Received: by 2002:ab2:7a09:0:b0:1f8:46dc:890e with SMTP id k9csp187567lqo; Wed, 15 May 2024 11:11:46 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXaZG/TjXu/yvTrNy9Z9eZ75RMgRPf+Vl29MtzpSjqrCMi08WtSrRNCp/BBMCNxBq9MInIPN7ZwsSqXxV9HAd5GmT6Fq/79QAi3p3WD9g== X-Google-Smtp-Source: AGHT+IH0M6vRcGIdE86eGxUv7hWDaaN8hdPVgj8VvjUiIKOjIvJctvJBbGr7uZyahCrvXsiudEQK X-Received: by 2002:a05:620a:348:b0:792:8ec4:a956 with SMTP id af79cd13be357-792c75aee0emr1654897485a.42.1715796706298; Wed, 15 May 2024 11:11:46 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715796706; cv=pass; d=google.com; s=arc-20160816; b=epBSdNEq9HAZi8issnm7L0qf0zpxq2bnl8Z2VETmb7TxPT9WCazQ1SALmUuKRR3ybc TPA71Djfz+Ues9yTaN8iCKf2ztUi53ac6HuXpnzlkuEi9PNY04YxYwIdcWaj765YBRpw m4H5n1XN7kUxWQLCB4/SbsXEP13KCrGg8ZICnHQxJcigXweR6nN7FjJ3kJU0EBfE1U8/ OuVNjelLXFqmiKxQpgVd6xB0Ai7Zy7papLJAHC7yKA8pR8BfGdTIkpeZsR9mRCwOJ78h iPIVZFtseGWApts3kVoxnVnoO7oljiDSCI62qnps9qB6HhkTpNdvl1OxWp0SlJY9o9Yq j/SA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature :dkim-filter; bh=MHbsM3k9BYDPr7S4yZzl1y3oe2899Tt/+6ok7Nit0qk=; fh=x6fEPjf6dqYgBkZ6EHcX6AOpoGKqPM/d5P3I2JzqUiU=; b=aRnDetV0CAtq3N/W1uCOjm4zbKswjFM8ixkQLtitCOxvrr0EUbisS6bx/UKaB23tgR GL7XcHUpSOuY4XPDzwGObk4L+WQ9oCl0b8v63vBvJ/zEu2DCWKi3DJZEU+RFh7pq32fu 9VY/mF6BEtID/cRKw+0aO5ThoIx0ZUgReMNenu9hGgZpzEpEZPfhhWwijFrDrzY0bZDk G6rOQxCVt+z+GZRs4i9vJ64xzaGILOIh+iLAtfxskcEV8MD+AERgFRKe3ef96xR7Fw9J MmyhvsFqAVcGUQfCT3czSq5W6Na2AC3x05xo8EKxhXqfDwdIMUxnduEXqLa3JQMgJAwm aQEg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=czDFgkkI; arc=pass (i=1 spf=pass spfdomain=linux.microsoft.com dkim=pass dkdomain=linux.microsoft.com dmarc=pass fromdomain=linux.microsoft.com); spf=pass (google.com: domain of linux-kernel+bounces-180244-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-180244-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id af79cd13be357-792bf36060csi1351154485a.539.2024.05.15.11.11.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 May 2024 11:11:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-180244-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=czDFgkkI; arc=pass (i=1 spf=pass spfdomain=linux.microsoft.com dkim=pass dkdomain=linux.microsoft.com dmarc=pass fromdomain=linux.microsoft.com); spf=pass (google.com: domain of linux-kernel+bounces-180244-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-180244-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 922501C20F73 for ; Wed, 15 May 2024 18:11:45 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 066A7158DC1; Wed, 15 May 2024 18:11:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.microsoft.com header.i=@linux.microsoft.com header.b="czDFgkkI" Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 633C9158DA9; Wed, 15 May 2024 18:11:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=13.77.154.182 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715796695; cv=none; b=NcBDmhCmfoCgSvXQ5fdNlnQ3tT7WyQm4zoIvJS7Bunkb52jiE6Bv5yEbl3cAs7u3AVsBQ9+OKmoDJp9xvXqga8UKFGC0r9hG12ykrF6myy+stVkTWVhKiaeCp7TNxK3IHR6YZglmzn9n4U3VOGhP/+7Wa0lt8dTWvWJT3gMoaE8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715796695; c=relaxed/simple; bh=kolY4gpqxNTi/z3uoL9Ny4J6tz26tbXoHj2/11jf3So=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=almQU6F8tQ4vJKmnks0d8XyMykcSmz+b4skub8UAXUIQ+HpNjvDXfR5sC52i0eG7/e298IbLOLa95ug/jXajGGqNtGEWRePxhAafyVH3MSQoIRqJ3J3GclI8G2rV79fe7dwR2iVEcmM0kO+cis7d8w/iZZb8cXdSi5kJXQq0deg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.microsoft.com; spf=pass