162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * AMD Secure Encrypted Virtualization (SEV) interface 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2016,2019 Advanced Micro Devices, Inc. 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Author: Brijesh Singh <brijesh.singh@amd.com> 862306a36Sopenharmony_ci */ 962306a36Sopenharmony_ci 1062306a36Sopenharmony_ci#include <linux/bitfield.h> 1162306a36Sopenharmony_ci#include <linux/module.h> 1262306a36Sopenharmony_ci#include <linux/kernel.h> 1362306a36Sopenharmony_ci#include <linux/kthread.h> 1462306a36Sopenharmony_ci#include <linux/sched.h> 1562306a36Sopenharmony_ci#include <linux/interrupt.h> 1662306a36Sopenharmony_ci#include <linux/spinlock.h> 1762306a36Sopenharmony_ci#include <linux/spinlock_types.h> 1862306a36Sopenharmony_ci#include <linux/types.h> 1962306a36Sopenharmony_ci#include <linux/mutex.h> 2062306a36Sopenharmony_ci#include <linux/delay.h> 2162306a36Sopenharmony_ci#include <linux/hw_random.h> 2262306a36Sopenharmony_ci#include <linux/ccp.h> 2362306a36Sopenharmony_ci#include <linux/firmware.h> 2462306a36Sopenharmony_ci#include <linux/gfp.h> 2562306a36Sopenharmony_ci#include <linux/cpufeature.h> 2662306a36Sopenharmony_ci#include <linux/fs.h> 2762306a36Sopenharmony_ci#include <linux/fs_struct.h> 2862306a36Sopenharmony_ci#include <linux/psp.h> 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_ci#include <asm/smp.h> 3162306a36Sopenharmony_ci#include <asm/cacheflush.h> 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_ci#include "psp-dev.h" 3462306a36Sopenharmony_ci#include "sev-dev.h" 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_ci#define DEVICE_NAME "sev" 3762306a36Sopenharmony_ci#define SEV_FW_FILE "amd/sev.fw" 3862306a36Sopenharmony_ci#define SEV_FW_NAME_SIZE 64 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_cistatic DEFINE_MUTEX(sev_cmd_mutex); 4162306a36Sopenharmony_cistatic struct sev_misc_dev *misc_dev; 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_cistatic int psp_cmd_timeout = 100; 4462306a36Sopenharmony_cimodule_param(psp_cmd_timeout, int, 0644); 4562306a36Sopenharmony_ciMODULE_PARM_DESC(psp_cmd_timeout, " default timeout value, in seconds, for PSP commands"); 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_cistatic int psp_probe_timeout = 5; 4862306a36Sopenharmony_cimodule_param(psp_probe_timeout, int, 0644); 4962306a36Sopenharmony_ciMODULE_PARM_DESC(psp_probe_timeout, " default timeout value, in seconds, during PSP device probe"); 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_cistatic char *init_ex_path; 5262306a36Sopenharmony_cimodule_param(init_ex_path, charp, 0444); 5362306a36Sopenharmony_ciMODULE_PARM_DESC(init_ex_path, " Path for INIT_EX data; if set try INIT_EX"); 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_cistatic bool psp_init_on_probe = true; 5662306a36Sopenharmony_cimodule_param(psp_init_on_probe, bool, 0444); 5762306a36Sopenharmony_ciMODULE_PARM_DESC(psp_init_on_probe, " if true, the PSP will be initialized on module init. Else the PSP will be initialized on the first command requiring it"); 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_ciMODULE_FIRMWARE("amd/amd_sev_fam17h_model0xh.sbin"); /* 1st gen EPYC */ 6062306a36Sopenharmony_ciMODULE_FIRMWARE("amd/amd_sev_fam17h_model3xh.sbin"); /* 2nd gen EPYC */ 6162306a36Sopenharmony_ciMODULE_FIRMWARE("amd/amd_sev_fam19h_model0xh.sbin"); /* 3rd gen EPYC */ 6262306a36Sopenharmony_ciMODULE_FIRMWARE("amd/amd_sev_fam19h_model1xh.sbin"); /* 4th gen EPYC */ 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_cistatic bool psp_dead; 6562306a36Sopenharmony_cistatic int psp_timeout; 6662306a36Sopenharmony_ci 6762306a36Sopenharmony_ci/* Trusted Memory Region (TMR): 6862306a36Sopenharmony_ci * The TMR is a 1MB area that must be 1MB aligned. Use the page allocator 6962306a36Sopenharmony_ci * to allocate the memory, which will return aligned memory for the specified 7062306a36Sopenharmony_ci * allocation order. 7162306a36Sopenharmony_ci */ 7262306a36Sopenharmony_ci#define SEV_ES_TMR_SIZE (1024 * 1024) 7362306a36Sopenharmony_cistatic void *sev_es_tmr; 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci/* INIT_EX NV Storage: 7662306a36Sopenharmony_ci * The NV Storage is a 32Kb area and must be 4Kb page aligned. Use the page 7762306a36Sopenharmony_ci * allocator to allocate the memory, which will return aligned memory for the 7862306a36Sopenharmony_ci * specified allocation order. 7962306a36Sopenharmony_ci */ 8062306a36Sopenharmony_ci#define NV_LENGTH (32 * 1024) 8162306a36Sopenharmony_cistatic void *sev_init_ex_buffer; 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_cistatic inline bool sev_version_greater_or_equal(u8 maj, u8 min) 8462306a36Sopenharmony_ci{ 8562306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_ci if (sev->api_major > maj) 8862306a36Sopenharmony_ci return true; 8962306a36Sopenharmony_ci 9062306a36Sopenharmony_ci if (sev->api_major == maj && sev->api_minor >= min) 9162306a36Sopenharmony_ci return true; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci return false; 9462306a36Sopenharmony_ci} 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_cistatic void sev_irq_handler(int irq, void *data, unsigned int status) 9762306a36Sopenharmony_ci{ 9862306a36Sopenharmony_ci struct sev_device *sev = data; 9962306a36Sopenharmony_ci int reg; 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci /* Check if it is command completion: */ 10262306a36Sopenharmony_ci if (!(status & SEV_CMD_COMPLETE)) 10362306a36Sopenharmony_ci return; 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci /* Check if it is SEV command completion: */ 10662306a36Sopenharmony_ci reg = ioread32(sev->io_regs + sev->vdata->cmdresp_reg); 10762306a36Sopenharmony_ci if (FIELD_GET(PSP_CMDRESP_RESP, reg)) { 10862306a36Sopenharmony_ci sev->int_rcvd = 1; 10962306a36Sopenharmony_ci wake_up(&sev->int_queue); 11062306a36Sopenharmony_ci } 11162306a36Sopenharmony_ci} 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_cistatic int sev_wait_cmd_ioc(struct sev_device *sev, 11462306a36Sopenharmony_ci unsigned int *reg, unsigned int timeout) 11562306a36Sopenharmony_ci{ 11662306a36Sopenharmony_ci int ret; 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_ci ret = wait_event_timeout(sev->int_queue, 11962306a36Sopenharmony_ci sev->int_rcvd, timeout * HZ); 12062306a36Sopenharmony_ci if (!ret) 12162306a36Sopenharmony_ci return -ETIMEDOUT; 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci *reg = ioread32(sev->io_regs + sev->vdata->cmdresp_reg); 12462306a36Sopenharmony_ci 12562306a36Sopenharmony_ci return 0; 12662306a36Sopenharmony_ci} 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_cistatic int sev_cmd_buffer_len(int cmd) 12962306a36Sopenharmony_ci{ 13062306a36Sopenharmony_ci switch (cmd) { 13162306a36Sopenharmony_ci case SEV_CMD_INIT: return sizeof(struct sev_data_init); 13262306a36Sopenharmony_ci case SEV_CMD_INIT_EX: return sizeof(struct sev_data_init_ex); 13362306a36Sopenharmony_ci case SEV_CMD_PLATFORM_STATUS: return sizeof(struct sev_user_data_status); 13462306a36Sopenharmony_ci case SEV_CMD_PEK_CSR: return sizeof(struct sev_data_pek_csr); 13562306a36Sopenharmony_ci case SEV_CMD_PEK_CERT_IMPORT: return sizeof(struct sev_data_pek_cert_import); 13662306a36Sopenharmony_ci case SEV_CMD_PDH_CERT_EXPORT: return sizeof(struct sev_data_pdh_cert_export); 13762306a36Sopenharmony_ci case SEV_CMD_LAUNCH_START: return sizeof(struct sev_data_launch_start); 13862306a36Sopenharmony_ci case SEV_CMD_LAUNCH_UPDATE_DATA: return sizeof(struct sev_data_launch_update_data); 13962306a36Sopenharmony_ci case SEV_CMD_LAUNCH_UPDATE_VMSA: return sizeof(struct sev_data_launch_update_vmsa); 14062306a36Sopenharmony_ci case SEV_CMD_LAUNCH_FINISH: return sizeof(struct sev_data_launch_finish); 14162306a36Sopenharmony_ci case SEV_CMD_LAUNCH_MEASURE: return sizeof(struct sev_data_launch_measure); 14262306a36Sopenharmony_ci case SEV_CMD_ACTIVATE: return sizeof(struct sev_data_activate); 14362306a36Sopenharmony_ci case SEV_CMD_DEACTIVATE: return sizeof(struct sev_data_deactivate); 14462306a36Sopenharmony_ci case SEV_CMD_DECOMMISSION: return sizeof(struct sev_data_decommission); 14562306a36Sopenharmony_ci case SEV_CMD_GUEST_STATUS: return sizeof(struct sev_data_guest_status); 14662306a36Sopenharmony_ci case SEV_CMD_DBG_DECRYPT: return sizeof(struct sev_data_dbg); 14762306a36Sopenharmony_ci case SEV_CMD_DBG_ENCRYPT: return sizeof(struct sev_data_dbg); 14862306a36Sopenharmony_ci case SEV_CMD_SEND_START: return sizeof(struct sev_data_send_start); 14962306a36Sopenharmony_ci case SEV_CMD_SEND_UPDATE_DATA: return sizeof(struct sev_data_send_update_data); 15062306a36Sopenharmony_ci