Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp5053965ybi; Tue, 11 Jun 2019 18:15:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqxu1LS+bxxgMXRF6hC2e+24fb3qALCm32qk6+eSnhz2prbYtk6KneJC6vXagX1yejqCQvD0 X-Received: by 2002:aa7:9aaf:: with SMTP id x15mr31797354pfi.214.1560302155955; Tue, 11 Jun 2019 18:15:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560302155; cv=none; d=google.com; s=arc-20160816; b=jp7Zy5m09dlkKnDr0KN98p2Wl9MCBrPM+KAG77rnCj6JdZiCfxHeg7+Se9tGZtm0K4 u8Xc0X7wFFIK4aC5cdNdAxFeTUAr3i1jiqbsSZyzxzDUDNDFzwqxJMc7ZQyXqLXm5KuA Saw1EZ5b6v3QusveP6GwXYcrKAcufrFASV0Iub/j30UHvslW/spTV2aODdtmrWeOZzy6 G1XFOibgn6C/DSVrmPPyjB1RUR4WZgET7UvcWg2Hz1/ROwdNLnlZe/1NOOjETbGQVb2J GqKqPpdJKvNu/K3CgFT+epyQi+uwqANjeGBalod+xigFz+F8qDIpPb6djhULWi05hWL6 k30Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:mime-version:robot-unsubscribe:robot-id :git-commit-id:subject:to:references:in-reply-to:reply-to:cc :message-id:from:date:dkim-signature:dkim-filter; bh=y6qm4URORM0BZT+Va2oAPRBsgwlAPshwKCTtkQnav3c=; b=e0bWKqNWF3nPD+WTTtTgQ+mtaTJd5TnBP8tVu6xauDG/Mio/HGKHUI+Dkv2TxNa+Ry dqUU+uXk4Jvnlkr1rhFxh+ZQXqGmLzoJ7tEcQnj7jbGFVrEyYxQ9DQzKsYEobNGHBbmZ 32kv+eE6qWqIS3k1aSf0MwUAJ+3JcvIgp4Vg62OhnmdjU9kwoHLvfc2qCK02tHBDnfFc fXvlKq1qhKxjW37gqUoCYe2AIKak1T4XRZPuUnmyalU4jaSqfHPF86c6dNeFra4VFhnI ZIItsJRuMEqwVlk8IMxagL1PsoS4SAcUnsjo1p6dfIQ2Weg1kKnK+IO6X7UxFpYOF9LS ITeQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@zytor.com header.s=2019051801 header.b="g3/JdsAl"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z17si13178960pgv.485.2019.06.11.18.15.39; Tue, 11 Jun 2019 18:15:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@zytor.com header.s=2019051801 header.b="g3/JdsAl"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2436514AbfFKUpS (ORCPT + 99 others); Tue, 11 Jun 2019 16:45:18 -0400 Received: from terminus.zytor.com ([198.137.202.136]:42089 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2436506AbfFKUpS (ORCPT ); Tue, 11 Jun 2019 16:45:18 -0400 Received: from terminus.zytor.com (localhost [127.0.0.1]) by terminus.zytor.com (8.15.2/8.15.2) with ESMTPS id x5BKixth367352 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Tue, 11 Jun 2019 13:44:59 -0700 DKIM-Filter: OpenDKIM Filter v2.11.0 terminus.zytor.com x5BKixth367352 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2019051801; t=1560285900; bh=y6qm4URORM0BZT+Va2oAPRBsgwlAPshwKCTtkQnav3c=; h=Date:From:Cc:Reply-To:In-Reply-To:References:To:Subject:From; b=g3/JdsAlGZd4bNWofjrXgqH4trBROA8wyBSJX2dUOrGZf+skltxD0DtgJ9W2ORGQF 8FfuqJ1F3Mq3xOEP6KMG9AZoNyG6wCDJB6LsZGBGGyGlUCMQm4GH1gZChebq0Ccndv awpTsL1J6VPjHAvh7RwrIOUv7b+YPVaUPTzQyt3RBWAlEUND8AaR8b0auiF78U5NsZ 5ZRKlEHYtZ96USgfsf+UpiCt3qQ/5A7a0t8GqDt/g3DItPgRuQnX2+m+azbXTU87gq SsKSy4V5AfpzjaVrCsperCOsPEmU5iUkmKQr/Qr9KIO+Oh5miyWVU3FqR2O+7SV+UB csC1z75Ospp7A== Received: (from tipbot@localhost) by terminus.zytor.com (8.15.2/8.15.2/Submit) id x5BKiw6Z367349; Tue, 11 Jun 2019 13:44:58 -0700 Date: Tue, 11 Jun 2019 13:44:58 -0700 X-Authentication-Warning: terminus.zytor.com: tipbot set sender to tipbot@zytor.com using -f From: tip-bot for Zhao Yakui Message-ID: Cc: tglx@linutronix.de, linux-kernel@vger.kernel.org, yakui.zhao@intel.com, hpa@zytor.com, mingo@kernel.org, mingo@redhat.com, bp@suse.de, luto@kernel.org, jason.cj.chen@intel.com, x86@kernel.org Reply-To: hpa@zytor.com, linux-kernel@vger.kernel.org, tglx@linutronix.de, yakui.zhao@intel.com, mingo@redhat.com, mingo@kernel.org, bp@suse.de, x86@kernel.org, jason.cj.chen@intel.com, luto@kernel.org In-Reply-To: <1559108037-18813-4-git-send-email-yakui.zhao@intel.com> References: <1559108037-18813-4-git-send-email-yakui.zhao@intel.com> To: linux-tip-commits@vger.kernel.org Subject: [tip:x86/platform] x86/acrn: Use HYPERVISOR_CALLBACK_VECTOR for ACRN guest upcall vector Git-Commit-ID: 498ad39368865dfdbf15d3516c43694947074b88 X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 Content-Disposition: inline X-Spam-Status: No, score=-1.2 required=5.0 tests=ALL_TRUSTED,BAYES_00, DATE_IN_FUTURE_96_Q,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on terminus.zytor.