1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * vmx.h: VMX Architecture related definitions
4 * Copyright (c) 2004, Intel Corporation.
6 * A few random additions are:
7 * Copyright (C) 2006 Qumranet
8 * Avi Kivity <avi@qumranet.com>
9 * Yaniv Kamay <yaniv@qumranet.com>
15 #include <linux/bitops.h>
16 #include <linux/types.h>
17 #include <uapi/asm/vmx.h>
18 #include <asm/vmxfeatures.h>
20 #define VMCS_CONTROL_BIT(x) BIT(VMX_FEATURE_##x & 0x1f)
23 * Definitions of Primary Processor-Based VM-Execution Controls.
25 #define CPU_BASED_INTR_WINDOW_EXITING VMCS_CONTROL_BIT(INTR_WINDOW_EXITING)
26 #define CPU_BASED_USE_TSC_OFFSETTING VMCS_CONTROL_BIT(USE_TSC_OFFSETTING)
27 #define CPU_BASED_HLT_EXITING VMCS_CONTROL_BIT(HLT_EXITING)
28 #define CPU_BASED_INVLPG_EXITING VMCS_CONTROL_BIT(INVLPG_EXITING)
29 #define CPU_BASED_MWAIT_EXITING VMCS_CONTROL_BIT(MWAIT_EXITING)
30 #define CPU_BASED_RDPMC_EXITING VMCS_CONTROL_BIT(RDPMC_EXITING)
31 #define CPU_BASED_RDTSC_EXITING VMCS_CONTROL_BIT(RDTSC_EXITING)
32 #define CPU_BASED_CR3_LOAD_EXITING VMCS_CONTROL_BIT(CR3_LOAD_EXITING)
33 #define CPU_BASED_CR3_STORE_EXITING VMCS_CONTROL_BIT(CR3_STORE_EXITING)
34 #define CPU_BASED_CR8_LOAD_EXITING VMCS_CONTROL_BIT(CR8_LOAD_EXITING)
35 #define CPU_BASED_CR8_STORE_EXITING VMCS_CONTROL_BIT(CR8_STORE_EXITING)
36 #define CPU_BASED_TPR_SHADOW VMCS_CONTROL_BIT(VIRTUAL_TPR)
37 #define CPU_BASED_NMI_WINDOW_EXITING VMCS_CONTROL_BIT(NMI_WINDOW_EXITING)
38 #define CPU_BASED_MOV_DR_EXITING VMCS_CONTROL_BIT(MOV_DR_EXITING)
39 #define CPU_BASED_UNCOND_IO_EXITING VMCS_CONTROL_BIT(UNCOND_IO_EXITING)
40 #define CPU_BASED_USE_IO_BITMAPS VMCS_CONTROL_BIT(USE_IO_BITMAPS)
41 #define CPU_BASED_MONITOR_TRAP_FLAG VMCS_CONTROL_BIT(MONITOR_TRAP_FLAG)
42 #define CPU_BASED_USE_MSR_BITMAPS VMCS_CONTROL_BIT(USE_MSR_BITMAPS)
43 #define CPU_BASED_MONITOR_EXITING VMCS_CONTROL_BIT(MONITOR_EXITING)
44 #define CPU_BASED_PAUSE_EXITING VMCS_CONTROL_BIT(PAUSE_EXITING)
45 #define CPU_BASED_ACTIVATE_SECONDARY_CONTROLS VMCS_CONTROL_BIT(SEC_CONTROLS)
47 #define CPU_BASED_ALWAYSON_WITHOUT_TRUE_MSR 0x0401e172
50 * Definitions of Secondary Processor-Based VM-Execution Controls.
52 #define SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES VMCS_CONTROL_BIT(VIRT_APIC_ACCESSES)
53 #define SECONDARY_EXEC_ENABLE_EPT VMCS_CONTROL_BIT(EPT)
54 #define SECONDARY_EXEC_DESC VMCS_CONTROL_BIT(DESC_EXITING)
55 #define SECONDARY_EXEC_ENABLE_RDTSCP VMCS_CONTROL_BIT(RDTSCP)
56 #define SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE VMCS_CONTROL_BIT(VIRTUAL_X2APIC)
57 #define SECONDARY_EXEC_ENABLE_VPID VMCS_CONTROL_BIT(VPID)
58 #define SECONDARY_EXEC_WBINVD_EXITING VMCS_CONTROL_BIT(WBINVD_EXITING)
59 #define SECONDARY_EXEC_UNRESTRICTED_GUEST VMCS_CONTROL_BIT(UNRESTRICTED_GUEST)
60 #define SECONDARY_EXEC_APIC_REGISTER_VIRT VMCS_CONTROL_BIT(APIC_REGISTER_VIRT)
61 #define SECONDARY_EXEC_VIRTUAL_INTR_DELIVERY VMCS_CONTROL_BIT(VIRT_INTR_DELIVERY)
