162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Copyright (C) 2012 - ARM Ltd 462306a36Sopenharmony_ci * Author: Marc Zyngier <marc.zyngier@arm.com> 562306a36Sopenharmony_ci */ 662306a36Sopenharmony_ci 762306a36Sopenharmony_ci#include <linux/arm-smccc.h> 862306a36Sopenharmony_ci#include <linux/preempt.h> 962306a36Sopenharmony_ci#include <linux/kvm_host.h> 1062306a36Sopenharmony_ci#include <linux/uaccess.h> 1162306a36Sopenharmony_ci#include <linux/wait.h> 1262306a36Sopenharmony_ci 1362306a36Sopenharmony_ci#include <asm/cputype.h> 1462306a36Sopenharmony_ci#include <asm/kvm_emulate.h> 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_ci#include <kvm/arm_psci.h> 1762306a36Sopenharmony_ci#include <kvm/arm_hypercalls.h> 1862306a36Sopenharmony_ci 1962306a36Sopenharmony_ci/* 2062306a36Sopenharmony_ci * This is an implementation of the Power State Coordination Interface 2162306a36Sopenharmony_ci * as described in ARM document number ARM DEN 0022A. 2262306a36Sopenharmony_ci */ 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_ci#define AFFINITY_MASK(level) ~((0x1UL << ((level) * MPIDR_LEVEL_BITS)) - 1) 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_cistatic unsigned long psci_affinity_mask(unsigned long affinity_level) 2762306a36Sopenharmony_ci{ 2862306a36Sopenharmony_ci if (affinity_level <= 3) 2962306a36Sopenharmony_ci return MPIDR_HWID_BITMASK & AFFINITY_MASK(affinity_level); 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_ci return 0; 3262306a36Sopenharmony_ci} 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_cistatic unsigned long kvm_psci_vcpu_suspend(struct kvm_vcpu *vcpu) 3562306a36Sopenharmony_ci{ 3662306a36Sopenharmony_ci /* 3762306a36Sopenharmony_ci * NOTE: For simplicity, we make VCPU suspend emulation to be 3862306a36Sopenharmony_ci * same-as WFI (Wait-for-interrupt) emulation. 3962306a36Sopenharmony_ci * 4062306a36Sopenharmony_ci * This means for KVM the wakeup events are interrupts and 4162306a36Sopenharmony_ci * this is consistent with intended use of StateID as described 4262306a36Sopenharmony_ci * in section 5.4.1 of PSCI v0.2 specification (ARM DEN 0022A). 4362306a36Sopenharmony_ci * 4462306a36Sopenharmony_ci * Further, we also treat power-down request to be same as 4562306a36Sopenharmony_ci * stand-by request as-per section 5.4.2 clause 3 of PSCI v0.2 4662306a36Sopenharmony_ci * specification (ARM DEN 0022A). This means all suspend states 4762306a36Sopenharmony_ci * for KVM will preserve the register state. 4862306a36Sopenharmony_ci */ 4962306a36Sopenharmony_ci kvm_vcpu_wfi(vcpu); 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_ci return PSCI_RET_SUCCESS; 5262306a36Sopenharmony_ci} 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_cistatic inline bool kvm_psci_valid_affinity(struct kvm_vcpu *vcpu, 5562306a36Sopenharmony_ci unsigned long affinity) 5662306a36Sopenharmony_ci{ 5762306a36Sopenharmony_ci return !