KVM Archive mirror
 help / color / mirror / Atom feed
From: isaku.yamahata@intel.com
To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org
Cc: isaku.yamahata@intel.com, isaku.yamahata@gmail.com,
	Paolo Bonzini <pbonzini@redhat.com>,
	erdemaktas@google.com, Sean Christopherson <seanjc@google.com>,
	Sagi Shahar <sagis@google.com>, Kai Huang <kai.huang@intel.com>,
	chen.bo@intel.com, hang.yuan@intel.com, tina.zhang@intel.com
Subject: [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support
Date: Mon, 26 Feb 2024 00:26:12 -0800	[thread overview]
Message-ID: <56cdb0da8bbf17dc293a2a6b4ff74f6e3e034bbd.1708933498.git.isaku.yamahata@intel.com> (raw)
In-Reply-To: <cover.1708933498.git.isaku.yamahata@intel.com>

From: Isaku Yamahata <isaku.yamahata@intel.com>

Implement hooks of TDP MMU for TDX backend.  TLB flush, TLB shootdown,
propagating the change private EPT entry to Secure EPT and freeing Secure
EPT page. TLB flush handles both shared EPT and private EPT.  It flushes
shared EPT same as VMX.  It also waits for the TDX TLB shootdown.  For the
hook to free Secure EPT page, unlinks the Secure EPT page from the Secure
EPT so that the page can be freed to OS.

Propagate the entry change to Secure EPT.  The possible entry changes are
present -> non-present(zapping) and non-present -> present(population).  On
population just link the Secure EPT page or the private guest page to the
Secure EPT by TDX SEAMCALL. Because TDP MMU allows concurrent
zapping/population, zapping requires synchronous TLB shoot down with the
frozen EPT entry.  It zaps the secure entry, increments TLB counter, sends
IPI to remote vcpus to trigger TLB flush, and then unlinks the private
guest page from the Secure EPT. For simplicity, batched zapping with
exclude lock is handled as concurrent zapping.  Although it's inefficient,
it can be optimized in the future.

For MMIO SPTE, the spte value changes as follows.
initial value (suppress VE bit is set)
-> Guest issues MMIO and triggers EPT violation
-> KVM updates SPTE value to MMIO value (suppress VE bit is cleared)
-> Guest MMIO resumes.  It triggers VE exception in guest TD
-> Guest VE handler issues TDG.VP.VMCALL<MMIO>
-> KVM handles MMIO
-> Guest VE handler resumes its execution after MMIO instruction

Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>

---
v19:
- Compile fix when CONFIG_HYPERV != y.
  It's due to the following patch.  Catch it up.
  https://lore.kernel.org/all/20231018192325.1893896-1-seanjc@google.com/
- Add comments on tlb shootdown to explan the sequence.
- Use gmem_max_level callback, delete tdp_max_page_level.

v18:
- rename tdx_sept_page_aug() -> tdx_mem_page_aug()
- checkpatch: space => tab

v15 -> v16:
- Add the handling of TD_ATTR_SEPT_VE_DISABLE case.

v14 -> v15:
- Implemented tdx_flush_tlb_current()
- Removed unnecessary invept in tdx_flush_tlb().  It was carry over
  from the very old code base.

Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
---
 arch/x86/kvm/mmu/spte.c    |   3 +-
 arch/x86/kvm/vmx/main.c    |  91 ++++++++-
 arch/x86/kvm/vmx/tdx.c     | 372 +++++++++++++++++++++++++++++++++++++
 arch/x86/kvm/vmx/tdx.h     |   2 +-
 arch/x86/kvm/vmx/tdx_ops.h |   6 +
 arch/x86/kvm/vmx/x86_ops.h |  13 ++
 6 files changed, 481 insertions(+), 6 deletions(-)

diff --git a/arch/x86/kvm/mmu/spte.c b/arch/x86/kvm/mmu/spte.c
index 318135daf685..83926a35ea47 100644
--- a/arch/x86/kvm/mmu/spte.c
+++ b/arch/x86/kvm/mmu/spte.c
@@ -74,7 +74,8 @@ u64 make_mmio_spte(struct kvm_vcpu *vcpu, u64 gfn, unsigned int access)
 	u64 spte = generation_mmio_spte_mask(gen);
 	u64 gpa = gfn << PAGE_SHIFT;
 
-	WARN_ON_ONCE(!vcpu->kvm->arch.shadow_mmio_value);
+	WARN_ON_ONCE(!vcpu->kvm->arch.shadow_mmio_value &&
+		     !kvm_gfn_shared_mask(vcpu->kvm));
 
 	access &= shadow_mmio_access_mask;
 	spte |= vcpu->kvm->arch.shadow_mmio_value | access;
diff --git a/arch/x86/kvm/vmx/main.c b/arch/x86/kvm/vmx/main.c
index 54df6653193e..8c5bac3defdf 100644
--- a/arch/x86/kvm/vmx/main.c
+++ b/arch/x86/kvm/vmx/main.c
@@ -29,6 +29,10 @@ static int vt_max_vcpus(struct kvm *kvm)
 	return kvm->max_vcpus;
 }
 
+#if IS_ENABLED(CONFIG_HYPERV)
+static int vt_flush_remote_tlbs(struct kvm *kvm);
+#endif
+
 static __init int vt_hardware_setup(void)
 {
 	int ret;
@@ -49,11 +53,29 @@ static __init int vt_hardware_setup(void)
 		pr_warn_ratelimited("TDX requires mmio caching.  Please enable mmio caching for TDX.\n");
 	}
 
+#if IS_ENABLED(CONFIG_HYPERV)
+	/*
+	 * TDX KVM overrides flush_remote_tlbs method and assumes
+	 * flush_remote_tlbs_range = NULL that falls back to
+	 * flush_remote_tlbs.  Disable TDX if there are conflicts.
+	 */
+	if (vt_x86_ops.flush_remote_tlbs ||
+	    vt_x86_ops.flush_remote_tlbs_range) {
+		enable_tdx = false;
+		pr_warn_ratelimited("TDX requires baremetal. Not Supported on VMM guest.\n");
+	}
+#endif
+
 	enable_tdx = enable_tdx && !tdx_hardware_setup(&vt_x86_ops);
 	if (enable_tdx)
 		vt_x86_ops.vm_size = max_t(unsigned int, vt_x86_ops.vm_size,
 					   sizeof(struct kvm_tdx));
 
