Merge tag 'trace-printf-v6.13' of git://git.kernel.org/pub/scm/linux/kernel/git/trace...
[drm/drm-misc.git] / include / uapi / linux / psp-sev.h
blob832c15d9155bdbb95827c3e8214da066efe0f55e
1 /* SPDX-License-Identifier: GPL-2.0-only WITH Linux-syscall-note */
2 /*
3 * Userspace interface for AMD Secure Encrypted Virtualization (SEV)
4 * platform management commands.
6 * Copyright (C) 2016-2017 Advanced Micro Devices, Inc.
8 * Author: Brijesh Singh <brijesh.singh@amd.com>
10 * SEV API specification is available at: https://developer.amd.com/sev/
13 #ifndef __PSP_SEV_USER_H__
14 #define __PSP_SEV_USER_H__
16 #include <linux/types.h>
18 /**
19 * SEV platform commands
21 enum {
22 SEV_FACTORY_RESET = 0,
23 SEV_PLATFORM_STATUS,
24 SEV_PEK_GEN,
25 SEV_PEK_CSR,
26 SEV_PDH_GEN,
27 SEV_PDH_CERT_EXPORT,
28 SEV_PEK_CERT_IMPORT,
29 SEV_GET_ID, /* This command is deprecated, use SEV_GET_ID2 */
30 SEV_GET_ID2,
31 SNP_PLATFORM_STATUS,
32 SNP_COMMIT,
33 SNP_SET_CONFIG,
34 SNP_VLEK_LOAD,
36 SEV_MAX,
39 /**
40 * SEV Firmware status code
42 typedef enum {
44 * This error code is not in the SEV spec. Its purpose is to convey that
45 * there was an error that prevented the SEV firmware from being called.
46 * The SEV API error codes are 16 bits, so the -1 value will not overlap
47 * with possible values from the specification.
49 SEV_RET_NO_FW_CALL = -1,
50 SEV_RET_SUCCESS = 0,
51 SEV_RET_INVALID_PLATFORM_STATE,
52 SEV_RET_INVALID_GUEST_STATE,
53 SEV_RET_INAVLID_CONFIG,
54 SEV_RET_INVALID_CONFIG = SEV_RET_INAVLID_CONFIG,
55 SEV_RET_INVALID_LEN,
56 SEV_RET_ALREADY_OWNED,
57 SEV_RET_INVALID_CERTIFICATE,
58 SEV_RET_POLICY_FAILURE,
59 SEV_RET_INACTIVE,
60 SEV_RET_INVALID_ADDRESS,
61 SEV_RET_BAD_SIGNATURE,
62 SEV_RET_BAD_MEASUREMENT,
63 SEV_RET_ASID_OWNED,
64 SEV_RET_INVALID_ASID,
65 SEV_RET_WBINVD_REQUIRED,
66 SEV_RET_DFFLUSH_REQUIRED,
67 SEV_RET_INVALID_GUEST,
68 SEV_RET_INVALID_COMMAND,
69 SEV_RET_ACTIVE,
70 SEV_RET_HWSEV_RET_PLATFORM,
71 SEV_RET_HWSEV_RET_UNSAFE,
72 SEV_RET_UNSUPPORTED,
73 SEV_RET_INVALID_PARAM,
74 SEV_RET_RESOURCE_LIMIT,
75 SEV_RET_SECURE_DATA_INVALID,
76 SEV_RET_INVALID_KEY = 0x27,
77 SEV_RET_INVALID_PAGE_SIZE,
78 SEV_RET_INVALID_PAGE_STATE,
79 SEV_RET_INVALID_MDATA_ENTRY,
80 SEV_RET_INVALID_PAGE_OWNER,
81 SEV_RET_INVALID_PAGE_AEAD_OFLOW,
82 SEV_RET_RMP_INIT_REQUIRED,
83 SEV_RET_MAX,
84 } sev_ret_code;
86 /**
87 * struct sev_user_data_status - PLATFORM_STATUS command parameters
89 * @major: major API version
90 * @minor: minor API version
91 * @state: platform state
92 * @flags: platform config flags
93 * @build: firmware build id for API version
94 * @guest_count: number of active guests
96 struct sev_user_data_status {
97 __u8 api_major; /* Out */
98 __u8 api_minor; /* Out */
99 __u8 state; /* Out */
100 __u32 flags; /* Out */
101 __u8 build; /* Out */
102 __u32 guest_count; /* Out */
103 } __packed;
105 #define SEV_STATUS_FLAGS_CONFIG_ES 0x0100
108 * struct sev_user_data_pek_csr - PEK_CSR command parameters
110 * @address: PEK certificate chain
111 * @length: length of certificate
113 struct sev_user_data_pek_csr {
114 __u64 address; /* In */
115 __u32 length; /* In/Out */
116 } __packed;
119 * struct sev_user_data_cert_import - PEK_CERT_IMPORT command parameters
121 * @pek_address: PEK certificate chain
122 * @pek_len: length of PEK certificate
123 * @oca_address: OCA certificate chain
124 * @oca_len: length of OCA certificate
126 struct sev_user_data_pek_cert_import {
127 __u64 pek_cert_address; /* In */
128 __u32 pek_cert_len; /* In */
129 __u64 oca_cert_address; /* In */
130 __u32 oca_cert_len; /* In */
131 } __packed;
134 * struct sev_user_data_pdh_cert_export - PDH_CERT_EXPORT command parameters
136 * @pdh_address: PDH certificate address
137 * @pdh_len: length of PDH certificate
138 * @cert_chain_address: PDH certificate chain
