From: Pavel Machek Sent: Tuesday, March 12, 2024 1:35 PM
>
> > In preparation for temporarily marking pages not present during a
> > transition between encrypted and decrypted, use slow_virt_to_phys()
> > in the hypervisor callback. As long as the PFN is correct,
>
> This seems to be preparation
From: Marc Zyngier Sent: Thursday, November 7, 2019 1:11 AM
> >>
> >> On 2019-10-03 20:12, Michael Kelley wrote:
> >> > Add ARM64-specific code to make Hyper-V hypercalls and to
> >> > access virtual processor synthetic registers via hypercalls.
> &
From: Marc Zyngier Sent: Thursday, November 7, 2019 6:20 AM
> > +/*
> > + * Functions for allocating and freeing memory with size and
> > + * alignment HV_HYP_PAGE_SIZE. These functions are needed because
> > + * the guest page size may not be the same as the Hyper-V page
> > + * size. And while
From: Marc Zyngier Sent: Wednesday, November 6, 2019 2:20 AM
>
> On 2019-10-03 20:12, Michael Kelley wrote:
> > Add ARM64-specific code to make Hyper-V hypercalls and to
> > access virtual processor synthetic registers via hypercalls.
> > Hypercalls use a Hyper-V specif
From: Boqun Feng Sent: Sunday, November 3, 2019 8:37 PM
>
> > diff --git a/arch/arm64/Kbuild b/arch/arm64/Kbuild
> > index d646582..2469421 100644
> > --- a/arch/arm64/Kbuild
> > +++ b/arch/arm64/Kbuild
> > @@ -3,4 +3,5 @@ obj-y += kernel/ mm/
> > obj-$(CONFIG_NET) += net/
Add ARM64-specific code to initialize the Hyper-V
hypervisor when booting as a guest VM. Provide functions
and data structures indicating hypervisor status that
are needed by VMbus driver.
This code is built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
arch/arm64
Update drivers/hv/Kconfig so CONFIG_HYPERV can be selected on
ARM64, causing the Hyper-V specific code to be built.
Signed-off-by: Michael Kelley
---
drivers/hv/Kconfig | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/hv/Kconfig b/drivers/hv/Kconfig
index 79e5356
ff-by: Michael Kelley
---
arch/x86/include/asm/mshyperv.h | 4
drivers/hv/hv.c | 3 +++
2 files changed, 7 insertions(+)
diff --git a/arch/x86/include/asm/mshyperv.h b/arch/x86/include/asm/mshyperv.h
index f4138ae..583e1ce 100644
--- a/arch/x86/include/asm/mshyperv.h
+++ b/arc
-generic.
Signed-off-by: Michael Kelley
---
MAINTAINERS | 2 +
arch/arm64/include/asm/hyperv-tlfs.h | 408 +++
arch/arm64/include/asm/mshyperv.h| 105 +
3 files changed, 515 insertions(+)
create mode 100644 arch/arm64/include/asm
attempt is made to combine
freed pages into larger chunks.
This code is built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
arch/arm64/hyperv/hv_init.c| 68 ++
include/asm-generic/mshyperv.h | 5
2 files changed, 73 insertions
nt Hyper-V
drivers has been eliminated by commit 6ba34171bcbd
("Drivers: hv: vmbus: Remove use of slow_virt_to_phys()")
* Minor tweaks to rebase to latest linux-next code
Michael Kelley (8):
arm64: hyperv: Add core Hyper-V include files
arm64: hyperv: Add hypercall and register access func
mostly driven by
architecture independent code in the VMbus driver and the
Hyper-V timer clocksource driver.
This code is built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
MAINTAINERS | 1 +
arch/arm64/Kbuild | 1 +
arch/arm64/hyperv
Add functions to set up and remove kexec and panic
handlers, and to inform Hyper-V about a guest panic.
These functions are called from architecture independent
code in the VMbus driver.
This code is built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
arch/arm64/hyperv
built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
arch/arm64/hyperv/Makefile | 2 +-
arch/arm64/hyperv/mshyperv.c | 139 +++
2 files changed, 140 insertions(+), 1 deletion(-)
create mode 100644 arch/arm64/hyperv/mshyperv.c
diff
From: Michael Kelley Sent: Tuesday, August 6, 2019
1:31 PM
>
> This series enables Linux guests running on Hyper-V on ARM64
> hardware. New ARM64-specific code in arch/arm64/hyperv initializes
> Hyper-V, including its interrupts and hypercall mechanism.
