Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2643378yba; Mon, 8 Apr 2019 01:16:23 -0700 (PDT) X-Google-Smtp-Source: APXvYqw0SaYkeO1M13XYzcxvAZMRgIvncEWlqFQJ2JXoGTg9VjnEsdfGe+0iYiXzJ3qCsYoggezR X-Received: by 2002:a17:902:1124:: with SMTP id d33mr4464138pla.268.1554711382974; Mon, 08 Apr 2019 01:16:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554711382; cv=none; d=google.com; s=arc-20160816; b=InzLV0qgADLP4tPRVGrrs+Wca5gu9eu36I6B+W3EJm8usyoaq5HYy3rHsdV7RrxZj8 Ro3gXLJXlnFJD5Mj2HlQyoZJUci6tjYSN/TIdDB6867BRzv7Nz/Rxck6rp3A876/4U2Y m8Ysi3YDw/L6ySvr4OkWn9uA+DV1CeLoFyu45wTZfXloKpAph0X8/4FjFhxojmpj3anP HqUE0iXRpJui4W793tWD4DS4pX6RgFUBdybhpMqmmU7NxcAWliAQCjPFgVC5jr7hrkjT QKr4xLob0B6c9qR+iM5CaWvXxf8ZJHYRHVXY0+Az0GgNZzZ46CEa8cCQLiO+C3GHwTLS ZC5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=G5IoMvejMfvarsnBCMy/KY188LyvqlnMCu+iLJDec7c=; b=vbSllOMwSe320adp7z7Z/aNJVybhUJIDn2IdBoqjdgUaAEsmrSK/sD3E3Uoayjpt7h Bgx/AcjQ8atoTX3dEmHS+d9czAeEEGtx55RGDGPOa4q7+6rM/w8tFleSn15zmDUULlby y6jymqH5VbKH09e3ZuSQZY8YfHSidqcTu5SnYEhg5ZcPbgfUtYzdJZPn5kHTZ9f5jci8 iWTuZCpF2OigoGvTFgY9kC1CGko21qeiPG5n2upvFzpl64Achp5LK9Xu9BM/HzY70WTS wiynRPfAsaGJ300900p2QVrY6tYykTRU4tLfMkrkM/M1IN0m+o5s2S4gEpiQ34sgGdR7 NKSA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 31si2070011plz.116.2019.04.08.01.16.08; Mon, 08 Apr 2019 01:16:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726640AbfDHIOM (ORCPT + 99 others); Mon, 8 Apr 2019 04:14:12 -0400 Received: from mga01.intel.com ([192.55.52.88]:12779 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725877AbfDHIOJ (ORCPT ); Mon, 8 Apr 2019 04:14:09 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Apr 2019 01:14:09 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,324,1549958400"; d="scan'208";a="147424274" Received: from genxtest-ykzhao.sh.intel.com ([10.239.143.71]) by FMSMGA003.fm.intel.com with ESMTP; 08 Apr 2019 01:14:08 -0700 From: Zhao Yakui To: linux-kernel@vger.kernel.org Cc: x86@kernel.org, tglx@linutronix.de, Zhao Yakui , Jason Chen CJ Subject: [RFC PATCH v3 4/4] x86: Add hypercall for acrn_guest Date: Mon, 8 Apr 2019 16:12:11 +0800 Message-Id: <1554711131-21514-5-git-send-email-yakui.zhao@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1554711131-21514-1-git-send-email-yakui.zhao@intel.com> References: <1554711131-21514-1-git-send-email-yakui.zhao@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When acrn_hypervisor is detected, the hypercall is needed so that the acrn guest can query/config some settings. For example: it can be used to query the resources in hypervisor and manage the CPU/memory/device/ interrupt for Guest system. So the hypercall is added so that the kernel can communicate with the low-level acrn-hypervisor. On x86 it is implemented by using vmacll when the acrn hypervisor is enabled. Co-developed-by: Jason Chen CJ Signed-off-by: Jason Chen CJ Signed-off-by: Zhao Yakui --- V1->V2: Refine the comments for the function of acrn_hypercall0/1/2 v2->v3: Use the "vmcall" mnemonic to replace hard-code byte definition --- arch/x86/include/asm/acrn_hypercall.h | 82 +++++++++++++++++++++++++++++++++++ 1 file changed, 82 insertions(+) create mode 100644 arch/x86/include/asm/acrn_hypercall.h diff --git a/arch/x86/include/asm/acrn_hypercall.h b/arch/x86/include/asm/acrn_hypercall.h new file mode 100644 index 0000000..82c1577 --- /dev/null +++ b/arch/x86/include/asm/acrn_hypercall.h @@ -0,0 +1,82 @@ +/* SPDX-License-Identifier: GPL-2.0 */ + +#ifndef _ASM_X86_ACRNHYPERCALL_H +#define _ASM_X86_ACRNHYPERCALL_H + +#include + +#ifdef CONFIG_ACRN_GUEST + +/* + * Hypercalls for ACRN Guest + * + * Hypercall number is passed in r8 register. + * Return value will be placed in rax. + * Up to 2 arguments are passed in rdi, rsi. + */ + +static inline long acrn_hypercall0(unsigned long hcall_id) +{ + register unsigned long r8 asm("r8") = hcall_id; + register long result asm("rax"); + + /* vmcall is used to implment the hypercall. + * asm volatile is used to avoid that it is dropped because of + * compiler optimization. + */ + asm volatile("vmcall" + : "=r"(result) + : "r"(r8)); + + return result; +} + +static inline long acrn_hypercall1(unsigned long hcall_id, + unsigned long param1) +{ + register unsigned long r8 asm("r8") = hcall_id; + register long result asm("rax"); + + asm volatile("vmcall" + : "=r"(result) + : "D"(param1), "r"(r8)); + + return result; +} + +static inline long acrn_hypercall2(unsigned long hcall_id, + unsigned long param1, + unsigned long param2) +{ + register unsigned long r8 asm("r8") = hcall_id; + register long result asm("rax"); + + asm volatile("vmcall" + : "=r"(result) + : "D"(param1), "S"(param2), "r"(r8)); + + return result; +} + +#else + +static inline long acrn_hypercall0(unsigned long hcall_id) +{ + return -ENOTSUPP; +} + +static inline long acrn_hypercall1(unsigned long hcall_id, + unsigned long param1) +{ + return -ENOTSUPP; +} + +static inline long acrn_hypercall2(unsigned long hcall_id, + unsigned long param1, + unsigned long param2) +{ + return -ENOTSUPP; +} +#endif + +#endif /* _ASM_X86_ACRNHYPERCALL_H */ -- 2.7.4