(affinity & ~MPIDR_HWID_BITMASK); 5862306a36Sopenharmony_ci} 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_cistatic unsigned long kvm_psci_vcpu_on(struct kvm_vcpu *source_vcpu) 6162306a36Sopenharmony_ci{ 6262306a36Sopenharmony_ci struct vcpu_reset_state *reset_state; 6362306a36Sopenharmony_ci struct kvm *kvm = source_vcpu->kvm; 6462306a36Sopenharmony_ci struct kvm_vcpu *vcpu = NULL; 6562306a36Sopenharmony_ci int ret = PSCI_RET_SUCCESS; 6662306a36Sopenharmony_ci unsigned long cpu_id; 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci cpu_id = smccc_get_arg1(source_vcpu); 6962306a36Sopenharmony_ci if (!kvm_psci_valid_affinity(source_vcpu, cpu_id)) 7062306a36Sopenharmony_ci return PSCI_RET_INVALID_PARAMS; 7162306a36Sopenharmony_ci 7262306a36Sopenharmony_ci vcpu = kvm_mpidr_to_vcpu(kvm, cpu_id); 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci /* 7562306a36Sopenharmony_ci * Make sure the caller requested a valid CPU and that the CPU is 7662306a36Sopenharmony_ci * turned off. 7762306a36Sopenharmony_ci */ 7862306a36Sopenharmony_ci if (!vcpu) 7962306a36Sopenharmony_ci return PSCI_RET_INVALID_PARAMS; 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci spin_lock(&vcpu->arch.mp_state_lock); 8262306a36Sopenharmony_ci if (!kvm_arm_vcpu_stopped(vcpu)) { 8362306a36Sopenharmony_ci if (kvm_psci_version(source_vcpu) != KVM_ARM_PSCI_0_1) 8462306a36Sopenharmony_ci ret = PSCI_RET_ALREADY_ON; 8562306a36Sopenharmony_ci else 8662306a36Sopenharmony_ci ret = PSCI_RET_INVALID_PARAMS; 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci goto out_unlock; 8962306a36Sopenharmony_ci } 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_ci reset_state = &vcpu->arch.reset_state; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci reset_state->pc = smccc_get_arg2(source_vcpu); 9462306a36Sopenharmony_ci 9562306a36Sopenharmony_ci /* Propagate caller endianness */ 9662306a36Sopenharmony_ci reset_state->be = kvm_vcpu_is_be(source_vcpu); 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_ci /* 9962306a36Sopenharmony_ci * NOTE: We always update r0 (or x0) because for PSCI v0.1 10062306a36Sopenharmony_ci * the general purpose registers are undefined upon CPU_ON. 10162306a36Sopenharmony_ci */ 10262306a36Sopenharmony_ci reset_state->r0 = smccc_get_arg3(source_vcpu); 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci reset_state->reset = true; 10562306a36Sopenharmony_ci kvm_make_request(KVM_REQ_VCPU_RESET, vcpu); 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_ci /* 10862306a36Sopenharmony_ci * Make sure the reset request is observed if the RUNNABLE mp_state is 10962306a36Sopenharmony_ci * observed. 