> Existing architect
ff-by: Michael Kelley
---
arch/x86/include/asm/mshyperv.h | 4
drivers/hv/hv.c | 2 ++
2 files changed, 6 insertions(+)
diff --git a/arch/x86/include/asm/mshyperv.h b/arch/x86/include/asm/mshyperv.h
index f4138ae..583e1ce 100644
--- a/arch/x86/include/asm/mshyperv.h
+++ b/arc
;Drivers: hv: vmbus: Remove use of slow_virt_to_phys()")
* Minor tweaks to rebase to latest linux-next code
Michael Kelley (8):
arm64: hyperv: Add core Hyper-V include files
arm64: hyperv: Add hypercall and register access functions
arm64: hyperv: Add memory alloc/free functions for
Add functions to set up and remove kexec and panic
handlers, and to inform Hyper-V about a guest panic.
These functions are called from architecture independent
code in the VMbus driver.
This code is built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
arch/arm64/hyperv
-generic.
Signed-off-by: Michael Kelley
---
MAINTAINERS | 2 +
arch/arm64/include/asm/hyperv-tlfs.h | 408 +++
arch/arm64/include/asm/mshyperv.h| 105 +
3 files changed, 515 insertions(+)
create mode 100644 arch/arm64/include/asm
mostly driven by
architecture independent code in the VMbus driver and the
Hyper-V timer clocksource driver.
This code is built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
MAINTAINERS | 1 +
arch/arm64/Makefile | 1 +
arch/arm64/hyperv
Update drivers/hv/Kconfig so CONFIG_HYPERV and CONFIG_HYPERV_TSCPAGE
can be selected on ARM64, causing the Hyper-V specific code to be built.
Signed-off-by: Michael Kelley
---
drivers/hv/Kconfig | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/drivers/hv/Kconfig b
attempt is made to combine
freed pages into larger chunks.
This code is built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
arch/arm64/hyperv/hv_init.c| 68 ++
include/asm-generic/mshyperv.h | 5
2 files changed, 73 insertions
built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
arch/arm64/hyperv/Makefile | 2 +-
arch/arm64/hyperv/mshyperv.c | 139 +++
2 files changed, 140 insertions(+), 1 deletion(-)
create mode 100644 arch/arm64/hyperv/mshyperv.c
diff
Add ARM64-specific code to initialize the Hyper-V
hypervisor when booting as a guest VM. Provide functions
and data structures indicating hypervisor status that
are needed by VMbus driver.
This code is built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
arch/arm64
r* the
> + * EOI optimization is disabled in hv_cpu_die(), otherwise a CPU may
> + * not be stopped in the case of CPU offlining and the VM will hang.
> + */
> if (!*hvp)
> - *hvp = __vmalloc(PAGE_SIZE, GFP_KERNEL, PAGE_KERNEL);
> + *hvp = __vmalloc(PAGE_SIZE, GFP_KERNEL | __GFP_ZERO,
> + PAGE_KERNEL);
>
> if (*hvp) {
> u64 val;
> --
> 2.19.1
Reviewed-by: Michael Kelley
r the VP ASSIST PAGE is disabled in hv_cpu_die().
> + */
> if (!*hvp)
> - *hvp = __vmalloc(PAGE_SIZE, GFP_KERNEL, PAGE_KERNEL);
> + *hvp = __vmalloc(PAGE_SIZE, GFP_KERNEL | __GFP_ZERO,
> + PAGE_KERNEL);
>
> if (*hvp) {
> u64 val;
> --
> 2.19.1
Reviewed-by: Michael Kelley
: hv: Fix a memory leak in hv_eject_device_work()")
> Signed-off-by: Dexuan Cui
> Cc: sta...@vger.kernel.org
> ---
>
> In v2:
> Replaced "hpdev->hbus" with "hbus", since we have the new "hbus" variable.
> [Michael
> Kelley]
>
>
From: Dexuan Cui Sent: Friday, June 21, 2019 12:02 PM
>
> The commit 05f151a73ec2 itself is correct, but it exposes this
> use-after-free bug, which is caught by some memory debug options.
>
> Add the Fixes tag to indicate the dependency.
