2003-10-01 00:34:21 +04:00
|
|
|
/*
|
|
|
|
* i386 virtual CPU header
|
2007-09-17 01:08:06 +04:00
|
|
|
*
|
2003-10-01 00:34:21 +04:00
|
|
|
* Copyright (c) 2003 Fabrice Bellard
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
2020-10-23 15:28:01 +03:00
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
2003-10-01 00:34:21 +04:00
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
2009-07-17 00:47:01 +04:00
|
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
2003-10-01 00:34:21 +04:00
|
|
|
*/
|
2016-06-29 12:05:55 +03:00
|
|
|
|
|
|
|
#ifndef I386_CPU_H
|
|
|
|
#define I386_CPU_H
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2019-05-23 17:35:05 +03:00
|
|
|
#include "sysemu/tcg.h"
|
2016-03-15 15:49:25 +03:00
|
|
|
#include "cpu-qom.h"
|
2020-12-12 18:55:08 +03:00
|
|
|
#include "kvm/hyperv-proto.h"
|
i386: hvf: add code base from Google's QEMU repository
This file begins tracking the files that will be the code base for HVF
support in QEMU. This code base is part of Google's QEMU version of
their Android emulator, and can be found at
https://android.googlesource.com/platform/external/qemu/+/emu-master-dev
This code is based on Veertu Inc's vdhh (Veertu Desktop Hosted
Hypervisor), found at https://github.com/veertuinc/vdhh. Everything is
appropriately licensed under GPL v2-or-later, except for the code inside
x86_task.c and x86_task.h, which, deriving from KVM (the Linux kernel),
is licensed GPL v2-only.
This code base already implements a very great deal of functionality,
although Google's version removed from Vertuu's the support for APIC
page and hyperv-related stuff. According to the Android Emulator Release
Notes, Revision 26.1.3 (August 2017), "Hypervisor.framework is now
enabled by default on macOS for 32-bit x86 images to improve performance
and macOS compatibility", although we better use with caution for, as the
same Revision warns us, "If you experience issues with it specifically,
please file a bug report...". The code hasn't seen much update in the
last 5 months, so I think that we can further develop the code with
occasional visiting Google's repository to see if there has been any
update.
On top of Google's code, the following changes were made:
- add code to the configure script to support the --enable-hvf argument.
If the OS is Darwin, it checks for presence of HVF in the system. The
patch also adds strings related to HVF in the file qemu-options.hx.
QEMU will only support the modern syntax style '-M accel=hvf' no enable
hvf; the legacy '-enable-hvf' will not be supported.
- fix styling issues
- add glue code to cpus.c
- move HVFX86EmulatorState field to CPUX86State, changing the
the emulation functions to have a parameter with signature 'CPUX86State *'
instead of 'CPUState *' so we don't have to get the 'env'.
Signed-off-by: Sergio Andres Gomez Del Real <Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-2-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-3-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-5-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-6-Sergio.G.DelReal@gmail.com>
Message-Id: <20170905035457.3753-7-Sergio.G.DelReal@gmail.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2017-09-13 12:05:09 +03:00
|
|
|
#include "exec/cpu-defs.h"
|
2019-10-18 19:39:08 +03:00
|
|
|
#include "qapi/qapi-types-common.h"
|
2022-03-23 18:57:39 +03:00
|
|
|
#include "qemu/cpu-float.h"
|
2018-09-17 14:04:54 +03:00
|
|
|
#include "qemu/timer.h"
|
i386: hvf: add code base from Google's QEMU repository
This file begins tracking the files that will be the code base for HVF
support in QEMU. This code base is part of Google's QEMU version of
their Android emulator, and can be found at
https://android.googlesource.com/platform/external/qemu/+/emu-master-dev
This code is based on Veertu Inc's vdhh (Veertu Desktop Hosted
Hypervisor), found at https://github.com/veertuinc/vdhh. Everything is
appropriately licensed under GPL v2-or-later, except for the code inside
x86_task.c and x86_task.h, which, deriving from KVM (the Linux kernel),
is licensed GPL v2-only.
This code base already implements a very great deal of functionality,
although Google's version removed from Vertuu's the support for APIC
page and hyperv-related stuff. According to the Android Emulator Release
Notes, Revision 26.1.3 (August 2017), "Hypervisor.framework is now
enabled by default on macOS for 32-bit x86 images to improve performance
and macOS compatibility", although we better use with caution for, as the
same Revision warns us, "If you experience issues with it specifically,
please file a bug report...". The code hasn't seen much update in the
last 5 months, so I think that we can further develop the code with
occasional visiting Google's repository to see if there has been any
update.
On top of Google's code, the following changes were made:
- add code to the configure script to support the --enable-hvf argument.
If the OS is Darwin, it checks for presence of HVF in the system. The
patch also adds strings related to HVF in the file qemu-options.hx.
QEMU will only support the modern syntax style '-M accel=hvf' no enable
hvf; the legacy '-enable-hvf' will not be supported.
- fix styling issues
- add glue code to cpus.c
- move HVFX86EmulatorState field to CPUX86State, changing the
the emulation functions to have a parameter with signature 'CPUX86State *'
instead of 'CPUState *' so we don't have to get the 'env'.
Signed-off-by: Sergio Andres Gomez Del Real <Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-2-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-3-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-5-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-6-Sergio.G.DelReal@gmail.com>
Message-Id: <20170905035457.3753-7-Sergio.G.DelReal@gmail.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2017-09-13 12:05:09 +03:00
|
|
|
|
2022-12-14 01:40:56 +03:00
|
|
|
#define XEN_NR_VIRQS 24
|
|
|
|
|
target-arm: kvm64: handle SIGBUS signal from kernel or KVM
Add a SIGBUS signal handler. In this handler, it checks the SIGBUS type,
translates the host VA delivered by host to guest PA, then fills this PA
to guest APEI GHES memory, then notifies guest according to the SIGBUS
type.
When guest accesses the poisoned memory, it will generate a Synchronous
External Abort(SEA). Then host kernel gets an APEI notification and calls
memory_failure() to unmapped the affected page in stage 2, finally
returns to guest.
Guest continues to access the PG_hwpoison page, it will trap to KVM as
stage2 fault, then a SIGBUS_MCEERR_AR synchronous signal is delivered to
Qemu, Qemu records this error address into guest APEI GHES memory and
notifes guest using Synchronous-External-Abort(SEA).
In order to inject a vSEA, we introduce the kvm_inject_arm_sea() function
in which we can setup the type of exception and the syndrome information.
When switching to guest, the target vcpu will jump to the synchronous
external abort vector table entry.
The ESR_ELx.DFSC is set to synchronous external abort(0x10), and the
ESR_ELx.FnV is set to not valid(0x1), which will tell guest that FAR is
not valid and hold an UNKNOWN value. These values will be set to KVM
register structures through KVM_SET_ONE_REG IOCTL.
Signed-off-by: Dongjiu Geng <gengdongjiu@huawei.com>
Signed-off-by: Xiang Zheng <zhengxiang9@huawei.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Acked-by: Xiang Zheng <zhengxiang9@huawei.com>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Igor Mammedov <imammedo@redhat.com>
Message-id: 20200512030609.19593-10-gengdongjiu@huawei.com
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2020-05-12 06:06:08 +03:00
|
|
|
#define KVM_HAVE_MCE_INJECTION 1
|
|
|
|
|
2004-04-25 21:57:43 +04:00
|
|
|
/* support for self modifying code even if the modified instruction is
|
|
|
|
close to the modifying instruction */
|
|
|
|
#define TARGET_HAS_PRECISE_SMC
|
|
|
|
|
2006-12-23 17:18:40 +03:00
|
|
|
#ifdef TARGET_X86_64
|
2015-05-11 09:29:10 +03:00
|
|
|
#define I386_ELF_MACHINE EM_X86_64
|
2014-02-18 10:11:37 +04:00
|
|
|
#define ELF_MACHINE_UNAME "x86_64"
|
2006-12-23 17:18:40 +03:00
|
|
|
#else
|
2015-05-11 09:29:10 +03:00
|
|
|
#define I386_ELF_MACHINE EM_386
|
2014-02-18 10:11:37 +04:00
|
|
|
#define ELF_MACHINE_UNAME "i686"
|
2006-12-23 17:18:40 +03:00
|
|
|
#endif
|
|
|
|
|
2017-10-03 14:59:15 +03:00
|
|
|
enum {
|
|
|
|
R_EAX = 0,
|
|
|
|
R_ECX = 1,
|
|
|
|
R_EDX = 2,
|
|
|
|
R_EBX = 3,
|
|
|
|
R_ESP = 4,
|
|
|
|
R_EBP = 5,
|
|
|
|
R_ESI = 6,
|
|
|
|
R_EDI = 7,
|
|
|
|
R_R8 = 8,
|
|
|
|
R_R9 = 9,
|
|
|
|
R_R10 = 10,
|
|
|
|
R_R11 = 11,
|
|
|
|
R_R12 = 12,
|
|
|
|
R_R13 = 13,
|
|
|
|
R_R14 = 14,
|
|
|
|
R_R15 = 15,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2017-10-03 14:59:15 +03:00
|
|
|
R_AL = 0,
|
|
|
|
R_CL = 1,
|
|
|
|
R_DL = 2,
|
|
|
|
R_BL = 3,
|
|
|
|
R_AH = 4,
|
|
|
|
R_CH = 5,
|
|
|
|
R_DH = 6,
|
|
|
|
R_BH = 7,
|
|
|
|
};
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2017-10-03 14:59:15 +03:00
|
|
|
typedef enum X86Seg {
|
|
|
|
R_ES = 0,
|
|
|
|
R_CS = 1,
|
|
|
|
R_SS = 2,
|
|
|
|
R_DS = 3,
|
|
|
|
R_FS = 4,
|
|
|
|
R_GS = 5,
|
|
|
|
R_LDTR = 6,
|
|
|
|
R_TR = 7,
|
|
|
|
} X86Seg;
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
/* segment descriptor fields */
|
i386: hvf: add code base from Google's QEMU repository
This file begins tracking the files that will be the code base for HVF
support in QEMU. This code base is part of Google's QEMU version of
their Android emulator, and can be found at
https://android.googlesource.com/platform/external/qemu/+/emu-master-dev
This code is based on Veertu Inc's vdhh (Veertu Desktop Hosted
Hypervisor), found at https://github.com/veertuinc/vdhh. Everything is
appropriately licensed under GPL v2-or-later, except for the code inside
x86_task.c and x86_task.h, which, deriving from KVM (the Linux kernel),
is licensed GPL v2-only.
This code base already implements a very great deal of functionality,
although Google's version removed from Vertuu's the support for APIC
page and hyperv-related stuff. According to the Android Emulator Release
Notes, Revision 26.1.3 (August 2017), "Hypervisor.framework is now
enabled by default on macOS for 32-bit x86 images to improve performance
and macOS compatibility", although we better use with caution for, as the
same Revision warns us, "If you experience issues with it specifically,
please file a bug report...". The code hasn't seen much update in the
last 5 months, so I think that we can further develop the code with
occasional visiting Google's repository to see if there has been any
update.
On top of Google's code, the following changes were made:
- add code to the configure script to support the --enable-hvf argument.
If the OS is Darwin, it checks for presence of HVF in the system. The
patch also adds strings related to HVF in the file qemu-options.hx.
QEMU will only support the modern syntax style '-M accel=hvf' no enable
hvf; the legacy '-enable-hvf' will not be supported.
- fix styling issues
- add glue code to cpus.c
- move HVFX86EmulatorState field to CPUX86State, changing the
the emulation functions to have a parameter with signature 'CPUX86State *'
instead of 'CPUState *' so we don't have to get the 'env'.
Signed-off-by: Sergio Andres Gomez Del Real <Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-2-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-3-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-5-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-6-Sergio.G.DelReal@gmail.com>
Message-Id: <20170905035457.3753-7-Sergio.G.DelReal@gmail.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2017-09-13 12:05:09 +03:00
|
|
|
#define DESC_G_SHIFT 23
|
|
|
|
#define DESC_G_MASK (1 << DESC_G_SHIFT)
|
2003-10-01 00:34:21 +04:00
|
|
|
#define DESC_B_SHIFT 22
|
|
|
|
#define DESC_B_MASK (1 << DESC_B_SHIFT)
|
2005-01-04 02:50:08 +03:00
|
|
|
#define DESC_L_SHIFT 21 /* x86_64 only : 64 bit code segment */
|
|
|
|
#define DESC_L_MASK (1 << DESC_L_SHIFT)
|
i386: hvf: add code base from Google's QEMU repository
This file begins tracking the files that will be the code base for HVF
support in QEMU. This code base is part of Google's QEMU version of
their Android emulator, and can be found at
https://android.googlesource.com/platform/external/qemu/+/emu-master-dev
This code is based on Veertu Inc's vdhh (Veertu Desktop Hosted
Hypervisor), found at https://github.com/veertuinc/vdhh. Everything is
appropriately licensed under GPL v2-or-later, except for the code inside
x86_task.c and x86_task.h, which, deriving from KVM (the Linux kernel),
is licensed GPL v2-only.
This code base already implements a very great deal of functionality,
although Google's version removed from Vertuu's the support for APIC
page and hyperv-related stuff. According to the Android Emulator Release
Notes, Revision 26.1.3 (August 2017), "Hypervisor.framework is now
enabled by default on macOS for 32-bit x86 images to improve performance
and macOS compatibility", although we better use with caution for, as the
same Revision warns us, "If you experience issues with it specifically,
please file a bug report...". The code hasn't seen much update in the
last 5 months, so I think that we can further develop the code with
occasional visiting Google's repository to see if there has been any
update.
On top of Google's code, the following changes were made:
- add code to the configure script to support the --enable-hvf argument.
If the OS is Darwin, it checks for presence of HVF in the system. The
patch also adds strings related to HVF in the file qemu-options.hx.
QEMU will only support the modern syntax style '-M accel=hvf' no enable
hvf; the legacy '-enable-hvf' will not be supported.
- fix styling issues
- add glue code to cpus.c
- move HVFX86EmulatorState field to CPUX86State, changing the
the emulation functions to have a parameter with signature 'CPUX86State *'
instead of 'CPUState *' so we don't have to get the 'env'.
Signed-off-by: Sergio Andres Gomez Del Real <Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-2-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-3-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-5-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-6-Sergio.G.DelReal@gmail.com>
Message-Id: <20170905035457.3753-7-Sergio.G.DelReal@gmail.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2017-09-13 12:05:09 +03:00
|
|
|
#define DESC_AVL_SHIFT 20
|
|
|
|
#define DESC_AVL_MASK (1 << DESC_AVL_SHIFT)
|
|
|
|
#define DESC_P_SHIFT 15
|
|
|
|
#define DESC_P_MASK (1 << DESC_P_SHIFT)
|
2003-10-01 00:34:21 +04:00
|
|
|
#define DESC_DPL_SHIFT 13
|
2009-04-18 19:36:11 +04:00
|
|
|
#define DESC_DPL_MASK (3 << DESC_DPL_SHIFT)
|
i386: hvf: add code base from Google's QEMU repository
This file begins tracking the files that will be the code base for HVF
support in QEMU. This code base is part of Google's QEMU version of
their Android emulator, and can be found at
https://android.googlesource.com/platform/external/qemu/+/emu-master-dev
This code is based on Veertu Inc's vdhh (Veertu Desktop Hosted
Hypervisor), found at https://github.com/veertuinc/vdhh. Everything is
appropriately licensed under GPL v2-or-later, except for the code inside
x86_task.c and x86_task.h, which, deriving from KVM (the Linux kernel),
is licensed GPL v2-only.
This code base already implements a very great deal of functionality,
although Google's version removed from Vertuu's the support for APIC
page and hyperv-related stuff. According to the Android Emulator Release
Notes, Revision 26.1.3 (August 2017), "Hypervisor.framework is now
enabled by default on macOS for 32-bit x86 images to improve performance
and macOS compatibility", although we better use with caution for, as the
same Revision warns us, "If you experience issues with it specifically,
please file a bug report...". The code hasn't seen much update in the
last 5 months, so I think that we can further develop the code with
occasional visiting Google's repository to see if there has been any
update.
On top of Google's code, the following changes were made:
- add code to the configure script to support the --enable-hvf argument.
If the OS is Darwin, it checks for presence of HVF in the system. The
patch also adds strings related to HVF in the file qemu-options.hx.
QEMU will only support the modern syntax style '-M accel=hvf' no enable
hvf; the legacy '-enable-hvf' will not be supported.
- fix styling issues
- add glue code to cpus.c
- move HVFX86EmulatorState field to CPUX86State, changing the
the emulation functions to have a parameter with signature 'CPUX86State *'
instead of 'CPUState *' so we don't have to get the 'env'.
Signed-off-by: Sergio Andres Gomez Del Real <Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-2-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-3-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-5-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-6-Sergio.G.DelReal@gmail.com>
Message-Id: <20170905035457.3753-7-Sergio.G.DelReal@gmail.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2017-09-13 12:05:09 +03:00
|
|
|
#define DESC_S_SHIFT 12
|
|
|
|
#define DESC_S_MASK (1 << DESC_S_SHIFT)
|
2003-10-01 00:34:21 +04:00
|
|
|
#define DESC_TYPE_SHIFT 8
|
2009-04-18 19:36:11 +04:00
|
|
|
#define DESC_TYPE_MASK (15 << DESC_TYPE_SHIFT)
|
2003-10-01 00:34:21 +04:00
|
|
|
#define DESC_A_MASK (1 << 8)
|
|
|
|
|
2003-11-13 02:23:42 +03:00
|
|
|
#define DESC_CS_MASK (1 << 11) /* 1=code segment 0=data segment */
|
|
|
|
#define DESC_C_MASK (1 << 10) /* code: conforming */
|
|
|
|
#define DESC_R_MASK (1 << 9) /* code: readable */
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2003-11-13 02:23:42 +03:00
|
|
|
#define DESC_E_MASK (1 << 10) /* data: expansion direction */
|
|
|
|
#define DESC_W_MASK (1 << 9) /* data: writable */
|
|
|
|
|
|
|
|
#define DESC_TSS_BUSY_MASK (1 << 9)
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
/* eflags masks */
|
2013-07-25 19:05:21 +04:00
|
|
|
#define CC_C 0x0001
|
|
|
|
#define CC_P 0x0004
|
|
|
|
#define CC_A 0x0010
|
|
|
|
#define CC_Z 0x0040
|
2003-10-01 00:34:21 +04:00
|
|
|
#define CC_S 0x0080
|
|
|
|
#define CC_O 0x0800
|
|
|
|
|
|
|
|
#define TF_SHIFT 8
|
|
|
|
#define IOPL_SHIFT 12
|
|
|
|
#define VM_SHIFT 17
|
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define TF_MASK 0x00000100
|
|
|
|
#define IF_MASK 0x00000200
|
|
|
|
#define DF_MASK 0x00000400
|
|
|
|
#define IOPL_MASK 0x00003000
|
|
|
|
#define NT_MASK 0x00004000
|
|
|
|
#define RF_MASK 0x00010000
|
|
|
|
#define VM_MASK 0x00020000
|
|
|
|
#define AC_MASK 0x00040000
|
2003-10-01 00:34:21 +04:00
|
|
|
#define VIF_MASK 0x00080000
|
|
|
|
#define VIP_MASK 0x00100000
|
|
|
|
#define ID_MASK 0x00200000
|
|
|
|
|
2007-07-12 02:48:58 +04:00
|
|
|
/* hidden flags - used internally by qemu to represent additional cpu
|
2014-04-30 00:38:59 +04:00
|
|
|
states. Only the INHIBIT_IRQ, SMM and SVMI are not redundant. We
|
|
|
|
avoid using the IOPL_MASK, TF_MASK, VM_MASK and AC_MASK bit
|
|
|
|
positions to ease oring with eflags. */
|
2003-10-01 00:34:21 +04:00
|
|
|
/* current cpl */
|
|
|
|
#define HF_CPL_SHIFT 0
|
|
|
|
/* true if hardware interrupts must be disabled for next instruction */
|
|
|
|
#define HF_INHIBIT_IRQ_SHIFT 3
|
|
|
|
/* 16 or 32 segments */
|
|
|
|
#define HF_CS32_SHIFT 4
|
|
|
|
#define HF_SS32_SHIFT 5
|
2004-06-13 17:26:14 +04:00
|
|
|
/* zero base for DS, ES and SS : can be '0' only in 32 bit CS segment */
|
2003-10-01 00:34:21 +04:00
|
|
|
#define HF_ADDSEG_SHIFT 6
|
2004-01-04 20:20:53 +03:00
|
|
|
/* copy of CR0.PE (protected mode) */
|
|
|
|
#define HF_PE_SHIFT 7
|
|
|
|
#define HF_TF_SHIFT 8 /* must be same as eflags */
|
2004-02-26 02:17:58 +03:00
|
|
|
#define HF_MP_SHIFT 9 /* the order must be MP, EM, TS */
|
|
|
|
#define HF_EM_SHIFT 10
|
|
|
|
#define HF_TS_SHIFT 11
|
2004-01-04 20:20:53 +03:00
|
|
|
#define HF_IOPL_SHIFT 12 /* must be same as eflags */
|
2005-01-04 02:50:08 +03:00
|
|
|
#define HF_LMA_SHIFT 14 /* only used on x86_64: long mode active */
|
|
|
|
#define HF_CS64_SHIFT 15 /* only used on x86_64: 64 bit code segment */
|
2009-05-11 00:30:53 +04:00
|
|
|
#define HF_RF_SHIFT 16 /* must be same as eflags */
|
2004-01-04 20:20:53 +03:00
|
|
|
#define HF_VM_SHIFT 17 /* must be same as eflags */
|
2012-09-27 00:18:43 +04:00
|
|
|
#define HF_AC_SHIFT 18 /* must be same as eflags */
|
2006-09-24 22:41:56 +04:00
|
|
|
#define HF_SMM_SHIFT 19 /* CPU in SMM mode */
|
2008-06-04 21:02:19 +04:00
|
|
|
#define HF_SVME_SHIFT 20 /* SVME enabled (copy of EFER.SVME) */
|
2018-08-21 10:40:22 +03:00
|
|
|
#define HF_GUEST_SHIFT 21 /* SVM intercepts are active */
|
2009-05-11 00:30:53 +04:00
|
|
|
#define HF_OSFXSR_SHIFT 22 /* CR4.OSFXSR */
|
2012-09-27 00:18:43 +04:00
|
|
|
#define HF_SMAP_SHIFT 23 /* CR4.SMAP */
|
2015-10-19 20:14:35 +03:00
|
|
|
#define HF_IOBPT_SHIFT 24 /* an io breakpoint enabled */
|
2015-07-02 17:57:14 +03:00
|
|
|
#define HF_MPX_EN_SHIFT 25 /* MPX Enabled (CR4+XCR0+BNDCFGx) */
|
|
|
|
#define HF_MPX_IU_SHIFT 26 /* BND registers in-use */
|
2022-02-07 01:36:09 +03:00
|
|
|
#define HF_UMIP_SHIFT 27 /* CR4.UMIP */
|
2022-04-25 01:01:25 +03:00
|
|
|
#define HF_AVX_EN_SHIFT 28 /* AVX Enabled (CR4+XCR0) */
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
#define HF_CPL_MASK (3 << HF_CPL_SHIFT)
|
|
|
|
#define HF_INHIBIT_IRQ_MASK (1 << HF_INHIBIT_IRQ_SHIFT)
|
|
|
|
#define HF_CS32_MASK (1 << HF_CS32_SHIFT)
|
|
|
|
#define HF_SS32_MASK (1 << HF_SS32_SHIFT)
|
|
|
|
#define HF_ADDSEG_MASK (1 << HF_ADDSEG_SHIFT)
|
2004-01-04 20:20:53 +03:00
|
|
|
#define HF_PE_MASK (1 << HF_PE_SHIFT)
|
2004-02-17 01:11:32 +03:00
|
|
|
#define HF_TF_MASK (1 << HF_TF_SHIFT)
|
2004-02-26 02:17:58 +03:00
|
|
|
#define HF_MP_MASK (1 << HF_MP_SHIFT)
|
|
|
|
#define HF_EM_MASK (1 << HF_EM_SHIFT)
|
|
|
|
#define HF_TS_MASK (1 << HF_TS_SHIFT)
|
2008-11-05 18:28:47 +03:00
|
|
|
#define HF_IOPL_MASK (3 << HF_IOPL_SHIFT)
|
2005-01-04 02:50:08 +03:00
|
|
|
#define HF_LMA_MASK (1 << HF_LMA_SHIFT)
|
|
|
|
#define HF_CS64_MASK (1 << HF_CS64_SHIFT)
|
2009-05-11 00:30:53 +04:00
|
|
|
#define HF_RF_MASK (1 << HF_RF_SHIFT)
|
2008-11-05 18:28:47 +03:00
|
|
|
#define HF_VM_MASK (1 << HF_VM_SHIFT)
|
2012-09-27 00:18:43 +04:00
|
|
|
#define HF_AC_MASK (1 << HF_AC_SHIFT)
|
2006-09-24 22:41:56 +04:00
|
|
|
#define HF_SMM_MASK (1 << HF_SMM_SHIFT)
|
2008-05-28 20:16:54 +04:00
|
|
|
#define HF_SVME_MASK (1 << HF_SVME_SHIFT)
|
2018-08-21 10:40:22 +03:00
|
|
|
#define HF_GUEST_MASK (1 << HF_GUEST_SHIFT)
|
2009-05-11 00:30:53 +04:00
|
|
|
#define HF_OSFXSR_MASK (1 << HF_OSFXSR_SHIFT)
|
2012-09-27 00:18:43 +04:00
|
|
|
#define HF_SMAP_MASK (1 << HF_SMAP_SHIFT)
|
2015-10-19 20:14:35 +03:00
|
|
|
#define HF_IOBPT_MASK (1 << HF_IOBPT_SHIFT)
|
2015-07-02 17:57:14 +03:00
|
|
|
#define HF_MPX_EN_MASK (1 << HF_MPX_EN_SHIFT)
|
|
|
|
#define HF_MPX_IU_MASK (1 << HF_MPX_IU_SHIFT)
