Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1730522yba; Sun, 14 Apr 2019 19:05:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqxpOzcSGPx+ms8IZ7UU8vIdzJYtnTfyhcoSarDjR/c0sxED3JA0oG32fgi4InOaqM3hjkZ1 X-Received: by 2002:a63:6fcd:: with SMTP id k196mr67015343pgc.238.1555293926371; Sun, 14 Apr 2019 19:05:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555293926; cv=none; d=google.com; s=arc-20160816; b=s319jBzpPKZQhLtK+JorJ5v7w6+ojDf5pR54rcO4b7qfVWqMSk3cTvJ2LTc5YrwCTV MBKc5y1fk8X8CK0kxihitdq0WmwH2FSGh/UXJMc8RCR+sxT6bDyEKta4r/k2Al0rc1+q EZcZ8pmwMfKe5kG59rK7XRV+AveLqNt9qjnZ8EsVEDRi2FMjGM/j4zPKvrXs1jc9V0Iv l4JuhtGdmGa8Lbh9/blHaK9G0MDu0k/xM5lMLr3lfG8zK1hQ7IdKVzx0wS1ZYtqKD0Wf kTtsXsyfrirKPFn3SxeAxBSFWCcZqC8y1AIUe03zZXPhgp6V8iT7Ceb/zGpuRl7M2Qke J7Wg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=hY+6TWPmWAxpU6Bu5SwU6XTWSWxAZShUtUJYQE81tK8=; b=DTPFUOVu36ijtOY3CFcV+wZqO7/kUByzS5LiNZuEgPmOwsnzbT3bcctdMJAX7kufq/ 1Udmb37AO/tFqeDLYM9GoW3adahigw+xkisoqzizp1M2N+ES4CTmtRbQSM5VHJNbz9hw j/cobkjHLwv8kBmreCXtaraWTNeuEva3qPz1ubSalCp32GAO5/1v01lZ322AVZeSvYRU N3xKJZmL5h85xbCrqIATIvI+C+Avkxb8qyQLPPwwtM6IUZ0EcZdl5AWIiOkDlK5s+Pk9 kh9YjQ7NFfwQ1tDF35GNkGqN6NuWJCy5pqxmSTScIkA11tCGr63rnoHY6b6K8yHqbX6j uvbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j184si48721190pfb.106.2019.04.14.19.05.10; Sun, 14 Apr 2019 19:05:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727111AbfDOCDS (ORCPT + 99 others); Sun, 14 Apr 2019 22:03:18 -0400 Received: from mga07.intel.com ([134.134.136.100]:30382 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726461AbfDOCDJ (ORCPT ); Sun, 14 Apr 2019 22:03:09 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 Apr 2019 19:03:08 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,351,1549958400"; d="scan'208";a="149422513" Received: from genxtest-ykzhao.sh.intel.com ([10.239.143.71]) by FMSMGA003.fm.intel.com with ESMTP; 14 Apr 2019 19:03:07 -0700 From: Zhao Yakui To: linux-kernel@vger.kernel.org, x86@kernel.org Cc: bp@alien8.de, tglx@linutronix.de, Zhao Yakui , Jason Chen CJ Subject: [RFC PATCH v4 4/4] x86/acrn: Add hypercall for ACRN guest Date: Mon, 15 Apr 2019 10:00:57 +0800 Message-Id: <1555293657-32233-5-git-send-email-yakui.zhao@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1555293657-32233-1-git-send-email-yakui.zhao@intel.com> References: <1555293657-32233-1-git-send-email-yakui.zhao@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When ACRN hypervisor is detected, the hypercall is needed so that the ACRN guest can query/config some settings. For example: it can be used to query the resources in hypervisor and manage the CPU/memory/device/ interrupt for guest operating system. Add the hypercall so that the kernel can communicate with the low-level ACRN hypervisor. It is implemented with vmacll instruction. Co-developed-by: Jason Chen CJ Signed-off-by: Jason Chen CJ Signed-off-by: Zhao Yakui --- V1->V2: Refine the comments for the function of acrn_hypercall0/1/2 v2->v3: Use the "vmcall" mnemonic to replace hard-code byte definition v3->v4: refine the commit log(minor change) --- arch/x86/include/asm/acrn_hypercall.h | 81 +++++++++++++++++++++++++++++++++++ 1 file changed, 81 insertions(+) create mode 100644 arch/x86/include/asm/acrn_hypercall.h diff --git a/arch/x86/include/asm/acrn_hypercall.h b/arch/x86/include/asm/acrn_hypercall.h new file mode 100644 index 0000000..30e256e --- /dev/null +++ b/arch/x86/include/asm/acrn_hypercall.h @@ -0,0 +1,81 @@ +/* SPDX-License-Identifier: GPL-2.0 */ + +#ifndef _ASM_X86_ACRNHYPERCALL_H +#define _ASM_X86_ACRNHYPERCALL_H + +#include + +#ifdef CONFIG_ACRN_GUEST + +/* + * Hypercalls for ACRN Guest + * + * Hypercall number is passed in r8 register. + * Return value will be placed in rax. + * Up to 2 arguments are passed in rdi, rsi. + */ + +static inline long acrn_hypercall0(unsigned long hcall_id) +{ + register unsigned long r8 asm("r8") = hcall_id; + register long result asm("rax"); + + /* the hypercall is implemented with vmcall instruction. + * asm volatile is used to avoid that it is dropped because of + * compiler optimization. + */ + asm volatile("vmcall" + : "=r"(result) + : "r"(r8)); + + return result; +} + +static inline long acrn_hypercall1(unsigned long hcall_id, + unsigned long param1) +{ + register unsigned long r8 asm("r8") = hcall_id; + register long result asm("rax"); + + asm volatile("vmcall" + : "=r"(result) + : "D"(param1), "r"(r8)); + + return result; +} + +static inline long acrn_hypercall2(unsigned long hcall_id, + unsigned long param1, + unsigned long param2) +{ + register unsigned long r8 asm("r8") = hcall_id; + register long result asm("rax"); + + asm volatile("vmcall" + : "=r"(result) + : "D"(param1), "S"(param2), "r"(r8)); + + return result; +} + +#else + +static inline long acrn_hypercall0(unsigned long hcall_id) +{ + return -ENOTSUPP; +} + +static inline long acrn_hypercall1(unsigned long hcall_id, + unsigned long param1) +{ + return -ENOTSUPP; +} + +static inline long acrn_hypercall2(unsigned long hcall_id, + unsigned long param1, + unsigned long param2) +{ + return -ENOTSUPP; +} +#endif /* CONFIG_ACRN_GUEST */ +#endif /* _ASM_X86_ACRNHYPERCALL_H */ -- 2.7.4