nvmm_x86_vmx.c revision 1.36.2.15 1 /* $NetBSD: nvmm_x86_vmx.c,v 1.36.2.15 2020/09/13 11:56:44 martin Exp $ */
2
3 /*
4 * Copyright (c) 2018-2019 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Maxime Villard.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: nvmm_x86_vmx.c,v 1.36.2.15 2020/09/13 11:56:44 martin Exp $");
34
35 #include <sys/param.h>
36 #include <sys/systm.h>
37 #include <sys/kernel.h>
38 #include <sys/kmem.h>
39 #include <sys/cpu.h>
40 #include <sys/xcall.h>
41 #include <sys/mman.h>
42 #include <sys/bitops.h>
43
44 #include <uvm/uvm.h>
45 #include <uvm/uvm_page.h>
46
47 #include <x86/cputypes.h>
48 #include <x86/specialreg.h>
49 #include <x86/pmap.h>
50 #include <x86/dbregs.h>
51 #include <x86/cpu_counter.h>
52 #include <machine/cpuvar.h>
53
54 #include <dev/nvmm/nvmm.h>
55 #include <dev/nvmm/nvmm_internal.h>
56 #include <dev/nvmm/x86/nvmm_x86.h>
57
58 int _vmx_vmxon(paddr_t *pa);
59 int _vmx_vmxoff(void);
60 int vmx_vmlaunch(uint64_t *gprs);
61 int vmx_vmresume(uint64_t *gprs);
62
63 #define vmx_vmxon(a) \
64 if (__predict_false(_vmx_vmxon(a) != 0)) { \
65 panic("%s: VMXON failed", __func__); \
66 }
67 #define vmx_vmxoff() \
68 if (__predict_false(_vmx_vmxoff() != 0)) { \
69 panic("%s: VMXOFF failed", __func__); \
70 }
71
72 struct ept_desc {
73 uint64_t eptp;
74 uint64_t mbz;
75 } __packed;
76
77 struct vpid_desc {
78 uint64_t vpid;
79 uint64_t addr;
80 } __packed;
81
82 static inline void
83 vmx_invept(uint64_t op, struct ept_desc *desc)
84 {
85 asm volatile (
86 "invept %[desc],%[op];"
87 "jz vmx_insn_failvalid;"
88 "jc vmx_insn_failinvalid;"
89 :
90 : [desc] "m" (*desc), [op] "r" (op)
91 : "memory", "cc"
92 );
93 }
94
95 static inline void
96 vmx_invvpid(uint64_t op, struct vpid_desc *desc)
97 {
98 asm volatile (
99 "invvpid %[desc],%[op];"
100 "jz vmx_insn_failvalid;"
101 "jc vmx_insn_failinvalid;"
102 :
103 : [desc] "m" (*desc), [op] "r" (op)
104 : "memory", "cc"
105 );
106 }
107
108 static inline uint64_t
109 vmx_vmread(uint64_t field)
110 {
111 uint64_t value;
112
113 asm volatile (
114 "vmread %[field],%[value];"
115 "jz vmx_insn_failvalid;"
116 "jc vmx_insn_failinvalid;"
117 : [value] "=r" (value)
118 : [field] "r" (field)
119 : "cc"
120 );
121
122 return value;
123 }
124
125 static inline void
126 vmx_vmwrite(uint64_t field, uint64_t value)
127 {
128 asm volatile (
129 "vmwrite %[value],%[field];"
130 "jz vmx_insn_failvalid;"
131 "jc vmx_insn_failinvalid;"
132 :
133 : [field] "r" (field), [value] "r" (value)
134 : "cc"
135 );
136 }
137
138 #ifdef DIAGNOSTIC
139 static inline paddr_t
140 vmx_vmptrst(void)
141 {
142 paddr_t pa;
143
144 asm volatile (
145 "vmptrst %[pa];"
146 :
147 : [pa] "m" (*(paddr_t *)&pa)
148 : "memory"
149 );
150
151 return pa;
152 }
153 #endif
154
155 static inline void
156 vmx_vmptrld(paddr_t *pa)
157 {
158 asm volatile (
159 "vmptrld %[pa];"
160 "jz vmx_insn_failvalid;"
161 "jc vmx_insn_failinvalid;"
162 :
163 : [pa] "m" (*pa)
164 : "memory", "cc"
165 );
166 }
167
168 static inline void
169 vmx_vmclear(paddr_t *pa)
170 {
171 asm volatile (
172 "vmclear %[pa];"
173 "jz vmx_insn_failvalid;"
174 "jc vmx_insn_failinvalid;"
175 :
176 : [pa] "m" (*pa)
177 : "memory", "cc"
178 );
179 }
180
181 #define MSR_IA32_FEATURE_CONTROL 0x003A
182 #define IA32_FEATURE_CONTROL_LOCK __BIT(0)
183 #define IA32_FEATURE_CONTROL_IN_SMX __BIT(1)
184 #define IA32_FEATURE_CONTROL_OUT_SMX __BIT(2)
185
186 #define MSR_IA32_VMX_BASIC 0x0480
187 #define IA32_VMX_BASIC_IDENT __BITS(30,0)
188 #define IA32_VMX_BASIC_DATA_SIZE __BITS(44,32)
189 #define IA32_VMX_BASIC_MEM_WIDTH __BIT(48)
190 #define IA32_VMX_BASIC_DUAL __BIT(49)
191 #define IA32_VMX_BASIC_MEM_TYPE __BITS(53,50)
192 #define MEM_TYPE_UC 0
193 #define MEM_TYPE_WB 6
194 #define IA32_VMX_BASIC_IO_REPORT __BIT(54)
195 #define IA32_VMX_BASIC_TRUE_CTLS __BIT(55)
196
197 #define MSR_IA32_VMX_PINBASED_CTLS 0x0481
198 #define MSR_IA32_VMX_PROCBASED_CTLS 0x0482
199 #define MSR_IA32_VMX_EXIT_CTLS 0x0483
200 #define MSR_IA32_VMX_ENTRY_CTLS 0x0484
201 #define MSR_IA32_VMX_PROCBASED_CTLS2 0x048B
202
203 #define MSR_IA32_VMX_TRUE_PINBASED_CTLS 0x048D
204 #define MSR_IA32_VMX_TRUE_PROCBASED_CTLS 0x048E
205 #define MSR_IA32_VMX_TRUE_EXIT_CTLS 0x048F
206 #define MSR_IA32_VMX_TRUE_ENTRY_CTLS 0x0490
207
208 #define MSR_IA32_VMX_CR0_FIXED0 0x0486
209 #define MSR_IA32_VMX_CR0_FIXED1 0x0487
210 #define MSR_IA32_VMX_CR4_FIXED0 0x0488
211 #define MSR_IA32_VMX_CR4_FIXED1 0x0489
212
213 #define MSR_IA32_VMX_EPT_VPID_CAP 0x048C
214 #define IA32_VMX_EPT_VPID_XO __BIT(0)
215 #define IA32_VMX_EPT_VPID_WALKLENGTH_4 __BIT(6)
216 #define IA32_VMX_EPT_VPID_UC __BIT(8)
217 #define IA32_VMX_EPT_VPID_WB __BIT(14)
218 #define IA32_VMX_EPT_VPID_2MB __BIT(16)
219 #define IA32_VMX_EPT_VPID_1GB __BIT(17)
220 #define IA32_VMX_EPT_VPID_INVEPT __BIT(20)
221 #define IA32_VMX_EPT_VPID_FLAGS_AD __BIT(21)
222 #define IA32_VMX_EPT_VPID_ADVANCED_VMEXIT_INFO __BIT(22)
223 #define IA32_VMX_EPT_VPID_SHSTK __BIT(23)
224 #define IA32_VMX_EPT_VPID_INVEPT_CONTEXT __BIT(25)
225 #define IA32_VMX_EPT_VPID_INVEPT_ALL __BIT(26)
226 #define IA32_VMX_EPT_VPID_INVVPID __BIT(32)
227 #define IA32_VMX_EPT_VPID_INVVPID_ADDR __BIT(40)
228 #define IA32_VMX_EPT_VPID_INVVPID_CONTEXT __BIT(41)
229 #define IA32_VMX_EPT_VPID_INVVPID_ALL __BIT(42)
230 #define IA32_VMX_EPT_VPID_INVVPID_CONTEXT_NOG __BIT(43)
231
232 /* -------------------------------------------------------------------------- */
233
234 /* 16-bit control fields */
235 #define VMCS_VPID 0x00000000
236 #define VMCS_PIR_VECTOR 0x00000002
237 #define VMCS_EPTP_INDEX 0x00000004
238 /* 16-bit guest-state fields */
239 #define VMCS_GUEST_ES_SELECTOR 0x00000800
240 #define VMCS_GUEST_CS_SELECTOR 0x00000802
241 #define VMCS_GUEST_SS_SELECTOR 0x00000804
242 #define VMCS_GUEST_DS_SELECTOR 0x00000806
243 #define VMCS_GUEST_FS_SELECTOR 0x00000808
244 #define VMCS_GUEST_GS_SELECTOR 0x0000080A
245 #define VMCS_GUEST_LDTR_SELECTOR 0x0000080C
246 #define VMCS_GUEST_TR_SELECTOR 0x0000080E
247 #define VMCS_GUEST_INTR_STATUS 0x00000810
248 #define VMCS_PML_INDEX 0x00000812
249 /* 16-bit host-state fields */
250 #define VMCS_HOST_ES_SELECTOR 0x00000C00
251 #define VMCS_HOST_CS_SELECTOR 0x00000C02
252 #define VMCS_HOST_SS_SELECTOR 0x00000C04
253 #define VMCS_HOST_DS_SELECTOR 0x00000C06
254 #define VMCS_HOST_FS_SELECTOR 0x00000C08
255 #define VMCS_HOST_GS_SELECTOR 0x00000C0A
256 #define VMCS_HOST_TR_SELECTOR 0x00000C0C
257 /* 64-bit control fields */
258 #define VMCS_IO_BITMAP_A 0x00002000
259 #define VMCS_IO_BITMAP_B 0x00002002
260 #define VMCS_MSR_BITMAP 0x00002004
261 #define VMCS_EXIT_MSR_STORE_ADDRESS 0x00002006
262 #define VMCS_EXIT_MSR_LOAD_ADDRESS 0x00002008
263 #define VMCS_ENTRY_MSR_LOAD_ADDRESS 0x0000200A
264 #define VMCS_EXECUTIVE_VMCS 0x0000200C
265 #define VMCS_PML_ADDRESS 0x0000200E
266 #define VMCS_TSC_OFFSET 0x00002010
267 #define VMCS_VIRTUAL_APIC 0x00002012
268 #define VMCS_APIC_ACCESS 0x00002014
269 #define VMCS_PIR_DESC 0x00002016
270 #define VMCS_VM_CONTROL 0x00002018
271 #define VMCS_EPTP 0x0000201A
272 #define EPTP_TYPE __BITS(2,0)
273 #define EPTP_TYPE_UC 0
274 #define EPTP_TYPE_WB 6
275 #define EPTP_WALKLEN __BITS(5,3)
276 #define EPTP_FLAGS_AD __BIT(6)
277 #define EPTP_SSS __BIT(7)
278 #define EPTP_PHYSADDR __BITS(63,12)
279 #define VMCS_EOI_EXIT0 0x0000201C
280 #define VMCS_EOI_EXIT1 0x0000201E
281 #define VMCS_EOI_EXIT2 0x00002020
282 #define VMCS_EOI_EXIT3 0x00002022
283 #define VMCS_EPTP_LIST 0x00002024
284 #define VMCS_VMREAD_BITMAP 0x00002026
285 #define VMCS_VMWRITE_BITMAP 0x00002028
286 #define VMCS_VIRTUAL_EXCEPTION 0x0000202A
287 #define VMCS_XSS_EXIT_BITMAP 0x0000202C
288 #define VMCS_ENCLS_EXIT_BITMAP 0x0000202E
289 #define VMCS_SUBPAGE_PERM_TABLE_PTR 0x00002030
290 #define VMCS_TSC_MULTIPLIER 0x00002032
291 #define VMCS_ENCLV_EXIT_BITMAP 0x00002036
292 /* 64-bit read-only fields */
293 #define VMCS_GUEST_PHYSICAL_ADDRESS 0x00002400
294 /* 64-bit guest-state fields */
295 #define VMCS_LINK_POINTER 0x00002800
296 #define VMCS_GUEST_IA32_DEBUGCTL 0x00002802
297 #define VMCS_GUEST_IA32_PAT 0x00002804
298 #define VMCS_GUEST_IA32_EFER 0x00002806
299 #define VMCS_GUEST_IA32_PERF_GLOBAL_CTRL 0x00002808
300 #define VMCS_GUEST_PDPTE0 0x0000280A
301 #define VMCS_GUEST_PDPTE1 0x0000280C
302 #define VMCS_GUEST_PDPTE2 0x0000280E
303 #define VMCS_GUEST_PDPTE3 0x00002810
304 #define VMCS_GUEST_BNDCFGS 0x00002812
305 #define VMCS_GUEST_RTIT_CTL 0x00002814
306 #define VMCS_GUEST_PKRS 0x00002818
307 /* 64-bit host-state fields */
308 #define VMCS_HOST_IA32_PAT 0x00002C00
309 #define VMCS_HOST_IA32_EFER 0x00002C02
310 #define VMCS_HOST_IA32_PERF_GLOBAL_CTRL 0x00002C04
311 #define VMCS_HOST_IA32_PKRS 0x00002C06
312 /* 32-bit control fields */
313 #define VMCS_PINBASED_CTLS 0x00004000
314 #define PIN_CTLS_INT_EXITING __BIT(0)
315 #define PIN_CTLS_NMI_EXITING __BIT(3)
316 #define PIN_CTLS_VIRTUAL_NMIS __BIT(5)
317 #define PIN_CTLS_ACTIVATE_PREEMPT_TIMER __BIT(6)
318 #define PIN_CTLS_PROCESS_POSTED_INTS __BIT(7)
319 #define VMCS_PROCBASED_CTLS 0x00004002
320 #define PROC_CTLS_INT_WINDOW_EXITING __BIT(2)
321 #define PROC_CTLS_USE_TSC_OFFSETTING __BIT(3)
322 #define PROC_CTLS_HLT_EXITING __BIT(7)
323 #define PROC_CTLS_INVLPG_EXITING __BIT(9)
324 #define PROC_CTLS_MWAIT_EXITING __BIT(10)
325 #define PROC_CTLS_RDPMC_EXITING __BIT(11)
326 #define PROC_CTLS_RDTSC_EXITING __BIT(12)
327 #define PROC_CTLS_RCR3_EXITING __BIT(15)
328 #define PROC_CTLS_LCR3_EXITING __BIT(16)
329 #define PROC_CTLS_RCR8_EXITING __BIT(19)
330 #define PROC_CTLS_LCR8_EXITING __BIT(20)
331 #define PROC_CTLS_USE_TPR_SHADOW __BIT(21)
332 #define PROC_CTLS_NMI_WINDOW_EXITING __BIT(22)
333 #define PROC_CTLS_DR_EXITING __BIT(23)
334 #define PROC_CTLS_UNCOND_IO_EXITING __BIT(24)
335 #define PROC_CTLS_USE_IO_BITMAPS __BIT(25)
336 #define PROC_CTLS_MONITOR_TRAP_FLAG __BIT(27)
337 #define PROC_CTLS_USE_MSR_BITMAPS __BIT(28)
338 #define PROC_CTLS_MONITOR_EXITING __BIT(29)
339 #define PROC_CTLS_PAUSE_EXITING __BIT(30)
340 #define PROC_CTLS_ACTIVATE_CTLS2 __BIT(31)
341 #define VMCS_EXCEPTION_BITMAP 0x00004004
342 #define VMCS_PF_ERROR_MASK 0x00004006
343 #define VMCS_PF_ERROR_MATCH 0x00004008
344 #define VMCS_CR3_TARGET_COUNT 0x0000400A
345 #define VMCS_EXIT_CTLS 0x0000400C
346 #define EXIT_CTLS_SAVE_DEBUG_CONTROLS __BIT(2)
347 #define EXIT_CTLS_HOST_LONG_MODE __BIT(9)
348 #define EXIT_CTLS_LOAD_PERFGLOBALCTRL __BIT(12)
349 #define EXIT_CTLS_ACK_INTERRUPT __BIT(15)
350 #define EXIT_CTLS_SAVE_PAT __BIT(18)
351 #define EXIT_CTLS_LOAD_PAT __BIT(19)
352 #define EXIT_CTLS_SAVE_EFER __BIT(20)
353 #define EXIT_CTLS_LOAD_EFER __BIT(21)
354 #define EXIT_CTLS_SAVE_PREEMPT_TIMER __BIT(22)
355 #define EXIT_CTLS_CLEAR_BNDCFGS __BIT(23)
356 #define EXIT_CTLS_CONCEAL_PT __BIT(24)
357 #define EXIT_CTLS_CLEAR_RTIT_CTL __BIT(25)
358 #define EXIT_CTLS_LOAD_CET __BIT(28)
359 #define EXIT_CTLS_LOAD_PKRS __BIT(29)
360 #define VMCS_EXIT_MSR_STORE_COUNT 0x0000400E
361 #define VMCS_EXIT_MSR_LOAD_COUNT 0x00004010
362 #define VMCS_ENTRY_CTLS 0x00004012
363 #define ENTRY_CTLS_LOAD_DEBUG_CONTROLS __BIT(2)
364 #define ENTRY_CTLS_LONG_MODE __BIT(9)
365 #define ENTRY_CTLS_SMM __BIT(10)
366 #define ENTRY_CTLS_DISABLE_DUAL __BIT(11)
367 #define ENTRY_CTLS_LOAD_PERFGLOBALCTRL __BIT(13)
368 #define ENTRY_CTLS_LOAD_PAT __BIT(14)
369 #define ENTRY_CTLS_LOAD_EFER __BIT(15)
370 #define ENTRY_CTLS_LOAD_BNDCFGS __BIT(16)
371 #define ENTRY_CTLS_CONCEAL_PT __BIT(17)
372 #define ENTRY_CTLS_LOAD_RTIT_CTL __BIT(18)
373 #define ENTRY_CTLS_LOAD_CET __BIT(20)
374 #define ENTRY_CTLS_LOAD_PKRS __BIT(22)
375 #define VMCS_ENTRY_MSR_LOAD_COUNT 0x00004014
376 #define VMCS_ENTRY_INTR_INFO 0x00004016
377 #define INTR_INFO_VECTOR __BITS(7,0)
378 #define INTR_INFO_TYPE __BITS(10,8)
379 #define INTR_TYPE_EXT_INT 0
380 #define INTR_TYPE_NMI 2
381 #define INTR_TYPE_HW_EXC 3
382 #define INTR_TYPE_SW_INT 4
383 #define INTR_TYPE_PRIV_SW_EXC 5
384 #define INTR_TYPE_SW_EXC 6
385 #define INTR_TYPE_OTHER 7
386 #define INTR_INFO_ERROR __BIT(11)
387 #define INTR_INFO_VALID __BIT(31)
388 #define VMCS_ENTRY_EXCEPTION_ERROR 0x00004018
389 #define VMCS_ENTRY_INSTRUCTION_LENGTH 0x0000401A
390 #define VMCS_TPR_THRESHOLD 0x0000401C
391 #define VMCS_PROCBASED_CTLS2 0x0000401E
392 #define PROC_CTLS2_VIRT_APIC_ACCESSES __BIT(0)
393 #define PROC_CTLS2_ENABLE_EPT __BIT(1)
394 #define PROC_CTLS2_DESC_TABLE_EXITING __BIT(2)
395 #define PROC_CTLS2_ENABLE_RDTSCP __BIT(3)
396 #define PROC_CTLS2_VIRT_X2APIC __BIT(4)
397 #define PROC_CTLS2_ENABLE_VPID __BIT(5)
398 #define PROC_CTLS2_WBINVD_EXITING __BIT(6)
399 #define PROC_CTLS2_UNRESTRICTED_GUEST __BIT(7)
400 #define PROC_CTLS2_APIC_REG_VIRT __BIT(8)
401 #define PROC_CTLS2_VIRT_INT_DELIVERY __BIT(9)
402 #define PROC_CTLS2_PAUSE_LOOP_EXITING __BIT(10)
403 #define PROC_CTLS2_RDRAND_EXITING __BIT(11)
404 #define PROC_CTLS2_INVPCID_ENABLE __BIT(12)
405 #define PROC_CTLS2_VMFUNC_ENABLE __BIT(13)
406 #define PROC_CTLS2_VMCS_SHADOWING __BIT(14)