11062306a36Sopenharmony_ci */ 11162306a36Sopenharmony_ci smp_wmb(); 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_ci WRITE_ONCE(vcpu->arch.mp_state.mp_state, KVM_MP_STATE_RUNNABLE); 11462306a36Sopenharmony_ci kvm_vcpu_wake_up(vcpu); 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ciout_unlock: 11762306a36Sopenharmony_ci spin_unlock(&vcpu->arch.mp_state_lock); 11862306a36Sopenharmony_ci return ret; 11962306a36Sopenharmony_ci} 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_cistatic unsigned long kvm_psci_vcpu_affinity_info(struct kvm_vcpu *vcpu) 12262306a36Sopenharmony_ci{ 12362306a36Sopenharmony_ci int matching_cpus = 0; 12462306a36Sopenharmony_ci unsigned long i, mpidr; 12562306a36Sopenharmony_ci unsigned long target_affinity; 12662306a36Sopenharmony_ci unsigned long target_affinity_mask; 12762306a36Sopenharmony_ci unsigned long lowest_affinity_level; 12862306a36Sopenharmony_ci struct kvm *kvm = vcpu->kvm; 12962306a36Sopenharmony_ci struct kvm_vcpu *tmp; 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_ci target_affinity = smccc_get_arg1(vcpu); 13262306a36Sopenharmony_ci lowest_affinity_level = smccc_get_arg2(vcpu); 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci if (!kvm_psci_valid_affinity(vcpu, target_affinity)) 13562306a36Sopenharmony_ci return PSCI_RET_INVALID_PARAMS; 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci /* Determine target affinity mask */ 13862306a36Sopenharmony_ci target_affinity_mask = psci_affinity_mask(lowest_affinity_level); 13962306a36Sopenharmony_ci if (!target_affinity_mask) 14062306a36Sopenharmony_ci return PSCI_RET_INVALID_PARAMS; 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci /* Ignore other bits of target affinity */ 14362306a36Sopenharmony_ci target_affinity &= target_affinity_mask; 14462306a36Sopenharmony_ci 14562306a36Sopenharmony_ci /* 14662306a36Sopenharmony_ci * If one or more VCPU matching target affinity are running 14762306a36Sopenharmony_ci * then ON else OFF 14862306a36Sopenharmony_ci */ 14962306a36Sopenharmony_ci kvm_for_each_vcpu(i, tmp, kvm) { 15062306a36Sopenharmony_ci mpidr = kvm_vcpu_get_mpidr_aff(tmp); 15162306a36Sopenharmony_ci if ((mpidr & target_affinity_mask) == target_affinity) { 15262306a36Sopenharmony_ci matching_cpus++; 15362306a36Sopenharmony_ci if (!kvm_arm_vcpu_stopped(tmp)) 15462306a36Sopenharmony_ci return PSCI_0_2_AFFINITY_LEVEL_ON; 15562306a36Sopenharmony_ci } 15662306a36Sopenharmony_ci } 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci if (!matching_cpus) 15962306a36Sopenharmony_ci return PSCI_RET_INVALID_PARAMS; 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci return PSCI_0_2_AFFINITY_LEVEL_OFF; 16262306a36Sopenharmony_ci} 16362306a36Sopenharmony_ci 16462306a36Sopenharmony_cistatic void kvm_prepare_system_event(struct kvm_vcpu *vcpu, u32 type, u64 flags) 16562306a36Sopenharmony_ci{ 16662306a36Sopenharmony_ci unsigned long i; 16762306a36Sopenharmony_ci struct kvm_vcpu *tmp; 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci /* 17062306a36Sopenharmony_ci * The KVM ABI specifies that a system event exit may call KVM_RUN 17162306a36Sopenharmony_ci * again and may perform shutdown/reboot at a later time that when the 17262306a36Sopenharmony_ci * actual request is made. Since we are implementing PSCI and a 17362306a36Sopenharmony_ci * caller of PSCI reboot and shutdown expects that the system shuts 17462306a36Sopenharmony_ci * down or reboots immediately, let's make sure that VCPUs are not run 17562306a36Sopenharmony_ci * after this call is handled and before the VCPUs have been 17662306a36Sopenharmony_ci * re-initialized. 