b585ec0abd
- kvm-introduce-pc_rhel_9_5_compat.patch [RHEL-39544] - kvm-target-i386-add-guest-phys-bits-cpu-property.patch [RHEL-39544] - kvm-kvm-add-support-for-guest-physical-bits.patch [RHEL-39544] - kvm-i386-kvm-Move-architectural-CPUID-leaf-generation-to.patch [RHEL-39544] - kvm-target-i386-Introduce-Icelake-Server-v7-to-enable-TS.patch [RHEL-39544] - kvm-target-i386-Add-new-CPU-model-SierraForest.patch [RHEL-39544] - kvm-target-i386-Export-RFDS-bit-to-guests.patch [RHEL-39544] - kvm-pci-host-q35-Move-PAM-initialization-above-SMRAM-ini.patch [RHEL-39544] - kvm-q35-Introduce-smm_ranges-property-for-q35-pci-host.patch [RHEL-39544] - kvm-hw-i386-acpi-Set-PCAT_COMPAT-bit-only-when-pic-is-no.patch [RHEL-39544] - kvm-confidential-guest-support-Add-kvm_init-and-kvm_rese.patch [RHEL-39544] - kvm-i386-sev-Switch-to-use-confidential_guest_kvm_init.patch [RHEL-39544] - kvm-ppc-pef-switch-to-use-confidential_guest_kvm_init-re.patch [RHEL-39544] - kvm-s390-Switch-to-use-confidential_guest_kvm_init.patch [RHEL-39544] - kvm-scripts-update-linux-headers-Add-setup_data.h-to-imp.patch [RHEL-39544] - kvm-scripts-update-linux-headers-Add-bits.h-to-file-impo.patch [RHEL-39544] - kvm-linux-headers-update-to-current-kvm-next.patch [RHEL-39544] - kvm-runstate-skip-initial-CPU-reset-if-reset-is-not-actu.patch [RHEL-39544] - kvm-KVM-track-whether-guest-state-is-encrypted.patch [RHEL-39544] - kvm-KVM-remove-kvm_arch_cpu_check_are_resettable.patch [RHEL-39544] - kvm-target-i386-introduce-x86-confidential-guest.patch [RHEL-39544] - kvm-target-i386-Implement-mc-kvm_type-to-get-VM-type.patch [RHEL-39544] - kvm-target-i386-SEV-use-KVM_SEV_INIT2-if-possible.patch [RHEL-39544] - kvm-i386-sev-Add-legacy-vm-type-parameter-for-SEV-guest-.patch [RHEL-39544] - kvm-hw-i386-sev-Use-legacy-SEV-VM-types-for-older-machin.patch [RHEL-39544] - kvm-trace-kvm-Split-address-space-and-slot-id-in-trace_k.patch [RHEL-39544] - kvm-kvm-Introduce-support-for-memory_attributes.patch [RHEL-39544] - kvm-RAMBlock-Add-support-of-KVM-private-guest-memfd.patch [RHEL-39544] - kvm-kvm-Enable-KVM_SET_USER_MEMORY_REGION2-for-memslot.patch [RHEL-39544] - kvm-kvm-memory-Make-memory-type-private-by-default-if-it.patch [RHEL-39544] - kvm-HostMem-Add-mechanism-to-opt-in-kvm-guest-memfd-via-.patch [RHEL-39544] - kvm-RAMBlock-make-guest_memfd-require-uncoordinated-disc.patch [RHEL-39544] - kvm-physmem-Introduce-ram_block_discard_guest_memfd_rang.patch [RHEL-39544] - kvm-kvm-handle-KVM_EXIT_MEMORY_FAULT.patch [RHEL-39544] - kvm-kvm-tdx-Don-t-complain-when-converting-vMMIO-region-.patch [RHEL-39544] - kvm-kvm-tdx-Ignore-memory-conversion-to-shared-of-unassi.patch [RHEL-39544] - kvm-hw-i386-x86-Eliminate-two-if-statements-in-x86_bios_.patch [RHEL-39544] - kvm-hw-i386-Have-x86_bios_rom_init-take-X86MachineState-.patch [RHEL-39544] - kvm-hw-i386-pc_sysfw-Remove-unused-parameter-from-pc_isa.patch [RHEL-39544] - kvm-hw-i386-x86-Don-t-leak-isa-bios-memory-regions.patch [RHEL-39544] - kvm-hw-i386-x86-Don-t-leak-pc.bios-memory-region.patch [RHEL-39544] - kvm-hw-i386-x86-Extract-x86_isa_bios_init-from-x86_bios_.patch [RHEL-39544] - kvm-hw-i386-pc_sysfw-Alias-rather-than-copy-isa-bios-reg.patch [RHEL-39544] - kvm-i386-correctly-select-code-in-hw-i386-that-depends-o.patch [RHEL-39544] - kvm-i386-pc-remove-unnecessary-MachineClass-overrides.patch [RHEL-39544] - kvm-hw-i386-split-x86.c-in-multiple-parts.patch [RHEL-39544] - kvm-scripts-update-linux-header.sh-be-more-src-tree-frie.patch [RHEL-39544] - kvm-scripts-update-linux-headers.sh-Remove-temporary-dir.patch [RHEL-39544] - kvm-scripts-update-linux-headers.sh-Fix-the-path-of-setu.patch [RHEL-39544] - kvm-update-linux-headers-fix-forwarding-to-asm-generic-h.patch [RHEL-39544] - kvm-update-linux-headers-move-pvpanic.h-to-correct-direc.patch [RHEL-39544] - kvm-linux-headers-Update-to-current-kvm-next.patch [RHEL-39544] - kvm-update-linux-headers-import-linux-kvm_para.h-header.patch [RHEL-39544] - kvm-machine-allow-early-use-of-machine_require_guest_mem.patch [RHEL-39544] - kvm-i386-sev-Replace-error_report-with-error_setg.patch [RHEL-39544] - kvm-i386-sev-Introduce-sev-common-type-to-encapsulate-co.patch [RHEL-39544] - kvm-i386-sev-Move-sev_launch_update-to-separate-class-me.patch [RHEL-39544] - kvm-i386-sev-Move-sev_launch_finish-to-separate-class-me.patch [RHEL-39544] - kvm-i386-sev-Introduce-sev-snp-guest-object.patch [RHEL-39544] - kvm-i386-sev-Add-a-sev_snp_enabled-helper.patch [RHEL-39544] - kvm-i386-sev-Add-sev_kvm_init-override-for-SEV-class.patch [RHEL-39544] - kvm-i386-sev-Add-snp_kvm_init-override-for-SNP-class.patch [RHEL-39544] - kvm-i386-cpu-Set-SEV-SNP-CPUID-bit-when-SNP-enabled.patch [RHEL-39544] - kvm-i386-sev-Don-t-return-launch-measurements-for-SEV-SN.patch [RHEL-39544] - kvm-i386-sev-Add-a-class-method-to-determine-KVM-VM-type.patch [RHEL-39544] - kvm-i386-sev-Update-query-sev-QAPI-format-to-handle-SEV-.patch [RHEL-39544] - kvm-i386-sev-Add-the-SNP-launch-start-context.patch [RHEL-39544] - kvm-i386-sev-Add-handling-to-encrypt-finalize-guest-laun.patch [RHEL-39544] - kvm-i386-sev-Set-CPU-state-to-protected-once-SNP-guest-p.patch [RHEL-39544] - kvm-hw-i386-sev-Add-function-to-get-SEV-metadata-from-OV.patch [RHEL-39544] - kvm-i386-sev-Add-support-for-populating-OVMF-metadata-pa.patch [RHEL-39544] - kvm-i386-sev-Add-support-for-SNP-CPUID-validation.patch [RHEL-39544] - kvm-hw-i386-sev-Add-support-to-encrypt-BIOS-when-SEV-SNP.patch [RHEL-39544] - kvm-i386-sev-Invoke-launch_updata_data-for-SEV-class.patch [RHEL-39544] - kvm-i386-sev-Invoke-launch_updata_data-for-SNP-class.patch [RHEL-39544] - kvm-i386-kvm-Add-KVM_EXIT_HYPERCALL-handling-for-KVM_HC_.patch [RHEL-39544] - kvm-i386-sev-Enable-KVM_HC_MAP_GPA_RANGE-hcall-for-SNP-g.patch [RHEL-39544] - kvm-i386-sev-Extract-build_kernel_loader_hashes.patch [RHEL-39544] - kvm-i386-sev-Reorder-struct-declarations.patch [RHEL-39544] - kvm-i386-sev-Allow-measured-direct-kernel-boot-on-SNP.patch [RHEL-39544] - kvm-memory-Introduce-memory_region_init_ram_guest_memfd.patch [RHEL-39544] - kvm-hw-i386-sev-Use-guest_memfd-for-legacy-ROMs.patch [RHEL-39544] - kvm-hw-i386-Add-support-for-loading-BIOS-using-guest_mem.patch [RHEL-39544] - kvm-i386-sev-fix-unreachable-code-coverity-issue.patch [RHEL-39544] - kvm-i386-sev-Move-SEV_COMMON-null-check-before-dereferen.patch [RHEL-39544] - kvm-i386-sev-Return-when-sev_common-is-null.patch [RHEL-39544] - kvm-target-i386-SEV-fix-formatting-of-CPUID-mismatch-mes.patch [RHEL-39544] - kvm-i386-sev-Fix-error-message-in-sev_get_capabilities.patch [RHEL-39544] - kvm-i386-sev-Fallback-to-the-default-SEV-device-if-none-.patch [RHEL-39544] - kvm-i386-sev-Don-t-allow-automatic-fallback-to-legacy-KV.patch [RHEL-39544] - kvm-target-i386-SEV-fix-mismatch-in-vcek-disabled-proper.patch [RHEL-39544] - kvm-virtio-rng-block-max-bytes-0.patch [RHEL-50336] - kvm-scsi-disk-Use-positive-return-value-for-status-in-dm.patch [RHEL-50000] - kvm-scsi-block-Don-t-skip-callback-for-sgio-error-status.patch [RHEL-50000] - kvm-scsi-disk-Add-warning-comments-that-host_status-erro.patch [RHEL-50000] - kvm-scsi-disk-Always-report-RESERVATION_CONFLICT-to-gues.patch [RHEL-50000] - kvm-nbd-server-Plumb-in-new-args-to-nbd_client_add.patch [RHEL-52617] - kvm-nbd-server-CVE-2024-7409-Cap-default-max-connections.patch [RHEL-52617] - kvm-nbd-server-CVE-2024-7409-Drop-non-negotiating-client.patch [RHEL-52617] - kvm-nbd-server-CVE-2024-7409-Close-stray-clients-at-serv.patch [RHEL-52617] - Resolves: RHEL-39544 ([QEMU] Add support for AMD SEV-SNP to Qemu) - Resolves: RHEL-50336 (Fail to boot up the guest including vtpm and virtio-rng (max-bytes=0) devices) - Resolves: RHEL-50000 (scsi-block: Cannot setup Windows Failover Cluster, qemu crashes on assert) - Resolves: RHEL-52617 (CVE-2024-7409 qemu-kvm: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure [rhel-9.5])
537 lines
18 KiB
Diff
537 lines
18 KiB
Diff
From 5ead79f45e8e90b7a04586c89e70cb9d0b66b730 Mon Sep 17 00:00:00 2001
|
|
From: Sean Christopherson <sean.j.christopherson@intel.com>
|
|
Date: Thu, 29 Feb 2024 01:36:43 -0500
|
|
Subject: [PATCH 004/100] i386/kvm: Move architectural CPUID leaf generation to
|
|
separate helper
|
|
|
|
RH-Author: Paolo Bonzini <pbonzini@redhat.com>
|
|
RH-MergeRequest: 245: SEV-SNP support
|
|
RH-Jira: RHEL-39544
|
|
RH-Acked-by: Thomas Huth <thuth@redhat.com>
|
|
RH-Acked-by: Bandan Das <bdas@redhat.com>
|
|
RH-Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
|
RH-Commit: [4/91] 06ecdbcf05ad3d658273980b114f02477d0b0475 (bonzini/rhel-qemu-kvm)
|
|
|
|
Move the architectural (for lack of a better term) CPUID leaf generation
|
|
to a separate helper so that the generation code can be reused by TDX,
|
|
which needs to generate a canonical VM-scoped configuration.
|
|
|
|
For now this is just a cleanup, so keep the function static.
|
|
|
|
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
|
|
Signed-off-by: Xiaoyao Li <xiaoyao.li@intel.com>
|
|
Message-ID: <20240229063726.610065-23-xiaoyao.li@intel.com>
|
|
Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
|
|
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
(cherry picked from commit a5acf4f26c208a05d05ef1bde65553ce2ab5e5d0)
|
|
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
---
|
|
target/i386/kvm/kvm.c | 417 +++++++++++++++++++++---------------------
|
|
1 file changed, 211 insertions(+), 206 deletions(-)
|
|
|
|
diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c
|
|
index 739f33db47..5f30b649a0 100644
|
|
--- a/target/i386/kvm/kvm.c
|
|
+++ b/target/i386/kvm/kvm.c
|
|
@@ -1706,195 +1706,22 @@ static void kvm_init_nested_state(CPUX86State *env)
|
|
}
|
|
}
|
|
|
|
-int kvm_arch_init_vcpu(CPUState *cs)
|
|
+static uint32_t kvm_x86_build_cpuid(CPUX86State *env,
|
|
+ struct kvm_cpuid_entry2 *entries,
|
|
+ uint32_t cpuid_i)
|
|
{
|
|
- struct {
|
|
- struct kvm_cpuid2 cpuid;
|
|
- struct kvm_cpuid_entry2 entries[KVM_MAX_CPUID_ENTRIES];
|
|
- } cpuid_data;
|
|
- /*
|
|
- * The kernel defines these structs with padding fields so there
|
|
- * should be no extra padding in our cpuid_data struct.
