From nobody Sun Oct 5 12:47:03 2025 Received: from mail-pl1-f172.google.com (mail-pl1-f172.google.com [209.85.214.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DF31C1AC43A; Mon, 4 Aug 2025 18:05:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.172 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754330733; cv=none; b=A5OfhuNAeP/7Ry5EFy83cFqLoweW9DX2BX4FQ6jfc3lS6RLofbYgNpbeHugzm3zA0y1YdBuLYhb5eByN7vbUAnRiLgW8BSaYGksv7uCU8+oMPdfseuElrNFesNPC5icpamnv/3oht8XRKm5cpo76UxUxJxe6N2naL8+Hio85Bt8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754330733; c=relaxed/simple; bh=6h/O09cg2ZK10uc+cU66V/UVcpCZST8xldPxxpIQ344=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=e/JlTHSRpkCj/ND4+q75RxhrMAYzAHgajjIhfGDoe9N2o47A1OKDQC/UzIRUBoUXfRwhSJV9pkk5YyYEdkzW+XS6BJO0MFvqKRGRALHlbvBQg9PfQbGmgtqJTMqnOI1Bq3NWCR0IJl7JR/Sz1Vmbv0FUhQQIn1wDtWeTRGtExa0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=YxcUu/uh; arc=none smtp.client-ip=209.85.214.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="YxcUu/uh" Received: by mail-pl1-f172.google.com with SMTP id d9443c01a7336-23fd3fe0d81so43311395ad.3; Mon, 04 Aug 2025 11:05:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1754330731; x=1754935531; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=diFyvyzFwUlfwRkaCIl9yb8fUI7T6mrGkXOX6Pchcec=; b=YxcUu/uhXKWItkosLpHB0iIqpBj5JsPZQ86+AQILwujiiYrmVfGuOlCP5frdW7gO6v gHIl6+1j3tYoU01cMAwrjZss6ICE0nNR51ZeI1OWdrPRCU4z/064IYhVjgg8bDJL4JAO mmygKRFZg3l50EtsdS1ZuK9R657yRGO/vUg392V7QhJhWHs+aNeEJku875d4F8WTQWNV wDWzvE4mRe6gxs5FEdd7qH9lybLV0CZMfDPCAFdSBgwHvJL2II4zwxryfeMBWgVFbvEf Emd31x6fqiXd+KNGFlS1A686DSCU7pq6aYGspjFOfU3F+HUCoAxd7KpgTmUeqN+klx9+ ruOg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1754330731; x=1754935531; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=diFyvyzFwUlfwRkaCIl9yb8fUI7T6mrGkXOX6Pchcec=; b=xVdPs5qIFpyyoYqUQpl0J83spmVURrReW1vTOlVRHm7Q+4amIKrzXAZ3EAbvk9SXnV JAE0lDnK5W3zqQZQVhEH4XZZZERobBtvgsjhPNkqzFvLft1JUujFXx4N+E62S/gCBa3Y wEAyH8rCr84wRGPtnKvxwqm1F8g+2YN9C5GwJVJgLnhm9UBOmcYhRLtKx74+ygickEoH 7odEUSJHn6j9CbfbMvYnX5xbDpAuZplIx8IA8AayLajl7BdDHZwzvxVkgLeST1TmlCco taqH5dhZv4xmvlDjm8+wkHF9OlGW7WZngOCLWY8g3c4/Ya42VFc7/G6vCsvBdJIuWIZZ +Dow== X-Forwarded-Encrypted: i=1; AJvYcCVo+PcDDP4wze1yW6qnawp8RHDsUyfe03Y9BwJPV913vxjAEf35lv/Jf2efkmwkvbW+yoA009/YhqVBu/eF@vger.kernel.org, AJvYcCWKDDPBl2ha3i6dM0SIPOJlAaBDfx8hXQ9V1PWNSejUlhSTXd/ykrREBhLJlfkXyXnMXeFCK7y7u97l@vger.kernel.org, AJvYcCX7deD1d0AS/MlFJI5yI3u9kn8M+9tvQ5ADnu9S7CdL6fGJRsHRURw4qUUJ9CJncqRQ1QTJL2IIPliZBT5b@vger.kernel.org X-Gm-Message-State: AOJu0Yy78Ri502EAyUPYy2r1SGKH1WNodvbmLfNAdNpg9/yRsod9eBWx f4SL1bBXX0ibNWRjg8OfHk6R4YvOZXgA5ICLJ67yAF7DIYtb8Swk5BQiT/5LSg== X-Gm-Gg: ASbGncsBk/l2GRrhp3WvIxViColA4K32sNJt7/TqlFB79q9qi/pbS175+IgcaMee8nu s5FTAU4QxF9GQwKrN9ngbXfqn0o/CbR6AKc2YQ+fpO6jW1KyC9aBFH18jfklSgoOyAJ2880TGzN df3ebAQ8bHbvSDd7txpomtFWKwU9pW/C6w1Fihm5YagaEoCf3UdUmK2wGmmM639fvKskY2Ykoyn