SHIFT);
}

3095
static void svm_set_irq(struct kvm_vcpu *vcpu)
Eddie Dong's avatar
Eddie Dong committed
3096 3097 3098
{
	struct vcpu_svm *svm = to_svm(vcpu);

3099
	BUG_ON(!(gif_set(svm)));
3100

3101 3102 3103
	trace_kvm_inj_virq(vcpu->arch.interrupt.nr);
	++vcpu->stat.irq_injections;

3104 3105
	svm->vmcb->control.event_inj = vcpu->arch.interrupt.nr |
		SVM_EVTINJ_VALID | SVM_EVTINJ_TYPE_INTR;
Eddie Dong's avatar
Eddie Dong committed
3106 3107
}

3108
static void update_cr8_intercept(struct kvm_vcpu *vcpu, int tpr, int irr)
3109 3110 3111
{
	struct vcpu_svm *svm = to_svm(vcpu);

3112 3113 3114
	if (is_nested(svm) && (vcpu->arch.hflags & HF_VINTR_MASK))
		return;

3115
	if (irr == -1)
3116 3117
		return;

3118 3119 3120
	if (tpr >= irr)
		svm->vmcb->control.intercept_cr_write |= INTERCEPT_CR8_MASK;
}
3121

3122 3123 3124 3125
static int svm_nmi_allowed(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);
	struct vmcb *vmcb = svm->vmcb;
3126 3127 3128 3129 3130 3131
	int ret;
	ret = !(vmcb->control.int_state & SVM_INTERRUPT_SHADOW_MASK) &&
	      !(svm->vcpu.arch.hflags & HF_NMI_MASK);
	ret = ret && gif_set(svm) && nested_svm_nmi(svm);

	return ret;
3132 3133
}

3134 3135 3136 3137 3138 3139 3140 3141 3142 3143 3144 3145 3146
static bool svm_get_nmi_mask(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	return !!(svm->vcpu.arch.hflags & HF_NMI_MASK);
}

static void svm_set_nmi_mask(struct kvm_vcpu *vcpu, bool masked)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	if (masked) {
		svm->vcpu.arch.hflags |= HF_NMI_MASK;
3147
		svm->vmcb->control.intercept |= (1ULL << INTERCEPT_IRET);
3148 3149
	} else {
		svm->vcpu.arch.hflags &= ~HF_NMI_MASK;
3150
		svm->vmcb->control.intercept &= ~(1ULL << INTERCEPT_IRET);
3151 3152 3153
	}
}

3154 3155 3156 3157
static int svm_interrupt_allowed(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);
	struct vmcb *vmcb = svm->vmcb;
3158 3159 3160 3161 3162 3163 3164 3165 3166 3167 3168 3169
	int ret;

	if (!gif_set(svm) ||
	     (vmcb->control.int_state & SVM_INTERRUPT_SHADOW_MASK))
		return 0;

	ret = !!(vmcb->save.rflags & X86_EFLAGS_IF);

	if (is_nested(svm))
		return ret && !(svm->vcpu.arch.hflags & HF_VINTR_MASK);

	return ret;
3170 3171
}

3172
static void enable_irq_window(struct kvm_vcpu *vcpu)
3173
{
3174 3175
	struct vcpu_svm *svm = to_svm(vcpu);

3176 3177 3178 3179 3180 3181
	/*
	 * In case GIF=0 we can't rely on the CPU to tell us when GIF becomes
	 * 1, because that's a separate STGI/VMRUN intercept.  The next time we
	 * get that intercept, this function will be called again though and
	 * we'll get the vintr intercept.
	 */
3182
	if (gif_set(svm) && nested_svm_intr(svm)) {
3183 3184 3185
		svm_set_vintr(svm);
		svm_inject_irq(svm, 0x0);
	}
3186 3187
}

3188
static void enable_nmi_window(struct kvm_vcpu *vcpu)
3189
{
3190
	struct vcpu_svm *svm = to_svm(vcpu);
3191

3192 3193 3194 3195
	if ((svm->vcpu.arch.hflags & (HF_NMI_MASK | HF_IRET_MASK))
	    == HF_NMI_MASK)
		return; /* IRET will cause a vm exit */

