xref: /linux/arch/x86/kvm/svm/nested.c (revision 6c0238c4a62b3a0b1201aeb7e33a4636d552a436)
1883b0a91SJoerg Roedel // SPDX-License-Identifier: GPL-2.0-only
2883b0a91SJoerg Roedel /*
3883b0a91SJoerg Roedel  * Kernel-based Virtual Machine driver for Linux
4883b0a91SJoerg Roedel  *
5883b0a91SJoerg Roedel  * AMD SVM support
6883b0a91SJoerg Roedel  *
7883b0a91SJoerg Roedel  * Copyright (C) 2006 Qumranet, Inc.
8883b0a91SJoerg Roedel  * Copyright 2010 Red Hat, Inc. and/or its affiliates.
9883b0a91SJoerg Roedel  *
10883b0a91SJoerg Roedel  * Authors:
11883b0a91SJoerg Roedel  *   Yaniv Kamay  <yaniv@qumranet.com>
12883b0a91SJoerg Roedel  *   Avi Kivity   <avi@qumranet.com>
13883b0a91SJoerg Roedel  */
14883b0a91SJoerg Roedel 
15883b0a91SJoerg Roedel #define pr_fmt(fmt) "SVM: " fmt
16883b0a91SJoerg Roedel 
17883b0a91SJoerg Roedel #include <linux/kvm_types.h>
18883b0a91SJoerg Roedel #include <linux/kvm_host.h>
19883b0a91SJoerg Roedel #include <linux/kernel.h>
20883b0a91SJoerg Roedel 
21883b0a91SJoerg Roedel #include <asm/msr-index.h>
225679b803SPaolo Bonzini #include <asm/debugreg.h>
23883b0a91SJoerg Roedel 
24883b0a91SJoerg Roedel #include "kvm_emulate.h"
25883b0a91SJoerg Roedel #include "trace.h"
26883b0a91SJoerg Roedel #include "mmu.h"
27883b0a91SJoerg Roedel #include "x86.h"
28883b0a91SJoerg Roedel #include "svm.h"
29883b0a91SJoerg Roedel 
30883b0a91SJoerg Roedel static void nested_svm_inject_npf_exit(struct kvm_vcpu *vcpu,
31883b0a91SJoerg Roedel 				       struct x86_exception *fault)
32883b0a91SJoerg Roedel {
33883b0a91SJoerg Roedel 	struct vcpu_svm *svm = to_svm(vcpu);
34883b0a91SJoerg Roedel 
35883b0a91SJoerg Roedel 	if (svm->vmcb->control.exit_code != SVM_EXIT_NPF) {
36883b0a91SJoerg Roedel 		/*
37883b0a91SJoerg Roedel 		 * TODO: track the cause of the nested page fault, and
38883b0a91SJoerg Roedel 		 * correctly fill in the high bits of exit_info_1.
39883b0a91SJoerg Roedel 		 */
40883b0a91SJoerg Roedel 		svm->vmcb->control.exit_code = SVM_EXIT_NPF;
41883b0a91SJoerg Roedel 		svm->vmcb->control.exit_code_hi = 0;
42883b0a91SJoerg Roedel 		svm->vmcb->control.exit_info_1 = (1ULL << 32);
43883b0a91SJoerg Roedel 		svm->vmcb->control.exit_info_2 = fault->address;
44883b0a91SJoerg Roedel 	}
45883b0a91SJoerg Roedel 
46883b0a91SJoerg Roedel 	svm->vmcb->control.exit_info_1 &= ~0xffffffffULL;
47883b0a91SJoerg Roedel 	svm->vmcb->control.exit_info_1 |= fault->error_code;
48883b0a91SJoerg Roedel 
49883b0a91SJoerg Roedel 	/*
50883b0a91SJoerg Roedel 	 * The present bit is always zero for page structure faults on real
51883b0a91SJoerg Roedel 	 * hardware.
52883b0a91SJoerg Roedel 	 */
53883b0a91SJoerg Roedel 	if (svm->vmcb->control.exit_info_1 & (2ULL << 32))
54883b0a91SJoerg Roedel 		svm->vmcb->control.exit_info_1 &= ~1;
55883b0a91SJoerg Roedel 
56883b0a91SJoerg Roedel 	nested_svm_vmexit(svm);
57883b0a91SJoerg Roedel }
58883b0a91SJoerg Roedel 
59883b0a91SJoerg Roedel static u64 nested_svm_get_tdp_pdptr(struct kvm_vcpu *vcpu, int index)
60883b0a91SJoerg Roedel {
61883b0a91SJoerg Roedel 	struct vcpu_svm *svm = to_svm(vcpu);
62883b0a91SJoerg Roedel 	u64 cr3 = svm->nested.nested_cr3;
63883b0a91SJoerg Roedel 	u64 pdpte;
64883b0a91SJoerg Roedel 	int ret;
65883b0a91SJoerg Roedel 
66883b0a91SJoerg Roedel 	ret = kvm_vcpu_read_guest_page(vcpu, gpa_to_gfn(__sme_clr(cr3)), &pdpte,
67883b0a91SJoerg Roedel 				       offset_in_page(cr3) + index * 8, 8);
68883b0a91SJoerg Roedel 	if (ret)
69883b0a91SJoerg Roedel 		return 0;
70883b0a91SJoerg Roedel 	return pdpte;
71883b0a91SJoerg Roedel }
72883b0a91SJoerg Roedel 
73883b0a91SJoerg Roedel static unsigned long nested_svm_get_tdp_cr3(struct kvm_vcpu *vcpu)
74883b0a91SJoerg Roedel {
75883b0a91SJoerg Roedel 	struct vcpu_svm *svm = to_svm(vcpu);
76883b0a91SJoerg Roedel 
77883b0a91SJoerg Roedel 	return svm->nested.nested_cr3;
78883b0a91SJoerg Roedel }
79883b0a91SJoerg Roedel 
80883b0a91SJoerg Roedel static void nested_svm_init_mmu_context(struct kvm_vcpu *vcpu)
81883b0a91SJoerg Roedel {
82883b0a91SJoerg Roedel 	WARN_ON(mmu_is_nested(vcpu));
83883b0a91SJoerg Roedel 
84883b0a91SJoerg Roedel 	vcpu->arch.mmu = &vcpu->arch.guest_mmu;
85883b0a91SJoerg Roedel 	kvm_init_shadow_mmu(vcpu);
86883b0a91SJoerg Roedel 	vcpu->arch.mmu->get_guest_pgd     = nested_svm_get_tdp_cr3;
87883b0a91SJoerg Roedel 	vcpu->arch.mmu->get_pdptr         = nested_svm_get_tdp_pdptr;
88883b0a91SJoerg Roedel 	vcpu->arch.mmu->inject_page_fault = nested_svm_inject_npf_exit;
89e93fd3b3SSean Christopherson 	vcpu->arch.mmu->shadow_root_level = vcpu->arch.tdp_level;
90883b0a91SJoerg Roedel 	reset_shadow_zero_bits_mask(vcpu, vcpu->arch.mmu);
91883b0a91SJoerg Roedel 	vcpu->arch.walk_mmu              = &vcpu->arch.nested_mmu;
92883b0a91SJoerg Roedel }
93883b0a91SJoerg Roedel 
94883b0a91SJoerg Roedel static void nested_svm_uninit_mmu_context(struct kvm_vcpu *vcpu)
95883b0a91SJoerg Roedel {
96883b0a91SJoerg Roedel 	vcpu->arch.mmu = &vcpu->arch.root_mmu;
97883b0a91SJoerg Roedel 	vcpu->arch.walk_mmu = &vcpu->arch.root_mmu;
98883b0a91SJoerg Roedel }
99883b0a91SJoerg Roedel 
100883b0a91SJoerg Roedel void recalc_intercepts(struct vcpu_svm *svm)
101883b0a91SJoerg Roedel {
102883b0a91SJoerg Roedel 	struct vmcb_control_area *c, *h;
103883b0a91SJoerg Roedel 	struct nested_state *g;
104883b0a91SJoerg Roedel 
105883b0a91SJoerg Roedel 	mark_dirty(svm->vmcb, VMCB_INTERCEPTS);
106883b0a91SJoerg Roedel 
107883b0a91SJoerg Roedel 	if (!is_guest_mode(&svm->vcpu))
108883b0a91SJoerg Roedel 		return;
109883b0a91SJoerg Roedel 
110883b0a91SJoerg Roedel 	c = &svm->vmcb->control;
111883b0a91SJoerg Roedel 	h = &svm->nested.hsave->control;
112883b0a91SJoerg Roedel 	g = &svm->nested;
113883b0a91SJoerg Roedel 
114883b0a91SJoerg Roedel 	c->intercept_cr = h->intercept_cr;
115883b0a91SJoerg Roedel 	c->intercept_dr = h->intercept_dr;
116883b0a91SJoerg Roedel 	c->intercept_exceptions = h->intercept_exceptions;
117883b0a91SJoerg Roedel 	c->intercept = h->intercept;
118883b0a91SJoerg Roedel 
119883b0a91SJoerg Roedel 	if (svm->vcpu.arch.hflags & HF_VINTR_MASK) {
120883b0a91SJoerg Roedel 		/* We only want the cr8 intercept bits of L1 */
121883b0a91SJoerg Roedel 		c->intercept_cr &= ~(1U << INTERCEPT_CR8_READ);
122883b0a91SJoerg Roedel 		c->intercept_cr &= ~(1U << INTERCEPT_CR8_WRITE);
123883b0a91SJoerg Roedel 
124883b0a91SJoerg Roedel 		/*
125883b0a91SJoerg Roedel 		 * Once running L2 with HF_VINTR_MASK, EFLAGS.IF does not
126883b0a91SJoerg Roedel 		 * affect any interrupt we may want to inject; therefore,
127883b0a91SJoerg Roedel 		 * interrupt window vmexits are irrelevant to L0.