17762306a36Sopenharmony_ci */ 17862306a36Sopenharmony_ci kvm_for_each_vcpu(i, tmp, vcpu->kvm) { 17962306a36Sopenharmony_ci spin_lock(&tmp->arch.mp_state_lock); 18062306a36Sopenharmony_ci WRITE_ONCE(tmp->arch.mp_state.mp_state, KVM_MP_STATE_STOPPED); 18162306a36Sopenharmony_ci spin_unlock(&tmp->arch.mp_state_lock); 18262306a36Sopenharmony_ci } 18362306a36Sopenharmony_ci kvm_make_all_cpus_request(vcpu->kvm, KVM_REQ_SLEEP); 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci memset(&vcpu->run->system_event, 0, sizeof(vcpu->run->system_event)); 18662306a36Sopenharmony_ci vcpu->run->system_event.type = type; 18762306a36Sopenharmony_ci vcpu->run->system_event.ndata = 1; 18862306a36Sopenharmony_ci vcpu->run->system_event.data[0] = flags; 18962306a36Sopenharmony_ci vcpu->run->exit_reason = KVM_EXIT_SYSTEM_EVENT; 19062306a36Sopenharmony_ci} 19162306a36Sopenharmony_ci 19262306a36Sopenharmony_cistatic void kvm_psci_system_off(struct kvm_vcpu *vcpu) 19362306a36Sopenharmony_ci{ 19462306a36Sopenharmony_ci kvm_prepare_system_event(vcpu, KVM_SYSTEM_EVENT_SHUTDOWN, 0); 19562306a36Sopenharmony_ci} 19662306a36Sopenharmony_ci 19762306a36Sopenharmony_cistatic void kvm_psci_system_reset(struct kvm_vcpu *vcpu) 19862306a36Sopenharmony_ci{ 19962306a36Sopenharmony_ci kvm_prepare_system_event(vcpu, KVM_SYSTEM_EVENT_RESET, 0); 20062306a36Sopenharmony_ci} 20162306a36Sopenharmony_ci 20262306a36Sopenharmony_cistatic void kvm_psci_system_reset2(struct kvm_vcpu *vcpu) 20362306a36Sopenharmony_ci{ 20462306a36Sopenharmony_ci kvm_prepare_system_event(vcpu, KVM_SYSTEM_EVENT_RESET, 20562306a36Sopenharmony_ci KVM_SYSTEM_EVENT_RESET_FLAG_PSCI_RESET2); 20662306a36Sopenharmony_ci} 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_cistatic void kvm_psci_system_suspend(struct kvm_vcpu *vcpu) 20962306a36Sopenharmony_ci{ 21062306a36Sopenharmony_ci struct kvm_run *run = vcpu->run; 21162306a36Sopenharmony_ci 21262306a36Sopenharmony_ci memset(&run->system_event, 0, sizeof(vcpu->run->system_event)); 21362306a36Sopenharmony_ci run->system_event.type = KVM_SYSTEM_EVENT_SUSPEND; 21462306a36Sopenharmony_ci run->exit_reason = KVM_EXIT_SYSTEM_EVENT; 21562306a36Sopenharmony_ci} 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_cistatic void kvm_psci_narrow_to_32bit(struct kvm_vcpu *vcpu) 21862306a36Sopenharmony_ci{ 21962306a36Sopenharmony_ci int i; 22062306a36Sopenharmony_ci 22162306a36Sopenharmony_ci /* 22262306a36Sopenharmony_ci * Zero the input registers' upper 32 bits. They will be fully 22362306a36Sopenharmony_ci * zeroed on exit, so we're fine changing them in place. 