3196 3197 3198 3199
	/*
	 * Something prevents NMI from been injected. Single step over possible
	 * problem (IRET or exception injection or interrupt shadow)
	 */
3200
	svm->nmi_singlestep = true;
3201 3202
	svm->vmcb->save.rflags |= (X86_EFLAGS_TF | X86_EFLAGS_RF);
	update_db_intercept(vcpu);
3203 3204
}

3205 3206 3207 3208 3209
static int svm_set_tss_addr(struct kvm *kvm, unsigned int addr)
{
	return 0;
}

3210 3211 3212 3213 3214
static void svm_flush_tlb(struct kvm_vcpu *vcpu)
{
	force_new_asid(vcpu);
}

3215 3216 3217 3218
static void svm_prepare_guest_switch(struct kvm_vcpu *vcpu)
{
}

3219 3220 3221 3222
static inline void sync_cr8_to_lapic(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);

3223 3224 3225
	if (is_nested(svm) && (vcpu->arch.hflags & HF_VINTR_MASK))
		return;

3226 3227
	if (!(svm->vmcb->control.intercept_cr_write & INTERCEPT_CR8_MASK)) {
		int cr8 = svm->vmcb->control.int_ctl & V_TPR_MASK;
3228
		kvm_set_cr8(vcpu, cr8);
3229 3230 3231
	}
}

3232 3233 3234 3235 3236
static inline void sync_lapic_to_cr8(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);
	u64 cr8;

3237 3238 3239
	if (is_nested(svm) && (vcpu->arch.hflags & HF_VINTR_MASK))
		return;

3240 3241 3242 3243 3244
	cr8 = kvm_get_cr8(vcpu);
	svm->vmcb->control.int_ctl &= ~V_TPR_MASK;
	svm->vmcb->control.int_ctl |= cr8 & V_TPR_MASK;
}

3245 3246 3247 3248 3249
static void svm_complete_interrupts(struct vcpu_svm *svm)
{
	u8 vector;
	int type;
	u32 exitintinfo = svm->vmcb->control.exit_int_info;
3250 3251 3252
	unsigned int3_injected = svm->int3_injected;

	svm->int3_injected = 0;
3253

3254
	if (svm->vcpu.arch.hflags & HF_IRET_MASK) {
3255
		svm->vcpu.arch.hflags &= ~(HF_NMI_MASK | HF_IRET_MASK);
3256 3257
		kvm_make_request(KVM_REQ_EVENT, &svm->vcpu);
	}
3258

3259 3260 3261 3262 3263 3264 3265
	svm->vcpu.arch.nmi_injected = false;
	kvm_clear_exception_queue(&svm->vcpu);
	kvm_clear_interrupt_queue(&svm->vcpu);

	if (!(exitintinfo & SVM_EXITINTINFO_VALID))
		return;

3266 3267
	kvm_make_request(KVM_REQ_EVENT, &svm->vcpu);

3268 3269 3270 3271 3272 3273 3274 3275
	vector = exitintinfo & SVM_EXITINTINFO_VEC_MASK;
	type = exitintinfo & SVM_EXITINTINFO_TYPE_MASK;

	switch (type) {
	case SVM_EXITINTINFO_TYPE_NMI:
		svm->vcpu.arch.nmi_injected = true;
		break;
	case SVM_EXITINTINFO_TYPE_EXEPT:
3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286
		/*
		 * In case of software exceptions, do not reinject the vector,
		 * but re-execute the instruction instead. Rewind RIP first
		 * if we emulated INT3 before.
		 */
		if (kvm_exception_is_soft(vector)) {
			if (vector == BP_VECTOR && int3_injected &&
			    kvm_is_linear_rip(&svm->vcpu, svm->int3_rip))
				kvm_rip_write(&svm->vcpu,
					      kvm_rip_read(&svm->vcpu) -
					      int3_injected);
3287
			break;
3288
		}
3289 3290
		if (exitintinfo & SVM_EXITINTINFO_VALID_ERR) {
			u32 err = svm->vmcb->control.exit_int_info_err;
3291
			kvm_requeue_exception_e(&svm->vcpu, vector, err);
3292 3293