|
2022-02-07 01:36:09 +03:00
|
|
|
#define HF_UMIP_MASK (1 << HF_UMIP_SHIFT)
|
2022-04-25 01:01:25 +03:00
|
|
|
#define HF_AVX_EN_MASK (1 << HF_AVX_EN_SHIFT)
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2008-06-04 21:02:19 +04:00
|
|
|
/* hflags2 */
|
|
|
|
|
2015-04-22 12:40:41 +03:00
|
|
|
#define HF2_GIF_SHIFT 0 /* if set CPU takes interrupts */
|
|
|
|
#define HF2_HIF_SHIFT 1 /* value of IF_MASK when entering SVM */
|
|
|
|
#define HF2_NMI_SHIFT 2 /* CPU serving NMI */
|
|
|
|
#define HF2_VINTR_SHIFT 3 /* value of V_INTR_MASKING bit */
|
|
|
|
#define HF2_SMM_INSIDE_NMI_SHIFT 4 /* CPU serving SMI nested inside NMI */
|
2015-07-02 17:57:14 +03:00
|
|
|
#define HF2_MPX_PR_SHIFT 5 /* BNDCFGx.BNDPRESERVE */
|
2018-06-30 09:08:23 +03:00
|
|
|
#define HF2_NPT_SHIFT 6 /* Nested Paging enabled */
|
2019-10-16 11:34:39 +03:00
|
|
|
#define HF2_IGNNE_SHIFT 7 /* Ignore CR0.NE=0 */
|
2021-08-05 14:08:23 +03:00
|
|
|
#define HF2_VGIF_SHIFT 8 /* Can take VIRQ*/
|
2015-04-22 12:40:41 +03:00
|
|
|
|
|
|
|
#define HF2_GIF_MASK (1 << HF2_GIF_SHIFT)
|
|
|
|
#define HF2_HIF_MASK (1 << HF2_HIF_SHIFT)
|
|
|
|
#define HF2_NMI_MASK (1 << HF2_NMI_SHIFT)
|
|
|
|
#define HF2_VINTR_MASK (1 << HF2_VINTR_SHIFT)
|
|
|
|
#define HF2_SMM_INSIDE_NMI_MASK (1 << HF2_SMM_INSIDE_NMI_SHIFT)
|
2015-07-02 17:57:14 +03:00
|
|
|
#define HF2_MPX_PR_MASK (1 << HF2_MPX_PR_SHIFT)
|
2018-06-30 09:08:23 +03:00
|
|
|
#define HF2_NPT_MASK (1 << HF2_NPT_SHIFT)
|
2019-10-16 11:34:39 +03:00
|
|
|
#define HF2_IGNNE_MASK (1 << HF2_IGNNE_SHIFT)
|
2021-08-05 14:08:23 +03:00
|
|
|
#define HF2_VGIF_MASK (1 << HF2_VGIF_SHIFT)
|
2008-06-04 21:02:19 +04:00
|
|
|
|
2008-11-05 18:28:47 +03:00
|
|
|
#define CR0_PE_SHIFT 0
|
|
|
|
#define CR0_MP_SHIFT 1
|
|
|
|
|
2014-03-17 20:00:30 +04:00
|
|
|
#define CR0_PE_MASK (1U << 0)
|
|
|
|
#define CR0_MP_MASK (1U << 1)
|
|
|
|
#define CR0_EM_MASK (1U << 2)
|
|
|
|
#define CR0_TS_MASK (1U << 3)
|
|
|
|
#define CR0_ET_MASK (1U << 4)
|
|
|
|
#define CR0_NE_MASK (1U << 5)
|
|
|
|
#define CR0_WP_MASK (1U << 16)
|
|
|
|
#define CR0_AM_MASK (1U << 18)
|
2021-06-16 15:39:06 +03:00
|
|
|
#define CR0_NW_MASK (1U << 29)
|
|
|
|
#define CR0_CD_MASK (1U << 30)
|
2014-03-17 20:00:30 +04:00
|
|
|
#define CR0_PG_MASK (1U << 31)
|
|
|
|
|
|
|
|
#define CR4_VME_MASK (1U << 0)
|
|
|
|
#define CR4_PVI_MASK (1U << 1)
|
|
|
|
#define CR4_TSD_MASK (1U << 2)
|
|
|
|
#define CR4_DE_MASK (1U << 3)
|
|
|
|
#define CR4_PSE_MASK (1U << 4)
|
|
|
|
#define CR4_PAE_MASK (1U << 5)
|
|
|
|
#define CR4_MCE_MASK (1U << 6)
|
|
|
|
#define CR4_PGE_MASK (1U << 7)
|
|
|
|
#define CR4_PCE_MASK (1U << 8)
|
2008-11-05 18:28:47 +03:00
|
|
|
#define CR4_OSFXSR_SHIFT 9
|
2014-03-17 20:00:30 +04:00
|
|
|
#define CR4_OSFXSR_MASK (1U << CR4_OSFXSR_SHIFT)
|
|
|
|
#define CR4_OSXMMEXCPT_MASK (1U << 10)
|
2021-07-21 18:26:50 +03:00
|
|
|
#define CR4_UMIP_MASK (1U << 11)
|
2016-12-15 03:13:05 +03:00
|
|
|
#define CR4_LA57_MASK (1U << 12)
|
2014-03-17 20:00:30 +04:00
|
|
|
#define CR4_VMXE_MASK (1U << 13)
|
|
|
|
#define CR4_SMXE_MASK (1U << 14)
|
|
|
|
#define CR4_FSGSBASE_MASK (1U << 16)
|
|
|
|
#define CR4_PCIDE_MASK (1U << 17)
|
|
|
|
#define CR4_OSXSAVE_MASK (1U << 18)
|
|
|
|
#define CR4_SMEP_MASK (1U << 20)
|
|
|
|
#define CR4_SMAP_MASK (1U << 21)
|
2016-02-09 16:14:28 +03:00
|
|
|
#define CR4_PKE_MASK (1U << 22)
|
2021-01-27 11:28:49 +03:00
|
|
|
#define CR4_PKS_MASK (1U << 24)
|
2024-01-12 09:00:42 +03:00
|
|
|
#define CR4_LAM_SUP_MASK (1U << 28)
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2021-07-21 18:26:50 +03:00
|
|
|
#define CR4_RESERVED_MASK \
|
|
|
|
(~(target_ulong)(CR4_VME_MASK | CR4_PVI_MASK | CR4_TSD_MASK \
|
|
|
|
| CR4_DE_MASK | CR4_PSE_MASK | CR4_PAE_MASK \
|
|
|
|
| CR4_MCE_MASK | CR4_PGE_MASK | CR4_PCE_MASK \
|
2022-02-07 01:36:09 +03:00
|
|
|
| CR4_OSFXSR_MASK | CR4_OSXMMEXCPT_MASK | CR4_UMIP_MASK \
|
2021-08-31 20:50:33 +03:00
|
|
|
| CR4_LA57_MASK \
|
2021-07-21 18:26:50 +03:00
|
|
|
| CR4_FSGSBASE_MASK | CR4_PCIDE_MASK | CR4_OSXSAVE_MASK \
|
2024-01-12 09:00:42 +03:00
|
|
|
| CR4_SMEP_MASK | CR4_SMAP_MASK | CR4_PKE_MASK | CR4_PKS_MASK \
|
|
|
|
| CR4_LAM_SUP_MASK))
|
2021-07-21 18:26:50 +03:00
|
|
|
|
2008-11-19 00:08:15 +03:00
|
|
|
#define DR6_BD (1 << 13)
|
|
|
|
#define DR6_BS (1 << 14)
|
|
|
|
#define DR6_BT (1 << 15)
|
|
|
|
#define DR6_FIXED_1 0xffff0ff0
|
|
|
|
|
|
|
|
#define DR7_GD (1 << 13)
|
|
|
|
#define DR7_TYPE_SHIFT 16
|
|
|
|
#define DR7_LEN_SHIFT 18
|
|
|
|
#define DR7_FIXED_1 0x00000400
|
2015-09-15 21:45:08 +03:00
|
|
|
#define DR7_GLOBAL_BP_MASK 0xaa
|
2013-01-15 09:39:55 +04:00
|
|
|
#define DR7_LOCAL_BP_MASK 0x55
|
|
|
|
#define DR7_MAX_BP 4
|
|
|
|
#define DR7_TYPE_BP_INST 0x0
|
|
|
|
#define DR7_TYPE_DATA_WR 0x1
|
|
|
|
#define DR7_TYPE_IO_RW 0x2
|
|
|
|
#define DR7_TYPE_DATA_RW 0x3
|
2008-11-19 00:08:15 +03:00
|
|
|
|
2021-07-06 18:53:29 +03:00
|
|
|
#define DR_RESERVED_MASK 0xffffffff00000000ULL
|
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define PG_PRESENT_BIT 0
|
|
|
|
#define PG_RW_BIT 1
|
|
|
|
#define PG_USER_BIT 2
|
|
|
|
#define PG_PWT_BIT 3
|
|
|
|
#define PG_PCD_BIT 4
|
|
|
|
#define PG_ACCESSED_BIT 5
|
|
|
|
#define PG_DIRTY_BIT 6
|
|
|
|
#define PG_PSE_BIT 7
|
|
|
|
#define PG_GLOBAL_BIT 8
|
2014-05-27 15:03:17 +04:00
|
|
|
#define PG_PSE_PAT_BIT 12
|
2016-02-09 16:14:28 +03:00
|
|
|
#define PG_PKRU_BIT 59
|
2013-07-25 19:05:21 +04:00
|
|
|
#define PG_NX_BIT 63
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
#define PG_PRESENT_MASK (1 << PG_PRESENT_BIT)
|
2013-07-25 19:05:21 +04:00
|
|
|
#define PG_RW_MASK (1 << PG_RW_BIT)
|
|
|
|
#define PG_USER_MASK (1 << PG_USER_BIT)
|
|
|
|
#define PG_PWT_MASK (1 << PG_PWT_BIT)
|
|
|
|
#define PG_PCD_MASK (1 << PG_PCD_BIT)
|
2003-10-01 00:34:21 +04:00
|
|
|
#define PG_ACCESSED_MASK (1 << PG_ACCESSED_BIT)
|
2013-07-25 19:05:21 +04:00
|
|
|
#define PG_DIRTY_MASK (1 << PG_DIRTY_BIT)
|
|
|
|
#define PG_PSE_MASK (1 << PG_PSE_BIT)
|
|
|
|
#define PG_GLOBAL_MASK (1 << PG_GLOBAL_BIT)
|
2014-05-27 15:03:17 +04:00
|
|
|
#define PG_PSE_PAT_MASK (1 << PG_PSE_PAT_BIT)
|
2014-05-27 14:58:36 +04:00
|
|
|
#define PG_ADDRESS_MASK 0x000ffffffffff000LL
|
2012-03-06 18:22:02 +04:00
|
|
|
#define PG_HI_USER_MASK 0x7ff0000000000000LL
|
2016-02-09 16:14:28 +03:00
|
|
|
#define PG_PKRU_MASK (15ULL << PG_PKRU_BIT)
|
|
|
|
#define PG_NX_MASK (1ULL << PG_NX_BIT)
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
#define PG_ERROR_W_BIT 1
|
|
|
|
|
|
|
|
#define PG_ERROR_P_MASK 0x01
|
|
|
|
#define PG_ERROR_W_MASK (1 << PG_ERROR_W_BIT)
|
|
|
|
#define PG_ERROR_U_MASK 0x04
|
|
|
|
#define PG_ERROR_RSVD_MASK 0x08
|
2005-11-29 00:02:43 +03:00
|
|
|
#define PG_ERROR_I_D_MASK 0x10
|
2016-02-09 16:14:28 +03:00
|
|
|
#define PG_ERROR_PK_MASK 0x20
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2021-02-26 17:45:05 +03:00
|
|
|
#define PG_MODE_PAE (1 << 0)
|
|
|
|
#define PG_MODE_LMA (1 << 1)
|
|
|
|
#define PG_MODE_NXE (1 << 2)
|
|
|
|
#define PG_MODE_PSE (1 << 3)
|
2021-02-26 18:24:35 +03:00
|
|
|
#define PG_MODE_LA57 (1 << 4)
|
|
|
|
#define PG_MODE_SVM_MASK MAKE_64BIT_MASK(0, 15)
|
|
|
|
|
|
|
|
/* Bits of CR4 that do not affect the NPT page format. */
|
|
|
|
#define PG_MODE_WP (1 << 16)
|
|
|
|
#define PG_MODE_PKE (1 << 17)
|
|
|
|
#define PG_MODE_PKS (1 << 18)
|
|
|
|
#define PG_MODE_SMEP (1 << 19)
|
2021-02-26 17:45:05 +03:00
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MCG_CTL_P (1ULL<<8) /* MCG_CAP register available */
|
|
|
|
#define MCG_SER_P (1ULL<<24) /* MCA recovery/new status bits */
|
2016-06-22 09:56:21 +03:00
|
|
|
#define MCG_LMCE_P (1ULL<<27) /* Local Machine Check Supported */
|
2009-06-23 06:05:14 +04:00
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MCE_CAP_DEF (MCG_CTL_P|MCG_SER_P)
|
|
|
|
#define MCE_BANKS_DEF 10
|
2009-06-23 06:05:14 +04:00
|
|
|
|
2015-11-25 20:19:15 +03:00
|
|
|
#define MCG_CAP_BANKS_MASK 0xff
|
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MCG_STATUS_RIPV (1ULL<<0) /* restart ip valid */
|
|
|
|
#define MCG_STATUS_EIPV (1ULL<<1) /* ip points to correct instruction */
|
|
|
|
#define MCG_STATUS_MCIP (1ULL<<2) /* machine check in progress */
|
2016-06-22 09:56:21 +03:00
|
|
|
#define MCG_STATUS_LMCE (1ULL<<3) /* Local MCE signaled */
|
|
|
|
|
|
|
|
#define MCG_EXT_CTL_LMCE_EN (1ULL<<0) /* Local MCE enabled */
|
2009-06-23 06:05:14 +04:00
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MCI_STATUS_VAL (1ULL<<63) /* valid error */
|
|
|
|
#define MCI_STATUS_OVER (1ULL<<62) /* previous errors lost */
|
|
|
|
#define MCI_STATUS_UC (1ULL<<61) /* uncorrected error */
|
|
|
|
#define MCI_STATUS_EN (1ULL<<60) /* error enabled */
|
|
|
|
#define MCI_STATUS_MISCV (1ULL<<59) /* misc error reg. valid */
|
|
|
|
#define MCI_STATUS_ADDRV (1ULL<<58) /* addr reg. valid */
|
|
|
|
#define MCI_STATUS_PCC (1ULL<<57) /* processor context corrupt */
|
|
|
|
#define MCI_STATUS_S (1ULL<<56) /* Signaled machine check */
|
|
|
|
#define MCI_STATUS_AR (1ULL<<55) /* Action required */
|
2010-10-11 22:31:21 +04:00
|
|
|
|
|
|
|
/* MISC register defines */
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MCM_ADDR_SEGOFF 0 /* segment offset */
|
|
|
|
#define MCM_ADDR_LINEAR 1 /* linear address */
|
|
|
|
#define MCM_ADDR_PHYS 2 /* physical address */
|
|
|
|
#define MCM_ADDR_MEM 3 /* memory address */
|
|
|
|
#define MCM_ADDR_GENERIC 7 /* generic */
|
2009-06-23 06:05:14 +04:00
|
|
|
|
2008-11-05 18:28:47 +03:00
|
|
|
#define MSR_IA32_TSC 0x10
|
2003-10-01 00:34:21 +04:00
|
|
|
#define MSR_IA32_APICBASE 0x1b
|
|
|
|
#define MSR_IA32_APICBASE_BSP (1<<8)
|
|
|
|
#define MSR_IA32_APICBASE_ENABLE (1<<11)
|
2016-10-19 15:05:35 +03:00
|
|
|
#define MSR_IA32_APICBASE_EXTD (1 << 10)
|
2015-05-29 22:31:12 +03:00
|
|
|
#define MSR_IA32_APICBASE_BASE (0xfffffU<<12)
|
2024-01-11 18:44:00 +03:00
|
|
|
#define MSR_IA32_APICBASE_RESERVED \
|
|
|
|
(~(uint64_t)(MSR_IA32_APICBASE_BSP | MSR_IA32_APICBASE_ENABLE \
|
|
|
|
| MSR_IA32_APICBASE_EXTD | MSR_IA32_APICBASE_BASE))
|
|
|
|
|
2013-07-07 19:13:37 +04:00
|
|
|
#define MSR_IA32_FEATURE_CONTROL 0x0000003a
|
2012-11-27 09:32:18 +04:00
|
|
|
#define MSR_TSC_ADJUST 0x0000003b
|
2018-01-09 18:45:14 +03:00
|
|
|
#define MSR_IA32_SPEC_CTRL 0x48
|
2018-05-22 00:54:24 +03:00
|
|
|
#define MSR_VIRT_SSBD 0xc001011f
|
2018-07-05 12:09:54 +03:00
|
|
|
#define MSR_IA32_PRED_CMD 0x49
|
2020-01-20 21:21:43 +03:00
|
|
|
#define MSR_IA32_UCODE_REV 0x8b
|
2019-06-17 18:36:54 +03:00
|
|
|
#define MSR_IA32_CORE_CAPABILITY 0xcf
|
2019-11-20 15:19:22 +03:00
|
|
|
|
2018-07-05 12:09:54 +03:00
|
|
|
#define MSR_IA32_ARCH_CAPABILITIES 0x10a
|
2019-11-20 15:19:22 +03:00
|
|
|
#define ARCH_CAP_TSX_CTRL_MSR (1<<7)
|
|
|
|
|
2020-05-29 10:43:47 +03:00
|
|
|
#define MSR_IA32_PERF_CAPABILITIES 0x345
|
2022-02-15 22:52:52 +03:00
|
|
|
#define PERF_CAP_LBR_FMT 0x3f
|
2020-05-29 10:43:47 +03:00
|
|
|
|
2019-11-20 15:19:22 +03:00
|
|
|
#define MSR_IA32_TSX_CTRL 0x122
|
2011-10-05 23:52:32 +04:00
|
|
|
#define MSR_IA32_TSCDEADLINE 0x6e0
|
2021-01-27 11:28:49 +03:00
|
|
|
#define MSR_IA32_PKRS 0x6e1
|
2022-02-15 22:52:56 +03:00
|
|
|
#define MSR_ARCH_LBR_CTL 0x000014ce
|
|
|
|
#define MSR_ARCH_LBR_DEPTH 0x000014cf
|
|
|
|
#define MSR_ARCH_LBR_FROM_0 0x00001500
|
|
|
|
#define MSR_ARCH_LBR_TO_0 0x00001600
|
|
|
|
#define MSR_ARCH_LBR_INFO_0 0x00001200
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2016-06-23 09:15:43 +03:00
|
|
|
#define FEATURE_CONTROL_LOCKED (1<<0)
|
2021-07-19 14:21:09 +03:00
|
|
|
#define FEATURE_CONTROL_VMXON_ENABLED_INSIDE_SMX (1ULL << 1)
|
2016-06-23 09:15:43 +03:00
|
|
|
#define FEATURE_CONTROL_VMXON_ENABLED_OUTSIDE_SMX (1<<2)
|
2021-07-19 14:21:09 +03:00
|
|
|
#define FEATURE_CONTROL_SGX_LC (1ULL << 17)
|
|
|
|
#define FEATURE_CONTROL_SGX (1ULL << 18)
|
2016-06-23 09:15:43 +03:00
|
|
|
#define FEATURE_CONTROL_LMCE (1<<20)
|
|
|
|
|
2021-07-19 14:21:09 +03:00
|
|
|
#define MSR_IA32_SGXLEPUBKEYHASH0 0x8c
|
|
|
|
#define MSR_IA32_SGXLEPUBKEYHASH1 0x8d
|
|
|
|
#define MSR_IA32_SGXLEPUBKEYHASH2 0x8e
|
|
|
|
#define MSR_IA32_SGXLEPUBKEYHASH3 0x8f
|
|
|
|
|
2013-07-25 19:05:22 +04:00
|
|
|
#define MSR_P6_PERFCTR0 0xc1
|
|
|
|
|
2015-06-18 19:28:42 +03:00
|
|
|
#define MSR_IA32_SMBASE 0x9e
|
2018-02-27 13:22:12 +03:00
|
|
|
#define MSR_SMI_COUNT 0x34
|
2021-01-13 23:53:23 +03:00
|
|
|
#define MSR_CORE_THREAD_COUNT 0x35
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MSR_MTRRcap 0xfe
|
|
|
|
#define MSR_MTRRcap_VCNT 8
|
|
|
|
#define MSR_MTRRcap_FIXRANGE_SUPPORT (1 << 8)
|
|
|
|
#define MSR_MTRRcap_WC_SUPPORTED (1 << 10)
|
2009-01-29 20:02:17 +03:00
|
|
|
|
2003-10-01 00:34:21 +04:00
|
|
|
#define MSR_IA32_SYSENTER_CS 0x174
|
|
|
|
#define MSR_IA32_SYSENTER_ESP 0x175
|
|
|
|
#define MSR_IA32_SYSENTER_EIP 0x176
|
|
|
|
|
2005-07-23 21:41:26 +04:00
|
|
|
#define MSR_MCG_CAP 0x179
|
|
|
|
#define MSR_MCG_STATUS 0x17a
|
|
|
|
#define MSR_MCG_CTL 0x17b
|
2016-06-22 09:56:21 +03:00
|
|
|
#define MSR_MCG_EXT_CTL 0x4d0
|
2005-07-23 21:41:26 +04:00
|
|
|
|
2013-07-25 19:05:22 +04:00
|
|
|
#define MSR_P6_EVNTSEL0 0x186
|
|
|
|
|
2008-09-25 22:11:30 +04:00
|
|
|
#define MSR_IA32_PERF_STATUS 0x198
|
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MSR_IA32_MISC_ENABLE 0x1a0
|
2011-10-04 18:26:35 +04:00
|
|
|
/* Indicates good rep/movs microcode on some processors: */
|
|
|
|
#define MSR_IA32_MISC_ENABLE_DEFAULT 1
|
2019-05-14 09:06:39 +03:00
|
|
|
#define MSR_IA32_MISC_ENABLE_MWAIT (1ULL << 18)
|
2011-10-04 18:26:35 +04:00
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MSR_MTRRphysBase(reg) (0x200 + 2 * (reg))
|
|
|
|
#define MSR_MTRRphysMask(reg) (0x200 + 2 * (reg) + 1)
|
|
|
|
|
2014-08-15 01:39:33 +04:00
|
|
|
#define MSR_MTRRphysIndex(addr) ((((addr) & ~1u) - 0x200) / 2)
|
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MSR_MTRRfix64K_00000 0x250
|
|
|
|
#define MSR_MTRRfix16K_80000 0x258
|
|
|
|
#define MSR_MTRRfix16K_A0000 0x259
|
|
|
|
#define MSR_MTRRfix4K_C0000 0x268
|
|
|
|
#define MSR_MTRRfix4K_C8000 0x269
|
|
|
|
#define MSR_MTRRfix4K_D0000 0x26a
|
|
|
|
#define MSR_MTRRfix4K_D8000 0x26b
|
|
|
|
#define MSR_MTRRfix4K_E0000 0x26c
|
|
|
|
#define MSR_MTRRfix4K_E8000 0x26d
|
|
|
|
#define MSR_MTRRfix4K_F0000 0x26e
|
|
|
|
#define MSR_MTRRfix4K_F8000 0x26f
|
2009-01-26 20:53:04 +03:00
|
|
|
|
2005-07-23 21:41:26 +04:00
|
|
|
#define MSR_PAT 0x277
|
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MSR_MTRRdefType 0x2ff
|
2009-01-26 20:53:04 +03:00
|
|
|
|
2013-07-25 19:05:22 +04:00
|
|
|
#define MSR_CORE_PERF_FIXED_CTR0 0x309
|
|
|
|
#define MSR_CORE_PERF_FIXED_CTR1 0x30a
|
|
|
|
#define MSR_CORE_PERF_FIXED_CTR2 0x30b
|
|
|
|
#define MSR_CORE_PERF_FIXED_CTR_CTRL 0x38d
|
|
|
|
#define MSR_CORE_PERF_GLOBAL_STATUS 0x38e
|
|
|
|
#define MSR_CORE_PERF_GLOBAL_CTRL 0x38f
|
|
|
|
#define MSR_CORE_PERF_GLOBAL_OVF_CTRL 0x390
|
2009-01-26 20:53:04 +03:00
|
|
|
|
2013-07-25 19:05:21 +04:00
|
|
|
#define MSR_MC0_CTL 0x400
|
|
|
|
#define MSR_MC0_STATUS 0x401
|
|
|
|
#define MSR_MC0_ADDR 0x402
|
|
|
|
#define MSR_MC0_MISC 0x403
|
2009-06-23 06:05:14 +04:00
|
|
|
|
2018-03-04 19:48:36 +03:00
|
|
|
#define MSR_IA32_RTIT_OUTPUT_BASE 0x560
|
|
|
|
#define MSR_IA32_RTIT_OUTPUT_MASK 0x561
|
|
|
|
#define MSR_IA32_RTIT_CTL 0x570
|
|
|
|
#define MSR_IA32_RTIT_STATUS 0x571
|
|
|
|
#define MSR_IA32_RTIT_CR3_MATCH 0x572
|
|
|
|
#define MSR_IA32_RTIT_ADDR0_A 0x580
|
|
|
|
#define MSR_IA32_RTIT_ADDR0_B 0x581
|
|
|
|
#define MSR_IA32_RTIT_ADDR1_A 0x582
|
|
|
|
#define MSR_IA32_RTIT_ADDR1_B 0x583
|
|
|
|
#define MSR_IA32_RTIT_ADDR2_A 0x584
|
|
|
|
#define MSR_IA32_RTIT_ADDR2_B 0x585
|
|
|
|
#define MSR_IA32_RTIT_ADDR3_A 0x586
|
|
|
|
#define MSR_IA32_RTIT_ADDR3_B 0x587
|
|
|
|
#define MAX_RTIT_ADDRS 8
|
|
|
|
|
2005-01-04 02:50:08 +03:00
|
|
|
#define MSR_EFER 0xc0000080
|
|
|
|
|
|
|
|
#define MSR_EFER_SCE (1 << 0)
|
|
|
|
#define MSR_EFER_LME (1 << 8)
|
|
|
|
#define MSR_EFER_LMA (1 << 10)
|
|
|
|
#define MSR_EFER_NXE (1 << 11)
|
2008-05-28 20:16:54 +04:00
|
|
|
#define MSR_EFER_SVME (1 << 12)
|
2005-01-04 02:50:08 +03:00
|
|
|
#define MSR_EFER_FFXSR (1 << 14)
|
|
|
|
|
2021-07-21 18:26:51 +03:00
|
|
|
#define MSR_EFER_RESERVED\
|
|
|
|
(~(target_ulong)(MSR_EFER_SCE | MSR_EFER_LME\
|
|
|
|
| MSR_EFER_LMA | MSR_EFER_NXE | MSR_EFER_SVME\
|
|
|
|
| MSR_EFER_FFXSR))
|
|
|
|
|
2005-01-04 02:50:08 +03:00
|
|
|
#define MSR_STAR 0xc0000081
|
|
|
|
#define MSR_LSTAR 0xc0000082
|
|
|
|
#define MSR_CSTAR 0xc0000083
|
|
|
|
#define MSR_FMASK 0xc0000084
|
|
|
|
#define MSR_FSBASE 0xc0000100
|
|
|
|
#define MSR_GSBASE 0xc0000101
|
|
|
|
#define MSR_KERNELGSBASE 0xc0000102
|
2009-09-19 02:30:49 +04:00
|
|
|
#define MSR_TSC_AUX 0xc0000103
|
2021-11-01 16:23:00 +03:00
|
|
|
#define MSR_AMD64_TSC_RATIO 0xc0000104
|
|
|
|
|
|
|
|
#define MSR_AMD64_TSC_RATIO_DEFAULT 0x100000000ULL
|
2005-01-04 02:50:08 +03:00
|
|
|
|
2007-09-23 19:28:04 +04:00
|
|
|
#define MSR_VM_HSAVE_PA 0xc0010117
|
|
|
|
|
2022-02-17 09:04:33 +03:00
|
|
|
#define MSR_IA32_XFD 0x000001c4
|
|
|
|
#define MSR_IA32_XFD_ERR 0x000001c5
|
|
|
|
|
2013-12-05 04:32:12 +04:00
|
|
|
#define MSR_IA32_BNDCFGS 0x00000d90
|
2014-12-03 05:36:23 +03:00
|
|
|
#define MSR_IA32_XSS 0x00000da0
|
2019-10-11 10:41:03 +03:00
|
|
|
#define MSR_IA32_UMWAIT_CONTROL 0xe1
|
2013-12-05 04:32:12 +04:00
|
|
|
|
2019-07-01 19:24:52 +03:00
|
|
|
#define MSR_IA32_VMX_BASIC 0x00000480
|
|
|
|
#define MSR_IA32_VMX_PINBASED_CTLS 0x00000481
|
|
|
|
#define MSR_IA32_VMX_PROCBASED_CTLS 0x00000482
|
|
|
|
#define MSR_IA32_VMX_EXIT_CTLS 0x00000483
|
|
|
|
#define MSR_IA32_VMX_ENTRY_CTLS 0x00000484
|
|
|
|
#define MSR_IA32_VMX_MISC 0x00000485
|
|
|
|
#define MSR_IA32_VMX_CR0_FIXED0 0x00000486
|
|
|
|
#define MSR_IA32_VMX_CR0_FIXED1 0x00000487
|
|
|
|
#define MSR_IA32_VMX_CR4_FIXED0 0x00000488
|
|
|
|
#define MSR_IA32_VMX_CR4_FIXED1 0x00000489
|
|
|
|
#define MSR_IA32_VMX_VMCS_ENUM 0x0000048a
|
|
|
|
#define MSR_IA32_VMX_PROCBASED_CTLS2 0x0000048b
|
|
|
|
#define MSR_IA32_VMX_EPT_VPID_CAP 0x0000048c
|
|
|
|
#define MSR_IA32_VMX_TRUE_PINBASED_CTLS 0x0000048d
|
|
|
|
#define MSR_IA32_VMX_TRUE_PROCBASED_CTLS 0x0000048e
|
|
|
|
#define MSR_IA32_VMX_TRUE_EXIT_CTLS 0x0000048f
|
|
|
|
#define MSR_IA32_VMX_TRUE_ENTRY_CTLS 0x00000490
|
|
|
|
#define MSR_IA32_VMX_VMFUNC 0x00000491
|
|
|
|
|
2024-01-11 18:43:58 +03:00
|
|
|
#define MSR_APIC_START 0x00000800
|
|
|
|
#define MSR_APIC_END 0x000008ff
|
|
|
|
|
2016-02-17 12:54:53 +03:00
|
|
|
#define XSTATE_FP_BIT 0
|
|
|
|
#define XSTATE_SSE_BIT 1
|
|
|
|
#define XSTATE_YMM_BIT 2
|
|
|
|
#define XSTATE_BNDREGS_BIT 3
|
|
|
|
#define XSTATE_BNDCSR_BIT 4
|
|
|
|
#define XSTATE_OPMASK_BIT 5
|
|
|
|
#define XSTATE_ZMM_Hi256_BIT 6
|
|
|
|
#define XSTATE_Hi16_ZMM_BIT 7
|
|
|
|
#define XSTATE_PKRU_BIT 9
|
2022-02-15 22:52:55 +03:00
|
|
|
#define XSTATE_ARCH_LBR_BIT 15
|
2022-02-17 09:04:28 +03:00
|
|
|
#define XSTATE_XTILE_CFG_BIT 17
|
|
|
|
#define XSTATE_XTILE_DATA_BIT 18
|
2016-02-17 12:54:53 +03:00
|
|
|
|
|
|
|
#define XSTATE_FP_MASK (1ULL << XSTATE_FP_BIT)
|
|
|
|
#define XSTATE_SSE_MASK (1ULL << XSTATE_SSE_BIT)
|
|
|
|
#define XSTATE_YMM_MASK (1ULL << XSTATE_YMM_BIT)
|
|
|
|
#define XSTATE_BNDREGS_MASK (1ULL << XSTATE_BNDREGS_BIT)
|
|
|
|
#define XSTATE_BNDCSR_MASK (1ULL << XSTATE_BNDCSR_BIT)
|
|
|
|
#define XSTATE_OPMASK_MASK (1ULL << XSTATE_OPMASK_BIT)
|
|
|
|
#define XSTATE_ZMM_Hi256_MASK (1ULL << XSTATE_ZMM_Hi256_BIT)
|
|
|
|
#define XSTATE_Hi16_ZMM_MASK (1ULL << XSTATE_Hi16_ZMM_BIT)
|
|
|
|
#define XSTATE_PKRU_MASK (1ULL << XSTATE_PKRU_BIT)
|
2022-02-15 22:52:55 +03:00
|
|
|
#define XSTATE_ARCH_LBR_MASK (1ULL << XSTATE_ARCH_LBR_BIT)
|
2022-02-17 09:04:29 +03:00
|
|
|
#define XSTATE_XTILE_CFG_MASK (1ULL << XSTATE_XTILE_CFG_BIT)
|
|
|
|
#define XSTATE_XTILE_DATA_MASK (1ULL << XSTATE_XTILE_DATA_BIT)
|
|
|
|
|
|
|
|
#define XSTATE_DYNAMIC_MASK (XSTATE_XTILE_DATA_MASK)
|
2013-09-13 17:55:57 +04:00
|
|
|
|
2022-02-17 09:04:27 +03:00
|
|
|
#define ESA_FEATURE_ALIGN64_BIT 1
|
2022-02-17 09:04:30 +03:00
|
|
|
#define ESA_FEATURE_XFD_BIT 2
|
2022-02-17 09:04:27 +03:00
|
|
|
|
|
|
|
#define ESA_FEATURE_ALIGN64_MASK (1U << ESA_FEATURE_ALIGN64_BIT)
|
2022-02-17 09:04:30 +03:00
|
|
|
#define ESA_FEATURE_XFD_MASK (1U << ESA_FEATURE_XFD_BIT)
|
2022-02-17 09:04:27 +03:00
|
|
|
|
|
|
|
|
2022-02-15 22:52:54 +03:00
|
|
|
/* CPUID feature bits available in XCR0 */
|
|
|
|
#define CPUID_XSTATE_XCR0_MASK (XSTATE_FP_MASK | XSTATE_SSE_MASK | \
|
|
|
|
XSTATE_YMM_MASK | XSTATE_BNDREGS_MASK | \
|
|
|
|
XSTATE_BNDCSR_MASK | XSTATE_OPMASK_MASK | \
|
|
|
|
XSTATE_ZMM_Hi256_MASK | \
|
|
|
|
XSTATE_Hi16_ZMM_MASK | XSTATE_PKRU_MASK | \
|
|
|
|
XSTATE_XTILE_CFG_MASK | XSTATE_XTILE_DATA_MASK)
|
|
|
|
|
2013-01-07 22:20:45 +04:00
|
|
|
/* CPUID feature words */
|
|
|
|
typedef enum FeatureWord {
|
|
|
|
FEAT_1_EDX, /* CPUID[1].EDX */
|
|
|
|
FEAT_1_ECX, /* CPUID[1].ECX */
|
|
|
|
FEAT_7_0_EBX, /* CPUID[EAX=7,ECX=0].EBX */
|
2015-11-18 05:20:15 +03:00
|
|
|
FEAT_7_0_ECX, /* CPUID[EAX=7,ECX=0].ECX */
|
2016-10-31 11:27:26 +03:00
|
|
|
FEAT_7_0_EDX, /* CPUID[EAX=7,ECX=0].EDX */
|
2019-07-25 09:14:16 +03:00
|
|
|
FEAT_7_1_EAX, /* CPUID[EAX=7,ECX=1].EAX */
|
2013-01-07 22:20:45 +04:00
|
|
|
FEAT_8000_0001_EDX, /* CPUID[8000_0001].EDX */
|
|
|
|
FEAT_8000_0001_ECX, /* CPUID[8000_0001].ECX */
|
2014-04-30 20:48:45 +04:00
|
|
|
FEAT_8000_0007_EDX, /* CPUID[8000_0007].EDX */
|
2018-01-09 18:45:16 +03:00
|
|
|
FEAT_8000_0008_EBX, /* CPUID[8000_0008].EBX */
|
2023-05-04 23:53:09 +03:00
|
|
|
FEAT_8000_0021_EAX, /* CPUID[8000_0021].EAX */
|
2013-01-07 22:20:45 +04:00
|
|
|
FEAT_C000_0001_EDX, /* CPUID[C000_0001].EDX */
|
|
|
|
FEAT_KVM, /* CPUID[4000_0001].EAX (KVM_CPUID_FEATURES) */
|
2018-02-09 17:15:25 +03:00
|
|
|
FEAT_KVM_HINTS, /* CPUID[4000_0001].EDX */
|
2013-01-07 22:20:45 +04:00
|
|
|
FEAT_SVM, /* CPUID[8000_000A].EDX */
|
2014-11-24 17:54:43 +03:00
|
|
|
FEAT_XSAVE, /* CPUID[EAX=0xd,ECX=1].EAX */
|
2015-06-07 12:15:08 +03:00
|
|
|
FEAT_6_EAX, /* CPUID[6].EAX */
|
2022-02-15 22:52:54 +03:00
|
|
|
FEAT_XSAVE_XCR0_LO, /* CPUID[EAX=0xd,ECX=0].EAX */
|
|
|
|
FEAT_XSAVE_XCR0_HI, /* CPUID[EAX=0xd,ECX=0].EDX */
|
2018-10-15 07:47:25 +03:00
|
|
|
FEAT_ARCH_CAPABILITIES,
|
2019-06-17 18:36:54 +03:00
|
|
|
FEAT_CORE_CAPABILITY,
|
2020-05-29 10:43:47 +03:00
|
|
|
FEAT_PERF_CAPABILITIES,
|
2019-07-01 19:32:17 +03:00
|
|
|
FEAT_VMX_PROCBASED_CTLS,
|
|
|
|
FEAT_VMX_SECONDARY_CTLS,
|
|
|
|
FEAT_VMX_PINBASED_CTLS,
|
|
|
|
FEAT_VMX_EXIT_CTLS,
|
|
|
|
FEAT_VMX_ENTRY_CTLS,
|
|
|
|
FEAT_VMX_MISC,
|
|
|
|
FEAT_VMX_EPT_VPID_CAPS,
|
|
|
|
FEAT_VMX_BASIC,
|
|
|
|
FEAT_VMX_VMFUNC,
|
2020-12-02 13:10:42 +03:00
|
|
|
FEAT_14_0_ECX,
|
2021-07-19 14:21:10 +03:00
|
|
|
FEAT_SGX_12_0_EAX, /* CPUID[EAX=0x12,ECX=0].EAX (SGX) */
|
2021-07-19 14:21:11 +03:00
|
|
|
FEAT_SGX_12_0_EBX, /* CPUID[EAX=0x12,ECX=0].EBX (SGX MISCSELECT[31:0]) */
|
i386: Add SGX CPUID leaf FEAT_SGX_12_1_EAX
CPUID leaf 12_1_EAX is an Intel-defined feature bits leaf enumerating
the platform's SGX capabilities that may be utilized by an enclave, e.g.