>
> Fixes: 05f151a73ec2 ("PCI: hv: Fix a memory leak in
> hypervisor writes data to the wrong location).
>
> Fixes: 6ba34171bcbd ("Drivers: hv: vmbus: Remove use of slow_virt_to_phys()")
> Cc: sta...@vger.kernel.org
> Cc: Michael Kelley
> Reported-and-tested-by: Juliana Rodrigueiro
>
> Signed-off
.org
> Cc: Stephen Hemminger
> Signed-off-by: Dexuan Cui
Reviewed-by: Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
From: Lorenzo Pieralisi Sent: Tuesday, March 26,
2019 10:09 AM
> On Thu, Mar 21, 2019 at 12:12:03AM +, Dexuan Cui wrote:
> > > From: Michael Kelley
> > > Sent: Wednesday, March 20, 2019 2:38 PM
> > >
> > > From: Dexuan Cui
> >
From: Dexuan Cui Sent: Wednesday, March 20, 2019 5:36 PM
>
> > From: Michael Kelley
> > > ...
> > > diff --git a/drivers/pci/controller/pci-hyperv.c
> > > @@ -1776,6 +1776,10 @@ static void pci_devices_present_work(struct
> > work_struct *work)
> &g
reporting serial number as slot
> information")
> Signed-off-by: Dexuan Cui
> Acked-by: Stephen Hemminger
> Cc: sta...@vger.kernel.org
Reviewed-by: Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
From: Dexuan Cui
>
> After a device is just created in new_pcichild_device(), hpdev->refs is set
> to 2 (i.e. the initial value of 1 plus the get_pcichild()).
>
> When we hot remove the device from the host, in Linux VM we first call
> hv_pci_eject_device(), which increases hpdev->refs by get_pci
From: Dexuan Cui Sent: Monday, March 4, 2019 1:35 PM
>
> diff --git a/drivers/pci/controller/pci-hyperv.c
> b/drivers/pci/controller/pci-hyperv.c
> index b489412e3502..82acd6155adf 100644
> --- a/drivers/pci/controller/pci-hyperv.c
> +++ b/drivers/pci/controller/pci-hyperv.c
> @@ -1776,6 +1776,
e
> 8-bit APIC id.
>
> Reviewed-by: Thomas Gleixner
> Reviewed-by: Michael Kelley
> Signed-off-by: Lan Tianyu
> ---
> Change since v5:
>- Fix comile error due to x2apic_phys
>
> Change since v2:
>- Fix compile error due to x2apic_ph
we're hoping that it
can get into linux-next this week (given the extra week due to 5.0-rc8).
Thanks,
Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
PIC irqs have
> 8-bit APIC id.
>
> Reviewed-by: Thomas Gleixner
> Signed-off-by: Lan Tianyu
> ---
> Change since v2:
>- Fix compile error due to x2apic_phys
>- Fix comment indent
> Change since v1:
>- Remove redundant extern
ther monitor pages have been allocated to a channel. In the affected
> "_show" functions, verify that "channel->offermsg.monitor_allocated" is
> set before accessing the monitor id or the monitor page data. If
> "channel->offermsg.monit
er
> ---
> drivers/hv/vmbus_drv.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
Reviewed-by: Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
From: Lorenzo Pieralisi Sent: Friday, February 15,
2019 2:27 AM
>
> I will add Michael's tag to v3 (unless Michael is not happy with that),
> it is missing there.
>
Yes, please add. Thanks.
Michae
___
devel mailing list
de...@linuxdriverproject.org
From: Lorenzo Pieralisi Sent: Tuesday, February
12, 2019 8:35 AM
>
> On Mon, Jan 28, 2019 at 09:49:32PM -0800, Maya Nakamura wrote:
> > On Sun, Jan 27, 2019 at 05:11:48AM +0000, Michael Kelley wrote:
> > > From: Maya Nakamura Sent: Saturday, January
>
easonable amount when the Hyper-v related drivers were in use.
>
> Signed-off-by: Kimberly Brown
> ---
>
Reviewed-by: Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
From: lantianyu1...@gmail.com Sent: Saturday,
February 2, 2019 5:15 AM
>
> Hyper-V doesn't provide irq remapping for IO-APIC. To enable x2apic,
> set x2apic destination mode to physcial mode when x2apic is available
> and Hyper-V IOMMU driver makes sure cpus assigned with IO-APIC irqs have
> 8-
From: Sasha Levin Sent: Thursday, January 31, 2019 7:20 AM
>
> I've queued this one for hyper-fixes, thanks all!