		} else
3294
			kvm_requeue_exception(&svm->vcpu, vector);
3295 3296
		break;
	case SVM_EXITINTINFO_TYPE_INTR:
3297
		kvm_queue_interrupt(&svm->vcpu, vector, false);
3298 3299 3300 3301 3302 3303
		break;
	default:
		break;
	}
}

3304 3305 3306 3307 3308 3309 3310 3311 3312 3313 3314
static void svm_cancel_injection(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);
	struct vmcb_control_area *control = &svm->vmcb->control;

	control->exit_int_info = control->event_inj;
	control->exit_int_info_err = control->event_inj_err;
	control->event_inj = 0;
	svm_complete_interrupts(svm);
}

3315 3316 3317 3318 3319 3320
#ifdef CONFIG_X86_64
#define R "r"
#else
#define R "e"
#endif

3321
static void svm_vcpu_run(struct kvm_vcpu *vcpu)
3322
{
3323
	struct vcpu_svm *svm = to_svm(vcpu);
3324

3325 3326 3327 3328
	svm->vmcb->save.rax = vcpu->arch.regs[VCPU_REGS_RAX];
	svm->vmcb->save.rsp = vcpu->arch.regs[VCPU_REGS_RSP];
	svm->vmcb->save.rip = vcpu->arch.regs[VCPU_REGS_RIP];

3329 3330 3331 3332 3333 3334 3335
	/*
	 * A vmexit emulation is required before the vcpu can be executed
	 * again.
	 */
	if (unlikely(svm->nested.exit_required))
		return;

Rusty Russell's avatar
Rusty Russell committed
3336
	pre_svm_run(svm);
3337

3338 3339
	sync_lapic_to_cr8(vcpu);

3340
	svm->vmcb->save.cr2 = vcpu->arch.cr2;
3341

3342 3343 3344
	clgi();

	local_irq_enable();
3345

3346
	asm volatile (
3347 3348 3349 3350 3351 3352 3353
		"push %%"R"bp; \n\t"
		"mov %c[rbx](%[svm]), %%"R"bx \n\t"
		"mov %c[rcx](%[svm]), %%"R"cx \n\t"
		"mov %c[rdx](%[svm]), %%"R"dx \n\t"
		"mov %c[rsi](%[svm]), %%"R"si \n\t"
		"mov %c[rdi](%[svm]), %%"R"di \n\t"
		"mov %c[rbp](%[svm]), %%"R"bp \n\t"
3354
#ifdef CONFIG_X86_64
3355 3356 3357 3358 3359 3360 3361 3362
		"mov %c[r8](%[svm]),  %%r8  \n\t"
		"mov %c[r9](%[svm]),  %%r9  \n\t"
		"mov %c[r10](%[svm]), %%r10 \n\t"
		"mov %c[r11](%[svm]), %%r11 \n\t"
		"mov %c[r12](%[svm]), %%r12 \n\t"
		"mov %c[r13](%[svm]), %%r13 \n\t"
		"mov %c[r14](%[svm]), %%r14 \n\t"
		"mov %c[r15](%[svm]), %%r15 \n\t"
3363 3364 3365
#endif

		/* Enter guest mode */
3366 3367
		"push %%"R"ax \n\t"
		"mov %c[vmcb](%[svm]), %%"R"ax \n\t"
3368 3369 3370
		__ex(SVM_VMLOAD) "\n\t"
		__ex(SVM_VMRUN) "\n\t"
		__ex(SVM_VMSAVE) "\n\t"
3371
		"pop %%"R"ax \n\t"
3372 3373