case SEV_CMD_SEND_UPDATE_VMSA: return sizeof(struct sev_data_send_update_vmsa); 15162306a36Sopenharmony_ci case SEV_CMD_SEND_FINISH: return sizeof(struct sev_data_send_finish); 15262306a36Sopenharmony_ci case SEV_CMD_RECEIVE_START: return sizeof(struct sev_data_receive_start); 15362306a36Sopenharmony_ci case SEV_CMD_RECEIVE_FINISH: return sizeof(struct sev_data_receive_finish); 15462306a36Sopenharmony_ci case SEV_CMD_RECEIVE_UPDATE_DATA: return sizeof(struct sev_data_receive_update_data); 15562306a36Sopenharmony_ci case SEV_CMD_RECEIVE_UPDATE_VMSA: return sizeof(struct sev_data_receive_update_vmsa); 15662306a36Sopenharmony_ci case SEV_CMD_LAUNCH_UPDATE_SECRET: return sizeof(struct sev_data_launch_secret); 15762306a36Sopenharmony_ci case SEV_CMD_DOWNLOAD_FIRMWARE: return sizeof(struct sev_data_download_firmware); 15862306a36Sopenharmony_ci case SEV_CMD_GET_ID: return sizeof(struct sev_data_get_id); 15962306a36Sopenharmony_ci case SEV_CMD_ATTESTATION_REPORT: return sizeof(struct sev_data_attestation_report); 16062306a36Sopenharmony_ci case SEV_CMD_SEND_CANCEL: return sizeof(struct sev_data_send_cancel); 16162306a36Sopenharmony_ci default: return 0; 16262306a36Sopenharmony_ci } 16362306a36Sopenharmony_ci 16462306a36Sopenharmony_ci return 0; 16562306a36Sopenharmony_ci} 16662306a36Sopenharmony_ci 16762306a36Sopenharmony_cistatic void *sev_fw_alloc(unsigned long len) 16862306a36Sopenharmony_ci{ 16962306a36Sopenharmony_ci struct page *page; 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_ci page = alloc_pages(GFP_KERNEL, get_order(len)); 17262306a36Sopenharmony_ci if (!page) 17362306a36Sopenharmony_ci return NULL; 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_ci return page_address(page); 17662306a36Sopenharmony_ci} 17762306a36Sopenharmony_ci 17862306a36Sopenharmony_cistatic struct file *open_file_as_root(const char *filename, int flags, umode_t mode) 17962306a36Sopenharmony_ci{ 18062306a36Sopenharmony_ci struct file *fp; 18162306a36Sopenharmony_ci struct path root; 18262306a36Sopenharmony_ci struct cred *cred; 18362306a36Sopenharmony_ci const struct cred *old_cred; 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci task_lock(&init_task); 18662306a36Sopenharmony_ci get_fs_root(init_task.fs, &root); 18762306a36Sopenharmony_ci task_unlock(&init_task); 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_ci cred = prepare_creds(); 19062306a36Sopenharmony_ci if (!cred) 19162306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 19262306a36Sopenharmony_ci cred->fsuid = GLOBAL_ROOT_UID; 19362306a36Sopenharmony_ci old_cred = override_creds(cred); 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci fp = file_open_root(&root, filename, flags, mode); 19662306a36Sopenharmony_ci path_put(&root); 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci revert_creds(old_cred); 19962306a36Sopenharmony_ci 20062306a36Sopenharmony_ci return fp; 20162306a36Sopenharmony_ci} 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_cistatic int sev_read_init_ex_file(void) 20462306a36Sopenharmony_ci{ 20562306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 20662306a36Sopenharmony_ci struct file *fp; 20762306a36Sopenharmony_ci ssize_t nread; 20862306a36Sopenharmony_ci 20962306a36Sopenharmony_ci lockdep_assert_held(&sev_cmd_mutex); 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci if (!sev_init_ex_buffer) 21262306a36Sopenharmony_ci return -EOPNOTSUPP; 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_ci fp = open_file_as_root(init_ex_path, O_RDONLY, 0); 21562306a36Sopenharmony_ci if (IS_ERR(fp)) { 21662306a36Sopenharmony_ci int ret = PTR_ERR(fp); 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci if (ret == -ENOENT) { 21962306a36Sopenharmony_ci dev_info(sev->dev, 22062306a36Sopenharmony_ci "SEV: %s does not exist and will be created later.\n", 22162306a36Sopenharmony_ci init_ex_path); 22262306a36Sopenharmony_ci ret = 0; 22362306a36Sopenharmony_ci } else { 22462306a36Sopenharmony_ci dev_err(sev->dev, 22562306a36Sopenharmony_ci "SEV: could not open %s for read, error %d\n", 22662306a36Sopenharmony_ci init_ex_path, ret); 22762306a36Sopenharmony_ci } 22862306a36Sopenharmony_ci return ret; 22962306a36Sopenharmony_ci } 23062306a36Sopenharmony_ci 23162306a36Sopenharmony_ci nread = kernel_read(fp, sev_init_ex_buffer, NV_LENGTH, NULL); 23262306a36Sopenharmony_ci if (nread != NV_LENGTH) { 23362306a36Sopenharmony_ci dev_info(sev->dev, 23462306a36Sopenharmony_ci "SEV: could not read %u bytes to non volatile memory area, ret %ld\n", 23562306a36Sopenharmony_ci NV_LENGTH, nread); 23662306a36Sopenharmony_ci } 23762306a36Sopenharmony_ci 23862306a36Sopenharmony_ci dev_dbg(sev->dev, "SEV: read %ld bytes from NV file\n", nread); 23962306a36Sopenharmony_ci filp_close(fp, NULL); 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci return 0; 24262306a36Sopenharmony_ci} 24362306a36Sopenharmony_ci 24462306a36Sopenharmony_cistatic int sev_write_init_ex_file(void) 24562306a36Sopenharmony_ci{ 24662306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 24762306a36Sopenharmony_ci struct file *fp; 24862306a36Sopenharmony_ci loff_t offset = 0; 24962306a36Sopenharmony_ci ssize_t nwrite; 25062306a36Sopenharmony_ci 25162306a36Sopenharmony_ci lockdep_assert_held(&sev_cmd_mutex); 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci if (!sev_init_ex_buffer) 25462306a36Sopenharmony_ci return 0; 25562306a36Sopenharmony_ci 25662306a36Sopenharmony_ci fp = open_file_as_root(init_ex_path, O_CREAT | O_WRONLY, 0600); 25762306a36Sopenharmony_ci if (IS_ERR(fp)) { 25862306a36Sopenharmony_ci int ret = PTR_ERR(fp); 25962306a36Sopenharmony_ci 26062306a36Sopenharmony_ci dev_err(sev->dev, 26162306a36Sopenharmony_ci "SEV: could not open file for write, error %d\n", 26262306a36Sopenharmony_ci ret); 26362306a36Sopenharmony_ci return ret; 26462306a36Sopenharmony_ci } 26562306a36Sopenharmony_ci 26662306a36Sopenharmony_ci nwrite = kernel_write(fp, sev_init_ex_buffer, NV_LENGTH, &offset); 26762306a36Sopenharmony_ci vfs_fsync(fp, 0); 26862306a36Sopenharmony_ci filp_close(fp, NULL); 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_ci if (nwrite != NV_LENGTH) { 27162306a36Sopenharmony_ci dev_err(sev->dev, 27262306a36Sopenharmony_ci "SEV: failed to write %u bytes to non volatile memory area, ret %ld\n", 27362306a36Sopenharmony_ci NV_LENGTH, nwrite); 27462306a36Sopenharmony_ci return -EIO; 27562306a36Sopenharmony_ci } 27662306a36Sopenharmony_ci 27762306a36Sopenharmony_ci dev_dbg(sev->dev, "SEV: write successful to NV file\n"); 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_ci return 0; 28062306a36Sopenharmony_ci} 28162306a36Sopenharmony_ci 28262306a36Sopenharmony_cistatic int sev_write_init_ex_file_if_required(int cmd_id) 28362306a36Sopenharmony_ci{ 28462306a36Sopenharmony_ci lockdep_assert_held(&sev_cmd_mutex); 28562306a36Sopenharmony_ci 28662306a36Sopenharmony_ci if (!sev_init_ex_buffer) 28762306a36Sopenharmony_ci return 0; 28862306a36Sopenharmony_ci 28962306a36Sopenharmony_ci /* 29062306a36Sopenharmony_ci * Only a few platform commands modify the SPI/NV area, but none of the 29162306a36Sopenharmony_ci * non-platform commands do. Only INIT(_EX), PLATFORM_RESET, PEK_GEN, 29262306a36Sopenharmony_ci * PEK_CERT_IMPORT, and PDH_GEN do. 29362306a36Sopenharmony_ci */ 29462306a36Sopenharmony_ci switch (cmd_id) { 29562306a36Sopenharmony_ci case SEV_CMD_FACTORY_RESET: 29662306a36Sopenharmony_ci case SEV_CMD_INIT_EX: 29762306a36Sopenharmony_ci case SEV_CMD_PDH_GEN: 29862306a36Sopenharmony_ci case SEV_CMD_PEK_CERT_IMPORT: 29962306a36Sopenharmony_ci case SEV_CMD_PEK_GEN: 30062306a36Sopenharmony_ci break; 30162306a36Sopenharmony_ci default: 30262306a36Sopenharmony_ci return 0; 30362306a36Sopenharmony_ci } 30462306a36Sopenharmony_ci 30562306a36Sopenharmony_ci return sev_write_init_ex_file(); 30662306a36Sopenharmony_ci} 30762306a36Sopenharmony_ci 30862306a36Sopenharmony_cistatic int __sev_do_cmd_locked(int cmd, void *data, int *psp_ret) 30962306a36Sopenharmony_ci{ 31062306a36Sopenharmony_ci struct psp_device *psp = psp_master; 31162306a36Sopenharmony_ci struct sev_device *sev; 31262306a36Sopenharmony_ci unsigned int phys_lsb, phys_msb; 31362306a36Sopenharmony_ci unsigned int reg, ret = 0; 31462306a36Sopenharmony_ci int buf_len; 31562306a36Sopenharmony_ci 31662306a36Sopenharmony_ci if (!psp || !psp->sev_data) 31762306a36Sopenharmony_ci return -ENODEV; 31862306a36Sopenharmony_ci 31962306a36Sopenharmony_ci if (psp_dead) 32062306a36Sopenharmony_ci return -EBUSY; 32162306a36Sopenharmony_ci 32262306a36Sopenharmony_ci sev = psp->sev_data; 32362306a36Sopenharmony_ci 32462306a36Sopenharmony_ci buf_len = sev_cmd_buffer_len(cmd); 32562306a36Sopenharmony_ci if (WARN_ON_ONCE(!data != !buf_len)) 32662306a36Sopenharmony_ci return -EINVAL; 32762306a36Sopenharmony_ci 32862306a36Sopenharmony_ci /* 32962306a36Sopenharmony_ci * Copy the incoming data to driver's scratch buffer as __pa() will not 33062306a36Sopenharmony_ci * work for some memory, e.g. vmalloc'd addresses, and @data may not be 33162306a36Sopenharmony_ci * physically contiguous. 