123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391 |
- /* SPDX-License-Identifier: GPL-2.0-only */
- /*
- * Copyright (C) 2012,2013 - ARM Ltd
- * Author: Marc Zyngier <[email protected]>
- */
- #ifndef __ARM_KVM_ASM_H__
- #define __ARM_KVM_ASM_H__
- #include <asm/hyp_image.h>
- #include <asm/insn.h>
- #include <asm/virt.h>
- #define ARM_EXIT_WITH_SERROR_BIT 31
- #define ARM_EXCEPTION_CODE(x) ((x) & ~(1U << ARM_EXIT_WITH_SERROR_BIT))
- #define ARM_EXCEPTION_IS_TRAP(x) (ARM_EXCEPTION_CODE((x)) == ARM_EXCEPTION_TRAP)
- #define ARM_SERROR_PENDING(x) !!((x) & (1U << ARM_EXIT_WITH_SERROR_BIT))
- #define ARM_EXCEPTION_IRQ 0
- #define ARM_EXCEPTION_EL1_SERROR 1
- #define ARM_EXCEPTION_TRAP 2
- #define ARM_EXCEPTION_IL 3
- /* The hyp-stub will return this for any kvm_call_hyp() call */
- #define ARM_EXCEPTION_HYP_GONE HVC_STUB_ERR
- #define kvm_arm_exception_type \
- {ARM_EXCEPTION_IRQ, "IRQ" }, \
- {ARM_EXCEPTION_EL1_SERROR, "SERROR" }, \
- {ARM_EXCEPTION_TRAP, "TRAP" }, \
- {ARM_EXCEPTION_HYP_GONE, "HYP_GONE" }
- /*
- * Size of the HYP vectors preamble. kvm_patch_vector_branch() generates code
- * that jumps over this.
- */
- #define KVM_VECTOR_PREAMBLE (2 * AARCH64_INSN_SIZE)
- #define KVM_HOST_SMCCC_ID(id) \
- ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, \
- ARM_SMCCC_SMC_64, \
- ARM_SMCCC_OWNER_VENDOR_HYP, \
- (id))
- #define KVM_HOST_SMCCC_FUNC(name) KVM_HOST_SMCCC_ID(__KVM_HOST_SMCCC_FUNC_##name)
- #define __KVM_HOST_SMCCC_FUNC___kvm_hyp_init 0
- #ifndef __ASSEMBLY__
- #include <linux/mm.h>
- enum __kvm_host_smccc_func {
- /* Hypercalls available only prior to pKVM finalisation */
- /* __KVM_HOST_SMCCC_FUNC___kvm_hyp_init */
- __KVM_HOST_SMCCC_FUNC___kvm_get_mdcr_el2 = __KVM_HOST_SMCCC_FUNC___kvm_hyp_init + 1,
- __KVM_HOST_SMCCC_FUNC___pkvm_init,
- __KVM_HOST_SMCCC_FUNC___pkvm_create_private_mapping,
- __KVM_HOST_SMCCC_FUNC___pkvm_cpu_set_vector,
- __KVM_HOST_SMCCC_FUNC___kvm_enable_ssbs,
- __KVM_HOST_SMCCC_FUNC___vgic_v3_init_lrs,
- __KVM_HOST_SMCCC_FUNC___vgic_v3_get_gic_config,
- __KVM_HOST_SMCCC_FUNC___kvm_flush_vm_context,
- __KVM_HOST_SMCCC_FUNC___kvm_tlb_flush_vmid_ipa,
- __KVM_HOST_SMCCC_FUNC___kvm_tlb_flush_vmid,
- __KVM_HOST_SMCCC_FUNC___kvm_flush_cpu_context,
- __KVM_HOST_SMCCC_FUNC___pkvm_alloc_module_va,
- __KVM_HOST_SMCCC_FUNC___pkvm_map_module_page,
- __KVM_HOST_SMCCC_FUNC___pkvm_unmap_module_page,
