drm/i915: Disable RC6 on Sandybridge by default
[deliverable/linux.git] / include / linux / kvm_host.h
CommitLineData
edf88417
AK
1#ifndef __KVM_HOST_H
2#define __KVM_HOST_H
6aa8b732
AK
3
4/*
5 * This work is licensed under the terms of the GNU GPL, version 2. See
6 * the COPYING file in the top-level directory.
7 */
8
9#include <linux/types.h>
e56a7a28 10#include <linux/hardirq.h>
6aa8b732
AK
11#include <linux/list.h>
12#include <linux/mutex.h>
13#include <linux/spinlock.h>
06ff0d37
MR
14#include <linux/signal.h>
15#include <linux/sched.h>
6aa8b732 16#include <linux/mm.h>
15ad7146 17#include <linux/preempt.h>
0937c48d 18#include <linux/msi.h>
d89f5eff 19#include <linux/slab.h>
bd2b53b2 20#include <linux/rcupdate.h>
bd80158a 21#include <linux/ratelimit.h>
e8edc6e0 22#include <asm/signal.h>
6aa8b732 23
6aa8b732 24#include <linux/kvm.h>
102d8325 25#include <linux/kvm_para.h>
6aa8b732 26
edf88417 27#include <linux/kvm_types.h>
d77a39d9 28
edf88417 29#include <asm/kvm_host.h>
d657a98e 30
cef4dea0
AK
31#ifndef KVM_MMIO_SIZE
32#define KVM_MMIO_SIZE 8
33#endif
34
d9e368d6
AK
35/*
36 * vcpu->requests bit members
37 */
3176bc3e 38#define KVM_REQ_TLB_FLUSH 0
2f52d58c 39#define KVM_REQ_MIGRATE_TIMER 1
b209749f 40#define KVM_REQ_REPORT_TPR_ACCESS 2
2e53d63a 41#define KVM_REQ_MMU_RELOAD 3
71c4dfaf 42#define KVM_REQ_TRIPLE_FAULT 4
06e05645 43#define KVM_REQ_PENDING_TIMER 5
d7690175 44#define KVM_REQ_UNHALT 6
4731d4c7 45#define KVM_REQ_MMU_SYNC 7
34c238a1 46#define KVM_REQ_CLOCK_UPDATE 8
32f88400 47#define KVM_REQ_KICK 9
02daab21 48#define KVM_REQ_DEACTIVATE_FPU 10
3842d135 49#define KVM_REQ_EVENT 11
af585b92 50#define KVM_REQ_APF_HALT 12
c9aaa895 51#define KVM_REQ_STEAL_UPDATE 13
7460fb4a 52#define KVM_REQ_NMI 14
6aa8b732 53
5550af4d
SY
54#define KVM_USERSPACE_IRQ_SOURCE_ID 0
55
6c474694 56struct kvm;
6aa8b732 57struct kvm_vcpu;
c16f862d 58extern struct kmem_cache *kvm_vcpu_cache;
6aa8b732 59
743eeb0b
SL
60struct kvm_io_range {
61 gpa_t addr;
62 int len;
63 struct kvm_io_device *dev;
64};
65
2eeb2e94
GH
66struct kvm_io_bus {
67 int dev_count;
2b3c246a 68#define NR_IOBUS_DEVS 300
743eeb0b 69 struct kvm_io_range range[NR_IOBUS_DEVS];
2eeb2e94
GH
70};
71
e93f8a0f
MT
72enum kvm_bus {
73 KVM_MMIO_BUS,
74 KVM_PIO_BUS,
75 KVM_NR_BUSES
76};
77
78int kvm_io_bus_write(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr,
79 int len, const void *val);
80int kvm_io_bus_read(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr, int len,
bda9020e 81 void *val);
743eeb0b
SL
82int kvm_io_bus_register_dev(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr,
83 int len, struct kvm_io_device *dev);
e93f8a0f
MT
84int kvm_io_bus_unregister_dev(struct kvm *kvm, enum kvm_bus bus_idx,
85 struct kvm_io_device *dev);
2eeb2e94 86
af585b92
GN
87#ifdef CONFIG_KVM_ASYNC_PF
88struct kvm_async_pf {
89 struct work_struct work;
90 struct list_head link;
91 struct list_head queue;
92 struct kvm_vcpu *vcpu;
93 struct mm_struct *mm;
94 gva_t gva;
95 unsigned long addr;
96 struct kvm_arch_async_pf arch;
97 struct page *page;
98 bool done;
99};
100
101void kvm_clear_async_pf_completion_queue(struct kvm_vcpu *vcpu);
102void kvm_check_async_pf_completion(struct kvm_vcpu *vcpu);
103int kvm_setup_async_pf(struct kvm_vcpu *vcpu, gva_t gva, gfn_t gfn,