smtp.mailfrom=linux.microsoft.com; dkim=pass (1024-bit key) header.d=linux.microsoft.com header.i=@linux.microsoft.com header.b=czDFgkkI; arc=none smtp.client-ip=13.77.154.182 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.microsoft.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.microsoft.com Received: from [10.137.186.190] (unknown [131.107.159.62]) by linux.microsoft.com (Postfix) with ESMTPSA id B7626201F184; Wed, 15 May 2024 11:11:33 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com B7626201F184 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1715796694; bh=MHbsM3k9BYDPr7S4yZzl1y3oe2899Tt/+6ok7Nit0qk=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=czDFgkkINuAcFnSu4m+Ap5N9pyy68duo4nurnPoyvlAVcY6rGyd65WojtjBWTkByu aFtS8SFIEYfDnB5szxuIAqa2QNEcQgP780rvqkZBoz5XbkOH2/J5pThc/FgEf71ipS ze2mc0DqPUy7Aq+rymAD6isq01PFDCl9LkerDy3Y= Message-ID: Date: Wed, 15 May 2024 11:11:33 -0700 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2 3/6] drivers/hv: arch-neutral implementation of get_vtl() To: Michael Kelley , "arnd@arndb.de" , "bhelgaas@google.com" , "bp@alien8.de" , "catalin.marinas@arm.com" , "dave.hansen@linux.intel.com" , "decui@microsoft.com" , "haiyangz@microsoft.com" , "hpa@zytor.com" , "kw@linux.com" , "kys@microsoft.com" , "lenb@kernel.org" , "lpieralisi@kernel.org" , "mingo@redhat.com" , "rafael@kernel.org" , "robh@kernel.org" , "tglx@linutronix.de" , "wei.liu@kernel.org" , "will@kernel.org" , "linux-acpi@vger.kernel.org" , "linux-arch@vger.kernel.org" , "linux-arm-kernel@lists.infradead.org" , "linux-hyperv@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "linux-pci@vger.kernel.org" , "x86@kernel.org" Cc: "ssengar@microsoft.com" , "sunilmut@microsoft.com" , "vdso@hexbites.dev" References: <20240514224508.212318-1-romank@linux.microsoft.com> <20240514224508.212318-4-romank@linux.microsoft.com> Content-Language: en-US From: Roman Kisel In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 5/15/2024 6:38 AM, Michael Kelley wrote: > From: Roman Kisel Sent: Tuesday, May 14, 2024 3:44 PM >> >> To run in the VTL mode, Hyper-V drivers have to know what >> VTL the system boots in, and the arm64/hyperv code does not >> have the means to compute that. >> >> Refactor the code to hoist the function that detects VTL, >> make it arch-neutral to be able to employ it to get the VTL >> on arm64. > > Nit: In patches that just refactor and move some code around, > patch authors will often include a statement like "No functional > changes" (or the slightly more doubtful "No functional changes > intended") as a separate line at the end of the commit message. > It's just something the reader/reviewer can cross-check against. > >> >> Signed-off-by: Roman Kisel >> --- >> arch/x86/hyperv/hv_init.c | 34 ----------------------- >> arch/x86/include/asm/hyperv-tlfs.h | 7 ----- >> drivers/hv/hv_common.c | 43 ++++++++++++++++++++++++++++++ >> include/asm-generic/hyperv-tlfs.h | 7 +++++ >> include/asm-generic/mshyperv.h | 6 +++++ >> 5 files changed, 56 insertions(+), 41 deletions(-) >> >> diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c >> index 17a71e92a343..c350fa05ee59 100644 >> --- a/arch/x86/hyperv/hv_init.c >> +++ b/arch/x86/hyperv/hv_init.c >> @@ -413,40 +413,6 @@ static void __init hv_get_partition_id(void) >> local_irq_restore(flags); >> } >> >> -#if IS_ENABLED(CONFIG_HYPERV_VTL_MODE) >> -static u8 __init get_vtl(void) >> -{ >> - u64 control = HV_HYPERCALL_REP_COMP_1 | HVCALL_GET_VP_REGISTERS; >> - struct hv_get_vp_registers_input *input; >> - struct hv_get_vp_registers_output *output; >> - unsigned long flags; >> - u64 ret; >> - >> - local_irq_save(flags); >> - input = *this_cpu_ptr(hyperv_pcpu_input_arg); >> - output = (struct hv_get_vp_registers_output *)input; >> - >> - memset(input, 0, struct_size(input, element, 1)); >> - input->header.partitionid = HV_PARTITION_ID_SELF; >> - input->header.vpindex = HV_VP_INDEX_SELF; >> - input->header.inputvtl = 0; >> - input->element[0].name0 = HV_X64_REGISTER_VSM_VP_STATUS; >> - >> - ret = hv_do_hypercall(control, input, output); >> - if (hv_result_success(ret)) { >> - ret = output->as64.low & HV_X64_VTL_MASK; >> - } else { >> - pr_err("Failed to get VTL(error: %lld) exiting...\n", ret); >> - BUG(); >> - } >> - >> - local_irq_restore(flags); >> - return ret; >> -} >> -#else >> -static inline u8 get_vtl(void) { return 0; } >> -#endif >> - >> /* >> * This function is to be invoked early in the boot sequence after the >> * hypervisor has been detected. >> diff --git a/arch/x86/include/asm/hyperv-tlfs.h b/arch/x86/include/asm/hyperv-tlfs.h >> index 3787d26810c1..9ee68eb8e6ff 100644 >> --- a/arch/x86/include/asm/hyperv-tlfs.h >> +++ b/arch/x86/include/asm/hyperv-tlfs.h >> @@ -309,13 +309,6 @@ enum hv_isolation_type { >> #define HV_MSR_STIMER0_CONFIG (HV_X64_MSR_STIMER0_CONFIG) >> #define HV_MSR_STIMER0_COUNT (HV_X64_MSR_STIMER0_COUNT) >> >> -/* >> - * Registers are only accessible via HVCALL_GET_VP_REGISTERS hvcall and >> - * there is not associated MSR address. >> - */ >> -#define HV_X64_REGISTER_VSM_VP_STATUS 0x000D0003 >> -#define HV_X64_VTL_MASK GENMASK(3, 0) >> - >> /* Hyper-V memory host visibility */ >> enum hv_mem_host_visibility { >> VMBUS_PAGE_NOT_VISIBLE = 0, >> diff --git a/drivers/hv/hv_common.c b/drivers/hv/hv_common.c >> index dde3f9b6871a..d4cf477a4d0c 100644 >> --- a/drivers/hv/hv_common.c >> +++ b/drivers/hv/hv_common.c >> @@ -660,3 +660,46 @@ u64 __weak hv_tdx_hypercall(u64 control, u64 param1, u64 >> param2) >> return HV_STATUS_INVALID_PARAMETER; >> } >> EXPORT_SYMBOL_GPL(hv_tdx_hypercall); >> + >> +#if IS_ENABLED(CONFIG_HYPERV_VTL_MODE) >> +u8 __init get_vtl(void) >> +{ >> + u64 control = HV_HYPERCALL_REP_COMP_1 | HVCALL_GET_VP_REGISTERS; >> + struct hv_get_vp_registers_input *input; >> + struct hv_get_vp_registers_output *output; >> + unsigned long flags; >> + u64 ret; >> + >> + local_irq_save(flags); >> + input = *this_cpu_ptr(hyperv_pcpu_input_arg); >> + output = (struct hv_get_vp_registers_output *)input; > > I gave some bad advice on the original version of the above code. Rather > than allocating a separate hypercall output area, I