+#if IS_ENABLED(CONFIG_HYPERV)
+	if (enable_tdx)
+		vt_x86_ops.flush_remote_tlbs = vt_flush_remote_tlbs;
+#endif
+
 	return 0;
 }
 
@@ -136,6 +158,56 @@ static void vt_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event)
 	vmx_vcpu_reset(vcpu, init_event);
 }
 
+static void vt_flush_tlb_all(struct kvm_vcpu *vcpu)
+{
+	if (is_td_vcpu(vcpu)) {
+		tdx_flush_tlb(vcpu);
+		return;
+	}
+
+	vmx_flush_tlb_all(vcpu);
+}
+
+static void vt_flush_tlb_current(struct kvm_vcpu *vcpu)
+{
+	if (is_td_vcpu(vcpu)) {
+		tdx_flush_tlb_current(vcpu);
+		return;
+	}
+
+	vmx_flush_tlb_current(vcpu);
+}
+
+#if IS_ENABLED(CONFIG_HYPERV)
+static int vt_flush_remote_tlbs(struct kvm *kvm)
+{
+	if (is_td(kvm))
+		return tdx_sept_flush_remote_tlbs(kvm);
+
+	/*
+	 * fallback to KVM_REQ_TLB_FLUSH.
+	 * See kvm_arch_flush_remote_tlb() and kvm_flush_remote_tlbs().
+	 */
+	return -EOPNOTSUPP;
+}
+#endif
+
+static void vt_flush_tlb_gva(struct kvm_vcpu *vcpu, gva_t addr)
+{
+	if (KVM_BUG_ON(is_td_vcpu(vcpu), vcpu->kvm))
+		return;
+
+	vmx_flush_tlb_gva(vcpu, addr);
+}
+
+static void vt_flush_tlb_guest(struct kvm_vcpu *vcpu)
+{
+	if (is_td_vcpu(vcpu))
+		return;
+
+	vmx_flush_tlb_guest(vcpu);
+}
+
 static void vt_load_mmu_pgd(struct kvm_vcpu *vcpu, hpa_t root_hpa,
 			int pgd_level)
 {
@@ -163,6 +235,15 @@ static int vt_vcpu_mem_enc_ioctl(struct kvm_vcpu *vcpu, void __user *argp)
 	return tdx_vcpu_ioctl(vcpu, argp);
 }
 
+static int vt_gmem_max_level(struct kvm *kvm, kvm_pfn_t pfn, gfn_t gfn,
+			     bool is_private, u8 *max_level)
+{
+	if (is_td(kvm))
+		return tdx_gmem_max_level(kvm, pfn, gfn, is_private, max_level);
+
+	return 0;
+}
+
 #define VMX_REQUIRED_APICV_INHIBITS				\
 	(BIT(APICV_INHIBIT_REASON_DISABLE)|			\
 	 BIT(APICV_INHIBIT_REASON_ABSENT) |			\
@@ -228,10 +309,10 @@ struct kvm_x86_ops vt_x86_ops __initdata = {
 	.set_rflags = vmx_set_rflags,
 	.get_if_flag = vmx_get_if_flag,
 
-	.flush_tlb_all = vmx_flush_tlb_all,
-	.flush_tlb_current = vmx_flush_tlb_current,
-	.flush_tlb_gva = vmx_flush_tlb_gva,
-	.flush_tlb_guest = vmx_flush_tlb_guest,
+	.flush_tlb_all = vt_flush_tlb_all,
+	.flush_tlb_current = vt_flush_tlb_current,
+	.flush_tlb_gva = vt_flush_tlb_gva,
+	.flush_tlb_guest = vt_flush_tlb_guest,
 
 	.vcpu_pre_run = vmx_vcpu_pre_run,
 	.vcpu_run = vmx_vcpu_run,
@@ -324,6 +405,8 @@ struct kvm_x86_ops vt_x86_ops __initdata = {
 
 	.mem_enc_ioctl = vt_mem_enc_ioctl,
 	.vcpu_mem_enc_ioctl = vt_vcpu_mem_enc_ioctl,
+
+	.gmem_max_level = vt_gmem_max_level,
 };
 
 struct kvm_x86_init_ops vt_init_ops __initdata = {
diff --git a/arch/x86/kvm/vmx/tdx.c b/arch/x86/kvm/vmx/tdx.c
index 143a3c2a16bc..39ef80857b6a 100644
--- a/arch/x86/kvm/vmx/tdx.c
+++ b/arch/x86/kvm/vmx/tdx.c
@@ -8,6 +8,7 @@
 #include "mmu.h"
 #include "tdx_arch.h"
 #include "tdx.h"
+#include "vmx.h"
 #include "x86.h"
 
 #undef pr_fmt
@@ -364,6 +365,19 @@ static int tdx_do_tdh_mng_key_config(void *param)
 
 int tdx_vm_init(struct kvm *kvm)
 {
+	/*
+	 * Because guest TD is protected, VMM can't parse the instruction in TD.
+	 * Instead, guest uses MMIO hypercall.  For unmodified device driver,
+	 * #VE needs to be injected for MMIO and #VE handler in TD converts MMIO
+	 * instruction into MMIO hypercall.
+	 *
+	 * SPTE value for MMIO needs to be setup so that #VE is injected into
+	 * TD instead of triggering EPT MISCONFIG.
+	 * - RWX=0 so that EPT violation is triggered.
+	 * - suppress #VE bit is cleared to inject #VE.
+	 */
+	kvm_mmu_set_mmio_spte_value(kvm, 0);
+
 	/*
 	 * This function initializes only KVM software construct.  It doesn't
 	 * initialize TDX stuff, e.g. TDCS, TDR, TDCX, HKID etc.
@@ -459,6 +473,307 @@ void tdx_load_mmu_pgd(struct kvm_vcpu *vcpu, hpa_t root_hpa, int pgd_level)
 	td_vmcs_write64(to_tdx(vcpu), SHARED_EPT_POINTER, root_hpa);
 }
 
