Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp691710pxf; Thu, 8 Apr 2021 10:48:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxs73jUUoo/2GGw3OaHtyEVzMQXrw17Sd8sbVRj/WqIG4L6KFy/Ayi4uuIePduaEyz6P4ot X-Received: by 2002:a17:906:1453:: with SMTP id q19mr12277978ejc.76.1617904118385; Thu, 08 Apr 2021 10:48:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617904118; cv=none; d=google.com; s=arc-20160816; b=E4yhJSzPXyAfit86JiEXbuwEde7hx4JW5OEUC9OKB/mA89R8fi9D0sbS94wHN95Qqc 1Tv01hs6eAWdhjpheR6ZSHBASXmhy9mnoFwilAJKsZiNp2dkHZ+mA5Nx47R7AJteWCyU 5co/U13Wx8LSeNNbNGLNV9HtxQJx/Ylo/JdinkeQnqVz43Zppa75VIRIY7rJIi2WNUn0 zLOY2Hty2d+SI744hr4GHNJxHVmv3UJ4QmFMqZBSgOG906VXf7AauYdzb7i7bqFwgTK7 +6eH40nuGHvngbYL/hbB3/O3gBazP3BjPefy/q4iZGTmqMcsMg34hQaKxZHsqYzrtyr8 TbXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:cc:to:from:date:subject :dkim-signature; bh=cRK7cHLlPvIvXeQBZsTih5yQp0YoZivUbAIHh/I9DCY=; b=H3Nej/xDYs9MT+CQndKkBOgn3Un3qcQ+RV9lAWDvaMhMjmJLsvYZDoxQCbrQBmKFUN ngwHY96Rxz91folS+5WQ1/+8pRg3GPs3xPrOnrl0p280a8/xS7IrOe/ue7tCim+iWZTx mVNbx6pfyTJRZu9tC/5gx/ounZrhjUfrT9Ex9ESc8OGogHDf1wrMk2l/4nJjrazlvtJM CAMrB8V2zLZnlwPMLOlCNkR+1JRBndkXVJbfDhoPdhPBvoRZ1RKEwQUero2KggMmk+xY U3iNuSohzfxqqvrMAfRfPTBLe1BDwr2Z837Zwp+kkXuQ8d4wgzgdCTe0KZ7djNR5wGOl tIqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=edMobyrz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i24si123614edq.138.2021.04.08.10.48.14; Thu, 08 Apr 2021 10:48:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=edMobyrz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232701AbhDHRp6 (ORCPT + 99 others); Thu, 8 Apr 2021 13:45:58 -0400 Received: from smtp-fw-4101.amazon.com ([72.21.198.25]:13320 "EHLO smtp-fw-4101.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232476AbhDHRp6 (ORCPT ); Thu, 8 Apr 2021 13:45:58 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209; t=1617903947; x=1649439947; h=date:from:to:cc:message-id:references:mime-version: in-reply-to:subject; bh=cRK7cHLlPvIvXeQBZsTih5yQp0YoZivUbAIHh/I9DCY=; b=edMobyrzZVYrsPeN3ebdRNr5IkzMCQ2nV8sFTAauVC7nzkVAt3tEjhe5 tm4ETr5GJlIilM15298CXr4bLZRfi6xz2MRNZLjPxq+qr1sejlS99tf0h AhRk8FHOc2s9mp+aMLtSznKVivHH5L9xt87IGap2t9fazA8ZAwnfEfQvh s=; X-IronPort-AV: E=Sophos;i="5.82,207,1613433600"; d="scan'208";a="100501308" Subject: Re: [PATCH 0/4] Add support for XMM fast hypercalls Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO email-inbound-relay-1e-27fb8269.us-east-1.amazon.com) ([10.43.8.2]) by smtp-border-fw-out-4101.iad4.amazon.com with ESMTP; 08 Apr 2021 17:45:39 +0000 Received: from EX13D28EUC003.ant.amazon.com (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38]) by email-inbound-relay-1e-27fb8269.us-east-1.amazon.com (Postfix) with ESMTPS id E3A73A17D1; Thu, 8 Apr 2021 17:45:33 +0000 (UTC) Received: from u366d62d47e3651.ant.amazon.com (10.43.160.224) by EX13D28EUC003.ant.amazon.com (10.43.164.43) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 8 Apr 2021 17:45:26 +0000 Date: Thu, 8 Apr 2021 19:45:22 +0200 From: Siddharth Chandrasekaran To: Wei Liu CC: Paolo Bonzini , , , , , , , , , , , , , , , , , , Message-ID: <20210408174521.GF32315@u366d62d47e3651.ant.amazon.com> References: <20210407212926.3016-1-sidcha@amazon.de> <20210408152817.k4d4hjdqu7hsjllo@liuwe-devbox-debian-v2> <033e7d77-d640-2c12-4918-da6b5b7f4e21@redhat.com> <20210408154006.GA32315@u366d62d47e3651.ant.amazon.com> <53200f24-bd57-1509-aee2-0723aa8a3f6f@redhat.com> <20210408155442.GC32315@u366d62d47e3651.ant.amazon.com> <20210408163018.mlr23jd2r4st54jc@liuwe-devbox-debian-v2> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20210408163018.mlr23jd2r4st54jc@liuwe-devbox-debian-v2> User-Agent: Mutt/1.9.4 (2018-02-28) X-Originating-IP: [10.43.160.224] X-ClientProxiedBy: EX13D49UWB001.ant.amazon.com (10.43.163.72) To EX13D28EUC003.ant.amazon.com (10.43.164.43) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 08, 2021 at 04:30:18PM +0000, Wei Liu wrote: > On Thu, Apr 08, 2021 at 05:54:43PM +0200, Siddharth Chandrasekaran wrote: > > On Thu, Apr 08, 2021 at 05:48:19PM +0200, Paolo Bonzini wrote: > > > On 08/04/21 17:40, Siddharth Chandrasekaran wrote: > > > > > > > Although the Hyper-v TLFS mentions that a guest cannot use this feature > > > > > > > unless the hypervisor advertises support for it, some hypercalls which > > > > > > > we plan on upstreaming in future uses them anyway. > > > > > > No, please don't do this. Check the feature bit(s) before you issue > > > > > > hypercalls which rely on the extended interface. > > > > > Perhaps Siddharth should clarify this, but I read it as Hyper-V being > > > > > buggy and using XMM arguments unconditionally. > > > > The guest is at fault here as it expects Hyper-V to consume arguments > > > > from XMM registers for certain hypercalls (that we are working) even if > > > > we didn't expose the feature via CPUID bits. > > > > > > What guest is that? > > > > It is a Windows Server 2016. > > Can you be more specific? Are you implementing some hypercalls from > TLFS? If so, which ones? Yes all of them are from TLFS. We are implementing VSM and there are a bunch of hypercalls that we have implemented to manage VTL switches, memory protection and virtual interrupts. The following 3 hypercalls that use the XMM fast hypercalls are relevant to this patch set: HvCallModifyVtlProtectionMask HvGetVpRegisters HvSetVpRegisters ~ Sid. Amazon Development Center Germany GmbH Krausenstr. 38 10117 Berlin Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B Sitz: Berlin Ust-ID: DE 289 237 879