whether or not an enclave can gain access to the provision key.
Currently there are six capabilities:
- INIT: set when the enclave has has been initialized by EINIT. Cannot
be set by software, i.e. forced to zero in CPUID.
- DEBUG: permits a debugger to read/write into the enclave.
- MODE64BIT: the enclave runs in 64-bit mode
- PROVISIONKEY: grants has access to the provision key
- EINITTOKENKEY: grants access to the EINIT token key, i.e. the
enclave can generate EINIT tokens
- KSS: Key Separation and Sharing enabled for the enclave.
Note that the entirety of CPUID.0x12.0x1, i.e. all registers, enumerates
the allowed ATTRIBUTES (128 bits), but only bits 31:0 are directly
exposed to the user (via FEAT_12_1_EAX). Bits 63:32 are currently all
reserved and bits 127:64 correspond to the allowed XSAVE Feature Request
Mask, which is calculated based on other CPU features, e.g. XSAVE, MPX,
AVX, etc... and is not exposed to the user.
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Signed-off-by: Yang Zhong <yang.zhong@intel.com>
Message-Id: <20210719112136.57018-10-yang.zhong@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-07-19 14:21:12 +03:00
|
|
|
FEAT_SGX_12_1_EAX, /* CPUID[EAX=0x12,ECX=1].EAX (SGX ATTRIBUTES[31:0]) */
|
2022-02-15 22:52:54 +03:00
|
|
|
FEAT_XSAVE_XSS_LO, /* CPUID[EAX=0xd,ECX=1].ECX */
|
|
|
|
FEAT_XSAVE_XSS_HI, /* CPUID[EAX=0xd,ECX=1].EDX */
|
2023-03-03 09:59:11 +03:00
|
|
|
FEAT_7_1_EDX, /* CPUID[EAX=7,ECX=1].EDX */
|
2023-07-06 08:49:45 +03:00
|
|
|
FEAT_7_2_EDX, /* CPUID[EAX=7,ECX=2].EDX */
|
2013-01-07 22:20:45 +04:00
|
|
|
FEATURE_WORDS,
|
|
|
|
} FeatureWord;
|
|
|
|
|
2019-07-01 18:38:54 +03:00
|
|
|
typedef uint64_t FeatureWordArray[FEATURE_WORDS];
|
2022-03-23 14:33:25 +03:00
|
|
|
uint64_t x86_cpu_get_supported_feature_word(FeatureWord w,
|
|
|
|
bool migratable_only);
|
2013-01-07 22:20:45 +04:00
|
|
|
|
2005-01-04 02:50:08 +03:00
|
|
|
/* cpuid_features bits */
|
2014-03-17 20:00:30 +04:00
|
|
|
#define CPUID_FP87 (1U << 0)
|
|
|
|
#define CPUID_VME (1U << 1)
|
|
|
|
#define CPUID_DE (1U << 2)
|
|
|
|
#define CPUID_PSE (1U << 3)
|
|
|
|
#define CPUID_TSC (1U << 4)
|
|
|
|
#define CPUID_MSR (1U << 5)
|
|
|
|
#define CPUID_PAE (1U << 6)
|
|
|
|
#define CPUID_MCE (1U << 7)
|
|
|
|
#define CPUID_CX8 (1U << 8)
|
|
|
|
#define CPUID_APIC (1U << 9)
|
|
|
|
#define CPUID_SEP (1U << 11) /* sysenter/sysexit */
|
|
|
|
#define CPUID_MTRR (1U << 12)
|
|
|
|
#define CPUID_PGE (1U << 13)
|
|
|
|
#define CPUID_MCA (1U << 14)
|
|
|
|
#define CPUID_CMOV (1U << 15)
|
|
|
|
#define CPUID_PAT (1U << 16)
|
|
|
|
#define CPUID_PSE36 (1U << 17)
|
|
|
|
#define CPUID_PN (1U << 18)
|
|
|
|
#define CPUID_CLFLUSH (1U << 19)
|
|
|
|
#define CPUID_DTS (1U << 21)
|
|
|
|
#define CPUID_ACPI (1U << 22)
|
|
|
|
#define CPUID_MMX (1U << 23)
|
|
|
|
#define CPUID_FXSR (1U << 24)
|
|
|
|
#define CPUID_SSE (1U << 25)
|
|
|
|
#define CPUID_SSE2 (1U << 26)
|
|
|
|
#define CPUID_SS (1U << 27)
|
|
|
|
#define CPUID_HT (1U << 28)
|
|
|
|
#define CPUID_TM (1U << 29)
|
|
|
|
#define CPUID_IA64 (1U << 30)
|
|
|
|
#define CPUID_PBE (1U << 31)
|
|
|
|
|
|
|
|
#define CPUID_EXT_SSE3 (1U << 0)
|
|
|
|
#define CPUID_EXT_PCLMULQDQ (1U << 1)
|
|
|
|
#define CPUID_EXT_DTES64 (1U << 2)
|
|
|
|
#define CPUID_EXT_MONITOR (1U << 3)
|
|
|
|
#define CPUID_EXT_DSCPL (1U << 4)
|
|
|
|
#define CPUID_EXT_VMX (1U << 5)
|
|
|
|
#define CPUID_EXT_SMX (1U << 6)
|
|
|
|
#define CPUID_EXT_EST (1U << 7)
|
|
|
|
#define CPUID_EXT_TM2 (1U << 8)
|
|
|
|
#define CPUID_EXT_SSSE3 (1U << 9)
|
|
|
|
#define CPUID_EXT_CID (1U << 10)
|
|
|
|
#define CPUID_EXT_FMA (1U << 12)
|
|
|
|
#define CPUID_EXT_CX16 (1U << 13)
|
|
|
|
#define CPUID_EXT_XTPR (1U << 14)
|
|
|
|
#define CPUID_EXT_PDCM (1U << 15)
|
|
|
|
#define CPUID_EXT_PCID (1U << 17)
|
|
|
|
#define CPUID_EXT_DCA (1U << 18)
|
|
|
|
#define CPUID_EXT_SSE41 (1U << 19)
|
|
|
|
#define CPUID_EXT_SSE42 (1U << 20)
|
|
|
|
#define CPUID_EXT_X2APIC (1U << 21)
|
|
|
|
#define CPUID_EXT_MOVBE (1U << 22)
|
|
|
|
#define CPUID_EXT_POPCNT (1U << 23)
|
|
|
|
#define CPUID_EXT_TSC_DEADLINE_TIMER (1U << 24)
|
|
|
|
#define CPUID_EXT_AES (1U << 25)
|
|
|
|
#define CPUID_EXT_XSAVE (1U << 26)
|
|
|
|
#define CPUID_EXT_OSXSAVE (1U << 27)
|
|
|
|
#define CPUID_EXT_AVX (1U << 28)
|
|
|
|
#define CPUID_EXT_F16C (1U << 29)
|
|
|
|
#define CPUID_EXT_RDRAND (1U << 30)
|
|
|
|
#define CPUID_EXT_HYPERVISOR (1U << 31)
|
|
|
|
|
|
|
|
#define CPUID_EXT2_FPU (1U << 0)
|
|
|
|
#define CPUID_EXT2_VME (1U << 1)
|
|
|
|
#define CPUID_EXT2_DE (1U << 2)
|
|
|
|
#define CPUID_EXT2_PSE (1U << 3)
|
|
|
|
#define CPUID_EXT2_TSC (1U << 4)
|
|
|
|
#define CPUID_EXT2_MSR (1U << 5)
|
|
|
|
#define CPUID_EXT2_PAE (1U << 6)
|
|
|
|
#define CPUID_EXT2_MCE (1U << 7)
|
|
|
|
#define CPUID_EXT2_CX8 (1U << 8)
|
|
|
|
#define CPUID_EXT2_APIC (1U << 9)
|
|
|
|
#define CPUID_EXT2_SYSCALL (1U << 11)
|
|
|
|
#define CPUID_EXT2_MTRR (1U << 12)
|
|
|
|
#define CPUID_EXT2_PGE (1U << 13)
|
|
|
|
#define CPUID_EXT2_MCA (1U << 14)
|
|
|
|
#define CPUID_EXT2_CMOV (1U << 15)
|
|
|
|
#define CPUID_EXT2_PAT (1U << 16)
|
|
|
|
#define CPUID_EXT2_PSE36 (1U << 17)
|
|
|
|
#define CPUID_EXT2_MP (1U << 19)
|
|
|
|
#define CPUID_EXT2_NX (1U << 20)
|
|
|
|
#define CPUID_EXT2_MMXEXT (1U << 22)
|
|
|
|
#define CPUID_EXT2_MMX (1U << 23)
|
|
|
|
#define CPUID_EXT2_FXSR (1U << 24)
|
|
|
|
#define CPUID_EXT2_FFXSR (1U << 25)
|
|
|
|
#define CPUID_EXT2_PDPE1GB (1U << 26)
|
|
|
|
#define CPUID_EXT2_RDTSCP (1U << 27)
|
|
|
|
#define CPUID_EXT2_LM (1U << 29)
|
|
|
|
#define CPUID_EXT2_3DNOWEXT (1U << 30)
|
|
|
|
#define CPUID_EXT2_3DNOW (1U << 31)
|
2005-02-11 01:05:51 +03:00
|
|
|
|
2023-07-14 14:16:12 +03:00
|
|
|
/* CPUID[8000_0001].EDX bits that are aliases of CPUID[1].EDX bits on AMD CPUs */
|
2012-09-06 14:05:36 +04:00
|
|
|
#define CPUID_EXT2_AMD_ALIASES (CPUID_EXT2_FPU | CPUID_EXT2_VME | \
|
|
|
|
CPUID_EXT2_DE | CPUID_EXT2_PSE | \
|
|
|
|
CPUID_EXT2_TSC | CPUID_EXT2_MSR | \
|
|
|
|
CPUID_EXT2_PAE | CPUID_EXT2_MCE | \
|
|
|
|
CPUID_EXT2_CX8 | CPUID_EXT2_APIC | \
|
|
|
|
CPUID_EXT2_MTRR | CPUID_EXT2_PGE | \
|
|
|
|
CPUID_EXT2_MCA | CPUID_EXT2_CMOV | \
|
|
|
|
CPUID_EXT2_PAT | CPUID_EXT2_PSE36 | \
|
|
|
|
CPUID_EXT2_MMX | CPUID_EXT2_FXSR)
|
|
|
|
|
2014-03-17 20:00:30 +04:00
|
|
|
#define CPUID_EXT3_LAHF_LM (1U << 0)
|
|
|
|
#define CPUID_EXT3_CMP_LEG (1U << 1)
|
|
|
|
#define CPUID_EXT3_SVM (1U << 2)
|
|
|
|
#define CPUID_EXT3_EXTAPIC (1U << 3)
|
|
|
|
#define CPUID_EXT3_CR8LEG (1U << 4)
|
|
|
|
#define CPUID_EXT3_ABM (1U << 5)
|
|
|
|
#define CPUID_EXT3_SSE4A (1U << 6)
|
|
|
|
#define CPUID_EXT3_MISALIGNSSE (1U << 7)
|
|
|
|
#define CPUID_EXT3_3DNOWPREFETCH (1U << 8)
|
|
|
|
#define CPUID_EXT3_OSVW (1U << 9)
|
|
|
|
#define CPUID_EXT3_IBS (1U << 10)
|
|
|
|
#define CPUID_EXT3_XOP (1U << 11)
|
|
|
|
#define CPUID_EXT3_SKINIT (1U << 12)
|
|
|
|
#define CPUID_EXT3_WDT (1U << 13)
|
|
|
|
#define CPUID_EXT3_LWP (1U << 15)
|
|
|
|
#define CPUID_EXT3_FMA4 (1U << 16)
|
|
|
|
#define CPUID_EXT3_TCE (1U << 17)
|
|
|
|
#define CPUID_EXT3_NODEID (1U << 19)
|
|
|
|
#define CPUID_EXT3_TBM (1U << 21)
|
|
|
|
#define CPUID_EXT3_TOPOEXT (1U << 22)
|
|
|
|
#define CPUID_EXT3_PERFCORE (1U << 23)
|
|
|
|
#define CPUID_EXT3_PERFNB (1U << 24)
|
|
|
|
|
2021-01-26 23:24:56 +03:00
|
|
|
#define CPUID_SVM_NPT (1U << 0)
|
|
|
|
#define CPUID_SVM_LBRV (1U << 1)
|
|
|
|
#define CPUID_SVM_SVMLOCK (1U << 2)
|
|
|
|
#define CPUID_SVM_NRIPSAVE (1U << 3)
|
|
|
|
#define CPUID_SVM_TSCSCALE (1U << 4)
|
|
|
|
#define CPUID_SVM_VMCBCLEAN (1U << 5)
|
|
|
|
#define CPUID_SVM_FLUSHASID (1U << 6)
|
|
|
|
#define CPUID_SVM_DECODEASSIST (1U << 7)
|
|
|
|
#define CPUID_SVM_PAUSEFILTER (1U << 10)
|
|
|
|
#define CPUID_SVM_PFTHRESHOLD (1U << 12)
|
|
|
|
#define CPUID_SVM_AVIC (1U << 13)
|
|
|
|
#define CPUID_SVM_V_VMSAVE_VMLOAD (1U << 15)
|
|
|
|
#define CPUID_SVM_VGIF (1U << 16)
|
2023-05-04 23:53:11 +03:00
|
|
|
#define CPUID_SVM_VNMI (1U << 25)
|
2021-01-26 23:24:56 +03:00
|
|
|
#define CPUID_SVM_SVME_ADDR_CHK (1U << 28)
|
2014-03-17 20:00:30 +04:00
|
|
|
|
2019-09-26 05:10:54 +03:00
|
|
|
/* Support RDFSBASE/RDGSBASE/WRFSBASE/WRGSBASE */
|
|
|
|
#define CPUID_7_0_EBX_FSGSBASE (1U << 0)
|
2021-07-19 14:21:09 +03:00
|
|
|
/* Support SGX */
|
|
|
|
#define CPUID_7_0_EBX_SGX (1U << 2)
|
2019-09-26 05:10:54 +03:00
|
|
|
/* 1st Group of Advanced Bit Manipulation Extensions */
|
|
|
|
#define CPUID_7_0_EBX_BMI1 (1U << 3)
|
|
|
|
/* Hardware Lock Elision */
|
|
|
|
#define CPUID_7_0_EBX_HLE (1U << 4)
|
|
|
|
/* Intel Advanced Vector Extensions 2 */
|
|
|
|
#define CPUID_7_0_EBX_AVX2 (1U << 5)
|
|
|
|
/* Supervisor-mode Execution Prevention */
|
|
|
|
#define CPUID_7_0_EBX_SMEP (1U << 7)
|
|
|
|
/* 2nd Group of Advanced Bit Manipulation Extensions */
|
|
|
|
#define CPUID_7_0_EBX_BMI2 (1U << 8)
|
|
|
|
/* Enhanced REP MOVSB/STOSB */
|
|
|
|
#define CPUID_7_0_EBX_ERMS (1U << 9)
|
|
|
|
/* Invalidate Process-Context Identifier */
|
|
|
|
#define CPUID_7_0_EBX_INVPCID (1U << 10)
|
|
|
|
/* Restricted Transactional Memory */
|
|
|
|
#define CPUID_7_0_EBX_RTM (1U << 11)
|
|
|
|
/* Memory Protection Extension */
|
|
|
|
#define CPUID_7_0_EBX_MPX (1U << 14)
|
|
|
|
/* AVX-512 Foundation */
|
|
|
|
#define CPUID_7_0_EBX_AVX512F (1U << 16)
|
|
|
|
/* AVX-512 Doubleword & Quadword Instruction */
|
|
|
|
#define CPUID_7_0_EBX_AVX512DQ (1U << 17)
|
|
|
|
/* Read Random SEED */
|
|
|
|
#define CPUID_7_0_EBX_RDSEED (1U << 18)
|
|
|
|
/* ADCX and ADOX instructions */
|
|
|
|
#define CPUID_7_0_EBX_ADX (1U << 19)
|
|
|
|
/* Supervisor Mode Access Prevention */
|
|
|
|
#define CPUID_7_0_EBX_SMAP (1U << 20)
|
|
|
|
/* AVX-512 Integer Fused Multiply Add */
|
|
|
|
#define CPUID_7_0_EBX_AVX512IFMA (1U << 21)
|
|
|
|
/* Flush a Cache Line Optimized */
|
|
|
|
#define CPUID_7_0_EBX_CLFLUSHOPT (1U << 23)
|
|
|
|
/* Cache Line Write Back */
|
|
|
|
#define CPUID_7_0_EBX_CLWB (1U << 24)
|
|
|
|
/* Intel Processor Trace */
|
|
|
|
#define CPUID_7_0_EBX_INTEL_PT (1U << 25)
|
|
|
|
/* AVX-512 Prefetch */
|
|
|
|
#define CPUID_7_0_EBX_AVX512PF (1U << 26)
|
|
|
|
/* AVX-512 Exponential and Reciprocal */
|
|
|
|
#define CPUID_7_0_EBX_AVX512ER (1U << 27)
|
|
|
|
/* AVX-512 Conflict Detection */
|
|
|
|
#define CPUID_7_0_EBX_AVX512CD (1U << 28)
|
|
|
|
/* SHA1/SHA256 Instruction Extensions */
|
|
|
|
#define CPUID_7_0_EBX_SHA_NI (1U << 29)
|
|
|
|
/* AVX-512 Byte and Word Instructions */
|
|
|
|
#define CPUID_7_0_EBX_AVX512BW (1U << 30)
|
|
|
|
/* AVX-512 Vector Length Extensions */
|
|
|
|
#define CPUID_7_0_EBX_AVX512VL (1U << 31)
|
|
|
|
|
|
|
|
/* AVX-512 Vector Byte Manipulation Instruction */
|
2019-09-26 05:10:55 +03:00
|
|
|
#define CPUID_7_0_ECX_AVX512_VBMI (1U << 1)
|
2019-09-26 05:10:54 +03:00
|
|
|
/* User-Mode Instruction Prevention */
|
|
|
|
#define CPUID_7_0_ECX_UMIP (1U << 2)
|
|
|
|
/* Protection Keys for User-mode Pages */
|
|
|
|
#define CPUID_7_0_ECX_PKU (1U << 3)
|
|
|
|
/* OS Enable Protection Keys */
|
|
|
|
#define CPUID_7_0_ECX_OSPKE (1U << 4)
|
2019-10-11 10:41:02 +03:00
|
|
|
/* UMONITOR/UMWAIT/TPAUSE Instructions */
|
|
|
|
#define CPUID_7_0_ECX_WAITPKG (1U << 5)
|
2019-09-26 05:10:54 +03:00
|
|
|
/* Additional AVX-512 Vector Byte Manipulation Instruction */
|
2019-09-26 05:10:55 +03:00
|
|
|
#define CPUID_7_0_ECX_AVX512_VBMI2 (1U << 6)
|
2019-09-26 05:10:54 +03:00
|
|
|
/* Galois Field New Instructions */
|
|
|
|
#define CPUID_7_0_ECX_GFNI (1U << 8)
|
|
|
|
/* Vector AES Instructions */
|
|
|
|
#define CPUID_7_0_ECX_VAES (1U << 9)
|
|
|
|
/* Carry-Less Multiplication Quadword */
|
|
|
|
#define CPUID_7_0_ECX_VPCLMULQDQ (1U << 10)
|
|
|
|
/* Vector Neural Network Instructions */
|
|
|
|
#define CPUID_7_0_ECX_AVX512VNNI (1U << 11)
|
|
|
|
/* Support for VPOPCNT[B,W] and VPSHUFBITQMB */
|
|
|
|
#define CPUID_7_0_ECX_AVX512BITALG (1U << 12)
|
|
|
|
/* POPCNT for vectors of DW/QW */
|
|
|
|
#define CPUID_7_0_ECX_AVX512_VPOPCNTDQ (1U << 14)
|
|
|
|
/* 5-level Page Tables */
|
|
|
|
#define CPUID_7_0_ECX_LA57 (1U << 16)
|
|
|
|
/* Read Processor ID */
|
|
|
|
#define CPUID_7_0_ECX_RDPID (1U << 22)
|
2021-02-02 12:02:24 +03:00
|
|
|
/* Bus Lock Debug Exception */
|
|
|
|
#define CPUID_7_0_ECX_BUS_LOCK_DETECT (1U << 24)
|
2019-09-26 05:10:54 +03:00
|
|
|
/* Cache Line Demote Instruction */
|
|
|
|
#define CPUID_7_0_ECX_CLDEMOTE (1U << 25)
|
|
|
|
/* Move Doubleword as Direct Store Instruction */
|
|
|
|
#define CPUID_7_0_ECX_MOVDIRI (1U << 27)
|
|
|
|
/* Move 64 Bytes as Direct Store Instruction */
|
|
|
|
#define CPUID_7_0_ECX_MOVDIR64B (1U << 28)
|
2021-07-19 14:21:09 +03:00
|
|
|
/* Support SGX Launch Control */
|
|
|
|
#define CPUID_7_0_ECX_SGX_LC (1U << 30)
|
2021-01-27 11:28:49 +03:00
|
|
|
/* Protection Keys for Supervisor-mode Pages */
|
|
|
|
#define CPUID_7_0_ECX_PKS (1U << 31)
|
2019-09-26 05:10:54 +03:00
|
|
|
|
|
|
|
/* AVX512 Neural Network Instructions */
|
|
|
|
#define CPUID_7_0_EDX_AVX512_4VNNIW (1U << 2)
|
|
|
|
/* AVX512 Multiply Accumulation Single Precision */
|
|
|
|
#define CPUID_7_0_EDX_AVX512_4FMAPS (1U << 3)
|
2020-07-14 11:41:46 +03:00
|
|
|
/* Fast Short Rep Mov */
|
|
|
|
#define CPUID_7_0_EDX_FSRM (1U << 4)
|
2020-04-13 09:52:38 +03:00
|
|
|
/* AVX512 Vector Pair Intersection to a Pair of Mask Registers */
|
|
|
|
#define CPUID_7_0_EDX_AVX512_VP2INTERSECT (1U << 8)
|
2020-07-06 02:17:15 +03:00
|
|
|
/* SERIALIZE instruction */
|
|
|
|
#define CPUID_7_0_EDX_SERIALIZE (1U << 14)
|
2020-07-06 02:17:16 +03:00
|
|
|
/* TSX Suspend Load Address Tracking instruction */
|
|
|
|
#define CPUID_7_0_EDX_TSX_LDTRK (1U << 16)
|
2022-02-15 22:52:55 +03:00
|
|
|
/* Architectural LBRs */
|
|
|
|
#define CPUID_7_0_EDX_ARCH_LBR (1U << 19)
|
2022-08-12 08:57:51 +03:00
|
|
|
/* AMX_BF16 instruction */
|
|
|
|
#define CPUID_7_0_EDX_AMX_BF16 (1U << 22)
|
2020-12-17 01:40:02 +03:00
|
|
|
/* AVX512_FP16 instruction */
|
|
|
|
#define CPUID_7_0_EDX_AVX512_FP16 (1U << 23)
|
2022-02-17 09:04:28 +03:00
|
|
|
/* AMX tile (two-dimensional register) */
|
|
|
|
#define CPUID_7_0_EDX_AMX_TILE (1U << 24)
|
2022-08-12 08:57:51 +03:00
|
|
|
/* AMX_INT8 instruction */
|
|
|
|
#define CPUID_7_0_EDX_AMX_INT8 (1U << 25)
|
2019-09-26 05:10:54 +03:00
|
|
|
/* Speculation Control */
|
|
|
|
#define CPUID_7_0_EDX_SPEC_CTRL (1U << 26)
|
2019-10-22 10:35:27 +03:00
|
|
|
/* Single Thread Indirect Branch Predictors */
|
|
|
|
#define CPUID_7_0_EDX_STIBP (1U << 27)
|
2023-02-01 16:57:58 +03:00
|
|
|
/* Flush L1D cache */
|
|
|
|
#define CPUID_7_0_EDX_FLUSH_L1D (1U << 28)
|
2019-09-26 05:10:54 +03:00
|
|
|
/* Arch Capabilities */
|
|
|
|
#define CPUID_7_0_EDX_ARCH_CAPABILITIES (1U << 29)
|
|
|
|
/* Core Capability */
|
|
|
|
#define CPUID_7_0_EDX_CORE_CAPABILITY (1U << 30)
|
|
|
|
/* Speculative Store Bypass Disable */
|
|
|
|
#define CPUID_7_0_EDX_SPEC_CTRL_SSBD (1U << 31)
|
|
|
|
|
2021-04-07 04:56:09 +03:00
|
|
|
/* AVX VNNI Instruction */
|
|
|
|
#define CPUID_7_1_EAX_AVX_VNNI (1U << 4)
|
2019-09-26 05:10:54 +03:00
|
|
|
/* AVX512 BFloat16 Instruction */
|
|
|
|
#define CPUID_7_1_EAX_AVX512_BF16 (1U << 5)
|
2023-03-03 09:59:08 +03:00
|
|
|
/* CMPCCXADD Instructions */
|
|
|
|
#define CPUID_7_1_EAX_CMPCCXADD (1U << 7)
|
2023-02-27 12:55:46 +03:00
|
|
|
/* Fast Zero REP MOVS */
|
|
|
|
#define CPUID_7_1_EAX_FZRM (1U << 10)
|
|
|
|
/* Fast Short REP STOS */
|
|
|
|
#define CPUID_7_1_EAX_FSRS (1U << 11)
|
|
|
|
/* Fast Short REP CMPS/SCAS */
|
|
|
|
#define CPUID_7_1_EAX_FSRC (1U << 12)
|
2023-03-03 09:59:09 +03:00
|
|
|
/* Support Tile Computational Operations on FP16 Numbers */
|
|
|
|
#define CPUID_7_1_EAX_AMX_FP16 (1U << 21)
|
2023-03-03 09:59:10 +03:00
|
|
|
/* Support for VPMADD52[H,L]UQ */
|
|
|
|
#define CPUID_7_1_EAX_AVX_IFMA (1U << 23)
|
2024-01-12 09:00:41 +03:00
|
|
|
/* Linear Address Masking */
|
|
|
|
#define CPUID_7_1_EAX_LAM (1U << 26)
|
2023-02-27 12:55:46 +03:00
|
|
|
|
2023-03-03 09:59:11 +03:00
|
|
|
/* Support for VPDPB[SU,UU,SS]D[,S] */
|
|
|
|
