Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4229794yba; Tue, 23 Apr 2019 17:58:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqxRvMvCM8K/U3ycApKukcgPKvXFpkAw58o8ZPBHegnHHiq2cy1OVuu2aytj7jaVMdJq8Txf X-Received: by 2002:a63:f817:: with SMTP id n23mr18138690pgh.302.1556067496393; Tue, 23 Apr 2019 17:58:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556067496; cv=none; d=google.com; s=arc-20160816; b=0eRk5cOA2VoXWtOiSEM/gGlUlQfdvyFlTjSbq2vCVyLAKkqPO843/Y1OIrFgQYEusp pg55oQnPOLu7iXNCu/+4dxDrSe+nhojt/7PJ2P3Sr8Co+SVzHGwb08Pe695kOlmq22+Y DqNi23w00nE0RwmSgzUuvnwi5yu5O2OaIcCVDPuRg2Y5JLPY/tkEGcapnbTn/3+hNca5 jc8N2wFaZlznsO3ylpMuItup6MRglvW04K2/IiUfOq8pwYaIRcVxelnK7NhaZ7Lorx7d XnPWwIyEiWhcr6Garvb3VIW+SophgKBQFPqMz3XwLzgvMXBru0Asg0mdxFyVdXEwjpyy MKNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=8fo3WTvTJFe7zNdCFaqHarfcfS/O/6ljmxjz9C0Io9M=; b=JCJ7SlWsnJTs+WnZiXQMZHZmkkKPcoaIGckWcew0FhIAQkmGXnwDFSpDDtoYrz+O8k e3mnj7EKTGj0SKo7SU9KYszx8NjVAChe4BMIU5jNHav8jx+uiKMQyKPkleEBlBOtL1aE baPrepXi0KviCrhBpEI5i3iFYjrz2NezlCfCtwcsmvYB6WsXDGAovvi+0ga5aet1gZnF DurlSvRAo3HGaSPU0vRNhQjE/XvheBJI9xRW+oSjIXgMUE6ZgAwD6z9er5yyJbgvGmRp xNFcZtSRfOOlxANLE5K2JstaEGnRQ0Na5ygV8w2M5wgyfN7NeBbwyHLCZwpaVShJgi/D pRjg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n6si11091634pgv.458.2019.04.23.17.57.59; Tue, 23 Apr 2019 17:58:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729165AbfDXA5C (ORCPT + 99 others); Tue, 23 Apr 2019 20:57:02 -0400 Received: from mga02.intel.com ([134.134.136.20]:21810 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728992AbfDXA44 (ORCPT ); Tue, 23 Apr 2019 20:56:56 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Apr 2019 17:56:56 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,387,1549958400"; d="scan'208";a="340195457" Received: from genxtest-ykzhao.sh.intel.com ([10.239.143.71]) by fmsmga005.fm.intel.com with ESMTP; 23 Apr 2019 17:56:55 -0700 From: Zhao Yakui To: linux-kernel@vger.kernel.org, x86@kernel.org Cc: tglx@linutronix.de, bp@alien8.de, Zhao Yakui , Jason Chen CJ Subject: [RFC PATCH v5 4/4] x86/acrn: Add hypercall for ACRN guest Date: Wed, 24 Apr 2019 08:54:20 +0800 Message-Id: <1556067260-9128-5-git-send-email-yakui.zhao@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1556067260-9128-1-git-send-email-yakui.zhao@intel.com> References: <1556067260-9128-1-git-send-email-yakui.zhao@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When ACRN hypervisor is detected, the hypercall is needed so that the ACRN guest can query/config some settings. For example: it can be used to query the resources in hypervisor and manage the CPU/memory/device/ interrupt for the guest operating system. So add the hypercall so that ACRN guest can communicate with the low-level ACRN hypervisor. It is implemented with the VMCALL instruction. Co-developed-by: Jason Chen CJ Signed-off-by: Jason Chen CJ Signed-off-by: Zhao Yakui --- V1->V2: Refine the comments for the function of acrn_hypercall0/1/2 v2->v3: Use the "vmcall" mnemonic to replace hard-code byte definition v4->v5: Use _ASM_X86_ACRN_HYPERCALL_H instead of _ASM_X86_ACRNHYPERCALL_H to align the header file of acrn_hypercall.h Use the "VMCALL" mnemonic in comment/commit log. Uppercase r8/rdi/rsi/rax for hypercall parameter registers in comment. --- arch/x86/include/asm/acrn_hypercall.h | 82 +++++++++++++++++++++++++++++++++++ 1 file changed, 82 insertions(+) create mode 100644 arch/x86/include/asm/acrn_hypercall.h diff --git a/arch/x86/include/asm/acrn_hypercall.h b/arch/x86/include/asm/acrn_hypercall.h new file mode 100644 index 0000000..3594436 --- /dev/null +++ b/arch/x86/include/asm/acrn_hypercall.h @@ -0,0 +1,82 @@ +/* SPDX-License-Identifier: GPL-2.0 */ + +#ifndef _ASM_X86_ACRN_HYPERCALL_H +#define _ASM_X86_ACRN_HYPERCALL_H + +#include + +#ifdef CONFIG_ACRN_GUEST + +/* + * Hypercalls for ACRN guest + * + * Hypercall number is passed in R8 register. + * Up to 2 arguments are passed in RDI, RSI. + * Return value will be placed in RAX. + */ + +static inline long acrn_hypercall0(unsigned long hcall_id) +{ + register unsigned long r8 asm("r8") = hcall_id; + register long result asm("rax"); + + /* the hypercall is implemented with the VMCALL instruction. + * asm indicates that inline assembler instruction is used. + * volatile qualifier is added to avoid that it is dropped + * because of compiler optimization. + */ + asm volatile("vmcall" + : "=r"(result) + : "r"(r8)); + + return result; +} + +static inline long acrn_hypercall1(unsigned long hcall_id, + unsigned long param1) +{ + register unsigned long r8 asm("r8") = hcall_id; + register long result asm("rax"); + + asm volatile("vmcall" + : "=r"(result) + : "D"(param1), "r"(r8)); + + return result; +} + +static inline long acrn_hypercall2(unsigned long hcall_id, + unsigned long param1, + unsigned long param2) +{ + register unsigned long r8 asm("r8") = hcall_id; + register long result asm("rax"); + + asm volatile("vmcall" + : "=r"(result) + : "D"(param1), "S"(param2), "r"(r8)); + + return result; +} + +#else + +static inline long acrn_hypercall0(unsigned long hcall_id) +{ + return -ENOTSUPP; +} + +static inline long acrn_hypercall1(unsigned long hcall_id, + unsigned long param1) +{ + return -ENOTSUPP; +} + +static inline long acrn_hypercall2(unsigned long hcall_id, + unsigned long param1, + unsigned long param2) +{ + return -ENOTSUPP; +} +#endif /* CONFIG_ACRN_GUEST */ +#endif /* _ASM_X86_ACRN_HYPERCALL_H */ -- 2.7.4