>
Actually, please hold off on queuing this one. In a conversation I had
yesterday with Kim, they had identified a deadlock. Kim was going to be
looking at some revisions to avoi
essary dev_err()'s.
> - Unlock before returning.
> - Update the commit message.
>
Reviewed-by: Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
uct hv_pcibus_device.
>
> Signed-off-by: Maya Nakamura
> ---
> Change in v3:
> - Correct the v2 change log.
>
> Change in v2:
> - Update the commit message.
>
Reviewed-by: Michael Kelley
___
devel mailing list
de...@li
From: Maya Nakamura Sent: Saturday, January 26,
2019 12:55 AM
>
> @@ -953,29 +951,27 @@ static void hv_irq_unmask(struct irq_data *data)
>*/
> params->int_target.flags |=
> HV_DEVICE_INTERRUPT_TARGET_PROCESSOR_SET;
> - params->int_t
r
> of struct hv_pcibus_device.
>
> Signed-off-by: Maya Nakamura
> ---
> Change in v2:
> - None
>
Right -- there was no code change. But it's customary to note that
you updated the commit message.
Reviewed-by: Michael Kelley
+-
> include/uapi/linux/ndctl.h | 1 +
> 3 files changed, 10 insertions(+), 2 deletions(-)
>
Reviewed-by: Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
From: Michael Kelley Sent: Friday, January 4, 2019 12:05 PM
>
> > >> As Will said, this isn't a viable option. Please follow SMCCC 1.1.
> > >
> > > I'll have to start a conversation with the Hyper-V team about this.
> > > I don't
t/hyperv/netvsc.c | 2 +-
> drivers/net/hyperv/netvsc_drv.c | 5 -
> drivers/net/hyperv/rndis_filter.c | 9 +++--
> 4 files changed, 19 insertions(+), 7 deletions(-)
>
Reviewed-by: Michael Kelley
__
> drivers/net/hyperv/netvsc_drv.c | 134
> 1 file changed, 85 insertions(+), 49 deletions(-)
>
Reviewed-by: Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
f RSS indirection table")
> Reported-by: Wei Hu
> Signed-off-by: Haiyang Zhang
> ---
> drivers/net/hyperv/rndis_filter.c | 25 +++--
> 1 file changed, 19 insertions(+), 6 deletions(-)
>
Reviewed-by: Michael Kelley
___
d
.c | 14 -
> drivers/hv/vmbus_drv.c | 32
> include/linux/hyperv.h | 38
> 4 files changed, 116 insertions(+), 1 deletion(-)
>
Reviewed-by: Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
rs/hv/channel_mgmt.c | 18 +++
> drivers/hv/hyperv_vmbus.h | 4 +-
> drivers/hv/vmbus_drv.c| 48 +++
> include/linux/hyperv.h| 98 +++----
> 5 files changed, 79 insertions(+), 93 deletions(-)
Reviewed-by: Michae
From: Kimberly Brown Sent: Friday, January 4, 2019 8:35
PM
> static inline void set_channel_pending_send_size(struct vmbus_channel *c,
>u32 size)
> {
> + if (size) {
> + ++c->out_full_total;
> +
> + if (!c->out_full_f
From: Marc Zyngier Sent: Thursday, December 13, 2018
3:23 AM
> >> As Will said, this isn't a viable option. Please follow SMCCC 1.1.
> >
> > I'll have to start a conversation with the Hyper-V team about this.
> > I don't know why they chose to use HVC #1 or this register scheme
> > for output va
In these two cases, a value returned by rdmsr() or rdmsrl()
is ignored. Indicate that ignoring the value is intentional, so
that with the W=1 compilation option no warning is generated.
Signed-off-by: Michael Kelley
---
arch/x86/hyperv/hv_apic.c | 2 +-
arch/x86/hyperv/hv_spinlock.c | 2
With high IOPS storage being increasingly prevalent for guests
on Hyper-V and in Azure, make blk-mq the default so that the
full performance of the storage can be realized without having
to tweak other configuration settings.
Signed-off-by: Michael Kelley
---
drivers/scsi/storvsc_drv.c | 1 +
1
yered patches in the next
version.