128883b0a91SJoerg Roedel 		 */
129883b0a91SJoerg Roedel 		c->intercept &= ~(1ULL << INTERCEPT_VINTR);
130883b0a91SJoerg Roedel 	}
131883b0a91SJoerg Roedel 
132883b0a91SJoerg Roedel 	/* We don't want to see VMMCALLs from a nested guest */
133883b0a91SJoerg Roedel 	c->intercept &= ~(1ULL << INTERCEPT_VMMCALL);
134883b0a91SJoerg Roedel 
135883b0a91SJoerg Roedel 	c->intercept_cr |= g->intercept_cr;
136883b0a91SJoerg Roedel 	c->intercept_dr |= g->intercept_dr;
137883b0a91SJoerg Roedel 	c->intercept_exceptions |= g->intercept_exceptions;
138883b0a91SJoerg Roedel 	c->intercept |= g->intercept;
139883b0a91SJoerg Roedel }
140883b0a91SJoerg Roedel 
141883b0a91SJoerg Roedel static void copy_vmcb_control_area(struct vmcb *dst_vmcb, struct vmcb *from_vmcb)
142883b0a91SJoerg Roedel {
143883b0a91SJoerg Roedel 	struct vmcb_control_area *dst  = &dst_vmcb->control;
144883b0a91SJoerg Roedel 	struct vmcb_control_area *from = &from_vmcb->control;
145883b0a91SJoerg Roedel 
146883b0a91SJoerg Roedel 	dst->intercept_cr         = from->intercept_cr;
147883b0a91SJoerg Roedel 	dst->intercept_dr         = from->intercept_dr;
148883b0a91SJoerg Roedel 	dst->intercept_exceptions = from->intercept_exceptions;
149883b0a91SJoerg Roedel 	dst->intercept            = from->intercept;
150883b0a91SJoerg Roedel 	dst->iopm_base_pa         = from->iopm_base_pa;
151883b0a91SJoerg Roedel 	dst->msrpm_base_pa        = from->msrpm_base_pa;
152883b0a91SJoerg Roedel 	dst->tsc_offset           = from->tsc_offset;
153*6c0238c4SPaolo Bonzini 	/* asid not copied, it is handled manually for svm->vmcb.  */
154883b0a91SJoerg Roedel 	dst->tlb_ctl              = from->tlb_ctl;
155883b0a91SJoerg Roedel 	dst->int_ctl              = from->int_ctl;
156883b0a91SJoerg Roedel 	dst->int_vector           = from->int_vector;
157883b0a91SJoerg Roedel 	dst->int_state            = from->int_state;
158883b0a91SJoerg Roedel 	dst->exit_code            = from->exit_code;
159883b0a91SJoerg Roedel 	dst->exit_code_hi         = from->exit_code_hi;
160883b0a91SJoerg Roedel 	dst->exit_info_1          = from->exit_info_1;
161883b0a91SJoerg Roedel 	dst->exit_info_2          = from->exit_info_2;
162883b0a91SJoerg Roedel 	dst->exit_int_info        = from->exit_int_info;
163883b0a91SJoerg Roedel 	dst->exit_int_info_err    = from->exit_int_info_err;
164883b0a91SJoerg Roedel 	dst->nested_ctl           = from->nested_ctl;
165883b0a91SJoerg Roedel 	dst->event_inj            = from->event_inj;
166883b0a91SJoerg Roedel 	dst->event_inj_err        = from->event_inj_err;
167883b0a91SJoerg Roedel 	dst->nested_cr3           = from->nested_cr3;
168883b0a91SJoerg Roedel 	dst->virt_ext              = from->virt_ext;
169883b0a91SJoerg Roedel 	dst->pause_filter_count   = from->pause_filter_count;
170883b0a91SJoerg Roedel 	dst->pause_filter_thresh  = from->pause_filter_thresh;
171883b0a91SJoerg Roedel }
172883b0a91SJoerg Roedel 
173883b0a91SJoerg Roedel static bool nested_svm_vmrun_msrpm(struct vcpu_svm *svm)
174883b0a91SJoerg Roedel {
175883b0a91SJoerg Roedel 	/*
176883b0a91SJoerg Roedel 	 * This function merges the msr permission bitmaps of kvm and the
177883b0a91SJoerg Roedel 	 * nested vmcb. It is optimized in that it only merges the parts where
178883b0a91SJoerg Roedel 	 * the kvm msr permission bitmap may contain zero bits
179883b0a91SJoerg Roedel 	 */
180883b0a91SJoerg Roedel 	int i;
181883b0a91SJoerg Roedel 
182883b0a91SJoerg Roedel 	if (!(svm->nested.intercept & (1ULL << INTERCEPT_MSR_PROT)))
183883b0a91SJoerg Roedel 		return true;
184883b0a91SJoerg Roedel 
185883b0a91SJoerg Roedel 	for (i = 0; i < MSRPM_OFFSETS; i++) {
186883b0a91SJoerg Roedel 		u32 value, p;
187883b0a91SJoerg Roedel 		u64 offset;
188883b0a91SJoerg Roedel 
189883b0a91SJoerg Roedel 		if (msrpm_offsets[i] == 0xffffffff)
190883b0a91SJoerg Roedel 			break;
191883b0a91SJoerg Roedel 
192883b0a91SJoerg Roedel 		p      = msrpm_offsets[i];
193883b0a91SJoerg Roedel 		offset = svm->nested.vmcb_msrpm + (p * 4);
194883b0a91SJoerg Roedel 
195883b0a91SJoerg Roedel 		if (kvm_vcpu_read_guest(&svm->vcpu, offset, &value, 4))
196883b0a91SJoerg Roedel 			return false;
197883b0a91SJoerg Roedel 
198883b0a91SJoerg Roedel 		svm->nested.msrpm[p] = svm->msrpm[p] | value;
199883b0a91SJoerg Roedel 	}
200883b0a91SJoerg Roedel 
201883b0a91SJoerg Roedel 	svm->vmcb->control.msrpm_base_pa = __sme_set(__pa(svm->nested.msrpm));
202883b0a91SJoerg Roedel 
203883b0a91SJoerg Roedel 	return true;
204883b0a91SJoerg Roedel }
205883b0a91SJoerg Roedel 
206883b0a91SJoerg Roedel static bool nested_vmcb_checks(struct vmcb *vmcb)
207883b0a91SJoerg Roedel {
208883b0a91SJoerg Roedel 	if ((vmcb->save.efer & EFER_SVME) == 0)
209883b0a91SJoerg Roedel 		return false;
210883b0a91SJoerg Roedel 
2114f233371SKrish Sadhukhan 	if (((vmcb->save.cr0 & X86_CR0_CD) == 0) &&
2124f233371SKrish Sadhukhan 	    (vmcb->save.cr0 & X86_CR0_NW))
2134f233371SKrish Sadhukhan 		return false;
2144f233371SKrish Sadhukhan 
215883b0a91SJoerg Roedel 	if ((vmcb->control.intercept & (1ULL << INTERCEPT_VMRUN)) == 0)
216883b0a91SJoerg Roedel 		return false;
217883b0a91SJoerg Roedel 
218883b0a91SJoerg Roedel 	if (vmcb->control.asid == 0)
219883b0a91SJoerg Roedel 		return false;
220883b0a91SJoerg Roedel 
221883b0a91SJoerg Roedel 	if ((vmcb->control.nested_ctl & SVM_NESTED_CTL_NP_ENABLE) &&
222883b0a91SJoerg Roedel 	    !npt_enabled)
223883b0a91SJoerg Roedel 		return false;
224883b0a91SJoerg Roedel 
225883b0a91SJoerg Roedel 	return true;
226883b0a91SJoerg Roedel }
227883b0a91SJoerg Roedel 
228883b0a91SJoerg Roedel void enter_svm_guest_mode(struct vcpu_svm *svm, u64 vmcb_gpa,
229883b0a91SJoerg Roedel 			  struct vmcb *nested_vmcb, struct kvm_host_map *map)
230883b0a91SJoerg Roedel {
231883b0a91SJoerg Roedel 	bool evaluate_pending_interrupts =
232883b0a91SJoerg Roedel 		is_intercept(svm, INTERCEPT_VINTR) ||
233883b0a91SJoerg Roedel 		is_intercept(svm, INTERCEPT_IRET);
234883b0a91SJoerg Roedel 
235883b0a91SJoerg Roedel 	if (kvm_get_rflags(&svm->vcpu) & X86_EFLAGS_IF)
236883b0a91SJoerg Roedel 		svm->vcpu.arch.hflags |= HF_HIF_MASK;
237883b0a91SJoerg Roedel 	else
