Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp4793728imm; Tue, 9 Oct 2018 05:28:50 -0700 (PDT) X-Google-Smtp-Source: ACcGV61HCcqLtIY8e4ZgpE2Y9SxdLqxOuPRI6iE02J/TcoSsgbEx7Dplj0bkLcjmq0BWR8dS6R6e X-Received: by 2002:a17:902:15c5:: with SMTP id a5-v6mr12009488plh.137.1539088129987; Tue, 09 Oct 2018 05:28:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539088129; cv=none; d=google.com; s=arc-20160816; b=CUxlSt5LvIn6arepPWW2M0AxZ/VOIqEc7T4eQ4/NWhlSwsA8O2WJlffVgP3iNxHDtb sSp6o7CuagjUyR1mok6PbqLWakxRdIbKMjowiwmJROsaC4nZltQ87Ubb/4FzOnCEU5Aw i3lWWmk4y3jAdfcpbkI293mG/kxuzaEkeoihzAWjh6RR6OhnsgOSt4/gMbcuCqq2q6IA ZokWOtQkAWaic8NLQP4AZCj5uFv6qIDpuWcHxDFCk/dxmfqVsxrXBIp7R9Fa5g84hoO+ AzptBRS9oqg/avPPWw0zjlXns4Lnc/PuE8QczV5CSnIshM79ZfNZQgOY1JOQNFP7GEQY epZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:mime-version:robot-unsubscribe:robot-id :git-commit-id:subject:to:references:in-reply-to:reply-to:cc :message-id:from:date; bh=xyfHys6pq9n1LurtMTM+dpindyY+YmwMXtqUWtud6h8=; b=tPv2S6sYKTJRUzg7S4v4WHeS+qC84Kpk9HP7haJaIx4gmX/R7Ml6Mnq/prxQ+N5gpH +jhc5Isiov0jTwiMugAjc4SauZtXgGdySjgCeSptrF6Af8CF8s1BfMhRziI7eBCFRyjZ jZydKiMmwId9qDir7S7HsZvDohl80fCyuSEw/f1fuGPNuOaQ4MwwapUn5JEV8j7m4QAI Rvf3Y8kfI05ACNZYxEu1/I7GlbnORJMhEdvDJadk7woFk0+lTUydJt/hzyERy1uQvdtA BoBJ5ov+XHhrUrY8N8H/DPm2PJP2+rOcqqkak84bdmRrSNy69EFlcq5s8ANFPS+JOSRf rHZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n7-v6si12993986pgb.171.2018.10.09.05.28.35; Tue, 09 Oct 2018 05:28:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726870AbeJITot (ORCPT + 99 others); Tue, 9 Oct 2018 15:44:49 -0400 Received: from terminus.zytor.com ([198.137.202.136]:55425 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726393AbeJITot (ORCPT ); Tue, 9 Oct 2018 15:44:49 -0400 Received: from terminus.zytor.com (localhost [127.0.0.1]) by terminus.zytor.com (8.15.2/8.15.2) with ESMTPS id w99CRpNf1035250 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 9 Oct 2018 05:27:52 -0700 Received: (from tipbot@localhost) by terminus.zytor.com (8.15.2/8.15.2/Submit) id w99CRp0Z1035247; Tue, 9 Oct 2018 05:27:51 -0700 Date: Tue, 9 Oct 2018 05:27:51 -0700 X-Authentication-Warning: terminus.zytor.com: tipbot set sender to tipbot@zytor.com using -f From: tip-bot for Yi Sun Message-ID: Cc: kys@microsoft.com, tglx@linutronix.de, linux-kernel@vger.kernel.org, yi.y.sun@linux.intel.com, haiyangz@microsoft.com, mingo@kernel.org, mikelley@microsoft.com, sthemmin@microsoft.com, hpa@zytor.com Reply-To: mingo@kernel.org, mikelley@microsoft.com, sthemmin@microsoft.com, hpa@zytor.com, tglx@linutronix.de, kys@microsoft.com, haiyangz@microsoft.com, yi.y.sun@linux.intel.com, linux-kernel@vger.kernel.org In-Reply-To: <1538028104-114050-2-git-send-email-yi.y.sun@linux.intel.com> References: <1538028104-114050-2-git-send-email-yi.y.sun@linux.intel.com> To: linux-tip-commits@vger.kernel.org Subject: [tip:x86/paravirt] x86/hyperv: Add GUEST_IDLE_MSR support Git-Commit-ID: f726c4620df39055f060537a8ed183c18a2c504b X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 Content-Disposition: inline X-Spam-Status: No, score=-0.7 required=5.0 tests=ALL_TRUSTED,BAYES_00, DATE_IN_FUTURE_48_96 autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on terminus.zytor.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit-ID: f726c4620df39055f060537a8ed183c18a2c504b Gitweb: https://git.kernel.org/tip/f726c4620df39055f060537a8ed183c18a2c504b Author: Yi Sun AuthorDate: Thu, 27 Sep 2018 14:01:43 +0800 Committer: Thomas Gleixner CommitDate: Tue, 9 Oct 2018 14:14:49 +0200 x86/hyperv: Add GUEST_IDLE_MSR support Hyper-V may expose a HV_X64_MSR_GUEST_IDLE MSR via HYPERV_CPUID_FEATURES. Reading this MSR triggers the host to transition the guest vCPU into an idle state. This state can be exited via an IPI even if the read in the guest happened from an interrupt disabled section. Signed-off-by: Yi Sun Signed-off-by: Thomas Gleixner Reviewed-by: Michael Kelley Cc: chao.p.peng@intel.com Cc: chao.gao@intel.com Cc: isaku.yamahata@intel.com Cc: tianyu.lan@microsoft.com Cc: "K. Y. Srinivasan" Cc: Haiyang Zhang Cc: Stephen Hemminger Link: https://lkml.kernel.org/r/1538028104-114050-2-git-send-email-yi.y.sun@linux.intel.com --- arch/x86/include/asm/hyperv-tlfs.h | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/arch/x86/include/asm/hyperv-tlfs.h b/arch/x86/include/asm/hyperv-tlfs.h index e977b6b3a538..2a2fa170caf1 100644 --- a/arch/x86/include/asm/hyperv-tlfs.h +++ b/arch/x86/include/asm/hyperv-tlfs.h @@ -38,6 +38,8 @@ #define HV_MSR_TIME_REF_COUNT_AVAILABLE (1 << 1) /* Partition reference TSC MSR is available */ #define HV_MSR_REFERENCE_TSC_AVAILABLE (1 << 9) +/* Partition Guest IDLE MSR is available */ +#define HV_X64_MSR_GUEST_IDLE_AVAILABLE (1 << 10) /* A partition's reference time stamp counter (TSC) page */ #define HV_X64_MSR_REFERENCE_TSC 0x40000021 @@ -246,6 +248,9 @@ #define HV_X64_MSR_STIMER3_CONFIG 0x400000B6 #define HV_X64_MSR_STIMER3_COUNT 0x400000B7 +/* Hyper-V guest idle MSR */ +#define HV_X64_MSR_GUEST_IDLE 0x400000F0 + /* Hyper-V guest crash notification MSR's */ #define HV_X64_MSR_CRASH_P0 0x40000100 #define HV_X64_MSR_CRASH_P1 0x40000101