linux-loongson/include/linux/misc_cgroup.h
Paolo Bonzini fd02aa45bd Merge branch 'kvm-tdx-initial' into HEAD
This large commit contains the initial support for TDX in KVM.  All x86
parts enable the host-side hypercalls that KVM uses to talk to the TDX
module, a software component that runs in a special CPU mode called SEAM
(Secure Arbitration Mode).

The series is in turn split into multiple sub-series, each with a separate
merge commit:

- Initialization: basic setup for using the TDX module from KVM, plus
  ioctls to create TDX VMs and vCPUs.

- MMU: in TDX, private and shared halves of the address space are mapped by
  different EPT roots, and the private half is managed by the TDX module.
  Using the support that was added to the generic MMU code in 6.14,
  add support for TDX's secure page tables to the Intel side of KVM.
  Generic KVM code takes care of maintaining a mirror of the secure page
  tables so that they can be queried efficiently, and ensuring that changes
  are applied to both the mirror and the secure EPT.

- vCPU enter/exit: implement the callbacks that handle the entry of a TDX
  vCPU (via the SEAMCALL TDH.VP.ENTER) and the corresponding save/restore
  of host state.

- Userspace exits: introduce support for guest TDVMCALLs that KVM forwards to
  userspace.  These correspond to the usual KVM_EXIT_* "heavyweight vmexits"
  but are triggered through a different mechanism, similar to VMGEXIT for
  SEV-ES and SEV-SNP.

- Interrupt handling: support for virtual interrupt injection as well as
  handling VM-Exits that are caused by vectored events.  Exclusive to
  TDX are machine-check SMIs, which the kernel already knows how to
  handle through the kernel machine check handler (commit 7911f145de,
  "x86/mce: Implement recovery for errors in TDX/SEAM non-root mode")

- Loose ends: handling of the remaining exits from the TDX module, including
  EPT violation/misconfig and several TDVMCALL leaves that are handled in
  the kernel (CPUID, HLT, RDMSR/WRMSR, GetTdVmCallInfo); plus returning
  an error or ignoring operations that are not supported by TDX guests

Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2025-04-07 07:36:33 -04:00

139 lines
3.2 KiB
C

/* SPDX-License-Identifier: GPL-2.0 */
/*
* Miscellaneous cgroup controller.
*
* Copyright 2020 Google LLC
* Author: Vipin Sharma <vipinsh@google.com>
*/
#ifndef _MISC_CGROUP_H_
#define _MISC_CGROUP_H_
/**
* enum misc_res_type - Types of misc cgroup entries supported by the host.
*/
enum misc_res_type {
#ifdef CONFIG_KVM_AMD_SEV
/** @MISC_CG_RES_SEV: AMD SEV ASIDs resource */
MISC_CG_RES_SEV,
/** @MISC_CG_RES_SEV_ES: AMD SEV-ES ASIDs resource */
MISC_CG_RES_SEV_ES,
#endif
#ifdef CONFIG_INTEL_TDX_HOST
/* Intel TDX HKIDs resource */
MISC_CG_RES_TDX,
#endif
/** @MISC_CG_RES_TYPES: count of enum misc_res_type constants */
MISC_CG_RES_TYPES
};
struct misc_cg;
#ifdef CONFIG_CGROUP_MISC
#include <linux/cgroup.h>
/**
* struct misc_res: Per cgroup per misc type resource
* @max: Maximum limit on the resource.
* @watermark: Historical maximum usage of the resource.
* @usage: Current usage of the resource.
* @events: Number of times, the resource limit exceeded.
*/
struct misc_res {
u64 max;
atomic64_t watermark;
atomic64_t usage;
atomic64_t events;
atomic64_t events_local;
};
/**
* struct misc_cg - Miscellaneous controller's cgroup structure.
* @css: cgroup subsys state object.
* @events_file: Handle for the misc resources events file.
* @res: Array of misc resources usage in the cgroup.
*/
struct misc_cg {
struct cgroup_subsys_state css;
/* misc.events */
struct cgroup_file events_file;
/* misc.events.local */
struct cgroup_file events_local_file;
struct misc_res res[MISC_CG_RES_TYPES];
};
int misc_cg_set_capacity(enum misc_res_type type, u64 capacity);
int misc_cg_try_charge(enum misc_res_type type, struct misc_cg *cg, u64 amount);
void misc_cg_uncharge(enum misc_res_type type, struct misc_cg *cg, u64 amount);
/**
* css_misc() - Get misc cgroup from the css.
* @css: cgroup subsys state object.
*
* Context: Any context.
* Return:
* * %NULL - If @css is null.
* * struct misc_cg* - misc cgroup pointer of the passed css.
*/
static inline struct misc_cg *css_misc(struct cgroup_subsys_state *css)
{
return css ? container_of(css, struct misc_cg, css) : NULL;
}
/*
* get_current_misc_cg() - Find and get the misc cgroup of the current task.
*
* Returned cgroup has its ref count increased by 1. Caller must call
* put_misc_cg() to return the reference.
*
* Return: Misc cgroup to which the current task belongs to.
*/
static inline struct misc_cg *get_current_misc_cg(void)
{
return css_misc(task_get_css(current, misc_cgrp_id));
}
/*
* put_misc_cg() - Put the misc cgroup and reduce its ref count.
* @cg - cgroup to put.
*/
static inline void put_misc_cg(struct misc_cg *cg)
{
if (cg)
css_put(&cg->css);
}
#else /* !CONFIG_CGROUP_MISC */
static inline int misc_cg_set_capacity(enum misc_res_type type, u64 capacity)
{
return 0;
}
static inline int misc_cg_try_charge(enum misc_res_type type,
struct misc_cg *cg,
u64 amount)
{
return 0;
}
static inline void misc_cg_uncharge(enum misc_res_type type,
struct misc_cg *cg,
u64 amount)
{
}
static inline struct misc_cg *get_current_misc_cg(void)
{
return NULL;
}
static inline void put_misc_cg(struct misc_cg *cg)
{
}
#endif /* CONFIG_CGROUP_MISC */
#endif /* _MISC_CGROUP_H_ */