1 /* SPDX-License-Identifier: GPL-2.0 */
5 #include <uapi/asm/svm.h>
6 #include <uapi/asm/kvm.h>
9 * 32-bit intercept words in the VMCB Control Area, starting
10 * at Byte offset 000h.
13 enum intercept_words {
24 /* Byte offset 000h (word 0) */
25 INTERCEPT_CR0_READ = 0,
26 INTERCEPT_CR3_READ = 3,
27 INTERCEPT_CR4_READ = 4,
28 INTERCEPT_CR8_READ = 8,
29 INTERCEPT_CR0_WRITE = 16,
30 INTERCEPT_CR3_WRITE = 16 + 3,
31 INTERCEPT_CR4_WRITE = 16 + 4,
32 INTERCEPT_CR8_WRITE = 16 + 8,
33 /* Byte offset 004h (word 1) */
34 INTERCEPT_DR0_READ = 32,
42 INTERCEPT_DR0_WRITE = 48,
50 /* Byte offset 008h (word 2) */
51 INTERCEPT_EXCEPTION_OFFSET = 64,
52 /* Byte offset 00Ch (word 3) */
58 INTERCEPT_SELECTIVE_CR0,
82 INTERCEPT_TASK_SWITCH,
83 INTERCEPT_FERR_FREEZE,
85 /* Byte offset 010h (word 4) */
86 INTERCEPT_VMRUN = 128,
111 /* Byte offset 014h (word 5) */
112 INTERCEPT_INVLPGB = 160,
113 INTERCEPT_INVLPGB_ILLEGAL,
120 struct __attribute__ ((__packed__)) vmcb_control_area {
121 u32 intercepts[MAX_INTERCEPT];
122 u32 reserved_1[15 - MAX_INTERCEPT];
123 u16 pause_filter_thresh;
124 u16 pause_filter_count;
140 u32 exit_int_info_err;
153 u64 avic_backing_page; /* Offset 0xe0 */
154 u8 reserved_6[8]; /* Offset 0xe8 */
155 u64 avic_logical_id; /* Offset 0xf0 */
156 u64 avic_physical_id; /* Offset 0xf8 */
158 u64 vmsa_pa; /* Used for an SEV-ES guest */
161 * Offset 0x3e0, 32 bytes reserved
162 * for use by hypervisor/software.
168 #define TLB_CONTROL_DO_NOTHING 0
169 #define TLB_CONTROL_FLUSH_ALL_ASID 1
170 #define TLB_CONTROL_FLUSH_ASID 3
171 #define TLB_CONTROL_FLUSH_ASID_LOCAL 7
173 #define V_TPR_MASK 0x0f
175 #define V_IRQ_SHIFT 8
176 #define V_IRQ_MASK (1 << V_IRQ_SHIFT)
178 #define V_GIF_SHIFT 9
179 #define V_GIF_MASK (1 << V_GIF_SHIFT)
181 #define V_INTR_PRIO_SHIFT 16
182 #define V_INTR_PRIO_MASK (0x0f << V_INTR_PRIO_SHIFT)
184 #define V_IGN_TPR_SHIFT 20
185 #define V_IGN_TPR_MASK (1 << V_IGN_TPR_SHIFT)
187 #define V_INTR_MASKING_SHIFT 24
188 #define V_INTR_MASKING_MASK (1 << V_INTR_MASKING_SHIFT)
190 #define V_GIF_ENABLE_SHIFT 25
191 #define V_GIF_ENABLE_MASK (1 << V_GIF_ENABLE_SHIFT)
193 #define AVIC_ENABLE_SHIFT 31
194 #define AVIC_ENABLE_MASK (1 << AVIC_ENABLE_SHIFT)
196 #define LBR_CTL_ENABLE_MASK BIT_ULL(0)
197 #define VIRTUAL_VMLOAD_VMSAVE_ENABLE_MASK BIT_ULL(1)
199 #define SVM_INTERRUPT_SHADOW_MASK BIT_ULL(0)
200 #define SVM_GUEST_INTERRUPT_MASK BIT_ULL(1)
202 #define SVM_IOIO_STR_SHIFT 2
203 #define SVM_IOIO_REP_SHIFT 3
204 #define SVM_IOIO_SIZE_SHIFT 4
205 #define SVM_IOIO_ASIZE_SHIFT 7
207 #define SVM_IOIO_TYPE_MASK 1
208 #define SVM_IOIO_STR_MASK (1 << SVM_IOIO_STR_SHIFT)
209 #define SVM_IOIO_REP_MASK (1 << SVM_IOIO_REP_SHIFT)
210 #define SVM_IOIO_SIZE_MASK (7 << SVM_IOIO_SIZE_SHIFT)
211 #define SVM_IOIO_ASIZE_MASK (7 << SVM_IOIO_ASIZE_SHIFT)
213 #define SVM_VM_CR_VALID_MASK 0x001fULL
214 #define SVM_VM_CR_SVM_LOCK_MASK 0x0008ULL
215 #define SVM_VM_CR_SVM_DIS_MASK 0x0010ULL
217 #define SVM_NESTED_CTL_NP_ENABLE BIT(0)
218 #define SVM_NESTED_CTL_SEV_ENABLE BIT(1)
219 #define SVM_NESTED_CTL_SEV_ES_ENABLE BIT(2)
228 struct vmcb_save_area {
235 struct vmcb_seg gdtr;
236 struct vmcb_seg ldtr;
237 struct vmcb_seg idtr;
244 u64 xss; /* Valid for SEV-ES only */
274 * The following part of the save area is valid only for
275 * SEV-ES guests when referenced through the GHCB or for
276 * saving to the host save area.
