This patchset is split from the TDX series[1]. It introduces vm_type for x86 at Patch 1, which leaves vaule 0 for normal VM and adds a new type KVM_X86_TDX_VM for upcoming TDX guest. Following patches (2, 4 - 11) block the ioctls that doesn't support for TDX from userspace for TDX by checking the VM type. Patch 3 is a cleanup. Note, it doesn't block the ioctls for SEV-ES at all because I'm not sure if each one applied to SEV-ES or not. Folks can introduce new vm_type for SEV-* and extend each helper function kvm_xxx_feature_disallowed() for SEV-* vm type. Paolo, Please let us know if you want this series sent together with whole TDX support. [1] https://lore.kernel.org/all/cover.1625186503.git.isaku.yamahata@xxxxxxxxx/T/#u Isaku Yamahata (1): KVM: Disallow read-only memory for x86 TDX Kai Huang (1): KVM: x86: Disable in-kernel I/O APIC and level routes for TDX Sean Christopherson (6): KVM: x86: Introduce vm_type to differentiate normal VMs from confidential VMs KVM: x86: Disable direct IRQ injection for TDX KVM: x86: Disable MCE related stuff for TDX KVM: x86: Disallow tsc manipulation for TDX KVM: x86: Block ioctls to access guest state for TDX KVM: Disallow dirty logging for x86 TDX Xiaoyao Li (3): KVM: x86: Clean up kvm_vcpu_ioctl_x86_setup_mce() KVM: x86: Disable SMM for TDX KVM: x86: Disable INIT/SIPI for TDX Documentation/virt/kvm/api.rst | 15 ++ arch/x86/include/asm/kvm-x86-ops.h | 1 + arch/x86/include/asm/kvm_host.h | 2 + arch/x86/include/uapi/asm/kvm.h | 3 + arch/x86/kvm/ioapic.c | 5 + arch/x86/kvm/irq_comm.c | 13 +- arch/x86/kvm/lapic.c | 3 +- arch/x86/kvm/svm/svm.c | 6 + arch/x86/kvm/vmx/vmx.c | 6 + arch/x86/kvm/x86.c | 199 +++++++++++++++++++++----- arch/x86/kvm/x86.h | 35 +++++ include/linux/kvm_host.h | 2 + include/uapi/linux/kvm.h | 1 + tools/arch/x86/include/uapi/asm/kvm.h | 3 + tools/include/uapi/linux/kvm.h | 1 + virt/kvm/kvm_main.c | 25 +++- 16 files changed, 278 insertions(+), 42 deletions(-) -- 2.27.0