Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp322477imu; Mon, 26 Nov 2018 11:22:38 -0800 (PST) X-Google-Smtp-Source: AFSGD/XL/tsro9kPdk75CsE7ad1M5vr/U/2kD1479TylFb/OyaJMeFM/LWpEI5u3bwVe3Woov6+C X-Received: by 2002:a63:5a08:: with SMTP id o8mr26022007pgb.185.1543260158095; Mon, 26 Nov 2018 11:22:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543260158; cv=none; d=google.com; s=arc-20160816; b=vmFlPG0D/7HZxBs13YMKBrjR5PuQ5+3yzNEokwdHDWe+QI/PmOrOYSS2zuQiL6uxOG gUSE/AD/OjNumIFLUbPtYHIfIcCqjev53zEzTYq/SDLIOr/zgSg0ySxiqI9WxIh+EshZ nCaha4e6Y11CsR9GonhvCHmIDCJ5Y38Atxz6XDItExbxUpUJl4ExLER4BU9qupnBoLLv g+BZd1LTd7phPPdYRLXzTRWcOv3szCS1KZGHJKvLSSigvfecVt6otgWov+JIWiFQTFcl 3TILEwd+tsl1eoU3rzpVetDOnyKk3DnpHTFUyTvAZhkuvMN3ZPrl7CPj6BzvBIP+MkoH klMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=XW6od99W42MywS30aigdsFJEEtRiOYwZ1uroSYtnvsk=; b=l2A0ChS3r17JImE1jS6L4Ah6iqgSaHS/IxOTO45ERrDAQszl21Mus8boK/Pih9LeJP bXYhM3Cq5nQ7Cgnh7yOaOmYtK9ZE3IeCFvvnTUAKty9hsCfHV5KzADCh4yoTayTbSw6L i4maLTSXdBpm02xvz2z1F8LTajm8kMCJEMQ01ZIvsWkNZUQ1yIicnK5iEuDUcYEf6Y+1 WODhy+YXZS10Vc2nklICiMxl4psz/l720xkGsxyeS3RLkPMTWITAzL9RTXCkG6Iz2BSz 7n25283qhgsI7idgqSjzDnLEXjTd2n/anmjt18Z3zTYDkkEu6r+bJ2MkKm+TBtEt0u66 UYYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xgHECmlc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v3si1092888pgh.305.2018.11.26.11.22.02; Mon, 26 Nov 2018 11:22:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xgHECmlc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726516AbeK0GQJ (ORCPT + 99 others); Tue, 27 Nov 2018 01:16:09 -0500 Received: from mail.kernel.org ([198.145.29.99]:49092 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725884AbeK0GQJ (ORCPT ); Tue, 27 Nov 2018 01:16:09 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4342C20664; Mon, 26 Nov 2018 19:21:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543260063; bh=arTvBTMHo211CEFsQZ3llYCvJQPZMMCwd5uKDaPt9Y8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=xgHECmlc9AR/cgJ/axLTIfy0mednZ0kWh5N45K2uL4JVmRfWtYaMAU2rDo6tfu4E5 va92Nf0mf5b2GmnH7qQSYsYdmjQ3c6EVsvmF+gWmHSo2UwiG8XRxKzGp8TbZPXIDRo MGGhNdJMQuot+OfbrmRGLJLjoBDHUd9exue1KTMg= Date: Mon, 26 Nov 2018 20:21:01 +0100 From: Greg KH To: kys@microsoft.com Cc: will.deacon@arm.com, catalin.marinas@armm.com, mark.rutland@arm.com, marc.zyngier@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, devel@linuxdriverproject.org, olaf@aepfle.de, apw@canonical.com, jasowang@redhat.com, sthemmin@microsoft.com, Michael.H.Kelley@microsoft.com, vkuznets@redhat.com, Michael Kelley Subject: Re: [PATCH 3/4] Drivers: hv: vmbus: Add hooks for per-CPU IRQ Message-ID: <20181126192101.GC32208@kroah.com> References: <20181122030914.16274-1-kys@linuxonhyperv.com> <20181122031059.16338-1-kys@linuxonhyperv.com> <20181122031059.16338-3-kys@linuxonhyperv.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181122031059.16338-3-kys@linuxonhyperv.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 22, 2018 at 03:10:58AM +0000, kys@linuxonhyperv.com wrote: > From: Michael Kelley > > Add hooks to enable/disable a per-CPU IRQ for VMbus. These hooks > are in the architecture independent setup and shutdown paths for > Hyper-V, and are needed by Linux guests on Hyper-V on ARM64. The > x86/x64 implementation is null because VMbus interrupts on x86/x64 > don't use an IRQ. > > Signed-off-by: Michael Kelley > Signed-off-by: K. Y. Srinivasan > --- > arch/x86/include/asm/mshyperv.h | 4 ++++ > drivers/hv/hv.c | 2 ++ > 2 files changed, 6 insertions(+) > > diff --git a/arch/x86/include/asm/mshyperv.h b/arch/x86/include/asm/mshyperv.h > index 0d6271cce198..8d97bd3a13a6 100644 > --- a/arch/x86/include/asm/mshyperv.h > +++ b/arch/x86/include/asm/mshyperv.h > @@ -109,6 +109,10 @@ void hyperv_vector_handler(struct pt_regs *regs); > void hv_setup_vmbus_irq(void (*handler)(void)); > void hv_remove_vmbus_irq(void); > > +/* On x86/x64, there isn't a real IRQ to be enabled/disable */ > +static inline void hv_enable_vmbus_irq(void) {} > +static inline void hv_disable_vmbus_irq(void) {} > + > void hv_setup_kexec_handler(void (*handler)(void)); > void hv_remove_kexec_handler(void); > void hv_setup_crash_handler(void (*handler)(struct pt_regs *regs)); > diff --git a/drivers/hv/hv.c b/drivers/hv/hv.c > index 166c2501de17..d0bb09a4bd73 100644 > --- a/drivers/hv/hv.c > +++ b/drivers/hv/hv.c > @@ -307,6 +307,7 @@ int hv_synic_init(unsigned int cpu) > hv_set_siefp(siefp.as_uint64); > > /* Setup the shared SINT. */ > + hv_enable_vmbus_irq(); > hv_get_synint_state(VMBUS_MESSAGE_SINT, shared_sint.as_uint64); > > shared_sint.vector = HYPERVISOR_CALLBACK_VECTOR; > @@ -434,6 +435,7 @@ int hv_synic_cleanup(unsigned int cpu) > /* Disable the global synic bit */ > sctrl.enable = 0; > hv_set_synic_state(sctrl.as_uint64); > + hv_disable_vmbus_irq(); > > return 0; > } > -- > 2.19.1 You created "null" hooks that do nothing, for no one in this patch series, why? Add them when they are needed not now. If I saw this code in the tree, I would just go delete it as it is because it is not used at all. thanks, greg k-h