~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/arch/x86/include/asm/sev-common.h

Version: ~ [ linux-6.11-rc3 ] ~ [ linux-6.10.4 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.45 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.104 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.164 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.223 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.281 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.319 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /* SPDX-License-Identifier: GPL-2.0 */
  2 /*
  3  * AMD SEV header common between the guest and the hypervisor.
  4  *
  5  * Author: Brijesh Singh <brijesh.singh@amd.com>
  6  */
  7 
  8 #ifndef __ASM_X86_SEV_COMMON_H
  9 #define __ASM_X86_SEV_COMMON_H
 10 
 11 #define GHCB_MSR_INFO_POS               0
 12 #define GHCB_DATA_LOW                   12
 13 #define GHCB_MSR_INFO_MASK              (BIT_ULL(GHCB_DATA_LOW) - 1)
 14 
 15 #define GHCB_DATA(v)                    \
 16         (((unsigned long)(v) & ~GHCB_MSR_INFO_MASK) >> GHCB_DATA_LOW)
 17 
 18 /* SEV Information Request/Response */
 19 #define GHCB_MSR_SEV_INFO_RESP          0x001
 20 #define GHCB_MSR_SEV_INFO_REQ           0x002
 21 
 22 #define GHCB_MSR_SEV_INFO(_max, _min, _cbit)    \
 23         /* GHCBData[63:48] */                   \
 24         ((((_max) & 0xffff) << 48) |            \
 25          /* GHCBData[47:32] */                  \
 26          (((_min) & 0xffff) << 32) |            \
 27          /* GHCBData[31:24] */                  \
 28          (((_cbit) & 0xff)  << 24) |            \
 29          GHCB_MSR_SEV_INFO_RESP)
 30 
 31 #define GHCB_MSR_INFO(v)                ((v) & 0xfffUL)
 32 #define GHCB_MSR_PROTO_MAX(v)           (((v) >> 48) & 0xffff)
 33 #define GHCB_MSR_PROTO_MIN(v)           (((v) >> 32) & 0xffff)
 34 
 35 /* CPUID Request/Response */
 36 #define GHCB_MSR_CPUID_REQ              0x004
 37 #define GHCB_MSR_CPUID_RESP             0x005
 38 #define GHCB_MSR_CPUID_FUNC_POS         32
 39 #define GHCB_MSR_CPUID_FUNC_MASK        0xffffffff
 40 #define GHCB_MSR_CPUID_VALUE_POS        32
 41 #define GHCB_MSR_CPUID_VALUE_MASK       0xffffffff
 42 #define GHCB_MSR_CPUID_REG_POS          30
 43 #define GHCB_MSR_CPUID_REG_MASK         0x3
 44 #define GHCB_CPUID_REQ_EAX              0
 45 #define GHCB_CPUID_REQ_EBX              1
 46 #define GHCB_CPUID_REQ_ECX              2
 47 #define GHCB_CPUID_REQ_EDX              3
 48 #define GHCB_CPUID_REQ(fn, reg)                         \
 49         /* GHCBData[11:0] */                            \
 50         (GHCB_MSR_CPUID_REQ |                           \
 51         /* GHCBData[31:12] */                           \
 52         (((unsigned long)(reg) & 0x3) << 30) |          \
 53         /* GHCBData[63:32] */                           \
 54         (((unsigned long)fn) << 32))
 55 
 56 /* AP Reset Hold */
 57 #define GHCB_MSR_AP_RESET_HOLD_REQ              0x006
 58 #define GHCB_MSR_AP_RESET_HOLD_RESP             0x007
 59 #define GHCB_MSR_AP_RESET_HOLD_RESULT_POS       12
 60 #define GHCB_MSR_AP_RESET_HOLD_RESULT_MASK      GENMASK_ULL(51, 0)
 61 
 62 /* Preferred GHCB GPA Request */
 63 #define GHCB_MSR_PREF_GPA_REQ           0x010
 64 #define GHCB_MSR_GPA_VALUE_POS          12
 65 #define GHCB_MSR_GPA_VALUE_MASK         GENMASK_ULL(51, 0)
 66 
 67 #define GHCB_MSR_PREF_GPA_RESP          0x011
