Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp3661686rdh; Mon, 27 Nov 2023 23:26:22 -0800 (PST) X-Google-Smtp-Source: AGHT+IFU0Mvr7Ej5nTdpAt7KoK47TrwX737ok11XkjFWnVqYyY8daPJs8Hkm90/YGuZOhh1HYR5g X-Received: by 2002:a05:6808:19a5:b0:3b8:5dd0:8ea with SMTP id bj37-20020a05680819a500b003b85dd008eamr13303647oib.9.1701156382583; Mon, 27 Nov 2023 23:26:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701156382; cv=none; d=google.com; s=arc-20160816; b=g4zobWFVqPxRFR6mTLLpWq6MkG6kUSoNw6RTRtpPp4cD7MEZIGV1OR0ZxuREhSFwT/ D8jsuKjI0xdJnbv6lxlrMheaA0Ov8Ucl2NS/1cYX9sN+22ukmQba6Sbl0O1OjZ6T1cpX KKtZhS3M9dgF16osgO/6nCjkqfXqc+5WgDDasfQ4GEncU4HaIL4pukdcjijxpa8rUHtZ l4qtUP5lMh8KafunSVGQkAt37rJWxaCkKPy/aUsh3+HW6bPaL/+Wgsy27QMLRTIkMFPQ pTYSIbuomArtZUU8SWlqCVsFYztYCaPyoInd/W7qFAg3Sz9lY2JbqWUI+Tudi+L39/R8 3w2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=C5IfKQ0g84TQ0CBoWOqqFsM6EdM4fH6opAzeKUDu0Ps=; fh=0JE/s9melwQrHIwHj7I58Itp5rDesgOPWrDm6iWtl/s=; b=YYQAFtcbOUCiGAKTHhzy0OnF6vZ1cFu0ZV1kkpPEDTAt2Eg/TEH/dUkxt15h8wW3vw o9F6Qpcz3kqjQmzsohcACFkLi72yvqMkRHeoCYedDoIJwEgID/eInXtqecIGrJbsmjjR BSukeAnLiMT6gTE1JdcLUiNaKPxpTEsPFQLEwIWyKtNQDn3ZcWXPMj0LcpLrkJ4ej8tj 4aLOocD3esCntROvUXmlGkfjq/Ch7q9gG94DSnsfhotJKFZovOYndh3Pfx2VcSCglhUK puBTXQcOCl5Bnp3WxU2HIeXLda843gO6cgyL22ewfRaX/mlPypIsvKF92gOj56kt7Mt+ iTYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=FWOV07Ju; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id j12-20020a056a00174c00b0069014d63f21si3497741pfc.148.2023.11.27.23.26.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Nov 2023 23:26:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=FWOV07Ju; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 8842D80658C2; Mon, 27 Nov 2023 23:26:21 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343840AbjK1H0M (ORCPT + 99 others); Tue, 28 Nov 2023 02:26:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52436 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234643AbjK1H0D (ORCPT ); Tue, 28 Nov 2023 02:26:03 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8DE37D45 for ; Mon, 27 Nov 2023 23:26:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1701156368; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=C5IfKQ0g84TQ0CBoWOqqFsM6EdM4fH6opAzeKUDu0Ps=; b=FWOV07JuCOAKwrMiEhXvEtZWEtdas78DC5YKWX+tWkt56o36na6Zqn9n600kvPvLPZ9CNL kVt63Yp++8HGoZjQkEhSAwUHvjXBGr/j33EtGfe08WcA+IrQaGkD6eUjvKNH2+rW2xOcCX 0uIFmxRn8S+D5i7fEYPDo49RoDwLcXw= Received: from mail-wr1-f71.google.com (mail-wr1-f71.google.com [209.85.221.