#define CPUID_7_1_EDX_AVX_VNNI_INT8 (1U << 4)
|
2023-03-03 09:59:12 +03:00
|
|
|
/* AVX NE CONVERT Instructions */
|
|
|
|
#define CPUID_7_1_EDX_AVX_NE_CONVERT (1U << 5)
|
2023-08-30 10:43:24 +03:00
|
|
|
/* AMX COMPLEX Instructions */
|
|
|
|
#define CPUID_7_1_EDX_AMX_COMPLEX (1U << 8)
|
2023-03-03 09:59:13 +03:00
|
|
|
/* PREFETCHIT0/1 Instructions */
|
|
|
|
#define CPUID_7_1_EDX_PREFETCHITI (1U << 14)
|
2023-03-03 09:59:11 +03:00
|
|
|
|
2023-07-06 08:49:45 +03:00
|
|
|
/* Do not exhibit MXCSR Configuration Dependent Timing (MCDT) behavior */
|
|
|
|
#define CPUID_7_2_EDX_MCDT_NO (1U << 5)
|
|
|
|
|
2022-02-17 09:04:33 +03:00
|
|
|
/* XFD Extend Feature Disabled */
|
|
|
|
#define CPUID_D_1_EAX_XFD (1U << 4)
|
2019-09-26 05:10:54 +03:00
|
|
|
|
2020-12-02 13:10:42 +03:00
|
|
|
/* Packets which contain IP payload have LIP values */
|
|
|
|
#define CPUID_14_0_ECX_LIP (1U << 31)
|
|
|
|
|
2019-09-26 05:10:54 +03:00
|
|
|
/* CLZERO instruction */
|
|
|
|
#define CPUID_8000_0008_EBX_CLZERO (1U << 0)
|
|
|
|
/* Always save/restore FP error pointers */
|
|
|
|
#define CPUID_8000_0008_EBX_XSAVEERPTR (1U << 2)
|
|
|
|
/* Write back and do not invalidate cache */
|
|
|
|
#define CPUID_8000_0008_EBX_WBNOINVD (1U << 9)
|
|
|
|
/* Indirect Branch Prediction Barrier */
|
|
|
|
#define CPUID_8000_0008_EBX_IBPB (1U << 12)
|
2021-02-10 00:04:05 +03:00
|
|
|
/* Indirect Branch Restricted Speculation */
|
|
|
|
#define CPUID_8000_0008_EBX_IBRS (1U << 14)
|
2019-11-07 21:01:04 +03:00
|
|
|
/* Single Thread Indirect Branch Predictors */
|
|
|
|
#define CPUID_8000_0008_EBX_STIBP (1U << 15)
|
2023-05-04 23:53:08 +03:00
|
|
|
/* STIBP mode has enhanced performance and may be left always on */
|
|
|
|
#define CPUID_8000_0008_EBX_STIBP_ALWAYS_ON (1U << 17)
|
2021-02-10 00:04:05 +03:00
|
|
|
/* Speculative Store Bypass Disable */
|
|
|
|
#define CPUID_8000_0008_EBX_AMD_SSBD (1U << 24)
|
2023-05-04 23:53:08 +03:00
|
|
|
/* Predictive Store Forwarding Disable */
|
|
|
|
#define CPUID_8000_0008_EBX_AMD_PSFD (1U << 28)
|
2018-01-09 18:45:16 +03:00
|
|
|
|
2023-05-04 23:53:09 +03:00
|
|
|
/* Processor ignores nested data breakpoints */
|
|
|
|
#define CPUID_8000_0021_EAX_No_NESTED_DATA_BP (1U << 0)
|
|
|
|
/* LFENCE is always serializing */
|
|
|
|
#define CPUID_8000_0021_EAX_LFENCE_ALWAYS_SERIALIZING (1U << 2)
|
|
|
|
/* Null Selector Clears Base */
|
|
|
|
#define CPUID_8000_0021_EAX_NULL_SEL_CLR_BASE (1U << 6)
|
2023-05-04 23:53:11 +03:00
|
|
|
/* Automatic IBRS */
|
|
|
|
#define CPUID_8000_0021_EAX_AUTO_IBRS (1U << 8)
|
2023-05-04 23:53:09 +03:00
|
|
|
|
2014-11-24 17:54:43 +03:00
|
|
|
#define CPUID_XSAVE_XSAVEOPT (1U << 0)
|
|
|
|
#define CPUID_XSAVE_XSAVEC (1U << 1)
|
|
|
|
#define CPUID_XSAVE_XGETBV1 (1U << 2)
|
|
|
|
#define CPUID_XSAVE_XSAVES (1U << 3)
|
|
|
|
|
2015-06-07 12:15:08 +03:00
|
|
|
#define CPUID_6_EAX_ARAT (1U << 2)
|
|
|
|
|
2014-04-30 20:48:45 +04:00
|
|
|
/* CPUID[0x80000007].EDX flags: */
|
|
|
|
#define CPUID_APM_INVTSC (1U << 8)
|
|
|
|
|
2012-10-22 19:03:10 +04:00
|
|
|
#define CPUID_VENDOR_SZ 12
|
|
|
|
|
2008-09-25 22:08:05 +04:00
|
|
|
#define CPUID_VENDOR_INTEL_1 0x756e6547 /* "Genu" */
|
|
|
|
#define CPUID_VENDOR_INTEL_2 0x49656e69 /* "ineI" */
|
|
|
|
#define CPUID_VENDOR_INTEL_3 0x6c65746e /* "ntel" */
|
2013-01-21 18:06:36 +04:00
|
|
|
#define CPUID_VENDOR_INTEL "GenuineIntel"
|
2008-09-25 22:08:05 +04:00
|
|
|
|
|
|
|
#define CPUID_VENDOR_AMD_1 0x68747541 /* "Auth" */
|
2011-06-01 05:59:52 +04:00
|
|
|
#define CPUID_VENDOR_AMD_2 0x69746e65 /* "enti" */
|
2008-09-25 22:08:05 +04:00
|
|
|
#define CPUID_VENDOR_AMD_3 0x444d4163 /* "cAMD" */
|
2013-01-21 18:06:36 +04:00
|
|
|
#define CPUID_VENDOR_AMD "AuthenticAMD"
|
2008-09-25 22:08:05 +04:00
|
|
|
|
2013-01-21 18:06:36 +04:00
|
|
|
#define CPUID_VENDOR_VIA "CentaurHauls"
|
2011-06-01 05:59:52 +04:00
|
|
|
|
2019-04-16 15:06:13 +03:00
|
|
|
#define CPUID_VENDOR_HYGON "HygonGenuine"
|
|
|
|
|
2019-06-19 19:21:35 +03:00
|
|
|
#define IS_INTEL_CPU(env) ((env)->cpuid_vendor1 == CPUID_VENDOR_INTEL_1 && \
|
|
|
|
(env)->cpuid_vendor2 == CPUID_VENDOR_INTEL_2 && \
|
|
|
|
(env)->cpuid_vendor3 == CPUID_VENDOR_INTEL_3)
|
|
|
|
#define IS_AMD_CPU(env) ((env)->cpuid_vendor1 == CPUID_VENDOR_AMD_1 && \
|
|
|
|
(env)->cpuid_vendor2 == CPUID_VENDOR_AMD_2 && \
|
|
|
|
(env)->cpuid_vendor3 == CPUID_VENDOR_AMD_3)
|
|
|
|
|
2014-03-17 20:00:30 +04:00
|
|
|
#define CPUID_MWAIT_IBE (1U << 1) /* Interrupts can exit capability */
|
|
|
|
#define CPUID_MWAIT_EMX (1U << 0) /* enumeration supported */
|
2008-09-25 22:11:30 +04:00
|
|
|
|
2016-05-12 20:24:26 +03:00
|
|
|
/* CPUID[0xB].ECX level types */
|
|
|
|
#define CPUID_TOPOLOGY_LEVEL_INVALID (0U << 8)
|
|
|
|
#define CPUID_TOPOLOGY_LEVEL_SMT (1U << 8)
|
|
|
|
#define CPUID_TOPOLOGY_LEVEL_CORE (2U << 8)
|
2019-06-20 08:45:23 +03:00
|
|
|
#define CPUID_TOPOLOGY_LEVEL_DIE (5U << 8)
|
2016-05-12 20:24:26 +03:00
|
|
|
|
2018-10-15 07:47:25 +03:00
|
|
|
/* MSR Feature Bits */
|
2019-12-25 09:30:17 +03:00
|
|
|
#define MSR_ARCH_CAP_RDCL_NO (1U << 0)
|
|
|
|
#define MSR_ARCH_CAP_IBRS_ALL (1U << 1)
|
|
|
|
#define MSR_ARCH_CAP_RSBA (1U << 2)
|
2018-10-15 07:47:25 +03:00
|
|
|
#define MSR_ARCH_CAP_SKIP_L1DFL_VMENTRY (1U << 3)
|
2019-12-25 09:30:17 +03:00
|
|
|
#define MSR_ARCH_CAP_SSB_NO (1U << 4)
|
|
|
|
#define MSR_ARCH_CAP_MDS_NO (1U << 5)
|
|
|
|
#define MSR_ARCH_CAP_PSCHANGE_MC_NO (1U << 6)
|
|
|
|
#define MSR_ARCH_CAP_TSX_CTRL_MSR (1U << 7)
|
|
|
|
#define MSR_ARCH_CAP_TAA_NO (1U << 8)
|
2023-07-06 08:49:47 +03:00
|
|
|
#define MSR_ARCH_CAP_SBDR_SSDP_NO (1U << 13)
|
|
|
|
#define MSR_ARCH_CAP_FBSDP_NO (1U << 14)
|
|
|
|
#define MSR_ARCH_CAP_PSDP_NO (1U << 15)
|
2023-02-01 16:57:59 +03:00
|
|
|
#define MSR_ARCH_CAP_FB_CLEAR (1U << 17)
|
2023-07-06 08:49:47 +03:00
|
|
|
#define MSR_ARCH_CAP_PBRSB_NO (1U << 24)
|
2018-10-15 07:47:25 +03:00
|
|
|
|
2019-06-17 18:36:54 +03:00
|
|
|
#define MSR_CORE_CAP_SPLIT_LOCK_DETECT (1U << 5)
|
|
|
|
|
2019-07-01 19:24:52 +03:00
|
|
|
/* VMX MSR features */
|
|
|
|
#define MSR_VMX_BASIC_VMCS_REVISION_MASK 0x7FFFFFFFull
|
|
|
|
#define MSR_VMX_BASIC_VMXON_REGION_SIZE_MASK (0x00001FFFull << 32)
|
|
|
|
#define MSR_VMX_BASIC_VMCS_MEM_TYPE_MASK (0x003C0000ull << 32)
|
|
|
|
#define MSR_VMX_BASIC_DUAL_MONITOR (1ULL << 49)
|
|
|
|
#define MSR_VMX_BASIC_INS_OUTS (1ULL << 54)
|
|
|
|
#define MSR_VMX_BASIC_TRUE_CTLS (1ULL << 55)
|
2023-09-20 18:41:17 +03:00
|
|
|
#define MSR_VMX_BASIC_ANY_ERRCODE (1ULL << 56)
|
2019-07-01 19:24:52 +03:00
|
|
|
|
|
|
|
#define MSR_VMX_MISC_PREEMPTION_TIMER_SHIFT_MASK 0x1Full
|
|
|
|
#define MSR_VMX_MISC_STORE_LMA (1ULL << 5)
|
|
|
|
#define MSR_VMX_MISC_ACTIVITY_HLT (1ULL << 6)
|
|
|
|
#define MSR_VMX_MISC_ACTIVITY_SHUTDOWN (1ULL << 7)
|
|
|
|
#define MSR_VMX_MISC_ACTIVITY_WAIT_SIPI (1ULL << 8)
|
|
|
|
#define MSR_VMX_MISC_MAX_MSR_LIST_SIZE_MASK 0x0E000000ull
|
|
|
|
#define MSR_VMX_MISC_VMWRITE_VMEXIT (1ULL << 29)
|
|
|
|
#define MSR_VMX_MISC_ZERO_LEN_INJECT (1ULL << 30)
|
|
|
|
|
|
|
|
#define MSR_VMX_EPT_EXECONLY (1ULL << 0)
|
|
|
|
#define MSR_VMX_EPT_PAGE_WALK_LENGTH_4 (1ULL << 6)
|
|
|
|
#define MSR_VMX_EPT_PAGE_WALK_LENGTH_5 (1ULL << 7)
|
|
|
|
#define MSR_VMX_EPT_UC (1ULL << 8)
|
|
|
|
#define MSR_VMX_EPT_WB (1ULL << 14)
|
|
|
|
#define MSR_VMX_EPT_2MB (1ULL << 16)
|
|
|
|
#define MSR_VMX_EPT_1GB (1ULL << 17)
|
|
|
|
#define MSR_VMX_EPT_INVEPT (1ULL << 20)
|
|
|
|
#define MSR_VMX_EPT_AD_BITS (1ULL << 21)
|
|
|
|
#define MSR_VMX_EPT_ADVANCED_VMEXIT_INFO (1ULL << 22)
|
|
|
|
#define MSR_VMX_EPT_INVEPT_SINGLE_CONTEXT (1ULL << 25)
|
|
|
|
#define MSR_VMX_EPT_INVEPT_ALL_CONTEXT (1ULL << 26)
|
|
|
|
#define MSR_VMX_EPT_INVVPID (1ULL << 32)
|
|
|
|
#define MSR_VMX_EPT_INVVPID_SINGLE_ADDR (1ULL << 40)
|
|
|
|
#define MSR_VMX_EPT_INVVPID_SINGLE_CONTEXT (1ULL << 41)
|
|
|
|
#define MSR_VMX_EPT_INVVPID_ALL_CONTEXT (1ULL << 42)
|
|
|
|
#define MSR_VMX_EPT_INVVPID_SINGLE_CONTEXT_NOGLOBALS (1ULL << 43)
|
|
|
|
|
|
|
|
#define MSR_VMX_VMFUNC_EPT_SWITCHING (1ULL << 0)
|
|
|
|
|
|
|
|
|
|
|
|
/* VMX controls */
|
|
|
|
#define VMX_CPU_BASED_VIRTUAL_INTR_PENDING 0x00000004
|
|
|
|
#define VMX_CPU_BASED_USE_TSC_OFFSETING 0x00000008
|
|
|
|
#define VMX_CPU_BASED_HLT_EXITING 0x00000080
|
|
|
|
#define VMX_CPU_BASED_INVLPG_EXITING 0x00000200
|
|
|
|
#define VMX_CPU_BASED_MWAIT_EXITING 0x00000400
|
|
|
|
#define VMX_CPU_BASED_RDPMC_EXITING 0x00000800
|
|
|
|
#define VMX_CPU_BASED_RDTSC_EXITING 0x00001000
|
|
|
|
#define VMX_CPU_BASED_CR3_LOAD_EXITING 0x00008000
|
|
|
|
#define VMX_CPU_BASED_CR3_STORE_EXITING 0x00010000
|
|
|
|
#define VMX_CPU_BASED_CR8_LOAD_EXITING 0x00080000
|
|
|
|
#define VMX_CPU_BASED_CR8_STORE_EXITING 0x00100000
|
|
|
|
#define VMX_CPU_BASED_TPR_SHADOW 0x00200000
|
|
|
|
#define VMX_CPU_BASED_VIRTUAL_NMI_PENDING 0x00400000
|
|
|
|
#define VMX_CPU_BASED_MOV_DR_EXITING 0x00800000
|
|
|
|
#define VMX_CPU_BASED_UNCOND_IO_EXITING 0x01000000
|
|
|
|
#define VMX_CPU_BASED_USE_IO_BITMAPS 0x02000000
|
|
|
|
#define VMX_CPU_BASED_MONITOR_TRAP_FLAG 0x08000000
|
|
|
|
#define VMX_CPU_BASED_USE_MSR_BITMAPS 0x10000000
|
|
|
|
#define VMX_CPU_BASED_MONITOR_EXITING 0x20000000
|
|
|
|
#define VMX_CPU_BASED_PAUSE_EXITING 0x40000000
|
|
|
|
#define VMX_CPU_BASED_ACTIVATE_SECONDARY_CONTROLS 0x80000000
|
|
|
|
|
|
|
|
#define VMX_SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES 0x00000001
|
|
|
|
#define VMX_SECONDARY_EXEC_ENABLE_EPT 0x00000002
|
|
|
|
#define VMX_SECONDARY_EXEC_DESC 0x00000004
|
|
|
|
#define VMX_SECONDARY_EXEC_RDTSCP 0x00000008
|
|
|
|
#define VMX_SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE 0x00000010
|
|
|
|
#define VMX_SECONDARY_EXEC_ENABLE_VPID 0x00000020
|
|
|
|
#define VMX_SECONDARY_EXEC_WBINVD_EXITING 0x00000040
|
|
|
|
#define VMX_SECONDARY_EXEC_UNRESTRICTED_GUEST 0x00000080
|
|
|
|
#define VMX_SECONDARY_EXEC_APIC_REGISTER_VIRT 0x00000100
|
|
|
|
#define VMX_SECONDARY_EXEC_VIRTUAL_INTR_DELIVERY 0x00000200
|
|
|
|
#define VMX_SECONDARY_EXEC_PAUSE_LOOP_EXITING 0x00000400
|
|
|
|
#define VMX_SECONDARY_EXEC_RDRAND_EXITING 0x00000800
|
|
|
|
#define VMX_SECONDARY_EXEC_ENABLE_INVPCID 0x00001000
|
|
|
|
#define VMX_SECONDARY_EXEC_ENABLE_VMFUNC 0x00002000
|
|
|
|
#define VMX_SECONDARY_EXEC_SHADOW_VMCS 0x00004000
|
|
|
|
#define VMX_SECONDARY_EXEC_ENCLS_EXITING 0x00008000
|
|
|
|
#define VMX_SECONDARY_EXEC_RDSEED_EXITING 0x00010000
|
|
|
|
#define VMX_SECONDARY_EXEC_ENABLE_PML 0x00020000
|
|
|
|
#define VMX_SECONDARY_EXEC_XSAVES 0x00100000
|
2021-06-21 19:31:52 +03:00
|
|
|
#define VMX_SECONDARY_EXEC_TSC_SCALING 0x02000000
|
2023-08-07 12:33:40 +03:00
|
|
|
#define VMX_SECONDARY_EXEC_ENABLE_USER_WAIT_PAUSE 0x04000000
|
2019-07-01 19:24:52 +03:00
|
|
|
|
|
|
|
#define VMX_PIN_BASED_EXT_INTR_MASK 0x00000001
|
|
|
|
#define VMX_PIN_BASED_NMI_EXITING 0x00000008
|
|
|
|
#define VMX_PIN_BASED_VIRTUAL_NMIS 0x00000020
|
|
|
|
#define VMX_PIN_BASED_VMX_PREEMPTION_TIMER 0x00000040
|
|
|
|
#define VMX_PIN_BASED_POSTED_INTR 0x00000080
|
|
|
|
|
|
|
|
#define VMX_VM_EXIT_SAVE_DEBUG_CONTROLS 0x00000004
|
|
|
|
#define VMX_VM_EXIT_HOST_ADDR_SPACE_SIZE 0x00000200
|
|
|
|
#define VMX_VM_EXIT_LOAD_IA32_PERF_GLOBAL_CTRL 0x00001000
|
|
|
|
#define VMX_VM_EXIT_ACK_INTR_ON_EXIT 0x00008000
|
|
|
|
#define VMX_VM_EXIT_SAVE_IA32_PAT 0x00040000
|
|
|
|
#define VMX_VM_EXIT_LOAD_IA32_PAT 0x00080000
|
|
|
|
#define VMX_VM_EXIT_SAVE_IA32_EFER 0x00100000
|
|
|
|
#define VMX_VM_EXIT_LOAD_IA32_EFER 0x00200000
|
|
|
|
#define VMX_VM_EXIT_SAVE_VMX_PREEMPTION_TIMER 0x00400000
|
|
|
|
#define VMX_VM_EXIT_CLEAR_BNDCFGS 0x00800000
|
|
|
|
#define VMX_VM_EXIT_PT_CONCEAL_PIP 0x01000000
|
|
|
|
#define VMX_VM_EXIT_CLEAR_IA32_RTIT_CTL 0x02000000
|
2021-02-05 11:33:25 +03:00
|
|
|
#define VMX_VM_EXIT_LOAD_IA32_PKRS 0x20000000
|
2019-07-01 19:24:52 +03:00
|
|
|
|
|
|
|
#define VMX_VM_ENTRY_LOAD_DEBUG_CONTROLS 0x00000004
|
|
|
|
#define VMX_VM_ENTRY_IA32E_MODE 0x00000200
|
|
|
|
#define VMX_VM_ENTRY_SMM 0x00000400
|
|
|
|
#define VMX_VM_ENTRY_DEACT_DUAL_MONITOR 0x00000800
|
|
|
|
#define VMX_VM_ENTRY_LOAD_IA32_PERF_GLOBAL_CTRL 0x00002000
|
|
|
|
#define VMX_VM_ENTRY_LOAD_IA32_PAT 0x00004000
|
|
|
|
#define VMX_VM_ENTRY_LOAD_IA32_EFER 0x00008000
|
|
|
|
#define VMX_VM_ENTRY_LOAD_BNDCFGS 0x00010000
|
|
|
|
#define VMX_VM_ENTRY_PT_CONCEAL_PIP 0x00020000
|
|
|
|
#define VMX_VM_ENTRY_LOAD_IA32_RTIT_CTL 0x00040000
|
2021-02-05 11:33:25 +03:00
|
|
|
#define VMX_VM_ENTRY_LOAD_IA32_PKRS 0x00400000
|
2019-07-01 19:24:52 +03:00
|
|
|
|
2019-05-17 17:19:16 +03:00
|
|
|
/* Supported Hyper-V Enlightenments */
|
|
|
|
#define HYPERV_FEAT_RELAXED 0
|
|
|
|
#define HYPERV_FEAT_VAPIC 1
|
|
|
|
#define HYPERV_FEAT_TIME 2
|
|
|
|
#define HYPERV_FEAT_CRASH 3
|
|
|
|
#define HYPERV_FEAT_RESET 4
|
|
|
|
#define HYPERV_FEAT_VPINDEX 5
|
|
|
|
#define HYPERV_FEAT_RUNTIME 6
|
|
|
|
#define HYPERV_FEAT_SYNIC 7
|
|
|
|
#define HYPERV_FEAT_STIMER 8
|
|
|
|
#define HYPERV_FEAT_FREQUENCIES 9
|
|
|
|
#define HYPERV_FEAT_REENLIGHTENMENT 10
|
|
|
|
#define HYPERV_FEAT_TLBFLUSH 11
|
|
|
|
#define HYPERV_FEAT_EVMCS 12
|
|
|
|
#define HYPERV_FEAT_IPI 13
|
2019-05-17 17:19:24 +03:00
|
|
|
#define HYPERV_FEAT_STIMER_DIRECT 14
|
2021-09-02 12:35:28 +03:00
|
|
|
#define HYPERV_FEAT_AVIC 15
|
2022-02-16 13:24:59 +03:00
|
|
|
#define HYPERV_FEAT_SYNDBG 16
|
2022-05-25 14:59:45 +03:00
|
|
|
#define HYPERV_FEAT_MSR_BITMAP 17
|
2022-05-25 14:59:46 +03:00
|
|
|
#define HYPERV_FEAT_XMM_INPUT 18
|
2022-05-25 14:59:47 +03:00
|
|
|
#define HYPERV_FEAT_TLBFLUSH_EXT 19
|
2022-05-25 14:59:48 +03:00
|
|
|
#define HYPERV_FEAT_TLBFLUSH_DIRECT 20
|
2019-05-17 17:19:16 +03:00
|
|
|
|
2020-05-15 14:48:47 +03:00
|
|
|
#ifndef HYPERV_SPINLOCK_NEVER_NOTIFY
|
|
|
|
#define HYPERV_SPINLOCK_NEVER_NOTIFY 0xFFFFFFFF
|
2013-06-05 17:18:40 +04:00
|
|
|
#endif
|
|
|
|
|
2003-10-01 00:34:21 +04:00
|
|
|
#define EXCP00_DIVZ 0
|
2008-11-19 00:08:15 +03:00
|
|
|
#define EXCP01_DB 1
|
2003-10-01 00:34:21 +04:00
|
|
|
#define EXCP02_NMI 2
|
|
|
|
#define EXCP03_INT3 3
|
|
|
|
#define EXCP04_INTO 4
|
|
|
|
#define EXCP05_BOUND 5
|
|
|
|
#define EXCP06_ILLOP 6
|
|
|
|
#define EXCP07_PREX 7
|
|
|
|
#define EXCP08_DBLE 8
|
|
|
|
#define EXCP09_XERR 9
|
|
|
|
#define EXCP0A_TSS 10
|
|
|
|
#define EXCP0B_NOSEG 11
|
|
|
|
#define EXCP0C_STACK 12
|
|
|
|
#define EXCP0D_GPF 13
|
|
|
|
#define EXCP0E_PAGE 14
|
|
|
|
#define EXCP10_COPR 16
|
|
|
|
#define EXCP11_ALGN 17
|
|
|
|
#define EXCP12_MCHK 18
|
|
|
|
|
2020-02-13 06:22:19 +03:00
|
|
|
#define EXCP_VMEXIT 0x100 /* only for system emulation */
|
|
|
|
#define EXCP_SYSCALL 0x101 /* only for user emulation */
|
2020-02-13 06:22:21 +03:00
|
|
|
#define EXCP_VSYSCALL 0x102 /* only for user emulation */
|
2007-11-14 21:08:56 +03:00
|
|
|
|
2011-05-05 00:34:30 +04:00
|
|
|
/* i386-specific interrupt pending bits. */
|
2012-07-09 18:42:32 +04:00
|
|
|
#define CPU_INTERRUPT_POLL CPU_INTERRUPT_TGT_EXT_1
|
2011-05-05 00:34:30 +04:00
|
|
|
#define CPU_INTERRUPT_SMI CPU_INTERRUPT_TGT_EXT_2
|
2011-05-05 00:34:31 +04:00
|
|
|
#define CPU_INTERRUPT_NMI CPU_INTERRUPT_TGT_EXT_3
|
2011-05-05 00:34:30 +04:00
|
|
|
#define CPU_INTERRUPT_MCE CPU_INTERRUPT_TGT_EXT_4
|
|
|
|
#define CPU_INTERRUPT_VIRQ CPU_INTERRUPT_TGT_INT_0
|
2013-03-05 18:35:17 +04:00
|
|
|
#define CPU_INTERRUPT_SIPI CPU_INTERRUPT_TGT_INT_1
|
|
|
|
#define CPU_INTERRUPT_TPR CPU_INTERRUPT_TGT_INT_2
|
2011-05-05 00:34:30 +04:00
|
|
|
|
2013-03-05 18:35:17 +04:00
|
|
|
/* Use a clearer name for this. */
|
|
|
|
#define CPU_INTERRUPT_INIT CPU_INTERRUPT_RESET
|
2011-05-05 00:34:30 +04:00
|
|
|
|
2016-10-06 16:10:57 +03:00
|
|
|
/* Instead of computing the condition codes after each x86 instruction,
|
|
|
|
* QEMU just stores one operand (called CC_SRC), the result
|
|
|
|
* (called CC_DST) and the type of operation (called CC_OP). When the
|
|
|
|
* condition codes are needed, the condition codes can be calculated
|
|
|
|
* using this information. Condition codes are not generated if they
|
|
|
|
* are only needed for conditional branches.
