2018-06-13 21:55:44 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/*
|
|
|
|
* Copyright © 2019 Oracle and/or its affiliates. All rights reserved.
|
|
|
|
* Copyright © 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
|
|
*
|
|
|
|
* KVM Xen emulation
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __ARCH_X86_KVM_XEN_H__
|
|
|
|
#define __ARCH_X86_KVM_XEN_H__
|
|
|
|
|
2021-02-26 17:54:45 +08:00
|
|
|
#ifdef CONFIG_KVM_XEN
|
2021-02-02 23:48:05 +08:00
|
|
|
#include <linux/jump_label_ratelimit.h>
|
|
|
|
|
|
|
|
extern struct static_key_false_deferred kvm_xen_enabled;
|
|
|
|
|
2020-12-10 04:08:30 +08:00
|
|
|
int __kvm_xen_has_interrupt(struct kvm_vcpu *vcpu);
|
2021-02-03 00:53:25 +08:00
|
|
|
int kvm_xen_vcpu_set_attr(struct kvm_vcpu *vcpu, struct kvm_xen_vcpu_attr *data);
|
|
|
|
int kvm_xen_vcpu_get_attr(struct kvm_vcpu *vcpu, struct kvm_xen_vcpu_attr *data);
|
2020-12-03 23:52:25 +08:00
|
|
|
int kvm_xen_hvm_set_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data);
|
|
|
|
int kvm_xen_hvm_get_attr(struct kvm *kvm, struct kvm_xen_hvm_attr *data);
|
2018-06-13 21:55:44 +08:00
|
|
|
int kvm_xen_write_hypercall_page(struct kvm_vcpu *vcpu, u64 data);
|
2021-02-02 21:19:35 +08:00
|
|
|
int kvm_xen_hvm_config(struct kvm *kvm, struct kvm_xen_hvm_config *xhc);
|
2021-08-05 00:48:41 +08:00
|
|
|
void kvm_xen_init_vm(struct kvm *kvm);
|
2021-02-02 23:48:05 +08:00
|
|
|
void kvm_xen_destroy_vm(struct kvm *kvm);
|
2018-06-13 21:55:44 +08:00
|
|
|
|
2021-03-01 20:53:09 +08:00
|
|
|
static inline bool kvm_xen_msr_enabled(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
return static_branch_unlikely(&kvm_xen_enabled.key) &&
|
|
|
|
kvm->arch.xen_hvm_config.msr;
|
|
|
|
}
|
|
|
|
|
2018-06-13 21:55:44 +08:00
|
|
|
static inline bool kvm_xen_hypercall_enabled(struct kvm *kvm)
|
|
|
|
{
|
2021-02-02 23:48:05 +08:00
|
|
|
return static_branch_unlikely(&kvm_xen_enabled.key) &&
|
|
|
|
(kvm->arch.xen_hvm_config.flags &
|
|
|
|
KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL);
|
2018-06-13 21:55:44 +08:00
|
|
|
}
|
|
|
|
|
2020-12-10 04:08:30 +08:00
|
|
|
static inline int kvm_xen_has_interrupt(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
if (static_branch_unlikely(&kvm_xen_enabled.key) &&
|
|
|
|
vcpu->arch.xen.vcpu_info_set && vcpu->kvm->arch.xen.upcall_vector)
|
|
|
|
return __kvm_xen_has_interrupt(vcpu);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2021-02-26 17:54:45 +08:00
|
|
|
#else
|
|
|
|
static inline int kvm_xen_write_hypercall_page(struct kvm_vcpu *vcpu, u64 data)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2021-08-05 00:48:41 +08:00
|
|
|
static inline void kvm_xen_init_vm(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2021-02-26 17:54:45 +08:00
|
|
|
static inline void kvm_xen_destroy_vm(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2021-03-01 20:53:09 +08:00
|
|
|
static inline bool kvm_xen_msr_enabled(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-02-26 17:54:45 +08:00
|
|
|
static inline bool kvm_xen_hypercall_enabled(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int kvm_xen_has_interrupt(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int kvm_xen_hypercall(struct kvm_vcpu *vcpu);
|
2020-12-04 02:45:22 +08:00
|
|
|
|
|
|
|
#include <asm/pvclock-abi.h>
|
|
|
|
#include <asm/xen/interface.h>
|
2021-03-01 20:53:09 +08:00
|
|
|
#include <xen/interface/vcpu.h>
|
2020-12-04 02:45:22 +08:00
|
|
|
|
2021-03-01 20:53:09 +08:00
|
|
|
void kvm_xen_update_runstate_guest(struct kvm_vcpu *vcpu, int state);
|
|
|
|
|
|
|
|
static inline void kvm_xen_runstate_set_running(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
kvm_xen_update_runstate_guest(vcpu, RUNSTATE_running);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void kvm_xen_runstate_set_preempted(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If the vCPU wasn't preempted but took a normal exit for
|
|
|
|
* some reason (hypercalls, I/O, etc.), that is accounted as
|
|
|
|
* still RUNSTATE_running, as the VMM is still operating on
|
|
|
|
* behalf of the vCPU. Only if the VMM does actually block
|
|
|
|
* does it need to enter RUNSTATE_blocked.
|
|
|
|
*/
|
|
|
|
if (vcpu->preempted)
|
|
|
|
kvm_xen_update_runstate_guest(vcpu, RUNSTATE_runnable);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 32-bit compatibility definitions, also used natively in 32-bit build */
|
2020-12-04 02:45:22 +08:00
|
|
|
struct compat_arch_vcpu_info {
|
|
|
|
unsigned int cr2;
|
|
|
|
unsigned int pad[5];
|
|
|
|
};
|
|
|
|
|
|
|
|
struct compat_vcpu_info {
|
2021-02-11 02:26:09 +08:00
|
|
|
uint8_t evtchn_upcall_pending;
|
|
|
|
uint8_t evtchn_upcall_mask;
|
|
|
|
uint16_t pad;
|
|
|
|
uint32_t evtchn_pending_sel;
|
|
|
|
struct compat_arch_vcpu_info arch;
|
|
|
|
struct pvclock_vcpu_time_info time;
|
2020-12-04 02:45:22 +08:00
|
|
|
}; /* 64 bytes (x86) */
|
|
|
|
|
|
|
|
struct compat_arch_shared_info {
|
|
|
|
unsigned int max_pfn;
|
|
|
|
unsigned int pfn_to_mfn_frame_list_list;
|
|
|
|
unsigned int nmi_reason;
|
|
|
|
unsigned int p2m_cr3;
|
|
|
|
unsigned int p2m_vaddr;
|
|
|
|
unsigned int p2m_generation;
|
|
|
|
uint32_t wc_sec_hi;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct compat_shared_info {
|
|
|
|
struct compat_vcpu_info vcpu_info[MAX_VIRT_CPUS];
|
|
|
|
uint32_t evtchn_pending[32];
|
|
|
|
uint32_t evtchn_mask[32];
|
|
|
|
struct pvclock_wall_clock wc;
|
|
|
|
struct compat_arch_shared_info arch;
|
|
|
|
};
|
|
|
|
|
2021-03-01 20:53:09 +08:00
|
|
|
struct compat_vcpu_runstate_info {
|
|
|
|
int state;
|
|
|
|
uint64_t state_entry_time;
|
|
|
|
uint64_t time[4];
|
|
|
|
} __attribute__((packed));
|
|
|
|
|
2018-06-13 21:55:44 +08:00
|
|
|
#endif /* __ARCH_X86_KVM_XEN_H__ */
|