238883b0a91SJoerg Roedel 		svm->vcpu.arch.hflags &= ~HF_HIF_MASK;
239883b0a91SJoerg Roedel 
240883b0a91SJoerg Roedel 	if (nested_vmcb->control.nested_ctl & SVM_NESTED_CTL_NP_ENABLE) {
241883b0a91SJoerg Roedel 		svm->nested.nested_cr3 = nested_vmcb->control.nested_cr3;
242883b0a91SJoerg Roedel 		nested_svm_init_mmu_context(&svm->vcpu);
243883b0a91SJoerg Roedel 	}
244883b0a91SJoerg Roedel 
245883b0a91SJoerg Roedel 	/* Load the nested guest state */
246883b0a91SJoerg Roedel 	svm->vmcb->save.es = nested_vmcb->save.es;
247883b0a91SJoerg Roedel 	svm->vmcb->save.cs = nested_vmcb->save.cs;
248883b0a91SJoerg Roedel 	svm->vmcb->save.ss = nested_vmcb->save.ss;
249883b0a91SJoerg Roedel 	svm->vmcb->save.ds = nested_vmcb->save.ds;
250883b0a91SJoerg Roedel 	svm->vmcb->save.gdtr = nested_vmcb->save.gdtr;
251883b0a91SJoerg Roedel 	svm->vmcb->save.idtr = nested_vmcb->save.idtr;
252883b0a91SJoerg Roedel 	kvm_set_rflags(&svm->vcpu, nested_vmcb->save.rflags);
253883b0a91SJoerg Roedel 	svm_set_efer(&svm->vcpu, nested_vmcb->save.efer);
254883b0a91SJoerg Roedel 	svm_set_cr0(&svm->vcpu, nested_vmcb->save.cr0);
255883b0a91SJoerg Roedel 	svm_set_cr4(&svm->vcpu, nested_vmcb->save.cr4);
256883b0a91SJoerg Roedel 	if (npt_enabled) {
257883b0a91SJoerg Roedel 		svm->vmcb->save.cr3 = nested_vmcb->save.cr3;
258883b0a91SJoerg Roedel 		svm->vcpu.arch.cr3 = nested_vmcb->save.cr3;
259883b0a91SJoerg Roedel 	} else
260883b0a91SJoerg Roedel 		(void)kvm_set_cr3(&svm->vcpu, nested_vmcb->save.cr3);
261883b0a91SJoerg Roedel 
262883b0a91SJoerg Roedel 	/* Guest paging mode is active - reset mmu */
263883b0a91SJoerg Roedel 	kvm_mmu_reset_context(&svm->vcpu);
264883b0a91SJoerg Roedel 
265883b0a91SJoerg Roedel 	svm->vmcb->save.cr2 = svm->vcpu.arch.cr2 = nested_vmcb->save.cr2;
266883b0a91SJoerg Roedel 	kvm_rax_write(&svm->vcpu, nested_vmcb->save.rax);
267883b0a91SJoerg Roedel 	kvm_rsp_write(&svm->vcpu, nested_vmcb->save.rsp);
268883b0a91SJoerg Roedel 	kvm_rip_write(&svm->vcpu, nested_vmcb->save.rip);
269883b0a91SJoerg Roedel 
270883b0a91SJoerg Roedel 	/* In case we don't even reach vcpu_run, the fields are not updated */
271883b0a91SJoerg Roedel 	svm->vmcb->save.rax = nested_vmcb->save.rax;
272883b0a91SJoerg Roedel 	svm->vmcb->save.rsp = nested_vmcb->save.rsp;
273883b0a91SJoerg Roedel 	svm->vmcb->save.rip = nested_vmcb->save.rip;
274883b0a91SJoerg Roedel 	svm->vmcb->save.dr7 = nested_vmcb->save.dr7;
2755679b803SPaolo Bonzini 	svm->vcpu.arch.dr6  = nested_vmcb->save.dr6;
276883b0a91SJoerg Roedel 	svm->vmcb->save.cpl = nested_vmcb->save.cpl;
277883b0a91SJoerg Roedel 
278883b0a91SJoerg Roedel 	svm->nested.vmcb_msrpm = nested_vmcb->control.msrpm_base_pa & ~0x0fffULL;
279883b0a91SJoerg Roedel 	svm->nested.vmcb_iopm  = nested_vmcb->control.iopm_base_pa  & ~0x0fffULL;
280883b0a91SJoerg Roedel 
281883b0a91SJoerg Roedel 	/* cache intercepts */
282883b0a91SJoerg Roedel 	svm->nested.intercept_cr         = nested_vmcb->control.intercept_cr;
283883b0a91SJoerg Roedel 	svm->nested.intercept_dr         = nested_vmcb->control.intercept_dr;
284883b0a91SJoerg Roedel 	svm->nested.intercept_exceptions = nested_vmcb->control.intercept_exceptions;
285883b0a91SJoerg Roedel 	svm->nested.intercept            = nested_vmcb->control.intercept;
286883b0a91SJoerg Roedel 
287f55ac304SSean Christopherson 	svm_flush_tlb(&svm->vcpu);
288883b0a91SJoerg Roedel 	svm->vmcb->control.int_ctl = nested_vmcb->control.int_ctl | V_INTR_MASKING_MASK;
289883b0a91SJoerg Roedel 	if (nested_vmcb->control.int_ctl & V_INTR_MASKING_MASK)
290883b0a91SJoerg Roedel 		svm->vcpu.arch.hflags |= HF_VINTR_MASK;
291883b0a91SJoerg Roedel 	else
292883b0a91SJoerg Roedel 		svm->vcpu.arch.hflags &= ~HF_VINTR_MASK;
293883b0a91SJoerg Roedel 
294883b0a91SJoerg Roedel 	svm->vcpu.arch.tsc_offset += nested_vmcb->control.tsc_offset;
295883b0a91SJoerg Roedel 	svm->vmcb->control.tsc_offset = svm->vcpu.arch.tsc_offset;
296883b0a91SJoerg Roedel 
297883b0a91SJoerg Roedel 	svm->vmcb->control.virt_ext = nested_vmcb->control.virt_ext;
298883b0a91SJoerg Roedel 	svm->vmcb->control.int_vector = nested_vmcb->control.int_vector;
299883b0a91SJoerg Roedel 	svm->vmcb->control.int_state = nested_vmcb->control.int_state;
300883b0a91SJoerg Roedel 	svm->vmcb->control.event_inj = nested_vmcb->control.event_inj;
301883b0a91SJoerg Roedel 	svm->vmcb->control.event_inj_err = nested_vmcb->control.event_inj_err;
302883b0a91SJoerg Roedel 
303883b0a91SJoerg Roedel 	svm->vmcb->control.pause_filter_count =
304883b0a91SJoerg Roedel 		nested_vmcb->control.pause_filter_count;
305883b0a91SJoerg Roedel 	svm->vmcb->control.pause_filter_thresh =
306883b0a91SJoerg Roedel 		nested_vmcb->control.pause_filter_thresh;
307883b0a91SJoerg Roedel 
308883b0a91SJoerg Roedel 	kvm_vcpu_unmap(&svm->vcpu, map, true);
309883b0a91SJoerg Roedel 
310883b0a91SJoerg Roedel 	/* Enter Guest-Mode */
311883b0a91SJoerg Roedel 	enter_guest_mode(&svm->vcpu);
312883b0a91SJoerg Roedel 
313883b0a91SJoerg Roedel 	/*
314883b0a91SJoerg Roedel 	 * Merge guest and host intercepts - must be called  with vcpu in
315883b0a91SJoerg Roedel 	 * guest-mode to take affect here
316883b0a91SJoerg Roedel 	 */
317883b0a91SJoerg Roedel 	recalc_intercepts(svm);
318883b0a91SJoerg Roedel 
319883b0a91SJoerg Roedel 	svm->nested.vmcb = vmcb_gpa;
320883b0a91SJoerg Roedel 
321883b0a91SJoerg Roedel 	/*
322883b0a91SJoerg Roedel 	 * If L1 had a pending IRQ/NMI before executing VMRUN,
323883b0a91SJoerg Roedel 	 * which wasn't delivered because it was disallowed (e.g.
324883b0a91SJoerg Roedel 	 * interrupts disabled), L0 needs to evaluate if this pending
325883b0a91SJoerg Roedel 	 * event should cause an exit from L2 to L1 or be delivered
326883b0a91SJoerg Roedel 	 * directly to L2.
327883b0a91SJoerg Roedel 	 *
328883b0a91SJoerg Roedel 	 * Usually this would be handled by the processor noticing an
329883b0a91SJoerg Roedel 	 * IRQ/NMI window request.  However, VMRUN can unblock interrupts
330883b0a91SJoerg Roedel 	 * by implicitly setting GIF, so force L0 to perform pending event
331883b0a91SJoerg Roedel 	 * evaluation by requesting a KVM_REQ_EVENT.