104 struct kvm_arch_async_pf *arch);
344d9588 105int kvm_async_pf_wakeup_all(struct kvm_vcpu *vcpu);
af585b92
GN
106#endif
107
6b7e2d09
XG
108enum {
109 OUTSIDE_GUEST_MODE,
110 IN_GUEST_MODE,
111 EXITING_GUEST_MODE
112};
113
d17fbbf7
ZX
114struct kvm_vcpu {
115 struct kvm *kvm;
31bb117e 116#ifdef CONFIG_PREEMPT_NOTIFIERS
d17fbbf7 117 struct preempt_notifier preempt_notifier;
31bb117e 118#endif
6b7e2d09 119 int cpu;
d17fbbf7 120 int vcpu_id;
6b7e2d09
XG
121 int srcu_idx;
122 int mode;
d17fbbf7 123 unsigned long requests;
d0bfb940 124 unsigned long guest_debug;
6b7e2d09
XG
125
126 struct mutex mutex;
127 struct kvm_run *run;
f656ce01 128
d17fbbf7 129 int fpu_active;
2acf923e 130 int guest_fpu_loaded, guest_xcr0_loaded;
d17fbbf7 131 wait_queue_head_t wq;
34bb10b7 132 struct pid *pid;
d17fbbf7
ZX
133 int sigset_active;
134 sigset_t sigset;
135 struct kvm_vcpu_stat stat;
136
34c16eec 137#ifdef CONFIG_HAS_IOMEM
d17fbbf7
ZX
138 int mmio_needed;
139 int mmio_read_completed;
140 int mmio_is_write;
141 int mmio_size;
cef4dea0
AK
142 int mmio_index;
143 unsigned char mmio_data[KVM_MMIO_SIZE];
6aa8b732 144 gpa_t mmio_phys_addr;
34c16eec 145#endif
1165f5fe 146
af585b92
GN
147#ifdef CONFIG_KVM_ASYNC_PF
148 struct {
149 u32 queued;
150 struct list_head queue;
151 struct list_head done;
152 spinlock_t lock;
153 } async_pf;
154#endif
155
d657a98e
ZX
156 struct kvm_vcpu_arch arch;
157};
158
6b7e2d09
XG
159static inline int kvm_vcpu_exiting_guest_mode(struct kvm_vcpu *vcpu)
160{
161 return cmpxchg(&vcpu->mode, IN_GUEST_MODE, EXITING_GUEST_MODE);
162}
163
660c22c4
TY
164/*
165 * Some of the bitops functions do not support too long bitmaps.
166 * This number must be determined not to exceed such limits.
167 */
168#define KVM_MEM_MAX_NR_PAGES ((1UL << 31) - 1)
169
d4dbf470
TY
170struct kvm_lpage_info {
171 unsigned long rmap_pde;
172 int write_count;
173};
174
6aa8b732
AK
175struct kvm_memory_slot {
176 gfn_t base_gfn;
177 unsigned long npages;
178 unsigned long flags;
290fc38d 179 unsigned long *rmap;
6aa8b732 180 unsigned long *dirty_bitmap;
515a0127 181 unsigned long *dirty_bitmap_head;
d4dbf470 182 struct kvm_lpage_info *lpage_info[KVM_NR_PAGE_SIZES - 1];
8a7ae055 183 unsigned long userspace_addr;
80b14b5b 184 int user_alloc;
e36d96f7 185 int id;
6aa8b732
AK
186};
187
87bf6e7d
TY
188static inline unsigned long kvm_dirty_bitmap_bytes(struct kvm_memory_slot *memslot)
189{
190 return ALIGN(memslot->npages, BITS_PER_LONG) / 8;
191}
192
399ec807
AK
193struct kvm_kernel_irq_routing_entry {
194 u32 gsi;
5116d8f6 195 u32 type;
4925663a 196 int (*set)(struct kvm_kernel_irq_routing_entry *e,
1a6e4a8c 197 struct kvm *kvm, int irq_source_id, int level);
399ec807
AK
198 union {
199 struct {
200 unsigned irqchip;
201 unsigned pin;
202 } irqchip;
79950e10 203 struct msi_msg msi;
399ec807 204 };
46e624b9
GN
205 struct hlist_node link;
206};
207
3e71f88b
GN
208#ifdef __KVM_HAVE_IOAPIC
209
46e624b9 210struct kvm_irq_routing_table {
3e71f88b 211 int chip[KVM_NR_IRQCHIPS][KVM_IOAPIC_NUM_PINS];
46e624b9
GN
212 struct kvm_kernel_irq_routing_entry *rt_entries;
213 u32 nr_rt_entries;
214 /*
215 * Array indexed by gsi. Each entry contains list of irq chips
216 * the gsi is connected to.
