mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Switch all queries (except XSAVES) of guest features from guest CPUID to guest capabilities, i.e. replace all calls to guest_cpuid_has() with calls to guest_cpu_cap_has(). Keep guest_cpuid_has() around for XSAVES, but subsume its helper guest_cpuid_get_register() and add a compile-time assertion to prevent using guest_cpuid_has() for any other feature. Add yet another comment for XSAVE to explain why KVM is allowed to query its raw guest CPUID. Opportunistically drop the unused guest_cpuid_clear(), as there should be no circumstance in which KVM needs to _clear_ a guest CPUID feature now that everything is tracked via cpu_caps. E.g. KVM may need to _change_ a feature to emulate dynamic CPUID flags, but KVM should never need to clear a feature in guest CPUID to prevent it from being used by the guest. Delete the last remnants of the governed features framework, as the lone holdout was vmx_adjust_secondary_exec_control()'s divergent behavior for governed vs. ungoverned features. Note, replacing guest_cpuid_has() checks with guest_cpu_cap_has() when computing reserved CR4 bits is a nop when viewed as a whole, as KVM's capabilities are already incorporated into the calculation, i.e. if a feature is present in guest CPUID but unsupported by KVM, its CR4 bit was already being marked as reserved, checking guest_cpu_cap_has() simply double-stamps that it's a reserved bit. Reviewed-by: Maxim Levitsky <mlevitsk@redhat.com> Link: https://lore.kernel.org/r/20241128013424.4096668-51-seanjc@google.com Signed-off-by: Sean Christopherson <seanjc@google.com>
90 lines
2.1 KiB
C
90 lines
2.1 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef __KVM_X86_VMX_HYPERV_H
|
|
#define __KVM_X86_VMX_HYPERV_H
|
|
|
|
#include <linux/kvm_host.h>
|
|
#include "vmcs12.h"
|
|
#include "vmx.h"
|
|
|
|
#define EVMPTR_INVALID (-1ULL)
|
|
#define EVMPTR_MAP_PENDING (-2ULL)
|
|
|
|
enum nested_evmptrld_status {
|
|
EVMPTRLD_DISABLED,
|
|
EVMPTRLD_SUCCEEDED,
|
|
EVMPTRLD_VMFAIL,
|
|
EVMPTRLD_ERROR,
|
|
};
|
|
|
|
#ifdef CONFIG_KVM_HYPERV
|
|
static inline bool evmptr_is_valid(u64 evmptr)
|
|
{
|
|
return evmptr != EVMPTR_INVALID && evmptr != EVMPTR_MAP_PENDING;
|
|
}
|
|
|
|
static inline bool nested_vmx_is_evmptr12_valid(struct vcpu_vmx *vmx)
|
|
{
|
|
return evmptr_is_valid(vmx->nested.hv_evmcs_vmptr);
|
|
}
|
|
|
|
static inline bool evmptr_is_set(u64 evmptr)
|
|
{
|
|
return evmptr != EVMPTR_INVALID;
|
|
}
|
|
|
|
static inline bool nested_vmx_is_evmptr12_set(struct vcpu_vmx *vmx)
|
|
{
|
|
return evmptr_is_set(vmx->nested.hv_evmcs_vmptr);
|
|
}
|
|
|
|
static inline struct hv_enlightened_vmcs *nested_vmx_evmcs(struct vcpu_vmx *vmx)
|
|
{
|
|
return vmx->nested.hv_evmcs;
|
|
}
|
|
|
|
static inline bool guest_cpu_cap_has_evmcs(struct kvm_vcpu *vcpu)
|
|
{
|
|
/*
|
|
* eVMCS is exposed to the guest if Hyper-V is enabled in CPUID and
|
|
* eVMCS has been explicitly enabled by userspace.
|
|
*/
|
|
return vcpu->arch.hyperv_enabled &&
|
|
to_vmx(vcpu)->nested.enlightened_vmcs_enabled;
|
|
}
|
|
|
|
u64 nested_get_evmptr(struct kvm_vcpu *vcpu);
|
|
uint16_t nested_get_evmcs_version(struct kvm_vcpu *vcpu);
|
|
int nested_enable_evmcs(struct kvm_vcpu *vcpu,
|
|
uint16_t *vmcs_version);
|
|
void nested_evmcs_filter_control_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 *pdata);
|
|
int nested_evmcs_check_controls(struct vmcs12 *vmcs12);
|
|
bool nested_evmcs_l2_tlb_flush_enabled(struct kvm_vcpu *vcpu);
|
|
void vmx_hv_inject_synthetic_vmexit_post_tlb_flush(struct kvm_vcpu *vcpu);
|
|
#else
|
|
static inline bool evmptr_is_valid(u64 evmptr)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline bool nested_vmx_is_evmptr12_valid(struct vcpu_vmx *vmx)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline bool evmptr_is_set(u64 evmptr)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline bool nested_vmx_is_evmptr12_set(struct vcpu_vmx *vmx)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline struct hv_enlightened_vmcs *nested_vmx_evmcs(struct vcpu_vmx *vmx)
|
|
{
|
|
return NULL;
|
|
}
|
|
#endif
|
|
|
|
#endif /* __KVM_X86_VMX_HYPERV_H */
|