1 // SPDX-License-Identifier: GPL-2.0
3 * AMD Encrypted Register State Support
7 * This file is not compiled stand-alone. It contains code shared
8 * between the pre-decompression boot code and the running Linux kernel
9 * and is included directly into both code-bases.
12 #ifndef __BOOT_COMPRESSED
13 #define error(v) pr_err(v)
14 #define has_cpuflag(f) boot_cpu_has(f)
17 static bool __init sev_es_check_cpu_features(void)
19 if (!has_cpuflag(X86_FEATURE_RDRAND)) {
20 error("RDRAND instruction not supported - no trusted source of randomness available\n");
27 static void __noreturn sev_es_terminate(unsigned int reason)
29 u64 val = GHCB_MSR_TERM_REQ;
32 * Tell the hypervisor what went wrong - only reason-set 0 is
33 * currently supported.
35 val |= GHCB_SEV_TERM_REASON(0, reason);
37 /* Request Guest Termination from Hypvervisor */
38 sev_es_wr_ghcb_msr(val);
42 asm volatile("hlt\n" : : : "memory");
45 static bool sev_es_negotiate_protocol(void)
49 /* Do the GHCB protocol version negotiation */
50 sev_es_wr_ghcb_msr(GHCB_MSR_SEV_INFO_REQ);
52 val = sev_es_rd_ghcb_msr();
54 if (GHCB_MSR_INFO(val) != GHCB_MSR_SEV_INFO_RESP)
57 if (GHCB_MSR_PROTO_MAX(val) < GHCB_PROTO_OUR ||
58 GHCB_MSR_PROTO_MIN(val) > GHCB_PROTO_OUR)
64 static __always_inline void vc_ghcb_invalidate(struct ghcb *ghcb)
66 ghcb->save.sw_exit_code = 0;
67 __builtin_memset(ghcb->save.valid_bitmap, 0, sizeof(ghcb->save.valid_bitmap));
70 static bool vc_decoding_needed(unsigned long exit_code)
72 /* Exceptions don't require to decode the instruction */
73 return !(exit_code >= SVM_EXIT_EXCP_BASE &&
74 exit_code <= SVM_EXIT_LAST_EXCP);
77 static enum es_result vc_init_em_ctxt(struct es_em_ctxt *ctxt,
79 unsigned long exit_code)
81 enum es_result ret = ES_OK;
83 memset(ctxt, 0, sizeof(*ctxt));
86 if (vc_decoding_needed(exit_code))
87 ret = vc_decode_insn(ctxt);
92 static void vc_finish_insn(struct es_em_ctxt *ctxt)
94 ctxt->regs->ip += ctxt->insn.length;
97 static enum es_result verify_exception_info(struct ghcb *ghcb, struct es_em_ctxt *ctxt)
101 ret = ghcb->save.sw_exit_info_1 & GENMASK_ULL(31, 0);
106 u64 info = ghcb->save.sw_exit_info_2;
109 info = ghcb->save.sw_exit_info_2;
110 v = info & SVM_EVTINJ_VEC_MASK;
112 /* Check if exception information from hypervisor is sane. */
113 if ((info & SVM_EVTINJ_VALID) &&
114 ((v == X86_TRAP_GP) || (v == X86_TRAP_UD)) &&
115 ((info & SVM_EVTINJ_TYPE_MASK) == SVM_EVTINJ_TYPE_EXEPT)) {
118 if (info & SVM_EVTINJ_VALID_ERR)
119 ctxt->fi.error_code = info >> 32;
128 enum es_result sev_es_ghcb_hv_call(struct ghcb *ghcb, bool set_ghcb_msr,
129 struct es_em_ctxt *ctxt, u64 exit_code,
130 u64 exit_info_1, u64 exit_info_2)
132 /* Fill in protocol and format specifiers */
133 ghcb->protocol_version = GHCB_PROTOCOL_MAX;
134 ghcb->ghcb_usage = GHCB_DEFAULT_USAGE;
136 ghcb_set_sw_exit_code(ghcb, exit_code);
137 ghcb_set_sw_exit_info_1(ghcb, exit_info_1);
138 ghcb_set_sw_exit_info_2(ghcb, exit_info_2);
141 * Hyper-V unenlightened guests use a paravisor for communicating and
142 * GHCB pages are being allocated and set up by that paravisor. Linux
143 * should not change the GHCB page's physical address.
