Received: by 2002:aa6:c429:0:b029:98:93ff:f56f with SMTP id g9csp3405721lkq; Mon, 23 Nov 2020 05:01:32 -0800 (PST) X-Google-Smtp-Source: ABdhPJwD9+LfgSFfAVbKGuVml66+mZGFYPT1lijwMUKz87RJYNCvtUZsGkScxvbJqUmuu+XN+P+O X-Received: by 2002:aa7:df81:: with SMTP id b1mr45848575edy.365.1606136492090; Mon, 23 Nov 2020 05:01:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606136492; cv=none; d=google.com; s=arc-20160816; b=socn7PfttFnHwrX99DJCUmLCaoGcI4UDih44nRADUJvEXvfXh9RAMpccllf9ntU9G8 5CyYYDZ1l8lO0/GWVfpTp9wStPL6yxmiCDgS81RDCRyhkJaayDzKrQxPSGg0Ns5rsMmF KB0Sa0y23JyCFMWFcz2UlC7JbgG8lkcnxdHf7eH8vRPy4B0DGeCUGgzvlTLzt4tnTcgK BjelOKFAEqdyYVI4p/knYcO6/ZvDl6a/EyaI6mhokjjxHUyefKyELgNu963AZh/wyi6D 4gA+G0s1M/mS7RhDG7EWlhthiLywfbw/0r7pDJYhFHZHf29LJhvxgXPvWhRJs/p3pKFZ ED2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=jnD6JxIyxc4vm54K4tKnhPWtevyVeHY1Zgn00laUUfA=; b=PvGrVIg/cEg9IhcNP944bju/+ixLzxGHdQdidyNbx7MrYhnAJqHDfEsadC6vmgkOuc kdFpj/KneDcwZA3uNS9y4Msm413dNKe7mxoGQmFzfZVgv4xT9UgsYwTdhVBegWKanJuZ /DSeJ6FaQjoIgvvcE50AbvqgKVXbliFIezjkYOD1qemgQkNpAtVKDQtB4a6G7Aq53SiF sjGy6FAuiKLtGjkN/Yb3dxPuu9R1yG3tgkXZnJNjQrZuDUuzQ6elqlGXh04hZcNG5cGa j/H1jq6T2QDrKaJ8wVSuQBNh0tK0PfLwqTsLD7Eq3M4krl78YpGZlkP3ouDNEfvd9Yxv 6v7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=n+SsvAnO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m17si6383733ejb.268.2020.11.23.05.01.08; Mon, 23 Nov 2020 05:01:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=n+SsvAnO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387771AbgKWM6r (ORCPT + 99 others); Mon, 23 Nov 2020 07:58:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59124 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387668AbgKWMv5 (ORCPT ); Mon, 23 Nov 2020 07:51:57 -0500 Received: from mail-ej1-x643.google.com (mail-ej1-x643.google.com [IPv6:2a00:1450:4864:20::643]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 02D60C061A4D for ; Mon, 23 Nov 2020 04:51:57 -0800 (PST) Received: by mail-ej1-x643.google.com with SMTP id z5so3016582ejp.4 for ; Mon, 23 Nov 2020 04:51:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=jnD6JxIyxc4vm54K4tKnhPWtevyVeHY1Zgn00laUUfA=; b=n+SsvAnOuvFpo9fuYFpraPfRqMJQBKN5DmMsO67xbOdk7xeiFLjd9qowus6ere1Cg3 IyClkLOxj+jm6I2dSTy2Tx1nAoEZtFF6N2t915Kw+bQ+hCeNUQe+u8vfps7+3A37Wd0i Xw468ZyUMHg34aARMw+5sCah5Ife3hgkIOgBaEFtTkrdvjw+F3UZo5x6JCdflbNWKuPL +gH7yEC9lZxw9iErt3++xiBCrsbPc8RsDMEJx2rKd5jMKKG8buEGI2odLG0PEC0EqUaX T33iehIZOGb9ctsRDtPWP1OUCnXL1/JQt4rpA1d7l2yVOfogxApssQ/fZAMIbiU6O13Y pn1g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=jnD6JxIyxc4vm54K4tKnhPWtevyVeHY1Zgn00laUUfA=; b=oPWU/rTrS0ysTcjSEg3UdzU6/OUGDtwmBRe1NwAo4y1sTJl2SdliE4PEG86ylQkaNy bPKtF+/N2VScS6ZKjdJ03mHP7CHfN57x0+MIPk4wMIoLXoWWp3Vj2QVD8lMo940Q5xb1 BEVe/D0rBqndLx0HiOd8DujRKAZ3KMF5BPuGC7VEpCmQgLkLZn5j47yReWi3BmJkQjXr 8Wbcu2U2XyzT7Ai9NRJg3SX/U2kCQ9Tfyw2mtKidQBVv5thYC6s7fGwKBxe0P7o2ZopB T40N9qDLSMlDXok2ksj0RPf5PzYFauWAgmukd55zCa9xdFZZf8+hV5FmToqB+LpwWz/f Un3Q== X-Gm-Message-State: AOAM533dE9GSn75VcmOb3/NljxBKnDDnw70uYOhQXfkEV5KWNiY9ibwY 0Rl4bM3hHcUSlm1M90q1BlTUBA== X-Received: by 2002:a17:907:c14:: with SMTP id ga20mr43858051ejc.526.1606135915525; Mon, 23 Nov 2020 04:51:55 -0800 (PST) Received: from google.com ([2a01:4b00:8523:2d03:acac:b2ef:c7d:fd8a]) by smtp.gmail.com with ESMTPSA id z19sm4921235ejj.101.2020.11.23.04.51.