|
|
- */
|
|
- QEMU_BUILD_BUG_ON(sizeof(cpuid_data) !=
|
|
- sizeof(struct kvm_cpuid2) +
|
|
- sizeof(struct kvm_cpuid_entry2) * KVM_MAX_CPUID_ENTRIES);
|
|
-
|
|
- X86CPU *cpu = X86_CPU(cs);
|
|
- CPUX86State *env = &cpu->env;
|
|
- uint32_t limit, i, j, cpuid_i;
|
|
+ uint32_t limit, i, j;
|
|
uint32_t unused;
|
|
struct kvm_cpuid_entry2 *c;
|
|
- uint32_t signature[3];
|
|
- int kvm_base = KVM_CPUID_SIGNATURE;
|
|
- int max_nested_state_len;
|
|
- int r;
|
|
- Error *local_err = NULL;
|
|
-
|
|
- memset(&cpuid_data, 0, sizeof(cpuid_data));
|
|
-
|
|
- cpuid_i = 0;
|
|
-
|
|
- has_xsave2 = kvm_check_extension(cs->kvm_state, KVM_CAP_XSAVE2);
|
|
-
|
|
- r = kvm_arch_set_tsc_khz(cs);
|
|
- if (r < 0) {
|
|
- return r;
|
|
- }
|
|
-
|
|
- /* vcpu's TSC frequency is either specified by user, or following
|
|
- * the value used by KVM if the former is not present. In the
|
|
- * latter case, we query it from KVM and record in env->tsc_khz,
|
|
- * so that vcpu's TSC frequency can be migrated later via this field.
|
|
- */
|
|
- if (!env->tsc_khz) {
|
|
- r = kvm_check_extension(cs->kvm_state, KVM_CAP_GET_TSC_KHZ) ?
|
|
- kvm_vcpu_ioctl(cs, KVM_GET_TSC_KHZ) :
|
|
- -ENOTSUP;
|
|
- if (r > 0) {
|
|
- env->tsc_khz = r;
|
|
- }
|
|
- }
|
|
-
|
|
- env->apic_bus_freq = KVM_APIC_BUS_FREQUENCY;
|
|
-
|
|
- /*
|
|
- * kvm_hyperv_expand_features() is called here for the second time in case
|
|
- * KVM_CAP_SYS_HYPERV_CPUID is not supported. While we can't possibly handle
|
|
- * 'query-cpu-model-expansion' in this case as we don't have a KVM vCPU to
|
|
- * check which Hyper-V enlightenments are supported and which are not, we
|
|
- * can still proceed and check/expand Hyper-V enlightenments here so legacy
|
|
- * behavior is preserved.
|
|
- */
|
|
- if (!kvm_hyperv_expand_features(cpu, &local_err)) {
|
|
- error_report_err(local_err);
|
|
- return -ENOSYS;
|
|
- }
|
|
-
|
|
- if (hyperv_enabled(cpu)) {
|
|
- r = hyperv_init_vcpu(cpu);
|
|
- if (r) {
|
|
- return r;
|
|
- }
|
|
-
|
|
- cpuid_i = hyperv_fill_cpuids(cs, cpuid_data.entries);
|
|
- kvm_base = KVM_CPUID_SIGNATURE_NEXT;
|
|
- has_msr_hv_hypercall = true;
|
|
- }
|
|
-
|
|
- if (cs->kvm_state->xen_version) {
|
|
-#ifdef CONFIG_XEN_EMU
|
|
- struct kvm_cpuid_entry2 *xen_max_leaf;
|
|
-
|
|
- memcpy(signature, "XenVMMXenVMM", 12);
|
|
-
|
|
- xen_max_leaf = c = &cpuid_data.entries[cpuid_i++];
|
|
- c->function = kvm_base + XEN_CPUID_SIGNATURE;
|
|
- c->eax = kvm_base + XEN_CPUID_TIME;
|
|
- c->ebx = signature[0];
|
|
- c->ecx = signature[1];
|
|
- c->edx = signature[2];
|
|
-
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
- c->function = kvm_base + XEN_CPUID_VENDOR;
|
|
- c->eax = cs->kvm_state->xen_version;
|
|
- c->ebx = 0;
|
|
- c->ecx = 0;
|
|
- c->edx = 0;
|
|
-
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
- c->function = kvm_base + XEN_CPUID_HVM_MSR;
|
|
- /* Number of hypercall-transfer pages */
|
|
- c->eax = 1;
|
|
- /* Hypercall MSR base address */
|
|
- if (hyperv_enabled(cpu)) {
|
|
- c->ebx = XEN_HYPERCALL_MSR_HYPERV;
|
|
- kvm_xen_init(cs->kvm_state, c->ebx);
|
|
- } else {
|
|
- c->ebx = XEN_HYPERCALL_MSR;
|
|
- }
|
|
- c->ecx = 0;
|
|
- c->edx = 0;
|
|
-
