Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp6268016pxb; Thu, 27 Jan 2022 09:56:22 -0800 (PST) X-Google-Smtp-Source: ABdhPJy16gy3/wyYqmzTZrKJ1ScCSDSwS8ZJ8KgioL/DjE2vzbmRDyQZQ3go0t6NXCI7rIKnjdEN X-Received: by 2002:a17:907:2849:: with SMTP id el9mr3861774ejc.201.1643306181861; Thu, 27 Jan 2022 09:56:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643306181; cv=none; d=google.com; s=arc-20160816; b=S1V7tSZQopwQ8L6fq+ODljl3PKIMqp41CSRUIxUio1aabTUvE3pr33fudIX1x4lw8T EBaO+qQ/XOB50GdR1hzrZLQUuIp38vGUOVmjwrP3N0CELv7UmAgu8bmae8drCyloZ5l/ ru7xLjl03MoZ3OIVRyMC90n3IbYFQnqxg9wjW90YQjDlFPEADkH5R+fAk1ov2AdFTV44 8tVR7zqM4nbzAxVNwER5dbHu1LEQICSxxpx6luzXCU4RfdQqp9bBCu8Tkm+ghXG1XlEV 3d/p6HaE0m/d8yHmJ9yIMWSlge7ttqAg9fl8nfoTD1DgoDZBN0ryuw6ga4a9RqnWhFyJ mIrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=aP/qVW8ys8j/lkTB2P19LNn9Pvfii49OUzCTM66E2is=; b=NpZlBS5eL3o/MQqoQhEWL82XPDA9NPbqwKUewtgwSVB4cNLE/o4EcnTNoGgkQ0wIkv MAItnhj0rfRsUKLfBiOepZ5MOQ1ymM59REju3Sk+b5iCLL535BrGH+apBKveZyJU53yw CXt7d+pJszDqbsoshqzyKI5r07z5vP4hn8DVrROy/X6vNVzMGuM9uJXn/JO8K/I8pYKY pQs+jAmfeyH97iss/Zi237VrWYS1oeH14YnFVB6WKECODbxeCXY57ls6fTdg9HnrvXTQ NbSyAZeqfmFVe0DTmgUT7WldgH5JfGPjbkdQRG9N5hwMDfsc02BhOxVz0kVBNWMXJG4b LcSw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x25si1640406edq.325.2022.01.27.09.55.33; Thu, 27 Jan 2022 09:56:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239013AbiA0KLb (ORCPT + 99 others); Thu, 27 Jan 2022 05:11:31 -0500 Received: from 8bytes.org ([81.169.241.247]:47834 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232204AbiA0KLX (ORCPT ); Thu, 27 Jan 2022 05:11:23 -0500 Received: from cap.home.8bytes.org (p549ad610.dip0.t-ipconnect.de [84.154.214.16]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by theia.8bytes.org (Postfix) with ESMTPSA id 3E7E7870; Thu, 27 Jan 2022 11:11:20 +0100 (CET) From: Joerg Roedel To: x86@kernel.org Cc: Joerg Roedel , Joerg Roedel , Eric Biederman , kexec@lists.infradead.org, hpa@zytor.com, Andy Lutomirski , Dave Hansen , Peter Zijlstra , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , David Rientjes , Cfir Cohen , Erdem Aktas , Masami Hiramatsu , Mike Stunes , Sean Christopherson , Martin Radev , Arvind Sankar , linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: [PATCH v3 03/10] x86/sev: Set GHCB data structure version Date: Thu, 27 Jan 2022 11:10:37 +0100 Message-Id: <20220127101044.13803-4-joro@8bytes.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220127101044.13803-1-joro@8bytes.org> References: <20220127101044.13803-1-joro@8bytes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel It turned out that the GHCB->protocol field does not declare the version of the guest-hypervisor communication protocol, but rather the version of the GHCB data structure. Reflect that in the define used to set the protocol field. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/sev.h | 3 +++ arch/x86/kernel/sev-shared.c | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/arch/x86/include/asm/sev.h b/arch/x86/include/asm/sev.h index 17b75f6ee11a..09eb2cc6f54f 100644 --- a/arch/x86/include/asm/sev.h +++ b/arch/x86/include/asm/sev.h @@ -16,6 +16,9 @@ #define GHCB_PROTOCOL_MAX 2ULL #define GHCB_DEFAULT_USAGE 0ULL +/* Version of the GHCB data structure */ +#define GHCB_VERSION 1 + #define VMGEXIT() { asm volatile("rep; vmmcall\n\r"); } enum es_result { diff --git a/arch/x86/kernel/sev-shared.c b/arch/x86/kernel/sev-shared.c index 60ca7dd64d64..4468150a42bb 100644 --- a/arch/x86/kernel/sev-shared.c +++ b/arch/x86/kernel/sev-shared.c @@ -162,7 +162,7 @@ enum es_result sev_es_ghcb_hv_call(struct ghcb *ghcb, bool set_ghcb_msr, u64 exit_info_1, u64 exit_info_2) { /* Fill in protocol and format specifiers */ - ghcb->protocol_version = GHCB_PROTOCOL_MAX; + ghcb->protocol_version = GHCB_VERSION; ghcb->ghcb_usage = GHCB_DEFAULT_USAGE; ghcb_set_sw_exit_code(ghcb, exit_code); -- 2.34.1