19ed24f4bSMarc Zyngier // SPDX-License-Identifier: GPL-2.0-only 29ed24f4bSMarc Zyngier /* 39ed24f4bSMarc Zyngier * Copyright (C) 2012 - ARM Ltd 49ed24f4bSMarc Zyngier * Author: Marc Zyngier <marc.zyngier@arm.com> 59ed24f4bSMarc Zyngier */ 69ed24f4bSMarc Zyngier 79ed24f4bSMarc Zyngier #include <linux/arm-smccc.h> 89ed24f4bSMarc Zyngier #include <linux/preempt.h> 99ed24f4bSMarc Zyngier #include <linux/kvm_host.h> 109ed24f4bSMarc Zyngier #include <linux/uaccess.h> 119ed24f4bSMarc Zyngier #include <linux/wait.h> 129ed24f4bSMarc Zyngier 139ed24f4bSMarc Zyngier #include <asm/cputype.h> 149ed24f4bSMarc Zyngier #include <asm/kvm_emulate.h> 159ed24f4bSMarc Zyngier 169ed24f4bSMarc Zyngier #include <kvm/arm_psci.h> 179ed24f4bSMarc Zyngier #include <kvm/arm_hypercalls.h> 189ed24f4bSMarc Zyngier 199ed24f4bSMarc Zyngier /* 209ed24f4bSMarc Zyngier * This is an implementation of the Power State Coordination Interface 219ed24f4bSMarc Zyngier * as described in ARM document number ARM DEN 0022A. 229ed24f4bSMarc Zyngier */ 239ed24f4bSMarc Zyngier 249ed24f4bSMarc Zyngier #define AFFINITY_MASK(level) ~((0x1UL << ((level) * MPIDR_LEVEL_BITS)) - 1) 259ed24f4bSMarc Zyngier 269ed24f4bSMarc Zyngier static unsigned long psci_affinity_mask(unsigned long affinity_level) 279ed24f4bSMarc Zyngier { 289ed24f4bSMarc Zyngier if (affinity_level <= 3) 299ed24f4bSMarc Zyngier return MPIDR_HWID_BITMASK & AFFINITY_MASK(affinity_level); 309ed24f4bSMarc Zyngier 319ed24f4bSMarc Zyngier return 0; 329ed24f4bSMarc Zyngier } 339ed24f4bSMarc Zyngier 349ed24f4bSMarc Zyngier static unsigned long kvm_psci_vcpu_suspend(struct kvm_vcpu *vcpu) 359ed24f4bSMarc Zyngier { 369ed24f4bSMarc Zyngier /* 379ed24f4bSMarc Zyngier * NOTE: For simplicity, we make VCPU suspend emulation to be 389ed24f4bSMarc Zyngier * same-as WFI (Wait-for-interrupt) emulation. 399ed24f4bSMarc Zyngier * 409ed24f4bSMarc Zyngier * This means for KVM the wakeup events are interrupts and 419ed24f4bSMarc Zyngier * this is consistent with intended use of StateID as described 429ed24f4bSMarc Zyngier * in section 5.4.1 of PSCI v0.2 specification (ARM DEN 0022A). 439ed24f4bSMarc Zyngier * 449ed24f4bSMarc Zyngier * Further, we also treat power-down request to be same as 459ed24f4bSMarc Zyngier * stand-by request as-per section 5.4.2 clause 3 of PSCI v0.2 469ed24f4bSMarc Zyngier * specification (ARM DEN 0022A). This means all suspend states 479ed24f4bSMarc Zyngier * for KVM will preserve the register state. 489ed24f4bSMarc Zyngier */ 4991b99ea7SSean Christopherson kvm_vcpu_halt(vcpu); 509ed24f4bSMarc Zyngier kvm_clear_request(KVM_REQ_UNHALT, vcpu); 519ed24f4bSMarc Zyngier 529ed24f4bSMarc Zyngier return PSCI_RET_SUCCESS; 539ed24f4bSMarc Zyngier } 549ed24f4bSMarc Zyngier 559ed24f4bSMarc Zyngier static void kvm_psci_vcpu_off(struct kvm_vcpu *vcpu) 569ed24f4bSMarc Zyngier { 579ed24f4bSMarc Zyngier vcpu->arch.power_off = true; 589ed24f4bSMarc Zyngier kvm_make_request(KVM_REQ_SLEEP, vcpu); 599ed24f4bSMarc Zyngier kvm_vcpu_kick(vcpu); 609ed24f4bSMarc Zyngier } 619ed24f4bSMarc Zyngier 62e10ecb4dSOliver Upton static inline bool kvm_psci_valid_affinity(struct kvm_vcpu *vcpu, 63e10ecb4dSOliver Upton unsigned long affinity) 64e10ecb4dSOliver Upton { 65e10ecb4dSOliver Upton return !