217 */
218 struct hlist_head map[0];
399ec807
AK
219};
220
3e71f88b
GN
221#else
222
223struct kvm_irq_routing_table {};
224
225#endif
226
46a26bf5
MT
227struct kvm_memslots {
228 int nmemslots;
49c7754c 229 u64 generation;
46a26bf5
MT
230 struct kvm_memory_slot memslots[KVM_MEMORY_SLOTS +
231 KVM_PRIVATE_MEM_SLOTS];
232};
233
6aa8b732 234struct kvm {
aaee2c94 235 spinlock_t mmu_lock;
79fac95e 236 struct mutex slots_lock;
6d4e4c4f 237 struct mm_struct *mm; /* userspace tied to this vm */
46a26bf5 238 struct kvm_memslots *memslots;
bc6678a3 239 struct srcu_struct srcu;
73880c80
GN
240#ifdef CONFIG_KVM_APIC_ARCHITECTURE
241 u32 bsp_vcpu_id;
c5af89b6 242 struct kvm_vcpu *bsp_vcpu;
73880c80 243#endif
fb3f0f51 244 struct kvm_vcpu *vcpus[KVM_MAX_VCPUS];
73880c80 245 atomic_t online_vcpus;
217ece61 246 int last_boosted_vcpu;
133de902 247 struct list_head vm_list;
60eead79 248 struct mutex lock;
e93f8a0f 249 struct kvm_io_bus *buses[KVM_NR_BUSES];
721eecbf
GH
250#ifdef CONFIG_HAVE_KVM_EVENTFD
251 struct {
252 spinlock_t lock;
253 struct list_head items;
254 } irqfds;
d34e6b17 255 struct list_head ioeventfds;
721eecbf 256#endif
ba1389b7 257 struct kvm_vm_stat stat;
d69fb81f 258 struct kvm_arch arch;
d39f13b0 259 atomic_t users_count;
5f94c174 260#ifdef KVM_COALESCED_MMIO_PAGE_OFFSET
5f94c174 261 struct kvm_coalesced_mmio_ring *coalesced_mmio_ring;
2b3c246a
SL
262 spinlock_t ring_lock;
263 struct list_head coalesced_zones;
5f94c174 264#endif
e930bffe 265
60eead79 266 struct mutex irq_lock;
75858a84 267#ifdef CONFIG_HAVE_KVM_IRQCHIP
bd2b53b2
MT
268 /*
269 * Update side is protected by irq_lock and,
270 * if configured, irqfds.lock.
271 */
4b6a2872 272 struct kvm_irq_routing_table __rcu *irq_routing;
75858a84 273 struct hlist_head mask_notifier_list;
136bdfee 274 struct hlist_head irq_ack_notifier_list;
75858a84
AK
275#endif
276
e930bffe
AA
277#ifdef KVM_ARCH_WANT_MMU_NOTIFIER
278 struct mmu_notifier mmu_notifier;
279 unsigned long mmu_notifier_seq;
280 long mmu_notifier_count;
281#endif
5c663a15 282 long tlbs_dirty;
6aa8b732
AK
283};
284
f0242478
RR
285/* The guest did something we don't support. */
286#define pr_unimpl(vcpu, fmt, ...) \
bd80158a
JK
287 pr_err_ratelimited("kvm: %i: cpu%i " fmt, \
288 current->tgid, (vcpu)->vcpu_id , ## __VA_ARGS__)
f0242478 289
6aa8b732
AK
290#define kvm_printf(kvm, fmt ...) printk(KERN_DEBUG fmt)
291#define vcpu_printf(vcpu, fmt...) kvm_printf(vcpu->kvm, fmt)
292
988a2cae
GN
293static inline struct kvm_vcpu *kvm_get_vcpu(struct kvm *kvm, int i)
294{
295 smp_rmb();
296 return kvm->vcpus[i];
297}
298
299#define kvm_for_each_vcpu(idx, vcpup, kvm) \
b42fc3cb
JM
300 for (idx = 0; \
301 idx < atomic_read(&kvm->online_vcpus) && \
302 (vcpup = kvm_get_vcpu(kvm, idx)) != NULL; \
303 idx++)
988a2cae 304
fb3f0f51
RR
305int kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id);
306void kvm_vcpu_uninit(struct kvm_vcpu *vcpu);
307
313a3dc7
CO
308void vcpu_load(struct kvm_vcpu *vcpu);
309void vcpu_put(struct kvm_vcpu *vcpu);
310
0ee75bea 311int kvm_init(void *opaque, unsigned vcpu_size, unsigned vcpu_align,
c16f862d 312 struct module *module);
cb498ea2 313void kvm_exit(void);
6aa8b732 314
d39f13b0
IE
315void kvm_get_kvm(struct kvm *kvm);
316void kvm_put_kvm(struct kvm *kvm);
317
90d83dc3
LJ
318static inline struct kvm_memslots *kvm_memslots(struct kvm *kvm)
319{
320 return rcu_dereference_check(kvm->memslots,
321 srcu_read_lock_held(&kvm->srcu)
322 || lockdep_is_held(&kvm->slots_lock));
323}
324
6aa8b732
