2020-03-24 17:41:52 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
|
|
|
/*
|
|
|
|
* Kernel-based Virtual Machine driver for Linux
|
|
|
|
*
|
|
|
|
* AMD SVM support
|
|
|
|
*
|
|
|
|
* Copyright (C) 2006 Qumranet, Inc.
|
|
|
|
* Copyright 2010 Red Hat, Inc. and/or its affiliates.
|
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Yaniv Kamay <yaniv@qumranet.com>
|
|
|
|
* Avi Kivity <avi@qumranet.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __SVM_SVM_H
|
|
|
|
#define __SVM_SVM_H
|
|
|
|
|
|
|
|
#include <linux/kvm_types.h>
|
|
|
|
#include <linux/kvm_host.h>
|
2020-12-11 01:09:47 +08:00
|
|
|
#include <linux/bits.h>
|
2020-03-24 17:41:52 +08:00
|
|
|
|
|
|
|
#include <asm/svm.h>
|
|
|
|
|
2020-12-11 01:10:04 +08:00
|
|
|
#define __sme_page_pa(x) __sme_set(page_to_pfn(x) << PAGE_SHIFT)
|
|
|
|
|
2021-04-13 05:56:05 +08:00
|
|
|
#define IOPM_SIZE PAGE_SIZE * 3
|
|
|
|
#define MSRPM_SIZE PAGE_SIZE * 2
|
|
|
|
|
2021-04-01 19:19:28 +08:00
|
|
|
#define MAX_DIRECT_ACCESS_MSRS 20
|
2020-03-24 17:41:52 +08:00
|
|
|
#define MSRPM_OFFSETS 16
|
|
|
|
extern u32 msrpm_offsets[MSRPM_OFFSETS] __read_mostly;
|
|
|
|
extern bool npt_enabled;
|
|
|
|
|
|
|
|
enum {
|
|
|
|
VMCB_INTERCEPTS, /* Intercept vectors, TSC offset,
|
|
|
|
pause filter count */
|
|
|
|
VMCB_PERM_MAP, /* IOPM Base and MSRPM Base */
|
|
|
|
VMCB_ASID, /* ASID */
|
|
|
|
VMCB_INTR, /* int_ctl, int_vector */
|
|
|
|
VMCB_NPT, /* npt_en, nCR3, gPAT */
|
|
|
|
VMCB_CR, /* CR0, CR3, CR4, EFER */
|
|
|
|
VMCB_DR, /* DR6, DR7 */
|
|
|
|
VMCB_DT, /* GDT, IDT */
|
|
|
|
VMCB_SEG, /* CS, DS, SS, ES, CPL */
|
|
|
|
VMCB_CR2, /* CR2 only */
|
|
|
|
VMCB_LBR, /* DBGCTL, BR_FROM, BR_TO, LAST_EX_FROM, LAST_EX_TO */
|
|
|
|
VMCB_AVIC, /* AVIC APIC_BAR, AVIC APIC_BACKING_PAGE,
|
|
|
|
* AVIC PHYSICAL_TABLE pointer,
|
|
|
|
* AVIC LOGICAL_TABLE pointer
|
|
|
|
*/
|
|
|
|
VMCB_DIRTY_MAX,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* TPR and CR2 are always written before VMRUN */
|
|
|
|
#define VMCB_ALWAYS_DIRTY_MASK ((1U << VMCB_INTR) | (1U << VMCB_CR2))
|
|
|
|
|
|
|
|
struct kvm_sev_info {
|
|
|
|
bool active; /* SEV enabled guest */
|
2020-12-11 01:09:38 +08:00
|
|
|
bool es_active; /* SEV-ES enabled guest */
|
2020-03-24 17:41:52 +08:00
|
|
|
unsigned int asid; /* ASID used for this guest */
|
|
|
|
unsigned int handle; /* SEV firmware handle */
|
|
|
|
int fd; /* SEV device fd */
|
|
|
|
unsigned long pages_locked; /* Number of pages locked */
|
|
|
|
struct list_head regions_list; /* List of registered regions */
|
2020-12-16 01:44:07 +08:00
|
|
|
u64 ap_jump_table; /* SEV-ES AP Jump Table address */
|
2021-04-09 06:32:14 +08:00
|
|
|
struct kvm *enc_context_owner; /* Owner of copied encryption context */
|
2021-03-30 12:42:06 +08:00
|
|
|
struct misc_cg *misc_cg; /* For misc cgroup accounting */
|
2020-03-24 17:41:52 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct kvm_svm {
|
|
|
|
struct kvm kvm;
|
|
|
|
|
|
|
|
/* Struct members for AVIC */
|
|
|
|
u32 avic_vm_id;
|
|
|
|
struct page *avic_logical_id_table_page;
|
|
|
|
struct page *avic_physical_id_table_page;
|
|
|
|
struct hlist_node hnode;
|
|
|
|
|
|
|
|
struct kvm_sev_info sev_info;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct kvm_vcpu;
|
|
|
|
|
2021-01-13 20:07:52 +08:00
|
|
|
struct kvm_vmcb_info {
|
|
|
|
struct vmcb *ptr;
|
|
|
|
unsigned long pa;
|
2021-01-13 00:43:12 +08:00
|
|
|
int cpu;
|
2021-01-13 00:43:13 +08:00
|
|
|
uint64_t asid_generation;
|
2021-01-13 20:07:52 +08:00
|
|
|
};
|
|
|
|
|
2020-06-25 16:03:22 +08:00
|
|
|
struct svm_nested_state {
|
2021-01-13 20:07:52 +08:00
|
