Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp1108365lqp; Fri, 22 Mar 2024 06:03:41 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWDLo3fopKzJkay20YXbwrZ1FoKaaExgQN8WwTScC3of+P7VNLpOe6EsUZ419dWI++grrcWfVFwxe2xUg7ar6iyqMyH7+jWl2DVH9vpwA== X-Google-Smtp-Source: AGHT+IEGQudSk4iHcGpdsADIuF/JiGGW3NvB6Okta+LgG2FAe/iE6lHJ9hv/yNX/PfuhZRAAania X-Received: by 2002:a05:6358:93a4:b0:17e:6a48:fe86 with SMTP id h36-20020a05635893a400b0017e6a48fe86mr2914674rwb.3.1711112620980; Fri, 22 Mar 2024 06:03:40 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711112620; cv=pass; d=google.com; s=arc-20160816; b=YUt3B6AahiyU6YFjsFwgD4mdgTpH9NEKYZvg6k5S+RrkLuqgKEog3Cj5u6eyplhMdC R0x5R1ZbOjMqvoWhLFAhjSJXTxnANMsFZwoDdPyJhk+sRTgoCtdVpah6Dbyrdx/RVWzV Z2+jfI/HPOIqyz2RNhKNokppTRB0r2aWTnsx05WvsXwWxqyWrI7qxW4VkIVnThW0tAeJ GS09NFt38z/3+/RgJqWV4tBprqsDH6B7oxa5ZHaBtLX3P4MASL/LKQyg8O+2yz7WCmxo DZzPphbFBT/Z6tEYmZiJhiME7Hc3H9UNSvkVHW4TjR7csr2vf13KdtawTf+/PnbdpY5k mhVw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=user-agent:in-reply-to:content-disposition:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:references :message-id:subject:cc:to:from:date:dkim-signature; bh=tuGmHAHM0c9AAF+42jmr0wlujDk8jzCsnr4IQFKnnhI=; fh=xchq4VqNgR2XV6F4D5tN0ACSSJTDdwm3vrQDeRGFEaA=; b=oL85qCe93DR/59RZ6te6X9Ju9rQCVJC+WI5Vk8hlYbMwDvqyAeJt0jh/Rb3pbnkvoo viY/LbNj8R1K2qRkhioVRCkl4lZ1XkLite4H23GeOl4EeM2mMpUqxjgJHnIhy6iDJizF ubrt4j4oyWr5Aix43FBJl5RiNiZmGAgfbAg7F4bLouNmKXkv3zasC+qZGJVkq144AHvU WPNxUKlo+wuFPp3GE71CErSFpmWsHKZBV1IvvnGiykh3hKyQmhQM3eiBOVYz13CtGC3I l/9kjXcu/SP+QCu+qYpvlFZEw7AZPdgv3YbCqSQ9NwRYxOuan9BiqaWJyqT/TURhCyJB 4BPA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=mHu6o8PT; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-111047-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-111047-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id w35-20020a631623000000b005e838bb2e76si1884640pgl.871.2024.03.22.06.03.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Mar 2024 06:03:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-111047-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=mHu6o8PT; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-111047-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-111047-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 6DBA8283C80 for ; Fri, 22 Mar 2024 07:06:52 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 03D8512B6F; Fri, 22 Mar 2024 07:06:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="mHu6o8PT" Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8953F10A2E; Fri, 22 Mar 2024 07:06:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.13 