146 sev_es_wr_ghcb_msr(__pa(ghcb));
150 return verify_exception_info(ghcb, ctxt);
154 * Boot VC Handler - This is the first VC handler during boot, there is no GHCB
155 * page yet, so it only supports the MSR based communication with the
156 * hypervisor and only the CPUID exit-code.
158 void __init do_vc_no_ghcb(struct pt_regs *regs, unsigned long exit_code)
160 unsigned int fn = lower_bits(regs->ax, 32);
163 /* Only CPUID is supported via MSR protocol */
164 if (exit_code != SVM_EXIT_CPUID)
167 sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(fn, GHCB_CPUID_REQ_EAX));
169 val = sev_es_rd_ghcb_msr();
170 if (GHCB_RESP_CODE(val) != GHCB_MSR_CPUID_RESP)
172 regs->ax = val >> 32;
174 sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(fn, GHCB_CPUID_REQ_EBX));
176 val = sev_es_rd_ghcb_msr();
177 if (GHCB_RESP_CODE(val) != GHCB_MSR_CPUID_RESP)
179 regs->bx = val >> 32;
181 sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(fn, GHCB_CPUID_REQ_ECX));
183 val = sev_es_rd_ghcb_msr();
184 if (GHCB_RESP_CODE(val) != GHCB_MSR_CPUID_RESP)
186 regs->cx = val >> 32;
188 sev_es_wr_ghcb_msr(GHCB_CPUID_REQ(fn, GHCB_CPUID_REQ_EDX));
190 val = sev_es_rd_ghcb_msr();
191 if (GHCB_RESP_CODE(val) != GHCB_MSR_CPUID_RESP)
193 regs->dx = val >> 32;
196 * This is a VC handler and the #VC is only raised when SEV-ES is
197 * active, which means SEV must be active too. Do sanity checks on the
198 * CPUID results to make sure the hypervisor does not trick the kernel
199 * into the no-sev path. This could map sensitive data unencrypted and
200 * make it accessible to the hypervisor.
202 * In particular, check for:
203 * - Availability of CPUID leaf 0x8000001f
206 * The hypervisor might still report the wrong C-bit position, but this
207 * can't be checked here.
210 if (fn == 0x80000000 && (regs->ax < 0x8000001f))
213 else if ((fn == 0x8000001f && !(regs->ax & BIT(1))))
217 /* Skip over the CPUID two-byte opcode */
223 /* Terminate the guest */
224 sev_es_terminate(GHCB_SEV_ES_GEN_REQ);
227 static enum es_result vc_insn_string_read(struct es_em_ctxt *ctxt,
228 void *src, char *buf,
229 unsigned int data_size,
233 int i, b = backwards ? -1 : 1;
234 enum es_result ret = ES_OK;
236 for (i = 0; i < count; i++) {
237 void *s = src + (i * data_size * b);
238 char *d = buf + (i * data_size);
240 ret = vc_read_mem(ctxt, s, d, data_size);
248 static enum es_result vc_insn_string_write(struct es_em_ctxt *ctxt,
249 void *dst, char *buf,
250 unsigned int data_size,
254 int i, s = backwards ? -1 : 1;
255 enum es_result ret = ES_OK;
257 for (i = 0; i < count; i++) {
258 void *d = dst + (i * data_size * s);
259 char *b = buf + (i * data_size);
261 ret = vc_write_mem(ctxt, d, b, data_size);
269 #define IOIO_TYPE_STR BIT(2)
270 #define IOIO_TYPE_IN 1
271 #define IOIO_TYPE_INS (IOIO_TYPE_IN | IOIO_TYPE_STR)
272 #define IOIO_TYPE_OUT 0
273 #define IOIO_TYPE_OUTS (IOIO_TYPE_OUT | IOIO_TYPE_STR)
