From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1163740AbdEXMEb (ORCPT ); Wed, 24 May 2017 08:04:31 -0400 Received: from mx1.redhat.com ([209.132.183.28]:60180 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1030344AbdEXME2 (ORCPT ); Wed, 24 May 2017 08:04:28 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com D845580053 Authentication-Results: ext-mx03.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx03.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=vkuznets@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com D845580053 From: Vitaly Kuznetsov To: devel@linuxdriverproject.org, x86@kernel.org Cc: linux-kernel@vger.kernel.org, "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Steven Rostedt , Jork Loeser , Simon Xiao , Andy Lutomirski Subject: [PATCH v4 06/10] x86/hyper-v: implement rep hypercalls Date: Wed, 24 May 2017 14:04:01 +0200 Message-Id: <20170524120405.19079-7-vkuznets@redhat.com> In-Reply-To: <20170524120405.19079-1-vkuznets@redhat.com> References: <20170524120405.19079-1-vkuznets@redhat.com> X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.27]); Wed, 24 May 2017 12:04:28 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Rep hypercalls are normal hypercalls which perform multiple actions at once. Hyper-V guarantees to return exectution to the caller in not more than 50us and the caller needs to use hypercall continuation. Touch NMI watchdog between hypercall invocations. This is going to be used for HvFlushVirtualAddressList hypercall for remote TLB flushing. Signed-off-by: Vitaly Kuznetsov Acked-by: K. Y. Srinivasan Tested-by: Simon Xiao Tested-by: Srikanth Myakam --- arch/x86/include/asm/mshyperv.h | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) diff --git a/arch/x86/include/asm/mshyperv.h b/arch/x86/include/asm/mshyperv.h index 52b3611..e0b4c70 100644 --- a/arch/x86/include/asm/mshyperv.h +++ b/arch/x86/include/asm/mshyperv.h @@ -4,6 +4,7 @@ #include #include #include +#include #include /* @@ -258,6 +259,31 @@ static inline u64 hv_do_fast_hypercall8(u16 code, u64 input1) #endif } +/* + * Rep hypercalls. Callers of this functions are supposed to ensure that + * rep_count and vahead_size comply with union hv_hypercall_input definition. + */ +static inline u64 hv_do_rep_hypercall(u16 code, u16 rep_count, u16 varhead_size, + void *input, void *output) +{ + union hv_hypercall_input hc_input = { .code = code, + .varhead_size = varhead_size, + .rep_count = rep_count}; + u64 status; + + do { + status = hv_do_hypercall(hc_input.as_uint64, input, output); + if ((status & 0xffff) != HV_STATUS_SUCCESS) + return status; + + hc_input.rep_start = (status >> 32) & 0xfff; + + touch_nmi_watchdog(); + } while (hc_input.rep_start < hc_input.rep_count); + + return status; +} + void hyperv_init(void); void hyperv_report_panic(struct pt_regs *regs); bool hv_is_hypercall_page_setup(void); -- 2.9.4