Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1381864rwb; Fri, 18 Nov 2022 17:58:47 -0800 (PST) X-Google-Smtp-Source: AA0mqf6rp+DtFp+zlNXhISnjxzISodA4ZPxkmJ9acAnyEfdvT0/7eoyHXumnwZX1AxdxkafScXxt X-Received: by 2002:a62:2702:0:b0:572:8766:598b with SMTP id n2-20020a622702000000b005728766598bmr10478381pfn.21.1668823127500; Fri, 18 Nov 2022 17:58:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668823127; cv=none; d=google.com; s=arc-20160816; b=OxqCOvWVTKoc+r9+pinQ+oeJ+i+Z5lDFkUGjOtoL7OuyezMehNGwsdOrbuuF2zgD1S 2/w4LtSW1FN7nskxFvtz5wuAJKvRTaciLWzGbOcO7F4yBDk4fs4g98LoU8FUEabY/8EH XB+cByr6wNh6TWYJgtLhMPbg2YTlXjbQELhcq1qqUPXfMAwqx9qzp4XTqG0NBQwibg86 m532ndNn4l1wK7+ffakod0M7A74yGqqcPQ15B/vG46wI+ExRk78ra1IHTmpGv2B+V5Gq jRAydDzvJIS1D+I88xvZ+mWZHPN/sZlzEUuJdOFnY5/qOPKVysdZhVGlcEO7oMvLma9s ibvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-filter; bh=tpBioxUJdr+zIDBZjxvEcm/NSQO7L5i+paa1kbCpVYQ=; b=TTACbrI/FvvdUpFgJEyhbPVSgGrAfb3bz+ljERE6EieKcu/oEIFwAKtzb7pTbzjoXi EEADVA6pCq+L3zhp+rhCi0ZirwrEcNZLwwsbNk3KitHh747licOwD/qkcnYzJ9ukOQSJ KqNfNbQTK8IuWE6FuaPuWjzC62jtbt9tqOZxDB8bJekFCl7VYU78Vsfv6kLExyPRfwHV 7Gpif0kfDGUTm9mTbCH/GMvmNky/P0GT+AkAbYM4Fqp6sURnPsOMj6DvSv54JT9MGPkQ ErtHY6mV08MCxao3tJb0uoSkSQgOeg/79eWB1EJLsQSq6t4jGXB1PRGzvGbqfodze9hI sIxw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=N8EpbWcF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s11-20020a65584b000000b004609faa2dbesi5183727pgr.285.2022.11.18.17.58.34; Fri, 18 Nov 2022 17:58:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=N8EpbWcF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232062AbiKSByf (ORCPT + 90 others); Fri, 18 Nov 2022 20:54:35 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50434 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234266AbiKSBxK (ORCPT ); Fri, 18 Nov 2022 20:53:10 -0500 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A451EC6D02; Fri, 18 Nov 2022 17:39:49 -0800 (PST) Received: from [192.168.0.5] (71-212-113-106.tukw.qwest.net [71.212.113.106]) by linux.microsoft.com (Postfix) with ESMTPSA id 15C3A20B83C2; Fri, 18 Nov 2022 17:39:49 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 15C3A20B83C2 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1668821989; bh=tpBioxUJdr+zIDBZjxvEcm/NSQO7L5i+paa1kbCpVYQ=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=N8EpbWcF0GynpIQSHEuzgFQ9Pw6NxTBgt4hE0R7HgaqUr03Kx9vVwdfFZb57P/X7w tr8doQjtb+dlpK8E4td6w2nRCCkkCrET0HB9w1EU/Wd6czfZMbxM6WTZ/CEVhsHOTB DqKgP4XZ1weqzfNkiaxXxj5OT4RS3KkZC36tooOk= Message-ID: Date: Fri, 18 Nov 2022 17:39:48 -0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.4.2 Subject: Re: [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition Content-Language: en-US To: Jinank Jain , jinankjain@microsoft.com Cc: kys@microsoft.com, haiyangz@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, arnd@arndb.de, peterz@infradead.org, jpoimboe@kernel.org, seanjc@google.com, kirill.shutemov@linux.intel.com, ak@linux.intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, anrayabh@linux.microsoft.com, mikelley@microsoft.com References: <11dda2c697781c5d12bbffd11052e6d6bb2ca705.1668618583.git.jinankjain@linux.microsoft.com> From: Nuno Das Neves In-Reply-To: <11dda2c697781c5d12bbffd11052e6d6bb2ca705.1668618583.git.jinankjain@linux.microsoft.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-19.