		/* Save guest registers, load host registers */
3374 3375 3376 3377 3378 3379
		"mov %%"R"bx, %c[rbx](%[svm]) \n\t"
		"mov %%"R"cx, %c[rcx](%[svm]) \n\t"
		"mov %%"R"dx, %c[rdx](%[svm]) \n\t"
		"mov %%"R"si, %c[rsi](%[svm]) \n\t"
		"mov %%"R"di, %c[rdi](%[svm]) \n\t"
		"mov %%"R"bp, %c[rbp](%[svm]) \n\t"
3380
#ifdef CONFIG_X86_64
3381 3382 3383 3384 3385 3386 3387 3388
		"mov %%r8,  %c[r8](%[svm]) \n\t"
		"mov %%r9,  %c[r9](%[svm]) \n\t"
		"mov %%r10, %c[r10](%[svm]) \n\t"
		"mov %%r11, %c[r11](%[svm]) \n\t"
		"mov %%r12, %c[r12](%[svm]) \n\t"
		"mov %%r13, %c[r13](%[svm]) \n\t"
		"mov %%r14, %c[r14](%[svm]) \n\t"
		"mov %%r15, %c[r15](%[svm]) \n\t"
3389
#endif
3390
		"pop %%"R"bp"
3391
		:
3392
		: [svm]"a"(svm),
3393
		  [vmcb]"i"(offsetof(struct vcpu_svm, vmcb_pa)),
3394 3395 3396 3397 3398 3399
		  [rbx]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_RBX])),
		  [rcx]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_RCX])),
		  [rdx]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_RDX])),
		  [rsi]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_RSI])),
		  [rdi]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_RDI])),
		  [rbp]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_RBP]))
3400
#ifdef CONFIG_X86_64
3401 3402 3403 3404 3405 3406 3407 3408
		  , [r8]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_R8])),
		  [r9]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_R9])),
		  [r10]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_R10])),
		  [r11]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_R11])),
		  [r12]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_R12])),
		  [r13]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_R13])),
		  [r14]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_R14])),
		  [r15]"i"(offsetof(struct vcpu_svm, vcpu.arch.regs[VCPU_REGS_R15]))
3409
#endif
3410
		: "cc", "memory"
3411
		, R"bx", R"cx", R"dx", R"si", R"di"
3412 3413 3414 3415
#ifdef CONFIG_X86_64
		, "r8", "r9", "r10", "r11" , "r12", "r13", "r14", "r15"
#endif
		);
3416

3417 3418 3419
#ifdef CONFIG_X86_64
	wrmsrl(MSR_GS_BASE, svm->host.gs_base);
#else
3420
	loadsegment(fs, svm->host.fs);
3421
#endif
3422 3423 3424

	reload_tss(vcpu);

3425 3426 3427 3428
	local_irq_disable();

	stgi();

3429 3430 3431 3432 3433
	vcpu->arch.cr2 = svm->vmcb->save.cr2;
	vcpu->arch.regs[VCPU_REGS_RAX] = svm->vmcb->save.rax;
	vcpu->arch.regs[VCPU_REGS_RSP] = svm->vmcb->save.rsp;
	vcpu->arch.regs[VCPU_REGS_RIP] = svm->vmcb->save.rip;

3434 3435
	sync_cr8_to_lapic(vcpu);

3436
	svm->next_rip = 0;
3437

3438 3439 3440 3441
	/* if exit due to PF check for async PF */
	if (svm->vmcb->control.exit_code == SVM_EXIT_EXCP_BASE + PF_VECTOR)
		svm->apf_reason = kvm_read_and_reset_pf_reason();

Avi Kivity's avatar
Avi Kivity committed
3442 3443 3444 3445
	if (npt_enabled) {
		vcpu->arch.regs_avail &= ~(1 << VCPU_EXREG_PDPTR);
		vcpu->arch.regs_dirty &= ~(1 << VCPU_EXREG_PDPTR);
	}
3446 3447 3448 3449 3450 3451 3452 3453

	/*
	 * We need to handle MC intercepts here before the vcpu has a chance to
	 * change the physical cpu
	 */
	if (unlikely(svm->vmcb->control.exit_code ==
		     SVM_EXIT_EXCP_BASE + MC_VECTOR))
		svm_handle_mce(svm);
3454 3455
}

3456 3457
#undef R

3458 3459
static void svm_set_cr3(struct kvm_vcpu *vcpu, unsigned long root)
{
3460 3461 3462
	struct vcpu_svm *svm = to_svm(vcpu);

	svm->vmcb->save.cr3 = root;
3463 3464 3465
	force_new_asid(vcpu);
}

3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477
static void set_tdp_cr3(struct kvm_vcpu *vcpu, unsigned long root)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	svm->vmcb->control.nested_cr3 = root;

