GNU Linux-libre 6.1.24-gnu
[releases.git] / arch / x86 / kvm / lapic.c
1 // SPDX-License-Identifier: GPL-2.0-only
2
3 /*
4  * Local APIC virtualization
5  *
6  * Copyright (C) 2006 Qumranet, Inc.
7  * Copyright (C) 2007 Novell
8  * Copyright (C) 2007 Intel
9  * Copyright 2009 Red Hat, Inc. and/or its affiliates.
10  *
11  * Authors:
12  *   Dor Laor <dor.laor@qumranet.com>
13  *   Gregory Haskins <ghaskins@novell.com>
14  *   Yaozu (Eddie) Dong <eddie.dong@intel.com>
15  *
16  * Based on Xen 3.1 code, Copyright (c) 2004, Intel Corporation.
17  */
18
19 #include <linux/kvm_host.h>
20 #include <linux/kvm.h>
21 #include <linux/mm.h>
22 #include <linux/highmem.h>
23 #include <linux/smp.h>
24 #include <linux/hrtimer.h>
25 #include <linux/io.h>
26 #include <linux/export.h>
27 #include <linux/math64.h>
28 #include <linux/slab.h>
29 #include <asm/processor.h>
30 #include <asm/mce.h>
31 #include <asm/msr.h>
32 #include <asm/page.h>
33 #include <asm/current.h>
34 #include <asm/apicdef.h>
35 #include <asm/delay.h>
36 #include <linux/atomic.h>
37 #include <linux/jump_label.h>
38 #include "kvm_cache_regs.h"
39 #include "irq.h"
40 #include "ioapic.h"
41 #include "trace.h"
42 #include "x86.h"
43 #include "cpuid.h"
44 #include "hyperv.h"
45
46 #ifndef CONFIG_X86_64
47 #define mod_64(x, y) ((x) - (y) * div64_u64(x, y))
48 #else
49 #define mod_64(x, y) ((x) % (y))
50 #endif
51
52 #define PRId64 "d"
53 #define PRIx64 "llx"
54 #define PRIu64 "u"
55 #define PRIo64 "o"
56
57 /* 14 is the version for Xeon and Pentium 8.4.8*/
58 #define APIC_VERSION                    0x14UL
59 #define LAPIC_MMIO_LENGTH               (1 << 12)
60 /* followed define is not in apicdef.h */
61 #define MAX_APIC_VECTOR                 256
62 #define APIC_VECTORS_PER_REG            32
63
64 static bool lapic_timer_advance_dynamic __read_mostly;
65 #define LAPIC_TIMER_ADVANCE_ADJUST_MIN  100     /* clock cycles */
66 #define LAPIC_TIMER_ADVANCE_ADJUST_MAX  10000   /* clock cycles */
67 #define LAPIC_TIMER_ADVANCE_NS_INIT     1000
68 #define LAPIC_TIMER_ADVANCE_NS_MAX     5000
69 /* step-by-step approximation to mitigate fluctuation */
70 #define LAPIC_TIMER_ADVANCE_ADJUST_STEP 8
71 static int kvm_lapic_msr_read(struct kvm_lapic *apic, u32 reg, u64 *data);
72 static int kvm_lapic_msr_write(struct kvm_lapic *apic, u32 reg, u64 data);
73
74 static inline void __kvm_lapic_set_reg(char *regs, int reg_off, u32 val)
75 {
76         *((u32 *) (regs + reg_off)) = val;
77 }
78
79 static inline void kvm_lapic_set_reg(struct kvm_lapic *apic, int reg_off, u32 val)
80 {
81         __kvm_lapic_set_reg(apic->regs, reg_off, val);
82 }
83
84 static __always_inline u64 __kvm_lapic_get_reg64(char *regs, int reg)
85 {
86         BUILD_BUG_ON(reg != APIC_ICR);
87         return *((u64 *) (regs + reg));
88 }
89
90 static __always_inline u64 kvm_lapic_get_reg64(struct kvm_lapic *apic, int reg)
91 {
92         return __kvm_lapic_get_reg64(apic->regs, reg);
93 }
94
95 static __always_inline void __kvm_lapic_set_reg64(char *regs, int reg, u64 val)
96 {
97         BUILD_BUG_ON(reg != APIC_ICR);
98         *((u64 *) (regs + reg)) = val;
99 }
100
101 static __always_inline void kvm_lapic_set_reg64(struct kvm_lapic *apic,
102                                                 int reg, u64 val)
103 {
104         __kvm_lapic_set_reg64(apic->regs, reg, val);
105 }
106
107 static inline int apic_test_vector(int vec, void *bitmap)
108 {
109         return test_bit(VEC_POS(vec), (bitmap) + REG_POS(vec));
110 }
111
112 bool kvm_apic_pending_eoi(struct kvm_vcpu *vcpu, int vector)
113 {
114         struct kvm_lapic *apic = vcpu->arch.apic;
115
116         return apic_test_vector(vector, apic->regs + APIC_ISR) ||
117                 apic_test_vector(vector, apic->regs + APIC_IRR);
118 }
119
120 static inline int __apic_test_and_set_vector(int vec, void *bitmap)
121 {
122         return __test_and_set_bit(VEC_POS(vec), (bitmap) + REG_POS(vec));
123 }
124
125 static inline int __apic_test_and_clear_vector(int vec, void *bitmap)
126 {
127         return __test_and_clear_bit(VEC_POS(vec), (bitmap) + REG_POS(vec));
128 }
129
130 __read_mostly DEFINE_STATIC_KEY_DEFERRED_FALSE(apic_hw_disabled, HZ);
131 __read_mostly DEFINE_STATIC_KEY_DEFERRED_FALSE(apic_sw_disabled, HZ);
132
133 static inline int apic_enabled(struct kvm_lapic *apic)
134 {
135         return kvm_apic_sw_enabled(apic) &&     kvm_apic_hw_enabled(apic);
136 }
137
138 #define LVT_MASK        \
139         (APIC_LVT_MASKED | APIC_SEND_PENDING | APIC_VECTOR_MASK)
140
141 #define LINT_MASK       \
142         (LVT_MASK | APIC_MODE_MASK | APIC_INPUT_POLARITY | \
143          APIC_LVT_REMOTE_IRR | APIC_LVT_LEVEL_TRIGGER)
144
145 static inline u32 kvm_x2apic_id(struct kvm_lapic *apic)
146 {
147         return apic->vcpu->vcpu_id;
148 }
149
150 static bool kvm_can_post_timer_interrupt(struct kvm_vcpu *vcpu)
151 {
152         return pi_inject_timer && kvm_vcpu_apicv_active(vcpu) &&
153                 (kvm_mwait_in_guest(vcpu->kvm) || kvm_hlt_in_guest(vcpu->kvm));
154 }
155
156 bool kvm_can_use_hv_timer(struct kvm_vcpu *vcpu)
157 {
158         return kvm_x86_ops.set_hv_timer
159                && !(kvm_mwait_in_guest(vcpu->kvm) ||
160                     kvm_can_post_timer_interrupt(vcpu));
161 }
162 EXPORT_SYMBOL_GPL(kvm_can_use_hv_timer);
163
164 static bool kvm_use_posted_timer_interrupt(struct kvm_vcpu *vcpu)
165 {
166         return kvm_can_post_timer_interrupt(vcpu) && vcpu->mode == IN_GUEST_MODE;
167 }
168
169 static inline bool kvm_apic_map_get_logical_dest(struct kvm_apic_map *map,
170                 u32 dest_id, struct kvm_lapic ***cluster, u16 *mask) {
171         switch (map->mode) {
172         case KVM_APIC_MODE_X2APIC: {
173                 u32 offset = (dest_id >> 16) * 16;
174                 u32 max_apic_id = map->max_apic_id;
175
176                 if (offset <= max_apic_id) {
177                         u8 cluster_size = min(max_apic_id - offset + 1, 16U);
178
179                         offset = array_index_nospec(offset, map->max_apic_id + 1);
180                         *cluster = &map->phys_map[offset];
181                         *mask = dest_id & (0xffff >> (16 - cluster_size));
182                 } else {
183                         *mask = 0;
184                 }
185
186                 return true;
187                 }
188         case KVM_APIC_MODE_XAPIC_FLAT:
189                 *cluster = map->xapic_flat_map;
190                 *mask = dest_id & 0xff;
191                 return true;
192         case KVM_APIC_MODE_XAPIC_CLUSTER:
193                 *cluster = map->xapic_cluster_map[(dest_id >> 4) & 0xf];
194                 *mask = dest_id & 0xf;
195                 return true;
196         default:
197                 /* Not optimized. */
198                 return false;
199         }
200 }
201
202 static void kvm_apic_map_free(struct rcu_head *rcu)
203 {
204         struct kvm_apic_map *map = container_of(rcu, struct kvm_apic_map, rcu);
205
206         kvfree(map);
207 }
208
209 /*
210  * CLEAN -> DIRTY and UPDATE_IN_PROGRESS -> DIRTY changes happen without a lock.
211  *
212  * DIRTY -> UPDATE_IN_PROGRESS and UPDATE_IN_PROGRESS -> CLEAN happen with
213  * apic_map_lock_held.
214  */
215 enum {
216         CLEAN,
217         UPDATE_IN_PROGRESS,
218         DIRTY
219 };
220
221 void kvm_recalculate_apic_map(struct kvm *kvm)
222 {
223         struct kvm_apic_map *new, *old = NULL;
224         struct kvm_vcpu *vcpu;
225         unsigned long i;
226         u32 max_id = 255; /* enough space for any xAPIC ID */
227
228         /* Read kvm->arch.apic_map_dirty before kvm->arch.apic_map.  */
229         if (atomic_read_acquire(&kvm->arch.apic_map_dirty) == CLEAN)
230                 return;
231
232         WARN_ONCE(!irqchip_in_kernel(kvm),
233                   "Dirty APIC map without an in-kernel local APIC");
234
235         mutex_lock(&kvm->arch.apic_map_lock);
236         /*
237          * Read kvm->arch.apic_map_dirty before kvm->arch.apic_map
238          * (if clean) or the APIC registers (if dirty).
239          */
240         if (atomic_cmpxchg_acquire(&kvm->arch.apic_map_dirty,
241                                    DIRTY, UPDATE_IN_PROGRESS) == CLEAN) {
242                 /* Someone else has updated the map. */
243                 mutex_unlock(&kvm->arch.apic_map_lock);
244                 return;
245         }
246
247         kvm_for_each_vcpu(i, vcpu, kvm)
248                 if (kvm_apic_present(vcpu))
249                         max_id = max(max_id, kvm_x2apic_id(vcpu->arch.apic));
250
251         new = kvzalloc(sizeof(struct kvm_apic_map) +
252                            sizeof(struct kvm_lapic *) * ((u64)max_id + 1),
253                            GFP_KERNEL_ACCOUNT);
254
255         if (!new)
256                 goto out;
257
258         new->max_apic_id = max_id;
259
260         kvm_for_each_vcpu(i, vcpu, kvm) {
261                 struct kvm_lapic *apic = vcpu->arch.apic;
262                 struct kvm_lapic **cluster;
263                 u16 mask;
264                 u32 ldr;
265                 u8 xapic_id;
266                 u32 x2apic_id;
267
268                 if (!kvm_apic_present(vcpu))
269                         continue;
270
271                 xapic_id = kvm_xapic_id(apic);
272                 x2apic_id = kvm_x2apic_id(apic);
273
274                 /* Hotplug hack: see kvm_apic_match_physical_addr(), ... */
275                 if ((apic_x2apic_mode(apic) || x2apic_id > 0xff) &&
276                                 x2apic_id <= new->max_apic_id)
277                         new->phys_map[x2apic_id] = apic;
278                 /*
279                  * ... xAPIC ID of VCPUs with APIC ID > 0xff will wrap-around,
280                  * prevent them from masking VCPUs with APIC ID <= 0xff.
281                  */
282                 if (!apic_x2apic_mode(apic) && !new->phys_map[xapic_id])
283                         new->phys_map[xapic_id] = apic;
284
285                 if (!kvm_apic_sw_enabled(apic))
286                         continue;
287
288                 ldr = kvm_lapic_get_reg(apic, APIC_LDR);
289
290                 if (apic_x2apic_mode(apic)) {
291                         new->mode |= KVM_APIC_MODE_X2APIC;
292                 } else if (ldr) {
293                         ldr = GET_APIC_LOGICAL_ID(ldr);
294                         if (kvm_lapic_get_reg(apic, APIC_DFR) == APIC_DFR_FLAT)
295                                 new->mode |= KVM_APIC_MODE_XAPIC_FLAT;
296                         else
297                                 new->mode |= KVM_APIC_MODE_XAPIC_CLUSTER;
298                 }
299
300                 if (!kvm_apic_map_get_logical_dest(new, ldr, &cluster, &mask))
301                         continue;
302
303                 if (mask)
304                         cluster[ffs(mask) - 1] = apic;
305         }
306 out:
307         old = rcu_dereference_protected(kvm->arch.apic_map,
308                         lockdep_is_held(&kvm->arch.apic_map_lock));
309         rcu_assign_pointer(kvm->arch.apic_map, new);
310         /*
311          * Write kvm->arch.apic_map before clearing apic->apic_map_dirty.
312          * If another update has come in, leave it DIRTY.
313          */
314         atomic_cmpxchg_release(&kvm->arch.apic_map_dirty,
315                                UPDATE_IN_PROGRESS, CLEAN);
316         mutex_unlock(&kvm->arch.apic_map_lock);
317
318         if (old)
319                 call_rcu(&old->rcu, kvm_apic_map_free);
320
321         kvm_make_scan_ioapic_request(kvm);
322 }
323
324 static inline void apic_set_spiv(struct kvm_lapic *apic, u32 val)
325 {
326         bool enabled = val & APIC_SPIV_APIC_ENABLED;
327
328         kvm_lapic_set_reg(apic, APIC_SPIV, val);
329
330         if (enabled != apic->sw_enabled) {
331                 apic->sw_enabled = enabled;
332                 if (enabled)
333                         static_branch_slow_dec_deferred(&apic_sw_disabled);
334                 else
335                         static_branch_inc(&apic_sw_disabled.key);
336
337                 atomic_set_release(&apic->vcpu->kvm->arch.apic_map_dirty, DIRTY);
338         }
339
340         /* Check if there are APF page ready requests pending */
341         if (enabled)
342                 kvm_make_request(KVM_REQ_APF_READY, apic->vcpu);
343 }
344
345 static inline void kvm_apic_set_xapic_id(struct kvm_lapic *apic, u8 id)
346 {
347         kvm_lapic_set_reg(apic, APIC_ID, id << 24);
348         atomic_set_release(&apic->vcpu->kvm->arch.apic_map_dirty, DIRTY);
349 }
350
351 static inline void kvm_apic_set_ldr(struct kvm_lapic *apic, u32 id)
352 {
353         kvm_lapic_set_reg(apic, APIC_LDR, id);
354         atomic_set_release(&apic->vcpu->kvm->arch.apic_map_dirty, DIRTY);
355 }
356
357 static inline void kvm_apic_set_dfr(struct kvm_lapic *apic, u32 val)
358 {
359         kvm_lapic_set_reg(apic, APIC_DFR, val);
360         atomic_set_release(&apic->vcpu->kvm->arch.apic_map_dirty, DIRTY);
361 }
362
363 static inline u32 kvm_apic_calc_x2apic_ldr(u32 id)
364 {
365         return ((id >> 4) << 16) | (1 << (id & 0xf));
366 }
367
368 static inline void kvm_apic_set_x2apic_id(struct kvm_lapic *apic, u32 id)
369 {
370         u32 ldr = kvm_apic_calc_x2apic_ldr(id);
371
372         WARN_ON_ONCE(id != apic->vcpu->vcpu_id);
373
374         kvm_lapic_set_reg(apic, APIC_ID, id);
375         kvm_lapic_set_reg(apic, APIC_LDR, ldr);
376         atomic_set_release(&apic->vcpu->kvm->arch.apic_map_dirty, DIRTY);
377 }
378
379 static inline int apic_lvt_enabled(struct kvm_lapic *apic, int lvt_type)
380 {
381         return !(kvm_lapic_get_reg(apic, lvt_type) & APIC_LVT_MASKED);
382 }
383
384 static inline int apic_lvtt_oneshot(struct kvm_lapic *apic)
385 {
386         return apic->lapic_timer.timer_mode == APIC_LVT_TIMER_ONESHOT;
387 }
388
389 static inline int apic_lvtt_period(struct kvm_lapic *apic)
390 {
391         return apic->lapic_timer.timer_mode == APIC_LVT_TIMER_PERIODIC;
392 }
393
394 static inline int apic_lvtt_tscdeadline(struct kvm_lapic *apic)
395 {
396         return apic->lapic_timer.timer_mode == APIC_LVT_TIMER_TSCDEADLINE;
397 }
398
399 static inline int apic_lvt_nmi_mode(u32 lvt_val)
400 {
401         return (lvt_val & (APIC_MODE_MASK | APIC_LVT_MASKED)) == APIC_DM_NMI;
402 }
403
404 static inline bool kvm_lapic_lvt_supported(struct kvm_lapic *apic, int lvt_index)
405 {
406         return apic->nr_lvt_entries > lvt_index;
407 }
408
409 static inline int kvm_apic_calc_nr_lvt_entries(struct kvm_vcpu *vcpu)
410 {
411         return KVM_APIC_MAX_NR_LVT_ENTRIES - !(vcpu->arch.mcg_cap & MCG_CMCI_P);
412 }
413
414 void kvm_apic_set_version(struct kvm_vcpu *vcpu)
415 {
416         struct kvm_lapic *apic = vcpu->arch.apic;
417         u32 v = 0;
418
419         if (!lapic_in_kernel(vcpu))
420                 return;
421
422         v = APIC_VERSION | ((apic->nr_lvt_entries - 1) << 16);
423
424         /*
425          * KVM emulates 82093AA datasheet (with in-kernel IOAPIC implementation)
426          * which doesn't have EOI register; Some buggy OSes (e.g. Windows with
427          * Hyper-V role) disable EOI broadcast in lapic not checking for IOAPIC
428          * version first and level-triggered interrupts never get EOIed in
429          * IOAPIC.
