Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp409075rwi; Thu, 27 Oct 2022 03:02:07 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4EgJiHCXkzgxjE5iFtJZbIHf1gbMXfqXOKuq3v8bR+cK72onRiFW96gGzcEF5I8qT6+ShC X-Received: by 2002:a17:907:3e11:b0:78d:9918:217f with SMTP id hp17-20020a1709073e1100b0078d9918217fmr40175367ejc.742.1666864926816; Thu, 27 Oct 2022 03:02:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666864926; cv=none; d=google.com; s=arc-20160816; b=iENy5Z/0NkVPbYoIiqtEpd+ApP8Yu7g7IcJPqzEGAmLuD6VRkQmWws+0pCZ6PcGWhf 5zEsvk93QhTnPRe2tuGdtuteaMFBsX0HiNBWUVZJE7LHDreexnEEuCZn8kwHqEa2I5ky 5+8CPgf2lPxNXQYguBsEXZj/jkxP2qF3ZEf7a0GU0ZL4yiN6BBUZHpGqoGbi+GOtKFkd mrU/ubY331uW6p6uTBiJlZQJjlZIJsAXkQ5b/3NtbHsZqu4K9SkJFm1/M1cbBSQ816+o qt5+b2cYqHTye93QwX99Vl9zH0ESrVMuDuDXGyO4EdoWq6r4aXnmzzRqwm9s/yU+9NSM lR1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=jZZ6qM4jUHM2tL93sOCGMRdtlaB9Zvma95PgYX3k+/8=; b=xMfQPtALEM2IjkaGeGLc9g2i7mRcAPVhIVRTaxWwuOsM6eKxenTPzG/TEqn7G8xqwf kmFX6hvaO9GCzGTBH7bx1VsIZmQEghDCyo/1mYtNcobRt5RAikXDWL7WkvaKssGD2T1Q qNm5PbcqsIVnik/Wfp8dKJPu958oGJK2Qlw+TyPrrzB9b8F94BdN16iHNNQDS03/CMOi WznJdIJWlrLXXBKDps2BvwcXipfDcvgFRyq7/HmFUy0NtysTuicGr0ZFiP6mO0isE5LH 9aM3ScjIV4AaK8/6sAvl8l7w29UC3vS1OavjuscPJj1TInzspgKuZ5UYLtJ54waUkcmU HzaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Or5dRUFb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b11-20020a056402084b00b0045938ab7129si1452173edz.330.2022.10.27.03.01.36; Thu, 27 Oct 2022 03:02:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Or5dRUFb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234921AbiJ0J7M (ORCPT + 99 others); Thu, 27 Oct 2022 05:59:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39396 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234610AbiJ0J6U (ORCPT ); Thu, 27 Oct 2022 05:58:20 -0400 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B6426186DE; Thu, 27 Oct 2022 02:58:08 -0700 (PDT) Received: from anrayabh-desk.corp.microsoft.com (unknown [167.220.238.193]) by linux.microsoft.com (Postfix) with ESMTPSA id A92F3210DC4A; Thu, 27 Oct 2022 02:58:03 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com A92F3210DC4A DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1666864688; bh=jZZ6qM4jUHM2tL93sOCGMRdtlaB9Zvma95PgYX3k+/8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Or5dRUFbmQppKY2ubGZ3DaOOE7D2DWgjIkzD9tFR4HwPXfrK/ZNOV8XfCzbPksEzj WhHFyxyqHJbnrhPRze4TbVrIgwbosQbfJ7iVnN1tpQjGz3XO1xEBG9zkOgfzVZQOPl qUgjCvi+xZ6UfCrxrAc+vDgUI3KNcH630oQFXYqU= From: Anirudh Rayabharam To: kys@microsoft.com, haiyangz@microsoft.com, sthemmin@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, daniel.lezcano@linaro.org, Arnd Bergmann , linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org Cc: stanislav.kinsburskiy@gmail.com, Anirudh Rayabharam , kumarpraveen@linux.microsoft.com, mail@anirudhrb.com Subject: [PATCH v2 2/2] x86/hyperv: fix invalid writes to MSRs during root partition kexec Date: Thu, 27 Oct 2022 15:27:29 +0530 Message-Id: <20221027095729.1676394-3-anrayabh@linux.microsoft.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20221027095729.1676394-1-anrayabh@linux.microsoft.com> References: <20221027095729.1676394-1-anrayabh@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-19.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_PASS,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org hv_cleanup resets the hypercall page by setting the MSR to 0. However, the root partition is not allowed to write to the GPA bits of the MSR. Instead, it uses the hypercall page provided by the MSR. Similar is the case with the reference TSC MSR. Clear only the enable bit instead of zeroing the entire MSR to make the code valid for root partition too. Signed-off-by: Anirudh Rayabharam --- arch/x86/hyperv/hv_init.c | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c index 29774126e931..80fdfff9266c 100644 --- a/arch/x86/hyperv/hv_init.c +++ b/arch/x86/hyperv/hv_init.c @@ -537,6 +537,7 @@ void __init hyperv_init(void) void hyperv_cleanup(void) { union hv_x64_msr_hypercall_contents hypercall_msr; + union hv_reference_tsc_msr tsc_msr; unregister_syscore_ops(&hv_syscore_ops); @@ -552,12 +553,14 @@ void hyperv_cleanup(void) hv_hypercall_pg = NULL; /* Reset the hypercall page */ - hypercall_msr.as_uint64 = 0; - wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64); + hypercall_msr.as_uint64 = hv_get_register(HV_X64_MSR_HYPERCALL); + hypercall_msr.enable = 0; + hv_set_register(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64); /* Reset the TSC page */ - hypercall_msr.as_uint64 = 0; - wrmsrl(HV_X64_MSR_REFERENCE_TSC, hypercall_msr.as_uint64); + tsc_msr.as_uint64 = hv_get_register(HV_X64_MSR_REFERENCE_TSC); + tsc_msr.enable = 0; + hv_set_register(HV_X64_MSR_REFERENCE_TSC, tsc_msr.as_uint64); } void hyperv_report_panic(struct pt_regs *regs, long err, bool in_die) -- 2.34.1