- __KVM_HOST_SMCCC_FUNC___pkvm_init_module,
- __KVM_HOST_SMCCC_FUNC___pkvm_register_hcall,
- __KVM_HOST_SMCCC_FUNC___pkvm_prot_finalize,
- /* Hypercalls available after pKVM finalisation */
- __KVM_HOST_SMCCC_FUNC___pkvm_host_share_hyp,
- __KVM_HOST_SMCCC_FUNC___pkvm_host_unshare_hyp,
- __KVM_HOST_SMCCC_FUNC___pkvm_host_map_guest,
- __KVM_HOST_SMCCC_FUNC___kvm_adjust_pc,
- __KVM_HOST_SMCCC_FUNC___kvm_vcpu_run,
- __KVM_HOST_SMCCC_FUNC___kvm_timer_set_cntvoff,
- __KVM_HOST_SMCCC_FUNC___vgic_v3_save_vmcr_aprs,
- __KVM_HOST_SMCCC_FUNC___vgic_v3_restore_vmcr_aprs,
- __KVM_HOST_SMCCC_FUNC___pkvm_init_vm,
- __KVM_HOST_SMCCC_FUNC___pkvm_init_vcpu,
- __KVM_HOST_SMCCC_FUNC___pkvm_start_teardown_vm,
- __KVM_HOST_SMCCC_FUNC___pkvm_finalize_teardown_vm,
- __KVM_HOST_SMCCC_FUNC___pkvm_reclaim_dying_guest_page,
- __KVM_HOST_SMCCC_FUNC___pkvm_vcpu_load,
- __KVM_HOST_SMCCC_FUNC___pkvm_vcpu_put,
- __KVM_HOST_SMCCC_FUNC___pkvm_vcpu_sync_state,
- __KVM_HOST_SMCCC_FUNC___pkvm_iommu_driver_init,
- __KVM_HOST_SMCCC_FUNC___pkvm_iommu_register,
- __KVM_HOST_SMCCC_FUNC___pkvm_iommu_pm_notify,
- __KVM_HOST_SMCCC_FUNC___pkvm_iommu_finalize,
- __KVM_HOST_SMCCC_FUNC___pkvm_load_tracing,
- __KVM_HOST_SMCCC_FUNC___pkvm_teardown_tracing,
- __KVM_HOST_SMCCC_FUNC___pkvm_enable_tracing,
- __KVM_HOST_SMCCC_FUNC___pkvm_rb_swap_reader_page,
- __KVM_HOST_SMCCC_FUNC___pkvm_rb_update_footers,
- __KVM_HOST_SMCCC_FUNC___pkvm_enable_event,
- #ifdef CONFIG_ANDROID_ARM64_WORKAROUND_DMA_BEYOND_POC
- __KVM_HOST_SMCCC_FUNC___pkvm_host_set_stage2_memattr,
- #endif
- /*
- * Start of the dynamically registered hypercalls. Start a bit
- * further, just in case some modules...
- */
- __KVM_HOST_SMCCC_FUNC___dynamic_hcalls = 128,
- };
- #define DECLARE_KVM_VHE_SYM(sym) extern char sym[]
- #define DECLARE_KVM_NVHE_SYM(sym) extern char kvm_nvhe_sym(sym)[]
- /*
- * Define a pair of symbols sharing the same name but one defined in
- * VHE and the other in nVHE hyp implementations.
- */
- #define DECLARE_KVM_HYP_SYM(sym) \
- DECLARE_KVM_VHE_SYM(sym); \
- DECLARE_KVM_NVHE_SYM(sym)
- #define DECLARE_KVM_VHE_PER_CPU(type, sym) \
- DECLARE_PER_CPU(type, sym)
- #define DECLARE_KVM_NVHE_PER_CPU(type, sym) \
- DECLARE_PER_CPU(type, kvm_nvhe_sym(sym))
- #define DECLARE_KVM_HYP_PER_CPU(type, sym) \
- DECLARE_KVM_VHE_PER_CPU(type, sym); \
- DECLARE_KVM_NVHE_PER_CPU(type, sym)
- /*
- * Compute pointer to a symbol defined in nVHE percpu region.