279 u32 spec_ctrl; /* Guest version of SPEC_CTRL at 0x2E0 */
283 u64 reserved_8; /* rax already available at 0x01f8 */
287 u64 reserved_9; /* rsp already available at 0x01d8 */
311 struct vmcb_save_area save;
312 u8 reserved_save[2048 - sizeof(struct vmcb_save_area)];
314 u8 shared_buffer[2032];
317 u16 protocol_version; /* negotiated SEV-ES/GHCB protocol version */
322 #define EXPECTED_VMCB_SAVE_AREA_SIZE 1032
323 #define EXPECTED_VMCB_CONTROL_AREA_SIZE 1024
324 #define EXPECTED_GHCB_SIZE PAGE_SIZE
326 static inline void __unused_size_checks(void)
328 BUILD_BUG_ON(sizeof(struct vmcb_save_area) != EXPECTED_VMCB_SAVE_AREA_SIZE);
329 BUILD_BUG_ON(sizeof(struct vmcb_control_area) != EXPECTED_VMCB_CONTROL_AREA_SIZE);
330 BUILD_BUG_ON(sizeof(struct ghcb) != EXPECTED_GHCB_SIZE);
334 struct vmcb_control_area control;
335 struct vmcb_save_area save;
338 #define SVM_CPUID_FUNC 0x8000000a
340 #define SVM_VM_CR_SVM_DISABLE 4
342 #define SVM_SELECTOR_S_SHIFT 4
343 #define SVM_SELECTOR_DPL_SHIFT 5
344 #define SVM_SELECTOR_P_SHIFT 7
345 #define SVM_SELECTOR_AVL_SHIFT 8
346 #define SVM_SELECTOR_L_SHIFT 9
347 #define SVM_SELECTOR_DB_SHIFT 10
348 #define SVM_SELECTOR_G_SHIFT 11
350 #define SVM_SELECTOR_TYPE_MASK (0xf)
351 #define SVM_SELECTOR_S_MASK (1 << SVM_SELECTOR_S_SHIFT)
352 #define SVM_SELECTOR_DPL_MASK (3 << SVM_SELECTOR_DPL_SHIFT)
353 #define SVM_SELECTOR_P_MASK (1 << SVM_SELECTOR_P_SHIFT)
354 #define SVM_SELECTOR_AVL_MASK (1 << SVM_SELECTOR_AVL_SHIFT)
355 #define SVM_SELECTOR_L_MASK (1 << SVM_SELECTOR_L_SHIFT)
356 #define SVM_SELECTOR_DB_MASK (1 << SVM_SELECTOR_DB_SHIFT)
357 #define SVM_SELECTOR_G_MASK (1 << SVM_SELECTOR_G_SHIFT)
359 #define SVM_SELECTOR_WRITE_MASK (1 << 1)
360 #define SVM_SELECTOR_READ_MASK SVM_SELECTOR_WRITE_MASK
361 #define SVM_SELECTOR_CODE_MASK (1 << 3)
363 #define SVM_EVTINJ_VEC_MASK 0xff
365 #define SVM_EVTINJ_TYPE_SHIFT 8
366 #define SVM_EVTINJ_TYPE_MASK (7 << SVM_EVTINJ_TYPE_SHIFT)
368 #define SVM_EVTINJ_TYPE_INTR (0 << SVM_EVTINJ_TYPE_SHIFT)
369 #define SVM_EVTINJ_TYPE_NMI (2 << SVM_EVTINJ_TYPE_SHIFT)
370 #define SVM_EVTINJ_TYPE_EXEPT (3 << SVM_EVTINJ_TYPE_SHIFT)
371 #define SVM_EVTINJ_TYPE_SOFT (4 << SVM_EVTINJ_TYPE_SHIFT)
373 #define SVM_EVTINJ_VALID (1 << 31)
374 #define SVM_EVTINJ_VALID_ERR (1 << 11)