|
|
struct kvm_vmcb_info vmcb02;
|
2020-03-24 17:41:52 +08:00
|
|
|
u64 hsave_msr;
|
|
|
|
u64 vm_cr_msr;
|
2020-08-28 01:11:39 +08:00
|
|
|
u64 vmcb12_gpa;
|
2021-03-02 04:08:44 +08:00
|
|
|
u64 last_vmcb12_gpa;
|
2020-03-24 17:41:52 +08:00
|
|
|
|
|
|
|
/* These are the merged vectors */
|
|
|
|
u32 *msrpm;
|
|
|
|
|
2020-04-24 01:22:27 +08:00
|
|
|
/* A VMRUN has started but has not yet been performed, so
|
|
|
|
* we cannot inject a nested vmexit yet. */
|
|
|
|
bool nested_run_pending;
|
|
|
|
|
2020-05-14 01:16:12 +08:00
|
|
|
/* cache for control fields of the guest */
|
|
|
|
struct vmcb_control_area ctl;
|
2020-10-01 19:29:54 +08:00
|
|
|
|
|
|
|
bool initialized;
|
2020-03-24 17:41:52 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct vcpu_svm {
|
|
|
|
struct kvm_vcpu vcpu;
|
2021-04-07 01:18:10 +08:00
|
|
|
/* vmcb always points at current_vmcb->ptr, it's purely a shorthand. */
|
2020-03-24 17:41:52 +08:00
|
|
|
struct vmcb *vmcb;
|
2021-01-13 20:07:52 +08:00
|
|
|
struct kvm_vmcb_info vmcb01;
|
|
|
|
struct kvm_vmcb_info *current_vmcb;
|
2020-03-24 17:41:52 +08:00
|
|
|
struct svm_cpu_data *svm_data;
|
2020-10-12 02:48:17 +08:00
|
|
|
u32 asid;
|
2021-04-01 19:19:28 +08:00
|
|
|
u32 sysenter_esp_hi;
|
|
|
|
u32 sysenter_eip_hi;
|
2020-03-24 17:41:52 +08:00
|
|
|
uint64_t tsc_aux;
|
|
|
|
|
|
|
|
u64 msr_decfg;
|
|
|
|
|
|
|
|
u64 next_rip;
|
|
|
|
|
|
|
|
u64 spec_ctrl;
|
|
|
|
/*
|
|
|
|
* Contains guest-controlled bits of VIRT_SPEC_CTRL, which will be
|
|
|
|
* translated into the appropriate L2_CFG bits on the host to
|
|
|
|
* perform speculative control.
|
|
|
|
*/
|
|
|
|
u64 virt_spec_ctrl;
|
|
|
|
|
|
|
|
u32 *msrpm;
|
|
|
|
|
|
|
|
ulong nmi_iret_rip;
|
|
|
|
|
2020-06-25 16:03:22 +08:00
|
|
|
struct svm_nested_state nested;
|
2020-03-24 17:41:52 +08:00
|
|
|
|
|
|
|
bool nmi_singlestep;
|
|
|
|
u64 nmi_singlestep_guest_rflags;
|
|
|
|
|
|
|
|
unsigned int3_injected;
|
|
|
|
unsigned long int3_rip;
|
|
|
|
|
|
|
|
/* cached guest cpuid flags for faster access */
|
|
|
|
bool nrips_enabled : 1;
|
|
|
|
|
|
|
|
u32 ldr_reg;
|
|
|
|
u32 dfr_reg;
|
|
|
|
struct page *avic_backing_page;
|
|
|
|
u64 *avic_physical_id_cache;
|
|
|
|
bool avic_is_running;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Per-vcpu list of struct amd_svm_iommu_ir:
|
|
|
|
* This is used mainly to store interrupt remapping information used
|
|
|
|
* when update the vcpu affinity. This avoids the need to scan for
|
|
|
|
* IRTE and try to match ga_tag in the IOMMU driver.
|
|
|
|
*/
|
|
|
|
struct list_head ir_list;
|
|
|
|
spinlock_t ir_list_lock;
|
2020-09-25 22:34:19 +08:00
|
|
|
|
|
|
|
/* Save desired MSR intercept (read: pass-through) state */
|
|
|
|
struct {
|
|
|
|
DECLARE_BITMAP(read, MAX_DIRECT_ACCESS_MSRS);
|
|
|
|
DECLARE_BITMAP(write, MAX_DIRECT_ACCESS_MSRS);
|
|
|
|
} shadow_msr_intercept;
|
2020-12-11 01:09:40 +08:00
|
|
|
|
|
|
|
/* SEV-ES support */
|
|
|
|
struct vmcb_save_area *vmsa;
|
|
|
|
struct ghcb *ghcb;
|
2020-12-11 01:09:47 +08:00
|
|
|
struct kvm_host_map ghcb_map;
|
KVM: SVM: Add support for booting APs in an SEV-ES guest
Typically under KVM, an AP is booted using the INIT-SIPI-SIPI sequence,
where the guest vCPU register state is updated and then the vCPU is VMRUN
to begin execution of the AP. For an SEV-ES guest, this won't work because
the guest register state is encrypted.
Following the GHCB specification, the hypervisor must not alter the guest
register state, so KVM must track an AP/vCPU boot. Should the guest want
to park the AP, it must use the AP Reset Hold exit event in place of, for
example, a HLT loop.