aLdhzRs2cTLKVR//HdtezIwrOVfxZE+NGfyE4Ggnmoar+WpcRg8FSCxmt3PEpjXP+Y+7uk5poCh hbuk+ZQBdASPwNlYR0qGZu5oWL+umtk7fYkyTAlsnAhXTL5/FIIf7MPr00wHhbXumB4Q5NOwKbv GZOKEwGTTONJu4x1WVAIz+/DmmE4LI3OSv25eLKXVn+z8t+QqCxOHeAgOaQlgUZI= X-Google-Smtp-Source: AGHT+IE7mHgAv0lcc0hWBFYThROiodeuo5QTQxbXshLlUBr+SbFWiKqcdbpU88AENOgaqd2elstJDQ== X-Received: by 2002:a17:902:db10:b0:234:df51:d16c with SMTP id d9443c01a7336-24247047121mr169092885ad.45.1754330731141; Mon, 04 Aug 2025 11:05:31 -0700 (PDT) Received: from ubuntu-Virtual-Machine.corp.microsoft.com ([2001:4898:80e8:6f:2b47:96b8:6281:35ea]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-241e8aafb34sm114144825ad.173.2025.08.04.11.05.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Aug 2025 11:05:30 -0700 (PDT) From: Tianyu Lan To: kys@microsoft.com, haiyangz@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, arnd@arndb.de, Neeraj.Upadhyay@amd.com, kvijayab@amd.com Cc: Tianyu Lan , linux-arch@vger.kernel.org, linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, Michael Kelley Subject: [RFC PATCH V5 1/4] x86/hyperv: Don't use hv apic driver when Secure AVIC is available Date: Mon, 4 Aug 2025 14:05:22 -0400 Message-Id: <20250804180525.32658-2-ltykernel@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250804180525.32658-1-ltykernel@gmail.com> References: <20250804180525.32658-1-ltykernel@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Tianyu Lan When Secure AVIC is available, the AMD x2apic Secure AVIC driver will be selected. In that case, have hv_apic_init() return immediately without doing anything. Reviewed-by: Michael Kelley Signed-off-by: Tianyu Lan Reviewed-by: Neeraj Upadhyay --- Change since RFC V3: - Update Change log and fix coding style issue. --- arch/x86/hyperv/hv_apic.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/x86/hyperv/hv_apic.c b/arch/x86/hyperv/hv_apic.c index bfde0a3498b9..e669053b637d 100644 --- a/arch/x86/hyperv/hv_apic.c +++ b/arch/x86/hyperv/hv_apic.c @@ -293,6 +293,9 @@ static void hv_send_ipi_self(int vector) =20 void __init hv_apic_init(void) { + if (cc_platform_has(CC_ATTR_SNP_SECURE_AVIC)) + return; + if (ms_hyperv.hints & HV_X64_CLUSTER_IPI_RECOMMENDED) { pr_info("Hyper-V: Using IPI hypercalls\n"); /* --=20 2.25.1 From nobody Sun Oct 5 12:47:03 2025 Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E9D05258CD3; Mon, 4 Aug 2025 18:05:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.171 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754330734; cv=none; b=ovo0kVRMiIX/DDhdUxZEs+FAsKU3AgLgOq+6+8vNKCnMMCxvSsDhWTR92T78CfnnubNz4WBUH+deH7WC5mhtYeWG2aYBwwlIggSsg5AAMA6++guE3ip6/nTle97C7U7wBPL4sZytUoooH4WcZwt0Gw2bl2Rmjs8PEFa6DY9NYFM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754330734; c=relaxed/simple; bh=OwnTw3uK7yB5c51Tl0CAUBqfi3DK/t76c6S4ZAo74ds=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=ArN8AJHBX17xT1b2Cw7M0vG19lM+wJmzJNuxKbIikKHdYa17+XQAPD4pOhzl04ry1gZQC3x4AAisel/osmN+WyIMqbbmOdTicsrKtIjYecJO3iIgNPnQnR+tNgVN2EwqVfwEl621PfqtwiCkA4V5PbCzcj9vrVsPbRDOdJaTPdU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=A+Subz+W; arc=none