Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2597531pxa; Mon, 24 Aug 2020 20:07:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyTP+MPnmdpYU2K0KhqmerspfAL09rhG2FuRCrTDHBWVx35BYw10lrrHd/KABvyZH15u3DM X-Received: by 2002:a17:906:560d:: with SMTP id f13mr8364347ejq.102.1598324837292; Mon, 24 Aug 2020 20:07:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598324837; cv=none; d=google.com; s=arc-20160816; b=F9BC0g3iBaRUAOwOScYhRsxaSEA09v5Iqc7Y8p8sKyZcxUyQPX8zWabmopVR32OQHA b0hF7rXLP+BQYECBlZVJdk9xRKun/onh5befo02b5F3ZEZJjMiGQiY4LHMhsT21H5JOn 6BcMWxW4a1H8TUrIvP4ZCMxPLYb1xGmiEJccsemxVGB3I79sfZ++znbly//NgCxRU4De 9/x/+dUz+ZrwBGlWcaMmw0Eez9d+rsFmKX0AMnop6tSOugOHQ5/ODsdwT6jPyVvYVPgG G5d1E1BXScQy0nzh2Cj09lHMR2Q6vJV9QvGEawRoP7E8O0GFc5UR3S97ojfNSfJpMehW Vpmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=SUWyiXAhosWseIwLdhcvfRkrg24tJGguTE7t7KXNNuY=; b=iHUKAwtzLHL0SQksf8Gaanr5PaP6T8oHM4nWdsn5Qx8ZLHAi/xwPC5B9AvUihDhB/G 0NHxIC2Uj5J0KZt2oWOjBwnw2SX62PMZdyPcSv+NrTAOIvkmv5jUfKD01zQR5YO5qnqo XWYBJapPr4BYlJthRDy3vH9/HpSezAUbByvar54a56b3TRGJc9YQNf43zS+7/3wLq+mk jBOFZODRN8KNbphrVG8kBMPhWgawM4TOFnxrQQQylNb7Y3PCx88gs+MFlzmixp1GPSgU IJqg8/l3QttOotYesPWVu3HTiIPaB7BALvcCcC6UUt0F9eXbxeY4qhHH14pij3Pgt4Hy QUcw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f1si7993049edm.270.2020.08.24.20.06.54; Mon, 24 Aug 2020 20:07:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728124AbgHYCu7 (ORCPT + 99 others); Mon, 24 Aug 2020 22:50:59 -0400 Received: from mga18.intel.com ([134.134.136.126]:37715 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726027AbgHYCu5 (ORCPT ); Mon, 24 Aug 2020 22:50:57 -0400 IronPort-SDR: MUrsUnphiXkkaubGoTNnkTWFtYNvqBSyAuxW7GWgditoxFBQHbTAcMO2fztYwjllTn47rKHBnF H4nKV9HhkduQ== X-IronPort-AV: E=McAfee;i="6000,8403,9723"; a="143690768" X-IronPort-AV: E=Sophos;i="5.76,350,1592895600"; d="scan'208";a="143690768" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Aug 2020 19:50:55 -0700 IronPort-SDR: KZ36llnBC89UVprDZVRQY5dGq44j350x5PZcUbD6nSZ8YHGrNY3WzfjOZ8NgYV+wjsBjQ4F5Em bA9f2S0o0eZg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.76,350,1592895600"; d="scan'208";a="312409758" Received: from shsi6026.sh.intel.com ([10.239.147.135]) by orsmga002.jf.intel.com with ESMTP; 24 Aug 2020 19:50:51 -0700 From: shuo.a.liu@intel.com To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , "H . Peter Anvin" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Sean Christopherson , Yu Wang , Reinette Chatre , x86@kernel.org, Shuo Liu , Dave Hansen , Zhi Wang , Zhenyu Wang Subject: [PATCH 05/17] virt: acrn: Introduce ACRN HSM basic driver Date: Tue, 25 Aug 2020 10:45:05 +0800 Message-Id: <20200825024516.16766-6-shuo.a.liu@intel.com> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200825024516.16766-1-shuo.a.liu@intel.com> References: <20200825024516.16766-1-shuo.a.liu@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Shuo Liu ACRN Hypervisor Service Module (HSM) is a