First AP boot (first INIT-SIPI-SIPI sequence):
Execute the AP (vCPU) as it was initialized and measured by the SEV-ES
support. It is up to the guest to transfer control of the AP to the
proper location.
Subsequent AP boot:
KVM will expect to receive an AP Reset Hold exit event indicating that
the vCPU is being parked and will require an INIT-SIPI-SIPI sequence to
awaken it. When the AP Reset Hold exit event is received, KVM will place
the vCPU into a simulated HLT mode. Upon receiving the INIT-SIPI-SIPI
sequence, KVM will make the vCPU runnable. It is again up to the guest
to then transfer control of the AP to the proper location.
To differentiate between an actual HLT and an AP Reset Hold, a new MP
state is introduced, KVM_MP_STATE_AP_RESET_HOLD, which the vCPU is
placed in upon receiving the AP Reset Hold exit event. Additionally, to
communicate the AP Reset Hold exit event up to userspace (if needed), a
new exit reason is introduced, KVM_EXIT_AP_RESET_HOLD.
A new x86 ops function is introduced, vcpu_deliver_sipi_vector, in order
to accomplish AP booting. For VMX, vcpu_deliver_sipi_vector is set to the
original SIPI delivery function, kvm_vcpu_deliver_sipi_vector(). SVM adds
a new function that, for non SEV-ES guests, invokes the original SIPI
delivery function, kvm_vcpu_deliver_sipi_vector(), but for SEV-ES guests,
implements the logic above.
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Message-Id: <e8fbebe8eb161ceaabdad7c01a5859a78b424d5e.1609791600.git.thomas.lendacky@amd.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-01-05 04:20:01 +08:00
|
|
|
bool received_first_sipi;
|
2020-12-11 01:09:53 +08:00
|
|
|
|
|
|
|
/* SEV-ES scratch area support */
|
|
|
|
void *ghcb_sa;
|
|
|
|
u64 ghcb_sa_len;
|
|
|
|
bool ghcb_sa_sync;
|
|
|
|
bool ghcb_sa_free;
|
2021-02-03 03:01:26 +08:00
|
|
|
|
|
|
|
bool guest_state_loaded;
|
2020-03-24 17:41:52 +08:00
|
|
|
};
|
|
|
|
|
2020-03-24 17:41:54 +08:00
|
|
|
struct svm_cpu_data {
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
u64 asid_generation;
|
|
|
|
u32 max_asid;
|
|
|
|
u32 next_asid;
|
|
|
|
u32 min_asid;
|
|
|
|
struct kvm_ldttss_desc *tss_desc;
|
|
|
|
|
|
|
|
struct page *save_area;
|
|
|
|
struct vmcb *current_vmcb;
|
|
|
|
|
|
|
|
/* index = sev_asid, value = vmcb pointer */
|
|
|
|
struct vmcb **sev_vmcbs;
|
|
|
|
};
|
|
|
|
|
|
|
|
DECLARE_PER_CPU(struct svm_cpu_data *, svm_data);
|
|
|
|
|
2020-03-24 17:41:52 +08:00
|
|
|
void recalc_intercepts(struct vcpu_svm *svm);
|
|
|
|
|
2020-04-01 00:17:38 +08:00
|
|
|
static inline struct kvm_svm *to_kvm_svm(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
return container_of(kvm, struct kvm_svm, kvm);
|
|
|
|
}
|
|
|
|
|
2020-12-11 01:09:38 +08:00
|
|
|
static inline bool sev_guest(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_KVM_AMD_SEV
|
|
|
|
struct kvm_sev_info *sev = &to_kvm_svm(kvm)->sev_info;
|
|
|
|
|
|
|
|
return sev->active;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool sev_es_guest(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_KVM_AMD_SEV
|
|
|
|
struct kvm_sev_info *sev = &to_kvm_svm(kvm)->sev_info;
|
|
|
|
|
|
|
|
return sev_guest(kvm) && sev->es_active;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2020-06-25 16:03:23 +08:00
|
|
|
static inline void vmcb_mark_all_dirty(struct vmcb *vmcb)
|
2020-03-24 17:41:52 +08:00
|
|
|
{
|
|
|
|
vmcb->control.clean = 0;
|
|
|
|
}
|
|
|
|
|
2020-06-25 16:03:23 +08:00
|
|
|
static inline void vmcb_mark_all_clean(struct vmcb *vmcb)
|
2020-03-24 17:41:52 +08:00
|
|
|
{
|
|
|
|
vmcb->control.clean = ((1 << VMCB_DIRTY_MAX) - 1)
|
|
|
|
& ~VMCB_ALWAYS_DIRTY_MASK;
|
|
|
|
}
|
|
|
|
|
2020-06-25 16:03:23 +08:00
|
|
|
static inline void vmcb_mark_dirty(struct vmcb *vmcb, int bit)
|
2020-03-24 17:41:52 +08:00
|
|
|
{
|
|
|
|
vmcb->control.clean &= ~(1 << bit);
|
|