had suggested just setting > the hypercall output to be the same as the input area, which is done > above. While the overlap doesn't cause any problems for a hypercall returning > the value of single register, the TLFS says to never set up such an overlap. > > Since this code is being moved anyway, there's an opportunity to fix > this by setting output to "input" + "struct_size(input, element, 1)". Or > put the output at the start of the second half of the page (note that the > size is HY_HYP_PAGE_SIZE, not PAGE_SIZE). The input and output for 1 > register are relatively small and both easily fit with either approach. They > just shouldn't overlap. > > Some might argue this tweak should be made in a separate patch, but > in my judgment, it's OK to do it here if you note it in the commit > message. Your call. Of course, if you make this change, my previous > comment about "No functional changes" no longer applies. :-) I'll update the code to adhere to the TLFS requirements, thank you :) > > Michael > >> + >> + memset(input, 0, struct_size(input, element, 1)); >> + input->header.partitionid = HV_PARTITION_ID_SELF; >> + input->header.vpindex = HV_VP_INDEX_SELF; >> + input->header.inputvtl = 0; >> + input->element[0].name0 = HV_REGISTER_VSM_VP_STATUS; >> + >> + ret = hv_do_hypercall(control, input, output); >> + if (hv_result_success(ret)) { >> + ret = output->as64.low & HV_VTL_MASK; >> + } else { >> + pr_err("Failed to get VTL(error: %lld) exiting...\n", ret); >> + >> + /* >> + * This is a dead end, something fundamental is broken. >> + * >> + * There is no sensible way of continuing as the Hyper-V drivers >> + * transitively depend via the vmbus driver on knowing which VTL >> + * they run in to establish communication with the host. The kernel >> + * is going to be worse off if continued booting than a panicked one, >> + * just hung and stuck, producing second-order failures, with neither >> + * a way to recover nor to provide expected services. >> + */ >> + BUG(); >> + } >> + >> + local_irq_restore(flags); >> + return ret; >> +} >> +#endif >> diff --git a/include/asm-generic/hyperv-tlfs.h b/include/asm-generic/hyperv-tlfs.h >> index 87e3d49a4e29..682bcda3124f 100644 >> --- a/include/asm-generic/hyperv-tlfs.h >> +++ b/include/asm-generic/hyperv-tlfs.h >> @@ -75,6 +75,13 @@ >> /* AccessTscInvariantControls privilege */ >> #define HV_ACCESS_TSC_INVARIANT BIT(15) >> >> +/* >> + * This synthetic register is only accessible via the HVCALL_GET_VP_REGISTERS >> + * hvcall, and there is no an associated MSR on x86. >> + */ >> +#define HV_REGISTER_VSM_VP_STATUS 0x000D0003 >> +#define HV_VTL_MASK GENMASK(3, 0) >> + >> /* >> * Group B features. >> */ >> diff --git a/include/asm-generic/mshyperv.h b/include/asm-generic/mshyperv.h >> index 99935779682d..ea434186d765 100644 >> --- a/include/asm-generic/mshyperv.h >> +++ b/include/asm-generic/mshyperv.h >> @@ -301,4 +301,10 @@ static inline enum hv_isolation_type >> hv_get_isolation_type(void) >> } >> #endif /* CONFIG_HYPERV */ >> >> +#if IS_ENABLED(CONFIG_HYPERV_VTL_MODE) >> +u8 __init get_vtl(void); >> +#else >> +static inline u8 get_vtl(void) { return 0; } >> +#endif >> + >> #endif >> -- >> 2.45.0 >> -- Thank you, Roman