xref: /linux/arch/x86/kvm/vmx/hyperv.h (revision 497e6b37b0099dc415578488287fd84fb74433eb)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef __KVM_X86_VMX_HYPERV_H
3 #define __KVM_X86_VMX_HYPERV_H
4 
5 #include <linux/jump_label.h>
6 
7 #include <asm/hyperv-tlfs.h>
8 #include <asm/mshyperv.h>
9 #include <asm/vmx.h>
10 
11 #include "../hyperv.h"
12 
13 #include "capabilities.h"
14 #include "vmcs.h"
15 #include "vmcs12.h"
16 
17 struct vmcs_config;
18 
19 DECLARE_STATIC_KEY_FALSE(enable_evmcs);
20 
21 #define current_evmcs ((struct hv_enlightened_vmcs *)this_cpu_read(current_vmcs))
22 
23 #define KVM_EVMCS_VERSION 1
24 
25 /*
26  * Enlightened VMCSv1 doesn't support these:
27  *
28  *	POSTED_INTR_NV                  = 0x00000002,
29  *	GUEST_INTR_STATUS               = 0x00000810,
30  *	APIC_ACCESS_ADDR		= 0x00002014,
31  *	POSTED_INTR_DESC_ADDR           = 0x00002016,
32  *	EOI_EXIT_BITMAP0                = 0x0000201c,
33  *	EOI_EXIT_BITMAP1                = 0x0000201e,
34  *	EOI_EXIT_BITMAP2                = 0x00002020,
35  *	EOI_EXIT_BITMAP3                = 0x00002022,
36  *	GUEST_PML_INDEX			= 0x00000812,
37  *	PML_ADDRESS			= 0x0000200e,
38  *	VM_FUNCTION_CONTROL             = 0x00002018,
39  *	EPTP_LIST_ADDRESS               = 0x00002024,
40  *	VMREAD_BITMAP                   = 0x00002026,
41  *	VMWRITE_BITMAP                  = 0x00002028,
42  *
43  *	TSC_MULTIPLIER                  = 0x00002032,
44  *	PLE_GAP                         = 0x00004020,
45  *	PLE_WINDOW                      = 0x00004022,
46  *	VMX_PREEMPTION_TIMER_VALUE      = 0x0000482E,
47  *
48  * Currently unsupported in KVM:
49  *	GUEST_IA32_RTIT_CTL		= 0x00002814,
50  */
51 #define EVMCS1_UNSUPPORTED_PINCTRL (PIN_BASED_POSTED_INTR | \
52 				    PIN_BASED_VMX_PREEMPTION_TIMER)
53 #define EVMCS1_UNSUPPORTED_EXEC_CTRL (CPU_BASED_ACTIVATE_TERTIARY_CONTROLS)
54 #define EVMCS1_UNSUPPORTED_2NDEXEC					\
55 	(SECONDARY_EXEC_VIRTUAL_INTR_DELIVERY |				\
56 	 SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES |			\
57 	 SECONDARY_EXEC_APIC_REGISTER_VIRT |				\
58 	 SECONDARY_EXEC_ENABLE_PML |					\
59 	 SECONDARY_EXEC_ENABLE_VMFUNC |					\
60 	 SECONDARY_EXEC_SHADOW_VMCS |					\
61 	 SECONDARY_EXEC_TSC_SCALING |					\
62 	 SECONDARY_EXEC_PAUSE_LOOP_EXITING)
63 #define EVMCS1_UNSUPPORTED_VMEXIT_CTRL					\
64 	(VM_EXIT_SAVE_VMX_PREEMPTION_TIMER)
65 #define EVMCS1_UNSUPPORTED_VMENTRY_CTRL (0)
66 #define EVMCS1_UNSUPPORTED_VMFUNC (VMX_VMFUNC_EPTP_SWITCHING)
67 
68 struct evmcs_field {
69 	u16 offset;
70 	u16 clean_field;
71 };
72 
73 extern const struct evmcs_field vmcs_field_to_evmcs_1[];
74 extern const unsigned int nr_evmcs_1_fields;
75 
76 static __always_inline int evmcs_field_offset(unsigned long field,
77 					      u16 *clean_field)
78 {
79 	unsigned int index = ROL16(field, 6);
80 	const struct evmcs_field *evmcs_field;
81 
82 	if (unlikely(index >= nr_evmcs_1_fields))
83 		return -ENOENT;
84 
85 	evmcs_field = &vmcs_field_to_evmcs_1[index];
86 
87 	/*
88 	 * Use offset=0 to detect holes in eVMCS. This offset belongs to
89 	 * 'revision_id' but this field has no encoding and is supposed to
90 	 * be accessed directly.
91 	 */
92 	if (unlikely(!evmcs_field->offset))
93 		return -ENOENT;
94 
95 	if (clean_field)
96 		*clean_field = evmcs_field->clean_field;
97 
98 	return evmcs_field->offset;
99 }
100 
101 static inline u64 evmcs_read_any(struct hv_enlightened_vmcs *evmcs,
102 				 unsigned long field, u16 offset)
103 {
104 	/*
105 	 * vmcs12_read_any() doesn't care whether the supplied structure
106 	 * is 'struct vmcs12' or 'struct hv_enlightened_vmcs' as it takes
107 	 * the exact offset of the required field, use it for convenience
108 	 * here.