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
- c->function = kvm_base + XEN_CPUID_TIME;
|
|
- c->eax = ((!!tsc_is_stable_and_known(env) << 1) |
|
|
- (!!(env->features[FEAT_8000_0001_EDX] & CPUID_EXT2_RDTSCP) << 2));
|
|
- /* default=0 (emulate if necessary) */
|
|
- c->ebx = 0;
|
|
- /* guest tsc frequency */
|
|
- c->ecx = env->user_tsc_khz;
|
|
- /* guest tsc incarnation (migration count) */
|
|
- c->edx = 0;
|
|
-
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
- c->function = kvm_base + XEN_CPUID_HVM;
|
|
- xen_max_leaf->eax = kvm_base + XEN_CPUID_HVM;
|
|
- if (cs->kvm_state->xen_version >= XEN_VERSION(4, 5)) {
|
|
- c->function = kvm_base + XEN_CPUID_HVM;
|
|
-
|
|
- if (cpu->xen_vapic) {
|
|
- c->eax |= XEN_HVM_CPUID_APIC_ACCESS_VIRT;
|
|
- c->eax |= XEN_HVM_CPUID_X2APIC_VIRT;
|
|
- }
|
|
-
|
|
- c->eax |= XEN_HVM_CPUID_IOMMU_MAPPINGS;
|
|
-
|
|
- if (cs->kvm_state->xen_version >= XEN_VERSION(4, 6)) {
|
|
- c->eax |= XEN_HVM_CPUID_VCPU_ID_PRESENT;
|
|
- c->ebx = cs->cpu_index;
|
|
- }
|
|
-
|
|
- if (cs->kvm_state->xen_version >= XEN_VERSION(4, 17)) {
|
|
- c->eax |= XEN_HVM_CPUID_UPCALL_VECTOR;
|
|
- }
|
|
- }
|
|
-
|
|
- r = kvm_xen_init_vcpu(cs);
|
|
- if (r) {
|
|
- return r;
|
|
- }
|
|
-
|
|
- kvm_base += 0x100;
|
|
-#else /* CONFIG_XEN_EMU */
|
|
- /* This should never happen as kvm_arch_init() would have died first. */
|
|
- fprintf(stderr, "Cannot enable Xen CPUID without Xen support\n");
|
|
- abort();
|
|
-#endif
|
|
- } else if (cpu->expose_kvm) {
|
|
- memcpy(signature, "KVMKVMKVM\0\0\0", 12);
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
- c->function = KVM_CPUID_SIGNATURE | kvm_base;
|
|
- c->eax = KVM_CPUID_FEATURES | kvm_base;
|
|
- c->ebx = signature[0];
|
|
- c->ecx = signature[1];
|
|
- c->edx = signature[2];
|
|
-
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
- c->function = KVM_CPUID_FEATURES | kvm_base;
|
|
- c->eax = env->features[FEAT_KVM];
|
|
- c->edx = env->features[FEAT_KVM_HINTS];
|
|
- }
|
|
|
|
cpu_x86_cpuid(env, 0, 0, &limit, &unused, &unused, &unused);
|
|
|
|
- if (cpu->kvm_pv_enforce_cpuid) {
|
|
- r = kvm_vcpu_enable_cap(cs, KVM_CAP_ENFORCE_PV_FEATURE_CPUID, 0, 1);
|
|
- if (r < 0) {
|
|
- fprintf(stderr,
|
|
- "failed to enable KVM_CAP_ENFORCE_PV_FEATURE_CPUID: %s",
|
|
- strerror(-r));
|
|
- abort();
|
|
- }
|
|
- }
|
|
-
|
|
for (i = 0; i <= limit; i++) {
|
|
+ j = 0;
|
|
if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
|
|
- fprintf(stderr, "unsupported level value: 0x%x\n", limit);
|
|
- abort();
|
|
+ goto full;
|
|
}
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
-
|
|
+ c = &entries[cpuid_i++];
|
|
switch (i) {
|
|
case 2: {
|
|
/* Keep reading function 2 till all the input is received */
|
|
@@ -1908,11 +1735,9 @@ int kvm_arch_init_vcpu(CPUState *cs)
|
|
|
|
for (j = 1; j < times; ++j) {
|
|
if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
|
|
- fprintf(stderr, "cpuid_data is full, no space for "
|
|
- "cpuid(eax:2):eax & 0xf = 0x%x\n", times);
|
|
- abort();
|
|
+ goto full;
|
|
}
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
+ c = &entries[cpuid_i++];
|
|
c->function = i;
|
|
c->flags = KVM_CPUID_FLAG_STATEFUL_FUNC;
|
|