332883b0a91SJoerg Roedel 	 */
333883b0a91SJoerg Roedel 	enable_gif(svm);
334883b0a91SJoerg Roedel 	if (unlikely(evaluate_pending_interrupts))
335883b0a91SJoerg Roedel 		kvm_make_request(KVM_REQ_EVENT, &svm->vcpu);
336883b0a91SJoerg Roedel 
337883b0a91SJoerg Roedel 	mark_all_dirty(svm->vmcb);
338883b0a91SJoerg Roedel }
339883b0a91SJoerg Roedel 
340883b0a91SJoerg Roedel int nested_svm_vmrun(struct vcpu_svm *svm)
341883b0a91SJoerg Roedel {
342883b0a91SJoerg Roedel 	int ret;
343883b0a91SJoerg Roedel 	struct vmcb *nested_vmcb;
344883b0a91SJoerg Roedel 	struct vmcb *hsave = svm->nested.hsave;
345883b0a91SJoerg Roedel 	struct vmcb *vmcb = svm->vmcb;
346883b0a91SJoerg Roedel 	struct kvm_host_map map;
347883b0a91SJoerg Roedel 	u64 vmcb_gpa;
348883b0a91SJoerg Roedel 
3497c67f546SPaolo Bonzini 	if (is_smm(&svm->vcpu)) {
3507c67f546SPaolo Bonzini 		kvm_queue_exception(&svm->vcpu, UD_VECTOR);
3517c67f546SPaolo Bonzini 		return 1;
3527c67f546SPaolo Bonzini 	}
353883b0a91SJoerg Roedel 
3547c67f546SPaolo Bonzini 	vmcb_gpa = svm->vmcb->save.rax;
355883b0a91SJoerg Roedel 	ret = kvm_vcpu_map(&svm->vcpu, gpa_to_gfn(vmcb_gpa), &map);
356883b0a91SJoerg Roedel 	if (ret == -EINVAL) {
357883b0a91SJoerg Roedel 		kvm_inject_gp(&svm->vcpu, 0);
358883b0a91SJoerg Roedel 		return 1;
359883b0a91SJoerg Roedel 	} else if (ret) {
360883b0a91SJoerg Roedel 		return kvm_skip_emulated_instruction(&svm->vcpu);
361883b0a91SJoerg Roedel 	}
362883b0a91SJoerg Roedel 
363883b0a91SJoerg Roedel 	ret = kvm_skip_emulated_instruction(&svm->vcpu);
364883b0a91SJoerg Roedel 
365883b0a91SJoerg Roedel 	nested_vmcb = map.hva;
366883b0a91SJoerg Roedel 
367883b0a91SJoerg Roedel 	if (!nested_vmcb_checks(nested_vmcb)) {
368883b0a91SJoerg Roedel 		nested_vmcb->control.exit_code    = SVM_EXIT_ERR;
369883b0a91SJoerg Roedel 		nested_vmcb->control.exit_code_hi = 0;
370883b0a91SJoerg Roedel 		nested_vmcb->control.exit_info_1  = 0;
371883b0a91SJoerg Roedel 		nested_vmcb->control.exit_info_2  = 0;
372883b0a91SJoerg Roedel 
373883b0a91SJoerg Roedel 		kvm_vcpu_unmap(&svm->vcpu, &map, true);
374883b0a91SJoerg Roedel 
375883b0a91SJoerg Roedel 		return ret;
376883b0a91SJoerg Roedel 	}
377883b0a91SJoerg Roedel 
378883b0a91SJoerg Roedel 	trace_kvm_nested_vmrun(svm->vmcb->save.rip, vmcb_gpa,
379883b0a91SJoerg Roedel 			       nested_vmcb->save.rip,
380883b0a91SJoerg Roedel 			       nested_vmcb->control.int_ctl,
381883b0a91SJoerg Roedel 			       nested_vmcb->control.event_inj,
382883b0a91SJoerg Roedel 			       nested_vmcb->control.nested_ctl);
383883b0a91SJoerg Roedel 
384883b0a91SJoerg Roedel 	trace_kvm_nested_intercepts(nested_vmcb->control.intercept_cr & 0xffff,
385883b0a91SJoerg Roedel 				    nested_vmcb->control.intercept_cr >> 16,
386883b0a91SJoerg Roedel 				    nested_vmcb->control.intercept_exceptions,
387883b0a91SJoerg Roedel 				    nested_vmcb->control.intercept);
388883b0a91SJoerg Roedel 
389883b0a91SJoerg Roedel 	/* Clear internal status */
390883b0a91SJoerg Roedel 	kvm_clear_exception_queue(&svm->vcpu);
391883b0a91SJoerg Roedel 	kvm_clear_interrupt_queue(&svm->vcpu);
392883b0a91SJoerg Roedel 
393883b0a91SJoerg Roedel 	/*
394883b0a91SJoerg Roedel 	 * Save the old vmcb, so we don't need to pick what we save, but can
395883b0a91SJoerg Roedel 	 * restore everything when a VMEXIT occurs
396883b0a91SJoerg Roedel 	 */
397883b0a91SJoerg Roedel 	hsave->save.es     = vmcb->save.es;
398883b0a91SJoerg Roedel 	hsave->save.cs     = vmcb->save.cs;
399883b0a91SJoerg Roedel 	hsave->save.ss     = vmcb->save.ss;
400883b0a91SJoerg Roedel 	hsave->save.ds     = vmcb->save.ds;
401883b0a91SJoerg Roedel 	hsave->save.gdtr   = vmcb->save.gdtr;
402883b0a91SJoerg Roedel 	hsave->save.idtr   = vmcb->save.idtr;
403883b0a91SJoerg Roedel 	hsave->save.efer   = svm->vcpu.arch.efer;
404883b0a91SJoerg Roedel 	hsave->save.cr0    = kvm_read_cr0(&svm->vcpu);
405883b0a91SJoerg Roedel 	hsave->save.cr4    = svm->vcpu.arch.cr4;
406883b0a91SJoerg Roedel 	hsave->save.rflags = kvm_get_rflags(&svm->vcpu);
407883b0a91SJoerg Roedel 	hsave->save.rip    = kvm_rip_read(&svm->vcpu);
408883b0a91SJoerg Roedel 	hsave->save.rsp    = vmcb->save.rsp;
409883b0a91SJoerg Roedel 	hsave->save.rax    = vmcb->save.rax;
410883b0a91SJoerg Roedel 	if (npt_enabled)
411883b0a91SJoerg Roedel 		hsave->save.cr3    = vmcb->save.cr3;
412883b0a91SJoerg Roedel 	else
413883b0a91SJoerg Roedel 		hsave->save.cr3    = kvm_read_cr3(&svm->vcpu);
414883b0a91SJoerg Roedel 
415883b0a91SJoerg Roedel 	copy_vmcb_control_area(hsave, vmcb);
416883b0a91SJoerg Roedel 
417f74f9414SPaolo Bonzini 	svm->nested.nested_run_pending = 1;
418883b0a91SJoerg Roedel 	enter_svm_guest_mode(svm, vmcb_gpa, nested_vmcb, &map);
419883b0a91SJoerg Roedel 
420883b0a91SJoerg Roedel 	if (!nested_svm_vmrun_msrpm(svm)) {
421883b0a91SJoerg Roedel 		svm->vmcb->control.exit_code    = SVM_EXIT_ERR;
422883b0a91SJoerg Roedel 		svm->vmcb->control.exit_code_hi = 0;
423883b0a91SJoerg Roedel 		svm->vmcb->control.exit_info_1  = 0;
424883b0a91SJoerg Roedel 		svm->vmcb->control.exit_info_2  = 0;
425883b0a91SJoerg Roedel 
426883b0a91SJoerg Roedel 		nested_svm_vmexit(svm);
427883b0a91SJoerg Roedel 	}
428883b0a91SJoerg Roedel 
429883b0a91SJoerg Roedel 	return ret;
430883b0a91SJoerg Roedel }
431883b0a91SJoerg Roedel 
432883b0a91SJoerg Roedel void nested_svm_vmloadsave(struct vmcb *from_vmcb, struct vmcb *to_vmcb)
433883b0a91SJoerg Roedel {
434883b0a91SJoerg Roedel 	to_vmcb->save.fs = from_vmcb->save.fs;