AK
325#define HPA_MSB ((sizeof(hpa_t) * 8) - 1)
326#define HPA_ERR_MASK ((hpa_t)1 << HPA_MSB)
327static inline int is_error_hpa(hpa_t hpa) { return hpa >> HPA_MSB; }
6aa8b732 328
cea7bb21 329extern struct page *bad_page;
fce92dce
XG
330extern struct page *fault_page;
331
35149e21 332extern pfn_t bad_pfn;
fce92dce 333extern pfn_t fault_pfn;
6aa8b732 334
cea7bb21 335int is_error_page(struct page *page);
35149e21 336int is_error_pfn(pfn_t pfn);
bf998156 337int is_hwpoison_pfn(pfn_t pfn);
edba23e5 338int is_fault_pfn(pfn_t pfn);
fce92dce
XG
339int is_noslot_pfn(pfn_t pfn);
340int is_invalid_pfn(pfn_t pfn);
f9d46eb0 341int kvm_is_error_hva(unsigned long addr);
210c7c4d
IE
342int kvm_set_memory_region(struct kvm *kvm,
343 struct kvm_userspace_memory_region *mem,
344 int user_alloc);
f78e0e2e
SY
345int __kvm_set_memory_region(struct kvm *kvm,
346 struct kvm_userspace_memory_region *mem,
347 int user_alloc);
f7784b8e
MT
348int kvm_arch_prepare_memory_region(struct kvm *kvm,
349 struct kvm_memory_slot *memslot,
350 struct kvm_memory_slot old,
351 struct kvm_userspace_memory_region *mem,
352 int user_alloc);
353void kvm_arch_commit_memory_region(struct kvm *kvm,
0de10343
ZX
354 struct kvm_userspace_memory_region *mem,
355 struct kvm_memory_slot old,
356 int user_alloc);
54dee993 357void kvm_disable_largepages(void);
34d4cb8f 358void kvm_arch_flush_shadow(struct kvm *kvm);
a983fb23 359
48987781
XG
360int gfn_to_page_many_atomic(struct kvm *kvm, gfn_t gfn, struct page **pages,
361 int nr_pages);
362
954bbbc2 363struct page *gfn_to_page(struct kvm *kvm, gfn_t gfn);
05da4558 364unsigned long gfn_to_hva(struct kvm *kvm, gfn_t gfn);
b4231d61
IE
365void kvm_release_page_clean(struct page *page);
366void kvm_release_page_dirty(struct page *page);
35149e21
AL
367void kvm_set_page_dirty(struct page *page);
368void kvm_set_page_accessed(struct page *page);
369
887c08ac 370pfn_t hva_to_pfn_atomic(struct kvm *kvm, unsigned long addr);
365fb3fd 371pfn_t gfn_to_pfn_atomic(struct kvm *kvm, gfn_t gfn);
612819c3
MT
372pfn_t gfn_to_pfn_async(struct kvm *kvm, gfn_t gfn, bool *async,
373 bool write_fault, bool *writable);
35149e21 374pfn_t gfn_to_pfn(struct kvm *kvm, gfn_t gfn);
612819c3
MT
375pfn_t gfn_to_pfn_prot(struct kvm *kvm, gfn_t gfn, bool write_fault,
376 bool *writable);
506f0d6f
MT
377pfn_t gfn_to_pfn_memslot(struct kvm *kvm,
378 struct kvm_memory_slot *slot, gfn_t gfn);
35149e21
AL
379void kvm_release_pfn_dirty(pfn_t);
380void kvm_release_pfn_clean(pfn_t pfn);
381void kvm_set_pfn_dirty(pfn_t pfn);
382void kvm_set_pfn_accessed(pfn_t pfn);
383void kvm_get_pfn(pfn_t pfn);
384
195aefde
IE
385int kvm_read_guest_page(struct kvm *kvm, gfn_t gfn, void *data, int offset,
386 int len);
7ec54588
MT
387int kvm_read_guest_atomic(struct kvm *kvm, gpa_t gpa, void *data,
388 unsigned long len);
195aefde 389int kvm_read_guest(struct kvm *kvm, gpa_t gpa, void *data, unsigned long len);
e03b644f
GN
390int kvm_read_guest_cached(struct kvm *kvm, struct gfn_to_hva_cache *ghc,
391 void *data, unsigned long len);
195aefde
IE
392int kvm_write_guest_page(struct kvm *kvm, gfn_t gfn, const void *data,
393 int offset, int len);
394int kvm_write_guest(struct kvm *kvm, gpa_t gpa, const void *data,
395 unsigned long len);
49c7754c
GN
396int kvm_write_guest_cached(struct kvm *kvm, struct gfn_to_hva_cache *ghc,
397 void *data, unsigned long len);
398int kvm_gfn_to_hva_cache_init(struct kvm *kvm, struct gfn_to_hva_cache *ghc,
399 gpa_t gpa);
195aefde
IE