430          */
431         if (guest_cpuid_has(vcpu, X86_FEATURE_X2APIC) &&
432             !ioapic_in_kernel(vcpu->kvm))
433                 v |= APIC_LVR_DIRECTED_EOI;
434         kvm_lapic_set_reg(apic, APIC_LVR, v);
435 }
436
437 void kvm_apic_after_set_mcg_cap(struct kvm_vcpu *vcpu)
438 {
439         int nr_lvt_entries = kvm_apic_calc_nr_lvt_entries(vcpu);
440         struct kvm_lapic *apic = vcpu->arch.apic;
441         int i;
442
443         if (!lapic_in_kernel(vcpu) || nr_lvt_entries == apic->nr_lvt_entries)
444                 return;
445
446         /* Initialize/mask any "new" LVT entries. */
447         for (i = apic->nr_lvt_entries; i < nr_lvt_entries; i++)
448                 kvm_lapic_set_reg(apic, APIC_LVTx(i), APIC_LVT_MASKED);
449
450         apic->nr_lvt_entries = nr_lvt_entries;
451
452         /* The number of LVT entries is reflected in the version register. */
453         kvm_apic_set_version(vcpu);
454 }
455
456 static const unsigned int apic_lvt_mask[KVM_APIC_MAX_NR_LVT_ENTRIES] = {
457         [LVT_TIMER] = LVT_MASK,      /* timer mode mask added at runtime */
458         [LVT_THERMAL_MONITOR] = LVT_MASK | APIC_MODE_MASK,
459         [LVT_PERFORMANCE_COUNTER] = LVT_MASK | APIC_MODE_MASK,
460         [LVT_LINT0] = LINT_MASK,
461         [LVT_LINT1] = LINT_MASK,
462         [LVT_ERROR] = LVT_MASK,
463         [LVT_CMCI] = LVT_MASK | APIC_MODE_MASK
464 };
465
466 static int find_highest_vector(void *bitmap)
467 {
468         int vec;
469         u32 *reg;
470
471         for (vec = MAX_APIC_VECTOR - APIC_VECTORS_PER_REG;
472              vec >= 0; vec -= APIC_VECTORS_PER_REG) {
473                 reg = bitmap + REG_POS(vec);
474                 if (*reg)
475                         return __fls(*reg) + vec;
476         }
477
478         return -1;
479 }
480
481 static u8 count_vectors(void *bitmap)
482 {
483         int vec;
484         u32 *reg;
485         u8 count = 0;
486
487         for (vec = 0; vec < MAX_APIC_VECTOR; vec += APIC_VECTORS_PER_REG) {
488                 reg = bitmap + REG_POS(vec);
489                 count += hweight32(*reg);
490         }
491
492         return count;
493 }
494
495 bool __kvm_apic_update_irr(u32 *pir, void *regs, int *max_irr)
496 {
497         u32 i, vec;
498         u32 pir_val, irr_val, prev_irr_val;
499         int max_updated_irr;
500
501         max_updated_irr = -1;
502         *max_irr = -1;
503
504         for (i = vec = 0; i <= 7; i++, vec += 32) {
505                 pir_val = READ_ONCE(pir[i]);
506                 irr_val = *((u32 *)(regs + APIC_IRR + i * 0x10));
507                 if (pir_val) {
508                         prev_irr_val = irr_val;
509                         irr_val |= xchg(&pir[i], 0);
510                         *((u32 *)(regs + APIC_IRR + i * 0x10)) = irr_val;
511                         if (prev_irr_val != irr_val) {
512                                 max_updated_irr =
513                                         __fls(irr_val ^ prev_irr_val) + vec;
514                         }
515                 }
516                 if (irr_val)
517                         *max_irr = __fls(irr_val) + vec;
518         }
519
520         return ((max_updated_irr != -1) &&
521                 (max_updated_irr == *max_irr));
522 }
523 EXPORT_SYMBOL_GPL(__kvm_apic_update_irr);
524
525 bool kvm_apic_update_irr(struct kvm_vcpu *vcpu, u32 *pir, int *max_irr)
526 {
527         struct kvm_lapic *apic = vcpu->arch.apic;
528
529         return __kvm_apic_update_irr(pir, apic->regs, max_irr);
530 }
531 EXPORT_SYMBOL_GPL(kvm_apic_update_irr);
532
533 static inline int apic_search_irr(struct kvm_lapic *apic)
534 {
535         return find_highest_vector(apic->regs + APIC_IRR);
536 }
537
538 static inline int apic_find_highest_irr(struct kvm_lapic *apic)
539 {
540         int result;
541
542         /*
543          * Note that irr_pending is just a hint. It will be always
544          * true with virtual interrupt delivery enabled.
545          */
546         if (!apic->irr_pending)
547                 return -1;
548
549         result = apic_search_irr(apic);
550         ASSERT(result == -1 || result >= 16);
551
552         return result;
553 }
554
555 static inline void apic_clear_irr(int vec, struct kvm_lapic *apic)
556 {
557         if (unlikely(apic->apicv_active)) {
558                 /* need to update RVI */
559                 kvm_lapic_clear_vector(vec, apic->regs + APIC_IRR);
560                 static_call_cond(kvm_x86_hwapic_irr_update)(apic->vcpu,
561                                                             apic_find_highest_irr(apic));
562         } else {
563                 apic->irr_pending = false;
564                 kvm_lapic_clear_vector(vec, apic->regs + APIC_IRR);
565                 if (apic_search_irr(apic) != -1)
566                         apic->irr_pending = true;
567         }
568 }
569
570 void kvm_apic_clear_irr(struct kvm_vcpu *vcpu, int vec)
571 {
572         apic_clear_irr(vec, vcpu->arch.apic);
573 }
574 EXPORT_SYMBOL_GPL(kvm_apic_clear_irr);
575
576 static inline void apic_set_isr(int vec, struct kvm_lapic *apic)
577 {
578         if (__apic_test_and_set_vector(vec, apic->regs + APIC_ISR))
579                 return;
580
581         /*
582          * With APIC virtualization enabled, all caching is disabled
583          * because the processor can modify ISR under the hood.  Instead
584          * just set SVI.
585          */
586         if (unlikely(apic->apicv_active))
587                 static_call_cond(kvm_x86_hwapic_isr_update)(vec);
588         else {
589                 ++apic->isr_count;
590                 BUG_ON(apic->isr_count > MAX_APIC_VECTOR);
591                 /*
592                  * ISR (in service register) bit is set when injecting an interrupt.
593                  * The highest vector is injected. Thus the latest bit set matches
594                  * the highest bit in ISR.
595                  */
596                 apic->highest_isr_cache = vec;
597         }
598 }
599
600 static inline int apic_find_highest_isr(struct kvm_lapic *apic)
601 {
602         int result;
603
604         /*
605          * Note that isr_count is always 1, and highest_isr_cache
606          * is always -1, with APIC virtualization enabled.
607          */
608         if (!apic->isr_count)
609                 return -1;
610         if (likely(apic->highest_isr_cache != -1))
611                 return apic->highest_isr_cache;
612
613         result = find_highest_vector(apic->regs + APIC_ISR);
614         ASSERT(result == -1 || result >= 16);
615
616         return result;
617 }
618
619 static inline void apic_clear_isr(int vec, struct kvm_lapic *apic)
620 {
621         if (!__apic_test_and_clear_vector(vec, apic->regs + APIC_ISR))
622                 return;
623
624         /*
625          * We do get here for APIC virtualization enabled if the guest
626          * uses the Hyper-V APIC enlightenment.  In this case we may need
627          * to trigger a new interrupt delivery by writing the SVI field;
628          * on the other hand isr_count and highest_isr_cache are unused
629          * and must be left alone.
630          */
631         if (unlikely(apic->apicv_active))
632                 static_call_cond(kvm_x86_hwapic_isr_update)(apic_find_highest_isr(apic));
633         else {
634                 --apic->isr_count;
635                 BUG_ON(apic->isr_count < 0);
636                 apic->highest_isr_cache = -1;
637         }
638 }
639
640 int kvm_lapic_find_highest_irr(struct kvm_vcpu *vcpu)
641 {
642         /* This may race with setting of irr in __apic_accept_irq() and
643          * value returned may be wrong, but kvm_vcpu_kick() in __apic_accept_irq
644          * will cause vmexit immediately and the value will be recalculated
645          * on the next vmentry.
646          */
647         return apic_find_highest_irr(vcpu->arch.apic);
648 }
649 EXPORT_SYMBOL_GPL(kvm_lapic_find_highest_irr);
650
651 static int __apic_accept_irq(struct kvm_lapic *apic, int delivery_mode,
652                              int vector, int level, int trig_mode,
653                              struct dest_map *dest_map);
654
655 int kvm_apic_set_irq(struct kvm_vcpu *vcpu, struct kvm_lapic_irq *irq,
656                      struct dest_map *dest_map)
657 {
658         struct kvm_lapic *apic = vcpu->arch.apic;
659
660         return __apic_accept_irq(apic, irq->delivery_mode, irq->vector,
661                         irq->level, irq->trig_mode, dest_map);
662 }
663
664 static int __pv_send_ipi(unsigned long *ipi_bitmap, struct kvm_apic_map *map,
665                          struct kvm_lapic_irq *irq, u32 min)
666 {
667         int i, count = 0;
668         struct kvm_vcpu *vcpu;
669
670         if (min > map->max_apic_id)
671                 return 0;
672
673         for_each_set_bit(i, ipi_bitmap,
674                 min((u32)BITS_PER_LONG, (map->max_apic_id - min + 1))) {
675                 if (map->phys_map[min + i]) {
676                         vcpu = map->phys_map[min + i]->vcpu;
677                         count += kvm_apic_set_irq(vcpu, irq, NULL);
678                 }
679         }
680
681         return count;
682 }
683
684 int kvm_pv_send_ipi(struct kvm *kvm, unsigned long ipi_bitmap_low,
685                     unsigned long ipi_bitmap_high, u32 min,
686                     unsigned long icr, int op_64_bit)
687 {
688         struct kvm_apic_map *map;
689         struct kvm_lapic_irq irq = {0};
690         int cluster_size = op_64_bit ? 64 : 32;
691         int count;
692
693         if (icr & (APIC_DEST_MASK | APIC_SHORT_MASK))
694                 return -KVM_EINVAL;
695
696         irq.vector = icr & APIC_VECTOR_MASK;
697         irq.delivery_mode = icr & APIC_MODE_MASK;
698         irq.level = (icr & APIC_INT_ASSERT) != 0;
699         irq.trig_mode = icr & APIC_INT_LEVELTRIG;
700
701         rcu_read_lock();
702         map = rcu_dereference(kvm->arch.apic_map);
703
704         count = -EOPNOTSUPP;
705         if (likely(map)) {
706                 count = __pv_send_ipi(&ipi_bitmap_low, map, &irq, min);
707                 min += cluster_size;
708                 count += __pv_send_ipi(&ipi_bitmap_high, map, &irq, min);
709         }
710
711         rcu_read_unlock();
712         return count;
713 }
714
715 static int pv_eoi_put_user(struct kvm_vcpu *vcpu, u8 val)
716 {
717
718         return kvm_write_guest_cached(vcpu->kvm, &vcpu->arch.pv_eoi.data, &val,
719                                       sizeof(val));
720 }
721
722 static int pv_eoi_get_user(struct kvm_vcpu *vcpu, u8 *val)
723 {
724
725         return kvm_read_guest_cached(vcpu->kvm, &vcpu->arch.pv_eoi.data, val,
726                                       sizeof(*val));
727 }
728
729 static inline bool pv_eoi_enabled(struct kvm_vcpu *vcpu)
730 {
731         return vcpu->arch.pv_eoi.msr_val & KVM_MSR_ENABLED;
732 }
733
734 static void pv_eoi_set_pending(struct kvm_vcpu *vcpu)
735 {
736         if (pv_eoi_put_user(vcpu, KVM_PV_EOI_ENABLED) < 0)
737                 return;
738
739         __set_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention);
740 }
741
742 static bool pv_eoi_test_and_clr_pending(struct kvm_vcpu *vcpu)
743 {
744         u8 val;
745
746         if (pv_eoi_get_user(vcpu, &val) < 0)
747                 return false;
748
749         val &= KVM_PV_EOI_ENABLED;
750
751         if (val && pv_eoi_put_user(vcpu, KVM_PV_EOI_DISABLED) < 0)
752                 return false;
753
754         /*
755          * Clear pending bit in any case: it will be set again on vmentry.
756          * While this might not be ideal from performance point of view,
757          * this makes sure pv eoi is only enabled when we know it's safe.
758          */
759         __clear_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention);
760
761         return val;
762 }
763
764 static int apic_has_interrupt_for_ppr(struct kvm_lapic *apic, u32 ppr)
765 {
766         int highest_irr;
767         if (kvm_x86_ops.sync_pir_to_irr)
768                 highest_irr = static_call(kvm_x86_sync_pir_to_irr)(apic->vcpu);
769         else
770                 highest_irr = apic_find_highest_irr(apic);
771         if (highest_irr == -1 || (highest_irr & 0xF0) <= ppr)
772                 return -1;
773         return highest_irr;
774 }
775
776 static bool __apic_update_ppr(struct kvm_lapic *apic, u32 *new_ppr)
777 {
778         u32 tpr, isrv, ppr, old_ppr;
779         int isr;
780
781         old_ppr = kvm_lapic_get_reg(apic, APIC_PROCPRI);
782         tpr = kvm_lapic_get_reg(apic, APIC_TASKPRI);
783         isr = apic_find_highest_isr(apic);
784         isrv = (isr != -1) ? isr : 0;
785
786         if ((tpr & 0xf0) >= (isrv & 0xf0))
787                 ppr = tpr & 0xff;
788         else
789                 ppr = isrv & 0xf0;
790
791         *new_ppr = ppr;
792         if (old_ppr != ppr)
793                 kvm_lapic_set_reg(apic, APIC_PROCPRI, ppr);
794
795         return ppr < old_ppr;
796 }
797
798 static void apic_update_ppr(struct kvm_lapic *apic)
799 {
800         u32 ppr;
801
802         if (__apic_update_ppr(apic, &ppr) &&
803             apic_has_interrupt_for_ppr(apic, ppr) != -1)
804                 kvm_make_request(KVM_REQ_EVENT, apic->vcpu);
805 }
806
807 void kvm_apic_update_ppr(struct kvm_vcpu *vcpu)
808 {
809         apic_update_ppr(vcpu->arch.apic);
810 }
811 EXPORT_SYMBOL_GPL(kvm_apic_update_ppr);
812
813 static void apic_set_tpr(struct kvm_lapic *apic, u32 tpr)
814 {
815         kvm_lapic_set_reg(apic, APIC_TASKPRI, tpr);
816         apic_update_ppr(apic);
817 }
818
819 static bool kvm_apic_broadcast(struct kvm_lapic *apic, u32 mda)
820 {
821         return mda == (apic_x2apic_mode(apic) ?
