Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp3525284pxb; Mon, 4 Apr 2022 19:55:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzPT+3PNxwwdL4mHnoxDFMHvsKytp4aaBdTI559/6qRTH5O2O11GYMojVpcOrc3IYCiy9Vq X-Received: by 2002:a17:902:9b95:b0:151:533b:9197 with SMTP id y21-20020a1709029b9500b00151533b9197mr1373037plp.66.1649127334294; Mon, 04 Apr 2022 19:55:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649127334; cv=none; d=google.com; s=arc-20160816; b=xSF2ZW/xkVb2YgZO99b6h8hALXVqgZvh7RhIfBzaYrWm2IYmndzMW9mCjkqjNjfiYm y9n2c70LhH78KHPna9yXJoH+oQfPtFEGed1pUoExbUj4XtYyC+9nOYAdAnAjn1LfQAIN BLMKup92GAa+a5T0XRTmO92+B/Ir6yzvJZtq1IhF8r0lto9r4Q8BaiDLbeaiFtEt7Jfl wHuOV5OoNvijLPpA8kYrVQ20huEHymmGq+bKA7X4C46dKbdtBplUju+gfHlIlXgV+OHw IofX/PUuGNcAPEiqm3KFlxylX7nGFUu94Sgo6Z9KUkFWkVFvcz0jOYE6KBY2OnJC6Dj6 fTHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=9lEo1vYagHbuDvOHHz7jGfQGWnUXmF26JqdCfdJr4Xk=; b=SvTHwbr8tSGhky+XDvDkEvr1wttWOk6GuwT5+/6SEgMaxjdRFvRyEXbvYnIG7ru+r1 +VXlGWDWZ9xwJDKCsk4HOlefsVrcvqGnpiNS+Yd0hnv2umKBj0RrFo3mub1dS9JSyfoK 4GW/BxZW+pDr6L/MTK7c8Mn3fht+YCWWmyBb/4yWNi7CxQyrem6eDOfII3LtHw4ZQxEp i2F61LIekqUCSsmL/NhgKHdrTlXM+icHhwAaklw8cqt4hQ4wIxv+QyqxANoB4IroPkYS xgPz2ffKB30pAuqui84X6KQyEhauKU2/kwkbm1NzWYpRmBVsX2cXy2Tc3rZgLNh76nxy evWA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=WyEptZai; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id w7-20020a655347000000b0039905cd15f7si7111727pgr.344.2022.04.04.19.55.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Apr 2022 19:55:34 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=WyEptZai; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 30A613FA5AE; Mon, 4 Apr 2022 18:20:04 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1355047AbiDCPmI (ORCPT + 99 others); Sun, 3 Apr 2022 11:42:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38028 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1359225AbiDCPmD (ORCPT ); Sun, 3 Apr 2022 11:42:03 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B18322496C for ; Sun, 3 Apr 2022 08:40:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1649000404; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=9lEo1vYagHbuDvOHHz7jGfQGWnUXmF26JqdCfdJr4Xk=; b=WyEptZain2/z3XgWHGcj4amjgghiLW5411oVgmp+KotzJnEmbbtl9dJvT580db2TnJTgNl yjIpL6N6FAMWtV5UfpyTeTHgNX4GWXwZTSD4z5b0FMr/vuvmiJV44Ofw/ZsRk8FuvN7R8n 03mfap+9tv5pVcxSc2dF4cDaaoyIwvQ= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-280-iVS-vYIFO2CGM-WfXn9xhw-1; Sun, 03 Apr 2022 11:40:00 -0400 X-MC-Unique: iVS-vYIFO2CGM-WfXn9xhw-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id AC5CB2999B23; Sun, 3 Apr 2022 15:39:59 +0000 (UTC) Received: from gshan.redhat.com (ovpn-12-82.pek2.redhat.com [10.72.12.82]) by smtp.corp.redhat.com (Postfix) with ESMTPS id B66F9403172; Sun, 3 Apr 2022 15:39:53 +0000 (UTC) From: Gavin Shan To: kvmarm@lists.cs.columbia.edu Cc: linux-kernel@vger.kernel.org, eauger@redhat.com, oupton@google.com, Jonathan.Cameron@huawei.com, vkuznets@redhat.com, will@kernel.org, shannon.zhaosl@gmail.com, james.morse@arm.com, mark.rutland@arm.com, maz@kernel.org, pbonzini@redhat.com, shan.gavin@gmail.com