+static void tdx_unpin(struct kvm *kvm, kvm_pfn_t pfn)
+{
+	struct page *page = pfn_to_page(pfn);
+
+	put_page(page);
+}
+
+static int tdx_mem_page_aug(struct kvm *kvm, gfn_t gfn,
+			    enum pg_level level, kvm_pfn_t pfn)
+{
+	int tdx_level = pg_level_to_tdx_sept_level(level);
+	struct kvm_tdx *kvm_tdx = to_kvm_tdx(kvm);
+	union tdx_sept_level_state level_state;
+	hpa_t hpa = pfn_to_hpa(pfn);
+	gpa_t gpa = gfn_to_gpa(gfn);
+	struct tdx_module_args out;
+	union tdx_sept_entry entry;
+	u64 err;
+
+	err = tdh_mem_page_aug(kvm_tdx->tdr_pa, gpa, hpa, &out);
+	if (unlikely(err == TDX_ERROR_SEPT_BUSY)) {
+		tdx_unpin(kvm, pfn);
+		return -EAGAIN;
+	}
+	if (unlikely(err == (TDX_EPT_ENTRY_STATE_INCORRECT | TDX_OPERAND_ID_RCX))) {
+		entry.raw = out.rcx;
+		level_state.raw = out.rdx;
+		if (level_state.level == tdx_level &&
+		    level_state.state == TDX_SEPT_PENDING &&
+		    entry.leaf && entry.pfn == pfn && entry.sve) {
+			tdx_unpin(kvm, pfn);
+			WARN_ON_ONCE(!(to_kvm_tdx(kvm)->attributes &
+				       TDX_TD_ATTR_SEPT_VE_DISABLE));
+			return -EAGAIN;
+		}
+	}
+	if (KVM_BUG_ON(err, kvm)) {
+		pr_tdx_error(TDH_MEM_PAGE_AUG, err, &out);
+		tdx_unpin(kvm, pfn);
+		return -EIO;
+	}
+
+	return 0;
+}
+
+static int tdx_sept_set_private_spte(struct kvm *kvm, gfn_t gfn,
+				     enum pg_level level, kvm_pfn_t pfn)
+{
+	struct kvm_tdx *kvm_tdx = to_kvm_tdx(kvm);
+
+	/* TODO: handle large pages. */
+	if (KVM_BUG_ON(level != PG_LEVEL_4K, kvm))
+		return -EINVAL;
+
+	/*
+	 * Because restricted mem doesn't support page migration with
+	 * a_ops->migrate_page (yet), no callback isn't triggered for KVM on
+	 * page migration.  Until restricted mem supports page migration,
+	 * prevent page migration.
+	 * TODO: Once restricted mem introduces callback on page migration,
+	 * implement it and remove get_page/put_page().
+	 */
+	get_page(pfn_to_page(pfn));
+
+	if (likely(is_td_finalized(kvm_tdx)))
+		return tdx_mem_page_aug(kvm, gfn, level, pfn);
+
+	/* TODO: tdh_mem_page_add() comes here for the initial memory. */
+
+	return 0;
+}
+
+static int tdx_sept_drop_private_spte(struct kvm *kvm, gfn_t gfn,
+				       enum pg_level level, kvm_pfn_t pfn)
+{
+	int tdx_level = pg_level_to_tdx_sept_level(level);
+	struct kvm_tdx *kvm_tdx = to_kvm_tdx(kvm);
+	struct tdx_module_args out;
+	gpa_t gpa = gfn_to_gpa(gfn);
+	hpa_t hpa = pfn_to_hpa(pfn);
+	hpa_t hpa_with_hkid;
+	u64 err;
+
+	/* TODO: handle large pages. */
+	if (KVM_BUG_ON(level != PG_LEVEL_4K, kvm))
+		return -EINVAL;
+
+	if (unlikely(!is_hkid_assigned(kvm_tdx))) {
+		/*
+		 * The HKID assigned to this TD was already freed and cache
+		 * was already flushed. We don't have to flush again.
+		 */
+		err = tdx_reclaim_page(hpa);
+		if (KVM_BUG_ON(err, kvm))
+			return -EIO;
+		tdx_unpin(kvm, pfn);
+		return 0;
+	}
+
+	do {
+		/*
+		 * When zapping private page, write lock is held. So no race
+		 * condition with other vcpu sept operation.  Race only with
+		 * TDH.VP.ENTER.
+		 */
+		err = tdh_mem_page_remove(kvm_tdx->tdr_pa, gpa, tdx_level, &out);
+	} while (unlikely(err == TDX_ERROR_SEPT_BUSY));
+	if (KVM_BUG_ON(err, kvm)) {
+		pr_tdx_error(TDH_MEM_PAGE_REMOVE, err, &out);
+		return -EIO;
+	}
+
+	hpa_with_hkid = set_hkid_to_hpa(hpa, (u16)kvm_tdx->hkid);
+	do {
+		/*
+		 * TDX_OPERAND_BUSY can happen on locking PAMT entry.  Because
+		 * this page was removed above, other thread shouldn't be
+		 * repeatedly operating on this page.  Just retry loop.
+		 */
+		err = tdh_phymem_page_wbinvd(hpa_with_hkid);
+	} while (unlikely(err == (TDX_OPERAND_BUSY | TDX_OPERAND_ID_RCX)));
+	if (KVM_BUG_ON(err, kvm)) {
+		pr_tdx_error(TDH_PHYMEM_PAGE_WBINVD, err, NULL);
+		return -EIO;
+	}
+	tdx_clear_page(hpa);
+	tdx_unpin(kvm, pfn);
+	return 0;
+}
+
+static int tdx_sept_link_private_spt(struct kvm *kvm, gfn_t gfn,
+				     enum pg_level level, void *private_spt)
+{
+	int tdx_level = pg_level_to_tdx_sept_level(level);
+	struct kvm_tdx *kvm_tdx = to_kvm_tdx(kvm);
+	gpa_t gpa = gfn_to_gpa(gfn);
+	hpa_t hpa = __pa(private_spt);
+	struct tdx_module_args out;
+	u64 err;
+
+	err = tdh_mem_sept_add(kvm_tdx->tdr_pa, gpa, tdx_level, hpa, &out);
+	if (unlikely(err == TDX_ERROR_SEPT_BUSY))
+		return -EAGAIN;
+	if (KVM_BUG_ON(err, kvm)) {
+		pr_tdx_error(TDH_MEM_SEPT_ADD, err, &out);
+		return -EIO;
+	}
+
+	return 0;
+}
+
+static int tdx_sept_zap_private_spte(struct kvm *kvm, gfn_t gfn,
+				      enum pg_level level)
+{
+	int tdx_level = pg_level_to_tdx_sept_level(level);
+	struct kvm_tdx *kvm_tdx = to_kvm_tdx(kvm);
+	gpa_t gpa = gfn_to_gpa(gfn) & KVM_HPAGE_MASK(level);
+	struct tdx_module_args out;
+	u64 err;
+
+	/* This can be called when destructing guest TD after freeing HKID. */