822                         X2APIC_BROADCAST : APIC_BROADCAST);
823 }
824
825 static bool kvm_apic_match_physical_addr(struct kvm_lapic *apic, u32 mda)
826 {
827         if (kvm_apic_broadcast(apic, mda))
828                 return true;
829
830         /*
831          * Hotplug hack: Accept interrupts for vCPUs in xAPIC mode as if they
832          * were in x2APIC mode if the target APIC ID can't be encoded as an
833          * xAPIC ID.  This allows unique addressing of hotplugged vCPUs (which
834          * start in xAPIC mode) with an APIC ID that is unaddressable in xAPIC
835          * mode.  Match the x2APIC ID if and only if the target APIC ID can't
836          * be encoded in xAPIC to avoid spurious matches against a vCPU that
837          * changed its (addressable) xAPIC ID (which is writable).
838          */
839         if (apic_x2apic_mode(apic) || mda > 0xff)
840                 return mda == kvm_x2apic_id(apic);
841
842         return mda == kvm_xapic_id(apic);
843 }
844
845 static bool kvm_apic_match_logical_addr(struct kvm_lapic *apic, u32 mda)
846 {
847         u32 logical_id;
848
849         if (kvm_apic_broadcast(apic, mda))
850                 return true;
851
852         logical_id = kvm_lapic_get_reg(apic, APIC_LDR);
853
854         if (apic_x2apic_mode(apic))
855                 return ((logical_id >> 16) == (mda >> 16))
856                        && (logical_id & mda & 0xffff) != 0;
857
858         logical_id = GET_APIC_LOGICAL_ID(logical_id);
859
860         switch (kvm_lapic_get_reg(apic, APIC_DFR)) {
861         case APIC_DFR_FLAT:
862                 return (logical_id & mda) != 0;
863         case APIC_DFR_CLUSTER:
864                 return ((logical_id >> 4) == (mda >> 4))
865                        && (logical_id & mda & 0xf) != 0;
866         default:
867                 return false;
868         }
869 }
870
871 /* The KVM local APIC implementation has two quirks:
872  *
873  *  - Real hardware delivers interrupts destined to x2APIC ID > 0xff to LAPICs
874  *    in xAPIC mode if the "destination & 0xff" matches its xAPIC ID.
875  *    KVM doesn't do that aliasing.
876  *
877  *  - in-kernel IOAPIC messages have to be delivered directly to
878  *    x2APIC, because the kernel does not support interrupt remapping.
879  *    In order to support broadcast without interrupt remapping, x2APIC
880  *    rewrites the destination of non-IPI messages from APIC_BROADCAST
881  *    to X2APIC_BROADCAST.
882  *
883  * The broadcast quirk can be disabled with KVM_CAP_X2APIC_API.  This is
884  * important when userspace wants to use x2APIC-format MSIs, because
885  * APIC_BROADCAST (0xff) is a legal route for "cluster 0, CPUs 0-7".
886  */
887 static u32 kvm_apic_mda(struct kvm_vcpu *vcpu, unsigned int dest_id,
888                 struct kvm_lapic *source, struct kvm_lapic *target)
889 {
890         bool ipi = source != NULL;
891
892         if (!vcpu->kvm->arch.x2apic_broadcast_quirk_disabled &&
893             !ipi && dest_id == APIC_BROADCAST && apic_x2apic_mode(target))
894                 return X2APIC_BROADCAST;
895
896         return dest_id;
897 }
898
899 bool kvm_apic_match_dest(struct kvm_vcpu *vcpu, struct kvm_lapic *source,
900                            int shorthand, unsigned int dest, int dest_mode)
901 {
902         struct kvm_lapic *target = vcpu->arch.apic;
903         u32 mda = kvm_apic_mda(vcpu, dest, source, target);
904
905         ASSERT(target);
906         switch (shorthand) {
907         case APIC_DEST_NOSHORT:
908                 if (dest_mode == APIC_DEST_PHYSICAL)
909                         return kvm_apic_match_physical_addr(target, mda);
910                 else
911                         return kvm_apic_match_logical_addr(target, mda);
912         case APIC_DEST_SELF:
913                 return target == source;
914         case APIC_DEST_ALLINC:
915                 return true;
916         case APIC_DEST_ALLBUT:
917                 return target != source;
918         default:
919                 return false;
920         }
921 }
922 EXPORT_SYMBOL_GPL(kvm_apic_match_dest);
923
924 int kvm_vector_to_index(u32 vector, u32 dest_vcpus,
925                        const unsigned long *bitmap, u32 bitmap_size)
926 {
927         u32 mod;
928         int i, idx = -1;
929
930         mod = vector % dest_vcpus;
931
932         for (i = 0; i <= mod; i++) {
933                 idx = find_next_bit(bitmap, bitmap_size, idx + 1);
934                 BUG_ON(idx == bitmap_size);
935         }
936
937         return idx;
938 }
939
940 static void kvm_apic_disabled_lapic_found(struct kvm *kvm)
941 {
942         if (!kvm->arch.disabled_lapic_found) {
943                 kvm->arch.disabled_lapic_found = true;
944                 printk(KERN_INFO
945                        "Disabled LAPIC found during irq injection\n");
946         }
947 }
948
949 static bool kvm_apic_is_broadcast_dest(struct kvm *kvm, struct kvm_lapic **src,
950                 struct kvm_lapic_irq *irq, struct kvm_apic_map *map)
951 {
952         if (kvm->arch.x2apic_broadcast_quirk_disabled) {
953                 if ((irq->dest_id == APIC_BROADCAST &&
954                                 map->mode != KVM_APIC_MODE_X2APIC))
955                         return true;
956                 if (irq->dest_id == X2APIC_BROADCAST)
957                         return true;
958         } else {
959                 bool x2apic_ipi = src && *src && apic_x2apic_mode(*src);
960                 if (irq->dest_id == (x2apic_ipi ?
961                                      X2APIC_BROADCAST : APIC_BROADCAST))
962                         return true;
963         }
964
965         return false;
966 }
967
968 /* Return true if the interrupt can be handled by using *bitmap as index mask
969  * for valid destinations in *dst array.
970  * Return false if kvm_apic_map_get_dest_lapic did nothing useful.
971  * Note: we may have zero kvm_lapic destinations when we return true, which
972  * means that the interrupt should be dropped.  In this case, *bitmap would be
973  * zero and *dst undefined.
974  */
975 static inline bool kvm_apic_map_get_dest_lapic(struct kvm *kvm,
976                 struct kvm_lapic **src, struct kvm_lapic_irq *irq,
977                 struct kvm_apic_map *map, struct kvm_lapic ***dst,
978                 unsigned long *bitmap)
979 {
980         int i, lowest;
981
982         if (irq->shorthand == APIC_DEST_SELF && src) {
983                 *dst = src;
984                 *bitmap = 1;
985                 return true;
986         } else if (irq->shorthand)
987                 return false;
988
989         if (!map || kvm_apic_is_broadcast_dest(kvm, src, irq, map))
990                 return false;
991
992         if (irq->dest_mode == APIC_DEST_PHYSICAL) {
993                 if (irq->dest_id > map->max_apic_id) {
994                         *bitmap = 0;
995                 } else {
996                         u32 dest_id = array_index_nospec(irq->dest_id, map->max_apic_id + 1);
997                         *dst = &map->phys_map[dest_id];
998                         *bitmap = 1;
999                 }
1000                 return true;
1001         }
1002
1003         *bitmap = 0;
1004         if (!kvm_apic_map_get_logical_dest(map, irq->dest_id, dst,
1005                                 (u16 *)bitmap))
1006                 return false;
1007
1008         if (!kvm_lowest_prio_delivery(irq))
1009                 return true;
1010
1011         if (!kvm_vector_hashing_enabled()) {
1012                 lowest = -1;
1013                 for_each_set_bit(i, bitmap, 16) {
1014                         if (!(*dst)[i])
1015                                 continue;
1016                         if (lowest < 0)
1017                                 lowest = i;
1018                         else if (kvm_apic_compare_prio((*dst)[i]->vcpu,
1019                                                 (*dst)[lowest]->vcpu) < 0)
1020                                 lowest = i;
1021                 }
1022         } else {
1023                 if (!*bitmap)
1024                         return true;
1025
1026                 lowest = kvm_vector_to_index(irq->vector, hweight16(*bitmap),
1027                                 bitmap, 16);
1028
1029                 if (!(*dst)[lowest]) {
1030                         kvm_apic_disabled_lapic_found(kvm);
1031                         *bitmap = 0;
1032                         return true;
1033                 }
1034         }
1035
1036         *bitmap = (lowest >= 0) ? 1 << lowest : 0;
1037
1038         return true;
1039 }
1040
1041 bool kvm_irq_delivery_to_apic_fast(struct kvm *kvm, struct kvm_lapic *src,
1042                 struct kvm_lapic_irq *irq, int *r, struct dest_map *dest_map)
1043 {
1044         struct kvm_apic_map *map;
1045         unsigned long bitmap;
1046         struct kvm_lapic **dst = NULL;
1047         int i;
1048         bool ret;
1049
1050         *r = -1;
1051
1052         if (irq->shorthand == APIC_DEST_SELF) {
1053                 if (KVM_BUG_ON(!src, kvm)) {
1054                         *r = 0;
1055                         return true;
1056                 }
1057                 *r = kvm_apic_set_irq(src->vcpu, irq, dest_map);
1058                 return true;
1059         }
1060
1061         rcu_read_lock();
1062         map = rcu_dereference(kvm->arch.apic_map);
1063
1064         ret = kvm_apic_map_get_dest_lapic(kvm, &src, irq, map, &dst, &bitmap);
1065         if (ret) {
1066                 *r = 0;
1067                 for_each_set_bit(i, &bitmap, 16) {
1068                         if (!dst[i])
1069                                 continue;
1070                         *r += kvm_apic_set_irq(dst[i]->vcpu, irq, dest_map);
1071                 }
1072         }
1073
1074         rcu_read_unlock();
1075         return ret;
1076 }
1077
1078 /*
1079  * This routine tries to handle interrupts in posted mode, here is how
1080  * it deals with different cases:
1081  * - For single-destination interrupts, handle it in posted mode
1082  * - Else if vector hashing is enabled and it is a lowest-priority
1083  *   interrupt, handle it in posted mode and use the following mechanism
1084  *   to find the destination vCPU.
1085  *      1. For lowest-priority interrupts, store all the possible
1086  *         destination vCPUs in an array.
1087  *      2. Use "guest vector % max number of destination vCPUs" to find
1088  *         the right destination vCPU in the array for the lowest-priority
1089  *         interrupt.
1090  * - Otherwise, use remapped mode to inject the interrupt.
1091  */
1092 bool kvm_intr_is_single_vcpu_fast(struct kvm *kvm, struct kvm_lapic_irq *irq,
1093                         struct kvm_vcpu **dest_vcpu)
1094 {
1095         struct kvm_apic_map *map;
1096         unsigned long bitmap;
1097         struct kvm_lapic **dst = NULL;
1098         bool ret = false;
1099
1100         if (irq->shorthand)
1101                 return false;
1102
1103         rcu_read_lock();
1104         map = rcu_dereference(kvm->arch.apic_map);
1105
1106         if (kvm_apic_map_get_dest_lapic(kvm, NULL, irq, map, &dst, &bitmap) &&
1107                         hweight16(bitmap) == 1) {
1108                 unsigned long i = find_first_bit(&bitmap, 16);
1109
1110                 if (dst[i]) {
1111                         *dest_vcpu = dst[i]->vcpu;
1112                         ret = true;
1113                 }
1114         }
1115
1116         rcu_read_unlock();
1117         return ret;
1118 }
1119
1120 /*
1121  * Add a pending IRQ into lapic.
1122  * Return 1 if successfully added and 0 if discarded.
1123  */
1124 static int __apic_accept_irq(struct kvm_lapic *apic, int delivery_mode,
1125                              int vector, int level, int trig_mode,
1126                              struct dest_map *dest_map)
1127 {
1128         int result = 0;
1129         struct kvm_vcpu *vcpu = apic->vcpu;
1130
1131         trace_kvm_apic_accept_irq(vcpu->vcpu_id, delivery_mode,
1132                                   trig_mode, vector);
1133         switch (delivery_mode) {
1134         case APIC_DM_LOWEST:
1135                 vcpu->arch.apic_arb_prio++;
1136                 fallthrough;
1137         case APIC_DM_FIXED:
1138                 if (unlikely(trig_mode && !level))
1139                         break;
1140
1141                 /* FIXME add logic for vcpu on reset */
1142                 if (unlikely(!apic_enabled(apic)))
1143                         break;
1144
1145                 result = 1;
1146
1147                 if (dest_map) {
1148                         __set_bit(vcpu->vcpu_id, dest_map->map);
1149                         dest_map->vectors[vcpu->vcpu_id] = vector;
1150                 }
1151
1152                 if (apic_test_vector(vector, apic->regs + APIC_TMR) != !!trig_mode) {
1153                         if (trig_mode)
1154                                 kvm_lapic_set_vector(vector,
1155                                                      apic->regs + APIC_TMR);
1156                         else
1157                                 kvm_lapic_clear_vector(vector,
1158                                                        apic->regs + APIC_TMR);
1159                 }
1160
1161                 static_call(kvm_x86_deliver_interrupt)(apic, delivery_mode,
1162                                                        trig_mode, vector);
1163                 break;
1164
1165         case APIC_DM_REMRD:
1166                 result = 1;
1167                 vcpu->arch.pv.pv_unhalted = 1;
1168                 kvm_make_request(KVM_REQ_EVENT, vcpu);
1169                 kvm_vcpu_kick(vcpu);
1170                 break;
1171
1172         case APIC_DM_SMI:
1173                 result = 1;
1174                 kvm_make_request(KVM_REQ_SMI, vcpu);
1175                 kvm_vcpu_kick(vcpu);
1176                 break;
1177
1178         case APIC_DM_NMI:
1179                 result = 1;
1180                 kvm_inject_nmi(vcpu);
1181                 kvm_vcpu_kick(vcpu);
1182                 break;
1183
1184         case APIC_DM_INIT:
1185                 if (!trig_mode || level) {
1186                         result = 1;
1187                         /* assumes that there are only KVM_APIC_INIT/SIPI */
1188                         apic->pending_events = (1UL << KVM_APIC_INIT);
1189                         kvm_make_request(KVM_REQ_EVENT, vcpu);
1190                         kvm_vcpu_kick(vcpu);
1191                 }
1192                 break;
1193
1194         case APIC_DM_STARTUP:
1195                 result = 1;
1196                 apic->sipi_vector = vector;
1197                 /* make sure sipi_vector is visible for the receiver */
1198                 smp_wmb();
1199                 set_bit(KVM_APIC_SIPI, &apic->pending_events);
1200                 kvm_make_request(KVM_REQ_EVENT, vcpu);
1201                 kvm_vcpu_kick(vcpu);
1202                 break;
1203
1204         case APIC_DM_EXTINT:
1205                 /*
1206                  * Should only be called by kvm_apic_local_deliver() with LVT0,
1207                  * before NMI watchdog was enabled. Already handled by
1208                  * kvm_apic_accept_pic_intr().
