Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1629159pxb; Thu, 4 Mar 2021 16:55:47 -0800 (PST) X-Google-Smtp-Source: ABdhPJwFHM+2WIXmZsqPHJHZRsVs9uH1M7o+zqDVfi7wQdi55TrkkNIxuffcOoVxZ0y/RRTMr9R0 X-Received: by 2002:a05:6638:1610:: with SMTP id x16mr6971301jas.115.1614905747797; Thu, 04 Mar 2021 16:55:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614905747; cv=none; d=google.com; s=arc-20160816; b=PAgM7E/ESU8PfcXZvbi7NL2wo+1xoglq/zX1qfWimDpk+DyA022fG+sHPxswcF6iDa kDD0Hecb/JISIb/jvMHQVoPvZkzN05nNyNnygwJqDI/yHjGw4iNfkX8pIEBa6yjGRwxA DIHJwKPjXeLUoI9AgZBvcsqBlqjrPUW8W5XNyMzWiHwSPIrwDxttMCAeaaRaSLa1ENUv fE7aPNVS4aN8izg+3jFnwqiwj74p312c/4sXrMMtMWI52WS8mSYBfAdQNpN3pkBWGiWN m28w8Ox0IsKL8jjVJYZoCCrYS8V/kW6V2XLjk+iO1fAWNnWUfWECOwnPpUn1+OaMm4bS rcjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature:dkim-filter; bh=NdHnANwOeJmoKeDwgB+UDZnIe/taaytnFRBfPgEMM0o=; b=IWMIvHEy7/ip2IPVOmbXgqaCQZ4UdilgcO2xooQD00Gsc1bPYzP9a7hdaQGzhFcll3 gSpF/fGZKqUcHL8SvDJk/Hu+h44WSGz9rDRcnyXut5xS4KGBXdT0wmEZXqyUoypQsyPV XGwl7EVMzXfokivbgp4V+8z1WBywZKpK3/3fE468JcsFk22oyHYnoHe5F5AOvxRKleTr TE1TDmzD7R6mmqZf1Eyi4c9Oz01RXKvSLKJ+7f4EVvSdoNfQNMV40ok/N+RF7L/rxo0T f6p5j4njGDOby5bQ0FmjxpZwlzzxmao9KVPLESuXyHtwYLaEt8UsSU4KZSCwEBlyakWf 2xkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=seTfnNMA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f6si850504ila.108.2021.03.04.16.55.34; Thu, 04 Mar 2021 16:55:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=seTfnNMA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233922AbhCDSoD (ORCPT + 99 others); Thu, 4 Mar 2021 13:44:03 -0500 Received: from linux.microsoft.com ([13.77.154.182]:35732 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233130AbhCDSoB (ORCPT ); Thu, 4 Mar 2021 13:44:01 -0500 Received: from [10.0.0.178] (c-67-168-106-253.hsd1.wa.comcast.net [67.168.106.253]) by linux.microsoft.com (Postfix) with ESMTPSA id 46A1C20B83EA; Thu, 4 Mar 2021 10:43:20 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 46A1C20B83EA DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1614883400; bh=NdHnANwOeJmoKeDwgB+UDZnIe/taaytnFRBfPgEMM0o=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=seTfnNMAwhvdfuz0SYH9EkPYgaefZq1HGMeSrB2k7v8GNffHjdqIFbu2LJMeeJ48f fKx5CFg8EyfcoDCUjbuLfrY2Xa8wRqMtapeom5RGrnceuJ8Wk5b3EFm5dZjZxz1Fm3 Y+7kfNgDyyP/rynr6SGKThKKwhera1Xg4AkHPBqU= Subject: Re: [RFC PATCH 04/18] virt/mshv: request version ioctl To: Vitaly Kuznetsov , linux-hyperv@vger.kernel.org Cc: virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, mikelley@microsoft.com, viremana@linux.microsoft.com, sunilmut@microsoft.com, wei.liu@kernel.org, ligrassi@microsoft.com, kys@microsoft.com References: <1605918637-12192-1-git-send-email-nunodasneves@linux.microsoft.com> <1605918637-12192-5-git-send-email-nunodasneves@linux.microsoft.com> <87y2fxmlmb.fsf@vitty.brq.redhat.com> From: Nuno Das Neves Message-ID: <194e0dad-495e-ae94-3f51-d2c95da52139@linux.microsoft.com> Date: Thu, 4 Mar 2021 10:43:19 -0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.8.0 MIME-Version: 1.0 In-Reply-To: <87y2fxmlmb.fsf@vitty.brq.redhat.