X86/tdx: Add cmdline option to force use of ioremap_host_shared X86/tdx: Enable shared memory confidential guest flags for TDX guest X86/tdx: Add helper to do MapGPA hypercall X86/tdx: Exclude Shared bit from physical_mask X86/tdx: Get TD execution environment information via TDINFO X86/mm: Move force_dma_unencrypted() to common code X86/tdx: ioapic: Add shared bit for IOAPIC base address X86/tdx: Implement ioremap_host_shared for x86 Virtio: Use shared mappings for virtio PCI devices PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range() PCI: Consolidate pci_iomap_range(), pci_iomap_wc_range()Īsm/io.h: Add ioremap_host_shared fallback * Added new wrapper (pci_iomap_shared_range()) for PCI IO * Added new API to share io-reamapped memory selectively * Rebased on top of Tom Lendacky's protected guest * Rest of the change log is included per patch.
Information via TDINFO" is required only by this patch set, * Since patch titled "x86/tdx: Get TD execution environment If you prefer to get only patches specific to yourĭomain, please let me know. I have CCed this patch series to all the related domain maintainersĪnd open lists.
PCI devices" adds ioremap_host_shared() support for virtio driversĪnd are meant to be reviewed by virtio driver maintainers. Meant to be reviewed by patch titled "virtio: Use shared mappings for virtio Generic and arch specific ioremap_host_shared headers and are Patch titled "asm/io.h: Add ioremap_host_shared fallback" adds Pci: Consolidate pci_iomap* and pci_iomap*wc In this patch series, following patches are in PCI domain and are Only compile tested, and hence need help from the community users of theseĪrchs' to make sure that it does not break any functionality. You can find TDX related documents in the following link.Īlso, ioremap related changes in mips, parisc, alpha, sparch archs' are You need to apply all the above 3 patch series to get 2, v7] - 3, v7] - please note that this series alone is not necessarily fullyįunctional. Related patchsets in the following links. #VE handler support and boot fixes for TDX guests. Support (Initial support)", "Add TDX Guest Support (#VE handler support)"Īnd "Add TDX Guest Support (boot support)" which added initial support, This series is the continuation of the patch series titled "Add TDX Guest There is still a command line option to override this option,
Other drivers from doing MMIO, which can happen in some cases even with This gives the advantage of automatically preventing To be used it's safer to mark them explicitly (for virtio it actually only Also in general since only a few drivers are expected This ends up with a lot of memory shared that is supposed to be private, forĮxample ACPI tables. Originally TDX did automatic sharing of every ioremap. Support to securely share guest memory with VMM when it is required by Any memory that is requiredįor communication with VMM must be shared explicitly. Not allow VMM to access guest private memory. Intel's Trust Domain Extensions (TDX) protect guest VMs from malicious Linux-alpha, linux-mips, linux-parisc, sparclinux, linux-arch, Kuppuswamy Sathyanarayanan, x86, linux-kernel, linux-pci, Kirill Shutemov, Sean Christopherson, Kuppuswamy Sathyanarayanan, Tsirkin, Paolo Bonzini, David Hildenbrand,Ĭc: Peter H Anvin, Dave Hansen, Tony Luck, Dan Williams, Andi Kleen, Thomas Bogendoerfer, James E J Bottomley, Helge Deller,ĭavid S. To: Thomas Gleixner, Ingo Molnar, Borislav Petkov, Peter Zijlstra,Īndy Lutomirski, Bjorn Helgaas, Richard Henderson, ` (15 more replies) 0 siblings, 16 replies 81+ messages in threadįrom: Kuppuswamy Sathyanarayanan 0:36 UTC ( / raw) 0:36 ` x86/mm: Move force_dma_unencrypted() to common code Kuppuswamy Sathyanarayanan
Add TDX Guest Support (shared-mm support) archive mirror help / color / mirror / Atom feed * Add TDX Guest Support (shared-mm support) 0:36 Kuppuswamy Sathyanarayanan