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711091202; cv=none; b=u6g3r6JAgkwJcr33NjDTstfeGfZa/IQ0aEGP4z8HSFnBvXElV1BDNGxH00fDXVnNf+JVzyAiWGZQY7z8bbFvgiSCvxcuPryWRjz92S866POby1JxSy9PWpjacUfkTL8Zy9g5NTV88qISmPVt7uuTsgXRHY2lCkdcaQEcI9kK2mE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711091202; c=relaxed/simple; bh=X6KWO0JkFQmX9DisdsBko7gEf7srau9Hv1mi627ATLo=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=ld3JzJZU343dV0vKvjb1WnFbWr6JmoIhNfMR0P/gnAKbeyRG4P23HYTWGlogqEUMyoKYp38VcTMIkMewaKHU0FuBXf0BkpdEbXazCzz2gN+8ZcR2farC8vyGZ2DiKT08gcemSXkQSJlDlpos8a8H1M39uAEAMemzHwRmMqwsdSw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=mHu6o8PT; arc=none smtp.client-ip=198.175.65.13 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1711091201; x=1742627201; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=X6KWO0JkFQmX9DisdsBko7gEf7srau9Hv1mi627ATLo=; b=mHu6o8PTgsKe/fwFxaPndujNqv6mv905OZCucoDLWH9xh6uI+HDFH6PL umGLSLXhiQ3LkhzBY1nNvDQOpiND3uIi82rt8z6WLyrIEgdljzbWwIzO1 8DJi48U5RksAmmUogzrogHUmELBEihJpdIpQGp67vcMn6FxBjBzVQYH8h ZG0gMNDF0jAM6xhtRXciubA4TRH0+29qvn/UAV8PXIZjLZrMSsJycgXg9 Gpv1p3SkVTbC7XBpgE7/3yZlT0zDDH8F0umrdSIlmJPuEHYkqku1ngaqs L6N/S3S+fXzCm8FHxkAa9QZV012ia84U+cWSyki3nVzvURL3GrWXY1xOC A==; X-IronPort-AV: E=McAfee;i="6600,9927,11020"; a="17273410" X-IronPort-AV: E=Sophos;i="6.07,145,1708416000"; d="scan'208";a="17273410" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by orvoesa105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Mar 2024 00:06:40 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,145,1708416000"; d="scan'208";a="19496114" Received: from yy-desk-7060.sh.intel.com (HELO localhost) ([10.239.159.76]) by orviesa003.jf.intel.com with ESMTP; 22 Mar 2024 00:06:36 -0700 Date: Fri, 22 Mar 2024 15:06:35 +0800 From: Yuan Yao To: isaku.yamahata@intel.com Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, isaku.yamahata@gmail.com, Paolo Bonzini , erdemaktas@google.com, Sean Christopherson , Sagi Shahar , Kai Huang , chen.bo@intel.com, hang.yuan@intel.com, tina.zhang@intel.com, Sean Christopherson , Xiaoyao Li Subject: Re: [PATCH v19 027/130] KVM: TDX: Define TDX architectural definitions Message-ID: <20240322070635.jwqlqzo2x2ddf5c3@yy-desk-7060> References: <522cbfe6e5a351f88480790fe3c3be36c82ca4b1.1708933498.git.isaku.yamahata@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <522cbfe6e5a351f88480790fe3c3be36c82ca4b1.1708933498.git.isaku.yamahata@intel.com> User-Agent: NeoMutt/20171215 On Mon, Feb 26, 2024 at 12:25:29AM -0800, isaku.yamahata@intel.com wrote: > From: Isaku Yamahata > > Define architectural definitions for KVM to issue the TDX SEAMCALLs. > > Structures and values that are architecturally defined in the TDX module > specifications the chapter of ABI