|
|
|
|
*/
|
2013-01-17 04:23:46 +04:00
|
|
|
typedef enum {
|
2003-10-01 00:34:21 +04:00
|
|
|
CC_OP_DYNAMIC, /* must use dynamic code to get cc_op */
|
2008-06-03 23:51:57 +04:00
|
|
|
CC_OP_EFLAGS, /* all cc are explicitly computed, CC_SRC = flags */
|
2003-12-03 01:01:31 +03:00
|
|
|
|
|
|
|
CC_OP_MULB, /* modify all flags, C, O = (CC_SRC != 0) */
|
|
|
|
CC_OP_MULW,
|
|
|
|
CC_OP_MULL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_MULQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
CC_OP_ADDB, /* modify all flags, CC_DST = res, CC_SRC = src1 */
|
|
|
|
CC_OP_ADDW,
|
|
|
|
CC_OP_ADDL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_ADDQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
CC_OP_ADCB, /* modify all flags, CC_DST = res, CC_SRC = src1 */
|
|
|
|
CC_OP_ADCW,
|
|
|
|
CC_OP_ADCL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_ADCQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
CC_OP_SUBB, /* modify all flags, CC_DST = res, CC_SRC = src1 */
|
|
|
|
CC_OP_SUBW,
|
|
|
|
CC_OP_SUBL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_SUBQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
CC_OP_SBBB, /* modify all flags, CC_DST = res, CC_SRC = src1 */
|
|
|
|
CC_OP_SBBW,
|
|
|
|
CC_OP_SBBL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_SBBQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
CC_OP_LOGICB, /* modify all flags, CC_DST = res */
|
|
|
|
CC_OP_LOGICW,
|
|
|
|
CC_OP_LOGICL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_LOGICQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
CC_OP_INCB, /* modify all flags except, CC_DST = res, CC_SRC = C */
|
|
|
|
CC_OP_INCW,
|
|
|
|
CC_OP_INCL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_INCQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
CC_OP_DECB, /* modify all flags except, CC_DST = res, CC_SRC = C */
|
|
|
|
CC_OP_DECW,
|
|
|
|
CC_OP_DECL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_DECQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2004-07-13 00:33:47 +04:00
|
|
|
CC_OP_SHLB, /* modify all flags, CC_DST = res, CC_SRC.msb = C */
|
2003-10-01 00:34:21 +04:00
|
|
|
CC_OP_SHLW,
|
|
|
|
CC_OP_SHLL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_SHLQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
CC_OP_SARB, /* modify all flags, CC_DST = res, CC_SRC.lsb = C */
|
|
|
|
CC_OP_SARW,
|
|
|
|
CC_OP_SARL,
|
2005-01-04 02:50:08 +03:00
|
|
|
CC_OP_SARQ,
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2013-01-24 04:44:37 +04:00
|
|
|
CC_OP_BMILGB, /* Z,S via CC_DST, C = SRC==0; O=0; P,A undefined */
|
|
|
|
CC_OP_BMILGW,
|
|
|
|
CC_OP_BMILGL,
|
|
|
|
CC_OP_BMILGQ,
|
|
|
|
|
2013-01-24 06:17:33 +04:00
|
|
|
CC_OP_ADCX, /* CC_DST = C, CC_SRC = rest. */
|
|
|
|
CC_OP_ADOX, /* CC_DST = O, CC_SRC = rest. */
|
|
|
|
CC_OP_ADCOX, /* CC_DST = C, CC_SRC2 = O, CC_SRC = rest. */
|
|
|
|
|
2013-01-30 01:38:43 +04:00
|
|
|
CC_OP_CLR, /* Z set, all other flags clear. */
|
2016-11-21 14:18:53 +03:00
|
|
|
CC_OP_POPCNT, /* Z via CC_SRC, all other flags clear. */
|
2013-01-30 01:38:43 +04:00
|
|
|
|
2003-10-01 00:34:21 +04:00
|
|
|
CC_OP_NB,
|
2013-01-17 04:23:46 +04:00
|
|
|
} CCOp;
|
2023-10-11 16:26:40 +03:00
|
|
|
QEMU_BUILD_BUG_ON(CC_OP_NB >= 128);
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
typedef struct SegmentCache {
|
|
|
|
uint32_t selector;
|
2005-01-04 02:50:08 +03:00
|
|
|
target_ulong base;
|
2003-10-01 00:34:21 +04:00
|
|
|
uint32_t limit;
|
|
|
|
uint32_t flags;
|
|
|
|
} SegmentCache;
|
|
|
|
|
2022-08-23 01:37:17 +03:00
|
|
|
typedef union MMXReg {
|
|
|
|
uint8_t _b_MMXReg[64 / 8];
|
|
|
|
uint16_t _w_MMXReg[64 / 16];
|
|
|
|
uint32_t _l_MMXReg[64 / 32];
|
|
|
|
uint64_t _q_MMXReg[64 / 64];
|
|
|
|
float32 _s_MMXReg[64 / 32];
|
|
|
|
float64 _d_MMXReg[64 / 64];
|
|
|
|
} MMXReg;
|
|
|
|
|
|
|
|
typedef union XMMReg {
|
|
|
|
uint64_t _q_XMMReg[128 / 64];
|
|
|
|
} XMMReg;
|
|
|
|
|
|
|
|
typedef union YMMReg {
|
|
|
|
uint64_t _q_YMMReg[256 / 64];
|
|
|
|
XMMReg _x_YMMReg[256 / 128];
|
|
|
|
} YMMReg;
|
|
|
|
|
|
|
|
typedef union ZMMReg {
|
|
|
|
uint8_t _b_ZMMReg[512 / 8];
|
|
|
|
uint16_t _w_ZMMReg[512 / 16];
|
|
|
|
uint32_t _l_ZMMReg[512 / 32];
|
|
|
|
uint64_t _q_ZMMReg[512 / 64];
|
2022-10-19 14:22:06 +03:00
|
|
|
float16 _h_ZMMReg[512 / 16];
|
2022-08-23 01:37:17 +03:00
|
|
|
float32 _s_ZMMReg[512 / 32];
|
|
|
|
float64 _d_ZMMReg[512 / 64];
|
|
|
|
XMMReg _x_ZMMReg[512 / 128];
|
|
|
|
YMMReg _y_ZMMReg[512 / 256];
|
|
|
|
} ZMMReg;
|
2005-01-06 23:44:11 +03:00
|
|
|
|
2013-12-05 04:32:12 +04:00
|
|
|
typedef struct BNDReg {
|
|
|
|
uint64_t lb;
|
|
|
|
uint64_t ub;
|
|
|
|
} BNDReg;
|
|
|
|
|
|
|
|
typedef struct BNDCSReg {
|
|
|
|
uint64_t cfgu;
|
|
|
|
uint64_t sts;
|
|
|
|
} BNDCSReg;
|
|
|
|
|
2015-07-02 17:57:14 +03:00
|
|
|
#define BNDCFG_ENABLE 1ULL
|
|
|
|
#define BNDCFG_BNDPRESERVE 2ULL
|
|
|
|
#define BNDCFG_BDIR_MASK TARGET_PAGE_MASK
|
|
|
|
|
2022-03-23 18:57:17 +03:00
|
|
|
#if HOST_BIG_ENDIAN
|
2015-12-02 18:51:54 +03:00
|
|
|
#define ZMM_B(n) _b_ZMMReg[63 - (n)]
|
|
|
|
#define ZMM_W(n) _w_ZMMReg[31 - (n)]
|
|
|
|
#define ZMM_L(n) _l_ZMMReg[15 - (n)]
|
2022-10-19 14:22:06 +03:00
|
|
|
#define ZMM_H(n) _h_ZMMReg[31 - (n)]
|
2015-12-02 18:51:54 +03:00
|
|
|
#define ZMM_S(n) _s_ZMMReg[15 - (n)]
|
|
|
|
#define ZMM_Q(n) _q_ZMMReg[7 - (n)]
|
|
|
|
#define ZMM_D(n) _d_ZMMReg[7 - (n)]
|
2022-08-23 01:37:17 +03:00
|
|
|
#define ZMM_X(n) _x_ZMMReg[3 - (n)]
|
|
|
|
#define ZMM_Y(n) _y_ZMMReg[1 - (n)]
|
|
|
|
|
|
|
|
#define XMM_Q(n) _q_XMMReg[1 - (n)]
|
|
|
|
|
|
|
|
#define YMM_Q(n) _q_YMMReg[3 - (n)]
|
|
|
|
#define YMM_X(n) _x_YMMReg[1 - (n)]
|
2015-12-02 18:51:54 +03:00
|
|
|
|
|
|
|
#define MMX_B(n) _b_MMXReg[7 - (n)]
|
|
|
|
#define MMX_W(n) _w_MMXReg[3 - (n)]
|
|
|
|
#define MMX_L(n) _l_MMXReg[1 - (n)]
|
|
|
|
#define MMX_S(n) _s_MMXReg[1 - (n)]
|
2005-01-06 23:44:11 +03:00
|
|
|
#else
|
2015-12-02 18:51:54 +03:00
|
|
|
#define ZMM_B(n) _b_ZMMReg[n]
|
|
|
|
#define ZMM_W(n) _w_ZMMReg[n]
|
|
|
|
#define ZMM_L(n) _l_ZMMReg[n]
|
2022-10-19 14:22:06 +03:00
|
|
|
#define ZMM_H(n) _h_ZMMReg[n]
|
2015-12-02 18:51:54 +03:00
|
|
|
#define ZMM_S(n) _s_ZMMReg[n]
|
|
|
|
#define ZMM_Q(n) _q_ZMMReg[n]
|
|
|
|
#define ZMM_D(n) _d_ZMMReg[n]
|
2022-08-23 01:37:17 +03:00
|
|
|
#define ZMM_X(n) _x_ZMMReg[n]
|
|
|
|
#define ZMM_Y(n) _y_ZMMReg[n]
|
|
|
|
|
|
|
|
#define XMM_Q(n) _q_XMMReg[n]
|
|
|
|
|
|
|
|
#define YMM_Q(n) _q_YMMReg[n]
|
|
|
|
#define YMM_X(n) _x_YMMReg[n]
|
2015-12-02 18:51:54 +03:00
|
|
|
|
|
|
|
#define MMX_B(n) _b_MMXReg[n]
|
|
|
|
#define MMX_W(n) _w_MMXReg[n]
|
|
|
|
#define MMX_L(n) _l_MMXReg[n]
|
|
|
|
#define MMX_S(n) _s_MMXReg[n]
|
2005-01-06 23:44:11 +03:00
|
|
|
#endif
|
2015-12-02 18:51:54 +03:00
|
|
|
#define MMX_Q(n) _q_MMXReg[n]
|
2005-01-06 23:44:11 +03:00
|
|
|
|
2009-09-30 00:48:58 +04:00
|
|
|
typedef union {
|
2011-05-15 16:09:18 +04:00
|
|
|
floatx80 d __attribute__((aligned(16)));
|
2009-09-30 00:48:58 +04:00
|
|
|
MMXReg mmx;
|
|
|
|
} FPReg;
|
|
|
|
|
2009-09-30 00:48:59 +04:00
|
|
|
typedef struct {
|
|
|
|
uint64_t base;
|
|
|
|
uint64_t mask;
|
|
|
|
} MTRRVar;
|
|
|
|
|
2009-09-17 20:14:13 +04:00
|
|
|
#define CPU_NB_REGS64 16
|
|
|
|
#define CPU_NB_REGS32 8
|
|
|
|
|
2005-01-04 02:50:08 +03:00
|
|
|
#ifdef TARGET_X86_64
|
2009-09-17 20:14:13 +04:00
|
|
|
#define CPU_NB_REGS CPU_NB_REGS64
|
2005-01-04 02:50:08 +03:00
|
|
|
#else
|
2009-09-17 20:14:13 +04:00
|
|
|
#define CPU_NB_REGS CPU_NB_REGS32
|
2005-01-04 02:50:08 +03:00
|
|
|
#endif
|
|
|
|
|
2013-07-25 19:05:22 +04:00
|
|
|
#define MAX_FIXED_COUNTERS 3
|
|
|
|
#define MAX_GP_COUNTERS (MSR_IA32_PERF_STATUS - MSR_P6_EVNTSEL0)
|
|
|
|
|
2015-08-30 19:24:58 +03:00
|
|
|
#define TARGET_INSN_START_EXTRA_WORDS 1
|
2007-10-14 11:07:08 +04:00
|
|
|
|
2014-10-23 07:02:43 +04:00
|
|
|
#define NB_OPMASK_REGS 8
|
|
|
|
|
2016-07-06 09:20:37 +03:00
|
|
|
/* CPU can't have 0xFFFFFFFF APIC ID, use that value to distinguish
|
|
|
|
* that APIC ID hasn't been set yet
|
|
|
|
*/
|
|
|
|
#define UNASSIGNED_APIC_ID 0xFFFFFFFF
|
|
|
|
|
2015-11-19 21:52:33 +03:00
|
|
|
typedef union X86LegacyXSaveArea {
|
|
|
|
struct {
|
|
|
|
uint16_t fcw;
|
|
|
|
uint16_t fsw;
|
|
|
|
uint8_t ftw;
|
|
|
|
uint8_t reserved;
|
|
|
|
uint16_t fpop;
|
|
|
|
uint64_t fpip;
|
|
|
|
uint64_t fpdp;
|
|
|
|
uint32_t mxcsr;
|
|
|
|
uint32_t mxcsr_mask;
|
|
|
|
FPReg fpregs[8];
|
|
|
|
uint8_t xmm_regs[16][16];
|
|
|
|
};
|
|
|
|
uint8_t data[512];
|
|
|
|
} X86LegacyXSaveArea;
|
|
|
|
|
|
|
|
typedef struct X86XSaveHeader {
|
|
|
|
uint64_t xstate_bv;
|
|
|
|
uint64_t xcomp_bv;
|
2016-07-06 23:35:00 +03:00
|
|
|
uint64_t reserve0;
|
|
|
|
uint8_t reserved[40];
|
2015-11-19 21:52:33 +03:00
|
|
|
} X86XSaveHeader;
|
|
|
|
|
|
|
|
/* Ext. save area 2: AVX State */
|
|
|
|
typedef struct XSaveAVX {
|
|
|
|
uint8_t ymmh[16][16];
|
|
|
|
} XSaveAVX;
|
|
|
|
|
|
|
|
/* Ext. save area 3: BNDREG */
|
|
|
|
typedef struct XSaveBNDREG {
|
|
|
|
BNDReg bnd_regs[4];
|
|
|
|
} XSaveBNDREG;
|
|
|
|
|
|
|
|
/* Ext. save area 4: BNDCSR */
|
|
|
|
typedef union XSaveBNDCSR {
|
|
|
|
BNDCSReg bndcsr;
|
|
|
|
uint8_t data[64];
|
|
|
|
} XSaveBNDCSR;
|
|
|
|
|
|
|
|
/* Ext. save area 5: Opmask */
|
|
|
|
typedef struct XSaveOpmask {
|
|
|
|
uint64_t opmask_regs[NB_OPMASK_REGS];
|
|
|
|
} XSaveOpmask;
|
|
|
|
|
|
|
|
/* Ext. save area 6: ZMM_Hi256 */
|
|
|
|
typedef struct XSaveZMM_Hi256 {
|
|
|
|
uint8_t zmm_hi256[16][32];
|
|
|
|
} XSaveZMM_Hi256;
|
|
|
|
|
|
|
|
/* Ext. save area 7: Hi16_ZMM */
|
|
|
|
typedef struct XSaveHi16_ZMM {
|
|
|
|
uint8_t hi16_zmm[16][64];
|
|
|
|
} XSaveHi16_ZMM;
|
|
|
|
|
|
|
|
/* Ext. save area 9: PKRU state */
|
|
|
|
typedef struct XSavePKRU {
|
|
|
|
uint32_t pkru;
|
|
|
|
uint32_t padding;
|
|
|
|
} XSavePKRU;
|
|
|
|
|
2022-02-17 09:04:28 +03:00
|
|
|
/* Ext. save area 17: AMX XTILECFG state */
|
|
|
|
typedef struct XSaveXTILECFG {
|
|
|
|
uint8_t xtilecfg[64];
|
|
|
|
} XSaveXTILECFG;
|
|
|
|
|
|
|
|
/* Ext. save area 18: AMX XTILEDATA state */
|
|
|
|
typedef struct XSaveXTILEDATA {
|
|
|
|
uint8_t xtiledata[8][1024];
|
|
|
|
} XSaveXTILEDATA;
|
|
|
|
|
2022-02-15 22:52:55 +03:00
|
|
|
typedef struct {
|
|
|
|
uint64_t from;
|
|
|
|
uint64_t to;
|
|
|
|
uint64_t info;
|
|
|
|
} LBREntry;
|
|
|
|
|
|
|
|
#define ARCH_LBR_NR_ENTRIES 32
|
|
|
|
|
|
|
|
/* Ext. save area 19: Supervisor mode Arch LBR state */
|
|
|
|
typedef struct XSavesArchLBR {
|
|
|
|
uint64_t lbr_ctl;
|
|
|
|
uint64_t lbr_depth;
|
|
|
|
uint64_t ler_from;
|
|
|
|
uint64_t ler_to;
|
|
|
|
uint64_t ler_info;
|
|
|
|
LBREntry lbr_records[ARCH_LBR_NR_ENTRIES];
|
|
|
|
} XSavesArchLBR;
|
|
|
|
|
2015-11-19 21:52:33 +03:00
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSaveAVX) != 0x100);
|
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSaveBNDREG) != 0x40);
|
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSaveBNDCSR) != 0x40);
|
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSaveOpmask) != 0x40);
|
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSaveZMM_Hi256) != 0x200);
|
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSaveHi16_ZMM) != 0x400);
|
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSavePKRU) != 0x8);
|
2022-02-17 09:04:28 +03:00
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSaveXTILECFG) != 0x40);
|
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSaveXTILEDATA) != 0x2000);
|
2022-02-15 22:52:55 +03:00
|
|
|
QEMU_BUILD_BUG_ON(sizeof(XSavesArchLBR) != 0x328);
|
2015-11-19 21:52:33 +03:00
|
|
|
|
2021-07-05 13:46:29 +03:00
|
|
|
typedef struct ExtSaveArea {
|
|
|
|
uint32_t feature, bits;
|
|
|
|
uint32_t offset, size;
|
2022-02-17 09:04:27 +03:00
|
|
|
uint32_t ecx;
|
2021-07-05 13:46:29 +03:00
|
|
|
} ExtSaveArea;
|
|
|
|
|
2022-02-17 09:04:28 +03:00
|
|
|
#define XSAVE_STATE_AREA_COUNT (XSTATE_XTILE_DATA_BIT + 1)
|
2021-07-05 13:46:29 +03:00
|
|
|
|
2021-07-05 13:46:31 +03:00
|
|
|
extern ExtSaveArea x86_ext_save_areas[XSAVE_STATE_AREA_COUNT];
|
2021-07-05 13:46:29 +03:00
|
|
|
|
2012-02-17 21:31:17 +04:00
|
|
|
typedef enum TPRAccess {
|
|
|
|
TPR_ACCESS_READ,
|
|
|
|
TPR_ACCESS_WRITE,
|
|
|
|
} TPRAccess;
|
|
|
|
|
2018-05-10 23:41:41 +03:00
|
|
|
/* Cache information data structures: */
|
|
|
|
|
|
|
|
enum CacheType {
|
2018-07-17 22:40:10 +03:00
|
|
|
DATA_CACHE,
|
|
|
|
INSTRUCTION_CACHE,
|
2018-05-10 23:41:41 +03:00
|
|
|
UNIFIED_CACHE
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef struct CPUCacheInfo {
|
|
|
|
enum CacheType type;
|
|
|
|
uint8_t level;
|
|
|
|
/* Size in bytes */
|
|
|
|
uint32_t size;
|
|
|
|
/* Line size, in bytes */
|
|
|
|
uint16_t line_size;
|
|
|
|
/*
|
|
|
|
* Associativity.
|
|
|
|
* Note: representation of fully-associative caches is not implemented
|
|
|
|
*/
|
|
|
|
uint8_t associativity;
|
|
|
|
/* Physical line partitions. CPUID[0x8000001D].EBX, CPUID[4].EBX */
|
|
|
|
uint8_t partitions;
|
|
|
|
/* Number of sets. CPUID[0x8000001D].ECX, CPUID[4].ECX */
|
|
|
|
uint32_t sets;
|
|
|
|
/*
|
|
|
|
* Lines per tag.
|
|
|
|
* AMD-specific: CPUID[0x80000005], CPUID[0x80000006].
|
|
|
|
* (Is this synonym to @partitions?)
|
|
|
|
*/
|
|
|
|
uint8_t lines_per_tag;
|
|
|
|
|
|
|
|
/* Self-initializing cache */
|
|
|
|
bool self_init;
|
|
|
|
/*
|
|
|
|
* WBINVD/INVD is not guaranteed to act upon lower level caches of
|
|
|
|
* non-originating threads sharing this cache.
|
|
|
|
* CPUID[4].EDX[bit 0], CPUID[0x8000001D].EDX[bit 0]
|
|
|
|
*/
|
|
|
|
bool no_invd_sharing;
|
|
|
|
/*
|
|
|
|
* Cache is inclusive of lower cache levels.
|
|
|
|
* CPUID[4].EDX[bit 1], CPUID[0x8000001D].EDX[bit 1].
|
|
|
|
*/
|
|
|
|
bool inclusive;
|
|
|
|
/*
|
|
|
|
* A complex function is used to index the cache, potentially using all
|
|
|
|
* address bits. CPUID[4].EDX[bit 2].