(affinity & ~MPIDR_HWID_BITMASK); 66e10ecb4dSOliver Upton } 67e10ecb4dSOliver Upton 689ed24f4bSMarc Zyngier static unsigned long kvm_psci_vcpu_on(struct kvm_vcpu *source_vcpu) 699ed24f4bSMarc Zyngier { 709ed24f4bSMarc Zyngier struct vcpu_reset_state *reset_state; 719ed24f4bSMarc Zyngier struct kvm *kvm = source_vcpu->kvm; 729ed24f4bSMarc Zyngier struct kvm_vcpu *vcpu = NULL; 739ed24f4bSMarc Zyngier unsigned long cpu_id; 749ed24f4bSMarc Zyngier 75e10ecb4dSOliver Upton cpu_id = smccc_get_arg1(source_vcpu); 76e10ecb4dSOliver Upton if (!kvm_psci_valid_affinity(source_vcpu, cpu_id)) 77e10ecb4dSOliver Upton return PSCI_RET_INVALID_PARAMS; 789ed24f4bSMarc Zyngier 799ed24f4bSMarc Zyngier vcpu = kvm_mpidr_to_vcpu(kvm, cpu_id); 809ed24f4bSMarc Zyngier 819ed24f4bSMarc Zyngier /* 829ed24f4bSMarc Zyngier * Make sure the caller requested a valid CPU and that the CPU is 839ed24f4bSMarc Zyngier * turned off. 849ed24f4bSMarc Zyngier */ 859ed24f4bSMarc Zyngier if (!vcpu) 869ed24f4bSMarc Zyngier return PSCI_RET_INVALID_PARAMS; 879ed24f4bSMarc Zyngier if (!vcpu->arch.power_off) { 889ed24f4bSMarc Zyngier if (kvm_psci_version(source_vcpu, kvm) != KVM_ARM_PSCI_0_1) 899ed24f4bSMarc Zyngier return PSCI_RET_ALREADY_ON; 909ed24f4bSMarc Zyngier else 919ed24f4bSMarc Zyngier return PSCI_RET_INVALID_PARAMS; 929ed24f4bSMarc Zyngier } 939ed24f4bSMarc Zyngier 949ed24f4bSMarc Zyngier reset_state = &vcpu->arch.reset_state; 959ed24f4bSMarc Zyngier 969ed24f4bSMarc Zyngier reset_state->pc = smccc_get_arg2(source_vcpu); 979ed24f4bSMarc Zyngier 989ed24f4bSMarc Zyngier /* Propagate caller endianness */ 999ed24f4bSMarc Zyngier reset_state->be = kvm_vcpu_is_be(source_vcpu); 1009ed24f4bSMarc Zyngier 1019ed24f4bSMarc Zyngier /* 1029ed24f4bSMarc Zyngier * NOTE: We always update r0 (or x0) because for PSCI v0.1 103656012c7SFuad Tabba * the general purpose registers are undefined upon CPU_ON. 1049ed24f4bSMarc Zyngier */ 1059ed24f4bSMarc Zyngier reset_state->r0 = smccc_get_arg3(source_vcpu); 1069ed24f4bSMarc Zyngier 1079ed24f4bSMarc Zyngier WRITE_ONCE(reset_state->reset, true); 1089ed24f4bSMarc Zyngier kvm_make_request(KVM_REQ_VCPU_RESET, vcpu); 1099ed24f4bSMarc Zyngier 1109ed24f4bSMarc Zyngier /* 1119ed24f4bSMarc Zyngier * Make sure the reset request is observed if the change to 112dda0190dSFuad Tabba * power_off is observed. 1139ed24f4bSMarc Zyngier */ 1149ed24f4bSMarc Zyngier smp_wmb(); 1159ed24f4bSMarc Zyngier 1169ed24f4bSMarc Zyngier vcpu->arch.power_off = false; 1179ed24f4bSMarc Zyngier kvm_vcpu_wake_up(vcpu); 1189ed24f4bSMarc Zyngier 1199ed24f4bSMarc Zyngier return PSCI_RET_SUCCESS; 1209ed24f4bSMarc Zyngier } 1219ed24f4bSMarc Zyngier 1229ed24f4bSMarc Zyngier static unsigned long kvm_psci_vcpu_affinity_info(struct kvm_vcpu *vcpu) 1239ed24f4bSMarc Zyngier { 12446808a4cSMarc Zyngier int matching_cpus = 0; 12546808a4cSMarc Zyngier unsigned long i, mpidr; 1269ed24f4bSMarc Zyngier unsigned long target_affinity; 1279ed24f4bSMarc Zyngier unsigned long target_affinity_mask; 1289ed24f4bSMarc Zyngier unsigned long lowest_affinity_level; 1299ed24f4bSMarc Zyngier struct kvm *kvm = vcpu->kvm; 1309ed24f4bSMarc Zyngier struct kvm_vcpu *tmp; 1319ed24f4bSMarc Zyngier 1329ed24f4bSMarc Zyngier target_affinity = smccc_get_arg1(vcpu); 1339ed24f4bSMarc Zyngier lowest_affinity_level = smccc_get_arg2(vcpu); 1349ed24f4bSMarc Zyngier 135e10ecb4dSOliver Upton if (!kvm_psci_valid_affinity(vcpu, target_affinity)) 136e10ecb4dSOliver Upton return PSCI_RET_INVALID_PARAMS; 137e10ecb4dSOliver Upton 1389ed24f4bSMarc Zyngier /* Determine target affinity mask */ 1399ed24f4bSMarc Zyngier target_affinity_mask = psci_affinity_mask(lowest_affinity_level); 1409ed24f4bSMarc Zyngier if (!target_affinity_mask) 1419ed24f4bSMarc Zyngier return PSCI_RET_INVALID_PARAMS; 1429ed24f4bSMarc Zyngier 1439ed24f4bSMarc Zyngier /* Ignore other bits of target affinity */ 1449ed24f4bSMarc Zyngier target_affinity &= target_affinity_mask; 1459ed24f4bSMarc Zyngier 1469ed24f4bSMarc Zyngier /* 1479ed24f4bSMarc Zyngier * If one or more VCPU matching target affinity are running 1489ed24f4bSMarc Zyngier * then ON else OFF 1499ed24f4bSMarc Zyngier */ 1509ed24f4bSMarc Zyngier kvm_for_each_vcpu(i, tmp, kvm) { 1519ed24f4bSMarc Zyngier