Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2642720yba; Mon, 8 Apr 2019 01:15:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqwe5wsmbBG9fF8XiSm6fu2qURDm8yIHMX+ci3E/MiVVyC1HABK71d2WGyq/Q63o4sg0nudJ X-Received: by 2002:a63:e850:: with SMTP id a16mr25909276pgk.195.1554711324468; Mon, 08 Apr 2019 01:15:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554711324; cv=none; d=google.com; s=arc-20160816; b=s5rlI7urlsjr3wGmaTXfxWIq8/KTsYpDDnQctXBlrMa5g/M6/7c9qcBnKILrljGg0J I8S/sW2hZFJjmjWSUuvqN5j9cqvR++pbR1CJmtGD454EXEWu/v1b1m/tLoNxdiUGB3AT vtco02B7CZ17hWjD5kd2JXs+D+JasngEOPFc4rGyKPIMXXhtLj9o9NKhAe1Vb1ORxLi9 2ATUpvwttQ4K1PZhxLH3rRYKG3uWih2wlr+tOFhZMUvCJUFo65ZT3VQApmr0NgBqTXO0 PbciJ14RWCuNK2Dm3Y8Ez9kDZAWfK0qnfybq+Er237R6kqDEP73JiLGV+W3K857fR0L7 Iy9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=qjECzZwMjsfQ5MvkELVTGbR0OvxyEZF4rLackTFf014=; b=SF9IB/5Gy0Q6RLnqbkc0HW/sJxgYZ3TvEU0s9Fd/8s6bcCWfzQ3m4Q35Bv3BhCdbCz JscCl65UYojCREmBpW+T9LkLzWIH+ZDIgt8t+Lp2vebQ7WHYC55zylG2A9yA1v8jA1/x nPJJiw9C//TS7C8pjc72+CXXQ/eK6DmzIJXZ5DoEQRxRnuZi3ot6E1KbD2Bi25OBWzAl yI+EtM19fx9OT01IUl6oQoyHZTy8CCMc8OLd88EUu3nnWJEZMxpT8tpj+Gk55Yqp43kO RJ6VKK0i1rjS0tCMSQMRj192fnrXsVegQ/yMIw4iGYmTcUqH9fuRBe+FZzRBZI8DYB3y wZFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w12si12288980pgr.412.2019.04.08.01.15.09; Mon, 08 Apr 2019 01:15:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726706AbfDHIOU (ORCPT + 99 others); Mon, 8 Apr 2019 04:14:20 -0400 Received: from mga01.intel.com ([192.55.52.88]:12779 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726595AbfDHIOH (ORCPT ); Mon, 8 Apr 2019 04:14:07 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Apr 2019 01:14:07 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,324,1549958400"; d="scan'208";a="147424259" Received: from genxtest-ykzhao.sh.intel.com ([10.239.143.71]) by FMSMGA003.fm.intel.com with ESMTP; 08 Apr 2019 01:14:06 -0700 From: Zhao Yakui To: linux-kernel@vger.kernel.org Cc: x86@kernel.org, tglx@linutronix.de, Zhao Yakui , Jason Chen CJ Subject: [RFC PATCH v3 2/4] x86: Add the support of ACRN guest Date: Mon, 8 Apr 2019 16:12:09 +0800 Message-Id: <1554711131-21514-3-git-send-email-yakui.zhao@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1554711131-21514-1-git-send-email-yakui.zhao@intel.com> References: <1554711131-21514-1-git-send-email-yakui.zhao@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ACRN is an open-source hypervisor maintained by Linuxfoundation. This is to add the Linux guest support on acrn-hypervisor. Add x86_hyper_acrn into supported hypervisors array, which enables Linux ACRN guest running on ACRN hypervisor. It is restricted to X86_64. Co-developed-by: Jason Chen CJ Signed-off-by: Jason Chen CJ Signed-off-by: Zhao Yakui --- v1->v2: Change the CONFIG_ACRN to CONFIG_ACRN_GUEST, which makes it easy to understand. Remove the export of x86_hyper_acrn. v2->v3: Remove the unnecessary dependency of PARAVIRT --- arch/x86/Kconfig | 8 ++++++++ arch/x86/include/asm/hypervisor.h | 1 + arch/x86/kernel/cpu/Makefile | 1 + arch/x86/kernel/cpu/acrn.c | 35 +++++++++++++++++++++++++++++++++++ arch/x86/kernel/cpu/hypervisor.c | 4 ++++ 5 files changed, 49 insertions(+) create mode 100644 arch/x86/kernel/cpu/acrn.c diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 54d1fbc..d77d215 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -845,6 +845,14 @@ config JAILHOUSE_GUEST cell. You can leave this option disabled if you only want to start Jailhouse and run Linux afterwards in the root cell. +config ACRN_GUEST + bool "ACRN Guest support" + depends on X86_64 + help + This option allows to run Linux as guest in ACRN hypervisor. Enabling + this will allow the kernel to boot in virtualized environment under + the ACRN hypervisor. + endif #HYPERVISOR_GUEST source "arch/x86/Kconfig.cpu" diff --git a/arch/x86/include/asm/hypervisor.h b/arch/x86/include/asm/hypervisor.h index 8c5aaba..50a30f6 100644 --- a/arch/x86/include/asm/hypervisor.h +++ b/arch/x86/include/asm/hypervisor.h @@ -29,6 +29,7 @@ enum x86_hypervisor_type { X86_HYPER_XEN_HVM, X86_HYPER_KVM, X86_HYPER_JAILHOUSE, + X86_HYPER_ACRN, }; #ifdef CONFIG_HYPERVISOR_GUEST diff --git a/arch/x86/kernel/cpu/Makefile b/arch/x86/kernel/cpu/Makefile index cfd24f9..17a7cdf 100644 --- a/arch/x86/kernel/cpu/Makefile +++ b/arch/x86/kernel/cpu/Makefile @@ -44,6 +44,7 @@ obj-$(CONFIG_X86_CPU_RESCTRL) += resctrl/ obj-$(CONFIG_X86_LOCAL_APIC) += perfctr-watchdog.o obj-$(CONFIG_HYPERVISOR_GUEST) += vmware.o hypervisor.o mshyperv.o +obj-$(CONFIG_ACRN_GUEST) += acrn.o ifdef CONFIG_X86_FEATURE_NAMES quiet_cmd_mkcapflags = MKCAP $@ diff --git a/arch/x86/kernel/cpu/acrn.c b/arch/x86/kernel/cpu/acrn.c new file mode 100644 index 0000000..3956567 --- /dev/null +++ b/arch/x86/kernel/cpu/acrn.c @@ -0,0 +1,35 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * ACRN detection support + * + * Copyright (C) 2019 Intel Corporation. All rights reserved. + * + * Jason Chen CJ + * Zhao Yakui + * + */ + +#include + +static uint32_t __init acrn_detect(void) +{ + return hypervisor_cpuid_base("ACRNACRNACRN\0\0", 0); +} + +static void __init acrn_init_platform(void) +{ +} + +static bool acrn_x2apic_available(void) +{ + /* do not support x2apic */ + return false; +} + +const __initconst struct hypervisor_x86 x86_hyper_acrn = { + .name = "ACRN", + .detect = acrn_detect, + .type = X86_HYPER_ACRN, + .init.init_platform = acrn_init_platform, + .init.x2apic_available = acrn_x2apic_available, +}; diff --git a/arch/x86/kernel/cpu/hypervisor.c b/arch/x86/kernel/cpu/hypervisor.c index 479ca47..87e39ad 100644 --- a/arch/x86/kernel/cpu/hypervisor.c +++ b/arch/x86/kernel/cpu/hypervisor.c @@ -32,6 +32,7 @@ extern const struct hypervisor_x86 x86_hyper_xen_pv; extern const struct hypervisor_x86 x86_hyper_xen_hvm; extern const struct hypervisor_x86 x86_hyper_kvm; extern const struct hypervisor_x86 x86_hyper_jailhouse; +extern const struct hypervisor_x86 x86_hyper_acrn; static const __initconst struct hypervisor_x86 * const hypervisors[] = { @@ -49,6 +50,9 @@ static const __initconst struct hypervisor_x86 * const hypervisors[] = #ifdef CONFIG_JAILHOUSE_GUEST &x86_hyper_jailhouse, #endif +#ifdef CONFIG_ACRN_GUEST + &x86_hyper_acrn, +#endif }; enum x86_hypervisor_type x86_hyper_type; -- 2.7.4