smtp.client-ip=209.85.214.171 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="A+Subz+W" Received: by mail-pl1-f171.google.com with SMTP id d9443c01a7336-2403c13cac3so43859735ad.0; Mon, 04 Aug 2025 11:05:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1754330732; x=1754935532; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=z5un/sQQC+zCFhLU2I/r3RaEnZHYOsc9l2VjdIVN8y0=; b=A+Subz+WOp/Oc+Z/FdH8UsukZ07QuaMG8B7Ar+ZCk+4VhJIZnwFcJOKVHmZVIN2XNX GuMa9XEDhlVrgHGmcfXBDHSaKJv26AJLxABhW6DO6UaZhZTpKjUgABTziJNTrJylCPJm HylCyZLmXOthtMcJxJoWSvJo7bhz1OdcYjy5rxb2P/w5R6HeX3Wy6xffxs8GZexDm0kb o3get1FZ/U8ZY/KTXEZx1hFZ4nvkby8Pin31qDi4gREN+X/bs5keL6we7DYS/cUfZ6dW Pq81n9ue9eSEZEU+dFqeMrLbU8T50dOHwbDCtjgzMpu2zw79Hg+w/8E+QD339MZEvf/7 +3Gg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1754330732; x=1754935532; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=z5un/sQQC+zCFhLU2I/r3RaEnZHYOsc9l2VjdIVN8y0=; b=D5DLZYxkBcv/8kbVZAYwXaDX8b8fPM7uMFxz3ti7uZsdmQf4xjRreDrLoBtP1K68hY hKGpCve0oePBcGtd4GUM4GBeHKtwUap1WLf9hSWp9w/uweFy8q/M+ufc8LZ4nimKVM3y 34peV3domHFqEkTEn2Lw7A1Svl8EDNQjWznVIUQRUeziMuzeuOWosiuWWU1phRZOtFHp hJBDC+0aGAbG0oixDg9OYLH/T3KR1DnahkhlI2nRgzYercM19Lfntle1fVrvLJT7zjVk zyl0k1NEOu2aNWXSZ5MTX+V6Dd1ZyeAPTdop5vZNP27lbozAJDx+PuZ2pJYQeYi5e58L UcFQ== X-Forwarded-Encrypted: i=1; AJvYcCUlu8u4NjZxWtealOXSYSRjKBr7qBaFoe57tDyA9wma2bSbOzVhEzzjpI8NrntRS5SCdow4TDLHOz4U@vger.kernel.org, AJvYcCX2ruPKnJ5LvFiARBjPb2JpReNADQivmKziqCMO/xnJB3X9tFVRWgMg2kJcetdRPh65/sJTmb5GofHN1awO@vger.kernel.org, AJvYcCXY7OR6PjjBNayO9wjkTRM1h+9RwDq66gl+9BRz/BrEPLNIko94bPJHtfKZ94l3/m3fXqECr6Ep/KRSQ/6B@vger.kernel.org X-Gm-Message-State: AOJu0YyBx9U/5+Bp6mUsye59Byd1DJj+VOmSjbKRySt3WAL3qWzYvW99 ExWRHOFOMwmtm6QtsQjrxszArx4J+aX7V8HOPE9fuK8iSK6moLssYlLc X-Gm-Gg: ASbGncuJJM07zHqFFuHOR3TR7zKKU6WoYxEIG6ZnETA23VlDcYPJKZmX18O2FEihZVv 9Fb89qTnaK6WLj8RCHsWe9iW3nWzez625kOBlXdPcG0h1RcEmTl33MC+lj0dZgJ6qe7pm7mehSE lJXmV3QqdOM419Jz428kcQZrc/iJeIfDie8EEO4t09e+2O2hqwWajqMKBONWjDNof40vrbu0D1M irorEQxKIxAFhISed1hc/i3VaUDjexyYroY+sVSJAhSqLh478P8qt+17Uibn6z4LFhlg0/zkRPS eNjURUP0+wGE3hRX61BIoyKuq/L6PJgQT6NThPrs98MVRRCc6PuWiMXomYS6mRi4guhhMJms951 XqUUCkvIe7uduwA4FedtscXE7w5zihgK6NGTIczkme22TyFbzjxqicJ4aE00PSgM= X-Google-Smtp-Source: AGHT+IF1r4Uj2dSSbjnREKNgVY5077VXWjmnua/R/CFyFXiWymX1ZlYuodHv1wiIc2verd4QWVpt4A== X-Received: by 2002:a17:902:fc4d:b0:23f:fa47:f933 with SMTP id d9443c01a7336-24288d46831mr6787045ad.8.1754330732070; Mon, 04 Aug 2025 11:05:32 -0700 (PDT) Received: from ubuntu-Virtual-Machine.corp.microsoft.com ([2001:4898:80e8:6f:2b47:96b8:6281:35ea]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-241e8aafb34sm114144825ad.173.2025.08.04.11.05.