mpidr = kvm_vcpu_get_mpidr_aff(tmp); 1529ed24f4bSMarc Zyngier if ((mpidr & target_affinity_mask) == target_affinity) { 1539ed24f4bSMarc Zyngier matching_cpus++; 1549ed24f4bSMarc Zyngier if (!tmp->arch.power_off) 1559ed24f4bSMarc Zyngier return PSCI_0_2_AFFINITY_LEVEL_ON; 1569ed24f4bSMarc Zyngier } 1579ed24f4bSMarc Zyngier } 1589ed24f4bSMarc Zyngier 1599ed24f4bSMarc Zyngier if (!matching_cpus) 1609ed24f4bSMarc Zyngier return PSCI_RET_INVALID_PARAMS; 1619ed24f4bSMarc Zyngier 1629ed24f4bSMarc Zyngier return PSCI_0_2_AFFINITY_LEVEL_OFF; 1639ed24f4bSMarc Zyngier } 1649ed24f4bSMarc Zyngier 16534739fd9SWill Deacon static void kvm_prepare_system_event(struct kvm_vcpu *vcpu, u32 type, u64 flags) 1669ed24f4bSMarc Zyngier { 16746808a4cSMarc Zyngier unsigned long i; 1689ed24f4bSMarc Zyngier struct kvm_vcpu *tmp; 1699ed24f4bSMarc Zyngier 1709ed24f4bSMarc Zyngier /* 1719ed24f4bSMarc Zyngier * The KVM ABI specifies that a system event exit may call KVM_RUN 1729ed24f4bSMarc Zyngier * again and may perform shutdown/reboot at a later time that when the 1739ed24f4bSMarc Zyngier * actual request is made. Since we are implementing PSCI and a 1749ed24f4bSMarc Zyngier * caller of PSCI reboot and shutdown expects that the system shuts 1759ed24f4bSMarc Zyngier * down or reboots immediately, let's make sure that VCPUs are not run 1769ed24f4bSMarc Zyngier * after this call is handled and before the VCPUs have been 1779ed24f4bSMarc Zyngier * re-initialized. 1789ed24f4bSMarc Zyngier */ 1799ed24f4bSMarc Zyngier kvm_for_each_vcpu(i, tmp, vcpu->kvm) 1809ed24f4bSMarc Zyngier tmp->arch.power_off = true; 1819ed24f4bSMarc Zyngier kvm_make_all_cpus_request(vcpu->kvm, KVM_REQ_SLEEP); 1829ed24f4bSMarc Zyngier 1839ed24f4bSMarc Zyngier memset(&vcpu->run->system_event, 0, sizeof(vcpu->run->system_event)); 1849ed24f4bSMarc Zyngier vcpu->run->system_event.type = type; 18534739fd9SWill Deacon vcpu->run->system_event.flags = flags; 1869ed24f4bSMarc Zyngier vcpu->run->exit_reason = KVM_EXIT_SYSTEM_EVENT; 1879ed24f4bSMarc Zyngier } 1889ed24f4bSMarc Zyngier 1899ed24f4bSMarc Zyngier static void kvm_psci_system_off(struct kvm_vcpu *vcpu) 1909ed24f4bSMarc Zyngier { 19134739fd9SWill Deacon kvm_prepare_system_event(vcpu, KVM_SYSTEM_EVENT_SHUTDOWN, 0); 1929ed24f4bSMarc Zyngier } 1939ed24f4bSMarc Zyngier 1949ed24f4bSMarc Zyngier static void kvm_psci_system_reset(struct kvm_vcpu *vcpu) 1959ed24f4bSMarc Zyngier { 19634739fd9SWill Deacon kvm_prepare_system_event(vcpu, KVM_SYSTEM_EVENT_RESET, 0); 19734739fd9SWill Deacon } 19834739fd9SWill Deacon 19934739fd9SWill Deacon static void kvm_psci_system_reset2(struct kvm_vcpu *vcpu) 20034739fd9SWill Deacon { 20134739fd9SWill Deacon kvm_prepare_system_event(vcpu, KVM_SYSTEM_EVENT_RESET, 20234739fd9SWill Deacon KVM_SYSTEM_EVENT_RESET_FLAG_PSCI_RESET2); 2039ed24f4bSMarc Zyngier } 2049ed24f4bSMarc Zyngier 2059ed24f4bSMarc Zyngier static void kvm_psci_narrow_to_32bit(struct kvm_vcpu *vcpu) 2069ed24f4bSMarc Zyngier { 2079ed24f4bSMarc Zyngier int i; 2089ed24f4bSMarc Zyngier 2099ed24f4bSMarc Zyngier /* 2109ed24f4bSMarc Zyngier * Zero the input registers' upper 32 bits. They will be fully 2119ed24f4bSMarc Zyngier * zeroed on exit, so we're fine changing them in place. 