|
|
}
|
|
|
|
|
2021-03-02 04:08:44 +08:00
|
|
|
static inline bool vmcb_is_dirty(struct vmcb *vmcb, int bit)
|
|
|
|
{
|
|
|
|
return !test_bit(bit, (unsigned long *)&vmcb->control.clean);
|
|
|
|
}
|
|
|
|
|
2020-03-24 17:41:52 +08:00
|
|
|
static inline struct vcpu_svm *to_svm(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return container_of(vcpu, struct vcpu_svm, vcpu);
|
|
|
|
}
|
|
|
|
|
2020-09-12 03:27:58 +08:00
|
|
|
static inline void vmcb_set_intercept(struct vmcb_control_area *control, u32 bit)
|
|
|
|
{
|
|
|
|
WARN_ON_ONCE(bit >= 32 * MAX_INTERCEPT);
|
|
|
|
__set_bit(bit, (unsigned long *)&control->intercepts);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void vmcb_clr_intercept(struct vmcb_control_area *control, u32 bit)
|
|
|
|
{
|
|
|
|
WARN_ON_ONCE(bit >= 32 * MAX_INTERCEPT);
|
|
|
|
__clear_bit(bit, (unsigned long *)&control->intercepts);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool vmcb_is_intercept(struct vmcb_control_area *control, u32 bit)
|
|
|
|
{
|
|
|
|
WARN_ON_ONCE(bit >= 32 * MAX_INTERCEPT);
|
|
|
|
return test_bit(bit, (unsigned long *)&control->intercepts);
|
|
|
|
}
|
|
|
|
|
2020-03-24 17:41:52 +08:00
|
|
|
static inline void set_dr_intercepts(struct vcpu_svm *svm)
|
|
|
|
{
|
2021-01-13 20:07:52 +08:00
|
|
|
struct vmcb *vmcb = svm->vmcb01.ptr;
|
2020-03-24 17:41:52 +08:00
|
|
|
|
2020-12-11 01:09:43 +08:00
|
|
|
if (!sev_es_guest(svm->vcpu.kvm)) {
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR0_READ);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR1_READ);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR2_READ);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR3_READ);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR4_READ);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR5_READ);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR6_READ);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR0_WRITE);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR1_WRITE);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR2_WRITE);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR3_WRITE);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR4_WRITE);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR5_WRITE);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR6_WRITE);
|
|
|
|
}
|
|
|
|
|
2020-09-12 03:28:12 +08:00
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR7_READ);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR7_WRITE);
|
2020-03-24 17:41:52 +08:00
|
|
|
|
|
|
|
recalc_intercepts(svm);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void clr_dr_intercepts(struct vcpu_svm *svm)
|
|
|
|
{
|
2021-01-13 20:07:52 +08:00
|
|
|
struct vmcb *vmcb = svm->vmcb01.ptr;
|
2020-03-24 17:41:52 +08:00
|
|
|
|
2020-09-12 03:28:12 +08:00
|
|
|
vmcb->control.intercepts[INTERCEPT_DR] = 0;
|
2020-03-24 17:41:52 +08:00
|
|
|
|
2020-12-11 01:09:43 +08:00
|
|
|
/* DR7 access must remain intercepted for an SEV-ES guest */
|
|
|
|
if (sev_es_guest(svm->vcpu.kvm)) {
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR7_READ);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_DR7_WRITE);
|
|
|
|
}
|
|
|
|
|
2020-03-24 17:41:52 +08:00
|
|
|
recalc_intercepts(svm);
|
|
|
|
}
|
|
|
|
|
2020-09-12 03:28:20 +08:00
|
|
|
static inline void set_exception_intercept(struct vcpu_svm *svm, u32 bit)
|
2020-03-24 17:41:52 +08:00
|
|
|
{
|
2021-01-13 20:07:52 +08:00
|
|
|
struct vmcb *vmcb = svm->vmcb01.ptr;
|
2020-03-24 17:41:52 +08:00
|
|
|
|
2020-09-12 03:28:20 +08:00
|
|
|
WARN_ON_ONCE(bit >= 32);
|
|
|
|
vmcb_set_intercept(&vmcb->control, INTERCEPT_EXCEPTION_OFFSET + bit);
|
2020-03-24 17:41:52 +08:00
|
|
|
|
|
|
|
recalc_intercepts(svm);
|
|
|
|
}
|
|
|
|
|
2020-09-12 03:28:20 +08:00
|
|
|
static inline void clr_exception_intercept(struct vcpu_svm *svm, u32 bit)
|