407 #define PROC_CTLS2_ENCLS_EXITING __BIT(15)
408 #define PROC_CTLS2_RDSEED_EXITING __BIT(16)
409 #define PROC_CTLS2_PML_ENABLE __BIT(17)
410 #define PROC_CTLS2_EPT_VIOLATION __BIT(18)
411 #define PROC_CTLS2_CONCEAL_VMX_FROM_PT __BIT(19)
412 #define PROC_CTLS2_XSAVES_ENABLE __BIT(20)
413 #define PROC_CTLS2_MODE_BASED_EXEC_EPT __BIT(22)
414 #define PROC_CTLS2_SUBPAGE_PERMISSIONS __BIT(23)
415 #define PROC_CTLS2_PT_USES_GPA __BIT(24)
416 #define PROC_CTLS2_USE_TSC_SCALING __BIT(25)
417 #define PROC_CTLS2_WAIT_PAUSE_ENABLE __BIT(26)
418 #define PROC_CTLS2_ENCLV_EXITING __BIT(28)
419 #define VMCS_PLE_GAP 0x00004020
420 #define VMCS_PLE_WINDOW 0x00004022
421 /* 32-bit read-only data fields */
422 #define VMCS_INSTRUCTION_ERROR 0x00004400
423 #define VMCS_EXIT_REASON 0x00004402
424 #define VMCS_EXIT_INTR_INFO 0x00004404
425 #define VMCS_EXIT_INTR_ERRCODE 0x00004406
426 #define VMCS_IDT_VECTORING_INFO 0x00004408
427 #define VMCS_IDT_VECTORING_ERROR 0x0000440A
428 #define VMCS_EXIT_INSTRUCTION_LENGTH 0x0000440C
429 #define VMCS_EXIT_INSTRUCTION_INFO 0x0000440E
430 /* 32-bit guest-state fields */
431 #define VMCS_GUEST_ES_LIMIT 0x00004800
432 #define VMCS_GUEST_CS_LIMIT 0x00004802
433 #define VMCS_GUEST_SS_LIMIT 0x00004804
434 #define VMCS_GUEST_DS_LIMIT 0x00004806
435 #define VMCS_GUEST_FS_LIMIT 0x00004808
436 #define VMCS_GUEST_GS_LIMIT 0x0000480A
437 #define VMCS_GUEST_LDTR_LIMIT 0x0000480C
438 #define VMCS_GUEST_TR_LIMIT 0x0000480E
439 #define VMCS_GUEST_GDTR_LIMIT 0x00004810
440 #define VMCS_GUEST_IDTR_LIMIT 0x00004812
441 #define VMCS_GUEST_ES_ACCESS_RIGHTS 0x00004814
442 #define VMCS_GUEST_CS_ACCESS_RIGHTS 0x00004816
443 #define VMCS_GUEST_SS_ACCESS_RIGHTS 0x00004818
444 #define VMCS_GUEST_DS_ACCESS_RIGHTS 0x0000481A
445 #define VMCS_GUEST_FS_ACCESS_RIGHTS 0x0000481C
446 #define VMCS_GUEST_GS_ACCESS_RIGHTS 0x0000481E
447 #define VMCS_GUEST_LDTR_ACCESS_RIGHTS 0x00004820
448 #define VMCS_GUEST_TR_ACCESS_RIGHTS 0x00004822
449 #define VMCS_GUEST_INTERRUPTIBILITY 0x00004824
450 #define INT_STATE_STI __BIT(0)
451 #define INT_STATE_MOVSS __BIT(1)
452 #define INT_STATE_SMI __BIT(2)
453 #define INT_STATE_NMI __BIT(3)
454 #define INT_STATE_ENCLAVE __BIT(4)
455 #define VMCS_GUEST_ACTIVITY 0x00004826
456 #define VMCS_GUEST_SMBASE 0x00004828
457 #define VMCS_GUEST_IA32_SYSENTER_CS 0x0000482A
458 #define VMCS_PREEMPTION_TIMER_VALUE 0x0000482E
459 /* 32-bit host state fields */
460 #define VMCS_HOST_IA32_SYSENTER_CS 0x00004C00
461 /* Natural-Width control fields */
462 #define VMCS_CR0_MASK 0x00006000
463 #define VMCS_CR4_MASK 0x00006002
464 #define VMCS_CR0_SHADOW 0x00006004
465 #define VMCS_CR4_SHADOW 0x00006006
466 #define VMCS_CR3_TARGET0 0x00006008
467 #define VMCS_CR3_TARGET1 0x0000600A
468 #define VMCS_CR3_TARGET2 0x0000600C
469 #define VMCS_CR3_TARGET3 0x0000600E
470 /* Natural-Width read-only fields */
471 #define VMCS_EXIT_QUALIFICATION 0x00006400
472 #define VMCS_IO_RCX 0x00006402
473 #define VMCS_IO_RSI 0x00006404
474 #define VMCS_IO_RDI 0x00006406
475 #define VMCS_IO_RIP 0x00006408
476 #define VMCS_GUEST_LINEAR_ADDRESS 0x0000640A
477 /* Natural-Width guest-state fields */
478 #define VMCS_GUEST_CR0 0x00006800
479 #define VMCS_GUEST_CR3 0x00006802
480 #define VMCS_GUEST_CR4 0x00006804
481 #define VMCS_GUEST_ES_BASE 0x00006806
482 #define VMCS_GUEST_CS_BASE 0x00006808
483 #define VMCS_GUEST_SS_BASE 0x0000680A
484 #define VMCS_GUEST_DS_BASE 0x0000680C
485 #define VMCS_GUEST_FS_BASE 0x0000680E
486 #define VMCS_GUEST_GS_BASE 0x00006810
487 #define VMCS_GUEST_LDTR_BASE 0x00006812
488 #define VMCS_GUEST_TR_BASE 0x00006814
489 #define VMCS_GUEST_GDTR_BASE 0x00006816
490 #define VMCS_GUEST_IDTR_BASE 0x00006818
491 #define VMCS_GUEST_DR7 0x0000681A
492 #define VMCS_GUEST_RSP 0x0000681C
493 #define VMCS_GUEST_RIP 0x0000681E
494 #define VMCS_GUEST_RFLAGS 0x00006820
495 #define VMCS_GUEST_PENDING_DBG_EXCEPTIONS 0x00006822
496 #define VMCS_GUEST_IA32_SYSENTER_ESP 0x00006824
497 #define VMCS_GUEST_IA32_SYSENTER_EIP 0x00006826
498 #define VMCS_GUEST_IA32_S_CET 0x00006828
499 #define VMCS_GUEST_SSP 0x0000682A
500 #define VMCS_GUEST_IA32_INTR_SSP_TABLE 0x0000682C
501 /* Natural-Width host-state fields */
502 #define VMCS_HOST_CR0 0x00006C00
503 #define VMCS_HOST_CR3 0x00006C02
504 #define VMCS_HOST_CR4 0x00006C04
505 #define VMCS_HOST_FS_BASE 0x00006C06
506 #define VMCS_HOST_GS_BASE 0x00006C08
507 #define VMCS_HOST_TR_BASE 0x00006C0A
508 #define VMCS_HOST_GDTR_BASE 0x00006C0C
509 #define VMCS_HOST_IDTR_BASE 0x00006C0E
510 #define VMCS_HOST_IA32_SYSENTER_ESP 0x00006C10
511 #define VMCS_HOST_IA32_SYSENTER_EIP 0x00006C12
512 #define VMCS_HOST_RSP 0x00006C14
513 #define VMCS_HOST_RIP 0x00006C16
514 #define VMCS_HOST_IA32_S_CET 0x00006C18
515 #define VMCS_HOST_SSP 0x00006C1A
516 #define VMCS_HOST_IA32_INTR_SSP_TABLE 0x00006C1C
517
518 /* VMX basic exit reasons. */
519 #define VMCS_EXITCODE_EXC_NMI 0
520 #define VMCS_EXITCODE_EXT_INT 1
521 #define VMCS_EXITCODE_SHUTDOWN 2
522 #define VMCS_EXITCODE_INIT 3
523 #define VMCS_EXITCODE_SIPI 4
524 #define VMCS_EXITCODE_SMI 5
525 #define VMCS_EXITCODE_OTHER_SMI 6
526 #define VMCS_EXITCODE_INT_WINDOW 7
527 #define VMCS_EXITCODE_NMI_WINDOW 8
528 #define VMCS_EXITCODE_TASK_SWITCH 9
529 #define VMCS_EXITCODE_CPUID 10
530 #define VMCS_EXITCODE_GETSEC 11
531 #define VMCS_EXITCODE_HLT 12
532 #define VMCS_EXITCODE_INVD 13
533 #define VMCS_EXITCODE_INVLPG 14
534 #define VMCS_EXITCODE_RDPMC 15
535 #define VMCS_EXITCODE_RDTSC 16
536 #define VMCS_EXITCODE_RSM 17
537 #define VMCS_EXITCODE_VMCALL 18
538 #define VMCS_EXITCODE_VMCLEAR 19
539 #define VMCS_EXITCODE_VMLAUNCH 20
540 #define VMCS_EXITCODE_VMPTRLD 21
541 #define VMCS_EXITCODE_VMPTRST 22
542 #define VMCS_EXITCODE_VMREAD 23
543 #define VMCS_EXITCODE_VMRESUME 24
544 #define VMCS_EXITCODE_VMWRITE 25
545 #define VMCS_EXITCODE_VMXOFF 26
546 #define VMCS_EXITCODE_VMXON 27
547 #define VMCS_EXITCODE_CR 28
548 #define VMCS_EXITCODE_DR 29
549 #define VMCS_EXITCODE_IO 30
550 #define VMCS_EXITCODE_RDMSR 31
551 #define VMCS_EXITCODE_WRMSR 32
552 #define VMCS_EXITCODE_FAIL_GUEST_INVALID 33
553 #define VMCS_EXITCODE_FAIL_MSR_INVALID 34
554 #define VMCS_EXITCODE_MWAIT 36
555 #define VMCS_EXITCODE_TRAP_FLAG 37
556 #define VMCS_EXITCODE_MONITOR 39
557 #define VMCS_EXITCODE_PAUSE 40
558 #define VMCS_EXITCODE_FAIL_MACHINE_CHECK 41
559 #define VMCS_EXITCODE_TPR_BELOW 43
560 #define VMCS_EXITCODE_APIC_ACCESS 44
561 #define VMCS_EXITCODE_VEOI 45
562 #define VMCS_EXITCODE_GDTR_IDTR 46
563 #define VMCS_EXITCODE_LDTR_TR 47
564 #define VMCS_EXITCODE_EPT_VIOLATION 48
565 #define VMCS_EXITCODE_EPT_MISCONFIG 49
566 #define VMCS_EXITCODE_INVEPT 50
567 #define VMCS_EXITCODE_RDTSCP 51
568 #define VMCS_EXITCODE_PREEMPT_TIMEOUT 52
569 #define VMCS_EXITCODE_INVVPID 53
570 #define VMCS_EXITCODE_WBINVD 54
571 #define VMCS_EXITCODE_XSETBV 55
572 #define VMCS_EXITCODE_APIC_WRITE 56
573 #define VMCS_EXITCODE_RDRAND 57
574 #define VMCS_EXITCODE_INVPCID 58
575 #define VMCS_EXITCODE_VMFUNC 59
576 #define VMCS_EXITCODE_ENCLS 60
577 #define VMCS_EXITCODE_RDSEED 61
578 #define VMCS_EXITCODE_PAGE_LOG_FULL 62
579 #define VMCS_EXITCODE_XSAVES 63
580 #define VMCS_EXITCODE_XRSTORS 64
581 #define VMCS_EXITCODE_SPP 66
582 #define VMCS_EXITCODE_UMWAIT 67
583 #define VMCS_EXITCODE_TPAUSE 68
584
585 /* -------------------------------------------------------------------------- */
586
587 static void vmx_vcpu_state_provide(struct nvmm_cpu *, uint64_t);
588 static void vmx_vcpu_state_commit(struct nvmm_cpu *);
589
590 #define VMX_MSRLIST_STAR 0
591 #define VMX_MSRLIST_LSTAR 1
592 #define VMX_MSRLIST_CSTAR 2
593 #define VMX_MSRLIST_SFMASK 3
594 #define VMX_MSRLIST_KERNELGSBASE 4
595 #define VMX_MSRLIST_EXIT_NMSR 5
596 #define VMX_MSRLIST_L1DFLUSH 5
597
598 /* On entry, we may do +1 to include L1DFLUSH. */
599 static size_t vmx_msrlist_entry_nmsr __read_mostly = VMX_MSRLIST_EXIT_NMSR;
600
601 struct vmxon {
602 uint32_t ident;
603 #define VMXON_IDENT_REVISION __BITS(30,0)
604
605 uint8_t data[PAGE_SIZE - 4];
606 } __packed;
607
608 CTASSERT(sizeof(struct vmxon) == PAGE_SIZE);
609
610 struct vmxoncpu {
611 vaddr_t va;
612 paddr_t pa;
613 };
614
615 static struct vmxoncpu vmxoncpu[MAXCPUS];
616
617 struct vmcs {
618 uint32_t ident;
619 #define VMCS_IDENT_REVISION __BITS(30,0)
620 #define VMCS_IDENT_SHADOW __BIT(31)
621
622 uint32_t abort;
623 uint8_t data[PAGE_SIZE - 8];
624 } __packed;
625
626 CTASSERT(sizeof(struct vmcs) == PAGE_SIZE);
627
628 struct msr_entry {
629 uint32_t msr;
630 uint32_t rsvd;
631 uint64_t val;
632 } __packed;
633
634 #define VPID_MAX 0xFFFF
635
636 /* Make sure we never run out of VPIDs. */
637 CTASSERT(VPID_MAX-1 >= NVMM_MAX_MACHINES * NVMM_MAX_VCPUS);
638
639 static uint64_t vmx_tlb_flush_op __read_mostly;
640 static uint64_t vmx_ept_flush_op __read_mostly;
641 static uint64_t vmx_eptp_type __read_mostly;
642
643 static uint64_t vmx_pinbased_ctls __read_mostly;
644 static uint64_t vmx_procbased_ctls __read_mostly;
645 static uint64_t vmx_procbased_ctls2 __read_mostly;
646 static uint64_t vmx_entry_ctls __read_mostly;
647 static uint64_t vmx_exit_ctls __read_mostly;
648
649 static uint64_t vmx_cr0_fixed0 __read_mostly;
650 static uint64_t vmx_cr0_fixed1 __read_mostly;
651 static uint64_t vmx_cr4_fixed0 __read_mostly;
652 static uint64_t vmx_cr4_fixed1 __read_mostly;
653
654 extern bool pmap_ept_has_ad;
655
656 #define VMX_PINBASED_CTLS_ONE \
657 (PIN_CTLS_INT_EXITING| \
658 PIN_CTLS_NMI_EXITING| \
659 PIN_CTLS_VIRTUAL_NMIS)
660
661 #define VMX_PINBASED_CTLS_ZERO 0
662
663 #define VMX_PROCBASED_CTLS_ONE \
664 (PROC_CTLS_USE_TSC_OFFSETTING| \
665 PROC_CTLS_HLT_EXITING| \
666 PROC_CTLS_MWAIT_EXITING | \
667 PROC_CTLS_RDPMC_EXITING | \
668 PROC_CTLS_RCR8_EXITING | \
669 PROC_CTLS_LCR8_EXITING | \
670 PROC_CTLS_UNCOND_IO_EXITING | /* no I/O bitmap */ \
671 PROC_CTLS_USE_MSR_BITMAPS | \
672 PROC_CTLS_MONITOR_EXITING | \
673 PROC_CTLS_ACTIVATE_CTLS2)
674
675 #define VMX_PROCBASED_CTLS_ZERO \
676 (PROC_CTLS_RCR3_EXITING| \
677 PROC_CTLS_LCR3_EXITING)
678
679 #define VMX_PROCBASED_CTLS2_ONE \
680 (PROC_CTLS2_ENABLE_EPT| \
681 PROC_CTLS2_ENABLE_VPID| \
682 PROC_CTLS2_UNRESTRICTED_GUEST)
683
684 #define VMX_PROCBASED_CTLS2_ZERO 0
685
686 #define VMX_ENTRY_CTLS_ONE \
687 (ENTRY_CTLS_LOAD_DEBUG_CONTROLS| \
688 ENTRY_CTLS_LOAD_EFER| \
689 ENTRY_CTLS_LOAD_PAT)
690
691 #define VMX_ENTRY_CTLS_ZERO \
692 (ENTRY_CTLS_SMM| \
693 ENTRY_CTLS_DISABLE_DUAL)
694
695 #define VMX_EXIT_CTLS_ONE \
696 (EXIT_CTLS_SAVE_DEBUG_CONTROLS| \
697 EXIT_CTLS_HOST_LONG_MODE| \
698 EXIT_CTLS_SAVE_PAT| \
699 EXIT_CTLS_LOAD_PAT| \
700 EXIT_CTLS_SAVE_EFER| \
701 EXIT_CTLS_LOAD_EFER)
702
703 #define VMX_EXIT_CTLS_ZERO 0
704
705 static uint8_t *vmx_asidmap __read_mostly;
706 static uint32_t vmx_maxasid __read_mostly;
707 static kmutex_t vmx_asidlock __cacheline_aligned;
708
709 #define VMX_XCR0_MASK_DEFAULT (XCR0_X87|XCR0_SSE)
710 static uint64_t vmx_xcr0_mask __read_mostly;
711
712 #define VMX_NCPUIDS 32
713
714 #define VMCS_NPAGES 1
715 #define VMCS_SIZE (VMCS_NPAGES * PAGE_SIZE)
716
717 #define MSRBM_NPAGES 1
718 #define MSRBM_SIZE (MSRBM_NPAGES * PAGE_SIZE)
719
720 #define CR4_VALID \
721 (CR4_VME | \
722 CR4_PVI | \
723 CR4_TSD | \
724 CR4_DE | \
725 CR4_PSE | \
726 CR4_PAE | \
727 CR4_MCE | \
728 CR4_PGE | \
729 CR4_PCE | \
730 CR4_OSFXSR | \
731 CR4_OSXMMEXCPT | \
732 CR4_UMIP | \
733 /* CR4_LA57 excluded */ \
734 /* CR4_VMXE excluded */ \
735 /* CR4_SMXE excluded */ \
736 CR4_FSGSBASE | \
737 CR4_PCIDE | \
738 CR4_OSXSAVE | \
739 CR4_SMEP | \
740 CR4_SMAP \
741 /* CR4_PKE excluded */ \
742 /* CR4_CET excluded */ \
743 /* CR4_PKS excluded */)
744 #define CR4_INVALID \
745 (0xFFFFFFFFFFFFFFFFULL & ~CR4_VALID)
746
747 #define EFER_TLB_FLUSH \
748 (EFER_NXE|EFER_LMA|EFER_LME)
749 #define CR0_TLB_FLUSH \
750 (CR0_PG|CR0_WP|CR0_CD|CR0_NW)
751 #define CR4_TLB_FLUSH \
752 (CR4_PSE|CR4_PAE|CR4_PGE|CR4_PCIDE|CR4_SMEP)
753
754 /* -------------------------------------------------------------------------- */
755
756 struct vmx_machdata {
757 volatile uint64_t mach_htlb_gen;
758 };
759
760 static const size_t vmx_vcpu_conf_sizes[NVMM_X86_VCPU_NCONF] = {
761 [NVMM_VCPU_CONF_MD(NVMM_VCPU_CONF_CPUID)] =
762 sizeof(struct nvmm_vcpu_conf_cpuid),
763 [NVMM_VCPU_CONF_MD(NVMM_VCPU_CONF_TPR)] =
764 sizeof(struct nvmm_vcpu_conf_tpr)
765 };
766
767 struct vmx_cpudata {
768 /* General */
769 uint64_t asid;
770 bool gtlb_want_flush;
771 bool gtsc_want_update;
772 uint64_t vcpu_htlb_gen;
773 kcpuset_t *htlb_want_flush;
774
775 /* VMCS */
776 struct vmcs *vmcs;
777 paddr_t vmcs_pa;
778 size_t vmcs_refcnt;
779 struct cpu_info *vmcs_ci;
780 bool vmcs_launched;
781
782 /* MSR bitmap */
783 uint8_t *msrbm;
784 paddr_t msrbm_pa;
785
786 /* Host state */
787 uint64_t hxcr0;
788 uint64_t star;
789 uint64_t lstar;
790 uint64_t cstar;
791 uint64_t sfmask;
792 uint64_t kernelgsbase;
793 bool ts_set;
794 struct xsave_header hfpu __aligned(64);
795
796 /* Intr state */
797 bool int_window_exit;
