Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2642891yba; Mon, 8 Apr 2019 01:15:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqzXwLmbRYwyg6QyYNUFlho74O/77+w1WEDUpZX2q6XRAkURwz62Isc3oowF9jev/vpUmhmL X-Received: by 2002:a17:902:d24:: with SMTP id 33mr29515198plu.246.1554711340632; Mon, 08 Apr 2019 01:15:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554711340; cv=none; d=google.com; s=arc-20160816; b=PZCShzJdgonNB222iM9PpS/N4DtGb9DJTgwrbzO2qrLCEyIDtpCESxs0mH6N0dmzE2 NWU82us+MTpSBa/VqAmKWGB3naAF3bpl8kXnyCbv9UnKsN71BlHPDA8KBYdCp8WdQCEa 6QhQzD3jiL1N0lKu/ACwMFos/Ki4MIMvdSx6dkEWEvHBMdWmes0+d0EZhZiXVAKkmonJ HI3cnsV1zu2KxbzoIQRAQjWy/mDDbjsrUjysuK7B+ngKecNTDbm0zQ8A+ekrUGC2W9Ks 9z2iRizK5sonNijyWrNPQnHNWkZHOGnzbuS0skvacq++hQTzxpCgbhCrbwOLahUhtUku mInQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=HhRXZ1vccRVuVoRu671XggBaVwLFE13opQ3YJ3XmZLo=; b=XfJi4VX1qMZ0ijxsblNLfdzCvtAmRM2b1Be2AwPUrwwI2Q3lGWCfmVRlsjouHKfgqU zRkoGPeqP+ocMgFjELM+7fM2mco/cubfelI3jZ6Bro7cwIununCCvZfEPgyJRL1+Fzgk vndJ6E5Q6hCJq1qREGymwNHhHJkuaH5PmooeNTMSET2o8L2T9ToIdC44Y2eVFmroM0JQ doyja+3A6HXB5omyFNIEYi9NKX/OdyoFXkfSG7ykNI4P/iRSS13+XDwkh9gSoA5oQWoM igh5skZrFzpmkbhx3z1/8N0fnGU2HZNj/e8OQXr4bgkAq0UGUXTzbTbY6b7JWB+5vLYP JkjA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k18si26345174pgb.351.2019.04.08.01.15.25; Mon, 08 Apr 2019 01:15:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726685AbfDHIOT (ORCPT + 99 others); Mon, 8 Apr 2019 04:14:19 -0400 Received: from mga01.intel.com ([192.55.52.88]:12779 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726615AbfDHIOI (ORCPT ); Mon, 8 Apr 2019 04:14:08 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Apr 2019 01:14:08 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,324,1549958400"; d="scan'208";a="147424268" Received: from genxtest-ykzhao.sh.intel.com ([10.239.143.71]) by FMSMGA003.fm.intel.com with ESMTP; 08 Apr 2019 01:14:07 -0700 From: Zhao Yakui To: linux-kernel@vger.kernel.org Cc: x86@kernel.org, tglx@linutronix.de, Zhao Yakui , Jason Chen CJ Subject: [RFC PATCH v3 3/4] x86: Use HYPERVISOR_CALLBACK_VECTOR for acrn_guest upcall vector Date: Mon, 8 Apr 2019 16:12:10 +0800 Message-Id: <1554711131-21514-4-git-send-email-yakui.zhao@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1554711131-21514-1-git-send-email-yakui.zhao@intel.com> References: <1554711131-21514-1-git-send-email-yakui.zhao@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Linux kernel uses the HYPERVISOR_CALLBACK_VECTOR for hypervisor upcall vector. And it is already used for Xen and HyperV. After Acrn hypervisor is detected, it will also use this defined vector to notify kernel. Co-developed-by: Jason Chen CJ Signed-off-by: Jason Chen CJ Signed-off-by: Zhao Yakui --- V1->V2: Remove the unused API definition of acrn_setup_intr_handler and acrn_remove_intr_handler. Adjust the order of header file Add the declaration of acrn_hv_vector_handler and tracing definition of acrn_hv_callback_vector. --- arch/x86/Kconfig | 1 + arch/x86/entry/entry_64.S | 5 +++++ arch/x86/include/asm/acrnhyper.h | 19 +++++++++++++++++++ arch/x86/kernel/cpu/acrn.c | 22 ++++++++++++++++++++++ 4 files changed, 47 insertions(+) create mode 100644 arch/x86/include/asm/acrnhyper.h diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index d77d215..ae4d38b 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -848,6 +848,7 @@ config JAILHOUSE_GUEST config ACRN_GUEST bool "ACRN Guest support" depends on X86_64 + select X86_HV_CALLBACK_VECTOR help This option allows to run Linux as guest in ACRN hypervisor. Enabling this will allow the kernel to boot in virtualized environment under diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S index 1f0efdb..d1b8ad3 100644 --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -1129,6 +1129,11 @@ apicinterrupt3 HYPERV_STIMER0_VECTOR \ hv_stimer0_callback_vector hv_stimer0_vector_handler #endif /* CONFIG_HYPERV */ +#if IS_ENABLED(CONFIG_ACRN_GUEST) +apicinterrupt3 HYPERVISOR_CALLBACK_VECTOR \ + acrn_hv_callback_vector acrn_hv_vector_handler +#endif + idtentry debug do_debug has_error_code=0 paranoid=1 shift_ist=DEBUG_STACK idtentry int3 do_int3 has_error_code=0 idtentry stack_segment do_stack_segment has_error_code=1 diff --git a/arch/x86/include/asm/acrnhyper.h b/arch/x86/include/asm/acrnhyper.h new file mode 100644 index 0000000..9f9c239 --- /dev/null +++ b/arch/x86/include/asm/acrnhyper.h @@ -0,0 +1,19 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#ifndef _ASM_X86_ACRNHYPER_H +#define _ASM_X86_ACRNHYPER_H + +#include +#include +#include +#include + +#ifdef CONFIG_ACRN_GUEST +void acrn_hv_callback_vector(void); +#ifdef CONFIG_TRACING +#define trace_acrn_hv_callback_vector acrn_hv_callback_vector +#endif + +void acrn_hv_vector_handler(struct pt_regs *regs); +#endif + +#endif diff --git a/arch/x86/kernel/cpu/acrn.c b/arch/x86/kernel/cpu/acrn.c index 3956567..7a233b5 100644 --- a/arch/x86/kernel/cpu/acrn.c +++ b/arch/x86/kernel/cpu/acrn.c @@ -9,7 +9,11 @@ * */ +#include #include +#include +#include +#include static uint32_t __init acrn_detect(void) { @@ -18,6 +22,8 @@ static uint32_t __init acrn_detect(void) static void __init acrn_init_platform(void) { + alloc_intr_gate(HYPERVISOR_CALLBACK_VECTOR, + acrn_hv_callback_vector); } static bool acrn_x2apic_available(void) @@ -26,6 +32,22 @@ static bool acrn_x2apic_available(void) return false; } +static void (*acrn_intr_handler)(void); + +__visible void __irq_entry acrn_hv_vector_handler(struct pt_regs *regs) +{ + struct pt_regs *old_regs = set_irq_regs(regs); + + entering_ack_irq(); + inc_irq_stat(irq_hv_callback_count); + + if (acrn_intr_handler) + acrn_intr_handler(); + + exiting_irq(); + set_irq_regs(old_regs); +} + const __initconst struct hypervisor_x86 x86_hyper_acrn = { .name = "ACRN", .detect = acrn_detect, -- 2.7.4