Reference. > > Co-developed-by: Sean Christopherson > Signed-off-by: Sean Christopherson > Signed-off-by: Isaku Yamahata > Reviewed-by: Paolo Bonzini > Reviewed-by: Xiaoyao Li > --- > v19: > - drop tdvmcall constants by Xiaoyao > > v18: > - Add metadata field id > > Signed-off-by: Isaku Yamahata > --- > arch/x86/kvm/vmx/tdx_arch.h | 265 ++++++++++++++++++++++++++++++++++++ > 1 file changed, 265 insertions(+) > create mode 100644 arch/x86/kvm/vmx/tdx_arch.h > > diff --git a/arch/x86/kvm/vmx/tdx_arch.h b/arch/x86/kvm/vmx/tdx_arch.h > new file mode 100644 > index 000000000000..e2c1a6f429d7 > --- /dev/null > +++ b/arch/x86/kvm/vmx/tdx_arch.h > @@ -0,0 +1,265 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +/* architectural constants/data definitions for TDX SEAMCALLs */ > + > +#ifndef __KVM_X86_TDX_ARCH_H > +#define __KVM_X86_TDX_ARCH_H > + > +#include > + > +/* > + * TDX SEAMCALL API function leaves > + */ > +#define TDH_VP_ENTER 0 > +#define TDH_MNG_ADDCX 1 > +#define TDH_MEM_PAGE_ADD 2 > +#define TDH_MEM_SEPT_ADD 3 > +#define TDH_VP_ADDCX 4 > +#define TDH_MEM_PAGE_RELOCATE 5 > +#define TDH_MEM_PAGE_AUG 6 > +#define TDH_MEM_RANGE_BLOCK 7 > +#define TDH_MNG_KEY_CONFIG 8 > +#define TDH_MNG_CREATE 9 > +#define TDH_VP_CREATE 10 > +#define TDH_MNG_RD 11 > +#define TDH_MR_EXTEND 16 > +#define TDH_MR_FINALIZE 17 > +#define TDH_VP_FLUSH 18 > +#define TDH_MNG_VPFLUSHDONE 19 > +#define TDH_MNG_KEY_FREEID 20 > +#define TDH_MNG_INIT 21 > +#define TDH_VP_INIT 22 > +#define TDH_MEM_SEPT_RD 25 > +#define TDH_VP_RD 26 > +#define TDH_MNG_KEY_RECLAIMID 27 > +#define TDH_PHYMEM_PAGE_RECLAIM 28 > +#define TDH_MEM_PAGE_REMOVE 29 > +#define TDH_MEM_SEPT_REMOVE 30 > +#define TDH_SYS_RD 34 > +#define TDH_MEM_TRACK 38 > +#define TDH_MEM_RANGE_UNBLOCK 39 > +#define TDH_PHYMEM_CACHE_WB 40 > +#define TDH_PHYMEM_PAGE_WBINVD 41 > +#define TDH_VP_WR 43 > +#define TDH_SYS_LP_SHUTDOWN 44 > + > +/* TDX control structure (TDR/TDCS/TDVPS) field access codes */ > +#define TDX_NON_ARCH BIT_ULL(63) > +#define TDX_CLASS_SHIFT 56 > +#define TDX_FIELD_MASK GENMASK_ULL(31, 0) > + > +#define __BUILD_TDX_FIELD(non_arch, class, field) \ > + (((non_arch) ? TDX_NON_ARCH : 0) | \ > + ((u64)(class) << TDX_CLASS_SHIFT) | \ > + ((u64)(field) & TDX_FIELD_MASK)) > + > +#define BUILD_TDX_FIELD(class, field) \ > + __BUILD_TDX_FIELD(false, (class), (field)) > + > +#define BUILD_TDX_FIELD_NON_ARCH(class, field) \ > + __BUILD_TDX_FIELD(true, (class), (field)) > + > + > +/* Class code for TD */ > +#define TD_CLASS_EXECUTION_CONTROLS 17ULL > + > +/* Class code for TDVPS */ > +#define TDVPS_CLASS_VMCS 0ULL > +#define TDVPS_CLASS_GUEST_GPR 16ULL > +#define TDVPS_CLASS_OTHER_GUEST 17ULL > +#define TDVPS_CLASS_MANAGEMENT 32ULL > + > +enum tdx_tdcs_execution_control { > + TD_TDCS_EXEC_TSC_OFFSET = 10, > +}; > + > +/* @field is any of enum tdx_tdcs_execution_control */ > +#define TDCS_EXEC(field) BUILD_TDX_FIELD(TD_CLASS_EXECUTION_CONTROLS, (field)) > + > +/* @field is the VMCS field encoding */ > +#define TDVPS_VMCS(field) BUILD_TDX_FIELD(TDVPS_CLASS_VMCS, (field)) > + > +enum tdx_vcpu_guest_other_state { > + TD_VCPU_STATE_DETAILS_NON_ARCH = 0x100, > +}; > + > +union tdx_vcpu_state_details { > + struct { > + u64 vmxip : 1; > + u64 reserved : 63; > + }; > + u64 full; > +}; > + > +/* @field is any of enum tdx_guest_other_state */ > +#define TDVPS_STATE(field) BUILD_TDX_FIELD(TDVPS_CLASS_OTHER_GUEST, (field)) > +#define TDVPS_STATE_NON_ARCH(field) BUILD_TDX_FIELD_NON_ARCH(TDVPS_CLASS_OTHER_GUEST, (field)) > + > +/* Management class fields */ > +enum tdx_vcpu_guest_management { > + TD_VCPU_PEND_NMI = 11, > +}; > + > +/* @field is any of enum tdx_vcpu_guest_management */ > +#define TDVPS_MANAGEMENT(field) BUILD_TDX_FIELD(TDVPS_CLASS_MANAGEMENT, (field)) > + > +#define TDX_EXTENDMR_CHUNKSIZE 256 > + > +struct tdx_cpuid_value { > + u32 eax; > + u32 ebx; > + u32 ecx; > + u32 edx; > +} __packed; > + > +#define TDX_TD_ATTRIBUTE_DEBUG BIT_ULL(0) This series doesn't really touch off-TD things, so you can remove this. > +#define TDX_TD_ATTR_SEPT_VE_DISABLE BIT_ULL(28) > +#define TDX_TD_ATTRIBUTE_PKS BIT_ULL(30) > +#define TDX_TD_ATTRIBUTE_KL BIT_ULL(31) > +#define TDX_TD_ATTRIBUTE_PERFMON BIT_ULL(63) > + > +/* > + * TD_PARAMS is provided as an input to TDH_MNG_INIT, the size of which is 1024B. > + */ > +#define TDX_MAX_VCPUS (~(u16)0) > + > +struct td_params { > + u64 attributes; > + u64 xfam; > + u16 max_vcpus; > + u8 reserved0[6]; > + > + u64 eptp_controls; > + u64 exec_controls; > + u16 tsc_frequency; > + u8 reserved1[38]; > + > + u64 mrconfigid[6]; > + u64 mrowner[6]; > + u64 mrownerconfig[6]; > + u64 reserved2[4]; > + > + union { > + DECLARE_FLEX_ARRAY(struct tdx_cpuid_value, cpuid_values); > + u8 reserved3[768]; > + }; > +} __packed __aligned(1024); > + > +/* > + * Guest uses MAX_PA for GPAW when set. > + * 0: GPA.SHARED bit is GPA[47] > + * 1: GPA.SHARED bit is GPA[51] > + */ > +#define TDX_EXEC_CONTROL_MAX_GPAW BIT_ULL(0) > + > +/* > + * TDH.VP.ENTER, TDG.VP.VMCALL preserves RBP > + * 0: RBP can be used for TDG.VP.VMCALL input. RBP is clobbered. > + * 1: RBP can't be used for TDG.VP.VMCALL input. RBP is preserved. > + */ > +#define TDX_CONTROL_FLAG_NO_RBP_MOD BIT_ULL(2) > + > + > +/* > + * TDX requires the frequency to be defined in units of 25MHz, which is the > + * frequency of the core crystal clock on TDX-capable platforms, i.e. the TDX > + * module can only program frequencies that are