798 bool nmi_window_exit;
799 bool evt_pending;
800
801 /* Guest state */
802 struct msr_entry *gmsr;
803 paddr_t gmsr_pa;
804 uint64_t gmsr_misc_enable;
805 uint64_t gcr2;
806 uint64_t gcr8;
807 uint64_t gxcr0;
808 uint64_t gprs[NVMM_X64_NGPR];
809 uint64_t drs[NVMM_X64_NDR];
810 uint64_t gtsc;
811 struct xsave_header gfpu __aligned(64);
812
813 /* VCPU configuration. */
814 bool cpuidpresent[VMX_NCPUIDS];
815 struct nvmm_vcpu_conf_cpuid cpuid[VMX_NCPUIDS];
816 struct nvmm_vcpu_conf_tpr tpr;
817 };
818
819 static const struct {
820 uint64_t selector;
821 uint64_t attrib;
822 uint64_t limit;
823 uint64_t base;
824 } vmx_guest_segs[NVMM_X64_NSEG] = {
825 [NVMM_X64_SEG_ES] = {
826 VMCS_GUEST_ES_SELECTOR,
827 VMCS_GUEST_ES_ACCESS_RIGHTS,
828 VMCS_GUEST_ES_LIMIT,
829 VMCS_GUEST_ES_BASE
830 },
831 [NVMM_X64_SEG_CS] = {
832 VMCS_GUEST_CS_SELECTOR,
833 VMCS_GUEST_CS_ACCESS_RIGHTS,
834 VMCS_GUEST_CS_LIMIT,
835 VMCS_GUEST_CS_BASE
836 },
837 [NVMM_X64_SEG_SS] = {
838 VMCS_GUEST_SS_SELECTOR,
839 VMCS_GUEST_SS_ACCESS_RIGHTS,
840 VMCS_GUEST_SS_LIMIT,
841 VMCS_GUEST_SS_BASE
842 },
843 [NVMM_X64_SEG_DS] = {
844 VMCS_GUEST_DS_SELECTOR,
845 VMCS_GUEST_DS_ACCESS_RIGHTS,
846 VMCS_GUEST_DS_LIMIT,
847 VMCS_GUEST_DS_BASE
848 },
849 [NVMM_X64_SEG_FS] = {
850 VMCS_GUEST_FS_SELECTOR,
851 VMCS_GUEST_FS_ACCESS_RIGHTS,
852 VMCS_GUEST_FS_LIMIT,
853 VMCS_GUEST_FS_BASE
854 },
855 [NVMM_X64_SEG_GS] = {
856 VMCS_GUEST_GS_SELECTOR,
857 VMCS_GUEST_GS_ACCESS_RIGHTS,
858 VMCS_GUEST_GS_LIMIT,
859 VMCS_GUEST_GS_BASE
860 },
861 [NVMM_X64_SEG_GDT] = {
862 0, /* doesn't exist */
863 0, /* doesn't exist */
864 VMCS_GUEST_GDTR_LIMIT,
865 VMCS_GUEST_GDTR_BASE
866 },
867 [NVMM_X64_SEG_IDT] = {
868 0, /* doesn't exist */
869 0, /* doesn't exist */
870 VMCS_GUEST_IDTR_LIMIT,
871 VMCS_GUEST_IDTR_BASE
872 },
873 [NVMM_X64_SEG_LDT] = {
874 VMCS_GUEST_LDTR_SELECTOR,
875 VMCS_GUEST_LDTR_ACCESS_RIGHTS,
876 VMCS_GUEST_LDTR_LIMIT,
877 VMCS_GUEST_LDTR_BASE
878 },
879 [NVMM_X64_SEG_TR] = {
880 VMCS_GUEST_TR_SELECTOR,
881 VMCS_GUEST_TR_ACCESS_RIGHTS,
882 VMCS_GUEST_TR_LIMIT,
883 VMCS_GUEST_TR_BASE
884 }
885 };
886
887 /* -------------------------------------------------------------------------- */
888
889 static uint64_t
890 vmx_get_revision(void)
891 {
892 uint64_t msr;
893
894 msr = rdmsr(MSR_IA32_VMX_BASIC);
895 msr &= IA32_VMX_BASIC_IDENT;
896
897 return msr;
898 }
899
900 static void
901 vmx_vmclear_ipi(void *arg1, void *arg2)
902 {
903 paddr_t vmcs_pa = (paddr_t)arg1;
904 vmx_vmclear(&vmcs_pa);
905 }
906
907 static void
908 vmx_vmclear_remote(struct cpu_info *ci, paddr_t vmcs_pa)
909 {
910 uint64_t xc;
911 int bound;
912
913 KASSERT(kpreempt_disabled());
914
915 bound = curlwp_bind();
916 kpreempt_enable();
917
918 xc = xc_unicast(XC_HIGHPRI, vmx_vmclear_ipi, (void *)vmcs_pa, NULL, ci);
919 xc_wait(xc);
920
921 kpreempt_disable();
922 curlwp_bindx(bound);
923 }
924
925 static void
926 vmx_vmcs_enter(struct nvmm_cpu *vcpu)
927 {
928 struct vmx_cpudata *cpudata = vcpu->cpudata;
929 struct cpu_info *vmcs_ci;
930
931 cpudata->vmcs_refcnt++;
932 if (cpudata->vmcs_refcnt > 1) {
933 KASSERT(kpreempt_disabled());
934 KASSERT(vmx_vmptrst() == cpudata->vmcs_pa);
935 return;
936 }
937
938 vmcs_ci = cpudata->vmcs_ci;
939 cpudata->vmcs_ci = (void *)0x00FFFFFFFFFFFFFF; /* clobber */
940
941 kpreempt_disable();
942
943 if (vmcs_ci == NULL) {
944 /* This VMCS is loaded for the first time. */
945 vmx_vmclear(&cpudata->vmcs_pa);
946 cpudata->vmcs_launched = false;
947 } else if (vmcs_ci != curcpu()) {
948 /* This VMCS is active on a remote CPU. */
949 vmx_vmclear_remote(vmcs_ci, cpudata->vmcs_pa);
950 cpudata->vmcs_launched = false;
951 } else {
952 /* This VMCS is active on curcpu, nothing to do. */
953 }
954
955 vmx_vmptrld(&cpudata->vmcs_pa);
956 }
957
958 static void
959 vmx_vmcs_leave(struct nvmm_cpu *vcpu)
960 {
961 struct vmx_cpudata *cpudata = vcpu->cpudata;
962
963 KASSERT(kpreempt_disabled());
964 KASSERT(vmx_vmptrst() == cpudata->vmcs_pa);
965 KASSERT(cpudata->vmcs_refcnt > 0);
966 cpudata->vmcs_refcnt--;
967
968 if (cpudata->vmcs_refcnt > 0) {
969 return;
970 }
971
972 cpudata->vmcs_ci = curcpu();
973 kpreempt_enable();
974 }
975
976 static void
977 vmx_vmcs_destroy(struct nvmm_cpu *vcpu)
978 {
979 struct vmx_cpudata *cpudata = vcpu->cpudata;
980
981 KASSERT(kpreempt_disabled());
982 KASSERT(vmx_vmptrst() == cpudata->vmcs_pa);
983 KASSERT(cpudata->vmcs_refcnt == 1);
984 cpudata->vmcs_refcnt--;
985
986 vmx_vmclear(&cpudata->vmcs_pa);
987 kpreempt_enable();
988 }
989
990 /* -------------------------------------------------------------------------- */
991
992 static void
993 vmx_event_waitexit_enable(struct nvmm_cpu *vcpu, bool nmi)
994 {
995 struct vmx_cpudata *cpudata = vcpu->cpudata;
996 uint64_t ctls1;
997
998 ctls1 = vmx_vmread(VMCS_PROCBASED_CTLS);
999
1000 if (nmi) {
1001 // XXX INT_STATE_NMI?
1002 ctls1 |= PROC_CTLS_NMI_WINDOW_EXITING;
1003 cpudata->nmi_window_exit = true;
1004 } else {
1005 ctls1 |= PROC_CTLS_INT_WINDOW_EXITING;
1006 cpudata->int_window_exit = true;
1007 }
1008
1009 vmx_vmwrite(VMCS_PROCBASED_CTLS, ctls1);
1010 }
1011
1012 static void
1013 vmx_event_waitexit_disable(struct nvmm_cpu *vcpu, bool nmi)
1014 {
1015 struct vmx_cpudata *cpudata = vcpu->cpudata;
1016 uint64_t ctls1;
1017
1018 ctls1 = vmx_vmread(VMCS_PROCBASED_CTLS);
1019
1020 if (nmi) {
1021 ctls1 &= ~PROC_CTLS_NMI_WINDOW_EXITING;
1022 cpudata->nmi_window_exit = false;
1023 } else {
1024 ctls1 &= ~PROC_CTLS_INT_WINDOW_EXITING;
1025 cpudata->int_window_exit = false;
1026 }
1027
1028 vmx_vmwrite(VMCS_PROCBASED_CTLS, ctls1);
1029 }
1030
1031 static inline bool
1032 vmx_excp_has_rf(uint8_t vector)
1033 {
1034 switch (vector) {
1035 case 1: /* #DB */
1036 case 4: /* #OF */
1037 case 8: /* #DF */
1038 case 18: /* #MC */
1039 return false;
1040 default:
1041 return true;
1042 }
1043 }
1044
1045 static inline int
1046 vmx_excp_has_error(uint8_t vector)
1047 {
1048 switch (vector) {
1049 case 8: /* #DF */
1050 case 10: /* #TS */
1051 case 11: /* #NP */
1052 case 12: /* #SS */
1053 case 13: /* #GP */
1054 case 14: /* #PF */
1055 case 17: /* #AC */
1056 case 30: /* #SX */
1057 return 1;
1058 default:
1059 return 0;
1060 }
1061 }
1062
1063 static int
1064 vmx_vcpu_inject(struct nvmm_cpu *vcpu)
1065 {
1066 struct nvmm_comm_page *comm = vcpu->comm;
1067 struct vmx_cpudata *cpudata = vcpu->cpudata;
1068 int type = 0, err = 0, ret = EINVAL;
1069 uint64_t rflags, info, error;
1070 u_int evtype;
1071 uint8_t vector;
1072
1073 evtype = comm->event.type;
1074 vector = comm->event.vector;
1075 error = comm->event.u.excp.error;
1076 __insn_barrier();
1077
1078 vmx_vmcs_enter(vcpu);
1079
1080 switch (evtype) {
1081 case NVMM_VCPU_EVENT_EXCP:
1082 if (vector == 2 || vector >= 32)
1083 goto out;
1084 if (vector == 3 || vector == 0)
1085 goto out;
1086 if (vmx_excp_has_rf(vector)) {
1087 rflags = vmx_vmread(VMCS_GUEST_RFLAGS);
1088 vmx_vmwrite(VMCS_GUEST_RFLAGS, rflags | PSL_RF);
1089 }
1090 type = INTR_TYPE_HW_EXC;
1091 err = vmx_excp_has_error(vector);
1092 break;
1093 case NVMM_VCPU_EVENT_INTR:
1094 type = INTR_TYPE_EXT_INT;
1095 if (vector == 2) {
1096 type = INTR_TYPE_NMI;
1097 vmx_event_waitexit_enable(vcpu, true);
1098 }
1099 err = 0;
1100 break;
1101 default:
1102 goto out;
1103 }
1104
1105 info =
1106 __SHIFTIN((uint64_t)vector, INTR_INFO_VECTOR) |
1107 __SHIFTIN((uint64_t)type, INTR_INFO_TYPE) |
1108 __SHIFTIN((uint64_t)err, INTR_INFO_ERROR) |
1109 __SHIFTIN((uint64_t)1, INTR_INFO_VALID);
1110 vmx_vmwrite(VMCS_ENTRY_INTR_INFO, info);
1111 vmx_vmwrite(VMCS_ENTRY_EXCEPTION_ERROR, error);
1112
1113 cpudata->evt_pending = true;
1114 ret = 0;
1115
1116 out:
1117 vmx_vmcs_leave(vcpu);
1118 return ret;
1119 }
1120
1121 static void
1122 vmx_inject_ud(struct nvmm_cpu *vcpu)
1123 {
1124 struct nvmm_comm_page *comm = vcpu->comm;
1125 int ret __diagused;
1126
1127 comm->event.type = NVMM_VCPU_EVENT_EXCP;
1128 comm->event.vector = 6;
1129 comm->event.u.excp.error = 0;
1130
1131 ret = vmx_vcpu_inject(vcpu);
1132 KASSERT(ret == 0);
1133 }
1134
1135 static void
1136 vmx_inject_gp(struct nvmm_cpu *vcpu)
1137 {
1138 struct nvmm_comm_page *comm = vcpu->comm;
1139 int ret __diagused;
1140
1141 comm->event.type = NVMM_VCPU_EVENT_EXCP;
1142 comm->event.vector = 13;
1143 comm->event.u.excp.error = 0;
1144
1145 ret = vmx_vcpu_inject(vcpu);
1146 KASSERT(ret == 0);
1147 }
1148
1149 static inline int
1150 vmx_vcpu_event_commit(struct nvmm_cpu *vcpu)
1151 {
1152 if (__predict_true(!vcpu->comm->event_commit)) {
1153 return 0;
1154 }
1155 vcpu->comm->event_commit = false;
1156 return vmx_vcpu_inject(vcpu);
1157 }
1158
1159 static inline void
1160 vmx_inkernel_advance(void)
1161 {
1162 uint64_t rip, inslen, intstate, rflags;
1163
1164 /*
1165 * Maybe we should also apply single-stepping and debug exceptions.
1166 * Matters for guest-ring3, because it can execute 'cpuid' under a
1167 * debugger.
1168 */
1169
1170 inslen = vmx_vmread(VMCS_EXIT_INSTRUCTION_LENGTH);
1171 rip = vmx_vmread(VMCS_GUEST_RIP);
1172 vmx_vmwrite(VMCS_GUEST_RIP, rip + inslen);
1173
1174 rflags = vmx_vmread(VMCS_GUEST_RFLAGS);
1175 vmx_vmwrite(VMCS_GUEST_RFLAGS, rflags & ~PSL_RF);
1176
1177 intstate = vmx_vmread(VMCS_GUEST_INTERRUPTIBILITY);
1178 vmx_vmwrite(VMCS_GUEST_INTERRUPTIBILITY,
1179 intstate & ~(INT_STATE_STI|INT_STATE_MOVSS));
1180 }
1181
1182 static void
1183 vmx_exit_invalid(struct nvmm_vcpu_exit *exit, uint64_t code)
1184 {
1185 exit->u.inv.hwcode = code;
1186 exit->reason = NVMM_VCPU_EXIT_INVALID;
1187 }
1188
1189 static void
1190 vmx_exit_exc_nmi(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1191 struct nvmm_vcpu_exit *exit)
1192 {
1193 uint64_t qual;
1194
1195 qual = vmx_vmread(VMCS_EXIT_INTR_INFO);
1196
1197 if ((qual & INTR_INFO_VALID) == 0) {
1198 goto error;
1199 }
1200 if (__SHIFTOUT(qual, INTR_INFO_TYPE) != INTR_TYPE_NMI) {
1201 goto error;
1202 }
1203
1204 exit->reason = NVMM_VCPU_EXIT_NONE;
1205 return;
1206
1207 error:
1208 vmx_exit_invalid(exit, VMCS_EXITCODE_EXC_NMI);
1209 }
1210
1211 #define VMX_CPUID_MAX_BASIC 0x16
1212 #define VMX_CPUID_MAX_HYPERVISOR 0x40000000
1213 #define VMX_CPUID_MAX_EXTENDED 0x80000008
1214 static uint32_t vmx_cpuid_max_basic __read_mostly;
1215 static uint32_t vmx_cpuid_max_extended __read_mostly;
1216
1217 static void
1218 vmx_inkernel_exec_cpuid(struct vmx_cpudata *cpudata, uint64_t eax, uint64_t ecx)
1219 {
1220 u_int descs[4];
1221
1222 x86_cpuid2(eax, ecx, descs);
1223 cpudata->gprs[NVMM_X64_GPR_RAX] = descs[0];
1224 cpudata->gprs[NVMM_X64_GPR_RBX] = descs[1];
1225 cpudata->gprs[NVMM_X64_GPR_RCX] = descs[2];
1226 cpudata->gprs[NVMM_X64_GPR_RDX] = descs[3];
1227 }
1228
1229 static void
1230 vmx_inkernel_handle_cpuid(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1231 uint64_t eax, uint64_t ecx)
1232 {
1233 struct vmx_cpudata *cpudata = vcpu->cpudata;
1234 unsigned int ncpus;
1235 uint64_t cr4;
1236
1237 if (eax < 0x40000000) {
1238 if (__predict_false(eax > vmx_cpuid_max_basic)) {
1239 eax = vmx_cpuid_max_basic;
1240 vmx_inkernel_exec_cpuid(cpudata, eax, ecx);
1241 }
1242 } else if (eax < 0x80000000) {
1243 if (__predict_false(eax > VMX_CPUID_MAX_HYPERVISOR)) {
1244 eax = vmx_cpuid_max_basic;
1245 vmx_inkernel_exec_cpuid(cpudata, eax, ecx);
1246 }
1247 } else {
1248 if (__predict_false(eax > vmx_cpuid_max_extended)) {
1249 eax = vmx_cpuid_max_basic;
1250 vmx_inkernel_exec_cpuid(cpudata, eax, ecx);
1251 }
1252 }
1253
1254 switch (eax) {
1255 case 0x00000000:
1256 cpudata->gprs[NVMM_X64_GPR_RAX] = vmx_cpuid_max_basic;
1257 break;
1258 case 0x00000001:
1259 cpudata->gprs[NVMM_X64_GPR_RAX] &= nvmm_cpuid_00000001.eax;
1260
1261 cpudata->gprs[NVMM_X64_GPR_RBX] &= ~CPUID_LOCAL_APIC_ID;
1262 cpudata->gprs[NVMM_X64_GPR_RBX] |= __SHIFTIN(vcpu->cpuid,
1263 CPUID_LOCAL_APIC_ID);
1264
1265 cpudata->gprs[NVMM_X64_GPR_RCX] &= nvmm_cpuid_00000001.ecx;
1266 cpudata->gprs[NVMM_X64_GPR_RCX] |= CPUID2_RAZ;
1267 if (vmx_procbased_ctls2 & PROC_CTLS2_INVPCID_ENABLE) {
1268 cpudata->gprs[NVMM_X64_GPR_RCX] |= CPUID2_PCID;
1269 }
1270
1271 cpudata->gprs[NVMM_X64_GPR_RDX] &= nvmm_cpuid_00000001.edx;
1272
1273 /* CPUID2_OSXSAVE depends on CR4. */
1274 cr4 = vmx_vmread(VMCS_GUEST_CR4);
1275 if (!(cr4 & CR4_OSXSAVE)) {
1276 cpudata->gprs[NVMM_X64_GPR_RCX] &= ~CPUID2_OSXSAVE;
1277 }
1278 break;
1279 case 0x00000002:
1280 break;
1281 case 0x00000003:
1282 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1283 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1284 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1285 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1286 break;
1287 case 0x00000004: /* Deterministic Cache Parameters */
1288 break; /* TODO? */
1289 case 0x00000005: /* MONITOR/MWAIT */
1290 case 0x00000006: /* Thermal and Power Management */
1291 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1292 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1293 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1294 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1295 break;