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_PASS,USER_IN_DEF_DKIM_WL, USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/16/2022 7:27 PM, Jinank Jain wrote: > Child partitions are free to allocate SynIC message and event page but in > case of root partition it must use the pages allocated by Microsoft > Hypervisor (MSHV). Base address for these pages can be found using > synthetic MSRs exposed by MSHV. There is a slight difference in those MSRs > for nested vs non-nested root partition. > > Signed-off-by: Jinank Jain > --- > arch/x86/include/asm/hyperv-tlfs.h | 11 +++++++ > arch/x86/include/asm/mshyperv.h | 26 ++-------------- > arch/x86/kernel/cpu/mshyperv.c | 49 ++++++++++++++++++++++++++++++ > drivers/hv/hv.c | 18 ++++++++--- > 4 files changed, 75 insertions(+), 29 deletions(-) > > diff --git a/arch/x86/include/asm/hyperv-tlfs.h b/arch/x86/include/asm/hyperv-tlfs.h > index 58c03d18c235..b5019becb618 100644 > --- a/arch/x86/include/asm/hyperv-tlfs.h > +++ b/arch/x86/include/asm/hyperv-tlfs.h > @@ -225,6 +225,17 @@ enum hv_isolation_type { > #define HV_REGISTER_SINT14 0x4000009E > #define HV_REGISTER_SINT15 0x4000009F > > +/* > + * Define synthetic interrupt controller model specific registers for > + * nested hypervisor. > + */ > +#define HV_REGISTER_NESTED_SCONTROL 0x40001080 > +#define HV_REGISTER_NESTED_SVERSION 0x40001081 > +#define HV_REGISTER_NESTED_SIEFP 0x40001082 > +#define HV_REGISTER_NESTED_SIMP 0x40001083 > +#define HV_REGISTER_NESTED_EOM 0x40001084 > +#define HV_REGISTER_NESTED_SINT0 0x40001090 > + > /* > * Synthetic Timer MSRs. Four timers per vcpu. > */ > diff --git a/arch/x86/include/asm/mshyperv.h b/arch/x86/include/asm/mshyperv.h > index 61f0c206bff0..326d699b30d5 100644 > --- a/arch/x86/include/asm/mshyperv.h > +++ b/arch/x86/include/asm/mshyperv.h > @@ -198,30 +198,8 @@ static inline bool hv_is_synic_reg(unsigned int reg) > return false; > } > > -static inline u64 hv_get_register(unsigned int reg) > -{ > - u64 value; > - > - if (hv_is_synic_reg(reg) && hv_isolation_type_snp()) > - hv_ghcb_msr_read(reg, &value); > - else > - rdmsrl(reg, value); > - return value; > -} > - > -static inline void hv_set_register(unsigned int reg, u64 value) > -{ > - if (hv_is_synic_reg(reg) && hv_isolation_type_snp()) { > - hv_ghcb_msr_write(reg, value); > - > - /* Write proxy bit via wrmsl instruction */ > - if (reg >= HV_REGISTER_SINT0 && > - reg <= HV_REGISTER_SINT15) > - wrmsrl(reg, value | 1 << 20); > - } else { > - wrmsrl(reg, value); > - } > -} > +u64 hv_get_register(unsigned int reg); > +void hv_set_register(unsigned int reg, u64 value); > > #else /* CONFIG_HYPERV */ > static inline void hyperv_init(void) {} > diff --git a/arch/x86/kernel/cpu/mshyperv.c b/arch/x86/kernel/cpu/mshyperv.c > index 9a4204139490..3e6711a6af6b 100644 > --- a/arch/x86/kernel/cpu/mshyperv.c > +++ b/arch/x86/kernel/cpu/mshyperv.c > @@ -41,6 +41,55 @@ bool hv_root_partition; > bool hv_nested; > struct ms_hyperv_info ms_hyperv; > > +static inline unsigned int hv_get_nested_reg(unsigned int reg) > +{ > + switch (reg) { > + case HV_REGISTER_SIMP: > + return HV_REGISTER_NESTED_SIMP; > + case HV_REGISTER_NESTED_SIEFP: > + return HV_REGISTER_SIEFP; > + case HV_REGISTER_SCONTROL: > + return HV_REGISTER_NESTED_SCONTROL; > + case HV_REGISTER_SINT0: > + return HV_REGISTER_NESTED_SINT0; > + case HV_REGISTER_EOM: > + return HV_REGISTER_NESTED_EOM; > + default: > + return reg; > + } > +} > + > +inline u64 hv_get_register(unsigned int reg) > +{ > + u64 value; > + > + if (hv_nested) > + reg = hv_get_nested_reg(reg); > + > + if (hv_is_synic_reg(reg) && hv_isolation_type_snp()) > + hv_ghcb_msr_read(reg, &value); > + else > + rdmsrl(reg, value); > + return value; > +} > + > +inline void hv_set_register(unsigned int reg, u64 value) > +{ > + if (hv_nested) > + reg = hv_get_nested_reg(reg); > + > + if (hv_is_synic_reg(reg) && hv_isolation_type_snp()) { > + hv_ghcb_msr_write(reg, value); > + > + /* Write proxy bit via wrmsl instruction */ > + if (reg >= HV_REGISTER_SINT0 && > + reg <= HV_REGISTER_SINT15) > + wrmsrl(reg, value | 1 << 20); > + } else { > + wrmsrl(reg, value); > + } > +} This approach has a problem, in that it removes the interface for getting and setting the non-nested SIMP etc... We will need to use the non-nested SIMP for getting intercepts in the root partition from the L1 hypervisor. Nuno