multiples of 25MHz. The > + * frequency must be between 100mhz and 10ghz (inclusive). > + */ > +#define TDX_TSC_KHZ_TO_25MHZ(tsc_in_khz) ((tsc_in_khz) / (25 * 1000)) > +#define TDX_TSC_25MHZ_TO_KHZ(tsc_in_25mhz) ((tsc_in_25mhz) * (25 * 1000)) > +#define TDX_MIN_TSC_FREQUENCY_KHZ (100 * 1000) > +#define TDX_MAX_TSC_FREQUENCY_KHZ (10 * 1000 * 1000) > + > +union tdx_sept_entry { > + struct { > + u64 r : 1; > + u64 w : 1; > + u64 x : 1; > + u64 mt : 3; > + u64 ipat : 1; > + u64 leaf : 1; > + u64 a : 1; > + u64 d : 1; > + u64 xu : 1; > + u64 ignored0 : 1; > + u64 pfn : 40; > + u64 reserved : 5; > + u64 vgp : 1; > + u64 pwa : 1; > + u64 ignored1 : 1; > + u64 sss : 1; > + u64 spp : 1; > + u64 ignored2 : 1; > + u64 sve : 1; > + }; > + u64 raw; > +}; > + > +enum tdx_sept_entry_state { > + TDX_SEPT_FREE = 0, > + TDX_SEPT_BLOCKED = 1, > + TDX_SEPT_PENDING = 2, > + TDX_SEPT_PENDING_BLOCKED = 3, > + TDX_SEPT_PRESENT = 4, > +}; > + > +union tdx_sept_level_state { > + struct { > + u64 level : 3; > + u64 reserved0 : 5; > + u64 state : 8; > + u64 reserved1 : 48; > + }; > + u64 raw; > +}; > + > +/* > + * Global scope metadata field ID. > + * See Table "Global Scope Metadata", TDX module 1.5 ABI spec. > + */ > +#define MD_FIELD_ID_SYS_ATTRIBUTES 0x0A00000200000000ULL > +#define MD_FIELD_ID_FEATURES0 0x0A00000300000008ULL > +#define MD_FIELD_ID_ATTRS_FIXED0 0x1900000300000000ULL > +#define MD_FIELD_ID_ATTRS_FIXED1 0x1900000300000001ULL > +#define MD_FIELD_ID_XFAM_FIXED0 0x1900000300000002ULL > +#define MD_FIELD_ID_XFAM_FIXED1 0x1900000300000003ULL > + > +#define MD_FIELD_ID_TDCS_BASE_SIZE 0x9800000100000100ULL > +#define MD_FIELD_ID_TDVPS_BASE_SIZE 0x9800000100000200ULL > + > +#define MD_FIELD_ID_NUM_CPUID_CONFIG 0x9900000100000004ULL > +#define MD_FIELD_ID_CPUID_CONFIG_LEAVES 0x9900000300000400ULL > +#define MD_FIELD_ID_CPUID_CONFIG_VALUES 0x9900000300000500ULL > + > +#define MD_FIELD_ID_FEATURES0_NO_RBP_MOD BIT_ULL(18) > + > +#define TDX_MAX_NR_CPUID_CONFIGS 37 > + > +#define TDX_MD_ELEMENT_SIZE_8BITS 0 > +#define TDX_MD_ELEMENT_SIZE_16BITS 1 > +#define TDX_MD_ELEMENT_SIZE_32BITS 2 > +#define TDX_MD_ELEMENT_SIZE_64BITS 3 > + > +union tdx_md_field_id { > + struct { > + u64 field : 24; > + u64 reserved0 : 8; > + u64 element_size_code : 2; > + u64 last_element_in_field : 4; > + u64 reserved1 : 3; > + u64 inc_size : 1; > + u64 write_mask_valid : 1; > + u64 context : 3; > + u64 reserved2 : 1; > + u64 class : 6; > + u64 reserved3 : 1; > + u64 non_arch : 1; > + }; > + u64 raw; > +}; > + > +#define TDX_MD_ELEMENT_SIZE_CODE(_field_id) \ > + ({ union tdx_md_field_id _fid = { .raw = (_field_id)}; \ > + _fid.element_size_code; }) > + > +#endif /* __KVM_X86_TDX_ARCH_H */ > -- > 2.25.1 > >