| /* SPDX-License-Identifier: GPL-2.0 */ |
| /* Copyright (C) 2021-2022 Intel Corporation */ |
| #ifndef _ASM_X86_TDX_H |
| #define _ASM_X86_TDX_H |
| |
| #include <linux/init.h> |
| #include <linux/bits.h> |
| #include <asm/ptrace.h> |
| #include <asm/shared/tdx.h> |
| |
| /* |
| * SW-defined error codes. |
| * |
| * Bits 47:40 == 0xFF indicate Reserved status code class that never used by |
| * TDX module. |
| */ |
| #define TDX_ERROR _BITUL(63) |
| #define TDX_SW_ERROR (TDX_ERROR | GENMASK_ULL(47, 40)) |
| #define TDX_SEAMCALL_VMFAILINVALID (TDX_SW_ERROR | _UL(0xFFFF0000)) |
| |
| #ifndef __ASSEMBLY__ |
| |
| /* |
| * Used to gather the output registers values of the TDCALL and SEAMCALL |
| * instructions when requesting services from the TDX module. |
| * |
| * This is a software only structure and not part of the TDX module/VMM ABI. |
| */ |
| struct tdx_module_output { |
| u64 rcx; |
| u64 rdx; |
| u64 r8; |
| u64 r9; |
| u64 r10; |
| u64 r11; |
| }; |
| |
| /* |
| * Used by the #VE exception handler to gather the #VE exception |
| * info from the TDX module. This is a software only structure |
| * and not part of the TDX module/VMM ABI. |
| */ |
| struct ve_info { |
| u64 exit_reason; |
| u64 exit_qual; |
| /* Guest Linear (virtual) Address */ |
| u64 gla; |
| /* Guest Physical Address */ |
| u64 gpa; |
| u32 instr_len; |
| u32 instr_info; |
| }; |
| |
| #ifdef CONFIG_INTEL_TDX_GUEST |
| |
| void __init tdx_early_init(void); |
| |
| /* Used to communicate with the TDX module */ |
| u64 __tdx_module_call(u64 fn, u64 rcx, u64 rdx, u64 r8, u64 r9, |
| struct tdx_module_output *out); |
| |
| void tdx_get_ve_info(struct ve_info *ve); |
| |
| bool tdx_handle_virt_exception(struct pt_regs *regs, struct ve_info *ve); |
| |
| void tdx_safe_halt(void); |
| |
| bool tdx_early_handle_ve(struct pt_regs *regs); |
| |
| int tdx_mcall_get_report0(u8 *reportdata, u8 *tdreport); |
| |
| #else |
| |
| static inline void tdx_early_init(void) { }; |
| static inline void tdx_safe_halt(void) { }; |
| |
| static inline bool tdx_early_handle_ve(struct pt_regs *regs) { return false; } |
| |
| #endif /* CONFIG_INTEL_TDX_GUEST */ |
| |
| #if defined(CONFIG_KVM_GUEST) && defined(CONFIG_INTEL_TDX_GUEST) |
| long tdx_kvm_hypercall(unsigned int nr, unsigned long p1, unsigned long p2, |
| unsigned long p3, unsigned long p4); |
| #else |
| static inline long tdx_kvm_hypercall(unsigned int nr, unsigned long p1, |
| unsigned long p2, unsigned long p3, |
| unsigned long p4) |
| { |
| return -ENODEV; |
| } |
| #endif /* CONFIG_INTEL_TDX_GUEST && CONFIG_KVM_GUEST */ |
| #endif /* !__ASSEMBLY__ */ |
| #endif /* _ASM_X86_TDX_H */ |