162306a36Sopenharmony_ci/* SPDX-License-Identifier: GPL-2.0-only */ 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * KVM Microsoft Hyper-V emulation 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * derived from arch/x86/kvm/x86.c 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Copyright (C) 2006 Qumranet, Inc. 862306a36Sopenharmony_ci * Copyright (C) 2008 Qumranet, Inc. 962306a36Sopenharmony_ci * Copyright IBM Corporation, 2008 1062306a36Sopenharmony_ci * Copyright 2010 Red Hat, Inc. and/or its affiliates. 1162306a36Sopenharmony_ci * Copyright (C) 2015 Andrey Smetanin <asmetanin@virtuozzo.com> 1262306a36Sopenharmony_ci * 1362306a36Sopenharmony_ci * Authors: 1462306a36Sopenharmony_ci * Avi Kivity <avi@qumranet.com> 1562306a36Sopenharmony_ci * Yaniv Kamay <yaniv@qumranet.com> 1662306a36Sopenharmony_ci * Amit Shah <amit.shah@qumranet.com> 1762306a36Sopenharmony_ci * Ben-Ami Yassour <benami@il.ibm.com> 1862306a36Sopenharmony_ci * Andrey Smetanin <asmetanin@virtuozzo.com> 1962306a36Sopenharmony_ci */ 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_ci#ifndef __ARCH_X86_KVM_HYPERV_H__ 2262306a36Sopenharmony_ci#define __ARCH_X86_KVM_HYPERV_H__ 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_ci#include <linux/kvm_host.h> 2562306a36Sopenharmony_ci#include "x86.h" 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_ci/* "Hv#1" signature */ 2862306a36Sopenharmony_ci#define HYPERV_CPUID_SIGNATURE_EAX 0x31237648 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_ci/* 3162306a36Sopenharmony_ci * The #defines related to the synthetic debugger are required by KDNet, but 3262306a36Sopenharmony_ci * they are not documented in the Hyper-V TLFS because the synthetic debugger 3362306a36Sopenharmony_ci * functionality has been deprecated and is subject to removal in future 3462306a36Sopenharmony_ci * versions of Windows. 3562306a36Sopenharmony_ci */ 3662306a36Sopenharmony_ci#define HYPERV_CPUID_SYNDBG_VENDOR_AND_MAX_FUNCTIONS 0x40000080 3762306a36Sopenharmony_ci#define HYPERV_CPUID_SYNDBG_INTERFACE 0x40000081 3862306a36Sopenharmony_ci#define HYPERV_CPUID_SYNDBG_PLATFORM_CAPABILITIES 0x40000082 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_ci/* 4162306a36Sopenharmony_ci * Hyper-V synthetic debugger platform capabilities 4262306a36Sopenharmony_ci * These are HYPERV_CPUID_SYNDBG_PLATFORM_CAPABILITIES.EAX bits. 4362306a36Sopenharmony_ci */ 4462306a36Sopenharmony_ci#define HV_X64_SYNDBG_CAP_ALLOW_KERNEL_DEBUGGING BIT(1) 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_ci/* Hyper-V Synthetic debug options MSR */ 4762306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_CONTROL 0x400000F1 4862306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_STATUS 0x400000F2 4962306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_SEND_BUFFER 0x400000F3 5062306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_RECV_BUFFER 0x400000F4 5162306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_PENDING_BUFFER 0x400000F5 5262306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_OPTIONS 0x400000FF 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_ci/* Hyper-V HV_X64_MSR_SYNDBG_OPTIONS bits */ 5562306a36Sopenharmony_ci#define HV_X64_SYNDBG_OPTION_USE_HCALLS BIT(2) 5662306a36Sopenharmony_ci 5762306a36Sopenharmony_cistatic inline struct kvm_hv *to_kvm_hv(struct kvm *kvm) 5862306a36Sopenharmony_ci{ 5962306a36Sopenharmony_ci return &kvm->arch.hyperv; 6062306a36Sopenharmony_ci} 6162306a36Sopenharmony_ci 6262306a36Sopenharmony_cistatic inline struct kvm_vcpu_hv *to_hv_vcpu(struct kvm_vcpu *vcpu) 6362306a36Sopenharmony_ci{ 6462306a36Sopenharmony_ci return vcpu->arch.hyperv; 6562306a36Sopenharmony_ci} 6662306a36Sopenharmony_ci 6762306a36Sopenharmony_cistatic inline struct kvm_vcpu_hv_synic *to_hv_synic(struct kvm_vcpu *vcpu) 6862306a36Sopenharmony_ci{ 6962306a36Sopenharmony_ci struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu); 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_ci return &hv_vcpu->synic; 7262306a36Sopenharmony_ci} 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_cistatic inline struct kvm_vcpu *hv_synic_to_vcpu(struct kvm_vcpu_hv_synic *synic) 7562306a36Sopenharmony_ci{ 7662306a36Sopenharmony_ci struct kvm_vcpu_hv *hv_vcpu = container_of(synic, struct kvm_vcpu_hv, synic); 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci return hv_vcpu->vcpu; 7962306a36Sopenharmony_ci} 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_cistatic inline struct kvm_hv_syndbg *to_hv_syndbg(struct kvm_vcpu *vcpu) 8262306a36Sopenharmony_ci{ 8362306a36Sopenharmony_ci return &vcpu->kvm->arch.hyperv.hv_syndbg; 8462306a36Sopenharmony_ci} 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_cistatic inline u32 kvm_hv_get_vpindex(struct kvm_vcpu *vcpu) 8762306a36Sopenharmony_ci{ 8862306a36Sopenharmony_ci struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu); 8962306a36Sopenharmony_ci 9062306a36Sopenharmony_ci return hv_vcpu ? hv_vcpu->vp_index : vcpu->vcpu_idx; 9162306a36Sopenharmony_ci} 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ciint kvm_hv_set_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 data, bool host); 9462306a36Sopenharmony_ciint kvm_hv_get_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata, bool host); 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_cistatic inline bool kvm_hv_hypercall_enabled(struct kvm_vcpu *vcpu) 9762306a36Sopenharmony_ci{ 9862306a36Sopenharmony_ci return vcpu->arch.hyperv_enabled && to_kvm_hv(vcpu->kvm)->hv_guest_os_id; 9962306a36Sopenharmony_ci} 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ciint kvm_hv_hypercall(struct kvm_vcpu *vcpu); 10262306a36Sopenharmony_ci 10362306a36Sopenharmony_civoid kvm_hv_irq_routing_update(struct kvm *kvm); 10462306a36Sopenharmony_ciint kvm_hv_synic_set_irq(struct kvm *kvm, u32 vcpu_id, u32 sint); 10562306a36Sopenharmony_civoid kvm_hv_synic_send_eoi(struct kvm_vcpu *vcpu, int vector); 10662306a36Sopenharmony_ciint kvm_hv_activate_synic(struct kvm_vcpu *vcpu, bool dont_zero_synic_pages); 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_civoid kvm_hv_vcpu_uninit(struct kvm_vcpu *vcpu); 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_cibool kvm_hv_assist_page_enabled(struct kvm_vcpu *vcpu); 11162306a36Sopenharmony_ciint kvm_hv_get_assist_page(struct kvm_vcpu *vcpu); 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_cistatic inline struct kvm_vcpu_hv_stimer *to_hv_stimer(struct kvm_vcpu *vcpu, 11462306a36Sopenharmony_ci int timer_index) 11562306a36Sopenharmony_ci{ 11662306a36Sopenharmony_ci return &to_hv_vcpu(vcpu)->stimer[timer_index]; 11762306a36Sopenharmony_ci} 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_cistatic inline struct kvm_vcpu *hv_stimer_to_vcpu(struct kvm_vcpu_hv_stimer *stimer) 12062306a36Sopenharmony_ci{ 12162306a36Sopenharmony_ci