Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1792601pxb; Fri, 5 Feb 2021 01:17:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJyaHJVKYQX+ZoVKcGRYsB2y8bhM4qWx3pMi2AvZ4C5IfFr8e9AS6/DkD555CmgnljJphi4e X-Received: by 2002:a05:6402:438d:: with SMTP id o13mr2597073edc.135.1612516663014; Fri, 05 Feb 2021 01:17:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612516663; cv=none; d=google.com; s=arc-20160816; b=MUUEz935nOdh1r/ud1vXBaZ53Cb3xoBpMFyLeyX67+Coz8SDEb9XD44uuEhJFsHOk9 MnvHz+HD8qmdla/0Np8wc7yXA4E0cTAFm7je8xAlaBJiN6lpGcmNOj+GVXqIWxDxys7d J2wrFvJhL7icNz8ua8KuERgu04jzXJP0iPkp2ji21wT5yL9p2B3wo8YEZz6yBzrZqyLj DdwsL8792ckuIPKl3DSRXtugiMcrWRV1pGpPJZnJATdJGjDS9EmH1ekH76pmw2MRQkfk ikA9hUF49F4tn02cvGNPA/NCJmbnBn1c4l9rXkk6mMpr4Bx2TsHIB8CBGH9g+M3IHL77 +K1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=KlW3RkM+56s8fal9bmX5TOQcueMpVy2hC7oWX3ztCho=; b=q9OGmBtptFSvp8Gx1SS7C26AtytakxO9P17fseA5rwJZmWYOT6jyhsC0waX2UbJPtS 3/ObtqWKQu5KVCwc169ZEhhslfmsoEq3kEyMYE3feM9V14MZlqWfz80EhkCKVZWiQLlQ poryCbNDFtfUHqoVpAIi6EGbLeXE4mnjepWXE+mSgcjCHuxrxhNRumO688u4KXvSWYgb n0vfb7K51j/7WI+rU0JJaZ451XoQLIGumdcsnPRjLzKE9+4vnAH0BImXfSTdbezMTyYZ Wf9Mhe/tStwWQoE4NKuyksyK+S1sZUs8tHzyzoCO4BMmN+Bsf3qbIhGa+Lp37DB44UIh 8OnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v4si6218469edj.37.2021.02.05.01.17.18; Fri, 05 Feb 2021 01:17:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229703AbhBEJOP (ORCPT + 99 others); Fri, 5 Feb 2021 04:14:15 -0500 Received: from foss.arm.com ([217.140.110.172]:52918 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229534AbhBEJLj (ORCPT ); Fri, 5 Feb 2021 04:11:39 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8964731B; Fri, 5 Feb 2021 01:10:52 -0800 (PST) Received: from [192.168.1.179] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id CC14D3F73B; Fri, 5 Feb 2021 01:10:48 -0800 (PST) Subject: Re: [PATCH v17 1/7] arm/arm64: Probe for the presence of KVM hypervisor To: Marc Zyngier , netdev@vger.kernel.org, yangbo.lu@nxp.com, john.stultz@linaro.org, tglx@linutronix.de, pbonzini@redhat.com, seanjc@google.com, richardcochran@gmail.com, Mark.Rutland@arm.com, will@kernel.org, suzuki.poulose@arm.com, Andre.Przywara@arm.com Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, Steve.Capper@arm.com, justin.he@arm.com, jianyong.wu@arm.com, kernel-team@android.com References: <20210202141204.3134855-1-maz@kernel.org> <20210202141204.3134855-2-maz@kernel.org> From: Steven Price Message-ID: Date: Fri, 5 Feb 2021 09:11:00 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20210202141204.3134855-2-maz@kernel.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/02/2021 14:11, Marc Zyngier wrote: > From: Will Deacon > > Although the SMCCC specification provides some limited functionality for > describing the presence of hypervisor and firmware services, this is > generally applicable only to functions designated as "Arm Architecture > Service Functions" and no portable discovery mechanism is provided for > standard hypervisor services, despite having a designated range of > function identifiers reserved by the specification. > > In an attempt to avoid the need for additional firmware changes every > time