kernel module in Service VM which communicates with ACRN userspace through ioctls and talks to ACRN Hypervisor through hypercalls. Add a basic HSM driver which allows Service VM userspace to communicate with ACRN. The following patches will add more ioctls, guest VM memory mapping caching, I/O request processing, ioeventfd and irqfd into this module. HSM exports a char device interface (/dev/acrn_hsm) to userspace. Signed-off-by: Shuo Liu Reviewed-by: Reinette Chatre Cc: Dave Hansen Cc: Zhi Wang Cc: Zhenyu Wang Cc: Yu Wang Cc: Reinette Chatre --- .../userspace-api/ioctl/ioctl-number.rst | 1 + MAINTAINERS | 2 + drivers/virt/Kconfig | 2 + drivers/virt/Makefile | 1 + drivers/virt/acrn/Kconfig | 14 +++ drivers/virt/acrn/Makefile | 3 + drivers/virt/acrn/acrn_drv.h | 21 ++++ drivers/virt/acrn/hsm.c | 115 ++++++++++++++++++ drivers/virt/acrn/hypercall.h | 30 +++++ include/uapi/linux/acrn.h | 33 +++++ 10 files changed, 222 insertions(+) create mode 100644 drivers/virt/acrn/Kconfig create mode 100644 drivers/virt/acrn/Makefile create mode 100644 drivers/virt/acrn/acrn_drv.h create mode 100644 drivers/virt/acrn/hsm.c create mode 100644 drivers/virt/acrn/hypercall.h create mode 100644 include/uapi/linux/acrn.h diff --git a/Documentation/userspace-api/ioctl/ioctl-number.rst b/Documentation/userspace-api/ioctl/ioctl-number.rst index 2a198838fca9..ac60efedb104 100644 --- a/Documentation/userspace-api/ioctl/ioctl-number.rst +++ b/Documentation/userspace-api/ioctl/ioctl-number.rst @@ -319,6 +319,7 @@ Code Seq# Include File Comments 0xA0 all linux/sdp/sdp.h Industrial Device Project 0xA1 0 linux/vtpm_proxy.h TPM Emulator Proxy Driver +0xA2 all uapi/linux/acrn.h ACRN hypervisor 0xA3 80-8F Port ACL in development: 0xA3 90-9F linux/dtlk.h diff --git a/MAINTAINERS b/MAINTAINERS index e0fea5e464b4..d4c1ef303c2d 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -442,6 +442,8 @@ L: acrn-dev@lists.projectacrn.org S: Supported W: https://projectacrn.org F: Documentation/virt/acrn/ +F: drivers/virt/acrn/ +F: include/uapi/linux/acrn.h AD1889 ALSA SOUND DRIVER L: linux-parisc@vger.kernel.org diff --git a/drivers/virt/Kconfig b/drivers/virt/Kconfig index cbc1f25c79ab..d9484a2e9b46 100644 --- a/drivers/virt/Kconfig +++ b/drivers/virt/Kconfig @@ -32,4 +32,6 @@ config FSL_HV_MANAGER partition shuts down. source "drivers/virt/vboxguest/Kconfig" + +source "drivers/virt/acrn/Kconfig" endif diff --git a/drivers/virt/Makefile b/drivers/virt/Makefile index fd331247c27a..f0491bbf0d4d 100644 --- a/drivers/virt/Makefile +++ b/drivers/virt/Makefile @@ -5,3 +5,4 @@ obj-$(CONFIG_FSL_HV_MANAGER) += fsl_hypervisor.o obj-y += vboxguest/ +obj-$(CONFIG_ACRN_HSM) += acrn/ diff --git a/drivers/virt/acrn/Kconfig b/drivers/virt/acrn/Kconfig new file mode 100644 index 000000000000..36c80378c30c --- /dev/null +++ b/drivers/virt/acrn/Kconfig @@ -0,0 +1,14 @@ +# SPDX-License-Identifier: GPL-2.0 +config ACRN_HSM + tristate "ACRN Hypervisor