62 #define SECONDARY_EXEC_PAUSE_LOOP_EXITING VMCS_CONTROL_BIT(PAUSE_LOOP_EXITING)
63 #define SECONDARY_EXEC_RDRAND_EXITING VMCS_CONTROL_BIT(RDRAND_EXITING)
64 #define SECONDARY_EXEC_ENABLE_INVPCID VMCS_CONTROL_BIT(INVPCID)
65 #define SECONDARY_EXEC_ENABLE_VMFUNC VMCS_CONTROL_BIT(VMFUNC)
66 #define SECONDARY_EXEC_SHADOW_VMCS VMCS_CONTROL_BIT(SHADOW_VMCS)
67 #define SECONDARY_EXEC_ENCLS_EXITING VMCS_CONTROL_BIT(ENCLS_EXITING)
68 #define SECONDARY_EXEC_RDSEED_EXITING VMCS_CONTROL_BIT(RDSEED_EXITING)
69 #define SECONDARY_EXEC_ENABLE_PML VMCS_CONTROL_BIT(PAGE_MOD_LOGGING)
70 #define SECONDARY_EXEC_PT_CONCEAL_VMX VMCS_CONTROL_BIT(PT_CONCEAL_VMX)
71 #define SECONDARY_EXEC_XSAVES VMCS_CONTROL_BIT(XSAVES)
72 #define SECONDARY_EXEC_MODE_BASED_EPT_EXEC VMCS_CONTROL_BIT(MODE_BASED_EPT_EXEC)
73 #define SECONDARY_EXEC_PT_USE_GPA VMCS_CONTROL_BIT(PT_USE_GPA)
74 #define SECONDARY_EXEC_TSC_SCALING VMCS_CONTROL_BIT(TSC_SCALING)
75 #define SECONDARY_EXEC_ENABLE_USR_WAIT_PAUSE VMCS_CONTROL_BIT(USR_WAIT_PAUSE)
77 #define PIN_BASED_EXT_INTR_MASK VMCS_CONTROL_BIT(INTR_EXITING)
78 #define PIN_BASED_NMI_EXITING VMCS_CONTROL_BIT(NMI_EXITING)
79 #define PIN_BASED_VIRTUAL_NMIS VMCS_CONTROL_BIT(VIRTUAL_NMIS)
80 #define PIN_BASED_VMX_PREEMPTION_TIMER VMCS_CONTROL_BIT(PREEMPTION_TIMER)
81 #define PIN_BASED_POSTED_INTR VMCS_CONTROL_BIT(POSTED_INTR)
83 #define PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR 0x00000016
85 #define VM_EXIT_SAVE_DEBUG_CONTROLS 0x00000004
86 #define VM_EXIT_HOST_ADDR_SPACE_SIZE 0x00000200
87 #define VM_EXIT_LOAD_IA32_PERF_GLOBAL_CTRL 0x00001000
88 #define VM_EXIT_ACK_INTR_ON_EXIT 0x00008000
89 #define VM_EXIT_SAVE_IA32_PAT 0x00040000
90 #define VM_EXIT_LOAD_IA32_PAT 0x00080000
91 #define VM_EXIT_SAVE_IA32_EFER 0x00100000
92 #define VM_EXIT_LOAD_IA32_EFER 0x00200000
93 #define VM_EXIT_SAVE_VMX_PREEMPTION_TIMER 0x00400000
94 #define VM_EXIT_CLEAR_BNDCFGS 0x00800000
95 #define VM_EXIT_PT_CONCEAL_PIP 0x01000000
96 #define VM_EXIT_CLEAR_IA32_RTIT_CTL 0x02000000
98 #define VM_EXIT_ALWAYSON_WITHOUT_TRUE_MSR 0x00036dff
100 #define VM_ENTRY_LOAD_DEBUG_CONTROLS 0x00000004
101 #define VM_ENTRY_IA32E_MODE 0x00000200
102 #define VM_ENTRY_SMM 0x00000400
103 #define VM_ENTRY_DEACT_DUAL_MONITOR 0x00000800
104 #define VM_ENTRY_LOAD_IA32_PERF_GLOBAL_CTRL 0x00002000
105 #define VM_ENTRY_LOAD_IA32_PAT 0x00004000
106 #define VM_ENTRY_LOAD_IA32_EFER 0x00008000
107 #define VM_ENTRY_LOAD_BNDCFGS 0x00010000
108 #define VM_ENTRY_PT_CONCEAL_PIP 0x00020000
109 #define VM_ENTRY_LOAD_IA32_RTIT_CTL 0x00040000
111 #define VM_ENTRY_ALWAYSON_WITHOUT_TRUE_MSR 0x000011ff
113 #define VMX_MISC_PREEMPTION_TIMER_RATE_MASK 0x0000001f
114 #define VMX_MISC_SAVE_EFER_LMA 0x00000020
115 #define VMX_MISC_ACTIVITY_HLT 0x00000040
116 #define VMX_MISC_ACTIVITY_WAIT_SIPI 0x00000100
117 #define VMX_MISC_ZERO_LEN_INS 0x40000000
118 #define VMX_MISC_MSR_LIST_MULTIPLIER 512
120 /* VMFUNC functions */
121 #define VMFUNC_CONTROL_BIT(x) BIT((VMX_FEATURE_##x & 0x1f) - 28)