	/* Also sync guest cr3 here in case we live migrate */
	svm->vmcb->save.cr3 = vcpu->arch.cr3;

	force_new_asid(vcpu);
}

3478 3479
static int is_disabled(void)
{
3480 3481 3482 3483 3484 3485
	u64 vm_cr;

	rdmsrl(MSR_VM_CR, vm_cr);
	if (vm_cr & (1 << SVM_VM_CR_SVM_DISABLE))
		return 1;

3486 3487 3488
	return 0;
}

3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499
static void
svm_patch_hypercall(struct kvm_vcpu *vcpu, unsigned char *hypercall)
{
	/*
	 * Patch in the VMMCALL instruction:
	 */
	hypercall[0] = 0x0f;
	hypercall[1] = 0x01;
	hypercall[2] = 0xd9;
}

3500 3501 3502 3503 3504
static void svm_check_processor_compat(void *rtn)
{
	*(int *)rtn = 0;
}

3505 3506 3507 3508 3509
static bool svm_cpu_has_accelerated_tpr(void)
{
	return false;
}

3510
static u64 svm_get_mt_mask(struct kvm_vcpu *vcpu, gfn_t gfn, bool is_mmio)
Sheng Yang's avatar
Sheng Yang committed
3511 3512 3513 3514
{
	return 0;
}

3515 3516 3517 3518
static void svm_cpuid_update(struct kvm_vcpu *vcpu)
{
}

3519 3520
static void svm_set_supported_cpuid(u32 func, struct kvm_cpuid_entry2 *entry)
{
3521
	switch (func) {
3522 3523 3524 3525
	case 0x00000001:
		/* Mask out xsave bit as long as it is not supported by SVM */
		entry->ecx &= ~(bit(X86_FEATURE_XSAVE));
		break;
3526 3527 3528 3529
	case 0x80000001:
		if (nested)
			entry->ecx |= (1 << 2); /* Set SVM bit */
		break;
3530 3531 3532 3533 3534
	case 0x8000000A:
		entry->eax = 1; /* SVM revision 1 */
		entry->ebx = 8; /* Lets support 8 ASIDs in case we add proper
				   ASID emulation to nested SVM */
		entry->ecx = 0; /* Reserved */
3535 3536 3537 3538
		entry->edx = 0; /* Per default do not support any
				   additional features */

		/* Support next_rip if host supports it */
3539
		if (boot_cpu_has(X86_FEATURE_NRIPS))
3540
			entry->edx |= SVM_FEATURE_NRIP;
3541

3542 3543 3544 3545
		/* Support NPT for the guest if enabled */
		if (npt_enabled)
			entry->edx |= SVM_FEATURE_NPT;

