Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp3442228pxb; Mon, 4 Apr 2022 17:08:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyoh5UaQoCPXFWL4ZlYuJsi2g+pt2NdIO5eyPJmbSTZ471m+Dy+QRPYuKfeiXL96nexakQM X-Received: by 2002:a17:902:ecc8:b0:156:92d6:7c7a with SMTP id a8-20020a170902ecc800b0015692d67c7amr581268plh.75.1649117288842; Mon, 04 Apr 2022 17:08:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649117288; cv=none; d=google.com; s=arc-20160816; b=oS6cpzaLz3HTz4tqL1/ch6KFjePV600cgYI1ovJsnQsEJoUFfKNTGkEvvcl5aqG9Li 55d7AzyaOLwnb19dxulMW4UU2OmEMUqDNVrybWxB2WYsu2aNuvU65TksIire1zFKeaHk rh2thqvZgZadOeJPj/Xi3TcfSozeFu9mqg8RDynUUVBWlWmtce5ffYWZEm/vFW7rFZK8 DB0/dR5cHw+86ezsDaVJalEDofwQz3Qk+pdIecxZgkXdpkP9XlndbB0n7ESRTGVXaPD5 uPOiX5L/q9EJGaHkBaj5BRvqQfQQpxHjqiJqrI59tXrWup6Ff3vQEyNZK92IfCTzd+Sj QsQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=PrMW1GidvsPmhW46oQQCOc/ckEuxqUmXOy5/nPzOjBY=; b=VhmrjxOdUSpQu0sRN5VuJ9HK7QhSP28z+BP0eloZBCwVWbp2IgWxY2udH24HDA3H0A XHDYjfTN9SSeRG8pgawqWJoY2aYdOYGiPpAWt6hsGfw10EXZNNZwuOkCnu2fjeg36p9C A3+jQ1ngbMKzjPWBASfMY1app5ykKUWFibPmSyqa4QjLJG0XXUdNWO9a/VnbRBHX+8MW mTz/87k3D4ZunL7fF87D70RpsitaAmI5t5x/ZNIb4B3VjAvkmAatgFtHnNKv/AEF1web qs2JI0vwIs+4RVLwzBu/MX8SCO+0J0dQXjP5yQKMBpRl/EQYHnWoNrdsD4iNmaaLQdv+ IMzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BRFFoZ+i; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id pi19-20020a17090b1e5300b001c6deb4730asi433629pjb.109.2022.04.04.17.08.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Apr 2022 17:08:08 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BRFFoZ+i; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A6E9454BEE; Mon, 4 Apr 2022 16:41:26 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1354963AbiDCPnZ (ORCPT + 99 others); Sun, 3 Apr 2022 11:43:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42594 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1359332AbiDCPnD (ORCPT ); Sun, 3 Apr 2022 11:43:03 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1DA812DD61 for ; Sun, 3 Apr 2022 08:41:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1649000469; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=PrMW1GidvsPmhW46oQQCOc/ckEuxqUmXOy5/nPzOjBY=; b=BRFFoZ+iMFZ+w6nl6kdHwD18hEuA56/qL52PApnu46QYLjklYCeXs8f86/0JDdXqPREiGC alznjde/5SWBTuRUs6+a8F5wJjjJfOZYHtoCqpd1CJAIcR8IYe/bl9oTLF1eJxsrPgCpqt qK9eYXFUKpcz7rUqB+KXhoZb0dViujY= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-633-JnseUGxkPz2hLf1dmAnbPw-1; Sun, 03 Apr 2022 11:41:08 -0400 X-MC-Unique: JnseUGxkPz2hLf1dmAnbPw-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id B58303811A20; Sun, 3 Apr 2022 15:41:07 +0000 (UTC) Received: from gshan.redhat.com (ovpn-12-82.pek2.redhat.com [10.72.12.82]) by smtp.corp.redhat.com (Postfix) with ESMTPS id A7682403172; Sun, 3 Apr 2022 15:41:01 +0000 (UTC) From: Gavin Shan To: kvmarm@lists.cs.columbia.edu Cc: linux-kernel@vger.kernel.org, eauger@redhat.com, oupton@google.com, Jonathan.Cameron@huawei.com, vkuznets@redhat.com, will@kernel.org, shannon.zhaosl@gmail.com, james.morse@arm.com, mark.rutland@arm.com, maz@kernel.org, pbonzini@redhat.com, shan.gavin@gmail.com Subject: [PATCH v6 14/18] KVM: arm64: Support SDEI_EVENT_SIGNAL hypercall Date: Sun, 3 Apr 2022 23:39:07 +0800 Message-Id: <20220403153911.12332-15-gshan@redhat.com> In-Reply-To: <20220403153911.12332-1-gshan@redhat.com> References: <20220403153911.12332-1-gshan@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.85 on 10.11.54.10 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This supports SDEI_EVENT_SIGNAL hypercall. It's used by guest to inject event, whose number must be zero to the specified vCPU. As the shared event isn't supported, calling vCPU is assumed to be the target. Signed-off-by: Gavin Shan --- arch/arm64/kvm/sdei.c | 45 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) diff --git a/arch/arm64/kvm/sdei.c b/arch/arm64/kvm/sdei.c index ebdbe7810cf0..e1f6ab9800ee 100644 --- a/arch/arm64/kvm/sdei.c +++ b/arch/arm64/kvm/sdei.c @@ -455,6 +455,48 @@ static unsigned long hypercall_mask(struct kvm_vcpu *vcpu, bool mask) return ret; } +static unsigned long hypercall_signal(struct kvm_vcpu *vcpu) +{ + struct kvm_sdei_vcpu *vsdei = vcpu->arch.sdei; + struct kvm_sdei_event *event; + unsigned int num = smccc_get_arg(vcpu, 1); + unsigned long ret = SDEI_SUCCESS; + + /* + * The event must be the software signaled one, whose number + * is zero. + */ + if (!kvm_sdei_is_sw_signaled(num)) { + ret = SDEI_INVALID_PARAMETERS; + goto out; + } + + spin_lock(&vsdei->lock); + + /* Check if the vcpu has been masked */ + if (vsdei->masked) { + ret = SDEI_INVALID_PARAMETERS; + goto unlock; + } + + /* Check if the event exists */ + event = find_event(vcpu, num); + if (!event) { + ret = SDEI_INVALID_PARAMETERS; + goto unlock; + } + + if (inject_event(vcpu, event)) { + ret = SDEI_INVALID_PARAMETERS; + goto unlock; + } + +unlock: + spin_unlock(&vsdei->lock); +out: + return ret; +} + static unsigned long hypercall_reset(struct kvm_vcpu *vcpu, bool private) { struct kvm_sdei_vcpu *vsdei = vcpu->arch.sdei; @@ -539,6 +581,9 @@ int kvm_sdei_call(struct kvm_vcpu *vcpu) case SDEI_1_0_FN_SDEI_PE_UNMASK: ret = hypercall_mask(vcpu, false); break; + case SDEI_1_1_FN_SDEI_EVENT_SIGNAL: + ret = hypercall_signal(vcpu); + break; case SDEI_1_0_FN_SDEI_PRIVATE_RESET: ret = hypercall_reset(vcpu, true); break; -- 2.23.0