From nobody Tue Dec 16 11:50:05 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass header.i=teddy.astie@vates.tech; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=reject dis=none) header.from=vates.tech ARC-Seal: i=1; a=rsa-sha256; t=1747387944; cv=none; d=zohomail.com; s=zohoarc; b=bHdpXZC1aQFJslqRMWZAmboZ48Vkfy0Pk6XmgK+yERx+G85twVtKOysDztB66xGGIuB1RflQkPTtTbFfc9ywlu6fjrVgjf6JDUZdYnzc3RafM0cq1sHzTNAmpaYBtWP/9iztxuTBzNxOPFPpIsAyHqJmPLNzKI/tt4fby3XeUJk= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1747387944; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Bm3fwAmp4WAbuBybmOkVHtGEJRz6Fv9FQEpbNnQjujk=; b=PIcpDCRECv98QPGimh3sLK8zVHZ1wPHE+nHrw8fRe3qmqUYo8wzoSCrPhMDbJh8MlHmSsi0FnHTID8bErGF3RAd8TEW8mS12Ng9lgx4L3tP941hhrJIauHeV4P1DbmKjRuwCFpo8SNGp1RdF97oZKIOujMTshZa9FJfpb1brX4c= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=teddy.astie@vates.tech; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1747387944428757.4465760537173; Fri, 16 May 2025 02:32:24 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.986617.1372147 (Exim 4.92) (envelope-from ) id 1uFrPu-0007vL-Il; Fri, 16 May 2025 09:31:46 +0000 Received: by outflank-mailman (output) from mailman id 986617.1372147; Fri, 16 May 2025 09:31:46 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uFrPu-0007vD-Du; Fri, 16 May 2025 09:31:46 +0000 Received: by outflank-mailman (input) for mailman id 986617; Fri, 16 May 2025 09:31:45 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uFrPt-0007iv-MZ for xen-devel@lists.xenproject.org; Fri, 16 May 2025 09:31:45 +0000 Received: from mail133-28.atl131.mandrillapp.com (mail133-28.atl131.mandrillapp.com [198.2.133.28]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 94541256-3238-11f0-9eb6-5ba50f476ded; Fri, 16 May 2025 11:31:44 +0200 (CEST) Received: from pmta13.mandrill.prod.atl01.rsglab.com (localhost [127.0.0.1]) by mail133-28.atl131.mandrillapp.com (Mailchimp) with ESMTP id 4ZzMKP3MYszMQxXQJ for ; Fri, 16 May 2025 09:31:37 +0000 (GMT) Received: from [37.26.189.201] by mandrillapp.com id ff315deb4bd344d39271417cf5ae7a76; Fri, 16 May 2025 09:31:37 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 94541256-3238-11f0-9eb6-5ba50f476ded DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mandrillapp.com; s=mte1; t=1747387897; x=1747657897; bh=Bm3fwAmp4WAbuBybmOkVHtGEJRz6Fv9FQEpbNnQjujk=; h=From:Subject:To:Cc:Message-Id:In-Reply-To:References:Feedback-ID: Date:MIME-Version:Content-Type:Content-Transfer-Encoding:CC:Date: Subject:From; b=1Gc0hXi6YayeadhiAlCyKeJLWh2XbM+glWXIDDxBW9wVcyWvL7PzQBZzvVO1XZwpd FL23g+zTG72IuyzKi8Woo8O1nKuCvU/569B2ne9CJaoKd75adM2kAMXckw0OMaHpo9 cdePv1QaI5fgDYBnnj/KS+iy6C9S2vBROGvDxb2KCNKSJUVk8FwgOE94GzYxy8k9x+ MVFFVtycWnh3vxtbDMZp0G7v9OIYPV0L7BPr9poymPmlcLMizOlV4pd5Y2SMxEFVnJ nT49qfa4s7LgtWqp4WVPM8n1IYePT5SP4egvikS0J7omD7vp8rIO9DFuaZ4wo8EDrT gSH+7y+Gl9+ow== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vates.tech; s=mte1; t=1747387897; x=1747648397; i=teddy.astie@vates.tech; bh=Bm3fwAmp4WAbuBybmOkVHtGEJRz6Fv9FQEpbNnQjujk=; h=From:Subject:To:Cc:Message-Id:In-Reply-To:References:Feedback-ID: Date:MIME-Version:Content-Type:Content-Transfer-Encoding:CC:Date: Subject:From; b=RAw6lC0xk7AIzin+hubuQg5zDWFx+wP+WCFQi4xWdPN9wQVQgm3Pi5aSY789FCQTz /G32elnJqJapnDKel/6uItODiq6PRgRv2QIHnubIHrNzTprARNqoSnAfrX04goK7ZZ cQIwOULtIFKg3W16iyu4eAcpulgde5EPTCNaRyZN4MnptBl/e2mXUnAQGkDX0D3ddK LogKQYkqX3Y5Am9LANp8l8OZEy7DsOWix+x7S5+pRzZdEjfymglXhD5zThAWpfbp1O JlX1E024o8OV8Bx+HVoO88Eh+Fd5X9Hr+1LlsDSECAntyLf6hUxoERFM7ftxjCJRNZ 5sUfV0+wO7VRQ== From: "Teddy Astie" Subject: =?utf-8?Q?