275 #define IOIO_REP BIT(3)
277 #define IOIO_ADDR_64 BIT(9)
278 #define IOIO_ADDR_32 BIT(8)
279 #define IOIO_ADDR_16 BIT(7)
281 #define IOIO_DATA_32 BIT(6)
282 #define IOIO_DATA_16 BIT(5)
283 #define IOIO_DATA_8 BIT(4)
285 #define IOIO_SEG_ES (0 << 10)
286 #define IOIO_SEG_DS (3 << 10)
288 static enum es_result vc_ioio_exitinfo(struct es_em_ctxt *ctxt, u64 *exitinfo)
290 struct insn *insn = &ctxt->insn;
293 switch (insn->opcode.bytes[0]) {
297 *exitinfo |= IOIO_TYPE_INS;
298 *exitinfo |= IOIO_SEG_ES;
299 *exitinfo |= (ctxt->regs->dx & 0xffff) << 16;
305 *exitinfo |= IOIO_TYPE_OUTS;
306 *exitinfo |= IOIO_SEG_DS;
307 *exitinfo |= (ctxt->regs->dx & 0xffff) << 16;
310 /* IN immediate opcodes */
313 *exitinfo |= IOIO_TYPE_IN;
314 *exitinfo |= (u8)insn->immediate.value << 16;
317 /* OUT immediate opcodes */
320 *exitinfo |= IOIO_TYPE_OUT;
321 *exitinfo |= (u8)insn->immediate.value << 16;
324 /* IN register opcodes */
327 *exitinfo |= IOIO_TYPE_IN;
328 *exitinfo |= (ctxt->regs->dx & 0xffff) << 16;
331 /* OUT register opcodes */
334 *exitinfo |= IOIO_TYPE_OUT;
335 *exitinfo |= (ctxt->regs->dx & 0xffff) << 16;
339 return ES_DECODE_FAILED;
342 switch (insn->opcode.bytes[0]) {
349 /* Single byte opcodes */
350 *exitinfo |= IOIO_DATA_8;
353 /* Length determined by instruction parsing */
354 *exitinfo |= (insn->opnd_bytes == 2) ? IOIO_DATA_16
357 switch (insn->addr_bytes) {
359 *exitinfo |= IOIO_ADDR_16;
362 *exitinfo |= IOIO_ADDR_32;
365 *exitinfo |= IOIO_ADDR_64;
369 if (insn_has_rep_prefix(insn))
370 *exitinfo |= IOIO_REP;
375 static enum es_result vc_handle_ioio(struct ghcb *ghcb, struct es_em_ctxt *ctxt)
377 struct pt_regs *regs = ctxt->regs;
378 u64 exit_info_1, exit_info_2;
381 ret = vc_ioio_exitinfo(ctxt, &exit_info_1);
385 if (exit_info_1 & IOIO_TYPE_STR) {
389 bool df = ((regs->flags & X86_EFLAGS_DF) == X86_EFLAGS_DF);
390 unsigned int io_bytes, exit_bytes;
391 unsigned int ghcb_count, op_count;
392 unsigned long es_base;
396 * For the string variants with rep prefix the amount of in/out
397 * operations per #VC exception is limited so that the kernel
398 * has a chance to take interrupts and re-schedule while the
399 * instruction is emulated.
401 io_bytes = (exit_info_1 >> 4) & 0x7;
402 ghcb_count = sizeof(ghcb->shared_buffer) / io_bytes;
404 op_count = (exit_info_1 & IOIO_REP) ? regs->cx : 1;
405 exit_info_2 = min(op_count, ghcb_count);
406 exit_bytes = exit_info_2 * io_bytes;
408 es_base = insn_get_seg_base(ctxt->regs, INAT_SEG_REG_ES);
410 /* Read bytes of OUTS into the shared buffer */
411 if (!(exit_info_1 & IOIO_TYPE_IN)) {
412 ret = vc_insn_string_read(ctxt,
413 (void *)(es_base + regs->si),
414 ghcb->shared_buffer, io_bytes,
421 * Issue an VMGEXIT to the HV to consume the bytes from the
422 * shared buffer or to have it write them into the shared buffer
423 * depending on the instruction: OUTS or INS.