2129ed24f4bSMarc Zyngier */ 2139ed24f4bSMarc Zyngier for (i = 1; i < 4; i++) 2149ed24f4bSMarc Zyngier vcpu_set_reg(vcpu, i, lower_32_bits(vcpu_get_reg(vcpu, i))); 2159ed24f4bSMarc Zyngier } 2169ed24f4bSMarc Zyngier 2179ed24f4bSMarc Zyngier static unsigned long kvm_psci_check_allowed_function(struct kvm_vcpu *vcpu, u32 fn) 2189ed24f4bSMarc Zyngier { 2199ed24f4bSMarc Zyngier switch(fn) { 2209ed24f4bSMarc Zyngier case PSCI_0_2_FN64_CPU_SUSPEND: 2219ed24f4bSMarc Zyngier case PSCI_0_2_FN64_CPU_ON: 2229ed24f4bSMarc Zyngier case PSCI_0_2_FN64_AFFINITY_INFO: 2239ed24f4bSMarc Zyngier /* Disallow these functions for 32bit guests */ 2249ed24f4bSMarc Zyngier if (vcpu_mode_is_32bit(vcpu)) 2259ed24f4bSMarc Zyngier return PSCI_RET_NOT_SUPPORTED; 2269ed24f4bSMarc Zyngier break; 2279ed24f4bSMarc Zyngier } 2289ed24f4bSMarc Zyngier 2299ed24f4bSMarc Zyngier return 0; 2309ed24f4bSMarc Zyngier } 2319ed24f4bSMarc Zyngier 2329ed24f4bSMarc Zyngier static int kvm_psci_0_2_call(struct kvm_vcpu *vcpu) 2339ed24f4bSMarc Zyngier { 2349ed24f4bSMarc Zyngier struct kvm *kvm = vcpu->kvm; 2359ed24f4bSMarc Zyngier u32 psci_fn = smccc_get_function(vcpu); 2369ed24f4bSMarc Zyngier unsigned long val; 2379ed24f4bSMarc Zyngier int ret = 1; 2389ed24f4bSMarc Zyngier 2399ed24f4bSMarc Zyngier val = kvm_psci_check_allowed_function(vcpu, psci_fn); 2409ed24f4bSMarc Zyngier if (val) 2419ed24f4bSMarc Zyngier goto out; 2429ed24f4bSMarc Zyngier 2439ed24f4bSMarc Zyngier switch (psci_fn) { 2449ed24f4bSMarc Zyngier case PSCI_0_2_FN_PSCI_VERSION: 2459ed24f4bSMarc Zyngier /* 2469ed24f4bSMarc Zyngier * Bits[31:16] = Major Version = 0 2479ed24f4bSMarc Zyngier * Bits[15:0] = Minor Version = 2 2489ed24f4bSMarc Zyngier */ 2499ed24f4bSMarc Zyngier val = KVM_ARM_PSCI_0_2; 2509ed24f4bSMarc Zyngier break; 2519ed24f4bSMarc Zyngier case PSCI_0_2_FN_CPU_SUSPEND: 2529ed24f4bSMarc Zyngier case PSCI_0_2_FN64_CPU_SUSPEND: 2539ed24f4bSMarc Zyngier val = kvm_psci_vcpu_suspend(vcpu); 2549ed24f4bSMarc Zyngier break; 2559ed24f4bSMarc Zyngier case PSCI_0_2_FN_CPU_OFF: 2569ed24f4bSMarc Zyngier kvm_psci_vcpu_off(vcpu); 2579ed24f4bSMarc Zyngier val = PSCI_RET_SUCCESS; 2589ed24f4bSMarc Zyngier break; 2599ed24f4bSMarc Zyngier case PSCI_0_2_FN_CPU_ON: 2609ed24f4bSMarc Zyngier kvm_psci_narrow_to_32bit(vcpu); 2619ed24f4bSMarc Zyngier fallthrough; 2629ed24f4bSMarc Zyngier case PSCI_0_2_FN64_CPU_ON: 2639ed24f4bSMarc Zyngier mutex_lock(&kvm->lock); 2649ed24f4bSMarc Zyngier val = kvm_psci_vcpu_on(vcpu); 2659ed24f4bSMarc Zyngier mutex_unlock(&kvm->lock); 2669ed24f4bSMarc Zyngier break; 2679ed24f4bSMarc Zyngier case PSCI_0_2_FN_AFFINITY_INFO: 2689ed24f4bSMarc Zyngier kvm_psci_narrow_to_32bit(vcpu); 2699ed24f4bSMarc Zyngier fallthrough; 2709ed24f4bSMarc Zyngier case PSCI_0_2_FN64_AFFINITY_INFO: 2719ed24f4bSMarc Zyngier val = kvm_psci_vcpu_affinity_info(vcpu); 2729ed24f4bSMarc Zyngier break; 2739ed24f4bSMarc Zyngier case PSCI_0_2_FN_MIGRATE_INFO_TYPE: 2749ed24f4bSMarc Zyngier /* 2759ed24f4bSMarc Zyngier * Trusted OS is MP hence does not require migration 2769ed24f4bSMarc Zyngier * or 2779ed24f4bSMarc Zyngier * Trusted OS is not present 2789ed24f4bSMarc Zyngier */ 2799ed24f4bSMarc Zyngier val = PSCI_0_2_TOS_MP; 2809ed24f4bSMarc Zyngier break; 2819ed24f4bSMarc Zyngier case PSCI_0_2_FN_SYSTEM_OFF: 2829ed24f4bSMarc Zyngier kvm_psci_system_off(vcpu); 2839ed24f4bSMarc Zyngier /* 284656012c7SFuad Tabba * We shouldn't be going back to guest VCPU after 2859ed24f4bSMarc Zyngier * receiving SYSTEM_OFF request. 2869ed24f4bSMarc Zyngier * 287656012c7SFuad Tabba * If user space accidentally/deliberately resumes 2889ed24f4bSMarc Zyngier * guest VCPU after SYSTEM_OFF request then guest 2899ed24f4bSMarc Zyngier * VCPU should see internal failure from PSCI return 2909ed24f4bSMarc Zyngier * value. To achieve this, we preload r0 (or x0) with 2919ed24f4bSMarc Zyngier * PSCI return value INTERNAL_FAILURE. 2929ed24f4bSMarc Zyngier */ 2939ed24f4bSMarc Zyngier val = PSCI_RET_INTERNAL_FAILURE; 2949ed24f4bSMarc Zyngier ret = 0; 2959ed24f4bSMarc Zyngier break; 2969ed24f4bSMarc Zyngier case PSCI_0_2_FN_SYSTEM_RESET: 2979ed24f4bSMarc Zyngier kvm_psci_system_reset(vcpu); 2989ed24f4bSMarc Zyngier /* 2999ed24f4bSMarc Zyngier * Same reason as SYSTEM_OFF for preloading r0 (or x0) 3009ed24f4bSMarc Zyngier * with PSCI return value INTERNAL_FAILURE. 