162306a36Sopenharmony_ci/* SPDX-License-Identifier: GPL-2.0-only */
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * KVM Microsoft Hyper-V emulation
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * derived from arch/x86/kvm/x86.c
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Copyright (C) 2006 Qumranet, Inc.
862306a36Sopenharmony_ci * Copyright (C) 2008 Qumranet, Inc.
962306a36Sopenharmony_ci * Copyright IBM Corporation, 2008
1062306a36Sopenharmony_ci * Copyright 2010 Red Hat, Inc. and/or its affiliates.
1162306a36Sopenharmony_ci * Copyright (C) 2015 Andrey Smetanin <asmetanin@virtuozzo.com>
1262306a36Sopenharmony_ci *
1362306a36Sopenharmony_ci * Authors:
1462306a36Sopenharmony_ci *   Avi Kivity   <avi@qumranet.com>
1562306a36Sopenharmony_ci *   Yaniv Kamay  <yaniv@qumranet.com>
1662306a36Sopenharmony_ci *   Amit Shah    <amit.shah@qumranet.com>
1762306a36Sopenharmony_ci *   Ben-Ami Yassour <benami@il.ibm.com>
1862306a36Sopenharmony_ci *   Andrey Smetanin <asmetanin@virtuozzo.com>
1962306a36Sopenharmony_ci */
2062306a36Sopenharmony_ci
2162306a36Sopenharmony_ci#ifndef __ARCH_X86_KVM_HYPERV_H__
2262306a36Sopenharmony_ci#define __ARCH_X86_KVM_HYPERV_H__
2362306a36Sopenharmony_ci
2462306a36Sopenharmony_ci#include <linux/kvm_host.h>
2562306a36Sopenharmony_ci#include "x86.h"
2662306a36Sopenharmony_ci
2762306a36Sopenharmony_ci/* "Hv#1" signature */
2862306a36Sopenharmony_ci#define HYPERV_CPUID_SIGNATURE_EAX 0x31237648
2962306a36Sopenharmony_ci
3062306a36Sopenharmony_ci/*
3162306a36Sopenharmony_ci * The #defines related to the synthetic debugger are required by KDNet, but
3262306a36Sopenharmony_ci * they are not documented in the Hyper-V TLFS because the synthetic debugger
3362306a36Sopenharmony_ci * functionality has been deprecated and is subject to removal in future
3462306a36Sopenharmony_ci * versions of Windows.
3562306a36Sopenharmony_ci */
3662306a36Sopenharmony_ci#define HYPERV_CPUID_SYNDBG_VENDOR_AND_MAX_FUNCTIONS	0x40000080
3762306a36Sopenharmony_ci#define HYPERV_CPUID_SYNDBG_INTERFACE			0x40000081
3862306a36Sopenharmony_ci#define HYPERV_CPUID_SYNDBG_PLATFORM_CAPABILITIES	0x40000082
3962306a36Sopenharmony_ci
4062306a36Sopenharmony_ci/*
4162306a36Sopenharmony_ci * Hyper-V synthetic debugger platform capabilities
4262306a36Sopenharmony_ci * These are HYPERV_CPUID_SYNDBG_PLATFORM_CAPABILITIES.EAX bits.
4362306a36Sopenharmony_ci */
4462306a36Sopenharmony_ci#define HV_X64_SYNDBG_CAP_ALLOW_KERNEL_DEBUGGING	BIT(1)
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_ci/* Hyper-V Synthetic debug options MSR */
4762306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_CONTROL		0x400000F1
4862306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_STATUS		0x400000F2
4962306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_SEND_BUFFER		0x400000F3
5062306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_RECV_BUFFER		0x400000F4
5162306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_PENDING_BUFFER	0x400000F5
5262306a36Sopenharmony_ci#define HV_X64_MSR_SYNDBG_OPTIONS		0x400000FF
5362306a36Sopenharmony_ci
5462306a36Sopenharmony_ci/* Hyper-V HV_X64_MSR_SYNDBG_OPTIONS bits */
5562306a36Sopenharmony_ci#define HV_X64_SYNDBG_OPTION_USE_HCALLS		BIT(2)
5662306a36Sopenharmony_ci
5762306a36Sopenharmony_cistatic inline struct kvm_hv *to_kvm_hv(struct kvm *kvm)
5862306a36Sopenharmony_ci{
5962306a36Sopenharmony_ci	return &kvm->arch.hyperv;
6062306a36Sopenharmony_ci}
6162306a36Sopenharmony_ci
6262306a36Sopenharmony_cistatic inline struct kvm_vcpu_hv *to_hv_vcpu(struct kvm_vcpu *vcpu)
6362306a36Sopenharmony_ci{
6462306a36Sopenharmony_ci	return vcpu->arch.hyperv;
6562306a36Sopenharmony_ci}
6662306a36Sopenharmony_ci
6762306a36Sopenharmony_cistatic inline struct kvm_vcpu_hv_synic *to_hv_synic(struct kvm_vcpu *vcpu)
6862306a36Sopenharmony_ci{
6962306a36Sopenharmony_ci	struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
7062306a36Sopenharmony_ci