1296 case 0x00000007: /* Structured Extended Feature Flags Enumeration */
1297 switch (ecx) {
1298 case 0:
1299 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1300 cpudata->gprs[NVMM_X64_GPR_RBX] &= nvmm_cpuid_00000007.ebx;
1301 cpudata->gprs[NVMM_X64_GPR_RCX] &= nvmm_cpuid_00000007.ecx;
1302 cpudata->gprs[NVMM_X64_GPR_RDX] &= nvmm_cpuid_00000007.edx;
1303 if (vmx_procbased_ctls2 & PROC_CTLS2_INVPCID_ENABLE) {
1304 cpudata->gprs[NVMM_X64_GPR_RBX] |= CPUID_SEF_INVPCID;
1305 }
1306 break;
1307 default:
1308 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1309 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1310 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1311 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1312 break;
1313 }
1314 break;
1315 case 0x00000008: /* Empty */
1316 case 0x00000009: /* Direct Cache Access Information */
1317 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1318 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1319 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1320 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1321 break;
1322 case 0x0000000A: /* Architectural Performance Monitoring */
1323 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1324 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1325 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1326 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1327 break;
1328 case 0x0000000B: /* Extended Topology Enumeration */
1329 switch (ecx) {
1330 case 0: /* Threads */
1331 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1332 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1333 cpudata->gprs[NVMM_X64_GPR_RCX] =
1334 __SHIFTIN(ecx, CPUID_TOP_LVLNUM) |
1335 __SHIFTIN(CPUID_TOP_LVLTYPE_SMT, CPUID_TOP_LVLTYPE);
1336 cpudata->gprs[NVMM_X64_GPR_RDX] = vcpu->cpuid;
1337 break;
1338 case 1: /* Cores */
1339 ncpus = atomic_load_relaxed(&mach->ncpus);
1340 cpudata->gprs[NVMM_X64_GPR_RAX] = ilog2(ncpus);
1341 cpudata->gprs[NVMM_X64_GPR_RBX] = ncpus;
1342 cpudata->gprs[NVMM_X64_GPR_RCX] =
1343 __SHIFTIN(ecx, CPUID_TOP_LVLNUM) |
1344 __SHIFTIN(CPUID_TOP_LVLTYPE_CORE, CPUID_TOP_LVLTYPE);
1345 cpudata->gprs[NVMM_X64_GPR_RDX] = vcpu->cpuid;
1346 break;
1347 default:
1348 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1349 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1350 cpudata->gprs[NVMM_X64_GPR_RCX] = 0; /* LVLTYPE_INVAL */
1351 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1352 break;
1353 }
1354 break;
1355 case 0x0000000C: /* Empty */
1356 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1357 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1358 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1359 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1360 break;
1361 case 0x0000000D: /* Processor Extended State Enumeration */
1362 if (vmx_xcr0_mask == 0) {
1363 break;
1364 }
1365 switch (ecx) {
1366 case 0:
1367 cpudata->gprs[NVMM_X64_GPR_RAX] = vmx_xcr0_mask & 0xFFFFFFFF;
1368 if (cpudata->gxcr0 & XCR0_SSE) {
1369 cpudata->gprs[NVMM_X64_GPR_RBX] = sizeof(struct fxsave);
1370 } else {
1371 cpudata->gprs[NVMM_X64_GPR_RBX] = sizeof(struct save87);
1372 }
1373 cpudata->gprs[NVMM_X64_GPR_RBX] += 64; /* XSAVE header */
1374 cpudata->gprs[NVMM_X64_GPR_RCX] = sizeof(struct fxsave) + 64;
1375 cpudata->gprs[NVMM_X64_GPR_RDX] = vmx_xcr0_mask >> 32;
1376 break;
1377 case 1:
1378 cpudata->gprs[NVMM_X64_GPR_RAX] &=
1379 (CPUID_PES1_XSAVEOPT | CPUID_PES1_XSAVEC |
1380 CPUID_PES1_XGETBV);
1381 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1382 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1383 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1384 break;
1385 default:
1386 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1387 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1388 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1389 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1390 break;
1391 }
1392 break;
1393 case 0x0000000E: /* Empty */
1394 case 0x0000000F: /* Intel RDT Monitoring Enumeration */
1395 case 0x00000010: /* Intel RDT Allocation Enumeration */
1396 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1397 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1398 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1399 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1400 break;
1401 case 0x00000011: /* Empty */
1402 case 0x00000012: /* Intel SGX Capability Enumeration */
1403 case 0x00000013: /* Empty */
1404 case 0x00000014: /* Intel Processor Trace Enumeration */
1405 cpudata->gprs[NVMM_X64_GPR_RAX] = 0;
1406 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1407 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1408 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1409 break;
1410 case 0x00000015: /* TSC and Nominal Core Crystal Clock Information */
1411 case 0x00000016: /* Processor Frequency Information */
1412 break;
1413
1414 case 0x40000000: /* Hypervisor Information */
1415 cpudata->gprs[NVMM_X64_GPR_RAX] = VMX_CPUID_MAX_HYPERVISOR;
1416 cpudata->gprs[NVMM_X64_GPR_RBX] = 0;
1417 cpudata->gprs[NVMM_X64_GPR_RCX] = 0;
1418 cpudata->gprs[NVMM_X64_GPR_RDX] = 0;
1419 memcpy(&cpudata->gprs[NVMM_X64_GPR_RBX], "___ ", 4);
1420 memcpy(&cpudata->gprs[NVMM_X64_GPR_RCX], "NVMM", 4);
1421 memcpy(&cpudata->gprs[NVMM_X64_GPR_RDX], " ___", 4);
1422 break;
1423
1424 case 0x80000000:
1425 cpudata->gprs[NVMM_X64_GPR_RAX] = vmx_cpuid_max_extended;
1426 break;
1427 case 0x80000001:
1428 cpudata->gprs[NVMM_X64_GPR_RAX] &= nvmm_cpuid_80000001.eax;
1429 cpudata->gprs[NVMM_X64_GPR_RBX] &= nvmm_cpuid_80000001.ebx;
1430 cpudata->gprs[NVMM_X64_GPR_RCX] &= nvmm_cpuid_80000001.ecx;
1431 cpudata->gprs[NVMM_X64_GPR_RDX] &= nvmm_cpuid_80000001.edx;
1432 break;
1433 case 0x80000002: /* Processor Brand String */
1434 case 0x80000003: /* Processor Brand String */
1435 case 0x80000004: /* Processor Brand String */
1436 case 0x80000005: /* Reserved Zero */
1437 case 0x80000006: /* Cache Information */
1438 break;
1439 case 0x80000007: /* TSC Information */
1440 cpudata->gprs[NVMM_X64_GPR_RAX] &= nvmm_cpuid_80000007.eax;
1441 cpudata->gprs[NVMM_X64_GPR_RBX] &= nvmm_cpuid_80000007.ebx;
1442 cpudata->gprs[NVMM_X64_GPR_RCX] &= nvmm_cpuid_80000007.ecx;
1443 cpudata->gprs[NVMM_X64_GPR_RDX] &= nvmm_cpuid_80000007.edx;
1444 break;
1445 case 0x80000008: /* Address Sizes */
1446 cpudata->gprs[NVMM_X64_GPR_RAX] &= nvmm_cpuid_80000008.eax;
1447 cpudata->gprs[NVMM_X64_GPR_RBX] &= nvmm_cpuid_80000008.ebx;
1448 cpudata->gprs[NVMM_X64_GPR_RCX] &= nvmm_cpuid_80000008.ecx;
1449 cpudata->gprs[NVMM_X64_GPR_RDX] &= nvmm_cpuid_80000008.edx;
1450 break;
1451
1452 default:
1453 break;
1454 }
1455 }
1456
1457 static void
1458 vmx_exit_insn(struct nvmm_vcpu_exit *exit, uint64_t reason)
1459 {
1460 uint64_t inslen, rip;
1461
1462 inslen = vmx_vmread(VMCS_EXIT_INSTRUCTION_LENGTH);
1463 rip = vmx_vmread(VMCS_GUEST_RIP);
1464 exit->u.insn.npc = rip + inslen;
1465 exit->reason = reason;
1466 }
1467
1468 static void
1469 vmx_exit_cpuid(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1470 struct nvmm_vcpu_exit *exit)
1471 {
1472 struct vmx_cpudata *cpudata = vcpu->cpudata;
1473 struct nvmm_vcpu_conf_cpuid *cpuid;
1474 uint64_t eax, ecx;
1475 size_t i;
1476
1477 eax = cpudata->gprs[NVMM_X64_GPR_RAX];
1478 ecx = cpudata->gprs[NVMM_X64_GPR_RCX];
1479 vmx_inkernel_exec_cpuid(cpudata, eax, ecx);
1480 vmx_inkernel_handle_cpuid(mach, vcpu, eax, ecx);
1481
1482 for (i = 0; i < VMX_NCPUIDS; i++) {
1483 if (!cpudata->cpuidpresent[i]) {
1484 continue;
1485 }
1486 cpuid = &cpudata->cpuid[i];
1487 if (cpuid->leaf != eax) {
1488 continue;
1489 }
1490
1491 if (cpuid->exit) {
1492 vmx_exit_insn(exit, NVMM_VCPU_EXIT_CPUID);
1493 return;
1494 }
1495 KASSERT(cpuid->mask);
1496
1497 /* del */
1498 cpudata->gprs[NVMM_X64_GPR_RAX] &= ~cpuid->u.mask.del.eax;
1499 cpudata->gprs[NVMM_X64_GPR_RBX] &= ~cpuid->u.mask.del.ebx;
1500 cpudata->gprs[NVMM_X64_GPR_RCX] &= ~cpuid->u.mask.del.ecx;
1501 cpudata->gprs[NVMM_X64_GPR_RDX] &= ~cpuid->u.mask.del.edx;
1502
1503 /* set */
1504 cpudata->gprs[NVMM_X64_GPR_RAX] |= cpuid->u.mask.set.eax;
1505 cpudata->gprs[NVMM_X64_GPR_RBX] |= cpuid->u.mask.set.ebx;
1506 cpudata->gprs[NVMM_X64_GPR_RCX] |= cpuid->u.mask.set.ecx;
1507 cpudata->gprs[NVMM_X64_GPR_RDX] |= cpuid->u.mask.set.edx;
1508
1509 break;
1510 }
1511
1512 vmx_inkernel_advance();
1513 exit->reason = NVMM_VCPU_EXIT_NONE;
1514 }
1515
1516 static void
1517 vmx_exit_hlt(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1518 struct nvmm_vcpu_exit *exit)
1519 {
1520 struct vmx_cpudata *cpudata = vcpu->cpudata;
1521 uint64_t rflags;
1522
1523 if (cpudata->int_window_exit) {
1524 rflags = vmx_vmread(VMCS_GUEST_RFLAGS);
1525 if (rflags & PSL_I) {
1526 vmx_event_waitexit_disable(vcpu, false);
1527 }
1528 }
1529
1530 vmx_inkernel_advance();
1531 exit->reason = NVMM_VCPU_EXIT_HALTED;
1532 }
1533
1534 #define VMX_QUAL_CR_NUM __BITS(3,0)
1535 #define VMX_QUAL_CR_TYPE __BITS(5,4)
1536 #define CR_TYPE_WRITE 0
1537 #define CR_TYPE_READ 1
1538 #define CR_TYPE_CLTS 2
1539 #define CR_TYPE_LMSW 3
1540 #define VMX_QUAL_CR_LMSW_OPMEM __BIT(6)
1541 #define VMX_QUAL_CR_GPR __BITS(11,8)
1542 #define VMX_QUAL_CR_LMSW_SRC __BIT(31,16)
1543
1544 static inline int
1545 vmx_check_cr(uint64_t crval, uint64_t fixed0, uint64_t fixed1)
1546 {
1547 /* Bits set to 1 in fixed0 are fixed to 1. */
1548 if ((crval & fixed0) != fixed0) {
1549 return -1;
1550 }
1551 /* Bits set to 0 in fixed1 are fixed to 0. */
1552 if (crval & ~fixed1) {
1553 return -1;
1554 }
1555 return 0;
1556 }
1557
1558 static int
1559 vmx_inkernel_handle_cr0(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1560 uint64_t qual)
1561 {
1562 struct vmx_cpudata *cpudata = vcpu->cpudata;
1563 uint64_t type, gpr, cr0;
1564 uint64_t efer, ctls1;
1565
1566 type = __SHIFTOUT(qual, VMX_QUAL_CR_TYPE);
1567 if (type != CR_TYPE_WRITE) {
1568 return -1;
1569 }
1570
1571 gpr = __SHIFTOUT(qual, VMX_QUAL_CR_GPR);
1572 KASSERT(gpr < 16);
1573
1574 if (gpr == NVMM_X64_GPR_RSP) {
1575 gpr = vmx_vmread(VMCS_GUEST_RSP);
1576 } else {
1577 gpr = cpudata->gprs[gpr];
1578 }
1579
1580 cr0 = gpr | CR0_NE | CR0_ET;
1581 cr0 &= ~(CR0_NW|CR0_CD);
1582
1583 if (vmx_check_cr(cr0, vmx_cr0_fixed0, vmx_cr0_fixed1) == -1) {
1584 return -1;
1585 }
1586
1587 /*
1588 * XXX Handle 32bit PAE paging, need to set PDPTEs, fetched manually
1589 * from CR3.
1590 */
1591
1592 if (cr0 & CR0_PG) {
1593 ctls1 = vmx_vmread(VMCS_ENTRY_CTLS);
1594 efer = vmx_vmread(VMCS_GUEST_IA32_EFER);
1595 if (efer & EFER_LME) {
1596 ctls1 |= ENTRY_CTLS_LONG_MODE;
1597 efer |= EFER_LMA;
1598 } else {
1599 ctls1 &= ~ENTRY_CTLS_LONG_MODE;
1600 efer &= ~EFER_LMA;
1601 }
1602 vmx_vmwrite(VMCS_GUEST_IA32_EFER, efer);
1603 vmx_vmwrite(VMCS_ENTRY_CTLS, ctls1);
1604 }
1605
1606 vmx_vmwrite(VMCS_GUEST_CR0, cr0);
1607 vmx_inkernel_advance();
1608 return 0;
1609 }
1610
1611 static int
1612 vmx_inkernel_handle_cr4(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1613 uint64_t qual)
1614 {
1615 struct vmx_cpudata *cpudata = vcpu->cpudata;
1616 uint64_t type, gpr, cr4;
1617
1618 type = __SHIFTOUT(qual, VMX_QUAL_CR_TYPE);
1619 if (type != CR_TYPE_WRITE) {
1620 return -1;
1621 }
1622
1623 gpr = __SHIFTOUT(qual, VMX_QUAL_CR_GPR);
1624 KASSERT(gpr < 16);
1625
1626 if (gpr == NVMM_X64_GPR_RSP) {
1627 gpr = vmx_vmread(VMCS_GUEST_RSP);
1628 } else {
1629 gpr = cpudata->gprs[gpr];
1630 }
1631
1632 if (gpr & CR4_INVALID) {
1633 return -1;
1634 }
1635 cr4 = gpr | CR4_VMXE;
1636 if (vmx_check_cr(cr4, vmx_cr4_fixed0, vmx_cr4_fixed1) == -1) {
1637 return -1;
1638 }
1639
1640 if ((vmx_vmread(VMCS_GUEST_CR4) ^ cr4) & CR4_TLB_FLUSH) {
1641 cpudata->gtlb_want_flush = true;
1642 }
1643
1644 vmx_vmwrite(VMCS_GUEST_CR4, cr4);
1645 vmx_inkernel_advance();
1646 return 0;
1647 }
1648
1649 static int
1650 vmx_inkernel_handle_cr8(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1651 uint64_t qual, struct nvmm_vcpu_exit *exit)
1652 {
1653 struct vmx_cpudata *cpudata = vcpu->cpudata;
1654 uint64_t type, gpr;
1655 bool write;
1656
1657 type = __SHIFTOUT(qual, VMX_QUAL_CR_TYPE);
1658 if (type == CR_TYPE_WRITE) {
1659 write = true;
1660 } else if (type == CR_TYPE_READ) {
1661 write = false;
1662 } else {
1663 return -1;
1664 }
1665
1666 gpr = __SHIFTOUT(qual, VMX_QUAL_CR_GPR);
1667 KASSERT(gpr < 16);
1668
1669 if (write) {
1670 if (gpr == NVMM_X64_GPR_RSP) {
1671 cpudata->gcr8 = vmx_vmread(VMCS_GUEST_RSP);
1672 } else {
1673 cpudata->gcr8 = cpudata->gprs[gpr];
1674 }
1675 if (cpudata->tpr.exit_changed) {
1676 exit->reason = NVMM_VCPU_EXIT_TPR_CHANGED;
1677 }
1678 } else {
1679 if (gpr == NVMM_X64_GPR_RSP) {
1680 vmx_vmwrite(VMCS_GUEST_RSP, cpudata->gcr8);
1681 } else {
1682 cpudata->gprs[gpr] = cpudata->gcr8;
1683 }
1684 }
1685
1686 vmx_inkernel_advance();
1687 return 0;
1688 }
1689
1690 static void