3019ed24f4bSMarc Zyngier */ 3029ed24f4bSMarc Zyngier val = PSCI_RET_INTERNAL_FAILURE; 3039ed24f4bSMarc Zyngier ret = 0; 3049ed24f4bSMarc Zyngier break; 3059ed24f4bSMarc Zyngier default: 3069ed24f4bSMarc Zyngier val = PSCI_RET_NOT_SUPPORTED; 3079ed24f4bSMarc Zyngier break; 3089ed24f4bSMarc Zyngier } 3099ed24f4bSMarc Zyngier 3109ed24f4bSMarc Zyngier out: 3119ed24f4bSMarc Zyngier smccc_set_retval(vcpu, val, 0, 0, 0); 3129ed24f4bSMarc Zyngier return ret; 3139ed24f4bSMarc Zyngier } 3149ed24f4bSMarc Zyngier 315512865d8SWill Deacon static int kvm_psci_1_x_call(struct kvm_vcpu *vcpu, u32 minor) 3169ed24f4bSMarc Zyngier { 3179ed24f4bSMarc Zyngier u32 psci_fn = smccc_get_function(vcpu); 318d43583b8SWill Deacon u32 arg; 3199ed24f4bSMarc Zyngier unsigned long val; 3209ed24f4bSMarc Zyngier int ret = 1; 3219ed24f4bSMarc Zyngier 322512865d8SWill Deacon if (minor > 1) 323512865d8SWill Deacon return -EINVAL; 324512865d8SWill Deacon 3259ed24f4bSMarc Zyngier switch(psci_fn) { 3269ed24f4bSMarc Zyngier case PSCI_0_2_FN_PSCI_VERSION: 327512865d8SWill Deacon val = minor == 0 ? KVM_ARM_PSCI_1_0 : KVM_ARM_PSCI_1_1; 3289ed24f4bSMarc Zyngier break; 3299ed24f4bSMarc Zyngier case PSCI_1_0_FN_PSCI_FEATURES: 330d43583b8SWill Deacon arg = smccc_get_arg1(vcpu); 331d43583b8SWill Deacon val = kvm_psci_check_allowed_function(vcpu, arg); 3329ed24f4bSMarc Zyngier if (val) 3339ed24f4bSMarc Zyngier break; 3349ed24f4bSMarc Zyngier 335d43583b8SWill Deacon switch(arg) { 3369ed24f4bSMarc Zyngier case PSCI_0_2_FN_PSCI_VERSION: 3379ed24f4bSMarc Zyngier case PSCI_0_2_FN_CPU_SUSPEND: 3389ed24f4bSMarc Zyngier case PSCI_0_2_FN64_CPU_SUSPEND: 3399ed24f4bSMarc Zyngier case PSCI_0_2_FN_CPU_OFF: 3409ed24f4bSMarc Zyngier case PSCI_0_2_FN_CPU_ON: 3419ed24f4bSMarc Zyngier case PSCI_0_2_FN64_CPU_ON: 3429ed24f4bSMarc Zyngier case PSCI_0_2_FN_AFFINITY_INFO: 3439ed24f4bSMarc Zyngier case PSCI_0_2_FN64_AFFINITY_INFO: 3449ed24f4bSMarc Zyngier case PSCI_0_2_FN_MIGRATE_INFO_TYPE: 3459ed24f4bSMarc Zyngier case PSCI_0_2_FN_SYSTEM_OFF: 3469ed24f4bSMarc Zyngier case PSCI_0_2_FN_SYSTEM_RESET: 3479ed24f4bSMarc Zyngier case PSCI_1_0_FN_PSCI_FEATURES: 3489ed24f4bSMarc Zyngier case ARM_SMCCC_VERSION_FUNC_ID: 3499ed24f4bSMarc Zyngier val = 0; 3509ed24f4bSMarc Zyngier break; 351d43583b8SWill Deacon case PSCI_1_1_FN_SYSTEM_RESET2: 352d43583b8SWill Deacon case PSCI_1_1_FN64_SYSTEM_RESET2: 353d43583b8SWill Deacon if (minor >= 1) { 354d43583b8SWill Deacon val = 0; 355d43583b8SWill Deacon break; 356d43583b8SWill Deacon } 357d43583b8SWill Deacon fallthrough; 3589ed24f4bSMarc Zyngier default: 3599ed24f4bSMarc Zyngier val = PSCI_RET_NOT_SUPPORTED; 3609ed24f4bSMarc Zyngier break; 3619ed24f4bSMarc Zyngier } 3629ed24f4bSMarc Zyngier break; 363d43583b8SWill Deacon case PSCI_1_1_FN_SYSTEM_RESET2: 364d43583b8SWill Deacon kvm_psci_narrow_to_32bit(vcpu); 365d43583b8SWill Deacon fallthrough; 366d43583b8SWill Deacon case PSCI_1_1_FN64_SYSTEM_RESET2: 367d43583b8SWill Deacon if (minor >= 1) { 368d43583b8SWill Deacon arg = smccc_get_arg1(vcpu); 369d43583b8SWill Deacon 370*9d3e7b7cSWill Deacon if (arg <= PSCI_1_1_RESET_TYPE_SYSTEM_WARM_RESET || 371*9d3e7b7cSWill Deacon arg >= PSCI_1_1_RESET_TYPE_VENDOR_START) { 37234739fd9SWill Deacon kvm_psci_system_reset2(vcpu); 373*9d3e7b7cSWill Deacon vcpu_set_reg(vcpu, 0, PSCI_RET_INTERNAL_FAILURE); 374*9d3e7b7cSWill Deacon return 0; 375d43583b8SWill Deacon } 376*9d3e7b7cSWill Deacon 377*9d3e7b7cSWill Deacon val = PSCI_RET_INVALID_PARAMS; 378d43583b8SWill Deacon break; 379ae82047eSChangcheng Deng } 380d43583b8SWill Deacon fallthrough; 3819ed24f4bSMarc Zyngier default: 3829ed24f4bSMarc Zyngier return kvm_psci_0_2_call(vcpu); 3839ed24f4bSMarc