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-324-FI3WizTRMw2095VuWuqw0g-1; Tue, 28 Nov 2023 02:26:06 -0500 X-MC-Unique: FI3WizTRMw2095VuWuqw0g-1 Received: by mail-wr1-f71.google.com with SMTP id ffacd0b85a97d-332ed7c0955so2919816f8f.2 for ; Mon, 27 Nov 2023 23:26:06 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701156366; x=1701761166; h=content-transfer-encoding:mime-version:user-agent:references :in-reply-to:date:cc:to:from:subject:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=C5IfKQ0g84TQ0CBoWOqqFsM6EdM4fH6opAzeKUDu0Ps=; b=Z8HGbdKtuXekdObz+Vn5VQrFhhbD20umqHQuLt/A2nyaO1AOcy8iBHUGokVR5Q4tZ0 xdZ6fmBNoHWpwxjjEe58JeOCcTKE1zZnM/+vVBhRD1oKhqiZlUdNYstSAHjf1Uah/VPe uyJjfHRFNhbOt1czHEjnJ3i/85dOSzRTyOAngwCSevhi0jnAbBvKsnUDQL6RBmTgvTve Y9VQIx0Wm0m3VG8Amb3kAqzQigUSGdu/ooZR62Jq/0yQ+5KRzKUqm7fZiXrFt/FTAb/O rXiyyHVRAPQcbZLMM7Zfrm3yhD1VZaRTdTDsAuL11J184WqsxtpknVXU0S4Hay5U5ChY WjUg== X-Gm-Message-State: AOJu0Yyl/rpygTdr2RspfNo6DCl2W7J77r1HY51oTRLbupIRJybXXJeN M5thY7HDM6aWiImaM3pzR53bfvNnU5hZ4mHSth4L719jQL03BpNQJqgSdWcZu+NgsoY1aezIWkt zsQwGNTutUL+AJ5KM/3xNr3wH X-Received: by 2002:a05:6000:181b:b0:332:ca1e:679f with SMTP id m27-20020a056000181b00b00332ca1e679fmr9682388wrh.52.1701156365793; Mon, 27 Nov 2023 23:26:05 -0800 (PST) X-Received: by 2002:a05:6000:181b:b0:332:ca1e:679f with SMTP id m27-20020a056000181b00b00332ca1e679fmr9682371wrh.52.1701156365500; Mon, 27 Nov 2023 23:26:05 -0800 (PST) Received: from starship ([77.137.131.4]) by smtp.gmail.com with ESMTPSA id k24-20020a5d5258000000b00332d04514b9sm13962130wrc.95.2023.11.27.23.26.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Nov 2023 23:26:05 -0800 (PST) Message-ID: Subject: Re: [RFC 10/33] KVM: x86: hyper-v: Introduce KVM_HV_GET_VSM_STATE From: Maxim Levitsky To: Nicolas Saenz Julienne , kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org, linux-hyperv@vger.kernel.org, pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, anelkz@amazon.com, graf@amazon.com, dwmw@amazon.co.uk, jgowans@amazon.com, corbert@lwn.net, kys@microsoft.com, haiyangz@microsoft.com, decui@microsoft.com, x86@kernel.org, linux-doc@vger.kernel.org Date: Tue, 28 Nov 2023 09:26:03 +0200 In-Reply-To: <20231108111806.92604-11-nsaenz@amazon.com> References: <20231108111806.92604-1-nsaenz@amazon.com> <20231108111806.92604-11-nsaenz@amazon.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Mon, 27 Nov 2023 23:26:21 -0800 (PST) On Wed, 2023-11-08 at 11:17 +0000, Nicolas Saenz Julienne wrote: > HVCALL_GET_VP_REGISTERS exposes the VTL call hypercall page entry > offsets to the guest. This hypercall is implemented in user-space while > the hypercall page patching happens in-kernel. So expose it as part of > the partition wide VSM state. > > NOTE: Alternatively there is the option of sharing this information > through a VTL KVM device attribute (the device is introduced in > subsequent patches). > > Signed-off-by: Nicolas Saenz Julienne > --- > arch/x86/include/uapi/asm/kvm.h | 5 +++++ > arch/x86/kvm/hyperv.c | 8 ++++++++ > arch/x86/kvm/hyperv.h | 2 ++ > arch/x86/kvm/x86.c | 18 ++++++++++++++++++ > include/uapi/linux/kvm.h | 4 ++++ > 5 files changed, 37 insertions(+) > > diff --git a/arch/x86/include/uapi/asm/kvm.h b/arch/x86/include/uapi/asm/kvm.h > index f73d137784d7..370483d5d5fd 100644 > --- a/arch/x86/include/uapi/asm/kvm.h > +++ b/arch/x86/include/uapi/asm/kvm.h > @@ -570,4 +570,9 @@ struct kvm_apic_id_groups { > __u8 n_bits; /* nr of bits used to represent group in the APIC ID */ > }; > > +/* for KVM_HV_GET_VSM_STATE */ > +struct kvm_hv_vsm_state { > + __u64 vsm_code_page_offsets; > +}; > + > #endif /* _ASM_X86_KVM_H */ > diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c > index 2cf430f6ddd8..caaa859932c5 100644 > --- a/arch/x86/kvm/hyperv.c > +++ b/arch/x86/kvm/hyperv.c > @@ -2990,3 +2990,11 @@ int kvm_get_hv_cpuid(struct kvm_vcpu *vcpu, struct kvm_cpuid2 *cpuid, > > return 0; > } > + > +int kvm_vm_ioctl_get_hv_vsm_state(struct kvm *kvm, struct kvm_hv_vsm_state *state) > +{ > + struct kvm_hv* hv = &kvm->arch.hyperv; > + > + state->vsm_code_page_offsets = hv->vsm_code_page_offsets.as_u64; > + return 0; > +} > diff --git a/arch/x86/kvm/hyperv.h b/arch/x86/kvm/hyperv.h > index 5433107e7cc8..b3d1113efe82 100644 > --- a/arch/x86/kvm/hyperv.h > +++ b/arch/x86/kvm/hyperv.h > @@ -261,4 +261,6 @@ static inline bool kvm_hv_vsm_enabled(struct kvm *kvm) > return kvm->arch.hyperv.hv_enable_vsm; > } > > +int kvm_vm_ioctl_get_hv_vsm_state(struct kvm *kvm, struct kvm_hv_vsm_state *state); > + > #endif > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index b0512e433032..57f9c58e1e32 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -7132,6 +7132,24 @@ int kvm_arch_vm_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) > r = kvm_vm_ioctl_set_apic_id_groups(kvm, &groups); > break; > } > + case KVM_HV_GET_VSM_STATE: { > + struct kvm_hv_vsm_state vsm_state; > + > + r = -EINVAL; > + if (!kvm_hv_vsm_enabled(kvm)) > + goto out; > + > + r = kvm_vm_ioctl_get_hv_vsm_state(kvm, &vsm_state); > + if (r) > + goto out; > + > + r = -EFAULT; > + if (copy_to_user(argp, &vsm_state, sizeof(vsm_state))) > + goto out; > + > + r = 0; > + break; > + } > default: > r = -ENOTTY; > } > diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h > index 168b6ac6ebe5..03f5c08fd7aa 100644 > --- a/include/uapi/linux/kvm.h > +++ b/include/uapi/linux/kvm.h > @@ -2316,4 +2316,8 @@ struct kvm_create_guest_memfd { > #define KVM_GUEST_MEMFD_ALLOW_HUGEPAGE (1ULL << 0) > > #define KVM_SET_APIC_ID_GROUPS _IOW(KVMIO, 0xd7, struct kvm_apic_id_groups) > + > +/* Get/Set Hyper-V VSM state. Available with KVM_CAP_HYPERV_VSM */ > +#define KVM_HV_GET_VSM_STATE _IOR(KVMIO, 0xd5, struct kvm_hv_vsm_state) > + > #endif /* __LINUX_KVM_H */ Looks reasonable but if we do hypercall patching in userspace as I suggested, we might not need this. Best regards, Maxim Levitsky