1691 vmx_exit_cr(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1692 struct nvmm_vcpu_exit *exit)
1693 {
1694 uint64_t qual;
1695 int ret;
1696
1697 exit->reason = NVMM_VCPU_EXIT_NONE;
1698
1699 qual = vmx_vmread(VMCS_EXIT_QUALIFICATION);
1700
1701 switch (__SHIFTOUT(qual, VMX_QUAL_CR_NUM)) {
1702 case 0:
1703 ret = vmx_inkernel_handle_cr0(mach, vcpu, qual);
1704 break;
1705 case 4:
1706 ret = vmx_inkernel_handle_cr4(mach, vcpu, qual);
1707 break;
1708 case 8:
1709 ret = vmx_inkernel_handle_cr8(mach, vcpu, qual, exit);
1710 break;
1711 default:
1712 ret = -1;
1713 break;
1714 }
1715
1716 if (ret == -1) {
1717 vmx_inject_gp(vcpu);
1718 }
1719 }
1720
1721 #define VMX_QUAL_IO_SIZE __BITS(2,0)
1722 #define IO_SIZE_8 0
1723 #define IO_SIZE_16 1
1724 #define IO_SIZE_32 3
1725 #define VMX_QUAL_IO_IN __BIT(3)
1726 #define VMX_QUAL_IO_STR __BIT(4)
1727 #define VMX_QUAL_IO_REP __BIT(5)
1728 #define VMX_QUAL_IO_DX __BIT(6)
1729 #define VMX_QUAL_IO_PORT __BITS(31,16)
1730
1731 #define VMX_INFO_IO_ADRSIZE __BITS(9,7)
1732 #define IO_ADRSIZE_16 0
1733 #define IO_ADRSIZE_32 1
1734 #define IO_ADRSIZE_64 2
1735 #define VMX_INFO_IO_SEG __BITS(17,15)
1736
1737 static void
1738 vmx_exit_io(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1739 struct nvmm_vcpu_exit *exit)
1740 {
1741 uint64_t qual, info, inslen, rip;
1742
1743 qual = vmx_vmread(VMCS_EXIT_QUALIFICATION);
1744 info = vmx_vmread(VMCS_EXIT_INSTRUCTION_INFO);
1745
1746 exit->reason = NVMM_VCPU_EXIT_IO;
1747
1748 exit->u.io.in = (qual & VMX_QUAL_IO_IN) != 0;
1749 exit->u.io.port = __SHIFTOUT(qual, VMX_QUAL_IO_PORT);
1750
1751 KASSERT(__SHIFTOUT(info, VMX_INFO_IO_SEG) < 6);
1752 exit->u.io.seg = __SHIFTOUT(info, VMX_INFO_IO_SEG);
1753
1754 if (__SHIFTOUT(info, VMX_INFO_IO_ADRSIZE) == IO_ADRSIZE_64) {
1755 exit->u.io.address_size = 8;
1756 } else if (__SHIFTOUT(info, VMX_INFO_IO_ADRSIZE) == IO_ADRSIZE_32) {
1757 exit->u.io.address_size = 4;
1758 } else if (__SHIFTOUT(info, VMX_INFO_IO_ADRSIZE) == IO_ADRSIZE_16) {
1759 exit->u.io.address_size = 2;
1760 }
1761
1762 if (__SHIFTOUT(qual, VMX_QUAL_IO_SIZE) == IO_SIZE_32) {
1763 exit->u.io.operand_size = 4;
1764 } else if (__SHIFTOUT(qual, VMX_QUAL_IO_SIZE) == IO_SIZE_16) {
1765 exit->u.io.operand_size = 2;
1766 } else if (__SHIFTOUT(qual, VMX_QUAL_IO_SIZE) == IO_SIZE_8) {
1767 exit->u.io.operand_size = 1;
1768 }
1769
1770 exit->u.io.rep = (qual & VMX_QUAL_IO_REP) != 0;
1771 exit->u.io.str = (qual & VMX_QUAL_IO_STR) != 0;
1772
1773 if (exit->u.io.in && exit->u.io.str) {
1774 exit->u.io.seg = NVMM_X64_SEG_ES;
1775 }
1776
1777 inslen = vmx_vmread(VMCS_EXIT_INSTRUCTION_LENGTH);
1778 rip = vmx_vmread(VMCS_GUEST_RIP);
1779 exit->u.io.npc = rip + inslen;
1780
1781 vmx_vcpu_state_provide(vcpu,
1782 NVMM_X64_STATE_GPRS | NVMM_X64_STATE_SEGS |
1783 NVMM_X64_STATE_CRS | NVMM_X64_STATE_MSRS);
1784 }
1785
1786 static const uint64_t msr_ignore_list[] = {
1787 MSR_BIOS_SIGN,
1788 MSR_IA32_PLATFORM_ID
1789 };
1790
1791 static bool
1792 vmx_inkernel_handle_msr(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1793 struct nvmm_vcpu_exit *exit)
1794 {
1795 struct vmx_cpudata *cpudata = vcpu->cpudata;
1796 uint64_t val;
1797 size_t i;
1798
1799 if (exit->reason == NVMM_VCPU_EXIT_RDMSR) {
1800 if (exit->u.rdmsr.msr == MSR_CR_PAT) {
1801 val = vmx_vmread(VMCS_GUEST_IA32_PAT);
1802 cpudata->gprs[NVMM_X64_GPR_RAX] = (val & 0xFFFFFFFF);
1803 cpudata->gprs[NVMM_X64_GPR_RDX] = (val >> 32);
1804 goto handled;
1805 }
1806 if (exit->u.rdmsr.msr == MSR_MISC_ENABLE) {
1807 val = cpudata->gmsr_misc_enable;
1808 cpudata->gprs[NVMM_X64_GPR_RAX] = (val & 0xFFFFFFFF);
1809 cpudata->gprs[NVMM_X64_GPR_RDX] = (val >> 32);
1810 goto handled;
1811 }
1812 if (exit->u.rdmsr.msr == MSR_IA32_ARCH_CAPABILITIES) {
1813 u_int descs[4];
1814 if (cpuid_level < 7) {
1815 goto error;
1816 }
1817 x86_cpuid(7, descs);
1818 if (!(descs[3] & CPUID_SEF_ARCH_CAP)) {
1819 goto error;
1820 }
1821 val = rdmsr(MSR_IA32_ARCH_CAPABILITIES);
1822 val &= (IA32_ARCH_RDCL_NO |
1823 IA32_ARCH_SSB_NO |
1824 IA32_ARCH_MDS_NO |
1825 IA32_ARCH_TAA_NO);
1826 cpudata->gprs[NVMM_X64_GPR_RAX] = (val & 0xFFFFFFFF);
1827 cpudata->gprs[NVMM_X64_GPR_RDX] = (val >> 32);
1828 goto handled;
1829 }
1830 for (i = 0; i < __arraycount(msr_ignore_list); i++) {
1831 if (msr_ignore_list[i] != exit->u.rdmsr.msr)
1832 continue;
1833 val = 0;
1834 cpudata->gprs[NVMM_X64_GPR_RAX] = (val & 0xFFFFFFFF);
1835 cpudata->gprs[NVMM_X64_GPR_RDX] = (val >> 32);
1836 goto handled;
1837 }
1838 } else {
1839 if (exit->u.wrmsr.msr == MSR_TSC) {
1840 cpudata->gtsc = exit->u.wrmsr.val;
1841 cpudata->gtsc_want_update = true;
1842 goto handled;
1843 }
1844 if (exit->u.wrmsr.msr == MSR_CR_PAT) {
1845 val = exit->u.wrmsr.val;
1846 if (__predict_false(!nvmm_x86_pat_validate(val))) {
1847 goto error;
1848 }
1849 vmx_vmwrite(VMCS_GUEST_IA32_PAT, val);
1850 goto handled;
1851 }
1852 if (exit->u.wrmsr.msr == MSR_MISC_ENABLE) {
1853 /* Don't care. */
1854 goto handled;
1855 }
1856 for (i = 0; i < __arraycount(msr_ignore_list); i++) {
1857 if (msr_ignore_list[i] != exit->u.wrmsr.msr)
1858 continue;
1859 goto handled;
1860 }
1861 }
1862
1863 return false;
1864
1865 handled:
1866 vmx_inkernel_advance();
1867 return true;
1868
1869 error:
1870 vmx_inject_gp(vcpu);
1871 return true;
1872 }
1873
1874 static void
1875 vmx_exit_rdmsr(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1876 struct nvmm_vcpu_exit *exit)
1877 {
1878 struct vmx_cpudata *cpudata = vcpu->cpudata;
1879 uint64_t inslen, rip;
1880
1881 exit->reason = NVMM_VCPU_EXIT_RDMSR;
1882 exit->u.rdmsr.msr = (cpudata->gprs[NVMM_X64_GPR_RCX] & 0xFFFFFFFF);
1883
1884 if (vmx_inkernel_handle_msr(mach, vcpu, exit)) {
1885 exit->reason = NVMM_VCPU_EXIT_NONE;
1886 return;
1887 }
1888
1889 inslen = vmx_vmread(VMCS_EXIT_INSTRUCTION_LENGTH);
1890 rip = vmx_vmread(VMCS_GUEST_RIP);
1891 exit->u.rdmsr.npc = rip + inslen;
1892
1893 vmx_vcpu_state_provide(vcpu, NVMM_X64_STATE_GPRS);
1894 }
1895
1896 static void
1897 vmx_exit_wrmsr(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1898 struct nvmm_vcpu_exit *exit)
1899 {
1900 struct vmx_cpudata *cpudata = vcpu->cpudata;
1901 uint64_t rdx, rax, inslen, rip;
1902
1903 rdx = cpudata->gprs[NVMM_X64_GPR_RDX];
1904 rax = cpudata->gprs[NVMM_X64_GPR_RAX];
1905
1906 exit->reason = NVMM_VCPU_EXIT_WRMSR;
1907 exit->u.wrmsr.msr = (cpudata->gprs[NVMM_X64_GPR_RCX] & 0xFFFFFFFF);
1908 exit->u.wrmsr.val = (rdx << 32) | (rax & 0xFFFFFFFF);
1909
1910 if (vmx_inkernel_handle_msr(mach, vcpu, exit)) {
1911 exit->reason = NVMM_VCPU_EXIT_NONE;
1912 return;
1913 }
1914
1915 inslen = vmx_vmread(VMCS_EXIT_INSTRUCTION_LENGTH);
1916 rip = vmx_vmread(VMCS_GUEST_RIP);
1917 exit->u.wrmsr.npc = rip + inslen;
1918
1919 vmx_vcpu_state_provide(vcpu, NVMM_X64_STATE_GPRS);
1920 }
1921
1922 static void
1923 vmx_exit_xsetbv(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1924 struct nvmm_vcpu_exit *exit)
1925 {
1926 struct vmx_cpudata *cpudata = vcpu->cpudata;
1927 uint64_t val;
1928
1929 exit->reason = NVMM_VCPU_EXIT_NONE;
1930
1931 val = (cpudata->gprs[NVMM_X64_GPR_RDX] << 32) |
1932 (cpudata->gprs[NVMM_X64_GPR_RAX] & 0xFFFFFFFF);
1933
1934 if (__predict_false(cpudata->gprs[NVMM_X64_GPR_RCX] != 0)) {
1935 goto error;
1936 } else if (__predict_false((val & ~vmx_xcr0_mask) != 0)) {
1937 goto error;
1938 } else if (__predict_false((val & XCR0_X87) == 0)) {
1939 goto error;
1940 }
1941
1942 cpudata->gxcr0 = val;
1943
1944 vmx_inkernel_advance();
1945 return;
1946
1947 error:
1948 vmx_inject_gp(vcpu);
1949 }
1950
1951 #define VMX_EPT_VIOLATION_READ __BIT(0)
1952 #define VMX_EPT_VIOLATION_WRITE __BIT(1)
1953 #define VMX_EPT_VIOLATION_EXECUTE __BIT(2)
1954
1955 static void
1956 vmx_exit_epf(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
1957 struct nvmm_vcpu_exit *exit)
1958 {
1959 uint64_t perm;
1960 gpaddr_t gpa;
1961
1962 gpa = vmx_vmread(VMCS_GUEST_PHYSICAL_ADDRESS);
1963
1964 exit->reason = NVMM_VCPU_EXIT_MEMORY;
1965 perm = vmx_vmread(VMCS_EXIT_QUALIFICATION);
1966 if (perm & VMX_EPT_VIOLATION_WRITE)
1967 exit->u.mem.prot = PROT_WRITE;
1968 else if (perm & VMX_EPT_VIOLATION_EXECUTE)
1969 exit->u.mem.prot = PROT_EXEC;
1970 else
1971 exit->u.mem.prot = PROT_READ;
1972 exit->u.mem.gpa = gpa;
1973 exit->u.mem.inst_len = 0;
1974
1975 vmx_vcpu_state_provide(vcpu,
1976 NVMM_X64_STATE_GPRS | NVMM_X64_STATE_SEGS |
1977 NVMM_X64_STATE_CRS | NVMM_X64_STATE_MSRS);
1978 }
1979
1980 /* -------------------------------------------------------------------------- */
1981
1982 static void
1983 vmx_vcpu_guest_fpu_enter(struct nvmm_cpu *vcpu)
1984 {
1985 struct vmx_cpudata *cpudata = vcpu->cpudata;
1986
1987 cpudata->ts_set = (rcr0() & CR0_TS) != 0;
1988
1989 fpu_area_save(&cpudata->hfpu, vmx_xcr0_mask);
1990 fpu_area_restore(&cpudata->gfpu, vmx_xcr0_mask);
1991
1992 if (vmx_xcr0_mask != 0) {
1993 cpudata->hxcr0 = rdxcr(0);
1994 wrxcr(0, cpudata->gxcr0);
1995 }
1996 }
1997
1998 static void
1999 vmx_vcpu_guest_fpu_leave(struct nvmm_cpu *vcpu)
2000 {
2001 struct vmx_cpudata *cpudata = vcpu->cpudata;
2002
2003 if (vmx_xcr0_mask != 0) {
2004 cpudata->gxcr0 = rdxcr(0);
2005 wrxcr(0, cpudata->hxcr0);
2006 }
2007
2008 fpu_area_save(&cpudata->gfpu, vmx_xcr0_mask);
2009 fpu_area_restore(&cpudata->hfpu, vmx_xcr0_mask);
2010
2011 if (cpudata->ts_set) {
2012 stts();
2013 }
2014 }
2015
2016 static void
2017 vmx_vcpu_guest_dbregs_enter(struct nvmm_cpu *vcpu)
2018 {
2019 struct vmx_cpudata *cpudata = vcpu->cpudata;
2020
2021 x86_dbregs_save(curlwp);
2022
2023 ldr7(0);
2024
2025 ldr0(cpudata->drs[NVMM_X64_DR_DR0]);
2026 ldr1(cpudata->drs[NVMM_X64_DR_DR1]);
2027 ldr2(cpudata->drs[NVMM_X64_DR_DR2]);
2028 ldr3(cpudata->drs[NVMM_X64_DR_DR3]);
2029 ldr6(cpudata->drs[NVMM_X64_DR_DR6]);
2030 }
2031
2032 static void
2033 vmx_vcpu_guest_dbregs_leave(struct nvmm_cpu *vcpu)
2034 {
2035 struct vmx_cpudata *cpudata = vcpu->cpudata;
2036
2037 cpudata->drs[NVMM_X64_DR_DR0] = rdr0();
2038 cpudata->drs[NVMM_X64_DR_DR1] = rdr1();
2039 cpudata->drs[NVMM_X64_DR_DR2] = rdr2();
2040 cpudata->drs[NVMM_X64_DR_DR3] = rdr3();
2041 cpudata->drs[NVMM_X64_DR_DR6] = rdr6();
2042
2043 x86_dbregs_restore(curlwp);
2044 }
2045
2046 static void
2047 vmx_vcpu_guest_misc_enter(struct nvmm_cpu *vcpu)
2048 {
2049 struct vmx_cpudata *cpudata = vcpu->cpudata;
2050
2051 /* This gets restored automatically by the CPU. */
2052 vmx_vmwrite(VMCS_HOST_FS_BASE, rdmsr(MSR_FSBASE));
2053 vmx_vmwrite(VMCS_HOST_CR3, rcr3());
2054 vmx_vmwrite(VMCS_HOST_CR4, rcr4());
2055
2056 cpudata->kernelgsbase = rdmsr(MSR_KERNELGSBASE);
2057 }
2058
2059 static void
2060 vmx_vcpu_guest_misc_leave(struct nvmm_cpu *vcpu)
2061 {
2062 struct vmx_cpudata *cpudata = vcpu->cpudata;
2063
2064 wrmsr(MSR_STAR, cpudata->star);
2065 wrmsr(MSR_LSTAR, cpudata->lstar);
2066 wrmsr(MSR_CSTAR, cpudata->cstar);
2067 wrmsr(MSR_SFMASK, cpudata->sfmask);
2068 wrmsr(MSR_KERNELGSBASE, cpudata->kernelgsbase);
2069 }
2070
2071 /* -------------------------------------------------------------------------- */
2072
2073 #define VMX_INVVPID_ADDRESS 0
2074 #define VMX_INVVPID_CONTEXT 1
2075 #define VMX_INVVPID_ALL 2
2076 #define VMX_INVVPID_CONTEXT_NOGLOBAL 3
2077
2078 #define VMX_INVEPT_CONTEXT 1
2079 #define VMX_INVEPT_ALL 2
2080
2081 static inline void
2082 vmx_gtlb_catchup(struct nvmm_cpu *vcpu, int hcpu)
2083 {
2084 struct vmx_cpudata *cpudata = vcpu->cpudata;
2085
2086 if (vcpu->hcpu_last != hcpu) {
2087 cpudata->gtlb_want_flush = true;
2088 }
2089 }
2090
2091 static inline void
2092 vmx_htlb_catchup(struct nvmm_cpu *vcpu, int hcpu)
2093 {
2094 struct vmx_cpudata *cpudata = vcpu->cpudata;
2095 struct ept_desc ept_desc;
2096
2097 if (__predict_true(!kcpuset_isset(cpudata->htlb_want_flush, hcpu))) {
2098 return;
2099 }
2100
2101 ept_desc.eptp = vmx_vmread(VMCS_EPTP);
2102 ept_desc.mbz = 0;
2103 vmx_invept(vmx_ept_flush_op, &ept_desc);
2104 kcpuset_clear(cpudata->htlb_want_flush, hcpu);
2105 }
2106
2107 static inline uint64_t
2108 vmx_htlb_flush(struct vmx_machdata *machdata, struct vmx_cpudata *cpudata)
2109 {
2110 struct ept_desc ept_desc;
2111 uint64_t machgen;
2112
2113 machgen = machdata->mach_htlb_gen;
2114 if (__predict_true(machgen == cpudata->vcpu_htlb_gen)) {
2115 return machgen;
2116 }
2117
2118 kcpuset_copy(cpudata->htlb_want_flush, kcpuset_running);
2119
2120 ept_desc.eptp = vmx_vmread(VMCS_EPTP);
2121 ept_desc.mbz = 0;
2122 vmx_invept(vmx_ept_flush_op, &ept_desc);
2123
2124 return machgen;
2125 }
2126
2127 static inline void
2128 vmx_htlb_flush_ack(struct vmx_cpudata *cpudata, uint64_t machgen)
2129 {
2130 cpudata->vcpu_htlb_gen = machgen;
2131 kcpuset_clear(cpudata->htlb_want_flush, cpu_number());
2132 }
2133
2134 static inline void
2135 vmx_exit_evt(struct vmx_cpudata *cpudata)
2136 {
2137 uint64_t info, err, inslen;
2138
2139 cpudata->evt_pending = false;
2140
2141 info = vmx_vmread(VMCS_IDT_VECTORING_INFO);
2142 if (__predict_true((info & INTR_INFO_VALID) == 0)) {
2143 return;
2144 }