376 #define SVM_EXITINTINFO_VEC_MASK SVM_EVTINJ_VEC_MASK
377 #define SVM_EXITINTINFO_TYPE_MASK SVM_EVTINJ_TYPE_MASK
379 #define SVM_EXITINTINFO_TYPE_INTR SVM_EVTINJ_TYPE_INTR
380 #define SVM_EXITINTINFO_TYPE_NMI SVM_EVTINJ_TYPE_NMI
381 #define SVM_EXITINTINFO_TYPE_EXEPT SVM_EVTINJ_TYPE_EXEPT
382 #define SVM_EXITINTINFO_TYPE_SOFT SVM_EVTINJ_TYPE_SOFT
384 #define SVM_EXITINTINFO_VALID SVM_EVTINJ_VALID
385 #define SVM_EXITINTINFO_VALID_ERR SVM_EVTINJ_VALID_ERR
387 #define SVM_EXITINFOSHIFT_TS_REASON_IRET 36
388 #define SVM_EXITINFOSHIFT_TS_REASON_JMP 38
389 #define SVM_EXITINFOSHIFT_TS_HAS_ERROR_CODE 44
391 #define SVM_EXITINFO_REG_MASK 0x0F
393 #define SVM_CR0_SELECTIVE_MASK (X86_CR0_TS | X86_CR0_MP)
395 /* GHCB Accessor functions */
397 #define GHCB_BITMAP_IDX(field) \
398 (offsetof(struct vmcb_save_area, field) / sizeof(u64))
400 #define DEFINE_GHCB_ACCESSORS(field) \
401 static inline bool ghcb_##field##_is_valid(const struct ghcb *ghcb) \
403 return test_bit(GHCB_BITMAP_IDX(field), \
404 (unsigned long *)&ghcb->save.valid_bitmap); \
407 static inline u64 ghcb_get_##field(struct ghcb *ghcb) \
409 return ghcb->save.field; \
412 static inline u64 ghcb_get_##field##_if_valid(struct ghcb *ghcb) \
414 return ghcb_##field##_is_valid(ghcb) ? ghcb->save.field : 0; \
417 static inline void ghcb_set_##field(struct ghcb *ghcb, u64 value) \
419 __set_bit(GHCB_BITMAP_IDX(field), \
420 (unsigned long *)&ghcb->save.valid_bitmap); \
421 ghcb->save.field = value; \
424 DEFINE_GHCB_ACCESSORS(cpl)
425 DEFINE_GHCB_ACCESSORS(rip)
426 DEFINE_GHCB_ACCESSORS(rsp)
427 DEFINE_GHCB_ACCESSORS(rax)
428 DEFINE_GHCB_ACCESSORS(rcx)
429 DEFINE_GHCB_ACCESSORS(rdx)
430 DEFINE_GHCB_ACCESSORS(rbx)
431 DEFINE_GHCB_ACCESSORS(rbp)
432 DEFINE_GHCB_ACCESSORS(rsi)
433 DEFINE_GHCB_ACCESSORS(rdi)
434 DEFINE_GHCB_ACCESSORS(r8)
435 DEFINE_GHCB_ACCESSORS(r9)
436 DEFINE_GHCB_ACCESSORS(r10)
437 DEFINE_GHCB_ACCESSORS(r11)
438 DEFINE_GHCB_ACCESSORS(r12)
439 DEFINE_GHCB_ACCESSORS(r13)
440 DEFINE_GHCB_ACCESSORS(r14)
441 DEFINE_GHCB_ACCESSORS(r15)
442 DEFINE_GHCB_ACCESSORS(sw_exit_code)
443 DEFINE_GHCB_ACCESSORS(sw_exit_info_1)
444 DEFINE_GHCB_ACCESSORS(sw_exit_info_2)
445 DEFINE_GHCB_ACCESSORS(sw_scratch)
446 DEFINE_GHCB_ACCESSORS(xcr0)