cpu_x86_cpuid(env, i, 0, &c->eax, &c->ebx, &c->ecx, &c->edx);
|
|
@@ -1951,11 +1776,9 @@ int kvm_arch_init_vcpu(CPUState *cs)
|
|
continue;
|
|
}
|
|
if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
|
|
- fprintf(stderr, "cpuid_data is full, no space for "
|
|
- "cpuid(eax:0x%x,ecx:0x%x)\n", i, j);
|
|
- abort();
|
|
+ goto full;
|
|
}
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
+ c = &entries[cpuid_i++];
|
|
}
|
|
break;
|
|
case 0x12:
|
|
@@ -1970,11 +1793,9 @@ int kvm_arch_init_vcpu(CPUState *cs)
|
|
}
|
|
|
|
if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
|
|
- fprintf(stderr, "cpuid_data is full, no space for "
|
|
- "cpuid(eax:0x12,ecx:0x%x)\n", j);
|
|
- abort();
|
|
+ goto full;
|
|
}
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
+ c = &entries[cpuid_i++];
|
|
}
|
|
break;
|
|
case 0x7:
|
|
@@ -1991,11 +1812,9 @@ int kvm_arch_init_vcpu(CPUState *cs)
|
|
|
|
for (j = 1; j <= times; ++j) {
|
|
if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
|
|
- fprintf(stderr, "cpuid_data is full, no space for "
|
|
- "cpuid(eax:0x%x,ecx:0x%x)\n", i, j);
|
|
- abort();
|
|
+ goto full;
|
|
}
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
+ c = &entries[cpuid_i++];
|
|
c->function = i;
|
|
c->index = j;
|
|
c->flags = KVM_CPUID_FLAG_SIGNIFCANT_INDEX;
|
|
@@ -2048,11 +1867,11 @@ int kvm_arch_init_vcpu(CPUState *cs)
|
|
cpu_x86_cpuid(env, 0x80000000, 0, &limit, &unused, &unused, &unused);
|
|
|
|
for (i = 0x80000000; i <= limit; i++) {
|
|
+ j = 0;
|
|
if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
|
|
- fprintf(stderr, "unsupported xlevel value: 0x%x\n", limit);
|
|
- abort();
|
|
+ goto full;
|
|
}
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
+ c = &entries[cpuid_i++];
|
|
|
|
switch (i) {
|
|
case 0x8000001d:
|
|
@@ -2067,11 +1886,9 @@ int kvm_arch_init_vcpu(CPUState *cs)
|
|
break;
|
|
}
|
|
if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
|
|
- fprintf(stderr, "cpuid_data is full, no space for "
|
|
- "cpuid(eax:0x%x,ecx:0x%x)\n", i, j);
|
|
- abort();
|
|
+ goto full;
|
|
}
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
+ c = &entries[cpuid_i++];
|
|
}
|
|
break;
|
|
default:
|
|
@@ -2094,11 +1911,11 @@ int kvm_arch_init_vcpu(CPUState *cs)
|
|
cpu_x86_cpuid(env, 0xC0000000, 0, &limit, &unused, &unused, &unused);
|
|
|
|
for (i = 0xC0000000; i <= limit; i++) {
|
|
+ j = 0;
|
|
if (cpuid_i == KVM_MAX_CPUID_ENTRIES) {
|
|
- fprintf(stderr, "unsupported xlevel2 value: 0x%x\n", limit);
|
|
- abort();
|
|
+ goto full;
|
|
}
|
|
- c = &cpuid_data.entries[cpuid_i++];
|
|
+ c = &entries[cpuid_i++];
|
|
|
|
c->function = i;
|
|
c->flags = 0;
|
|
@@ -2106,6 +1923,194 @@ int kvm_arch_init_vcpu(CPUState *cs)
|
|
}
|
|
}
|
|
|
|
+ return cpuid_i;
|
|
+
|
|
+full:
|
|
+ fprintf(stderr, "cpuid_data is full, no space for "
|
|
+ "cpuid(eax:0x%x,ecx:0x%x)\n", i, j);
|
|
+ abort();
|
|
+}
|
|
+
|
|
+int kvm_arch_init_vcpu(CPUState *cs)
|
|
+{
|
|
+ struct {
|
|
+ struct kvm_cpuid2 cpuid;
|
|
+ struct kvm_cpuid_entry2 entries[KVM_MAX_CPUID_ENTRIES];
|
|
+ } cpuid_data;
|
|
+ /*
|
|
+ * The kernel defines these structs with padding fields so there
|
|
+ * should be no extra padding in our cpuid_data struct.
