Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp4250060imw; Tue, 12 Jul 2022 04:53:13 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vjyf9qDzqIi0LoAXMfY87UfKJQ4tUZlibYj9Z4syjWZ2GO8N7ahAomyuDIJfwWL5uxAXlh X-Received: by 2002:a05:6402:27c9:b0:43a:d14b:1fa5 with SMTP id c9-20020a05640227c900b0043ad14b1fa5mr15256964ede.245.1657626793023; Tue, 12 Jul 2022 04:53:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657626793; cv=none; d=google.com; s=arc-20160816; b=B/zjziN5d+bp6YrhPqii90o4soPoZJYFSkyQ686caMRVz2fokixqBiP2AnUwIUZ6dR qVg1s5S3szVN/QqYwt+KCE9bXUWqG6+APPDoENagcVUDz5TC1nQ39nWXKjAtxuRpswWf 5FNJETKRHb2nVArtUKAc3dAWtfT+/1IG5wmb+MVcBrSgThSJ0nPt7LR9xiy6QO4A3Fry w1pRhSji0ljTHXTG4GVtY5jlgXc8fr+k9buACh76DiSE76LxODcA/IJk6vEByZ/MCjnw nWQTOAAC5zfWH9zZppoSmdzQsU2xzE3dT4OY2d8VJBF7fUYJVc7suCLW5gwEV76Q0Coa qUiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=MhycE2vEwnb9k/UxKYsjDnSNw/br2B5mjJJO+OCBKJk=; b=oBTCu1HxvA+7iJuTTnvqj9KsGlOp4hs9kXmiXvXD8/BT8YulMdSK+aUftzqP74gBOT PsA74oYLxxsxkceD9cM18Xr1zA/sLgYyDotc8DVI7/GOBS6p0neY/8vdxszOsUb2ftOc mfYL6m8O3s2HO/1EFZY4r2K2PZ6UxIj9S1jn2YuF7v/4EYlzaosR+iyqiUEf7z73vrDg jVmAoiW2CTT3zgkl5vsKLjO7QUGoCuq2wLVocgn5Ycdn2W6YpfljU0tacn0XsgxA1pgs cu3QoJlPqWZDf+pjmNsN2fER6YVh7YYQ7WWag58O6ejzFePuuVLjYeqpy9axC/+/3H6Q nhIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ehznDEmk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id fk3-20020a056402398300b0043a9d35955bsi13072373edb.16.2022.07.12.04.52.48; Tue, 12 Jul 2022 04:53:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ehznDEmk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232294AbiGLLtR (ORCPT + 99 others); Tue, 12 Jul 2022 07:49:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60858 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230257AbiGLLtQ (ORCPT ); Tue, 12 Jul 2022 07:49:16 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 3D7221C923 for ; Tue, 12 Jul 2022 04:49:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1657626554; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=MhycE2vEwnb9k/UxKYsjDnSNw/br2B5mjJJO+OCBKJk=; b=ehznDEmkGM2ONKd+Uo0Q2cYNEmIOn7L4pWRFrjSH8CKPBqZ2+VOipBsrBdDVUJnpaoteTg WjS0y7jKt3UYrfamVO59A4CNa03rnvwBExy8hzorTVbVHvQQwQeDLMtfcK9pC8P2mShHF9 C4uP9QtM9oWBhA87sLLyqtJtNg/MitE= Received: from mail-qk1-f200.google.com (mail-qk1-f200.google.com [209.85.222.200]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-362-zrXtPKR1N4KhJBhxvH0Wqw-1; Tue, 12 Jul 2022 07:49:13 -0400 X-MC-Unique: zrXtPKR1N4KhJBhxvH0Wqw-1 Received: by mail-qk1-f200.google.com with SMTP id bj31-20020a05620a191f00b006b5a69786fcso813610qkb.15 for ; Tue, 12 Jul 2022 04:49:13 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:user-agent:mime-version:content-transfer-encoding; bh=MhycE2vEwnb9k/UxKYsjDnSNw/br2B5mjJJO+OCBKJk=; b=P5dn1IBytmmg10WY/BUfhNOA86diuXiuBIedcGKSZwEyLnrXfgI44H285S0h9dsgk7 ec1JU0kvt9VTQPL7FAQGRiAtpn/YAzBH6tJ5fb1+fnVrSS5IGPBz+IoVJkSIxD2JCe0I ljDcvsSrYTFZuaSEoGQad6fdlGrfh6dJcs55jpAbgZQ2WMLfOJ+htO4KraXrgfW09NRm CDyG82uRw5EzmYWUbRXKxdXx+DJl2INVh88ImbP75DJDa6n+70SgB0BZL8rXhrRIKXfA eiWfSsmxWBcDIvVS/aeADKGNphiCO/XD5ptSrCIyLCRIHCC/48T8jLj0zag1rs2iMgLX 7A3w== X-Gm-Message-State: AJIora+FhNuVTOFO5+k1omwL5JUlote2TV8/nc9OMh9F0pW6Y7ljUo8W