Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1730914yba; Sun, 14 Apr 2019 19:06:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqyqYCxSN3ef7wahtVVFNfd5BU0SA7ybIAnYScJEoIO6/91PefabvZYYyX/DklUXSA3ROEXE X-Received: by 2002:a62:1215:: with SMTP id a21mr71733472pfj.126.1555293969316; Sun, 14 Apr 2019 19:06:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555293969; cv=none; d=google.com; s=arc-20160816; b=H0bbDHdU2oZvwbKuihWmEc5xLK/Y3JLmNJwHCE66TWKPgg9sJrgKbVjQG9otHfOzIA 1riAN/MqPAHFnN+fbC06dt1JO7qaznSWKE1y6yYYmvIxv4JMS72bJPnt4WIu7kpnZp5+ Mstn1mEEgtb7C74jiOhTQ7p7c8imGuaCsvoUUmDN+aj3K6NLU42GtSr/jJ4SnU8YMQkF snnPPvj9Z/0VqxXgZLBqe00W66WHtaSqG0oENnvpOV72Ap1qCA+XO8KMmn0xVmzayHrI gqE74/4bxx79VXpV0e1ggH64BXRV2wrPhmwPETwyhK/v5vkIuGMBPuj0uHrN2ACQDuxf Pabw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=XewIHnCV5rsz0FChiAqtH0CDNcn2AgodCYXOLAFgOC8=; b=GtRlRR4dqYWsY1Ynr8UGJGMZFVh0x2o2JLrom8UDZ/G4SIcdS9az9elXmJ5fdu0aqN nionaQAY8XhN5SliKNlXXbR9Fl64MMPiaYT+dJdLUbZ1OfzBxubZ7HyRMSNSEzb+IieQ Ca43d8vXqkpceNi2tnxgD+Z2qSHEQ4HQl8MEXJ4gJcIcv3xNuFh0soBo1Lf5EX7RLRT6 XwVgf1SNSy0X00CpcXEXuLN92nU/M2SFdrHBDIrnHQMG9ZwPCYgLckSJ0oE0zl2wcjgh wkigVMuA2d6lpaHzhE14Ve+8CuWdVDfqE9xK+h/UXFrAlzjOxyFr1bzV/ZALUsYRUjIa UoeA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c3si44814659pfg.109.2019.04.14.19.05.53; Sun, 14 Apr 2019 19:06:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726689AbfDOCDE (ORCPT + 99 others); Sun, 14 Apr 2019 22:03:04 -0400 Received: from mga07.intel.com ([134.134.136.100]:30382 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726120AbfDOCDE (ORCPT ); Sun, 14 Apr 2019 22:03:04 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 Apr 2019 19:03:03 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,351,1549958400"; d="scan'208";a="149422488" Received: from genxtest-ykzhao.sh.intel.com ([10.239.143.71]) by FMSMGA003.fm.intel.com with ESMTP; 14 Apr 2019 19:03:02 -0700 From: Zhao Yakui To: linux-kernel@vger.kernel.org, x86@kernel.org Cc: bp@alien8.de, tglx@linutronix.de, Zhao Yakui Subject: [RFC PATCH v4 0/4] x86: Add the support of ACRN guest under arch/x86 Date: Mon, 15 Apr 2019 10:00:53 +0800 Message-Id: <1555293657-32233-1-git-send-email-yakui.zhao@intel.com> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ACRN is a flexible, lightweight reference hypervisor, built with real-time and safety-criticality in mind, optimized to streamline embedded development through an open source platform. It is built for embedded IOT with small footprint and real-time features. More details can be found in https://projectacrn.org/ This is the patch set that allows the Linux to work on ACRN hypervisor and it can work with the following patch set to manage the Linux guest on acrn-hypervisor. It includes the detection of acrn_hypervisor, upcall notification vector from hypervisor, hypercall. The hypervisor detection is similar to Xen/VMWARE/Hyperv. ACRN also uses the upcall notification mechanism similar to that in Xen/Microsoft HyperV when it needs to send the notification to Linux OS. The hypercall provides the mechanism that can be used to query/configure the acrn-hypervisor by Linux guest. Following this patch set, we will send acrn driver part, which provides the interface that can be used to manage the virtualized CPU/memory/device/interrupt for other guest OS after the acrn hypervisor is detected. v1->v2: Change the CONFIG_ACRN to CONFIG_ACRN_GUEST, which makes it easy to understand. Remove the export of x86_hyper_acrn. Remove the unused API definition of acrn_setup_intr_handler and acrn_remove_intr_handler. Adjust the order of header file Add the declaration of acrn_hv_vector_handler and tracing definition of acrn_hv_callback_vector. Refine the comments for the function of acrn_hypercall0/1/2 v2-v3: Add one new config symbol to unify the conditional definition of hv_irq_callback_count Use the "vmcall" mnemonic to replace the hard-code byte definition Remove the unnecessary dependency of CONFIG_PARAVIRT for ACRN_GUEST v3-v4: Rename the file name of acrnhyper.h to acrn.h Refine the commit log and some other minor changes(more comments and redundant ifdef in acrn.h, sorting the header file in acrn.c) Zhao Yakui (4): x86/Kconfig: Add new config symbol to unify conditional definition of hv_irq_callback_count x86: Add the support of Linux guest on ACRN hypervisor x86/acrn: Use HYPERVISOR_CALLBACK_VECTOR for ACRN guest upcall vector x86/acrn: Add hypercall for ACRN guest arch/x86/Kconfig | 16 +++++++ arch/x86/entry/entry_64.S | 5 +++ arch/x86/include/asm/acrn.h | 11 +++++ arch/x86/include/asm/acrn_hypercall.h | 81 +++++++++++++++++++++++++++++++++++ arch/x86/include/asm/hardirq.h | 2 +- arch/x86/include/asm/hypervisor.h | 1 + arch/x86/kernel/cpu/Makefile | 1 + arch/x86/kernel/cpu/acrn.c | 61 ++++++++++++++++++++++++++ arch/x86/kernel/cpu/hypervisor.c | 4 ++ arch/x86/kernel/irq.c | 2 +- arch/x86/xen/Kconfig | 1 + drivers/hv/Kconfig | 1 + 12 files changed, 184 insertions(+), 2 deletions(-) create mode 100644 arch/x86/include/asm/acrn.h create mode 100644 arch/x86/include/asm/acrn_hypercall.h create mode 100644 arch/x86/kernel/cpu/acrn.c -- 2.7.4