 68 #define GHCB_MSR_PREF_GPA_NONE          0xfffffffffffff
 69 
 70 /* GHCB GPA Register */
 71 #define GHCB_MSR_REG_GPA_REQ            0x012
 72 #define GHCB_MSR_REG_GPA_REQ_VAL(v)                     \
 73         /* GHCBData[63:12] */                           \
 74         (((u64)((v) & GENMASK_ULL(51, 0)) << 12) |      \
 75         /* GHCBData[11:0] */                            \
 76         GHCB_MSR_REG_GPA_REQ)
 77 
 78 #define GHCB_MSR_REG_GPA_RESP           0x013
 79 #define GHCB_MSR_REG_GPA_RESP_VAL(v)                    \
 80         /* GHCBData[63:12] */                           \
 81         (((u64)(v) & GENMASK_ULL(63, 12)) >> 12)
 82 
 83 /*
 84  * SNP Page State Change Operation
 85  *
 86  * GHCBData[55:52] - Page operation:
 87  *   0x0001     Page assignment, Private
 88  *   0x0002     Page assignment, Shared
 89  */
 90 enum psc_op {
 91         SNP_PAGE_STATE_PRIVATE = 1,
 92         SNP_PAGE_STATE_SHARED,
 93 };
 94 
 95 #define GHCB_MSR_PSC_REQ                0x014
 96 #define GHCB_MSR_PSC_REQ_GFN(gfn, op)                   \
 97         /* GHCBData[55:52] */                           \
 98         (((u64)((op) & 0xf) << 52) |                    \
 99         /* GHCBData[51:12] */                           \
100         ((u64)((gfn) & GENMASK_ULL(39, 0)) << 12) |     \
101         /* GHCBData[11:0] */                            \
102         GHCB_MSR_PSC_REQ)
103 
104 #define GHCB_MSR_PSC_REQ_TO_GFN(msr) (((msr) & GENMASK_ULL(51, 12)) >> 12)
105 #define GHCB_MSR_PSC_REQ_TO_OP(msr) (((msr) & GENMASK_ULL(55, 52)) >> 52)
106 
107 #define GHCB_MSR_PSC_RESP               0x015
108 #define GHCB_MSR_PSC_RESP_VAL(val)                      \
109         /* GHCBData[63:32] */                           \
110         (((u64)(val) & GENMASK_ULL(63, 32)) >> 32)
111 
112 /* Set highest bit as a generic error response */
113 #define GHCB_MSR_PSC_RESP_ERROR (BIT_ULL(63) | GHCB_MSR_PSC_RESP)
114 
115 /* GHCB Run at VMPL Request/Response */
116 #define GHCB_MSR_VMPL_REQ               0x016
117 #define GHCB_MSR_VMPL_REQ_LEVEL(v)                      \
118         /* GHCBData[39:32] */                           \
119         (((u64)(v) & GENMASK_ULL(7, 0) << 32) |         \
120         /* GHCBDdata[11:0] */                           \
121         GHCB_MSR_VMPL_REQ)
122 
123 #define GHCB_MSR_VMPL_RESP              0x017
124 #define GHCB_MSR_VMPL_RESP_VAL(v)                       \
125         /* GHCBData[63:32] */                           \
126         (((u64)(v) & GENMASK_ULL(63, 32)) >> 32)
127 
128 /* GHCB Hypervisor Feature Request/Response */
129 #define GHCB_MSR_HV_FT_REQ              0x080
130 #define GHCB_MSR_HV_FT_RESP             0x081
131 #define GHCB_MSR_HV_FT_POS              12
132 #define GHCB_MSR_HV_FT_MASK             GENMASK_ULL(51, 0)
133 #define GHCB_MSR_HV_FT_RESP_VAL(v)                      \
134         /* GHCBData[63:12] */                           \
135         (((u64)(v) & GENMASK_ULL(63, 12)) >> 12)
136 
137 #define GHCB_HV_FT_SNP                  BIT_ULL(0)
138 #define GHCB_HV_FT_SNP_AP_CREATION      BIT_ULL(1)
139 #define GHCB_HV_FT_SNP_MULTI_VMPL       BIT_ULL(5)
140 
141 /*
142  * SNP Page State Change NAE event
143  *   The VMGEXIT_PSC_MAX_ENTRY determines the size of the PSC structure, which
144  *   is a local stack variable in set_pages_state(). Do not increase this value
145  *   without evaluating the impact to stack usage.