400int kvm_clear_guest_page(struct kvm *kvm, gfn_t gfn, int offset, int len);
401int kvm_clear_guest(struct kvm *kvm, gpa_t gpa, unsigned long len);
6aa8b732 402struct kvm_memory_slot *gfn_to_memslot(struct kvm *kvm, gfn_t gfn);
e0d62c7f 403int kvm_is_visible_gfn(struct kvm *kvm, gfn_t gfn);
8f0b1ab6 404unsigned long kvm_host_page_size(struct kvm *kvm, gfn_t gfn);
6aa8b732 405void mark_page_dirty(struct kvm *kvm, gfn_t gfn);
49c7754c
GN
406void mark_page_dirty_in_slot(struct kvm *kvm, struct kvm_memory_slot *memslot,
407 gfn_t gfn);
6aa8b732 408
8776e519 409void kvm_vcpu_block(struct kvm_vcpu *vcpu);
d255f4f2 410void kvm_vcpu_on_spin(struct kvm_vcpu *vcpu);
6aa8b732 411void kvm_resched(struct kvm_vcpu *vcpu);
7702fd1f
AK
412void kvm_load_guest_fpu(struct kvm_vcpu *vcpu);
413void kvm_put_guest_fpu(struct kvm_vcpu *vcpu);
a4ee1ca4 414
d9e368d6 415void kvm_flush_remote_tlbs(struct kvm *kvm);
2e53d63a 416void kvm_reload_remote_mmus(struct kvm *kvm);
6aa8b732 417
043405e1
CO
418long kvm_arch_dev_ioctl(struct file *filp,
419 unsigned int ioctl, unsigned long arg);
313a3dc7
CO
420long kvm_arch_vcpu_ioctl(struct file *filp,
421 unsigned int ioctl, unsigned long arg);
018d00d2
ZX
422
423int kvm_dev_ioctl_check_extension(long ext);
424
5bb064dc
ZX
425int kvm_get_dirty_log(struct kvm *kvm,
426 struct kvm_dirty_log *log, int *is_dirty);
427int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
428 struct kvm_dirty_log *log);
429
1fe779f8
CO
430int kvm_vm_ioctl_set_memory_region(struct kvm *kvm,
431 struct
432 kvm_userspace_memory_region *mem,
433 int user_alloc);
434long kvm_arch_vm_ioctl(struct file *filp,
435 unsigned int ioctl, unsigned long arg);
313a3dc7 436
d0752060
HB
437int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu);
438int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu);
439
8b006791
ZX
440int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
441 struct kvm_translation *tr);
442
b6c7a5dc
HB
443int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs);
444int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs);
445int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
446 struct kvm_sregs *sregs);
447int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
448 struct kvm_sregs *sregs);
62d9f0db
MT
449int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
450 struct kvm_mp_state *mp_state);
451int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
452 struct kvm_mp_state *mp_state);
d0bfb940
JK
453int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
454 struct kvm_guest_debug *dbg);
b6c7a5dc
HB
455int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run);
456
f8c16bba
ZX
457int kvm_arch_init(void *opaque);
458void kvm_arch_exit(void);
043405e1 459
e9b11c17
ZX
460int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu);
461void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu);
462
463void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
464void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
465void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu);
466struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, unsigned int id);
26e5215f 467int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu);
d40ccc62 468void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu);
e9b11c17
ZX
469
470int kvm_arch_vcpu_reset(struct kvm_vcpu *vcpu);
10474ae8 471int kvm_arch_hardware_enable(void *garbage);
e9b11c17
ZX
472void kvm_arch_hardware_disable(void *garbage);
473int kvm_arch_hardware_setup(void);