1209                  */
1210                 break;
1211
1212         default:
1213                 printk(KERN_ERR "TODO: unsupported delivery mode %x\n",
1214                        delivery_mode);
1215                 break;
1216         }
1217         return result;
1218 }
1219
1220 /*
1221  * This routine identifies the destination vcpus mask meant to receive the
1222  * IOAPIC interrupts. It either uses kvm_apic_map_get_dest_lapic() to find
1223  * out the destination vcpus array and set the bitmap or it traverses to
1224  * each available vcpu to identify the same.
1225  */
1226 void kvm_bitmap_or_dest_vcpus(struct kvm *kvm, struct kvm_lapic_irq *irq,
1227                               unsigned long *vcpu_bitmap)
1228 {
1229         struct kvm_lapic **dest_vcpu = NULL;
1230         struct kvm_lapic *src = NULL;
1231         struct kvm_apic_map *map;
1232         struct kvm_vcpu *vcpu;
1233         unsigned long bitmap, i;
1234         int vcpu_idx;
1235         bool ret;
1236
1237         rcu_read_lock();
1238         map = rcu_dereference(kvm->arch.apic_map);
1239
1240         ret = kvm_apic_map_get_dest_lapic(kvm, &src, irq, map, &dest_vcpu,
1241                                           &bitmap);
1242         if (ret) {
1243                 for_each_set_bit(i, &bitmap, 16) {
1244                         if (!dest_vcpu[i])
1245                                 continue;
1246                         vcpu_idx = dest_vcpu[i]->vcpu->vcpu_idx;
1247                         __set_bit(vcpu_idx, vcpu_bitmap);
1248                 }
1249         } else {
1250                 kvm_for_each_vcpu(i, vcpu, kvm) {
1251                         if (!kvm_apic_present(vcpu))
1252                                 continue;
1253                         if (!kvm_apic_match_dest(vcpu, NULL,
1254                                                  irq->shorthand,
1255                                                  irq->dest_id,
1256                                                  irq->dest_mode))
1257                                 continue;
1258                         __set_bit(i, vcpu_bitmap);
1259                 }
1260         }
1261         rcu_read_unlock();
1262 }
1263
1264 int kvm_apic_compare_prio(struct kvm_vcpu *vcpu1, struct kvm_vcpu *vcpu2)
1265 {
1266         return vcpu1->arch.apic_arb_prio - vcpu2->arch.apic_arb_prio;
1267 }
1268
1269 static bool kvm_ioapic_handles_vector(struct kvm_lapic *apic, int vector)
1270 {
1271         return test_bit(vector, apic->vcpu->arch.ioapic_handled_vectors);
1272 }
1273
1274 static void kvm_ioapic_send_eoi(struct kvm_lapic *apic, int vector)
1275 {
1276         int trigger_mode;
1277
1278         /* Eoi the ioapic only if the ioapic doesn't own the vector. */
1279         if (!kvm_ioapic_handles_vector(apic, vector))
1280                 return;
1281
1282         /* Request a KVM exit to inform the userspace IOAPIC. */
1283         if (irqchip_split(apic->vcpu->kvm)) {
1284                 apic->vcpu->arch.pending_ioapic_eoi = vector;
1285                 kvm_make_request(KVM_REQ_IOAPIC_EOI_EXIT, apic->vcpu);
1286                 return;
1287         }
1288
1289         if (apic_test_vector(vector, apic->regs + APIC_TMR))
1290                 trigger_mode = IOAPIC_LEVEL_TRIG;
1291         else
1292                 trigger_mode = IOAPIC_EDGE_TRIG;
1293
1294         kvm_ioapic_update_eoi(apic->vcpu, vector, trigger_mode);
1295 }
1296
1297 static int apic_set_eoi(struct kvm_lapic *apic)
1298 {
1299         int vector = apic_find_highest_isr(apic);
1300
1301         trace_kvm_eoi(apic, vector);
1302
1303         /*
1304          * Not every write EOI will has corresponding ISR,
1305          * one example is when Kernel check timer on setup_IO_APIC
1306          */
1307         if (vector == -1)
1308                 return vector;
1309
1310         apic_clear_isr(vector, apic);
1311         apic_update_ppr(apic);
1312
1313         if (to_hv_vcpu(apic->vcpu) &&
1314             test_bit(vector, to_hv_synic(apic->vcpu)->vec_bitmap))
1315                 kvm_hv_synic_send_eoi(apic->vcpu, vector);
1316
1317         kvm_ioapic_send_eoi(apic, vector);
1318         kvm_make_request(KVM_REQ_EVENT, apic->vcpu);
1319         return vector;
1320 }
1321
1322 /*
1323  * this interface assumes a trap-like exit, which has already finished
1324  * desired side effect including vISR and vPPR update.
1325  */
1326 void kvm_apic_set_eoi_accelerated(struct kvm_vcpu *vcpu, int vector)
1327 {
1328         struct kvm_lapic *apic = vcpu->arch.apic;
1329
1330         trace_kvm_eoi(apic, vector);
1331
1332         kvm_ioapic_send_eoi(apic, vector);
1333         kvm_make_request(KVM_REQ_EVENT, apic->vcpu);
1334 }
1335 EXPORT_SYMBOL_GPL(kvm_apic_set_eoi_accelerated);
1336
1337 void kvm_apic_send_ipi(struct kvm_lapic *apic, u32 icr_low, u32 icr_high)
1338 {
1339         struct kvm_lapic_irq irq;
1340
1341         /* KVM has no delay and should always clear the BUSY/PENDING flag. */
1342         WARN_ON_ONCE(icr_low & APIC_ICR_BUSY);
1343
1344         irq.vector = icr_low & APIC_VECTOR_MASK;
1345         irq.delivery_mode = icr_low & APIC_MODE_MASK;
1346         irq.dest_mode = icr_low & APIC_DEST_MASK;
1347         irq.level = (icr_low & APIC_INT_ASSERT) != 0;
1348         irq.trig_mode = icr_low & APIC_INT_LEVELTRIG;
1349         irq.shorthand = icr_low & APIC_SHORT_MASK;
1350         irq.msi_redir_hint = false;
1351         if (apic_x2apic_mode(apic))
1352                 irq.dest_id = icr_high;
1353         else
1354                 irq.dest_id = GET_XAPIC_DEST_FIELD(icr_high);
1355
1356         trace_kvm_apic_ipi(icr_low, irq.dest_id);
1357
1358         kvm_irq_delivery_to_apic(apic->vcpu->kvm, apic, &irq, NULL);
1359 }
1360 EXPORT_SYMBOL_GPL(kvm_apic_send_ipi);
1361
1362 static u32 apic_get_tmcct(struct kvm_lapic *apic)
1363 {
1364         ktime_t remaining, now;
1365         s64 ns;
1366         u32 tmcct;
1367
1368         ASSERT(apic != NULL);
1369
1370         /* if initial count is 0, current count should also be 0 */
1371         if (kvm_lapic_get_reg(apic, APIC_TMICT) == 0 ||
1372                 apic->lapic_timer.period == 0)
1373                 return 0;
1374
1375         now = ktime_get();
1376         remaining = ktime_sub(apic->lapic_timer.target_expiration, now);
1377         if (ktime_to_ns(remaining) < 0)
1378                 remaining = 0;
1379
1380         ns = mod_64(ktime_to_ns(remaining), apic->lapic_timer.period);
1381         tmcct = div64_u64(ns,
1382                          (APIC_BUS_CYCLE_NS * apic->divide_count));
1383
1384         return tmcct;
1385 }
1386
1387 static void __report_tpr_access(struct kvm_lapic *apic, bool write)
1388 {
1389         struct kvm_vcpu *vcpu = apic->vcpu;
1390         struct kvm_run *run = vcpu->run;
1391
1392         kvm_make_request(KVM_REQ_REPORT_TPR_ACCESS, vcpu);
1393         run->tpr_access.rip = kvm_rip_read(vcpu);
1394         run->tpr_access.is_write = write;
1395 }
1396
1397 static inline void report_tpr_access(struct kvm_lapic *apic, bool write)
1398 {
1399         if (apic->vcpu->arch.tpr_access_reporting)
1400                 __report_tpr_access(apic, write);
1401 }
1402
1403 static u32 __apic_read(struct kvm_lapic *apic, unsigned int offset)
1404 {
1405         u32 val = 0;
1406
1407         if (offset >= LAPIC_MMIO_LENGTH)
1408                 return 0;
1409
1410         switch (offset) {
1411         case APIC_ARBPRI:
1412                 break;
1413
1414         case APIC_TMCCT:        /* Timer CCR */
1415                 if (apic_lvtt_tscdeadline(apic))
1416                         return 0;
1417
1418                 val = apic_get_tmcct(apic);
1419                 break;
1420         case APIC_PROCPRI:
1421                 apic_update_ppr(apic);
1422                 val = kvm_lapic_get_reg(apic, offset);
1423                 break;
1424         case APIC_TASKPRI:
1425                 report_tpr_access(apic, false);
1426                 fallthrough;
1427         default:
1428                 val = kvm_lapic_get_reg(apic, offset);
1429                 break;
1430         }
1431
1432         return val;
1433 }
1434
1435 static inline struct kvm_lapic *to_lapic(struct kvm_io_device *dev)
1436 {
1437         return container_of(dev, struct kvm_lapic, dev);
1438 }
1439
1440 #define APIC_REG_MASK(reg)      (1ull << ((reg) >> 4))
1441 #define APIC_REGS_MASK(first, count) \
1442         (APIC_REG_MASK(first) * ((1ull << (count)) - 1))
1443
1444 static int kvm_lapic_reg_read(struct kvm_lapic *apic, u32 offset, int len,
1445                               void *data)
1446 {
1447         unsigned char alignment = offset & 0xf;
1448         u32 result;
1449         /* this bitmask has a bit cleared for each reserved register */
1450         u64 valid_reg_mask =
1451                 APIC_REG_MASK(APIC_ID) |
1452                 APIC_REG_MASK(APIC_LVR) |
1453                 APIC_REG_MASK(APIC_TASKPRI) |
1454                 APIC_REG_MASK(APIC_PROCPRI) |
1455                 APIC_REG_MASK(APIC_LDR) |
1456                 APIC_REG_MASK(APIC_DFR) |
1457                 APIC_REG_MASK(APIC_SPIV) |
1458                 APIC_REGS_MASK(APIC_ISR, APIC_ISR_NR) |
1459                 APIC_REGS_MASK(APIC_TMR, APIC_ISR_NR) |
1460                 APIC_REGS_MASK(APIC_IRR, APIC_ISR_NR) |
1461                 APIC_REG_MASK(APIC_ESR) |
1462                 APIC_REG_MASK(APIC_ICR) |
1463                 APIC_REG_MASK(APIC_LVTT) |
1464                 APIC_REG_MASK(APIC_LVTTHMR) |
1465                 APIC_REG_MASK(APIC_LVTPC) |
1466                 APIC_REG_MASK(APIC_LVT0) |
1467                 APIC_REG_MASK(APIC_LVT1) |
1468                 APIC_REG_MASK(APIC_LVTERR) |
1469                 APIC_REG_MASK(APIC_TMICT) |
1470                 APIC_REG_MASK(APIC_TMCCT) |
1471                 APIC_REG_MASK(APIC_TDCR);
1472
1473         if (kvm_lapic_lvt_supported(apic, LVT_CMCI))
1474                 valid_reg_mask |= APIC_REG_MASK(APIC_LVTCMCI);
1475
1476         /*
1477          * ARBPRI and ICR2 are not valid in x2APIC mode.  WARN if KVM reads ICR
1478          * in x2APIC mode as it's an 8-byte register in x2APIC and needs to be
1479          * manually handled by the caller.
1480          */
1481         if (!apic_x2apic_mode(apic))
1482                 valid_reg_mask |= APIC_REG_MASK(APIC_ARBPRI) |
1483                                   APIC_REG_MASK(APIC_ICR2);
1484         else
1485                 WARN_ON_ONCE(offset == APIC_ICR);
1486
1487         if (alignment + len > 4)
1488                 return 1;
1489
1490         if (offset > 0x3f0 || !(valid_reg_mask & APIC_REG_MASK(offset)))
1491                 return 1;
1492
1493         result = __apic_read(apic, offset & ~0xf);
1494
1495         trace_kvm_apic_read(offset, result);
1496
1497         switch (len) {
1498         case 1:
1499         case 2:
1500         case 4:
1501                 memcpy(data, (char *)&result + alignment, len);
1502                 break;
1503         default:
1504                 printk(KERN_ERR "Local APIC read with len = %x, "
1505                        "should be 1,2, or 4 instead\n", len);
1506                 break;
1507         }
1508         return 0;
1509 }
1510
1511 static int apic_mmio_in_range(struct kvm_lapic *apic, gpa_t addr)
1512 {
1513         return addr >= apic->base_address &&
1514                 addr < apic->base_address + LAPIC_MMIO_LENGTH;
1515 }
1516
1517 static int apic_mmio_read(struct kvm_vcpu *vcpu, struct kvm_io_device *this,
1518                            gpa_t address, int len, void *data)
1519 {
1520         struct kvm_lapic *apic = to_lapic(this);
1521         u32 offset = address - apic->base_address;
1522
1523         if (!apic_mmio_in_range(apic, address))
1524                 return -EOPNOTSUPP;
1525
1526         if (!kvm_apic_hw_enabled(apic) || apic_x2apic_mode(apic)) {
1527                 if (!kvm_check_has_quirk(vcpu->kvm,
1528                                          KVM_X86_QUIRK_LAPIC_MMIO_HOLE))
1529                         return -EOPNOTSUPP;
1530
1531                 memset(data, 0xff, len);
1532                 return 0;
1533         }
1534
1535         kvm_lapic_reg_read(apic, offset, len, data);
1536
1537         return 0;
1538 }
1539
1540 static void update_divide_count(struct kvm_lapic *apic)
1541 {
1542         u32 tmp1, tmp2, tdcr;
1543
1544         tdcr = kvm_lapic_get_reg(apic, APIC_TDCR);
1545         tmp1 = tdcr & 0xf;
1546         tmp2 = ((tmp1 & 0x3) | ((tmp1 & 0x8) >> 1)) + 1;
1547         apic->divide_count = 0x1 << (tmp2 & 0x7);
1548 }
1549
1550 static void limit_periodic_timer_frequency(struct kvm_lapic *apic)
1551 {
1552         /*
1553          * Do not allow the guest to program periodic timers with small
1554          * interval, since the hrtimers are not throttled by the host
1555          * scheduler.
1556          */
1557         if (apic_lvtt_period(apic) && apic->lapic_timer.period) {
1558                 s64 min_period = min_timer_period_us * 1000LL;
1559
1560                 if (apic->lapic_timer.period < min_period) {
1561                         pr_info_ratelimited(
1562                             "kvm: vcpu %i: requested %lld ns "
1563                             "lapic timer period limited to %lld ns\n",
1564                             apic->vcpu->vcpu_id,
1565                             apic->lapic_timer.period, min_period);
1566                         apic->lapic_timer.period = min_period;
1567                 }
1568         }
1569 }
1570
1571 static void cancel_hv_timer(struct kvm_lapic *apic);
1572
1573 static void cancel_apic_timer(struct kvm_lapic *apic)
1574 {
1575         hrtimer_cancel(&apic->lapic_timer.timer);
1576         preempt_disable();
1577         if (apic->lapic_timer.hv_timer_in_use)
1578                 cancel_hv_timer(apic);
1579         preempt_enable();
1580         atomic_set(&apic->lapic_timer.pending, 0);
1581 }
1582
1583 static void apic_update_lvtt(struct kvm_lapic *apic)
1584 {
1585         u32 timer_mode = kvm_lapic_get_reg(apic, APIC_LVTT) &
1586                         apic->lapic_timer.timer_mode_mask;
1587
1588         if (apic->lapic_timer.timer_mode != timer_mode) {
1589                 if (apic_lvtt_tscdeadline(apic) != (timer_mode ==
1590                                 APIC_LVT_TIMER_TSCDEADLINE)) {
1591                         cancel_apic_timer(apic);
1592                         kvm_lapic_set_reg(apic, APIC_TMICT, 0);
1593                         apic->lapic_timer.period = 0;
1594                         apic->lapic_timer.tscdeadline = 0;
1595                 }
1596                 apic->lapic_timer.timer_mode = timer_mode;
1597                 limit_periodic_timer_frequency(apic);
1598         }
1599 }
1600
1601 /*
1602  * On APICv, this test will cause a busy wait
1603  * during a higher-priority task.