2020-03-24 17:41:52 +08:00
|
|
|
{
|
2021-01-13 20:07:52 +08:00
|
|
|
struct vmcb *vmcb = svm->vmcb01.ptr;
|
2020-03-24 17:41:52 +08:00
|
|
|
|
2020-09-12 03:28:20 +08:00
|
|
|
WARN_ON_ONCE(bit >= 32);
|
|
|
|
vmcb_clr_intercept(&vmcb->control, INTERCEPT_EXCEPTION_OFFSET + bit);
|
2020-03-24 17:41:52 +08:00
|
|
|
|
|
|
|
recalc_intercepts(svm);
|
|
|
|
}
|
|
|
|
|
2020-06-25 16:03:24 +08:00
|
|
|
static inline void svm_set_intercept(struct vcpu_svm *svm, int bit)
|
2020-03-24 17:41:52 +08:00
|
|
|
{
|
2021-01-13 20:07:52 +08:00
|
|
|
struct vmcb *vmcb = svm->vmcb01.ptr;
|
2020-03-24 17:41:52 +08:00
|
|
|
|
2020-09-12 03:28:28 +08:00
|
|
|
vmcb_set_intercept(&vmcb->control, bit);
|
2020-03-24 17:41:52 +08:00
|
|
|
|
|
|
|
recalc_intercepts(svm);
|
|
|
|
}
|
|
|
|
|
2020-06-25 16:03:24 +08:00
|
|
|
static inline void svm_clr_intercept(struct vcpu_svm *svm, int bit)
|
2020-03-24 17:41:52 +08:00
|
|
|
{
|
2021-01-13 20:07:52 +08:00
|
|
|
struct vmcb *vmcb = svm->vmcb01.ptr;
|
2020-03-24 17:41:52 +08:00
|
|
|
|
2020-09-12 03:28:28 +08:00
|
|
|
vmcb_clr_intercept(&vmcb->control, bit);
|
2020-03-24 17:41:52 +08:00
|
|
|
|
|
|
|
recalc_intercepts(svm);
|
|
|
|
}
|
|
|
|
|
2020-06-25 16:03:24 +08:00
|
|
|
static inline bool svm_is_intercept(struct vcpu_svm *svm, int bit)
|
2020-03-24 17:41:52 +08:00
|
|
|
{
|
2020-09-12 03:28:28 +08:00
|
|
|
return vmcb_is_intercept(&svm->vmcb->control, bit);
|
2020-03-24 17:41:52 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool vgif_enabled(struct vcpu_svm *svm)
|
|
|
|
{
|
|
|
|
return !!(svm->vmcb->control.int_ctl & V_GIF_ENABLE_MASK);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void enable_gif(struct vcpu_svm *svm)
|
|
|
|
{
|
|
|
|
if (vgif_enabled(svm))
|
|
|
|
svm->vmcb->control.int_ctl |= V_GIF_MASK;
|
|
|
|
else
|
|
|
|
svm->vcpu.arch.hflags |= HF_GIF_MASK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void disable_gif(struct vcpu_svm *svm)
|
|
|
|
{
|
|
|
|
if (vgif_enabled(svm))
|
|
|
|
svm->vmcb->control.int_ctl &= ~V_GIF_MASK;
|
|
|
|
else
|
|
|
|
svm->vcpu.arch.hflags &= ~HF_GIF_MASK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool gif_set(struct vcpu_svm *svm)
|
|
|
|
{
|
|
|
|
if (vgif_enabled(svm))
|
|
|
|
return !!(svm->vmcb->control.int_ctl & V_GIF_MASK);
|
|
|
|
else
|
|
|
|
return !!(svm->vcpu.arch.hflags & HF_GIF_MASK);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* svm.c */
|
2020-07-08 08:39:56 +08:00
|
|
|
#define MSR_INVALID 0xffffffffU
|
2020-03-24 17:41:52 +08:00
|
|
|
|
2020-12-11 01:09:47 +08:00
|
|
|
extern bool dump_invalid_vmcb;
|
2020-12-11 01:09:38 +08:00
|
|
|
|
2020-03-24 17:41:52 +08:00
|
|
|
u32 svm_msrpm_offset(u32 msr);
|
2020-10-01 19:29:54 +08:00
|
|
|
u32 *svm_vcpu_alloc_msrpm(void);
|
|
|
|
void svm_vcpu_init_msrpm(struct kvm_vcpu *vcpu, u32 *msrpm);
|
|
|
|
void svm_vcpu_free_msrpm(u32 *msrpm);
|
|
|
|
|
2020-10-01 19:29:53 +08:00
|
|
|
int svm_set_efer(struct kvm_vcpu *vcpu, u64 efer);
|
2020-03-24 17:41:52 +08:00
|
|
|
void svm_set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0);
|
2020-10-07 09:44:15 +08:00
|
|
|
void svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4);
|
2020-03-21 05:28:12 +08:00
|
|
|
void svm_flush_tlb(struct kvm_vcpu *vcpu);
|
2020-03-24 17:41:52 +08:00
|
|
|
void disable_nmi_singlestep(struct vcpu_svm *svm);
|
2020-04-24 02:19:26 +08:00
|
|
|
bool svm_smi_blocked(struct kvm_vcpu *vcpu);
|
|
|
|
bool svm_nmi_blocked(struct kvm_vcpu *vcpu);
|
|
|
|
bool svm_interrupt_blocked(struct kvm_vcpu *vcpu);
|
2020-05-23 00:18:27 +08:00
|
|
|
void svm_set_gif(struct vcpu_svm *svm, bool value);
|
2021-03-03 03:40:39 +08:00
|
|
|
int svm_invoke_exit_handler(struct kvm_vcpu *vcpu, u64 exit_code);
|
2020-12-11 01:10:06 +08:00
|
|
|
void set_msr_interception(struct kvm_vcpu *vcpu, u32 *msrpm, u32 msr,
|
|
|
|
int read, int write);
|