33262306a36Sopenharmony_ci */ 33362306a36Sopenharmony_ci if (data) 33462306a36Sopenharmony_ci memcpy(sev->cmd_buf, data, buf_len); 33562306a36Sopenharmony_ci 33662306a36Sopenharmony_ci /* Get the physical address of the command buffer */ 33762306a36Sopenharmony_ci phys_lsb = data ? lower_32_bits(__psp_pa(sev->cmd_buf)) : 0; 33862306a36Sopenharmony_ci phys_msb = data ? upper_32_bits(__psp_pa(sev->cmd_buf)) : 0; 33962306a36Sopenharmony_ci 34062306a36Sopenharmony_ci dev_dbg(sev->dev, "sev command id %#x buffer 0x%08x%08x timeout %us\n", 34162306a36Sopenharmony_ci cmd, phys_msb, phys_lsb, psp_timeout); 34262306a36Sopenharmony_ci 34362306a36Sopenharmony_ci print_hex_dump_debug("(in): ", DUMP_PREFIX_OFFSET, 16, 2, data, 34462306a36Sopenharmony_ci buf_len, false); 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_ci iowrite32(phys_lsb, sev->io_regs + sev->vdata->cmdbuff_addr_lo_reg); 34762306a36Sopenharmony_ci iowrite32(phys_msb, sev->io_regs + sev->vdata->cmdbuff_addr_hi_reg); 34862306a36Sopenharmony_ci 34962306a36Sopenharmony_ci sev->int_rcvd = 0; 35062306a36Sopenharmony_ci 35162306a36Sopenharmony_ci reg = FIELD_PREP(SEV_CMDRESP_CMD, cmd) | SEV_CMDRESP_IOC; 35262306a36Sopenharmony_ci iowrite32(reg, sev->io_regs + sev->vdata->cmdresp_reg); 35362306a36Sopenharmony_ci 35462306a36Sopenharmony_ci /* wait for command completion */ 35562306a36Sopenharmony_ci ret = sev_wait_cmd_ioc(sev, ®, psp_timeout); 35662306a36Sopenharmony_ci if (ret) { 35762306a36Sopenharmony_ci if (psp_ret) 35862306a36Sopenharmony_ci *psp_ret = 0; 35962306a36Sopenharmony_ci 36062306a36Sopenharmony_ci dev_err(sev->dev, "sev command %#x timed out, disabling PSP\n", cmd); 36162306a36Sopenharmony_ci psp_dead = true; 36262306a36Sopenharmony_ci 36362306a36Sopenharmony_ci return ret; 36462306a36Sopenharmony_ci } 36562306a36Sopenharmony_ci 36662306a36Sopenharmony_ci psp_timeout = psp_cmd_timeout; 36762306a36Sopenharmony_ci 36862306a36Sopenharmony_ci if (psp_ret) 36962306a36Sopenharmony_ci *psp_ret = FIELD_GET(PSP_CMDRESP_STS, reg); 37062306a36Sopenharmony_ci 37162306a36Sopenharmony_ci if (FIELD_GET(PSP_CMDRESP_STS, reg)) { 37262306a36Sopenharmony_ci dev_dbg(sev->dev, "sev command %#x failed (%#010lx)\n", 37362306a36Sopenharmony_ci cmd, FIELD_GET(PSP_CMDRESP_STS, reg)); 37462306a36Sopenharmony_ci ret = -EIO; 37562306a36Sopenharmony_ci } else { 37662306a36Sopenharmony_ci ret = sev_write_init_ex_file_if_required(cmd); 37762306a36Sopenharmony_ci } 37862306a36Sopenharmony_ci 37962306a36Sopenharmony_ci print_hex_dump_debug("(out): ", DUMP_PREFIX_OFFSET, 16, 2, data, 38062306a36Sopenharmony_ci buf_len, false); 38162306a36Sopenharmony_ci 38262306a36Sopenharmony_ci /* 38362306a36Sopenharmony_ci * Copy potential output from the PSP back to data. Do this even on 38462306a36Sopenharmony_ci * failure in case the caller wants to glean something from the error. 38562306a36Sopenharmony_ci */ 38662306a36Sopenharmony_ci if (data) 38762306a36Sopenharmony_ci memcpy(data, sev->cmd_buf, buf_len); 38862306a36Sopenharmony_ci 38962306a36Sopenharmony_ci return ret; 39062306a36Sopenharmony_ci} 39162306a36Sopenharmony_ci 39262306a36Sopenharmony_cistatic int sev_do_cmd(int cmd, void *data, int *psp_ret) 39362306a36Sopenharmony_ci{ 39462306a36Sopenharmony_ci int rc; 39562306a36Sopenharmony_ci 39662306a36Sopenharmony_ci mutex_lock(&sev_cmd_mutex); 39762306a36Sopenharmony_ci rc = __sev_do_cmd_locked(cmd, data, psp_ret); 39862306a36Sopenharmony_ci mutex_unlock(&sev_cmd_mutex); 39962306a36Sopenharmony_ci 40062306a36Sopenharmony_ci return rc; 40162306a36Sopenharmony_ci} 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_cistatic int __sev_init_locked(int *error) 40462306a36Sopenharmony_ci{ 40562306a36Sopenharmony_ci struct sev_data_init data; 40662306a36Sopenharmony_ci 40762306a36Sopenharmony_ci memset(&data, 0, sizeof(data)); 40862306a36Sopenharmony_ci if (sev_es_tmr) { 40962306a36Sopenharmony_ci /* 41062306a36Sopenharmony_ci * Do not include the encryption mask on the physical 41162306a36Sopenharmony_ci * address of the TMR (firmware should clear it anyway). 41262306a36Sopenharmony_ci */ 41362306a36Sopenharmony_ci data.tmr_address = __pa(sev_es_tmr); 41462306a36Sopenharmony_ci 41562306a36Sopenharmony_ci data.flags |= SEV_INIT_FLAGS_SEV_ES; 41662306a36Sopenharmony_ci data.tmr_len = SEV_ES_TMR_SIZE; 41762306a36Sopenharmony_ci } 41862306a36Sopenharmony_ci 41962306a36Sopenharmony_ci return __sev_do_cmd_locked(SEV_CMD_INIT, &data, error); 42062306a36Sopenharmony_ci} 42162306a36Sopenharmony_ci 42262306a36Sopenharmony_cistatic int __sev_init_ex_locked(int *error) 42362306a36Sopenharmony_ci{ 42462306a36Sopenharmony_ci struct sev_data_init_ex data; 42562306a36Sopenharmony_ci 42662306a36Sopenharmony_ci memset(&data, 0, sizeof(data)); 42762306a36Sopenharmony_ci data.length = sizeof(data); 42862306a36Sopenharmony_ci data.nv_address = __psp_pa(sev_init_ex_buffer); 42962306a36Sopenharmony_ci data.nv_len = NV_LENGTH; 43062306a36Sopenharmony_ci 43162306a36Sopenharmony_ci if (sev_es_tmr) { 43262306a36Sopenharmony_ci /* 43362306a36Sopenharmony_ci * Do not include the encryption mask on the physical 43462306a36Sopenharmony_ci * address of the TMR (firmware should clear it anyway). 43562306a36Sopenharmony_ci */ 43662306a36Sopenharmony_ci data.tmr_address = __pa(sev_es_tmr); 43762306a36Sopenharmony_ci 43862306a36Sopenharmony_ci data.flags |= SEV_INIT_FLAGS_SEV_ES; 43962306a36Sopenharmony_ci data.tmr_len = SEV_ES_TMR_SIZE; 44062306a36Sopenharmony_ci } 44162306a36Sopenharmony_ci 44262306a36Sopenharmony_ci return __sev_do_cmd_locked(SEV_CMD_INIT_EX, &data, error); 44362306a36Sopenharmony_ci} 44462306a36Sopenharmony_ci 44562306a36Sopenharmony_cistatic inline int __sev_do_init_locked(int *psp_ret) 44662306a36Sopenharmony_ci{ 44762306a36Sopenharmony_ci if (sev_init_ex_buffer) 44862306a36Sopenharmony_ci return __sev_init_ex_locked(psp_ret); 44962306a36Sopenharmony_ci else 45062306a36Sopenharmony_ci return __sev_init_locked(psp_ret); 45162306a36Sopenharmony_ci} 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_cistatic int __sev_platform_init_locked(int *error) 45462306a36Sopenharmony_ci{ 45562306a36Sopenharmony_ci int rc = 0, psp_ret = SEV_RET_NO_FW_CALL; 45662306a36Sopenharmony_ci struct psp_device *psp = psp_master; 45762306a36Sopenharmony_ci struct sev_device *sev; 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_ci if (!psp || !psp->sev_data) 46062306a36Sopenharmony_ci return -ENODEV; 46162306a36Sopenharmony_ci 46262306a36Sopenharmony_ci sev = psp->sev_data; 46362306a36Sopenharmony_ci 46462306a36Sopenharmony_ci if (sev->state == SEV_STATE_INIT) 46562306a36Sopenharmony_ci return 0; 46662306a36Sopenharmony_ci 46762306a36Sopenharmony_ci if (sev_init_ex_buffer) { 46862306a36Sopenharmony_ci rc = sev_read_init_ex_file(); 46962306a36Sopenharmony_ci if (rc) 47062306a36Sopenharmony_ci return rc; 47162306a36Sopenharmony_ci } 47262306a36Sopenharmony_ci 47362306a36Sopenharmony_ci rc = __sev_do_init_locked(&psp_ret); 47462306a36Sopenharmony_ci if (rc && psp_ret == SEV_RET_SECURE_DATA_INVALID) { 47562306a36Sopenharmony_ci /* 47662306a36Sopenharmony_ci * Initialization command returned an integrity check failure 47762306a36Sopenharmony_ci * status code, meaning that firmware load and validation of SEV 47862306a36Sopenharmony_ci * related persistent data has failed. Retrying the 47962306a36Sopenharmony_ci * initialization function should succeed by replacing the state 48062306a36Sopenharmony_ci * with a reset state. 48162306a36Sopenharmony_ci */ 48262306a36Sopenharmony_ci dev_err(sev->dev, 48362306a36Sopenharmony_ci"SEV: retrying INIT command because of SECURE_DATA_INVALID error. Retrying once to reset PSP SEV state."); 48462306a36Sopenharmony_ci rc = __sev_do_init_locked(&psp_ret); 48562306a36Sopenharmony_ci } 48662306a36Sopenharmony_ci 48762306a36Sopenharmony_ci if (error) 48862306a36Sopenharmony_ci *error = psp_ret; 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_ci if (rc) 49162306a36Sopenharmony_ci return rc; 49262306a36Sopenharmony_ci 49362306a36Sopenharmony_ci sev->state = SEV_STATE_INIT; 49462306a36Sopenharmony_ci 49562306a36Sopenharmony_ci /* Prepare for first SEV guest launch after INIT */ 49662306a36Sopenharmony_ci wbinvd_on_all_cpus(); 49762306a36Sopenharmony_ci rc = __sev_do_cmd_locked(SEV_CMD_DF_FLUSH, NULL, error); 49862306a36Sopenharmony_ci if (rc) 49962306a36Sopenharmony_ci return rc; 50062306a36Sopenharmony_ci 50162306a36Sopenharmony_ci dev_dbg(sev->dev, "SEV firmware initialized\n"); 50262306a36Sopenharmony_ci 50362306a36Sopenharmony_ci dev_info(sev->dev, "SEV API:%d.