- * Returns NULL if percpu memory has not been allocated yet.
- */
- #define this_cpu_ptr_nvhe_sym(sym) per_cpu_ptr_nvhe_sym(sym, smp_processor_id())
- #define per_cpu_ptr_nvhe_sym(sym, cpu) \
- ({ \
- unsigned long base, off; \
- base = kvm_nvhe_sym(kvm_arm_hyp_percpu_base)[cpu]; \
- off = (unsigned long)&CHOOSE_NVHE_SYM(sym) - \
- (unsigned long)&CHOOSE_NVHE_SYM(__per_cpu_start); \
- base ? (typeof(CHOOSE_NVHE_SYM(sym))*)(base + off) : NULL; \
- })
- #if defined(__KVM_NVHE_HYPERVISOR__)
- #define CHOOSE_NVHE_SYM(sym) sym
- #define CHOOSE_HYP_SYM(sym) CHOOSE_NVHE_SYM(sym)
- /* The nVHE hypervisor shouldn't even try to access VHE symbols */
- extern void *__nvhe_undefined_symbol;
- #define CHOOSE_VHE_SYM(sym) __nvhe_undefined_symbol
- #define this_cpu_ptr_hyp_sym(sym) (&__nvhe_undefined_symbol)
- #define per_cpu_ptr_hyp_sym(sym, cpu) (&__nvhe_undefined_symbol)
- /*
- * pKVM uses the module_ops struct to expose services to modules but
- * doesn't allow fine-grained definition of the license for each export,
- * and doesn't have a way to check the license of the loaded module.
- * Given that said module may be proprietary, let's seek GPL compliance
- * by preventing the accidental export of GPL symbols to hyp modules via
- * pKVM's module_ops struct.
- */
- #ifdef EXPORT_SYMBOL_GPL
- #undef EXPORT_SYMBOL_GPL
- #endif
- #define EXPORT_SYMBOL_GPL(sym) BUILD_BUG()
- #elif defined(__KVM_VHE_HYPERVISOR__)
- #define CHOOSE_VHE_SYM(sym) sym
- #define CHOOSE_HYP_SYM(sym) CHOOSE_VHE_SYM(sym)
- /* The VHE hypervisor shouldn't even try to access nVHE symbols */
- extern void *__vhe_undefined_symbol;
- #define CHOOSE_NVHE_SYM(sym) __vhe_undefined_symbol
- #define this_cpu_ptr_hyp_sym(sym) (&__vhe_undefined_symbol)
- #define per_cpu_ptr_hyp_sym(sym, cpu) (&__vhe_undefined_symbol)
- #else
- /*
- * BIG FAT WARNINGS:
- *
- * - Don't be tempted to change the following is_kernel_in_hyp_mode()
- * to has_vhe(). has_vhe() is implemented as a *final* capability,
- * while this is used early at boot time, when the capabilities are
- * not final yet....
- *
- * - Don't let the nVHE hypervisor have access to this, as it will
- * pick the *wrong* symbol (yes, it runs at EL2...).
- */
- #define CHOOSE_HYP_SYM(sym) (is_kernel_in_hyp_mode() \
- ? CHOOSE_VHE_SYM(sym) \
- : CHOOSE_NVHE_SYM(sym))
- #define this_cpu_ptr_hyp_sym(sym) (is_kernel_in_hyp_mode() \
- ? this_cpu_ptr(&sym) \
- : this_cpu_ptr_nvhe_sym(sym))
- #define per_cpu_ptr_hyp_sym(sym, cpu) (is_kernel_in_hyp_mode() \
- ? per_cpu_ptr(&sym, cpu) \
- : per_cpu_ptr_nvhe_sym(sym, cpu))
- #define CHOOSE_VHE_SYM(sym) sym
- #define CHOOSE_NVHE_SYM(sym) kvm_nvhe_sym(sym)
- #endif
- struct kvm_nvhe_init_params {
- unsigned long mair_el2;
- unsigned long tcr_el2;
- unsigned long tpidr_el2;
- unsigned long stack_hyp_va;
- unsigned long stack_pa;
- phys_addr_t pgd_pa;
- unsigned long hcr_el2;
- unsigned long hfgwtr_el2;
- unsigned long vttbr;
- unsigned long vtcr;
- };
- /*
- * Used by the host in EL1 to dump the nVHE hypervisor backtrace on
- * hyp_panic() in non-protected mode.