Service Module" + depends on ACRN_GUEST + help + ACRN Hypervisor Service Module (HSM) is a kernel module which + communicates with ACRN userspace through ioctls and talks to + the ACRN Hypervisor through hypercalls. HSM will only run in + a privileged management VM, called Service VM, to manage User + VMs and do I/O emulation. Not required for simply running + under ACRN as a User VM. + + To compile as a module, choose M, the module will be called + acrn. If unsure, say N. diff --git a/drivers/virt/acrn/Makefile b/drivers/virt/acrn/Makefile new file mode 100644 index 000000000000..6920ed798aaf --- /dev/null +++ b/drivers/virt/acrn/Makefile @@ -0,0 +1,3 @@ +# SPDX-License-Identifier: GPL-2.0 +obj-$(CONFIG_ACRN_HSM) := acrn.o +acrn-y := hsm.o diff --git a/drivers/virt/acrn/acrn_drv.h b/drivers/virt/acrn/acrn_drv.h new file mode 100644 index 000000000000..36f43d8d43d0 --- /dev/null +++ b/drivers/virt/acrn/acrn_drv.h @@ -0,0 +1,21 @@ +/* SPDX-License-Identifier: GPL-2.0 */ + +#ifndef __ACRN_HSM_DRV_H +#define __ACRN_HSM_DRV_H + +#include +#include + +#include "hypercall.h" + +#define ACRN_INVALID_VMID (0xffffU) + +/** + * struct acrn_vm - Properties of ACRN User VM. + * @vmid: User VM ID + */ +struct acrn_vm { + u16 vmid; +}; + +#endif /* __ACRN_HSM_DRV_H */ diff --git a/drivers/virt/acrn/hsm.c b/drivers/virt/acrn/hsm.c new file mode 100644 index 000000000000..a08169f35c96 --- /dev/null +++ b/drivers/virt/acrn/hsm.c @@ -0,0 +1,115 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * ACRN Hypervisor Service Module (HSM) + * + * Copyright (C) 2020 Intel Corporation. All rights reserved. + * + * Authors: + * Fengwei Yin + * Yakui Zhao + */ + +#define pr_fmt(fmt) "acrn: " fmt + +#include +#include +#include +#include + +#include +#include + +#include "acrn_drv.h" + +static struct acrn_api_version api_version; + +/* + * When /dev/acrn_hsm is opened, a 'struct acrn_vm' object is created to + * represent a VM instance and continues to be associated with the opened file + * descriptor. All ioctl operations on this file descriptor will be targeted to + * the VM instance. Release of this file descriptor will destroy the object. + */ +static int acrn_dev_open(struct inode *inode, struct file *filp) +{ + struct acrn_vm *vm; + + vm = kzalloc(sizeof(*vm), GFP_KERNEL); + if (!vm) + return -ENOMEM; + + vm->vmid = ACRN_INVALID_VMID; + filp->private_data = vm; + return 0; +} + +static long acrn_dev_ioctl(struct file *filp, unsigned int cmd, + unsigned long ioctl_param) +{ + if (cmd == ACRN_IOCTL_GET_API_VERSION) { + if (copy_to_user((void __user *)ioctl_param, + &api_version, sizeof(api_version))) + return -EFAULT; + } + + return 0; +} + +static int acrn_dev_release(struct inode *inode, struct file *filp) +{ + struct acrn_vm *vm = filp->private_data; + + kfree(vm); + return 0; +} + +static const struct file_operations acrn_fops = { + .owner = THIS_MODULE, + .open = acrn_dev_open, + .release = acrn_dev_release, + .unlocked_ioctl = acrn_dev_ioctl, +}; + +static struct miscdevice acrn_dev = { + .minor = MISC_DYNAMIC_MINOR, + .name = "acrn_hsm", + .fops = &acrn_fops, +}; + +static int __init hsm_init(void) +{ + int ret; + + if (x86_hyper_type != X86_HYPER_ACRN) + return -ENODEV; + + if (!acrn_is_privileged_vm()) + return -EPERM; + + ret = hcall_get_api_version(slow_virt_to_phys(&api_version)); + if (ret < 0) { + pr_err("Failed to get API version from hypervisor!\n"); + return ret; + } + + pr_info("API version is %u.%u\n", + api_version.major_version, api_version.minor_version); + + ret = misc_register(&acrn_dev); + if (ret) { + pr_err("Create misc dev failed!\n"); + return ret; + } + + return 0; +} + +static void __exit hsm_exit(void) +{ + misc_deregister(&acrn_dev); +} +module_init(hsm_init); +module_exit(hsm_exit); + +MODULE_AUTHOR("Intel Corporation"); +MODULE_LICENSE("GPL"); +MODULE_DESCRIPTION("ACRN Hypervisor Service Module (HSM)"); diff --git a/drivers/virt/acrn/hypercall.h b/drivers/virt/acrn/hypercall.h new file mode 100644 index 000000000000..3ad1b708e162 --- /dev/null +++ b/drivers/virt/acrn/hypercall.h @@ -0,0 +1,30 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* + * ACRN HSM: hypercalls of ACRN Hypervisor + */ +#ifndef __ACRN_HSM_HYPERCALL_H +#define __ACRN_HSM_HYPERCALL_H +#include + +/* + * Hypercall IDs of the ACRN Hypervisor + */ +#define _HC_ID(x, y) (((x) << 24) | (y)) + +#define HC_ID 0x80UL + +#define HC_ID_GEN_BASE 0x0UL +#define HC_GET_API_VERSION _HC_ID(HC_ID, HC_ID_GEN_BASE + 0x00) + +/** + * hcall_get_api_version() - Get API version from hypervisor + * @api_version: Service VM GPA of version info + * + * Return: 0 on success, <0 on failure + */ +static inline long hcall_get_api_version(u64 api_version) +{ + return acrn_hypercall1(HC_GET_API_VERSION, api_version); +} + +#endif /* __ACRN_HSM_HYPERCALL_H */ diff --git a/include/uapi/linux/acrn.h b/include/uapi/linux/acrn.h new file mode 100644 index 000000000000..c59488ad7252 --- /dev/null +++ b/include/uapi/linux/acrn.h @@ -0,0 +1,33 @@ +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ +/* + * Userspace interface for /dev/acrn_hsm - ACRN Hypervisor Service Module + * + * This file can be used by applications that need to communicate with the HSM + * via the ioctl interface. + */ + +#ifndef _UAPI_ACRN_H +#define _UAPI_ACRN_H + +#include + +/** + * struct acrn_api_version - ACRN Hypervisor API version. + * @major_version: Major version of ACRN Hypervisor API. + * @minor_version: Minor version of ACRN Hypervisor API. + */ +struct acrn_api_version { + __u32 major_version; + __u32 minor_version; +} __attribute__((aligned(8))); + +/* The ioctl type, documented in ioctl-number.rst */ +#define ACRN_IOCTL_TYPE 0xA2 + +/* + * Common IOCTL IDs definition for ACRN userspace + */ +#define ACRN_IOCTL_GET_API_VERSION \ + _IOR(ACRN_IOCTL_TYPE, 0, struct acrn_api_version) + +#endif /* _UAPI_ACRN_H */ -- 2.28.0