diff options
author | 2025-02-27 09:20:11 +0800 | |
---|---|---|
committer | 2025-03-14 14:20:57 -0400 | |
commit | 9fc3402a20771ebd3abedec9d354b89b10ccfd98 (patch) | |
tree | 1afb9f1e6b07682731babb7170a2105ed5590871 /scripts/lib/kdoc/kdoc_files.py | |
parent | KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall (diff) | |
download | linux-rng-9fc3402a20771ebd3abedec9d354b89b10ccfd98.tar.xz linux-rng-9fc3402a20771ebd3abedec9d354b89b10ccfd98.zip |
KVM: TDX: Enable guest access to LMCE related MSRs
Allow TDX guest to configure LMCE (Local Machine Check Event) by handling
MSR IA32_FEAT_CTL and IA32_MCG_EXT_CTL.
MCE and MCA are advertised via cpuid based on the TDX module spec. Guest
kernel can access IA32_FEAT_CTL to check whether LMCE is opted-in by the
platform or not. If LMCE is opted-in by the platform, guest kernel can
access IA32_MCG_EXT_CTL to enable/disable LMCE.
Handle MSR IA32_FEAT_CTL and IA32_MCG_EXT_CTL for TDX guests to avoid
failure when a guest accesses them with TDG.VP.VMCALL<MSR> on #VE. E.g.,
Linux guest will treat the failure as a #GP(0).
Userspace VMM may not opt-in LMCE by default, e.g., QEMU disables it by
default, "-cpu lmce=on" is needed in QEMU command line to opt-in it.
Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
[binbin: rework changelog]
Signed-off-by: Binbin Wu <binbin.wu@linux.intel.com>
Message-ID: <20250227012021.1778144-11-binbin.wu@linux.intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'scripts/lib/kdoc/kdoc_files.py')
0 files changed, 0 insertions, 0 deletions