1604  */
1605
1606 static bool lapic_timer_int_injected(struct kvm_vcpu *vcpu)
1607 {
1608         struct kvm_lapic *apic = vcpu->arch.apic;
1609         u32 reg = kvm_lapic_get_reg(apic, APIC_LVTT);
1610
1611         if (kvm_apic_hw_enabled(apic)) {
1612                 int vec = reg & APIC_VECTOR_MASK;
1613                 void *bitmap = apic->regs + APIC_ISR;
1614
1615                 if (apic->apicv_active)
1616                         bitmap = apic->regs + APIC_IRR;
1617
1618                 if (apic_test_vector(vec, bitmap))
1619                         return true;
1620         }
1621         return false;
1622 }
1623
1624 static inline void __wait_lapic_expire(struct kvm_vcpu *vcpu, u64 guest_cycles)
1625 {
1626         u64 timer_advance_ns = vcpu->arch.apic->lapic_timer.timer_advance_ns;
1627
1628         /*
1629          * If the guest TSC is running at a different ratio than the host, then
1630          * convert the delay to nanoseconds to achieve an accurate delay.  Note
1631          * that __delay() uses delay_tsc whenever the hardware has TSC, thus
1632          * always for VMX enabled hardware.
1633          */
1634         if (vcpu->arch.tsc_scaling_ratio == kvm_caps.default_tsc_scaling_ratio) {
1635                 __delay(min(guest_cycles,
1636                         nsec_to_cycles(vcpu, timer_advance_ns)));
1637         } else {
1638                 u64 delay_ns = guest_cycles * 1000000ULL;
1639                 do_div(delay_ns, vcpu->arch.virtual_tsc_khz);
1640                 ndelay(min_t(u32, delay_ns, timer_advance_ns));
1641         }
1642 }
1643
1644 static inline void adjust_lapic_timer_advance(struct kvm_vcpu *vcpu,
1645                                               s64 advance_expire_delta)
1646 {
1647         struct kvm_lapic *apic = vcpu->arch.apic;
1648         u32 timer_advance_ns = apic->lapic_timer.timer_advance_ns;
1649         u64 ns;
1650
1651         /* Do not adjust for tiny fluctuations or large random spikes. */
1652         if (abs(advance_expire_delta) > LAPIC_TIMER_ADVANCE_ADJUST_MAX ||
1653             abs(advance_expire_delta) < LAPIC_TIMER_ADVANCE_ADJUST_MIN)
1654                 return;
1655
1656         /* too early */
1657         if (advance_expire_delta < 0) {
1658                 ns = -advance_expire_delta * 1000000ULL;
1659                 do_div(ns, vcpu->arch.virtual_tsc_khz);
1660                 timer_advance_ns -= ns/LAPIC_TIMER_ADVANCE_ADJUST_STEP;
1661         } else {
1662         /* too late */
1663                 ns = advance_expire_delta * 1000000ULL;
1664                 do_div(ns, vcpu->arch.virtual_tsc_khz);
1665                 timer_advance_ns += ns/LAPIC_TIMER_ADVANCE_ADJUST_STEP;
1666         }
1667
1668         if (unlikely(timer_advance_ns > LAPIC_TIMER_ADVANCE_NS_MAX))
1669                 timer_advance_ns = LAPIC_TIMER_ADVANCE_NS_INIT;
1670         apic->lapic_timer.timer_advance_ns = timer_advance_ns;
1671 }
1672
1673 static void __kvm_wait_lapic_expire(struct kvm_vcpu *vcpu)
1674 {
1675         struct kvm_lapic *apic = vcpu->arch.apic;
1676         u64 guest_tsc, tsc_deadline;
1677
1678         tsc_deadline = apic->lapic_timer.expired_tscdeadline;
1679         apic->lapic_timer.expired_tscdeadline = 0;
1680         guest_tsc = kvm_read_l1_tsc(vcpu, rdtsc());
1681         trace_kvm_wait_lapic_expire(vcpu->vcpu_id, guest_tsc - tsc_deadline);
1682
1683         if (lapic_timer_advance_dynamic) {
1684                 adjust_lapic_timer_advance(vcpu, guest_tsc - tsc_deadline);
1685                 /*
1686                  * If the timer fired early, reread the TSC to account for the
1687                  * overhead of the above adjustment to avoid waiting longer
1688                  * than is necessary.
1689                  */
1690                 if (guest_tsc < tsc_deadline)
1691                         guest_tsc = kvm_read_l1_tsc(vcpu, rdtsc());
1692         }
1693
1694         if (guest_tsc < tsc_deadline)
1695                 __wait_lapic_expire(vcpu, tsc_deadline - guest_tsc);
1696 }
1697
1698 void kvm_wait_lapic_expire(struct kvm_vcpu *vcpu)
1699 {
1700         if (lapic_in_kernel(vcpu) &&
1701             vcpu->arch.apic->lapic_timer.expired_tscdeadline &&
1702             vcpu->arch.apic->lapic_timer.timer_advance_ns &&
1703             lapic_timer_int_injected(vcpu))
1704                 __kvm_wait_lapic_expire(vcpu);
1705 }
1706 EXPORT_SYMBOL_GPL(kvm_wait_lapic_expire);
1707
1708 static void kvm_apic_inject_pending_timer_irqs(struct kvm_lapic *apic)
1709 {
1710         struct kvm_timer *ktimer = &apic->lapic_timer;
1711
1712         kvm_apic_local_deliver(apic, APIC_LVTT);
1713         if (apic_lvtt_tscdeadline(apic)) {
1714                 ktimer->tscdeadline = 0;
1715         } else if (apic_lvtt_oneshot(apic)) {
1716                 ktimer->tscdeadline = 0;
1717                 ktimer->target_expiration = 0;
1718         }
1719 }
1720
1721 static void apic_timer_expired(struct kvm_lapic *apic, bool from_timer_fn)
1722 {
1723         struct kvm_vcpu *vcpu = apic->vcpu;
1724         struct kvm_timer *ktimer = &apic->lapic_timer;
1725
1726         if (atomic_read(&apic->lapic_timer.pending))
1727                 return;
1728
1729         if (apic_lvtt_tscdeadline(apic) || ktimer->hv_timer_in_use)
1730                 ktimer->expired_tscdeadline = ktimer->tscdeadline;
1731
1732         if (!from_timer_fn && apic->apicv_active) {
1733                 WARN_ON(kvm_get_running_vcpu() != vcpu);
1734                 kvm_apic_inject_pending_timer_irqs(apic);
1735                 return;
1736         }
1737
1738         if (kvm_use_posted_timer_interrupt(apic->vcpu)) {
1739                 /*
1740                  * Ensure the guest's timer has truly expired before posting an
1741                  * interrupt.  Open code the relevant checks to avoid querying
1742                  * lapic_timer_int_injected(), which will be false since the
1743                  * interrupt isn't yet injected.  Waiting until after injecting
1744                  * is not an option since that won't help a posted interrupt.
1745                  */
1746                 if (vcpu->arch.apic->lapic_timer.expired_tscdeadline &&
1747                     vcpu->arch.apic->lapic_timer.timer_advance_ns)
1748                         __kvm_wait_lapic_expire(vcpu);
1749                 kvm_apic_inject_pending_timer_irqs(apic);
1750                 return;
1751         }
1752
1753         atomic_inc(&apic->lapic_timer.pending);
1754         kvm_make_request(KVM_REQ_UNBLOCK, vcpu);
1755         if (from_timer_fn)
1756                 kvm_vcpu_kick(vcpu);
1757 }
1758
1759 static void start_sw_tscdeadline(struct kvm_lapic *apic)
1760 {
1761         struct kvm_timer *ktimer = &apic->lapic_timer;
1762         u64 guest_tsc, tscdeadline = ktimer->tscdeadline;
1763         u64 ns = 0;
1764         ktime_t expire;
1765         struct kvm_vcpu *vcpu = apic->vcpu;
1766         unsigned long this_tsc_khz = vcpu->arch.virtual_tsc_khz;
1767         unsigned long flags;
1768         ktime_t now;
1769
1770         if (unlikely(!tscdeadline || !this_tsc_khz))
1771                 return;
1772
1773         local_irq_save(flags);
1774
1775         now = ktime_get();
1776         guest_tsc = kvm_read_l1_tsc(vcpu, rdtsc());
1777
1778         ns = (tscdeadline - guest_tsc) * 1000000ULL;
1779         do_div(ns, this_tsc_khz);
1780
1781         if (likely(tscdeadline > guest_tsc) &&
1782             likely(ns > apic->lapic_timer.timer_advance_ns)) {
1783                 expire = ktime_add_ns(now, ns);
1784                 expire = ktime_sub_ns(expire, ktimer->timer_advance_ns);
1785                 hrtimer_start(&ktimer->timer, expire, HRTIMER_MODE_ABS_HARD);
1786         } else
1787                 apic_timer_expired(apic, false);
1788
1789         local_irq_restore(flags);
1790 }
1791
1792 static inline u64 tmict_to_ns(struct kvm_lapic *apic, u32 tmict)
1793 {
1794         return (u64)tmict * APIC_BUS_CYCLE_NS * (u64)apic->divide_count;
1795 }
1796
1797 static void update_target_expiration(struct kvm_lapic *apic, uint32_t old_divisor)
1798 {
1799         ktime_t now, remaining;
1800         u64 ns_remaining_old, ns_remaining_new;
1801
1802         apic->lapic_timer.period =
1803                         tmict_to_ns(apic, kvm_lapic_get_reg(apic, APIC_TMICT));
1804         limit_periodic_timer_frequency(apic);
1805
1806         now = ktime_get();
1807         remaining = ktime_sub(apic->lapic_timer.target_expiration, now);
1808         if (ktime_to_ns(remaining) < 0)
1809                 remaining = 0;
1810
1811         ns_remaining_old = ktime_to_ns(remaining);
1812         ns_remaining_new = mul_u64_u32_div(ns_remaining_old,
1813                                            apic->divide_count, old_divisor);
1814
1815         apic->lapic_timer.tscdeadline +=
1816                 nsec_to_cycles(apic->vcpu, ns_remaining_new) -
1817                 nsec_to_cycles(apic->vcpu, ns_remaining_old);
1818         apic->lapic_timer.target_expiration = ktime_add_ns(now, ns_remaining_new);
1819 }
1820
1821 static bool set_target_expiration(struct kvm_lapic *apic, u32 count_reg)
1822 {
1823         ktime_t now;
1824         u64 tscl = rdtsc();
1825         s64 deadline;
1826
1827         now = ktime_get();
1828         apic->lapic_timer.period =
1829                         tmict_to_ns(apic, kvm_lapic_get_reg(apic, APIC_TMICT));
1830
1831         if (!apic->lapic_timer.period) {
1832                 apic->lapic_timer.tscdeadline = 0;
1833                 return false;
1834         }
1835
1836         limit_periodic_timer_frequency(apic);
1837         deadline = apic->lapic_timer.period;
1838
1839         if (apic_lvtt_period(apic) || apic_lvtt_oneshot(apic)) {
1840                 if (unlikely(count_reg != APIC_TMICT)) {
1841                         deadline = tmict_to_ns(apic,
1842                                      kvm_lapic_get_reg(apic, count_reg));
1843                         if (unlikely(deadline <= 0))
1844                                 deadline = apic->lapic_timer.period;
1845                         else if (unlikely(deadline > apic->lapic_timer.period)) {
1846                                 pr_info_ratelimited(
1847                                     "kvm: vcpu %i: requested lapic timer restore with "
1848                                     "starting count register %#x=%u (%lld ns) > initial count (%lld ns). "
1849                                     "Using initial count to start timer.\n",
1850                                     apic->vcpu->vcpu_id,
1851                                     count_reg,
1852                                     kvm_lapic_get_reg(apic, count_reg),
1853                                     deadline, apic->lapic_timer.period);
1854                                 kvm_lapic_set_reg(apic, count_reg, 0);
1855                                 deadline = apic->lapic_timer.period;
1856                         }
1857                 }
1858         }
1859
1860         apic->lapic_timer.tscdeadline = kvm_read_l1_tsc(apic->vcpu, tscl) +
1861                 nsec_to_cycles(apic->vcpu, deadline);
1862         apic->lapic_timer.target_expiration = ktime_add_ns(now, deadline);
1863
1864         return true;
1865 }
1866
1867 static void advance_periodic_target_expiration(struct kvm_lapic *apic)
1868 {
1869         ktime_t now = ktime_get();
1870         u64 tscl = rdtsc();
1871         ktime_t delta;
1872
1873         /*
1874          * Synchronize both deadlines to the same time source or
1875          * differences in the periods (caused by differences in the
1876          * underlying clocks or numerical approximation errors) will
1877          * cause the two to drift apart over time as the errors
1878          * accumulate.
1879          */
1880         apic->lapic_timer.target_expiration =
1881                 ktime_add_ns(apic->lapic_timer.target_expiration,
1882                                 apic->lapic_timer.period);
1883         delta = ktime_sub(apic->lapic_timer.target_expiration, now);
1884         apic->lapic_timer.tscdeadline = kvm_read_l1_tsc(apic->vcpu, tscl) +
1885                 nsec_to_cycles(apic->vcpu, delta);
1886 }
1887
1888 static void start_sw_period(struct kvm_lapic *apic)
1889 {
1890         if (!apic->lapic_timer.period)
1891                 return;
1892
1893         if (ktime_after(ktime_get(),
1894                         apic->lapic_timer.target_expiration)) {
1895                 apic_timer_expired(apic, false);
1896
1897                 if (apic_lvtt_oneshot(apic))
1898                         return;
1899
1900                 advance_periodic_target_expiration(apic);
1901         }
1902
1903         hrtimer_start(&apic->lapic_timer.timer,
1904                 apic->lapic_timer.target_expiration,
1905                 HRTIMER_MODE_ABS_HARD);
1906 }
1907
1908 bool kvm_lapic_hv_timer_in_use(struct kvm_vcpu *vcpu)
1909 {
1910         if (!lapic_in_kernel(vcpu))
1911                 return false;
1912
1913         return vcpu->arch.apic->lapic_timer.hv_timer_in_use;
1914 }
1915 EXPORT_SYMBOL_GPL(kvm_lapic_hv_timer_in_use);
1916
1917 static void cancel_hv_timer(struct kvm_lapic *apic)
1918 {
1919         WARN_ON(preemptible());
1920         WARN_ON(!apic->lapic_timer.hv_timer_in_use);
1921         static_call(kvm_x86_cancel_hv_timer)(apic->vcpu);
1922         apic->lapic_timer.hv_timer_in_use = false;
1923 }
1924
1925 static bool start_hv_timer(struct kvm_lapic *apic)
1926 {
1927         struct kvm_timer *ktimer = &apic->lapic_timer;
1928         struct kvm_vcpu *vcpu = apic->vcpu;
1929         bool expired;
1930
1931         WARN_ON(preemptible());
1932         if (!kvm_can_use_hv_timer(vcpu))
1933                 return false;
1934
1935         if (!ktimer->tscdeadline)
1936                 return false;
1937
1938         if (static_call(kvm_x86_set_hv_timer)(vcpu, ktimer->tscdeadline, &expired))
1939                 return false;
1940
1941         ktimer->hv_timer_in_use = true;
1942         hrtimer_cancel(&ktimer->timer);
1943
1944         /*
1945          * To simplify handling the periodic timer, leave the hv timer running
1946          * even if the deadline timer has expired, i.e. rely on the resulting
1947          * VM-Exit to recompute the periodic timer's target expiration.