+	if (unlikely(!is_hkid_assigned(kvm_tdx)))
+		return 0;
+
+	/* For now large page isn't supported yet. */
+	WARN_ON_ONCE(level != PG_LEVEL_4K);
+	err = tdh_mem_range_block(kvm_tdx->tdr_pa, gpa, tdx_level, &out);
+	if (unlikely(err == TDX_ERROR_SEPT_BUSY))
+		return -EAGAIN;
+	if (KVM_BUG_ON(err, kvm)) {
+		pr_tdx_error(TDH_MEM_RANGE_BLOCK, err, &out);
+		return -EIO;
+	}
+	return 0;
+}
+
+/*
+ * TLB shoot down procedure:
+ * There is a global epoch counter and each vcpu has local epoch counter.
+ * - TDH.MEM.RANGE.BLOCK(TDR. level, range) on one vcpu
+ *   This blocks the subsequenct creation of TLB translation on that range.
+ *   This corresponds to clear the present bit(all RXW) in EPT entry
+ * - TDH.MEM.TRACK(TDR): advances the epoch counter which is global.
+ * - IPI to remote vcpus
+ * - TDExit and re-entry with TDH.VP.ENTER on remote vcpus
+ * - On re-entry, TDX module compares the local epoch counter with the global
+ *   epoch counter.  If the local epoch counter is older than the global epoch
+ *   counter, update the local epoch counter and flushes TLB.
+ */
+static void tdx_track(struct kvm *kvm)
+{
+	struct kvm_tdx *kvm_tdx = to_kvm_tdx(kvm);
+	u64 err;
+
+	KVM_BUG_ON(!is_hkid_assigned(kvm_tdx), kvm);
+	/* If TD isn't finalized, it's before any vcpu running. */
+	if (unlikely(!is_td_finalized(kvm_tdx)))
+		return;
+
+	/*
+	 * tdx_flush_tlb() waits for this function to issue TDH.MEM.TRACK() by
+	 * the counter.  The counter is used instead of bool because multiple
+	 * TDH_MEM_TRACK() can be issued concurrently by multiple vcpus.
+	 *
+	 * optimization: The TLB shoot down procedure described in The TDX
+	 * specification is, TDH.MEM.TRACK(), send IPI to remote vcpus, confirm
+	 * all remote vcpus exit to VMM, and execute vcpu, both local and
+	 * remote.  Twist the sequence to reduce IPI overhead as follows.
+	 *
+	 * local			remote
+	 * -----			------
+	 * increment tdh_mem_track
+	 *
+	 * request KVM_REQ_TLB_FLUSH
+	 * send IPI
+	 *
+	 *				TDEXIT to KVM due to IPI
+	 *
+	 *				IPI handler calls tdx_flush_tlb()
+	 *                              to process KVM_REQ_TLB_FLUSH.
+	 *				spin wait for tdh_mem_track == 0
+	 *
+	 * TDH.MEM.TRACK()
+	 *
+	 * decrement tdh_mem_track
+	 *
+	 *				complete KVM_REQ_TLB_FLUSH
+	 *
+	 * TDH.VP.ENTER to flush tlbs	TDH.VP.ENTER to flush tlbs
+	 */
+	atomic_inc(&kvm_tdx->tdh_mem_track);
+	/*
+	 * KVM_REQ_TLB_FLUSH waits for the empty IPI handler, ack_flush(), with
+	 * KVM_REQUEST_WAIT.
+	 */
+	kvm_make_all_cpus_request(kvm, KVM_REQ_TLB_FLUSH);
+
+	do {
+		err = tdh_mem_track(kvm_tdx->tdr_pa);
+	} while (unlikely((err & TDX_SEAMCALL_STATUS_MASK) == TDX_OPERAND_BUSY));
+
+	/* Release remote vcpu waiting for TDH.MEM.TRACK in tdx_flush_tlb(). */
+	atomic_dec(&kvm_tdx->tdh_mem_track);
+
+	if (KVM_BUG_ON(err, kvm))
+		pr_tdx_error(TDH_MEM_TRACK, err, NULL);
+
+}
+
+static int tdx_sept_free_private_spt(struct kvm *kvm, gfn_t gfn,
+				     enum pg_level level, void *private_spt)
+{
+	struct kvm_tdx *kvm_tdx = to_kvm_tdx(kvm);
+
+	/*
+	 * The HKID assigned to this TD was already freed and cache was
+	 * already flushed. We don't have to flush again.
+	 */
+	if (!is_hkid_assigned(kvm_tdx))
+		return tdx_reclaim_page(__pa(private_spt));
+
+	/*
+	 * free_private_spt() is (obviously) called when a shadow page is being
+	 * zapped.  KVM doesn't (yet) zap private SPs while the TD is active.
+	 * Note: This function is for private shadow page.  Not for private
+	 * guest page.   private guest page can be zapped during TD is active.
+	 * shared <-> private conversion and slot move/deletion.
+	 */
+	KVM_BUG_ON(is_hkid_assigned(kvm_tdx), kvm);
+	return -EINVAL;
+}
+
+int tdx_sept_flush_remote_tlbs(struct kvm *kvm)
+{
+	if (unlikely(!is_td(kvm)))
+		return -EOPNOTSUPP;
+
+	if (is_hkid_assigned(to_kvm_tdx(kvm)))
+		tdx_track(kvm);
+
+	return 0;
+}
+
+static int tdx_sept_remove_private_spte(struct kvm *kvm, gfn_t gfn,
+					 enum pg_level level, kvm_pfn_t pfn)
+{
+	/*
+	 * TDX requires TLB tracking before dropping private page.  Do
+	 * it here, although it is also done later.
+	 * If hkid isn't assigned, the guest is destroying and no vcpu
+	 * runs further.  TLB shootdown isn't needed.
+	 *
+	 * TODO: Call TDH.MEM.TRACK() only when we have called
+	 * TDH.MEM.RANGE.BLOCK(), but not call TDH.MEM.TRACK() yet.
+	 */
+	if (is_hkid_assigned(to_kvm_tdx(kvm)))
+		tdx_track(kvm);
+
+	return tdx_sept_drop_private_spte(kvm, gfn, level, pfn);
+}
+
 static int tdx_get_capabilities(struct kvm_tdx_cmd *cmd)
 {
 	struct kvm_tdx_capabilities __user *user_caps;
@@ -924,6 +1239,39 @@ static int tdx_td_init(struct kvm *kvm, struct kvm_tdx_cmd *cmd)
 	return ret;
 }
 
