xref: /linux/arch/x86/include/asm/shared/tdx.h (revision e669e322c52c49c161e46492963e64319fbb53a8)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef _ASM_X86_SHARED_TDX_H
3 #define _ASM_X86_SHARED_TDX_H
4 
5 #include <linux/bits.h>
6 #include <linux/types.h>
7 
8 #define TDX_HYPERCALL_STANDARD  0
9 
10 #define TDX_CPUID_LEAF_ID	0x21
11 #define TDX_IDENT		"IntelTDX    "
12 
13 /* TDX module Call Leaf IDs */
14 #define TDG_VP_VMCALL			0
15 #define TDG_VP_INFO			1
16 #define TDG_MR_RTMR_EXTEND		2
17 #define TDG_VP_VEINFO_GET		3
18 #define TDG_MR_REPORT			4
19 #define TDG_MEM_PAGE_ACCEPT		6
20 #define TDG_VM_RD			7
21 #define TDG_VM_WR			8
22 
23 /* TDX attributes */
24 #define TDX_ATTR_DEBUG_BIT		0
25 #define TDX_ATTR_DEBUG			BIT_ULL(TDX_ATTR_DEBUG_BIT)
26 #define TDX_ATTR_HGS_PLUS_PROF_BIT	4
27 #define TDX_ATTR_HGS_PLUS_PROF		BIT_ULL(TDX_ATTR_HGS_PLUS_PROF_BIT)
28 #define TDX_ATTR_PERF_PROF_BIT		5
29 #define TDX_ATTR_PERF_PROF		BIT_ULL(TDX_ATTR_PERF_PROF_BIT)
30 #define TDX_ATTR_PMT_PROF_BIT		6
31 #define TDX_ATTR_PMT_PROF		BIT_ULL(TDX_ATTR_PMT_PROF_BIT)
32 #define TDX_ATTR_ICSSD_BIT		16
33 #define TDX_ATTR_ICSSD			BIT_ULL(TDX_ATTR_ICSSD_BIT)
34 #define TDX_ATTR_LASS_BIT		27
35 #define TDX_ATTR_LASS			BIT_ULL(TDX_ATTR_LASS_BIT)
36 #define TDX_ATTR_SEPT_VE_DISABLE_BIT	28
37 #define TDX_ATTR_SEPT_VE_DISABLE	BIT_ULL(TDX_ATTR_SEPT_VE_DISABLE_BIT)
38 #define TDX_ATTR_MIGRTABLE_BIT		29
39 #define TDX_ATTR_MIGRTABLE		BIT_ULL(TDX_ATTR_MIGRTABLE_BIT)
40 #define TDX_ATTR_PKS_BIT		30
41 #define TDX_ATTR_PKS			BIT_ULL(TDX_ATTR_PKS_BIT)
42 #define TDX_ATTR_KL_BIT			31
43 #define TDX_ATTR_KL			BIT_ULL(TDX_ATTR_KL_BIT)
44 #define TDX_ATTR_TPA_BIT		62
45 #define TDX_ATTR_TPA			BIT_ULL(TDX_ATTR_TPA_BIT)
46 #define TDX_ATTR_PERFMON_BIT		63
47 #define TDX_ATTR_PERFMON		BIT_ULL(TDX_ATTR_PERFMON_BIT)
48 
49 /* TDX TD-Scope Metadata. To be used by TDG.VM.WR and TDG.VM.RD */
50 #define TDCS_CONFIG_FLAGS		0x1110000300000016
51 #define TDCS_TD_CTLS			0x1110000300000017
52 #define TDCS_NOTIFY_ENABLES		0x9100000000000010
53 #define TDCS_TOPOLOGY_ENUM_CONFIGURED	0x9100000000000019
54 
55 /* TDCS_CONFIG_FLAGS bits */
56 #define TDCS_CONFIG_FLEXIBLE_PENDING_VE	BIT_ULL(1)
57 
58 /* TDCS_TD_CTLS bits */
59 #define TD_CTLS_PENDING_VE_DISABLE_BIT	0
60 #define TD_CTLS_PENDING_VE_DISABLE	BIT_ULL(TD_CTLS_PENDING_VE_DISABLE_BIT)
61 #define TD_CTLS_ENUM_TOPOLOGY_BIT	1
62 #define TD_CTLS_ENUM_TOPOLOGY		BIT_ULL(TD_CTLS_ENUM_TOPOLOGY_BIT)
63 #define TD_CTLS_VIRT_CPUID2_BIT		2
64 #define TD_CTLS_VIRT_CPUID2		BIT_ULL(TD_CTLS_VIRT_CPUID2_BIT)
65 #define TD_CTLS_REDUCE_VE_BIT		3
66 #define TD_CTLS_REDUCE_VE		BIT_ULL(TD_CTLS_REDUCE_VE_BIT)
67 #define TD_CTLS_LOCK_BIT		63
68 #define TD_CTLS_LOCK			BIT_ULL(TD_CTLS_LOCK_BIT)
69 
70 /* TDX hypercall Leaf IDs */
71 #define TDVMCALL_GET_TD_VM_CALL_INFO	0x10000
72 #define TDVMCALL_MAP_GPA		0x10001
73 #define TDVMCALL_GET_QUOTE		0x10002
74 #define TDVMCALL_REPORT_FATAL_ERROR	0x10003
75 
76 /*
77  * TDG.VP.VMCALL Status Codes (returned in R10)
78  */
79 #define TDVMCALL_STATUS_SUCCESS		0x0000000000000000ULL
80 #define TDVMCALL_STATUS_RETRY		0x0000000000000001ULL
81 #define TDVMCALL_STATUS_INVALID_OPERAND	0x8000000000000000ULL
82 #define TDVMCALL_STATUS_ALIGN_ERROR	0x8000000000000002ULL
83 #define TDVMCALL_STATUS_SUBFUNC_UNSUPPORTED	0x8000000000000003ULL
84 
85 /*
86  * Bitmasks of exposed registers (with VMM).