2145 err = vmx_vmread(VMCS_IDT_VECTORING_ERROR);
2146
2147 vmx_vmwrite(VMCS_ENTRY_INTR_INFO, info);
2148 vmx_vmwrite(VMCS_ENTRY_EXCEPTION_ERROR, err);
2149
2150 switch (__SHIFTOUT(info, INTR_INFO_TYPE)) {
2151 case INTR_TYPE_SW_INT:
2152 case INTR_TYPE_PRIV_SW_EXC:
2153 case INTR_TYPE_SW_EXC:
2154 inslen = vmx_vmread(VMCS_EXIT_INSTRUCTION_LENGTH);
2155 vmx_vmwrite(VMCS_ENTRY_INSTRUCTION_LENGTH, inslen);
2156 }
2157
2158 cpudata->evt_pending = true;
2159 }
2160
2161 static int
2162 vmx_vcpu_run(struct nvmm_machine *mach, struct nvmm_cpu *vcpu,
2163 struct nvmm_vcpu_exit *exit)
2164 {
2165 struct nvmm_comm_page *comm = vcpu->comm;
2166 struct vmx_machdata *machdata = mach->machdata;
2167 struct vmx_cpudata *cpudata = vcpu->cpudata;
2168 struct vpid_desc vpid_desc;
2169 struct cpu_info *ci;
2170 uint64_t exitcode;
2171 uint64_t intstate;
2172 uint64_t machgen;
2173 int hcpu, s, ret;
2174 bool launched;
2175
2176 vmx_vmcs_enter(vcpu);
2177
2178 vmx_vcpu_state_commit(vcpu);
2179 comm->state_cached = 0;
2180
2181 if (__predict_false(vmx_vcpu_event_commit(vcpu) != 0)) {
2182 vmx_vmcs_leave(vcpu);
2183 return EINVAL;
2184 }
2185
2186 ci = curcpu();
2187 hcpu = cpu_number();
2188 launched = cpudata->vmcs_launched;
2189
2190 vmx_gtlb_catchup(vcpu, hcpu);
2191 vmx_htlb_catchup(vcpu, hcpu);
2192
2193 if (vcpu->hcpu_last != hcpu) {
2194 vmx_vmwrite(VMCS_HOST_TR_SELECTOR, ci->ci_tss_sel);
2195 vmx_vmwrite(VMCS_HOST_TR_BASE, (uint64_t)ci->ci_tss);
2196 vmx_vmwrite(VMCS_HOST_GDTR_BASE, (uint64_t)ci->ci_gdt);
2197 vmx_vmwrite(VMCS_HOST_GS_BASE, rdmsr(MSR_GSBASE));
2198 cpudata->gtsc_want_update = true;
2199 vcpu->hcpu_last = hcpu;
2200 }
2201
2202 vmx_vcpu_guest_dbregs_enter(vcpu);
2203 vmx_vcpu_guest_misc_enter(vcpu);
2204
2205 while (1) {
2206 if (cpudata->gtlb_want_flush) {
2207 vpid_desc.vpid = cpudata->asid;
2208 vpid_desc.addr = 0;
2209 vmx_invvpid(vmx_tlb_flush_op, &vpid_desc);
2210 cpudata->gtlb_want_flush = false;
2211 }
2212
2213 if (__predict_false(cpudata->gtsc_want_update)) {
2214 vmx_vmwrite(VMCS_TSC_OFFSET, cpudata->gtsc - rdtsc());
2215 cpudata->gtsc_want_update = false;
2216 }
2217
2218 s = splhigh();
2219 machgen = vmx_htlb_flush(machdata, cpudata);
2220 vmx_vcpu_guest_fpu_enter(vcpu);
2221 lcr2(cpudata->gcr2);
2222 if (launched) {
2223 ret = vmx_vmresume(cpudata->gprs);
2224 } else {
2225 ret = vmx_vmlaunch(cpudata->gprs);
2226 }
2227 cpudata->gcr2 = rcr2();
2228 vmx_vcpu_guest_fpu_leave(vcpu);
2229 vmx_htlb_flush_ack(cpudata, machgen);
2230 splx(s);
2231
2232 if (__predict_false(ret != 0)) {
2233 vmx_exit_invalid(exit, -1);
2234 break;
2235 }
2236 vmx_exit_evt(cpudata);
2237
2238 launched = true;
2239
2240 exitcode = vmx_vmread(VMCS_EXIT_REASON);
2241 exitcode &= __BITS(15,0);
2242
2243 switch (exitcode) {
2244 case VMCS_EXITCODE_EXC_NMI:
2245 vmx_exit_exc_nmi(mach, vcpu, exit);
2246 break;
2247 case VMCS_EXITCODE_EXT_INT:
2248 exit->reason = NVMM_VCPU_EXIT_NONE;
2249 break;
2250 case VMCS_EXITCODE_CPUID:
2251 vmx_exit_cpuid(mach, vcpu, exit);
2252 break;
2253 case VMCS_EXITCODE_HLT:
2254 vmx_exit_hlt(mach, vcpu, exit);
2255 break;
2256 case VMCS_EXITCODE_CR:
2257 vmx_exit_cr(mach, vcpu, exit);
2258 break;
2259 case VMCS_EXITCODE_IO:
2260 vmx_exit_io(mach, vcpu, exit);
2261 break;
2262 case VMCS_EXITCODE_RDMSR:
2263 vmx_exit_rdmsr(mach, vcpu, exit);
2264 break;
2265 case VMCS_EXITCODE_WRMSR:
2266 vmx_exit_wrmsr(mach, vcpu, exit);
2267 break;
2268 case VMCS_EXITCODE_SHUTDOWN:
2269 exit->reason = NVMM_VCPU_EXIT_SHUTDOWN;
2270 break;
2271 case VMCS_EXITCODE_MONITOR:
2272 vmx_exit_insn(exit, NVMM_VCPU_EXIT_MONITOR);
2273 break;
2274 case VMCS_EXITCODE_MWAIT:
2275 vmx_exit_insn(exit, NVMM_VCPU_EXIT_MWAIT);
2276 break;
2277 case VMCS_EXITCODE_XSETBV:
2278 vmx_exit_xsetbv(mach, vcpu, exit);
2279 break;
2280 case VMCS_EXITCODE_RDPMC:
2281 case VMCS_EXITCODE_RDTSCP:
2282 case VMCS_EXITCODE_INVVPID:
2283 case VMCS_EXITCODE_INVEPT:
2284 case VMCS_EXITCODE_VMCALL:
2285 case VMCS_EXITCODE_VMCLEAR:
2286 case VMCS_EXITCODE_VMLAUNCH:
2287 case VMCS_EXITCODE_VMPTRLD:
2288 case VMCS_EXITCODE_VMPTRST:
2289 case VMCS_EXITCODE_VMREAD:
2290 case VMCS_EXITCODE_VMRESUME:
2291 case VMCS_EXITCODE_VMWRITE:
2292 case VMCS_EXITCODE_VMXOFF:
2293 case VMCS_EXITCODE_VMXON:
2294 vmx_inject_ud(vcpu);
2295 exit->reason = NVMM_VCPU_EXIT_NONE;
2296 break;
2297 case VMCS_EXITCODE_EPT_VIOLATION:
2298 vmx_exit_epf(mach, vcpu, exit);
2299 break;
2300 case VMCS_EXITCODE_INT_WINDOW:
2301 vmx_event_waitexit_disable(vcpu, false);
2302 exit->reason = NVMM_VCPU_EXIT_INT_READY;
2303 break;
2304 case VMCS_EXITCODE_NMI_WINDOW:
2305 vmx_event_waitexit_disable(vcpu, true);
2306 exit->reason = NVMM_VCPU_EXIT_NMI_READY;
2307 break;
2308 default:
2309 vmx_exit_invalid(exit, exitcode);
2310 break;
2311 }
2312
2313 /* If no reason to return to userland, keep rolling. */
2314 if (nvmm_return_needed()) {
2315 break;
2316 }
2317 if (exit->reason != NVMM_VCPU_EXIT_NONE) {
2318 break;
2319 }
2320 }
2321
2322 cpudata->vmcs_launched = launched;
2323
2324 cpudata->gtsc = vmx_vmread(VMCS_TSC_OFFSET) + rdtsc();
2325
2326 vmx_vcpu_guest_misc_leave(vcpu);
2327 vmx_vcpu_guest_dbregs_leave(vcpu);
2328
2329 exit->exitstate.rflags = vmx_vmread(VMCS_GUEST_RFLAGS);
2330 exit->exitstate.cr8 = cpudata->gcr8;
2331 intstate = vmx_vmread(VMCS_GUEST_INTERRUPTIBILITY);
2332 exit->exitstate.int_shadow =
2333 (intstate & (INT_STATE_STI|INT_STATE_MOVSS)) != 0;
2334 exit->exitstate.int_window_exiting = cpudata->int_window_exit;
2335 exit->exitstate.nmi_window_exiting = cpudata->nmi_window_exit;
2336 exit->exitstate.evt_pending = cpudata->evt_pending;
2337
2338 vmx_vmcs_leave(vcpu);
2339
2340 return 0;
2341 }
2342
2343 /* -------------------------------------------------------------------------- */
2344
2345 static int
2346 vmx_memalloc(paddr_t *pa, vaddr_t *va, size_t npages)
2347 {
2348 struct pglist pglist;
2349 paddr_t _pa;
2350 vaddr_t _va;
2351 size_t i;
2352 int ret;
2353
2354 ret = uvm_pglistalloc(npages * PAGE_SIZE, 0, ~0UL, PAGE_SIZE, 0,
2355 &pglist, 1, 0);
2356 if (ret != 0)
2357 return ENOMEM;
2358 _pa = VM_PAGE_TO_PHYS(TAILQ_FIRST(&pglist));
2359 _va = uvm_km_alloc(kernel_map, npages * PAGE_SIZE, 0,
2360 UVM_KMF_VAONLY | UVM_KMF_NOWAIT);
2361 if (_va == 0)
2362 goto error;
2363
2364 for (i = 0; i < npages; i++) {
2365 pmap_kenter_pa(_va + i * PAGE_SIZE, _pa + i * PAGE_SIZE,
2366 VM_PROT_READ | VM_PROT_WRITE, PMAP_WRITE_BACK);
2367 }
2368 pmap_update(pmap_kernel());
2369
2370 memset((void *)_va, 0, npages * PAGE_SIZE);
2371
2372 *pa = _pa;
2373 *va = _va;
2374 return 0;
2375
2376 error:
2377 for (i = 0; i < npages; i++) {
2378 uvm_pagefree(PHYS_TO_VM_PAGE(_pa + i * PAGE_SIZE));
2379 }
2380 return ENOMEM;
2381 }
2382
2383 static void
2384 vmx_memfree(paddr_t pa, vaddr_t va, size_t npages)
2385 {
2386 size_t i;
2387
2388 pmap_kremove(va, npages * PAGE_SIZE);
2389 pmap_update(pmap_kernel());
2390 uvm_km_free(kernel_map, va, npages * PAGE_SIZE, UVM_KMF_VAONLY);
2391 for (i = 0; i < npages; i++) {
2392 uvm_pagefree(PHYS_TO_VM_PAGE(pa + i * PAGE_SIZE));
2393 }
2394 }
2395
2396 /* -------------------------------------------------------------------------- */
2397
2398 static void
2399 vmx_vcpu_msr_allow(uint8_t *bitmap, uint64_t msr, bool read, bool write)
2400 {
2401 uint64_t byte;
2402 uint8_t bitoff;
2403
2404 if (msr < 0x00002000) {
2405 /* Range 1 */
2406 byte = ((msr - 0x00000000) / 8) + 0;
2407 } else if (msr >= 0xC0000000 && msr < 0xC0002000) {
2408 /* Range 2 */
2409 byte = ((msr - 0xC0000000) / 8) + 1024;
2410 } else {
2411 panic("%s: wrong range", __func__);
2412 }
2413
2414 bitoff = (msr & 0x7);
2415
2416 if (read) {
2417 bitmap[byte] &= ~__BIT(bitoff);
2418 }
2419 if (write) {
2420 bitmap[2048 + byte] &= ~__BIT(bitoff);
2421 }
2422 }
2423
2424 #define VMX_SEG_ATTRIB_TYPE __BITS(3,0)
2425 #define VMX_SEG_ATTRIB_S __BIT(4)
2426 #define VMX_SEG_ATTRIB_DPL __BITS(6,5)
2427 #define VMX_SEG_ATTRIB_P __BIT(7)
2428 #define VMX_SEG_ATTRIB_AVL __BIT(12)
2429 #define VMX_SEG_ATTRIB_L __BIT(13)
2430 #define VMX_SEG_ATTRIB_DEF __BIT(14)
2431 #define VMX_SEG_ATTRIB_G __BIT(15)
2432 #define VMX_SEG_ATTRIB_UNUSABLE __BIT(16)
2433
2434 static void
2435 vmx_vcpu_setstate_seg(const struct nvmm_x64_state_seg *segs, int idx)
2436 {
2437 uint64_t attrib;
2438
2439 attrib =
2440 __SHIFTIN(segs[idx].attrib.type, VMX_SEG_ATTRIB_TYPE) |
2441 __SHIFTIN(segs[idx].attrib.s, VMX_SEG_ATTRIB_S) |
2442 __SHIFTIN(segs[idx].attrib.dpl, VMX_SEG_ATTRIB_DPL) |
2443 __SHIFTIN(segs[idx].attrib.p, VMX_SEG_ATTRIB_P) |
2444 __SHIFTIN(segs[idx].attrib.avl, VMX_SEG_ATTRIB_AVL) |
2445 __SHIFTIN(segs[idx].attrib.l, VMX_SEG_ATTRIB_L) |
2446 __SHIFTIN(segs[idx].attrib.def, VMX_SEG_ATTRIB_DEF) |
2447 __SHIFTIN(segs[idx].attrib.g, VMX_SEG_ATTRIB_G) |
2448 (!segs[idx].attrib.p ? VMX_SEG_ATTRIB_UNUSABLE : 0);
2449
2450 if (idx != NVMM_X64_SEG_GDT && idx != NVMM_X64_SEG_IDT) {
2451 vmx_vmwrite(vmx_guest_segs[idx].selector, segs[idx].selector);
2452 vmx_vmwrite(vmx_guest_segs[idx].attrib, attrib);
2453 }
2454 vmx_vmwrite(vmx_guest_segs[idx].limit, segs[idx].limit);
2455 vmx_vmwrite(vmx_guest_segs[idx].base, segs[idx].base);
2456 }
2457
2458 static void
2459 vmx_vcpu_getstate_seg(struct nvmm_x64_state_seg *segs, int idx)
2460 {
2461 uint64_t selector = 0, attrib = 0, base, limit;
2462
2463 if (idx != NVMM_X64_SEG_GDT && idx != NVMM_X64_SEG_IDT) {
2464 selector = vmx_vmread(vmx_guest_segs[idx].selector);
2465 attrib = vmx_vmread(vmx_guest_segs[idx].attrib);
2466 }
2467 limit = vmx_vmread(vmx_guest_segs[idx].limit);
2468 base = vmx_vmread(vmx_guest_segs[idx].base);
2469
2470 segs[idx].selector = selector;
2471 segs[idx].limit = limit;
2472 segs[idx].base = base;
2473 segs[idx].attrib.type = __SHIFTOUT(attrib, VMX_SEG_ATTRIB_TYPE);
2474 segs[idx].attrib.s = __SHIFTOUT(attrib, VMX_SEG_ATTRIB_S);
2475 segs[idx].attrib.dpl = __SHIFTOUT(attrib, VMX_SEG_ATTRIB_DPL);
2476 segs[idx].attrib.p = __SHIFTOUT(attrib, VMX_SEG_ATTRIB_P);
2477 segs[idx].attrib.avl = __SHIFTOUT(attrib, VMX_SEG_ATTRIB_AVL);
2478 segs[idx].attrib.l = __SHIFTOUT(attrib, VMX_SEG_ATTRIB_L);
2479 segs[idx].attrib.def = __SHIFTOUT(attrib, VMX_SEG_ATTRIB_DEF);
2480 segs[idx].attrib.g = __SHIFTOUT(attrib, VMX_SEG_ATTRIB_G);
2481 if (attrib & VMX_SEG_ATTRIB_UNUSABLE) {
2482 segs[idx].attrib.p = 0;
2483 }
2484 }
2485
2486 static inline bool
2487 vmx_state_tlb_flush(const struct nvmm_x64_state *state, uint64_t flags)
2488 {
2489 uint64_t cr0, cr3, cr4, efer;
2490
2491 if (flags & NVMM_X64_STATE_CRS) {
2492 cr0 = vmx_vmread(VMCS_GUEST_CR0);
2493 if ((cr0 ^ state->crs[NVMM_X64_CR_CR0]) & CR0_TLB_FLUSH) {
2494 return true;
2495 }
2496 cr3 = vmx_vmread(VMCS_GUEST_CR3);
2497 if (cr3 != state->crs[NVMM_X64_CR_CR3]) {
2498 return true;
2499 }
2500 cr4 = vmx_vmread(VMCS_GUEST_CR4);
2501 if ((cr4 ^ state->crs[NVMM_X64_CR_CR4]) & CR4_TLB_FLUSH) {
2502 return true;
2503 }
2504 }
2505
2506 if (flags & NVMM_X64_STATE_MSRS) {
2507 efer = vmx_vmread(VMCS_GUEST_IA32_EFER);
2508 if ((efer ^
2509 state->msrs[NVMM_X64_MSR_EFER]) & EFER_TLB_FLUSH) {
2510 return true;
2511 }
2512 }
2513
2514 return false;
2515 }
2516
2517 static void
2518 vmx_vcpu_setstate(struct nvmm_cpu *vcpu)
2519 {
2520 struct nvmm_comm_page *comm = vcpu->comm;
2521 const struct nvmm_x64_state *state = &comm->state;
2522 struct vmx_cpudata *cpudata = vcpu->cpudata;
2523 struct fxsave *fpustate;
2524 uint64_t ctls1, intstate;
2525 uint64_t flags;
2526
2527 flags = comm->state_wanted;
2528
2529 vmx_vmcs_enter(vcpu);
2530
2531 if (vmx_state_tlb_flush(state, flags)) {
2532 cpudata->gtlb_want_flush = true;
2533 }
2534
2535 if (flags & NVMM_X64_STATE_SEGS) {
2536 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_CS);
2537 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_DS);
2538 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_ES);
2539 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_FS);
2540 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_GS);
2541 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_SS);
2542 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_GDT);
2543 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_IDT);
2544 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_LDT);
2545 vmx_vcpu_setstate_seg(state->segs, NVMM_X64_SEG_TR);
2546 }
2547
2548 CTASSERT(sizeof(cpudata->gprs) == sizeof(state->gprs));
2549 if (flags & NVMM_X64_STATE_GPRS) {
2550 memcpy(cpudata->gprs, state->gprs, sizeof(state->gprs));
2551
2552 vmx_vmwrite(VMCS_GUEST_RIP, state->gprs[NVMM_X64_GPR_RIP]);
2553 vmx_vmwrite(VMCS_GUEST_RSP, state->gprs[NVMM_X64_GPR_RSP]);
2554 vmx_vmwrite(VMCS_GUEST_RFLAGS, state->gprs[NVMM_X64_GPR_RFLAGS]);
2555 }
2556
2557 if (flags & NVMM_X64_STATE_CRS) {
2558 /*
2559 * CR0_NE and CR4_VMXE are mandatory.
2560 */
2561 vmx_vmwrite(VMCS_GUEST_CR0,
2562 state->crs[NVMM_X64_CR_CR0] | CR0_NE);
2563 cpudata->gcr2 = state->crs[NVMM_X64_CR_CR2];
2564 vmx_vmwrite(VMCS_GUEST_CR3, state->crs[NVMM_X64_CR_CR3]); // XXX PDPTE?