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Aug 2025 11:05:31 -0700 (PDT) From: Tianyu Lan To: kys@microsoft.com, haiyangz@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, arnd@arndb.de, Neeraj.Upadhyay@amd.com, kvijayab@amd.com Cc: Tianyu Lan , linux-arch@vger.kernel.org, linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, Michael Kelley Subject: [RFC PATCH V5 2/4] Drivers: hv: Allow vmbus message synic interrupt injected from Hyper-V Date: Mon, 4 Aug 2025 14:05:23 -0400 Message-Id: <20250804180525.32658-3-ltykernel@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250804180525.32658-1-ltykernel@gmail.com> References: <20250804180525.32658-1-ltykernel@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Tianyu Lan When Secure AVIC is enabled, VMBus driver should call x2apic Secure AVIC interface to allow Hyper-V to inject VMBus message interrupt. Reviewed-by: Michael Kelley Signed-off-by: Tianyu Lan --- Change since RFC V4: - Change the order to call hv_enable_coco_interrupt() in the hv_synic_enable/disable_regs(). - Update commit title "Drivers/hv:" to "Drivers: hv:" Change since RFC V3: - Disable VMBus Message interrupt via hv_enable_ coco_interrupt() in the hv_synic_disable_regs(). --- arch/x86/hyperv/hv_apic.c | 5 +++++ drivers/hv/hv.c | 7 ++++++- drivers/hv/hv_common.c | 5 +++++ include/asm-generic/mshyperv.h | 1 + 4 files changed, 17 insertions(+), 1 deletion(-) diff --git a/arch/x86/hyperv/hv_apic.c b/arch/x86/hyperv/hv_apic.c index e669053b637d..a8de503def37 100644 --- a/arch/x86/hyperv/hv_apic.c +++ b/arch/x86/hyperv/hv_apic.c @@ -53,6 +53,11 @@ static void hv_apic_icr_write(u32 low, u32 id) wrmsrq(HV_X64_MSR_ICR, reg_val); } =20 +void hv_enable_coco_interrupt(unsigned int cpu, unsigned int vector, bool = set) +{ + apic_update_vector(cpu, vector, set); +} + static u32 hv_apic_read(u32 reg) { u32 reg_val, hi; diff --git a/drivers/hv/hv.c b/drivers/hv/hv.c index 308c8f279df8..2ff433cb5cc2 100644 --- a/drivers/hv/hv.c +++ b/drivers/hv/hv.c @@ -314,8 +314,11 @@ void hv_synic_enable_regs(unsigned int cpu) shared_sint.vector =3D vmbus_interrupt; shared_sint.masked =3D false; shared_sint.auto_eoi =3D hv_recommend_using_aeoi(); + hv_set_msr(HV_MSR_SINT0 + VMBUS_MESSAGE_SINT, shared_sint.as_uint64); =20 + hv_enable_coco_interrupt(cpu, vmbus_interrupt, true); + /* Enable the global synic bit */ sctrl.as_uint64 =3D hv_get_msr(HV_MSR_SCONTROL); sctrl.enable =3D 1; @@ -342,7 +345,6 @@ void hv_synic_disable_regs(unsigned int cpu) union hv_synic_scontrol sctrl; =20 shared_sint.as_uint64 =3D hv_get_msr(HV_MSR_SINT0 + VMBUS_MESSAGE_SINT); - shared_sint.masked =3D 1; =20 /* Need to correctly cleanup in the case of SMP!!! */ @@ -350,6 +352,9 @@ void hv_synic_disable_regs(unsigned int cpu) hv_set_msr(HV_MSR_SINT0 + VMBUS_MESSAGE_SINT, shared_sint.as_uint64); =20 simp.as_uint64 =3D hv_get_msr(HV_MSR_SIMP); + + hv_enable_coco_interrupt(cpu, vmbus_interrupt, false); + /* * In