87  */
88 #define TDX_RDX		BIT(2)
89 #define TDX_RBX		BIT(3)
90 #define TDX_RSI		BIT(6)
91 #define TDX_RDI		BIT(7)
92 #define TDX_R8		BIT(8)
93 #define TDX_R9		BIT(9)
94 #define TDX_R10		BIT(10)
95 #define TDX_R11		BIT(11)
96 #define TDX_R12		BIT(12)
97 #define TDX_R13		BIT(13)
98 #define TDX_R14		BIT(14)
99 #define TDX_R15		BIT(15)
100 
101 /*
102  * These registers are clobbered to hold arguments for each
103  * TDVMCALL. They are safe to expose to the VMM.
104  * Each bit in this mask represents a register ID. Bit field
105  * details can be found in TDX GHCI specification, section
106  * titled "TDCALL [TDG.VP.VMCALL] leaf".
107  */
108 #define TDVMCALL_EXPOSE_REGS_MASK	\
109 	(TDX_RDX | TDX_RBX | TDX_RSI | TDX_RDI | TDX_R8  | TDX_R9  | \
110 	 TDX_R10 | TDX_R11 | TDX_R12 | TDX_R13 | TDX_R14 | TDX_R15)
111 
112 /* TDX supported page sizes from the TDX module ABI. */
113 #define TDX_PS_4K	0
114 #define TDX_PS_2M	1
115 #define TDX_PS_1G	2
116 #define TDX_PS_NR	(TDX_PS_1G + 1)
117 
118 #ifndef __ASSEMBLER__
119 
120 #include <linux/compiler_attributes.h>
121 
122 /*
123  * Used in __tdcall*() to gather the input/output registers' values of the
124  * TDCALL instruction when requesting services from the TDX module. This is a
125  * software only structure and not part of the TDX module/VMM ABI
126  */
127 struct tdx_module_args {
128 	/* callee-clobbered */
129 	u64 rcx;
130 	u64 rdx;
131 	u64 r8;
132 	u64 r9;
133 	/* extra callee-clobbered */
134 	u64 r10;
135 	u64 r11;
136 	/* callee-saved + rdi/rsi */
137 	u64 r12;
138 	u64 r13;
139 	u64 r14;
140 	u64 r15;
141 	u64 rbx;
142 	u64 rdi;
143 	u64 rsi;
144 };
145 
146 /* Used to communicate with the TDX module */
147 u64 __tdcall(u64 fn, struct tdx_module_args *args);
148 u64 __tdcall_ret(u64 fn, struct tdx_module_args *args);
149 u64 __tdcall_saved_ret(u64 fn, struct tdx_module_args *args);
150 
151 /* Used to request services from the VMM */
152 u64 __tdx_hypercall(struct tdx_module_args *args);
153 
154 /*
155  * Wrapper for standard use of __tdx_hypercall with no output aside from
156  * return code.
157  */
_tdx_hypercall(u64 fn,u64 r12,u64 r13,u64 r14,u64 r15)158 static inline u64 _tdx_hypercall(u64 fn, u64 r12, u64 r13, u64 r14, u64 r15)
159 {
160 	struct tdx_module_args args = {
161 		.r10 = TDX_HYPERCALL_STANDARD,
162 		.r11 = fn,
163 		.r12 = r12,
164 		.r13 = r13,
165 		.r14 = r14,
166 		.r15 = r15,
167 	};
168 
169 	return __tdx_hypercall(&args);
170 }
171 
172 
173 /* Called from __tdx_hypercall() for unrecoverable failure */
174 void __noreturn __tdx_hypercall_failed(void);
175 
176 bool tdx_accept_memory(phys_addr_t start, phys_addr_t end);
177 
178 /*
179  * The TDG.VP.VMCALL-Instruction-execution sub-functions are defined
180  * independently from but are currently matched 1:1 with VMX EXIT_REASONs.
181  * Reusing the KVM EXIT_REASON macros makes it easier to connect the host and
182  * guest sides of these calls.
183  */
hcall_func(u64 exit_reason)184 static __always_inline u64 hcall_func(u64 exit_reason)
185 {
186         return exit_reason;
187 }
188 
189 #endif /* !__ASSEMBLER__ */
190 #endif /* _ASM_X86_SHARED_TDX_H */
191