%d build:%d\n", sev->api_major, 50462306a36Sopenharmony_ci sev->api_minor, sev->build); 50562306a36Sopenharmony_ci 50662306a36Sopenharmony_ci return 0; 50762306a36Sopenharmony_ci} 50862306a36Sopenharmony_ci 50962306a36Sopenharmony_ciint sev_platform_init(int *error) 51062306a36Sopenharmony_ci{ 51162306a36Sopenharmony_ci int rc; 51262306a36Sopenharmony_ci 51362306a36Sopenharmony_ci mutex_lock(&sev_cmd_mutex); 51462306a36Sopenharmony_ci rc = __sev_platform_init_locked(error); 51562306a36Sopenharmony_ci mutex_unlock(&sev_cmd_mutex); 51662306a36Sopenharmony_ci 51762306a36Sopenharmony_ci return rc; 51862306a36Sopenharmony_ci} 51962306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(sev_platform_init); 52062306a36Sopenharmony_ci 52162306a36Sopenharmony_cistatic int __sev_platform_shutdown_locked(int *error) 52262306a36Sopenharmony_ci{ 52362306a36Sopenharmony_ci struct psp_device *psp = psp_master; 52462306a36Sopenharmony_ci struct sev_device *sev; 52562306a36Sopenharmony_ci int ret; 52662306a36Sopenharmony_ci 52762306a36Sopenharmony_ci if (!psp || !psp->sev_data) 52862306a36Sopenharmony_ci return 0; 52962306a36Sopenharmony_ci 53062306a36Sopenharmony_ci sev = psp->sev_data; 53162306a36Sopenharmony_ci 53262306a36Sopenharmony_ci if (sev->state == SEV_STATE_UNINIT) 53362306a36Sopenharmony_ci return 0; 53462306a36Sopenharmony_ci 53562306a36Sopenharmony_ci ret = __sev_do_cmd_locked(SEV_CMD_SHUTDOWN, NULL, error); 53662306a36Sopenharmony_ci if (ret) 53762306a36Sopenharmony_ci return ret; 53862306a36Sopenharmony_ci 53962306a36Sopenharmony_ci sev->state = SEV_STATE_UNINIT; 54062306a36Sopenharmony_ci dev_dbg(sev->dev, "SEV firmware shutdown\n"); 54162306a36Sopenharmony_ci 54262306a36Sopenharmony_ci return ret; 54362306a36Sopenharmony_ci} 54462306a36Sopenharmony_ci 54562306a36Sopenharmony_cistatic int sev_platform_shutdown(int *error) 54662306a36Sopenharmony_ci{ 54762306a36Sopenharmony_ci int rc; 54862306a36Sopenharmony_ci 54962306a36Sopenharmony_ci mutex_lock(&sev_cmd_mutex); 55062306a36Sopenharmony_ci rc = __sev_platform_shutdown_locked(NULL); 55162306a36Sopenharmony_ci mutex_unlock(&sev_cmd_mutex); 55262306a36Sopenharmony_ci 55362306a36Sopenharmony_ci return rc; 55462306a36Sopenharmony_ci} 55562306a36Sopenharmony_ci 55662306a36Sopenharmony_cistatic int sev_get_platform_state(int *state, int *error) 55762306a36Sopenharmony_ci{ 55862306a36Sopenharmony_ci struct sev_user_data_status data; 55962306a36Sopenharmony_ci int rc; 56062306a36Sopenharmony_ci 56162306a36Sopenharmony_ci rc = __sev_do_cmd_locked(SEV_CMD_PLATFORM_STATUS, &data, error); 56262306a36Sopenharmony_ci if (rc) 56362306a36Sopenharmony_ci return rc; 56462306a36Sopenharmony_ci 56562306a36Sopenharmony_ci *state = data.state; 56662306a36Sopenharmony_ci return rc; 56762306a36Sopenharmony_ci} 56862306a36Sopenharmony_ci 56962306a36Sopenharmony_cistatic int sev_ioctl_do_reset(struct sev_issue_cmd *argp, bool writable) 57062306a36Sopenharmony_ci{ 57162306a36Sopenharmony_ci int state, rc; 57262306a36Sopenharmony_ci 57362306a36Sopenharmony_ci if (!writable) 57462306a36Sopenharmony_ci return -EPERM; 57562306a36Sopenharmony_ci 57662306a36Sopenharmony_ci /* 57762306a36Sopenharmony_ci * The SEV spec requires that FACTORY_RESET must be issued in 57862306a36Sopenharmony_ci * UNINIT state. Before we go further lets check if any guest is 57962306a36Sopenharmony_ci * active. 58062306a36Sopenharmony_ci * 58162306a36Sopenharmony_ci * If FW is in WORKING state then deny the request otherwise issue 58262306a36Sopenharmony_ci * SHUTDOWN command do INIT -> UNINIT before issuing the FACTORY_RESET. 58362306a36Sopenharmony_ci * 58462306a36Sopenharmony_ci */ 58562306a36Sopenharmony_ci rc = sev_get_platform_state(&state, &argp->error); 58662306a36Sopenharmony_ci if (rc) 58762306a36Sopenharmony_ci return rc; 58862306a36Sopenharmony_ci 58962306a36Sopenharmony_ci if (state == SEV_STATE_WORKING) 59062306a36Sopenharmony_ci return -EBUSY; 59162306a36Sopenharmony_ci 59262306a36Sopenharmony_ci if (state == SEV_STATE_INIT) { 59362306a36Sopenharmony_ci rc = __sev_platform_shutdown_locked(&argp->error); 59462306a36Sopenharmony_ci if (rc) 59562306a36Sopenharmony_ci return rc; 59662306a36Sopenharmony_ci } 59762306a36Sopenharmony_ci 59862306a36Sopenharmony_ci return __sev_do_cmd_locked(SEV_CMD_FACTORY_RESET, NULL, &argp->error); 59962306a36Sopenharmony_ci} 60062306a36Sopenharmony_ci 60162306a36Sopenharmony_cistatic int sev_ioctl_do_platform_status(struct sev_issue_cmd *argp) 60262306a36Sopenharmony_ci{ 60362306a36Sopenharmony_ci struct sev_user_data_status data; 60462306a36Sopenharmony_ci int ret; 60562306a36Sopenharmony_ci 60662306a36Sopenharmony_ci memset(&data, 0, sizeof(data)); 60762306a36Sopenharmony_ci 60862306a36Sopenharmony_ci ret = __sev_do_cmd_locked(SEV_CMD_PLATFORM_STATUS, &data, &argp->error); 60962306a36Sopenharmony_ci if (ret) 61062306a36Sopenharmony_ci return ret; 61162306a36Sopenharmony_ci 61262306a36Sopenharmony_ci if (copy_to_user((void __user *)argp->data, &data, sizeof(data))) 61362306a36Sopenharmony_ci ret = -EFAULT; 61462306a36Sopenharmony_ci 61562306a36Sopenharmony_ci return ret; 61662306a36Sopenharmony_ci} 61762306a36Sopenharmony_ci 61862306a36Sopenharmony_cistatic int sev_ioctl_do_pek_pdh_gen(int cmd, struct sev_issue_cmd *argp, bool writable) 61962306a36Sopenharmony_ci{ 62062306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 62162306a36Sopenharmony_ci int rc; 62262306a36Sopenharmony_ci 62362306a36Sopenharmony_ci if (!writable) 62462306a36Sopenharmony_ci return -EPERM; 62562306a36Sopenharmony_ci 62662306a36Sopenharmony_ci if (sev->state == SEV_STATE_UNINIT) { 62762306a36Sopenharmony_ci rc = __sev_platform_init_locked(&argp->error); 62862306a36Sopenharmony_ci if (rc) 62962306a36Sopenharmony_ci return rc; 63062306a36Sopenharmony_ci } 63162306a36Sopenharmony_ci 63262306a36Sopenharmony_ci return __sev_do_cmd_locked(cmd, NULL, &argp->error); 63362306a36Sopenharmony_ci} 63462306a36Sopenharmony_ci 63562306a36Sopenharmony_cistatic int sev_ioctl_do_pek_csr(struct sev_issue_cmd *argp, bool writable) 63662306a36Sopenharmony_ci{ 63762306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 63862306a36Sopenharmony_ci struct sev_user_data_pek_csr input; 63962306a36Sopenharmony_ci struct sev_data_pek_csr data; 64062306a36Sopenharmony_ci void __user *input_address; 64162306a36Sopenharmony_ci void *blob = NULL; 64262306a36Sopenharmony_ci int ret; 64362306a36Sopenharmony_ci 64462306a36Sopenharmony_ci if (!writable) 64562306a36Sopenharmony_ci return -EPERM; 64662306a36Sopenharmony_ci 64762306a36Sopenharmony_ci if (copy_from_user(&input, (void __user *)argp->data, sizeof(input))) 64862306a36Sopenharmony_ci return -EFAULT; 64962306a36Sopenharmony_ci 65062306a36Sopenharmony_ci memset(&data, 0, sizeof(data)); 65162306a36Sopenharmony_ci 65262306a36Sopenharmony_ci /* userspace wants to query CSR length */ 65362306a36Sopenharmony_ci if (!input.address || !input.length) 65462306a36Sopenharmony_ci goto cmd; 65562306a36Sopenharmony_ci 65662306a36Sopenharmony_ci /* allocate a physically contiguous buffer to store the CSR blob */ 65762306a36Sopenharmony_ci input_address = (void __user *)input.address; 65862306a36Sopenharmony_ci if (input.length > SEV_FW_BLOB_MAX_SIZE) 65962306a36Sopenharmony_ci return -EFAULT; 66062306a36Sopenharmony_ci 66162306a36Sopenharmony_ci blob = kzalloc(input.length, GFP_KERNEL); 66262306a36Sopenharmony_ci if (!blob) 66362306a36Sopenharmony_ci return -ENOMEM; 66462306a36Sopenharmony_ci 66562306a36Sopenharmony_ci data.address = __psp_pa(blob); 66662306a36Sopenharmony_ci data.len = input.length; 66762306a36Sopenharmony_ci 66862306a36Sopenharmony_cicmd: 66962306a36Sopenharmony_ci if (sev->state == SEV_STATE_UNINIT) { 67062306a36Sopenharmony_ci ret = __sev_platform_init_locked(&argp->error); 67162306a36Sopenharmony_ci if (ret) 67262306a36Sopenharmony_ci goto e_free_blob; 67362306a36Sopenharmony_ci } 67462306a36Sopenharmony_ci 67562306a36Sopenharmony_ci ret = __sev_do_cmd_locked(SEV_CMD_PEK_CSR, &data, &argp->error); 67662306a36Sopenharmony_ci 67762306a36Sopenharmony_ci /* If we query the CSR length, FW responded with expected data. */ 67862306a36Sopenharmony_ci input.length = data.len; 67962306a36Sopenharmony_ci 68062306a36Sopenharmony_ci if (copy_to_user((void __user *)argp->data, &input, sizeof(input))) { 68162306a36Sopenharmony_ci ret = -EFAULT; 68262306a36Sopenharmony_ci goto e_free_blob; 68362306a36Sopenharmony_ci } 68462306a36Sopenharmony_ci 