2565 vmx_vmwrite(VMCS_GUEST_CR4,
2566 (state->crs[NVMM_X64_CR_CR4] & CR4_VALID) | CR4_VMXE);
2567 cpudata->gcr8 = state->crs[NVMM_X64_CR_CR8];
2568
2569 if (vmx_xcr0_mask != 0) {
2570 /* Clear illegal XCR0 bits, set mandatory X87 bit. */
2571 cpudata->gxcr0 = state->crs[NVMM_X64_CR_XCR0];
2572 cpudata->gxcr0 &= vmx_xcr0_mask;
2573 cpudata->gxcr0 |= XCR0_X87;
2574 }
2575 }
2576
2577 CTASSERT(sizeof(cpudata->drs) == sizeof(state->drs));
2578 if (flags & NVMM_X64_STATE_DRS) {
2579 memcpy(cpudata->drs, state->drs, sizeof(state->drs));
2580
2581 cpudata->drs[NVMM_X64_DR_DR6] &= 0xFFFFFFFF;
2582 vmx_vmwrite(VMCS_GUEST_DR7, cpudata->drs[NVMM_X64_DR_DR7]);
2583 }
2584
2585 if (flags & NVMM_X64_STATE_MSRS) {
2586 cpudata->gmsr[VMX_MSRLIST_STAR].val =
2587 state->msrs[NVMM_X64_MSR_STAR];
2588 cpudata->gmsr[VMX_MSRLIST_LSTAR].val =
2589 state->msrs[NVMM_X64_MSR_LSTAR];
2590 cpudata->gmsr[VMX_MSRLIST_CSTAR].val =
2591 state->msrs[NVMM_X64_MSR_CSTAR];
2592 cpudata->gmsr[VMX_MSRLIST_SFMASK].val =
2593 state->msrs[NVMM_X64_MSR_SFMASK];
2594 cpudata->gmsr[VMX_MSRLIST_KERNELGSBASE].val =
2595 state->msrs[NVMM_X64_MSR_KERNELGSBASE];
2596
2597 vmx_vmwrite(VMCS_GUEST_IA32_EFER,
2598 state->msrs[NVMM_X64_MSR_EFER]);
2599 vmx_vmwrite(VMCS_GUEST_IA32_PAT,
2600 state->msrs[NVMM_X64_MSR_PAT]);
2601 vmx_vmwrite(VMCS_GUEST_IA32_SYSENTER_CS,
2602 state->msrs[NVMM_X64_MSR_SYSENTER_CS]);
2603 vmx_vmwrite(VMCS_GUEST_IA32_SYSENTER_ESP,
2604 state->msrs[NVMM_X64_MSR_SYSENTER_ESP]);
2605 vmx_vmwrite(VMCS_GUEST_IA32_SYSENTER_EIP,
2606 state->msrs[NVMM_X64_MSR_SYSENTER_EIP]);
2607
2608 cpudata->gtsc = state->msrs[NVMM_X64_MSR_TSC];
2609 cpudata->gtsc_want_update = true;
2610
2611 /* ENTRY_CTLS_LONG_MODE must match EFER_LMA. */
2612 ctls1 = vmx_vmread(VMCS_ENTRY_CTLS);
2613 if (state->msrs[NVMM_X64_MSR_EFER] & EFER_LMA) {
2614 ctls1 |= ENTRY_CTLS_LONG_MODE;
2615 } else {
2616 ctls1 &= ~ENTRY_CTLS_LONG_MODE;
2617 }
2618 vmx_vmwrite(VMCS_ENTRY_CTLS, ctls1);
2619 }
2620
2621 if (flags & NVMM_X64_STATE_INTR) {
2622 intstate = vmx_vmread(VMCS_GUEST_INTERRUPTIBILITY);
2623 intstate &= ~(INT_STATE_STI|INT_STATE_MOVSS);
2624 if (state->intr.int_shadow) {
2625 intstate |= INT_STATE_MOVSS;
2626 }
2627 vmx_vmwrite(VMCS_GUEST_INTERRUPTIBILITY, intstate);
2628
2629 if (state->intr.int_window_exiting) {
2630 vmx_event_waitexit_enable(vcpu, false);
2631 } else {
2632 vmx_event_waitexit_disable(vcpu, false);
2633 }
2634
2635 if (state->intr.nmi_window_exiting) {
2636 vmx_event_waitexit_enable(vcpu, true);
2637 } else {
2638 vmx_event_waitexit_disable(vcpu, true);
2639 }
2640 }
2641
2642 CTASSERT(sizeof(cpudata->gfpu.xsh_fxsave) == sizeof(state->fpu));
2643 if (flags & NVMM_X64_STATE_FPU) {
2644 memcpy(cpudata->gfpu.xsh_fxsave, &state->fpu,
2645 sizeof(state->fpu));
2646
2647 fpustate = (struct fxsave *)cpudata->gfpu.xsh_fxsave;
2648 fpustate->fx_mxcsr_mask &= x86_fpu_mxcsr_mask;
2649 fpustate->fx_mxcsr &= fpustate->fx_mxcsr_mask;
2650
2651 if (vmx_xcr0_mask != 0) {
2652 /* Reset XSTATE_BV, to force a reload. */
2653 cpudata->gfpu.xsh_xstate_bv = vmx_xcr0_mask;
2654 }
2655 }
2656
2657 vmx_vmcs_leave(vcpu);
2658
2659 comm->state_wanted = 0;
2660 comm->state_cached |= flags;
2661 }
2662
2663 static void
2664 vmx_vcpu_getstate(struct nvmm_cpu *vcpu)
2665 {
2666 struct nvmm_comm_page *comm = vcpu->comm;
2667 struct nvmm_x64_state *state = &comm->state;
2668 struct vmx_cpudata *cpudata = vcpu->cpudata;
2669 uint64_t intstate, flags;
2670
2671 flags = comm->state_wanted;
2672
2673 vmx_vmcs_enter(vcpu);
2674
2675 if (flags & NVMM_X64_STATE_SEGS) {
2676 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_CS);
2677 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_DS);
2678 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_ES);
2679 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_FS);
2680 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_GS);
2681 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_SS);
2682 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_GDT);
2683 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_IDT);
2684 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_LDT);
2685 vmx_vcpu_getstate_seg(state->segs, NVMM_X64_SEG_TR);
2686 }
2687
2688 CTASSERT(sizeof(cpudata->gprs) == sizeof(state->gprs));
2689 if (flags & NVMM_X64_STATE_GPRS) {
2690 memcpy(state->gprs, cpudata->gprs, sizeof(state->gprs));
2691
2692 state->gprs[NVMM_X64_GPR_RIP] = vmx_vmread(VMCS_GUEST_RIP);
2693 state->gprs[NVMM_X64_GPR_RSP] = vmx_vmread(VMCS_GUEST_RSP);
2694 state->gprs[NVMM_X64_GPR_RFLAGS] = vmx_vmread(VMCS_GUEST_RFLAGS);
2695 }
2696
2697 if (flags & NVMM_X64_STATE_CRS) {
2698 state->crs[NVMM_X64_CR_CR0] = vmx_vmread(VMCS_GUEST_CR0);
2699 state->crs[NVMM_X64_CR_CR2] = cpudata->gcr2;
2700 state->crs[NVMM_X64_CR_CR3] = vmx_vmread(VMCS_GUEST_CR3);
2701 state->crs[NVMM_X64_CR_CR4] = vmx_vmread(VMCS_GUEST_CR4);
2702 state->crs[NVMM_X64_CR_CR8] = cpudata->gcr8;
2703 state->crs[NVMM_X64_CR_XCR0] = cpudata->gxcr0;
2704
2705 /* Hide VMXE. */
2706 state->crs[NVMM_X64_CR_CR4] &= ~CR4_VMXE;
2707 }
2708
2709 CTASSERT(sizeof(cpudata->drs) == sizeof(state->drs));
2710 if (flags & NVMM_X64_STATE_DRS) {
2711 memcpy(state->drs, cpudata->drs, sizeof(state->drs));
2712
2713 state->drs[NVMM_X64_DR_DR7] = vmx_vmread(VMCS_GUEST_DR7);
2714 }
2715
2716 if (flags & NVMM_X64_STATE_MSRS) {
2717 state->msrs[NVMM_X64_MSR_STAR] =
2718 cpudata->gmsr[VMX_MSRLIST_STAR].val;
2719 state->msrs[NVMM_X64_MSR_LSTAR] =
2720 cpudata->gmsr[VMX_MSRLIST_LSTAR].val;
2721 state->msrs[NVMM_X64_MSR_CSTAR] =
2722 cpudata->gmsr[VMX_MSRLIST_CSTAR].val;
2723 state->msrs[NVMM_X64_MSR_SFMASK] =
2724 cpudata->gmsr[VMX_MSRLIST_SFMASK].val;
2725 state->msrs[NVMM_X64_MSR_KERNELGSBASE] =
2726 cpudata->gmsr[VMX_MSRLIST_KERNELGSBASE].val;
2727 state->msrs[NVMM_X64_MSR_EFER] =
2728 vmx_vmread(VMCS_GUEST_IA32_EFER);
2729 state->msrs[NVMM_X64_MSR_PAT] =
2730 vmx_vmread(VMCS_GUEST_IA32_PAT);
2731 state->msrs[NVMM_X64_MSR_SYSENTER_CS] =
2732 vmx_vmread(VMCS_GUEST_IA32_SYSENTER_CS);
2733 state->msrs[NVMM_X64_MSR_SYSENTER_ESP] =
2734 vmx_vmread(VMCS_GUEST_IA32_SYSENTER_ESP);
2735 state->msrs[NVMM_X64_MSR_SYSENTER_EIP] =
2736 vmx_vmread(VMCS_GUEST_IA32_SYSENTER_EIP);
2737 state->msrs[NVMM_X64_MSR_TSC] = cpudata->gtsc;
2738 }
2739
2740 if (flags & NVMM_X64_STATE_INTR) {
2741 intstate = vmx_vmread(VMCS_GUEST_INTERRUPTIBILITY);
2742 state->intr.int_shadow =
2743 (intstate & (INT_STATE_STI|INT_STATE_MOVSS)) != 0;
2744 state->intr.int_window_exiting = cpudata->int_window_exit;
2745 state->intr.nmi_window_exiting = cpudata->nmi_window_exit;
2746 state->intr.evt_pending = cpudata->evt_pending;
2747 }
2748
2749 CTASSERT(sizeof(cpudata->gfpu.xsh_fxsave) == sizeof(state->fpu));
2750 if (flags & NVMM_X64_STATE_FPU) {
2751 memcpy(&state->fpu, cpudata->gfpu.xsh_fxsave,
2752 sizeof(state->fpu));
2753 }
2754
2755 vmx_vmcs_leave(vcpu);
2756
2757 comm->state_wanted = 0;
2758 comm->state_cached |= flags;
2759 }
2760
2761 static void
2762 vmx_vcpu_state_provide(struct nvmm_cpu *vcpu, uint64_t flags)
2763 {
2764 vcpu->comm->state_wanted = flags;
2765 vmx_vcpu_getstate(vcpu);
2766 }
2767
2768 static void
2769 vmx_vcpu_state_commit(struct nvmm_cpu *vcpu)
2770 {
2771 vcpu->comm->state_wanted = vcpu->comm->state_commit;
2772 vcpu->comm->state_commit = 0;
2773 vmx_vcpu_setstate(vcpu);
2774 }
2775
2776 /* -------------------------------------------------------------------------- */
2777
2778 static void
2779 vmx_asid_alloc(struct nvmm_cpu *vcpu)
2780 {
2781 struct vmx_cpudata *cpudata = vcpu->cpudata;
2782 size_t i, oct, bit;
2783
2784 mutex_enter(&vmx_asidlock);
2785
2786 for (i = 0; i < vmx_maxasid; i++) {
2787 oct = i / 8;
2788 bit = i % 8;
2789
2790 if (vmx_asidmap[oct] & __BIT(bit)) {
2791 continue;
2792 }
2793
2794 cpudata->asid = i;
2795
2796 vmx_asidmap[oct] |= __BIT(bit);
2797 vmx_vmwrite(VMCS_VPID, i);
2798 mutex_exit(&vmx_asidlock);
2799 return;
2800 }
2801
2802 mutex_exit(&vmx_asidlock);
2803
2804 panic("%s: impossible", __func__);
2805 }
2806
2807 static void
2808 vmx_asid_free(struct nvmm_cpu *vcpu)
2809 {
2810 size_t oct, bit;
2811 uint64_t asid;
2812
2813 asid = vmx_vmread(VMCS_VPID);
2814
2815 oct = asid / 8;
2816 bit = asid % 8;
2817
2818 mutex_enter(&vmx_asidlock);
2819 vmx_asidmap[oct] &= ~__BIT(bit);
2820 mutex_exit(&vmx_asidlock);
2821 }
2822
2823 static void
2824 vmx_vcpu_init(struct nvmm_machine *mach, struct nvmm_cpu *vcpu)
2825 {
2826 struct vmx_cpudata *cpudata = vcpu->cpudata;
2827 struct vmcs *vmcs = cpudata->vmcs;
2828 struct msr_entry *gmsr = cpudata->gmsr;
2829 extern uint8_t vmx_resume_rip;
2830 uint64_t rev, eptp;
2831
2832 rev = vmx_get_revision();
2833
2834 memset(vmcs, 0, VMCS_SIZE);
2835 vmcs->ident = __SHIFTIN(rev, VMCS_IDENT_REVISION);
2836 vmcs->abort = 0;
2837
2838 vmx_vmcs_enter(vcpu);
2839
2840 /* No link pointer. */
2841 vmx_vmwrite(VMCS_LINK_POINTER, 0xFFFFFFFFFFFFFFFF);
2842
2843 /* Install the CTLSs. */
2844 vmx_vmwrite(VMCS_PINBASED_CTLS, vmx_pinbased_ctls);
2845 vmx_vmwrite(VMCS_PROCBASED_CTLS, vmx_procbased_ctls);
2846 vmx_vmwrite(VMCS_PROCBASED_CTLS2, vmx_procbased_ctls2);
2847 vmx_vmwrite(VMCS_ENTRY_CTLS, vmx_entry_ctls);
2848 vmx_vmwrite(VMCS_EXIT_CTLS, vmx_exit_ctls);
2849
2850 /* Allow direct access to certain MSRs. */
2851 memset(cpudata->msrbm, 0xFF, MSRBM_SIZE);
2852 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_EFER, true, true);
2853 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_STAR, true, true);
2854 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_LSTAR, true, true);
2855 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_CSTAR, true, true);
2856 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_SFMASK, true, true);
2857 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_KERNELGSBASE, true, true);
2858 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_SYSENTER_CS, true, true);
2859 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_SYSENTER_ESP, true, true);
2860 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_SYSENTER_EIP, true, true);
2861 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_FSBASE, true, true);
2862 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_GSBASE, true, true);
2863 vmx_vcpu_msr_allow(cpudata->msrbm, MSR_TSC, true, false);
2864 vmx_vmwrite(VMCS_MSR_BITMAP, (uint64_t)cpudata->msrbm_pa);
2865
2866 /*
2867 * List of Guest MSRs loaded on VMENTRY, saved on VMEXIT. This
2868 * includes the L1D_FLUSH MSR, to mitigate L1TF.
2869 */
2870 gmsr[VMX_MSRLIST_STAR].msr = MSR_STAR;
2871 gmsr[VMX_MSRLIST_STAR].val = 0;
2872 gmsr[VMX_MSRLIST_LSTAR].msr = MSR_LSTAR;
2873 gmsr[VMX_MSRLIST_LSTAR].val = 0;
2874 gmsr[VMX_MSRLIST_CSTAR].msr = MSR_CSTAR;
2875 gmsr[VMX_MSRLIST_CSTAR].val = 0;
2876 gmsr[VMX_MSRLIST_SFMASK].msr = MSR_SFMASK;
2877 gmsr[VMX_MSRLIST_SFMASK].val = 0;
2878 gmsr[VMX_MSRLIST_KERNELGSBASE].msr = MSR_KERNELGSBASE;
2879 gmsr[VMX_MSRLIST_KERNELGSBASE].val = 0;
2880 gmsr[VMX_MSRLIST_L1DFLUSH].msr = MSR_IA32_FLUSH_CMD;
2881 gmsr[VMX_MSRLIST_L1DFLUSH].val = IA32_FLUSH_CMD_L1D_FLUSH;
2882 vmx_vmwrite(VMCS_ENTRY_MSR_LOAD_ADDRESS, cpudata->gmsr_pa);
2883 vmx_vmwrite(VMCS_EXIT_MSR_STORE_ADDRESS, cpudata->gmsr_pa);
2884 vmx_vmwrite(VMCS_ENTRY_MSR_LOAD_COUNT, vmx_msrlist_entry_nmsr);
2885 vmx_vmwrite(VMCS_EXIT_MSR_STORE_COUNT, VMX_MSRLIST_EXIT_NMSR);
2886
2887 /* Force CR0_NW and CR0_CD to zero, CR0_ET to one. */
2888 vmx_vmwrite(VMCS_CR0_MASK, CR0_NW|CR0_CD|CR0_ET);
2889 vmx_vmwrite(VMCS_CR0_SHADOW, CR0_ET);
2890
2891 /* Force unsupported CR4 fields to zero. */
2892 vmx_vmwrite(VMCS_CR4_MASK, CR4_INVALID);
2893 vmx_vmwrite(VMCS_CR4_SHADOW, 0);
2894
2895 /* Set the Host state for resuming. */
2896 vmx_vmwrite(VMCS_HOST_RIP, (uint64_t)&vmx_resume_rip);
2897 vmx_vmwrite(VMCS_HOST_CS_SELECTOR, GSEL(GCODE_SEL, SEL_KPL));
2898 vmx_vmwrite(VMCS_HOST_SS_SELECTOR, GSEL(GDATA_SEL, SEL_KPL));
2899 vmx_vmwrite(VMCS_HOST_DS_SELECTOR, GSEL(GDATA_SEL, SEL_KPL));
2900 vmx_vmwrite(VMCS_HOST_ES_SELECTOR, GSEL(GDATA_SEL, SEL_KPL));
2901 vmx_vmwrite(VMCS_HOST_FS_SELECTOR, 0);
2902 vmx_vmwrite(VMCS_HOST_GS_SELECTOR, 0);
2903 vmx_vmwrite(VMCS_HOST_IA32_SYSENTER_CS, 0);
2904 vmx_vmwrite(VMCS_HOST_IA32_SYSENTER_ESP, 0);
2905 vmx_vmwrite(VMCS_HOST_IA32_SYSENTER_EIP, 0);
2906 vmx_vmwrite(VMCS_HOST_IDTR_BASE, (uint64_t)idt);
2907 vmx_vmwrite(VMCS_HOST_IA32_PAT, rdmsr(MSR_CR_PAT));
2908 vmx_vmwrite(VMCS_HOST_IA32_EFER, rdmsr(MSR_EFER));
2909 vmx_vmwrite(VMCS_HOST_CR0, rcr0());
2910
2911 /* Generate ASID. */
2912 vmx_asid_alloc(vcpu);
2913
2914 /* Enable Extended Paging, 4-Level. */
2915 eptp =
2916 __SHIFTIN(vmx_eptp_type, EPTP_TYPE) |
2917 __SHIFTIN(4-1, EPTP_WALKLEN) |
2918 (pmap_ept_has_ad ? EPTP_FLAGS_AD : 0) |
2919 mach->vm->vm_map.pmap->pm_pdirpa[0];
2920 vmx_vmwrite(VMCS_EPTP, eptp);
2921
2922 /* Init IA32_MISC_ENABLE. */
2923 cpudata->gmsr_misc_enable = rdmsr(MSR_MISC_ENABLE);
2924 cpudata->gmsr_misc_enable &=
2925 ~(IA32_MISC_PERFMON_EN|IA32_MISC_EISST_EN|IA32_MISC_MWAIT_EN);
2926 cpudata->gmsr_misc_enable |=
2927 (IA32_MISC_BTS_UNAVAIL|IA32_MISC_PEBS_UNAVAIL);
2928
2929 /* Init XSAVE header. */
2930 cpudata->gfpu.xsh_xstate_bv = vmx_xcr0_mask;
2931 cpudata->gfpu.xsh_xcomp_bv = 0;
2932
2933 /* These MSRs are static. */
2934 cpudata->star = rdmsr(MSR_STAR);
2935 cpudata->lstar = rdmsr(MSR_LSTAR);
2936 cpudata->cstar = rdmsr(MSR_CSTAR);
2937 cpudata->sfmask = rdmsr(MSR_SFMASK);
2938
2939 /* Install the RESET state. */
2940 memcpy(&vcpu->comm->state, &nvmm_x86_reset_state,
2941 sizeof(nvmm_x86_reset_state));
2942 vcpu->comm->state_wanted = NVMM_X64_STATE_ALL;
2943 vcpu->comm->state_cached = 0;
2944 vmx_vcpu_setstate(vcpu);
2945
2946 vmx_vmcs_leave(vcpu);
2947 }
2948
2949 static int
2950 vmx_vcpu_create(struct nvmm_machine *mach, struct nvmm_cpu *vcpu)
2951 {
2952 struct vmx_cpudata *cpudata;
2953 int error;
2954
2955 /* Allocate the VMX cpudata. */
2956 cpudata = (struct vmx_cpudata *)uvm_km_alloc(kernel_map,
2957 roundup(sizeof(*cpudata), PAGE_SIZE), 0,
2958 UVM_KMF_WIRED|UVM_KMF_ZERO);
2959 vcpu->cpudata = cpudata;
2960
2961 /* VMCS */
2962 error = vmx_memalloc(&cpudata->vmcs_pa, (vaddr_t *)&cpudata->vmcs,
2963 VMCS_NPAGES);
2964 if (error)
2965 goto error;
2966
2967 /* MSR Bitmap */
2968 error = vmx_memalloc(&cpudata->msrbm_pa, (vaddr_t *)&cpudata->msrbm,
2969 MSRBM_NPAGES);
2970 if (error)
2971 goto error;
2972
2973 /* Guest MSR List */
2974 error = vmx_memalloc(&cpudata->gmsr_pa, (vaddr_t *)&cpudata->gmsr, 1);
2975 if (error)
2976 goto error;
2977
2978 kcpuset_create(&cpudata->htlb_want_flush, true);
2979
2980 /* Init the VCPU info. */
2981 vmx_vcpu_init(mach, vcpu);
2982
2983 return 0;
2984
2985 error:
2986 if (cpudata->vmcs_pa) {
2987 vmx_memfree(cpudata->vmcs_pa, (vaddr_t)cpudata->vmcs,
2988 VMCS_NPAGES);
2989 }
2990 if (cpudata->msrbm_pa) {
2991 vmx_memfree(cpudata->msrbm_pa, (vaddr_t)cpudata->msrbm,
2992 MSRBM_NPAGES);
2993 }
2994 if (cpudata->gmsr_pa) {
2995 vmx_memfree(cpudata->gmsr_pa, (vaddr_t)cpudata->gmsr, 1);
2996 }
2997
2998 kmem_free(cpudata, sizeof(*cpudata));
2999 return error;
3000 }
3001
3002 static void
3003 vmx_vcpu_destroy(struct nvmm_machine *mach, struct nvmm_cpu *vcpu)
3004 {
3005 struct vmx_cpudata *cpudata = vcpu->cpudata;
3006