2020-03-24 17:41:52 +08:00
|
|
|
|
|
|
|
/* nested.c */
|
|
|
|
|
|
|
|
#define NESTED_EXIT_HOST 0 /* Exit handled on host level */
|
|
|
|
#define NESTED_EXIT_DONE 1 /* Exit caused nested vmexit */
|
|
|
|
#define NESTED_EXIT_CONTINUE 2 /* Further checks needed */
|
|
|
|
|
2020-06-25 16:03:25 +08:00
|
|
|
static inline bool nested_svm_virtualize_tpr(struct kvm_vcpu *vcpu)
|
2020-03-24 17:41:52 +08:00
|
|
|
{
|
2020-05-14 01:28:23 +08:00
|
|
|
struct vcpu_svm *svm = to_svm(vcpu);
|
|
|
|
|
|
|
|
return is_guest_mode(vcpu) && (svm->nested.ctl.int_ctl & V_INTR_MASKING_MASK);
|
2020-03-24 17:41:52 +08:00
|
|
|
}
|
|
|
|
|
2020-04-23 20:17:28 +08:00
|
|
|
static inline bool nested_exit_on_smi(struct vcpu_svm *svm)
|
|
|
|
{
|
2020-09-12 03:28:28 +08:00
|
|
|
return vmcb_is_intercept(&svm->nested.ctl, INTERCEPT_SMI);
|
2020-04-23 20:17:28 +08:00
|
|
|
}
|
|
|
|
|
2020-04-24 06:02:45 +08:00
|
|
|
static inline bool nested_exit_on_intr(struct vcpu_svm *svm)
|
|
|
|
{
|
2020-09-12 03:28:28 +08:00
|
|
|
return vmcb_is_intercept(&svm->nested.ctl, INTERCEPT_INTR);
|
2020-04-24 06:02:45 +08:00
|
|
|
}
|
|
|
|
|
2020-04-23 20:06:43 +08:00
|
|
|
static inline bool nested_exit_on_nmi(struct vcpu_svm *svm)
|
|
|
|
{
|
2020-09-12 03:28:28 +08:00
|
|
|
return vmcb_is_intercept(&svm->nested.ctl, INTERCEPT_NMI);
|
2020-04-23 20:06:43 +08:00
|
|
|
}
|
|
|
|
|
2021-03-03 03:40:39 +08:00
|
|
|
int enter_svm_guest_mode(struct kvm_vcpu *vcpu, u64 vmcb_gpa, struct vmcb *vmcb12);
|
2020-05-19 01:08:37 +08:00
|
|
|
void svm_leave_nested(struct vcpu_svm *svm);
|
2020-10-01 19:29:54 +08:00
|
|
|
void svm_free_nested(struct vcpu_svm *svm);
|
|
|
|
int svm_allocate_nested(struct vcpu_svm *svm);
|
2021-03-03 03:40:39 +08:00
|
|
|
int nested_svm_vmrun(struct kvm_vcpu *vcpu);
|
2020-03-24 17:41:52 +08:00
|
|
|
void nested_svm_vmloadsave(struct vmcb *from_vmcb, struct vmcb *to_vmcb);
|
|
|
|
int nested_svm_vmexit(struct vcpu_svm *svm);
|
2021-03-03 01:45:15 +08:00
|
|
|
|
|
|
|
static inline int nested_svm_simple_vmexit(struct vcpu_svm *svm, u32 exit_code)
|
|
|
|
{
|
|
|
|
svm->vmcb->control.exit_code = exit_code;
|
|
|
|
svm->vmcb->control.exit_info_1 = 0;
|
|
|
|
svm->vmcb->control.exit_info_2 = 0;
|
|
|
|
return nested_svm_vmexit(svm);
|
|
|
|
}
|
|
|
|
|
2020-03-24 17:41:52 +08:00
|
|
|
int nested_svm_exit_handled(struct vcpu_svm *svm);
|
2021-03-03 03:40:39 +08:00
|
|
|
int nested_svm_check_permissions(struct kvm_vcpu *vcpu);
|
2020-03-24 17:41:52 +08:00
|
|
|
int nested_svm_check_exception(struct vcpu_svm *svm, unsigned nr,
|
|
|
|
bool has_error_code, u32 error_code);
|
|
|
|
int nested_svm_exit_special(struct vcpu_svm *svm);
|
2020-11-17 18:15:41 +08:00
|
|
|
void nested_sync_control_from_vmcb02(struct vcpu_svm *svm);
|
2021-01-13 20:07:52 +08:00
|
|
|
void nested_vmcb02_compute_g_pat(struct vcpu_svm *svm);
|
|
|
|
void svm_switch_vmcb(struct vcpu_svm *svm, struct kvm_vmcb_info *target_vmcb);
|
2020-03-24 17:41:52 +08:00
|
|
|
|
2020-04-17 22:24:18 +08:00
|
|
|
extern struct kvm_x86_nested_ops svm_nested_ops;
|
|
|
|
|
2020-04-01 00:17:38 +08:00
|
|
|
/* avic.c */
|
|
|
|
|
|
|
|
#define AVIC_LOGICAL_ID_ENTRY_GUEST_PHYSICAL_ID_MASK (0xFF)
|
|
|
|
#define AVIC_LOGICAL_ID_ENTRY_VALID_BIT 31
|
|
|
|
#define AVIC_LOGICAL_ID_ENTRY_VALID_MASK (1 << 31)
|
|
|
|
|
|
|
|
#define AVIC_PHYSICAL_ID_ENTRY_HOST_PHYSICAL_ID_MASK (0xFFULL)
|
|
|
|
#define AVIC_PHYSICAL_ID_ENTRY_BACKING_PAGE_MASK (0xFFFFFFFFFFULL << 12)
|
|
|
|
#define AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK (1ULL << 62)
|
|
|
|
#define AVIC_PHYSICAL_ID_ENTRY_VALID_MASK (1ULL << 63)
|
|
|
|
|
|
|
|
#define VMCB_AVIC_APIC_BAR_MASK 0xFFFFFFFFFF000ULL
|
|
|
|
|
|
|
|
extern int avic;
|
|
|
|
|
|
|
|
static inline void avic_update_vapic_bar(struct vcpu_svm *svm, u64 data)
|
|
|
|
{
|
|
|
|
svm->vmcb->control.avic_vapic_bar = data & VMCB_AVIC_APIC_BAR_MASK;