68562306a36Sopenharmony_ci if (blob) { 68662306a36Sopenharmony_ci if (copy_to_user(input_address, blob, input.length)) 68762306a36Sopenharmony_ci ret = -EFAULT; 68862306a36Sopenharmony_ci } 68962306a36Sopenharmony_ci 69062306a36Sopenharmony_cie_free_blob: 69162306a36Sopenharmony_ci kfree(blob); 69262306a36Sopenharmony_ci return ret; 69362306a36Sopenharmony_ci} 69462306a36Sopenharmony_ci 69562306a36Sopenharmony_civoid *psp_copy_user_blob(u64 uaddr, u32 len) 69662306a36Sopenharmony_ci{ 69762306a36Sopenharmony_ci if (!uaddr || !len) 69862306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 69962306a36Sopenharmony_ci 70062306a36Sopenharmony_ci /* verify that blob length does not exceed our limit */ 70162306a36Sopenharmony_ci if (len > SEV_FW_BLOB_MAX_SIZE) 70262306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 70362306a36Sopenharmony_ci 70462306a36Sopenharmony_ci return memdup_user((void __user *)uaddr, len); 70562306a36Sopenharmony_ci} 70662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(psp_copy_user_blob); 70762306a36Sopenharmony_ci 70862306a36Sopenharmony_cistatic int sev_get_api_version(void) 70962306a36Sopenharmony_ci{ 71062306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 71162306a36Sopenharmony_ci struct sev_user_data_status status; 71262306a36Sopenharmony_ci int error = 0, ret; 71362306a36Sopenharmony_ci 71462306a36Sopenharmony_ci ret = sev_platform_status(&status, &error); 71562306a36Sopenharmony_ci if (ret) { 71662306a36Sopenharmony_ci dev_err(sev->dev, 71762306a36Sopenharmony_ci "SEV: failed to get status. Error: %#x\n", error); 71862306a36Sopenharmony_ci return 1; 71962306a36Sopenharmony_ci } 72062306a36Sopenharmony_ci 72162306a36Sopenharmony_ci sev->api_major = status.api_major; 72262306a36Sopenharmony_ci sev->api_minor = status.api_minor; 72362306a36Sopenharmony_ci sev->build = status.build; 72462306a36Sopenharmony_ci sev->state = status.state; 72562306a36Sopenharmony_ci 72662306a36Sopenharmony_ci return 0; 72762306a36Sopenharmony_ci} 72862306a36Sopenharmony_ci 72962306a36Sopenharmony_cistatic int sev_get_firmware(struct device *dev, 73062306a36Sopenharmony_ci const struct firmware **firmware) 73162306a36Sopenharmony_ci{ 73262306a36Sopenharmony_ci char fw_name_specific[SEV_FW_NAME_SIZE]; 73362306a36Sopenharmony_ci char fw_name_subset[SEV_FW_NAME_SIZE]; 73462306a36Sopenharmony_ci 73562306a36Sopenharmony_ci snprintf(fw_name_specific, sizeof(fw_name_specific), 73662306a36Sopenharmony_ci "amd/amd_sev_fam%.2xh_model%.2xh.sbin", 73762306a36Sopenharmony_ci boot_cpu_data.x86, boot_cpu_data.x86_model); 73862306a36Sopenharmony_ci 73962306a36Sopenharmony_ci snprintf(fw_name_subset, sizeof(fw_name_subset), 74062306a36Sopenharmony_ci "amd/amd_sev_fam%.2xh_model%.1xxh.sbin", 74162306a36Sopenharmony_ci boot_cpu_data.x86, (boot_cpu_data.x86_model & 0xf0) >> 4); 74262306a36Sopenharmony_ci 74362306a36Sopenharmony_ci /* Check for SEV FW for a particular model. 74462306a36Sopenharmony_ci * Ex. amd_sev_fam17h_model00h.sbin for Family 17h Model 00h 74562306a36Sopenharmony_ci * 74662306a36Sopenharmony_ci * or 74762306a36Sopenharmony_ci * 74862306a36Sopenharmony_ci * Check for SEV FW common to a subset of models. 74962306a36Sopenharmony_ci * Ex. amd_sev_fam17h_model0xh.sbin for 75062306a36Sopenharmony_ci * Family 17h Model 00h -- Family 17h Model 0Fh 75162306a36Sopenharmony_ci * 75262306a36Sopenharmony_ci * or 75362306a36Sopenharmony_ci * 75462306a36Sopenharmony_ci * Fall-back to using generic name: sev.fw 75562306a36Sopenharmony_ci */ 75662306a36Sopenharmony_ci if ((firmware_request_nowarn(firmware, fw_name_specific, dev) >= 0) || 75762306a36Sopenharmony_ci (firmware_request_nowarn(firmware, fw_name_subset, dev) >= 0) || 75862306a36Sopenharmony_ci (firmware_request_nowarn(firmware, SEV_FW_FILE, dev) >= 0)) 75962306a36Sopenharmony_ci return 0; 76062306a36Sopenharmony_ci 76162306a36Sopenharmony_ci return -ENOENT; 76262306a36Sopenharmony_ci} 76362306a36Sopenharmony_ci 76462306a36Sopenharmony_ci/* Don't fail if SEV FW couldn't be updated. Continue with existing SEV FW */ 76562306a36Sopenharmony_cistatic int sev_update_firmware(struct device *dev) 76662306a36Sopenharmony_ci{ 76762306a36Sopenharmony_ci struct sev_data_download_firmware *data; 76862306a36Sopenharmony_ci const struct firmware *firmware; 76962306a36Sopenharmony_ci int ret, error, order; 77062306a36Sopenharmony_ci struct page *p; 77162306a36Sopenharmony_ci u64 data_size; 77262306a36Sopenharmony_ci 77362306a36Sopenharmony_ci if (!sev_version_greater_or_equal(0, 15)) { 77462306a36Sopenharmony_ci dev_dbg(dev, "DOWNLOAD_FIRMWARE not supported\n"); 77562306a36Sopenharmony_ci return -1; 77662306a36Sopenharmony_ci } 77762306a36Sopenharmony_ci 77862306a36Sopenharmony_ci if (sev_get_firmware(dev, &firmware) == -ENOENT) { 77962306a36Sopenharmony_ci dev_dbg(dev, "No SEV firmware file present\n"); 78062306a36Sopenharmony_ci return -1; 78162306a36Sopenharmony_ci } 78262306a36Sopenharmony_ci 78362306a36Sopenharmony_ci /* 78462306a36Sopenharmony_ci * SEV FW expects the physical address given to it to be 32 78562306a36Sopenharmony_ci * byte aligned. Memory allocated has structure placed at the 78662306a36Sopenharmony_ci * beginning followed by the firmware being passed to the SEV 78762306a36Sopenharmony_ci * FW. Allocate enough memory for data structure + alignment 78862306a36Sopenharmony_ci * padding + SEV FW. 78962306a36Sopenharmony_ci */ 79062306a36Sopenharmony_ci data_size = ALIGN(sizeof(struct sev_data_download_firmware), 32); 79162306a36Sopenharmony_ci 79262306a36Sopenharmony_ci order = get_order(firmware->size + data_size); 79362306a36Sopenharmony_ci p = alloc_pages(GFP_KERNEL, order); 79462306a36Sopenharmony_ci if (!p) { 79562306a36Sopenharmony_ci ret = -1; 79662306a36Sopenharmony_ci goto fw_err; 79762306a36Sopenharmony_ci } 79862306a36Sopenharmony_ci 79962306a36Sopenharmony_ci /* 80062306a36Sopenharmony_ci * Copy firmware data to a kernel allocated contiguous 80162306a36Sopenharmony_ci * memory region. 80262306a36Sopenharmony_ci */ 80362306a36Sopenharmony_ci data = page_address(p); 80462306a36Sopenharmony_ci memcpy(page_address(p) + data_size, firmware->data, firmware->size); 80562306a36Sopenharmony_ci 80662306a36Sopenharmony_ci data->address = __psp_pa(page_address(p) + data_size); 80762306a36Sopenharmony_ci data->len = firmware->size; 80862306a36Sopenharmony_ci 80962306a36Sopenharmony_ci ret = sev_do_cmd(SEV_CMD_DOWNLOAD_FIRMWARE, data, &error); 81062306a36Sopenharmony_ci 81162306a36Sopenharmony_ci /* 81262306a36Sopenharmony_ci * A quirk for fixing the committed TCB version, when upgrading from 81362306a36Sopenharmony_ci * earlier firmware version than 1.50. 81462306a36Sopenharmony_ci */ 81562306a36Sopenharmony_ci if (!ret && !sev_version_greater_or_equal(1, 50)) 81662306a36Sopenharmony_ci ret = sev_do_cmd(SEV_CMD_DOWNLOAD_FIRMWARE, data, &error); 81762306a36Sopenharmony_ci 81862306a36Sopenharmony_ci if (ret) 81962306a36Sopenharmony_ci dev_dbg(dev, "Failed to update SEV firmware: %#x\n", error); 82062306a36Sopenharmony_ci else 82162306a36Sopenharmony_ci dev_info(dev, "SEV firmware update successful\n"); 82262306a36Sopenharmony_ci 82362306a36Sopenharmony_ci __free_pages(p, order); 82462306a36Sopenharmony_ci 82562306a36Sopenharmony_cifw_err: 82662306a36Sopenharmony_ci release_firmware(firmware); 82762306a36Sopenharmony_ci 82862306a36Sopenharmony_ci return ret; 82962306a36Sopenharmony_ci} 83062306a36Sopenharmony_ci 83162306a36Sopenharmony_cistatic int sev_ioctl_do_pek_import(struct sev_issue_cmd *argp, bool writable) 83262306a36Sopenharmony_ci{ 83362306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 83462306a36Sopenharmony_ci struct sev_user_data_pek_cert_import input; 83562306a36Sopenharmony_ci struct sev_data_pek_cert_import data; 83662306a36Sopenharmony_ci void *pek_blob, *oca_blob; 83762306a36Sopenharmony_ci int ret; 83862306a36Sopenharmony_ci 83962306a36Sopenharmony_ci if (!writable) 84062306a36Sopenharmony_ci return -EPERM; 84162306a36Sopenharmony_ci 84262306a36Sopenharmony_ci if (copy_from_user(&input, (void __user *)argp->data, sizeof(input))) 84362306a36Sopenharmony_ci return -EFAULT; 84462306a36Sopenharmony_ci 84562306a36Sopenharmony_ci /* copy PEK certificate blobs from userspace */ 84662306a36Sopenharmony_ci pek_blob = psp_copy_user_blob(input.pek_cert_address, input.pek_cert_len); 84762306a36Sopenharmony_ci if (IS_ERR(pek_blob)) 84862306a36Sopenharmony_ci return PTR_ERR(pek_blob); 84962306a36Sopenharmony_ci 85062306a36Sopenharmony_ci data.reserved = 0; 85162306a36Sopenharmony_ci data.pek_cert_address = __psp_pa(pek_blob); 85262306a36Sopenharmony_ci data.pek_cert_len = input.pek_cert_len; 85362306a36Sopenharmony_ci 85462306a36Sopenharmony_ci /* copy