123 #define VMX_VMFUNC_EPTP_SWITCHING VMFUNC_CONTROL_BIT(EPTP_SWITCHING)
124 #define VMFUNC_EPTP_ENTRIES 512
126 static inline u32
vmx_basic_vmcs_revision_id(u64 vmx_basic
)
128 return vmx_basic
& GENMASK_ULL(30, 0);
131 static inline u32
vmx_basic_vmcs_size(u64 vmx_basic
)
133 return (vmx_basic
& GENMASK_ULL(44, 32)) >> 32;
136 static inline int vmx_misc_preemption_timer_rate(u64 vmx_misc
)
138 return vmx_misc
& VMX_MISC_PREEMPTION_TIMER_RATE_MASK
;
141 static inline int vmx_misc_cr3_count(u64 vmx_misc
)
143 return (vmx_misc
& GENMASK_ULL(24, 16)) >> 16;
146 static inline int vmx_misc_max_msr(u64 vmx_misc
)
148 return (vmx_misc
& GENMASK_ULL(27, 25)) >> 25;
151 static inline int vmx_misc_mseg_revid(u64 vmx_misc
)
153 return (vmx_misc
& GENMASK_ULL(63, 32)) >> 32;
158 VIRTUAL_PROCESSOR_ID
= 0x00000000,
159 POSTED_INTR_NV
= 0x00000002,
160 GUEST_ES_SELECTOR
= 0x00000800,
161 GUEST_CS_SELECTOR
= 0x00000802,
162 GUEST_SS_SELECTOR
= 0x00000804,
163 GUEST_DS_SELECTOR
= 0x00000806,
164 GUEST_FS_SELECTOR
= 0x00000808,
165 GUEST_GS_SELECTOR
= 0x0000080a,
166 GUEST_LDTR_SELECTOR
= 0x0000080c,
167 GUEST_TR_SELECTOR
= 0x0000080e,
168 GUEST_INTR_STATUS
= 0x00000810,
169 GUEST_PML_INDEX
= 0x00000812,
170 HOST_ES_SELECTOR
= 0x00000c00,
171 HOST_CS_SELECTOR
= 0x00000c02,
172 HOST_SS_SELECTOR
= 0x00000c04,
173 HOST_DS_SELECTOR
= 0x00000c06,
174 HOST_FS_SELECTOR
= 0x00000c08,
175 HOST_GS_SELECTOR
= 0x00000c0a,
176 HOST_TR_SELECTOR
= 0x00000c0c,
177 IO_BITMAP_A
= 0x00002000,
178 IO_BITMAP_A_HIGH
= 0x00002001,
179 IO_BITMAP_B
= 0x00002002,
180 IO_BITMAP_B_HIGH
= 0x00002003,
181 MSR_BITMAP
= 0x00002004,
182 MSR_BITMAP_HIGH
= 0x00002005,
183 VM_EXIT_MSR_STORE_ADDR
= 0x00002006,
184 VM_EXIT_MSR_STORE_ADDR_HIGH
= 0x00002007,
185 VM_EXIT_MSR_LOAD_ADDR
= 0x00002008,
186 VM_EXIT_MSR_LOAD_ADDR_HIGH
= 0x00002009,
187 VM_ENTRY_MSR_LOAD_ADDR
= 0x0000200a,
188 VM_ENTRY_MSR_LOAD_ADDR_HIGH
= 0x0000200b,
189 PML_ADDRESS
= 0x0000200e,
190 PML_ADDRESS_HIGH
= 0x0000200f,
191 TSC_OFFSET
= 0x00002010,
192 TSC_OFFSET_HIGH
= 0x00002011,
193 VIRTUAL_APIC_PAGE_ADDR
= 0x00002012,
194 VIRTUAL_APIC_PAGE_ADDR_HIGH
= 0x00002013,
195 APIC_ACCESS_ADDR
= 0x00002014,
196 APIC_ACCESS_ADDR_HIGH
= 0x00002015,
197 POSTED_INTR_DESC_ADDR
= 0x00002016,
198 POSTED_INTR_DESC_ADDR_HIGH
= 0x00002017,
199 VM_FUNCTION_CONTROL
= 0x00002018,
200 VM_FUNCTION_CONTROL_HIGH
= 0x00002019,
201 EPT_POINTER
= 0x0000201a,
202 EPT_POINTER_HIGH
= 0x0000201b,
203 EOI_EXIT_BITMAP0
= 0x0000201c,
204 EOI_EXIT_BITMAP0_HIGH
= 0x0000201d,
205 EOI_EXIT_BITMAP1
= 0x0000201e,
206 EOI_EXIT_BITMAP1_HIGH
= 0x0000201f,
207 EOI_EXIT_BITMAP2
= 0x00002020,
208 EOI_EXIT_BITMAP2_HIGH
= 0x00002021,
209 EOI_EXIT_BITMAP3
= 0x00002022,
210 EOI_EXIT_BITMAP3_HIGH
= 0x00002023,
211 EPTP_LIST_ADDRESS
= 0x00002024,
212 EPTP_LIST_ADDRESS_HIGH
= 0x00002025,
213 VMREAD_BITMAP
= 0x00002026,
214 VMREAD_BITMAP_HIGH
= 0x00002027,
215 VMWRITE_BITMAP
= 0x00002028,
216 VMWRITE_BITMAP_HIGH
