Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp328936pxf; Thu, 8 Apr 2021 04:07:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzB7rIr0hrhgQosVOWQdMrWmX1puNjQFZeDMFzuJB4evqxEEfUI9uQnbsYxyP8/eGumOH2H X-Received: by 2002:a17:90a:5898:: with SMTP id j24mr7702539pji.110.1617880067649; Thu, 08 Apr 2021 04:07:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617880067; cv=none; d=google.com; s=arc-20160816; b=Sse/GQ1gYxd1jbTEmSWE8YsawIMa/C6KP+6BZ3NAENCL79oSsTKUg4+TpPyv8v/dV8 bffC76GGkFqx+aMLSt652zn8Uzb+dsNfaubYWwaS78+b8Qt9SjBNQcC5wlnYSCM9P01C aHJvJoMAAhSA0VeXcIFuyOtPMtS2Jof54xtdnbTP6EqGHuWi36fhVmZspPCcRjLPfip8 FeraenYzOjUSk1RmMFP35e0lNtjjEdu9vG7V8FpbnlUrSqEbLpUJblHXg9KZpRIj3K7Q n2UTGa5uFR1vTm824Lg3Nh09R0IVuLN8RY1DPZgpvf/QHSYRls4r4GHkvj0l2x0oIDx2 fJXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=uqFnFnU+W5hoDYL4hIDIXsxj0nax+65fpHN1hSzXtQU=; b=PBpS6oARU1zy6WPRYGYblTkuVuLQ76+B4+pwlKDHlRQITpm34Mzw8zcHFeBMITkMJa jGqw3lIhfWxW+F8R706aKNK8WRL8IX3XWZZ+akWSGa5YqJgsW/dYzXwESWrZvCAKVk9h 0qUrGi4LnOAB2oNXf5veYd+14rWCIIehqa5iZufNBxCPCV/lnKNbZLzAfGps7w2SkD14 F7p0fn/xSXzZft3P8Uc5uMUqnV94tfem+Nuq0j7BUXB6IVGBTgi0YmjXJrUlsqzcc/Tp pDHtMoOzMUvO7GPrUduXA7enFnT0enePXhMajCbv1QwATTz35XliS4x/8NlTYnFjjc6h 7jKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=i5RFaEYO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ot14si4575298pjb.55.2021.04.08.04.07.35; Thu, 08 Apr 2021 04:07:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=i5RFaEYO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231126AbhDHLHL (ORCPT + 99 others); Thu, 8 Apr 2021 07:07:11 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:20130 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230344AbhDHLHJ (ORCPT ); Thu, 8 Apr 2021 07:07:09 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1617880018; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=uqFnFnU+W5hoDYL4hIDIXsxj0nax+65fpHN1hSzXtQU=; b=i5RFaEYOoBBVxgion5/FMLabt+iHjFmzycvPHnes5VOYfGVW67/TwK3wqaFaf/bHdfqLvh EHfUTdt1lZJAwO1pjJb+KIZiCUycVdwulaXah9JDiPcZSkXGfs4hLp7j/tSLRGKhr7rMrO 4HxXGDwWIvjgPJPVvACL+2fi7AYE+uw= Received: from mail-wm1-f71.google.com (mail-wm1-f71.google.com [209.85.128.71]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-434-r6J8R0nhMamvCNWQPT06iA-1; Thu, 08 Apr 2021 07:06:56 -0400 X-MC-Unique: r6J8R0nhMamvCNWQPT06iA-1 Received: by mail-wm1-f71.google.com with SMTP id b20so330337wmj.3 for ; Thu, 08 Apr 2021 04:06:56 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=uqFnFnU+W5hoDYL4hIDIXsxj0nax+65fpHN1hSzXtQU=; b=lfYLG5Py+XEhmUbM73a7H5lwmW4OhvXAHknR+nb/9ewoqQmz6rbZcNeoemZAc2lYPy YsO1cGSTwkscVnLrdEckss07AXFciTxa2ILTeiWcqpJ1ydis2RYMJVU49pChi84p6/+f vU4R151srb8RJbKhSN2ip9PZjcvtqtQ7tqoEgSZrzbNPuLpZNjUN8QSBy4tKBIVmn2wi