Zyngier } 3849ed24f4bSMarc Zyngier 3859ed24f4bSMarc Zyngier smccc_set_retval(vcpu, val, 0, 0, 0); 3869ed24f4bSMarc Zyngier return ret; 3879ed24f4bSMarc Zyngier } 3889ed24f4bSMarc Zyngier 3899ed24f4bSMarc Zyngier static int kvm_psci_0_1_call(struct kvm_vcpu *vcpu) 3909ed24f4bSMarc Zyngier { 3919ed24f4bSMarc Zyngier struct kvm *kvm = vcpu->kvm; 3929ed24f4bSMarc Zyngier u32 psci_fn = smccc_get_function(vcpu); 3939ed24f4bSMarc Zyngier unsigned long val; 3949ed24f4bSMarc Zyngier 3959ed24f4bSMarc Zyngier switch (psci_fn) { 3969ed24f4bSMarc Zyngier case KVM_PSCI_FN_CPU_OFF: 3979ed24f4bSMarc Zyngier kvm_psci_vcpu_off(vcpu); 3989ed24f4bSMarc Zyngier val = PSCI_RET_SUCCESS; 3999ed24f4bSMarc Zyngier break; 4009ed24f4bSMarc Zyngier case KVM_PSCI_FN_CPU_ON: 4019ed24f4bSMarc Zyngier mutex_lock(&kvm->lock); 4029ed24f4bSMarc Zyngier val = kvm_psci_vcpu_on(vcpu); 4039ed24f4bSMarc Zyngier mutex_unlock(&kvm->lock); 4049ed24f4bSMarc Zyngier break; 4059ed24f4bSMarc Zyngier default: 4069ed24f4bSMarc Zyngier val = PSCI_RET_NOT_SUPPORTED; 4079ed24f4bSMarc Zyngier break; 4089ed24f4bSMarc Zyngier } 4099ed24f4bSMarc Zyngier 4109ed24f4bSMarc Zyngier smccc_set_retval(vcpu, val, 0, 0, 0); 4119ed24f4bSMarc Zyngier return 1; 4129ed24f4bSMarc Zyngier } 4139ed24f4bSMarc Zyngier 4149ed24f4bSMarc Zyngier /** 4159ed24f4bSMarc Zyngier * kvm_psci_call - handle PSCI call if r0 value is in range 4169ed24f4bSMarc Zyngier * @vcpu: Pointer to the VCPU struct 4179ed24f4bSMarc Zyngier * 4189ed24f4bSMarc Zyngier * Handle PSCI calls from guests through traps from HVC instructions. 4199ed24f4bSMarc Zyngier * The calling convention is similar to SMC calls to the secure world 4209ed24f4bSMarc Zyngier * where the function number is placed in r0. 4219ed24f4bSMarc Zyngier * 4229ed24f4bSMarc Zyngier * This function returns: > 0 (success), 0 (success but exit to user 4239ed24f4bSMarc Zyngier * space), and < 0 (errors) 4249ed24f4bSMarc Zyngier * 4259ed24f4bSMarc Zyngier * Errors: 4269ed24f4bSMarc Zyngier * -EINVAL: Unrecognized PSCI function 4279ed24f4bSMarc Zyngier */ 4289ed24f4bSMarc Zyngier int kvm_psci_call(struct kvm_vcpu *vcpu) 4299ed24f4bSMarc Zyngier { 4309ed24f4bSMarc Zyngier switch (kvm_psci_version(vcpu, vcpu->kvm)) { 431512865d8SWill Deacon case KVM_ARM_PSCI_1_1: 432512865d8SWill Deacon return kvm_psci_1_x_call(vcpu, 1); 4339ed24f4bSMarc Zyngier case KVM_ARM_PSCI_1_0: 434512865d8SWill Deacon return kvm_psci_1_x_call(vcpu, 0); 4359ed24f4bSMarc Zyngier case KVM_ARM_PSCI_0_2: 4369ed24f4bSMarc Zyngier return kvm_psci_0_2_call(vcpu); 4379ed24f4bSMarc Zyngier case KVM_ARM_PSCI_0_1: 4389ed24f4bSMarc Zyngier return kvm_psci_0_1_call(vcpu); 4399ed24f4bSMarc Zyngier default: 4409ed24f4bSMarc Zyngier return -EINVAL; 441ae82047eSChangcheng Deng } 4429ed24f4bSMarc Zyngier } 4439ed24f4bSMarc Zyngier 4449ed24f4bSMarc Zyngier int kvm_arm_get_fw_num_regs(struct kvm_vcpu *vcpu) 4459ed24f4bSMarc Zyngier { 4469ed24f4bSMarc Zyngier return 3; /* PSCI version and two workaround registers */ 4479ed24f4bSMarc Zyngier } 4489ed24f4bSMarc Zyngier 4499ed24f4bSMarc Zyngier int kvm_arm_copy_fw_reg_indices(struct kvm_vcpu *vcpu, u64 __user *uindices) 4509ed24f4bSMarc Zyngier { 4519ed24f4bSMarc Zyngier if (put_user(KVM_REG_ARM_PSCI_VERSION, uindices++)) 4529ed24f4bSMarc Zyngier return -EFAULT; 4539ed24f4bSMarc Zyngier 4549ed24f4bSMarc Zyngier if (put_user(KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1, uindices++)) 4559ed24f4bSMarc Zyngier return -EFAULT; 4569ed24f4bSMarc Zyngier 4579ed24f4bSMarc Zyngier if (put_user(KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2, uindices++)) 4589ed24f4bSMarc Zyngier return -EFAULT; 4599ed24f4bSMarc Zyngier 4609ed24f4bSMarc Zyngier return 0; 4619ed24f4bSMarc Zyngier } 4629ed24f4bSMarc Zyngier 4639ed24f4bSMarc Zyngier #define KVM_REG_FEATURE_LEVEL_WIDTH 4 4649ed24f4bSMarc Zyngier #define KVM_REG_FEATURE_LEVEL_MASK (BIT(KVM_REG_FEATURE_LEVEL_WIDTH) - 1) 4659ed24f4bSMarc Zyngier 4669ed24f4bSMarc Zyngier /* 4679ed24f4bSMarc Zyngier * Convert the workaround level into an easy-to-compare number, where higher 4689ed24f4bSMarc Zyngier * values mean better protection. 