= 0x00002029,
217 XSS_EXIT_BITMAP
= 0x0000202C,
218 XSS_EXIT_BITMAP_HIGH
= 0x0000202D,
219 ENCLS_EXITING_BITMAP
= 0x0000202E,
220 ENCLS_EXITING_BITMAP_HIGH
= 0x0000202F,
221 TSC_MULTIPLIER
= 0x00002032,
222 TSC_MULTIPLIER_HIGH
= 0x00002033,
223 GUEST_PHYSICAL_ADDRESS
= 0x00002400,
224 GUEST_PHYSICAL_ADDRESS_HIGH
= 0x00002401,
225 VMCS_LINK_POINTER
= 0x00002800,
226 VMCS_LINK_POINTER_HIGH
= 0x00002801,
227 GUEST_IA32_DEBUGCTL
= 0x00002802,
228 GUEST_IA32_DEBUGCTL_HIGH
= 0x00002803,
229 GUEST_IA32_PAT
= 0x00002804,
230 GUEST_IA32_PAT_HIGH
= 0x00002805,
231 GUEST_IA32_EFER
= 0x00002806,
232 GUEST_IA32_EFER_HIGH
= 0x00002807,
233 GUEST_IA32_PERF_GLOBAL_CTRL
= 0x00002808,
234 GUEST_IA32_PERF_GLOBAL_CTRL_HIGH
= 0x00002809,
235 GUEST_PDPTR0
= 0x0000280a,
236 GUEST_PDPTR0_HIGH
= 0x0000280b,
237 GUEST_PDPTR1
= 0x0000280c,
238 GUEST_PDPTR1_HIGH
= 0x0000280d,
239 GUEST_PDPTR2
= 0x0000280e,
240 GUEST_PDPTR2_HIGH
= 0x0000280f,
241 GUEST_PDPTR3
= 0x00002810,
242 GUEST_PDPTR3_HIGH
= 0x00002811,
243 GUEST_BNDCFGS
= 0x00002812,
244 GUEST_BNDCFGS_HIGH
= 0x00002813,
245 GUEST_IA32_RTIT_CTL
= 0x00002814,
246 GUEST_IA32_RTIT_CTL_HIGH
= 0x00002815,
247 HOST_IA32_PAT
= 0x00002c00,
248 HOST_IA32_PAT_HIGH
= 0x00002c01,
249 HOST_IA32_EFER
= 0x00002c02,
250 HOST_IA32_EFER_HIGH
= 0x00002c03,
251 HOST_IA32_PERF_GLOBAL_CTRL
= 0x00002c04,
252 HOST_IA32_PERF_GLOBAL_CTRL_HIGH
= 0x00002c05,
253 PIN_BASED_VM_EXEC_CONTROL
= 0x00004000,
254 CPU_BASED_VM_EXEC_CONTROL
= 0x00004002,
255 EXCEPTION_BITMAP
= 0x00004004,
256 PAGE_FAULT_ERROR_CODE_MASK
= 0x00004006,
257 PAGE_FAULT_ERROR_CODE_MATCH
= 0x00004008,
258 CR3_TARGET_COUNT
= 0x0000400a,
259 VM_EXIT_CONTROLS
= 0x0000400c,
260 VM_EXIT_MSR_STORE_COUNT
= 0x0000400e,
261 VM_EXIT_MSR_LOAD_COUNT
= 0x00004010,
262 VM_ENTRY_CONTROLS
= 0x00004012,
263 VM_ENTRY_MSR_LOAD_COUNT
= 0x00004014,
264 VM_ENTRY_INTR_INFO_FIELD
= 0x00004016,
265 VM_ENTRY_EXCEPTION_ERROR_CODE
= 0x00004018,
266 VM_ENTRY_INSTRUCTION_LEN
= 0x0000401a,
267 TPR_THRESHOLD
= 0x0000401c,
268 SECONDARY_VM_EXEC_CONTROL
= 0x0000401e,
269 PLE_GAP
= 0x00004020,
270 PLE_WINDOW
= 0x00004022,
271 VM_INSTRUCTION_ERROR
= 0x00004400,
272 VM_EXIT_REASON
= 0x00004402,
273 VM_EXIT_INTR_INFO
= 0x00004404,
274 VM_EXIT_INTR_ERROR_CODE
= 0x00004406,
275 IDT_VECTORING_INFO_FIELD
= 0x00004408,
276 IDT_VECTORING_ERROR_CODE
= 0x0000440a,
277 VM_EXIT_INSTRUCTION_LEN
= 0x0000440c,
278 VMX_INSTRUCTION_INFO
= 0x0000440e,
279 GUEST_ES_LIMIT
= 0x00004800,
280 GUEST_CS_LIMIT
= 0x00004802,
281 GUEST_SS_LIMIT
= 0x00004804,
282 GUEST_DS_LIMIT
= 0x00004806,
283 GUEST_FS_LIMIT
= 0x00004808,
284 GUEST_GS_LIMIT
= 0x0000480a,
285 GUEST_LDTR_LIMIT
= 0x0000480c,
286 GUEST_TR_LIMIT
= 0x0000480e,
287 GUEST_GDTR_LIMIT
= 0x00004810,
288 GUEST_IDTR_LIMIT
= 0x00004812,
289 GUEST_ES_AR_BYTES
= 0x00004814,
290 GUEST_CS_AR_BYTES
= 0x00004816,
291 GUEST_SS_AR_BYTES
= 0x00004818,
292 GUEST_DS_AR_BYTES
= 0x0000481a,
293 GUEST_FS_AR_BYTES
= 0x0000481c,
294 GUEST_GS_AR_BYTES
