From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753787AbdDLKpB (ORCPT ); Wed, 12 Apr 2017 06:45:01 -0400 Received: from mx1.redhat.com ([209.132.183.28]:51640 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753419AbdDLKny (ORCPT ); Wed, 12 Apr 2017 06:43:54 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com DAE1080466 Authentication-Results: ext-mx04.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx04.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=vkuznets@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com DAE1080466 From: Vitaly Kuznetsov To: devel@linuxdriverproject.org, x86@kernel.org Cc: linux-kernel@vger.kernel.org, "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Steven Rostedt , Jork Loeser , Simon Xiao Subject: [PATCH v2 06/10] x86/hyper-v: implement rep hypercalls Date: Wed, 12 Apr 2017 12:43:22 +0200 Message-Id: <20170412104326.19126-7-vkuznets@redhat.com> In-Reply-To: <20170412104326.19126-1-vkuznets@redhat.com> References: <20170412104326.19126-1-vkuznets@redhat.com> X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.28]); Wed, 12 Apr 2017 10:43:49 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Rep hypercalls are normal hypercalls which perform multiple actions at once. Hyper-V guarantees to return exectution to the caller in not more than 50us and the caller needs to use hypercall continuation. Touch NMI watchdog between hypercall invocations. This is going to be used for HvFlushVirtualAddressList hypercall for remote TLB flushing. Signed-off-by: Vitaly Kuznetsov --- Changes since v1: - add variable header size --- arch/x86/include/asm/mshyperv.h | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) diff --git a/arch/x86/include/asm/mshyperv.h b/arch/x86/include/asm/mshyperv.h index 7b9b404..3a0b3f8 100644 --- a/arch/x86/include/asm/mshyperv.h +++ b/arch/x86/include/asm/mshyperv.h @@ -4,6 +4,7 @@ #include #include #include +#include #include /* @@ -255,6 +256,31 @@ static inline u64 hv_do_fast_hypercall8(u16 code, u64 input1) #endif } +/* + * Rep hypercalls. Callers of this functions are supposed to ensure that + * rep_count and vahead_size comply with union hv_hypercall_input definition. + */ +static inline u64 hv_do_rep_hypercall(u16 code, u16 rep_count, u16 varhead_size, + void *input, void *output) +{ + union hv_hypercall_input hc_input = { .code = code, + .varhead_size = varhead_size, + .rep_count = rep_count}; + u64 status; + + do { + status = hv_do_hypercall(hc_input.as_uint64, input, output); + if ((status & 0xffff) != HV_STATUS_SUCCESS) + return status; + + hc_input.rep_start = (status >> 32) & 0xfff; + + touch_nmi_watchdog(); + } while (hc_input.rep_start < hc_input.rep_count); + + return status; +} + void hyperv_init(void); void hyperv_report_panic(struct pt_regs *regs); bool hv_is_hypercall_page_setup(void); -- 2.9.3