arch/x86/hyperv/hv_apic.c | 9 +++++++++ arch/x86/hyperv/hv_init.c | 7 +++++++ arch/x86/kernel/cpu/mshyperv.c | 2 ++ drivers/hv/hv.c | 7 ++++++- drivers/hv/hv_common.c | 5 +++++ include/asm-generic/mshyperv.h | 1 + 6 files changed, 30 insertions(+), 1 deletion(-)
From: Tianyu Lan <tiala@microsoft.com>
Secure AVIC is a new hardware feature in the AMD64
architecture to allow SEV-SNP guests to prevent the
hypervisor from generating unexpected interrupts to
a vCPU or otherwise violate architectural assumptions
around APIC behavior.
Each vCPU has a guest-allocated APIC backing page of
size 4K, which maintains APIC state for that vCPU.
APIC backing page's ALLOWED_IRR field indicates the
interrupt vectors which the guest allows the hypervisor
to send.
This patchset is to enable the feature for Hyper-V
platform. Patch "Drivers: hv: Allow vmbus message
synic interrupt injected from Hyper-V" is to expose
new fucntion hv_enable_coco_interrupt() and device
driver and arch code may update AVIC backing page
ALLOWED_IRR field to allow Hyper-V inject associated
vector.
This patchset is based on the AMD patchset "AMD: Add
Secure AVIC Guest Support"
https://lkml.org/lkml/2025/6/10/1579
Change since v5:
- Rmove extra line and move hv_enable_coco_interrupt()
just after hv_set_msr() in the hv_synic_disable_regs().
Change since v4:
- Change the order to call hv_enable_coco_interrupt()
in the hv_synic_enable/disable_regs().
- Update commit title "Drivers/hv:" to "Drivers: hv:"
Change since v3:
- Disable VMBus Message interrupt via hv_enable_
coco_interrupt() in the hv_synic_disable_regs().
- Fix coding style issue and update change log.
Change since v2:
- Add hv_enable_coco_interrupt() as wrapper
of apic_update_vector()
- Re-work change logs
Change since v1:
- Remove the check of Secure AVIC when set APIC backing page
- Use apic_update_vector() instead of exposing new interface
from Secure AVIC driver to update APIC backing page and allow
associated interrupt to be injected by hypervisor.
Tianyu Lan (4):
x86/hyperv: Don't use hv apic driver when Secure AVIC is available
Drivers: hv: Allow vmbus message synic interrupt injected from Hyper-V
x86/hyperv: Don't use auto-eoi when Secure AVIC is available
x86/hyperv: Allow Hyper-V to inject STIMER0 interrupts
arch/x86/hyperv/hv_apic.c | 9 +++++++++
arch/x86/hyperv/hv_init.c | 7 +++++++
arch/x86/kernel/cpu/mshyperv.c | 2 ++
drivers/hv/hv.c | 7 ++++++-
drivers/hv/hv_common.c | 5 +++++
include/asm-generic/mshyperv.h | 1 +
6 files changed, 30 insertions(+), 1 deletion(-)
--
2.25.1
On Wed, Aug 06, 2025 at 08:18:51PM +0800, Tianyu Lan wrote: > From: Tianyu Lan <tiala@microsoft.com> [...] > Tianyu Lan (4): > x86/hyperv: Don't use hv apic driver when Secure AVIC is available > Drivers: hv: Allow vmbus message synic interrupt injected from Hyper-V > x86/hyperv: Don't use auto-eoi when Secure AVIC is available > x86/hyperv: Allow Hyper-V to inject STIMER0 interrupts Are they still RFC? They look like ready to be merged. Wei
On Wed, Aug 13, 2025 at 7:47 AM Wei Liu <wei.liu@kernel.org> wrote:
>
> On Wed, Aug 06, 2025 at 08:18:51PM +0800, Tianyu Lan wrote:
> > From: Tianyu Lan <tiala@microsoft.com>
> [...]
> > Tianyu Lan (4):
> > x86/hyperv: Don't use hv apic driver when Secure AVIC is available
> > Drivers: hv: Allow vmbus message synic interrupt injected from Hyper-V
> > x86/hyperv: Don't use auto-eoi when Secure AVIC is available
> > x86/hyperv: Allow Hyper-V to inject STIMER0 interrupts
>
> Are they still RFC? They look like ready to be merged.