= 0x0000481e,
295 GUEST_LDTR_AR_BYTES
= 0x00004820,
296 GUEST_TR_AR_BYTES
= 0x00004822,
297 GUEST_INTERRUPTIBILITY_INFO
= 0x00004824,
298 GUEST_ACTIVITY_STATE
= 0X00004826,
299 GUEST_SYSENTER_CS
= 0x0000482A,
300 VMX_PREEMPTION_TIMER_VALUE
= 0x0000482E,
301 HOST_IA32_SYSENTER_CS
= 0x00004c00,
302 CR0_GUEST_HOST_MASK
= 0x00006000,
303 CR4_GUEST_HOST_MASK
= 0x00006002,
304 CR0_READ_SHADOW
= 0x00006004,
305 CR4_READ_SHADOW
= 0x00006006,
306 CR3_TARGET_VALUE0
= 0x00006008,
307 CR3_TARGET_VALUE1
= 0x0000600a,
308 CR3_TARGET_VALUE2
= 0x0000600c,
309 CR3_TARGET_VALUE3
= 0x0000600e,
310 EXIT_QUALIFICATION
= 0x00006400,
311 GUEST_LINEAR_ADDRESS
= 0x0000640a,
312 GUEST_CR0
= 0x00006800,
313 GUEST_CR3
= 0x00006802,
314 GUEST_CR4
= 0x00006804,
315 GUEST_ES_BASE
= 0x00006806,
316 GUEST_CS_BASE
= 0x00006808,
317 GUEST_SS_BASE
= 0x0000680a,
318 GUEST_DS_BASE
= 0x0000680c,
319 GUEST_FS_BASE
= 0x0000680e,
320 GUEST_GS_BASE
= 0x00006810,
321 GUEST_LDTR_BASE
= 0x00006812,
322 GUEST_TR_BASE
= 0x00006814,
323 GUEST_GDTR_BASE
= 0x00006816,
324 GUEST_IDTR_BASE
= 0x00006818,
325 GUEST_DR7
= 0x0000681a,
326 GUEST_RSP
= 0x0000681c,
327 GUEST_RIP
= 0x0000681e,
328 GUEST_RFLAGS
= 0x00006820,
329 GUEST_PENDING_DBG_EXCEPTIONS
= 0x00006822,
330 GUEST_SYSENTER_ESP
= 0x00006824,
331 GUEST_SYSENTER_EIP
= 0x00006826,
332 HOST_CR0
= 0x00006c00,
333 HOST_CR3
= 0x00006c02,
334 HOST_CR4
= 0x00006c04,
335 HOST_FS_BASE
= 0x00006c06,
336 HOST_GS_BASE
= 0x00006c08,
337 HOST_TR_BASE
= 0x00006c0a,
338 HOST_GDTR_BASE
= 0x00006c0c,
339 HOST_IDTR_BASE
= 0x00006c0e,
340 HOST_IA32_SYSENTER_ESP
= 0x00006c10,
341 HOST_IA32_SYSENTER_EIP
= 0x00006c12,
342 HOST_RSP
= 0x00006c14,
343 HOST_RIP
= 0x00006c16,
347 * Interruption-information format
349 #define INTR_INFO_VECTOR_MASK 0xff /* 7:0 */
350 #define INTR_INFO_INTR_TYPE_MASK 0x700 /* 10:8 */
351 #define INTR_INFO_DELIVER_CODE_MASK 0x800 /* 11 */
352 #define INTR_INFO_UNBLOCK_NMI 0x1000 /* 12 */
353 #define INTR_INFO_VALID_MASK 0x80000000 /* 31 */
354 #define INTR_INFO_RESVD_BITS_MASK 0x7ffff000
356 #define VECTORING_INFO_VECTOR_MASK INTR_INFO_VECTOR_MASK
357 #define VECTORING_INFO_TYPE_MASK INTR_INFO_INTR_TYPE_MASK
358 #define VECTORING_INFO_DELIVER_CODE_MASK INTR_INFO_DELIVER_CODE_MASK
359 #define VECTORING_INFO_VALID_MASK INTR_INFO_VALID_MASK
361 #define INTR_TYPE_EXT_INTR (0 << 8) /* external interrupt */
362 #define INTR_TYPE_RESERVED (1 << 8) /* reserved */
363 #define INTR_TYPE_NMI_INTR (2 << 8) /* NMI */
364 #define INTR_TYPE_HARD_EXCEPTION (3 << 8) /* processor exception */
365 #define INTR_TYPE_SOFT_INTR (4 << 8) /* software interrupt */
366 #define INTR_TYPE_PRIV_SW_EXCEPTION (5 << 8) /* ICE breakpoint - undocumented */
367 #define INTR_TYPE_SOFT_EXCEPTION (6 << 8) /* software exception */
368 #define INTR_TYPE_OTHER_EVENT (7 << 8) /* other event */
370 /* GUEST_INTERRUPTIBILITY_INFO flags. */
371 #define GUEST_INTR_STATE_STI 0x00000001
372 #define GUEST_INTR_STATE_MOV_SS 0x00000002