a new function is added, introduce a UID to identify the service > provider as being compatible with KVM. Once this has been established, > additional services can be discovered via a feature bitmap. > > Signed-off-by: Will Deacon > Signed-off-by: Jianyong Wu > [maz: move code to its own file, plug it into PSCI] > Signed-off-by: Marc Zyngier > Link: https://lore.kernel.org/r/20201209060932.212364-2-jianyong.wu@arm.com > --- > arch/arm/include/asm/hypervisor.h | 3 ++ > arch/arm64/include/asm/hypervisor.h | 3 ++ > drivers/firmware/psci/psci.c | 2 ++ > drivers/firmware/smccc/Makefile | 2 +- > drivers/firmware/smccc/kvm_guest.c | 51 +++++++++++++++++++++++++++++ > drivers/firmware/smccc/smccc.c | 1 + > include/linux/arm-smccc.h | 25 ++++++++++++++ > 7 files changed, 86 insertions(+), 1 deletion(-) > create mode 100644 drivers/firmware/smccc/kvm_guest.c > > diff --git a/arch/arm/include/asm/hypervisor.h b/arch/arm/include/asm/hypervisor.h > index df8524365637..bd61502b9715 100644 > --- a/arch/arm/include/asm/hypervisor.h > +++ b/arch/arm/include/asm/hypervisor.h > @@ -4,4 +4,7 @@ > > #include > > +void kvm_init_hyp_services(void); > +bool kvm_arm_hyp_service_available(u32 func_id); > + > #endif > diff --git a/arch/arm64/include/asm/hypervisor.h b/arch/arm64/include/asm/hypervisor.h > index f9cc1d021791..0ae427f352c8 100644 > --- a/arch/arm64/include/asm/hypervisor.h > +++ b/arch/arm64/include/asm/hypervisor.h > @@ -4,4 +4,7 @@ > > #include > > +void kvm_init_hyp_services(void); > +bool kvm_arm_hyp_service_available(u32 func_id); > + > #endif > diff --git a/drivers/firmware/psci/psci.c b/drivers/firmware/psci/psci.c > index f5fc429cae3f..69e296f02902 100644 > --- a/drivers/firmware/psci/psci.c > +++ b/drivers/firmware/psci/psci.c > @@ -23,6 +23,7 @@ > > #include > #include > +#include > #include > #include > #include > @@ -498,6 +499,7 @@ static int __init psci_probe(void) > psci_init_cpu_suspend(); > psci_init_system_suspend(); > psci_init_system_reset2(); > + kvm_init_hyp_services(); > } > > return 0; > diff --git a/drivers/firmware/smccc/Makefile b/drivers/firmware/smccc/Makefile > index 72ab84042832..40d19144a860 100644 > --- a/drivers/firmware/smccc/Makefile > +++ b/drivers/firmware/smccc/Makefile > @@ -1,4 +1,4 @@ > # SPDX-License-Identifier: GPL-2.0 > # > -obj-$(CONFIG_HAVE_ARM_SMCCC_DISCOVERY) += smccc.o > +obj-$(CONFIG_HAVE_ARM_SMCCC_DISCOVERY) += smccc.o kvm_guest.o > obj-$(CONFIG_ARM_SMCCC_SOC_ID) += soc_id.o > diff --git a/drivers/firmware/smccc/kvm_guest.c b/drivers/firmware/smccc/kvm_guest.c > new file mode 100644 > index 000000000000..23ce1ded88b4 > --- /dev/null > +++ b/drivers/firmware/smccc/kvm_guest.c > @@ -0,0 +1,51 @@ > +// SPDX-License-Identifier: GPL-2.0 > + > +#define pr_fmt(fmt) "smccc: KVM: " fmt > + > +#include > +#include > +#include > +#include > + > +static DECLARE_BITMAP(__kvm_arm_hyp_services, ARM_SMCCC_KVM_NUM_FUNCS) __ro_after_init = { }; > + > +void __init kvm_init_hyp_services(void) > +{ > + int i; > + struct arm_smccc_res res; > + > + if (arm_smccc_1_1_get_conduit() != SMCCC_CONDUIT_HVC) > + return; > + > + arm_smccc_1_1_invoke(ARM_SMCCC_VENDOR_HYP_CALL_UID_FUNC_ID, &res); > + if (res.a0 != ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_0 || > + res.a1 != ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_1 || > + res.a2 != ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_2 || > + res.a3 != ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_3) > + return; > + > + memset(&res, 0, sizeof(res)); > + arm_smccc_1_1_invoke(ARM_SMCCC_VENDOR_HYP_KVM_FEATURES_FUNC_ID, &res); > + for (i = 0; i < 32; ++i) { > + if (res.a0 & (i)) > + set_bit(i + (32 * 0), __kvm_arm_hyp_services); > + if (res.a1 & (i)) > + set_bit(i + (32 * 1), __kvm_arm_hyp_services); > + if (res.a2 & (i)) > + set_bit(i + (32 * 2), __kvm_arm_hyp_services); > + if (res.a3 & (i)) > + set_bit(i + (32 * 3), __kvm_arm_hyp_services); The bit shifts are missing, the tests should be of the form: if (res.a0 & (1 << i)) Or indeed using a BIT() macro. Steve > + } > + > + pr_info("hypervisor services detected (0x%08lx 0x%08lx 0x%08lx 0x%08lx)\n", > + res.a3, res.a2, res.a1, res.a0); > +} > + > +bool kvm_arm_hyp_service_available(u32 func_id) > +{ > + if (func_id >= ARM_SMCCC_KVM_NUM_FUNCS) > + return -EINVAL; > + > + return test_bit(func_id, __kvm_arm_hyp_services); > +} > +EXPORT_SYMBOL_GPL(kvm_arm_hyp_service_available); > diff --git a/drivers/firmware/smccc/smccc.c b/drivers/firmware/smccc/smccc.c > index 00c88b809c0c..94eca6ffda05 100644 > --- a/drivers/firmware/smccc/smccc.c > +++ b/drivers/firmware/smccc/smccc.c > @@ -7,6 +7,7 @@ > > #include > #include > +#include > > static u32 smccc_version = ARM_SMCCC_VERSION_1_0; > static enum arm_smccc_conduit smccc_conduit = SMCCC_CONDUIT_NONE; > diff --git a/include/linux/arm-smccc.h b/include/linux/arm-smccc.h > index f860645f6512..74e90b65b489 100644 > --- a/include/linux/arm-smccc.h > +++ b/include/linux/arm-smccc.h > @@ -55,6 +55,8 @@ > #define ARM_SMCCC_OWNER_TRUSTED_OS 50 > #define ARM_SMCCC_OWNER_TRUSTED_OS_END 63 > > +#define ARM_SMCCC_FUNC_QUERY_CALL_UID 0xff01 > + > #define ARM_SMCCC_QUIRK_NONE 0 > #define ARM_SMCCC_QUIRK_QCOM_A6 1 /* Save/restore register a6 */ > > @@ -87,6 +89,29 @@ > ARM_SMCCC_SMC_32, \ > 0, 0x7fff) > > +#define ARM_SMCCC_VENDOR_HYP_CALL_UID_FUNC_ID \ > + ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, \ > + ARM_SMCCC_SMC_32, \ > + ARM_SMCCC_OWNER_VENDOR_HYP, \ > + ARM_SMCCC_FUNC_QUERY_CALL_UID) > + > +/* KVM UID value: 28b46fb6-2ec5-11e9-a9ca-4b564d003a74 */ > +#define ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_0 0xb66fb428U > +#define ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_1 0xe911c52eU > +#define ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_2 0x564bcaa9U > +#define ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_3 0x743a004dU > + > +/* KVM "vendor specific" services */ > +#define ARM_SMCCC_KVM_FUNC_FEATURES 0 > +#define ARM_SMCCC_KVM_FUNC_FEATURES_2 127 > +#define ARM_SMCCC_KVM_NUM_FUNCS 128 > + > +#define ARM_SMCCC_VENDOR_HYP_KVM_FEATURES_FUNC_ID \ > + ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, \ > + ARM_SMCCC_SMC_32, \ > + ARM_SMCCC_OWNER_VENDOR_HYP, \ > + ARM_SMCCC_KVM_FUNC_FEATURES) > + > #define SMCCC_ARCH_WORKAROUND_RET_UNAFFECTED 1 > > /* Paravirtualised time calls (defined by ARM DEN0057A) */ >