1/* SPDX-License-Identifier: GPL-2.0 */ 2#ifndef _ASM_X86_SHARED_TDX_H 3#define _ASM_X86_SHARED_TDX_H 4 5#include <linux/bits.h> 6#include <linux/types.h> 7 8#define TDX_HYPERCALL_STANDARD 0 9 10#define TDX_CPUID_LEAF_ID 0x21 11#define TDX_IDENT "IntelTDX " 12 13/* TDX module Call Leaf IDs */ 14#define TDG_VP_VMCALL 0 15#define TDG_VP_INFO 1 16#define TDG_VP_VEINFO_GET 3 17#define TDG_MR_REPORT 4 18#define TDG_MEM_PAGE_ACCEPT 6 19#define TDG_VM_WR 8 20 21/* TDCS fields. To be used by TDG.VM.WR and TDG.VM.RD module calls */ 22#define TDCS_NOTIFY_ENABLES 0x9100000000000010 23 24/* TDX hypercall Leaf IDs */ 25#define TDVMCALL_MAP_GPA 0x10001 26#define TDVMCALL_GET_QUOTE 0x10002 27#define TDVMCALL_REPORT_FATAL_ERROR 0x10003 28 29#define TDVMCALL_STATUS_RETRY 1 30 31/* 32 * Bitmasks of exposed registers (with VMM). 33 */ 34#define TDX_RDX BIT(2) 35#define TDX_RBX BIT(3) 36#define TDX_RSI BIT(6) 37#define TDX_RDI BIT(7) 38#define TDX_R8 BIT(8) 39#define TDX_R9 BIT(9) 40#define TDX_R10 BIT(10) 41#define TDX_R11 BIT(11) 42#define TDX_R12 BIT(12) 43#define TDX_R13 BIT(13) 44#define TDX_R14 BIT(14) 45#define TDX_R15 BIT(15) 46 47/* 48 * These registers are clobbered to hold arguments for each 49 * TDVMCALL. They are safe to expose to the VMM. 50 * Each bit in this mask represents a register ID. Bit field 51 * details can be found in TDX GHCI specification, section 52 * titled "TDCALL [TDG.VP.VMCALL] leaf". 53 */ 54#define TDVMCALL_EXPOSE_REGS_MASK \ 55 (TDX_RDX | TDX_RBX | TDX_RSI | TDX_RDI | TDX_R8 | TDX_R9 | \ 56 TDX_R10 | TDX_R11 | TDX_R12 | TDX_R13 | TDX_R14 | TDX_R15) 57 58/* TDX supported page sizes from the TDX module ABI. */ 59#define TDX_PS_4K 0 60#define TDX_PS_2M 1 61#define TDX_PS_1G 2 62#define TDX_PS_NR (TDX_PS_1G + 1) 63 64#ifndef __ASSEMBLY__ 65 66#include <linux/compiler_attributes.h> 67 68/* 69 * Used in __tdcall*() to gather the input/output registers' values of the 70 * TDCALL instruction when requesting services from the TDX module. This is a 71 * software only structure and not part of the TDX module/VMM ABI 72 */ 73struct tdx_module_args { 74 /* callee-clobbered */ 75 u64 rcx; 76 u64 rdx; 77 u64 r8; 78 u64 r9; 79 /* extra callee-clobbered */ 80 u64 r10; 81 u64 r11; 82 /* callee-saved + rdi/rsi */ 83 u64 r12; 84 u64 r13; 85 u64 r14; 86 u64 r15; 87 u64 rbx; 88 u64 rdi; 89 u64 rsi; 90}; 91 92/* Used to communicate with the TDX module */ 93u64 __tdcall(u64 fn, struct tdx_module_args *args); 94u64 __tdcall_ret(u64 fn, struct tdx_module_args *args); 95u64 __tdcall_saved_ret(u64 fn, struct tdx_module_args *args); 96 97/* Used to request services from the VMM */ 98u64 __tdx_hypercall(struct tdx_module_args *args); 99 100/* 101 * Wrapper for standard use of __tdx_hypercall with no output aside from 102 * return code. 103 */ 104static inline u64 _tdx_hypercall(u64 fn, u64 r12, u64 r13, u64 r14, u64 r15) 105{ 106 struct tdx_module_args args = { 107 .r10 = TDX_HYPERCALL_STANDARD, 108 .r11 = fn, 109 .r12 = r12, 110 .r13 = r13, 111 .r14 = r14, 112 .r15 = r15, 113 }; 114 115 return __tdx_hypercall(&args); 116} 117 118 119/* Called from __tdx_hypercall() for unrecoverable failure */ 120void __noreturn __tdx_hypercall_failed(void); 121 122bool tdx_accept_memory(phys_addr_t start, phys_addr_t end); 123 124/* 125 * The TDG.VP.VMCALL-Instruction-execution sub-functions are defined 126 * independently from but are currently matched 1:1 with VMX EXIT_REASONs. 127 * Reusing the KVM EXIT_REASON macros makes it easier to connect the host and 128 * guest sides of these calls. 129 */ 130static __always_inline u64 hcall_func(u64 exit_reason) 131{ 132 return exit_reason; 133} 134 135#endif /* !__ASSEMBLY__ */ 136#endif /* _ASM_X86_SHARED_TDX_H */ 137