lLUakFCjAx1lIjveT1cHmKXVRu2thrxydtAEgrEL5vO+5OK7kpHWlMIL5f3JZblZFMIy qOdaWfVs/JkdNMNfLcYbGhQcxZUvVrM+MmuvIR59RVXEMm0iVmwmJ4WnbRP3TUVOlaGJ BBNg== X-Gm-Message-State: AOAM532vD92fbBS6SV3Ik6v8I9RQFlWFaz04JbO01opPIKz2HRpXqQpr T8E8rXH3CfmJ81jqUmRg/bG7ONTP7Ve91wRx0iR9NwSb+BZJQC6LnWOEjdWzQnfQg5PG8bi2WKl rWqQc5Qq5eGmLwF0xmDFcNlba X-Received: by 2002:a1c:9dd5:: with SMTP id g204mr7810246wme.87.1617880015666; Thu, 08 Apr 2021 04:06:55 -0700 (PDT) X-Received: by 2002:a1c:9dd5:: with SMTP id g204mr7810214wme.87.1617880015445; Thu, 08 Apr 2021 04:06:55 -0700 (PDT) Received: from vitty.brq.redhat.com (g-server-2.ign.cz. [91.219.240.2]) by smtp.gmail.com with ESMTPSA id z15sm15469155wrw.38.2021.04.08.04.06.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 08 Apr 2021 04:06:55 -0700 (PDT) From: Vitaly Kuznetsov To: Vineeth Pillai Cc: "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "K. Y. Srinivasan" , x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-hyperv@vger.kernel.org, Lan Tianyu , Michael Kelley , Paolo Bonzini , Sean Christopherson , Wanpeng Li , Jim Mattson , Joerg Roedel , Wei Liu , Stephen Hemminger , Haiyang Zhang Subject: Re: [PATCH 1/7] hyperv: Detect Nested virtualization support for SVM In-Reply-To: References: Date: Thu, 08 Apr 2021 13:06:53 +0200 Message-ID: <87lf9tavci.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Vineeth Pillai writes: > Detect nested features exposed by Hyper-V if SVM is enabled. > > Signed-off-by: Vineeth Pillai > --- > arch/x86/kernel/cpu/mshyperv.c | 10 +++++++++- > 1 file changed, 9 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/kernel/cpu/mshyperv.c b/arch/x86/kernel/cpu/mshyperv.c > index 3546d3e21787..4d364acfe95d 100644 > --- a/arch/x86/kernel/cpu/mshyperv.c > +++ b/arch/x86/kernel/cpu/mshyperv.c > @@ -325,9 +325,17 @@ static void __init ms_hyperv_init_platform(void) > ms_hyperv.isolation_config_a, ms_hyperv.isolation_config_b); > } > > - if (ms_hyperv.hints & HV_X64_ENLIGHTENED_VMCS_RECOMMENDED) { > + /* > + * AMD does not need enlightened VMCS as VMCB is already a > + * datastructure in memory. Well, VMCS is also a structure in memory, isn't it? It's just that we don't have a 'clean field' concept for it and we can't use normal memory accesses. > We need to get the nested > + * features if SVM is enabled. > + */ > + if (boot_cpu_has(X86_FEATURE_SVM) || > + ms_hyperv.hints & HV_X64_ENLIGHTENED_VMCS_RECOMMENDED) { Do I understand correctly that we can just look at CPUID.0x40000000.EAX and in case it is >= 0x4000000A we can read HYPERV_CPUID_NESTED_FEATURES leaf? I'd suggest we do that intead then. > ms_hyperv.nested_features = > cpuid_eax(HYPERV_CPUID_NESTED_FEATURES); > + pr_info("Hyper-V nested_features: 0x%x\n", > + ms_hyperv.nested_features); > } > > /* -- Vitaly