+void tdx_flush_tlb(struct kvm_vcpu *vcpu)
+{
+	/*
+	 * Don't need to flush shared EPTP:
+	 * "TD VCPU TLB Address Spaced Identifier" in the TDX module spec:
+	 * The TLB entries for TD are tagged with:
+	 *  SEAM (1 bit)
+	 *  VPID
+	 *  Secure EPT root (51:12 bits) with HKID = 0
+	 *  PCID
+	 * for *both* Secure-EPT and Shared-EPT.
+	 * TLB flush with Secure-EPT root by tdx_track() results in flushing
+	 * the conversion of both Secure-EPT and Shared-EPT.
+	 */
+
+	/*
+	 * See tdx_track().  Wait for tlb shootdown initiater to finish
+	 * TDH_MEM_TRACK() so that shared-EPT/secure-EPT TLB is flushed
+	 * on the next TDENTER.
+	 */
+	while (atomic_read(&to_kvm_tdx(vcpu->kvm)->tdh_mem_track))
+		cpu_relax();
+}
+
+void tdx_flush_tlb_current(struct kvm_vcpu *vcpu)
+{
+	/*
+	 * flush_tlb_current() is used only the first time for the vcpu to run.
+	 * As it isn't performance critical, keep this function simple.
+	 */
+	tdx_track(vcpu->kvm);
+}
+
 int tdx_vm_ioctl(struct kvm *kvm, void __user *argp)
 {
 	struct kvm_tdx_cmd tdx_cmd;
@@ -1087,6 +1435,17 @@ int tdx_vcpu_ioctl(struct kvm_vcpu *vcpu, void __user *argp)
 	return 0;
 }
 