- *
- * @stack_base: hyp VA of the hyp_stack base.
- * @overflow_stack_base: hyp VA of the hyp_overflow_stack base.
- * @fp: hyp FP where the backtrace begins.
- * @pc: hyp PC where the backtrace begins.
- */
- struct kvm_nvhe_stacktrace_info {
- unsigned long stack_base;
- unsigned long overflow_stack_base;
- unsigned long fp;
- unsigned long pc;
- };
- /* Translate a kernel address @ptr into its equivalent linear mapping */
- #define kvm_ksym_ref(ptr) \
- ({ \
- void *val = (ptr); \
- if (!is_kernel_in_hyp_mode()) \
- val = lm_alias((ptr)); \
- val; \
- })
- #define kvm_ksym_ref_nvhe(sym) kvm_ksym_ref(kvm_nvhe_sym(sym))
- struct kvm;
- struct kvm_vcpu;
- struct kvm_s2_mmu;
- DECLARE_KVM_NVHE_SYM(__kvm_hyp_init);
- DECLARE_KVM_HYP_SYM(__kvm_hyp_vector);
- #define __kvm_hyp_init CHOOSE_NVHE_SYM(__kvm_hyp_init)
- #define __kvm_hyp_vector CHOOSE_HYP_SYM(__kvm_hyp_vector)
- extern unsigned long kvm_nvhe_sym(kvm_arm_hyp_percpu_base)[];
- DECLARE_KVM_NVHE_SYM(__per_cpu_start);
- DECLARE_KVM_NVHE_SYM(__per_cpu_end);
- extern unsigned long kvm_nvhe_sym(kvm_arm_hyp_host_fp_state)[];
- DECLARE_KVM_HYP_SYM(__bp_harden_hyp_vecs);
- #define __bp_harden_hyp_vecs CHOOSE_HYP_SYM(__bp_harden_hyp_vecs)
- extern void __kvm_flush_vm_context(void);
- extern void __kvm_flush_cpu_context(struct kvm_s2_mmu *mmu);
- extern void __kvm_tlb_flush_vmid_ipa(struct kvm_s2_mmu *mmu, phys_addr_t ipa,
- int level);
- extern void __kvm_tlb_flush_vmid(struct kvm_s2_mmu *mmu);
- extern void __kvm_timer_set_cntvoff(u64 cntvoff);
- extern int __kvm_vcpu_run(struct kvm_vcpu *vcpu);
- extern void __kvm_adjust_pc(struct kvm_vcpu *vcpu);
- extern u64 __vgic_v3_get_gic_config(void);
- extern void __vgic_v3_init_lrs(void);
- extern u64 __kvm_get_mdcr_el2(void);
- #define __KVM_EXTABLE(from, to) \
- " .pushsection __kvm_ex_table, \"a\"\n" \
- " .align 3\n" \
- " .long (" #from " - .), (" #to " - .)\n" \
- " .popsection\n"
- #define __kvm_at(at_op, addr) \
- ( { \
- int __kvm_at_err = 0; \
- u64 spsr, elr; \
- asm volatile( \
- " mrs %1, spsr_el2\n" \
- " mrs %2, elr_el2\n" \
- "1: at "at_op", %3\n" \
- " isb\n" \
- " b 9f\n" \
- "2: msr spsr_el2, %1\n" \
- " msr elr_el2, %2\n" \
- " mov %w0, %4\n" \
- "9:\n" \
- __KVM_EXTABLE(1b, 2b) \
- : "+r" (__kvm_at_err), "=&r" (spsr), "=&r" (elr) \
- : "r" (addr), "i" (-EFAULT)); \
