| 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
| 2 | /* |
| 3 | * AMD SEV header common between the guest and the hypervisor. |
| 4 | * |
| 5 | * Author: Brijesh Singh <brijesh.singh@amd.com> |
| 6 | */ |
| 7 | |
| 8 | #ifndef __ASM_X86_SEV_COMMON_H |
| 9 | #define __ASM_X86_SEV_COMMON_H |
| 10 | |
| 11 | #define GHCB_MSR_INFO_POS 0 |
| 12 | #define GHCB_DATA_LOW 12 |
| 13 | #define GHCB_MSR_INFO_MASK (BIT_ULL(GHCB_DATA_LOW) - 1) |
| 14 | |
| 15 | #define GHCB_DATA(v) \ |
| 16 | (((unsigned long)(v) & ~GHCB_MSR_INFO_MASK) >> GHCB_DATA_LOW) |
| 17 | |
| 18 | /* SEV Information Request/Response */ |
| 19 | #define GHCB_MSR_SEV_INFO_RESP 0x001 |
| 20 | #define GHCB_MSR_SEV_INFO_REQ 0x002 |
| 21 | |
| 22 | #define GHCB_MSR_SEV_INFO(_max, _min, _cbit) \ |
| 23 | /* GHCBData[63:48] */ \ |
| 24 | ((((_max) & 0xffff) << 48) | \ |
| 25 | /* GHCBData[47:32] */ \ |
| 26 | (((_min) & 0xffff) << 32) | \ |
| 27 | /* GHCBData[31:24] */ \ |
| 28 | (((_cbit) & 0xff) << 24) | \ |
| 29 | GHCB_MSR_SEV_INFO_RESP) |
| 30 | |
| 31 | #define GHCB_MSR_INFO(v) ((v) & 0xfffUL) |
| 32 | #define GHCB_MSR_PROTO_MAX(v) (((v) >> 48) & 0xffff) |
| 33 | #define GHCB_MSR_PROTO_MIN(v) (((v) >> 32) & 0xffff) |
| 34 | |
| 35 | /* CPUID Request/Response */ |
| 36 | #define GHCB_MSR_CPUID_REQ 0x004 |
| 37 | #define GHCB_MSR_CPUID_RESP 0x005 |
| 38 | #define GHCB_MSR_CPUID_FUNC_POS 32 |
| 39 | #define GHCB_MSR_CPUID_FUNC_MASK 0xffffffff |
| 40 | #define GHCB_MSR_CPUID_VALUE_POS 32 |
| 41 | #define GHCB_MSR_CPUID_VALUE_MASK 0xffffffff |
| 42 | #define GHCB_MSR_CPUID_REG_POS 30 |
| 43 | #define GHCB_MSR_CPUID_REG_MASK 0x3 |
| 44 | #define GHCB_CPUID_REQ_EAX 0 |
| 45 | #define GHCB_CPUID_REQ_EBX 1 |
| 46 | #define GHCB_CPUID_REQ_ECX 2 |
| 47 | #define GHCB_CPUID_REQ_EDX 3 |
| 48 | #define GHCB_CPUID_REQ(fn, reg) \ |
| 49 | /* GHCBData[11:0] */ \ |
| 50 | (GHCB_MSR_CPUID_REQ | \ |
| 51 | /* GHCBData[31:12] */ \ |
| 52 | (((unsigned long)(reg) & 0x3) << 30) | \ |
| 53 | /* GHCBData[63:32] */ \ |
| 54 | (((unsigned long)fn) << 32)) |
| 55 | |
| 56 | /* AP Reset Hold */ |
| 57 | #define GHCB_MSR_AP_RESET_HOLD_REQ 0x006 |
| 58 | #define GHCB_MSR_AP_RESET_HOLD_RESP 0x007 |
| 59 | #define GHCB_MSR_AP_RESET_HOLD_RESULT_POS 12 |
| 60 | #define GHCB_MSR_AP_RESET_HOLD_RESULT_MASK GENMASK_ULL(51, 0) |
| 61 | |
| 62 | /* Preferred GHCB GPA Request */ |
| 63 | #define GHCB_MSR_PREF_GPA_REQ 0x010 |
| 64 | #define GHCB_MSR_GPA_VALUE_POS 12 |
| 65 | #define GHCB_MSR_GPA_VALUE_MASK GENMASK_ULL(51, 0) |
| 66 | |
| 67 | #define GHCB_MSR_PREF_GPA_RESP 0x011 |
