Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4270317ybz; Tue, 28 Apr 2020 08:30:09 -0700 (PDT) X-Google-Smtp-Source: APiQypJp2MaAfZ5/dunFG3VEneF3Ku3FTGMdxvGQL9bwcjOg9zv8nGRX5VCvKBX1drg5HPL88I4D X-Received: by 2002:a17:906:3952:: with SMTP id g18mr25945058eje.191.1588087809060; Tue, 28 Apr 2020 08:30:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588087809; cv=none; d=google.com; s=arc-20160816; b=nPpz6E/b1l6WDEKCj6l+LoiRsLp63QIUOZCtmC5uLOJ2dQRtjTFKyCSRPgVNuBQv/O OkJk24QDx+7/U2TXekHWGaj46BYVvI8KkTtw2QTClDc67o/p0mfwmAFnn/aJNukPETKu FXO7odsnwCq9/Wk2XnNzYvJ2Kd4pUwyhN4vqrGlisx7wQgkryaV0i7yKVSPDv7xRxxd3 4dqPrUlV6eIQNMQ65lBytxh1gXmNt/2iHYqrx3Psyb1oP+wuYFgGFa5q9q2/ErEkHN1K cuh9TCfx5bi9APPG/jG7XBuQpk32v8M1IMhgpvc1tzIW4L7LMfyp1mrlYc0/1IO5pP0X FRCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=NxbNT7+MrxOUleP5pz3mUft+/7+oOYMgoFVRZFuN1Aw=; b=T6dbdjiw51FrRVZuh8RqX3BAnSYFM7tV0CCnyJ0Zfty2llJPX/PkCC8Q3MfBmcwr5E +fmtBYnfMLZjpARTFhoGhooMnJB9GQWwFaP83fiqatg1fNv7LCTLfFJHP7aJlJsiCC7L 4K+Z7THNYSm+wRR0fukHJoCc70/QjDA6SaQCddFtOCKtcSdAUHoguLAWlLUH9AQBpZqB z+7RDMvfkrM1YWlR9ZsFZlbwdaExzcZf/tkJFZ3Cmk/ksv1W924CRfn0f9EamysP9kqw D/kQDJlfOdyU/R8v4mKWWkQEOUhxf+wlwBbA8DhIDmE5uzKBUBmlP5KR4T+jPjKb85I9 6rsQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z2si1844487edp.320.2020.04.28.08.28.52; Tue, 28 Apr 2020 08:30:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728084AbgD1PRr (ORCPT + 99 others); Tue, 28 Apr 2020 11:17:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41588 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1728028AbgD1PRq (ORCPT ); Tue, 28 Apr 2020 11:17:46 -0400 Received: from theia.8bytes.org (8bytes.org [IPv6:2a01:238:4383:600:38bc:a715:4b6d:a889]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2C031C03C1AB; Tue, 28 Apr 2020 08:17:46 -0700 (PDT) Received: by theia.8bytes.org (Postfix, from userid 1000) id 756F16BB; Tue, 28 Apr 2020 17:17:42 +0200 (CEST) From: Joerg Roedel To: x86@kernel.org Cc: hpa@zytor.com, Andy Lutomirski , Dave Hansen , Peter Zijlstra , Thomas Hellstrom , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , David Rientjes , Cfir Cohen , Erdem Aktas , Masami Hiramatsu , Mike Stunes , Joerg Roedel , Joerg Roedel , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: [PATCH v3 01/75] KVM: SVM: Add GHCB definitions Date: Tue, 28 Apr 2020 17:16:11 +0200 Message-Id: <20200428151725.31091-2-joro@8bytes.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200428151725.31091-1-joro@8bytes.org> References: <20200428151725.31091-1-joro@8bytes.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tom Lendacky Extend the vmcb_safe_area with SEV-ES fields and add a new 'struct ghcb' which will be used for guest-hypervisor communication. Signed-off-by: Tom Lendacky Signed-off-by: Joerg Roedel --- arch/x86/include/asm/svm.h | 42 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h index 6ece8561ba66..f36288c659b5 100644 --- a/arch/x86/include/asm/svm.h +++ b/arch/x86/include/asm/svm.h @@ -201,6 +201,48 @@ struct __attribute__ ((__packed__)) vmcb_save_area { u64 br_to; u64 last_excp_from; u64 last_excp_to; + + /* + * The following part of the save area is valid only for + * SEV-ES guests when referenced through the GHCB. + */ + u8 reserved_7[104]; + u64 reserved_8; /* rax already available at 0x01f8 */ + u64 rcx; + u64 rdx; + u64 rbx; + u64 reserved_9; /* rsp already available at 0x01d8 */ + u64 rbp; + u64 rsi; + u64 rdi; + u64 r8; + u64 r9; + u64 r10; + u64 r11; + u64 r12; + u64 r13; + u64 r14; + u64 r15; + u8 reserved_10[16]; + u64 sw_exit_code; + u64 sw_exit_info_1; + u64 sw_exit_info_2; + u64 sw_scratch; + u8 reserved_11[56]; + u64 xcr0; + u8 valid_bitmap[16]; + u64 x87_state_gpa; + u8 reserved_12[1016]; +}; + +struct __attribute__ ((__packed__)) ghcb { + struct vmcb_save_area save; + + u8 shared_buffer[2032]; + + u8 reserved_1[10]; + u16 protocol_version; /* negotiated SEV-ES/GHCB protocol version */ + u32 ghcb_usage; }; struct __attribute__ ((__packed__)) vmcb { -- 2.17.1