1 /* SPDX-License-Identifier: GPL-2.0 */ 2 #ifndef __KVM_X86_VMX_HYPERV_H 3 #define __KVM_X86_VMX_HYPERV_H 4 5 #include <linux/jump_label.h> 6 7 #include <asm/hyperv-tlfs.h> 8 #include <asm/mshyperv.h> 9 #include <asm/vmx.h> 10 11 #include "../hyperv.h" 12 13 #include "capabilities.h" 14 #include "vmcs.h" 15 #include "vmcs12.h" 16 17 struct vmcs_config; 18 19 DECLARE_STATIC_KEY_FALSE(enable_evmcs); 20 21 #define current_evmcs ((struct hv_enlightened_vmcs *)this_cpu_read(current_vmcs)) 22 23 #define KVM_EVMCS_VERSION 1 24 25 /* 26 * Enlightened VMCSv1 doesn't support these: 27 * 28 * POSTED_INTR_NV = 0x00000002, 29 * GUEST_INTR_STATUS = 0x00000810, 30 * APIC_ACCESS_ADDR = 0x00002014, 31 * POSTED_INTR_DESC_ADDR = 0x00002016, 32 * EOI_EXIT_BITMAP0 = 0x0000201c, 33 * EOI_EXIT_BITMAP1 = 0x0000201e, 34 * EOI_EXIT_BITMAP2 = 0x00002020, 35 * EOI_EXIT_BITMAP3 = 0x00002022, 36 * GUEST_PML_INDEX = 0x00000812, 37 * PML_ADDRESS = 0x0000200e, 38 * VM_FUNCTION_CONTROL = 0x00002018, 39 * EPTP_LIST_ADDRESS = 0x00002024, 40 * VMREAD_BITMAP = 0x00002026, 41 * VMWRITE_BITMAP = 0x00002028, 42 * 43 * TSC_MULTIPLIER = 0x00002032, 44 * PLE_GAP = 0x00004020, 45 * PLE_WINDOW = 0x00004022, 46 * VMX_PREEMPTION_TIMER_VALUE = 0x0000482E, 47 * 48 * Currently unsupported in KVM: 49 * GUEST_IA32_RTIT_CTL = 0x00002814, 50 */ 51 #define EVMCS1_UNSUPPORTED_PINCTRL (PIN_BASED_POSTED_INTR | \ 52 PIN_BASED_VMX_PREEMPTION_TIMER) 53 #define EVMCS1_UNSUPPORTED_EXEC_CTRL (CPU_BASED_ACTIVATE_TERTIARY_CONTROLS) 54 #define EVMCS1_UNSUPPORTED_2NDEXEC \ 55 (SECONDARY_EXEC_VIRTUAL_INTR_DELIVERY | \ 56 SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES | \ 57 SECONDARY_EXEC_APIC_REGISTER_VIRT | \ 58 SECONDARY_EXEC_ENABLE_PML | \ 59 SECONDARY_EXEC_ENABLE_VMFUNC | \ 60 SECONDARY_EXEC_SHADOW_VMCS | \ 61 SECONDARY_EXEC_TSC_SCALING | \ 62 SECONDARY_EXEC_PAUSE_LOOP_EXITING) 63 #define EVMCS1_UNSUPPORTED_VMEXIT_CTRL \ 64 (VM_EXIT_SAVE_VMX_PREEMPTION_TIMER) 65 #define EVMCS1_UNSUPPORTED_VMENTRY_CTRL (0) 66 #define EVMCS1_UNSUPPORTED_VMFUNC (VMX_VMFUNC_EPTP_SWITCHING) 67 68 struct evmcs_field { 69 u16 offset; 70 u16 clean_field; 71 }; 72 73 extern const struct evmcs_field vmcs_field_to_evmcs_1[]; 74 extern const unsigned int nr_evmcs_1_fields; 75 76 static __always_inline int evmcs_field_offset(unsigned long field, 77 u16 *clean_field) 78 { 79 unsigned int index = ROL16(field, 6); 80 const struct evmcs_field *evmcs_field; 81 82 if (unlikely(index >= nr_evmcs_1_fields)) 83 return -ENOENT; 84 85 evmcs_field = &vmcs_field_to_evmcs_1[index]; 86 87 /* 88 * Use offset=0 to detect holes in eVMCS. This offset belongs to 89 * 'revision_id' but this field has no encoding and is supposed to 90 * be accessed directly. 91 */ 92 if (unlikely(!evmcs_field->offset)) 93 return -ENOENT; 94 95 if (clean_field) 96 *clean_field = evmcs_field->clean_field; 97 98 return evmcs_field->offset; 99 } 100 101 static inline u64 evmcs_read_any(struct hv_enlightened_vmcs *evmcs, 102 unsigned long field, u16 offset) 103 { 104 /* 105 * vmcs12_read_any() doesn't care whether the supplied structure 106 * is 'struct vmcs12' or 'struct hv_enlightened_vmcs' as it takes 107 * the exact offset of the required field, use it for convenience 108 * here. 109 */ 110 return vmcs12_read_any((void *)evmcs, field, offset); 111 } 112 113 #if IS_ENABLED(CONFIG_HYPERV) 114 115 static __always_inline int get_evmcs_offset(unsigned long field, 116 u16 *clean_field) 117 { 118 int offset = evmcs_field_offset(field, clean_field); 119 120 WARN_ONCE(offset < 0, "KVM: accessing unsupported EVMCS field %lx\n", 121 field); 122 123 return offset; 124 } 125 126 static __always_inline void evmcs_write64(unsigned long