Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1523307pxb; Wed, 4 Nov 2020 11:12:52 -0800 (PST) X-Google-Smtp-Source: ABdhPJzukgg9jgDxXrGkLODgWy0L522zJRy4Q8gyeJKlgSbp57wuZfKKPZpXHx/PvoMeoRfqMwIs X-Received: by 2002:a17:906:c288:: with SMTP id r8mr13794432ejz.35.1604517172320; Wed, 04 Nov 2020 11:12:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604517172; cv=none; d=google.com; s=arc-20160816; b=cslXH3jsckaY6wOtc78OBMZg6GKtHSMQiogBJCR+CwAbueU7KzaUuvPpBN3ILYX9Yd anCq5sDICc20b/WCKsWVPnT6cPwbwzefNDga1SYJeoAXYL4UM+rNGN0NUFMNoqqcdnW+ zZFJuq8/Ik4DKaIbnKB5j5DqTegmNE+lxnXH2zxJFsJTvm/02PIf97AQ4VV2/q93UhKi Kky8QyoY/9Q4LEmu9PSQPERZDouuOoIJqzNBEpkMymzWrGcn0LprO/A7xKaK1x3vfy9i GuHzglf7m4PI+nhBYV+5y2uukc9SYgCw9lnE0XBSpAK+6uM9qp3c3zivJhYiQZyEga9n djyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=9bnsPOxn9yGq928zTuAG9ePIv/5JkrABhmxyp7kCDgs=; b=MlSwcKeFbCkkQMj/Po8UXZYcK+d5y8NzzsmpHZxLhggaDHdy5LKkRdhNgJGkCvWcdV 4EuZnhcylU54w9FV5X4sZBbMxH0l/7f+EHmy/HVTfF3apaNCc3sqDKL7nUXzFTAUtsQH FdZhEMpHpOF4BgmhQDwqCoygBwDCJGlkY+uFbKASOGFDkfwxTeezm7QiyyaK0nAPJEAl Ioq3gj8ixwiFRgnzJnv1YxUK4+1kfCjvI52s3mguP+Dj8KAX5gxfl9yqCUm4L3G+DuOs J/NNAc7Daq+36aDdJr1MHFmnkyOIUaZWhbL303dJErHkTSaWg8Pw+83oCwgOc3tZHJ2m wIwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=l6wxGTW9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x64si1877663edc.367.2020.11.04.11.12.29; Wed, 04 Nov 2020 11:12:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=l6wxGTW9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732400AbgKDSgk (ORCPT + 99 others); Wed, 4 Nov 2020 13:36:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56406 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726225AbgKDSgk (ORCPT ); Wed, 4 Nov 2020 13:36:40 -0500 Received: from mail-wm1-x343.google.com (mail-wm1-x343.google.com [IPv6:2a00:1450:4864:20::343]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6BCCAC0613D3 for ; Wed, 4 Nov 2020 10:36:38 -0800 (PST) Received: by mail-wm1-x343.google.com with SMTP id h2so727924wmm.0 for ; Wed, 04 Nov 2020 10:36:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=9bnsPOxn9yGq928zTuAG9ePIv/5JkrABhmxyp7kCDgs=; b=l6wxGTW9/LgEK7XEkr5CmOoS+dYbC2prLnazJg1dUjb83k2tfBbIuo1MO4xfZuYuq2 sdCXNTy3SkxO9ZDbZMd3NOEHJs6ugqJAtzosfyql8vY74UHap4MybGlDLWijiRZXgNL2 ukXB3rZMzB4hfoEZDlt1s11vC2vnIaVIKJNFHYOoH9vUcjoIXfy1vRSHptzTvVN+B5SZ 4nCASvL0GV20ahufoXLFL+HdwJO1PLsbLwPV0JNLmWxWUMdIIbkL9NGUdfqAk9XstiEY 3sEQ4PgP50Nx7Z3YaYwq+KXRrQaOS0rD6uHN3wn+AKch4N4pP8rsBwWw8K+ZWGmb4isW YE1A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=9bnsPOxn9yGq928zTuAG9ePIv/5JkrABhmxyp7kCDgs=; b=RcRfz+g1/iZDHkRNdKpS6uHzl6tn5DVlOeQnm13XTaTVnXmgkKbuX8sfZNOE+snx8n Z0iXVY2ube+fCoy1Bs+dthXY3LLVsRHp0hOFoGrUmKG1ovPxYgUntLWlfk3MqQRTZ1Wr eMZ+fYE3mXfzPwJO+HbkFAbIdKBaapOKUcaMtC2ZzC8D5kslTHXKq3781ORPiR35TB61 SnVK59Xg/J/lM76c7Dox6n8IMQT0mZVRWx5b9FqXLZF75BXPn25srAeIYZ9jftTKrKCY wtTfa6ChytUc9oPA/gVQDfpq8Wm9OpWumeoPjMyluG8HkuwvLm/ihb/57YDulMLxop2B UUzg== X-Gm-Message-State: AOAM530sURAxnn/B0HGZ5/5yK8K3j2Fo52x/p85oq5fdS9OpIz2owuge xHUcHzheYmsIcOJVa9NAgNz7RAEUDqUbGHgg X-Received: by 2002:a1c:18b:: with SMTP id 133mr1119334wmb.157.1604514996877; Wed, 04 Nov 2020 10:36:36 -0800 (PST) Received: from localhost ([2a01:4b00:8523:2d03:c8d2:30f2:53c6:bc2]) by smtp.gmail.com with ESMTPSA id d8sm3267985wmb.11.2020.11.04.10.36.35 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 04 Nov 2020 10:36:35 -0800 (PST) From: David Brazdil To: kvmarm@lists.cs.columbia.edu Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Marc Zyngier , James Morse , Julien Thierry , Suzuki K Poulose , Catalin Marinas , Will Deacon , Dennis Zhou , Tejun Heo , Christoph Lameter , Mark Rutland , Lorenzo Pieralisi , Quentin Perret , Andrew Scull , kernel-team@android.com, David Brazdil Subject: [RFC PATCH 00/26] kvm: arm64: Always-on nVHE hypervisor Date: Wed, 4 Nov 2020 18:36:04 +0000 Message-Id: <20201104183630.27513-1-dbrazdil@google.com> X-Mailer: git-send-email 2.29.