wZLff1LHSJY+J9gVDBIbloarLU3Ap0JZQQ40Ssm6D5gtl+NLg0nCMlfWy+7daarkRdLLFcDPuTn b0NRQkdrTCuZWxM3DViWX7ml+ X-Received: by 2002:a05:622a:1a1b:b0:31e:b7c8:b6cb with SMTP id f27-20020a05622a1a1b00b0031eb7c8b6cbmr5750537qtb.175.1657626552900; Tue, 12 Jul 2022 04:49:12 -0700 (PDT) X-Received: by 2002:a05:622a:1a1b:b0:31e:b7c8:b6cb with SMTP id f27-20020a05622a1a1b00b0031eb7c8b6cbmr5750518qtb.175.1657626552708; Tue, 12 Jul 2022 04:49:12 -0700 (PDT) Received: from [10.35.4.238] (bzq-82-81-161-50.red.bezeqint.net. [82.81.161.50]) by smtp.gmail.com with ESMTPSA id m6-20020a05620a290600b006a758ce2ae1sm9729262qkp.104.2022.07.12.04.49.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Jul 2022 04:49:12 -0700 (PDT) Message-ID: <6a92c7b3ab9932ebfb459841021f2cc1de03b5e1.camel@redhat.com> Subject: Re: [PATCH v3 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags From: Maxim Levitsky To: Vitaly Kuznetsov , kvm@vger.kernel.org, Paolo Bonzini , Sean Christopherson Cc: Anirudh Rayabharam , Wanpeng Li , Jim Mattson , linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 12 Jul 2022 14:49:08 +0300 In-Reply-To: <20220708144223.610080-2-vkuznets@redhat.com> References: <20220708144223.610080-1-vkuznets@redhat.com> <20220708144223.610080-2-vkuznets@redhat.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.40.4 (3.40.4-5.fc34) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2022-07-08 at 16:41 +0200, Vitaly Kuznetsov wrote: > For some features, Hyper-V spec defines two separate CPUID bits: one > listing whether the feature is supported or not and another one showing > whether guest partition was granted access to the feature ("partition > privilege mask"). 'Debug MSRs available' is one of such features. Add > the missing 'access' bit. > > Fixes: f97f5a56f597 ("x86/kvm/hyper-v: Add support for synthetic debugger interface") > Signed-off-by: Vitaly Kuznetsov > --- > arch/x86/kvm/hyperv.c | 1 + > include/asm-generic/hyperv-tlfs.h | 2 ++ > 2 files changed, 3 insertions(+) > > diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c > index e2e95a6fccfd..e08189211d9a 100644 > --- a/arch/x86/kvm/hyperv.c > +++ b/arch/x86/kvm/hyperv.c > @@ -2496,6 +2496,7 @@ int kvm_get_hv_cpuid(struct kvm_vcpu *vcpu, struct kvm_cpuid2 *cpuid, > ent->eax |= HV_MSR_RESET_AVAILABLE; > ent->eax |= HV_MSR_REFERENCE_TSC_AVAILABLE; > ent->eax |= HV_ACCESS_FREQUENCY_MSRS; > + ent->eax |= HV_ACCESS_DEBUG_MSRS; > ent->eax |= HV_ACCESS_REENLIGHTENMENT; > > ent->ebx |= HV_POST_MESSAGES; > diff --git a/include/asm-generic/hyperv-tlfs.h b/include/asm-generic/hyperv-tlfs.h > index fdce7a4cfc6f..1d99dd296a76 100644 > --- a/include/asm-generic/hyperv-tlfs.h > +++ b/include/asm-generic/hyperv-tlfs.h > @@ -70,6 +70,8 @@ > #define HV_MSR_GUEST_IDLE_AVAILABLE BIT(10) > /* Partition local APIC and TSC frequency registers available */ > #define HV_ACCESS_FREQUENCY_MSRS BIT(11) > +/* Debug MSRs available */ > +#define HV_ACCESS_DEBUG_MSRS BIT(12) > /* AccessReenlightenmentControls privilege */ > #define HV_ACCESS_REENLIGHTENMENT BIT(13) > /* AccessTscInvariantControls privilege */ I guess you mean HV_FEATURE_DEBUG_MSRS_AVAILABLE and the new HV_ACCESS_DEBUG_MSRS I checked the spec and the bits match, so I guess: Reviewed-by: Maxim Levitsky Best regards, Maxim Levitsky