Received: by 10.223.176.5 with SMTP id f5csp3170040wra; Mon, 29 Jan 2018 09:48:01 -0800 (PST) X-Google-Smtp-Source: AH8x227PXt4jOfpTXv5m/+aPV/v/wQFcuaKi6IXF2vRnGdhIf6Du1B4Y9l0VWYLBOCLWZCeHKNDq X-Received: by 10.107.57.4 with SMTP id g4mr25629347ioa.236.1517248081856; Mon, 29 Jan 2018 09:48:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517248081; cv=none; d=google.com; s=arc-20160816; b=BW7rK0Zg/vfrPxcEuFminbLtGySkcdi3PdhQtSKh6rGURvhvFj7pRY4RCySBd00hZm +DOxcSybjJgnFbn41y++EGHDEO0fcikFHIcenHmILg5drFfAuyaih4pAbKO0W4eRWw/f kHwB5me5SaSDmLldaYBlq30UuZaHYHSuOqyfTZVl38M59hOL+y/Uwfblba/ytdYSxXBX B7oU5KWRzfwDYsrZrWV3dVoSFNIZs5FAZKTvDgcm+r7LcKiSdeIWkv4T7HhDGyenqb5R 84CL5jxHZJepd1oR8N6njKR8P+W1z5tg1zbBF8BnGk5B/s1ISG/B3zwxYTmFowX9rmVT pmYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=mGMdzRi+KUK9A/RR/SQnhoM3i9uyd/Y29b1u8rJuBrQ=; b=jIThg1ZfZUNxFblOO6bURoWdGZdorjEGrFhmpgW8Pw4VAWjW/d1HDkX9G3z7GFOqI6 YTL+wT3CGUwWdtwkwOIUYLpMvPD8Upg5OfPhJBcmlRP5JzVYfkI/7AUtV99ONUH0EhXV zly9M6Qi2T2YRFGA8EDXRqFh4/MKjdhly+jdS9rYAqKszKmDZNf+O5DGTBODppShIjeP TetaZ6dofFbqEEJI18sRYftDTyHgSFNpWZaMyYYuY5erwGP15mpuHVVeJbbG8Dm2139P 2pukJr37LQHZqqmOR06AmrsVYtzzf3il3dFu8UxwSUGTNUEm1Quda8nmF4fM//vdIrat Fw2g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r142si4592802itr.18.2018.01.29.09.47.48; Mon, 29 Jan 2018 09:48:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751779AbeA2Rqh (ORCPT + 99 others); Mon, 29 Jan 2018 12:46:37 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:43552 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751753AbeA2Rqf (ORCPT ); Mon, 29 Jan 2018 12:46:35 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0CD35164F; Mon, 29 Jan 2018 09:46:35 -0800 (PST) Received: from approximate.cambridge.arm.com (approximate.cambridge.arm.com [10.1.207.62]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id EBCC83F487; Mon, 29 Jan 2018 09:46:32 -0800 (PST) From: Marc Zyngier To: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu Cc: Catalin Marinas , Will Deacon , Peter Maydell , Christoffer Dall , Lorenzo Pieralisi , Mark Rutland , Robin Murphy , Ard Biesheuvel , Jon Masters Subject: [PATCH v2 09/16] arm/arm64: KVM: Turn kvm_psci_version into a static inline Date: Mon, 29 Jan 2018 17:45:52 +0000 Message-Id: <20180129174559.1866-10-marc.zyngier@arm.com> X-Mailer: git-send-email 2.14.2 In-Reply-To: <20180129174559.1866-1-marc.zyngier@arm.com> References: <20180129174559.1866-1-marc.zyngier@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We're about to need kvm_psci_version in HYP too. So let's turn it into a static inline, and pass the kvm structure as a second parameter (so that HYP can do a kern_hyp_va on it). Signed-off-by: Marc Zyngier --- arch/arm64/kvm/hyp/switch.c | 20 ++++++++++++-------- include/kvm/arm_psci.h | 27 ++++++++++++++++++++++++++- virt/kvm/arm/psci.c | 23 ++--------------------- 3 files changed, 40 insertions(+), 30 deletions(-) diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c index 036e1f3d77a6..408c04d789a5 100644 --- a/arch/arm64/kvm/hyp/switch.c +++ b/arch/arm64/kvm/hyp/switch.c @@ -19,6 +19,8 @@ #include #include +#include + #include #include #include @@ -350,14 +352,16 @@ int __hyp_text __kvm_vcpu_run(struct kvm_vcpu *vcpu) if (exit_code == ARM_EXCEPTION_TRAP && (kvm_vcpu_trap_get_class(vcpu) == ESR_ELx_EC_HVC64 || - kvm_vcpu_trap_get_class(vcpu) == ESR_ELx_EC_HVC32) && - vcpu_get_reg(vcpu, 