Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1463744pxb; Wed, 20 Oct 2021 05:45:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxCuT5Tlu4lmuwH9RGtaiREObxKRiWbLLi88QncYKTFmTx7x+K2bMdCrVNry3vMb6JnnaTp X-Received: by 2002:a17:902:930c:b029:12c:d5c8:61c4 with SMTP id bc12-20020a170902930cb029012cd5c861c4mr38978535plb.73.1634733957312; Wed, 20 Oct 2021 05:45:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634733957; cv=none; d=google.com; s=arc-20160816; b=J3fzZxm4xj2XAjv2kWjEf/gvjRsluh4+MCaK33+5s+ZSkwWxFHDu6EyaQWpyE/k48Q Tm+afLDKZS5nF9SjTqSEupHmIqFXzMfYg9w7bl3EfSB5vQgZiX79nsTDeZqHN8jOZVTp sBrBdRKKHTXAlmNU4ct1N+8XFXv6lXSS9tfD1cgA8rB7hSgKRwu/VgMa/b8nZRq8vuU0 ng+AzOive4AE6Z1zwSA2lPxI18lpMb7eSGWSjlBb5mO0zNDsVrYharzBGe7OdgM4yeqB V5fYh7oiiysJ6EmqFOza8Hk9CrhXauGN3WdUALJNkSANlxqcf71wOMIqh3OYExWQUxzo T1vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=ngrktqtNWg+Eoa90qsOMcp4bqQMzrSWpKwrJYtt3TCg=; b=I5MrLJONsXveuqomyQprhb7Oo2bYX25Kixf/tJj8npPy4Lq7EO/udFDcinZiJgpeCZ v2e/ZGX28DUOGpT9zB5Kiij9sygbtTDGVpyfT299XKzFNyTsFshJiJYWxEbm9DLcPaTs uo5BuddPh8n7Ge221gvnGbudo78xiTgIKilpHMyTEQ+5a+Mu0Zlh2JUGHKI780E0cxhK NyQ1/Nxr6d11y3lJCLNN4yD6ND90hoLAqHOcsDFYdw+2kgk1BAYcNWOHi8rZoos3K+xu dosz9F1RYRbz9C6ShU2/5vVWg8RL350Buc7qV3RYji1/MqcP+7ANwZevTAeQY/Em4RUW GPDg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n9si7555462pjf.11.2021.10.20.05.45.43; Wed, 20 Oct 2021 05:45:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230186AbhJTMqt (ORCPT + 99 others); Wed, 20 Oct 2021 08:46:49 -0400 Received: from 8bytes.org ([81.169.241.247]:33490 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229998AbhJTMqt (ORCPT ); Wed, 20 Oct 2021 08:46:49 -0400 Received: from cap.home.8bytes.org (p4ff2b5b0.dip0.t-ipconnect.de [79.242.181.176]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by theia.8bytes.org (Postfix) with ESMTPSA id 4B9F038F; Wed, 20 Oct 2021 14:44:33 +0200 (CEST) From: Joerg Roedel To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , x86@kernel.org, Brijesh Singh , Tom Lendacky , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Joerg Roedel Subject: [PATCH v5 2/6] KVM: SVM: Add helper to generate GHCB MSR verson info, and drop macro Date: Wed, 20 Oct 2021 14:44:12 +0200 Message-Id: <20211020124416.24523-3-joro@8bytes.org> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211020124416.24523-1-joro@8bytes.org> References: <20211020124416.24523-1-joro@8bytes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson Convert the GHCB_MSR_SEV_INFO macro into a helper function, and have the helper hardcode the min/max versions instead of relying on the caller to do the same. Under no circumstance should different pieces of KVM define different min/max versions. No functional change intended. Signed-off-by: Sean Christopherson --- arch/x86/include/asm/sev-common.h | 5 ----- arch/x86/kvm/svm/sev.c | 24 ++++++++++++++++++------ arch/x86/kvm/svm/svm.h | 5 ----- 3 files changed, 18 insertions(+), 16 deletions(-) diff --git a/arch/x86/include/asm/sev-common.h b/arch/x86/include/asm/sev-common.h index 8540972cad04..886c36f0cb16 100644 --- a/arch/x86/include/asm/sev-common.h +++ b/arch/x86/include/asm/sev-common.h @@ -24,11 +24,6 @@ #define GHCB_MSR_VER_MIN_MASK 0xffff #define GHCB_MSR_CBIT_POS 24 #define GHCB_MSR_CBIT_MASK 0xff -#define GHCB_MSR_SEV_INFO(_max, _min, _cbit) \ - ((((_max) & GHCB_MSR_VER_MAX_MASK) << GHCB_MSR_VER_MAX_POS) | \ - (((_min) & GHCB_MSR_VER_MIN_MASK) << GHCB_MSR_VER_MIN_POS) | \ - (((_cbit) & GHCB_MSR_CBIT_MASK) << GHCB_MSR_CBIT_POS) | \ - GHCB_MSR_SEV_INFO_RESP) #define GHCB_MSR_INFO(v) ((v) & 0xfffUL) #define GHCB_MSR_PROTO_MAX(v) (((v) >> GHCB_MSR_VER_MAX_POS) & GHCB_MSR_VER_MAX_MASK) #define GHCB_MSR_PROTO_MIN(v) (((v) >> GHCB_MSR_VER_MIN_POS) & GHCB_MSR_VER_MIN_MASK) diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index 2e3ecab6f1c8..9fb4d8fad1f4 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -2389,6 +2389,22 @@ static u64 ghcb_msr_cpuid_resp(u64 reg, u64 value) return msr; } +/* The min/max GHCB version supported by KVM. */ +#define GHCB_VERSION_MAX 1ULL +#define GHCB_VERSION_MIN 1ULL + +static u64 ghcb_msr_version_info(void) +{ + u64 msr; + + msr = GHCB_MSR_SEV_INFO_RESP; + msr |= GHCB_VERSION_MAX << GHCB_MSR_VER_MAX_POS; + msr |= GHCB_VERSION_MIN << GHCB_MSR_VER_MIN_POS; + msr |= sev_enc_bit << GHCB_MSR_CBIT_POS; + + return msr; +} + static int sev_handle_vmgexit_msr_protocol(struct vcpu_svm *svm) { struct vmcb_control_area *control = &svm->vmcb->control; @@ -2403,9 +2419,7 @@ static int sev_handle_vmgexit_msr_protocol(struct vcpu_svm *svm) switch (ghcb_info) { case GHCB_MSR_SEV_INFO_REQ: - svm->vmcb->control.ghcb_gpa = GHCB_MSR_SEV_INFO(GHCB_VERSION_MAX, - GHCB_VERSION_MIN, - sev_enc_bit); + control->ghcb_gpa = ghcb_msr_version_info(); break; case GHCB_MSR_CPUID_REQ: { u64 cpuid_fn, cpuid_reg, cpuid_value; @@ -2621,9 +2635,7 @@ void sev_es_vcpu_reset(struct vcpu_svm *svm) * Set the GHCB MSR value as per the GHCB specification when emulating * vCPU RESET for an SEV-ES guest. */ - svm->vmcb->control.ghcb_gpa = GHCB_MSR_SEV_INFO(GHCB_VERSION_MAX, - GHCB_VERSION_MIN, - sev_enc_bit); + svm->vmcb->control.ghcb_gpa = ghcb_msr_version_info(); } void sev_es_prepare_guest_switch(struct vcpu_svm *svm, unsigned int cpu) diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h index 0d7bbe548ac3..68e5f16a0554 100644 --- a/arch/x86/kvm/svm/svm.h +++ b/arch/x86/kvm/svm/svm.h @@ -544,11 +544,6 @@ void svm_vcpu_blocking(struct kvm_vcpu *vcpu); void svm_vcpu_unblocking(struct kvm_vcpu *vcpu); /* sev.c */ - -#define GHCB_VERSION_MAX 1ULL -#define GHCB_VERSION_MIN 1ULL - - extern unsigned int max_sev_asid; void sev_vm_destroy(struct kvm *kvm); -- 2.33.1