474void kvm_arch_hardware_unsetup(void);
475void kvm_arch_check_processor_compat(void *rtn);
1d737c8a 476int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu);
e9b11c17 477
d19a9cd2
ZX
478void kvm_free_physmem(struct kvm *kvm);
479
d89f5eff
JK
480#ifndef __KVM_HAVE_ARCH_VM_ALLOC
481static inline struct kvm *kvm_arch_alloc_vm(void)
482{
483 return kzalloc(sizeof(struct kvm), GFP_KERNEL);
484}
485
486static inline void kvm_arch_free_vm(struct kvm *kvm)
487{
488 kfree(kvm);
489}
490#endif
491
492int kvm_arch_init_vm(struct kvm *kvm);
d19a9cd2 493void kvm_arch_destroy_vm(struct kvm *kvm);
8a98f664 494void kvm_free_all_assigned_devices(struct kvm *kvm);
ad8ba2cd 495void kvm_arch_sync_events(struct kvm *kvm);
e9b11c17 496
3d80840d 497int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu);
5736199a 498void kvm_vcpu_kick(struct kvm_vcpu *vcpu);
682c59a3 499
c77fb9dc
XZ
500int kvm_is_mmio_pfn(pfn_t pfn);
501
62c476c7
BAY
502struct kvm_irq_ack_notifier {
503 struct hlist_node link;
504 unsigned gsi;
505 void (*irq_acked)(struct kvm_irq_ack_notifier *kian);
506};
507
508struct kvm_assigned_dev_kernel {
509 struct kvm_irq_ack_notifier ack_notifier;
62c476c7
BAY
510 struct list_head list;
511 int assigned_dev_id;
ab9f4ecb 512 int host_segnr;
62c476c7
BAY
513 int host_busnr;
514 int host_devfn;
c1e01514 515 unsigned int entries_nr;
62c476c7 516 int host_irq;
defaf158 517 bool host_irq_disabled;
c1e01514 518 struct msix_entry *host_msix_entries;
62c476c7 519 int guest_irq;
0645211c 520 struct msix_entry *guest_msix_entries;
4f906c19 521 unsigned long irq_requested_type;
5550af4d 522 int irq_source_id;
b653574a 523 int flags;
62c476c7
BAY
524 struct pci_dev *dev;
525 struct kvm *kvm;
0645211c 526 spinlock_t intx_lock;
1e001d49 527 char irq_name[32];
f8fcfd77 528 struct pci_saved_state *pci_saved_state;
62c476c7 529};
75858a84
AK
530
531struct kvm_irq_mask_notifier {
532 void (*func)(struct kvm_irq_mask_notifier *kimn, bool masked);
533 int irq;
534 struct hlist_node link;
535};
536
537void kvm_register_irq_mask_notifier(struct kvm *kvm, int irq,
538 struct kvm_irq_mask_notifier *kimn);
539void kvm_unregister_irq_mask_notifier(struct kvm *kvm, int irq,
540 struct kvm_irq_mask_notifier *kimn);
4a994358
GN
541void kvm_fire_mask_notifiers(struct kvm *kvm, unsigned irqchip, unsigned pin,
542 bool mask);
75858a84 543
46e624b9
GN
544#ifdef __KVM_HAVE_IOAPIC
545void kvm_get_intr_delivery_bitmask(struct kvm_ioapic *ioapic,
546 union kvm_ioapic_redirect_entry *entry,
547 unsigned long *deliver_bitmask);
548#endif
549int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level);
bd2b53b2
MT
550int kvm_set_msi(struct kvm_kernel_irq_routing_entry *irq_entry, struct kvm *kvm,
551 int irq_source_id, int level);
44882eed 552void kvm_notify_acked_irq(struct kvm *kvm, unsigned irqchip, unsigned pin);
3de42dc0
XZ
553void kvm_register_irq_ack_notifier(struct kvm *kvm,
554 struct kvm_irq_ack_notifier *kian);
fa40a821
MT
555void kvm_unregister_irq_ack_notifier(struct kvm *kvm,
556 struct kvm_irq_ack_notifier *kian);
5550af4d
SY
557int kvm_request_irq_source_id(struct kvm *kvm);
558void kvm_free_irq_source_id(struct kvm *kvm, int irq_source_id);
62c476c7 559
522c68c4
SY
560/* For vcpu->arch.iommu_flags */
561#define KVM_IOMMU_CACHE_COHERENCY 0x1
562
19de40a8 563#ifdef CONFIG_IOMMU_API
3ad26d81 564int kvm_iommu_map_pages(struct kvm *kvm, struct kvm_memory_slot *slot);
260782bc 565int kvm_iommu_map_guest(struct kvm *kvm);