+int tdx_gmem_max_level(struct kvm *kvm, kvm_pfn_t pfn, gfn_t gfn,
+		       bool is_private, u8 *max_level)
+{
+	if (!is_private)
+		return 0;
+
+	/* TODO: Enable 2mb and 1gb large page support. */
+	*max_level = min(*max_level, PG_LEVEL_4K);
+	return 0;
+}
+
 #define TDX_MD_MAP(_fid, _ptr)			\
 	{ .fid = MD_FIELD_ID_##_fid,		\
 	  .ptr = (_ptr), }
@@ -1297,8 +1656,21 @@ int __init tdx_hardware_setup(struct kvm_x86_ops *x86_ops)
 	on_each_cpu(vmx_off, &enable.enabled, true);
 	cpus_read_unlock();
 	free_cpumask_var(enable.enabled);
+	if (r)
+		goto out;
+
+	x86_ops->link_private_spt = tdx_sept_link_private_spt;
+	x86_ops->free_private_spt = tdx_sept_free_private_spt;
+	x86_ops->set_private_spte = tdx_sept_set_private_spte;
+	x86_ops->remove_private_spte = tdx_sept_remove_private_spte;
+	x86_ops->zap_private_spte = tdx_sept_zap_private_spte;
+
+	return 0;
 
 out:
+	/* kfree() accepts NULL. */
+	kfree(tdx_mng_key_config_lock);
+	tdx_mng_key_config_lock = NULL;
 	return r;
 }
 
diff --git a/arch/x86/kvm/vmx/tdx.h b/arch/x86/kvm/vmx/tdx.h
index 8a0d1bfe34a0..75596b9dcf3f 100644
--- a/arch/x86/kvm/vmx/tdx.h
+++ b/arch/x86/kvm/vmx/tdx.h
@@ -18,6 +18,7 @@ struct kvm_tdx {
 	int hkid;
 
 	bool finalized;
+	atomic_t tdh_mem_track;
 
 	u64 tsc_offset;
 };
@@ -162,7 +163,6 @@ static __always_inline u64 td_tdcs_exec_read64(struct kvm_tdx *kvm_tdx, u32 fiel
 	}
 	return out.r8;
 }
-
 #else
 struct kvm_tdx {
 	struct kvm kvm;
diff --git a/arch/x86/kvm/vmx/tdx_ops.h b/arch/x86/kvm/vmx/tdx_ops.h
index e5c069b96126..d27f281152cb 100644
--- a/arch/x86/kvm/vmx/tdx_ops.h
+++ b/arch/x86/kvm/vmx/tdx_ops.h
@@ -44,6 +44,12 @@ static inline u64 tdx_seamcall(u64 op, struct tdx_module_args *in,
 void pr_tdx_error(u64 op, u64 error_code, const struct tdx_module_args *out);
 #endif
 
+static inline int pg_level_to_tdx_sept_level(enum pg_level level)
+{
+	WARN_ON_ONCE(level == PG_LEVEL_NONE);
+	return level - 1;
+}
+
 /*
  * TDX module acquires its internal lock for resources.  It doesn't spin to get
  * locks because of its restrictions of allowed execution time.  Instead, it
diff --git a/arch/x86/kvm/vmx/x86_ops.h b/arch/x86/kvm/vmx/x86_ops.h
index 24161fa404aa..d5f75efd87e6 100644
--- a/arch/x86/kvm/vmx/x86_ops.h
+++ b/arch/x86/kvm/vmx/x86_ops.h
@@ -153,7 +153,12 @@ void tdx_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event);
 
 int tdx_vcpu_ioctl(struct kvm_vcpu *vcpu, void __user *argp);
 
+void tdx_flush_tlb(struct kvm_vcpu *vcpu);
+void tdx_flush_tlb_current(struct kvm_vcpu *vcpu);
+int tdx_sept_flush_remote_tlbs(struct kvm *kvm);
 void tdx_load_mmu_pgd(struct kvm_vcpu *vcpu, hpa_t root_hpa, int root_level);
+int tdx_gmem_max_level(struct kvm *kvm, kvm_pfn_t pfn, gfn_t gfn,
+		       bool is_private, u8 *max_level);
 #else
 static inline int tdx_hardware_setup(struct kvm_x86_ops *x86_ops) { return -EOPNOTSUPP; }
 static inline void tdx_hardware_unsetup(void) {}
@@ -176,7 +181,15 @@ static inline void tdx_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event) {}
 
 static inline int tdx_vcpu_ioctl(struct kvm_vcpu *vcpu, void __user *argp) { return -EOPNOTSUPP; }
 