146  *
147  *   Use VMGEXIT_PSC_MAX_COUNT in cases where the actual GHCB-defined max value
148  *   is needed, such as when processing GHCB requests on the hypervisor side.
149  */
150 #define VMGEXIT_PSC_MAX_ENTRY           64
151 #define VMGEXIT_PSC_MAX_COUNT           253
152 
153 #define VMGEXIT_PSC_ERROR_GENERIC       (0x100UL << 32)
154 #define VMGEXIT_PSC_ERROR_INVALID_HDR   ((1UL << 32) | 1)
155 #define VMGEXIT_PSC_ERROR_INVALID_ENTRY ((1UL << 32) | 2)
156 
157 #define VMGEXIT_PSC_OP_PRIVATE          1
158 #define VMGEXIT_PSC_OP_SHARED           2
159 
160 struct psc_hdr {
161         u16 cur_entry;
162         u16 end_entry;
163         u32 reserved;
164 } __packed;
165 
166 struct psc_entry {
167         u64     cur_page        : 12,
168                 gfn             : 40,
169                 operation       : 4,
170                 pagesize        : 1,
171                 reserved        : 7;
172 } __packed;
173 
174 struct snp_psc_desc {
175         struct psc_hdr hdr;
176         struct psc_entry entries[VMGEXIT_PSC_MAX_ENTRY];
177 } __packed;
178 
179 #define GHCB_MSR_TERM_REQ               0x100
180 #define GHCB_MSR_TERM_REASON_SET_POS    12
181 #define GHCB_MSR_TERM_REASON_SET_MASK   0xf
182 #define GHCB_MSR_TERM_REASON_POS        16
183 #define GHCB_MSR_TERM_REASON_MASK       0xff
184 
185 #define GHCB_SEV_TERM_REASON(reason_set, reason_val)    \
186         /* GHCBData[15:12] */                           \
187         (((((u64)reason_set) &  0xf) << 12) |           \
188          /* GHCBData[23:16] */                          \
189         ((((u64)reason_val) & 0xff) << 16))
190 
191 /* Error codes from reason set 0 */
192 #define SEV_TERM_SET_GEN                0
193 #define GHCB_SEV_ES_GEN_REQ             0
194 #define GHCB_SEV_ES_PROT_UNSUPPORTED    1
195 #define GHCB_SNP_UNSUPPORTED            2
196 
197 /* Linux-specific reason codes (used with reason set 1) */
198 #define SEV_TERM_SET_LINUX              1
199 #define GHCB_TERM_REGISTER              0       /* GHCB GPA registration failure */
200 #define GHCB_TERM_PSC                   1       /* Page State Change failure */
201 #define GHCB_TERM_PVALIDATE             2       /* Pvalidate failure */
202 #define GHCB_TERM_NOT_VMPL0             3       /* SNP guest is not running at VMPL-0 */
203 #define GHCB_TERM_CPUID                 4       /* CPUID-validation failure */
204 #define GHCB_TERM_CPUID_HV              5       /* CPUID failure during hypervisor fallback */
205 #define GHCB_TERM_SECRETS_PAGE          6       /* Secrets page failure */
206 #define GHCB_TERM_NO_SVSM               7       /* SVSM is not advertised in the secrets page */
207 #define GHCB_TERM_SVSM_VMPL0            8       /* SVSM is present but has set VMPL to 0 */
208 #define GHCB_TERM_SVSM_CAA              9       /* SVSM is present but CAA is not page aligned */
209 
210 #define GHCB_RESP_CODE(v)               ((v) & GHCB_MSR_INFO_MASK)
211 
212 /*
213  * Error codes related to GHCB input that can be communicated back to the guest
214  * by setting the lower 32-bits of the GHCB SW_EXITINFO1 field to 2.
215  */
216 #define GHCB_ERR_NOT_REGISTERED         1
217 #define GHCB_ERR_INVALID_USAGE          2
218 #define GHCB_ERR_INVALID_SCRATCH_AREA   3
219 #define GHCB_ERR_MISSING_INPUT          4
220 #define GHCB_ERR_INVALID_INPUT          5
221 #define GHCB_ERR_INVALID_EVENT          6
222 
223 #endif
224 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php