139 * @cert_chain_len: length of PDH certificate chain
141 struct sev_user_data_pdh_cert_export {
142 __u64 pdh_cert_address; /* In */
143 __u32 pdh_cert_len; /* In/Out */
144 __u64 cert_chain_address; /* In */
145 __u32 cert_chain_len; /* In/Out */
146 } __packed;
149 * struct sev_user_data_get_id - GET_ID command parameters (deprecated)
151 * @socket1: Buffer to pass unique ID of first socket
152 * @socket2: Buffer to pass unique ID of second socket
154 struct sev_user_data_get_id {
155 __u8 socket1[64]; /* Out */
156 __u8 socket2[64]; /* Out */
157 } __packed;
160 * struct sev_user_data_get_id2 - GET_ID command parameters
161 * @address: Buffer to store unique ID
162 * @length: length of the unique ID
164 struct sev_user_data_get_id2 {
165 __u64 address; /* In */
166 __u32 length; /* In/Out */
167 } __packed;
170 * struct sev_user_data_snp_status - SNP status
172 * @api_major: API major version
173 * @api_minor: API minor version
174 * @state: current platform state
175 * @is_rmp_initialized: whether RMP is initialized or not
176 * @rsvd: reserved
177 * @build_id: firmware build id for the API version
178 * @mask_chip_id: whether chip id is present in attestation reports or not
179 * @mask_chip_key: whether attestation reports are signed or not
180 * @vlek_en: VLEK (Version Loaded Endorsement Key) hashstick is loaded
181 * @rsvd1: reserved
182 * @guest_count: the number of guest currently managed by the firmware
183 * @current_tcb_version: current TCB version
184 * @reported_tcb_version: reported TCB version
186 struct sev_user_data_snp_status {
187 __u8 api_major; /* Out */
188 __u8 api_minor; /* Out */
189 __u8 state; /* Out */
190 __u8 is_rmp_initialized:1; /* Out */
191 __u8 rsvd:7;
192 __u32 build_id; /* Out */
193 __u32 mask_chip_id:1; /* Out */
194 __u32 mask_chip_key:1; /* Out */
195 __u32 vlek_en:1; /* Out */
196 __u32 rsvd1:29;
197 __u32 guest_count; /* Out */
198 __u64 current_tcb_version; /* Out */
199 __u64 reported_tcb_version; /* Out */
200 } __packed;
203 * struct sev_user_data_snp_config - system wide configuration value for SNP.
205 * @reported_tcb: the TCB version to report in the guest attestation report.
206 * @mask_chip_id: whether chip id is present in attestation reports or not
207 * @mask_chip_key: whether attestation reports are signed or not
208 * @rsvd: reserved
209 * @rsvd1: reserved
211 struct sev_user_data_snp_config {
212 __u64 reported_tcb ; /* In */
213 __u32 mask_chip_id:1; /* In */
214 __u32 mask_chip_key:1; /* In */
215 __u32 rsvd:30; /* In */
216 __u8 rsvd1[52];
217 } __packed;
220 * struct sev_data_snp_vlek_load - SNP_VLEK_LOAD structure
222 * @len: length of the command buffer read by the PSP
223 * @vlek_wrapped_version: version of wrapped VLEK hashstick (Must be 0h)
224 * @rsvd: reserved
225 * @vlek_wrapped_address: address of a wrapped VLEK hashstick
226 * (struct sev_user_data_snp_wrapped_vlek_hashstick)
228 struct sev_user_data_snp_vlek_load {
229 __u32 len; /* In */
230 __u8 vlek_wrapped_version; /* In */
231 __u8 rsvd[3]; /* In */
232 __u64 vlek_wrapped_address; /* In */
233 } __packed;
236 * struct sev_user_data_snp_vlek_wrapped_vlek_hashstick - Wrapped VLEK data
238 * @data: Opaque data provided by AMD KDS (as described in SEV-SNP Firmware ABI
239 * 1.54, SNP_VLEK_LOAD)
241 struct sev_user_data_snp_wrapped_vlek_hashstick {
242 __u8 data[432]; /* In */
243 } __packed;
246 * struct sev_issue_cmd - SEV ioctl parameters
248 * @cmd: SEV commands to execute
249 * @opaque: pointer to the command structure
250 * @error: SEV FW return code on failure
252 struct sev_issue_cmd {
253 __u32 cmd; /* In */
254 __u64 data; /* In */
255 __u32 error; /* Out */
256 } __packed;
258 #define SEV_IOC_TYPE 'S'
259 #define SEV_ISSUE_CMD _IOWR(SEV_IOC_TYPE, 0x0, struct sev_issue_cmd)
261 #endif /* __PSP_USER_SEV_H */