mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Add new hvcall guest address host visibility support to mark memory visible to host. Call it inside set_memory_decrypted /encrypted(). Add HYPERVISOR feature check in the hv_is_isolation_supported() to optimize in non-virtualization environment. Acked-by: Dave Hansen <dave.hansen@intel.com> Reviewed-by: Michael Kelley <mikelley@microsoft.com> Signed-off-by: Tianyu Lan <Tianyu.Lan@microsoft.com> Link: https://lore.kernel.org/r/20211025122116.264793-4-ltykernel@gmail.com [ wei: fix conflicts with tip ] Signed-off-by: Wei Liu <wei.liu@kernel.org>
105 lines
2.7 KiB
C
105 lines
2.7 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Hyper-V Isolation VM interface with paravisor and hypervisor
|
|
*
|
|
* Author:
|
|
* Tianyu Lan <Tianyu.Lan@microsoft.com>
|
|
*/
|
|
|
|
#include <linux/hyperv.h>
|
|
#include <linux/types.h>
|
|
#include <linux/bitfield.h>
|
|
#include <linux/slab.h>
|
|
#include <asm/io.h>
|
|
#include <asm/mshyperv.h>
|
|
|
|
/*
|
|
* hv_mark_gpa_visibility - Set pages visible to host via hvcall.
|
|
*
|
|
* In Isolation VM, all guest memory is encrypted from host and guest
|
|
* needs to set memory visible to host via hvcall before sharing memory
|
|
* with host.
|
|
*/
|
|
static int hv_mark_gpa_visibility(u16 count, const u64 pfn[],
|
|
enum hv_mem_host_visibility visibility)
|
|
{
|
|
struct hv_gpa_range_for_visibility **input_pcpu, *input;
|
|
u16 pages_processed;
|
|
u64 hv_status;
|
|
unsigned long flags;
|
|
|
|
/* no-op if partition isolation is not enabled */
|
|
if (!hv_is_isolation_supported())
|
|
return 0;
|
|
|
|
if (count > HV_MAX_MODIFY_GPA_REP_COUNT) {
|
|
pr_err("Hyper-V: GPA count:%d exceeds supported:%lu\n", count,
|
|
HV_MAX_MODIFY_GPA_REP_COUNT);
|
|
return -EINVAL;
|
|
}
|
|
|
|
local_irq_save(flags);
|
|
input_pcpu = (struct hv_gpa_range_for_visibility **)
|
|
this_cpu_ptr(hyperv_pcpu_input_arg);
|
|
input = *input_pcpu;
|
|
if (unlikely(!input)) {
|
|
local_irq_restore(flags);
|
|
return -EINVAL;
|
|
}
|
|
|
|
input->partition_id = HV_PARTITION_ID_SELF;
|
|
input->host_visibility = visibility;
|
|
input->reserved0 = 0;
|
|
input->reserved1 = 0;
|
|
memcpy((void *)input->gpa_page_list, pfn, count * sizeof(*pfn));
|
|
hv_status = hv_do_rep_hypercall(
|
|
HVCALL_MODIFY_SPARSE_GPA_PAGE_HOST_VISIBILITY, count,
|
|
0, input, &pages_processed);
|
|
local_irq_restore(flags);
|
|
|
|
if (hv_result_success(hv_status))
|
|
return 0;
|
|
else
|
|
return -EFAULT;
|
|
}
|
|
|
|
/*
|
|
* hv_set_mem_host_visibility - Set specified memory visible to host.
|
|
*
|
|
* In Isolation VM, all guest memory is encrypted from host and guest
|
|
* needs to set memory visible to host via hvcall before sharing memory
|
|
* with host. This function works as wrap of hv_mark_gpa_visibility()
|
|
* with memory base and size.
|
|
*/
|
|
int hv_set_mem_host_visibility(unsigned long kbuffer, int pagecount, bool visible)
|
|
{
|
|
enum hv_mem_host_visibility visibility = visible ?
|
|
VMBUS_PAGE_VISIBLE_READ_WRITE : VMBUS_PAGE_NOT_VISIBLE;
|
|
u64 *pfn_array;
|
|
int ret = 0;
|
|
int i, pfn;
|
|
|
|
if (!hv_is_isolation_supported() || !hv_hypercall_pg)
|
|
return 0;
|
|
|
|
pfn_array = kmalloc(HV_HYP_PAGE_SIZE, GFP_KERNEL);
|
|
if (!pfn_array)
|
|
return -ENOMEM;
|
|
|
|
for (i = 0, pfn = 0; i < pagecount; i++) {
|
|
pfn_array[pfn] = virt_to_hvpfn((void *)kbuffer + i * HV_HYP_PAGE_SIZE);
|
|
pfn++;
|
|
|
|
if (pfn == HV_MAX_MODIFY_GPA_REP_COUNT || i == pagecount - 1) {
|
|
ret = hv_mark_gpa_visibility(pfn, pfn_array,
|
|
visibility);
|
|
if (ret)
|
|
goto err_free_pfn_array;
|
|
pfn = 0;
|
|
}
|
|
}
|
|
|
|
err_free_pfn_array:
|
|
kfree(pfn_array);
|
|
return ret;
|
|
}
|