22462306a36Sopenharmony_ci */ 22562306a36Sopenharmony_ci for (i = 1; i < 4; i++) 22662306a36Sopenharmony_ci vcpu_set_reg(vcpu, i, lower_32_bits(vcpu_get_reg(vcpu, i))); 22762306a36Sopenharmony_ci} 22862306a36Sopenharmony_ci 22962306a36Sopenharmony_cistatic unsigned long kvm_psci_check_allowed_function(struct kvm_vcpu *vcpu, u32 fn) 23062306a36Sopenharmony_ci{ 23162306a36Sopenharmony_ci /* 23262306a36Sopenharmony_ci * Prevent 32 bit guests from calling 64 bit PSCI functions. 23362306a36Sopenharmony_ci */ 23462306a36Sopenharmony_ci if ((fn & PSCI_0_2_64BIT) && vcpu_mode_is_32bit(vcpu)) 23562306a36Sopenharmony_ci return PSCI_RET_NOT_SUPPORTED; 23662306a36Sopenharmony_ci 23762306a36Sopenharmony_ci return 0; 23862306a36Sopenharmony_ci} 23962306a36Sopenharmony_ci 24062306a36Sopenharmony_cistatic int kvm_psci_0_2_call(struct kvm_vcpu *vcpu) 24162306a36Sopenharmony_ci{ 24262306a36Sopenharmony_ci u32 psci_fn = smccc_get_function(vcpu); 24362306a36Sopenharmony_ci unsigned long val; 24462306a36Sopenharmony_ci int ret = 1; 24562306a36Sopenharmony_ci 24662306a36Sopenharmony_ci switch (psci_fn) { 24762306a36Sopenharmony_ci case PSCI_0_2_FN_PSCI_VERSION: 24862306a36Sopenharmony_ci /* 24962306a36Sopenharmony_ci * Bits[31:16] = Major Version = 0 25062306a36Sopenharmony_ci * Bits[15:0] = Minor Version = 2 25162306a36Sopenharmony_ci */ 25262306a36Sopenharmony_ci val = KVM_ARM_PSCI_0_2; 25362306a36Sopenharmony_ci break; 25462306a36Sopenharmony_ci case PSCI_0_2_FN_CPU_SUSPEND: 25562306a36Sopenharmony_ci case PSCI_0_2_FN64_CPU_SUSPEND: 25662306a36Sopenharmony_ci val = kvm_psci_vcpu_suspend(vcpu); 25762306a36Sopenharmony_ci break; 25862306a36Sopenharmony_ci case PSCI_0_2_FN_CPU_OFF: 25962306a36Sopenharmony_ci kvm_arm_vcpu_power_off(vcpu); 26062306a36Sopenharmony_ci val = PSCI_RET_SUCCESS; 26162306a36Sopenharmony_ci break; 26262306a36Sopenharmony_ci case PSCI_0_2_FN_CPU_ON: 26362306a36Sopenharmony_ci kvm_psci_narrow_to_32bit(vcpu); 26462306a36Sopenharmony_ci fallthrough; 26562306a36Sopenharmony_ci case PSCI_0_2_FN64_CPU_ON: 26662306a36Sopenharmony_ci val = kvm_psci_vcpu_on(vcpu); 26762306a36Sopenharmony_ci break; 26862306a36Sopenharmony_ci case PSCI_0_2_FN_AFFINITY_INFO: 26962306a36Sopenharmony_ci kvm_psci_narrow_to_32bit(vcpu); 27062306a36Sopenharmony_ci fallthrough; 27162306a36Sopenharmony_ci case PSCI_0_2_FN64_AFFINITY_INFO: 27262306a36Sopenharmony_ci val = kvm_psci_vcpu_affinity_info(vcpu); 27362306a36Sopenharmony_ci break; 27462306a36Sopenharmony_ci case PSCI_0_2_FN_MIGRATE_INFO_TYPE: 27562306a36Sopenharmony_ci /* 27662306a36Sopenharmony_ci * Trusted OS is MP hence does not require migration 27762306a36Sopenharmony_ci * or 27862306a36Sopenharmony_ci * Trusted OS is not present 27962306a36Sopenharmony_ci */ 28062306a36Sopenharmony_ci val = PSCI_0_2_TOS_MP; 28162306a36Sopenharmony_ci break; 28262306a36Sopenharmony_ci case PSCI_0_2_FN_SYSTEM_OFF: 28362306a36Sopenharmony_ci kvm_psci_system_off(vcpu); 28462306a36Sopenharmony_ci /* 28562306a36Sopenharmony_ci * We shouldn't be going back to guest VCPU after 28662306a36Sopenharmony_ci * receiving SYSTEM_OFF request. 