4699ed24f4bSMarc Zyngier */ 4709ed24f4bSMarc Zyngier static int get_kernel_wa_level(u64 regid) 4719ed24f4bSMarc Zyngier { 4729ed24f4bSMarc Zyngier switch (regid) { 4739ed24f4bSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1: 474d4647f0aSWill Deacon switch (arm64_get_spectre_v2_state()) { 475d4647f0aSWill Deacon case SPECTRE_VULNERABLE: 4769ed24f4bSMarc Zyngier return KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_NOT_AVAIL; 477d4647f0aSWill Deacon case SPECTRE_MITIGATED: 4789ed24f4bSMarc Zyngier return KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_AVAIL; 479d4647f0aSWill Deacon case SPECTRE_UNAFFECTED: 4809ed24f4bSMarc Zyngier return KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_NOT_REQUIRED; 4819ed24f4bSMarc Zyngier } 4829ed24f4bSMarc Zyngier return KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1_NOT_AVAIL; 4839ed24f4bSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2: 484d63d975aSMarc Zyngier switch (arm64_get_spectre_v4_state()) { 485d63d975aSMarc Zyngier case SPECTRE_MITIGATED: 486d63d975aSMarc Zyngier /* 487d63d975aSMarc Zyngier * As for the hypercall discovery, we pretend we 488d63d975aSMarc Zyngier * don't have any FW mitigation if SSBS is there at 489d63d975aSMarc Zyngier * all times. 490d63d975aSMarc Zyngier */ 491d63d975aSMarc Zyngier if (cpus_have_final_cap(ARM64_SSBS)) 492d63d975aSMarc Zyngier return KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_AVAIL; 493d63d975aSMarc Zyngier fallthrough; 494d63d975aSMarc Zyngier case SPECTRE_UNAFFECTED: 4959ed24f4bSMarc Zyngier return KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_REQUIRED; 496d63d975aSMarc Zyngier case SPECTRE_VULNERABLE: 49729e8910aSMarc Zyngier return KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_AVAIL; 4989ed24f4bSMarc Zyngier } 4999ed24f4bSMarc Zyngier } 5009ed24f4bSMarc Zyngier 5019ed24f4bSMarc Zyngier return -EINVAL; 5029ed24f4bSMarc Zyngier } 5039ed24f4bSMarc Zyngier 5049ed24f4bSMarc Zyngier int kvm_arm_get_fw_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg) 5059ed24f4bSMarc Zyngier { 5069ed24f4bSMarc Zyngier void __user *uaddr = (void __user *)(long)reg->addr; 5079ed24f4bSMarc Zyngier u64 val; 5089ed24f4bSMarc Zyngier 5099ed24f4bSMarc Zyngier switch (reg->id) { 5109ed24f4bSMarc Zyngier case KVM_REG_ARM_PSCI_VERSION: 5119ed24f4bSMarc Zyngier val = kvm_psci_version(vcpu, vcpu->kvm); 5129ed24f4bSMarc Zyngier break; 5139ed24f4bSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1: 5149ed24f4bSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2: 5159ed24f4bSMarc Zyngier val = get_kernel_wa_level(reg->id) & KVM_REG_FEATURE_LEVEL_MASK; 5169ed24f4bSMarc Zyngier break; 5179ed24f4bSMarc Zyngier default: 5189ed24f4bSMarc Zyngier return -ENOENT; 5199ed24f4bSMarc Zyngier } 5209ed24f4bSMarc Zyngier 5219ed24f4bSMarc Zyngier if (copy_to_user(uaddr, &val, KVM_REG_SIZE(reg->id))) 5229ed24f4bSMarc Zyngier return -EFAULT; 5239ed24f4bSMarc Zyngier 5249ed24f4bSMarc Zyngier return 0; 5259ed24f4bSMarc Zyngier } 5269ed24f4bSMarc Zyngier 5279ed24f4bSMarc Zyngier int kvm_arm_set_fw_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg) 5289ed24f4bSMarc Zyngier { 5299ed24f4bSMarc Zyngier void __user *uaddr = (void __user *)(long)reg->addr; 5309ed24f4bSMarc Zyngier u64 val; 5319ed24f4bSMarc Zyngier int wa_level; 5329ed24f4bSMarc Zyngier 