On Tue, 01 Jun 2021 14:34:05 +0100, Dongjiu Geng gengdongjiu1@gmail.com wrote:
Marc Zyngier maz@kernel.org 于2021年6月1日周二 下午6:09写道:
On Tue, 01 Jun 2021 10:53:49 +0100, Dongjiu Geng gengdongjiu1@gmail.com wrote:
Mark Rutland mark.rutland@arm.com 于2021年6月1日周二 下午5:19写道:
On Fri, May 28, 2021 at 05:26:51PM +0800, Dongjiu Geng wrote:
Hi All, when Linux kernel boot from EL1, there is no method to let kernel to enter EL2 to enable hypervisor. so I want to add an SMC interface between kernel and EL3 ATF to let kernel can set the hypervisor vector table, then can enter EL2 to enable hypervisor, as shown in [1]. Do you agree? Otherwise there is no method to enter EL2 hypervisor when kernel boot from EL1, because the hypervisor vector table(vbar_el2) is unknown.
The kernel already supported being booted at EL2, where it will install itself as the hypervisor (and will drop to EL1 if required). EL2 is the preferred boot mode, as we document in:
https://www.kernel.org/doc/html/latest/arm64/booting.html
... where we say:
| The CPU must be in either EL2 (RECOMMENDED in order to have access to | the virtualisation extensions) or non-secure EL1.
We *strongly* prefer this over adding new ABIs to transition from EL1 to EL2. Please boot the kernel at EL2 if you want to use KVM.
Thanks for the answer. If use KVM, it should boot from EL2. But if the hypervisor is not KVM, such as Jailhouse hypervisor and some Chip manufacturer boot the host kernel from EL1(not follow above rule), it seems there is not way to enter the Jailhouse hypervisor.
We only deal with two cases:
either the kernel uses its own, built-in hypervisor: it boots at EL2, and installs itself.
or there is a pre-existing hypervisor, and the kernel boots at EL1.
In the past, Jailhouse used the exact same entry points as KVM. What has changed?
Jailhouse use the __hyp_stub_vectors vector table[1] in linux kernel arch/arm64/kernel/hyp-stub.S to re-set his own's hypervisor vector table, but if linux kernel is boot from EL1,it can not use the entry points(__hyp_stub_vectors). I agree Linux kernel is recommended boot from EL2, but some custer's boards not follow this rule.
So Jailhouse doesn't have this problem when used as intended.
ventry el2_sync_invalid // Synchronous EL2t ventry el2_irq_invalid // IRQ EL2t ventry el2_fiq_invalid // FIQ EL2t ventry el2_error_invalid // Error EL2t ventry el2_sync_invalid // Synchronous EL2h ventry el2_irq_invalid // IRQ EL2h ventry el2_fiq_invalid // FIQ EL2h ventry el2_error_invalid // Error EL2h ventry el1_sync // Synchronous 64-bit EL1 ventry el1_irq_invalid // IRQ 64-bit EL1 ventry el1_fiq_invalid // FIQ 64-bit EL1 ventry el1_error_invalid // Error 64-bit EL1 ventry el1_sync_invalid // Synchronous 32-bit EL1 ventry el1_irq_invalid // IRQ 32-bit EL1 ventry el1_fiq_invalid // FIQ 32-bit EL1 ventry el1_error_invalid // Error 32-bit EL1
ENDPROC(__hyp_stub_vectors)
Finally, if you can change the firmware to install the EL2 vectors, you can also change it to enter the kernel at EL2. I suggest you do that instead.
I agree with you, but needs to change customer‘s board, I will try to discuess with customer.
In both cases, you'll need to change your customer's firmware.
It seems to me that there is no reason for the arm64 boot protocol to change and adopt weird, wonderful and proprietary privilege escalation methods.
Thanks,
M.
tf-a@lists.trustedfirmware.org