1 /* SPDX-License-Identifier: GPL-2.0 */
3 * AMD SEV header common between the guest and the hypervisor.
5 * Author: Brijesh Singh <brijesh.singh@amd.com>
8 #ifndef __ASM_X86_SEV_COMMON_H
9 #define __ASM_X86_SEV_COMMON_H
11 #define GHCB_MSR_INFO_POS 0
12 #define GHCB_DATA_LOW 12
13 #define GHCB_MSR_INFO_MASK (BIT_ULL(GHCB_DATA_LOW) - 1)
15 #define GHCB_DATA(v) \
16 (((unsigned long)(v) & ~GHCB_MSR_INFO_MASK) >> GHCB_DATA_LOW)
18 /* SEV Information Request/Response */
19 #define GHCB_MSR_SEV_INFO_RESP 0x001
20 #define GHCB_MSR_SEV_INFO_REQ 0x002
22 #define GHCB_MSR_SEV_INFO(_max, _min, _cbit) \
23 /* GHCBData[63:48] */ \
24 ((((_max) & 0xffff) << 48) | \
25 /* GHCBData[47:32] */ \
26 (((_min) & 0xffff) << 32) | \
27 /* GHCBData[31:24] */ \
28 (((_cbit) & 0xff) << 24) | \
29 GHCB_MSR_SEV_INFO_RESP)
31 #define GHCB_MSR_INFO(v) ((v) & 0xfffUL)
32 #define GHCB_MSR_PROTO_MAX(v) (((v) >> 48) & 0xffff)
33 #define GHCB_MSR_PROTO_MIN(v) (((v) >> 32) & 0xffff)
35 /* CPUID Request/Response */
36 #define GHCB_MSR_CPUID_REQ 0x004
37 #define GHCB_MSR_CPUID_RESP 0x005
38 #define GHCB_MSR_CPUID_FUNC_POS 32
39 #define GHCB_MSR_CPUID_FUNC_MASK 0xffffffff
40 #define GHCB_MSR_CPUID_VALUE_POS 32
41 #define GHCB_MSR_CPUID_VALUE_MASK 0xffffffff
42 #define GHCB_MSR_CPUID_REG_POS 30
43 #define GHCB_MSR_CPUID_REG_MASK 0x3
44 #define GHCB_CPUID_REQ_EAX 0
45 #define GHCB_CPUID_REQ_EBX 1
46 #define GHCB_CPUID_REQ_ECX 2
47 #define GHCB_CPUID_REQ_EDX 3
48 #define GHCB_CPUID_REQ(fn, reg) \
49 /* GHCBData[11:0] */ \
50 (GHCB_MSR_CPUID_REQ | \
51 /* GHCBData[31:12] */ \
52 (((unsigned long)(reg) & 0x3) << 30) | \
53 /* GHCBData[63:32] */ \
54 (((unsigned long)fn) << 32))
57 #define GHCB_MSR_AP_RESET_HOLD_REQ 0x006
58 #define GHCB_MSR_AP_RESET_HOLD_RESP 0x007
59 #define GHCB_MSR_AP_RESET_HOLD_RESULT_POS 12
60 #define GHCB_MSR_AP_RESET_HOLD_RESULT_MASK GENMASK_ULL(51, 0)
62 /* Preferred GHCB GPA Request */
63 #define GHCB_MSR_PREF_GPA_REQ 0x010
64 #define GHCB_MSR_GPA_VALUE_POS 12
65 #define GHCB_MSR_GPA_VALUE_MASK GENMASK_ULL(51, 0)
67 #define GHCB_MSR_PREF_GPA_RESP 0x011
68 #define GHCB_MSR_PREF_GPA_NONE 0xfffffffffffff
70 /* GHCB GPA Register */
71 #define GHCB_MSR_REG_GPA_REQ 0x012
72 #define GHCB_MSR_REG_GPA_REQ_VAL(v) \
73 /* GHCBData[63:12] */ \
74 (((u64)((v) & GENMASK_ULL(51, 0)) << 12) | \
75 /* GHCBData[11:0] */ \
78 #define GHCB_MSR_REG_GPA_RESP 0x013
79 #define GHCB_MSR_REG_GPA_RESP_VAL(v) \
80 /* GHCBData[63:12] */ \
81 (((u64)(v) & GENMASK_ULL(63, 12)) >> 12)
84 * SNP Page State Change Operation
86 * GHCBData[55:52] - Page operation:
87 * 0x0001 Page assignment, Private
88 * 0x0002 Page assignment, Shared
91 SNP_PAGE_STATE_PRIVATE = 1,
92 SNP_PAGE_STATE_SHARED,
95 #define GHCB_MSR_PSC_REQ 0x014
96 #define GHCB_MSR_PSC_REQ_GFN(gfn, op) \
97 /* GHCBData[55:52] */ \
98 (((u64)((op) & 0xf) << 52) | \
99 /* GHCBData[51:12] */ \
100 ((u64)((gfn) & GENMASK_ULL(39, 0)) << 12) | \
101 /* GHCBData[11:0] */ \
104 #define GHCB_MSR_PSC_REQ_TO_GFN(msr) (((msr) & GENMASK_ULL(51, 12)) >> 12)
105 #define GHCB_MSR_PSC_REQ_TO_OP(msr) (((msr) & GENMASK_ULL(55, 52)) >> 52)
107 #define GHCB_MSR_PSC_RESP 0x015
108 #define GHCB_MSR_PSC_RESP_VAL(val) \
109 /* GHCBData[63:32] */ \
110 (((u64)(val) & GENMASK_ULL(63, 32)) >> 32)
112 /* Set highest bit as a generic error response */
113 #define GHCB_MSR_PSC_RESP_ERROR (BIT_ULL(63) | GHCB_MSR_PSC_RESP)
115 /* GHCB Run at VMPL Request/Response */
