Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp697091pxy; Wed, 21 Apr 2021 12:40:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzj8LhgKfgwhtukA85ngdUwaMMwF95ZrEQg9Oj8YyoU+xCt56qccFN6Af2rbW5Hx6xG0uQh X-Received: by 2002:aa7:da18:: with SMTP id r24mr39922784eds.198.1619034018153; Wed, 21 Apr 2021 12:40:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619034018; cv=none; d=google.com; s=arc-20160816; b=SQph50N2QB55UAo2/NSkxfCUupzN6IEunBpmbq9JujgmgD2GZ79Oq7ddoIcyauASQm 9akyJdUgvbxR1qhfmpf7+2vaBVHqzY2llQqFSwfbd9AyMTjxFsQ1sInGG+fGHT9F6rdb wBhNDgUdvJXkCK6Rvq/HHEo9XQZul/eKpNU9CH3dAawdc0kfAQj15K9fSe4FKRpUBozk 112zYvUKGHukv/to/awoLmPISZ6bmwHKusXwWKy3CxUISRNMfXaCB+jbLnFLYsr626Gn w0daAhkXHXdwzhBcBdJznPyNzcM3GsNnvEwt0DSiLP2tR8DphNuSr5Tix0cQDYrcsu4p spZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=bwKGSC2XKxHJ/OtACfutVacoa9FeOlpwalpdfXA2eRg=; b=rMHS+NErQvEOQnkCmcIJbRSgDojEBUZs70BsWdvp68NysrR5rjU2cvNOkhzL6QblVN RYMiI3QqeBQmp9PWPbjDTVHNN2L/SuCK2VyGSaaNvbZRG5U6Qp5aSdPOwAQljQTWgZ9h 8angYN4ocI3Gvgri0VeXbuWj8Ot6gAfUYXL7JATRsaE1cM3+8cCpsbQHAcGgHVYFU2nr n5oHb3qmxGxYLMtvbSC6OGQsVzcz0FJ2iv74VY+IUbQ1Q9l6XJRsqY7OKk1eaQUyxesL UYotKVcayE/KBH4yBhC0jNgIAyOoEcMdxXRjloThmSLO5E1MsFf2hWLT9+7pmIZgqRSS +A7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=DK9JbFQL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s15si209958edd.547.2021.04.21.12.39.55; Wed, 21 Apr 2021 12:40:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=DK9JbFQL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243442AbhDUOH6 (ORCPT + 99 others); Wed, 21 Apr 2021 10:07:58 -0400 Received: from linux.microsoft.com ([13.77.154.182]:37080 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243333AbhDUOHi (ORCPT ); Wed, 21 Apr 2021 10:07:38 -0400 Received: from viremana-dev.fwjladdvyuiujdukmejncen4mf.xx.internal.cloudapp.net (unknown [13.66.132.26]) by linux.microsoft.com (Postfix) with ESMTPSA id 45D9420B83DB; Wed, 21 Apr 2021 07:07:05 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 45D9420B83DB DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1619014025; bh=bwKGSC2XKxHJ/OtACfutVacoa9FeOlpwalpdfXA2eRg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DK9JbFQLCTbQR6aRJM13I/4Yi1cX9ILu9QpKtmDgSg98I9HZMqRLWqQa92dCWqKHz UJSQjA1F4ODWdudYaO34oI6IXXme4xoouDsKMeLNcjv8stUD1YAPz4MoXfhTid7M4D QDSp8uiGTV6p8W7k16E7mPh8me2xQ1nkHAFnhjx0= From: Vineeth Pillai To: Lan Tianyu , Michael Kelley , Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Wei Liu , Stephen Hemminger , Haiyang Zhang Cc: Vineeth Pillai , "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "K. Y. Srinivasan" , x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-hyperv@vger.kernel.org Subject: [PATCH v3 6/7] KVM: SVM: hyper-v: Enlightened MSR-Bitmap support Date: Wed, 21 Apr 2021 14:06:53 +0000 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Enlightened MSR-Bitmap as per TLFS: "The L1 hypervisor may collaborate with the L0 hypervisor to make MSR accesses more efficient. It can enable enlightened MSR bitmaps by setting the corresponding field in the enlightened VMCS to 1. When enabled, L0 hypervisor does not monitor the MSR bitmaps for changes. Instead, the L1 hypervisor must invalidate the corresponding clean field after making changes to one of the MSR bitmaps." Enable this for SVM. Related VMX changes: commit ceef7d10dfb6 ("KVM: x86: VMX: hyper-v: Enlightened MSR-Bitmap support") Signed-off-by: Vineeth Pillai --- arch/x86/kvm/svm/svm.c | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index 79d27a9f4b7c..ad87ae61dc9f 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -650,6 +650,27 @@ static bool msr_write_intercepted(struct kvm_vcpu *vcpu, u32 msr) return !!test_bit(bit_write, &tmp); } +#if IS_ENABLED(CONFIG_HYPERV) +static inline void hv_vmcb_dirty_nested_enlightenments(struct kvm_vcpu *vcpu) +{ + struct vmcb *vmcb = to_svm(vcpu)->vmcb; + + /* + * vmcb can be NULL if called during early vcpu init. + * And its okay not to mark vmcb dirty during vcpu init + * as we mark it dirty unconditionally towards end of vcpu + * init phase. + */ + if (vmcb && vmcb_is_clean(vmcb, VMCB_HV_NESTED_ENLIGHTENMENTS) && + vmcb->hv_enlightenments.hv_enlightenments_control.msr_bitmap) + vmcb_mark_dirty(vmcb, VMCB_HV_NESTED_ENLIGHTENMENTS); +} +#else +static inline void hv_vmcb_dirty_nested_enlightenments(struct kvm_vcpu *vcpu) +{ +} +#endif + static void set_msr_interception_bitmap(struct kvm_vcpu *vcpu, u32 *msrpm, u32 msr, int read, int write) { @@ -681,6 +702,9 @@ static void set_msr_interception_bitmap(struct kvm_vcpu *vcpu, u32 *msrpm, write ? clear_bit(bit_write, &tmp) : set_bit(bit_write, &tmp); msrpm[offset] = tmp; + + hv_vmcb_dirty_nested_enlightenments(vcpu); + } void set_msr_interception(struct kvm_vcpu *vcpu, u32 *msrpm, u32 msr, @@ -1144,6 +1168,9 @@ static inline void hv_init_vmcb(struct vmcb *vmcb) if (npt_enabled && ms_hyperv.nested_features & HV_X64_NESTED_ENLIGHTENED_TLB) hve->hv_enlightenments_control.enlightened_npt_tlb = 1; + + if (ms_hyperv.nested_features & HV_X64_NESTED_MSR_BITMAP) + hve->hv_enlightenments_control.msr_bitmap = 1; } #else static inline void hv_init_vmcb(struct vmcb *vmcb) -- 2.25.1