[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGtprH98GkZuFgJ6ZFTFUv2Bqzow9yw7WCd7TAyKPUe=2iqfbg@mail.gmail.com>
Date: Fri, 3 Jan 2025 14:04:29 -0800
From: Vishal Annapurve <vannapurve@...gle.com>
To: Binbin Wu <binbin.wu@...ux.intel.com>
Cc: pbonzini@...hat.com, seanjc@...gle.com, kvm@...r.kernel.org,
rick.p.edgecombe@...el.com, kai.huang@...el.com, adrian.hunter@...el.com,
reinette.chatre@...el.com, xiaoyao.li@...el.com,
tony.lindgren@...ux.intel.com, isaku.yamahata@...el.com, yan.y.zhao@...el.com,
chao.gao@...el.com, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 13/16] KVM: TDX: Add methods to ignore virtual apic
related operation
On Sun, Dec 8, 2024 at 5:12 PM Binbin Wu <binbin.wu@...ux.intel.com> wrote:
>
> From: Isaku Yamahata <isaku.yamahata@...el.com>
> ...
> +}
> +
> static void vt_apicv_pre_state_restore(struct kvm_vcpu *vcpu)
> {
> struct pi_desc *pi = vcpu_to_pi_desc(vcpu);
> @@ -236,6 +245,22 @@ static void vt_apicv_pre_state_restore(struct kvm_vcpu *vcpu)
> memset(pi->pir, 0, sizeof(pi->pir));
Should this be a nop for TDX VMs? pre_state_restore could cause
pending PIRs to get cleared as KVM doesn't have ability to sync them
to vIRR in absence of access to the VAPIC page.
> }
>
> +static void vt_hwapic_irr_update(struct kvm_vcpu *vcpu, int max_irr)
> +{
> + if (is_td_vcpu(vcpu))
> + return;
> +
> + return vmx_hwapic_irr_update(vcpu, max_irr);
> +}
> +
Powered by blists - more mailing lists