Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2861991pxk; Tue, 15 Sep 2020 04:28:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxsUaYmscOibVVlfwAOoF6PI0WW0ACnZVi23WUAj4xUI8cpR7DaHJS9lSu/w1Y2Ss/HY+PT X-Received: by 2002:a17:907:432b:: with SMTP id ob19mr19618188ejb.400.1600169293558; Tue, 15 Sep 2020 04:28:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600169293; cv=none; d=google.com; s=arc-20160816; b=HXpnw9LSX31j7xY53+Y9+QslCKKzbu+uGFYiYLIZ2pugFzws7r0HXbCJiKsG64qSaA lATkfZLSP2MCkUFFaJpvebOP2KRrkUxrs+GdmWSVfcxDIrN0ke7qM0/jDlgia1UjcKfs eJ+dlA4h5mv4G5OmY9jUbTso6zCHTwXx/CcoIyheC1EZNmWbQaioBlvsLvQFD1J2sMc+ ZvYYKHWBB8ZxfTxD0LwcvUxy88Zj1cnU0Ht8FRUVjff/Rt3hp7RXH7mdJcDYzeyU6/xY mjjmzEzC/u8+/0dPtRUEMApPyVSHnBUN5NPNP8OZ2ZEpnrBLsMb4ROOjd3UwzmOE9B5y 9rFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=6cVCOQ7d2lGCj+sz7IDzW+p3UDF4b8CRkA73qH7l96E=; b=xCz8Jew/7z/Mj7fyCFI3EOgsvqJk/3q70AddW98TNG44lcFRWPE/8uJS6EXYV+HINA UIU3bMMat1KKH3kx6NZUo2F/+qaVrM++nlK9Rg1AyRjmGCrmwYjUOPooSVBk5xuF48yp 5tGIYYB9ovDdrd6HNUNUeD1rikiVKSMwkSMV7cDsgPFszaxDcUC8gMDY1dFie8wlwQS6 A6Esu6x2xDXBIdvnJxF3j3ySOZt2Zq35TFcJaRS+3ctElTd0k5B+6WYpCBBjgWKCa1qO tqUDgtFWcbLR3F9GxlHntXH5PqD5gSnuk8iATF+Us9I1UolELgWWSRw+GdAmSvg3NV4P JaOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aqDppz5H; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rs1si8952602ejb.201.2020.09.15.04.27.50; Tue, 15 Sep 2020 04:28:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aqDppz5H; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726159AbgIOL0f (ORCPT + 99 others); Tue, 15 Sep 2020 07:26:35 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:52981 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726134AbgIOLYJ (ORCPT ); Tue, 15 Sep 2020 07:24:09 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1600169037; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=6cVCOQ7d2lGCj+sz7IDzW+p3UDF4b8CRkA73qH7l96E=; b=aqDppz5HApiZFKw3FTkK+pivO8p/LjX8d5cy/vupg/Z+9FcuuXCiR7t49z6uJI/eDar4ej NVUg2mKMAHl31uG5honNbdAf5YXqbJjc4qc7CS48K8lsOSHrX4XzmZcwMVZIR1NED9uQO3 SmMJjYDuEhQvA7dO3frylulsoHmuD+A= Received: from mail-wr1-f72.google.com (mail-wr1-f72.google.com [209.85.221.72]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-191-fyKEk54ANqypllDwUDLRSQ-1; Tue, 15 Sep 2020 07:23:54 -0400 X-MC-Unique: fyKEk54ANqypllDwUDLRSQ-1 Received: by mail-wr1-f72.google.com with SMTP id r15so1101400wrt.8 for ; Tue, 15 Sep 2020 04:23:53 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=6cVCOQ7d2lGCj+sz7IDzW+p3UDF4b8CRkA73qH7l96E=; b=TOY/U/OKl5oQd1IpI7wuXB2R96vA5hztO8SbUULbXwWgYHP0G05HaSzNpv5+1atEye bwPFKVXXkL9/sLG7ooLYs1nlanP9aLkrFUcLs5jZWqQKUCKJI6y9SYnIIyKODDLjo3A2 sb2lQyjXlT3arEfCmjHqXtv3cqmT9fvvXcmAgxFwMw+Lbc1I5VyN0pVnxszITRY1D/no NgTTElVFVGBVxNCcSANIYvVC2HYt/C2Ip/RwILLfX0exem/Uz7cLebS4aeVT+UocZxij jdTuvf6Vm4ZCGRE54A4O8qYA8PXhJlP+XOdA0zQNZNPnhJY1vkOr/sPc4Ac6bX6HiLaz Va+g== X-Gm-Message-State: AOAM533AIZqvDQJFE7CYE8GAL+D7+2fvTfcao6QgB/kFd2tJ+pKdpuOn x8hEJhKzpPtlGBpbhCSfWn08CR1gKvHbn3xHqrWFk9vf+iXOSB1Dg15t4+BeD1yVcYz/kACRMsQ u+kSCn1xP2NEAAgQhOJOOLofg X-Received: by 2002:a1c:f612:: with SMTP id w18mr4093225wmc.47.1600169032846; Tue, 15 Sep 2020 04:23:52 -0700 (PDT) X-Received: by 2002:a1c:f612:: with SMTP id w18mr4093200wmc.47.1600169032622; Tue, 15 Sep 2020 04:23:52 -0700 (PDT) Received: from vitty.brq.redhat.com (g-server-2.ign.cz. [91.219.240.2]) by smtp.gmail.com with ESMTPSA id x16sm25662251wrq.62.2020.09.15.04.23.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 15 Sep 2020 04:23:52 -0700 (PDT) From: Vitaly Kuznetsov To: Wei Liu Cc: Wei Liu , Linux on Hyper-V List , virtualization@lists.linux-foundation.org, Linux Kernel List , Michael Kelley , Vineeth Pillai , Sunil Muthuswamy , Nuno Das Neves , Lillian Grassin-Drake , "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "maintainer\:X86 ARCHITECTURE \(32-BIT AND 64-BIT\)" , "H. Peter Anvin" Subject: Re: [PATCH RFC v1 08/18] x86/hyperv: handling hypercall page setup for root In-Reply-To: <20200915111657.boa4cneqjqtmcaaq@liuwe-devbox-debian-v2> References: <20200914112802.80611-1-wei.liu@kernel.org> <20200914112802.80611-9-wei.liu@kernel.org> <87v9gfjpoi.fsf@vitty.brq.redhat.com> <20200915103710.cqmdvzh5lys4wsqo@liuwe-devbox-debian-v2> <87pn6njob3.fsf@vitty.brq.redhat.com> <20200915111657.boa4cneqjqtmcaaq@liuwe-devbox-debian-v2> Date: Tue, 15 Sep 2020 13:23:50 +0200 Message-ID: <87h7rzjnax.