Isolation VM, sim and sief pages are allocated by * paravisor. These pages also will be used by kdump diff --git a/drivers/hv/hv_common.c b/drivers/hv/hv_common.c index 49898d10faff..0f024ab3d360 100644 --- a/drivers/hv/hv_common.c +++ b/drivers/hv/hv_common.c @@ -716,6 +716,11 @@ u64 __weak hv_tdx_hypercall(u64 control, u64 param1, u= 64 param2) } EXPORT_SYMBOL_GPL(hv_tdx_hypercall); =20 +void __weak hv_enable_coco_interrupt(unsigned int cpu, unsigned int vector= , bool set) +{ +} +EXPORT_SYMBOL_GPL(hv_enable_coco_interrupt); + void hv_identify_partition_type(void) { /* Assume guest role */ diff --git a/include/asm-generic/mshyperv.h b/include/asm-generic/mshyperv.h index a729b77983fa..7907c9878369 100644 --- a/include/asm-generic/mshyperv.h +++ b/include/asm-generic/mshyperv.h @@ -333,6 +333,7 @@ bool hv_is_isolation_supported(void); bool hv_isolation_type_snp(void); u64 hv_ghcb_hypercall(u64 control, void *input, void *output, u32 input_si= ze); u64 hv_tdx_hypercall(u64 control, u64 param1, u64 param2); +void hv_enable_coco_interrupt(unsigned int cpu, unsigned int vector, bool = set); void hyperv_cleanup(void); bool hv_query_ext_cap(u64 cap_query); void hv_setup_dma_ops(struct device *dev, bool coherent); --=20 2.25.1 From nobody Sun Oct 5 12:47:03 2025 Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C7B0C28AAE0; Mon, 4 Aug 2025 18:05:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.171 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754330735; cv=none; b=DXS2VvHYoz6p4O6pTUiWcyISYHDC3Vu1XVx+Pf49u9K6uoQz7hk/+h+h/ecScB2boJ53+CmdVic2NplBRiv1qBSY4Wg1aBqVnoK8FT7c8d31FCTtBbguR7Aj+JlHW+NCncM/GumI+4R3ncrd7aVjQgG/xe9hc+/BxUcd9KL1mLQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754330735; c=relaxed/simple; bh=xXVjNI9bERkha9J0Rv0R70Dz7EfNyp1kbReuTtDg3Vw=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=rQuADiJ/Z5MKfMHJJ2dTlDBIjtRKR6OPdw3S06KavrzA/h8pp3aEvHU4B1dYm2ayobd4pARewkDlHJF+mr9aBSYfCyqajrZ9ibDgTPq8vesVK3GwcX8t8XhMqg6ZgjpimnGJ8gzJWA5En334qBhpk1MYfsMCUdgldQ3yqoWlX6M= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=Eo4tgzbU; arc=none smtp.client-ip=209.85.214.171 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Eo4tgzbU" Received: by mail-pl1-f171.google.com with SMTP id d9443c01a7336-23636167afeso31019245ad.3; Mon, 04 Aug 2025 11:05:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1754330733; x=1754935533; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=8sV7Buk+s0msso3TQBY+k1lyKNaQLXX/KlAJMeu8bD0=; b=Eo4tgzbUWlS9qwdDcSGxwoivDlm37hFuW9WqF9jdXmKx2Fa4ZsgyObnY4tdpzGU5pf phDsasiijga0rcsXMB2TUOQIZuNAOsQIjClSPtYhyESJmPn7P00ChpVDukLnYJ5Ek6cP Xjg5c9RE3MqtFb5yV24cu4FEgWWU6r6a4mFy6+RKga4y3NwJNrcbBj2J5RHAqYYk4gWC GvdA+4uEBZJsj8yiKZtpw6D7J3jQFOjFo3SOK77rrhes8I9bgxWwYQYPfSvYBPc8oHqL ztaFqVBfgw4zASl35a5PWnxcKB6fwmNDFMRyUqxZcY/645ZQH3I+dIpeICE4IL2WZIsx