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As we progress towards being able to keep guest state private to the host running nVHE hypervisor, this series allows the hypervisor to install itself on newly booted CPUs before the host is allowed to run on them. To this end, the hypervisor starts trapping host SMCs and intercepting host's PSCI CPU_ON/OFF/SUSPEND calls. It replaces the host's entry point with its own, initializes the EL2 state of the new CPU and installs the nVHE hyp vector before ERETing to the host's entry point. Other PSCI SMCs are forwarded to EL3, though only the known set of SMCs implemented in the kernel is allowed. Non-PSCI SMCs are also forwarded to EL3. Future changes will need to ensure the safety of all SMCs wrt. private guests. The host is still allowed to reset EL2 back to the stub vector, eg. for hibernation or kexec, but will not disable nVHE when there are no VMs. Tested on Rock Pi 4b. Sending this as an RFC to get feedback on the following decisions: 1) The kernel checks new cores' features against the finalized system capabilities. To avoid the need to move this code/data to EL2, the implementation only allows to boot cores that were online at the time of KVM initialization. 2) Trapping and forwarding SMCs cannot be switched off. This could cause issues eg. if EL3 always returned to EL1. A kernel command line flag may be needed to turn the feature off on such platforms. -David David Brazdil (25): psci: Export configured PSCI version psci: Export configured PSCI function IDs psci: Export psci_cpu_suspend_feature arm64: Move MAIR_EL1_SET to asm/memory.h kvm: arm64: Initialize MAIR_EL2 using a constant kvm: arm64: Add .hyp.data ELF section kvm: arm64: Support per_cpu_ptr in nVHE hyp code kvm: arm64: Create nVHE copy of cpu_logical_map kvm: arm64: Move hyp-init params to a per-CPU struct kvm: arm64: Refactor handle_trap to use a switch kvm: arm64: Extract parts of el2_setup into a macro kvm: arm64: Add SMC handler in nVHE EL2 kvm: arm64: Bootstrap PSCI SMC handler in nVHE EL2 kvm: arm64: Forward safe PSCI SMCs coming from host kvm: arm64: Add offset for hyp VA <-> PA conversion kvm: arm64: Bootstrap PSCI power state of host CPUs kvm: arm64: Intercept PSCI_CPU_OFF host SMC calls kvm: arm64: Extract __do_hyp_init into a helper function kvm: arm64: Add CPU entry point in nVHE hyp kvm: arm64: Add function to enter host from KVM nVHE hyp code kvm: arm64: Intercept PSCI_CPU_ON host SMC calls kvm: arm64: Intercept host's CPU_SUSPEND PSCI SMCs kvm: arm64: Keep nVHE EL2 vector installed kvm: arm64: Trap host SMCs kvm: arm64: Fix EL2 mode availability checks Will Deacon (1): arm64: kvm: Add standalone ticket spinlock implementation for use at hyp arch/arm64/include/asm/kvm_arm.h | 3 +- arch/arm64/include/asm/kvm_asm.h | 142 +++++++++ arch/arm64/include/asm/kvm_hyp.h | 10 + arch/arm64/include/asm/memory.h | 13 + arch/arm64/include/asm/percpu.h | 6 + arch/arm64/include/asm/sections.h | 1 + arch/arm64/include/asm/virt.h | 16 + arch/arm64/kernel/asm-offsets.c | 5 + arch/arm64/kernel/head.S | 140 +-------- arch/arm64/kernel/image-vars.h | 3 + arch/arm64/kernel/vmlinux.lds.S | 10 + arch/arm64/kvm/arm.c | 109 ++++++- arch/arm64/kvm/hyp/include/nvhe/spinlock.h | 96 ++++++ arch/arm64/kvm/hyp/nvhe/Makefile | 3 +- arch/arm64/kvm/hyp/nvhe/host.S | 9 + arch/arm64/kvm/hyp/nvhe/hyp-init.S | 82 ++++- arch/arm64/kvm/hyp/nvhe/hyp-main.c | 57 +++- arch/arm64/kvm/hyp/nvhe/hyp.lds.S | 3 + arch/arm64/kvm/hyp/nvhe/percpu.c | 38 +++ arch/arm64/kvm/hyp/nvhe/psci.c | 333 +++++++++++++++++++++ arch/arm64/mm/proc.S | 13 - drivers/firmware/psci/psci.c | 27 +- include/linux/psci.h | 20 ++ include/uapi/linux/psci.h | 8 + 24 files changed, 948 insertions(+), 199 deletions(-) create mode 100644 arch/arm64/kvm/hyp/include/nvhe/spinlock.h create mode 100644 arch/arm64/kvm/hyp/nvhe/percpu.c create mode 100644 arch/arm64/kvm/hyp/nvhe/psci.c -- 2.29.1.341.ge80a0c044ae-goog