435883b0a91SJoerg Roedel 	to_vmcb->save.gs = from_vmcb->save.gs;
436883b0a91SJoerg Roedel 	to_vmcb->save.tr = from_vmcb->save.tr;
437883b0a91SJoerg Roedel 	to_vmcb->save.ldtr = from_vmcb->save.ldtr;
438883b0a91SJoerg Roedel 	to_vmcb->save.kernel_gs_base = from_vmcb->save.kernel_gs_base;
439883b0a91SJoerg Roedel 	to_vmcb->save.star = from_vmcb->save.star;
440883b0a91SJoerg Roedel 	to_vmcb->save.lstar = from_vmcb->save.lstar;
441883b0a91SJoerg Roedel 	to_vmcb->save.cstar = from_vmcb->save.cstar;
442883b0a91SJoerg Roedel 	to_vmcb->save.sfmask = from_vmcb->save.sfmask;
443883b0a91SJoerg Roedel 	to_vmcb->save.sysenter_cs = from_vmcb->save.sysenter_cs;
444883b0a91SJoerg Roedel 	to_vmcb->save.sysenter_esp = from_vmcb->save.sysenter_esp;
445883b0a91SJoerg Roedel 	to_vmcb->save.sysenter_eip = from_vmcb->save.sysenter_eip;
446883b0a91SJoerg Roedel }
447883b0a91SJoerg Roedel 
448883b0a91SJoerg Roedel int nested_svm_vmexit(struct vcpu_svm *svm)
449883b0a91SJoerg Roedel {
450883b0a91SJoerg Roedel 	int rc;
451883b0a91SJoerg Roedel 	struct vmcb *nested_vmcb;
452883b0a91SJoerg Roedel 	struct vmcb *hsave = svm->nested.hsave;
453883b0a91SJoerg Roedel 	struct vmcb *vmcb = svm->vmcb;
454883b0a91SJoerg Roedel 	struct kvm_host_map map;
455883b0a91SJoerg Roedel 
456883b0a91SJoerg Roedel 	trace_kvm_nested_vmexit_inject(vmcb->control.exit_code,
457883b0a91SJoerg Roedel 				       vmcb->control.exit_info_1,
458883b0a91SJoerg Roedel 				       vmcb->control.exit_info_2,
459883b0a91SJoerg Roedel 				       vmcb->control.exit_int_info,
460883b0a91SJoerg Roedel 				       vmcb->control.exit_int_info_err,
461883b0a91SJoerg Roedel 				       KVM_ISA_SVM);
462883b0a91SJoerg Roedel 
463883b0a91SJoerg Roedel 	rc = kvm_vcpu_map(&svm->vcpu, gpa_to_gfn(svm->nested.vmcb), &map);
464883b0a91SJoerg Roedel 	if (rc) {
465883b0a91SJoerg Roedel 		if (rc == -EINVAL)
466883b0a91SJoerg Roedel 			kvm_inject_gp(&svm->vcpu, 0);
467883b0a91SJoerg Roedel 		return 1;
468883b0a91SJoerg Roedel 	}
469883b0a91SJoerg Roedel 
470883b0a91SJoerg Roedel 	nested_vmcb = map.hva;
471883b0a91SJoerg Roedel 
472883b0a91SJoerg Roedel 	/* Exit Guest-Mode */
473883b0a91SJoerg Roedel 	leave_guest_mode(&svm->vcpu);
474883b0a91SJoerg Roedel 	svm->nested.vmcb = 0;
475883b0a91SJoerg Roedel 
47638c0b192SPaolo Bonzini 	/* in case we halted in L2 */
47738c0b192SPaolo Bonzini 	svm->vcpu.arch.mp_state = KVM_MP_STATE_RUNNABLE;
47838c0b192SPaolo Bonzini 
479883b0a91SJoerg Roedel 	/* Give the current vmcb to the guest */
480883b0a91SJoerg Roedel 	disable_gif(svm);
481883b0a91SJoerg Roedel 
482883b0a91SJoerg Roedel 	nested_vmcb->save.es     = vmcb->save.es;
483883b0a91SJoerg Roedel 	nested_vmcb->save.cs     = vmcb->save.cs;
484883b0a91SJoerg Roedel 	nested_vmcb->save.ss     = vmcb->save.ss;
485883b0a91SJoerg Roedel 	nested_vmcb->save.ds     = vmcb->save.ds;
486883b0a91SJoerg Roedel 	nested_vmcb->save.gdtr   = vmcb->save.gdtr;
487883b0a91SJoerg Roedel 	nested_vmcb->save.idtr   = vmcb->save.idtr;
488883b0a91SJoerg Roedel 	nested_vmcb->save.efer   = svm->vcpu.arch.efer;
489883b0a91SJoerg Roedel 	nested_vmcb->save.cr0    = kvm_read_cr0(&svm->vcpu);
490883b0a91SJoerg Roedel 	nested_vmcb->save.cr3    = kvm_read_cr3(&svm->vcpu);
491883b0a91SJoerg Roedel 	nested_vmcb->save.cr2    = vmcb->save.cr2;
492883b0a91SJoerg Roedel 	nested_vmcb->save.cr4    = svm->vcpu.arch.cr4;
493883b0a91SJoerg Roedel 	nested_vmcb->save.rflags = kvm_get_rflags(&svm->vcpu);
494883b0a91SJoerg Roedel 	nested_vmcb->save.rip    = vmcb->save.rip;
495883b0a91SJoerg Roedel 	nested_vmcb->save.rsp    = vmcb->save.rsp;
496883b0a91SJoerg Roedel 	nested_vmcb->save.rax    = vmcb->save.rax;
497883b0a91SJoerg Roedel 	nested_vmcb->save.dr7    = vmcb->save.dr7;
4985679b803SPaolo Bonzini 	nested_vmcb->save.dr6    = svm->vcpu.arch.dr6;
499883b0a91SJoerg Roedel 	nested_vmcb->save.cpl    = vmcb->save.cpl;
500883b0a91SJoerg Roedel 
501883b0a91SJoerg Roedel 	nested_vmcb->control.int_ctl           = vmcb->control.int_ctl;
502883b0a91SJoerg Roedel 	nested_vmcb->control.int_vector        = vmcb->control.int_vector;
503883b0a91SJoerg Roedel 	nested_vmcb->control.int_state         = vmcb->control.int_state;
504883b0a91SJoerg Roedel 	nested_vmcb->control.exit_code         = vmcb->control.exit_code;
505883b0a91SJoerg Roedel 	nested_vmcb->control.exit_code_hi      = vmcb->control.exit_code_hi;
506883b0a91SJoerg Roedel 	nested_vmcb->control.exit_info_1       = vmcb->control.exit_info_1;
507883b0a91SJoerg Roedel 	nested_vmcb->control.exit_info_2       = vmcb->control.exit_info_2;
508883b0a91SJoerg Roedel 	nested_vmcb->control.exit_int_info     = vmcb->control.exit_int_info;
509883b0a91SJoerg Roedel 	nested_vmcb->control.exit_int_info_err = vmcb->control.exit_int_info_err;
510883b0a91SJoerg Roedel 
511883b0a91SJoerg Roedel 	if (svm->nrips_enabled)
512883b0a91SJoerg Roedel 		nested_vmcb->control.next_rip  = vmcb->control.next_rip;
513883b0a91SJoerg Roedel 
514883b0a91SJoerg Roedel 	/*
515883b0a91SJoerg Roedel 	 * If we emulate a VMRUN/#VMEXIT in the same host #vmexit cycle we have
516883b0a91SJoerg Roedel 	 * to make sure that we do not lose injected events. So check event_inj
517883b0a91SJoerg Roedel 	 * here and copy it to exit_int_info if it is valid.
518883b0a91SJoerg Roedel 	 * Exit_int_info and event_inj can't be both valid because the case
519883b0a91SJoerg Roedel 	 * below only happens on a VMRUN instruction intercept which has
520883b0a91SJoerg Roedel 	 * no valid exit_int_info set.
