Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp472337pxb; Tue, 9 Feb 2021 05:15:22 -0800 (PST) X-Google-Smtp-Source: ABdhPJyB30MPjBtgvzG4ZuTyWGlZ26zqyv0CkFOwhJcy0c7misHI92YjA4ngDhAnWKqYmtF7mgTt X-Received: by 2002:a17:907:7785:: with SMTP id ky5mr22547613ejc.176.1612876522162; Tue, 09 Feb 2021 05:15:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612876522; cv=none; d=google.com; s=arc-20160816; b=ssOC2t3Mws37HM2FW2zRzVtwJOU+VabmLU3+z1d0cYRyTZaSvw5Le8pLMze1MRwngH 4Yj0Dl/1KmrPr5JzoDym3+SerIip5dOIbgSgWobfq6G9+z6kBO4zcxvuj7Y/AtifO0VI Eg8oSOA1711w78eyB+WmJO2BIrbQD8QP6NlSChF/2d2NJ6AOyom8yXXN2WCUSSa4PJbv YzXMo0wWyQhcXZeEw1PVBtiLT1kKak26OuPg/+6jK3KhTfxJajHX+bX4aPJZq17u9EJ2 CDJgD64ZrmpBhzIj/SH7saPNBxTqig7bwp9O5DV34IJPlH07QaopR49CXt9iOpHejj0k y5Wg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=JPV4E371pW4Hi/fRCT2lEIP2ic6FNIvRlNKRhMtd+mg=; b=Deg92KI5rSuigpfLdZhhTgencuLDTZW/Tw6JLd948WbU7GRZuP75UB+66WQdw/Pw5F A8czA6FePGh5B3GzM3H9UoErHuWz5onXh0viNsjOlhXsLJboO3e3OlqyUPKcnWanFr/4 NPGgurmTLCWdmrn3Vj5tjHC0e+a7+XA/rmeV7eBjABhkLvuUd2M6WIlvDhKTg9bAHUQl Nd/r6Z2WPYn+cRVXO/VXIfRFU25848jIUBo1QjLAzqH6k7o1zPEPjdaau+pKlwAkdXG/ ubKkXwdbUNygrtPPV5kTJy8+DtJtEzJ9MNLsdJsdiSQJqP/eIwHghvej9SVcLo9A6FuP Jr0w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ICYGiUnp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e26si15965861edv.363.2021.02.09.05.14.56; Tue, 09 Feb 2021 05:15:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ICYGiUnp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230346AbhBINNV (ORCPT + 99 others); Tue, 9 Feb 2021 08:13:21 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:39270 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230228AbhBINNN (ORCPT ); Tue, 9 Feb 2021 08:13:13 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1612876305; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=JPV4E371pW4Hi/fRCT2lEIP2ic6FNIvRlNKRhMtd+mg=; b=ICYGiUnpzGfi2GAnYALp6ZWBULxUyu/A13I+l8sfiQMFTJyOXJqL5unxPrbCt22fZNWFl/ M7Vf/zL4+7kptxsPdvDIkmhnk/I1Ol4U57OkgkESSoIG4vy2IPsHJaMH6cuykpAXHgUSd5 xh31E6vL5k8uUmIOZVQMEBZ3hDX9R8Y= Received: from mail-ej1-f70.google.com (mail-ej1-f70.google.com [209.85.218.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-450-kEcy1ZJOOpaCQbIrU35_WQ-1; Tue, 09 Feb 2021 08:11:43 -0500 X-MC-Unique: kEcy1ZJOOpaCQbIrU35_WQ-1 Received: by mail-ej1-f70.google.com with SMTP id aq28so15350997ejc.20 for ; Tue, 09 Feb 2021 05:11:43 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=JPV4E371pW4Hi/fRCT2lEIP2ic6FNIvRlNKRhMtd+mg=; b=VnAnmS4EZmSzSFhpfT7Xl8kbmet8RU6BIouFpvTkusUVNlgj5XM7o6Cco4jMjzYgDI brSjh0xC+UfhKdzM5PlPN8zcKjkzN6Yfcc9/rqqQX1BJSMnbFuK2FEusFmalXcqRReeu wknJVRUUzIbnFIII5QuJF0i7HZfUEDltFvjWxMsupghNR+6u2fvwoF7wrpQJT9/tnl92 C7Dv5ykIYAm1bMlkFXMxtvUnA6RzHH92v+VNoQSwQzI2ySwxtfAFsMbkJ1Wm2B9ROscF VuD1KSwu3jsFTY/Y9z/RCJ+j0Ww5KpOLfnT47YA7byZsJo4WrUkNCeSS8tizhvqEQjKf BbTQ== X-Gm-Message-State: AOAM533Iyaec72EDdm2p+K3jTtZe3nmafKp0WGt4R2/btglbcrHEz4Cl Ctvk2lwCaACdw8qMQLuJkz4FdcyvWkne55vLSxjcwShEUfRcZ0JeWrMePOQtHZRFH7zFFnWW88t oPGIgifpkLkW6jMUoVzfvwz9X X-Received: by 2002:a05:6402:3514:: with SMTP id b20mr22296858edd.100.1612876302602; Tue, 09 Feb 2021 05:11:42 -0800 (PST) X-Received: by 2002:a05:6402:3514:: with SMTP id b20mr22296839edd.100.1612876302385; Tue, 09 Feb 2021 05:11:42 -0800 (PST) Received: from vitty.brq.redhat.com (g-server-2.ign.cz. [91.219.240.2]) by smtp.gmail.com with ESMTPSA id hc13sm4831808ejc.5.2021.02.09.05.11.