From nobody Sun Feb 8 20:33:19 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 12D2213D639; Fri, 19 Apr 2024 22:40:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713566443; cv=none; b=E860/gD0bnVVZzsSnibgeAlcFs2hiFnOp+jbO1MuNVkmxXHARwOAEwlZz6p2P7elx67xwjEQ7UblIoHXz5nacnFGEE+e2Cto0GxswyRzTdcPwh5qyZpJbP4USBQPhprWBerLz0NW4Gzr3+MHujrmjjcnS1EDomI/ldRx/hrjHcU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713566443; c=relaxed/simple; bh=CLOSPTOvgCa1gghsKOluMZpqjOL84fE+IgjLYFTiloc=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=t0rOVsHILTITjz0KujELw3nuJqaj7HRkTFz/BoOzZJ/PZyDAuq55ZF5dR3blhtizgCtbcd/uTmLD/GPJwavoeUBNQcMCdsFw7bFF/hdpgnZLUexZv/ZUbpukhlI9I7bSUm+tci/Fp0XA4/qTw6hiAopDJXt+JIjPZhYttE6UFH0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=zx2c4.com header.i=@zx2c4.com header.b=keGV/MMs; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=zx2c4.com header.i=@zx2c4.com header.b="keGV/MMs" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 65D7FC116B1; Fri, 19 Apr 2024 22:40:41 +0000 (UTC) Authentication-Results: smtp.kernel.org; dkim=pass (1024-bit key) header.d=zx2c4.com header.i=@zx2c4.com header.b="keGV/MMs" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zx2c4.com; s=20210105; t=1713566440; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=r1N6bJmpLXPntAJnUgAgfuW02Wzo9jdJftZihclYhBg=; b=keGV/MMscXm++2gDXDfH7LnKkO9scwzdqrQM5xVDzkOALsrorvavAWCByBBqOL9GXpt4fb ZbCmh33zf8VBF1Ht5NcBjky1dxW9M5ZhgIEW6KJHZnHZcc6mJe35doa4isiG0ztw1hZCou 5UCPGosTnn5vJ9kyOtN7Nmjiypl/FB8= Received: by mail.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id 455959d4 (TLSv1.3:TLS_AES_256_GCM_SHA384:256:NO); Fri, 19 Apr 2024 22:40:39 +0000 (UTC) From: "Jason A. Donenfeld" To: tytso@mit.edu, robh@kernel.org, krzk@kernel.org, conor+dt@kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, sudanl@amazon.com, graf@amazon.com, dwmw@amazon.co.uk, krzysztof.kozlowski@linaro.org, bchalios@amazon.es Cc: "Jason A . Donenfeld" Subject: [PATCH v8 3/3] virt: vmgenid: add support for devicetree bindings Date: Sat, 20 Apr 2024 00:40:00 +0200 Message-ID: <20240419224020.780377-4-Jason@zx2c4.com> In-Reply-To: <20240419224020.780377-1-Jason@zx2c4.com> References: <20240419224020.780377-1-Jason@zx2c4.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Sudan Landge Extend the vmgenid platform driver to support devicetree bindings. With this support, hypervisors can send vmgenid notifications to the virtual machine without the need to enable ACPI. The bindings are located at: Documentation/devicetree/bindings/rng/microsoft,vmgenid.yaml Since this is no longer ACPI-dependent, remove the dependency from Kconfig and protect the ACPI code with a single ifdef. Signed-off-by: Sudan Landge Reviewed-by: Alexander Graf [Jason: - Small style cleanups and refactoring. - Re-work ACPI conditionalization. ] Signed-off-by: Jason A. Donenfeld --- drivers/virt/Kconfig | 1 - drivers/virt/vmgenid.c | 53 ++++++++++++++++++++++++++++++++++++++++-- 2 files changed, 51 insertions(+), 3 deletions(-) diff --git a/drivers/virt/Kconfig