|
|
|
|
*/
|
|
|
|
bool complex_indexing;
|
|
|
|
} CPUCacheInfo;
|
|
|
|
|
|
|
|
|
2018-05-10 23:41:42 +03:00
|
|
|
typedef struct CPUCaches {
|
2018-05-24 18:43:30 +03:00
|
|
|
CPUCacheInfo *l1d_cache;
|
|
|
|
CPUCacheInfo *l1i_cache;
|
|
|
|
CPUCacheInfo *l2_cache;
|
|
|
|
CPUCacheInfo *l3_cache;
|
2018-05-10 23:41:42 +03:00
|
|
|
} CPUCaches;
|
2018-05-10 23:41:41 +03:00
|
|
|
|
2020-05-28 22:37:56 +03:00
|
|
|
typedef struct HVFX86LazyFlags {
|
|
|
|
target_ulong result;
|
|
|
|
target_ulong auxbits;
|
|
|
|
} HVFX86LazyFlags;
|
|
|
|
|
2022-02-07 15:35:58 +03:00
|
|
|
typedef struct CPUArchState {
|
2003-10-01 00:34:21 +04:00
|
|
|
/* standard registers */
|
2005-01-04 02:50:08 +03:00
|
|
|
target_ulong regs[CPU_NB_REGS];
|
|
|
|
target_ulong eip;
|
|
|
|
target_ulong eflags; /* eflags register. During CPU emulation, CC
|
2003-10-01 00:34:21 +04:00
|
|
|
flags and DF are set to zero because they are
|
|
|
|
stored elsewhere */
|
|
|
|
|
|
|
|
/* emulator internal eflags handling */
|
2005-01-04 02:50:08 +03:00
|
|
|
target_ulong cc_dst;
|
2013-01-24 04:03:16 +04:00
|
|
|
target_ulong cc_src;
|
|
|
|
target_ulong cc_src2;
|
2003-10-01 00:34:21 +04:00
|
|
|
uint32_t cc_op;
|
|
|
|
int32_t df; /* D flag : 1 if D = 0, -1 if D = 1 */
|
2008-06-04 21:02:19 +04:00
|
|
|
uint32_t hflags; /* TB flags, see HF_xxx constants. These flags
|
|
|
|
are known at translation time. */
|
|
|
|
uint32_t hflags2; /* various other flags, see HF2_xxx constants. */
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2005-02-11 01:05:51 +03:00
|
|
|
/* segments */
|
|
|
|
SegmentCache segs[6]; /* selector values */
|
|
|
|
SegmentCache ldt;
|
|
|
|
SegmentCache tr;
|
|
|
|
SegmentCache gdt; /* only base and limit are used */
|
|
|
|
SegmentCache idt; /* only base and limit are used */
|
|
|
|
|
2008-06-04 21:02:19 +04:00
|
|
|
target_ulong cr[5]; /* NOTE: cr1 is unused */
|
2021-11-01 16:22:58 +03:00
|
|
|
|
|
|
|
bool pdptrs_valid;
|
|
|
|
uint64_t pdptrs[4];
|
2009-09-30 00:48:49 +04:00
|
|
|
int32_t a20_mask;
|
2005-02-11 01:05:51 +03:00
|
|
|
|
2014-04-29 15:10:05 +04:00
|
|
|
BNDReg bnd_regs[4];
|
|
|
|
BNDCSReg bndcs_regs;
|
|
|
|
uint64_t msr_bndcfgs;
|
2015-10-01 01:33:29 +03:00
|
|
|
uint64_t efer;
|
2014-04-29 15:10:05 +04:00
|
|
|
|
2013-03-12 16:16:28 +04:00
|
|
|
/* Beginning of state preserved by INIT (dummy marker). */
|
|
|
|
struct {} start_init_save;
|
|
|
|
|
2003-10-01 00:34:21 +04:00
|
|
|
/* FPU state */
|
|
|
|
unsigned int fpstt; /* top of stack index */
|
2009-09-30 00:48:51 +04:00
|
|
|
uint16_t fpus;
|
2009-09-30 00:48:50 +04:00
|
|
|
uint16_t fpuc;
|
2003-10-01 00:34:21 +04:00
|
|
|
uint8_t fptags[8]; /* 0 = valid, 1 = empty */
|
2009-09-30 00:48:58 +04:00
|
|
|
FPReg fpregs[8];
|
2011-06-15 17:17:26 +04:00
|
|
|
/* KVM-only so far */
|
|
|
|
uint16_t fpop;
|
2021-05-30 18:01:14 +03:00
|
|
|
uint16_t fpcs;
|
|
|
|
uint16_t fpds;
|
2011-06-15 17:17:26 +04:00
|
|
|
uint64_t fpip;
|
|
|
|
uint64_t fpdp;
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
/* emulator internal variables */
|
2005-03-13 20:01:47 +03:00
|
|
|
float_status fp_status;
|
2011-05-15 16:09:18 +04:00
|
|
|
floatx80 ft0;
|
2007-09-17 12:09:54 +04:00
|
|
|
|
2008-04-08 23:51:29 +04:00
|
|
|
float_status mmx_status; /* for 3DNow! float ops */
|
2005-03-13 20:01:47 +03:00
|
|
|
float_status sse_status;
|
2005-01-08 21:58:29 +03:00
|
|
|
uint32_t mxcsr;
|
2022-08-23 01:37:17 +03:00
|
|
|
ZMMReg xmm_regs[CPU_NB_REGS == 8 ? 8 : 32] QEMU_ALIGNED(16);
|
|
|
|
ZMMReg xmm_t0 QEMU_ALIGNED(16);
|
2005-01-08 21:58:29 +03:00
|
|
|
MMXReg mmx_t0;
|
2005-01-04 02:50:08 +03:00
|
|
|
|
2014-10-23 07:02:43 +04:00
|
|
|
uint64_t opmask_regs[NB_OPMASK_REGS];
|
2022-02-17 09:04:32 +03:00
|
|
|
#ifdef TARGET_X86_64
|
|
|
|
uint8_t xtilecfg[64];
|
|
|
|
uint8_t xtiledata[8192];
|
|
|
|
#endif
|
2014-10-23 07:02:43 +04:00
|
|
|
|
2003-10-01 00:34:21 +04:00
|
|
|
/* sysenter registers */
|
|
|
|
uint32_t sysenter_cs;
|
2008-09-25 22:16:18 +04:00
|
|
|
target_ulong sysenter_esp;
|
|
|
|
target_ulong sysenter_eip;
|
2005-04-23 21:46:55 +04:00
|
|
|
uint64_t star;
|
2007-09-23 19:28:04 +04:00
|
|
|
|
2008-06-04 22:29:25 +04:00
|
|
|
uint64_t vm_hsave;
|
2007-09-23 19:28:04 +04:00
|
|
|
|
2005-01-04 02:50:08 +03:00
|
|
|
#ifdef TARGET_X86_64
|
|
|
|
target_ulong lstar;
|
|
|
|
target_ulong cstar;
|
|
|
|
target_ulong fmask;
|
|
|
|
target_ulong kernelgsbase;
|
|
|
|
#endif
|
2004-02-17 01:11:32 +03:00
|
|
|
|
2012-11-27 09:32:18 +04:00
|
|
|
uint64_t tsc_adjust;
|
2011-10-05 23:52:32 +04:00
|
|
|
uint64_t tsc_deadline;
|
2016-08-22 00:16:12 +03:00
|
|
|
uint64_t tsc_aux;
|
|
|
|
|
|
|
|
uint64_t xcr0;
|
2008-11-05 19:04:33 +03:00
|
|
|
|
2011-03-02 10:56:07 +03:00
|
|
|
uint64_t mcg_status;
|
2011-10-04 18:26:35 +04:00
|
|
|
uint64_t msr_ia32_misc_enable;
|
2013-07-07 19:13:37 +04:00
|
|
|
uint64_t msr_ia32_feature_control;
|
2021-07-19 14:21:13 +03:00
|
|
|
uint64_t msr_ia32_sgxlepubkeyhash[4];
|
2011-03-02 10:56:07 +03:00
|
|
|
|
2013-07-25 19:05:22 +04:00
|
|
|
uint64_t msr_fixed_ctr_ctrl;
|
|
|
|
uint64_t msr_global_ctrl;
|
|
|
|
uint64_t msr_global_status;
|
|
|
|
uint64_t msr_global_ovf_ctrl;
|
|
|
|
uint64_t msr_fixed_counters[MAX_FIXED_COUNTERS];
|
|
|
|
uint64_t msr_gp_counters[MAX_GP_COUNTERS];
|
|
|
|
uint64_t msr_gp_evtsel[MAX_GP_COUNTERS];
|
2013-03-12 16:16:28 +04:00
|
|
|
|
|
|
|
uint64_t pat;
|
|
|
|
uint32_t smbase;
|
2018-02-27 13:22:12 +03:00
|
|
|
uint64_t msr_smi_count;
|
2013-03-12 16:16:28 +04:00
|
|
|
|
2016-08-22 00:16:12 +03:00
|
|
|
uint32_t pkru;
|
2021-01-27 11:28:49 +03:00
|
|
|
uint32_t pkrs;
|
2019-11-20 15:19:22 +03:00
|
|
|
uint32_t tsx_ctrl;
|
2016-08-22 00:16:12 +03:00
|
|
|
|
2018-01-09 18:45:14 +03:00
|
|
|
uint64_t spec_ctrl;
|
2021-11-01 16:23:00 +03:00
|
|
|
uint64_t amd_tsc_scale_msr;
|
2018-05-22 00:54:24 +03:00
|
|
|
uint64_t virt_ssbd;
|
2018-01-09 18:45:14 +03:00
|
|
|
|
2013-03-12 16:16:28 +04:00
|
|
|
/* End of state preserved by INIT (dummy marker). */
|
|
|
|
struct {} end_init_save;
|
|
|
|
|
|
|
|
uint64_t system_time_msr;
|
|
|
|
uint64_t wall_clock_msr;
|
|
|
|
uint64_t steal_time_msr;
|
|
|
|
uint64_t async_pf_en_msr;
|
2020-09-08 17:12:06 +03:00
|
|
|
uint64_t async_pf_int_msr;
|
2013-03-12 16:16:28 +04:00
|
|
|
uint64_t pv_eoi_en_msr;
|
2019-06-04 02:04:08 +03:00
|
|
|
uint64_t poll_control_msr;
|
2013-03-12 16:16:28 +04:00
|
|
|
|
2017-11-22 21:14:16 +03:00
|
|
|
/* Partition-wide HV MSRs, will be updated only on the first vcpu */
|
2014-01-23 17:40:47 +04:00
|
|
|
uint64_t msr_hv_hypercall;
|
|
|
|
uint64_t msr_hv_guest_os_id;
|
2014-01-23 17:40:49 +04:00
|
|
|
uint64_t msr_hv_tsc;
|
2022-02-16 13:24:59 +03:00
|
|
|
uint64_t msr_hv_syndbg_control;
|
|
|
|
uint64_t msr_hv_syndbg_status;
|
|
|
|
uint64_t msr_hv_syndbg_send_page;
|
|
|
|
uint64_t msr_hv_syndbg_recv_page;
|
|
|
|
uint64_t msr_hv_syndbg_pending_page;
|
|
|
|
uint64_t msr_hv_syndbg_options;
|
2017-11-22 21:14:16 +03:00
|
|
|
|
|
|
|
/* Per-VCPU HV MSRs */
|
|
|
|
uint64_t msr_hv_vapic;
|
2017-07-13 23:15:21 +03:00
|
|
|
uint64_t msr_hv_crash_params[HV_CRASH_PARAMS];
|
2015-09-16 12:59:44 +03:00
|
|
|
uint64_t msr_hv_runtime;
|
2015-11-11 13:18:38 +03:00
|
|
|
uint64_t msr_hv_synic_control;
|
|
|
|
uint64_t msr_hv_synic_evt_page;
|
|
|
|
uint64_t msr_hv_synic_msg_page;
|
2017-07-13 23:15:21 +03:00
|
|
|
uint64_t msr_hv_synic_sint[HV_SINT_COUNT];
|
|
|
|
uint64_t msr_hv_stimer_config[HV_STIMER_COUNT];
|
|
|
|
uint64_t msr_hv_stimer_count[HV_STIMER_COUNT];
|
2018-04-11 14:50:36 +03:00
|
|
|
uint64_t msr_hv_reenlightenment_control;
|
|
|
|
uint64_t msr_hv_tsc_emulation_control;
|
|
|
|
uint64_t msr_hv_tsc_emulation_status;
|
2011-03-02 10:56:07 +03:00
|
|
|
|
2018-03-04 19:48:36 +03:00
|
|
|
uint64_t msr_rtit_ctrl;
|
|
|
|
uint64_t msr_rtit_status;
|
|
|
|
uint64_t msr_rtit_output_base;
|
|
|
|
uint64_t msr_rtit_output_mask;
|
|
|
|
uint64_t msr_rtit_cr3_match;
|
|
|
|
uint64_t msr_rtit_addrs[MAX_RTIT_ADDRS];
|
|
|
|
|
2022-02-17 09:04:33 +03:00
|
|
|
/* Per-VCPU XFD MSRs */
|
|
|
|
uint64_t msr_xfd;
|
|
|
|
uint64_t msr_xfd_err;
|
|
|
|
|
2022-02-15 22:52:56 +03:00
|
|
|
/* Per-VCPU Arch LBR MSRs */
|
|
|
|
uint64_t msr_lbr_ctl;
|
|
|
|
uint64_t msr_lbr_depth;
|
|
|
|
LBREntry lbr_records[ARCH_LBR_NR_ENTRIES];
|
|
|
|
|
2003-10-01 00:34:21 +04:00
|
|
|
/* exception/interrupt handling */
|
|
|
|
int error_code;
|
|
|
|
int exception_is_int;
|
2005-01-06 23:44:11 +03:00
|
|
|
target_ulong exception_next_eip;
|
2015-09-15 21:45:13 +03:00
|
|
|
target_ulong dr[8]; /* debug registers; note dr4 and dr5 are unused */
|
2008-11-19 00:08:15 +03:00
|
|
|
union {
|
2013-08-26 23:22:53 +04:00
|
|
|
struct CPUBreakpoint *cpu_breakpoint[4];
|
2013-08-26 20:23:18 +04:00
|
|
|
struct CPUWatchpoint *cpu_watchpoint[4];
|
2008-11-19 00:08:15 +03:00
|
|
|
}; /* break/watchpoints for dr[0..3] */
|
2007-04-01 00:28:52 +04:00
|
|
|
int old_exception; /* exception in flight */
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2013-03-12 16:16:28 +04:00
|
|
|
uint64_t vm_vmcb;
|
|
|
|
uint64_t tsc_offset;
|
|
|
|
uint64_t intercept;
|
|
|
|
uint16_t intercept_cr_read;
|
|
|
|
uint16_t intercept_cr_write;
|
|
|
|
uint16_t intercept_dr_read;
|
|
|
|
uint16_t intercept_dr_write;
|
|
|
|
uint32_t intercept_exceptions;
|
2018-06-30 09:08:23 +03:00
|
|
|
uint64_t nested_cr3;
|
|
|
|
uint32_t nested_pg_mode;
|
2013-03-12 16:16:28 +04:00
|
|
|
uint8_t v_tpr;
|
2021-08-14 10:51:00 +03:00
|
|
|
uint32_t int_ctl;
|
2013-03-12 16:16:28 +04:00
|
|
|
|
2011-01-21 23:48:21 +03:00
|
|
|
/* KVM states, automatically cleared on reset */
|
|
|
|
uint8_t nmi_injected;
|
|
|
|
uint8_t nmi_pending;
|
|
|
|
|
2018-06-30 09:08:23 +03:00
|
|
|
uintptr_t retaddr;
|
|
|
|
|
2016-11-14 17:19:17 +03:00
|
|
|
/* Fields up to this point are cleared by a CPU reset */
|
|
|
|
struct {} end_reset_fields;
|
|
|
|
|
2019-03-23 21:35:53 +03:00
|
|
|
/* Fields after this point are preserved across CPU reset. */
|
2011-03-15 14:26:21 +03:00
|
|
|
|
2005-01-04 02:50:08 +03:00
|
|
|
/* processor features (e.g. for CPUID insn) */
|
2019-07-25 09:14:16 +03:00
|
|
|
/* Minimum cpuid leaf 7 value */
|
|
|
|
uint32_t cpuid_level_func7;
|
|
|
|
/* Actual cpuid leaf 7 value */
|
|
|
|
uint32_t cpuid_min_level_func7;
|
2016-09-21 19:30:12 +03:00
|
|
|
/* Minimum level/xlevel/xlevel2, based on CPU model + features */
|
|
|
|
uint32_t cpuid_min_level, cpuid_min_xlevel, cpuid_min_xlevel2;
|
|
|
|
/* Maximum level/xlevel/xlevel2 value for auto-assignment: */
|
|
|
|
uint32_t cpuid_max_level, cpuid_max_xlevel, cpuid_max_xlevel2;
|
|
|
|
/* Actual level/xlevel/xlevel2 value: */
|
|
|
|
uint32_t cpuid_level, cpuid_xlevel, cpuid_xlevel2;
|
2005-01-04 02:50:08 +03:00
|
|
|
uint32_t cpuid_vendor1;
|
|
|
|
uint32_t cpuid_vendor2;
|
|
|
|
uint32_t cpuid_vendor3;
|
|
|
|
uint32_t cpuid_version;
|
2013-04-22 23:00:15 +04:00
|
|
|
FeatureWordArray features;
|
2017-03-27 17:48:15 +03:00
|
|
|
/* Features that were explicitly enabled/disabled */
|
|
|
|
FeatureWordArray user_features;
|
2005-04-23 21:46:55 +04:00
|
|
|
uint32_t cpuid_model[12];
|
2018-05-24 18:43:30 +03:00
|
|
|
/* Cache information for CPUID. When legacy-cache=on, the cache data
|
|
|
|
* on each CPUID leaf will be different, because we keep compatibility
|
|
|
|
* with old QEMU versions.
|
|
|
|
*/
|
|
|
|
CPUCaches cache_info_cpuid2, cache_info_cpuid4, cache_info_amd;
|
2007-09-17 12:09:54 +04:00
|
|
|
|
2009-01-26 20:53:04 +03:00
|
|
|
/* MTRRs */
|
|
|
|
uint64_t mtrr_fixed[11];
|
|
|
|
uint64_t mtrr_deftype;
|
2014-08-15 01:39:27 +04:00
|
|
|
MTRRVar mtrr_var[MSR_MTRRcap_VCNT];
|
2009-01-26 20:53:04 +03:00
|
|
|
|
2008-11-05 19:04:33 +03:00
|
|
|
/* For KVM */
|
2009-05-02 04:18:38 +04:00
|
|
|
uint32_t mp_state;
|
2019-06-19 19:21:39 +03:00
|
|
|
int32_t exception_nr;
|
2009-11-06 21:39:24 +03:00
|
|
|
int32_t interrupt_injected;
|
2009-11-25 02:33:03 +03:00
|
|
|
uint8_t soft_interrupt;
|
2019-06-19 19:21:39 +03:00
|
|
|
uint8_t exception_pending;
|
|
|
|
uint8_t exception_injected;
|
2009-11-25 02:33:03 +03:00
|
|
|
uint8_t has_error_code;
|
2019-06-19 19:21:39 +03:00
|
|
|
uint8_t exception_has_payload;
|
|
|
|
uint64_t exception_payload;
|
2022-09-29 10:20:11 +03:00
|
|
|
uint8_t triple_fault_pending;
|
i386: hvf: add code base from Google's QEMU repository
This file begins tracking the files that will be the code base for HVF
support in QEMU. This code base is part of Google's QEMU version of
their Android emulator, and can be found at
https://android.googlesource.com/platform/external/qemu/+/emu-master-dev
This code is based on Veertu Inc's vdhh (Veertu Desktop Hosted
Hypervisor), found at https://github.com/veertuinc/vdhh. Everything is
appropriately licensed under GPL v2-or-later, except for the code inside
x86_task.c and x86_task.h, which, deriving from KVM (the Linux kernel),
is licensed GPL v2-only.
This code base already implements a very great deal of functionality,
although Google's version removed from Vertuu's the support for APIC
page and hyperv-related stuff. According to the Android Emulator Release
Notes, Revision 26.1.3 (August 2017), "Hypervisor.framework is now
enabled by default on macOS for 32-bit x86 images to improve performance
and macOS compatibility", although we better use with caution for, as the
same Revision warns us, "If you experience issues with it specifically,
please file a bug report...". The code hasn't seen much update in the
last 5 months, so I think that we can further develop the code with
occasional visiting Google's repository to see if there has been any
update.
On top of Google's code, the following changes were made:
- add code to the configure script to support the --enable-hvf argument.
If the OS is Darwin, it checks for presence of HVF in the system. The
patch also adds strings related to HVF in the file qemu-options.hx.
QEMU will only support the modern syntax style '-M accel=hvf' no enable
hvf; the legacy '-enable-hvf' will not be supported.
- fix styling issues
- add glue code to cpus.c
- move HVFX86EmulatorState field to CPUX86State, changing the
the emulation functions to have a parameter with signature 'CPUX86State *'
instead of 'CPUState *' so we don't have to get the 'env'.
Signed-off-by: Sergio Andres Gomez Del Real <Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-2-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-3-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-5-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-6-Sergio.G.DelReal@gmail.com>
Message-Id: <20170905035457.3753-7-Sergio.G.DelReal@gmail.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2017-09-13 12:05:09 +03:00
|
|
|
uint32_t ins_len;
|
2009-11-25 02:33:03 +03:00
|
|
|
uint32_t sipi_vector;
|
2011-02-03 22:19:53 +03:00
|
|
|
bool tsc_valid;
|
2015-06-24 15:11:27 +03:00
|
|
|
int64_t tsc_khz;
|
2015-11-24 06:33:57 +03:00
|
|
|
int64_t user_tsc_khz; /* for sanity check only */
|
2020-03-12 19:54:29 +03:00
|
|
|
uint64_t apic_bus_freq;
|
2022-03-24 11:21:41 +03:00
|
|
|
uint64_t tsc;
|
2018-09-14 03:38:26 +03:00
|
|
|
#if defined(CONFIG_KVM) || defined(CONFIG_HVF)
|
|
|
|
void *xsave_buf;
|
2021-07-05 13:46:28 +03:00
|
|
|
uint32_t xsave_buf_len;
|
2018-09-14 03:38:26 +03:00
|
|
|
#endif
|
2019-06-19 19:21:38 +03:00
|
|
|
#if defined(CONFIG_KVM)
|
|
|
|
struct kvm_nested_state *nested_state;
|
2022-12-16 17:32:25 +03:00
|
|
|
MemoryRegion *xen_vcpu_info_mr;
|
|
|
|
void *xen_vcpu_info_hva;
|
2018-06-29 17:54:50 +03:00
|
|
|
uint64_t xen_vcpu_info_gpa;
|
|
|
|
uint64_t xen_vcpu_info_default_gpa;
|
2018-07-23 18:24:36 +03:00
|
|
|
uint64_t xen_vcpu_time_info_gpa;
|
2018-07-24 19:46:00 +03:00
|
|
|
uint64_t xen_vcpu_runstate_gpa;
|
2022-12-06 14:14:07 +03:00
|
|
|
uint8_t xen_vcpu_callback_vector;
|
hw/xen: Support HVM_PARAM_CALLBACK_TYPE_GSI callback
The GSI callback (and later PCI_INTX) is a level triggered interrupt. It
is asserted when an event channel is delivered to vCPU0, and is supposed
to be cleared when the vcpu_info->evtchn_upcall_pending field for vCPU0
is cleared again.
Thankfully, Xen does *not* assert the GSI if the guest sets its own
evtchn_upcall_pending field; we only need to assert the GSI when we
have delivered an event for ourselves. So that's the easy part, kind of.
There's a slight complexity in that we need to hold the BQL before we
can call qemu_set_irq(), and we definitely can't do that while holding
our own port_lock (because we'll need to take that from the qemu-side
functions that the PV backend drivers will call). So if we end up
wanting to set the IRQ in a context where we *don't* already hold the
BQL, defer to a BH.
However, we *do* need to poll for the evtchn_upcall_pending flag being
cleared. In an ideal world we would poll that when the EOI happens on
the PIC/IOAPIC. That's how it works in the kernel with the VFIO eventfd
pairs — one is used to trigger the interrupt, and the other works in the
other direction to 'resample' on EOI, and trigger the first eventfd
again if the line is still active.
However, QEMU doesn't seem to do that. Even VFIO level interrupts seem
to be supported by temporarily unmapping the device's BARs from the
guest when an interrupt happens, then trapping *all* MMIO to the device
and sending the 'resample' event on *every* MMIO access until the IRQ
is cleared! Maybe in future we'll plumb the 'resample' concept through
QEMU's irq framework but for now we'll do what Xen itself does: just
check the flag on every vmexit if the upcall GSI is known to be
asserted.
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Reviewed-by: Paul Durrant <paul@xen.org>
2022-12-15 23:35:24 +03:00
|
|
|
bool xen_callback_asserted;
|
2022-12-14 01:40:56 +03:00
|
|
|
uint16_t xen_virq[XEN_NR_VIRQS];
|
|
|
|
uint64_t xen_singleshot_timer_ns;
|
2018-09-17 14:04:54 +03:00
|
|
|
QEMUTimer *xen_singleshot_timer;
|
|
|
|
uint64_t xen_periodic_timer_period;
|
|
|
|
QEMUTimer *xen_periodic_timer;
|
|
|
|
QemuMutex xen_timers_lock;
|
2019-06-19 19:21:38 +03:00
|
|
|
#endif
|
i386: hvf: add code base from Google's QEMU repository
This file begins tracking the files that will be the code base for HVF
support in QEMU. This code base is part of Google's QEMU version of
their Android emulator, and can be found at
https://android.googlesource.com/platform/external/qemu/+/emu-master-dev
This code is based on Veertu Inc's vdhh (Veertu Desktop Hosted
Hypervisor), found at https://github.com/veertuinc/vdhh. Everything is
appropriately licensed under GPL v2-or-later, except for the code inside
x86_task.c and x86_task.h, which, deriving from KVM (the Linux kernel),
is licensed GPL v2-only.
This code base already implements a very great deal of functionality,
although Google's version removed from Vertuu's the support for APIC
page and hyperv-related stuff. According to the Android Emulator Release
Notes, Revision 26.1.3 (August 2017), "Hypervisor.framework is now
enabled by default on macOS for 32-bit x86 images to improve performance
and macOS compatibility", although we better use with caution for, as the
same Revision warns us, "If you experience issues with it specifically,
please file a bug report...". The code hasn't seen much update in the
last 5 months, so I think that we can further develop the code with
occasional visiting Google's repository to see if there has been any
update.
On top of Google's code, the following changes were made:
- add code to the configure script to support the --enable-hvf argument.
If the OS is Darwin, it checks for presence of HVF in the system. The
patch also adds strings related to HVF in the file qemu-options.hx.
QEMU will only support the modern syntax style '-M accel=hvf' no enable
hvf; the legacy '-enable-hvf' will not be supported.
- fix styling issues
- add glue code to cpus.c
- move HVFX86EmulatorState field to CPUX86State, changing the
the emulation functions to have a parameter with signature 'CPUX86State *'
instead of 'CPUState *' so we don't have to get the 'env'.
Signed-off-by: Sergio Andres Gomez Del Real <Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-2-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-3-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-5-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-6-Sergio.G.DelReal@gmail.com>
Message-Id: <20170905035457.3753-7-Sergio.G.DelReal@gmail.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2017-09-13 12:05:09 +03:00
|
|
|
#if defined(CONFIG_HVF)
|
2020-05-28 22:37:56 +03:00
|
|
|
HVFX86LazyFlags hvf_lflags;
|
2020-05-28 22:37:57 +03:00
|
|
|
void *hvf_mmio_buf;
|
i386: hvf: add code base from Google's QEMU repository
This file begins tracking the files that will be the code base for HVF
support in QEMU. This code base is part of Google's QEMU version of
their Android emulator, and can be found at
https://android.googlesource.com/platform/external/qemu/+/emu-master-dev
This code is based on Veertu Inc's vdhh (Veertu Desktop Hosted
Hypervisor), found at https://github.com/veertuinc/vdhh. Everything is
appropriately licensed under GPL v2-or-later, except for the code inside
x86_task.c and x86_task.h, which, deriving from KVM (the Linux kernel),
is licensed GPL v2-only.
This code base already implements a very great deal of functionality,
although Google's version removed from Vertuu's the support for APIC
page and hyperv-related stuff. According to the Android Emulator Release
Notes, Revision 26.1.3 (August 2017), "Hypervisor.framework is now
enabled by default on macOS for 32-bit x86 images to improve performance
and macOS compatibility", although we better use with caution for, as the
same Revision warns us, "If you experience issues with it specifically,
please file a bug report...". The code hasn't seen much update in the
last 5 months, so I think that we can further develop the code with
occasional visiting Google's repository to see if there has been any
update.
On top of Google's code, the following changes were made:
- add code to the configure script to support the --enable-hvf argument.
If the OS is Darwin, it checks for presence of HVF in the system. The
patch also adds strings related to HVF in the file qemu-options.hx.
QEMU will only support the modern syntax style '-M accel=hvf' no enable
hvf; the legacy '-enable-hvf' will not be supported.
- fix styling issues
- add glue code to cpus.c
- move HVFX86EmulatorState field to CPUX86State, changing the
the emulation functions to have a parameter with signature 'CPUX86State *'
instead of 'CPUState *' so we don't have to get the 'env'.