1948          */
1949         if (!apic_lvtt_period(apic)) {
1950                 /*
1951                  * Cancel the hv timer if the sw timer fired while the hv timer
1952                  * was being programmed, or if the hv timer itself expired.
1953                  */
1954                 if (atomic_read(&ktimer->pending)) {
1955                         cancel_hv_timer(apic);
1956                 } else if (expired) {
1957                         apic_timer_expired(apic, false);
1958                         cancel_hv_timer(apic);
1959                 }
1960         }
1961
1962         trace_kvm_hv_timer_state(vcpu->vcpu_id, ktimer->hv_timer_in_use);
1963
1964         return true;
1965 }
1966
1967 static void start_sw_timer(struct kvm_lapic *apic)
1968 {
1969         struct kvm_timer *ktimer = &apic->lapic_timer;
1970
1971         WARN_ON(preemptible());
1972         if (apic->lapic_timer.hv_timer_in_use)
1973                 cancel_hv_timer(apic);
1974         if (!apic_lvtt_period(apic) && atomic_read(&ktimer->pending))
1975                 return;
1976
1977         if (apic_lvtt_period(apic) || apic_lvtt_oneshot(apic))
1978                 start_sw_period(apic);
1979         else if (apic_lvtt_tscdeadline(apic))
1980                 start_sw_tscdeadline(apic);
1981         trace_kvm_hv_timer_state(apic->vcpu->vcpu_id, false);
1982 }
1983
1984 static void restart_apic_timer(struct kvm_lapic *apic)
1985 {
1986         preempt_disable();
1987
1988         if (!apic_lvtt_period(apic) && atomic_read(&apic->lapic_timer.pending))
1989                 goto out;
1990
1991         if (!start_hv_timer(apic))
1992                 start_sw_timer(apic);
1993 out:
1994         preempt_enable();
1995 }
1996
1997 void kvm_lapic_expired_hv_timer(struct kvm_vcpu *vcpu)
1998 {
1999         struct kvm_lapic *apic = vcpu->arch.apic;
2000
2001         preempt_disable();
2002         /* If the preempt notifier has already run, it also called apic_timer_expired */
2003         if (!apic->lapic_timer.hv_timer_in_use)
2004                 goto out;
2005         WARN_ON(kvm_vcpu_is_blocking(vcpu));
2006         apic_timer_expired(apic, false);
2007         cancel_hv_timer(apic);
2008
2009         if (apic_lvtt_period(apic) && apic->lapic_timer.period) {
2010                 advance_periodic_target_expiration(apic);
2011                 restart_apic_timer(apic);
2012         }
2013 out:
2014         preempt_enable();
2015 }
2016 EXPORT_SYMBOL_GPL(kvm_lapic_expired_hv_timer);
2017
2018 void kvm_lapic_switch_to_hv_timer(struct kvm_vcpu *vcpu)
2019 {
2020         restart_apic_timer(vcpu->arch.apic);
2021 }
2022
2023 void kvm_lapic_switch_to_sw_timer(struct kvm_vcpu *vcpu)
2024 {
2025         struct kvm_lapic *apic = vcpu->arch.apic;
2026
2027         preempt_disable();
2028         /* Possibly the TSC deadline timer is not enabled yet */
2029         if (apic->lapic_timer.hv_timer_in_use)
2030                 start_sw_timer(apic);
2031         preempt_enable();
2032 }
2033
2034 void kvm_lapic_restart_hv_timer(struct kvm_vcpu *vcpu)
2035 {
2036         struct kvm_lapic *apic = vcpu->arch.apic;
2037
2038         WARN_ON(!apic->lapic_timer.hv_timer_in_use);
2039         restart_apic_timer(apic);
2040 }
2041
2042 static void __start_apic_timer(struct kvm_lapic *apic, u32 count_reg)
2043 {
2044         atomic_set(&apic->lapic_timer.pending, 0);
2045
2046         if ((apic_lvtt_period(apic) || apic_lvtt_oneshot(apic))
2047             && !set_target_expiration(apic, count_reg))
2048                 return;
2049
2050         restart_apic_timer(apic);
2051 }
2052
2053 static void start_apic_timer(struct kvm_lapic *apic)
2054 {
2055         __start_apic_timer(apic, APIC_TMICT);
2056 }
2057
2058 static void apic_manage_nmi_watchdog(struct kvm_lapic *apic, u32 lvt0_val)
2059 {
2060         bool lvt0_in_nmi_mode = apic_lvt_nmi_mode(lvt0_val);
2061
2062         if (apic->lvt0_in_nmi_mode != lvt0_in_nmi_mode) {
2063                 apic->lvt0_in_nmi_mode = lvt0_in_nmi_mode;
2064                 if (lvt0_in_nmi_mode) {
2065                         atomic_inc(&apic->vcpu->kvm->arch.vapics_in_nmi_mode);
2066                 } else
2067                         atomic_dec(&apic->vcpu->kvm->arch.vapics_in_nmi_mode);
2068         }
2069 }
2070
2071 static void kvm_lapic_xapic_id_updated(struct kvm_lapic *apic)
2072 {
2073         struct kvm *kvm = apic->vcpu->kvm;
2074
2075         if (!kvm_apic_hw_enabled(apic))
2076                 return;
2077
2078         if (KVM_BUG_ON(apic_x2apic_mode(apic), kvm))
2079                 return;
2080
2081         /*
2082          * Deliberately truncate the vCPU ID when detecting a modified APIC ID
2083          * to avoid false positives if the vCPU ID, i.e. x2APIC ID, is a 32-bit
2084          * value.
2085          */
2086         if (kvm_xapic_id(apic) == (u8)apic->vcpu->vcpu_id)
2087                 return;
2088
2089         kvm_set_apicv_inhibit(apic->vcpu->kvm, APICV_INHIBIT_REASON_APIC_ID_MODIFIED);
2090 }
2091
2092 static int get_lvt_index(u32 reg)
2093 {
2094         if (reg == APIC_LVTCMCI)
2095                 return LVT_CMCI;
2096         if (reg < APIC_LVTT || reg > APIC_LVTERR)
2097                 return -1;
2098         return array_index_nospec(
2099                         (reg - APIC_LVTT) >> 4, KVM_APIC_MAX_NR_LVT_ENTRIES);
2100 }
2101
2102 static int kvm_lapic_reg_write(struct kvm_lapic *apic, u32 reg, u32 val)
2103 {
2104         int ret = 0;
2105
2106         trace_kvm_apic_write(reg, val);
2107
2108         switch (reg) {
2109         case APIC_ID:           /* Local APIC ID */
2110                 if (!apic_x2apic_mode(apic)) {
2111                         kvm_apic_set_xapic_id(apic, val >> 24);
2112                         kvm_lapic_xapic_id_updated(apic);
2113                 } else {
2114                         ret = 1;
2115                 }
2116                 break;
2117
2118         case APIC_TASKPRI:
2119                 report_tpr_access(apic, true);
2120                 apic_set_tpr(apic, val & 0xff);
2121                 break;
2122
2123         case APIC_EOI:
2124                 apic_set_eoi(apic);
2125                 break;
2126
2127         case APIC_LDR:
2128                 if (!apic_x2apic_mode(apic))
2129                         kvm_apic_set_ldr(apic, val & APIC_LDR_MASK);
2130                 else
2131                         ret = 1;
2132                 break;
2133
2134         case APIC_DFR:
2135                 if (!apic_x2apic_mode(apic))
2136                         kvm_apic_set_dfr(apic, val | 0x0FFFFFFF);
2137                 else
2138                         ret = 1;
2139                 break;
2140
2141         case APIC_SPIV: {
2142                 u32 mask = 0x3ff;
2143                 if (kvm_lapic_get_reg(apic, APIC_LVR) & APIC_LVR_DIRECTED_EOI)
2144                         mask |= APIC_SPIV_DIRECTED_EOI;
2145                 apic_set_spiv(apic, val & mask);
2146                 if (!(val & APIC_SPIV_APIC_ENABLED)) {
2147                         int i;
2148
2149                         for (i = 0; i < apic->nr_lvt_entries; i++) {
2150                                 kvm_lapic_set_reg(apic, APIC_LVTx(i),
2151                                         kvm_lapic_get_reg(apic, APIC_LVTx(i)) | APIC_LVT_MASKED);
2152                         }
2153                         apic_update_lvtt(apic);
2154                         atomic_set(&apic->lapic_timer.pending, 0);
2155
2156                 }
2157                 break;
2158         }
2159         case APIC_ICR:
2160                 WARN_ON_ONCE(apic_x2apic_mode(apic));
2161
2162                 /* No delay here, so we always clear the pending bit */
2163                 val &= ~APIC_ICR_BUSY;
2164                 kvm_apic_send_ipi(apic, val, kvm_lapic_get_reg(apic, APIC_ICR2));
2165                 kvm_lapic_set_reg(apic, APIC_ICR, val);
2166                 break;
2167         case APIC_ICR2:
2168                 if (apic_x2apic_mode(apic))
2169                         ret = 1;
2170                 else
2171                         kvm_lapic_set_reg(apic, APIC_ICR2, val & 0xff000000);
2172                 break;
2173
2174         case APIC_LVT0:
2175                 apic_manage_nmi_watchdog(apic, val);
2176                 fallthrough;
2177         case APIC_LVTTHMR:
2178         case APIC_LVTPC:
2179         case APIC_LVT1:
2180         case APIC_LVTERR:
2181         case APIC_LVTCMCI: {
2182                 u32 index = get_lvt_index(reg);
2183                 if (!kvm_lapic_lvt_supported(apic, index)) {
2184                         ret = 1;
2185                         break;
2186                 }
2187                 if (!kvm_apic_sw_enabled(apic))
2188                         val |= APIC_LVT_MASKED;
2189                 val &= apic_lvt_mask[index];
2190                 kvm_lapic_set_reg(apic, reg, val);
2191                 break;
2192         }
2193
2194         case APIC_LVTT:
2195                 if (!kvm_apic_sw_enabled(apic))
2196                         val |= APIC_LVT_MASKED;
2197                 val &= (apic_lvt_mask[0] | apic->lapic_timer.timer_mode_mask);
2198                 kvm_lapic_set_reg(apic, APIC_LVTT, val);
2199                 apic_update_lvtt(apic);
2200                 break;
2201
2202         case APIC_TMICT:
2203                 if (apic_lvtt_tscdeadline(apic))
2204                         break;
2205
2206                 cancel_apic_timer(apic);
2207                 kvm_lapic_set_reg(apic, APIC_TMICT, val);
2208                 start_apic_timer(apic);
2209                 break;
2210
2211         case APIC_TDCR: {
2212                 uint32_t old_divisor = apic->divide_count;
2213
2214                 kvm_lapic_set_reg(apic, APIC_TDCR, val & 0xb);
2215                 update_divide_count(apic);
2216                 if (apic->divide_count != old_divisor &&
2217                                 apic->lapic_timer.period) {
2218                         hrtimer_cancel(&apic->lapic_timer.timer);
2219                         update_target_expiration(apic, old_divisor);
2220                         restart_apic_timer(apic);
2221                 }
2222                 break;
2223         }
2224         case APIC_ESR:
2225                 if (apic_x2apic_mode(apic) && val != 0)
2226                         ret = 1;
2227                 break;
2228
2229         case APIC_SELF_IPI:
2230                 /*
2231                  * Self-IPI exists only when x2APIC is enabled.  Bits 7:0 hold
2232                  * the vector, everything else is reserved.
2233                  */
2234                 if (!apic_x2apic_mode(apic) || (val & ~APIC_VECTOR_MASK))
2235                         ret = 1;
2236                 else
2237                         kvm_apic_send_ipi(apic, APIC_DEST_SELF | val, 0);
2238                 break;
2239         default:
2240                 ret = 1;
2241                 break;
2242         }
2243
2244         /*
2245          * Recalculate APIC maps if necessary, e.g. if the software enable bit
2246          * was toggled, the APIC ID changed, etc...   The maps are marked dirty
2247          * on relevant changes, i.e. this is a nop for most writes.
2248          */
2249         kvm_recalculate_apic_map(apic->vcpu->kvm);
2250
2251         return ret;
2252 }
2253
2254 static int apic_mmio_write(struct kvm_vcpu *vcpu, struct kvm_io_device *this,
2255                             gpa_t address, int len, const void *data)
2256 {
2257         struct kvm_lapic *apic = to_lapic(this);
2258         unsigned int offset = address - apic->base_address;
2259         u32 val;
2260
2261         if (!apic_mmio_in_range(apic, address))
2262                 return -EOPNOTSUPP;
2263
2264         if (!kvm_apic_hw_enabled(apic) || apic_x2apic_mode(apic)) {
2265                 if (!kvm_check_has_quirk(vcpu->kvm,
2266                                          KVM_X86_QUIRK_LAPIC_MMIO_HOLE))
2267                         return -EOPNOTSUPP;
2268
2269                 return 0;
2270         }
2271
2272         /*
2273          * APIC register must be aligned on 128-bits boundary.
2274          * 32/64/128 bits registers must be accessed thru 32 bits.
2275          * Refer SDM 8.4.1
2276          */
2277         if (len != 4 || (offset & 0xf))
2278                 return 0;
2279
2280         val = *(u32*)data;
2281
2282         kvm_lapic_reg_write(apic, offset & 0xff0, val);
2283
2284         return 0;
2285 }
2286
2287 void kvm_lapic_set_eoi(struct kvm_vcpu *vcpu)
2288 {
2289         kvm_lapic_reg_write(vcpu->arch.apic, APIC_EOI, 0);
2290 }
2291 EXPORT_SYMBOL_GPL(kvm_lapic_set_eoi);
2292
2293 /* emulate APIC access in a trap manner */
2294 void kvm_apic_write_nodecode(struct kvm_vcpu *vcpu, u32 offset)
2295 {
2296         struct kvm_lapic *apic = vcpu->arch.apic;
2297         u64 val;
2298
2299         /*
2300          * ICR is a single 64-bit register when x2APIC is enabled.  For legacy
2301          * xAPIC, ICR writes need to go down the common (slightly slower) path
2302          * to get the upper half from ICR2.