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit-ID: 498ad39368865dfdbf15d3516c43694947074b88 Gitweb: https://git.kernel.org/tip/498ad39368865dfdbf15d3516c43694947074b88 Author: Zhao Yakui AuthorDate: Tue, 30 Apr 2019 11:45:25 +0800 Committer: Borislav Petkov CommitDate: Tue, 11 Jun 2019 21:31:31 +0200 x86/acrn: Use HYPERVISOR_CALLBACK_VECTOR for ACRN guest upcall vector Use the HYPERVISOR_CALLBACK_VECTOR to notify an ACRN guest. Co-developed-by: Jason Chen CJ Signed-off-by: Jason Chen CJ Signed-off-by: Zhao Yakui Signed-off-by: Borislav Petkov Reviewed-by: Thomas Gleixner Cc: Andy Lutomirski Cc: "H. Peter Anvin" Cc: Ingo Molnar Cc: Thomas Gleixner Cc: x86-ml Link: https://lkml.kernel.org/r/1559108037-18813-4-git-send-email-yakui.zhao@intel.com --- arch/x86/Kconfig | 1 + arch/x86/entry/entry_64.S | 5 +++++ arch/x86/include/asm/acrn.h | 11 +++++++++++ arch/x86/kernel/cpu/acrn.c | 30 ++++++++++++++++++++++++++++++ 4 files changed, 47 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 8a95c50e5c12..0ddcce78f85c 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -838,6 +838,7 @@ config JAILHOUSE_GUEST config ACRN_GUEST bool "ACRN Guest support" depends on X86_64 + select X86_HV_CALLBACK_VECTOR help This option allows to run Linux as guest in the ACRN hypervisor. ACRN is a flexible, lightweight reference open-source hypervisor, built with diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S index 11aa3b2afa4d..2fe62893bbdf 100644 --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -1142,6 +1142,11 @@ apicinterrupt3 HYPERV_STIMER0_VECTOR \ hv_stimer0_callback_vector hv_stimer0_vector_handler #endif /* CONFIG_HYPERV */ +#if IS_ENABLED(CONFIG_ACRN_GUEST) +apicinterrupt3 HYPERVISOR_CALLBACK_VECTOR \ + acrn_hv_callback_vector acrn_hv_vector_handler +#endif + idtentry debug do_debug has_error_code=0 paranoid=1 shift_ist=IST_INDEX_DB ist_offset=DB_STACK_OFFSET idtentry int3 do_int3 has_error_code=0 create_gap=1 idtentry stack_segment do_stack_segment has_error_code=1 diff --git a/arch/x86/include/asm/acrn.h b/arch/x86/include/asm/acrn.h new file mode 100644 index 000000000000..4adb13f08af7 --- /dev/null +++ b/arch/x86/include/asm/acrn.h @@ -0,0 +1,11 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#ifndef _ASM_X86_ACRN_H +#define _ASM_X86_ACRN_H + +extern void acrn_hv_callback_vector(void); +#ifdef CONFIG_TRACING +#define trace_acrn_hv_callback_vector acrn_hv_callback_vector +#endif + +extern void acrn_hv_vector_handler(struct pt_regs *regs); +#endif /* _ASM_X86_ACRN_H */ diff --git a/arch/x86/kernel/cpu/acrn.c b/arch/x86/kernel/cpu/acrn.c index 6d365e97cce6..676022e71791 100644 --- a/arch/x86/kernel/cpu/acrn.c +++ b/arch/x86/kernel/cpu/acrn.c @@ -9,7 +9,12 @@ * */ +#include +#include +#include +#include #include +#include static uint32_t __init acrn_detect(void) { @@ -18,6 +23,8 @@ static uint32_t __init acrn_detect(void) static void __init acrn_init_platform(void) { + /* Setup the IDT for ACRN hypervisor callback */ + alloc_intr_gate(HYPERVISOR_CALLBACK_VECTOR, acrn_hv_callback_vector); } static bool acrn_x2apic_available(void) @@ -30,6 +37,29 @@ static bool acrn_x2apic_available(void) return false; } +static void (*acrn_intr_handler)(void); + +__visible void __irq_entry acrn_hv_vector_handler(struct pt_regs *regs) +{ + struct pt_regs *old_regs = set_irq_regs(regs); + + /* + * The hypervisor requires that the APIC EOI should be acked. + * If the APIC EOI is not acked, the APIC ISR bit for the + * HYPERVISOR_CALLBACK_VECTOR will not be cleared and then it + * will block the interrupt whose vector is lower than + * HYPERVISOR_CALLBACK_VECTOR. + */ + entering_ack_irq(); + inc_irq_stat(irq_hv_callback_count); + + if (acrn_intr_handler) + acrn_intr_handler(); + + exiting_irq(); + set_irq_regs(old_regs); +} + const __initconst struct hypervisor_x86 x86_hyper_acrn = { .name = "ACRN", .detect = acrn_detect,