109 	 */
110 	return vmcs12_read_any((void *)evmcs, field, offset);
111 }
112 
113 #if IS_ENABLED(CONFIG_HYPERV)
114 
115 static __always_inline int get_evmcs_offset(unsigned long field,
116 					    u16 *clean_field)
117 {
118 	int offset = evmcs_field_offset(field, clean_field);
119 
120 	WARN_ONCE(offset < 0, "KVM: accessing unsupported EVMCS field %lx\n",
121 		  field);
122 
123 	return offset;
124 }
125 
126 static __always_inline void evmcs_write64(unsigned long field, u64 value)
127 {
128 	u16 clean_field;
129 	int offset = get_evmcs_offset(field, &clean_field);
130 
131 	if (offset < 0)
132 		return;
133 
134 	*(u64 *)((char *)current_evmcs + offset) = value;
135 
136 	current_evmcs->hv_clean_fields &= ~clean_field;
137 }
138 
139 static inline void evmcs_write32(unsigned long field, u32 value)
140 {
141 	u16 clean_field;
142 	int offset = get_evmcs_offset(field, &clean_field);
143 
144 	if (offset < 0)
145 		return;
146 
147 	*(u32 *)((char *)current_evmcs + offset) = value;
148 	current_evmcs->hv_clean_fields &= ~clean_field;
149 }
150 
151 static inline void evmcs_write16(unsigned long field, u16 value)
152 {
153 	u16 clean_field;
154 	int offset = get_evmcs_offset(field, &clean_field);
155 
156 	if (offset < 0)
157 		return;
158 
159 	*(u16 *)((char *)current_evmcs + offset) = value;
160 	current_evmcs->hv_clean_fields &= ~clean_field;
161 }
162 
163 static inline u64 evmcs_read64(unsigned long field)
164 {
165 	int offset = get_evmcs_offset(field, NULL);
166 
167 	if (offset < 0)
168 		return 0;
169 
170 	return *(u64 *)((char *)current_evmcs + offset);
171 }
172 
173 static inline u32 evmcs_read32(unsigned long field)
174 {
175 	int offset = get_evmcs_offset(field, NULL);
176 
177 	if (offset < 0)
178 		return 0;
179 
180 	return *(u32 *)((char *)current_evmcs + offset);
181 }
182 
183 static inline u16 evmcs_read16(unsigned long field)
184 {
185 	int offset = get_evmcs_offset(field, NULL);
186 
187 	if (offset < 0)
188 		return 0;
189 
190 	return *(u16 *)((char *)current_evmcs + offset);
191 }
192 
193 static inline void evmcs_touch_msr_bitmap(void)
194 {
195 	if (unlikely(!current_evmcs))
196 		return;
197 
198 	if (current_evmcs->hv_enlightenments_control.msr_bitmap)
199 		current_evmcs->hv_clean_fields &=
200 			~HV_VMX_ENLIGHTENED_CLEAN_FIELD_MSR_BITMAP;
201 }
202 
203 static inline void evmcs_load(u64 phys_addr)
204 {
205 	struct hv_vp_assist_page *vp_ap =
206 		hv_get_vp_assist_page(smp_processor_id());
207 
208 	if (current_evmcs->hv_enlightenments_control.nested_flush_hypercall)
209 		vp_ap->nested_control.features.directhypercall = 1;
210 	vp_ap->current_nested_vmcs = phys_addr;
211 	vp_ap->enlighten_vmentry = 1;
212 }
213 
214 #else /* !IS_ENABLED(CONFIG_HYPERV) */
215 static __always_inline void evmcs_write64(unsigned long field, u64 value) {}
216 static inline void evmcs_write32(unsigned long field, u32 value) {}
217 static inline void evmcs_write16(unsigned long field, u16 value) {}
218 static inline u64 evmcs_read64(unsigned long field) { return 0; }
219 static inline u32 evmcs_read32(unsigned long field) { return 0; }
220 static inline u16 evmcs_read16(unsigned long field) { return 0; }
221 static inline void evmcs_load(u64 phys_addr) {}
222 static inline void evmcs_touch_msr_bitmap(void) {}
223 #endif /* IS_ENABLED(CONFIG_HYPERV) */
224 
225 #define EVMPTR_INVALID (-1ULL)
226 #define EVMPTR_MAP_PENDING (-2ULL)
227 
228 static inline bool evmptr_is_valid(u64 evmptr)
229 {
230 	return evmptr != EVMPTR_INVALID && evmptr != EVMPTR_MAP_PENDING;
231 }
232 
233 enum nested_evmptrld_status {
234 	EVMPTRLD_DISABLED,
235 	EVMPTRLD_SUCCEEDED,
236 	EVMPTRLD_VMFAIL,
237 	EVMPTRLD_ERROR,
238 };
239 
240 u64 nested_get_evmptr(struct kvm_vcpu *vcpu);
241 uint16_t nested_get_evmcs_version(struct kvm_vcpu *vcpu);
242 int nested_enable_evmcs(struct kvm_vcpu *vcpu,
243 			uint16_t *vmcs_version);
244 void nested_evmcs_filter_control_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 *pdata);
245 int nested_evmcs_check_controls(struct vmcs12 *vmcs12);
246 bool nested_evmcs_l2_tlb_flush_enabled(struct kvm_vcpu *vcpu);
247 void vmx_hv_inject_synthetic_vmexit_post_tlb_flush(struct kvm_vcpu *vcpu);
248 
249 #endif /* __KVM_X86_VMX_HYPERV_H */
250