From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.7 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 33C0EC28B27 for ; Mon, 13 Sep 2021 14:20:17 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 1F2B961373 for ; Mon, 13 Sep 2021 14:20:17 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345609AbhIMOTz (ORCPT ); Mon, 13 Sep 2021 10:19:55 -0400 Received: from 8bytes.org ([81.169.241.247]:56618 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345349AbhIMOPL (ORCPT ); Mon, 13 Sep 2021 10:15:11 -0400 Received: from cap.home.8bytes.org (p549ad441.dip0.t-ipconnect.de [84.154.212.65]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by theia.8bytes.org (Postfix) with ESMTPSA id 8AC83205; Mon, 13 Sep 2021 16:13:53 +0200 (CEST) From: Joerg Roedel To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , x86@kernel.org, Brijesh Singh , Tom Lendacky , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Joerg Roedel Subject: [PATCH v3 0/4] KVM: SVM: Add initial GHCB protocol version 2 support Date: Mon, 13 Sep 2021 16:13:41 +0200 Message-Id: <20210913141345.27175-1-joro@8bytes.org> X-Mailer: git-send-email 2.33.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Hi, here is a small set of patches which I took from the pending SEV-SNP patch-sets to enable basic support for GHCB protocol version 2. When SEV-SNP is not supported, only two new MSR protocol VMGEXIT calls need to be supported: - MSR-based AP-reset-hold - MSR-based HV-feature-request These calls are implemented here and then the protocol is lifted to version 2. This is submitted separately because the MSR-based AP-reset-hold call is required to support kexec/kdump in SEV-ES guests. Regards, Joerg Changes v2->v3: - Rebased to v5.15-rc1 - Reworked GHCB_MSR access interfaces as suggested by Sean Christopherson. Brijesh Singh (2): KVM: SVM: Add support for Hypervisor Feature support MSR protocol KVM: SVM: Increase supported GHCB protocol version Joerg Roedel (1): KVM: SVM: Get rid of set_ghcb_msr() and *ghcb_msr_bits() functions Tom Lendacky (1): KVM: SVM: Add support to handle AP reset MSR protocol arch/x86/include/asm/kvm_host.h | 10 ++- arch/x86/include/asm/sev-common.h | 9 +++ arch/x86/include/uapi/asm/svm.h | 1 + arch/x86/kvm/svm/sev.c | 115 +++++++++++++++++++----------- arch/x86/kvm/svm/svm.h | 3 +- arch/x86/kvm/x86.c | 5 +- 6 files changed, 98 insertions(+), 45 deletions(-) base-commit: 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f -- 2.33.0