C6Mw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1754330733; x=1754935533; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8sV7Buk+s0msso3TQBY+k1lyKNaQLXX/KlAJMeu8bD0=; b=sDxqoM5QtOJ1h/Z4h/9Tcqh1APMnvIsh2KnesHQ6WK/0eApZTL7P5GPEh4+NyeZ0/G 1HLKLCzbYT6Xsd55tDCdbtnF8qZoboGSmt6wL6Q6OSiyd3PDi9hdiakWL4T38lHK67Ft Q0GRs44rxQBxMWB0GNQHkVUvEYjshagrLVmlvrHgx1e2zfRr+mzIPmpPSyPuHi0YwGeO P8MJIOsoQNUsaZtXwnqgG4X3wMwHHhStsKSkTWS6etP4fktG4XewATAhxv1CiiGT3Twl tuznunhyC1LytkXkFVOa9jZplTWolfn1UAv9ceG/dsJ2b3KLFgFIeiL/hmdlNQBBZ5Am GIww== X-Forwarded-Encrypted: i=1; AJvYcCVEq5r16SDphQtgchWV83KhrOfPPp97vLlP4l2GdFyvcKDFsnzI0/Yn+5LmKFn41sYyFqxI/O+s7DLN@vger.kernel.org, AJvYcCVHvgUBqrFomwH0RkdPMwRETQ1oa+hShWlcfCM1WGBvXxAqvbb2weKt2sUEOOkKK5g6c85rRTr69xBl2Zta@vger.kernel.org, AJvYcCXLzV+MG6YX9RKLQ8Kde7g9pvha9GIfoyuD4lOxNRlE9EQWEAWmXAyKSw6sj+89bRNOVguwoVYbszgp7VR9@vger.kernel.org X-Gm-Message-State: AOJu0YxJTkIZPXhzi/v1fLpA7TiqizbcEQRAzr5CNAYFAuHM7YC4UWMz 9VB1BiBF9O0l8aHEoQnOU8ZjWEIxESVz40l560tN2qAdRqruTpmBqkM/ X-Gm-Gg: ASbGncty2pDrkr5BGEa8wHZUcQFA2xEuYm5GD9etMyvYA3YiRLX3xBSHb1I7o22sKjx vEQiU1O4PgBxpbbqy6LLkZH8jutSm3p995fSHN1buLoAedLxmdx3lGc4VS2ZSr+1mgFobpdCcRo utj7JOw8ysHABMbc83LgFV2DQOLzKcy8UcGGBLhmT6Yeul4hmHyEiHnkzCbHvLRHR5LnLBRpO3m rnGVzEGYEpxf7dkHcP7YLl5qX0SBpT7263RTaLLYs6WeCDHPqiDRFZBKHHELOQIeM/jQ7lmsADw /hlqqlbNDqz9OEvsMY/Sq7uFWLdeZMyyEwzuB1jfJ6fvLrMpWTwI+3f9T+Bcn33S5PUra5y6xky xuXEDpopDfedIJrzezfk/NqVM4MGx8+FRtR+78LVGQWhBA88nJCeX4KghF76XUFc= X-Google-Smtp-Source: AGHT+IHidO3JlMsUdCvn2NIDfEWvvn3rDGKLvRlIU/kIsYPJJznQJz6KzmpB4+Nff29tXdXuwVrVIg== X-Received: by 2002:a17:903:1b50:b0:240:25f3:211b with SMTP id d9443c01a7336-24247163dedmr130244045ad.51.1754330732967; Mon, 04 Aug 2025 11:05:32 -0700 (PDT) Received: from ubuntu-Virtual-Machine.corp.microsoft.com ([2001:4898:80e8:6f:2b47:96b8:6281:35ea]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-241e8aafb34sm114144825ad.173.2025.08.04.11.05.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Aug 2025 11:05:32 -0700 (PDT) From: Tianyu Lan To: kys@microsoft.com, haiyangz@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, arnd@arndb.de, Neeraj.Upadhyay@amd.com, kvijayab@amd.com Cc: Tianyu Lan , linux-arch@vger.kernel.org, linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, Michael Kelley Subject: [RFC PATCH V5 3/4] x86/hyperv: Don't use auto-eoi when Secure AVIC is available Date: Mon, 4 Aug 2025 14:05:24 -0400 Message-Id: <20250804180525.32658-4-ltykernel@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250804180525.32658-1-ltykernel@gmail.com> References: <20250804180525.32658-1-ltykernel@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Tianyu Lan Hyper-V doesn't support auto-eoi with Secure AVIC. So set the HV_DEPRECATING_AEOI_RECOMMENDED flag to force writing the EOI register after handling an interrupt. Reviewed-by: Michael Kelley Signed-off-by: Tianyu Lan --- Change since RFC V3: - Update title prefix from "x86/Hyper-V" to "x86/hyperv" --- arch/x86/kernel/cpu/mshyperv.