|
2020-06-25 16:03:23 +08:00
|
|
|
vmcb_mark_dirty(svm->vmcb, VMCB_AVIC);
|
2020-04-01 00:17:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool avic_vcpu_is_running(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
struct vcpu_svm *svm = to_svm(vcpu);
|
|
|
|
u64 *entry = svm->avic_physical_id_cache;
|
|
|
|
|
|
|
|
if (!entry)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return (READ_ONCE(*entry) & AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK);
|
|
|
|
}
|
|
|
|
|
|
|
|
int avic_ga_log_notifier(u32 ga_tag);
|
|
|
|
void avic_vm_destroy(struct kvm *kvm);
|
|
|
|
int avic_vm_init(struct kvm *kvm);
|
|
|
|
void avic_init_vmcb(struct vcpu_svm *svm);
|
|
|
|
void svm_toggle_avic_for_irq_window(struct kvm_vcpu *vcpu, bool activate);
|
2021-03-03 03:40:39 +08:00
|
|
|
int avic_incomplete_ipi_interception(struct kvm_vcpu *vcpu);
|
|
|
|
int avic_unaccelerated_access_interception(struct kvm_vcpu *vcpu);
|
2020-04-01 00:17:38 +08:00
|
|
|
int avic_init_vcpu(struct vcpu_svm *svm);
|
|
|
|
void avic_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
|
|
|
|
void avic_vcpu_put(struct kvm_vcpu *vcpu);
|
|
|
|
void avic_post_state_restore(struct kvm_vcpu *vcpu);
|
|
|
|
void svm_set_virtual_apic_mode(struct kvm_vcpu *vcpu);
|
|
|
|
void svm_refresh_apicv_exec_ctrl(struct kvm_vcpu *vcpu);
|
|
|
|
bool svm_check_apicv_inhibit_reasons(ulong bit);
|
|
|
|
void svm_pre_update_apicv_exec_ctrl(struct kvm *kvm, bool activate);
|
|
|
|
void svm_load_eoi_exitmap(struct kvm_vcpu *vcpu, u64 *eoi_exit_bitmap);
|
|
|
|
void svm_hwapic_irr_update(struct kvm_vcpu *vcpu, int max_irr);
|
|
|
|
void svm_hwapic_isr_update(struct kvm_vcpu *vcpu, int max_isr);
|
|
|
|
int svm_deliver_avic_intr(struct kvm_vcpu *vcpu, int vec);
|
|
|
|
bool svm_dy_apicv_has_pending_interrupt(struct kvm_vcpu *vcpu);
|
|
|
|
int svm_update_pi_irte(struct kvm *kvm, unsigned int host_irq,
|
|
|
|
uint32_t guest_irq, bool set);
|
|
|
|
void svm_vcpu_blocking(struct kvm_vcpu *vcpu);
|
|
|
|
void svm_vcpu_unblocking(struct kvm_vcpu *vcpu);
|
|
|
|
|
2020-03-24 17:41:54 +08:00
|
|
|
/* sev.c */
|
|
|
|
|
2020-12-11 01:09:49 +08:00
|
|
|
#define GHCB_VERSION_MAX 1ULL
|
|
|
|
#define GHCB_VERSION_MIN 1ULL
|
|
|
|
|
2020-12-11 01:09:47 +08:00
|
|
|
#define GHCB_MSR_INFO_POS 0
|
|
|
|
#define GHCB_MSR_INFO_MASK (BIT_ULL(12) - 1)
|
|
|
|
|
2020-12-11 01:09:49 +08:00
|
|
|
#define GHCB_MSR_SEV_INFO_RESP 0x001
|
|
|
|
#define GHCB_MSR_SEV_INFO_REQ 0x002
|
|
|
|
#define GHCB_MSR_VER_MAX_POS 48
|
|
|
|
#define GHCB_MSR_VER_MAX_MASK 0xffff
|
|
|
|
#define GHCB_MSR_VER_MIN_POS 32
|
|
|
|
#define GHCB_MSR_VER_MIN_MASK 0xffff
|
|
|
|
#define GHCB_MSR_CBIT_POS 24
|
|
|
|
#define GHCB_MSR_CBIT_MASK 0xff
|
|
|
|
#define GHCB_MSR_SEV_INFO(_max, _min, _cbit) \
|
|
|
|
((((_max) & GHCB_MSR_VER_MAX_MASK) << GHCB_MSR_VER_MAX_POS) | \
|
|
|
|
(((_min) & GHCB_MSR_VER_MIN_MASK) << GHCB_MSR_VER_MIN_POS) | \
|
|
|
|
(((_cbit) & GHCB_MSR_CBIT_MASK) << GHCB_MSR_CBIT_POS) | \
|
|
|
|
GHCB_MSR_SEV_INFO_RESP)
|
|
|
|
|
2020-12-11 01:09:50 +08:00
|
|
|
#define GHCB_MSR_CPUID_REQ 0x004
|
|
|
|
#define GHCB_MSR_CPUID_RESP 0x005
|
|
|
|
#define GHCB_MSR_CPUID_FUNC_POS 32
|
|
|
|
#define GHCB_MSR_CPUID_FUNC_MASK 0xffffffff
|
|
|
|
#define GHCB_MSR_CPUID_VALUE_POS 32
|
|
|
|
#define GHCB_MSR_CPUID_VALUE_MASK 0xffffffff
|
|
|
|
#define GHCB_MSR_CPUID_REG_POS 30
|
|
|
|
#define GHCB_MSR_CPUID_REG_MASK 0x3
|
|
|
|
|
2020-12-11 01:09:51 +08:00
|
|
|
#define GHCB_MSR_TERM_REQ 0x100
|
|
|
|
#define GHCB_MSR_TERM_REASON_SET_POS 12
|
|
|
|
#define GHCB_MSR_TERM_REASON_SET_MASK 0xf
|
|
|
|
#define GHCB_MSR_TERM_REASON_POS 16
|
|
|
|
#define GHCB_MSR_TERM_REASON_MASK 0xff
|
|
|
|
|
2020-03-24 17:41:54 +08:00
|
|
|
extern unsigned int max_sev_asid;
|
|
|
|
|
|
|
|
static inline bool svm_sev_enabled(void)
|