| 68 | #define GHCB_MSR_PREF_GPA_NONE 0xfffffffffffff |
| 69 | |
| 70 | /* GHCB GPA Register */ |
| 71 | #define GHCB_MSR_REG_GPA_REQ 0x012 |
| 72 | #define GHCB_MSR_REG_GPA_REQ_VAL(v) \ |
| 73 | /* GHCBData[63:12] */ \ |
| 74 | (((u64)((v) & GENMASK_ULL(51, 0)) << 12) | \ |
| 75 | /* GHCBData[11:0] */ \ |
| 76 | GHCB_MSR_REG_GPA_REQ) |
| 77 | |
| 78 | #define GHCB_MSR_REG_GPA_RESP 0x013 |
| 79 | #define GHCB_MSR_REG_GPA_RESP_VAL(v) \ |
| 80 | /* GHCBData[63:12] */ \ |
| 81 | (((u64)(v) & GENMASK_ULL(63, 12)) >> 12) |
| 82 | |
| 83 | /* |
| 84 | * SNP Page State Change Operation |
| 85 | * |
| 86 | * GHCBData[55:52] - Page operation: |
| 87 | * 0x0001 Page assignment, Private |
| 88 | * 0x0002 Page assignment, Shared |
| 89 | */ |
| 90 | enum psc_op { |
| 91 | SNP_PAGE_STATE_PRIVATE = 1, |
| 92 | SNP_PAGE_STATE_SHARED, |
| 93 | }; |
| 94 | |
| 95 | #define GHCB_MSR_PSC_REQ 0x014 |
| 96 | #define GHCB_MSR_PSC_REQ_GFN(gfn, op) \ |
| 97 | /* GHCBData[55:52] */ \ |
| 98 | (((u64)((op) & 0xf) << 52) | \ |
| 99 | /* GHCBData[51:12] */ \ |
| 100 | ((u64)((gfn) & GENMASK_ULL(39, 0)) << 12) | \ |
| 101 | /* GHCBData[11:0] */ \ |
| 102 | GHCB_MSR_PSC_REQ) |
| 103 | |
| 104 | #define GHCB_MSR_PSC_REQ_TO_GFN(msr) (((msr) & GENMASK_ULL(51, 12)) >> 12) |
| 105 | #define GHCB_MSR_PSC_REQ_TO_OP(msr) (((msr) & GENMASK_ULL(55, 52)) >> 52) |
| 106 | |
| 107 | #define GHCB_MSR_PSC_RESP 0x015 |
| 108 | #define GHCB_MSR_PSC_RESP_VAL(val) \ |
| 109 | /* GHCBData[63:32] */ \ |
| 110 | (((u64)(val) & GENMASK_ULL(63, 32)) >> 32) |
| 111 | |
| 112 | /* Set highest bit as a generic error response */ |
| 113 | #define GHCB_MSR_PSC_RESP_ERROR (BIT_ULL(63) | GHCB_MSR_PSC_RESP) |
| 114 | |
| 115 | /* GHCB Run at VMPL Request/Response */ |
| 116 | #define GHCB_MSR_VMPL_REQ 0x016 |
| 117 | #define GHCB_MSR_VMPL_REQ_LEVEL(v) \ |
| 118 | /* GHCBData[39:32] */ \ |
| 119 | ((((u64)(v) & GENMASK_ULL(7, 0)) << 32) | \ |
| 120 | /* GHCBDdata[11:0] */ \ |
| 121 | GHCB_MSR_VMPL_REQ) |
| 122 | |
| 123 | #define GHCB_MSR_VMPL_RESP 0x017 |
| 124 | #define GHCB_MSR_VMPL_RESP_VAL(v) \ |
| 125 | /* GHCBData[63:32] */ \ |
| 126 | (((u64)(v) & GENMASK_ULL(63, 32)) >> 32) |
| 127 | |
| 128 | /* GHCB Hypervisor Feature Request/Response */ |
| 129 | #define GHCB_MSR_HV_FT_REQ 0x080 |
| 130 | #define GHCB_MSR_HV_FT_RESP 0x081 |
| 131 | #define GHCB_MSR_HV_FT_POS 12 |
| 132 | #define GHCB_MSR_HV_FT_MASK GENMASK_ULL(51, 0) |
| 133 | #define GHCB_MSR_HV_FT_RESP_VAL(v) \ |
| 134 | /* GHCBData[63:12] */ \ |
| 135 | (((u64)(v) & GENMASK_ULL(63, 12)) >> 12) |
| 136 | |