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/kernel/cpu/mshyperv.c b/arch/x86/kernel/cpu/mshyperv.c index c78f860419d6..8f029650f16c 100644 --- a/arch/x86/kernel/cpu/mshyperv.c +++ b/arch/x86/kernel/cpu/mshyperv.c @@ -463,6 +463,8 @@ static void __init ms_hyperv_init_platform(void) ms_hyperv.max_vp_index, ms_hyperv.max_lp_index); =20 hv_identify_partition_type(); + if (cc_platform_has(CC_ATTR_SNP_SECURE_AVIC)) + ms_hyperv.hints |=3D HV_DEPRECATING_AEOI_RECOMMENDED; =20 if (ms_hyperv.hints & HV_X64_HYPERV_NESTED) { hv_nested =3D true; --=20 2.25.1 From nobody Sun Oct 5 12:47:03 2025 Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 90C2328C2C6; Mon, 4 Aug 2025 18:05:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.170 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754330738; cv=none; b=ivhWpXsqJhA5MVgv09fkwWVS11QDxKIra7qDNceLiOyXb/zRt6umDMGabl6cnqQm91ronlWk0bIiEUiq/32Qy4/plms5iLVe01Bt4AafLIhOLm5YpoPX1Re35H1F3zyrOe8R2P0H5gX6g9XXwTf9OM2KQmpcUyl0hrkkTVeXnMo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754330738; c=relaxed/simple; bh=ma/BQawGYoy7ITtIcGnWLTuLrZMFRrj4k7am8UwuYVU=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=Z0xvzjxegKPPKBgdLal0qxNglAr8WJh+qy7Lotih48MZ4ydc+1ycERYmV5XRI17uwAtFfugq4oZ89qEdoze7MnZkHCIm59KlK7jYF+pLVtflgltsis2r1Fj8Q3Q1dKtMSVFnnVUBczwNmaD1DQIDk9adz3HAxZ2pPxpFdRee8LI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=MruUN+ex; arc=none smtp.client-ip=209.85.210.170 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="MruUN+ex" Received: by mail-pf1-f170.google.com with SMTP id d2e1a72fcca58-7698e914cd2so4811779b3a.3; Mon, 04 Aug 2025 11:05:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1754330734; x=1754935534; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=k7igQM7Vyn71nhVvSbp2kQ44aAuz9LFYWyrsCyPIgIw=; b=MruUN+exMXU9hwUWpJ6eaWZAciraELEMZINQXbSf1EzpFr3r3Mo0sqbPPDwGImyPFV O+1LEGKhdJmv7cf8IzP5rs6HszmX7NzCEMF+retfz250q/G5k+kg9j/poqVxtlRYIfLl Y4+RCti8c6bfHWiq29IP3/vjY5UsWsov32jrq/M8ILRgQU4nShW1hmcLOQ0egUgMfguM OwnMejXQmZ7qP14PlnA6yAIDNQwPS2GHqmpxZfxNNrQiaMsm39b8DFt2PhuQNDW+UMtB hRnM+eTSm6q6O3Auqhiw0n5yA4S7DDOyeLwhhnLfpzdm60hGMYmFvtfUAgpb572EZdjJ 0OOg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1754330734; x=1754935534; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=k7igQM7Vyn71nhVvSbp2kQ44aAuz9LFYWyrsCyPIgIw=; b=Xi4rM3IlbbxR4IKcmheER9rQVR1ptxCx2UQN7AGzKOvqBeb7JjpiGWKYLuGQF7ugNC lgRAgQ/jwOz010STxNniwBKeWJEk3I8TveMQD2ANxCf95FLsI4R5B8KwWeaT+EPjj9lK LhCGbeQQJPv0PPhAgfkM+5ZJFalXi0BTW+41zpfMI3/4QUGU0xgrxroTwaFlJEgDTWO/ LIj1smbAoce/9s/hSydv27gCqSu4F0tMz+h+qqLtTERF+h9vYo/8JKtwUyhzAszyycTN bMyiirevk3v4d4wrnO3TLidlu7Ztlplh672ztuQSYM9JHaOVuR6xtklgIos5uD07Wr8L zR8w== X-Forwarded-Encrypted: i=1; AJvYcCV0tBjLNJrAWcNx+f1TIak6lfkLZfqc0lqmkEskdDFza9nwiNSXKAQMXIrRUbXeD4zzbRvrz8t9WPLZ@vger.kernel.org, AJvYcCVBCB3WzVASwZDynvgq5pHQyh+6TAAmDANKCTS2BU3JvDF7vAFmvvbn2SqixiKNr7BY6WM1z11J3pOjIPHk@vger.kernel.org, AJvYcCVjwWVNujkRxwOkHl/1RnYukhKZo2LL54OL78KyyNKujBroMNWLrXLgMeQZXYbQp9fmgo6GgJRqhARmPUS3@vger.kernel.org