|
|
+ */
|
|
+ QEMU_BUILD_BUG_ON(sizeof(cpuid_data) !=
|
|
+ sizeof(struct kvm_cpuid2) +
|
|
+ sizeof(struct kvm_cpuid_entry2) * KVM_MAX_CPUID_ENTRIES);
|
|
+
|
|
+ X86CPU *cpu = X86_CPU(cs);
|
|
+ CPUX86State *env = &cpu->env;
|
|
+ uint32_t cpuid_i;
|
|
+ struct kvm_cpuid_entry2 *c;
|
|
+ uint32_t signature[3];
|
|
+ int kvm_base = KVM_CPUID_SIGNATURE;
|
|
+ int max_nested_state_len;
|
|
+ int r;
|
|
+ Error *local_err = NULL;
|
|
+
|
|
+ memset(&cpuid_data, 0, sizeof(cpuid_data));
|
|
+
|
|
+ cpuid_i = 0;
|
|
+
|
|
+ has_xsave2 = kvm_check_extension(cs->kvm_state, KVM_CAP_XSAVE2);
|
|
+
|
|
+ r = kvm_arch_set_tsc_khz(cs);
|
|
+ if (r < 0) {
|
|
+ return r;
|
|
+ }
|
|
+
|
|
+ /* vcpu's TSC frequency is either specified by user, or following
|
|
+ * the value used by KVM if the former is not present. In the
|
|
+ * latter case, we query it from KVM and record in env->tsc_khz,
|
|
+ * so that vcpu's TSC frequency can be migrated later via this field.
|
|
+ */
|
|
+ if (!env->tsc_khz) {
|
|
+ r = kvm_check_extension(cs->kvm_state, KVM_CAP_GET_TSC_KHZ) ?
|
|
+ kvm_vcpu_ioctl(cs, KVM_GET_TSC_KHZ) :
|
|
+ -ENOTSUP;
|
|
+ if (r > 0) {
|
|
+ env->tsc_khz = r;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ env->apic_bus_freq = KVM_APIC_BUS_FREQUENCY;
|
|
+
|
|
+ /*
|
|
+ * kvm_hyperv_expand_features() is called here for the second time in case
|
|
+ * KVM_CAP_SYS_HYPERV_CPUID is not supported. While we can't possibly handle
|
|
+ * 'query-cpu-model-expansion' in this case as we don't have a KVM vCPU to
|
|
+ * check which Hyper-V enlightenments are supported and which are not, we
|
|
+ * can still proceed and check/expand Hyper-V enlightenments here so legacy
|
|
+ * behavior is preserved.
|
|
+ */
|
|
+ if (!kvm_hyperv_expand_features(cpu, &local_err)) {
|
|
+ error_report_err(local_err);
|
|
+ return -ENOSYS;
|
|
+ }
|
|
+
|
|
+ if (hyperv_enabled(cpu)) {
|
|
+ r = hyperv_init_vcpu(cpu);
|
|
+ if (r) {
|
|
+ return r;
|
|
+ }
|
|
+
|
|
+ cpuid_i = hyperv_fill_cpuids(cs, cpuid_data.entries);
|
|
+ kvm_base = KVM_CPUID_SIGNATURE_NEXT;
|
|
+ has_msr_hv_hypercall = true;
|
|
+ }
|
|
+
|
|
+ if (cs->kvm_state->xen_version) {
|
|
+#ifdef CONFIG_XEN_EMU
|
|
+ struct kvm_cpuid_entry2 *xen_max_leaf;
|
|
+
|
|
+ memcpy(signature, "XenVMMXenVMM", 12);
|
|
+
|
|
+ xen_max_leaf = c = &cpuid_data.entries[cpuid_i++];
|
|
+ c->function = kvm_base + XEN_CPUID_SIGNATURE;
|
|
+ c->eax = kvm_base + XEN_CPUID_TIME;
|
|
+ c->ebx = signature[0];
|
|
+ c->ecx = signature[1];
|
|
+ c->edx = signature[2];
|
|
+
|
|
+ c = &cpuid_data.entries[cpuid_i++];
|
|
+ c->function = kvm_base + XEN_CPUID_VENDOR;
|
|
+ c->eax = cs->kvm_state->xen_version;
|
|
+ c->ebx = 0;
|
|
+ c->ecx = 0;
|
|
+ c->edx = 0;
|
|
+
|
|
+ c = &cpuid_data.entries[cpuid_i++];
|
|