b/drivers/virt/Kconfig index 40129b6f0eca..d8c848cf09a6 100644 --- a/drivers/virt/Kconfig +++ b/drivers/virt/Kconfig @@ -16,7 +16,6 @@ if VIRT_DRIVERS config VMGENID tristate "Virtual Machine Generation ID driver" default y - depends on ACPI help Say Y here to use the hypervisor-provided Virtual Machine Generation ID to reseed the RNG when the VM is cloned. This is highly recommended if diff --git a/drivers/virt/vmgenid.c b/drivers/virt/vmgenid.c index 0522107f9bee..66135eac3abf 100644 --- a/drivers/virt/vmgenid.c +++ b/drivers/virt/vmgenid.c @@ -2,12 +2,13 @@ /* * Copyright (C) 2022 Jason A. Donenfeld . All Rights Res= erved. * - * The "Virtual Machine Generation ID" is exposed via ACPI and changes whe= n a + * The "Virtual Machine Generation ID" is exposed via ACPI or DT and chang= es when a * virtual machine forks or is cloned. This driver exists for shepherding = that * information to random.c. */ =20 #include +#include #include #include #include @@ -41,6 +42,7 @@ static void setup_vmgenid_state(struct vmgenid_state *sta= te, void *virt_addr) add_device_randomness(state->this_id, sizeof(state->this_id)); } =20 +#ifdef CONFIG_ACPI static void vmgenid_acpi_handler(acpi_handle __always_unused handle, u32 __always_unused event, void *dev) { @@ -92,6 +94,43 @@ static int vmgenid_add_acpi(struct device *dev, struct v= mgenid_state *state) ACPI_FREE(parsed.pointer); return ret; } +#else +static int vmgenid_add_acpi(struct device *dev, struct vmgenid_state *stat= e) +{ + return -EINVAL; +} +#endif + +static irqreturn_t vmgenid_of_irq_handler(int __always_unused irq, void *d= ev) +{ + vmgenid_notify(dev); + return IRQ_HANDLED; +} + +static int vmgenid_add_of(struct platform_device *pdev, + struct vmgenid_state *state) +{ + void *virt_addr; + int ret; + + virt_addr =3D devm_platform_get_and_ioremap_resource(pdev, 0, NULL); + if (IS_ERR(virt_addr)) + return PTR_ERR(virt_addr); + + setup_vmgenid_state(state, virt_addr); + + ret =3D platform_get_irq(pdev, 0); + if (ret < 0) + return ret; + + ret =3D devm_request_irq(&pdev->dev, ret, vmgenid_of_irq_handler, + IRQF_SHARED, "vmgenid", &pdev->dev); + if (ret < 0) + return ret; + + pdev->dev.driver_data =3D state; + return 0; +} =20 static int vmgenid_add(struct platform_device *pdev) { @@ -103,13 +142,22 @@ static int vmgenid_add(struct platform_device *pdev) if (!state) return -ENOMEM; =20 - ret =3D vmgenid_add_acpi(dev, state); + if (dev->of_node) + ret =3D vmgenid_add_of(pdev, state); + else + ret =3D vmgenid_add_acpi(dev, state); =20 if (ret < 0) devm_kfree(dev, state); return ret; } =20 +static const struct of_device_id vmgenid_of_ids[] =3D { + { .compatible =3D "microsoft,vmgenid", }, + { }, +}; +MODULE_DEVICE_TABLE(of, vmgenid_of_ids); + static const struct acpi_device_id vmgenid_acpi_ids[] =3D { { "VMGENCTR", 0 }, { "VM_GEN_COUNTER", 0 }, @@ -122,6 +170,7 @@ static struct platform_driver vmgenid_plaform_driver = =3D { .driver =3D { .name =3D "vmgenid", .acpi_match_table =3D vmgenid_acpi_ids, + .of_match_table =3D vmgenid_of_ids, }, }; =20 --=20 2.44.0