From nobody Mon Feb 9 16:18:30 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) by mx.zohomail.com with SMTPS id 1520441921875132.3753844978213; Wed, 7 Mar 2018 08:58:41 -0800 (PST) Received: from localhost ([::1]:34377 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1etcOm-0002kf-PZ for importer@patchew.org; Wed, 07 Mar 2018 11:58:40 -0500 Received: from eggs.gnu.org ([2001:4830:134:3::10]:50232) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1etcHb-0004du-I5 for qemu-devel@nongnu.org; Wed, 07 Mar 2018 11:51:16 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1etcHX-0008Ds-3d for qemu-devel@nongnu.org; Wed, 07 Mar 2018 11:51:15 -0500 Received: from mail-bl2nam02on0050.outbound.protection.outlook.com ([104.47.38.50]:40768 helo=NAM02-BL2-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1etcHW-0008Cd-Tn for qemu-devel@nongnu.org; Wed, 07 Mar 2018 11:51:11 -0500 Received: from wsp141597wss.amd.com (165.204.78.1) by SN1PR12MB0158.namprd12.prod.outlook.com (2a01:111:e400:5144::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Wed, 7 Mar 2018 16:51:06 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=FFCItbhe3z5LnOPkxBvVYDwqD9Hfm01bHo8CiUMEhsQ=; b=fthYhoZyv2LLLJSzHurokQQqu52ysS9VOehnmzwwwxAe8pg+xafb/TXwm3F1+mbqjBU7sSzkUJCCQ8rDctqjLyHlcsTM75muhE7xRD6HfENHdh+g2jqxFS6KNKwTQKXoY3MS1BWJ9HFEoQ+WKXPNfoSzJI1aRBIW9Ziu+cVTJ8c= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; From: Brijesh Singh To: qemu-devel@nongnu.org Date: Wed, 7 Mar 2018 10:50:16 -0600 Message-Id: <20180307165038.88640-7-brijesh.singh@amd.com> X-Mailer: git-send-email 2.14.3 In-Reply-To: <20180307165038.88640-1-brijesh.singh@amd.com> References: <20180307165038.88640-1-brijesh.singh@amd.com> MIME-Version: 1.0 X-Originating-IP: [165.204.78.1] X-ClientProxiedBy: SN4PR0501CA0095.namprd05.prod.outlook.com (2603:10b6:803:22::33) To SN1PR12MB0158.namprd12.prod.outlook.com (2a01:111:e400:5144::17) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: f4bffe8e-fe3f-44de-b971-08d5844b9f31 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:SN1PR12MB0158; X-Microsoft-Exchange-Diagnostics: 1; SN1PR12MB0158; 3:qJjWGiR5HqKaf7Iwteo0ghToRq8C/+zXMkwpjm4rFavvyI9ZH25fIDes/NvGxo9spdv0wX7ZtRnT6M5lsdcgkgIGccgP0KlUZJXp9NXjlMB/UPNYW5trunmy2H1jly019sZXmPkVQeObe4U/ImAHpAAxikgqIxLz10C9UBBuxls42mNTcmEy05SgisDMlP3MDDJAz/vJKa76WA8BGucTNj19q4ksRPjNLAvUc7saiY6krzx1nevlPqqS7wPyrAg4; 25:GpRHUqDk563gytaLK1NgvAAalc1MJaOMN9wq54aTeicc5vLNDyWBR1ajszLdXmtVpR9qTV9GN9VWXpPsbS4o7jso2pFKvXUTfTsdjBjTDQdiGRPyL+jlVJu4ictyvu1K/HB3b9duzQR9NQBh6t+gllILF+yvSwX+05j+7wQ++cNwnitpFjqQcROvbsdyif0BYI9DHPnygzlsdMAXkT5zjvF8AclF8samxGYFdElIrb4KMy4gj83JcrBlkUiq5BJIaMuaEHAi5rWuNVfApr4Qo0Klfq6yxv6RGTyQf3BUJyiZgB1p6ccLDcinEjvNCuL6T3SOviwnDIl8c5BqWcj2Sw==; 31:3Nkofew7lODIK8rtUv/zS4bdpwfHXNGYHL03WqWOYJXrFIWcudg161vdASfCz+UMl1frx05dCo5dYcEYBimBYqR3wan3vja48EXYAOM71+zOkGJjsKr1ZlrJq6ienFJ4US1lKOyEHs8ncNse0fX3bWasbTHimSjLCo9J0I4etqKWpRpa/EXc2XVktBydNqwvtq2wceU0tGI8yGC4ywbpH9ROj/XZZYtXCt0Pu4QFJvg= X-MS-TrafficTypeDiagnostic: SN1PR12MB0158: X-Microsoft-Exchange-Diagnostics: 1; SN1PR12MB0158; 20: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; 4:nLFqiHK4LM8U7IowQLUDK1RKT1lkf+xzPB1tCuGYdSRITTGXI0157Eu/65SmHiLPg7q4z/nZTWriUWXB+oIlaAC0jPCf5+ILS325sDTJSeClM5k6vPPzYfPN4yS3A4XRp5bK/siY4NFpg5R3Gq1gvDWkhnKZ1PEJF7Aeur+XQLJURr4FHRQIbRahoDl4TkgiYt3P3WDaQMqYInMAm+gEYdyfqDbJh6CohlroefKkNakrDrW2EqknuO7YyJcvIO/IKoPk1ueAio8QbRzcMVEKegKGYI5RPt12JEntG7/GJMosknX+1mqxuYc0LEp3Yv7LnKD/Nt1JA1d9VVSBv1x1NnZ137g6gpFqdB82clhTQJJCkpWw4Ps6YgR0qxv8eenT X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110)(190383065149520)(104084551191319); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040501)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3231220)(944501244)(52105095)(3002001)(6055026)(6041288)(20161123562045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123560045)(6072148)(201708071742011); SRVR:SN1PR12MB0158; BCL:0; PCL:0; RULEID:; SRVR:SN1PR12MB0158; X-Forefront-PRVS: 0604AFA86B X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(39380400002)(39860400002)(376002)(346002)(396003)(366004)(189003)(199004)(53936002)(8666007)(2950100002)(6486002)(6666003)(6916009)(53416004)(3846002)(1076002)(6116002)(4326008)(54906003)(8656006)(2906002)(25786009)(59450400001)(386003)(68736007)(478600001)(48376002)(50466002)(105586002)(2361001)(15650500001)(2351001)(575784001)(86362001)(66066001)(106356001)(47776003)(186003)(16526019)(51416003)(76176011)(52116002)(7696005)(26005)(16586007)(316002)(50226002)(8936002)(8676002)(81156014)(81166006)(36756003)(7416002)(97736004)(305945005)(7736002)(39060400002)(5660300001); DIR:OUT; SFP:1101; SCL:1; SRVR:SN1PR12MB0158; H:wsp141597wss.amd.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN1PR12MB0158; 23:ebGw88B40KMTD5iqwG0vRRnO5NzanawXtFI4XiPHP?= =?us-ascii?Q?ZM6Y7gXqH7pLKQZn/rl1tknURMcAQ8fdp4xhL90z6tgB3//nT5ZxUM6FQXRe?= =?us-ascii?Q?G6q73XtY7/Z549ckV8Sa5WX/x50+ir3aAechHH1maT4Gij1qzAeJWHbYxG2w?= =?us-ascii?Q?DuNA1YWn7ru6DtUgdfa5x4PvedDB/Nuqe+awUrD2fQY/7EFoDmHgJFt5S5c9?= =?us-ascii?Q?PIFaS1ccEVFDDLRm1oqgU1lOlZjaYhmNX6lfFNLDg6UnCW7udIMfU//y60rg?= =?us-ascii?Q?z1JWedEplTxD6V2hFl9nM0w/FPnkaPbAP8fD9Dco0oFPvtPemoRth4OFUlyE?= =?us-ascii?Q?GP3+1bplObpqhldnVKt8dP513upwoBcfxkKVnfXKgfId0Sd44h6vyjn1HjNH?= =?us-ascii?Q?IAcrhPKL+cnjs25CsOFn5F2X0lVdBtkn5t2e6XL2zXoyOAkSgG/z97JL4SRC?= =?us-ascii?Q?qWiCVAX7EMkjq+peae6XIZ92gRSZUCZxTvQ+2uotRT5/hS6+E3vcnEF9jOi7?= =?us-ascii?Q?h4E0lZBbrKW6KWAG4eoYmFCDYqUXk9GcuASylARLvSKEuU+jszYBihRCXVAv?= =?us-ascii?Q?LxfujFYrPLSV8A1I+Pw80U3VDyTRDcwKNspKFnI7STK4x0V+M9XX6EwU4NFk?= =?us-ascii?Q?A+YAncf+glJckSEe+CZ1nXDFtNh9g9hOqEsTnm5Bsk0JQBBDvpbmDSmZDihN?= =?us-ascii?Q?EH+3Npv/2UpP1pj9dFJ586HD3JvtIoXIJkwcab3aaqQruQSYUZTGV2eqZMvl?= =?us-ascii?Q?0S7fut88lFQFLhFxVXk+II8xloxVIMgs/y23P1tY2OE+QoMhWa6LeQYMHczW?