field, u64 value) 127 { 128 u16 clean_field; 129 int offset = get_evmcs_offset(field, &clean_field); 130 131 if (offset < 0) 132 return; 133 134 *(u64 *)((char *)current_evmcs + offset) = value; 135 136 current_evmcs->hv_clean_fields &= ~clean_field; 137 } 138 139 static inline void evmcs_write32(unsigned long field, u32 value) 140 { 141 u16 clean_field; 142 int offset = get_evmcs_offset(field, &clean_field); 143 144 if (offset < 0) 145 return; 146 147 *(u32 *)((char *)current_evmcs + offset) = value; 148 current_evmcs->hv_clean_fields &= ~clean_field; 149 } 150 151 static inline void evmcs_write16(unsigned long field, u16 value) 152 { 153 u16 clean_field; 154 int offset = get_evmcs_offset(field, &clean_field); 155 156 if (offset < 0) 157 return; 158 159 *(u16 *)((char *)current_evmcs + offset) = value; 160 current_evmcs->hv_clean_fields &= ~clean_field; 161 } 162 163 static inline u64 evmcs_read64(unsigned long field) 164 { 165 int offset = get_evmcs_offset(field, NULL); 166 167 if (offset < 0) 168 return 0; 169 170 return *(u64 *)((char *)current_evmcs + offset); 171 } 172 173 static inline u32 evmcs_read32(unsigned long field) 174 { 175 int offset = get_evmcs_offset(field, NULL); 176 177 if (offset < 0) 178 return 0; 179 180 return *(u32 *)((char *)current_evmcs + offset); 181 } 182 183 static inline u16 evmcs_read16(unsigned long field) 184 { 185 int offset = get_evmcs_offset(field, NULL); 186 187 if (offset < 0) 188 return 0; 189 190 return *(u16 *)((char *)current_evmcs + offset); 191 } 192 193 static inline void evmcs_touch_msr_bitmap(void) 194 { 195 if (unlikely(!current_evmcs)) 196 return; 197 198 if (current_evmcs->hv_enlightenments_control.msr_bitmap) 199 current_evmcs->hv_clean_fields &= 200 ~HV_VMX_ENLIGHTENED_CLEAN_FIELD_MSR_BITMAP; 201 } 202 203 static inline void evmcs_load(u64 phys_addr) 204 { 205 struct hv_vp_assist_page *vp_ap = 206 hv_get_vp_assist_page(smp_processor_id()); 207 208 if (current_evmcs->hv_enlightenments_control.nested_flush_hypercall) 209 vp_ap->nested_control.features.directhypercall = 1; 210 vp_ap->current_nested_vmcs = phys_addr; 211 vp_ap->enlighten_vmentry = 1; 212 } 213 214 #else /* !IS_ENABLED(CONFIG_HYPERV) */ 215 static __always_inline void evmcs_write64(unsigned long field, u64 value) {} 216 static inline void evmcs_write32(unsigned long field, u32 value) {} 217 static inline void evmcs_write16(unsigned long field, u16 value) {} 218 static inline u64 evmcs_read64(unsigned long field) { return 0; } 219 static inline u32 evmcs_read32(unsigned long field) { return 0; } 220 static inline u16 evmcs_read16(unsigned long field) { return 0; } 221 static inline void evmcs_load(u64 phys_addr) {} 222 static inline void evmcs_touch_msr_bitmap(void) {} 223 #endif /* IS_ENABLED(CONFIG_HYPERV) */ 224 225 #define EVMPTR_INVALID (-1ULL) 226 #define EVMPTR_MAP_PENDING (-2ULL) 227 228 static inline bool evmptr_is_valid(u64 evmptr) 229 { 230 return evmptr != EVMPTR_INVALID && evmptr != EVMPTR_MAP_PENDING; 231 } 232 233 enum nested_evmptrld_status { 234 EVMPTRLD_DISABLED, 235 EVMPTRLD_SUCCEEDED, 236 EVMPTRLD_VMFAIL, 237 EVMPTRLD_ERROR, 238 }; 239 240 u64 nested_get_evmptr(struct kvm_vcpu *vcpu); 241 uint16_t nested_get_evmcs_version(struct kvm_vcpu *vcpu); 242 int nested_enable_evmcs(struct kvm_vcpu *vcpu, 243 uint16_t *vmcs_version); 244 void nested_evmcs_filter_control_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 *pdata); 245 int nested_evmcs_check_controls(struct vmcs12 *vmcs12); 246 bool nested_evmcs_l2_tlb_flush_enabled(struct kvm_vcpu *vcpu); 247 void vmx_hv_inject_synthetic_vmexit_post_tlb_flush(struct kvm_vcpu *vcpu); 248 249 #endif /* __KVM_X86_VMX_HYPERV_H */ 250