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Wei Liu writes: > On Tue, Sep 15, 2020 at 01:02:08PM +0200, Vitaly Kuznetsov wrote: >> Wei Liu writes: >> >> > On Tue, Sep 15, 2020 at 12:32:29PM +0200, Vitaly Kuznetsov wrote: >> >> Wei Liu writes: >> >> >> >> > When Linux is running as the root partition, the hypercall page will >> >> > have already been setup by Hyper-V. Copy the content over to the >> >> > allocated page. >> >> >> >> And we can't setup a new hypercall page by writing something different >> >> to HV_X64_MSR_HYPERCALL, right? >> >> >> > >> > My understanding is that we can't, but Sunil can maybe correct me. >> > >> >> > >> >> > The suspend, resume and cleanup paths remain untouched because they are >> >> > not supported in this setup yet. >> >> > >> >> > Signed-off-by: Lillian Grassin-Drake >> >> > Signed-off-by: Sunil Muthuswamy >> >> > Signed-off-by: Nuno Das Neves >> >> > Co-Developed-by: Lillian Grassin-Drake >> >> > Co-Developed-by: Sunil Muthuswamy >> >> > Co-Developed-by: Nuno Das Neves >> >> > Signed-off-by: Wei Liu >> >> > --- >> >> > arch/x86/hyperv/hv_init.c | 26 ++++++++++++++++++++++++-- >> >> > 1 file changed, 24 insertions(+), 2 deletions(-) >> >> > >> >> > diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c >> >> > index 0eec1ed32023..26233aebc86c 100644 >> >> > --- a/arch/x86/hyperv/hv_init.c >> >> > +++ b/arch/x86/hyperv/hv_init.c >> >> > @@ -25,6 +25,7 @@ >> >> > #include >> >> > #include >> >> > #include >> >> > +#include >> >> > >> >> > /* Is Linux running as the root partition? */ >> >> > bool hv_root_partition; >> >> > @@ -448,8 +449,29 @@ void __init hyperv_init(void) >> >> > >> >> > rdmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64); >> >> > hypercall_msr.enable = 1; >> >> > - hypercall_msr.guest_physical_address = vmalloc_to_pfn(hv_hypercall_pg); >> >> > - wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64); >> >> > + >> >> > + if (hv_root_partition) { >> >> > + struct page *pg; >> >> > + void *src, *dst; >> >> > + >> >> > + /* >> >> > + * Order is important here. We must enable the hypercall page >> >> > + * so it is populated with code, then copy the code to an >> >> > + * executable page. >> >> > + */ >> >> > + wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64); >> >> > + >> >> > + pg = vmalloc_to_page(hv_hypercall_pg); >> >> > + dst = kmap(pg); >> >> > + src = memremap(hypercall_msr.guest_physical_address << PAGE_SHIFT, PAGE_SIZE, >> >> > + MEMREMAP_WB); >> >> >> >> memremap() can fail... >> > >> > And we don't care here, if it fails, we would rather it panic or oops. >> > >> > I was relying on the fact that copying from / to a NULL pointer will >> > cause the kernel to crash. But of course it wouldn't hurt to explicitly >> > panic here. >> > >> >> >> >> > + memcpy(dst, src, PAGE_SIZE); >> >> > + memunmap(src); >> >> > + kunmap(pg); >> >> > + } else { >> >> > + hypercall_msr.guest_physical_address = vmalloc_to_pfn(hv_hypercall_pg); >> >> > + wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64); >> >> > + } >> >> >> >> Why can't we do wrmsrl() for both cases here? >> >> >> > >> > Because the hypercall page has already been set up when Linux is the >> > root. >> >> But you already do wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64) >> in 'if (hv_root_partition)' case above, that's why I asked. >> > > You mean extracting wrmsrl to this point? The ordering matters. See the > comment in the root branch -- we have to enable the page before copying > the content. > > What can be done is: > > if (!root) { > /* some stuff */ > } > > wrmsrl(...) > > if (root) { > /* some stuff */ > } > > This is not looking any better than the existing code. > Oh, I missed the comment indeed. So Hypervisor already picked a page for us, however, it didn't enable it and it's not populated? How can we be sure that we didn't use it for something else already? Maybe we can still give a different known-to-be-empty page? -- Vitaly