2303          */
2304         if (apic_x2apic_mode(apic) && offset == APIC_ICR) {
2305                 val = kvm_lapic_get_reg64(apic, APIC_ICR);
2306                 kvm_apic_send_ipi(apic, (u32)val, (u32)(val >> 32));
2307                 trace_kvm_apic_write(APIC_ICR, val);
2308         } else {
2309                 /* TODO: optimize to just emulate side effect w/o one more write */
2310                 val = kvm_lapic_get_reg(apic, offset);
2311                 kvm_lapic_reg_write(apic, offset, (u32)val);
2312         }
2313 }
2314 EXPORT_SYMBOL_GPL(kvm_apic_write_nodecode);
2315
2316 void kvm_free_lapic(struct kvm_vcpu *vcpu)
2317 {
2318         struct kvm_lapic *apic = vcpu->arch.apic;
2319
2320         if (!vcpu->arch.apic)
2321                 return;
2322
2323         hrtimer_cancel(&apic->lapic_timer.timer);
2324
2325         if (!(vcpu->arch.apic_base & MSR_IA32_APICBASE_ENABLE))
2326                 static_branch_slow_dec_deferred(&apic_hw_disabled);
2327
2328         if (!apic->sw_enabled)
2329                 static_branch_slow_dec_deferred(&apic_sw_disabled);
2330
2331         if (apic->regs)
2332                 free_page((unsigned long)apic->regs);
2333
2334         kfree(apic);
2335 }
2336
2337 /*
2338  *----------------------------------------------------------------------
2339  * LAPIC interface
2340  *----------------------------------------------------------------------
2341  */
2342 u64 kvm_get_lapic_tscdeadline_msr(struct kvm_vcpu *vcpu)
2343 {
2344         struct kvm_lapic *apic = vcpu->arch.apic;
2345
2346         if (!kvm_apic_present(vcpu) || !apic_lvtt_tscdeadline(apic))
2347                 return 0;
2348
2349         return apic->lapic_timer.tscdeadline;
2350 }
2351
2352 void kvm_set_lapic_tscdeadline_msr(struct kvm_vcpu *vcpu, u64 data)
2353 {
2354         struct kvm_lapic *apic = vcpu->arch.apic;
2355
2356         if (!kvm_apic_present(vcpu) || !apic_lvtt_tscdeadline(apic))
2357                 return;
2358
2359         hrtimer_cancel(&apic->lapic_timer.timer);
2360         apic->lapic_timer.tscdeadline = data;
2361         start_apic_timer(apic);
2362 }
2363
2364 void kvm_lapic_set_tpr(struct kvm_vcpu *vcpu, unsigned long cr8)
2365 {
2366         apic_set_tpr(vcpu->arch.apic, (cr8 & 0x0f) << 4);
2367 }
2368
2369 u64 kvm_lapic_get_cr8(struct kvm_vcpu *vcpu)
2370 {
2371         u64 tpr;
2372
2373         tpr = (u64) kvm_lapic_get_reg(vcpu->arch.apic, APIC_TASKPRI);
2374
2375         return (tpr & 0xf0) >> 4;
2376 }
2377
2378 void kvm_lapic_set_base(struct kvm_vcpu *vcpu, u64 value)
2379 {
2380         u64 old_value = vcpu->arch.apic_base;
2381         struct kvm_lapic *apic = vcpu->arch.apic;
2382
2383         vcpu->arch.apic_base = value;
2384
2385         if ((old_value ^ value) & MSR_IA32_APICBASE_ENABLE)
2386                 kvm_update_cpuid_runtime(vcpu);
2387
2388         if (!apic)
2389                 return;
2390
2391         /* update jump label if enable bit changes */
2392         if ((old_value ^ value) & MSR_IA32_APICBASE_ENABLE) {
2393                 if (value & MSR_IA32_APICBASE_ENABLE) {
2394                         kvm_apic_set_xapic_id(apic, vcpu->vcpu_id);
2395                         static_branch_slow_dec_deferred(&apic_hw_disabled);
2396                         /* Check if there are APF page ready requests pending */
2397                         kvm_make_request(KVM_REQ_APF_READY, vcpu);
2398                 } else {
2399                         static_branch_inc(&apic_hw_disabled.key);
2400                         atomic_set_release(&apic->vcpu->kvm->arch.apic_map_dirty, DIRTY);
2401                 }
2402         }
2403
2404         if (((old_value ^ value) & X2APIC_ENABLE) && (value & X2APIC_ENABLE))
2405                 kvm_apic_set_x2apic_id(apic, vcpu->vcpu_id);
2406
2407         if ((old_value ^ value) & (MSR_IA32_APICBASE_ENABLE | X2APIC_ENABLE)) {
2408                 kvm_vcpu_update_apicv(vcpu);
2409                 static_call_cond(kvm_x86_set_virtual_apic_mode)(vcpu);
2410         }
2411
2412         apic->base_address = apic->vcpu->arch.apic_base &
2413                              MSR_IA32_APICBASE_BASE;
2414
2415         if ((value & MSR_IA32_APICBASE_ENABLE) &&
2416              apic->base_address != APIC_DEFAULT_PHYS_BASE) {
2417                 kvm_set_apicv_inhibit(apic->vcpu->kvm,
2418                                       APICV_INHIBIT_REASON_APIC_BASE_MODIFIED);
2419         }
2420 }
2421
2422 void kvm_apic_update_apicv(struct kvm_vcpu *vcpu)
2423 {
2424         struct kvm_lapic *apic = vcpu->arch.apic;
2425
2426         if (apic->apicv_active) {
2427                 /* irr_pending is always true when apicv is activated. */
2428                 apic->irr_pending = true;
2429                 apic->isr_count = 1;
2430         } else {
2431                 /*
2432                  * Don't clear irr_pending, searching the IRR can race with
2433                  * updates from the CPU as APICv is still active from hardware's
2434                  * perspective.  The flag will be cleared as appropriate when
2435                  * KVM injects the interrupt.
2436                  */
2437                 apic->isr_count = count_vectors(apic->regs + APIC_ISR);
2438         }
2439         apic->highest_isr_cache = -1;
2440 }
2441 EXPORT_SYMBOL_GPL(kvm_apic_update_apicv);
2442
2443 void kvm_lapic_reset(struct kvm_vcpu *vcpu, bool init_event)
2444 {
2445         struct kvm_lapic *apic = vcpu->arch.apic;
2446         u64 msr_val;
2447         int i;
2448
2449         if (!init_event) {
2450                 msr_val = APIC_DEFAULT_PHYS_BASE | MSR_IA32_APICBASE_ENABLE;
2451                 if (kvm_vcpu_is_reset_bsp(vcpu))
2452                         msr_val |= MSR_IA32_APICBASE_BSP;
2453                 kvm_lapic_set_base(vcpu, msr_val);
2454         }
2455
2456         if (!apic)
2457                 return;
2458
2459         /* Stop the timer in case it's a reset to an active apic */
2460         hrtimer_cancel(&apic->lapic_timer.timer);
2461
2462         /* The xAPIC ID is set at RESET even if the APIC was already enabled. */
2463         if (!init_event)
2464                 kvm_apic_set_xapic_id(apic, vcpu->vcpu_id);
2465         kvm_apic_set_version(apic->vcpu);
2466
2467         for (i = 0; i < apic->nr_lvt_entries; i++)
2468                 kvm_lapic_set_reg(apic, APIC_LVTx(i), APIC_LVT_MASKED);
2469         apic_update_lvtt(apic);
2470         if (kvm_vcpu_is_reset_bsp(vcpu) &&
2471             kvm_check_has_quirk(vcpu->kvm, KVM_X86_QUIRK_LINT0_REENABLED))
2472                 kvm_lapic_set_reg(apic, APIC_LVT0,
2473                              SET_APIC_DELIVERY_MODE(0, APIC_MODE_EXTINT));
2474         apic_manage_nmi_watchdog(apic, kvm_lapic_get_reg(apic, APIC_LVT0));
2475
2476         kvm_apic_set_dfr(apic, 0xffffffffU);
2477         apic_set_spiv(apic, 0xff);
2478         kvm_lapic_set_reg(apic, APIC_TASKPRI, 0);
2479         if (!apic_x2apic_mode(apic))
2480                 kvm_apic_set_ldr(apic, 0);
2481         kvm_lapic_set_reg(apic, APIC_ESR, 0);
2482         if (!apic_x2apic_mode(apic)) {
2483                 kvm_lapic_set_reg(apic, APIC_ICR, 0);
2484                 kvm_lapic_set_reg(apic, APIC_ICR2, 0);
2485         } else {
2486                 kvm_lapic_set_reg64(apic, APIC_ICR, 0);
2487         }
2488         kvm_lapic_set_reg(apic, APIC_TDCR, 0);
2489         kvm_lapic_set_reg(apic, APIC_TMICT, 0);
2490         for (i = 0; i < 8; i++) {
2491                 kvm_lapic_set_reg(apic, APIC_IRR + 0x10 * i, 0);
2492                 kvm_lapic_set_reg(apic, APIC_ISR + 0x10 * i, 0);
2493                 kvm_lapic_set_reg(apic, APIC_TMR + 0x10 * i, 0);
2494         }
2495         kvm_apic_update_apicv(vcpu);
2496         update_divide_count(apic);
2497         atomic_set(&apic->lapic_timer.pending, 0);
2498
2499         vcpu->arch.pv_eoi.msr_val = 0;
2500         apic_update_ppr(apic);
2501         if (apic->apicv_active) {
2502                 static_call_cond(kvm_x86_apicv_post_state_restore)(vcpu);
2503                 static_call_cond(kvm_x86_hwapic_irr_update)(vcpu, -1);
2504                 static_call_cond(kvm_x86_hwapic_isr_update)(-1);
2505         }
2506
2507         vcpu->arch.apic_arb_prio = 0;
2508         vcpu->arch.apic_attention = 0;
2509
2510         kvm_recalculate_apic_map(vcpu->kvm);
2511 }
2512
2513 /*
2514  *----------------------------------------------------------------------
2515  * timer interface
2516  *----------------------------------------------------------------------
2517  */
2518
2519 static bool lapic_is_periodic(struct kvm_lapic *apic)
2520 {
2521         return apic_lvtt_period(apic);
2522 }
2523
2524 int apic_has_pending_timer(struct kvm_vcpu *vcpu)
2525 {
2526         struct kvm_lapic *apic = vcpu->arch.apic;
2527
2528         if (apic_enabled(apic) && apic_lvt_enabled(apic, APIC_LVTT))
2529                 return atomic_read(&apic->lapic_timer.pending);
2530
2531         return 0;
2532 }
2533
2534 int kvm_apic_local_deliver(struct kvm_lapic *apic, int lvt_type)
2535 {
2536         u32 reg = kvm_lapic_get_reg(apic, lvt_type);
2537         int vector, mode, trig_mode;
2538
2539         if (kvm_apic_hw_enabled(apic) && !(reg & APIC_LVT_MASKED)) {
2540                 vector = reg & APIC_VECTOR_MASK;
2541                 mode = reg & APIC_MODE_MASK;
2542                 trig_mode = reg & APIC_LVT_LEVEL_TRIGGER;
2543                 return __apic_accept_irq(apic, mode, vector, 1, trig_mode,
2544                                         NULL);
2545         }
2546         return 0;
2547 }
2548
2549 void kvm_apic_nmi_wd_deliver(struct kvm_vcpu *vcpu)
2550 {
2551         struct kvm_lapic *apic = vcpu->arch.apic;
2552
2553         if (apic)
2554                 kvm_apic_local_deliver(apic, APIC_LVT0);
2555 }
2556
2557 static const struct kvm_io_device_ops apic_mmio_ops = {
2558         .read     = apic_mmio_read,
2559         .write    = apic_mmio_write,
2560 };
2561
2562 static enum hrtimer_restart apic_timer_fn(struct hrtimer *data)
2563 {
2564         struct kvm_timer *ktimer = container_of(data, struct kvm_timer, timer);
2565         struct kvm_lapic *apic = container_of(ktimer, struct kvm_lapic, lapic_timer);
2566
2567         apic_timer_expired(apic, true);
2568
2569         if (lapic_is_periodic(apic)) {
2570                 advance_periodic_target_expiration(apic);
2571                 hrtimer_add_expires_ns(&ktimer->timer, ktimer->period);
2572                 return HRTIMER_RESTART;
2573         } else
2574                 return HRTIMER_NORESTART;
2575 }
2576
2577 int kvm_create_lapic(struct kvm_vcpu *vcpu, int timer_advance_ns)
2578 {
2579         struct kvm_lapic *apic;
2580
2581         ASSERT(vcpu != NULL);
2582
2583         apic = kzalloc(sizeof(*apic), GFP_KERNEL_ACCOUNT);
2584         if (!apic)
2585                 goto nomem;
2586
2587         vcpu->arch.apic = apic;
2588
2589         apic->regs = (void *)get_zeroed_page(GFP_KERNEL_ACCOUNT);
2590         if (!apic->regs) {
2591                 printk(KERN_ERR "malloc apic regs error for vcpu %x\n",
2592                        vcpu->vcpu_id);
2593                 goto nomem_free_apic;
2594         }
2595         apic->vcpu = vcpu;
2596
2597         apic->nr_lvt_entries = kvm_apic_calc_nr_lvt_entries(vcpu);
2598
2599         hrtimer_init(&apic->lapic_timer.timer, CLOCK_MONOTONIC,
2600                      HRTIMER_MODE_ABS_HARD);
2601         apic->lapic_timer.timer.function = apic_timer_fn;
2602         if (timer_advance_ns == -1) {
2603                 apic->lapic_timer.timer_advance_ns = LAPIC_TIMER_ADVANCE_NS_INIT;
2604                 lapic_timer_advance_dynamic = true;
2605         } else {
2606                 apic->lapic_timer.timer_advance_ns = timer_advance_ns;
2607                 lapic_timer_advance_dynamic = false;
2608         }
2609
2610         /*
2611          * Stuff the APIC ENABLE bit in lieu of temporarily incrementing
2612          * apic_hw_disabled; the full RESET value is set by kvm_lapic_reset().
2613          */
2614         vcpu->arch.apic_base = MSR_IA32_APICBASE_ENABLE;
2615         static_branch_inc(&apic_sw_disabled.key); /* sw disabled at reset */
2616         kvm_iodevice_init(&apic->dev, &apic_mmio_ops);
2617
2618         return 0;
2619 nomem_free_apic:
2620         kfree(apic);
2621         vcpu->arch.apic = NULL;
2622 nomem:
2623         return -ENOMEM;
2624 }
2625
2626 int kvm_apic_has_interrupt(struct kvm_vcpu *vcpu)
2627 {
2628         struct kvm_lapic *apic = vcpu->arch.apic;
2629         u32 ppr;
2630
2631         if (!kvm_apic_present(vcpu))
2632                 return -1;
2633
2634         __apic_update_ppr(apic, &ppr);
2635         return apic_has_interrupt_for_ppr(apic, ppr);
2636 }
2637 EXPORT_SYMBOL_GPL(kvm_apic_has_interrupt);
2638
2639 int kvm_apic_accept_pic_intr(struct kvm_vcpu *vcpu)
2640 {
2641         u32 lvt0 = kvm_lapic_get_reg(vcpu->arch.apic, APIC_LVT0);
2642
2643         if (!kvm_apic_hw_enabled(vcpu->arch.apic))
2644                 return 1;
2645         if ((lvt0 & APIC_LVT_MASKED) == 0 &&
2646             GET_APIC_DELIVERY_MODE(lvt0) == APIC_MODE_EXTINT)
2647                 return 1;
2648         return 0;
2649 }
2650
2651 void kvm_inject_apic_timer_irqs(struct kvm_vcpu *vcpu)
2652 {
2653         struct kvm_lapic *apic = vcpu->arch.apic;
2654
2655         if (atomic_read(&apic->lapic_timer.pending) > 0) {
2656                 kvm_apic_inject_pending_timer_irqs(apic);
2657                 atomic_set(&apic->lapic_timer.pending, 0);
2658         }
2659 }
2660
2661 int kvm_get_apic_interrupt(struct kvm_vcpu *vcpu)
2662 {
2663         int vector = kvm_apic_has_interrupt(vcpu);
2664         struct kvm_lapic *apic = vcpu->arch.apic;
2665         u32 ppr;
2666
2667         if (vector == -1)
2668                 return -1;
2669
2670         /*
2671          * We get here even with APIC virtualization enabled, if doing
2672          * nested virtualization and L1 runs with the "acknowledge interrupt
2673          * on exit" mode.  Then we cannot inject the interrupt via RVI,
2674          * because the process would deliver it through the IDT.
2675          */
2676
2677         apic_clear_irr(vector, apic);
2678         if (to_hv_vcpu(vcpu) && test_bit(vector, to_hv_synic(vcpu)->auto_eoi_bitmap)) {
2679                 /*
2680                  * For auto-EOI interrupts, there might be another pending
2681                  * interrupt above PPR, so check whether to raise another
2682                  * KVM_REQ_EVENT.
2683                  */
2684                 apic_update_ppr(apic);
2685         } else {
2686                 /*
2687                  * For normal interrupts, PPR has been raised and there cannot
2688                  * be a higher-priority pending interrupt---except if there was
2689                  * a concurrent interrupt injection, but that would have
2690                  * triggered KVM_REQ_EVENT already.
2691                  */
2692                 apic_set_isr(vector, apic);
2693                 __apic_update_ppr(apic, &ppr);
2694         }
2695
2696         return vector;
2697 }
2698
2699 static int kvm_apic_state_fixup(struct kvm_vcpu *vcpu,
2700                 struct kvm_lapic_state *s, bool set)
2701 {
2702         if (apic_x2apic_mode(vcpu->arch.apic)) {
2703                 u32 *id = (u32 *)(s->regs + APIC_ID);
2704                 u32 *ldr = (u32 *)(s->regs + APIC_LDR);
2705                 u64 icr;
2706
2707                 if (vcpu->kvm->arch.x2apic_format) {
2708                         if (*id != vcpu->vcpu_id)
2709                                 return -EINVAL;
2710                 } else {
2711                         if (set)
2712                                 *id >>= 24;
2713                         else
2714                                 *id <<= 24;
2715                 }
2716
2717                 /*
2718                  * In x2APIC mode, the LDR is fixed and based on the id.  And
2719                  * ICR is internally a single 64-bit register, but needs to be
2720                  * split to ICR+ICR2 in userspace for backwards compatibility.
