Updates kmv.h to include memory encryption ioctls and SEV command structure introduced in KVM RFC [1]
[1] http://marc.info/?l=linux-mm&m=148846752931115&w=2 Signed-off-by: Brijesh Singh <brijesh.si...@amd.com> --- linux-headers/linux/kvm.h | 100 +++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 100 insertions(+) diff --git a/linux-headers/linux/kvm.h b/linux-headers/linux/kvm.h index 4e082a8..1050f53 100644 --- a/linux-headers/linux/kvm.h +++ b/linux-headers/linux/kvm.h @@ -1300,6 +1300,106 @@ struct kvm_s390_ucas_mapping { #define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state) /* Available with KVM_CAP_X86_SMM */ #define KVM_SMI _IO(KVMIO, 0xb7) +/* Memory Encryption Commands */ +#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xb8, unsigned long) + +/* Secure Encrypted Virtualization mode */ +enum sev_cmd_id { + /* Guest launch commands */ + KVM_SEV_LAUNCH_START = 0, + KVM_SEV_LAUNCH_UPDATE_DATA, + KVM_SEV_LAUNCH_MEASURE, + KVM_SEV_LAUNCH_FINISH, + /* Guest migration commands (outgoing) */ + KVM_SEV_SEND_START, + KVM_SEV_SEND_UPDATE_DATA, + KVM_SEV_SEND_FINISH, + /* Guest migration commands (incoming) */ + KVM_SEV_RECEIVE_START, + KVM_SEV_RECEIVE_UPDATE_DATA, + KVM_SEV_RECEIVE_FINISH, + /* Guest status and debug commands */ + KVM_SEV_GUEST_STATUS, + KVM_SEV_DBG_DECRYPT, + KVM_SEV_DBG_ENCRYPT, + + KVM_SEV_NR_MAX, +}; + +struct kvm_sev_cmd { + __u32 id; + __u64 data; + __u32 error; + __u32 sev_fd; +}; + +struct kvm_sev_launch_start { + __u32 handle; + __u32 policy; + __u64 dh_cert_data; + __u32 dh_cert_length; + __u64 session_data; + __u32 session_length; +}; + +struct kvm_sev_launch_update_data { + __u64 address; + __u32 length; +}; + +struct kvm_sev_launch_measure { + __u64 address; + __u32 length; +}; + +struct kvm_sev_send_start { + __u64 pdh_cert_data; + __u32 pdh_cert_length; + __u64 plat_cert_data; + __u32 plat_cert_length; + __u64 amd_cert_data; + __u32 amd_cert_length; + __u64 session_data; + __u32 session_length; +}; + +struct kvm_sev_send_update_data { + __u64 hdr_data; + __u32 hdr_length; + __u64 guest_address; + __u32 guest_length; + __u64 host_address; + __u32 host_length; +}; + +struct kvm_sev_receive_start { + __u32 handle; + __u64 pdh_cert_data; + __u32 pdh_cert_length; + __u64 session_data; + __u32 session_length; +}; + +struct kvm_sev_receive_update_data { + __u64 hdr_data; + __u32 hdr_length; + __u64 guest_address; + __u32 guest_length; + __u64 host_address; + __u32 host_length; +}; + +struct kvm_sev_guest_status { + __u32 handle; + __u32 policy; + __u32 state; +}; + +struct kvm_sev_dbg { + __u64 src_addr; + __u64 dst_addr; + __u32 length; +}; #define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0) #define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)