116 #define GHCB_MSR_VMPL_REQ 0x016
117 #define GHCB_MSR_VMPL_REQ_LEVEL(v) \
118 /* GHCBData[39:32] */ \
119 (((u64)(v) & GENMASK_ULL(7, 0) << 32) | \
120 /* GHCBDdata[11:0] */ \
123 #define GHCB_MSR_VMPL_RESP 0x017
124 #define GHCB_MSR_VMPL_RESP_VAL(v) \
125 /* GHCBData[63:32] */ \
126 (((u64)(v) & GENMASK_ULL(63, 32)) >> 32)
128 /* GHCB Hypervisor Feature Request/Response */
129 #define GHCB_MSR_HV_FT_REQ 0x080
130 #define GHCB_MSR_HV_FT_RESP 0x081
131 #define GHCB_MSR_HV_FT_POS 12
132 #define GHCB_MSR_HV_FT_MASK GENMASK_ULL(51, 0)
133 #define GHCB_MSR_HV_FT_RESP_VAL(v) \
134 /* GHCBData[63:12] */ \
135 (((u64)(v) & GENMASK_ULL(63, 12)) >> 12)
137 #define GHCB_HV_FT_SNP BIT_ULL(0)
138 #define GHCB_HV_FT_SNP_AP_CREATION BIT_ULL(1)
139 #define GHCB_HV_FT_SNP_MULTI_VMPL BIT_ULL(5)
142 * SNP Page State Change NAE event
143 * The VMGEXIT_PSC_MAX_ENTRY determines the size of the PSC structure, which
144 * is a local stack variable in set_pages_state(). Do not increase this value
145 * without evaluating the impact to stack usage.
147 * Use VMGEXIT_PSC_MAX_COUNT in cases where the actual GHCB-defined max value
148 * is needed, such as when processing GHCB requests on the hypervisor side.
150 #define VMGEXIT_PSC_MAX_ENTRY 64
151 #define VMGEXIT_PSC_MAX_COUNT 253
153 #define VMGEXIT_PSC_ERROR_GENERIC (0x100UL << 32)
154 #define VMGEXIT_PSC_ERROR_INVALID_HDR ((1UL << 32) | 1)
155 #define VMGEXIT_PSC_ERROR_INVALID_ENTRY ((1UL << 32) | 2)
157 #define VMGEXIT_PSC_OP_PRIVATE 1
158 #define VMGEXIT_PSC_OP_SHARED 2
174 struct snp_psc_desc {
176 struct psc_entry entries[VMGEXIT_PSC_MAX_ENTRY];
179 #define GHCB_MSR_TERM_REQ 0x100
180 #define GHCB_MSR_TERM_REASON_SET_POS 12
181 #define GHCB_MSR_TERM_REASON_SET_MASK 0xf
182 #define GHCB_MSR_TERM_REASON_POS 16
183 #define GHCB_MSR_TERM_REASON_MASK 0xff
185 #define GHCB_SEV_TERM_REASON(reason_set, reason_val) \
186 /* GHCBData[15:12] */ \
187 (((((u64)reason_set) & 0xf) << 12) | \
188 /* GHCBData[23:16] */ \
189 ((((u64)reason_val) & 0xff) << 16))
191 /* Error codes from reason set 0 */
192 #define SEV_TERM_SET_GEN 0
193 #define GHCB_SEV_ES_GEN_REQ 0
194 #define GHCB_SEV_ES_PROT_UNSUPPORTED 1
195 #define GHCB_SNP_UNSUPPORTED 2
197 /* Linux-specific reason codes (used with reason set 1) */
198 #define SEV_TERM_SET_LINUX 1
199 #define GHCB_TERM_REGISTER 0 /* GHCB GPA registration failure */
200 #define GHCB_TERM_PSC 1 /* Page State Change failure */
201 #define GHCB_TERM_PVALIDATE 2 /* Pvalidate failure */
202 #define GHCB_TERM_NOT_VMPL0 3 /* SNP guest is not running at VMPL-0 */
203 #define GHCB_TERM_CPUID 4 /* CPUID-validation failure */
204 #define GHCB_TERM_CPUID_HV 5 /* CPUID failure during hypervisor fallback */
205 #define GHCB_TERM_SECRETS_PAGE 6 /* Secrets page failure */
206 #define GHCB_TERM_NO_SVSM 7 /* SVSM is not advertised in the secrets page */
207 #define GHCB_TERM_SVSM_VMPL0 8 /* SVSM is present but has set VMPL to 0 */
208 #define GHCB_TERM_SVSM_CAA 9 /* SVSM is present but CAA is not page aligned */
210 #define GHCB_RESP_CODE(v) ((v) & GHCB_MSR_INFO_MASK)
213 * Error codes related to GHCB input that can be communicated back to the guest
214 * by setting the lower 32-bits of the GHCB SW_EXITINFO1 field to 2.
216 #define GHCB_ERR_NOT_REGISTERED 1
217 #define GHCB_ERR_INVALID_USAGE 2
218 #define GHCB_ERR_INVALID_SCRATCH_AREA 3
219 #define GHCB_ERR_MISSING_INPUT 4
220 #define GHCB_ERR_INVALID_INPUT 5
221 #define GHCB_ERR_INVALID_EVENT 6