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/9/2021 5:11 AM, Vitaly Kuznetsov wrote: > Nuno Das Neves writes: > >> Reserve ioctl number in userpsace-api/ioctl/ioctl-number.rst >> Introduce MSHV_REQUEST_VERSION ioctl. >> Introduce documentation for /dev/mshv in Documentation/virt/mshv >> >> Signed-off-by: Nuno Das Neves >> --- >> .../userspace-api/ioctl/ioctl-number.rst | 2 + >> Documentation/virt/mshv/api.rst | 62 +++++++++++++++++++ >> include/linux/mshv.h | 11 ++++ >> include/uapi/linux/mshv.h | 19 ++++++ >> virt/mshv/mshv_main.c | 49 +++++++++++++++ >> 5 files changed, 143 insertions(+) >> create mode 100644 Documentation/virt/mshv/api.rst >> create mode 100644 include/linux/mshv.h >> create mode 100644 include/uapi/linux/mshv.h >> >> diff --git a/Documentation/userspace-api/ioctl/ioctl-number.rst b/Documentation/userspace-api/ioctl/ioctl-number.rst >> index 55a2d9b2ce33..13a4d3ecafca 100644 >> --- a/Documentation/userspace-api/ioctl/ioctl-number.rst >> +++ b/Documentation/userspace-api/ioctl/ioctl-number.rst >> @@ -343,6 +343,8 @@ Code Seq# Include File Comments >> 0xB5 00-0F uapi/linux/rpmsg.h >> 0xB6 all linux/fpga-dfl.h >> 0xB7 all uapi/linux/remoteproc_cdev.h >> +0xB8 all uapi/linux/mshv.h Microsoft Hypervisor root partition APIs >> + >> 0xC0 00-0F linux/usb/iowarrior.h >> 0xCA 00-0F uapi/misc/cxl.h >> 0xCA 10-2F uapi/misc/ocxl.h >> diff --git a/Documentation/virt/mshv/api.rst b/Documentation/virt/mshv/api.rst >> new file mode 100644 >> index 000000000000..82e32de48d03 >> --- /dev/null >> +++ b/Documentation/virt/mshv/api.rst >> @@ -0,0 +1,62 @@ >> +.. SPDX-License-Identifier: GPL-2.0 >> + >> +===================================================== >> +Microsoft Hypervisor Root Partition API Documentation >> +===================================================== >> + >> +1. Overview >> +=========== >> + >> +This document describes APIs for creating and managing guest virtual machines >> +when running Linux as the root partition on the Microsoft Hypervisor. >> + >> +This API is not yet stable. >> + >> +2. Glossary/Terms >> +================= >> + >> +hv >> +-- >> +Short for Hyper-V. This name is used in the kernel to describe interfaces to >> +the Microsoft Hypervisor. >> + >> +mshv >> +---- >> +Short for Microsoft Hypervisor. This is the name of the userland API module >> +described in this document. >> + >> +Partition >> +--------- >> +A virtual machine running on the Microsoft Hypervisor. >> + >> +Root Partition >> +-------------- >> +The partition that is created and assumes control when the machine boots. The >> +root partition can use mshv APIs to create guest partitions. >> + >> +3. API description >> +================== >> + >> +The module is named mshv and can be configured with CONFIG_HYPERV_ROOT_API. >> + >> +Mshv is file descriptor-based, following a similar pattern to KVM. >> + >> +To get a handle to the mshv driver, use open("/dev/mshv"). >> + >> +3.1 MSHV_REQUEST_VERSION >> +------------------------ >> +:Type: /dev/mshv ioctl >> +:Parameters: pointer to a u32 >> +:Returns: 0 on success >> + >> +Before issuing any other ioctls, a MSHV_REQUEST_VERSION ioctl must be called to >> +establish the interface version with the kernel module. >> + >> +The caller should pass the MSHV_VERSION as an argument. >> + >> +The kernel module will check which interface versions it supports and return 0 >> +if one of them matches. >> + >> +This /dev/mshv file descriptor will remain 'locked' to that version as long as >> +it