521883b0a91SJoerg Roedel 	 */
522883b0a91SJoerg Roedel 	if (vmcb->control.event_inj & SVM_EVTINJ_VALID) {
523883b0a91SJoerg Roedel 		struct vmcb_control_area *nc = &nested_vmcb->control;
524883b0a91SJoerg Roedel 
525883b0a91SJoerg Roedel 		nc->exit_int_info     = vmcb->control.event_inj;
526883b0a91SJoerg Roedel 		nc->exit_int_info_err = vmcb->control.event_inj_err;
527883b0a91SJoerg Roedel 	}
528883b0a91SJoerg Roedel 
529883b0a91SJoerg Roedel 	nested_vmcb->control.tlb_ctl           = 0;
530883b0a91SJoerg Roedel 	nested_vmcb->control.event_inj         = 0;
531883b0a91SJoerg Roedel 	nested_vmcb->control.event_inj_err     = 0;
532883b0a91SJoerg Roedel 
533883b0a91SJoerg Roedel 	nested_vmcb->control.pause_filter_count =
534883b0a91SJoerg Roedel 		svm->vmcb->control.pause_filter_count;
535883b0a91SJoerg Roedel 	nested_vmcb->control.pause_filter_thresh =
536883b0a91SJoerg Roedel 		svm->vmcb->control.pause_filter_thresh;
537883b0a91SJoerg Roedel 
538883b0a91SJoerg Roedel 	/* We always set V_INTR_MASKING and remember the old value in hflags */
539883b0a91SJoerg Roedel 	if (!(svm->vcpu.arch.hflags & HF_VINTR_MASK))
540883b0a91SJoerg Roedel 		nested_vmcb->control.int_ctl &= ~V_INTR_MASKING_MASK;
541883b0a91SJoerg Roedel 
542883b0a91SJoerg Roedel 	/* Restore the original control entries */
543883b0a91SJoerg Roedel 	copy_vmcb_control_area(vmcb, hsave);
544883b0a91SJoerg Roedel 
545883b0a91SJoerg Roedel 	svm->vcpu.arch.tsc_offset = svm->vmcb->control.tsc_offset;
546883b0a91SJoerg Roedel 	kvm_clear_exception_queue(&svm->vcpu);
547883b0a91SJoerg Roedel 	kvm_clear_interrupt_queue(&svm->vcpu);
548883b0a91SJoerg Roedel 
549883b0a91SJoerg Roedel 	svm->nested.nested_cr3 = 0;
550883b0a91SJoerg Roedel 
551883b0a91SJoerg Roedel 	/* Restore selected save entries */
552883b0a91SJoerg Roedel 	svm->vmcb->save.es = hsave->save.es;
553883b0a91SJoerg Roedel 	svm->vmcb->save.cs = hsave->save.cs;
554883b0a91SJoerg Roedel 	svm->vmcb->save.ss = hsave->save.ss;
555883b0a91SJoerg Roedel 	svm->vmcb->save.ds = hsave->save.ds;
556883b0a91SJoerg Roedel 	svm->vmcb->save.gdtr = hsave->save.gdtr;
557883b0a91SJoerg Roedel 	svm->vmcb->save.idtr = hsave->save.idtr;
558883b0a91SJoerg Roedel 	kvm_set_rflags(&svm->vcpu, hsave->save.rflags);
559883b0a91SJoerg Roedel 	svm_set_efer(&svm->vcpu, hsave->save.efer);
560883b0a91SJoerg Roedel 	svm_set_cr0(&svm->vcpu, hsave->save.cr0 | X86_CR0_PE);
561883b0a91SJoerg Roedel 	svm_set_cr4(&svm->vcpu, hsave->save.cr4);
562883b0a91SJoerg Roedel 	if (npt_enabled) {
563883b0a91SJoerg Roedel 		svm->vmcb->save.cr3 = hsave->save.cr3;
564883b0a91SJoerg Roedel 		svm->vcpu.arch.cr3 = hsave->save.cr3;
565883b0a91SJoerg Roedel 	} else {
566883b0a91SJoerg Roedel 		(void)kvm_set_cr3(&svm->vcpu, hsave->save.cr3);
567883b0a91SJoerg Roedel 	}
568883b0a91SJoerg Roedel 	kvm_rax_write(&svm->vcpu, hsave->save.rax);
569883b0a91SJoerg Roedel 	kvm_rsp_write(&svm->vcpu, hsave->save.rsp);
570883b0a91SJoerg Roedel 	kvm_rip_write(&svm->vcpu, hsave->save.rip);
571883b0a91SJoerg Roedel 	svm->vmcb->save.dr7 = 0;
572883b0a91SJoerg Roedel 	svm->vmcb->save.cpl = 0;
573883b0a91SJoerg Roedel 	svm->vmcb->control.exit_int_info = 0;
574883b0a91SJoerg Roedel 
575883b0a91SJoerg Roedel 	mark_all_dirty(svm->vmcb);
576883b0a91SJoerg Roedel 
577883b0a91SJoerg Roedel 	kvm_vcpu_unmap(&svm->vcpu, &map, true);
578883b0a91SJoerg Roedel 
579883b0a91SJoerg Roedel 	nested_svm_uninit_mmu_context(&svm->vcpu);
580883b0a91SJoerg Roedel 	kvm_mmu_reset_context(&svm->vcpu);
581883b0a91SJoerg Roedel 	kvm_mmu_load(&svm->vcpu);
582883b0a91SJoerg Roedel 
583883b0a91SJoerg Roedel 	/*
584883b0a91SJoerg Roedel 	 * Drop what we picked up for L2 via svm_complete_interrupts() so it
585883b0a91SJoerg Roedel 	 * doesn't end up in L1.
586883b0a91SJoerg Roedel 	 */
587883b0a91SJoerg Roedel 	svm->vcpu.arch.nmi_injected = false;
588883b0a91SJoerg Roedel 	kvm_clear_exception_queue(&svm->vcpu);
589883b0a91SJoerg Roedel 	kvm_clear_interrupt_queue(&svm->vcpu);
590883b0a91SJoerg Roedel 
591883b0a91SJoerg Roedel 	return 0;
592883b0a91SJoerg Roedel }
593883b0a91SJoerg Roedel 
594883b0a91SJoerg Roedel static int nested_svm_exit_handled_msr(struct vcpu_svm *svm)
595883b0a91SJoerg Roedel {
596883b0a91SJoerg Roedel 	u32 offset, msr, value;
597883b0a91SJoerg Roedel 	int write, mask;
598883b0a91SJoerg Roedel 
599883b0a91SJoerg Roedel 	if (!(svm->nested.intercept & (1ULL << INTERCEPT_MSR_PROT)))
600883b0a91SJoerg Roedel 		return NESTED_EXIT_HOST;
601883b0a91SJoerg Roedel 
602883b0a91SJoerg Roedel 	msr    = svm->vcpu.arch.regs[VCPU_REGS_RCX];
603883b0a91SJoerg Roedel 	offset = svm_msrpm_offset(msr);
604883b0a91SJoerg Roedel 	write  = svm->vmcb->control.exit_info_1 & 1;
605883b0a91SJoerg Roedel 	mask   = 1 << ((2 * (msr & 0xf)) + write);
606883b0a91SJoerg Roedel 
607883b0a91SJoerg Roedel 	if (offset == MSR_INVALID)
608883b0a91SJoerg Roedel 		return NESTED_EXIT_DONE;
609883b0a91SJoerg Roedel 
610883b0a91SJoerg Roedel 	/* Offset is in 32 bit units but need in 8 bit units */
611883b0a91SJoerg Roedel 	offset *= 4;
612883b0a91SJoerg Roedel 
613883b0a91SJoerg Roedel 	if (kvm_vcpu_read_guest(&svm->vcpu, svm->nested.vmcb_msrpm + offset, &value, 4))
614883b0a91SJoerg Roedel 		return NESTED_EXIT_DONE;
615883b0a91SJoerg Roedel 
616883b0a91SJoerg Roedel 	return (value & mask) ? NESTED_EXIT_DONE : NESTED_EXIT_HOST;
617883b0a91SJoerg Roedel }
618883b0a91SJoerg Roedel 
619883b0a91SJoerg Roedel /* DB exceptions for our internal use must not cause vmexit */
620883b0a91SJoerg Roedel static int nested_svm_intercept_db(struct vcpu_svm *svm)
621883b0a91SJoerg Roedel {
6225679b803SPaolo Bonzini 	unsigned long dr6 = svm->vmcb->save.dr6;
623883b0a91SJoerg Roedel 
6242c19dba6SPaolo Bonzini 	/* Always catch it and pass it to userspace if debugging.  */
6252c19dba6SPaolo Bonzini 	if (svm->vcpu.guest_debug &
6262c19dba6SPaolo Bonzini 	    (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP))
6272c19dba6SPaolo Bonzini 		return NESTED_EXIT_HOST;
628883b0a91SJoerg Roedel 
629883b0a91SJoerg Roedel 	/* if we're not singlestepping, it's not ours */
630883b0a91SJoerg Roedel 	if (!svm->nmi_singlestep)
6315679b803SPaolo Bonzini 		goto reflected_db;
632883b0a91SJoerg Roedel 
633883b0a91SJoerg Roedel 	/* if it's not a singlestep exception, it's not ours */
634883b0a91SJoerg Roedel 	if (!(dr6 & DR6_BS))
6355679b803SPaolo Bonzini 		goto reflected_db;
636883b0a91SJoerg Roedel 
637883b0a91SJoerg Roedel 	/* if the guest is singlestepping, it should get the vmexit */
638883b0a91SJoerg Roedel 	if (svm->nmi_singlestep_guest_rflags & X86_EFLAGS_TF) {
639883b0a91SJoerg Roedel 		disable_nmi_singlestep(svm);
6405679b803SPaolo Bonzini 		goto reflected_db;
641883b0a91SJoerg Roedel 	}
642883b0a91SJoerg Roedel 
643883b0a91SJoerg Roedel 	/* it's ours, the nested hypervisor must not see this one */
644883b0a91SJoerg Roedel 	return NESTED_EXIT_HOST;
6455679b803SPaolo Bonzini 
6465679b803SPaolo Bonzini reflected_db:
6475679b803SPaolo Bonzini 	/*
648d67668e9SPaolo Bonzini 	 * Synchronize guest DR6 here just like in kvm_deliver_exception_payload;
649d67668e9SPaolo Bonzini 	 * it will be moved into the nested VMCB by nested_svm_vmexit.  Once
650d67668e9SPaolo Bonzini 	 * exceptions will be moved to svm_check_nested_events, all this stuff
651d67668e9SPaolo Bonzini 	 * will just go away and we could just return NESTED_EXIT_HOST
652d67668e9SPaolo Bonzini 	 * unconditionally.  db_interception will queue the exception, which
653d67668e9SPaolo Bonzini 	 * will be processed by svm_check_nested_events if a nested vmexit is
654d67668e9SPaolo Bonzini 	 * required, and we will just use kvm_deliver_exception_payload to copy
655d67668e9SPaolo Bonzini 	 * the payload to DR6 before vmexit.