373 #define GUEST_INTR_STATE_SMI 0x00000004
374 #define GUEST_INTR_STATE_NMI 0x00000008
376 /* GUEST_ACTIVITY_STATE flags */
377 #define GUEST_ACTIVITY_ACTIVE 0
378 #define GUEST_ACTIVITY_HLT 1
379 #define GUEST_ACTIVITY_SHUTDOWN 2
380 #define GUEST_ACTIVITY_WAIT_SIPI 3
383 * Exit Qualifications for MOV for Control Register Access
385 #define CONTROL_REG_ACCESS_NUM 0x7 /* 2:0, number of control reg.*/
386 #define CONTROL_REG_ACCESS_TYPE 0x30 /* 5:4, access type */
387 #define CONTROL_REG_ACCESS_REG 0xf00 /* 10:8, general purpose reg. */
388 #define LMSW_SOURCE_DATA_SHIFT 16
389 #define LMSW_SOURCE_DATA (0xFFFF << LMSW_SOURCE_DATA_SHIFT) /* 16:31 lmsw source */
390 #define REG_EAX (0 << 8)
391 #define REG_ECX (1 << 8)
392 #define REG_EDX (2 << 8)
393 #define REG_EBX (3 << 8)
394 #define REG_ESP (4 << 8)
395 #define REG_EBP (5 << 8)
396 #define REG_ESI (6 << 8)
397 #define REG_EDI (7 << 8)
398 #define REG_R8 (8 << 8)
399 #define REG_R9 (9 << 8)
400 #define REG_R10 (10 << 8)
401 #define REG_R11 (11 << 8)
402 #define REG_R12 (12 << 8)
403 #define REG_R13 (13 << 8)
404 #define REG_R14 (14 << 8)
405 #define REG_R15 (15 << 8)
408 * Exit Qualifications for MOV for Debug Register Access
410 #define DEBUG_REG_ACCESS_NUM 0x7 /* 2:0, number of debug reg. */
411 #define DEBUG_REG_ACCESS_TYPE 0x10 /* 4, direction of access */
412 #define TYPE_MOV_TO_DR (0 << 4)
413 #define TYPE_MOV_FROM_DR (1 << 4)
414 #define DEBUG_REG_ACCESS_REG(eq) (((eq) >> 8) & 0xf) /* 11:8, general purpose reg. */
418 * Exit Qualifications for APIC-Access
420 #define APIC_ACCESS_OFFSET 0xfff /* 11:0, offset within the APIC page */
421 #define APIC_ACCESS_TYPE 0xf000 /* 15:12, access type */
422 #define TYPE_LINEAR_APIC_INST_READ (0 << 12)
423 #define TYPE_LINEAR_APIC_INST_WRITE (1 << 12)
424 #define TYPE_LINEAR_APIC_INST_FETCH (2 << 12)
425 #define TYPE_LINEAR_APIC_EVENT (3 << 12)
426 #define TYPE_PHYSICAL_APIC_EVENT (10 << 12)
427 #define TYPE_PHYSICAL_APIC_INST (15 << 12)
429 /* segment AR in VMCS -- these are different from what LAR reports */
430 #define VMX_SEGMENT_AR_L_MASK (1 << 13)
432 #define VMX_AR_TYPE_ACCESSES_MASK 1
433 #define VMX_AR_TYPE_READABLE_MASK (1 << 1)
434 #define VMX_AR_TYPE_WRITEABLE_MASK (1 << 2)
435 #define VMX_AR_TYPE_CODE_MASK (1 << 3)
436 #define VMX_AR_TYPE_MASK 0x0f
437 #define VMX_AR_TYPE_BUSY_64_TSS 11
438 #define VMX_AR_TYPE_BUSY_32_TSS 11
439 #define VMX_AR_TYPE_BUSY_16_TSS 3
440 #define VMX_AR_TYPE_LDT 2
442 #define VMX_AR_UNUSABLE_MASK (1 << 16)
443 #define VMX_AR_S_MASK (1 << 4)
444 #define VMX_AR_P_MASK (1 << 7)
445 #define VMX_AR_L_MASK (1 << 13)
446 #define VMX_AR_DB_MASK (1 << 14)
447 #define VMX_AR_G_MASK (1 << 15)
448 #define VMX_AR_DPL_SHIFT 5
449 #define VMX_AR_DPL(ar) (((ar) >> VMX_AR_DPL_SHIFT) & 3)
451 #define VMX_AR_RESERVD_MASK 0xfffe0f00
453 #define TSS_PRIVATE_MEMSLOT (KVM_USER_MEM_SLOTS + 0)
454 #define APIC_ACCESS_PAGE_PRIVATE_MEMSLOT (KVM_USER_MEM_SLOTS + 1)