62c476c7 566int kvm_iommu_unmap_guest(struct kvm *kvm);
260782bc
WH
567int kvm_assign_device(struct kvm *kvm,
568 struct kvm_assigned_dev_kernel *assigned_dev);
0a920356
WH
569int kvm_deassign_device(struct kvm *kvm,
570 struct kvm_assigned_dev_kernel *assigned_dev);
19de40a8 571#else /* CONFIG_IOMMU_API */
62c476c7 572static inline int kvm_iommu_map_pages(struct kvm *kvm,
d7a79b6c 573 struct kvm_memory_slot *slot)
62c476c7
BAY
574{
575 return 0;
576}
577
260782bc 578static inline int kvm_iommu_map_guest(struct kvm *kvm)
62c476c7
BAY
579{
580 return -ENODEV;
581}
582
583static inline int kvm_iommu_unmap_guest(struct kvm *kvm)
584{
585 return 0;
586}
260782bc
WH
587
588static inline int kvm_assign_device(struct kvm *kvm,
589 struct kvm_assigned_dev_kernel *assigned_dev)
590{
591 return 0;
592}
0a920356
WH
593
594static inline int kvm_deassign_device(struct kvm *kvm,
595 struct kvm_assigned_dev_kernel *assigned_dev)
596{
597 return 0;
598}
19de40a8 599#endif /* CONFIG_IOMMU_API */
62c476c7 600
d172fcd3
LV
601static inline void kvm_guest_enter(void)
602{
8fa22068 603 BUG_ON(preemptible());
e56a7a28 604 account_system_vtime(current);
d172fcd3 605 current->flags |= PF_VCPU;
8fa22068
GN
606 /* KVM does not hold any references to rcu protected data when it
607 * switches CPU into a guest mode. In fact switching to a guest mode
608 * is very similar to exiting to userspase from rcu point of view. In
609 * addition CPU may stay in a guest mode for quite a long time (up to
610 * one time slice). Lets treat guest mode as quiescent state, just like
611 * we do with user-mode execution.
612 */
613 rcu_virt_note_context_switch(smp_processor_id());
d172fcd3
LV
614}
615
616static inline void kvm_guest_exit(void)
617{
e56a7a28 618 account_system_vtime(current);
d172fcd3
LV
619 current->flags &= ~PF_VCPU;
620}
621
0ee8dcb8
XG
622static inline int memslot_id(struct kvm *kvm, gfn_t gfn)
623{
624 return gfn_to_memslot(kvm, gfn)->id;
625}
626
887c08ac
XG
627static inline unsigned long gfn_to_hva_memslot(struct kvm_memory_slot *slot,
628 gfn_t gfn)
629{
630 return slot->userspace_addr + (gfn - slot->base_gfn) * PAGE_SIZE;
631}
632
1755fbcc
AK
633static inline gpa_t gfn_to_gpa(gfn_t gfn)
634{
635 return (gpa_t)gfn << PAGE_SHIFT;
636}
6aa8b732 637
c30a358d
JR
638static inline gfn_t gpa_to_gfn(gpa_t gpa)
639{
640 return (gfn_t)(gpa >> PAGE_SHIFT);
641}
642
62c476c7
BAY
643static inline hpa_t pfn_to_hpa(pfn_t pfn)
644{
645 return (hpa_t)pfn << PAGE_SHIFT;
646}
647
2f599714 648static inline void kvm_migrate_timers(struct kvm_vcpu *vcpu)
2f52d58c
AK
649{
650 set_bit(KVM_REQ_MIGRATE_TIMER, &vcpu->requests);
651}
652
ba1389b7
AK
653enum kvm_stat_kind {
654 KVM_STAT_VM,
655 KVM_STAT_VCPU,
656};
657
417bc304
HB
658struct kvm_stats_debugfs_item {
659 const char *name;
660 int offset;
ba1389b7 661 enum kvm_stat_kind kind;
417bc304
HB
662 struct dentry *dentry;
663};
664extern struct kvm_stats_debugfs_item debugfs_entries[];
76f7c879 665extern struct dentry *kvm_debugfs_dir;
d4c9ff2d 666
e930bffe
AA
667#ifdef KVM_ARCH_WANT_MMU_NOTIFIER
668static inline int mmu_notifier_retry(struct kvm_vcpu *vcpu, unsigned long mmu_seq)
669{
670 if (unlikely(vcpu->kvm->mmu_notifier_count))
671 return 1;
672 /*
673 * Both reads happen under the mmu_lock and both values are
674 * modified under mmu_lock, so there's no need of smb_rmb()
675 * here in between, otherwise mmu_notifier_count should be
676 * read before mmu_notifier_seq, see
677 * mmu_notifier_invalidate_range_end write side.