Subject: [PATCH v6 04/18] KVM: arm64: Support SDEI_EVENT_REGISTER hypercall Date: Sun, 3 Apr 2022 23:38:57 +0800 Message-Id: <20220403153911.12332-5-gshan@redhat.com> In-Reply-To: <20220403153911.12332-1-gshan@redhat.com> References: <20220403153911.12332-1-gshan@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.85 on 10.11.54.10 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This supports SDEI_EVENT_REGISTER hypercall, which is used by guest to register event. The event won't be raised until it's registered and enabled. For those KVM owned events, they can't be registered if they aren't exposed. Signed-off-by: Gavin Shan --- arch/arm64/kvm/sdei.c | 78 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 78 insertions(+) diff --git a/arch/arm64/kvm/sdei.c b/arch/arm64/kvm/sdei.c index 3507e33ec00e..89c1b231cb60 100644 --- a/arch/arm64/kvm/sdei.c +++ b/arch/arm64/kvm/sdei.c @@ -25,6 +25,81 @@ static struct kvm_sdei_exposed_event exposed_events[] = { for (idx = 0, event = &exposed_events[0]; \ idx < ARRAY_SIZE(exposed_events); \ idx++, event++) +#define kvm_sdei_for_each_event(vsdei, event, idx) \ + for (idx = 0, event = &vsdei->events[0]; \ + idx < ARRAY_SIZE(exposed_events); \ + idx++, event++) + +static struct kvm_sdei_event *find_event(struct kvm_vcpu *vcpu, + unsigned int num) +{ + struct kvm_sdei_vcpu *vsdei = vcpu->arch.sdei; + struct kvm_sdei_event *event; + int i; + + kvm_sdei_for_each_event(vsdei, event, i) { + if (event->exposed_event->num == num) + return event; + } + + return NULL; +} + +static unsigned long hypercall_register(struct kvm_vcpu *vcpu) +{ + struct kvm_sdei_vcpu *vsdei = vcpu->arch.sdei; + struct kvm_sdei_event *event; + unsigned int num = smccc_get_arg(vcpu, 1); + unsigned long ep_address = smccc_get_arg(vcpu, 2); + unsigned long ep_arg = smccc_get_arg(vcpu, 3); + unsigned long route_mode = smccc_get_arg(vcpu, 4); + unsigned long route_affinity = smccc_get_arg(vcpu, 5); + unsigned long ret = SDEI_SUCCESS; + + if (!kvm_sdei_is_supported(num)) { + ret = SDEI_INVALID_PARAMETERS; + goto out; + } + + if (route_mode != SDEI_EVENT_REGISTER_RM_ANY && + route_mode != SDEI_EVENT_REGISTER_RM_PE) { + ret = SDEI_INVALID_PARAMETERS; + goto out; + } + + spin_lock(&vsdei->lock); + + /* + * The event should have been existing. Otherwise, the event + * isn't exposed yet. + */ + event = find_event(vcpu, num); + if (!event) { + ret = SDEI_INVALID_PARAMETERS; + goto unlock; + } + + /* + * Check if the event has been registered or pending for + * unregistration. + */ + if (kvm_sdei_is_registered(event) || + kvm_sdei_is_unregister_pending(event)) { + ret = SDEI_DENIED; + goto unlock; + } + + event->route_mode = route_mode; + event->route_affinity = route_affinity; + event->ep_address = ep_address; + event->ep_arg = ep_arg; + kvm_sdei_set_registered(event); + +unlock: + spin_unlock(&vsdei->lock); +out: + return ret; +} int kvm_sdei_call(struct kvm_vcpu *vcpu) { @@ -47,6 +122,9 @@ int kvm_sdei_call(struct kvm_vcpu *vcpu) } switch (func) { + case SDEI_1_0_FN_SDEI_EVENT_REGISTER: + ret = hypercall_register(vcpu); + break; default: ret = SDEI_NOT_SUPPORTED; } -- 2.23.0