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Nov 2020 04:51:54 -0800 (PST) Date: Mon, 23 Nov 2020 12:51:53 +0000 From: David Brazdil To: Quentin Perret Cc: Catalin Marinas , Will Deacon , Marc Zyngier , James Morse , Julien Thierry , Suzuki K Poulose , Rob Herring , Frank Rowand , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , open list , "open list:KERNEL VIRTUAL MACHINE FOR ARM64 (KVM/arm64)" , "open list:OPEN FIRMWARE AND FLATTENED DEVICE TREE" , kernel-team@android.com, android-kvm@google.com Subject: Re: [RFC PATCH 08/27] KVM: arm64: Make kvm_call_hyp() a function call at Hyp Message-ID: <20201123125153.hnipzls2ijptpti7@google.com> References: <20201117181607.1761516-1-qperret@google.com> <20201117181607.1761516-9-qperret@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201117181607.1761516-9-qperret@google.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 17, 2020 at 06:15:48PM +0000, 'Quentin Perret' via kernel-team wrote: > kvm_call_hyp() has some logic to issue a function call or a hypercall > depending the EL at which the kernel is running. However, all the code > compiled under __KVM_NVHE_HYPERVISOR__ is guaranteed to run only at EL2, > and in this case a simple function call is needed. > > Add ifdefery to kvm_host.h to symplify kvm_call_hyp() in .hyp.text. > > Signed-off-by: Quentin Perret > --- > arch/arm64/include/asm/kvm_host.h | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h > index ac11adab6602..7a5d5f4b3351 100644 > --- a/arch/arm64/include/asm/kvm_host.h > +++ b/arch/arm64/include/asm/kvm_host.h > @@ -557,6 +557,7 @@ int kvm_test_age_hva(struct kvm *kvm, unsigned long hva); > void kvm_arm_halt_guest(struct kvm *kvm); > void kvm_arm_resume_guest(struct kvm *kvm); > > +#ifndef __KVM_NVHE_HYPERVISOR__ > #define kvm_call_hyp_nvhe(f, ...) \ > ({ \ > struct arm_smccc_res res; \ > @@ -596,6 +597,11 @@ void kvm_arm_resume_guest(struct kvm *kvm); > \ > ret; \ > }) > +#else /* __KVM_NVHE_HYPERVISOR__ */ > +#define kvm_call_hyp(f, ...) f(__VA_ARGS__) > +#define kvm_call_hyp_ret(f, ...) f(__VA_ARGS__) > +#define kvm_call_hyp_nvhe(f, ...) f(__VA_ARGS__) > +#endif /* __KVM_NVHE_HYPERVISOR__ */ I was hoping we could define this as the following instead. That would require adding host-side declarations of all functions currently called with _nvhe. #define kvm_call_hyp_nvhe(f, ...) \ + is_nvhe_hyp_code() ? f(__VA_ARGS__) : \ ({ \ struct arm_smccc_res res; \ \ arm_smccc_1_1_hvc(KVM_HOST_SMCCC_FUNC(f), \ ##__VA_ARGS__, &res); \ WARN_ON(res.a0 != SMCCC_RET_SUCCESS); \ \ res.a1; \ }) Up to you what you think is cleaner, just my 2 cents...