678 */
679 if (vcpu->kvm->mmu_notifier_seq != mmu_seq)
680 return 1;
681 return 0;
682}
683#endif
684
399ec807
AK
685#ifdef CONFIG_HAVE_KVM_IRQCHIP
686
687#define KVM_MAX_IRQ_ROUTES 1024
688
689int kvm_setup_default_irq_routing(struct kvm *kvm);
690int kvm_set_irq_routing(struct kvm *kvm,
691 const struct kvm_irq_routing_entry *entries,
692 unsigned nr,
693 unsigned flags);
694void kvm_free_irq_routing(struct kvm *kvm);
695
696#else
697
698static inline void kvm_free_irq_routing(struct kvm *kvm) {}
699
700#endif
701
721eecbf
GH
702#ifdef CONFIG_HAVE_KVM_EVENTFD
703
d34e6b17 704void kvm_eventfd_init(struct kvm *kvm);
721eecbf
GH
705int kvm_irqfd(struct kvm *kvm, int fd, int gsi, int flags);
706void kvm_irqfd_release(struct kvm *kvm);
bd2b53b2 707void kvm_irq_routing_update(struct kvm *, struct kvm_irq_routing_table *);
d34e6b17 708int kvm_ioeventfd(struct kvm *kvm, struct kvm_ioeventfd *args);
721eecbf
GH
709
710#else
711
d34e6b17 712static inline void kvm_eventfd_init(struct kvm *kvm) {}
bd2b53b2 713
721eecbf
GH
714static inline int kvm_irqfd(struct kvm *kvm, int fd, int gsi, int flags)
715{
716 return -EINVAL;
717}
718
719static inline void kvm_irqfd_release(struct kvm *kvm) {}
bd2b53b2 720
27923eb1 721#ifdef CONFIG_HAVE_KVM_IRQCHIP
bd2b53b2
MT
722static inline void kvm_irq_routing_update(struct kvm *kvm,
723 struct kvm_irq_routing_table *irq_rt)
724{
725 rcu_assign_pointer(kvm->irq_routing, irq_rt);
726}
27923eb1 727#endif
bd2b53b2 728
d34e6b17
GH
729static inline int kvm_ioeventfd(struct kvm *kvm, struct kvm_ioeventfd *args)
730{
731 return -ENOSYS;
732}
721eecbf
GH
733
734#endif /* CONFIG_HAVE_KVM_EVENTFD */
735
73880c80 736#ifdef CONFIG_KVM_APIC_ARCHITECTURE
c5af89b6
GN
737static inline bool kvm_vcpu_is_bsp(struct kvm_vcpu *vcpu)
738{
d3efc8ef 739 return vcpu->kvm->bsp_vcpu_id == vcpu->vcpu_id;
c5af89b6 740}
6aa8b732 741#endif
bfd99ff5
AK
742
743#ifdef __KVM_HAVE_DEVICE_ASSIGNMENT
744
745long kvm_vm_ioctl_assigned_device(struct kvm *kvm, unsigned ioctl,
746 unsigned long arg);
747
748#else
749
750static inline long kvm_vm_ioctl_assigned_device(struct kvm *kvm, unsigned ioctl,
751 unsigned long arg)
752{
753 return -ENOTTY;
754}
755
73880c80 756#endif
bfd99ff5 757
a8eeb04a
AK
758static inline void kvm_make_request(int req, struct kvm_vcpu *vcpu)
759{
760 set_bit(req, &vcpu->requests);
761}
762
a8eeb04a
AK
763static inline bool kvm_check_request(int req, struct kvm_vcpu *vcpu)
764{
0719837c
AK
765 if (test_bit(req, &vcpu->requests)) {
766 clear_bit(req, &vcpu->requests);
767 return true;
768 } else {
769 return false;
770 }
a8eeb04a
AK
771}
772
bfd99ff5
AK
773#endif
774
This page took 0.741431 seconds and 5 git commands to generate.