Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1429810pxb; Wed, 10 Feb 2021 08:11:31 -0800 (PST) X-Google-Smtp-Source: ABdhPJywxX7FOiIhS8d/XLh83vUZKvY6O0Oz17q25RMEEUFtVq3BnceMsT/PGaDZggN8e9tRao0s X-Received: by 2002:a17:907:7670:: with SMTP id kk16mr3545185ejc.505.1612973491552; Wed, 10 Feb 2021 08:11:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612973491; cv=none; d=google.com; s=arc-20160816; b=tAabQclIas+E85OXQ7dWBEtedO0TjSC3hM07jtxk3iDw8wlaSwuNEOvJhqmXtYA3ku J/BMwwWCb/23sOvOozrYtnBvTtRcsG8JowPvdHG1ZEWLcsxZb2EwTketaANxJ9f6vWC3 cPnC5nv3Tt5jyFS0vVn8q7ALtqlk9Mp2JbPq6eMQL191lJfd3V95F10zM92Ya/3I1+1N 0N93SrPDCa3LI2Oc2gpiJt6ZxQ5uRA+SESllGnY5zBHz6L6qox1GHqFypKGqyZRiL5NT tjzH4450tzM4dW/oQ4It/kq2P4dyfOdlU/8mIZix85irTJE65rcV8ylRXhviM5DiAc7t y/aA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=3Q/FuCTRJgt2ew4RuzrC/DO7RCWEHWruzl3QKQ94gAA=; b=sw6OtrDJzCNasPzzXoeHQeh+oY5ehs7jRF2Bov8C/3aFexfx8mZtpHEq0JdsfWj0AB f40U4inF3xIHK7bOjQC4dCTsaESrnHerLR02c+Ilk44jBACI1FHD7vTvub7MP+HrQsHM IoW9ir4RreIhvoykAPuNI5Utpww+nMv0EbhVXMIGt0grJXBvHZoZILJUErK7SH/snZ6S 7eYfHfQC0m55dF56E1PEXW1zAMa3WA/nYCIjT6pTxH8zl3ah3OJtiiuUtBSB/P7Vy/IU dvUKWuUWZraDj0jvEKJHAb+o3tPgrbMVbu/1LAOCU+SaaStdqXCY0Fak8BTpMGx1hIuE s36w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q7si1512850edt.579.2021.02.10.08.11.04; Wed, 10 Feb 2021 08:11:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232152AbhBJQIS (ORCPT + 99 others); Wed, 10 Feb 2021 11:08:18 -0500 Received: from foss.arm.com ([217.140.110.172]:40020 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231431AbhBJQIP (ORCPT ); Wed, 10 Feb 2021 11:08:15 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3EB95113E; Wed, 10 Feb 2021 08:07:29 -0800 (PST) Received: from [192.168.1.179] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 3F48C3F73B; Wed, 10 Feb 2021 08:07:26 -0800 (PST) Subject: Re: [PATCH v18 1/7] arm/arm64: Probe for the presence of KVM hypervisor To: Marc Zyngier , netdev@vger.kernel.org, yangbo.lu@nxp.com, john.stultz@linaro.org, tglx@linutronix.de, pbonzini@redhat.com, seanjc@google.com, richardcochran@gmail.com, Mark.Rutland@arm.com, will@kernel.org, suzuki.poulose@arm.com, Andre.Przywara@arm.com, lorenzo.pieralisi@arm.com, sudeep.holla@arm.com Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, Steve.Capper@arm.com, justin.he@arm.com, jianyong.wu@arm.com, kernel-team@android.com References: <20210208134029.3269384-1-maz@kernel.org> <20210208134029.3269384-2-maz@kernel.org> From: Steven Price Message-ID: <7ac905c1-1039-eff6-7785-f2eef3d8e934@arm.com> Date: Wed, 10 Feb 2021 16:07:46 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20210208134029.3269384-2-maz@kernel.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/02/2021 13:40, Marc Zyngier wrote: > From: Will Deacon > > Although the SMCCC specification provides some limited functionality for > describing the presence of hypervisor and firmware services, this is > generally applicable only to functions designated as "Arm Architecture > Service Functions" and no portable discovery mechanism is provided for > standard hypervisor services, despite having a designated range of > function