Signed-off-by: Sergio Andres Gomez Del Real <Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-2-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-3-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-5-Sergio.G.DelReal@gmail.com>
Message-Id: <20170913090522.4022-6-Sergio.G.DelReal@gmail.com>
Message-Id: <20170905035457.3753-7-Sergio.G.DelReal@gmail.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2017-09-13 12:05:09 +03:00
|
|
|
#endif
|
2011-10-27 21:25:58 +04:00
|
|
|
|
2010-12-19 19:22:41 +03:00
|
|
|
uint64_t mcg_cap;
|
|
|
|
uint64_t mcg_ctl;
|
2016-06-22 09:56:21 +03:00
|
|
|
uint64_t mcg_ext_ctl;
|
2010-12-19 19:22:41 +03:00
|
|
|
uint64_t mce_banks[MCE_BANKS_DEF*4];
|
2016-08-22 00:16:12 +03:00
|
|
|
uint64_t xstate_bv;
|
2009-10-06 00:41:04 +04:00
|
|
|
|
|
|
|
/* vmstate */
|
|
|
|
uint16_t fpus_vmstate;
|
|
|
|
uint16_t fptag_vmstate;
|
|
|
|
uint16_t fpregs_format_vmstate;
|
2010-06-17 13:53:07 +04:00
|
|
|
|
2014-12-03 05:36:23 +03:00
|
|
|
uint64_t xss;
|
2019-10-11 10:41:03 +03:00
|
|
|
uint32_t umwait;
|
2012-02-17 21:31:17 +04:00
|
|
|
|
|
|
|
TPRAccess tpr_access_type;
|
2019-06-12 11:40:56 +03:00
|
|
|
|
2023-10-24 12:03:07 +03:00
|
|
|
/* Number of dies within this CPU package. */
|
2019-06-12 11:40:56 +03:00
|
|
|
unsigned nr_dies;
|
2003-10-01 00:34:21 +04:00
|
|
|
} CPUX86State;
|
|
|
|
|
2015-12-16 22:06:42 +03:00
|
|
|
struct kvm_msrs;
|
|
|
|
|
2016-03-15 15:49:25 +03:00
|
|
|
/**
|
|
|
|
* X86CPU:
|
|
|
|
* @env: #CPUX86State
|
|
|
|
* @migratable: If set, only migratable flags will be accepted when "enforce"
|
|
|
|
* mode is used, and only migratable flags will be included in the "host"
|
|
|
|
* CPU model.
|
|
|
|
*
|
|
|
|
* An x86 CPU.
|
|
|
|
*/
|
2022-02-14 19:15:16 +03:00
|
|
|
struct ArchCPU {
|
2016-03-15 15:49:25 +03:00
|
|
|
CPUState parent_obj;
|
|
|
|
|
|
|
|
CPUX86State env;
|
2020-05-13 16:26:30 +03:00
|
|
|
VMChangeStateEntry *vmsentry;
|
2016-03-15 15:49:25 +03:00
|
|
|
|
2020-01-20 21:21:43 +03:00
|
|
|
uint64_t ucode_rev;
|
|
|
|
|
2019-06-15 23:05:05 +03:00
|
|
|
uint32_t hyperv_spinlock_attempts;
|
2020-11-19 13:32:17 +03:00
|
|
|
char *hyperv_vendor;
|
2018-09-21 11:22:10 +03:00
|
|
|
bool hyperv_synic_kvm_only;
|
2019-05-17 17:19:16 +03:00
|
|
|
uint64_t hyperv_features;
|
2019-05-17 17:19:20 +03:00
|
|
|
bool hyperv_passthrough;
|
2019-10-18 19:39:08 +03:00
|
|
|
OnOffAuto hyperv_no_nonarch_cs;
|
2020-11-19 13:32:17 +03:00
|
|
|
uint32_t hyperv_vendor_id[3];
|
2020-11-19 13:32:18 +03:00
|
|
|
uint32_t hyperv_interface_id[4];
|
2020-11-19 13:32:20 +03:00
|
|
|
uint32_t hyperv_limits[3];
|
2021-09-02 12:35:26 +03:00
|
|
|
bool hyperv_enforce_cpuid;
|
2021-09-02 12:35:29 +03:00
|
|
|
uint32_t hyperv_ver_id_build;
|
|
|
|
uint16_t hyperv_ver_id_major;
|
|
|
|
uint16_t hyperv_ver_id_minor;
|
|
|
|
uint32_t hyperv_ver_id_sp;
|
|
|
|
uint8_t hyperv_ver_id_sb;
|
|
|
|
uint32_t hyperv_ver_id_sn;
|
2019-05-17 17:19:16 +03:00
|
|
|
|
2016-03-15 15:49:25 +03:00
|
|
|
bool check_cpuid;
|
|
|
|
bool enforce_cpuid;
|
2019-06-28 03:28:37 +03:00
|
|
|
/*
|
|
|
|
* Force features to be enabled even if the host doesn't support them.
|
|
|
|
* This is dangerous and should be done only for testing CPUID
|
|
|
|
* compatibility.
|
|
|
|
*/
|
|
|
|
bool force_features;
|
2016-03-15 15:49:25 +03:00
|
|
|
bool expose_kvm;
|
2017-05-09 16:27:36 +03:00
|
|
|
bool expose_tcg;
|
2016-03-15 15:49:25 +03:00
|
|
|
bool migratable;
|
2018-07-24 14:59:21 +03:00
|
|
|
bool migrate_smi_count;
|
2017-01-20 00:04:46 +03:00
|
|
|
bool max_features; /* Enable all supported features automatically */
|
2016-07-06 09:20:37 +03:00
|
|
|
uint32_t apic_id;
|
2016-03-15 15:49:25 +03:00
|
|
|
|
2017-01-20 17:11:34 +03:00
|
|
|
/* Enables publishing of TSC increment and Local APIC bus frequencies to
|
|
|
|
* the guest OS in CPUID page 0x40000010, the same way that VMWare does. */
|
|
|
|
bool vmware_cpuid_freq;
|
|
|
|
|
2016-03-15 15:49:25 +03:00
|
|
|
/* if true the CPUID code directly forward host cache leaves to the guest */
|
|
|
|
bool cache_info_passthrough;
|
|
|
|
|
2018-06-22 22:22:05 +03:00
|
|
|
/* if true the CPUID code directly forwards
|
|
|
|
* host monitor/mwait leaves to the guest */
|
|
|
|
struct {
|
|
|
|
uint32_t eax;
|
|
|
|
uint32_t ebx;
|
|
|
|
uint32_t ecx;
|
|
|
|
uint32_t edx;
|
|
|
|
} mwait;
|
|
|
|
|
2016-03-15 15:49:25 +03:00
|
|
|
/* Features that were filtered out because of missing host capabilities */
|
2019-06-20 05:37:46 +03:00
|
|
|
FeatureWordArray filtered_features;
|
2016-03-15 15:49:25 +03:00
|
|
|
|
|
|
|
/* Enable PMU CPUID bits. This can't be enabled by default yet because
|
|
|
|
* it doesn't have ABI stability guarantees, as it passes all PMU CPUID
|
|
|
|
* bits returned by GET_SUPPORTED_CPUID (that depend on host CPU and kernel
|
|
|
|
* capabilities) directly to the guest.
|
|
|
|
*/
|
|
|
|
bool enable_pmu;
|
|
|
|
|
2022-02-15 22:52:52 +03:00
|
|
|
/*
|
|
|
|
* Enable LBR_FMT bits of IA32_PERF_CAPABILITIES MSR.
|
|
|
|
* This can't be initialized with a default because it doesn't have
|
|
|
|
* stable ABI support yet. It is only allowed to pass all LBR_FMT bits
|
|
|
|
* returned by kvm_arch_get_supported_msr_feature()(which depends on both
|
|
|
|
* host CPU and kernel capabilities) to the guest.
|
|
|
|
*/
|
|
|
|
uint64_t lbr_fmt;
|
|
|
|
|
2016-06-22 09:56:21 +03:00
|
|
|
/* LMCE support can be enabled/disabled via cpu option 'lmce=on/off'. It is
|
|
|
|
* disabled by default to avoid breaking migration between QEMU with
|
|
|
|
* different LMCE configurations.
|
|
|
|
*/
|
|
|
|
bool enable_lmce;
|
|
|
|
|
target-i386: present virtual L3 cache info for vcpus
Some software algorithms are based on the hardware's cache info, for example,
for x86 linux kernel, when cpu1 want to wakeup a task on cpu2, cpu1 will trigger
a resched IPI and told cpu2 to do the wakeup if they don't share low level
cache. Oppositely, cpu1 will access cpu2's runqueue directly if they share llc.
The relevant linux-kernel code as bellow:
static void ttwu_queue(struct task_struct *p, int cpu)
{
struct rq *rq = cpu_rq(cpu);
......
if (... && !cpus_share_cache(smp_processor_id(), cpu)) {
......
ttwu_queue_remote(p, cpu); /* will trigger RES IPI */
return;
}
......
ttwu_do_activate(rq, p, 0); /* access target's rq directly */
......
}
In real hardware, the cpus on the same socket share L3 cache, so one won't
trigger a resched IPIs when wakeup a task on others. But QEMU doesn't present a
virtual L3 cache info for VM, then the linux guest will trigger lots of RES IPIs
under some workloads even if the virtual cpus belongs to the same virtual socket.
For KVM, there will be lots of vmexit due to guest send IPIs.
The workload is a SAP HANA's testsuite, we run it one round(about 40 minuates)
and observe the (Suse11sp3)Guest's amounts of RES IPIs which triggering during
the period:
No-L3 With-L3(applied this patch)
cpu0: 363890 44582
cpu1: 373405 43109
cpu2: 340783 43797
cpu3: 333854 43409
cpu4: 327170 40038
cpu5: 325491 39922
cpu6: 319129 42391
cpu7: 306480 41035
cpu8: 161139 32188
cpu9: 164649 31024
cpu10: 149823 30398
cpu11: 149823 32455
cpu12: 164830 35143
cpu13: 172269 35805
cpu14: 179979 33898
cpu15: 194505 32754
avg: 268963.6 40129.8
The VM's topology is "1*socket 8*cores 2*threads".
After present virtual L3 cache info for VM, the amounts of RES IPIs in guest
reduce 85%.
For KVM, vcpus send IPIs will cause vmexit which is expensive, so it can cause
severe performance degradation. We had tested the overall system performance if
vcpus actually run on sparate physical socket. With L3 cache, the performance
improves 7.2%~33.1%(avg:15.7%).
Signed-off-by: Longpeng(Mike) <longpeng2@huawei.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2016-09-07 08:21:13 +03:00
|
|
|
/* Compatibility bits for old machine types.
|
|
|
|
* If true present virtual l3 cache for VM, the vcpus in the same virtual
|
|
|
|
* socket share an virtual l3 cache.
|
|
|
|
*/
|
|
|
|
bool enable_l3_cache;
|
|
|
|
|
2018-05-14 19:41:51 +03:00
|
|
|
/* Compatibility bits for old machine types.
|
|
|
|
* If true present the old cache topology information
|
|
|
|
*/
|
|
|
|
bool legacy_cache;
|
|
|
|
|
target/i386: Fix CPUID encoding of Fn8000001E_ECX
Observed the following failure while booting the SEV-SNP guest and the
guest fails to boot with the smp parameters:
"-smp 192,sockets=1,dies=12,cores=8,threads=2".
qemu-system-x86_64: sev_snp_launch_update: SNP_LAUNCH_UPDATE ret=-5 fw_error=22 'Invalid parameter'
qemu-system-x86_64: SEV-SNP: CPUID validation failed for function 0x8000001e, index: 0x0.
provided: eax:0x00000000, ebx: 0x00000100, ecx: 0x00000b00, edx: 0x00000000
expected: eax:0x00000000, ebx: 0x00000100, ecx: 0x00000300, edx: 0x00000000
qemu-system-x86_64: SEV-SNP: failed update CPUID page
Reason for the failure is due to overflowing of bits used for "Node per
processor" in CPUID Fn8000001E_ECX. This field's width is 3 bits wide and
can hold maximum value 0x7. With dies=12 (0xB), it overflows and spills
over into the reserved bits. In the case of SEV-SNP, this causes CPUID
enforcement failure and guest fails to boot.
The PPR documentation for CPUID_Fn8000001E_ECX [Node Identifiers]
=================================================================
Bits Description
31:11 Reserved.
10:8 NodesPerProcessor: Node per processor. Read-only.
ValidValues:
Value Description
0h 1 node per processor.
7h-1h Reserved.
7:0 NodeId: Node ID. Read-only. Reset: Fixed,XXh.
=================================================================
As in the spec, the valid value for "node per processor" is 0 and rest
are reserved.
Looking back at the history of decoding of CPUID_Fn8000001E_ECX, noticed
that there were cases where "node per processor" can be more than 1. It
is valid only for pre-F17h (pre-EPYC) architectures. For EPYC or later
CPUs, the linux kernel does not use this information to build the L3
topology.
Also noted that the CPUID Function 0x8000001E_ECX is available only when
TOPOEXT feature is enabled. This feature is enabled only for EPYC(F17h)
or later processors. So, previous generation of processors do not not
enumerate 0x8000001E_ECX leaf.
There could be some corner cases where the older guests could enable the
TOPOEXT feature by running with -cpu host, in which case legacy guests
might notice the topology change. To address those cases introduced a
new CPU property "legacy-multi-node". It will be true for older machine
types to maintain compatibility. By default, it will be false, so new
decoding will be used going forward.
The documentation is taken from Preliminary Processor Programming
Reference (PPR) for AMD Family 19h Model 11h, Revision B1 Processors 55901
Rev 0.25 - Oct 6, 2022.
Cc: qemu-stable@nongnu.org
Fixes: 31ada106d891 ("Simplify CPUID_8000_001E for AMD")
Link: https://bugzilla.kernel.org/show_bug.cgi?id=206537
Reviewed-by: Zhao Liu <zhao1.liu@intel.com>
Signed-off-by: Babu Moger <babu.moger@amd.com>
Message-ID: <0ee4b0a8293188a53970a2b0e4f4ef713425055e.1714757834.git.babu.moger@amd.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2024-05-03 20:46:30 +03:00
|
|
|
/* Compatibility bits for old machine types.
|
|
|
|
* If true decode the CPUID Function 0x8000001E_ECX to support multiple
|
|
|
|
* nodes per processor
|
|
|
|
*/
|
|
|
|
bool legacy_multi_node;
|
|
|
|
|
2016-05-12 20:24:26 +03:00
|
|
|
/* Compatibility bits for old machine types: */
|
|
|
|
bool enable_cpuid_0xb;
|
|
|
|
|
2016-09-21 19:30:12 +03:00
|
|
|
/* Enable auto level-increase for all CPUID leaves */
|
|
|
|
bool full_cpuid_auto_level;
|
|
|
|
|
2021-07-08 03:36:23 +03:00
|
|
|
/* Only advertise CPUID leaves defined by the vendor */
|
|
|
|
bool vendor_cpuid_only;
|
|
|
|
|
2019-01-30 02:52:59 +03:00
|
|
|
/* Enable auto level-increase for Intel Processor Trace leave */
|
|
|
|
bool intel_pt_auto_level;
|
|
|
|
|
2016-07-08 18:01:38 +03:00
|
|
|
/* if true fill the top bits of the MTRR_PHYSMASKn variable range */
|
|
|
|
bool fill_mtrr_mask;
|
|
|
|
|
2016-07-11 22:28:46 +03:00
|
|
|
/* if true override the phys_bits value with a value read from the host */
|
|
|
|
bool host_phys_bits;
|
|
|
|
|
2018-12-11 22:25:27 +03:00
|
|
|
/* if set, limit maximum value for phys_bits when host_phys_bits is true */
|
|
|
|
uint8_t host_phys_bits_limit;
|
|
|
|
|
2017-02-23 16:34:41 +03:00
|
|
|
/* Stop SMI delivery for migration compatibility with old machines */
|
|
|
|
bool kvm_no_smi_migration;
|
|
|
|
|
2021-09-02 12:35:25 +03:00
|
|
|
/* Forcefully disable KVM PV features not exposed in guest CPUIDs */
|
|
|
|
bool kvm_pv_enforce_cpuid;
|
|
|
|
|
2016-07-08 18:01:36 +03:00
|
|
|
/* Number of physical address bits supported */
|
|
|
|
uint32_t phys_bits;
|
|
|
|
|
2024-03-18 18:53:36 +03:00
|
|
|
/*
|
|
|
|
* Number of guest physical address bits available. Usually this is
|
|
|
|
* identical to host physical address bits. With NPT or EPT 4-level
|
|
|
|
* paging, guest physical address space might be restricted to 48 bits
|
|
|
|
* even if the host cpu supports more physical address bits.
|
|
|
|
*/
|
|
|
|
uint32_t guest_phys_bits;
|
|
|
|
|
2016-03-15 15:49:25 +03:00
|
|
|
/* in order to simplify APIC support, we leave this pointer to the
|
|
|
|
user */
|
|
|
|
struct DeviceState *apic_state;
|
|
|
|
struct MemoryRegion *cpu_as_root, *cpu_as_mem, *smram;
|
|
|
|
Notifier machine_done;
|
2015-12-16 22:06:42 +03:00
|
|
|
|
|
|
|
struct kvm_msrs *kvm_msr_buf;
|
2016-07-06 09:20:42 +03:00
|
|
|
|
2017-05-30 19:24:00 +03:00
|
|
|
int32_t node_id; /* NUMA node this CPU belongs to */
|
2016-07-06 09:20:42 +03:00
|
|
|
int32_t socket_id;
|
2019-06-12 11:40:58 +03:00
|
|
|
int32_t die_id;
|
2016-07-06 09:20:42 +03:00
|
|
|
int32_t core_id;
|
|
|
|
int32_t thread_id;
|
2017-09-11 18:20:27 +03:00
|
|
|
|
|
|
|
int32_t hv_max_vps;
|
2022-12-06 13:48:53 +03:00
|
|
|
|
|
|
|
bool xen_vapic;
|
2016-03-15 15:49:25 +03:00
|
|
|
};
|
|
|
|
|
2023-10-13 12:35:04 +03:00
|
|
|
typedef struct X86CPUModel X86CPUModel;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* X86CPUClass:
|
|
|
|
* @cpu_def: CPU model definition
|
|
|
|
* @host_cpuid_required: Whether CPU model requires cpuid from host.
|
|
|
|
* @ordering: Ordering on the "-cpu help" CPU model list.
|
|
|
|
* @migration_safe: See CpuDefinitionInfo::migration_safe
|
|
|
|
* @static_model: See CpuDefinitionInfo::static
|
|
|
|
* @parent_realize: The parent class' realize handler.
|
|
|
|
* @parent_phases: The parent class' reset phase handlers.
|
|
|
|
*
|
|
|
|
* An x86 CPU model or family.
|
|
|
|
*/
|
|
|
|
struct X86CPUClass {
|
|
|
|
CPUClass parent_class;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CPU definition, automatically loaded by instance_init if not NULL.
|
|
|
|
* Should be eventually replaced by subclass-specific property defaults.
|
|
|
|
*/
|
|
|
|
X86CPUModel *model;
|
|
|
|
|
|
|
|
bool host_cpuid_required;
|
|
|
|
int ordering;
|
|
|
|
bool migration_safe;
|
|
|
|
bool static_model;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Optional description of CPU model.
|
|
|
|
* If unavailable, cpu_def->model_id is used.
|
|
|
|
*/
|
|
|
|
const char *model_description;
|
|
|
|
|
|
|
|
DeviceRealize parent_realize;
|
|
|
|
DeviceUnrealize parent_unrealize;
|
|
|
|
ResettablePhases parent_phases;
|
|
|
|
};
|
2016-03-15 15:49:25 +03:00
|
|
|
|
|
|
|
#ifndef CONFIG_USER_ONLY
|
2021-04-08 17:07:06 +03:00
|
|
|
extern const VMStateDescription vmstate_x86_cpu;
|
2016-03-15 15:49:25 +03:00
|
|
|
#endif
|
|
|
|
|
2018-08-21 16:31:24 +03:00
|
|
|
int x86_cpu_pending_interrupt(CPUState *cs, int interrupt_request);
|
2016-03-15 15:49:25 +03:00
|
|
|
|
|
|
|
int x86_cpu_write_elf64_note(WriteCoreDumpFunction f, CPUState *cpu,
|
2022-08-11 15:10:54 +03:00
|
|
|
int cpuid, DumpState *s);
|
2016-03-15 15:49:25 +03:00
|
|
|
int x86_cpu_write_elf32_note(WriteCoreDumpFunction f, CPUState *cpu,
|
2022-08-11 15:10:54 +03:00
|
|
|
int cpuid, DumpState *s);
|
2016-03-15 15:49:25 +03:00
|
|
|
int x86_cpu_write_elf64_qemunote(WriteCoreDumpFunction f, CPUState *cpu,
|
2022-08-11 15:10:54 +03:00
|
|
|
DumpState *s);
|
2016-03-15 15:49:25 +03:00
|
|
|
int x86_cpu_write_elf32_qemunote(WriteCoreDumpFunction f, CPUState *cpu,
|
2022-08-11 15:10:54 +03:00
|
|
|
DumpState *s);
|
2016-03-15 15:49:25 +03:00
|
|
|
|
2023-10-09 10:53:10 +03:00
|
|
|
bool x86_cpu_get_memory_mapping(CPUState *cpu, MemoryMappingList *list,
|
2016-03-15 15:49:25 +03:00
|
|
|
Error **errp);
|
|
|
|
|
2019-04-17 22:18:02 +03:00
|
|
|
void x86_cpu_dump_state(CPUState *cs, FILE *f, int flags);
|
2016-03-15 15:49:25 +03:00
|
|
|
|
2020-03-16 20:21:41 +03:00
|
|
|
int x86_cpu_gdb_read_register(CPUState *cpu, GByteArray *buf, int reg);
|
2016-03-15 15:49:25 +03:00
|
|
|
int x86_cpu_gdb_write_register(CPUState *cpu, uint8_t *buf, int reg);
|
|
|
|
|
2019-04-17 22:17:57 +03:00
|
|
|
void x86_cpu_list(void);
|
2012-03-14 04:38:21 +04:00
|
|
|
int cpu_x86_support_mca_broadcast(CPUX86State *env);
|
2010-02-20 20:14:59 +03:00
|
|
|
|
2021-09-11 19:54:34 +03:00
|
|
|
#ifndef CONFIG_USER_ONLY
|
2022-12-06 18:20:51 +03:00
|
|
|
hwaddr x86_cpu_get_phys_page_attrs_debug(CPUState *cpu, vaddr addr,
|
|
|
|
MemTxAttrs *attrs);
|
2004-04-25 21:57:43 +04:00
|
|
|
int cpu_get_pic_interrupt(CPUX86State *s);
|
2021-09-11 19:54:12 +03:00
|
|
|
|
2023-07-14 14:16:12 +03:00
|
|
|
/* MS-DOS compatibility mode FPU exception support */
|
2019-10-16 11:18:10 +03:00
|
|
|
void x86_register_ferr_irq(qemu_irq irq);
|
2021-03-22 16:27:51 +03:00
|
|
|
void fpu_check_raise_ferr_irq(CPUX86State *s);
|
2019-10-16 11:34:39 +03:00
|
|
|
void cpu_set_ignne(void);
|
2021-03-22 16:27:51 +03:00
|
|
|
void cpu_clear_ignne(void);
|
2021-09-11 19:54:12 +03:00
|
|
|
#endif
|
2021-03-22 16:27:51 +03:00
|
|
|
|
2018-08-21 10:46:30 +03:00
|
|
|
/* mpx_helper.c */
|
|
|
|
void cpu_sync_bndcs_hflags(CPUX86State *env);
|
2003-10-01 00:34:21 +04:00
|
|
|
|
|
|
|
/* this function must always be used to load data in the segment
|
|
|
|
cache: it synchronizes the hflags with the segment cache values */
|
2007-09-17 01:08:06 +04:00
|
|
|
static inline void cpu_x86_load_seg_cache(CPUX86State *env,
|
2021-01-10 02:34:27 +03:00
|
|
|
X86Seg seg_reg, unsigned int selector,
|
2006-09-27 23:54:02 +04:00
|
|
|
target_ulong base,
|
2007-09-17 01:08:06 +04:00
|
|
|
unsigned int limit,
|
2003-10-01 00:34:21 +04:00
|
|
|
unsigned int flags)
|
|
|
|
{
|
|
|
|
SegmentCache *sc;
|
|
|
|
unsigned int new_hflags;
|
2007-09-17 12:09:54 +04:00
|
|
|
|
2003-10-01 00:34:21 +04:00
|
|
|
sc = &env->segs[seg_reg];
|
|
|
|
sc->selector = selector;
|
|
|
|
sc->base = base;
|
|
|
|
sc->limit = limit;
|
|
|
|
sc->flags = flags;
|
|
|
|
|
|
|
|
/* update the hidden flags */
|
2005-01-04 02:50:08 +03:00
|
|
|
{
|
|
|
|
if (seg_reg == R_CS) {
|
|
|
|
#ifdef TARGET_X86_64
|
|
|
|
if ((env->hflags & HF_LMA_MASK) && (flags & DESC_L_MASK)) {
|
|
|
|
/* long mode */
|
|
|
|
env->hflags |= HF_CS32_MASK | HF_SS32_MASK | HF_CS64_MASK;
|
|
|
|
env->hflags &= ~(HF_ADDSEG_MASK);
|
2007-09-17 01:08:06 +04:00
|
|
|
} else
|
2005-01-04 02:50:08 +03:00
|
|
|
#endif
|
|
|
|
{
|
|
|
|
/* legacy / compatibility case */
|
|
|
|
new_hflags = (env->segs[R_CS].flags & DESC_B_MASK)
|
|
|
|
>> (DESC_B_SHIFT - HF_CS32_SHIFT);
|
|
|
|
env->hflags = (env->hflags & ~(HF_CS32_MASK | HF_CS64_MASK)) |
|
|
|
|
new_hflags;
|
|
|
|
}
|
2014-05-14 12:38:18 +04:00
|
|
|
}
|
|
|
|
if (seg_reg == R_SS) {
|
|
|
|
int cpl = (flags >> DESC_DPL_SHIFT) & 3;
|
2014-04-30 00:38:59 +04:00
|
|
|
#if HF_CPL_MASK != 3
|
|
|
|
#error HF_CPL_MASK is hardcoded
|
|
|
|
#endif
|
|
|
|
env->hflags = (env->hflags & ~HF_CPL_MASK) | cpl;
|
2018-08-21 10:46:30 +03:00
|
|
|
/* Possibly switch between BNDCFGS and BNDCFGU */
|
|
|
|
cpu_sync_bndcs_hflags(env);
|
2005-01-04 02:50:08 +03:00
|
|
|
}
|
|
|
|
new_hflags = (env->segs[R_SS].flags & DESC_B_MASK)
|
|
|
|
>> (DESC_B_SHIFT - HF_SS32_SHIFT);
|
|
|
|
if (env->hflags & HF_CS64_MASK) {
|
|
|
|
/* zero base assumed for DS, ES and SS in long mode */
|
2007-09-17 01:08:06 +04:00
|
|
|
} else if (!(env->cr[0] & CR0_PE_MASK) ||
|
2005-01-13 01:36:43 +03:00
|
|
|
(env->eflags & VM_MASK) ||
|
|
|
|
!(env->hflags & HF_CS32_MASK)) {
|
2005-01-04 02:50:08 +03:00
|
|
|
/* XXX: try to avoid this test. The problem comes from the
|
|
|
|
fact that is real mode or vm86 mode we only modify the
|
|
|
|
'base' and 'selector' fields of the segment cache to go
|
|
|
|
faster. A solution may be to force addseg to one in
|
|
|
|
translate-i386.c. */
|
|
|
|
new_hflags |= HF_ADDSEG_MASK;
|
|
|
|
} else {
|
2007-09-17 01:08:06 +04:00
|
|
|
new_hflags |= ((env->segs[R_DS].base |
|
2005-01-13 01:36:43 +03:00
|
|
|
env->segs[R_ES].base |
|
2007-09-17 01:08:06 +04:00
|
|
|
env->segs[R_SS].base) != 0) <<
|
2005-01-04 02:50:08 +03:00
|
|
|
HF_ADDSEG_SHIFT;
|
|
|
|
}
|
2007-09-17 01:08:06 +04:00
|
|
|
env->hflags = (env->hflags &
|
2005-01-04 02:50:08 +03:00
|
|
|
~(HF_SS32_MASK | HF_ADDSEG_MASK)) | new_hflags;
|
2003-10-01 00:34:21 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-03 17:37:01 +04:00
|
|
|
static inline void cpu_x86_load_seg_cache_sipi(X86CPU *cpu,
|
2014-11-12 14:16:58 +03:00
|
|
|
uint8_t sipi_vector)
|
2010-06-19 11:42:34 +04:00
|
|
|
{
|
2013-01-17 21:51:17 +04:00
|
|
|
CPUState *cs = CPU(cpu);
|
2012-05-03 17:37:01 +04:00
|
|
|
CPUX86State *env = &cpu->env;
|
|
|
|
|
2010-06-19 11:42:34 +04:00
|
|
|
env->eip = 0;
|
|
|
|
cpu_x86_load_seg_cache(env, R_CS, sipi_vector << 8,
|
|
|
|
sipi_vector << 12,
|
|
|
|
env->segs[R_CS].limit,
|
|
|
|
env->segs[R_CS].flags);
|
2013-01-17 21:51:17 +04:00
|
|
|
cs->halted = 0;
|
2010-06-19 11:42:34 +04:00
|
|
|
}
|
|
|
|
|
2009-06-27 11:53:51 +04:00
|
|
|
int cpu_x86_get_descr_debug(CPUX86State *env, unsigned int selector,
|
|
|
|
target_ulong *base, unsigned int *limit,
|
|
|
|
unsigned int *flags);
|
|
|
|
|
x86 cleanup
Remove some unnecessary includes, add needed includes, move prototypes to
cpu.h to suppress missing prototype warnings.
Remove unused functions and prototypes (cpu_x86_flush_tlb, cpu_lock,
cpu_unlock, restore_native_fp_state, save_native_fp_state).
Make some functions and data static (f15rk, parity_table, rclw_table,
rclb_table, raise_interrupt, fpu_raise_exception), they are not used
outside op_helper.c anymore.
Make some x86_64 and user only code conditional to avoid warnings.
Document where each function is implemented in cpu.h and exec.h.
git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6005 c046a42c-6fe2-441c-8c8c-71466251a162
2008-12-13 14:49:17 +03:00
|
|
|
/* op_helper.c */
|
2004-03-31 22:56:43 +04:00
|
|
|
/* used for debug or cpu save/restore */
|
|
|
|
|
x86 cleanup
Remove some unnecessary includes, add needed includes, move prototypes to
cpu.h to suppress missing prototype warnings.
Remove unused functions and prototypes (cpu_x86_flush_tlb, cpu_lock,
cpu_unlock, restore_native_fp_state, save_native_fp_state).
Make some functions and data static (f15rk, parity_table, rclw_table,
rclb_table, raise_interrupt, fpu_raise_exception), they are not used
outside op_helper.c anymore.
Make some x86_64 and user only code conditional to avoid warnings.
Document where each function is implemented in cpu.h and exec.h.
git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6005 c046a42c-6fe2-441c-8c8c-71466251a162
2008-12-13 14:49:17 +03:00
|
|
|
/* cpu-exec.c */
|
2003-10-01 00:34:21 +04:00
|
|
|
/* the following helpers are only usable in user mode simulation as
|
|
|
|
they can trigger unexpected exceptions */
|
2021-01-10 02:34:27 +03:00
|
|
|
void cpu_x86_load_seg(CPUX86State *s, X86Seg seg_reg, int selector);
|
2007-11-12 01:16:56 +03:00
|
|
|
void cpu_x86_fsave(CPUX86State *s, target_ulong ptr, int data32);
|
|
|
|
void cpu_x86_frstor(CPUX86State *s, target_ulong ptr, int data32);
|
2017-02-26 19:53:44 +03:00
|
|
|
void cpu_x86_fxsave(CPUX86State *s, target_ulong ptr);
|
|
|
|
void cpu_x86_fxrstor(CPUX86State *s, target_ulong ptr);
|
2022-10-10 16:28:54 +03:00
|
|
|
void cpu_x86_xsave(CPUX86State *s, target_ulong ptr);
|
|
|
|
void cpu_x86_xrstor(CPUX86State *s, target_ulong ptr);
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2015-07-02 17:57:14 +03:00
|
|
|
/* cpu.c */
|
2021-03-22 16:27:40 +03:00
|
|
|
void x86_cpu_vendor_words2str(char *dst, uint32_t vendor1,
|
|
|
|
uint32_t vendor2, uint32_t vendor3);
|
|
|
|
typedef struct PropValue {
|
|
|
|
const char *prop, *value;
|
|
|
|
} PropValue;
|
|
|
|
void x86_cpu_apply_props(X86CPU *cpu, PropValue *props);
|
|
|
|
|
2022-09-30 18:52:03 +03:00
|
|
|
void x86_cpu_after_reset(X86CPU *cpu);
|
|
|
|
|
2021-08-04 14:30:58 +03:00
|
|
|
uint32_t cpu_x86_virtual_addr_width(CPUX86State *env);
|
|
|
|
|
2021-03-22 16:27:40 +03:00
|
|
|
/* cpu.c other functions (cpuid) */
|
2010-03-11 16:38:55 +03:00
|
|
|
void cpu_x86_cpuid(CPUX86State *env, uint32_t index, uint32_t count,
|
|
|
|
uint32_t *eax, uint32_t *ebx,
|
|
|
|
uint32_t *ecx, uint32_t *edx);
|
2010-06-19 11:42:34 +04:00
|
|
|
void cpu_clear_apic_feature(CPUX86State *env);
|
2024-01-11 18:43:59 +03:00
|
|
|
void cpu_set_apic_feature(CPUX86State *env);
|
2011-01-21 23:48:07 +03:00
|
|
|
void host_cpuid(uint32_t function, uint32_t count,
|
|
|
|
uint32_t *eax, uint32_t *ebx, uint32_t *ecx, uint32_t *edx);
|
2024-01-11 18:43:59 +03:00
|
|
|
bool cpu_has_x2apic_feature(CPUX86State *env);
|
2010-03-11 16:38:55 +03:00
|
|
|
|
x86 cleanup
Remove some unnecessary includes, add needed includes, move prototypes to
cpu.h to suppress missing prototype warnings.