7162306a36Sopenharmony_ci	return &hv_vcpu->synic;
7262306a36Sopenharmony_ci}
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_cistatic inline struct kvm_vcpu *hv_synic_to_vcpu(struct kvm_vcpu_hv_synic *synic)
7562306a36Sopenharmony_ci{
7662306a36Sopenharmony_ci	struct kvm_vcpu_hv *hv_vcpu = container_of(synic, struct kvm_vcpu_hv, synic);
7762306a36Sopenharmony_ci
7862306a36Sopenharmony_ci	return hv_vcpu->vcpu;
7962306a36Sopenharmony_ci}
8062306a36Sopenharmony_ci
8162306a36Sopenharmony_cistatic inline struct kvm_hv_syndbg *to_hv_syndbg(struct kvm_vcpu *vcpu)
8262306a36Sopenharmony_ci{
8362306a36Sopenharmony_ci	return &vcpu->kvm->arch.hyperv.hv_syndbg;
8462306a36Sopenharmony_ci}
8562306a36Sopenharmony_ci
8662306a36Sopenharmony_cistatic inline u32 kvm_hv_get_vpindex(struct kvm_vcpu *vcpu)
8762306a36Sopenharmony_ci{
8862306a36Sopenharmony_ci	struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
8962306a36Sopenharmony_ci
9062306a36Sopenharmony_ci	return hv_vcpu ? hv_vcpu->vp_index : vcpu->vcpu_idx;
9162306a36Sopenharmony_ci}
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ciint kvm_hv_set_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 data, bool host);
9462306a36Sopenharmony_ciint kvm_hv_get_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata, bool host);
9562306a36Sopenharmony_ci
9662306a36Sopenharmony_cistatic inline bool kvm_hv_hypercall_enabled(struct kvm_vcpu *vcpu)
9762306a36Sopenharmony_ci{
9862306a36Sopenharmony_ci	return vcpu->arch.hyperv_enabled && to_kvm_hv(vcpu->kvm)->hv_guest_os_id;
9962306a36Sopenharmony_ci}
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_ciint kvm_hv_hypercall(struct kvm_vcpu *vcpu);
10262306a36Sopenharmony_ci
10362306a36Sopenharmony_civoid kvm_hv_irq_routing_update(struct kvm *kvm);
10462306a36Sopenharmony_ciint kvm_hv_synic_set_irq(struct kvm *kvm, u32 vcpu_id, u32 sint);
10562306a36Sopenharmony_civoid kvm_hv_synic_send_eoi(struct kvm_vcpu *vcpu, int vector);
10662306a36Sopenharmony_ciint kvm_hv_activate_synic(struct kvm_vcpu *vcpu, bool dont_zero_synic_pages);
10762306a36Sopenharmony_ci
10862306a36Sopenharmony_civoid kvm_hv_vcpu_uninit(struct kvm_vcpu *vcpu);
10962306a36Sopenharmony_ci
11062306a36Sopenharmony_cibool kvm_hv_assist_page_enabled(struct kvm_vcpu *vcpu);
11162306a36Sopenharmony_ciint kvm_hv_get_assist_page(struct kvm_vcpu *vcpu);
11262306a36Sopenharmony_ci
11362306a36Sopenharmony_cistatic inline struct kvm_vcpu_hv_stimer *to_hv_stimer(struct kvm_vcpu *vcpu,
11462306a36Sopenharmony_ci						      int timer_index)
11562306a36Sopenharmony_ci{
11662306a36Sopenharmony_ci	return &to_hv_vcpu(vcpu)->stimer[timer_index];
11762306a36Sopenharmony_ci}
11862306a36Sopenharmony_ci
11962306a36Sopenharmony_cistatic inline struct kvm_vcpu *hv_stimer_to_vcpu(struct kvm_vcpu_hv_stimer *stimer)
12062306a36Sopenharmony_ci{
12162306a36Sopenharmony_ci	struct kvm_vcpu_hv *hv_vcpu;
12262306a36Sopenharmony_ci
12362306a36Sopenharmony_ci	hv_vcpu = container_of(stimer - stimer->index, struct kvm_vcpu_hv,
12462306a36Sopenharmony_ci			       stimer[0]);
12562306a36Sopenharmony_ci	return hv_vcpu->vcpu;
12662306a36Sopenharmony_ci}
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_cistatic inline bool kvm_hv_has_stimer_pending(struct kvm_vcpu *vcpu)
12962306a36Sopenharmony_ci{
13062306a36Sopenharmony_ci	struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
13162306a36Sopenharmony_ci
13262306a36Sopenharmony_ci	if (!hv_vcpu)
13362306a36Sopenharmony_ci		return false;
13462306a36Sopenharmony_ci
13562306a36Sopenharmony_ci	return !bitmap_empty(hv_vcpu->stimer_pending_bitmap,
13662306a36Sopenharmony_ci			     HV_SYNIC_STIMER_COUNT);
13762306a36Sopenharmony_ci}
13862306a36Sopenharmony_ci
13962306a36Sopenharmony_ci/*
14062306a36Sopenharmony_ci * With HV_ACCESS_TSC_INVARIANT feature, invariant TSC (CPUID.80000007H:EDX[8])
14162306a36Sopenharmony_ci * is only observed after HV_X64_MSR_TSC_INVARIANT_CONTROL was written to.
