| // SPDX-License-Identifier: GPL-2.0 |
| // Copyright (C) 2019 Arm Ltd. |
| |
| #include <linux/arm-smccc.h> |
| #include <linux/kvm_host.h> |
| |
| #include <asm/kvm_emulate.h> |
| |
| #include <kvm/arm_hypercalls.h> |
| #include <kvm/arm_psci.h> |
| |
| int kvm_hvc_call_handler(struct kvm_vcpu *vcpu) |
| { |
| u32 func_id = smccc_get_function(vcpu); |
| long val = SMCCC_RET_NOT_SUPPORTED; |
| u32 feature; |
| gpa_t gpa; |
| |
| switch (func_id) { |
| case ARM_SMCCC_VERSION_FUNC_ID: |
| val = ARM_SMCCC_VERSION_1_1; |
| break; |
| case ARM_SMCCC_ARCH_FEATURES_FUNC_ID: |
| feature = smccc_get_arg1(vcpu); |
| switch (feature) { |
| case ARM_SMCCC_ARCH_WORKAROUND_1: |
| switch (arm64_get_spectre_v2_state()) { |
| case SPECTRE_VULNERABLE: |
| break; |
| case SPECTRE_MITIGATED: |
| val = SMCCC_RET_SUCCESS; |
| break; |
| case SPECTRE_UNAFFECTED: |
| val = SMCCC_RET_NOT_REQUIRED; |
| break; |
| } |
| break; |
| case ARM_SMCCC_ARCH_WORKAROUND_2: |
| switch (arm64_get_spectre_v4_state()) { |
| case SPECTRE_VULNERABLE: |
| break; |
| case SPECTRE_MITIGATED: |
| /* |
| * SSBS everywhere: Indicate no firmware |
| * support, as the SSBS support will be |
| * indicated to the guest and the default is |
| * safe. |
| * |
| * Otherwise, expose a permanent mitigation |
| * to the guest, and hide SSBS so that the |
| * guest stays protected. |
| */ |
| if (cpus_have_final_cap(ARM64_SSBS)) |
| break; |
| fallthrough; |
| case SPECTRE_UNAFFECTED: |
| val = SMCCC_RET_NOT_REQUIRED; |
| break; |
| } |
| break; |
| case ARM_SMCCC_HV_PV_TIME_FEATURES: |
| val = SMCCC_RET_SUCCESS; |
| break; |
| } |
| break; |
| case ARM_SMCCC_HV_PV_TIME_FEATURES: |
| val = kvm_hypercall_pv_features(vcpu); |
| break; |
| case ARM_SMCCC_HV_PV_TIME_ST: |
| gpa = kvm_init_stolen_time(vcpu); |
| if (gpa != GPA_INVALID) |
| val = gpa; |
| break; |
| default: |
| return kvm_psci_call(vcpu); |
| } |
| |
| smccc_set_retval(vcpu, val, 0, 0, 0); |
| return 1; |
| } |