2721                  */
2722                 if (set) {
2723                         *ldr = kvm_apic_calc_x2apic_ldr(*id);
2724
2725                         icr = __kvm_lapic_get_reg(s->regs, APIC_ICR) |
2726                               (u64)__kvm_lapic_get_reg(s->regs, APIC_ICR2) << 32;
2727                         __kvm_lapic_set_reg64(s->regs, APIC_ICR, icr);
2728                 } else {
2729                         icr = __kvm_lapic_get_reg64(s->regs, APIC_ICR);
2730                         __kvm_lapic_set_reg(s->regs, APIC_ICR2, icr >> 32);
2731                 }
2732         }
2733
2734         return 0;
2735 }
2736
2737 int kvm_apic_get_state(struct kvm_vcpu *vcpu, struct kvm_lapic_state *s)
2738 {
2739         memcpy(s->regs, vcpu->arch.apic->regs, sizeof(*s));
2740
2741         /*
2742          * Get calculated timer current count for remaining timer period (if
2743          * any) and store it in the returned register set.
2744          */
2745         __kvm_lapic_set_reg(s->regs, APIC_TMCCT,
2746                             __apic_read(vcpu->arch.apic, APIC_TMCCT));
2747
2748         return kvm_apic_state_fixup(vcpu, s, false);
2749 }
2750
2751 int kvm_apic_set_state(struct kvm_vcpu *vcpu, struct kvm_lapic_state *s)
2752 {
2753         struct kvm_lapic *apic = vcpu->arch.apic;
2754         int r;
2755
2756         kvm_lapic_set_base(vcpu, vcpu->arch.apic_base);
2757         /* set SPIV separately to get count of SW disabled APICs right */
2758         apic_set_spiv(apic, *((u32 *)(s->regs + APIC_SPIV)));
2759
2760         r = kvm_apic_state_fixup(vcpu, s, true);
2761         if (r) {
2762                 kvm_recalculate_apic_map(vcpu->kvm);
2763                 return r;
2764         }
2765         memcpy(vcpu->arch.apic->regs, s->regs, sizeof(*s));
2766
2767         if (!apic_x2apic_mode(apic))
2768                 kvm_lapic_xapic_id_updated(apic);
2769
2770         atomic_set_release(&apic->vcpu->kvm->arch.apic_map_dirty, DIRTY);
2771         kvm_recalculate_apic_map(vcpu->kvm);
2772         kvm_apic_set_version(vcpu);
2773
2774         apic_update_ppr(apic);
2775         cancel_apic_timer(apic);
2776         apic->lapic_timer.expired_tscdeadline = 0;
2777         apic_update_lvtt(apic);
2778         apic_manage_nmi_watchdog(apic, kvm_lapic_get_reg(apic, APIC_LVT0));
2779         update_divide_count(apic);
2780         __start_apic_timer(apic, APIC_TMCCT);
2781         kvm_lapic_set_reg(apic, APIC_TMCCT, 0);
2782         kvm_apic_update_apicv(vcpu);
2783         if (apic->apicv_active) {
2784                 static_call_cond(kvm_x86_apicv_post_state_restore)(vcpu);
2785                 static_call_cond(kvm_x86_hwapic_irr_update)(vcpu, apic_find_highest_irr(apic));
2786                 static_call_cond(kvm_x86_hwapic_isr_update)(apic_find_highest_isr(apic));
2787         }
2788         kvm_make_request(KVM_REQ_EVENT, vcpu);
2789         if (ioapic_in_kernel(vcpu->kvm))
2790                 kvm_rtc_eoi_tracking_restore_one(vcpu);
2791
2792         vcpu->arch.apic_arb_prio = 0;
2793
2794         return 0;
2795 }
2796
2797 void __kvm_migrate_apic_timer(struct kvm_vcpu *vcpu)
2798 {
2799         struct hrtimer *timer;
2800
2801         if (!lapic_in_kernel(vcpu) ||
2802                 kvm_can_post_timer_interrupt(vcpu))
2803                 return;
2804
2805         timer = &vcpu->arch.apic->lapic_timer.timer;
2806         if (hrtimer_cancel(timer))
2807                 hrtimer_start_expires(timer, HRTIMER_MODE_ABS_HARD);
2808 }
2809
2810 /*
2811  * apic_sync_pv_eoi_from_guest - called on vmexit or cancel interrupt
2812  *
2813  * Detect whether guest triggered PV EOI since the
2814  * last entry. If yes, set EOI on guests's behalf.
2815  * Clear PV EOI in guest memory in any case.
2816  */
2817 static void apic_sync_pv_eoi_from_guest(struct kvm_vcpu *vcpu,
2818                                         struct kvm_lapic *apic)
2819 {
2820         int vector;
2821         /*
2822          * PV EOI state is derived from KVM_APIC_PV_EOI_PENDING in host
2823          * and KVM_PV_EOI_ENABLED in guest memory as follows:
2824          *
2825          * KVM_APIC_PV_EOI_PENDING is unset:
2826          *      -> host disabled PV EOI.
2827          * KVM_APIC_PV_EOI_PENDING is set, KVM_PV_EOI_ENABLED is set:
2828          *      -> host enabled PV EOI, guest did not execute EOI yet.
2829          * KVM_APIC_PV_EOI_PENDING is set, KVM_PV_EOI_ENABLED is unset:
2830          *      -> host enabled PV EOI, guest executed EOI.
2831          */
2832         BUG_ON(!pv_eoi_enabled(vcpu));
2833
2834         if (pv_eoi_test_and_clr_pending(vcpu))
2835                 return;
2836         vector = apic_set_eoi(apic);
2837         trace_kvm_pv_eoi(apic, vector);
2838 }
2839
2840 void kvm_lapic_sync_from_vapic(struct kvm_vcpu *vcpu)
2841 {
2842         u32 data;
2843
2844         if (test_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention))
2845                 apic_sync_pv_eoi_from_guest(vcpu, vcpu->arch.apic);
2846
2847         if (!test_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention))
2848                 return;
2849
2850         if (kvm_read_guest_cached(vcpu->kvm, &vcpu->arch.apic->vapic_cache, &data,
2851                                   sizeof(u32)))
2852                 return;
2853
2854         apic_set_tpr(vcpu->arch.apic, data & 0xff);
2855 }
2856
2857 /*
2858  * apic_sync_pv_eoi_to_guest - called before vmentry
2859  *
2860  * Detect whether it's safe to enable PV EOI and
2861  * if yes do so.
2862  */
2863 static void apic_sync_pv_eoi_to_guest(struct kvm_vcpu *vcpu,
2864                                         struct kvm_lapic *apic)
2865 {
2866         if (!pv_eoi_enabled(vcpu) ||
2867             /* IRR set or many bits in ISR: could be nested. */
2868             apic->irr_pending ||
2869             /* Cache not set: could be safe but we don't bother. */
2870             apic->highest_isr_cache == -1 ||
2871             /* Need EOI to update ioapic. */
2872             kvm_ioapic_handles_vector(apic, apic->highest_isr_cache)) {
2873                 /*
2874                  * PV EOI was disabled by apic_sync_pv_eoi_from_guest
2875                  * so we need not do anything here.
2876                  */
2877                 return;
2878         }
2879
2880         pv_eoi_set_pending(apic->vcpu);
2881 }
2882
2883 void kvm_lapic_sync_to_vapic(struct kvm_vcpu *vcpu)
2884 {
2885         u32 data, tpr;
2886         int max_irr, max_isr;
2887         struct kvm_lapic *apic = vcpu->arch.apic;
2888
2889         apic_sync_pv_eoi_to_guest(vcpu, apic);
2890
2891         if (!test_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention))
2892                 return;
2893
2894         tpr = kvm_lapic_get_reg(apic, APIC_TASKPRI) & 0xff;
2895         max_irr = apic_find_highest_irr(apic);
2896         if (max_irr < 0)
2897                 max_irr = 0;
2898         max_isr = apic_find_highest_isr(apic);
2899         if (max_isr < 0)
2900                 max_isr = 0;
2901         data = (tpr & 0xff) | ((max_isr & 0xf0) << 8) | (max_irr << 24);
2902
2903         kvm_write_guest_cached(vcpu->kvm, &vcpu->arch.apic->vapic_cache, &data,
2904                                 sizeof(u32));
2905 }
2906
2907 int kvm_lapic_set_vapic_addr(struct kvm_vcpu *vcpu, gpa_t vapic_addr)
2908 {
2909         if (vapic_addr) {
2910                 if (kvm_gfn_to_hva_cache_init(vcpu->kvm,
2911                                         &vcpu->arch.apic->vapic_cache,
2912                                         vapic_addr, sizeof(u32)))
2913                         return -EINVAL;
2914                 __set_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention);
2915         } else {
2916                 __clear_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention);
2917         }
2918
2919         vcpu->arch.apic->vapic_addr = vapic_addr;
2920         return 0;
2921 }
2922
2923 int kvm_x2apic_icr_write(struct kvm_lapic *apic, u64 data)
2924 {
2925         data &= ~APIC_ICR_BUSY;
2926
2927         kvm_apic_send_ipi(apic, (u32)data, (u32)(data >> 32));
2928         kvm_lapic_set_reg64(apic, APIC_ICR, data);
2929         trace_kvm_apic_write(APIC_ICR, data);
2930         return 0;
2931 }
2932
2933 static int kvm_lapic_msr_read(struct kvm_lapic *apic, u32 reg, u64 *data)
2934 {
2935         u32 low;
2936
2937         if (reg == APIC_ICR) {
2938                 *data = kvm_lapic_get_reg64(apic, APIC_ICR);
2939                 return 0;
2940         }
2941
2942         if (kvm_lapic_reg_read(apic, reg, 4, &low))
2943                 return 1;
2944
2945         *data = low;
2946
2947         return 0;
2948 }
2949
2950 static int kvm_lapic_msr_write(struct kvm_lapic *apic, u32 reg, u64 data)
2951 {
2952         /*
2953          * ICR is a 64-bit register in x2APIC mode (and Hyper-V PV vAPIC) and
2954          * can be written as such, all other registers remain accessible only
2955          * through 32-bit reads/writes.
2956          */
2957         if (reg == APIC_ICR)
2958                 return kvm_x2apic_icr_write(apic, data);
2959
2960         /* Bits 63:32 are reserved in all other registers. */
2961         if (data >> 32)
2962                 return 1;
2963
2964         return kvm_lapic_reg_write(apic, reg, (u32)data);
2965 }
2966
2967 int kvm_x2apic_msr_write(struct kvm_vcpu *vcpu, u32 msr, u64 data)
2968 {
2969         struct kvm_lapic *apic = vcpu->arch.apic;
2970         u32 reg = (msr - APIC_BASE_MSR) << 4;
2971
2972         if (!lapic_in_kernel(vcpu) || !apic_x2apic_mode(apic))
2973                 return 1;
2974
2975         return kvm_lapic_msr_write(apic, reg, data);
2976 }
2977
2978 int kvm_x2apic_msr_read(struct kvm_vcpu *vcpu, u32 msr, u64 *data)
2979 {
2980         struct kvm_lapic *apic = vcpu->arch.apic;
2981         u32 reg = (msr - APIC_BASE_MSR) << 4;
2982
2983         if (!lapic_in_kernel(vcpu) || !apic_x2apic_mode(apic))
2984                 return 1;
2985
2986         if (reg == APIC_DFR)
2987                 return 1;
2988
2989         return kvm_lapic_msr_read(apic, reg, data);
2990 }
2991
2992 int kvm_hv_vapic_msr_write(struct kvm_vcpu *vcpu, u32 reg, u64 data)
2993 {
2994         if (!lapic_in_kernel(vcpu))
2995                 return 1;
2996
2997         return kvm_lapic_msr_write(vcpu->arch.apic, reg, data);
2998 }
2999
3000 int kvm_hv_vapic_msr_read(struct kvm_vcpu *vcpu, u32 reg, u64 *data)
3001 {
3002         if (!lapic_in_kernel(vcpu))
3003                 return 1;
3004
3005         return kvm_lapic_msr_read(vcpu->arch.apic, reg, data);
3006 }
3007
3008 int kvm_lapic_set_pv_eoi(struct kvm_vcpu *vcpu, u64 data, unsigned long len)
3009 {
3010         u64 addr = data & ~KVM_MSR_ENABLED;
3011         struct gfn_to_hva_cache *ghc = &vcpu->arch.pv_eoi.data;
3012         unsigned long new_len;
3013         int ret;
3014
3015         if (!IS_ALIGNED(addr, 4))
3016                 return 1;
3017
3018         if (data & KVM_MSR_ENABLED) {
3019                 if (addr == ghc->gpa && len <= ghc->len)
3020                         new_len = ghc->len;
3021                 else
3022                         new_len = len;
3023
3024                 ret = kvm_gfn_to_hva_cache_init(vcpu->kvm, ghc, addr, new_len);
3025                 if (ret)
3026                         return ret;
3027         }
3028
3029         vcpu->arch.pv_eoi.msr_val = data;
3030
3031         return 0;
3032 }
3033
3034 int kvm_apic_accept_events(struct kvm_vcpu *vcpu)
3035 {
3036         struct kvm_lapic *apic = vcpu->arch.apic;
3037         u8 sipi_vector;
3038         int r;
3039
3040         if (!kvm_apic_has_pending_init_or_sipi(vcpu))
3041                 return 0;
3042
3043         if (is_guest_mode(vcpu)) {
3044                 r = kvm_check_nested_events(vcpu);
3045                 if (r < 0)
3046                         return r == -EBUSY ? 0 : r;
3047                 /*
3048                  * Continue processing INIT/SIPI even if a nested VM-Exit
3049                  * occurred, e.g. pending SIPIs should be dropped if INIT+SIPI
3050                  * are blocked as a result of transitioning to VMX root mode.
3051                  */
3052         }
3053
3054         /*
3055          * INITs are blocked while CPU is in specific states (SMM, VMX root
3056          * mode, SVM with GIF=0), while SIPIs are dropped if the CPU isn't in
3057          * wait-for-SIPI (WFS).
3058          */
3059         if (!kvm_apic_init_sipi_allowed(vcpu)) {
3060                 WARN_ON_ONCE(vcpu->arch.mp_state == KVM_MP_STATE_INIT_RECEIVED);
3061                 clear_bit(KVM_APIC_SIPI, &apic->pending_events);
3062                 return 0;
3063         }
3064
3065         if (test_and_clear_bit(KVM_APIC_INIT, &apic->pending_events)) {
3066                 kvm_vcpu_reset(vcpu, true);
3067                 if (kvm_vcpu_is_bsp(apic->vcpu))
3068                         vcpu->arch.mp_state = KVM_MP_STATE_RUNNABLE;
3069                 else
3070                         vcpu->arch.mp_state = KVM_MP_STATE_INIT_RECEIVED;
3071         }
3072         if (test_and_clear_bit(KVM_APIC_SIPI, &apic->pending_events)) {
3073                 if (vcpu->arch.mp_state == KVM_MP_STATE_INIT_RECEIVED) {
3074                         /* evaluate pending_events before reading the vector */
3075                         smp_rmb();
3076                         sipi_vector = apic->sipi_vector;
3077                         static_call(kvm_x86_vcpu_deliver_sipi_vector)(vcpu, sipi_vector);
3078                         vcpu->arch.mp_state = KVM_MP_STATE_RUNNABLE;
3079                 }
3080         }
3081         return 0;
3082 }
3083
3084 void kvm_lapic_exit(void)
3085 {
3086         static_key_deferred_flush(&apic_hw_disabled);
3087         WARN_ON(static_branch_unlikely(&apic_hw_disabled.key));
3088         static_key_deferred_flush(&apic_sw_disabled);
3089         WARN_ON(static_branch_unlikely(&apic_sw_disabled.key));
3090 }