14262306a36Sopenharmony_ci */
14362306a36Sopenharmony_cistatic inline bool kvm_hv_invtsc_suppressed(struct kvm_vcpu *vcpu)
14462306a36Sopenharmony_ci{
14562306a36Sopenharmony_ci	struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
14662306a36Sopenharmony_ci
14762306a36Sopenharmony_ci	/*
14862306a36Sopenharmony_ci	 * If Hyper-V's invariant TSC control is not exposed to the guest,
14962306a36Sopenharmony_ci	 * the invariant TSC CPUID flag is not suppressed, Windows guests were
15062306a36Sopenharmony_ci	 * observed to be able to handle it correctly. Going forward, VMMs are
15162306a36Sopenharmony_ci	 * encouraged to enable Hyper-V's invariant TSC control when invariant
15262306a36Sopenharmony_ci	 * TSC CPUID flag is set to make KVM's behavior match genuine Hyper-V.
15362306a36Sopenharmony_ci	 */
15462306a36Sopenharmony_ci	if (!hv_vcpu ||
15562306a36Sopenharmony_ci	    !(hv_vcpu->cpuid_cache.features_eax & HV_ACCESS_TSC_INVARIANT))
15662306a36Sopenharmony_ci		return false;
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_ci	/*
15962306a36Sopenharmony_ci	 * If Hyper-V's invariant TSC control is exposed to the guest, KVM is
16062306a36Sopenharmony_ci	 * responsible for suppressing the invariant TSC CPUID flag if the
16162306a36Sopenharmony_ci	 * Hyper-V control is not enabled.
16262306a36Sopenharmony_ci	 */
16362306a36Sopenharmony_ci	return !(to_kvm_hv(vcpu->kvm)->hv_invtsc_control & HV_EXPOSE_INVARIANT_TSC);
16462306a36Sopenharmony_ci}
16562306a36Sopenharmony_ci
16662306a36Sopenharmony_civoid kvm_hv_process_stimers(struct kvm_vcpu *vcpu);
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_civoid kvm_hv_setup_tsc_page(struct kvm *kvm,
16962306a36Sopenharmony_ci			   struct pvclock_vcpu_time_info *hv_clock);
17062306a36Sopenharmony_civoid kvm_hv_request_tsc_page_update(struct kvm *kvm);
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_civoid kvm_hv_init_vm(struct kvm *kvm);
17362306a36Sopenharmony_civoid kvm_hv_destroy_vm(struct kvm *kvm);
17462306a36Sopenharmony_ciint kvm_hv_vcpu_init(struct kvm_vcpu *vcpu);
17562306a36Sopenharmony_civoid kvm_hv_set_cpuid(struct kvm_vcpu *vcpu, bool hyperv_enabled);
17662306a36Sopenharmony_ciint kvm_hv_set_enforce_cpuid(struct kvm_vcpu *vcpu, bool enforce);
17762306a36Sopenharmony_ciint kvm_vm_ioctl_hv_eventfd(struct kvm *kvm, struct kvm_hyperv_eventfd *args);
17862306a36Sopenharmony_ciint kvm_get_hv_cpuid(struct kvm_vcpu *vcpu, struct kvm_cpuid2 *cpuid,
17962306a36Sopenharmony_ci		     struct kvm_cpuid_entry2 __user *entries);
18062306a36Sopenharmony_ci
18162306a36Sopenharmony_cistatic inline struct kvm_vcpu_hv_tlb_flush_fifo *kvm_hv_get_tlb_flush_fifo(struct kvm_vcpu *vcpu,
18262306a36Sopenharmony_ci									   bool is_guest_mode)
18362306a36Sopenharmony_ci{
18462306a36Sopenharmony_ci	struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
18562306a36Sopenharmony_ci	int i = is_guest_mode ? HV_L2_TLB_FLUSH_FIFO :
