Received: by 10.223.185.116 with SMTP id b49csp2861034wrg; Sun, 25 Feb 2018 08:02:05 -0800 (PST) X-Google-Smtp-Source: AH8x2267mDDy3mMRJ2ucsgn9hVg7GZBrwP/hbO98TXGNDKE/5+TFVVhbrDqo9jfvz2x036nqRpQl X-Received: by 2002:a17:902:b7c1:: with SMTP id v1-v6mr7903886plz.315.1519574524956; Sun, 25 Feb 2018 08:02:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519574524; cv=none; d=google.com; s=arc-20160816; b=s59+0ED/5fRdSCW25vB3jNCnd+0IQZfmZe1AKnsEwt4VpW7XtI2t8VJzYSH01NCe+D zvk57rpxLaaBUXu/22EMw6szkb5i32RlqDtGqmQYJe7oqjlhJIJSioIIPSP9hGRjsos6 ZKYyHpHKkvDpBmNAuP+z4r5YgyUzQsdONhaQOJtvo4kvHd/0d5empP8CCbp90bakROdQ WLH4tI9O/0IcyFA7gcUuT4OvwXTUPwpuhWuQ+4lvx7iehnt3JFDP5vZ3/idLq3hIXNjt aASOWg5eKCIlYH+yhkoKtLdd7oN6UxrVFtmZUaTPMXwErGt27SpNH0h9wJXByBzuGjyB RqpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:arc-authentication-results; bh=KafxwblQkDq07Y7yWIUTmTY9rTFxwwJ9Fc22L6+1hg8=; b=0Tp9xW/NNUbzdTv/eskqnq60Vn0eawdcLthni0rnsi7YZ18+OpAqmFpUAY3/W53IMY PDe5pucaa/UY00AfGQnqzhuZjfVoPm12vPGABTaUqcwuWxeaxK5NdvSoU9ME3jRgjVr/ kJa23Bdepbt8S9WRggZZMjHeuhlsHRpuNJRYPrC7xxkIZ0Bn6yuCZVFFqTSHMmUvAtW9 6irPcAL/bRPSxZANFoBIec5EueiLuY6aawhS1tWkqnpS+/uvLhurfkAlObCJCaUDExYk FEegY6S1DTK8spddD2Kro92RYGDSSXAl+7RjPabKaOWekxjbx+SmoKA3uof5HdBTfJI9 hH1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@virtualoco.com header.s=it header.b=WK3c/mxR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n16si5289456pfb.163.2018.02.25.08.01.38; Sun, 25 Feb 2018 08:02:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@virtualoco.com header.s=it header.b=WK3c/mxR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751834AbeBYP6U (ORCPT + 99 others); Sun, 25 Feb 2018 10:58:20 -0500 Received: from sender-of-o52.zoho.com ([135.84.80.217]:21449 "EHLO sender-of-o52.zoho.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751680AbeBYP6T (ORCPT ); Sun, 25 Feb 2018 10:58:19 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1519574295; s=it; d=virtualoco.com; i=idgar@virtualoco.com; h=From:To:Cc:Subject:Date:Message-Id; l=6226; bh=KafxwblQkDq07Y7yWIUTmTY9rTFxwwJ9Fc22L6+1hg8=; b=WK3c/mxRcj/gsfxKmwjkSOLYu0IC8/TvCGifqrHCDr6H6I3fjZgaKLqujWcuDIh2 WaPjQDU/IWZkacUqEWcTUW4ziecDCZQ3gE6FkmZNsH57XDiXYBb4AwXMZoHYxO58VMT V8y9BfyHjkMp+TBXuWGzz6gva3DCUbS/YNGVnva0= Received: from ibm-p8-kvm-03-guest-02.virt.pnr.lab.eng.rdu2.redhat.com (bzq-82-81-15-113.red.bezeqint.net [82.81.15.113]) by mx.zohomail.com with SMTPS id 1519574294936130.14463074524224; Sun, 25 Feb 2018 07:58:14 -0800 (PST) From: Or Idgar To: linux-kernel@vger.kernel.org, arnd@arndb.de, gregkh@linuxfoundation.org Cc: oidgar@redhat.com, idgar@virtualoco.com, ghammer@redhat.com, Or Idgar Subject: [PATCH v3] drivers/virt: vm_gen_counter: initial driver implementation Date: Sun, 25 Feb 2018 17:55:25 +0200 Message-Id: <20180225155525.25436-1-idgar@virtualoco.com> X-Mailer: git-send-email 2.14.3 X-ZohoMailClient: External X-ZohoMail: Z_638866495 SPT_1 