Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp792666imm; Mon, 9 Jul 2018 10:42:57 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcEjY3BHCJbOdo+5LuEEuG6ePEPEWRaSC2Efj8uFIyVTaIivt2PeufCimvaTgo2/+A6Uaog X-Received: by 2002:a63:b445:: with SMTP id n5-v6mr15437789pgu.104.1531158177322; Mon, 09 Jul 2018 10:42:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531158177; cv=none; d=google.com; s=arc-20160816; b=r7tqOsh8iGOnNrkftGXnHU2+m8pmUM2oDrfc6oTq55241XHo5QTE618WdTg4bbSS+1 VzhzR7RIChSA8cLExStmIasFNmKPENF/MF7dyId6XrBika1JdeUY/+KDUw9Br6NXv/pm ruco0AcYhCBwcE/nRl60BeT4W868V5yZJQNYpQ5L0BFkwqrc9IbRJWJYfcW4pbjNKk3O ICzTUdXl6k2HeY1YVdVP/lRGPNxO2BiL4FHxyfJWpD+/0XBzf/NM8Zv/dcphWuB9hEeE jh/U+ITj2IQfM7NsqlENUIlLFsevuvs/Ur+pwkarIRGX9CTP1zAH1uig+Zk5075rBgga lRrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=fM1Y5Dw5Lu8g+rAktRWjf+d8vQCOBQi+pcqa3oHlm+0=; b=oLMmBaRzTcNygzod/HuQ0Hs4rWxr9sARDGOvY9HqmV3B9OUbLnVzKHy1LEUhk7nSXj Zz3dGQYcIXWfkUuFLYdeEovdxyVu+C4QwGgUlsZp3YjgnZ8PNvYId4VIGGHoesl8wsz+ 5JSl7AYnO1PLN5I9gam/wkYxgeUXq8zpK3XGmv5GwCVV5VZEAoXwRG8M+yYUEkUcg9rD x+ujRvl+t7RkLYPqVUaqQh/Cl7FEcVM4YCseL4tPMw8mIYwHxW6JXeBPCqi7f5oRD7ko RFZp9cSzYAjhF5By+UwzrR/szJI7Wzzs+regFqsoXEfz/wDK6IQyNISl/5lvTjkjxTUc sUpQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r12-v6si15870568pfd.193.2018.07.09.10.42.42; Mon, 09 Jul 2018 10:42:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933756AbeGIRkR (ORCPT + 99 others); Mon, 9 Jul 2018 13:40:17 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:60330 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933594AbeGIRkQ (ORCPT ); Mon, 9 Jul 2018 13:40:16 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B1F9240122D4; Mon, 9 Jul 2018 17:40:15 +0000 (UTC) Received: from vitty.brq.redhat.com (unknown [10.43.2.155]) by smtp.corp.redhat.com (Postfix) with ESMTP id 16F8A2156891; Mon, 9 Jul 2018 17:40:13 +0000 (UTC) From: Vitaly Kuznetsov To: x86@kernel.org Cc: "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , "Michael Kelley (EOSG)" , devel@linuxdriverproject.org, Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , linux-kernel@vger.kernel.org Subject: [PATCH 0/2] x86/hyper-v: cope with VP_INVAL in PV TLB flush code Date: Mon, 9 Jul 2018 19:40:10 +0200 Message-Id: <20180709174012.17429-1-vkuznets@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Mon, 09 Jul 2018 17:40:15 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Mon, 09 Jul 2018 17:40:15 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'vkuznets@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit 1268ed0c474a ("x86/hyper-v: Fix the circular dependency in IPI enlightenment") made it possible to observe VP_INVAL returned from hv_cpu_number_to_vp_number() and cpumask_to_vpset() and PV TLB flush code needs to be adjusted. The window when VP_INVAL is observable is very short, I'm not even sure we do TLB flushes during this period (secodary CPUs bringup on boot, there is no CPU hotplug on Hyper-V yet). This, however, may change in future so let's fix this now. Thomas, Ingo: these patches are for 'tip/x86/hyperv'. I don't think we have a real issue in 4.18 but I can definitely prepare fixes for it if you think this is needed. Vitaly Kuznetsov (2): x86/hyper-v: check cpumask_to_vpset() return value in hyperv_flush_tlb_others_ex() x86/hyper-v: check for VP_INVAL in hyperv_flush_tlb_others() arch/x86/hyperv/mmu.c | 7 +++++++ 1 file changed, 7 insertions(+) -- 2.14.4