PEK certificate blobs from userspace */ 85562306a36Sopenharmony_ci oca_blob = psp_copy_user_blob(input.oca_cert_address, input.oca_cert_len); 85662306a36Sopenharmony_ci if (IS_ERR(oca_blob)) { 85762306a36Sopenharmony_ci ret = PTR_ERR(oca_blob); 85862306a36Sopenharmony_ci goto e_free_pek; 85962306a36Sopenharmony_ci } 86062306a36Sopenharmony_ci 86162306a36Sopenharmony_ci data.oca_cert_address = __psp_pa(oca_blob); 86262306a36Sopenharmony_ci data.oca_cert_len = input.oca_cert_len; 86362306a36Sopenharmony_ci 86462306a36Sopenharmony_ci /* If platform is not in INIT state then transition it to INIT */ 86562306a36Sopenharmony_ci if (sev->state != SEV_STATE_INIT) { 86662306a36Sopenharmony_ci ret = __sev_platform_init_locked(&argp->error); 86762306a36Sopenharmony_ci if (ret) 86862306a36Sopenharmony_ci goto e_free_oca; 86962306a36Sopenharmony_ci } 87062306a36Sopenharmony_ci 87162306a36Sopenharmony_ci ret = __sev_do_cmd_locked(SEV_CMD_PEK_CERT_IMPORT, &data, &argp->error); 87262306a36Sopenharmony_ci 87362306a36Sopenharmony_cie_free_oca: 87462306a36Sopenharmony_ci kfree(oca_blob); 87562306a36Sopenharmony_cie_free_pek: 87662306a36Sopenharmony_ci kfree(pek_blob); 87762306a36Sopenharmony_ci return ret; 87862306a36Sopenharmony_ci} 87962306a36Sopenharmony_ci 88062306a36Sopenharmony_cistatic int sev_ioctl_do_get_id2(struct sev_issue_cmd *argp) 88162306a36Sopenharmony_ci{ 88262306a36Sopenharmony_ci struct sev_user_data_get_id2 input; 88362306a36Sopenharmony_ci struct sev_data_get_id data; 88462306a36Sopenharmony_ci void __user *input_address; 88562306a36Sopenharmony_ci void *id_blob = NULL; 88662306a36Sopenharmony_ci int ret; 88762306a36Sopenharmony_ci 88862306a36Sopenharmony_ci /* SEV GET_ID is available from SEV API v0.16 and up */ 88962306a36Sopenharmony_ci if (!sev_version_greater_or_equal(0, 16)) 89062306a36Sopenharmony_ci return -ENOTSUPP; 89162306a36Sopenharmony_ci 89262306a36Sopenharmony_ci if (copy_from_user(&input, (void __user *)argp->data, sizeof(input))) 89362306a36Sopenharmony_ci return -EFAULT; 89462306a36Sopenharmony_ci 89562306a36Sopenharmony_ci input_address = (void __user *)input.address; 89662306a36Sopenharmony_ci 89762306a36Sopenharmony_ci if (input.address && input.length) { 89862306a36Sopenharmony_ci /* 89962306a36Sopenharmony_ci * The length of the ID shouldn't be assumed by software since 90062306a36Sopenharmony_ci * it may change in the future. The allocation size is limited 90162306a36Sopenharmony_ci * to 1 << (PAGE_SHIFT + MAX_ORDER) by the page allocator. 90262306a36Sopenharmony_ci * If the allocation fails, simply return ENOMEM rather than 90362306a36Sopenharmony_ci * warning in the kernel log. 90462306a36Sopenharmony_ci */ 90562306a36Sopenharmony_ci id_blob = kzalloc(input.length, GFP_KERNEL | __GFP_NOWARN); 90662306a36Sopenharmony_ci if (!id_blob) 90762306a36Sopenharmony_ci return -ENOMEM; 90862306a36Sopenharmony_ci 90962306a36Sopenharmony_ci data.address = __psp_pa(id_blob); 91062306a36Sopenharmony_ci data.len = input.length; 91162306a36Sopenharmony_ci } else { 91262306a36Sopenharmony_ci data.address = 0; 91362306a36Sopenharmony_ci data.len = 0; 91462306a36Sopenharmony_ci } 91562306a36Sopenharmony_ci 91662306a36Sopenharmony_ci ret = __sev_do_cmd_locked(SEV_CMD_GET_ID, &data, &argp->error); 91762306a36Sopenharmony_ci 91862306a36Sopenharmony_ci /* 91962306a36Sopenharmony_ci * Firmware will return the length of the ID value (either the minimum 92062306a36Sopenharmony_ci * required length or the actual length written), return it to the user. 92162306a36Sopenharmony_ci */ 92262306a36Sopenharmony_ci input.length = data.len; 92362306a36Sopenharmony_ci 92462306a36Sopenharmony_ci if (copy_to_user((void __user *)argp->data, &input, sizeof(input))) { 92562306a36Sopenharmony_ci ret = -EFAULT; 92662306a36Sopenharmony_ci goto e_free; 92762306a36Sopenharmony_ci } 92862306a36Sopenharmony_ci 92962306a36Sopenharmony_ci if (id_blob) { 93062306a36Sopenharmony_ci if (copy_to_user(input_address, id_blob, data.len)) { 93162306a36Sopenharmony_ci ret = -EFAULT; 93262306a36Sopenharmony_ci goto e_free; 93362306a36Sopenharmony_ci } 93462306a36Sopenharmony_ci } 93562306a36Sopenharmony_ci 93662306a36Sopenharmony_cie_free: 93762306a36Sopenharmony_ci kfree(id_blob); 93862306a36Sopenharmony_ci 93962306a36Sopenharmony_ci return ret; 94062306a36Sopenharmony_ci} 94162306a36Sopenharmony_ci 94262306a36Sopenharmony_cistatic int sev_ioctl_do_get_id(struct sev_issue_cmd *argp) 94362306a36Sopenharmony_ci{ 94462306a36Sopenharmony_ci struct sev_data_get_id *data; 94562306a36Sopenharmony_ci u64 data_size, user_size; 94662306a36Sopenharmony_ci void *id_blob, *mem; 94762306a36Sopenharmony_ci int ret; 94862306a36Sopenharmony_ci 94962306a36Sopenharmony_ci /* SEV GET_ID available from SEV API v0.16 and up */ 95062306a36Sopenharmony_ci if (!sev_version_greater_or_equal(0, 16)) 95162306a36Sopenharmony_ci return -ENOTSUPP; 95262306a36Sopenharmony_ci 95362306a36Sopenharmony_ci /* SEV FW expects the buffer it fills with the ID to be 95462306a36Sopenharmony_ci * 8-byte aligned. Memory allocated should be enough to 95562306a36Sopenharmony_ci * hold data structure + alignment padding + memory 95662306a36Sopenharmony_ci * where SEV FW writes the ID. 95762306a36Sopenharmony_ci */ 95862306a36Sopenharmony_ci data_size = ALIGN(sizeof(struct sev_data_get_id), 8); 95962306a36Sopenharmony_ci user_size = sizeof(struct sev_user_data_get_id); 96062306a36Sopenharmony_ci 96162306a36Sopenharmony_ci mem = kzalloc(data_size + user_size, GFP_KERNEL); 96262306a36Sopenharmony_ci if (!mem) 96362306a36Sopenharmony_ci return -ENOMEM; 96462306a36Sopenharmony_ci 96562306a36Sopenharmony_ci data = mem; 96662306a36Sopenharmony_ci id_blob = mem + data_size; 96762306a36Sopenharmony_ci 96862306a36Sopenharmony_ci data->address = __psp_pa(id_blob); 96962306a36Sopenharmony_ci data->len = user_size; 97062306a36Sopenharmony_ci 97162306a36Sopenharmony_ci ret = __sev_do_cmd_locked(SEV_CMD_GET_ID, data, &argp->error); 97262306a36Sopenharmony_ci if (!ret) { 97362306a36Sopenharmony_ci if (copy_to_user((void __user *)argp->data, id_blob, data->len)) 97462306a36Sopenharmony_ci ret = -EFAULT; 97562306a36Sopenharmony_ci } 97662306a36Sopenharmony_ci 97762306a36Sopenharmony_ci kfree(mem); 97862306a36Sopenharmony_ci 97962306a36Sopenharmony_ci return ret; 98062306a36Sopenharmony_ci} 98162306a36Sopenharmony_ci 98262306a36Sopenharmony_cistatic int sev_ioctl_do_pdh_export(struct sev_issue_cmd *argp, bool writable) 98362306a36Sopenharmony_ci{ 98462306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 98562306a36Sopenharmony_ci struct sev_user_data_pdh_cert_export input; 98662306a36Sopenharmony_ci void *pdh_blob = NULL, *cert_blob = NULL; 98762306a36Sopenharmony_ci struct sev_data_pdh_cert_export data; 98862306a36Sopenharmony_ci void __user *input_cert_chain_address; 98962306a36Sopenharmony_ci void __user *input_pdh_cert_address; 99062306a36Sopenharmony_ci int ret; 99162306a36Sopenharmony_ci 99262306a36Sopenharmony_ci /* If platform is not in INIT state then transition it to INIT. */ 99362306a36Sopenharmony_ci if (sev->state != SEV_STATE_INIT) { 99462306a36Sopenharmony_ci if (!writable) 99562306a36Sopenharmony_ci return -EPERM; 99662306a36Sopenharmony_ci 99762306a36Sopenharmony_ci ret = __sev_platform_init_locked(&argp->error); 99862306a36Sopenharmony_ci if (ret) 99962306a36Sopenharmony_ci return ret; 100062306a36Sopenharmony_ci } 100162306a36Sopenharmony_ci 100262306a36Sopenharmony_ci if (copy_from_user(&input, (void __user *)argp->data, sizeof(input))) 100362306a36Sopenharmony_ci return -EFAULT; 100462306a36Sopenharmony_ci 100562306a36Sopenharmony_ci memset(&data, 0, sizeof(data)); 100662306a36Sopenharmony_ci 100762306a36Sopenharmony_ci /* Userspace wants to query the certificate length. */ 100862306a36Sopenharmony_ci if (!input.pdh_cert_address || 100962306a36Sopenharmony_ci !input.pdh_cert_len || 101062306a36Sopenharmony_ci !input.cert_chain_address) 101162306a36Sopenharmony_ci goto cmd; 101262306a36Sopenharmony_ci 101362306a36Sopenharmony_ci input_pdh_cert_address = (void __user *)input.pdh_cert_address; 101462306a36Sopenharmony_ci input_cert_chain_address = (void __user *)input.cert_chain_address; 101562306a36Sopenharmony_ci 101662306a36Sopenharmony_ci /* Allocate a physically contiguous buffer to store the PDH blob. */ 101762306a36Sopenharmony_ci if (input.pdh_cert_len > SEV_FW_BLOB_MAX_SIZE) 101862306a36Sopenharmony_ci return -EFAULT; 101962306a36Sopenharmony_ci 102062306a36Sopenharmony_ci /* Allocate a physically contiguous buffer to store the cert chain blob. */ 102162306a36Sopenharmony_ci if (input.cert_chain_len > SEV_FW_BLOB_MAX_SIZE) 102262306a36Sopenharmony_ci return -EFAULT; 102362306a36Sopenharmony_ci 