[RFC=20PATCH=2002/16]=20x86/svm:=20Move=20svm=5Fdomain=20structure=20to=20svm.h?= X-Mailer: git-send-email 2.49.0 X-Bm-Disclaimer: Yes X-Bm-Milter-Handled: 4ffbd6c1-ee69-4e1b-aabd-f977039bd3e2 X-Bm-Transport-Timestamp: 1747387896340 To: xen-devel@lists.xenproject.org Cc: "Teddy Astie" , "Jan Beulich" , "Andrew Cooper" , "=?utf-8?Q?Roger=20Pau=20Monn=C3=A9?=" Message-Id: In-Reply-To: References: X-Native-Encoded: 1 X-Report-Abuse: =?UTF-8?Q?Please=20forward=20a=20copy=20of=20this=20message,=20including=20all=20headers,=20to=20abuse@mandrill.com.=20You=20can=20also=20report=20abuse=20here:=20https://mandrillapp.com/contact/abuse=3Fid=3D30504962.ff315deb4bd344d39271417cf5ae7a76?= X-Mandrill-User: md_30504962 Feedback-ID: 30504962:30504962.20250516:md Date: Fri, 16 May 2025 09:31:37 +0000 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity teddy.astie@vates.tech) (identity @mandrillapp.com) X-ZM-MESSAGEID: 1747387945077116600 Content-Type: text/plain; charset="utf-8" struct svm_domain was in vmcb.h which is meant for VMCB specific operations and values, move it to svm.h where it belongs. Signed-off-by: Teddy Astie --- xen/arch/x86/include/asm/hvm/domain.h | 1 + xen/arch/x86/include/asm/hvm/svm/svm.h | 11 +++++++++++ xen/arch/x86/include/asm/hvm/svm/vmcb.h | 11 ----------- 3 files changed, 12 insertions(+), 11 deletions(-) diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/a= sm/hvm/domain.h index 333501d5f2..2608bcfad2 100644 --- a/xen/arch/x86/include/asm/hvm/domain.h +++ b/xen/arch/x86/include/asm/hvm/domain.h @@ -16,6 +16,7 @@ #include #include #include +#include =20 #ifdef CONFIG_MEM_SHARING struct mem_sharing_domain diff --git a/xen/arch/x86/include/asm/hvm/svm/svm.h b/xen/arch/x86/include/= asm/hvm/svm/svm.h index 4eeeb25da9..32f6e48e30 100644 --- a/xen/arch/x86/include/asm/hvm/svm/svm.h +++ b/xen/arch/x86/include/asm/hvm/svm/svm.h @@ -21,6 +21,17 @@ bool svm_load_segs(unsigned int ldt_ents, unsigned long = ldt_base, unsigned long fs_base, unsigned long gs_base, unsigned long gs_shadow); =20 +struct svm_domain { + /* OSVW MSRs */ + union { + uint64_t raw[2]; + struct { + uint64_t length; + uint64_t status; + }; + } osvw; +}; + extern u32 svm_feature_flags; =20 #define SVM_FEATURE_NPT 0 /* Nested page table support */ diff --git a/xen/arch/x86/include/asm/hvm/svm/vmcb.h b/xen/arch/x86/include= /asm/hvm/svm/vmcb.h index 28f715e376..3d871b6135 100644 --- a/xen/arch/x86/include/asm/hvm/svm/vmcb.h +++ b/xen/arch/x86/include/asm/hvm/svm/vmcb.h @@ -548,17 +548,6 @@ struct vmcb_struct { u64 res18[291]; }; =20 -struct svm_domain { - /* OSVW MSRs */ - union { - uint64_t raw[2]; - struct { - uint64_t length; - uint64_t status; - }; - } osvw; -}; - /* * VMRUN doesn't switch fs/gs/tr/ldtr and SHADOWGS/SYSCALL/SYSENTER state. * Therefore, guest state is in the hardware registers when servicing a --=20 2.49.0 Teddy Astie | Vates XCP-ng Developer XCP-ng & Xen Orchestra - Vates solutions web: https://vates.tech