0) == PSCI_0_2_FN_PSCI_VERSION) { - u64 val = PSCI_RET_NOT_SUPPORTED; - if (test_bit(KVM_ARM_VCPU_PSCI_0_2, vcpu->arch.features)) - val = 2; - - vcpu_set_reg(vcpu, 0, val); - goto again; + kvm_vcpu_trap_get_class(vcpu) == ESR_ELx_EC_HVC32)) { + u32 val = vcpu_get_reg(vcpu, 0); + + if (val == PSCI_0_2_FN_PSCI_VERSION) { + val = kvm_psci_version(vcpu, kern_hyp_va(vcpu->kvm)); + if (unlikely(val == KVM_ARM_PSCI_0_1)) + val = PSCI_RET_NOT_SUPPORTED; + vcpu_set_reg(vcpu, 0, val); + goto again; + } } if (static_branch_unlikely(&vgic_v2_cpuif_trap) && diff --git a/include/kvm/arm_psci.h b/include/kvm/arm_psci.h index 4876bfac2195..32978b578002 100644 --- a/include/kvm/arm_psci.h +++ b/include/kvm/arm_psci.h @@ -18,6 +18,8 @@ #ifndef __KVM_ARM_PSCI_H__ #define __KVM_ARM_PSCI_H__ +#include + #define PSCI_VERSION(x,y) ((((x) & 0x7fff) << 16) | ((y) & 0xffff)) #define KVM_ARM_PSCI_0_1 PSCI_VERSION(0, 1) #define KVM_ARM_PSCI_0_2 PSCI_VERSION(0, 2) @@ -25,7 +27,30 @@ #define KVM_ARM_PSCI_LATEST KVM_ARM_PSCI_1_0 -int kvm_psci_version(struct kvm_vcpu *vcpu); +/* + * We need the KVM pointer independently from the vcpu as we can call + * this from HYP, and need to apply kern_hyp_va on it... + */ +static inline int kvm_psci_version(struct kvm_vcpu *vcpu, struct kvm *kvm) +{ + /* + * Our PSCI implementation stays the same across versions from + * v0.2 onward, only adding the few mandatory functions (such + * as FEATURES with 1.0) that are required by newer + * revisions. It is thus safe to return the latest, unless + * userspace has instructed us otherwise. + */ + if (test_bit(KVM_ARM_VCPU_PSCI_0_2, vcpu->arch.features)) { + if (kvm->arch.psci_version) + return kvm->arch.psci_version; + + return KVM_ARM_PSCI_LATEST; + } + + return KVM_ARM_PSCI_0_1; +} + + int kvm_hvc_call_handler(struct kvm_vcpu *vcpu); struct kvm_one_reg; diff --git a/virt/kvm/arm/psci.c b/virt/kvm/arm/psci.c index 3bb336ac7d7d..a021b62ed762 100644 --- a/virt/kvm/arm/psci.c +++ b/virt/kvm/arm/psci.c @@ -126,7 +126,7 @@ static unsigned long kvm_psci_vcpu_on(struct kvm_vcpu *source_vcpu) if (!vcpu) return PSCI_RET_INVALID_PARAMS; if (!vcpu->arch.power_off) { - if (kvm_psci_version(source_vcpu) != KVM_ARM_PSCI_0_1) + if (kvm_psci_version(source_vcpu, kvm) != KVM_ARM_PSCI_0_1) return PSCI_RET_ALREADY_ON; else return PSCI_RET_INVALID_PARAMS; @@ -235,25 +235,6 @@ static void kvm_psci_system_reset(struct kvm_vcpu *vcpu) kvm_prepare_system_event(vcpu, KVM_SYSTEM_EVENT_RESET); } -int kvm_psci_version(struct kvm_vcpu *vcpu) -{ - /* - * Our PSCI implementation stays the same across versions from - * v0.2 onward, only adding the few mandatory functions (such - * as FEATURES with 1.0) that are required by newer - * revisions. It is thus safe to return the latest, unless - * userspace has instructed us otherwise. - */ - if (test_bit(KVM_ARM_VCPU_PSCI_0_2, vcpu->arch.features)) { - if (vcpu->kvm->arch.psci_version) - return vcpu->kvm->arch.psci_version; - - return KVM_ARM_PSCI_LATEST; - } - - return KVM_ARM_PSCI_0_1; -} - static int kvm_psci_0_2_call(struct kvm_vcpu *vcpu) { struct kvm *kvm = vcpu->kvm; @@ -411,7 +392,7 @@ static int kvm_psci_0_1_call(struct kvm_vcpu *vcpu) */ static int kvm_psci_call(struct kvm_vcpu *vcpu) { - switch (kvm_psci_version(vcpu)) { + switch (kvm_psci_version(vcpu, vcpu->kvm)) { case KVM_ARM_PSCI_1_0: return kvm_psci_1_0_call(vcpu); case KVM_ARM_PSCI_0_2: -- 2.14.2