455 #define IDENTITY_PAGETABLE_PRIVATE_MEMSLOT (KVM_USER_MEM_SLOTS + 2)
457 #define VMX_NR_VPIDS (1 << 16)
458 #define VMX_VPID_EXTENT_INDIVIDUAL_ADDR 0
459 #define VMX_VPID_EXTENT_SINGLE_CONTEXT 1
460 #define VMX_VPID_EXTENT_ALL_CONTEXT 2
461 #define VMX_VPID_EXTENT_SINGLE_NON_GLOBAL 3
463 #define VMX_EPT_EXTENT_CONTEXT 1
464 #define VMX_EPT_EXTENT_GLOBAL 2
465 #define VMX_EPT_EXTENT_SHIFT 24
467 #define VMX_EPT_EXECUTE_ONLY_BIT (1ull)
468 #define VMX_EPT_PAGE_WALK_4_BIT (1ull << 6)
469 #define VMX_EPT_PAGE_WALK_5_BIT (1ull << 7)
470 #define VMX_EPTP_UC_BIT (1ull << 8)
471 #define VMX_EPTP_WB_BIT (1ull << 14)
472 #define VMX_EPT_2MB_PAGE_BIT (1ull << 16)
473 #define VMX_EPT_1GB_PAGE_BIT (1ull << 17)
474 #define VMX_EPT_INVEPT_BIT (1ull << 20)
475 #define VMX_EPT_AD_BIT (1ull << 21)
476 #define VMX_EPT_EXTENT_CONTEXT_BIT (1ull << 25)
477 #define VMX_EPT_EXTENT_GLOBAL_BIT (1ull << 26)
479 #define VMX_VPID_INVVPID_BIT (1ull << 0) /* (32 - 32) */
480 #define VMX_VPID_EXTENT_INDIVIDUAL_ADDR_BIT (1ull << 8) /* (40 - 32) */
481 #define VMX_VPID_EXTENT_SINGLE_CONTEXT_BIT (1ull << 9) /* (41 - 32) */
482 #define VMX_VPID_EXTENT_GLOBAL_CONTEXT_BIT (1ull << 10) /* (42 - 32) */
483 #define VMX_VPID_EXTENT_SINGLE_NON_GLOBAL_BIT (1ull << 11) /* (43 - 32) */
485 #define VMX_EPT_MT_EPTE_SHIFT 3
486 #define VMX_EPTP_PWL_MASK 0x38ull
487 #define VMX_EPTP_PWL_4 0x18ull
488 #define VMX_EPTP_PWL_5 0x20ull
489 #define VMX_EPTP_AD_ENABLE_BIT (1ull << 6)
490 #define VMX_EPTP_MT_MASK 0x7ull
491 #define VMX_EPTP_MT_WB 0x6ull
492 #define VMX_EPTP_MT_UC 0x0ull
493 #define VMX_EPT_READABLE_MASK 0x1ull
494 #define VMX_EPT_WRITABLE_MASK 0x2ull
495 #define VMX_EPT_EXECUTABLE_MASK 0x4ull
496 #define VMX_EPT_IPAT_BIT (1ull << 6)
497 #define VMX_EPT_ACCESS_BIT (1ull << 8)
498 #define VMX_EPT_DIRTY_BIT (1ull << 9)
499 #define VMX_EPT_RWX_MASK (VMX_EPT_READABLE_MASK | \
500 VMX_EPT_WRITABLE_MASK | \
501 VMX_EPT_EXECUTABLE_MASK)
502 #define VMX_EPT_MT_MASK (7ull << VMX_EPT_MT_EPTE_SHIFT)
504 static inline u8
vmx_eptp_page_walk_level(u64 eptp
)
506 u64 encoded_level
= eptp
& VMX_EPTP_PWL_MASK
;
508 if (encoded_level
== VMX_EPTP_PWL_5
)
511 /* @eptp must be pre-validated by the caller. */
512 WARN_ON_ONCE(encoded_level
!= VMX_EPTP_PWL_4
);
516 /* The mask to use to trigger an EPT Misconfiguration in order to track MMIO */
517 #define VMX_EPT_MISCONFIG_WX_VALUE (VMX_EPT_WRITABLE_MASK | \
518 VMX_EPT_EXECUTABLE_MASK)
520 #define VMX_EPT_IDENTITY_PAGETABLE_ADDR 0xfffbc000ul
522 struct vmx_msr_entry
{
529 * Exit Qualifications for entry failure during or after loading guest state
531 enum vm_entry_failure_code
{
532 ENTRY_FAIL_DEFAULT
= 0,
533 ENTRY_FAIL_PDPTE
= 2,
535 ENTRY_FAIL_VMCS_LINK_PTR
= 4,
539 * Exit Qualifications for EPT Violations
541 #define EPT_VIOLATION_ACC_READ_BIT 0
542 #define EPT_VIOLATION_ACC_WRITE_BIT 1
543 #define EPT_VIOLATION_ACC_INSTR_BIT 2
544 #define EPT_VIOLATION_READABLE_BIT 3
545 #define EPT_VIOLATION_WRITABLE_BIT 4