>
> > This code is architecture dependent code and is mostly driven by
> > architecture independent code in the VMbus driver in drivers/hv/hv.c
> > and drivers/hv/vmbus_drv.c.
> >
> > This code is built only when CONFIG_HYPER
ndows/reference/tlfs
> >
> > mshyperv.h defines Linux-specific structures and routines for
> > interacting with Hyper-V. It is split into an ARM64 specific file
> > and an architecture independent file in include/asm-generic.
> >
> > Signed-off-by: Michael Kelley
&
From: Will Deacon Sent: Tuesday, November 27, 2018 2:19
AM
> > > The general approach is for patches 1 and 2 of the series to provide
> > > all the new code under arch/arm64 to enable Hyper-V. But the code
> > > won't get called (or even built) with just these two patches because
> > > CONFIG_
From: Greg KH Monday, November 26, 2018 11:57 AM
> > > You created "null" hooks that do nothing, for no one in this patch
> > > series, why?
> > >
> >
> > hv_enable_vmbus_irq() and hv_disable_vmbus_irq() have non-null
> > implementations in the ARM64 code in patch 2 of this series. The
> > impl
From: Greg KH Monday, November 26, 2018 11:21 AM
> > diff --git a/arch/x86/include/asm/mshyperv.h
> > b/arch/x86/include/asm/mshyperv.h
> > index 0d6271cce198..8d97bd3a13a6 100644
> > --- a/arch/x86/include/asm/mshyperv.h
> > +++ b/arch/x86/include/asm/mshyperv.h
> > @@ -109,6 +109,10 @@ void h
Commit-ID: 1de72c706488b7be664a601cf3843bd01e327e58
Gitweb: https://git.kernel.org/tip/1de72c706488b7be664a601cf3843bd01e327e58
Author: Michael Kelley
AuthorDate: Sun, 4 Nov 2018 03:48:57 +
Committer: Thomas Gleixner
CommitDate: Sun, 4 Nov 2018 11:04:46 +0100
x86/hyper-v: Enable
Commit-ID: 35b69a420bfb56b7b74cb635ea903db05e357bec
Gitweb: https://git.kernel.org/tip/35b69a420bfb56b7b74cb635ea903db05e357bec
Author: Michael Kelley
AuthorDate: Sun, 4 Nov 2018 03:48:54 +
Committer: Thomas Gleixner
CommitDate: Sun, 4 Nov 2018 11:04:46 +0100
clockevents/drivers
ro'ed, which platform specific
code can override.
Signed-off-by: Michael Kelley
---
drivers/clocksource/i8253.c | 14 --
include/linux/i8253.h | 1 +
2 files changed, 13 insertions(+), 2 deletions(-)
diff --git a/drivers/clocksource/i8253.c b/drivers/clocksource/i82
able to control whether the counter register
is zero'ed. [Juergen Gross & Thomas Gleixner]
Michael Kelley (2):
i8253: Add support for PIT shutdown quirk
x86/hyper-v: Enable PIT shutdown quirk
arch/x86/kernel/cpu/mshyperv.c | 11 +++
drivers/clocksource/i8253.c| 14 +
Hyper-V emulation of the PIT has a quirk such that the normal
PIT shutdown path doesn't work. Enable the PIT code that
handles this quirk.
Signed-off-by: Michael Kelley
---
arch/x86/kernel/cpu/mshyperv.c | 11 +++
1 file changed, 11 insertions(+)
diff --git a/arch/x86/kerne
Update drivers/hv/Kconfig so CONFIG_HYPERV can be selected on ARM64,
causing the Hyper-V specific code to be built.
Signed-off-by: Michael Kelley
---
drivers/hv/Kconfig | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/hv/Kconfig b/drivers/hv/Kconfig
index 97954f5
ff-by: Michael Kelley
---
arch/x86/include/asm/mshyperv.h | 4
drivers/hv/hv.c | 2 ++
2 files changed, 6 insertions(+)
diff --git a/arch/x86/include/asm/mshyperv.h b/arch/x86/include/asm/mshyperv.h
index 0d6271c..8d97bd3 100644
--- a/arch/x86/include/asm/mshyperv.h
+++ b/arc
-next code
Changes in v2:
* Removed patch to implement slow_virt_to_phys() on ARM64.