3546 3547
		break;
	}
3548 3549
}

3550
static const struct trace_print_flags svm_exit_reasons_str[] = {
3551 3552 3553 3554 3555 3556 3557 3558 3559 3560 3561 3562 3563 3564 3565 3566 3567 3568
	{ SVM_EXIT_READ_CR0,			"read_cr0" },
	{ SVM_EXIT_READ_CR3,			"read_cr3" },
	{ SVM_EXIT_READ_CR4,			"read_cr4" },
	{ SVM_EXIT_READ_CR8,			"read_cr8" },
	{ SVM_EXIT_WRITE_CR0,			"write_cr0" },
	{ SVM_EXIT_WRITE_CR3,			"write_cr3" },
	{ SVM_EXIT_WRITE_CR4,			"write_cr4" },
	{ SVM_EXIT_WRITE_CR8,			"write_cr8" },
	{ SVM_EXIT_READ_DR0,			"read_dr0" },
	{ SVM_EXIT_READ_DR1,			"read_dr1" },
	{ SVM_EXIT_READ_DR2,			"read_dr2" },
	{ SVM_EXIT_READ_DR3,			"read_dr3" },
	{ SVM_EXIT_WRITE_DR0,			"write_dr0" },
	{ SVM_EXIT_WRITE_DR1,			"write_dr1" },
	{ SVM_EXIT_WRITE_DR2,			"write_dr2" },
	{ SVM_EXIT_WRITE_DR3,			"write_dr3" },
	{ SVM_EXIT_WRITE_DR5,			"write_dr5" },
	{ SVM_EXIT_WRITE_DR7,			"write_dr7" },
3569 3570 3571 3572 3573 3574 3575 3576 3577 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594 3595 3596 3597 3598 3599 3600 3601 3602
	{ SVM_EXIT_EXCP_BASE + DB_VECTOR,	"DB excp" },
	{ SVM_EXIT_EXCP_BASE + BP_VECTOR,	"BP excp" },
	{ SVM_EXIT_EXCP_BASE + UD_VECTOR,	"UD excp" },
	{ SVM_EXIT_EXCP_BASE + PF_VECTOR,	"PF excp" },
	{ SVM_EXIT_EXCP_BASE + NM_VECTOR,	"NM excp" },
	{ SVM_EXIT_EXCP_BASE + MC_VECTOR,	"MC excp" },
	{ SVM_EXIT_INTR,			"interrupt" },
	{ SVM_EXIT_NMI,				"nmi" },
	{ SVM_EXIT_SMI,				"smi" },
	{ SVM_EXIT_INIT,			"init" },
	{ SVM_EXIT_VINTR,			"vintr" },
	{ SVM_EXIT_CPUID,			"cpuid" },
	{ SVM_EXIT_INVD,			"invd" },
	{ SVM_EXIT_HLT,				"hlt" },
	{ SVM_EXIT_INVLPG,			"invlpg" },
	{ SVM_EXIT_INVLPGA,			"invlpga" },
	{ SVM_EXIT_IOIO,			"io" },
	{ SVM_EXIT_MSR,				"msr" },
	{ SVM_EXIT_TASK_SWITCH,			"task_switch" },
	{ SVM_EXIT_SHUTDOWN,			"shutdown" },
	{ SVM_EXIT_VMRUN,			"vmrun" },
	{ SVM_EXIT_VMMCALL,			"hypercall" },
	{ SVM_EXIT_VMLOAD,			"vmload" },
	{ SVM_EXIT_VMSAVE,			"vmsave" },
	{ SVM_EXIT_STGI,			"stgi" },
	{ SVM_EXIT_CLGI,			"clgi" },
	{ SVM_EXIT_SKINIT,			"skinit" },
	{ SVM_EXIT_WBINVD,			"wbinvd" },
	{ SVM_EXIT_MONITOR,			"monitor" },
	{ SVM_EXIT_MWAIT,			"mwait" },
	{ SVM_EXIT_NPF,				"npf" },
	{ -1, NULL }
};

3603
static int svm_get_lpage_level(void)
3604
{
3605
	return PT_PDPE_LEVEL;
3606 3607
}

3608 3609 3610 3611 3612
static bool svm_rdtscp_supported(void)
{
	return false;
}

3613 3614 3615 3616 3617
static bool svm_has_wbinvd_exit(void)
{
	return true;
}

3618 3619 3620 3621 3622
static void svm_fpu_deactivate(struct kvm_vcpu *vcpu)
{
	struct vcpu_svm *svm = to_svm(vcpu);

	svm->vmcb->control.intercept_exceptions |= 1 << NM_VECTOR;
3623 3624 3625
	if (is_nested(svm))
		svm->nested.hsave->control.intercept_exceptions |= 1 << NM_VECTOR;
	update_cr0_intercept(svm);
3626 3627
}

3628
static struct kvm_x86_ops svm_x86_ops = {
3629 3630 3631 3632
	.cpu_has_kvm_support = has_svm,
	.disabled_by_bios = is_disabled,
	.hardware_setup = svm_hardware_setup,
	.hardware_unsetup = svm_hardware_unsetup,
3633
	.check_processor_compatibility = svm_check_processor_compat,
3634 3635
	.hardware_enable = svm_hardware_enable,
	.hardware_disable = svm_hardware_disable,
3636
	.cpu_has_accelerated_tpr = svm_cpu_has_accelerated_tpr,
3637 3638 3639

	.vcpu_create = svm_create_vcpu,
	.vcpu_free = svm_free_vcpu,
3640
	.vcpu_reset = svm_vcpu_reset,
3641