546 #define EPT_VIOLATION_EXECUTABLE_BIT 5
547 #define EPT_VIOLATION_GVA_TRANSLATED_BIT 8
548 #define EPT_VIOLATION_ACC_READ (1 << EPT_VIOLATION_ACC_READ_BIT)
549 #define EPT_VIOLATION_ACC_WRITE (1 << EPT_VIOLATION_ACC_WRITE_BIT)
550 #define EPT_VIOLATION_ACC_INSTR (1 << EPT_VIOLATION_ACC_INSTR_BIT)
551 #define EPT_VIOLATION_READABLE (1 << EPT_VIOLATION_READABLE_BIT)
552 #define EPT_VIOLATION_WRITABLE (1 << EPT_VIOLATION_WRITABLE_BIT)
553 #define EPT_VIOLATION_EXECUTABLE (1 << EPT_VIOLATION_EXECUTABLE_BIT)
554 #define EPT_VIOLATION_GVA_TRANSLATED (1 << EPT_VIOLATION_GVA_TRANSLATED_BIT)
557 * VM-instruction error numbers
559 enum vm_instruction_error_number
{
560 VMXERR_VMCALL_IN_VMX_ROOT_OPERATION
= 1,
561 VMXERR_VMCLEAR_INVALID_ADDRESS
= 2,
562 VMXERR_VMCLEAR_VMXON_POINTER
= 3,
563 VMXERR_VMLAUNCH_NONCLEAR_VMCS
= 4,
564 VMXERR_VMRESUME_NONLAUNCHED_VMCS
= 5,
565 VMXERR_VMRESUME_AFTER_VMXOFF
= 6,
566 VMXERR_ENTRY_INVALID_CONTROL_FIELD
= 7,
567 VMXERR_ENTRY_INVALID_HOST_STATE_FIELD
= 8,
568 VMXERR_VMPTRLD_INVALID_ADDRESS
= 9,
569 VMXERR_VMPTRLD_VMXON_POINTER
= 10,
570 VMXERR_VMPTRLD_INCORRECT_VMCS_REVISION_ID
= 11,
571 VMXERR_UNSUPPORTED_VMCS_COMPONENT
= 12,
572 VMXERR_VMWRITE_READ_ONLY_VMCS_COMPONENT
= 13,
573 VMXERR_VMXON_IN_VMX_ROOT_OPERATION
= 15,
574 VMXERR_ENTRY_INVALID_EXECUTIVE_VMCS_POINTER
= 16,
575 VMXERR_ENTRY_NONLAUNCHED_EXECUTIVE_VMCS
= 17,
576 VMXERR_ENTRY_EXECUTIVE_VMCS_POINTER_NOT_VMXON_POINTER
= 18,
577 VMXERR_VMCALL_NONCLEAR_VMCS
= 19,
578 VMXERR_VMCALL_INVALID_VM_EXIT_CONTROL_FIELDS
= 20,
579 VMXERR_VMCALL_INCORRECT_MSEG_REVISION_ID
= 22,
580 VMXERR_VMXOFF_UNDER_DUAL_MONITOR_TREATMENT_OF_SMIS_AND_SMM
= 23,
581 VMXERR_VMCALL_INVALID_SMM_MONITOR_FEATURES
= 24,
582 VMXERR_ENTRY_INVALID_VM_EXECUTION_CONTROL_FIELDS_IN_EXECUTIVE_VMCS
= 25,
583 VMXERR_ENTRY_EVENTS_BLOCKED_BY_MOV_SS
= 26,
584 VMXERR_INVALID_OPERAND_TO_INVEPT_INVVPID
= 28,
588 * VM-instruction errors that can be encountered on VM-Enter, used to trace
589 * nested VM-Enter failures reported by hardware. Errors unique to VM-Enter
590 * from a SMI Transfer Monitor are not included as things have gone seriously
591 * sideways if we get one of those...
593 #define VMX_VMENTER_INSTRUCTION_ERRORS \
594 { VMXERR_VMLAUNCH_NONCLEAR_VMCS, "VMLAUNCH_NONCLEAR_VMCS" }, \
595 { VMXERR_VMRESUME_NONLAUNCHED_VMCS, "VMRESUME_NONLAUNCHED_VMCS" }, \
596 { VMXERR_VMRESUME_AFTER_VMXOFF, "VMRESUME_AFTER_VMXOFF" }, \
597 { VMXERR_ENTRY_INVALID_CONTROL_FIELD, "VMENTRY_INVALID_CONTROL_FIELD" }, \
598 { VMXERR_ENTRY_INVALID_HOST_STATE_FIELD, "VMENTRY_INVALID_HOST_STATE_FIELD" }, \
599 { VMXERR_ENTRY_EVENTS_BLOCKED_BY_MOV_SS, "VMENTRY_EVENTS_BLOCKED_BY_MOV_SS" }
601 enum vmx_l1d_flush_state
{
602 VMENTER_L1D_FLUSH_AUTO
,
603 VMENTER_L1D_FLUSH_NEVER
,
604 VMENTER_L1D_FLUSH_COND
,
605 VMENTER_L1D_FLUSH_ALWAYS
,
606 VMENTER_L1D_FLUSH_EPT_DISABLED
,
607 VMENTER_L1D_FLUSH_NOT_REQUIRED
,
610 extern enum vmx_l1d_flush_state l1tf_vmx_mitigation
;