28762306a36Sopenharmony_ci * 28862306a36Sopenharmony_ci * If user space accidentally/deliberately resumes 28962306a36Sopenharmony_ci * guest VCPU after SYSTEM_OFF request then guest 29062306a36Sopenharmony_ci * VCPU should see internal failure from PSCI return 29162306a36Sopenharmony_ci * value. To achieve this, we preload r0 (or x0) with 29262306a36Sopenharmony_ci * PSCI return value INTERNAL_FAILURE. 29362306a36Sopenharmony_ci */ 29462306a36Sopenharmony_ci val = PSCI_RET_INTERNAL_FAILURE; 29562306a36Sopenharmony_ci ret = 0; 29662306a36Sopenharmony_ci break; 29762306a36Sopenharmony_ci case PSCI_0_2_FN_SYSTEM_RESET: 29862306a36Sopenharmony_ci kvm_psci_system_reset(vcpu); 29962306a36Sopenharmony_ci /* 30062306a36Sopenharmony_ci * Same reason as SYSTEM_OFF for preloading r0 (or x0) 30162306a36Sopenharmony_ci * with PSCI return value INTERNAL_FAILURE. 30262306a36Sopenharmony_ci */ 30362306a36Sopenharmony_ci val = PSCI_RET_INTERNAL_FAILURE; 30462306a36Sopenharmony_ci ret = 0; 30562306a36Sopenharmony_ci break; 30662306a36Sopenharmony_ci default: 30762306a36Sopenharmony_ci val = PSCI_RET_NOT_SUPPORTED; 30862306a36Sopenharmony_ci break; 30962306a36Sopenharmony_ci } 31062306a36Sopenharmony_ci 31162306a36Sopenharmony_ci smccc_set_retval(vcpu, val, 0, 0, 0); 31262306a36Sopenharmony_ci return ret; 31362306a36Sopenharmony_ci} 31462306a36Sopenharmony_ci 31562306a36Sopenharmony_cistatic int kvm_psci_1_x_call(struct kvm_vcpu *vcpu, u32 minor) 31662306a36Sopenharmony_ci{ 31762306a36Sopenharmony_ci unsigned long val = PSCI_RET_NOT_SUPPORTED; 31862306a36Sopenharmony_ci u32 psci_fn = smccc_get_function(vcpu); 31962306a36Sopenharmony_ci struct kvm *kvm = vcpu->kvm; 32062306a36Sopenharmony_ci u32 arg; 32162306a36Sopenharmony_ci int ret = 1; 32262306a36Sopenharmony_ci 32362306a36Sopenharmony_ci switch(psci_fn) { 32462306a36Sopenharmony_ci case PSCI_0_2_FN_PSCI_VERSION: 32562306a36Sopenharmony_ci val = minor == 0 ? KVM_ARM_PSCI_1_0 : KVM_ARM_PSCI_1_1; 32662306a36Sopenharmony_ci break; 32762306a36Sopenharmony_ci case PSCI_1_0_FN_PSCI_FEATURES: 32862306a36Sopenharmony_ci arg = smccc_get_arg1(vcpu); 32962306a36Sopenharmony_ci val = kvm_psci_check_allowed_function(vcpu, arg); 33062306a36Sopenharmony_ci if (val) 33162306a36Sopenharmony_ci break; 33262306a36Sopenharmony_ci 33362306a36Sopenharmony_ci val = PSCI_RET_NOT_SUPPORTED; 33462306a36Sopenharmony_ci 33562306a36Sopenharmony_ci switch(arg) { 33662306a36Sopenharmony_ci case PSCI_0_2_FN_PSCI_VERSION: 33762306a36Sopenharmony_ci case PSCI_0_2_FN_CPU_SUSPEND: 33862306a36Sopenharmony_ci case PSCI_0_2_FN64_CPU_SUSPEND: 33962306a36Sopenharmony_ci case PSCI_0_2_FN_CPU_OFF: 34062306a36Sopenharmony_ci case PSCI_0_2_FN_CPU_ON: 34162306a36Sopenharmony_ci case PSCI_0_2_FN64_CPU_ON: 34262306a36Sopenharmony_ci case PSCI_0_2_FN_AFFINITY_INFO: 34362306a36Sopenharmony_ci case PSCI_0_2_FN64_AFFINITY_INFO: 34462306a36Sopenharmony_ci case PSCI_0_2_FN_MIGRATE_INFO_TYPE: 34562306a36Sopenharmony_ci case PSCI_0_2_FN_SYSTEM_OFF: 