/* SPDX-License-Identifier: GPL-2.0 */ #ifndef _ASM_X86_SHARED_TDX_H #define _ASM_X86_SHARED_TDX_H #include #include #define TDX_HYPERCALL_STANDARD 0 #define TDX_CPUID_LEAF_ID 0x21 #define TDX_IDENT "IntelTDX " /* TDX module Call Leaf IDs */ #define TDG_VP_VMCALL 0 #define TDG_VP_INFO 1 #define TDG_VP_VEINFO_GET 3 #define TDG_MR_REPORT 4 #define TDG_MEM_PAGE_ACCEPT 6 #define TDG_VM_WR 8 /* TDCS fields. To be used by TDG.VM.WR and TDG.VM.RD module calls */ #define TDCS_NOTIFY_ENABLES 0x9100000000000010 /* TDX hypercall Leaf IDs */ #define TDVMCALL_MAP_GPA 0x10001 #define TDVMCALL_GET_QUOTE 0x10002 #define TDVMCALL_REPORT_FATAL_ERROR 0x10003 #define TDVMCALL_STATUS_RETRY 1 /* * Bitmasks of exposed registers (with VMM). */ #define TDX_RDX BIT(2) #define TDX_RBX BIT(3) #define TDX_RSI BIT(6) #define TDX_RDI BIT(7) #define TDX_R8 BIT(8) #define TDX_R9 BIT(9) #define TDX_R10 BIT(10) #define TDX_R11 BIT(11) #define TDX_R12 BIT(12) #define TDX_R13 BIT(13) #define TDX_R14 BIT(14) #define TDX_R15 BIT(15) /* * These registers are clobbered to hold arguments for each * TDVMCALL. They are safe to expose to the VMM. * Each bit in this mask represents a register ID. Bit field * details can be found in TDX GHCI specification, section * titled "TDCALL [TDG.VP.VMCALL] leaf". */ #define TDVMCALL_EXPOSE_REGS_MASK \ (TDX_RDX | TDX_RBX | TDX_RSI | TDX_RDI | TDX_R8 | TDX_R9 | \ TDX_R10 | TDX_R11 | TDX_R12 | TDX_R13 | TDX_R14 | TDX_R15) #ifndef __ASSEMBLY__ #include /* * Used in __tdcall*() to gather the input/output registers' values of the * TDCALL instruction when requesting services from the TDX module. This is a * software only structure and not part of the TDX module/VMM ABI */ struct tdx_module_args { /* callee-clobbered */ u64 rcx; u64 rdx; u64 r8; u64 r9; /* extra callee-clobbered */ u64 r10; u64 r11; /* callee-saved + rdi/rsi */ u64 r12; u64 r13; u64 r14; u64 r15; u64 rbx; u64 rdi; u64 rsi; }; /* Used to communicate with the TDX module */ u64 __tdcall(u64 fn, struct tdx_module_args *args); u64 __tdcall_ret(u64 fn, struct tdx_module_args *args); u64 __tdcall_saved_ret(u64 fn, struct tdx_module_args *args); /* Used to request services from the VMM */ u64 __tdx_hypercall(struct tdx_module_args *args); /* * Wrapper for standard use of __tdx_hypercall with no output aside from * return code. */ static inline u64 _tdx_hypercall(u64 fn, u64 r12, u64 r13, u64 r14, u64 r15) { struct tdx_module_args args = { .r10 = TDX_HYPERCALL_STANDARD, .r11 = fn, .r12 = r12, .r13 = r13, .r14 = r14, .r15 = r15, }; return __tdx_hypercall(&args); } /* Called from __tdx_hypercall() for unrecoverable failure */ void __noreturn __tdx_hypercall_failed(void); bool tdx_accept_memory(phys_addr_t start, phys_addr_t end); /* * The TDG.VP.VMCALL-Instruction-execution sub-functions are defined * independently from but are currently matched 1:1 with VMX EXIT_REASONs. * Reusing the KVM EXIT_REASON macros makes it easier to connect the host and * guest sides of these calls. */ static __always_inline u64 hcall_func(u64 exit_reason) { return exit_reason; } #endif /* !__ASSEMBLY__ */ #endif /* _ASM_X86_SHARED_TDX_H */