X-Gm-Message-State: AOJu0YzxsMXT8y/mzXUfTtotyDAjRE4gJegOEvtqZ6wuBBgWgYq2UWJJ nMOsUYwKxSaXdcAY6Kae6clzm6GH2XpfL1BEUCWW4Z4ysbiZucNfFH3v X-Gm-Gg: ASbGncv3SMCB+vJ57TonD9q3I1tvv3PRD7dsSn48O3ej6HD7n5c+BXrjwcmnfxxJzse T61R81+qAsH2InQ9buUfkG21KF4Lmw7rW4c3wseB6e4L21PIyddlg/gSPxEBiQqooAqvRcszIcA wP4wrA0wjUKFQeZRyJNDojw9jBaJZ8ATa5aI04ZD+6pXKZ3GYCgzhq6pX0fMtgY6BYcx+M3phaQ 8l5DtKfVbGTn1O8GgenXwomMn+zSuu/EF04eNa7YhRYMwMRh/NVkTd6RkLzzUd8Z08qePvUryi3 GXaUXlW0tznMmf3g/QitpwdPfH94pplfzBpF9d9ZDjhBQX1OajxyKNFchl4iMn9xwKJpAQi2VbY FVTt2uSThmkH6iE8Z40ddAtQvM7DzOiMw243aYQS4PtnxX9MA5YmOMzXj57dkkyA= X-Google-Smtp-Source: AGHT+IGEX9zQZ5yxqfGeWSNgESIzLOYxk4xxDtXRs6UBqCAGjHVyhfsKTVyBKHiF1X2tAvOh9Cxw6A== X-Received: by 2002:a17:902:fc45:b0:21f:617a:f1b2 with SMTP id d9443c01a7336-2424704958emr141890485ad.46.1754330733691; Mon, 04 Aug 2025 11:05:33 -0700 (PDT) Received: from ubuntu-Virtual-Machine.corp.microsoft.com ([2001:4898:80e8:6f:2b47:96b8:6281:35ea]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-241e8aafb34sm114144825ad.173.2025.08.04.11.05.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Aug 2025 11:05:33 -0700 (PDT) From: Tianyu Lan To: kys@microsoft.com, haiyangz@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, arnd@arndb.de, Neeraj.Upadhyay@amd.com, kvijayab@amd.com Cc: Tianyu Lan , linux-arch@vger.kernel.org, linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, Michael Kelley Subject: [RFC PATCH V5 4/4] x86/hyperv: Allow Hyper-V to inject STIMER0 interrupts Date: Mon, 4 Aug 2025 14:05:25 -0400 Message-Id: <20250804180525.32658-5-ltykernel@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250804180525.32658-1-ltykernel@gmail.com> References: <20250804180525.32658-1-ltykernel@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Tianyu Lan When Secure AVIC is enabled, call Secure AVIC function to allow Hyper-V to inject STIMER0 interrupt. Reviewed-by: Michael Kelley Signed-off-by: Tianyu Lan --- arch/x86/hyperv/hv_init.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c index 3d1d3547095a..591338162420 100644 --- a/arch/x86/hyperv/hv_init.c +++ b/arch/x86/hyperv/hv_init.c @@ -132,6 +132,10 @@ static int hv_cpu_init(unsigned int cpu) wrmsrq(HV_X64_MSR_VP_ASSIST_PAGE, msr.as_uint64); } =20 + /* Allow Hyper-V stimer vector to be injected from Hypervisor. */ + if (ms_hyperv.misc_features & HV_STIMER_DIRECT_MODE_AVAILABLE) + apic_update_vector(cpu, HYPERV_STIMER0_VECTOR, true); + return hyperv_init_ghcb(); } =20 @@ -239,6 +243,9 @@ static int hv_cpu_die(unsigned int cpu) *ghcb_va =3D NULL; } =20 + if (ms_hyperv.misc_features & HV_STIMER_DIRECT_MODE_AVAILABLE) + apic_update_vector(cpu, HYPERV_STIMER0_VECTOR, false); + hv_common_cpu_die(cpu); =20 if (hv_vp_assist_page && hv_vp_assist_page[cpu]) { --=20 2.25.1