| 137 | #define GHCB_HV_FT_SNP BIT_ULL(0) |
| 138 | #define GHCB_HV_FT_SNP_AP_CREATION BIT_ULL(1) |
| 139 | #define GHCB_HV_FT_SNP_MULTI_VMPL BIT_ULL(5) |
| 140 | |
| 141 | /* |
| 142 | * SNP Page State Change NAE event |
| 143 | * The VMGEXIT_PSC_MAX_ENTRY determines the size of the PSC structure, which |
| 144 | * is a local stack variable in set_pages_state(). Do not increase this value |
| 145 | * without evaluating the impact to stack usage. |
| 146 | * |
| 147 | * Use VMGEXIT_PSC_MAX_COUNT in cases where the actual GHCB-defined max value |
| 148 | * is needed, such as when processing GHCB requests on the hypervisor side. |
| 149 | */ |
| 150 | #define VMGEXIT_PSC_MAX_ENTRY 64 |
| 151 | #define VMGEXIT_PSC_MAX_COUNT 253 |
| 152 | |
| 153 | #define VMGEXIT_PSC_ERROR_GENERIC (0x100UL << 32) |
| 154 | #define VMGEXIT_PSC_ERROR_INVALID_HDR ((1UL << 32) | 1) |
| 155 | #define VMGEXIT_PSC_ERROR_INVALID_ENTRY ((1UL << 32) | 2) |
| 156 | |
| 157 | #define VMGEXIT_PSC_OP_PRIVATE 1 |
| 158 | #define VMGEXIT_PSC_OP_SHARED 2 |
| 159 | |
| 160 | struct psc_hdr { |
| 161 | u16 cur_entry; |
| 162 | u16 end_entry; |
| 163 | u32 reserved; |
| 164 | } __packed; |
| 165 | |
| 166 | struct psc_entry { |
| 167 | u64 cur_page : 12, |
| 168 | gfn : 40, |
| 169 | operation : 4, |
| 170 | pagesize : 1, |
| 171 | reserved : 7; |
| 172 | } __packed; |
| 173 | |
| 174 | struct snp_psc_desc { |
| 175 | struct psc_hdr hdr; |
| 176 | struct psc_entry entries[VMGEXIT_PSC_MAX_ENTRY]; |
| 177 | } __packed; |
| 178 | |
| 179 | #define GHCB_MSR_TERM_REQ 0x100 |
| 180 | #define GHCB_MSR_TERM_REASON_SET_POS 12 |
| 181 | #define GHCB_MSR_TERM_REASON_SET_MASK 0xf |
| 182 | #define GHCB_MSR_TERM_REASON_POS 16 |
| 183 | #define GHCB_MSR_TERM_REASON_MASK 0xff |
| 184 | |
| 185 | #define GHCB_SEV_TERM_REASON(reason_set, reason_val) \ |
| 186 | /* GHCBData[15:12] */ \ |
| 187 | (((((u64)reason_set) & 0xf) << 12) | \ |
| 188 | /* GHCBData[23:16] */ \ |
| 189 | ((((u64)reason_val) & 0xff) << 16)) |
| 190 | |
| 191 | /* Error codes from reason set 0 */ |
| 192 | #define SEV_TERM_SET_GEN 0 |
| 193 | #define GHCB_SEV_ES_GEN_REQ 0 |
| 194 | #define GHCB_SEV_ES_PROT_UNSUPPORTED 1 |
| 195 | #define GHCB_SNP_UNSUPPORTED 2 |
| 196 | |
| 197 | /* Linux-specific reason codes (used with reason set 1) */ |
| 198 | #define SEV_TERM_SET_LINUX 1 |
| 199 | #define GHCB_TERM_REGISTER 0 /* GHCB GPA registration failure */ |
| 200 | #define GHCB_TERM_PSC 1 /* Page State Change failure */ |
| 201 | #define GHCB_TERM_PVALIDATE 2 /* Pvalidate failure */ |