425 sw_scratch = __pa(ghcb) + offsetof(struct ghcb, shared_buffer);
426 ghcb_set_sw_scratch(ghcb, sw_scratch);
427 ret = sev_es_ghcb_hv_call(ghcb, true, ctxt, SVM_EXIT_IOIO,
428 exit_info_1, exit_info_2);
432 /* Read bytes from shared buffer into the guest's destination. */
433 if (exit_info_1 & IOIO_TYPE_IN) {
434 ret = vc_insn_string_write(ctxt,
435 (void *)(es_base + regs->di),
436 ghcb->shared_buffer, io_bytes,
442 regs->di -= exit_bytes;
444 regs->di += exit_bytes;
447 regs->si -= exit_bytes;
449 regs->si += exit_bytes;
452 if (exit_info_1 & IOIO_REP)
453 regs->cx -= exit_info_2;
455 ret = regs->cx ? ES_RETRY : ES_OK;
459 /* IN/OUT into/from rAX */
461 int bits = (exit_info_1 & 0x70) >> 1;
464 if (!(exit_info_1 & IOIO_TYPE_IN))
465 rax = lower_bits(regs->ax, bits);
467 ghcb_set_rax(ghcb, rax);
469 ret = sev_es_ghcb_hv_call(ghcb, true, ctxt,
470 SVM_EXIT_IOIO, exit_info_1, 0);
474 if (exit_info_1 & IOIO_TYPE_IN) {
475 if (!ghcb_rax_is_valid(ghcb))
477 regs->ax = lower_bits(ghcb->save.rax, bits);
484 static enum es_result vc_handle_cpuid(struct ghcb *ghcb,
485 struct es_em_ctxt *ctxt)
487 struct pt_regs *regs = ctxt->regs;
488 u32 cr4 = native_read_cr4();
491 ghcb_set_rax(ghcb, regs->ax);
492 ghcb_set_rcx(ghcb, regs->cx);
494 if (cr4 & X86_CR4_OSXSAVE)
495 /* Safe to read xcr0 */
496 ghcb_set_xcr0(ghcb, xgetbv(XCR_XFEATURE_ENABLED_MASK));
498 /* xgetbv will cause #GP - use reset value for xcr0 */
499 ghcb_set_xcr0(ghcb, 1);
501 ret = sev_es_ghcb_hv_call(ghcb, true, ctxt, SVM_EXIT_CPUID, 0, 0);
505 if (!(ghcb_rax_is_valid(ghcb) &&
506 ghcb_rbx_is_valid(ghcb) &&
507 ghcb_rcx_is_valid(ghcb) &&
508 ghcb_rdx_is_valid(ghcb)))
511 regs->ax = ghcb->save.rax;
512 regs->bx = ghcb->save.rbx;
513 regs->cx = ghcb->save.rcx;
514 regs->dx = ghcb->save.rdx;
519 static enum es_result vc_handle_rdtsc(struct ghcb *ghcb,
520 struct es_em_ctxt *ctxt,
521 unsigned long exit_code)
523 bool rdtscp = (exit_code == SVM_EXIT_RDTSCP);
526 ret = sev_es_ghcb_hv_call(ghcb, true, ctxt, exit_code, 0, 0);
530 if (!(ghcb_rax_is_valid(ghcb) && ghcb_rdx_is_valid(ghcb) &&
531 (!rdtscp || ghcb_rcx_is_valid(ghcb))))
534 ctxt->regs->ax = ghcb->save.rax;
535 ctxt->regs->dx = ghcb->save.rdx;
537 ctxt->regs->cx = ghcb->save.rcx;