Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v6.16 166 lines 4.4 kB view raw
1/* SPDX-License-Identifier: GPL-2.0-only */ 2/* 3 * Copyright (C) 2012 ARM Ltd. 4 * Author: Marc Zyngier <marc.zyngier@arm.com> 5 */ 6 7#ifndef __ASM__VIRT_H 8#define __ASM__VIRT_H 9 10/* 11 * The arm64 hcall implementation uses x0 to specify the hcall 12 * number. A value less than HVC_STUB_HCALL_NR indicates a special 13 * hcall, such as set vector. Any other value is handled in a 14 * hypervisor specific way. 15 * 16 * The hypercall is allowed to clobber any of the caller-saved 17 * registers (x0-x18), so it is advisable to use it through the 18 * indirection of a function call (as implemented in hyp-stub.S). 19 */ 20 21/* 22 * HVC_SET_VECTORS - Set the value of the vbar_el2 register. 23 * 24 * @x1: Physical address of the new vector table. 25 */ 26#define HVC_SET_VECTORS 0 27 28/* 29 * HVC_SOFT_RESTART - CPU soft reset, used by the cpu_soft_restart routine. 30 */ 31#define HVC_SOFT_RESTART 1 32 33/* 34 * HVC_RESET_VECTORS - Restore the vectors to the original HYP stubs 35 */ 36#define HVC_RESET_VECTORS 2 37 38/* 39 * HVC_FINALISE_EL2 - Upgrade the CPU from EL1 to EL2, if possible 40 */ 41#define HVC_FINALISE_EL2 3 42 43/* Max number of HYP stub hypercalls */ 44#define HVC_STUB_HCALL_NR 4 45 46/* Error returned when an invalid stub number is passed into x0 */ 47#define HVC_STUB_ERR 0xbadca11 48 49#define BOOT_CPU_MODE_EL1 (0xe11) 50#define BOOT_CPU_MODE_EL2 (0xe12) 51 52/* 53 * Flags returned together with the boot mode, but not preserved in 54 * __boot_cpu_mode. Used by the idreg override code to work out the 55 * boot state. 56 */ 57#define BOOT_CPU_FLAG_E2H BIT_ULL(32) 58 59#ifndef __ASSEMBLY__ 60 61#include <asm/ptrace.h> 62#include <asm/sections.h> 63#include <asm/sysreg.h> 64#include <asm/cpufeature.h> 65 66/* 67 * __boot_cpu_mode records what mode CPUs were booted in. 68 * A correctly-implemented bootloader must start all CPUs in the same mode: 69 * In this case, both 32bit halves of __boot_cpu_mode will contain the 70 * same value (either BOOT_CPU_MODE_EL1 if booted in EL1, BOOT_CPU_MODE_EL2 if 71 * booted in EL2). 72 * 73 * Should the bootloader fail to do this, the two values will be different. 74 * This allows the kernel to flag an error when the secondaries have come up. 75 */ 76extern u32 __boot_cpu_mode[2]; 77 78#define ARM64_VECTOR_TABLE_LEN SZ_2K 79 80void __hyp_set_vectors(phys_addr_t phys_vector_base); 81void __hyp_reset_vectors(void); 82bool is_kvm_arm_initialised(void); 83 84DECLARE_STATIC_KEY_FALSE(kvm_protected_mode_initialized); 85 86static inline bool is_pkvm_initialized(void) 87{ 88 return IS_ENABLED(CONFIG_KVM) && 89 static_branch_likely(&kvm_protected_mode_initialized); 90} 91 92/* Reports the availability of HYP mode */ 93static inline bool is_hyp_mode_available(void) 94{ 95 /* 96 * If KVM protected mode is initialized, all CPUs must have been booted 97 * in EL2. Avoid checking __boot_cpu_mode as CPUs now come up in EL1. 98 */ 99 if (is_pkvm_initialized()) 100 return true; 101 102 return (__boot_cpu_mode[0] == BOOT_CPU_MODE_EL2 && 103 __boot_cpu_mode[1] == BOOT_CPU_MODE_EL2); 104} 105 106/* Check if the bootloader has booted CPUs in different modes */ 107static inline bool is_hyp_mode_mismatched(void) 108{ 109 /* 110 * If KVM protected mode is initialized, all CPUs must have been booted 111 * in EL2. Avoid checking __boot_cpu_mode as CPUs now come up in EL1. 112 */ 113 if (is_pkvm_initialized()) 114 return false; 115 116 return __boot_cpu_mode[0] != __boot_cpu_mode[1]; 117} 118 119static __always_inline bool is_kernel_in_hyp_mode(void) 120{ 121 BUILD_BUG_ON(__is_defined(__KVM_NVHE_HYPERVISOR__) || 122 __is_defined(__KVM_VHE_HYPERVISOR__)); 123 return read_sysreg(CurrentEL) == CurrentEL_EL2; 124} 125 126static __always_inline bool has_vhe(void) 127{ 128 /* 129 * Code only run in VHE/NVHE hyp context can assume VHE is present or 130 * absent. Otherwise fall back to caps. 131 * This allows the compiler to discard VHE-specific code from the 132 * nVHE object, reducing the number of external symbol references 133 * needed to link. 134 */ 135 if (is_vhe_hyp_code()) 136 return true; 137 else if (is_nvhe_hyp_code()) 138 return false; 139 else 140 return cpus_have_final_cap(ARM64_HAS_VIRT_HOST_EXTN); 141} 142 143static __always_inline bool is_protected_kvm_enabled(void) 144{ 145 if (is_vhe_hyp_code()) 146 return false; 147 else 148 return cpus_have_final_cap(ARM64_KVM_PROTECTED_MODE); 149} 150 151static __always_inline bool has_hvhe(void) 152{ 153 if (is_vhe_hyp_code()) 154 return false; 155 156 return cpus_have_final_cap(ARM64_KVM_HVHE); 157} 158 159static inline bool is_hyp_nvhe(void) 160{ 161 return is_hyp_mode_available() && !is_kernel_in_hyp_mode(); 162} 163 164#endif /* __ASSEMBLY__ */ 165 166#endif /* ! __ASM__VIRT_H */