+static inline void tdx_flush_tlb(struct kvm_vcpu *vcpu) {}
+static inline void tdx_flush_tlb_current(struct kvm_vcpu *vcpu) {}
+static inline int tdx_sept_flush_remote_tlbs(struct kvm *kvm) { return 0; }
 static inline void tdx_load_mmu_pgd(struct kvm_vcpu *vcpu, hpa_t root_hpa, int root_level) {}
+static inline int tdx_gmem_max_level(struct kvm *kvm, kvm_pfn_t pfn, gfn_t gfn,
+				     bool is_private, u8 *max_level)
+{
+	return -EOPNOTSUPP;
+}
 #endif
 
 #endif /* __KVM_X86_VMX_X86_OPS_H */
-- 
2.25.1


  parent reply	other threads:[~2024-02-26  8:28 UTC|newest]

Thread overview: 665+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-02-26  8:25 [PATCH v19 000/130] KVM TDX basic feature support isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 001/130] x86/virt/tdx: Rename _offset to _member for TD_SYSINFO_MAP() macro isaku.yamahata
2024-03-08  7:25   ` Binbin Wu
2024-03-08 10:36     ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 002/130] x86/virt/tdx: Move TDMR metadata fields map table to local variable isaku.yamahata
2024-03-08  7:36   ` Binbin Wu
2024-04-04 14:08   ` Kirill A. Shutemov
2024-04-04 20:18     ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 003/130] x86/virt/tdx: Unbind global metadata read with 'struct tdx_tdmr_sysinfo' isaku.yamahata
2024-03-08  7:46   ` Binbin Wu
2024-02-26  8:25 ` [PATCH v19 004/130] x86/virt/tdx: Support global metadata read for all element sizes isaku.yamahata
2024-02-26 14:32   ` Juergen Gross
2024-02-27  8:40     ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 005/130] x86/virt/tdx: Export global metadata read infrastructure isaku.yamahata
2024-03-06  9:05   ` Yi Sun
2024-03-06 21:23     ` Huang, Kai
2024-03-08  8:31   ` Binbin Wu
2024-02-26  8:25 ` [PATCH v19 006/130] x86/virt/tdx: Export TDX KeyID information isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 007/130] x86/virt/tdx: Export SEAMCALL functions isaku.yamahata
2024-03-15  0:02   ` Huang, Kai
2024-03-15  1:17     ` Edgecombe, Rick P
2024-03-15  1:33       ` Dave Hansen
2024-03-15 16:33         ` Sean Christopherson
2024-03-15 17:46           ` Sean Christopherson
2024-03-15 17:51             ` Edgecombe, Rick P
2024-03-15 19:20               ` Sean Christopherson
2024-03-15 17:48           ` Edgecombe, Rick P
2024-03-20 11:27             ` Huang, Kai
2024-03-15 18:28           ` Dave Hansen
2024-03-15 19:38             ` Sean Christopherson
2024-03-15 23:53               ` Dave Hansen
2024-03-20 12:09               ` Huang, Kai
2024-03-20 15:07                 ` Dave Hansen
2024-03-20 21:00                   ` Huang, Kai
2024-04-03 21:36                   ` Sean Christopherson
2024-04-10 12:49           ` Kirill A. Shutemov
2024-04-16 19:45             ` Edgecombe, Rick P
2024-04-18 14:16               ` kirill.shutemov
2024-04-18 18:26                 ` Sean Christopherson
2024-04-19 14:46                   ` kirill.shutemov
2024-04-19 19:53                     ` Sean Christopherson
2024-04-25 16:46                       ` kirill.shutemov
2024-04-19 20:04                     ` Edgecombe, Rick P
2024-04-22 11:46                       ` kirill.shutemov
2024-04-22 15:56                         ` Edgecombe, Rick P
2024-04-22 19:50                           ` Sean Christopherson
2024-04-23  0:28                             ` Edgecombe, Rick P
2024-02-26  8:25 ` [PATCH v19 008/130] x86/tdx: Warning with 32bit build shift-count-overflow isaku.yamahata
2024-02-28 22:49   ` Huang, Kai
2024-03-01 11:36     ` Kirill A. Shutemov
2024-03-05  8:12       ` Isaku Yamahata
2024-03-05 21:35         ` Huang, Kai
2024-03-06 22:17           ` Isaku Yamahata
2024-03-06 22:25             ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 009/130] KVM: x86: Add gmem hook for determining max NPT mapping level isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 010/130] KVM: x86: Pass is_private to gmem hook of gmem_max_level isaku.yamahata
2024-04-19  1:19   ` Yan Zhao
2024-04-19 18:28     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 011/130] KVM: Add new members to struct kvm_gfn_range to operate on isaku.yamahata
2024-03-12 13:33   ` Binbin Wu
2024-03-13 17:14     ` Isaku Yamahata
2024-03-19  2:50       ` Edgecombe, Rick P
2024-03-19 14:47         ` Edgecombe, Rick P
2024-03-19 21:50           ` Isaku Yamahata
2024-04-26  7:39             ` Fuad Tabba
2024-04-26 13:50               ` Edgecombe, Rick P
2024-04-26 15:28                 ` Sean Christopherson
2024-04-26 15:57                   ` Edgecombe, Rick P
2024-04-26 16:49                     ` Sean Christopherson
2024-04-26 17:01                       ` Edgecombe, Rick P
2024-04-26 17:13                         ` Sean Christopherson
2024-02-26  8:25 ` [PATCH v19 012/130] KVM: x86/mmu: Pass around full 64-bit error code for the KVM page fault isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 013/130] KVM: x86: Use PFERR_GUEST_ENC_MASK to indicate fault is private isaku.yamahata
2024-03-07  7:04   ` Yin Fengwei
2024-02-26  8:25 ` [PATCH v19 014/130] KVM: Add KVM vcpu ioctl to pre-populate guest memory isaku.yamahata
2024-03-07  7:01   ` Yin Fengwei
2024-03-08 21:01     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 015/130] KVM: Document KVM_MEMORY_MAPPING ioctl isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 016/130] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2024-03-06  7:13   ` Binbin Wu
2024-03-06 22:22     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 017/130] KVM: x86: Implement kvm_arch_{, pre_}vcpu_memory_mapping() isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 018/130] KVM: x86/mmu: Assume guest MMIOs are shared isaku.yamahata
2024-03-25 23:41   ` Edgecombe, Rick P
2024-03-27 17:22     ` Isaku Yamahata
2024-03-27 17:27       ` Edgecombe, Rick P
2024-04-04 22:31         ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 019/130] KVM: x86: Add is_vm_type_supported callback isaku.yamahata
2024-03-14  8:32   ` Chao Gao
2024-03-14 16:13     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 020/130] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 021/130] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_init() isaku.yamahata
2024-03-13 15:30   ` Binbin Wu
2024-03-13 17:36     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 022/130] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2024-03-11  5:32   ` Yin, Fengwei
2024-03-12  2:15     ` Isaku Yamahata
2024-03-12  2:21       ` Yin Fengwei
2024-03-12  4:42         ` Isaku Yamahata
2024-03-21 11:27   ` Huang, Kai
2024-03-22 17:39     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 023/130] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2024-03-14  2:05   ` Binbin Wu
2024-03-14 16:27     ` Isaku Yamahata
2024-03-15  4:44       ` Binbin Wu
2024-03-15 23:25         ` Isaku Yamahata
2024-03-21 12:39           ` Huang, Kai
2024-03-22 18:01             ` Isaku Yamahata
2024-03-21 13:07   ` Huang, Kai
2024-03-22 21:23     ` Isaku Yamahata
2024-04-10 13:12       ` Huang, Kai
2024-04-10 15:29         ` Sean Christopherson
2024-04-10 23:15           ` Huang, Kai
2024-04-11 14:03             ` Sean Christopherson
2024-04-11 22:58               ` Huang, Kai
2024-04-16 20:58                 ` Sean Christopherson
2024-04-17 13:20                   ` Huang, Kai
2024-04-17 14:40                     ` Sean Christopherson
2024-04-17 23:09                       ` Huang, Kai
2024-04-17 23:35                         ` Sean Christopherson
2024-04-18  0:47                           ` Huang, Kai
2024-04-18 14:30                             ` Sean Christopherson
2024-04-18 23:09                               ` Huang, Kai
2024-04-19 17:23                                 ` Sean Christopherson
2024-04-22 12:46                                   ` Huang, Kai
2024-04-22 16:54                                     ` Sean Christopherson
2024-04-22 22:47                                       ` Huang, Kai
2024-04-23  0:08                                         ` Sean Christopherson
2024-04-23  1:34                                           ` Huang, Kai
2024-04-23  1:45                                             ` Huang, Kai
2024-04-23 15:15                                               ` Sean Christopherson
2024-04-23 22:59                                                 ` Huang, Kai
2024-04-23 23:29                                                   ` Huang, Kai
2024-04-25 16:30                                                     ` Sean Christopherson
2024-04-25 22:34                                                       ` Huang, Kai
2024-04-25 22:43                                                         ` Sean Christopherson
2024-04-29 11:41                                                           ` Huang, Kai
2024-04-29 20:06                                                             ` Sean Christopherson
2024-04-29 23:12                                                               ` Huang, Kai
2024-04-30 16:13                                                                 ` Sean Christopherson
2024-05-01  2:56                                                                   ` Huang, Kai