struct kvm_vcpu_hv *hv_vcpu; 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci hv_vcpu = container_of(stimer - stimer->index, struct kvm_vcpu_hv, 12462306a36Sopenharmony_ci stimer[0]); 12562306a36Sopenharmony_ci return hv_vcpu->vcpu; 12662306a36Sopenharmony_ci} 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_cistatic inline bool kvm_hv_has_stimer_pending(struct kvm_vcpu *vcpu) 12962306a36Sopenharmony_ci{ 13062306a36Sopenharmony_ci struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu); 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_ci if (!hv_vcpu) 13362306a36Sopenharmony_ci return false; 13462306a36Sopenharmony_ci 13562306a36Sopenharmony_ci return !bitmap_empty(hv_vcpu->stimer_pending_bitmap, 13662306a36Sopenharmony_ci HV_SYNIC_STIMER_COUNT); 13762306a36Sopenharmony_ci} 13862306a36Sopenharmony_ci 13962306a36Sopenharmony_ci/* 14062306a36Sopenharmony_ci * With HV_ACCESS_TSC_INVARIANT feature, invariant TSC (CPUID.80000007H:EDX[8]) 14162306a36Sopenharmony_ci * is only observed after HV_X64_MSR_TSC_INVARIANT_CONTROL was written to. 14262306a36Sopenharmony_ci */ 14362306a36Sopenharmony_cistatic inline bool kvm_hv_invtsc_suppressed(struct kvm_vcpu *vcpu) 14462306a36Sopenharmony_ci{ 14562306a36Sopenharmony_ci struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu); 14662306a36Sopenharmony_ci 14762306a36Sopenharmony_ci /* 14862306a36Sopenharmony_ci * If Hyper-V's invariant TSC control is not exposed to the guest, 14962306a36Sopenharmony_ci * the invariant TSC CPUID flag is not suppressed, Windows guests were 15062306a36Sopenharmony_ci * observed to be able to handle it correctly. Going forward, VMMs are 15162306a36Sopenharmony_ci * encouraged to enable Hyper-V's invariant TSC control when invariant 15262306a36Sopenharmony_ci * TSC CPUID flag is set to make KVM's behavior match genuine Hyper-V. 15362306a36Sopenharmony_ci */ 15462306a36Sopenharmony_ci if (!hv_vcpu || 15562306a36Sopenharmony_ci !(hv_vcpu->cpuid_cache.features_eax & HV_ACCESS_TSC_INVARIANT)) 15662306a36Sopenharmony_ci return false; 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci /* 15962306a36Sopenharmony_ci * If Hyper-V's invariant TSC control is exposed to the guest, KVM is 16062306a36Sopenharmony_ci * responsible for suppressing the invariant TSC CPUID flag if the 16162306a36Sopenharmony_ci * Hyper-V control is not enabled. 16262306a36Sopenharmony_ci */ 16362306a36Sopenharmony_ci return !(to_kvm_hv(vcpu->kvm)->hv_invtsc_control & HV_EXPOSE_INVARIANT_TSC); 16462306a36Sopenharmony_ci} 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_civoid kvm_hv_process_stimers(struct kvm_vcpu *vcpu); 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_civoid kvm_hv_setup_tsc_page(struct kvm *kvm, 16962306a36Sopenharmony_ci struct pvclock_vcpu_time_info *hv_clock); 17062306a36Sopenharmony_civoid kvm_hv_request_tsc_page_update(struct kvm *kvm); 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_civoid kvm_hv_init_vm(struct kvm *kvm); 17362306a36Sopenharmony_civoid kvm_hv_destroy_vm(struct kvm *kvm); 17462306a36Sopenharmony_ciint kvm_hv_vcpu_init(struct kvm_vcpu *vcpu); 17562306a36Sopenharmony_civoid kvm_hv_set_cpuid(struct kvm_vcpu *vcpu, bool hyperv_enabled); 17662306a36Sopenharmony_ciint kvm_hv_set_enforce_cpuid(struct kvm_vcpu *vcpu, bool enforce); 17762306a36Sopenharmony_ciint kvm_vm_ioctl_hv_eventfd(struct kvm *kvm, struct kvm_hyperv_eventfd *args); 