34662306a36Sopenharmony_ci case PSCI_0_2_FN_SYSTEM_RESET: 34762306a36Sopenharmony_ci case PSCI_1_0_FN_PSCI_FEATURES: 34862306a36Sopenharmony_ci case ARM_SMCCC_VERSION_FUNC_ID: 34962306a36Sopenharmony_ci val = 0; 35062306a36Sopenharmony_ci break; 35162306a36Sopenharmony_ci case PSCI_1_0_FN_SYSTEM_SUSPEND: 35262306a36Sopenharmony_ci case PSCI_1_0_FN64_SYSTEM_SUSPEND: 35362306a36Sopenharmony_ci if (test_bit(KVM_ARCH_FLAG_SYSTEM_SUSPEND_ENABLED, &kvm->arch.flags)) 35462306a36Sopenharmony_ci val = 0; 35562306a36Sopenharmony_ci break; 35662306a36Sopenharmony_ci case PSCI_1_1_FN_SYSTEM_RESET2: 35762306a36Sopenharmony_ci case PSCI_1_1_FN64_SYSTEM_RESET2: 35862306a36Sopenharmony_ci if (minor >= 1) 35962306a36Sopenharmony_ci val = 0; 36062306a36Sopenharmony_ci break; 36162306a36Sopenharmony_ci } 36262306a36Sopenharmony_ci break; 36362306a36Sopenharmony_ci case PSCI_1_0_FN_SYSTEM_SUSPEND: 36462306a36Sopenharmony_ci kvm_psci_narrow_to_32bit(vcpu); 36562306a36Sopenharmony_ci fallthrough; 36662306a36Sopenharmony_ci case PSCI_1_0_FN64_SYSTEM_SUSPEND: 36762306a36Sopenharmony_ci /* 36862306a36Sopenharmony_ci * Return directly to userspace without changing the vCPU's 36962306a36Sopenharmony_ci * registers. Userspace depends on reading the SMCCC parameters 37062306a36Sopenharmony_ci * to implement SYSTEM_SUSPEND. 37162306a36Sopenharmony_ci */ 37262306a36Sopenharmony_ci if (test_bit(KVM_ARCH_FLAG_SYSTEM_SUSPEND_ENABLED, &kvm->arch.flags)) { 37362306a36Sopenharmony_ci kvm_psci_system_suspend(vcpu); 37462306a36Sopenharmony_ci return 0; 37562306a36Sopenharmony_ci } 37662306a36Sopenharmony_ci break; 37762306a36Sopenharmony_ci case PSCI_1_1_FN_SYSTEM_RESET2: 37862306a36Sopenharmony_ci kvm_psci_narrow_to_32bit(vcpu); 37962306a36Sopenharmony_ci fallthrough; 38062306a36Sopenharmony_ci case PSCI_1_1_FN64_SYSTEM_RESET2: 38162306a36Sopenharmony_ci if (minor >= 1) { 38262306a36Sopenharmony_ci arg = smccc_get_arg1(vcpu); 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_ci if (arg <= PSCI_1_1_RESET_TYPE_SYSTEM_WARM_RESET || 38562306a36Sopenharmony_ci arg >= PSCI_1_1_RESET_TYPE_VENDOR_START) { 38662306a36Sopenharmony_ci kvm_psci_system_reset2(vcpu); 38762306a36Sopenharmony_ci vcpu_set_reg(vcpu, 0, PSCI_RET_INTERNAL_FAILURE); 38862306a36Sopenharmony_ci return 0; 38962306a36Sopenharmony_ci } 39062306a36Sopenharmony_ci 39162306a36Sopenharmony_ci val = PSCI_RET_INVALID_PARAMS; 39262306a36Sopenharmony_ci break; 39362306a36Sopenharmony_ci } 39462306a36Sopenharmony_ci break; 39562306a36Sopenharmony_ci default: 39662306a36Sopenharmony_ci return kvm_psci_0_2_call(vcpu); 39762306a36Sopenharmony_ci } 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_ci smccc_set_retval(vcpu, val, 0, 0, 0); 40062306a36Sopenharmony_ci return ret; 40162306a36Sopenharmony_ci} 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_cistatic int kvm_psci_0_1_call(struct kvm_vcpu *vcpu) 40462306a36Sopenharmony_ci{ 40562306a36Sopenharmony_ci u32 psci_fn = smccc_get_function(vcpu); 