Z_638866494 SPT_1 SLF_D Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Or Idgar This patch is a driver which expose the Virtual Machine Generation ID via sysfs. The ID is a UUID value used to differentiate between virtual machines. The VM-Generation ID is a feature defined by Microsoft (paper: http://go.microsoft.com/fwlink/?LinkId=260709) and supported by multiple hypervisor vendors. Signed-off-by: Or Idgar --- Changes in v3 from v1 (v2 lack of patch changelog): - replaced GPL2 section with SPDX line. - including linux/kobject.h for hypervisor_kobj. - using acpi_os_map_memory instead acpi_os_map_iomem. Documentation/ABI/testing/sysfs-hypervisor | 13 +++ drivers/misc/Kconfig | 6 ++ drivers/misc/Makefile | 1 + drivers/misc/vmgenid.c | 140 +++++++++++++++++++++++++++++ 4 files changed, 160 insertions(+) create mode 100644 Documentation/ABI/testing/sysfs-hypervisor create mode 100644 drivers/misc/vmgenid.c diff --git a/Documentation/ABI/testing/sysfs-hypervisor b/Documentation/ABI/testing/sysfs-hypervisor new file mode 100644 index 000000000000..2f9a7b8eab70 --- /dev/null +++ b/Documentation/ABI/testing/sysfs-hypervisor @@ -0,0 +1,13 @@ +What: /sys/hypervisor/vm_gen_counter +Date: February 2018 +Contact: Or Idgar + Gal Hammer +Description: Expose the virtual machine generation ID. The directory + contains two files: "generation_id" and "raw". Both files + represent the same information. + + "generation_id" file is a UUID string + representation. + + "raw" file is a 128-bit integer + representation (binary). diff --git a/drivers/misc/Kconfig b/drivers/misc/Kconfig index 03605f8fc0dc..5a74802bdfb4 100644 --- a/drivers/misc/Kconfig +++ b/drivers/misc/Kconfig @@ -500,6 +500,12 @@ config MISC_RTSX tristate default MISC_RTSX_PCI || MISC_RTSX_USB +config VMGENID + tristate "Virtual Machine Generation ID driver" + help + This is a Virtual Machine Generation ID driver which provides + a virtual machine unique identifier. + source "drivers/misc/c2port/Kconfig" source "drivers/misc/eeprom/Kconfig" source "drivers/misc/cb710/Kconfig" diff --git a/drivers/misc/Makefile b/drivers/misc/Makefile index c3c8624f4d95..067aa666bb6a 100644 --- a/drivers/misc/Makefile +++ b/drivers/misc/Makefile @@ -57,6 +57,7 @@ obj-$(CONFIG_ASPEED_LPC_SNOOP) += aspeed-lpc-snoop.o obj-$(CONFIG_PCI_ENDPOINT_TEST) += pci_endpoint_test.o obj-$(CONFIG_OCXL) += ocxl/ obj-$(CONFIG_MISC_RTSX) += cardreader/ +obj-$(CONFIG_VMGENID) += vmgenid.o lkdtm-$(CONFIG_LKDTM) += lkdtm_core.o lkdtm-$(CONFIG_LKDTM) += lkdtm_bugs.o diff --git a/drivers/misc/vmgenid.c b/drivers/misc/vmgenid.c new file mode 100644 index 000000000000..6b7ec9bd45e8 --- /dev/null +++ b/drivers/misc/vmgenid.c @@ -0,0 +1,140 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Virtual Machine Generation ID driver + * + * Copyright (C) 2018 Red Hat, Inc. All rights reserved. + * Authors: + * Or Idgar + * Gal Hammer + * + */ +#include +#include +#include +#include +#include +#include + +MODULE_LICENSE("GPL"); +MODULE_AUTHOR("Or Idgar "); +MODULE_AUTHOR("Gal Hammer "); +MODULE_DESCRIPTION("Virtual Machine Generation ID"); +MODULE_VERSION("0.1"); + +ACPI_MODULE_NAME("vmgenid"); + +static u64 phy_addr; + +static ssize_t generation_id_show(struct device *_d, + struct device_attribute *attr, char *buf) +{ + uuid_t *uuidp; + ssize_t result; + + uuidp = acpi_os_map_memory(phy_addr, sizeof(uuid_t)); + if (!uuidp) + return -EFAULT; + + result = sprintf(buf, "%pUl\n", uuidp); + acpi_os_unmap_memory(uuidp, sizeof(uuid_t)); + return result; +} +static DEVICE_ATTR_RO(generation_id); + +static ssize_t raw_show(struct device *_d, + struct device_attribute *attr, + char *buf) +{ + uuid_t *uuidp; + + uuidp = acpi_os_map_memory(phy_addr, sizeof(uuid_t)); + if (!uuidp) + return -EFAULT; + memcpy(buf, uuidp, sizeof(uuid_t)); + acpi_os_unmap_memory(uuidp, sizeof(uuid_t)); + return sizeof(uuid_t); +} +static DEVICE_ATTR_RO(raw); + +static struct attribute *vmgenid_attrs[] = { + &dev_attr_generation_id.attr, + &dev_attr_raw.attr, + NULL, +}; +static const struct attribute_group vmgenid_group = { + .name = "vm_gen_counter", + .attrs = vmgenid_attrs, +}; + +static int get_vmgenid(acpi_handle handle) +{ + int i; + struct acpi_buffer buffer = { ACPI_ALLOCATE_BUFFER, NULL }; + acpi_status status; + union acpi_object *pss; + union acpi_object *element; + + status = acpi_evaluate_object(handle, "ADDR", NULL, &buffer); + if (ACPI_FAILURE(status)) { + ACPI_EXCEPTION((AE_INFO, status, "Evaluating _ADDR")); + return -ENODEV; + } + pss = buffer.pointer; + if (!pss || pss->type != ACPI_TYPE_PACKAGE || pss->package.count != 2) + return -EFAULT; + + phy_addr = 0; + for (i = 0; i < pss->package.count; i++) { + element = &(pss->package.elements[i]); + if (element->type != ACPI_TYPE_INTEGER) + return -EFAULT; + phy_addr |= element->integer.value << i*32; + } + return 0; +} + +static int acpi_vmgenid_add(struct acpi_device *device) +{ + int retval; + + if (!device) + return -EINVAL; + retval = get_vmgenid(device->handle); + if (retval < 0) + return retval; + return sysfs_create_group(hypervisor_kobj, &vmgenid_group); +} + +static int acpi_vmgenid_remove(struct acpi_device *device) +{ + sysfs_remove_group(hypervisor_kobj, &vmgenid_group); + return 0; +} + +static const struct acpi_device_id vmgenid_ids[] = { + {"QEMUVGID", 0}, + {"", 0}, +}; + +static struct acpi_driver acpi_vmgenid_driver = { + .name = "vm_gen_counter", + .ids = vmgenid_ids, + .owner = THIS_MODULE, + .ops = { + .add = acpi_vmgenid_add, + .remove = acpi_vmgenid_remove, + } +}; + +static int __init vmgenid_init(void) +{ + return acpi_bus_register_driver(&acpi_vmgenid_driver); +} + +static void __exit vmgenid_exit(void) +{ + acpi_bus_unregister_driver(&acpi_vmgenid_driver); +} + +module_init(vmgenid_init); +module_exit(vmgenid_exit); -- 2.14.3