>
> Wei
Hi Wei:
Please ignore my previous email. I always ignore something.
AMD Secure AVIC patchset is still in the RFC stage. Is it possible to
accept my patchset before AMD Secure AVIC patchset to be merged?
--
Thanks
Tianyu Lan
On Wed, Aug 13, 2025 at 7:47 AM Wei Liu <wei.liu@kernel.org> wrote:
>
> On Wed, Aug 06, 2025 at 08:18:51PM +0800, Tianyu Lan wrote:
> > From: Tianyu Lan <tiala@microsoft.com>
> [...]
> > Tianyu Lan (4):
> > x86/hyperv: Don't use hv apic driver when Secure AVIC is available
> > Drivers: hv: Allow vmbus message synic interrupt injected from Hyper-V
> > x86/hyperv: Don't use auto-eoi when Secure AVIC is available
> > x86/hyperv: Allow Hyper-V to inject STIMER0 interrupts
>
> Are they still RFC? They look like ready to be merged.
>
> Wei
Hi Wei:
This patchset depends on the AMD Secure AVIC patchset. If we just
add hv_enable_coco_interrupt() as a dummy function. If It's acceptable,
I may send out a new version for merge.
--
Thanks
Tianyu Lan
On Wed, Aug 13, 2025 at 07:44:09PM +0800, Tianyu Lan wrote: > On Wed, Aug 13, 2025 at 7:47 AM Wei Liu <wei.liu@kernel.org> wrote: > > > > On Wed, Aug 06, 2025 at 08:18:51PM +0800, Tianyu Lan wrote: > > > From: Tianyu Lan <tiala@microsoft.com> > > [...] > > > Tianyu Lan (4): > > > x86/hyperv: Don't use hv apic driver when Secure AVIC is available > > > Drivers: hv: Allow vmbus message synic interrupt injected from Hyper-V > > > x86/hyperv: Don't use auto-eoi when Secure AVIC is available > > > x86/hyperv: Allow Hyper-V to inject STIMER0 interrupts > > > > Are they still RFC? They look like ready to be merged. > > > > Wei > Hi Wei: > This patchset depends on the AMD Secure AVIC patchset. If we just > add hv_enable_coco_interrupt() as a dummy function. If It's acceptable, > I may send out a new version for merge. Let's wait for the AMD Secure AVIC patchset to be merged first. You can then repost without the RFC tag. Thanks, Wei > -- > Thanks > Tianyu Lan
On Wed, Aug 13, 2025 at 10:40 PM Wei Liu <wei.liu@kernel.org> wrote: > > On Wed, Aug 13, 2025 at 07:44:09PM +0800, Tianyu Lan wrote: > > On Wed, Aug 13, 2025 at 7:47 AM Wei Liu <wei.liu@kernel.org> wrote: > > > > > > On Wed, Aug 06, 2025 at 08:18:51PM +0800, Tianyu Lan wrote: > > > > From: Tianyu Lan <tiala@microsoft.com> > > > [...] > > > > Tianyu Lan (4): > > > > x86/hyperv: Don't use hv apic driver when Secure AVIC is available > > > > Drivers: hv: Allow vmbus message synic interrupt injected from Hyper-V > > > > x86/hyperv: Don't use auto-eoi when Secure AVIC is available > > > > x86/hyperv: Allow Hyper-V to inject STIMER0 interrupts > > > > > > Are they still RFC? They look like ready to be merged. > > > > > > Wei > > Hi Wei: > > This patchset depends on the AMD Secure AVIC patchset. If we just > > add hv_enable_coco_interrupt() as a dummy function. If It's acceptable, > > I may send out a new version for merge. > > Let's wait for the AMD Secure AVIC patchset to be merged first. You can > then repost without the RFC tag. > > Thanks, > Wei > > > -- > > Thanks > > Tianyu Lan Sure. I got it. Thanks for your suggestion.and will update patches soon. -- Thanks Tianyu Lan
© 2016 - 2026 Red Hat, Inc.