3007 vmx_vmcs_enter(vcpu);
3008 vmx_asid_free(vcpu);
3009 vmx_vmcs_destroy(vcpu);
3010
3011 kcpuset_destroy(cpudata->htlb_want_flush);
3012
3013 vmx_memfree(cpudata->vmcs_pa, (vaddr_t)cpudata->vmcs, VMCS_NPAGES);
3014 vmx_memfree(cpudata->msrbm_pa, (vaddr_t)cpudata->msrbm, MSRBM_NPAGES);
3015 vmx_memfree(cpudata->gmsr_pa, (vaddr_t)cpudata->gmsr, 1);
3016 uvm_km_free(kernel_map, (vaddr_t)cpudata,
3017 roundup(sizeof(*cpudata), PAGE_SIZE), UVM_KMF_WIRED);
3018 }
3019
3020 /* -------------------------------------------------------------------------- */
3021
3022 static int
3023 vmx_vcpu_configure_cpuid(struct vmx_cpudata *cpudata, void *data)
3024 {
3025 struct nvmm_vcpu_conf_cpuid *cpuid = data;
3026 size_t i;
3027
3028 if (__predict_false(cpuid->mask && cpuid->exit)) {
3029 return EINVAL;
3030 }
3031 if (__predict_false(cpuid->mask &&
3032 ((cpuid->u.mask.set.eax & cpuid->u.mask.del.eax) ||
3033 (cpuid->u.mask.set.ebx & cpuid->u.mask.del.ebx) ||
3034 (cpuid->u.mask.set.ecx & cpuid->u.mask.del.ecx) ||
3035 (cpuid->u.mask.set.edx & cpuid->u.mask.del.edx)))) {
3036 return EINVAL;
3037 }
3038
3039 /* If unset, delete, to restore the default behavior. */
3040 if (!cpuid->mask && !cpuid->exit) {
3041 for (i = 0; i < VMX_NCPUIDS; i++) {
3042 if (!cpudata->cpuidpresent[i]) {
3043 continue;
3044 }
3045 if (cpudata->cpuid[i].leaf == cpuid->leaf) {
3046 cpudata->cpuidpresent[i] = false;
3047 }
3048 }
3049 return 0;
3050 }
3051
3052 /* If already here, replace. */
3053 for (i = 0; i < VMX_NCPUIDS; i++) {
3054 if (!cpudata->cpuidpresent[i]) {
3055 continue;
3056 }
3057 if (cpudata->cpuid[i].leaf == cpuid->leaf) {
3058 memcpy(&cpudata->cpuid[i], cpuid,
3059 sizeof(struct nvmm_vcpu_conf_cpuid));
3060 return 0;
3061 }
3062 }
3063
3064 /* Not here, insert. */
3065 for (i = 0; i < VMX_NCPUIDS; i++) {
3066 if (!cpudata->cpuidpresent[i]) {
3067 cpudata->cpuidpresent[i] = true;
3068 memcpy(&cpudata->cpuid[i], cpuid,
3069 sizeof(struct nvmm_vcpu_conf_cpuid));
3070 return 0;
3071 }
3072 }
3073
3074 return ENOBUFS;
3075 }
3076
3077 static int
3078 vmx_vcpu_configure_tpr(struct vmx_cpudata *cpudata, void *data)
3079 {
3080 struct nvmm_vcpu_conf_tpr *tpr = data;
3081
3082 memcpy(&cpudata->tpr, tpr, sizeof(*tpr));
3083 return 0;
3084 }
3085
3086 static int
3087 vmx_vcpu_configure(struct nvmm_cpu *vcpu, uint64_t op, void *data)
3088 {
3089 struct vmx_cpudata *cpudata = vcpu->cpudata;
3090
3091 switch (op) {
3092 case NVMM_VCPU_CONF_MD(NVMM_VCPU_CONF_CPUID):
3093 return vmx_vcpu_configure_cpuid(cpudata, data);
3094 case NVMM_VCPU_CONF_MD(NVMM_VCPU_CONF_TPR):
3095 return vmx_vcpu_configure_tpr(cpudata, data);
3096 default:
3097 return EINVAL;
3098 }
3099 }
3100
3101 /* -------------------------------------------------------------------------- */
3102
3103 static void
3104 vmx_tlb_flush(struct pmap *pm)
3105 {
3106 struct nvmm_machine *mach = pm->pm_data;
3107 struct vmx_machdata *machdata = mach->machdata;
3108
3109 atomic_inc_64(&machdata->mach_htlb_gen);
3110
3111 /* Generates IPIs, which cause #VMEXITs. */
3112 pmap_tlb_shootdown(pmap_kernel(), -1, PTE_G, TLBSHOOT_UPDATE);
3113 }
3114
3115 static void
3116 vmx_machine_create(struct nvmm_machine *mach)
3117 {
3118 struct pmap *pmap = mach->vm->vm_map.pmap;
3119 struct vmx_machdata *machdata;
3120
3121 /* Convert to EPT. */
3122 pmap_ept_transform(pmap);
3123
3124 /* Fill in pmap info. */
3125 pmap->pm_data = (void *)mach;
3126 pmap->pm_tlb_flush = vmx_tlb_flush;
3127
3128 machdata = kmem_zalloc(sizeof(struct vmx_machdata), KM_SLEEP);
3129 mach->machdata = machdata;
3130
3131 /* Start with an hTLB flush everywhere. */
3132 machdata->mach_htlb_gen = 1;
3133 }
3134
3135 static void
3136 vmx_machine_destroy(struct nvmm_machine *mach)
3137 {
3138 struct vmx_machdata *machdata = mach->machdata;
3139
3140 kmem_free(machdata, sizeof(struct vmx_machdata));
3141 }
3142
3143 static int
3144 vmx_machine_configure(struct nvmm_machine *mach, uint64_t op, void *data)
3145 {
3146 panic("%s: impossible", __func__);
3147 }
3148
3149 /* -------------------------------------------------------------------------- */
3150
3151 #define CTLS_ONE_ALLOWED(msrval, bitoff) \
3152 ((msrval & __BIT(32 + bitoff)) != 0)
3153 #define CTLS_ZERO_ALLOWED(msrval, bitoff) \
3154 ((msrval & __BIT(bitoff)) == 0)
3155
3156 static int
3157 vmx_check_ctls(uint64_t msr_ctls, uint64_t msr_true_ctls, uint64_t set_one)
3158 {
3159 uint64_t basic, val, true_val;
3160 bool has_true;
3161 size_t i;
3162
3163 basic = rdmsr(MSR_IA32_VMX_BASIC);
3164 has_true = (basic & IA32_VMX_BASIC_TRUE_CTLS) != 0;
3165
3166 val = rdmsr(msr_ctls);
3167 if (has_true) {
3168 true_val = rdmsr(msr_true_ctls);
3169 } else {
3170 true_val = val;
3171 }
3172
3173 for (i = 0; i < 32; i++) {
3174 if (!(set_one & __BIT(i))) {
3175 continue;
3176 }
3177 if (!CTLS_ONE_ALLOWED(true_val, i)) {
3178 return -1;
3179 }
3180 }
3181
3182 return 0;
3183 }
3184
3185 static int
3186 vmx_init_ctls(uint64_t msr_ctls, uint64_t msr_true_ctls,
3187 uint64_t set_one, uint64_t set_zero, uint64_t *res)
3188 {
3189 uint64_t basic, val, true_val;
3190 bool one_allowed, zero_allowed, has_true;
3191 size_t i;
3192
3193 basic = rdmsr(MSR_IA32_VMX_BASIC);
3194 has_true = (basic & IA32_VMX_BASIC_TRUE_CTLS) != 0;
3195
3196 val = rdmsr(msr_ctls);
3197 if (has_true) {
3198 true_val = rdmsr(msr_true_ctls);
3199 } else {
3200 true_val = val;
3201 }
3202
3203 for (i = 0; i < 32; i++) {
3204 one_allowed = CTLS_ONE_ALLOWED(true_val, i);
3205 zero_allowed = CTLS_ZERO_ALLOWED(true_val, i);
3206
3207 if (zero_allowed && !one_allowed) {
3208 if (set_one & __BIT(i))
3209 return -1;
3210 *res &= ~__BIT(i);
3211 } else if (one_allowed && !zero_allowed) {
3212 if (set_zero & __BIT(i))
3213 return -1;
3214 *res |= __BIT(i);
3215 } else {
3216 if (set_zero & __BIT(i)) {
3217 *res &= ~__BIT(i);
3218 } else if (set_one & __BIT(i)) {
3219 *res |= __BIT(i);
3220 } else if (!has_true) {
3221 *res &= ~__BIT(i);
3222 } else if (CTLS_ZERO_ALLOWED(val, i)) {
3223 *res &= ~__BIT(i);
3224 } else if (CTLS_ONE_ALLOWED(val, i)) {
3225 *res |= __BIT(i);
3226 } else {
3227 return -1;
3228 }
3229 }
3230 }
3231
3232 return 0;
3233 }
3234
3235 static bool
3236 vmx_ident(void)
3237 {
3238 uint64_t msr;
3239 int ret;
3240
3241 if (!(cpu_feature[1] & CPUID2_VMX)) {
3242 return false;
3243 }
3244
3245 msr = rdmsr(MSR_IA32_FEATURE_CONTROL);
3246 if ((msr & IA32_FEATURE_CONTROL_LOCK) != 0 &&
3247 (msr & IA32_FEATURE_CONTROL_OUT_SMX) == 0) {
3248 printf("NVMM: VMX disabled in BIOS\n");
3249 return false;
3250 }
3251
3252 msr = rdmsr(MSR_IA32_VMX_BASIC);
3253 if ((msr & IA32_VMX_BASIC_IO_REPORT) == 0) {
3254 printf("NVMM: I/O reporting not supported\n");
3255 return false;
3256 }
3257 if (__SHIFTOUT(msr, IA32_VMX_BASIC_MEM_TYPE) != MEM_TYPE_WB) {
3258 printf("NVMM: WB memory not supported\n");
3259 return false;
3260 }
3261
3262 /* PG and PE are reported, even if Unrestricted Guests is supported. */
3263 vmx_cr0_fixed0 = rdmsr(MSR_IA32_VMX_CR0_FIXED0) & ~(CR0_PG|CR0_PE);
3264 vmx_cr0_fixed1 = rdmsr(MSR_IA32_VMX_CR0_FIXED1) | (CR0_PG|CR0_PE);
3265 ret = vmx_check_cr(rcr0(), vmx_cr0_fixed0, vmx_cr0_fixed1);
3266 if (ret == -1) {
3267 printf("NVMM: CR0 requirements not satisfied\n");
3268 return false;
3269 }
3270
3271 vmx_cr4_fixed0 = rdmsr(MSR_IA32_VMX_CR4_FIXED0);
3272 vmx_cr4_fixed1 = rdmsr(MSR_IA32_VMX_CR4_FIXED1);
3273 ret = vmx_check_cr(rcr4() | CR4_VMXE, vmx_cr4_fixed0, vmx_cr4_fixed1);
3274 if (ret == -1) {
3275 printf("NVMM: CR4 requirements not satisfied\n");
3276 return false;
3277 }
3278
3279 /* Init the CTLSs right now, and check for errors. */
3280 ret = vmx_init_ctls(
3281 MSR_IA32_VMX_PINBASED_CTLS, MSR_IA32_VMX_TRUE_PINBASED_CTLS,
3282 VMX_PINBASED_CTLS_ONE, VMX_PINBASED_CTLS_ZERO,
3283 &vmx_pinbased_ctls);
3284 if (ret == -1) {
3285 printf("NVMM: pin-based-ctls requirements not satisfied\n");
3286 return false;
3287 }
3288 ret = vmx_init_ctls(
3289 MSR_IA32_VMX_PROCBASED_CTLS, MSR_IA32_VMX_TRUE_PROCBASED_CTLS,
3290 VMX_PROCBASED_CTLS_ONE, VMX_PROCBASED_CTLS_ZERO,
3291 &vmx_procbased_ctls);
3292 if (ret == -1) {
3293 printf("NVMM: proc-based-ctls requirements not satisfied\n");
3294 return false;
3295 }
3296 ret = vmx_init_ctls(
3297 MSR_IA32_VMX_PROCBASED_CTLS2, MSR_IA32_VMX_PROCBASED_CTLS2,
3298 VMX_PROCBASED_CTLS2_ONE, VMX_PROCBASED_CTLS2_ZERO,
3299 &vmx_procbased_ctls2);
3300 if (ret == -1) {
3301 printf("NVMM: proc-based-ctls2 requirements not satisfied\n");
3302 return false;
3303 }
3304 ret = vmx_check_ctls(
3305 MSR_IA32_VMX_PROCBASED_CTLS2, MSR_IA32_VMX_PROCBASED_CTLS2,
3306 PROC_CTLS2_INVPCID_ENABLE);
3307 if (ret != -1) {
3308 vmx_procbased_ctls2 |= PROC_CTLS2_INVPCID_ENABLE;
3309 }
3310 ret = vmx_init_ctls(
3311 MSR_IA32_VMX_ENTRY_CTLS, MSR_IA32_VMX_TRUE_ENTRY_CTLS,
3312 VMX_ENTRY_CTLS_ONE, VMX_ENTRY_CTLS_ZERO,
3313 &vmx_entry_ctls);
3314 if (ret == -1) {
3315 printf("NVMM: entry-ctls requirements not satisfied\n");
3316 return false;
3317 }
3318 ret = vmx_init_ctls(
3319 MSR_IA32_VMX_EXIT_CTLS, MSR_IA32_VMX_TRUE_EXIT_CTLS,
3320 VMX_EXIT_CTLS_ONE, VMX_EXIT_CTLS_ZERO,
3321 &vmx_exit_ctls);
3322 if (ret == -1) {
3323 printf("NVMM: exit-ctls requirements not satisfied\n");
3324 return false;
3325 }
3326
3327 msr = rdmsr(MSR_IA32_VMX_EPT_VPID_CAP);
3328 if ((msr & IA32_VMX_EPT_VPID_WALKLENGTH_4) == 0) {
3329 printf("NVMM: 4-level page tree not supported\n");
3330 return false;
3331 }
3332 if ((msr & IA32_VMX_EPT_VPID_INVEPT) == 0) {
3333 printf("NVMM: INVEPT not supported\n");
3334 return false;
3335 }
3336 if ((msr & IA32_VMX_EPT_VPID_INVVPID) == 0) {
3337 printf("NVMM: INVVPID not supported\n");
3338 return false;
3339 }
3340 if ((msr & IA32_VMX_EPT_VPID_FLAGS_AD) != 0) {
3341 pmap_ept_has_ad = true;
3342 } else {
3343 pmap_ept_has_ad = false;
3344 }
3345 if (!(msr & IA32_VMX_EPT_VPID_UC) && !(msr & IA32_VMX_EPT_VPID_WB)) {
3346 printf("NVMM: EPT UC/WB memory types not supported\n");
3347 return false;
3348 }
3349
3350 return true;
3351 }
3352
3353 static void
3354 vmx_init_asid(uint32_t maxasid)
3355 {
3356 size_t allocsz;
3357
3358 mutex_init(&vmx_asidlock, MUTEX_DEFAULT, IPL_NONE);
3359
3360 vmx_maxasid = maxasid;
3361 allocsz = roundup(maxasid, 8) / 8;
3362 vmx_asidmap = kmem_zalloc(allocsz, KM_SLEEP);
3363
3364 /* ASID 0 is reserved for the host. */
3365 vmx_asidmap[0] |= __BIT(0);
3366 }
3367
3368 static void
3369 vmx_change_cpu(void *arg1, void *arg2)
3370 {
3371 struct cpu_info *ci = curcpu();
3372 bool enable = arg1 != NULL;
3373 uint64_t msr, cr4;
3374
3375 if (enable) {
3376 msr = rdmsr(MSR_IA32_FEATURE_CONTROL);
3377 if ((msr & IA32_FEATURE_CONTROL_LOCK) == 0) {
3378 /* Lock now, with VMX-outside-SMX enabled. */
3379 wrmsr(MSR_IA32_FEATURE_CONTROL, msr |
3380 IA32_FEATURE_CONTROL_LOCK |
3381 IA32_FEATURE_CONTROL_OUT_SMX);
3382 }
3383 }
3384
3385 if (!enable) {
3386 vmx_vmxoff();
3387 }
3388
3389 cr4 = rcr4();
3390 if (enable) {
3391 cr4 |= CR4_VMXE;
3392 } else {
3393 cr4 &= ~CR4_VMXE;
3394 }
3395 lcr4(cr4);
3396
3397 if (enable) {
3398 vmx_vmxon(&vmxoncpu[cpu_index(ci)].pa);
3399 }
3400 }
3401
3402 static void
3403 vmx_init_l1tf(void)
3404 {
3405 u_int descs[4];
3406 uint64_t msr;
3407
3408 if (cpuid_level < 7) {
3409 return;
3410 }
3411
3412 x86_cpuid(7, descs);
3413
3414 if (descs[3] & CPUID_SEF_ARCH_CAP) {
3415 msr = rdmsr(MSR_IA32_ARCH_CAPABILITIES);
3416 if (msr & IA32_ARCH_SKIP_L1DFL_VMENTRY) {
3417 /* No mitigation needed. */
3418 return;
3419 }
3420 }
3421
3422 if (descs[3] & CPUID_SEF_L1D_FLUSH) {
3423 /* Enable hardware mitigation. */
3424 vmx_msrlist_entry_nmsr += 1;
3425 }
3426 }
3427
3428 static void
3429 vmx_init(void)
3430 {
3431 CPU_INFO_ITERATOR cii;
3432 struct cpu_info *ci;
3433 uint64_t xc, msr;
3434 struct vmxon *vmxon;
3435 uint32_t revision;
3436 u_int descs[4];
3437 paddr_t pa;
3438 vaddr_t va;
3439 int error;
3440
3441 /* Init the ASID bitmap (VPID). */
3442 vmx_init_asid(VPID_MAX);
3443
3444 /* Init the XCR0 mask. */
3445 vmx_xcr0_mask = VMX_XCR0_MASK_DEFAULT & x86_xsave_features;
3446
3447 /* Init the max basic CPUID leaf. */
3448 vmx_cpuid_max_basic = uimin(cpuid_level, VMX_CPUID_MAX_BASIC);
3449
3450 /* Init the max extended CPUID leaf. */
3451 x86_cpuid(0x80000000, descs);
3452 vmx_cpuid_max_extended = uimin(descs[0], VMX_CPUID_MAX_EXTENDED);
3453
3454 /* Init the TLB flush op, the EPT flush op and the EPTP type. */
3455 msr = rdmsr(MSR_IA32_VMX_EPT_VPID_CAP);
3456 if ((msr & IA32_VMX_EPT_VPID_INVVPID_CONTEXT) != 0) {
3457 vmx_tlb_flush_op = VMX_INVVPID_CONTEXT;
3458 } else {
3459 vmx_tlb_flush_op = VMX_INVVPID_ALL;
3460 }
3461 if ((msr & IA32_VMX_EPT_VPID_INVEPT_CONTEXT) != 0) {
3462 vmx_ept_flush_op = VMX_INVEPT_CONTEXT;
3463 } else {
3464 vmx_ept_flush_op = VMX_INVEPT_ALL;
3465 }
3466 if ((msr & IA32_VMX_EPT_VPID_WB) != 0) {
3467 vmx_eptp_type = EPTP_TYPE_WB;
3468 } else {
3469 vmx_eptp_type = EPTP_TYPE_UC;
3470 }
3471
3472 /* Init the L1TF mitigation. */
3473 vmx_init_l1tf();
3474
3475 memset(vmxoncpu, 0, sizeof(vmxoncpu));
3476 revision = vmx_get_revision();
3477
3478 for (CPU_INFO_FOREACH(cii, ci)) {
3479 error = vmx_memalloc(&pa, &va, 1);
3480 if (error) {
3481 panic("%s: out of memory", __func__);
3482 }
3483 vmxoncpu[cpu_index(ci)].pa = pa;
3484 vmxoncpu[cpu_index(ci)].va = va;
3485
3486 vmxon = (struct vmxon *)vmxoncpu[cpu_index(ci)].va;
3487 vmxon->ident = __SHIFTIN(revision, VMXON_IDENT_REVISION);
3488 }
3489
3490 xc = xc_broadcast(0, vmx_change_cpu, (void *)true, NULL);
3491 xc_wait(xc);
3492 }
3493
3494 static void
3495 vmx_fini_asid(void)
3496 {
3497 size_t allocsz;
3498
3499 allocsz = roundup(vmx_maxasid, 8) / 8;
3500 kmem_free(vmx_asidmap, allocsz);
3501
3502 mutex_destroy(&vmx_asidlock);
3503 }
3504
3505 static void
3506 vmx_fini(void)
3507 {
3508 uint64_t xc;
3509 size_t i;
3510
3511 xc = xc_broadcast(0, vmx_change_cpu, (void *)false, NULL);
3512 xc_wait(xc);
3513
3514 for (i = 0; i < MAXCPUS; i++) {
3515 if (vmxoncpu[i].pa != 0)
3516 vmx_memfree(vmxoncpu[i].pa, vmxoncpu[i].va, 1);
3517 }
3518
3519 vmx_fini_asid();
3520 }
3521
3522 static void
3523 vmx_capability(struct nvmm_capability *cap)
3524 {
3525 cap->arch.mach_conf_support = 0;
3526 cap->arch.vcpu_conf_support =
3527 NVMM_CAP_ARCH_VCPU_CONF_CPUID |
3528 NVMM_CAP_ARCH_VCPU_CONF_TPR;
3529 cap->arch.xcr0_mask = vmx_xcr0_mask;
3530 cap->arch.mxcsr_mask = x86_fpu_mxcsr_mask;
3531 cap->arch.conf_cpuid_maxops = VMX_NCPUIDS;
3532 }
3533
3534 const struct nvmm_impl nvmm_x86_vmx = {
3535 .name = "x86-vmx",
3536 .ident = vmx_ident,
3537 .init = vmx_init,
3538 .fini = vmx_fini,
3539 .capability = vmx_capability,
3540 .mach_conf_max = NVMM_X86_MACH_NCONF,
3541 .mach_conf_sizes = NULL,
3542 .vcpu_conf_max = NVMM_X86_VCPU_NCONF,
3543 .vcpu_conf_sizes = vmx_vcpu_conf_sizes,
3544 .state_size = sizeof(struct nvmm_x64_state),
3545 .machine_create = vmx_machine_create,
3546 .machine_destroy = vmx_machine_destroy,
3547 .machine_configure = vmx_machine_configure,
3548 .vcpu_create = vmx_vcpu_create,
3549 .vcpu_destroy = vmx_vcpu_destroy,
3550 .vcpu_configure = vmx_vcpu_configure,
3551 .vcpu_setstate = vmx_vcpu_setstate,
3552 .vcpu_getstate = vmx_vcpu_getstate,
3553 .vcpu_inject = vmx_vcpu_inject,
3554 .vcpu_run = vmx_vcpu_run
3555 };
3556