3642
	.prepare_guest_switch = svm_prepare_guest_switch,
3643 3644 3645 3646 3647 3648 3649 3650 3651
	.vcpu_load = svm_vcpu_load,
	.vcpu_put = svm_vcpu_put,

	.set_guest_debug = svm_guest_debug,
	.get_msr = svm_get_msr,
	.set_msr = svm_set_msr,
	.get_segment_base = svm_get_segment_base,
	.get_segment = svm_get_segment,
	.set_segment = svm_set_segment,
3652
	.get_cpl = svm_get_cpl,
3653
	.get_cs_db_l_bits = kvm_get_cs_db_l_bits,
3654
	.decache_cr0_guest_bits = svm_decache_cr0_guest_bits,
3655
	.decache_cr4_guest_bits = svm_decache_cr4_guest_bits,
3656 3657 3658 3659 3660 3661 3662 3663
	.set_cr0 = svm_set_cr0,
	.set_cr3 = svm_set_cr3,
	.set_cr4 = svm_set_cr4,
	.set_efer = svm_set_efer,
	.get_idt = svm_get_idt,
	.set_idt = svm_set_idt,
	.get_gdt = svm_get_gdt,
	.set_gdt = svm_set_gdt,
3664
	.set_dr7 = svm_set_dr7,
Avi Kivity's avatar
Avi Kivity committed
3665
	.cache_reg = svm_cache_reg,
3666 3667
	.get_rflags = svm_get_rflags,
	.set_rflags = svm_set_rflags,
Avi Kivity's avatar
Avi Kivity committed
3668
	.fpu_activate = svm_fpu_activate,
3669
	.fpu_deactivate = svm_fpu_deactivate,
3670 3671 3672 3673

	.tlb_flush = svm_flush_tlb,

	.run = svm_vcpu_run,
3674
	.handle_exit = handle_exit,
3675
	.skip_emulated_instruction = skip_emulated_instruction,
3676 3677
	.set_interrupt_shadow = svm_set_interrupt_shadow,
	.get_interrupt_shadow = svm_get_interrupt_shadow,
3678
	.patch_hypercall = svm_patch_hypercall,
Eddie Dong's avatar
Eddie Dong committed
3679
	.set_irq = svm_set_irq,
3680
	.set_nmi = svm_inject_nmi,
3681
	.queue_exception = svm_queue_exception,
3682
	.cancel_injection = svm_cancel_injection,
3683
	.interrupt_allowed = svm_interrupt_allowed,
3684
	.nmi_allowed = svm_nmi_allowed,
3685 3686
	.get_nmi_mask = svm_get_nmi_mask,
	.set_nmi_mask = svm_set_nmi_mask,
3687 3688 3689
	.enable_nmi_window = enable_nmi_window,
	.enable_irq_window = enable_irq_window,
	.update_cr8_intercept = update_cr8_intercept,
3690 3691

	.set_tss_addr = svm_set_tss_addr,
3692
	.get_tdp_level = get_npt_level,
3693
	.get_mt_mask = svm_get_mt_mask,
3694

3695
	.get_exit_info = svm_get_exit_info,
3696
	.exit_reasons_str = svm_exit_reasons_str,
3697

3698
	.get_lpage_level = svm_get_lpage_level,
3699 3700

	.cpuid_update = svm_cpuid_update,
3701 3702

	.rdtscp_supported = svm_rdtscp_supported,
3703 3704

	.set_supported_cpuid = svm_set_supported_cpuid,
3705 3706

	.has_wbinvd_exit = svm_has_wbinvd_exit,
3707 3708

	.write_tsc_offset = svm_write_tsc_offset,
Zachary Amsden's avatar
Zachary Amsden committed
3709
	.adjust_tsc_offset = svm_adjust_tsc_offset,
3710 3711

	.set_tdp_cr3 = set_tdp_cr3,
3712 3713 3714 3715
};

static int __init svm_init(void)
{
3716
	return kvm_init(&svm_x86_ops, sizeof(struct vcpu_svm),
3717
			__alignof__(struct vcpu_svm), THIS_MODULE);
3718 3719 3720 3721
}

static void __exit svm_exit(void)
{
3722
	kvm_exit();
3723 3724 3725 3726
}

module_init(svm_init)
module_exit(svm_exit)