| 202 | #define GHCB_TERM_NOT_VMPL0 3 /* SNP guest is not running at VMPL-0 */ |
| 203 | #define GHCB_TERM_CPUID 4 /* CPUID-validation failure */ |
| 204 | #define GHCB_TERM_CPUID_HV 5 /* CPUID failure during hypervisor fallback */ |
| 205 | #define GHCB_TERM_SECRETS_PAGE 6 /* Secrets page failure */ |
| 206 | #define GHCB_TERM_NO_SVSM 7 /* SVSM is not advertised in the secrets page */ |
| 207 | #define GHCB_TERM_SVSM_VMPL0 8 /* SVSM is present but has set VMPL to 0 */ |
| 208 | #define GHCB_TERM_SVSM_CAA 9 /* SVSM is present but CAA is not page aligned */ |
| 209 | #define GHCB_TERM_SECURE_TSC 10 /* Secure TSC initialization failed */ |
| 210 | #define GHCB_TERM_SVSM_CA_REMAP_FAIL 11 /* SVSM is present but CA could not be remapped */ |
| 211 | #define GHCB_TERM_SAVIC_FAIL 12 /* Secure AVIC-specific failure */ |
| 212 | |
| 213 | #define GHCB_RESP_CODE(v) ((v) & GHCB_MSR_INFO_MASK) |
| 214 | |
| 215 | /* |
| 216 | * GHCB-defined return codes that are communicated back to the guest via |
| 217 | * SW_EXITINFO1. |
| 218 | */ |
| 219 | #define GHCB_HV_RESP_NO_ACTION 0 |
| 220 | #define GHCB_HV_RESP_ISSUE_EXCEPTION 1 |
| 221 | #define GHCB_HV_RESP_MALFORMED_INPUT 2 |
| 222 | |
| 223 | /* |
| 224 | * GHCB-defined sub-error codes for malformed input (see above) that are |
| 225 | * communicated back to the guest via SW_EXITINFO2[31:0]. |
| 226 | */ |
| 227 | #define GHCB_ERR_NOT_REGISTERED 1 |
| 228 | #define GHCB_ERR_INVALID_USAGE 2 |
| 229 | #define GHCB_ERR_INVALID_SCRATCH_AREA 3 |
| 230 | #define GHCB_ERR_MISSING_INPUT 4 |
| 231 | #define GHCB_ERR_INVALID_INPUT 5 |
| 232 | #define GHCB_ERR_INVALID_EVENT 6 |
| 233 | |
| 234 | struct sev_config { |
| 235 | __u64 debug : 1, |
| 236 | |
| 237 | /* |
| 238 | * Indicates when the per-CPU GHCB has been created and registered |
| 239 | * and thus can be used by the BSP instead of the early boot GHCB. |
| 240 | * |
| 241 | * For APs, the per-CPU GHCB is created before they are started |
| 242 | * and registered upon startup, so this flag can be used globally |
| 243 | * for the BSP and APs. |
| 244 | */ |
| 245 | ghcbs_initialized : 1, |
| 246 | |
| 247 | /* |
| 248 | * Indicates when the per-CPU SVSM CA is to be used instead of the |
| 249 | * boot SVSM CA. |
| 250 | * |
| 251 | * For APs, the per-CPU SVSM CA is created as part of the AP |
| 252 | * bringup, so this flag can be used globally for the BSP and APs. |
| 253 | */ |
| 254 | use_cas : 1, |
| 255 | |
| 256 | __reserved : 61; |
| 257 | }; |
| 258 | |
| 259 | extern struct sev_config sev_cfg; |
| 260 | |
| 261 | #endif |
| 262 | |