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Feb 2021 05:11:41 -0800 (PST) From: Vitaly Kuznetsov To: Nuno Das Neves , linux-hyperv@vger.kernel.org Cc: virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, mikelley@microsoft.com, viremana@linux.microsoft.com, sunilmut@microsoft.com, nunodasneves@linux.microsoft.com, wei.liu@kernel.org, ligrassi@microsoft.com, kys@microsoft.com Subject: Re: [RFC PATCH 04/18] virt/mshv: request version ioctl In-Reply-To: <1605918637-12192-5-git-send-email-nunodasneves@linux.microsoft.com> References: <1605918637-12192-1-git-send-email-nunodasneves@linux.microsoft.com> <1605918637-12192-5-git-send-email-nunodasneves@linux.microsoft.com> Date: Tue, 09 Feb 2021 14:11:40 +0100 Message-ID: <87y2fxmlmb.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Nuno Das Neves writes: > Reserve ioctl number in userpsace-api/ioctl/ioctl-number.rst > Introduce MSHV_REQUEST_VERSION ioctl. > Introduce documentation for /dev/mshv in Documentation/virt/mshv > > Signed-off-by: Nuno Das Neves > --- > .../userspace-api/ioctl/ioctl-number.rst | 2 + > Documentation/virt/mshv/api.rst | 62 +++++++++++++++++++ > include/linux/mshv.h | 11 ++++ > include/uapi/linux/mshv.h | 19 ++++++ > virt/mshv/mshv_main.c | 49 +++++++++++++++ > 5 files changed, 143 insertions(+) > create mode 100644 Documentation/virt/mshv/api.rst > create mode 100644 include/linux/mshv.h > create mode 100644 include/uapi/linux/mshv.h > > diff --git a/Documentation/userspace-api/ioctl/ioctl-number.rst b/Documentation/userspace-api/ioctl/ioctl-number.rst > index 55a2d9b2ce33..13a4d3ecafca 100644 > --- a/Documentation/userspace-api/ioctl/ioctl-number.rst > +++ b/Documentation/userspace-api/ioctl/ioctl-number.rst > @@ -343,6 +343,8 @@ Code Seq# Include File Comments > 0xB5 00-0F uapi/linux/rpmsg.h > 0xB6 all linux/fpga-dfl.h > 0xB7 all uapi/linux/remoteproc_cdev.h > +0xB8 all uapi/linux/mshv.h Microsoft Hypervisor root partition APIs > + > 0xC0 00-0F linux/usb/iowarrior.h > 0xCA 00-0F uapi/misc/cxl.h > 0xCA 10-2F uapi/misc/ocxl.h > diff --git a/Documentation/virt/mshv/api.rst b/Documentation/virt/mshv/api.rst > new file mode 100644 > index 000000000000..82e32de48d03 > --- /dev/null > +++ b/Documentation/virt/mshv/api.rst > @@ -0,0 +1,62 @@ > +.. SPDX-License-Identifier: GPL-2.0 > + > +===================================================== > +Microsoft Hypervisor Root Partition API Documentation > +===================================================== > + > +1. Overview > +=========== > + > +This document describes APIs for creating and managing guest virtual machines > +when running Linux as the root partition on the Microsoft Hypervisor. > + > +This API is not yet stable. > + > +2. Glossary/Terms > +================= > + > +hv > +-- > +Short for Hyper-V. This name is used in the kernel to describe interfaces to > +the Microsoft Hypervisor. > + > +mshv > +---- > +Short for Microsoft Hypervisor. This is the name of the userland API module > +described in this document. > + > +Partition > +--------- > +A virtual machine running on the Microsoft Hypervisor. > + > +Root Partition > +-------------- > +The partition that is created and assumes control when the machine boots. The > +root partition can use mshv APIs to create guest partitions. > + > +3. API description > +================== > + > +The module is named mshv and can be configured with CONFIG_HYPERV_ROOT_API. > + > +Mshv is file descriptor-based, following a similar pattern to KVM. > + > +To get a handle to the mshv driver, use open("/dev/mshv"). > + > +3.1 MSHV_REQUEST_VERSION > +------------------------ > +:Type: /dev/mshv ioctl > +:Parameters: pointer to a u32 > +:Returns: 0 on success > + > +Before issuing any other ioctls, a MSHV_REQUEST_VERSION ioctl must be called to > +establish the interface version with the kernel module. > + > +The caller should pass the MSHV_VERSION as an argument. > + > +The kernel module will check which interface versions it supports and return 0 > +if one of them matches. > + > +This /dev/mshv file descriptor will remain 'locked' to that version as long as > +it is open - this ioctl can only be called once per open. > + KVM used to have KVM_GET_API_VERSION too but this turned out to be not very convenient so we use capabilities (KVM_CHECK_EXTENSION/KVM_ENABLE_CAP) instead. > diff --git a/include/linux/mshv.h b/include/linux/mshv.h > new file mode 100644 > index 000000000000..a0982fe2c0b8 > --- /dev/null > +++ b/include/linux/mshv.h > @@ -0,0 +1,11 @@ > +/* SPDX-License-Identifier: GPL-2.0-only */ > +#ifndef _LINUX_MSHV_H > +#define _LINUX_MSHV_H > + > +/* > + * Microsoft Hypervisor root partition driver for /dev/mshv > + */ > + > +#include > + > +#endif > diff --git a/include/uapi/linux/mshv.h b/include/uapi/linux/mshv.h > new file mode 100644 > index 000000000000..dd30fc2f0a80 > --- /dev/null > +++ b/include/uapi/linux/mshv.h > @@ -0,0 +1,19 @@ > +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ > +#ifndef _UAPI_LINUX_MSHV_H > +#define _UAPI_LINUX_MSHV_H > + > +/* > + * Userspace interface for /dev/mshv > + * Microsoft Hypervisor root partition APIs > + */ > + > +#include > + > +#define MSHV_VERSION 0x0 > + > +#define MSHV_IOCTL 0xB8 > + > +/* mshv device */ > +#define MSHV_REQUEST_VERSION _IOW(MSHV_IOCTL, 0x00, __u32) > + > +#endif > diff --git a/virt/mshv/mshv_main.c b/virt/mshv/mshv_main.c > index ecb9089761fe..62f631f85301 100644 > --- a/virt/mshv/mshv_main.c > +++ b/virt/mshv/mshv_main.c > @@ -11,25 +11,74 @@ > #include > #include > #include > +#include > +#include > > MODULE_AUTHOR("Microsoft"); > MODULE_LICENSE("GPL"); > > +#define MSHV_INVALID_VERSION 0xFFFFFFFF > +#define MSHV_CURRENT_VERSION MSHV_VERSION > + > +static u32 supported_versions[] = { > + MSHV_CURRENT_VERSION, > +}; > + > +static long > +mshv_ioctl_request_version(u32 *version, void __user *user_arg) > +{ > + u32 arg; > + int i; > + > + if (copy_from_user(&arg, user_arg, sizeof(arg))) > + return -EFAULT; > + > + for (i = 0; i < ARRAY_SIZE(supported_versions); ++i) { > + if (supported_versions[i] == arg) { > + *version = supported_versions[i]; > + return 0; > + } > + } > + return -ENOTSUPP; > +} > + > static long > mshv_dev_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) > { > + u32 *version = (u32 *)filp->private_data; > + > + if (ioctl == MSHV_REQUEST_VERSION) { > + /* Version can only be set once */ > + if (*version != MSHV_INVALID_VERSION) > + return -EBADFD; > + > + return mshv_ioctl_request_version(version, (void __user *)arg); > + } > + > + /* Version must be set before other ioctls can be called */ > + if (*version == MSHV_INVALID_VERSION) > + return -EBADFD; > + > + /* TODO other ioctls */ > + > return -ENOTTY; > } > > static int > mshv_dev_open(struct inode *inode, struct file *filp) > { > + filp->private_data = kmalloc(sizeof(u32), GFP_KERNEL); > + if (!filp->private_data) > + return -ENOMEM; > + *(u32 *)filp->private_data = MSHV_INVALID_VERSION; > + > return 0; > } > > static int > mshv_dev_release(struct inode *inode, struct file *filp) > { > + kfree(filp->private_data); > return 0; > } -- Vitaly