Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1463668pxb; Wed, 20 Oct 2021 05:45:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxHf/Gl1FlbRDNz1Dr0e6JK1C+HlQoy14ayFLyjSrjlze0DTi+M9P4K3hiLDR5apvProJDu X-Received: by 2002:a05:6a00:22d1:b0:44c:f752:a216 with SMTP id f17-20020a056a0022d100b0044cf752a216mr6101663pfj.45.1634733950237; Wed, 20 Oct 2021 05:45:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634733950; cv=none; d=google.com; s=arc-20160816; b=uxhZql4jJckTESDt7GxgcF7pPgwwTX6NwNPBChLmlz+UrvYRAej+OkSpLPfwc9Iley YGqLyOBZYPSCAvM5UDNOETw5KdnoGTS9smzH4Su9cVQbnF7myfmEIcFhK2q8L/B0VQaw Y+bPjJvTbtCMcCCYDtscxtIi/rO3AGVqF91r/LwPNESp956AhkmwENXgCaM2u+nj/WGz uNKsYzaKzz3d9wshHibkrPGt2G19wdRY5svlShh9Fr9UPaQLpGbQHXuPQcFSmEa+D6g+ zVV8/BCsiiWOL9M6PFUvVAexcBx3JKeeOvRq5XE2BaSGAr4HRaqtokb2zTrbHKLJyRR8 l9YA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=dCd7uS6NT9sVYl/zhCmPjpPc3oI/wkzoJtQP6nkQQu8=; b=vFhp9Rr/am/IxAeYXlzSvOh79XQrhUYmyB7AzzdnjhmH9Oo0j5dSKd6Ik52icpcl8F VKUySSlhfelfKLi8cwQtGa6I9B3B+bdr5Gas3isZR86Us1QQcPifG3PI3g1FUq1xZ0xw 3Kx42w1zrhGqi0fLndLV9sbkrwfypUX5ZswXuOTPSgrTPuqXK2VH7dJKU4bLrZsnhuaM pU6JOc/Xwb8E1zYNZBk3kPIoQCUz7+IxewhwEVwGn8zAsj+0oXutS2tgKLfp70BtLwqV 1iuIwPCtOoZUb5/cuKtOcoL4ObsYR4E9QxU/rSxasbgel3revt/me7Uu3ypa4mg3OviC 6q1w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r142si2836427pfc.275.2021.10.20.05.45.37; Wed, 20 Oct 2021 05:45:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230228AbhJTMqv (ORCPT + 99 others); Wed, 20 Oct 2021 08:46:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55496 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230174AbhJTMqv (ORCPT ); Wed, 20 Oct 2021 08:46:51 -0400 Received: from theia.8bytes.org (8bytes.org [IPv6:2a01:238:4383:600:38bc:a715:4b6d:a889]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CAEF5C06161C; Wed, 20 Oct 2021 05:44:36 -0700 (PDT) Received: from cap.home.8bytes.org (p4ff2b5b0.dip0.t-ipconnect.de [79.242.181.176]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by theia.8bytes.org (Postfix) with ESMTPSA id 78ED428B; Wed, 20 Oct 2021 14:44:32 +0200 (CEST) From: Joerg Roedel To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , x86@kernel.org, Brijesh Singh , Tom Lendacky , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Joerg Roedel Subject: [PATCH v5 0/6] KVM: SVM: Add initial GHCB protocol version 2 support Date: Wed, 20 Oct 2021 14:44:10 +0200 Message-Id: <20211020124416.24523-1-joro@8bytes.org> X-Mailer: git-send-email 2.33.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Hi, here is a small set of patches which I took from the pending SEV-SNP patch-sets to enable basic support for GHCB protocol version 2. When SEV-SNP is not supported, only two new MSR protocol VMGEXIT calls are required: - MSR-based AP-reset-hold - MSR-based HV-feature-request These calls are implemented here and then the protocol is lifted to version 2. This is submitted separately because the MSR-based AP-reset-hold call is required to support kexec/kdump in SEV-ES guests. The previous version can be found here: https://lore.kernel.org/lkml/20210929155330.5597-1-joro@8bytes.org/ Regards, Joerg Changes v4->v5: - Removed stable SoB from patch 1 - Moved kvm_emulate_ap_reset_hold() and all related code in later patches to SVM specific code, as suggested by Sean. Brijesh Singh (2): KVM: SVM: Add support for Hypervisor Feature support MSR protocol KVM: SVM: Increase supported GHCB protocol version Joerg Roedel (2): KVM: SVM: Get rid of set_ghcb_msr() and *ghcb_msr_bits() functions KVM: SVM: Move kvm_emulate_ap_reset_hold() to AMD specific code Sean Christopherson (1): KVM: SVM: Add helper to generate GHCB MSR verson info, and drop macro Tom Lendacky (1): KVM: SVM: Add support to handle AP reset MSR protocol arch/x86/include/asm/kvm_host.h | 3 +- arch/x86/include/asm/sev-common.h | 14 +-- arch/x86/include/uapi/asm/svm.h | 1 + arch/x86/kvm/svm/sev.c | 141 +++++++++++++++++++++--------- arch/x86/kvm/svm/svm.h | 13 +-- arch/x86/kvm/x86.c | 11 +-- 6 files changed, 120 insertions(+), 63 deletions(-) base-commit: 73f122c4f06f650ddf7f7410d8510db1a92a16a0 -- 2.33.1