Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp627029imw; Fri, 8 Jul 2022 08:52:53 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tbepiPyixngFYjpac3BFHGK2v+FSCccEA4l5rUe/GzsWoEI9enrxORShoTERaaOUkiZRdH X-Received: by 2002:a17:90b:1b10:b0:1ed:44:d00d with SMTP id nu16-20020a17090b1b1000b001ed0044d00dmr544878pjb.234.1657295573681; Fri, 08 Jul 2022 08:52:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657295573; cv=none; d=google.com; s=arc-20160816; b=MUrBYxKbO2fy5Ng0DBDgs2NEd4Fu+40RPO2VZXgBJ7tuYlzUd6KdcwvaAAlJSpHRXB qk09wvNTucEVfiMxtLC8Jw4E9Aa0/fOjvGzb9A2g+juboBfkBUckycKUZLLwR5Dc/TKP TPBYiPoDiT0lCKz49zgbawC1oKwPzvuS7WYJ273e+YScdxP7ZC4tjceocl2+knYohzCO 7cCqewOFwRP/TQokcPdThPVE+bQhM0orYYFnTdXslBqTJ5IC/9/tfUZdO60FyCVNWkXX FJ65ERoUPYYw6RPy0Wwy6GTOP8KUOwti3ZYDr4vMwuv6Wh5jNJ8LtcOVqGqVEt9WU1f8 0Cyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=fEdjnqcwdrP4ky6Ydkpn9hPwr/5/PhNfBhkdDi68CEI=; b=IWjhDPxgAB2C9Ga4HHQo7fWY9LU5/XPQkCUYCUuxdFPUkMIKiEqEQDzr30mskHVizi JH0L89ViQiE2OGe44LvzI1Q/28LAfSZEq5Zf3BaIcd+SxxGwJvU1pZWWw4HV3fZ7Yvbk zZGim3tmIrFpAvZU5efMYQTxmtjndIcAfR9Ld8idqqdz+LQ/G45FFNZj/zcsrcGUaoEi S29ckX0fByT0d3RZHm6fMOotmLDvoysyEWY4Os+Z1QlnezpAFhJOwivpgLZov5T22+ht Yqa3OC6F1IaxDJ/zWbmmJ/D/BvqP0Bmk5h3/s0d86jbcFbWcVPdYUwZbqTYddPv9Ww63 v0+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="R/S7Qeq6"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j67-20020a625546000000b005255dd30819si7316856pfb.4.2022.07.08.08.52.40; Fri, 08 Jul 2022 08:52:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="R/S7Qeq6"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238360AbiGHOmm (ORCPT + 99 others); Fri, 8 Jul 2022 10:42:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60934 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234643AbiGHOmg (ORCPT ); Fri, 8 Jul 2022 10:42:36 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id E0AD62FFFF for ; Fri, 8 Jul 2022 07:42:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1657291354; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=fEdjnqcwdrP4ky6Ydkpn9hPwr/5/PhNfBhkdDi68CEI=; b=R/S7Qeq6EAjmLDhQZuwn6NjCXbr8RthJNOEfxEb+SEJgoyaFTpCq3ez6V0LaNDtXO0PNet FdzcgBJkP2U8isGxlGioqVGza26Kw8dMsNbL106jKxIeiT9wceyflE+YeAJlnvtvzs8KKL tOcGHF1wkeKXD3+GpdacFz/LUmpYyh8= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-288-VdK724GANSCCoFqwWXvY6A-1; Fri, 08 Jul 2022 10:42:31 -0400 X-MC-Unique: VdK724GANSCCoFqwWXvY6A-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 7C1873C01DE4; Fri, 8 Jul 2022 14:42:30 +0000 (UTC) Received: from fedora.redhat.com (unknown [10.40.193.250]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6CC5E492C3B; Fri, 8 Jul 2022 14:42:28 +0000 (UTC) From: Vitaly Kuznetsov To: kvm@vger.kernel.org, Paolo Bonzini , Sean Christopherson Cc: Anirudh Rayabharam , Wanpeng Li , Jim Mattson , Maxim Levitsky , linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags Date: Fri, 8 Jul 2022 16:41:59 +0200 Message-Id: <20220708144223.610080-2-vkuznets@redhat.com> In-Reply-To: <20220708144223.610080-1-vkuznets@redhat.com> References: <20220708144223.610080-1-vkuznets@redhat.com> MIME-Version: 1.0 Content-Type: text/plain Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.85 on 10.11.54.10 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For some features, Hyper-V spec defines two separate CPUID bits: one listing whether the feature is supported or not and another one showing whether guest partition was granted access to the feature ("partition privilege mask"). 'Debug MSRs available' is one of such features. Add the missing 'access' bit. Fixes: f97f5a56f597 ("x86/kvm/hyper-v: Add support for synthetic debugger interface") Signed-off-by: Vitaly Kuznetsov --- arch/x86/kvm/hyperv.c | 1 + include/asm-generic/hyperv-tlfs.h | 2 ++ 2 files changed, 3 insertions(+) diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c index e2e95a6fccfd..e08189211d9a 100644 --- a/arch/x86/kvm/hyperv.c +++ b/arch/x86/kvm/hyperv.c @@ -2496,6 +2496,7 @@ int kvm_get_hv_cpuid(struct kvm_vcpu *vcpu, struct kvm_cpuid2 *cpuid, ent->eax |= HV_MSR_RESET_AVAILABLE; ent->eax |= HV_MSR_REFERENCE_TSC_AVAILABLE; ent->eax |= HV_ACCESS_FREQUENCY_MSRS; + ent->eax |= HV_ACCESS_DEBUG_MSRS; ent->eax |= HV_ACCESS_REENLIGHTENMENT; ent->ebx |= HV_POST_MESSAGES; diff --git a/include/asm-generic/hyperv-tlfs.h b/include/asm-generic/hyperv-tlfs.h index fdce7a4cfc6f..1d99dd296a76 100644 --- a/include/asm-generic/hyperv-tlfs.h +++ b/include/asm-generic/hyperv-tlfs.h @@ -70,6 +70,8 @@ #define HV_MSR_GUEST_IDLE_AVAILABLE BIT(10) /* Partition local APIC and TSC frequency registers available */ #define HV_ACCESS_FREQUENCY_MSRS BIT(11) +/* Debug MSRs available */ +#define HV_ACCESS_DEBUG_MSRS BIT(12) /* AccessReenlightenmentControls privilege */ #define HV_ACCESS_REENLIGHTENMENT BIT(13) /* AccessTscInvariantControls privilege */ -- 2.35.3