5339ed24f4bSMarc Zyngier if (copy_from_user(&val, uaddr, KVM_REG_SIZE(reg->id))) 5349ed24f4bSMarc Zyngier return -EFAULT; 5359ed24f4bSMarc Zyngier 5369ed24f4bSMarc Zyngier switch (reg->id) { 5379ed24f4bSMarc Zyngier case KVM_REG_ARM_PSCI_VERSION: 5389ed24f4bSMarc Zyngier { 5399ed24f4bSMarc Zyngier bool wants_02; 5409ed24f4bSMarc Zyngier 5419ed24f4bSMarc Zyngier wants_02 = test_bit(KVM_ARM_VCPU_PSCI_0_2, vcpu->arch.features); 5429ed24f4bSMarc Zyngier 5439ed24f4bSMarc Zyngier switch (val) { 5449ed24f4bSMarc Zyngier case KVM_ARM_PSCI_0_1: 5459ed24f4bSMarc Zyngier if (wants_02) 5469ed24f4bSMarc Zyngier return -EINVAL; 5479ed24f4bSMarc Zyngier vcpu->kvm->arch.psci_version = val; 5489ed24f4bSMarc Zyngier return 0; 5499ed24f4bSMarc Zyngier case KVM_ARM_PSCI_0_2: 5509ed24f4bSMarc Zyngier case KVM_ARM_PSCI_1_0: 551512865d8SWill Deacon case KVM_ARM_PSCI_1_1: 5529ed24f4bSMarc Zyngier if (!wants_02) 5539ed24f4bSMarc Zyngier return -EINVAL; 5549ed24f4bSMarc Zyngier vcpu->kvm->arch.psci_version = val; 5559ed24f4bSMarc Zyngier return 0; 5569ed24f4bSMarc Zyngier } 5579ed24f4bSMarc Zyngier break; 5589ed24f4bSMarc Zyngier } 5599ed24f4bSMarc Zyngier 5609ed24f4bSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_1: 5619ed24f4bSMarc Zyngier if (val & ~KVM_REG_FEATURE_LEVEL_MASK) 5629ed24f4bSMarc Zyngier return -EINVAL; 5639ed24f4bSMarc Zyngier 5649ed24f4bSMarc Zyngier if (get_kernel_wa_level(reg->id) < val) 5659ed24f4bSMarc Zyngier return -EINVAL; 5669ed24f4bSMarc Zyngier 5679ed24f4bSMarc Zyngier return 0; 5689ed24f4bSMarc Zyngier 5699ed24f4bSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2: 5709ed24f4bSMarc Zyngier if (val & ~(KVM_REG_FEATURE_LEVEL_MASK | 5719ed24f4bSMarc Zyngier KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_ENABLED)) 5729ed24f4bSMarc Zyngier return -EINVAL; 5739ed24f4bSMarc Zyngier 5749ed24f4bSMarc Zyngier /* The enabled bit must not be set unless the level is AVAIL. */ 57529e8910aSMarc Zyngier if ((val & KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_ENABLED) && 57629e8910aSMarc Zyngier (val & KVM_REG_FEATURE_LEVEL_MASK) != KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_AVAIL) 5779ed24f4bSMarc Zyngier return -EINVAL; 5789ed24f4bSMarc Zyngier 5799ed24f4bSMarc Zyngier /* 58029e8910aSMarc Zyngier * Map all the possible incoming states to the only two we 58129e8910aSMarc Zyngier * really want to deal with. 5829ed24f4bSMarc Zyngier */ 58329e8910aSMarc Zyngier switch (val & KVM_REG_FEATURE_LEVEL_MASK) { 58429e8910aSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_AVAIL: 58529e8910aSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_UNKNOWN: 58629e8910aSMarc Zyngier wa_level = KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_AVAIL; 58729e8910aSMarc Zyngier break; 5889ed24f4bSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_AVAIL: 5899ed24f4bSMarc Zyngier case KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_REQUIRED: 59029e8910aSMarc Zyngier wa_level = KVM_REG_ARM_SMCCC_ARCH_WORKAROUND_2_NOT_REQUIRED; 5919ed24f4bSMarc Zyngier break; 59229e8910aSMarc Zyngier default: 59329e8910aSMarc Zyngier return -EINVAL; 5949ed24f4bSMarc Zyngier } 5959ed24f4bSMarc Zyngier 59629e8910aSMarc Zyngier /* 59729e8910aSMarc Zyngier * We can deal with NOT_AVAIL on NOT_REQUIRED, but not the 59829e8910aSMarc Zyngier * other way around. 59929e8910aSMarc Zyngier */ 60029e8910aSMarc Zyngier if (get_kernel_wa_level(reg->id) < wa_level) 60129e8910aSMarc Zyngier return -EINVAL; 60229e8910aSMarc Zyngier 6039ed24f4bSMarc Zyngier return 0; 6049ed24f4bSMarc Zyngier default: 6059ed24f4bSMarc Zyngier return -ENOENT; 6069ed24f4bSMarc Zyngier } 6079ed24f4bSMarc Zyngier 6089ed24f4bSMarc Zyngier return -EINVAL; 6099ed24f4bSMarc Zyngier } 610