= =?us-ascii?Q?M0AoE8GG4JmeSQ6ysst3RZFIK3nZT93Z7VOIrECinFzo/7ZNbRx9CnqkctZD?= =?us-ascii?Q?x4fMnSNZpMwpiAV+HeIOGK0/LCHJrpJO+IN4dFXcQGTQDNpeZYy+Q3YLsiMF?= =?us-ascii?Q?WAILCLgsukta0gX52UCwlkyr34Q0r8UDQgiHvrCH2Bc+bUXVPWvW3gNrxSgk?= =?us-ascii?Q?BPHcYctViYR1Zr+JV+PFdVaub1mWG4lDDU4+psRjkDN3jlFfWEim93p/JZZG?= =?us-ascii?Q?+6lwjbPUb+4tBpURW7zIEZMe9Jn74UdFxllOoCSjzg5N7bmpU1VXYyaUXJ7R?= =?us-ascii?Q?QSANXIi9f889nOMhWBrK7TcdT9PL7NHOFL8Ge8T/pIZv7/unvFUobBUg57wF?= =?us-ascii?Q?pe2P7IPFaZEuqKsMWj33O4SGN1wuBawAZD7zUvLSuX050ow2gIwly6ae+u4r?= =?us-ascii?Q?mWcuvlGsP0m9tD7Gtck2KbarQNkDyFO2XQo7X39CCnFQedypgay1k7CxHtie?= =?us-ascii?Q?xx7x7V0xFZIkkJyZM+6vaG2c8jb5vKK1bJEHfo2xrHM?= X-Microsoft-Antispam-Message-Info: WXi+/t0dmM62+H2hi/hOq55MJreuAQPvBXrf9LYyuQt1oFfT8IYbJw2dvZgkBsExKQNvZpCuhz7e1qp3b6vYd/7HxmvM/F5dB5yI6wRiIVNfw0ExFaSxgBlY41qn0TO0mTNL8vjFqetCLedhZX3g4e/S0YyPjqCQU+Stb/cCQP+nnWmE0aq1gwK61IX2j+wU X-Microsoft-Exchange-Diagnostics: 1; SN1PR12MB0158; 6:Hz1Ayb8vGLJWvL6X1cAP0IAnJqjbwpTgj1TNOpax0r9az3fcpexAMAcYH676hDkC21smM/6hwZgN+rq2zkk77rqn+iL9l9ozUzZaI9EJe2970nDL05waj3mVIuFdWzn+De9Nn7nCqBmeKo7H8OCv1GnzD41Icv4DeS1FvbWAVUQBpb3S+ZcjmZLeZONG4VdmzTsxhq791KW5pl9OHRWeUMPW3xwft/lN2mc6h6O27BOuoclZEUjBmxIZ6/Wnkof9rN8vHQo806iO43Pojp1/SYIm9qsxWD+8xyS4f0FjPAxaTdjnErJ4kWnOJJQpyeFfRqnebgsjcfQ5P+ciJJ4ExiGnoOQSZrbRu83q/4+P5M0=; 5:scLqi/PhgF7e0mtERYIpLC+sBxIQrbzGETUzFdzm4BiKAMXJsLu+VQsqVFyHM2sBqWXnBTYSWtDOHaPWhyJJxKfEbX7R/sxpmJhYiq5PMqHKd1TEPtR/E6TvtAOappbvQNdFYEJ2gSvusTBX2mr5jiigXGbrwrbokLrFI8V7rYs=; 24:sZOKSedbVRsvqz5Q4eYzIetPxjhO6KCBXxl79sErPlqpzkRYBE2ZvVtveJw/Fm0Z168lx2vlq+5c6bNAjMM60GfkLbRxQPkvqaARvEHIKoU=; 7:ukmreX+lfKYTD6CsyOhB/KKThEeBduCM8+gDg5qonYudzRI82YVTjZddzS0t7H9Xlv3QIGHpAuGBfHeKVifnlaGdJ2T5FNxFqcElA/hH37gXlxHcY6YaA23iBNuG1eHsrc5rQwgSasdS2kdixf5r1xevGiFlszrbyphq4V1z4gRCwIPf2v+pJ5yJK9wYsiQN9CLBGdZPCQhYc6gdIujljiyoDJxJwmt5xk1pLjuUGKCICwqU/+ZbYqdEYbVgAy1O SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; SN1PR12MB0158; 20:n9mWQi7+Pfd7khGHdCtdSyCzheZRv+g0q6enTQ8ZtFgXLtuAyd2iyOkzbZkajl54GBKA5XetVVQmH+OHsAdG+xorta5Vf5SUx5/CP2rPqi4bh2jdcHNV/pv9NKnOVjMYO0EbVAjCdOX4nJZreXZ/M/gtqFsMZJWgOTApwR+CGoxOYreduuUnh8I5WcuRn8pqqbfxfzUSDJAC9OQfygDrtnl+C5WyQQzIVtkAGLQhwupeVx0cw/gwBLG7NBA7hT0+ X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2018 16:51:06.0261 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f4bffe8e-fe3f-44de-b971-08d5844b9f31 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR12MB0158 X-detected-operating-system: by eggs.gnu.org: Windows 7 or 8 [fuzzy] X-Received-From: 104.47.38.50 Subject: [Qemu-devel] [PATCH v11 06/28] kvm: update kvm.h to include memory encryption ioctls X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Peter Maydell , Brijesh Singh , kvm@vger.kernel.org, "Michael S. Tsirkin" , Stefan Hajnoczi , Alexander Graf , "Edgar E. Iglesias" , Markus Armbruster , Bruce Rogers , Christian Borntraeger , Marcel Apfelbaum , Borislav Petkov , Thomas Lendacky , Eduardo