Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2597205pxp; Tue, 22 Mar 2022 01:51:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwvfwPLYIjGaBW0JkT0MZaH34gtiDfYg4HY50oEaX0I4LrPi++Czow/Qb4kva/oZiAt18OI X-Received: by 2002:a17:906:a148:b0:6cd:50c7:8d4d with SMTP id bu8-20020a170906a14800b006cd50c78d4dmr24091922ejb.641.1647939067864; Tue, 22 Mar 2022 01:51:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647939067; cv=none; d=google.com; s=arc-20160816; b=nKyjySpPUXpHoc1BRx1ljFm5hnvaq8QfareIRdQ37xwsPMSpQPnCO3cuP0ecSphBRW MlMH+SOEDPUh4X/C9lPfgNcoWUmUc2oQtVtry4v0jb8QozcLAY/J+7pkQ4DkPXQH54K7 rvYKpuh2EYQiwZ+TxjFE53RgDU6cdVBdsOmLXfpSmnYjCBlADCcSxlur38CR1Hn+Lmjz 1/WKris7jWLNxEkNKG+GblsS6LF4x9jnxxgkDB0SAsBUyFG5v5tuQJnkYWgnselzrMSJ e+wtpPXhtMIo9lHu6IN1oWmUruHlDEcZpYmi3JOfDDHgOS0U9Ikb6vMRGMFuIdfFDBoe P0tQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=njjwnGmzLURai6W3k0QTeK0O5fDkMxYNSy6QT89iDAo=; b=jRxmTX7jLacvEHiU4Y+ybCVZxKhzzchwFfW1eyKakmyCKY12QHoiE8uhXzWzYcE5Wr /HPEgkCl5Ni90TLR//TJJFwrxPsb3q32RoTsSjycBrTUcHCMBzkXWFqFX1xxyq+H2xMO RHOd08/1gX49yBB4rMPtw3MxTth1FX5zKgzPF02Cjxx3KRm0aFAtw+ZPdjdhLFeujUSn YwF/deD4QF92j+H6vpYBOoHza+zYlF5ukpBuqmuZPg225kEAvnfk6R+xWNG+LY7G4JHw 2q59nqUUOmr2PUHUH1f/5aNUStkbGsUJ8VaO9/G/fEcIrgfNkBIfc20R0CujsnhSOhvF 2L0w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=jM8eeUAB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t24-20020a50d718000000b00418c2b5be41si11350743edi.291.2022.03.22.01.50.42; Tue, 22 Mar 2022 01:51:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=jM8eeUAB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230187AbiCVIMg (ORCPT + 99 others); Tue, 22 Mar 2022 04:12:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37518 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230181AbiCVIMb (ORCPT ); Tue, 22 Mar 2022 04:12:31 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 3E32C1A816 for ; Tue, 22 Mar 2022 01:11:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1647936662; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=njjwnGmzLURai6W3k0QTeK0O5fDkMxYNSy6QT89iDAo=; b=jM8eeUABS7botPkTe078lC0jrLmRLHH5jIWOCv0qB8nsbploHPnKPC+NQnvJIjptcf8Cb9 wb++4NrFa/N97hv7OSDiQZBBo8eEGOzTztRMtBeZzw95KYMSyXRWOEZrEfbXIoTEbsiSOt Q9PiM9F40IyqMkH9ZTEQWNq9IyDa58E= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-544-m6f8b7VAMv6Rt9_3hYWHEA-1; Tue, 22 Mar 2022 04:10:59 -0400 X-MC-Unique: m6f8b7VAMv6Rt9_3hYWHEA-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 8B98328035E3; Tue, 22 Mar 2022 08:10:58 +0000 (UTC) Received: from gshan.redhat.com (ovpn-12-33.pek2.redhat.com [10.72.12.33]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E156A1121324; Tue, 22 Mar 2022 08:10:52 +0000 (UTC) From: Gavin Shan To: kvmarm@lists.cs.columbia.edu Cc: linux-kernel@vger.kernel.org, eauger@redhat.com, shannon.zhaosl@gmail.com, maz@kernel.org, Jonathan.Cameron@huawei.com, will@kernel.org, pbonzini@redhat.com, james.morse@arm.com, mark.rutland@arm.com, drjones@redhat.com, vkuznets@redhat.com, shan.gavin@gmail.com Subject: [PATCH v5 20/22] KVM: arm64: Export SDEI capability Date: Tue, 22 Mar 2022 16:07:08 +0800 Message-Id: <20220322080710.51727-21-gshan@redhat.com> In-Reply-To: <20220322080710.51727-1-gshan@redhat.com> References: <20220322080710.51727-1-gshan@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The SDEI functionality is ready to be exported so far. This adds new capability (KVM_CAP_ARM_SDEI) and exports it. Signed-off-by: Gavin Shan --- Documentation/virt/kvm/api.rst | 10 ++++++++++ arch/arm64/kvm/arm.c | 3 +++ include/uapi/linux/kvm.h | 1 + 3 files changed, 14 insertions(+) diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst index 9f3172376ec3..06cf27f37b4d 100644 --- a/Documentation/virt/kvm/api.rst +++ b/Documentation/virt/kvm/api.rst @@ -7575,3 +7575,13 @@ The argument to KVM_ENABLE_CAP is also a bitmask, and must be a subset of the result of KVM_CHECK_EXTENSION. KVM will forward to userspace the hypercalls whose corresponding bit is in the argument, and return ENOSYS for the others. + +8.35 KVM_CAP_ARM_SDEI +--------------------- + +:Capability: KVM_CAP_ARM_SDEI +:Architectures: arm64 + +This capability indicates that the SDEI virtual service is supported +in the host. A VMM can check whether the service is available to enable +it. diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c index 3f532e1c4a95..ae3b53dfe88f 100644 --- a/arch/arm64/kvm/arm.c +++ b/arch/arm64/kvm/arm.c @@ -282,6 +282,9 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) case KVM_CAP_ARM_PTRAUTH_GENERIC: r = system_has_full_ptr_auth(); break; + case KVM_CAP_ARM_SDEI: + r = 1; + break; default: r = 0; } diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index 2d11c909ec42..5772385639b8 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -1135,6 +1135,7 @@ struct kvm_ppc_resize_hpt { #define KVM_CAP_XSAVE2 208 #define KVM_CAP_SYS_ATTRIBUTES 209 #define KVM_CAP_PPC_AIL_MODE_3 210 +#define KVM_CAP_ARM_SDEI 211 #ifdef KVM_CAP_IRQ_ROUTING -- 2.23.0