is open - this ioctl can only be called once per open. >> + > > KVM used to have KVM_GET_API_VERSION too but this turned out to be not > very convenient so we use capabilities (KVM_CHECK_EXTENSION/KVM_ENABLE_CAP) > instead. > The goal of MSHV_REQUEST_VERSION is to support changes to APIs in the core set. When we add new features/ioctls beyond the core we can use an extension/capability approach like KVM. >> diff --git a/include/linux/mshv.h b/include/linux/mshv.h >> new file mode 100644 >> index 000000000000..a0982fe2c0b8 >> --- /dev/null >> +++ b/include/linux/mshv.h >> @@ -0,0 +1,11 @@ >> +/* SPDX-License-Identifier: GPL-2.0-only */ >> +#ifndef _LINUX_MSHV_H >> +#define _LINUX_MSHV_H >> + >> +/* >> + * Microsoft Hypervisor root partition driver for /dev/mshv >> + */ >> + >> +#include >> + >> +#endif >> diff --git a/include/uapi/linux/mshv.h b/include/uapi/linux/mshv.h >> new file mode 100644 >> index 000000000000..dd30fc2f0a80 >> --- /dev/null >> +++ b/include/uapi/linux/mshv.h >> @@ -0,0 +1,19 @@ >> +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ >> +#ifndef _UAPI_LINUX_MSHV_H >> +#define _UAPI_LINUX_MSHV_H >> + >> +/* >> + * Userspace interface for /dev/mshv >> + * Microsoft Hypervisor root partition APIs >> + */ >> + >> +#include >> + >> +#define MSHV_VERSION 0x0 >> + >> +#define MSHV_IOCTL 0xB8 >> + >> +/* mshv device */ >> +#define MSHV_REQUEST_VERSION _IOW(MSHV_IOCTL, 0x00, __u32) >> + >> +#endif >> diff --git a/virt/mshv/mshv_main.c b/virt/mshv/mshv_main.c >> index ecb9089761fe..62f631f85301 100644 >> --- a/virt/mshv/mshv_main.c >> +++ b/virt/mshv/mshv_main.c >> @@ -11,25 +11,74 @@ >> #include >> #include >> #include >> +#include >> +#include >> >> MODULE_AUTHOR("Microsoft"); >> MODULE_LICENSE("GPL"); >> >> +#define MSHV_INVALID_VERSION 0xFFFFFFFF >> +#define MSHV_CURRENT_VERSION MSHV_VERSION >> + >> +static u32 supported_versions[] = { >> + MSHV_CURRENT_VERSION, >> +}; >> + >> +static long >> +mshv_ioctl_request_version(u32 *version, void __user *user_arg) >> +{ >> + u32 arg; >> + int i; >> + >> + if (copy_from_user(&arg, user_arg, sizeof(arg))) >> + return -EFAULT; >> + >> + for (i = 0; i < ARRAY_SIZE(supported_versions); ++i) { >> + if (supported_versions[i] == arg) { >> + *version = supported_versions[i]; >> + return 0; >> + } >> + } >> + return -ENOTSUPP; >> +} >> + >> static long >> mshv_dev_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) >> { >> + u32 *version = (u32 *)filp->private_data; >> + >> + if (ioctl == MSHV_REQUEST_VERSION) { >> + /* Version can only be set once */ >> + if (*version != MSHV_INVALID_VERSION) >> + return -EBADFD; >> + >> + return mshv_ioctl_request_version(version, (void __user *)arg); >> + } >> + >> + /* Version must be set before other ioctls can be called */ >> + if (*version == MSHV_INVALID_VERSION) >> + return -EBADFD; >> + >> + /* TODO other ioctls */ >> + >> return -ENOTTY; >> } >> >> static int >> mshv_dev_open(struct inode *inode, struct file *filp) >> { >> + filp->private_data = kmalloc(sizeof(u32), GFP_KERNEL); >> + if (!filp->private_data) >> + return -ENOMEM; >> + *(u32 *)filp->private_data = MSHV_INVALID_VERSION; >> + >> return 0; >> } >> >> static int >> mshv_dev_release(struct inode *inode, struct file *filp) >> { >> + kfree(filp->private_data); >> return 0; >> } >