On Thu, Mar 09, 2023 at 10:35:57AM -0800, Saurabh Sengar wrote: > Virtual Trust Levels (VTL) helps enable Hyper-V Virtual Secure Mode (VSM) > feature. VSM is a set of hypervisor capabilities and enlightenments > offered to host and guest partitions which enable the creation and > management of new security boundaries within operating system software. > VSM achieves and maintains isolation through VTLs. > > Add early initialization for Virtual Trust Levels (VTL). This includes > initializing the x86 platform for VTL and enabling boot support for > secondary CPUs to start in targeted VTL context. For now, only enable > the code for targeted VTL level as 2. > > When starting an AP at a VTL other than VTL 0, the AP must start directly > in 64-bit mode, bypassing the usual 16-bit -> 32-bit -> 64-bit mode > transition sequence that occurs after waking up an AP with SIPI whose > vector points to the 16-bit AP startup trampoline code. > > This commit also moves hv_get_nmi_reason function to header file, so > that it can be reused by VTL. > > Signed-off-by: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx> > --- > arch/x86/Kconfig | 24 +++ > arch/x86/hyperv/Makefile | 1 + > arch/x86/hyperv/hv_vtl.c | 227 +++++++++++++++++++++++++++++ > arch/x86/include/asm/hyperv-tlfs.h | 75 ++++++++++ > arch/x86/include/asm/mshyperv.h | 14 ++ > arch/x86/kernel/cpu/mshyperv.c | 6 +- > include/asm-generic/hyperv-tlfs.h | 4 + > 7 files changed, 346 insertions(+), 5 deletions(-) > create mode 100644 arch/x86/hyperv/hv_vtl.c > > diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig > index 453f462f6c9c..b9e52ac9c9f9 100644 > --- a/arch/x86/Kconfig > +++ b/arch/x86/Kconfig > @@ -782,6 +782,30 @@ menuconfig HYPERVISOR_GUEST > > if HYPERVISOR_GUEST > > +config HYPERV_VTL > + bool "Enable VTL" This is not to "Enable VTL". VTL is always there with or without this option. This option is to enable Linux to run in VTL2. I would suggest it to be changed to HYPERV_VTL2_MODE or something more explicit. HYPERV_VTL is better reserved to guard code which makes use of VTL related functionality -- if there is such a need in the future. > + depends on X86_64 && HYPERV > + default n > + help > + Virtual Secure Mode (VSM) is a set of hypervisor capabilities and > + enlightenments offered to host and guest partitions which enables > + the creation and management of new security boundaries within > + operating system software. > + > + VSM achieves and maintains isolation through Virtual Trust Levels > + (VTLs). Virtual Trust Levels are hierarchical, with higher levels > + being more privileged than lower levels. VTL0 is the least privileged > + level, and currently only other level supported is VTL2. Please be consistent as to VTL 0 vs VTL0. You use one form here and the other form in the next paragraph. > + > + Select this option to build a Linux kernel to run at a VTL other than > + the normal VTL 0, which currently is only VTL 2. This option > + initializes the x86 platform for VTL 2, and adds the ability to boot > + secondary CPUs directly into 64-bit context as required for VTLs other > + than 0. A kernel built with this option must run at VTL 2, and will > + not run as a normal guest. > + > + If unsure, say N > + > config PARAVIRT > bool "Enable paravirtualization code" > depends on HAVE_STATIC_CALL > diff --git a/arch/x86/hyperv/Makefile b/arch/x86/hyperv/Makefile > index 5d2de10809ae..a538df01181a 100644 > --- a/arch/x86/hyperv/Makefile > +++ b/arch/x86/hyperv/Makefile > @@ -1,6 +1,7 @@ > # SPDX-License-Identifier: GPL-2.0-only > obj-y := hv_init.o mmu.o nested.o irqdomain.o ivm.o > obj-$(CONFIG_X86_64) += hv_apic.o hv_proc.o > +obj-$(CONFIG_HYPERV_VTL) += hv_vtl.o > > ifdef CONFIG_X86_64 > obj-$(CONFIG_PARAVIRT_SPINLOCKS) += hv_spinlock.o > diff --git a/arch/x86/hyperv/hv_vtl.c b/arch/x86/hyperv/hv_vtl.c > new file mode 100644 > index 000000000000..0da8b242eb8b > --- /dev/null > +++ b/arch/x86/hyperv/hv_vtl.c > @@ -0,0 +1,227 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Copyright (c) 2023, Microsoft Corporation. > + * > + * Author: > + * Saurabh Sengar <ssengar@xxxxxxxxxxxxx> > + */ > + > +#include <asm/apic.h> > +#include <asm/boot.h> > +#include <asm/desc.h> > +#include <asm/i8259.h> > +#include <asm/mshyperv.h> > +#include <asm/realmode.h> > + > +extern struct boot_params boot_params; > +static struct real_mode_header hv_vtl_real_mode_header; > + > +void __init hv_vtl_init_platform(void) > +{ > + pr_info("Initializing Hyper-V VTL\n"); > + We can be more explicit here, "Linux runs in Hyper-V Virtual Trust Level 2". If we go with this, this and other function names should be renamed to something more explicit too. > + x86_init.irqs.pre_vector_init = x86_init_noop; > + x86_init.timers.timer_init = x86_init_noop; > + > + x86_platform.get_wallclock = get_rtc_noop; > + x86_platform.set_wallclock = set_rtc_noop; > + x86_platform.get_nmi_reason = hv_get_nmi_reason; > + > + x86_platform.legacy.i8042 = X86_LEGACY_I8042_PLATFORM_ABSENT; > + x86_platform.legacy.rtc = 0; > + x86_platform.legacy.warm_reset = 0; > + x86_platform.legacy.reserve_bios_regions = 0; > + x86_platform.legacy.devices.pnpbios = 0; > +} > + [...] > +static int hv_vtl_bringup_vcpu(u32 target_vp_index, u64 eip_ignored) > +{ > + u64 status; > + int ret = 0; > + struct hv_enable_vp_vtl *input; > + unsigned long irq_flags; > + > + struct desc_ptr gdt_ptr; > + struct desc_ptr idt_ptr; > + > + struct ldttss_desc *tss; > + struct ldttss_desc *ldt; > + struct desc_struct *gdt; > + > + u64 rsp = initial_stack; > + u64 rip = (u64)&hv_vtl_ap_entry; > + > + native_store_gdt(&gdt_ptr); > + store_idt(&idt_ptr); > + > + gdt = (struct desc_struct *)((void *)(gdt_ptr.address)); > + tss = (struct ldttss_desc *)(gdt + GDT_ENTRY_TSS); > + ldt = (struct ldttss_desc *)(gdt + GDT_ENTRY_LDT); > + > + local_irq_save(irq_flags); > + > + input = (struct hv_enable_vp_vtl *)(*this_cpu_ptr(hyperv_pcpu_input_arg)); Not a big deal, but you don't actually need to cast here. [...] > + > +static int hv_vtl_apicid_to_vp_id(u32 apic_id) > +{ > + u64 control; > + u64 status; > + unsigned long irq_flags; > + struct hv_get_vp_from_apic_id_in *input; > + u32 *output, ret; > + > + local_irq_save(irq_flags); > + > + input = (struct hv_get_vp_from_apic_id_in *)(*this_cpu_ptr(hyperv_pcpu_input_arg)); No need to cast here. [...] > +struct hv_x64_table_register { > + __u16 pad[3]; > + __u16 limit; > + __u64 base; > +} __packed; > + > +struct hv_init_vp_context_t { Drop the _t suffix please. Thanks, Wei.