102462306a36Sopenharmony_ci pdh_blob = kzalloc(input.pdh_cert_len, GFP_KERNEL); 102562306a36Sopenharmony_ci if (!pdh_blob) 102662306a36Sopenharmony_ci return -ENOMEM; 102762306a36Sopenharmony_ci 102862306a36Sopenharmony_ci data.pdh_cert_address = __psp_pa(pdh_blob); 102962306a36Sopenharmony_ci data.pdh_cert_len = input.pdh_cert_len; 103062306a36Sopenharmony_ci 103162306a36Sopenharmony_ci cert_blob = kzalloc(input.cert_chain_len, GFP_KERNEL); 103262306a36Sopenharmony_ci if (!cert_blob) { 103362306a36Sopenharmony_ci ret = -ENOMEM; 103462306a36Sopenharmony_ci goto e_free_pdh; 103562306a36Sopenharmony_ci } 103662306a36Sopenharmony_ci 103762306a36Sopenharmony_ci data.cert_chain_address = __psp_pa(cert_blob); 103862306a36Sopenharmony_ci data.cert_chain_len = input.cert_chain_len; 103962306a36Sopenharmony_ci 104062306a36Sopenharmony_cicmd: 104162306a36Sopenharmony_ci ret = __sev_do_cmd_locked(SEV_CMD_PDH_CERT_EXPORT, &data, &argp->error); 104262306a36Sopenharmony_ci 104362306a36Sopenharmony_ci /* If we query the length, FW responded with expected data. */ 104462306a36Sopenharmony_ci input.cert_chain_len = data.cert_chain_len; 104562306a36Sopenharmony_ci input.pdh_cert_len = data.pdh_cert_len; 104662306a36Sopenharmony_ci 104762306a36Sopenharmony_ci if (copy_to_user((void __user *)argp->data, &input, sizeof(input))) { 104862306a36Sopenharmony_ci ret = -EFAULT; 104962306a36Sopenharmony_ci goto e_free_cert; 105062306a36Sopenharmony_ci } 105162306a36Sopenharmony_ci 105262306a36Sopenharmony_ci if (pdh_blob) { 105362306a36Sopenharmony_ci if (copy_to_user(input_pdh_cert_address, 105462306a36Sopenharmony_ci pdh_blob, input.pdh_cert_len)) { 105562306a36Sopenharmony_ci ret = -EFAULT; 105662306a36Sopenharmony_ci goto e_free_cert; 105762306a36Sopenharmony_ci } 105862306a36Sopenharmony_ci } 105962306a36Sopenharmony_ci 106062306a36Sopenharmony_ci if (cert_blob) { 106162306a36Sopenharmony_ci if (copy_to_user(input_cert_chain_address, 106262306a36Sopenharmony_ci cert_blob, input.cert_chain_len)) 106362306a36Sopenharmony_ci ret = -EFAULT; 106462306a36Sopenharmony_ci } 106562306a36Sopenharmony_ci 106662306a36Sopenharmony_cie_free_cert: 106762306a36Sopenharmony_ci kfree(cert_blob); 106862306a36Sopenharmony_cie_free_pdh: 106962306a36Sopenharmony_ci kfree(pdh_blob); 107062306a36Sopenharmony_ci return ret; 107162306a36Sopenharmony_ci} 107262306a36Sopenharmony_ci 107362306a36Sopenharmony_cistatic long sev_ioctl(struct file *file, unsigned int ioctl, unsigned long arg) 107462306a36Sopenharmony_ci{ 107562306a36Sopenharmony_ci void __user *argp = (void __user *)arg; 107662306a36Sopenharmony_ci struct sev_issue_cmd input; 107762306a36Sopenharmony_ci int ret = -EFAULT; 107862306a36Sopenharmony_ci bool writable = file->f_mode & FMODE_WRITE; 107962306a36Sopenharmony_ci 108062306a36Sopenharmony_ci if (!psp_master || !psp_master->sev_data) 108162306a36Sopenharmony_ci return -ENODEV; 108262306a36Sopenharmony_ci 108362306a36Sopenharmony_ci if (ioctl != SEV_ISSUE_CMD) 108462306a36Sopenharmony_ci return -EINVAL; 108562306a36Sopenharmony_ci 108662306a36Sopenharmony_ci if (copy_from_user(&input, argp, sizeof(struct sev_issue_cmd))) 108762306a36Sopenharmony_ci return -EFAULT; 108862306a36Sopenharmony_ci 108962306a36Sopenharmony_ci if (input.cmd > SEV_MAX) 109062306a36Sopenharmony_ci return -EINVAL; 109162306a36Sopenharmony_ci 109262306a36Sopenharmony_ci mutex_lock(&sev_cmd_mutex); 109362306a36Sopenharmony_ci 109462306a36Sopenharmony_ci switch (input.cmd) { 109562306a36Sopenharmony_ci 109662306a36Sopenharmony_ci case SEV_FACTORY_RESET: 109762306a36Sopenharmony_ci ret = sev_ioctl_do_reset(&input, writable); 109862306a36Sopenharmony_ci break; 109962306a36Sopenharmony_ci case SEV_PLATFORM_STATUS: 110062306a36Sopenharmony_ci ret = sev_ioctl_do_platform_status(&input); 110162306a36Sopenharmony_ci break; 110262306a36Sopenharmony_ci case SEV_PEK_GEN: 110362306a36Sopenharmony_ci ret = sev_ioctl_do_pek_pdh_gen(SEV_CMD_PEK_GEN, &input, writable); 110462306a36Sopenharmony_ci break; 110562306a36Sopenharmony_ci case SEV_PDH_GEN: 110662306a36Sopenharmony_ci ret = sev_ioctl_do_pek_pdh_gen(SEV_CMD_PDH_GEN, &input, writable); 110762306a36Sopenharmony_ci break; 110862306a36Sopenharmony_ci case SEV_PEK_CSR: 110962306a36Sopenharmony_ci ret = sev_ioctl_do_pek_csr(&input, writable); 111062306a36Sopenharmony_ci break; 111162306a36Sopenharmony_ci case SEV_PEK_CERT_IMPORT: 111262306a36Sopenharmony_ci ret = sev_ioctl_do_pek_import(&input, writable); 111362306a36Sopenharmony_ci break; 111462306a36Sopenharmony_ci case SEV_PDH_CERT_EXPORT: 111562306a36Sopenharmony_ci ret = sev_ioctl_do_pdh_export(&input, writable); 111662306a36Sopenharmony_ci break; 111762306a36Sopenharmony_ci case SEV_GET_ID: 111862306a36Sopenharmony_ci pr_warn_once("SEV_GET_ID command is deprecated, use SEV_GET_ID2\n"); 111962306a36Sopenharmony_ci ret = sev_ioctl_do_get_id(&input); 112062306a36Sopenharmony_ci break; 112162306a36Sopenharmony_ci case SEV_GET_ID2: 112262306a36Sopenharmony_ci ret = sev_ioctl_do_get_id2(&input); 112362306a36Sopenharmony_ci break; 112462306a36Sopenharmony_ci default: 112562306a36Sopenharmony_ci ret = -EINVAL; 112662306a36Sopenharmony_ci goto out; 112762306a36Sopenharmony_ci } 112862306a36Sopenharmony_ci 112962306a36Sopenharmony_ci if (copy_to_user(argp, &input, sizeof(struct sev_issue_cmd))) 113062306a36Sopenharmony_ci ret = -EFAULT; 113162306a36Sopenharmony_ciout: 113262306a36Sopenharmony_ci mutex_unlock(&sev_cmd_mutex); 113362306a36Sopenharmony_ci 113462306a36Sopenharmony_ci return ret; 113562306a36Sopenharmony_ci} 113662306a36Sopenharmony_ci 113762306a36Sopenharmony_cistatic const struct file_operations sev_fops = { 113862306a36Sopenharmony_ci .owner = THIS_MODULE, 113962306a36Sopenharmony_ci .unlocked_ioctl = sev_ioctl, 114062306a36Sopenharmony_ci}; 114162306a36Sopenharmony_ci 114262306a36Sopenharmony_ciint sev_platform_status(struct sev_user_data_status *data, int *error) 114362306a36Sopenharmony_ci{ 114462306a36Sopenharmony_ci return sev_do_cmd(SEV_CMD_PLATFORM_STATUS, data, error); 114562306a36Sopenharmony_ci} 114662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(sev_platform_status); 114762306a36Sopenharmony_ci 114862306a36Sopenharmony_ciint sev_guest_deactivate(struct sev_data_deactivate *data, int *error) 114962306a36Sopenharmony_ci{ 115062306a36Sopenharmony_ci return sev_do_cmd(SEV_CMD_DEACTIVATE, data, error); 115162306a36Sopenharmony_ci} 115262306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(sev_guest_deactivate); 115362306a36Sopenharmony_ci 115462306a36Sopenharmony_ciint sev_guest_activate(struct sev_data_activate *data, int *error) 115562306a36Sopenharmony_ci{ 115662306a36Sopenharmony_ci return sev_do_cmd(SEV_CMD_ACTIVATE, data, error); 115762306a36Sopenharmony_ci} 115862306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(sev_guest_activate); 115962306a36Sopenharmony_ci 116062306a36Sopenharmony_ciint sev_guest_decommission(struct sev_data_decommission *data, int *error) 116162306a36Sopenharmony_ci{ 116262306a36Sopenharmony_ci return sev_do_cmd(SEV_CMD_DECOMMISSION, data, error); 116362306a36Sopenharmony_ci} 116462306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(sev_guest_decommission); 116562306a36Sopenharmony_ci 116662306a36Sopenharmony_ciint sev_guest_df_flush(int *error) 116762306a36Sopenharmony_ci{ 116862306a36Sopenharmony_ci return sev_do_cmd(SEV_CMD_DF_FLUSH, NULL, error); 116962306a36Sopenharmony_ci} 117062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(sev_guest_df_flush); 117162306a36Sopenharmony_ci 117262306a36Sopenharmony_cistatic void sev_exit(struct kref *ref) 117362306a36Sopenharmony_ci{ 117462306a36Sopenharmony_ci misc_deregister(&misc_dev->misc); 117562306a36Sopenharmony_ci kfree(misc_dev); 117662306a36Sopenharmony_ci misc_dev = NULL; 117762306a36Sopenharmony_ci} 117862306a36Sopenharmony_ci 117962306a36Sopenharmony_cistatic int sev_misc_init(struct sev_device *sev) 118062306a36Sopenharmony_ci{ 118162306a36Sopenharmony_ci struct device *dev = sev->dev; 118262306a36Sopenharmony_ci int ret; 118362306a36Sopenharmony_ci 118462306a36Sopenharmony_ci /* 118562306a36Sopenharmony_ci * SEV feature support can be detected on multiple devices but the SEV 118662306a36Sopenharmony_ci * FW commands must be issued on the master. During probe, we do not 118762306a36Sopenharmony_ci * know the master hence we create /dev/sev on the first device probe. 118862306a36Sopenharmony_ci * sev_do_cmd() finds the right master device to which to issue the 118962306a36Sopenharmony_ci * command to the firmware. 