Use of slow_virt_to_phys() in arch independent Hyper-V
drivers has been eliminated by commit 6ba34171bcbd
("Drivers: hv: vmbus: Remove use of slow_virt_to_phys()")
* Minor tweaks to rebase to latest
This code is architecture dependent code and is mostly driven by
architecture independent code in the VMbus driver in drivers/hv/hv.c
and drivers/hv/vmbus_drv.c.
This code is built only when CONFIG_HYPERV is enabled.
Signed-off-by: Michael Kelley
---
MAINTAINERS | 1 +
arch/
-generic.
Signed-off-by: Michael Kelley
---
MAINTAINERS | 3 +
arch/arm64/include/asm/hyperv-tlfs.h | 338 +++
arch/arm64/include/asm/mshyperv.h| 116
include/asm-generic/mshyperv.h | 240 +
4
Srinivasan
> ---
> drivers/hv/hv_kvp.c | 26 ++
> 1 file changed, 22 insertions(+), 4 deletions(-)
>
Reviewed-by: Michael Kelley
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
global state in struct hv_context.
> Get rid of this state in struct hv_context.
>
> Signed-off-by: K. Y. Srinivasan
> ---
> drivers/hv/hv.c | 10 +++---
> drivers/hv/hyperv_vmbus.h | 2 --
> 2 files changed, 3 insertions(+), 9 deletio
>From Olaf Hering Sent: Thursday, October 18, 2018 8:20 AM
>
> > This extends existing vmbus related sysfs structure to provide per-channel
> > state information. This is useful when diagnosing issues with multiple
> > queues in networking and storage.
>
> > +++ b/drivers/hv/vmbus_drv.c
> > +stat
From: Tianyu Lan Sent: Wednesday, September 26, 2018 8:50 PM
>
> Hyper-V provides HvFlushGuestAddressList() hypercall to flush EPT tlb
> with specified ranges. This patch is to add the hypercall support.
>
> Signed-off-by: Lan Tianyu
>
Looks good!
Reviewed-b
From: YueHaibing Sent: Sunday, September 23, 2018 1:20
AM
> Remove including that don't need it.
>
> Signed-off-by: YueHaibing
> ---
> arch/x86/hyperv/hv_apic.c | 1 -
> 1 file changed, 1 deletion(-)
>
Reviewed-by: Michael Kelley
___
From: Tianyu Lan Sent: Thursday, September 20, 2018 7:30 AM
> On 9/20/2018 12:08 AM, Michael Kelley (EOSG) wrote:
> > From: Tianyu Lan Sent: Monday, September 17, 2018 8:19 PM
> >> +
> >> + if (ret &&
From: Tianyu Lan Sent: Monday, September 17, 2018 8:19 PM
>
> #include
> #include
> #include
> #include
> +#include
Hopefully asm/kvm_host.h does not need to be #included, given
the new code structure.
>
> #include
>
> +/*
> + * MAX_FLUSH_PAGES = "additional_pages" + 1. It's limite
From: Tianyu Lan Sent: Monday, September 17, 2018 8:19 PM
> +
> + if (ret && kvm_available_flush_tlb_with_range()) {
> + kvm_flush_remote_tlbs_with_address(kvm,
> + gfn_start,
> +
From: Tianyu Lan Sent: Monday, September 17, 2018 8:18 PM
>
> +static void kvm_flush_remote_tlbs_with_range(struct kvm *kvm,
> + struct kvm_tlb_range *range)
> +{
> + int ret = -ENOTSUPP;
> +
> + if (range && kvm_x86_ops->tlb_remote_flush_with_range) {
> + /*
> +
Dexuan Cui
> Cc: K. Y. Srinivasan
> Cc: Haiyang Zhang
> Cc: Stephen Hemminger
> ---
> arch/x86/hyperv/hv_init.c | 19 +++
> 1 file changed, 19 insertions(+)
>
Reviewed-by: Michael Kelley
___
devel ma
From Sebastian Andrzej Siewior Sent: Thursday, August 30, 2018 12:55 AM
>
> On !RT the header file get_irq_regs() gets pulled in via other header files.