+ c->function = kvm_base + XEN_CPUID_HVM_MSR;
|
|
+ /* Number of hypercall-transfer pages */
|
|
+ c->eax = 1;
|
|
+ /* Hypercall MSR base address */
|
|
+ if (hyperv_enabled(cpu)) {
|
|
+ c->ebx = XEN_HYPERCALL_MSR_HYPERV;
|
|
+ kvm_xen_init(cs->kvm_state, c->ebx);
|
|
+ } else {
|
|
+ c->ebx = XEN_HYPERCALL_MSR;
|
|
+ }
|
|
+ c->ecx = 0;
|
|
+ c->edx = 0;
|
|
+
|
|
+ c = &cpuid_data.entries[cpuid_i++];
|
|
+ c->function = kvm_base + XEN_CPUID_TIME;
|
|
+ c->eax = ((!!tsc_is_stable_and_known(env) << 1) |
|
|
+ (!!(env->features[FEAT_8000_0001_EDX] & CPUID_EXT2_RDTSCP) << 2));
|
|
+ /* default=0 (emulate if necessary) */
|
|
+ c->ebx = 0;
|
|
+ /* guest tsc frequency */
|
|
+ c->ecx = env->user_tsc_khz;
|
|
+ /* guest tsc incarnation (migration count) */
|
|
+ c->edx = 0;
|
|
+
|
|
+ c = &cpuid_data.entries[cpuid_i++];
|
|
+ c->function = kvm_base + XEN_CPUID_HVM;
|
|
+ xen_max_leaf->eax = kvm_base + XEN_CPUID_HVM;
|
|
+ if (cs->kvm_state->xen_version >= XEN_VERSION(4, 5)) {
|
|
+ c->function = kvm_base + XEN_CPUID_HVM;
|
|
+
|
|
+ if (cpu->xen_vapic) {
|
|
+ c->eax |= XEN_HVM_CPUID_APIC_ACCESS_VIRT;
|
|
+ c->eax |= XEN_HVM_CPUID_X2APIC_VIRT;
|
|
+ }
|
|
+
|
|
+ c->eax |= XEN_HVM_CPUID_IOMMU_MAPPINGS;
|
|
+
|
|
+ if (cs->kvm_state->xen_version >= XEN_VERSION(4, 6)) {
|
|
+ c->eax |= XEN_HVM_CPUID_VCPU_ID_PRESENT;
|
|
+ c->ebx = cs->cpu_index;
|
|
+ }
|
|
+
|
|
+ if (cs->kvm_state->xen_version >= XEN_VERSION(4, 17)) {
|
|
+ c->eax |= XEN_HVM_CPUID_UPCALL_VECTOR;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ r = kvm_xen_init_vcpu(cs);
|
|
+ if (r) {
|
|
+ return r;
|
|
+ }
|
|
+
|
|
+ kvm_base += 0x100;
|
|
+#else /* CONFIG_XEN_EMU */
|
|
+ /* This should never happen as kvm_arch_init() would have died first. */
|
|
+ fprintf(stderr, "Cannot enable Xen CPUID without Xen support\n");
|
|
+ abort();
|
|
+#endif
|
|
+ } else if (cpu->expose_kvm) {
|
|
+ memcpy(signature, "KVMKVMKVM\0\0\0", 12);
|
|
+ c = &cpuid_data.entries[cpuid_i++];
|
|
+ c->function = KVM_CPUID_SIGNATURE | kvm_base;
|
|
+ c->eax = KVM_CPUID_FEATURES | kvm_base;
|
|
+ c->ebx = signature[0];
|
|
+ c->ecx = signature[1];
|
|
+ c->edx = signature[2];
|
|
+
|
|
+ c = &cpuid_data.entries[cpuid_i++];
|
|
+ c->function = KVM_CPUID_FEATURES | kvm_base;
|
|
+ c->eax = env->features[FEAT_KVM];
|
|
+ c->edx = env->features[FEAT_KVM_HINTS];
|
|
+ }
|
|
+
|
|
+ if (cpu->kvm_pv_enforce_cpuid) {
|
|
+ r = kvm_vcpu_enable_cap(cs, KVM_CAP_ENFORCE_PV_FEATURE_CPUID, 0, 1);
|
|
+ if (r < 0) {
|
|
+ fprintf(stderr,
|
|
+ "failed to enable KVM_CAP_ENFORCE_PV_FEATURE_CPUID: %s",
|
|
+ strerror(-r));
|
|
+ abort();
|
|
+ }
|
|
+ }
|
|
+
|
|
+ cpuid_i = kvm_x86_build_cpuid(env, cpuid_data.entries, cpuid_i);
|
|
cpuid_data.cpuid.nent = cpuid_i;
|
|
|
|
if (((env->cpuid_version >> 8)&0xF) >= 6
|
|
--
|
|
2.39.3
|
|
|