17862306a36Sopenharmony_ciint kvm_get_hv_cpuid(struct kvm_vcpu *vcpu, struct kvm_cpuid2 *cpuid, 17962306a36Sopenharmony_ci struct kvm_cpuid_entry2 __user *entries); 18062306a36Sopenharmony_ci 18162306a36Sopenharmony_cistatic inline struct kvm_vcpu_hv_tlb_flush_fifo *kvm_hv_get_tlb_flush_fifo(struct kvm_vcpu *vcpu, 18262306a36Sopenharmony_ci bool is_guest_mode) 18362306a36Sopenharmony_ci{ 18462306a36Sopenharmony_ci struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu); 18562306a36Sopenharmony_ci int i = is_guest_mode ? HV_L2_TLB_FLUSH_FIFO : 18662306a36Sopenharmony_ci HV_L1_TLB_FLUSH_FIFO; 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ci return &hv_vcpu->tlb_flush_fifo[i]; 18962306a36Sopenharmony_ci} 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_cistatic inline void kvm_hv_vcpu_purge_flush_tlb(struct kvm_vcpu *vcpu) 19262306a36Sopenharmony_ci{ 19362306a36Sopenharmony_ci struct kvm_vcpu_hv_tlb_flush_fifo *tlb_flush_fifo; 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci if (!to_hv_vcpu(vcpu) || !kvm_check_request(KVM_REQ_HV_TLB_FLUSH, vcpu)) 19662306a36Sopenharmony_ci return; 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci tlb_flush_fifo = kvm_hv_get_tlb_flush_fifo(vcpu, is_guest_mode(vcpu)); 19962306a36Sopenharmony_ci 20062306a36Sopenharmony_ci kfifo_reset_out(&tlb_flush_fifo->entries); 20162306a36Sopenharmony_ci} 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_cistatic inline bool guest_hv_cpuid_has_l2_tlb_flush(struct kvm_vcpu *vcpu) 20462306a36Sopenharmony_ci{ 20562306a36Sopenharmony_ci struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu); 20662306a36Sopenharmony_ci 20762306a36Sopenharmony_ci return hv_vcpu && 20862306a36Sopenharmony_ci (hv_vcpu->cpuid_cache.nested_eax & HV_X64_NESTED_DIRECT_FLUSH); 20962306a36Sopenharmony_ci} 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_cistatic inline bool kvm_hv_is_tlb_flush_hcall(struct kvm_vcpu *vcpu) 21262306a36Sopenharmony_ci{ 21362306a36Sopenharmony_ci struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu); 21462306a36Sopenharmony_ci u16 code; 21562306a36Sopenharmony_ci 21662306a36Sopenharmony_ci if (!hv_vcpu) 21762306a36Sopenharmony_ci return false; 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci code = is_64_bit_hypercall(vcpu) ? kvm_rcx_read(vcpu) : 22062306a36Sopenharmony_ci kvm_rax_read(vcpu); 22162306a36Sopenharmony_ci 22262306a36Sopenharmony_ci return (code == HVCALL_FLUSH_VIRTUAL_ADDRESS_SPACE || 22362306a36Sopenharmony_ci code == HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST || 22462306a36Sopenharmony_ci code == HVCALL_FLUSH_VIRTUAL_ADDRESS_SPACE_EX || 22562306a36Sopenharmony_ci code == HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX); 22662306a36Sopenharmony_ci} 22762306a36Sopenharmony_ci 22862306a36Sopenharmony_cistatic inline int kvm_hv_verify_vp_assist(struct kvm_vcpu *vcpu) 22962306a36Sopenharmony_ci{ 23062306a36Sopenharmony_ci if (!to_hv_vcpu(vcpu)) 23162306a36Sopenharmony_ci return 0; 23262306a36Sopenharmony_ci 23362306a36Sopenharmony_ci if (!kvm_hv_assist_page_enabled(vcpu)) 23462306a36Sopenharmony_ci return 0; 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci return kvm_hv_get_assist_page(vcpu); 23762306a36Sopenharmony_ci} 23862306a36Sopenharmony_ci 23962306a36Sopenharmony_ciint kvm_hv_vcpu_flush_tlb(struct kvm_vcpu *vcpu); 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci#endif 242