18662306a36Sopenharmony_ci				HV_L1_TLB_FLUSH_FIFO;
18762306a36Sopenharmony_ci
18862306a36Sopenharmony_ci	return &hv_vcpu->tlb_flush_fifo[i];
18962306a36Sopenharmony_ci}
19062306a36Sopenharmony_ci
19162306a36Sopenharmony_cistatic inline void kvm_hv_vcpu_purge_flush_tlb(struct kvm_vcpu *vcpu)
19262306a36Sopenharmony_ci{
19362306a36Sopenharmony_ci	struct kvm_vcpu_hv_tlb_flush_fifo *tlb_flush_fifo;
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci	if (!to_hv_vcpu(vcpu) || !kvm_check_request(KVM_REQ_HV_TLB_FLUSH, vcpu))
19662306a36Sopenharmony_ci		return;
19762306a36Sopenharmony_ci
19862306a36Sopenharmony_ci	tlb_flush_fifo = kvm_hv_get_tlb_flush_fifo(vcpu, is_guest_mode(vcpu));
19962306a36Sopenharmony_ci
20062306a36Sopenharmony_ci	kfifo_reset_out(&tlb_flush_fifo->entries);
20162306a36Sopenharmony_ci}
20262306a36Sopenharmony_ci
20362306a36Sopenharmony_cistatic inline bool guest_hv_cpuid_has_l2_tlb_flush(struct kvm_vcpu *vcpu)
20462306a36Sopenharmony_ci{
20562306a36Sopenharmony_ci	struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
20662306a36Sopenharmony_ci
20762306a36Sopenharmony_ci	return hv_vcpu &&
20862306a36Sopenharmony_ci		(hv_vcpu->cpuid_cache.nested_eax & HV_X64_NESTED_DIRECT_FLUSH);
20962306a36Sopenharmony_ci}
21062306a36Sopenharmony_ci
21162306a36Sopenharmony_cistatic inline bool kvm_hv_is_tlb_flush_hcall(struct kvm_vcpu *vcpu)
21262306a36Sopenharmony_ci{
21362306a36Sopenharmony_ci	struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
21462306a36Sopenharmony_ci	u16 code;
21562306a36Sopenharmony_ci
21662306a36Sopenharmony_ci	if (!hv_vcpu)
21762306a36Sopenharmony_ci		return false;
21862306a36Sopenharmony_ci
21962306a36Sopenharmony_ci	code = is_64_bit_hypercall(vcpu) ? kvm_rcx_read(vcpu) :
22062306a36Sopenharmony_ci					   kvm_rax_read(vcpu);
22162306a36Sopenharmony_ci
22262306a36Sopenharmony_ci	return (code == HVCALL_FLUSH_VIRTUAL_ADDRESS_SPACE ||
22362306a36Sopenharmony_ci		code == HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST ||
22462306a36Sopenharmony_ci		code == HVCALL_FLUSH_VIRTUAL_ADDRESS_SPACE_EX ||
22562306a36Sopenharmony_ci		code == HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX);
22662306a36Sopenharmony_ci}
22762306a36Sopenharmony_ci
22862306a36Sopenharmony_cistatic inline int kvm_hv_verify_vp_assist(struct kvm_vcpu *vcpu)
22962306a36Sopenharmony_ci{
23062306a36Sopenharmony_ci	if (!to_hv_vcpu(vcpu))
23162306a36Sopenharmony_ci		return 0;
23262306a36Sopenharmony_ci
23362306a36Sopenharmony_ci	if (!kvm_hv_assist_page_enabled(vcpu))
23462306a36Sopenharmony_ci		return 0;
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci	return kvm_hv_get_assist_page(vcpu);
23762306a36Sopenharmony_ci}
23862306a36Sopenharmony_ci
23962306a36Sopenharmony_ciint kvm_hv_vcpu_flush_tlb(struct kvm_vcpu *vcpu);
24062306a36Sopenharmony_ci
24162306a36Sopenharmony_ci#endif
242