> On
> RT it does not and the build fails:
>
> drivers/hv/vmbus_drv.c:975 implicit declaration of function
> ‘get_irq_regs’ [-
> Werror=
From: Tianyu Lan Sent: Monday, September 10, 2018 1:39 AM
> +
> +int hyperv_flush_guest_mapping_range(u64 as, struct kvm_tlb_range *range)
I'm really concerned about defining the Hyper-V function to flush
guest mappings in terms of a KVM struct definition. Your patch puts
this function in arch/x
From: KY Srinivasan Sent: Thursday, August 30, 2018 11:51 AM
> > + /* Allocate percpu VP index */
> > + hv_vp_index = kmalloc_array(num_possible_cpus(),
> > sizeof(*hv_vp_index),
> > + GFP_KERNEL);
> > + if (!hv_vp_index)
> > + return 1;
> > +
> We sh
From: KY Srinivasan Sent: Thursday, August 30, 2018 11:23 AM
> > +/*
> > + * This file contains definitions from the Hyper-V Hypervisor Top-Level
> > + * Functional Specification (TLFS):
> > + *
> > https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/reference/tlfs
> > +
> A lot of
From: Vitaly Kuznetsov Sent: Wednesday, August 1, 2018
2:26 AM
> > I was trying to decide if there are any arguments in favor of one
> > approach vs. the other: a per-cpu flag in memory or checking
> > the synic_control "enable" bit. Seems like a wash to me, in which
> > case I have a slight
From: Stephen Hemminger Sent: Tuesday, August 14,
2018 9:35 AM
> On Mon, 13 Aug 2018 19:30:50 +
> "Michael Kelley (EOSG)" wrote:
>
> > > +/*
> > > + * Return a matching hv_vmbus_device_id pointer.
> > > + * If there is no match, retu
From: k...@linuxonhyperv.com Sent: Friday, August 10,
2018 4:06 PM
> From: Stephen Hemminger
>
> Add support for overriding the default driver for a VMBus device
> in the same way that it can be done for PCI devices. This patch
> adds the /sys/bus/vmbus/devices/.../driver_override file
> and
From: k...@linuxonhyperv.com Sent: Friday, August 10,
2018 4:06 PM
>
> Fix a bug in the key delete code - the num_records range
> from 0 to num_records-1.
>
> Signed-off-by: K. Y. Srinivasan
> Reported-by: David Binderman
> Cc:
> ---
Rev
From: Vitaly Kuznetsov Sent: Tuesday, July 31, 2018 4:20
AM
>
> Reviewed-by: Vitaly Kuznetsov
Thanks for the review
>
> Alternatively, we can get rid of synic_initialized flag altogether:
> hv_synic_init() never fails in the first place but we can always
> implement something like:
>
> int
ost VSP's
> response and notices the channel has been rescinded, can't safely give
> up: e.g., in hv_pci_protocol_negotiation() -> wait_for_response(), it's
> unsafe to exit from wait_for_response() and proceed with the on-stack
> variable "comp_pkt" popped. Th
From: Sunil Muthuswamy Sent: Wednesday, July 11, 2018 9:59 AM
> Thanks, Michael. In which branch should I fix these now that the changes have
> been
> merged with the char-misc-next branch?
If the original code is already in char-misc-next, you should probably submit a
completely new patch for ch
>From k...@linuxonhyperv.com Sent: Saturday, July 7,
>2018 7:57 PM
>
> From: Sunil Muthuswamy
>
> In the VM mode on Hyper-V, currently, when the kernel panics, an error
> code and few register values are populated in an MSR and the Hypervisor
> notified. This information is collected on the h
From: Tianyu Lan Monday, July 9, 2018 2:03 AM
> Hyper-V supports a pv hypercall HvFlushGuestPhysicalAddressSpace to
> flush nested VM address space mapping in l1 hypervisor and it's to
> reduce overhead of flushing ept tlb among vcpus. This patch is to
> implement it.
>
> Signed-off-by: Lan Tiany
his will likely be a bigger change as
> all call sites need to be checked first.
>
> Fixes: 1268ed0c474a ("x86/hyper-v: Fix the circular dependency in IPI
> enlightenment")
> Signed-off-by: Vitaly Kuznetsov
> ---
> arch/x86/hyperv/mmu.c | 5 +
> 1 file
ked before
> we pass 'nr_bank' to hypercall.
>
> Fixes: 1268ed0c474a ("x86/hyper-v: Fix the circular dependency in IPI
> enlightenment")
> Signed-off-by: Vitaly Kuznetsov
> ---
> arch/x86/hyperv/mmu.c | 2 ++
> 1 file changed, 2 insertions(+)
Reviewed-
1 - 100 of 163 matches
Mail list logo