identifiers reserved by the specification. > > In an attempt to avoid the need for additional firmware changes every > time a new function is added, introduce a UID to identify the service > provider as being compatible with KVM. Once this has been established, > additional services can be discovered via a feature bitmap. > > Signed-off-by: Will Deacon > Signed-off-by: Jianyong Wu > [maz: move code to its own file, plug it into PSCI] > Signed-off-by: Marc Zyngier > Link: https://lore.kernel.org/r/20201209060932.212364-2-jianyong.wu@arm.com Looks good to me, FWIW: Reviewed-by: Steven Price > --- > arch/arm/include/asm/hypervisor.h | 3 ++ > arch/arm64/include/asm/hypervisor.h | 3 ++ > drivers/firmware/psci/psci.c | 2 ++ > drivers/firmware/smccc/Makefile | 2 +- > drivers/firmware/smccc/kvm_guest.c | 50 +++++++++++++++++++++++++++++ > drivers/firmware/smccc/smccc.c | 1 + > include/linux/arm-smccc.h | 25 +++++++++++++++ > 7 files changed, 85 insertions(+), 1 deletion(-) > create mode 100644 drivers/firmware/smccc/kvm_guest.c > > diff --git a/arch/arm/include/asm/hypervisor.h b/arch/arm/include/asm/hypervisor.h > index df8524365637..bd61502b9715 100644 > --- a/arch/arm/include/asm/hypervisor.h > +++ b/arch/arm/include/asm/hypervisor.h > @@ -4,4 +4,7 @@ > > #include > > +void kvm_init_hyp_services(void); > +bool kvm_arm_hyp_service_available(u32 func_id); > + > #endif > diff --git a/arch/arm64/include/asm/hypervisor.h b/arch/arm64/include/asm/hypervisor.h > index f9cc1d021791..0ae427f352c8 100644 > --- a/arch/arm64/include/asm/hypervisor.h > +++ b/arch/arm64/include/asm/hypervisor.h > @@ -4,4 +4,7 @@ > > #include > > +void kvm_init_hyp_services(void); > +bool kvm_arm_hyp_service_available(u32 func_id); > + > #endif > diff --git a/drivers/firmware/psci/psci.c b/drivers/firmware/psci/psci.c > index f5fc429cae3f..69e296f02902 100644 > --- a/drivers/firmware/psci/psci.c > +++ b/drivers/firmware/psci/psci.c > @@ -23,6 +23,7 @@ > > #include > #include > +#include > #include > #include > #include > @@ -498,6 +499,7 @@ static int __init psci_probe(void) > psci_init_cpu_suspend(); > psci_init_system_suspend(); > psci_init_system_reset2(); > + kvm_init_hyp_services(); > } > > return 0; > diff --git a/drivers/firmware/smccc/Makefile b/drivers/firmware/smccc/Makefile > index 72ab84042832..40d19144a860 100644 > --- a/drivers/firmware/smccc/Makefile > +++ b/drivers/firmware/smccc/Makefile > @@ -1,4 +1,4 @@ > # SPDX-License-Identifier: GPL-2.0 > # > -obj-$(CONFIG_HAVE_ARM_SMCCC_DISCOVERY) += smccc.o > +obj-$(CONFIG_HAVE_ARM_SMCCC_DISCOVERY) += smccc.o kvm_guest.o > obj-$(CONFIG_ARM_SMCCC_SOC_ID) += soc_id.o > diff --git a/drivers/firmware/smccc/kvm_guest.c b/drivers/firmware/smccc/kvm_guest.c > new file mode 100644 > index 000000000000..08836f2f39ee > --- /dev/null > +++ b/drivers/firmware/smccc/kvm_guest.c > @@ -0,0 +1,50 @@ > +// SPDX-License-Identifier: GPL-2.0 > + > +#define pr_fmt(fmt) "smccc: KVM: " fmt > + > +#include > +#include > +#include > +#include > + > +#include > + > +static DECLARE_BITMAP(__kvm_arm_hyp_services, ARM_SMCCC_KVM_NUM_FUNCS) __ro_after_init = { }; > + > +void __init kvm_init_hyp_services(void) > +{ > + struct arm_smccc_res res; > + u32 val[4]; > + > + if (arm_smccc_1_1_get_conduit() != SMCCC_CONDUIT_HVC) > + return; > + > + arm_smccc_1_1_invoke(ARM_SMCCC_VENDOR_HYP_CALL_UID_FUNC_ID, &res); > + if (res.a0 != ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_0 || > + res.a1 != ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_1 || > + res.a2 != ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_2 || > + res.a3 != ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_3) > + return; > + > + memset(&res, 0, sizeof(res)); > + arm_smccc_1_1_invoke(ARM_SMCCC_VENDOR_HYP_KVM_FEATURES_FUNC_ID, &res); > + > + val[0] = lower_32_bits(res.a0); > + val[1] = lower_32_bits(res.a1); > + val[2] = lower_32_bits(res.a2); > + val[3] = lower_32_bits(res.a3); > + > + bitmap_from_arr32(__kvm_arm_hyp_services, val, ARM_SMCCC_KVM_NUM_FUNCS); > + > + pr_info("hypervisor services detected (0x%08lx 0x%08lx 0x%08lx 0x%08lx)\n", > + res.a3, res.a2, res.a1, res.a0); > +} > + > +bool kvm_arm_hyp_service_available(u32 func_id) > +{ > + if (func_id >= ARM_SMCCC_KVM_NUM_FUNCS) > + return -EINVAL; > + > + return test_bit(func_id, __kvm_arm_hyp_services); > +} > +EXPORT_SYMBOL_GPL(kvm_arm_hyp_service_available); > diff --git a/drivers/firmware/smccc/smccc.c b/drivers/firmware/smccc/smccc.c > index 00c88b809c0c..94eca6ffda05 100644 > --- a/drivers/firmware/smccc/smccc.c > +++ b/drivers/firmware/smccc/smccc.c > @@ -7,6 +7,7 @@ > > #include > #include > +#include > > static u32 smccc_version = ARM_SMCCC_VERSION_1_0; > static enum arm_smccc_conduit smccc_conduit = SMCCC_CONDUIT_NONE; > diff --git a/include/linux/arm-smccc.h b/include/linux/arm-smccc.h > index f860645f6512..74e90b65b489 100644 > --- a/include/linux/arm-smccc.h > +++ b/include/linux/arm-smccc.h > @@ -55,6 +55,8 @@ > #define ARM_SMCCC_OWNER_TRUSTED_OS 50 > #define ARM_SMCCC_OWNER_TRUSTED_OS_END 63 > > +#define ARM_SMCCC_FUNC_QUERY_CALL_UID 0xff01 > + > #define ARM_SMCCC_QUIRK_NONE 0 > #define ARM_SMCCC_QUIRK_QCOM_A6 1 /* Save/restore register a6 */ > > @@ -87,6 +89,29 @@ > ARM_SMCCC_SMC_32, \ > 0, 0x7fff) > > +#define ARM_SMCCC_VENDOR_HYP_CALL_UID_FUNC_ID \ > + ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, \ > + ARM_SMCCC_SMC_32, \ > + ARM_SMCCC_OWNER_VENDOR_HYP, \ > + ARM_SMCCC_FUNC_QUERY_CALL_UID) > + > +/* KVM UID value: 28b46fb6-2ec5-11e9-a9ca-4b564d003a74 */ > +#define ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_0 0xb66fb428U > +#define ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_1 0xe911c52eU > +#define ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_2 0x564bcaa9U > +#define ARM_SMCCC_VENDOR_HYP_UID_KVM_REG_3 0x743a004dU > + > +/* KVM "vendor specific" services */ > +#define ARM_SMCCC_KVM_FUNC_FEATURES 0 > +#define ARM_SMCCC_KVM_FUNC_FEATURES_2 127 > +#define ARM_SMCCC_KVM_NUM_FUNCS 128 > + > +#define ARM_SMCCC_VENDOR_HYP_KVM_FEATURES_FUNC_ID \ > + ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, \ > + ARM_SMCCC_SMC_32, \ > + ARM_SMCCC_OWNER_VENDOR_HYP, \ > + ARM_SMCCC_KVM_FUNC_FEATURES) > + > #define SMCCC_ARCH_WORKAROUND_RET_UNAFFECTED 1 > > /* Paravirtualised time calls (defined by ARM DEN0057A) */ >