6565679b803SPaolo Bonzini 	 */
657d67668e9SPaolo Bonzini 	WARN_ON(svm->vcpu.arch.switch_db_regs & KVM_DEBUGREG_WONT_EXIT);
658d67668e9SPaolo Bonzini 	svm->vcpu.arch.dr6 &= ~(DR_TRAP_BITS | DR6_RTM);
659d67668e9SPaolo Bonzini 	svm->vcpu.arch.dr6 |= dr6 & ~DR6_FIXED_1;
6605679b803SPaolo Bonzini 	return NESTED_EXIT_DONE;
661883b0a91SJoerg Roedel }
662883b0a91SJoerg Roedel 
663883b0a91SJoerg Roedel static int nested_svm_intercept_ioio(struct vcpu_svm *svm)
664883b0a91SJoerg Roedel {
665883b0a91SJoerg Roedel 	unsigned port, size, iopm_len;
666883b0a91SJoerg Roedel 	u16 val, mask;
667883b0a91SJoerg Roedel 	u8 start_bit;
668883b0a91SJoerg Roedel 	u64 gpa;
669883b0a91SJoerg Roedel 
670883b0a91SJoerg Roedel 	if (!(svm->nested.intercept & (1ULL << INTERCEPT_IOIO_PROT)))
671883b0a91SJoerg Roedel 		return NESTED_EXIT_HOST;
672883b0a91SJoerg Roedel 
673883b0a91SJoerg Roedel 	port = svm->vmcb->control.exit_info_1 >> 16;
674883b0a91SJoerg Roedel 	size = (svm->vmcb->control.exit_info_1 & SVM_IOIO_SIZE_MASK) >>
675883b0a91SJoerg Roedel 		SVM_IOIO_SIZE_SHIFT;
676883b0a91SJoerg Roedel 	gpa  = svm->nested.vmcb_iopm + (port / 8);
677883b0a91SJoerg Roedel 	start_bit = port % 8;
678883b0a91SJoerg Roedel 	iopm_len = (start_bit + size > 8) ? 2 : 1;
679883b0a91SJoerg Roedel 	mask = (0xf >> (4 - size)) << start_bit;
680883b0a91SJoerg Roedel 	val = 0;
681883b0a91SJoerg Roedel 
682883b0a91SJoerg Roedel 	if (kvm_vcpu_read_guest(&svm->vcpu, gpa, &val, iopm_len))
683883b0a91SJoerg Roedel 		return NESTED_EXIT_DONE;
684883b0a91SJoerg Roedel 
685883b0a91SJoerg Roedel 	return (val & mask) ? NESTED_EXIT_DONE : NESTED_EXIT_HOST;
686883b0a91SJoerg Roedel }
687883b0a91SJoerg Roedel 
688883b0a91SJoerg Roedel static int nested_svm_intercept(struct vcpu_svm *svm)
689883b0a91SJoerg Roedel {
690883b0a91SJoerg Roedel 	u32 exit_code = svm->vmcb->control.exit_code;
691883b0a91SJoerg Roedel 	int vmexit = NESTED_EXIT_HOST;
692883b0a91SJoerg Roedel 
693883b0a91SJoerg Roedel 	switch (exit_code) {
694883b0a91SJoerg Roedel 	case SVM_EXIT_MSR:
695883b0a91SJoerg Roedel 		vmexit = nested_svm_exit_handled_msr(svm);
696883b0a91SJoerg Roedel 		break;
697883b0a91SJoerg Roedel 	case SVM_EXIT_IOIO:
698883b0a91SJoerg Roedel 		vmexit = nested_svm_intercept_ioio(svm);
699883b0a91SJoerg Roedel 		break;
700883b0a91SJoerg Roedel 	case SVM_EXIT_READ_CR0 ... SVM_EXIT_WRITE_CR8: {
701883b0a91SJoerg Roedel 		u32 bit = 1U << (exit_code - SVM_EXIT_READ_CR0);
702883b0a91SJoerg Roedel 		if (svm->nested.intercept_cr & bit)
703883b0a91SJoerg Roedel 			vmexit = NESTED_EXIT_DONE;
704883b0a91SJoerg Roedel 		break;
705883b0a91SJoerg Roedel 	}
706883b0a91SJoerg Roedel 	case SVM_EXIT_READ_DR0 ... SVM_EXIT_WRITE_DR7: {
707883b0a91SJoerg Roedel 		u32 bit = 1U << (exit_code - SVM_EXIT_READ_DR0);
708883b0a91SJoerg Roedel 		if (svm->nested.intercept_dr & bit)
709883b0a91SJoerg Roedel 			vmexit = NESTED_EXIT_DONE;
710883b0a91SJoerg Roedel 		break;
711883b0a91SJoerg Roedel 	}
712883b0a91SJoerg Roedel 	case SVM_EXIT_EXCP_BASE ... SVM_EXIT_EXCP_BASE + 0x1f: {
713883b0a91SJoerg Roedel 		u32 excp_bits = 1 << (exit_code - SVM_EXIT_EXCP_BASE);
714883b0a91SJoerg Roedel 		if (svm->nested.intercept_exceptions & excp_bits) {
715883b0a91SJoerg Roedel 			if (exit_code == SVM_EXIT_EXCP_BASE + DB_VECTOR)
716883b0a91SJoerg Roedel 				vmexit = nested_svm_intercept_db(svm);
7172c19dba6SPaolo Bonzini 			else if (exit_code == SVM_EXIT_EXCP_BASE + BP_VECTOR &&
7182c19dba6SPaolo Bonzini 				 svm->vcpu.guest_debug & KVM_GUESTDBG_USE_SW_BP)
7192c19dba6SPaolo Bonzini 				vmexit = NESTED_EXIT_HOST;
720883b0a91SJoerg Roedel 			else
721883b0a91SJoerg Roedel 				vmexit = NESTED_EXIT_DONE;
722883b0a91SJoerg Roedel 		}
723883b0a91SJoerg Roedel 		/* async page fault always cause vmexit */
724883b0a91SJoerg Roedel 		else if ((exit_code == SVM_EXIT_EXCP_BASE + PF_VECTOR) &&
725883b0a91SJoerg Roedel 			 svm->vcpu.arch.exception.nested_apf != 0)
726883b0a91SJoerg Roedel 			vmexit = NESTED_EXIT_DONE;
727883b0a91SJoerg Roedel 		break;
728883b0a91SJoerg Roedel 	}
729883b0a91SJoerg Roedel 	case SVM_EXIT_ERR: {
730883b0a91SJoerg Roedel 		vmexit = NESTED_EXIT_DONE;
731883b0a91SJoerg Roedel 		break;
732883b0a91SJoerg Roedel 	}
733883b0a91SJoerg Roedel 	default: {
734883b0a91SJoerg Roedel 		u64 exit_bits = 1ULL << (exit_code - SVM_EXIT_INTR);
735883b0a91SJoerg Roedel 		if (svm->nested.intercept & exit_bits)
736883b0a91SJoerg Roedel 			vmexit = NESTED_EXIT_DONE;
737883b0a91SJoerg Roedel 	}
738883b0a91SJoerg Roedel 	}
739883b0a91SJoerg Roedel 
740883b0a91SJoerg Roedel 	return vmexit;
741883b0a91SJoerg Roedel }
742883b0a91SJoerg Roedel 
743883b0a91SJoerg Roedel int nested_svm_exit_handled(struct vcpu_svm *svm)
744883b0a91SJoerg Roedel {
745883b0a91SJoerg Roedel 	int vmexit;
746883b0a91SJoerg Roedel 
747883b0a91SJoerg Roedel 	vmexit = nested_svm_intercept(svm);
748883b0a91SJoerg Roedel 
749883b0a91SJoerg Roedel 	if (vmexit == NESTED_EXIT_DONE)
750883b0a91SJoerg Roedel 		nested_svm_vmexit(svm);
751883b0a91SJoerg Roedel 
752883b0a91SJoerg Roedel 	return vmexit;
753883b0a91SJoerg Roedel }
754883b0a91SJoerg Roedel 
755883b0a91SJoerg Roedel int nested_svm_check_permissions(struct vcpu_svm *svm)
756883b0a91SJoerg Roedel {
757883b0a91SJoerg Roedel 	if (!(svm->vcpu.arch.efer & EFER_SVME) ||
758883b0a91SJoerg Roedel 	    !is_paging(&svm->vcpu)) {
759883b0a91SJoerg Roedel 		kvm_queue_exception(&svm->vcpu, UD_VECTOR);
760883b0a91SJoerg Roedel 		return 1;
761883b0a91SJoerg Roedel 	}
762883b0a91SJoerg Roedel 
763883b0a91SJoerg Roedel 	if (svm->vmcb->save.cpl) {
764883b0a91SJoerg Roedel 		kvm_inject_gp(&svm->vcpu, 0);
765883b0a91SJoerg Roedel 		return 1;
766883b0a91SJoerg Roedel 	}
767883b0a91SJoerg Roedel 
768883b0a91SJoerg Roedel 	return 0;
769883b0a91SJoerg Roedel }
770883b0a91SJoerg Roedel 
771883b0a91SJoerg Roedel int nested_svm_check_exception(struct vcpu_svm *svm, unsigned nr,
772883b0a91SJoerg Roedel 			       bool has_error_code, u32 error_code)
773883b0a91SJoerg Roedel {
774883b0a91SJoerg Roedel 	int vmexit;
775883b0a91SJoerg Roedel 
776883b0a91SJoerg Roedel 	if (!is_guest_mode(&svm->vcpu))
777883b0a91SJoerg Roedel 		return 0;
778883b0a91SJoerg Roedel 
779883b0a91SJoerg Roedel 	vmexit = nested_svm_intercept(svm);
780883b0a91SJoerg Roedel 	if (vmexit != NESTED_EXIT_DONE)
781883b0a91SJoerg Roedel 		return 0;
782883b0a91SJoerg Roedel 
783883b0a91SJoerg Roedel 	svm->vmcb->control.exit_code = SVM_EXIT_EXCP_BASE + nr;
784883b0a91SJoerg Roedel 	svm->vmcb->control.exit_code_hi = 0;
785883b0a91SJoerg Roedel 	svm->vmcb->control.exit_info_1 = error_code;
786883b0a91SJoerg Roedel 
787883b0a91SJoerg Roedel 	/*
788883b0a91SJoerg Roedel 	 * EXITINFO2 is undefined for all exception intercepts other
789883b0a91SJoerg Roedel 	 * than #PF.