Habkost , Richard Henderson , "Dr. David Alan Gilbert" , Alistair Francis , Cornelia Huck , Peter Crosthwaite , Paolo Bonzini Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_0 Z_629925259 SPT_0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Updates kmv.h to include memory encryption ioctls and SEV commands. Cc: Christian Borntraeger Cc: Cornelia Huck Cc: Paolo Bonzini Signed-off-by: Brijesh Singh --- linux-headers/linux/kvm.h | 90 +++++++++++++++++++++++++++++++++++++++++++= ++++ 1 file changed, 90 insertions(+) diff --git a/linux-headers/linux/kvm.h b/linux-headers/linux/kvm.h index d92c9b2f0ed2..aed22309950d 100644 --- a/linux-headers/linux/kvm.h +++ b/linux-headers/linux/kvm.h @@ -1362,6 +1362,96 @@ struct kvm_s390_ucas_mapping { /* Available with KVM_CAP_S390_CMMA_MIGRATION */ #define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmm= a_log) #define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma= _log) +/* Memory Encryption Commands */ +#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long) + +struct kvm_enc_region { + __u64 addr; + __u64 size; +}; + +#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_= region) +#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_= region) + +/* Secure Encrypted Virtualization command */ +enum sev_cmd_id { + /* Guest initialization commands */ + KVM_SEV_INIT =3D 0, + KVM_SEV_ES_INIT, + /* Guest launch commands */ + KVM_SEV_LAUNCH_START, + KVM_SEV_LAUNCH_UPDATE_DATA, + KVM_SEV_LAUNCH_UPDATE_VMSA, + KVM_SEV_LAUNCH_SECRET, + KVM_SEV_LAUNCH_MEASURE, + KVM_SEV_LAUNCH_FINISH, + /* Guest migration commands (outgoing) */ + KVM_SEV_SEND_START, + KVM_SEV_SEND_UPDATE_DATA, + KVM_SEV_SEND_UPDATE_VMSA, + KVM_SEV_SEND_FINISH, + /* Guest migration commands (incoming) */ + KVM_SEV_RECEIVE_START, + KVM_SEV_RECEIVE_UPDATE_DATA, + KVM_SEV_RECEIVE_UPDATE_VMSA, + KVM_SEV_RECEIVE_FINISH, + /* Guest status and debug commands */ + KVM_SEV_GUEST_STATUS, + KVM_SEV_DBG_DECRYPT, + KVM_SEV_DBG_ENCRYPT, + /* Guest certificates commands */ + KVM_SEV_CERT_EXPORT, + + KVM_SEV_NR_MAX, +}; + +struct kvm_sev_cmd { + __u32 id; + __u64 data; + __u32 error; + __u32 sev_fd; +}; + +struct kvm_sev_launch_start { + __u32 handle; + __u32 policy; + __u64 dh_uaddr; + __u32 dh_len; + __u64 session_uaddr; + __u32 session_len; +}; + +struct kvm_sev_launch_update_data { + __u64 uaddr; + __u32 len; +}; + + +struct kvm_sev_launch_secret { + __u64 hdr_uaddr; + __u32 hdr_len; + __u64 guest_uaddr; + __u32 guest_len; + __u64 trans_uaddr; + __u32 trans_len; +}; + +struct kvm_sev_launch_measure { + __u64 uaddr; + __u32 len; +}; + +struct kvm_sev_guest_status { + __u32 handle; + __u32 policy; + __u32 state; +}; + +struct kvm_sev_dbg { + __u64 src_uaddr; + __u64 dst_uaddr; + __u32 len; +}; =20 #define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0) #define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1) --=20 2.14.3