Remove unused functions and prototypes (cpu_x86_flush_tlb, cpu_lock,
cpu_unlock, restore_native_fp_state, save_native_fp_state).
Make some functions and data static (f15rk, parity_table, rclw_table,
rclb_table, raise_interrupt, fpu_raise_exception), they are not used
outside op_helper.c anymore.
Make some x86_64 and user only code conditional to avoid warnings.
Document where each function is implemented in cpu.h and exec.h.
git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6005 c046a42c-6fe2-441c-8c8c-71466251a162
2008-12-13 14:49:17 +03:00
|
|
|
/* helper.c */
|
2013-01-18 18:19:06 +04:00
|
|
|
void x86_cpu_set_a20(X86CPU *cpu, int a20_state);
|
2022-04-25 01:01:25 +03:00
|
|
|
void cpu_sync_avx_hflag(CPUX86State *env);
|
2003-10-01 00:34:21 +04:00
|
|
|
|
2015-04-08 14:39:37 +03:00
|
|
|
#ifndef CONFIG_USER_ONLY
|
2017-03-01 12:34:48 +03:00
|
|
|
static inline int x86_asidx_from_attrs(CPUState *cs, MemTxAttrs attrs)
|
|
|
|
{
|
|
|
|
return !!attrs.secure;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline AddressSpace *cpu_addressspace(CPUState *cs, MemTxAttrs attrs)
|
|
|
|
{
|
|
|
|
return cpu_get_address_space(cs, cpu_asidx_from_attrs(cs, attrs));
|
|
|
|
}
|
|
|
|
|
2021-03-22 16:27:57 +03:00
|
|
|
/*
|
|
|
|
* load efer and update the corresponding hflags. XXX: do consistency
|
|
|
|
* checks with cpuid bits?
|
|
|
|
*/
|
|
|
|
void cpu_load_efer(CPUX86State *env, uint64_t val);
|
2015-04-08 14:39:37 +03:00
|
|
|
uint8_t x86_ldub_phys(CPUState *cs, hwaddr addr);
|
|
|
|
uint32_t x86_lduw_phys(CPUState *cs, hwaddr addr);
|
|
|
|
uint32_t x86_ldl_phys(CPUState *cs, hwaddr addr);
|
|
|
|
uint64_t x86_ldq_phys(CPUState *cs, hwaddr addr);
|
|
|
|
void x86_stb_phys(CPUState *cs, hwaddr addr, uint8_t val);
|
|
|
|
void x86_stl_phys_notdirty(CPUState *cs, hwaddr addr, uint32_t val);
|
|
|
|
void x86_stw_phys(CPUState *cs, hwaddr addr, uint32_t val);
|
|
|
|
void x86_stl_phys(CPUState *cs, hwaddr addr, uint32_t val);
|
|
|
|
void x86_stq_phys(CPUState *cs, hwaddr addr, uint64_t val);
|
|
|
|
#endif
|
|
|
|
|
x86 cleanup
Remove some unnecessary includes, add needed includes, move prototypes to
cpu.h to suppress missing prototype warnings.
Remove unused functions and prototypes (cpu_x86_flush_tlb, cpu_lock,
cpu_unlock, restore_native_fp_state, save_native_fp_state).
Make some functions and data static (f15rk, parity_table, rclw_table,
rclb_table, raise_interrupt, fpu_raise_exception), they are not used
outside op_helper.c anymore.
Make some x86_64 and user only code conditional to avoid warnings.
Document where each function is implemented in cpu.h and exec.h.
git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6005 c046a42c-6fe2-441c-8c8c-71466251a162
2008-12-13 14:49:17 +03:00
|
|
|
/* will be suppressed */
|
|
|
|
void cpu_x86_update_cr0(CPUX86State *env, uint32_t new_cr0);
|
|
|
|
void cpu_x86_update_cr3(CPUX86State *env, target_ulong new_cr3);
|
|
|
|
void cpu_x86_update_cr4(CPUX86State *env, uint32_t new_cr4);
|
2015-09-15 21:45:08 +03:00
|
|
|
void cpu_x86_update_dr7(CPUX86State *env, uint32_t new_dr7);
|
x86 cleanup
Remove some unnecessary includes, add needed includes, move prototypes to
cpu.h to suppress missing prototype warnings.
Remove unused functions and prototypes (cpu_x86_flush_tlb, cpu_lock,
cpu_unlock, restore_native_fp_state, save_native_fp_state).
Make some functions and data static (f15rk, parity_table, rclw_table,
rclb_table, raise_interrupt, fpu_raise_exception), they are not used
outside op_helper.c anymore.
Make some x86_64 and user only code conditional to avoid warnings.
Document where each function is implemented in cpu.h and exec.h.
git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6005 c046a42c-6fe2-441c-8c8c-71466251a162
2008-12-13 14:49:17 +03:00
|
|
|
|
|
|
|
/* hw/pc.c */
|
|
|
|
uint64_t cpu_get_tsc(CPUX86State *env);
|
2008-11-05 18:34:06 +03:00
|
|
|
|
2018-02-07 13:40:25 +03:00
|
|
|
#define CPU_RESOLVING_TYPE TYPE_X86_CPU
|
2017-09-13 19:04:56 +03:00
|
|
|
|
|
|
|
#ifdef TARGET_X86_64
|
|
|
|
#define TARGET_DEFAULT_CPU_TYPE X86_CPU_TYPE_NAME("qemu64")
|
|
|
|
#else
|
|
|
|
#define TARGET_DEFAULT_CPU_TYPE X86_CPU_TYPE_NAME("qemu32")
|
|
|
|
#endif
|
|
|
|
|
2012-09-06 00:41:08 +04:00
|
|
|
#define cpu_list x86_cpu_list
|
2007-06-04 01:02:38 +04:00
|
|
|
|
2007-10-14 11:07:08 +04:00
|
|
|
/* MMU modes definitions */
|
2024-01-02 17:40:18 +03:00
|
|
|
#define MMU_KSMAP64_IDX 0
|
|
|
|
#define MMU_KSMAP32_IDX 1
|
|
|
|
#define MMU_USER64_IDX 2
|
|
|
|
#define MMU_USER32_IDX 3
|
|
|
|
#define MMU_KNOSMAP64_IDX 4
|
|
|
|
#define MMU_KNOSMAP32_IDX 5
|
|
|
|
#define MMU_PHYS_IDX 6
|
|
|
|
#define MMU_NESTED_IDX 7
|
|
|
|
|
|
|
|
#ifdef CONFIG_USER_ONLY
|
|
|
|
#ifdef TARGET_X86_64
|
|
|
|
#define MMU_USER_IDX MMU_USER64_IDX
|
|
|
|
#else
|
|
|
|
#define MMU_USER_IDX MMU_USER32_IDX
|
|
|
|
#endif
|
|
|
|
#endif
|
2022-10-02 20:29:52 +03:00
|
|
|
|
2024-01-02 17:36:51 +03:00
|
|
|
static inline bool is_mmu_index_smap(int mmu_index)
|
|
|
|
{
|
2024-01-02 17:40:18 +03:00
|
|
|
return (mmu_index & ~1) == MMU_KSMAP64_IDX;
|
2024-01-02 17:36:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool is_mmu_index_user(int mmu_index)
|
|
|
|
{
|
2024-01-02 17:40:18 +03:00
|
|
|
return (mmu_index & ~1) == MMU_USER64_IDX;
|
2024-01-02 17:36:51 +03:00
|
|
|
}
|
|
|
|
|
target/i386: Fix physical address truncation
The address translation logic in get_physical_address() will currently
truncate physical addresses to 32 bits unless long mode is enabled.
This is incorrect when using physical address extensions (PAE) outside
of long mode, with the result that a 32-bit operating system using PAE
to access memory above 4G will experience undefined behaviour.
The truncation code was originally introduced in commit 33dfdb5 ("x86:
only allow real mode to access 32bit without LMA"), where it applied
only to translations performed while paging is disabled (and so cannot
affect guests using PAE).
Commit 9828198 ("target/i386: Add MMU_PHYS_IDX and MMU_NESTED_IDX")
rearranged the code such that the truncation also applied to the use
of MMU_PHYS_IDX and MMU_NESTED_IDX. Commit 4a1e9d4 ("target/i386: Use
atomic operations for pte updates") brought this truncation into scope
for page table entry accesses, and is the first commit for which a
Windows 10 32-bit guest will reliably fail to boot if memory above 4G
is present.
The truncation code however is not completely redundant. Even though the
maximum address size for any executed instruction is 32 bits, helpers for
operations such as BOUND, FSAVE or XSAVE may ask get_physical_address()
to translate an address outside of the 32-bit range, if invoked with an
argument that is close to the 4G boundary. Likewise for processor
accesses, for example TSS or IDT accesses, when EFER.LMA==0.
So, move the address truncation in get_physical_address() so that it
applies to 32-bit MMU indexes, but not to MMU_PHYS_IDX and MMU_NESTED_IDX.
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/2040
Fixes: 4a1e9d4d11c ("target/i386: Use atomic operations for pte updates", 2022-10-18)
Cc: qemu-stable@nongnu.org
Co-developed-by: Michael Brown <mcb30@ipxe.org>
Signed-off-by: Michael Brown <mcb30@ipxe.org>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2023-12-22 20:01:52 +03:00
|
|
|
static inline bool is_mmu_index_32(int mmu_index)
|
|
|
|
{
|
|
|
|
assert(mmu_index < MMU_PHYS_IDX);
|
|
|
|
return mmu_index & 1;
|
|
|
|
}
|
|
|
|
|
2014-03-28 14:43:45 +04:00
|
|
|
static inline int cpu_mmu_index_kernel(CPUX86State *env)
|
|
|
|
{
|
2024-03-11 10:56:44 +03:00
|
|
|
int mmu_index_32 = (env->hflags & HF_LMA_MASK) ? 0 : 1;
|
2024-01-02 17:40:18 +03:00
|
|
|
int mmu_index_base =
|
|
|
|
!(env->hflags & HF_SMAP_MASK) ? MMU_KNOSMAP64_IDX :
|
|
|
|
((env->hflags & HF_CPL_MASK) < 3 && (env->eflags & AC_MASK)) ? MMU_KNOSMAP64_IDX : MMU_KSMAP64_IDX;
|
|
|
|
|
|
|
|
return mmu_index_base + mmu_index_32;
|
2007-10-14 11:07:08 +04:00
|
|
|
}
|
|
|
|
|
2013-01-24 04:03:16 +04:00
|
|
|
#define CC_DST (env->cc_dst)
|
|
|
|
#define CC_SRC (env->cc_src)
|
|
|
|
#define CC_SRC2 (env->cc_src2)
|
|
|
|
#define CC_OP (env->cc_op)
|
2011-05-21 11:10:23 +04:00
|
|
|
|
2012-12-17 21:19:49 +04:00
|
|
|
#include "exec/cpu-all.h"
|
2007-09-23 19:28:04 +04:00
|
|
|
#include "svm.h"
|
|
|
|
|
2010-06-19 11:42:34 +04:00
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
2013-02-05 20:06:20 +04:00
|
|
|
#include "hw/i386/apic.h"
|
2010-06-19 11:42:34 +04:00
|
|
|
#endif
|
|
|
|
|
2023-06-21 16:56:24 +03:00
|
|
|
static inline void cpu_get_tb_cpu_state(CPUX86State *env, vaddr *pc,
|
|
|
|
uint64_t *cs_base, uint32_t *flags)
|
2008-11-18 22:46:41 +03:00
|
|
|
{
|
2009-05-11 00:30:53 +04:00
|
|
|
*flags = env->hflags |
|
2012-09-27 00:18:43 +04:00
|
|
|
(env->eflags & (IOPL_MASK | TF_MASK | RF_MASK | VM_MASK | AC_MASK));
|
2023-12-12 20:01:38 +03:00
|
|
|
if (env->hflags & HF_CS64_MASK) {
|
|
|
|
*cs_base = 0;
|
|
|
|
*pc = env->eip;
|
|
|
|
} else {
|
|
|
|
*cs_base = env->segs[R_CS].base;
|
|
|
|
*pc = (uint32_t)(*cs_base + env->eip);
|
|
|
|
}
|
2008-11-18 22:46:41 +03:00
|
|
|
}
|
|
|
|
|
2012-05-05 03:14:41 +04:00
|
|
|
void do_cpu_init(X86CPU *cpu);
|
2011-03-02 10:56:08 +03:00
|
|
|
|
2011-03-02 10:56:10 +03:00
|
|
|
#define MCE_INJECT_BROADCAST 1
|
|
|
|
#define MCE_INJECT_UNCOND_AO 2
|
|
|
|
|
2012-05-03 17:22:54 +04:00
|
|
|
void cpu_x86_inject_mce(Monitor *mon, X86CPU *cpu, int bank,
|
2011-03-02 10:56:09 +03:00
|
|
|
uint64_t status, uint64_t mcg_status, uint64_t addr,
|
2011-03-02 10:56:10 +03:00
|
|
|
uint64_t misc, int flags);
|
2011-03-02 10:56:08 +03:00
|
|
|
|
2023-10-26 01:24:46 +03:00
|
|
|
uint32_t cpu_cc_compute_all(CPUX86State *env1);
|
2012-04-29 16:21:21 +04:00
|
|
|
|
|
|
|
static inline uint32_t cpu_compute_eflags(CPUX86State *env)
|
|
|
|
{
|
2017-07-03 13:12:22 +03:00
|
|
|
uint32_t eflags = env->eflags;
|
|
|
|
if (tcg_enabled()) {
|
2023-10-26 01:24:46 +03:00
|
|
|
eflags |= cpu_cc_compute_all(env) | (env->df & DF_MASK);
|
2017-07-03 13:12:22 +03:00
|
|
|
}
|
|
|
|
return eflags;
|
2012-04-29 16:21:21 +04:00
|
|
|
}
|
|
|
|
|
2015-04-08 15:52:04 +03:00
|
|
|
static inline MemTxAttrs cpu_get_mem_attrs(CPUX86State *env)
|
|
|
|
{
|
|
|
|
return ((MemTxAttrs) { .secure = (env->hflags & HF_SMM_MASK) != 0 });
|
|
|
|
}
|
|
|
|
|
2017-05-11 14:35:28 +03:00
|
|
|
static inline int32_t x86_get_a20_mask(CPUX86State *env)
|
|
|
|
{
|
|
|
|
if (env->hflags & HF_SMM_MASK) {
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
return env->a20_mask;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-19 19:21:35 +03:00
|
|
|
static inline bool cpu_has_vmx(CPUX86State *env)
|
|
|
|
{
|
|
|
|
return env->features[FEAT_1_ECX] & CPUID_EXT_VMX;
|
|
|
|
}
|
|
|
|
|
2020-05-20 17:49:22 +03:00
|
|
|
static inline bool cpu_has_svm(CPUX86State *env)
|
|
|
|
{
|
|
|
|
return env->features[FEAT_8000_0001_ECX] & CPUID_EXT3_SVM;
|
|
|
|
}
|
|
|
|
|
target/i386: kvm: Demand nested migration kernel capabilities only when vCPU may have enabled VMX
Previous to this change, a vCPU exposed with VMX running on a kernel
without KVM_CAP_NESTED_STATE or KVM_CAP_EXCEPTION_PAYLOAD resulted in
adding a migration blocker. This was because when the code was written
it was thought there is no way to reliably know if a vCPU is utilising
VMX or not at runtime. However, it turns out that this can be known to
some extent:
In order for a vCPU to enter VMX operation it must have CR4.VMXE set.
Since it was set, CR4.VMXE must remain set as long as the vCPU is in
VMX operation. This is because CR4.VMXE is one of the bits set
in MSR_IA32_VMX_CR4_FIXED1.
There is one exception to the above statement when vCPU enters SMM mode.
When a vCPU enters SMM mode, it temporarily exits VMX operation and
may also reset CR4.VMXE during execution in SMM mode.
When the vCPU exits SMM mode, vCPU state is restored to be in VMX operation
and CR4.VMXE is restored to its original state of being set.
Therefore, when the vCPU is not in SMM mode, we can infer whether
VMX is being used by examining CR4.VMXE. Otherwise, we cannot
know for certain but assume the worse that vCPU may utilise VMX.
Summaring all the above, a vCPU may have enabled VMX in case
CR4.VMXE is set or vCPU is in SMM mode.
Therefore, remove migration blocker and check before migration
(cpu_pre_save()) if the vCPU may have enabled VMX. If true, only then
require relevant kernel capabilities.
While at it, demand KVM_CAP_EXCEPTION_PAYLOAD only when the vCPU is in
guest-mode and there is a pending/injected exception. Otherwise, this
kernel capability is not required for proper migration.
Reviewed-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: Liran Alon <liran.alon@oracle.com>
Reviewed-by: Maran Wilson <maran.wilson@oracle.com>
Tested-by: Maran Wilson <maran.wilson@oracle.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-07-06 00:06:36 +03:00
|
|
|
/*
|
|
|
|
* In order for a vCPU to enter VMX operation it must have CR4.VMXE set.
|
|
|
|
* Since it was set, CR4.VMXE must remain set as long as vCPU is in
|
|
|
|
* VMX operation. This is because CR4.VMXE is one of the bits set
|
|
|
|
* in MSR_IA32_VMX_CR4_FIXED1.
|
|
|
|
*
|
|
|
|
* There is one exception to above statement when vCPU enters SMM mode.
|
|
|
|
* When a vCPU enters SMM mode, it temporarily exit VMX operation and
|
|
|
|
* may also reset CR4.VMXE during execution in SMM mode.
|
|
|
|
* When vCPU exits SMM mode, vCPU state is restored to be in VMX operation
|
|
|
|
* and CR4.VMXE is restored to it's original value of being set.
|
|
|
|
*
|
|
|
|
* Therefore, when vCPU is not in SMM mode, we can infer whether
|
|
|
|
* VMX is being used by examining CR4.VMXE. Otherwise, we cannot
|
|
|
|
* know for certain.
|
|
|
|
*/
|
|
|
|
static inline bool cpu_vmx_maybe_enabled(CPUX86State *env)
|
|
|
|
{
|
|
|
|
return cpu_has_vmx(env) &&
|
|
|
|
((env->cr[4] & CR4_VMXE_MASK) || (env->hflags & HF_SMM_MASK));
|
|
|
|
}
|
|
|
|
|
2021-02-26 17:45:05 +03:00
|
|
|
/* excp_helper.c */
|
|
|
|
int get_pg_mode(CPUX86State *env);
|
|
|
|
|
2014-02-25 02:59:54 +04:00
|
|
|
/* fpu_helper.c */
|
2017-07-03 13:12:19 +03:00
|
|
|
void update_fp_status(CPUX86State *env);
|
|
|
|
void update_mxcsr_status(CPUX86State *env);
|
2020-06-26 02:58:31 +03:00
|
|
|
void update_mxcsr_from_sse_status(CPUX86State *env);
|
2017-07-03 13:12:19 +03:00
|
|
|
|
|
|
|
static inline void cpu_set_mxcsr(CPUX86State *env, uint32_t mxcsr)
|
|
|
|
{
|
|
|
|
env->mxcsr = mxcsr;
|
|
|
|
if (tcg_enabled()) {
|
|
|
|
update_mxcsr_status(env);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void cpu_set_fpuc(CPUX86State *env, uint16_t fpuc)
|
|
|
|
{
|
|
|
|
env->fpuc = fpuc;
|
|
|
|
if (tcg_enabled()) {
|
|
|
|
update_fp_status(env);
|
|
|
|
}
|
|
|
|
}
|
2014-02-25 02:59:54 +04:00
|
|
|
|
2012-04-29 18:42:35 +04:00
|
|
|
/* svm_helper.c */
|
2021-05-14 18:13:35 +03:00
|
|
|
#ifdef CONFIG_USER_ONLY
|
|
|
|
static inline void
|
|
|
|
cpu_svm_check_intercept_param(CPUX86State *env1, uint32_t type,
|
|
|
|
uint64_t param, uintptr_t retaddr)
|
|
|
|
{ /* no-op */ }
|
2021-06-16 15:39:04 +03:00
|
|
|
static inline bool
|
|
|
|
cpu_svm_has_intercept(CPUX86State *env, uint32_t type)
|
|
|
|
{ return false; }
|
2021-05-14 18:13:35 +03:00
|
|
|
#else
|
2012-04-29 18:42:35 +04:00
|
|
|
void cpu_svm_check_intercept_param(CPUX86State *env1, uint32_t type,
|
2017-02-16 14:30:05 +03:00
|
|
|
uint64_t param, uintptr_t retaddr);
|
2021-06-16 15:39:04 +03:00
|
|
|
bool cpu_svm_has_intercept(CPUX86State *env, uint32_t type);
|
2021-05-14 18:13:35 +03:00
|
|
|
#endif
|
|
|
|
|
2015-12-04 13:04:13 +03:00
|
|
|
/* apic.c */
|
2012-03-14 04:38:21 +04:00
|
|
|
void cpu_report_tpr_access(CPUX86State *env, TPRAccess access);
|
2015-12-04 13:04:13 +03:00
|
|
|
void apic_handle_tpr_access_report(DeviceState *d, target_ulong ip,
|
|
|
|
TPRAccess access);
|
|
|
|
|
2019-06-28 03:28:39 +03:00
|
|
|
/* Special values for X86CPUVersion: */
|
|
|
|
|
|
|
|
/* Resolve to latest CPU version */
|
|
|
|
#define CPU_VERSION_LATEST -1
|
|
|
|
|
2019-06-28 03:28:42 +03:00
|
|
|
/*
|
|
|
|
* Resolve to version defined by current machine type.
|
|
|
|
* See x86_cpu_set_default_version()
|
|
|
|
*/
|
|
|
|
#define CPU_VERSION_AUTO -2
|
|
|
|
|
2019-06-28 03:28:39 +03:00
|
|
|
/* Don't resolve to any versioned CPU models, like old QEMU versions */
|
|
|
|
#define CPU_VERSION_LEGACY 0
|
|
|
|
|
|
|
|
typedef int X86CPUVersion;
|
|
|
|
|
2019-06-28 03:28:42 +03:00
|
|
|
/*
|
|
|
|
* Set default CPU model version for CPU models having
|
|
|
|
* version == CPU_VERSION_AUTO.
|
|
|
|
*/
|
|
|
|
void x86_cpu_set_default_version(X86CPUVersion version);
|
|
|
|
|
2022-12-16 15:39:32 +03:00
|
|
|
#ifndef CONFIG_USER_ONLY
|
|
|
|
|
2023-06-03 01:11:03 +03:00
|
|
|
void do_cpu_sipi(X86CPU *cpu);
|
|
|
|
|
2013-03-21 03:23:20 +04:00
|
|
|
#define APIC_DEFAULT_ADDRESS 0xfee00000
|
2013-04-25 18:05:29 +04:00
|
|
|
#define APIC_SPACE_SIZE 0x100000
|
2013-03-21 03:23:20 +04:00
|
|
|
|
2020-12-12 18:55:13 +03:00
|
|
|
/* cpu-dump.c */
|
2019-04-17 22:17:59 +03:00
|
|
|
void x86_cpu_dump_local_apic_state(CPUState *cs, int flags);
|
2015-09-22 16:18:18 +03:00
|
|
|
|
2022-12-16 15:39:32 +03:00
|
|
|
#endif
|
|
|
|
|
2015-12-04 13:04:13 +03:00
|
|
|
/* cpu.c */
|
|
|
|
bool cpu_is_bsp(X86CPU *cpu);
|
|
|
|
|
2021-07-05 13:46:28 +03:00
|
|
|
void x86_cpu_xrstor_all_areas(X86CPU *cpu, const void *buf, uint32_t buflen);
|
|
|
|
void x86_cpu_xsave_all_areas(X86CPU *cpu, void *buf, uint32_t buflen);
|
2022-10-10 16:28:54 +03:00
|
|
|
uint32_t xsave_area_size(uint64_t mask, bool compacted);
|
2018-01-10 22:50:54 +03:00
|
|
|
void x86_update_hflags(CPUX86State* env);
|
|
|
|
|
2019-05-17 17:19:16 +03:00
|
|
|
static inline bool hyperv_feat_enabled(X86CPU *cpu, int feat)
|
|
|
|
{
|
|
|
|
return !!(cpu->hyperv_features & BIT(feat));
|
|
|
|
}
|
|
|
|
|
2021-07-21 18:26:50 +03:00
|
|
|
static inline uint64_t cr4_reserved_bits(CPUX86State *env)
|
|
|
|
{
|
|
|
|
uint64_t reserved_bits = CR4_RESERVED_MASK;
|
|
|
|
if (!env->features[FEAT_XSAVE]) {
|
|
|
|
reserved_bits |= CR4_OSXSAVE_MASK;
|
|
|
|
}
|
|
|
|
if (!(env->features[FEAT_7_0_EBX] & CPUID_7_0_EBX_SMEP)) {
|
|
|
|
reserved_bits |= CR4_SMEP_MASK;
|
|
|
|
}
|
|
|
|
if (!(env->features[FEAT_7_0_EBX] & CPUID_7_0_EBX_SMAP)) {
|
|
|
|
reserved_bits |= CR4_SMAP_MASK;
|
|
|
|
}
|
|
|
|
if (!(env->features[FEAT_7_0_EBX] & CPUID_7_0_EBX_FSGSBASE)) {
|
|
|
|
reserved_bits |= CR4_FSGSBASE_MASK;
|
|
|
|
}
|
|
|
|
if (!(env->features[FEAT_7_0_ECX] & CPUID_7_0_ECX_PKU)) {
|
|
|
|
reserved_bits |= CR4_PKE_MASK;
|
|
|
|
}
|
|
|
|
if (!(env->features[FEAT_7_0_ECX] & CPUID_7_0_ECX_LA57)) {
|
|
|
|
reserved_bits |= CR4_LA57_MASK;
|
|
|
|
}
|
|
|
|
if (!(env->features[FEAT_7_0_ECX] & CPUID_7_0_ECX_UMIP)) {
|
|
|
|
reserved_bits |= CR4_UMIP_MASK;
|
|
|
|
}
|
|
|
|
if (!(env->features[FEAT_7_0_ECX] & CPUID_7_0_ECX_PKS)) {
|
|
|
|
reserved_bits |= CR4_PKS_MASK;
|
|
|
|
}
|
2024-01-12 09:00:42 +03:00
|
|
|
if (!(env->features[FEAT_7_1_EAX] & CPUID_7_1_EAX_LAM)) {
|
|
|
|
reserved_bits |= CR4_LAM_SUP_MASK;
|
|
|
|
}
|
2021-07-21 18:26:50 +03:00
|
|
|
return reserved_bits;
|
|
|
|
}
|
|
|
|
|
2021-08-13 12:45:52 +03:00
|
|
|
static inline bool ctl_has_irq(CPUX86State *env)
|
|
|
|
{
|
|
|
|
uint32_t int_prio;
|
|
|
|
uint32_t tpr;
|
|
|
|
|
|
|
|
int_prio = (env->int_ctl & V_INTR_PRIO_MASK) >> V_INTR_PRIO_SHIFT;
|
|
|
|
tpr = env->int_ctl & V_TPR_MASK;
|
|
|
|
|
|
|
|
if (env->int_ctl & V_IGN_TPR_MASK) {
|
|
|
|
return (env->int_ctl & V_IRQ_MASK);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (env->int_ctl & V_IRQ_MASK) && (int_prio >= tpr);
|
|
|
|
}
|
|
|
|
|
2020-02-13 06:22:21 +03:00
|
|
|
#if defined(TARGET_X86_64) && \
|
|
|
|
defined(CONFIG_USER_ONLY) && \
|
|
|
|
defined(CONFIG_LINUX)
|
|
|
|
# define TARGET_VSYSCALL_PAGE (UINT64_C(-10) << 20)
|
|
|
|
#endif
|
|
|
|
|
2016-06-29 12:05:55 +03:00
|
|
|
#endif /* I386_CPU_H */
|