790883b0a91SJoerg Roedel 	 */
791883b0a91SJoerg Roedel 	if (svm->vcpu.arch.exception.nested_apf)
792883b0a91SJoerg Roedel 		svm->vmcb->control.exit_info_2 = svm->vcpu.arch.apf.nested_apf_token;
793883b0a91SJoerg Roedel 	else if (svm->vcpu.arch.exception.has_payload)
794883b0a91SJoerg Roedel 		svm->vmcb->control.exit_info_2 = svm->vcpu.arch.exception.payload;
795883b0a91SJoerg Roedel 	else
796883b0a91SJoerg Roedel 		svm->vmcb->control.exit_info_2 = svm->vcpu.arch.cr2;
797883b0a91SJoerg Roedel 
798883b0a91SJoerg Roedel 	svm->nested.exit_required = true;
799883b0a91SJoerg Roedel 	return vmexit;
800883b0a91SJoerg Roedel }
801883b0a91SJoerg Roedel 
80255714cddSPaolo Bonzini static void nested_svm_smi(struct vcpu_svm *svm)
80355714cddSPaolo Bonzini {
80455714cddSPaolo Bonzini 	svm->vmcb->control.exit_code = SVM_EXIT_SMI;
80555714cddSPaolo Bonzini 	svm->vmcb->control.exit_info_1 = 0;
80655714cddSPaolo Bonzini 	svm->vmcb->control.exit_info_2 = 0;
80755714cddSPaolo Bonzini 
80855714cddSPaolo Bonzini 	nested_svm_vmexit(svm);
80955714cddSPaolo Bonzini }
81055714cddSPaolo Bonzini 
8119c3d370aSCathy Avery static void nested_svm_nmi(struct vcpu_svm *svm)
8129c3d370aSCathy Avery {
8139c3d370aSCathy Avery 	svm->vmcb->control.exit_code = SVM_EXIT_NMI;
8149c3d370aSCathy Avery 	svm->vmcb->control.exit_info_1 = 0;
8159c3d370aSCathy Avery 	svm->vmcb->control.exit_info_2 = 0;
8169c3d370aSCathy Avery 
8179c3d370aSCathy Avery 	nested_svm_vmexit(svm);
8189c3d370aSCathy Avery }
8199c3d370aSCathy Avery 
820883b0a91SJoerg Roedel static void nested_svm_intr(struct vcpu_svm *svm)
821883b0a91SJoerg Roedel {
8226e085cbfSPaolo Bonzini 	trace_kvm_nested_intr_vmexit(svm->vmcb->save.rip);
8236e085cbfSPaolo Bonzini 
824883b0a91SJoerg Roedel 	svm->vmcb->control.exit_code   = SVM_EXIT_INTR;
825883b0a91SJoerg Roedel 	svm->vmcb->control.exit_info_1 = 0;
826883b0a91SJoerg Roedel 	svm->vmcb->control.exit_info_2 = 0;
827883b0a91SJoerg Roedel 
8286e085cbfSPaolo Bonzini 	nested_svm_vmexit(svm);
829883b0a91SJoerg Roedel }
830883b0a91SJoerg Roedel 
83133b22172SPaolo Bonzini static int svm_check_nested_events(struct kvm_vcpu *vcpu)
832883b0a91SJoerg Roedel {
833883b0a91SJoerg Roedel 	struct vcpu_svm *svm = to_svm(vcpu);
834883b0a91SJoerg Roedel 	bool block_nested_events =
835f74f9414SPaolo Bonzini 		kvm_event_needs_reinjection(vcpu) || svm->nested.exit_required ||
836f74f9414SPaolo Bonzini 		svm->nested.nested_run_pending;
837883b0a91SJoerg Roedel 
838221e7610SPaolo Bonzini 	if (vcpu->arch.smi_pending && !svm_smi_blocked(vcpu)) {
83955714cddSPaolo Bonzini 		if (block_nested_events)
84055714cddSPaolo Bonzini 			return -EBUSY;
841221e7610SPaolo Bonzini 		if (!nested_exit_on_smi(svm))
842221e7610SPaolo Bonzini 			return 0;
84355714cddSPaolo Bonzini 		nested_svm_smi(svm);
84455714cddSPaolo Bonzini 		return 0;
84555714cddSPaolo Bonzini 	}
84655714cddSPaolo Bonzini 
847221e7610SPaolo Bonzini 	if (vcpu->arch.nmi_pending && !svm_nmi_blocked(vcpu)) {
8489c3d370aSCathy Avery 		if (block_nested_events)
8499c3d370aSCathy Avery 			return -EBUSY;
850221e7610SPaolo Bonzini 		if (!nested_exit_on_nmi(svm))
851221e7610SPaolo Bonzini 			return 0;
8529c3d370aSCathy Avery 		nested_svm_nmi(svm);
8539c3d370aSCathy Avery 		return 0;
8549c3d370aSCathy Avery 	}
8559c3d370aSCathy Avery 
856221e7610SPaolo Bonzini 	if (kvm_cpu_has_interrupt(vcpu) && !svm_interrupt_blocked(vcpu)) {
857883b0a91SJoerg Roedel 		if (block_nested_events)
858883b0a91SJoerg Roedel 			return -EBUSY;
859221e7610SPaolo Bonzini 		if (!nested_exit_on_intr(svm))
860221e7610SPaolo Bonzini 			return 0;
861883b0a91SJoerg Roedel 		nested_svm_intr(svm);
862883b0a91SJoerg Roedel 		return 0;
863883b0a91SJoerg Roedel 	}
864883b0a91SJoerg Roedel 
865883b0a91SJoerg Roedel 	return 0;
866883b0a91SJoerg Roedel }
867883b0a91SJoerg Roedel 
868883b0a91SJoerg Roedel int nested_svm_exit_special(struct vcpu_svm *svm)
869883b0a91SJoerg Roedel {
870883b0a91SJoerg Roedel 	u32 exit_code = svm->vmcb->control.exit_code;
871883b0a91SJoerg Roedel 
872883b0a91SJoerg Roedel 	switch (exit_code) {
873883b0a91SJoerg Roedel 	case SVM_EXIT_INTR:
874883b0a91SJoerg Roedel 	case SVM_EXIT_NMI:
875883b0a91SJoerg Roedel 	case SVM_EXIT_EXCP_BASE + MC_VECTOR:
876883b0a91SJoerg Roedel 		return NESTED_EXIT_HOST;
877883b0a91SJoerg Roedel 	case SVM_EXIT_NPF:
878883b0a91SJoerg Roedel 		/* For now we are always handling NPFs when using them */
879883b0a91SJoerg Roedel 		if (npt_enabled)
880883b0a91SJoerg Roedel 			return NESTED_EXIT_HOST;
881883b0a91SJoerg Roedel 		break;
882883b0a91SJoerg Roedel 	case SVM_EXIT_EXCP_BASE + PF_VECTOR:
883a3535be7SPaolo Bonzini 		/* Trap async PF even if not shadowing */
884a3535be7SPaolo Bonzini 		if (!npt_enabled || svm->vcpu.arch.apf.host_apf_reason)
885883b0a91SJoerg Roedel 			return NESTED_EXIT_HOST;
886883b0a91SJoerg Roedel 		break;
887883b0a91SJoerg Roedel 	default:
888883b0a91SJoerg Roedel 		break;
889883b0a91SJoerg Roedel 	}
890883b0a91SJoerg Roedel 
891883b0a91SJoerg Roedel 	return NESTED_EXIT_CONTINUE;
892883b0a91SJoerg Roedel }
89333b22172SPaolo Bonzini 
89433b22172SPaolo Bonzini struct kvm_x86_nested_ops svm_nested_ops = {
89533b22172SPaolo Bonzini 	.check_events = svm_check_nested_events,
89633b22172SPaolo Bonzini };
897