119062306a36Sopenharmony_ci */ 119162306a36Sopenharmony_ci if (!misc_dev) { 119262306a36Sopenharmony_ci struct miscdevice *misc; 119362306a36Sopenharmony_ci 119462306a36Sopenharmony_ci misc_dev = kzalloc(sizeof(*misc_dev), GFP_KERNEL); 119562306a36Sopenharmony_ci if (!misc_dev) 119662306a36Sopenharmony_ci return -ENOMEM; 119762306a36Sopenharmony_ci 119862306a36Sopenharmony_ci misc = &misc_dev->misc; 119962306a36Sopenharmony_ci misc->minor = MISC_DYNAMIC_MINOR; 120062306a36Sopenharmony_ci misc->name = DEVICE_NAME; 120162306a36Sopenharmony_ci misc->fops = &sev_fops; 120262306a36Sopenharmony_ci 120362306a36Sopenharmony_ci ret = misc_register(misc); 120462306a36Sopenharmony_ci if (ret) 120562306a36Sopenharmony_ci return ret; 120662306a36Sopenharmony_ci 120762306a36Sopenharmony_ci kref_init(&misc_dev->refcount); 120862306a36Sopenharmony_ci } else { 120962306a36Sopenharmony_ci kref_get(&misc_dev->refcount); 121062306a36Sopenharmony_ci } 121162306a36Sopenharmony_ci 121262306a36Sopenharmony_ci init_waitqueue_head(&sev->int_queue); 121362306a36Sopenharmony_ci sev->misc = misc_dev; 121462306a36Sopenharmony_ci dev_dbg(dev, "registered SEV device\n"); 121562306a36Sopenharmony_ci 121662306a36Sopenharmony_ci return 0; 121762306a36Sopenharmony_ci} 121862306a36Sopenharmony_ci 121962306a36Sopenharmony_ciint sev_dev_init(struct psp_device *psp) 122062306a36Sopenharmony_ci{ 122162306a36Sopenharmony_ci struct device *dev = psp->dev; 122262306a36Sopenharmony_ci struct sev_device *sev; 122362306a36Sopenharmony_ci int ret = -ENOMEM; 122462306a36Sopenharmony_ci 122562306a36Sopenharmony_ci if (!boot_cpu_has(X86_FEATURE_SEV)) { 122662306a36Sopenharmony_ci dev_info_once(dev, "SEV: memory encryption not enabled by BIOS\n"); 122762306a36Sopenharmony_ci return 0; 122862306a36Sopenharmony_ci } 122962306a36Sopenharmony_ci 123062306a36Sopenharmony_ci sev = devm_kzalloc(dev, sizeof(*sev), GFP_KERNEL); 123162306a36Sopenharmony_ci if (!sev) 123262306a36Sopenharmony_ci goto e_err; 123362306a36Sopenharmony_ci 123462306a36Sopenharmony_ci sev->cmd_buf = (void *)devm_get_free_pages(dev, GFP_KERNEL, 0); 123562306a36Sopenharmony_ci if (!sev->cmd_buf) 123662306a36Sopenharmony_ci goto e_sev; 123762306a36Sopenharmony_ci 123862306a36Sopenharmony_ci psp->sev_data = sev; 123962306a36Sopenharmony_ci 124062306a36Sopenharmony_ci sev->dev = dev; 124162306a36Sopenharmony_ci sev->psp = psp; 124262306a36Sopenharmony_ci 124362306a36Sopenharmony_ci sev->io_regs = psp->io_regs; 124462306a36Sopenharmony_ci 124562306a36Sopenharmony_ci sev->vdata = (struct sev_vdata *)psp->vdata->sev; 124662306a36Sopenharmony_ci if (!sev->vdata) { 124762306a36Sopenharmony_ci ret = -ENODEV; 124862306a36Sopenharmony_ci dev_err(dev, "sev: missing driver data\n"); 124962306a36Sopenharmony_ci goto e_buf; 125062306a36Sopenharmony_ci } 125162306a36Sopenharmony_ci 125262306a36Sopenharmony_ci psp_set_sev_irq_handler(psp, sev_irq_handler, sev); 125362306a36Sopenharmony_ci 125462306a36Sopenharmony_ci ret = sev_misc_init(sev); 125562306a36Sopenharmony_ci if (ret) 125662306a36Sopenharmony_ci goto e_irq; 125762306a36Sopenharmony_ci 125862306a36Sopenharmony_ci dev_notice(dev, "sev enabled\n"); 125962306a36Sopenharmony_ci 126062306a36Sopenharmony_ci return 0; 126162306a36Sopenharmony_ci 126262306a36Sopenharmony_cie_irq: 126362306a36Sopenharmony_ci psp_clear_sev_irq_handler(psp); 126462306a36Sopenharmony_cie_buf: 126562306a36Sopenharmony_ci devm_free_pages(dev, (unsigned long)sev->cmd_buf); 126662306a36Sopenharmony_cie_sev: 126762306a36Sopenharmony_ci devm_kfree(dev, sev); 126862306a36Sopenharmony_cie_err: 126962306a36Sopenharmony_ci psp->sev_data = NULL; 127062306a36Sopenharmony_ci 127162306a36Sopenharmony_ci dev_notice(dev, "sev initialization failed\n"); 127262306a36Sopenharmony_ci 127362306a36Sopenharmony_ci return ret; 127462306a36Sopenharmony_ci} 127562306a36Sopenharmony_ci 127662306a36Sopenharmony_cistatic void sev_firmware_shutdown(struct sev_device *sev) 127762306a36Sopenharmony_ci{ 127862306a36Sopenharmony_ci sev_platform_shutdown(NULL); 127962306a36Sopenharmony_ci 128062306a36Sopenharmony_ci if (sev_es_tmr) { 128162306a36Sopenharmony_ci /* The TMR area was encrypted, flush it from the cache */ 128262306a36Sopenharmony_ci wbinvd_on_all_cpus(); 128362306a36Sopenharmony_ci 128462306a36Sopenharmony_ci free_pages((unsigned long)sev_es_tmr, 128562306a36Sopenharmony_ci get_order(SEV_ES_TMR_SIZE)); 128662306a36Sopenharmony_ci sev_es_tmr = NULL; 128762306a36Sopenharmony_ci } 128862306a36Sopenharmony_ci 128962306a36Sopenharmony_ci if (sev_init_ex_buffer) { 129062306a36Sopenharmony_ci free_pages((unsigned long)sev_init_ex_buffer, 129162306a36Sopenharmony_ci get_order(NV_LENGTH)); 129262306a36Sopenharmony_ci sev_init_ex_buffer = NULL; 129362306a36Sopenharmony_ci } 129462306a36Sopenharmony_ci} 129562306a36Sopenharmony_ci 129662306a36Sopenharmony_civoid sev_dev_destroy(struct psp_device *psp) 129762306a36Sopenharmony_ci{ 129862306a36Sopenharmony_ci struct sev_device *sev = psp->sev_data; 129962306a36Sopenharmony_ci 130062306a36Sopenharmony_ci if (!sev) 130162306a36Sopenharmony_ci return; 130262306a36Sopenharmony_ci 130362306a36Sopenharmony_ci sev_firmware_shutdown(sev); 130462306a36Sopenharmony_ci 130562306a36Sopenharmony_ci if (sev->misc) 130662306a36Sopenharmony_ci kref_put(&misc_dev->refcount, sev_exit); 130762306a36Sopenharmony_ci 130862306a36Sopenharmony_ci psp_clear_sev_irq_handler(psp); 130962306a36Sopenharmony_ci} 131062306a36Sopenharmony_ci 131162306a36Sopenharmony_ciint sev_issue_cmd_external_user(struct file *filep, unsigned int cmd, 131262306a36Sopenharmony_ci void *data, int *error) 131362306a36Sopenharmony_ci{ 131462306a36Sopenharmony_ci if (!filep || filep->f_op != &sev_fops) 131562306a36Sopenharmony_ci return -EBADF; 131662306a36Sopenharmony_ci 131762306a36Sopenharmony_ci return sev_do_cmd(cmd, data, error); 131862306a36Sopenharmony_ci} 131962306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(sev_issue_cmd_external_user); 132062306a36Sopenharmony_ci 132162306a36Sopenharmony_civoid sev_pci_init(void) 132262306a36Sopenharmony_ci{ 132362306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 132462306a36Sopenharmony_ci int error, rc; 132562306a36Sopenharmony_ci 132662306a36Sopenharmony_ci if (!sev) 132762306a36Sopenharmony_ci return; 132862306a36Sopenharmony_ci 132962306a36Sopenharmony_ci psp_timeout = psp_probe_timeout; 133062306a36Sopenharmony_ci 133162306a36Sopenharmony_ci if (sev_get_api_version()) 133262306a36Sopenharmony_ci goto err; 133362306a36Sopenharmony_ci 133462306a36Sopenharmony_ci if (sev_update_firmware(sev->dev) == 0) 133562306a36Sopenharmony_ci sev_get_api_version(); 133662306a36Sopenharmony_ci 133762306a36Sopenharmony_ci /* If an init_ex_path is provided rely on INIT_EX for PSP initialization 133862306a36Sopenharmony_ci * instead of INIT. 133962306a36Sopenharmony_ci */ 134062306a36Sopenharmony_ci if (init_ex_path) { 134162306a36Sopenharmony_ci sev_init_ex_buffer = sev_fw_alloc(NV_LENGTH); 134262306a36Sopenharmony_ci if (!sev_init_ex_buffer) { 134362306a36Sopenharmony_ci dev_err(sev->dev, 134462306a36Sopenharmony_ci "SEV: INIT_EX NV memory allocation failed\n"); 134562306a36Sopenharmony_ci goto err; 134662306a36Sopenharmony_ci } 134762306a36Sopenharmony_ci } 134862306a36Sopenharmony_ci 134962306a36Sopenharmony_ci /* Obtain the TMR memory area for SEV-ES use */ 135062306a36Sopenharmony_ci sev_es_tmr = sev_fw_alloc(SEV_ES_TMR_SIZE); 135162306a36Sopenharmony_ci if (sev_es_tmr) 135262306a36Sopenharmony_ci /* Must flush the cache before giving it to the firmware */ 135362306a36Sopenharmony_ci clflush_cache_range(sev_es_tmr, SEV_ES_TMR_SIZE); 135462306a36Sopenharmony_ci else 135562306a36Sopenharmony_ci dev_warn(sev->dev, 135662306a36Sopenharmony_ci "SEV: TMR allocation failed, SEV-ES support unavailable\n"); 135762306a36Sopenharmony_ci 135862306a36Sopenharmony_ci if (!psp_init_on_probe) 135962306a36Sopenharmony_ci return; 136062306a36Sopenharmony_ci 136162306a36Sopenharmony_ci /* Initialize the platform */ 136262306a36Sopenharmony_ci rc = sev_platform_init(&error); 136362306a36Sopenharmony_ci if (rc) 136462306a36Sopenharmony_ci dev_err(sev->dev, "SEV: failed to INIT error %#x, rc %d\n", 136562306a36Sopenharmony_ci error, rc); 136662306a36Sopenharmony_ci 136762306a36Sopenharmony_ci return; 136862306a36Sopenharmony_ci 136962306a36Sopenharmony_cierr: 137062306a36Sopenharmony_ci psp_master->sev_data = NULL; 137162306a36Sopenharmony_ci} 137262306a36Sopenharmony_ci 137362306a36Sopenharmony_civoid sev_pci_exit(void) 137462306a36Sopenharmony_ci{ 137562306a36Sopenharmony_ci struct sev_device *sev = psp_master->sev_data; 137662306a36Sopenharmony_ci 137762306a36Sopenharmony_ci if (!sev) 137862306a36Sopenharmony_ci return; 137962306a36Sopenharmony_ci 138062306a36Sopenharmony_ci sev_firmware_shutdown(sev); 138162306a36Sopenharmony_ci} 1382