- __kvm_at_err; \
- } )
- #else /* __ASSEMBLY__ */
- .macro get_host_ctxt reg, tmp
- adr_this_cpu \reg, kvm_host_data, \tmp
- add \reg, \reg, #HOST_DATA_CONTEXT
- .endm
- .macro get_vcpu_ptr vcpu, ctxt
- get_host_ctxt \ctxt, \vcpu
- ldr \vcpu, [\ctxt, #HOST_CONTEXT_VCPU]
- .endm
- .macro get_loaded_vcpu vcpu, ctxt
- adr_this_cpu \ctxt, kvm_hyp_ctxt, \vcpu
- ldr \vcpu, [\ctxt, #HOST_CONTEXT_VCPU]
- .endm
- .macro set_loaded_vcpu vcpu, ctxt, tmp
- adr_this_cpu \ctxt, kvm_hyp_ctxt, \tmp
- str \vcpu, [\ctxt, #HOST_CONTEXT_VCPU]
- .endm
- /*
- * KVM extable for unexpected exceptions.
- * Create a struct kvm_exception_table_entry output to a section that can be
- * mapped by EL2. The table is not sorted.
- *
- * The caller must ensure:
- * x18 has the hypervisor value to allow any Shadow-Call-Stack instrumented
- * code to write to it, and that SPSR_EL2 and ELR_EL2 are restored by the fixup.
- */
- .macro _kvm_extable, from, to
- .pushsection __kvm_ex_table, "a"
- .align 3
- .long (\from - .), (\to - .)
- .popsection
- .endm
- #define CPU_XREG_OFFSET(x) (CPU_USER_PT_REGS + 8*x)
- #define CPU_LR_OFFSET CPU_XREG_OFFSET(30)
- #define CPU_SP_EL0_OFFSET (CPU_LR_OFFSET + 8)
- /*
- * We treat x18 as callee-saved as the host may use it as a platform
- * register (e.g. for shadow call stack).
- */
- .macro save_callee_saved_regs ctxt
- str x18, [\ctxt, #CPU_XREG_OFFSET(18)]
- stp x19, x20, [\ctxt, #CPU_XREG_OFFSET(19)]
- stp x21, x22, [\ctxt, #CPU_XREG_OFFSET(21)]
- stp x23, x24, [\ctxt, #CPU_XREG_OFFSET(23)]
- stp x25, x26, [\ctxt, #CPU_XREG_OFFSET(25)]
- stp x27, x28, [\ctxt, #CPU_XREG_OFFSET(27)]
- stp x29, lr, [\ctxt, #CPU_XREG_OFFSET(29)]
- .endm
- .macro restore_callee_saved_regs ctxt
- // We require \ctxt is not x18-x28
- ldr x18, [\ctxt, #CPU_XREG_OFFSET(18)]
- ldp x19, x20, [\ctxt, #CPU_XREG_OFFSET(19)]
- ldp x21, x22, [\ctxt, #CPU_XREG_OFFSET(21)]
- ldp x23, x24, [\ctxt, #CPU_XREG_OFFSET(23)]
- ldp x25, x26, [\ctxt, #CPU_XREG_OFFSET(25)]
- ldp x27, x28, [\ctxt, #CPU_XREG_OFFSET(27)]
- ldp x29, lr, [\ctxt, #CPU_XREG_OFFSET(29)]
- .endm
- .macro save_sp_el0 ctxt, tmp
- mrs \tmp, sp_el0
- str \tmp, [\ctxt, #CPU_SP_EL0_OFFSET]
- .endm
- .macro restore_sp_el0 ctxt, tmp
- ldr \tmp, [\ctxt, #CPU_SP_EL0_OFFSET]
- msr sp_el0, \tmp
- .endm
- #endif
- #endif /* __ARM_KVM_ASM_H__ */
|