40662306a36Sopenharmony_ci unsigned long val; 40762306a36Sopenharmony_ci 40862306a36Sopenharmony_ci switch (psci_fn) { 40962306a36Sopenharmony_ci case KVM_PSCI_FN_CPU_OFF: 41062306a36Sopenharmony_ci kvm_arm_vcpu_power_off(vcpu); 41162306a36Sopenharmony_ci val = PSCI_RET_SUCCESS; 41262306a36Sopenharmony_ci break; 41362306a36Sopenharmony_ci case KVM_PSCI_FN_CPU_ON: 41462306a36Sopenharmony_ci val = kvm_psci_vcpu_on(vcpu); 41562306a36Sopenharmony_ci break; 41662306a36Sopenharmony_ci default: 41762306a36Sopenharmony_ci val = PSCI_RET_NOT_SUPPORTED; 41862306a36Sopenharmony_ci break; 41962306a36Sopenharmony_ci } 42062306a36Sopenharmony_ci 42162306a36Sopenharmony_ci smccc_set_retval(vcpu, val, 0, 0, 0); 42262306a36Sopenharmony_ci return 1; 42362306a36Sopenharmony_ci} 42462306a36Sopenharmony_ci 42562306a36Sopenharmony_ci/** 42662306a36Sopenharmony_ci * kvm_psci_call - handle PSCI call if r0 value is in range 42762306a36Sopenharmony_ci * @vcpu: Pointer to the VCPU struct 42862306a36Sopenharmony_ci * 42962306a36Sopenharmony_ci * Handle PSCI calls from guests through traps from HVC instructions. 43062306a36Sopenharmony_ci * The calling convention is similar to SMC calls to the secure world 43162306a36Sopenharmony_ci * where the function number is placed in r0. 43262306a36Sopenharmony_ci * 43362306a36Sopenharmony_ci * This function returns: > 0 (success), 0 (success but exit to user 43462306a36Sopenharmony_ci * space), and < 0 (errors) 43562306a36Sopenharmony_ci * 43662306a36Sopenharmony_ci * Errors: 43762306a36Sopenharmony_ci * -EINVAL: Unrecognized PSCI function 43862306a36Sopenharmony_ci */ 43962306a36Sopenharmony_ciint kvm_psci_call(struct kvm_vcpu *vcpu) 44062306a36Sopenharmony_ci{ 44162306a36Sopenharmony_ci u32 psci_fn = smccc_get_function(vcpu); 44262306a36Sopenharmony_ci int version = kvm_psci_version(vcpu); 44362306a36Sopenharmony_ci unsigned long val; 44462306a36Sopenharmony_ci 44562306a36Sopenharmony_ci val = kvm_psci_check_allowed_function(vcpu, psci_fn); 44662306a36Sopenharmony_ci if (val) { 44762306a36Sopenharmony_ci smccc_set_retval(vcpu, val, 0, 0, 0); 44862306a36Sopenharmony_ci return 1; 44962306a36Sopenharmony_ci } 45062306a36Sopenharmony_ci 45162306a36Sopenharmony_ci switch (version) { 45262306a36Sopenharmony_ci case KVM_ARM_PSCI_1_1: 45362306a36Sopenharmony_ci return kvm_psci_1_x_call(vcpu, 1); 45462306a36Sopenharmony_ci case KVM_ARM_PSCI_1_0: 45562306a36Sopenharmony_ci return kvm_psci_1_x_call(vcpu, 0); 45662306a36Sopenharmony_ci case KVM_ARM_PSCI_0_2: 45762306a36Sopenharmony_ci return kvm_psci_0_2_call(vcpu); 45862306a36Sopenharmony_ci case KVM_ARM_PSCI_0_1: 45962306a36Sopenharmony_ci return kvm_psci_0_1_call(vcpu); 46062306a36Sopenharmony_ci default: 46162306a36Sopenharmony_ci WARN_ONCE(1, "Unknown PSCI version %d", version); 46262306a36Sopenharmony_ci smccc_set_retval(vcpu, SMCCC_RET_NOT_SUPPORTED, 0, 0, 0); 46362306a36Sopenharmony_ci return 1; 46462306a36Sopenharmony_ci } 46562306a36Sopenharmony_ci} 466