|
|
|
{
|
|
|
|
return IS_ENABLED(CONFIG_KVM_AMD_SEV) ? max_sev_asid : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void sev_vm_destroy(struct kvm *kvm);
|
|
|
|
int svm_mem_enc_op(struct kvm *kvm, void __user *argp);
|
|
|
|
int svm_register_enc_region(struct kvm *kvm,
|
|
|
|
struct kvm_enc_region *range);
|
|
|
|
int svm_unregister_enc_region(struct kvm *kvm,
|
|
|
|
struct kvm_enc_region *range);
|
2021-04-09 06:32:14 +08:00
|
|
|
int svm_vm_copy_asid_from(struct kvm *kvm, unsigned int source_fd);
|
2020-03-24 17:41:54 +08:00
|
|
|
void pre_sev_run(struct vcpu_svm *svm, int cpu);
|
2021-04-22 10:11:15 +08:00
|
|
|
void __init sev_set_cpu_caps(void);
|
2020-12-11 01:09:38 +08:00
|
|
|
void __init sev_hardware_setup(void);
|
2020-03-24 17:41:54 +08:00
|
|
|
void sev_hardware_teardown(void);
|
2020-12-11 01:09:40 +08:00
|
|
|
void sev_free_vcpu(struct kvm_vcpu *vcpu);
|
2021-03-03 03:40:39 +08:00
|
|
|
int sev_handle_vmgexit(struct kvm_vcpu *vcpu);
|
2020-12-11 01:09:54 +08:00
|
|
|
int sev_es_string_io(struct vcpu_svm *svm, int size, unsigned int port, int in);
|
2020-12-11 01:10:06 +08:00
|
|
|
void sev_es_init_vmcb(struct vcpu_svm *svm);
|
|
|
|
void sev_es_create_vcpu(struct vcpu_svm *svm);
|
KVM: SVM: Add support for booting APs in an SEV-ES guest
Typically under KVM, an AP is booted using the INIT-SIPI-SIPI sequence,
where the guest vCPU register state is updated and then the vCPU is VMRUN
to begin execution of the AP. For an SEV-ES guest, this won't work because
the guest register state is encrypted.
Following the GHCB specification, the hypervisor must not alter the guest
register state, so KVM must track an AP/vCPU boot. Should the guest want
to park the AP, it must use the AP Reset Hold exit event in place of, for
example, a HLT loop.
First AP boot (first INIT-SIPI-SIPI sequence):
Execute the AP (vCPU) as it was initialized and measured by the SEV-ES
support. It is up to the guest to transfer control of the AP to the
proper location.
Subsequent AP boot:
KVM will expect to receive an AP Reset Hold exit event indicating that
the vCPU is being parked and will require an INIT-SIPI-SIPI sequence to
awaken it. When the AP Reset Hold exit event is received, KVM will place
the vCPU into a simulated HLT mode. Upon receiving the INIT-SIPI-SIPI
sequence, KVM will make the vCPU runnable. It is again up to the guest
to then transfer control of the AP to the proper location.
To differentiate between an actual HLT and an AP Reset Hold, a new MP
state is introduced, KVM_MP_STATE_AP_RESET_HOLD, which the vCPU is
placed in upon receiving the AP Reset Hold exit event. Additionally, to
communicate the AP Reset Hold exit event up to userspace (if needed), a
new exit reason is introduced, KVM_EXIT_AP_RESET_HOLD.
A new x86 ops function is introduced, vcpu_deliver_sipi_vector, in order
to accomplish AP booting. For VMX, vcpu_deliver_sipi_vector is set to the
original SIPI delivery function, kvm_vcpu_deliver_sipi_vector(). SVM adds
a new function that, for non SEV-ES guests, invokes the original SIPI
delivery function, kvm_vcpu_deliver_sipi_vector(), but for SEV-ES guests,
implements the logic above.
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Message-Id: <e8fbebe8eb161ceaabdad7c01a5859a78b424d5e.1609791600.git.thomas.lendacky@amd.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-01-05 04:20:01 +08:00
|
|
|
void sev_vcpu_deliver_sipi_vector(struct kvm_vcpu *vcpu, u8 vector);
|
2021-02-03 03:01:26 +08:00
|
|
|
void sev_es_prepare_guest_switch(struct vcpu_svm *svm, unsigned int cpu);
|
2020-03-24 17:41:54 +08:00
|
|
|
|
2020-12-11 01:10:08 +08:00
|
|
|
/* vmenter.S */
|
|
|
|
|
|
|
|
void __svm_sev_es_vcpu_run(unsigned long vmcb_pa);
|
|
|
|
void __svm_vcpu_run(unsigned long vmcb_pa, unsigned long *regs);
|
|
|
|
|
2020-03-24 17:41:52 +08:00
|
|
|
#endif
|