2024-04-25 16:35                                                   ` Sean Christopherson
2024-04-25 21:53                                                     ` Huang, Kai
2024-04-25 22:07                                                       ` Sean Christopherson
2024-04-26  0:21                                                         ` Huang, Kai
2024-04-26  3:21                                                           ` Chao Gao
2024-04-26  9:44                                                             ` Huang, Kai
2024-05-07 12:40                                   ` Huang, Kai
2024-05-07 16:24                                     ` Sean Christopherson
2024-05-07 21:59                                       ` Huang, Kai
2024-04-09  0:37   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 024/130] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2024-03-14  6:21   ` Binbin Wu
2024-03-14 16:37     ` Isaku Yamahata
2024-03-21 21:37   ` Huang, Kai
2024-03-22 22:45     ` Isaku Yamahata
2024-03-25 10:22       ` Huang, Kai
2024-04-23 13:59       ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 025/130] KVM: TDX: Make TDX VM type supported isaku.yamahata
2024-03-14  6:29   ` Binbin Wu
2024-03-15 21:36     ` Isaku Yamahata
2024-03-21 21:40       ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 026/130] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 027/130] KVM: TDX: Define " isaku.yamahata
2024-03-01  7:25   ` Yan Zhao
2024-03-05  8:21     ` Isaku Yamahata
2024-04-16  0:55       ` Huang, Kai
2024-04-16 16:28         ` Isaku Yamahata
2024-04-16 22:06           ` Huang, Kai
2024-03-14  7:30   ` Binbin Wu
2024-03-14 16:48     ` Isaku Yamahata
2024-03-21 21:57   ` Huang, Kai
2024-03-22 23:15     ` Isaku Yamahata
2024-03-22  7:06   ` Yuan Yao
2024-03-22 23:17     ` Isaku Yamahata
2024-04-03 15:04   ` Sean Christopherson
2024-04-03 16:30     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 028/130] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2024-02-26 19:27   ` Isaku Yamahata
2024-03-14  7:45     ` Binbin Wu
2024-03-14 17:21       ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 029/130] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2024-03-15 17:41   ` Sean Christopherson
2024-03-15 19:23     ` Isaku Yamahata
2024-03-19 23:24   ` Edgecombe, Rick P
2024-03-20  0:09     ` Isaku Yamahata
2024-03-20  0:11       ` Edgecombe, Rick P
2024-03-20  5:41         ` Isaku Yamahata
2024-03-20 20:20           ` Isaku Yamahata
2024-03-20  0:03   ` Huang, Kai
2024-03-20 21:36     ` Isaku Yamahata
2024-03-20 22:37       ` Huang, Kai
2024-03-22  0:16         ` Isaku Yamahata
2024-03-22  4:33           ` Huang, Kai
2024-03-22 23:26             ` Isaku Yamahata
2024-04-24 10:50   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 030/130] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2024-03-20  0:29   ` Huang, Kai
2024-03-20 21:50     ` Isaku Yamahata
2024-03-20 23:09       ` Huang, Kai
2024-03-21 23:52         ` Isaku Yamahata
2024-03-22  4:37           ` Huang, Kai
2024-04-24  0:11   ` Huang, Kai
2024-04-26 18:38     ` Isaku Yamahata
2024-04-24 11:06   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 031/130] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 032/130] KVM: TDX: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2024-03-13  0:44   ` Edgecombe, Rick P
2024-03-13 17:44     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 033/130] KVM: TDX: Add helper function to read TDX metadata in array isaku.yamahata
2024-03-14  9:17   ` Binbin Wu
2024-03-14 14:35     ` Binbin Wu
2024-03-14 17:00       ` Isaku Yamahata
2024-03-14 22:27   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 034/130] KVM: TDX: Get system-wide info about TDX module on initialization isaku.yamahata
2024-03-14 15:06   ` Binbin Wu
2024-03-14 23:09   ` Huang, Kai
2024-03-15  2:18     ` Xiaoyao Li
2024-03-15  4:57       ` Huang, Kai
2024-03-15  5:11         ` Xiaoyao Li
2024-03-15  5:39           ` Huang, Kai
2024-03-15  5:50             ` Xiaoyao Li
2024-03-15 16:22     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 035/130] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2024-03-21 22:10   ` Huang, Kai
2024-03-22 23:36     ` Isaku Yamahata
2024-03-23  4:27       ` Huang, Kai
2024-03-26  3:10         ` Edgecombe, Rick P
2024-02-26  8:25 ` [PATCH v19 036/130] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2024-03-21 22:26   ` Huang, Kai
2024-03-23  0:28     ` Isaku Yamahata
2024-03-25  0:25       ` Huang, Kai
2024-04-24 10:30   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific isaku.yamahata
2024-03-21 23:36   ` Huang, Kai
2024-03-23  1:13     ` Isaku Yamahata
2024-03-25  8:42       ` Binbin Wu
2024-03-25 21:31         ` Isaku Yamahata
2024-03-25 22:47           ` Huang, Kai
2024-03-25  8:43       ` Huang, Kai
2024-03-25 21:29         ` isaku.yamahata
2024-05-09 16:35   ` Sean Christopherson
2024-05-09 22:40     ` Huang, Kai
2024-05-09 22:47       ` Huang, Kai
2024-05-09 22:52       ` Sean Christopherson
2024-05-09 23:19         ` Huang, Kai
2024-05-09 23:55           ` Isaku Yamahata
2024-05-10 14:04             ` Sean Christopherson
2024-05-14  2:01               ` Huang, Kai
2024-05-29 23:15                 ` Sean Christopherson
2024-05-30 12:21                   ` Huang, Kai
2024-05-30 23:12                     ` Sean Christopherson
2024-05-31  0:36                       ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 038/130] KVM: TDX: create/destroy VM structure isaku.yamahata
2024-03-20  5:12   ` Chao Gao
2024-03-21 14:17     ` Isaku Yamahata
2024-03-22  3:46       ` Yuan Yao
2024-03-22  5:32         ` Yuan Yao
2024-03-22 23:44           ` Isaku Yamahata
2024-03-29  6:22       ` Binbin Wu
2024-04-01 22:55         ` Isaku Yamahata
2024-04-03 22:13       ` Huang, Kai
2024-04-04  1:03         ` Chao Gao
2024-04-04  1:24           ` Huang, Kai
2024-03-22  1:06   ` Huang, Kai
2024-03-23  1:36     ` Isaku Yamahata
2024-03-25  9:58   ` Binbin Wu
2024-03-25 21:48     ` Isaku Yamahata
2024-03-26  1:43   ` Huang, Kai
2024-03-27 22:53     ` Isaku Yamahata
2024-03-28  1:49       ` Huang, Kai
2024-03-28  5:34         ` Isaku Yamahata
2024-03-28 11:14           ` Huang, Kai
2024-03-28 14:12             ` Chao Gao
2024-03-28 20:39             ` Isaku Yamahata
2024-03-29  7:25               ` Binbin Wu
2024-04-02  6:16                 ` Isaku Yamahata
2024-04-01 10:41               ` Huang, Kai
2024-03-27 23:33   ` Huang, Kai
2024-04-03 17:24     ` Isaku Yamahata
2024-04-03 22:26       ` Huang, Kai
2024-04-15  8:17   ` Xiaoyao Li
2024-04-16 16:40     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2024-03-20  6:12   ` Chao Gao
2024-03-21 15:55     ` Isaku Yamahata
2024-03-28  1:12       ` Edgecombe, Rick P
2024-03-28  1:36         ` Xiaoyao Li
2024-03-28 18:26           ` Edgecombe, Rick P
2024-04-01  7:23             ` Xiaoyao Li
2024-03-20  8:15   ` Xiaoyao Li
2024-03-21 17:30     ` Isaku Yamahata
2024-03-22 11:20   ` Huang, Kai
2024-03-23  1:22     ` Isaku Yamahata
2024-03-25 10:39       ` Huang, Kai
2024-03-25 22:04         ` Isaku Yamahata
2024-04-03 23:59   ` Huang, Kai
2024-04-11 18:54     ` Isaku Yamahata
2024-04-08 18:38   ` Edgecombe, Rick P
2024-04-11 19:26     ` Isaku Yamahata
2024-04-11 19:51       ` Edgecombe, Rick P
2024-04-11 20:46         ` Isaku Yamahata
2024-04-11 21:03           ` Edgecombe, Rick P
2024-05-17 14:32   ` Kirill A. Shutemov
2024-05-17 14:37     ` Juergen Gross
2024-05-17 14:53       ` Kirill A. Shutemov
2024-05-17 15:00         ` Jürgen Groß
2024-05-17 16:25           ` Kirill A. Shutemov
2024-05-23 10:35             ` Kirill A. Shutemov
2024-05-23 10:37               ` Jürgen Groß
2024-05-23 23:37             ` Huang, Kai
2024-05-28  8:19               ` Kirill A. Shutemov
2024-02-26  8:25 ` [PATCH v19 040/130] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2024-03-20  7:01   ` Chao Gao
2024-03-21 17:46     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 041/130] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2024-03-21  1:06   ` Chao Gao
2024-03-21 17:59     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 042/130] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 043/130] KVM: TDX: create/free TDX vcpu structure isaku.yamahata
2024-03-21  1:30   ` Chao Gao
2024-03-21 20:21     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 044/130] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2024-03-21  5:43   ` Chao Gao
2024-03-21 20:43     ` Isaku Yamahata
2024-03-27  0:27   ` Edgecombe, Rick P
2024-03-27 22:56     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 045/130] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 046/130] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2024-03-27  3:08   ` Chenyi Qiang
2024-03-27 14:09     ` Binbin Wu
2024-03-27 23:50       ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 047/130] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 048/130] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values isaku.yamahata
2024-03-26 15:53   ` Binbin Wu
2024-03-26 17:34     ` Isaku Yamahata
2024-03-27  0:47       ` Binbin Wu
2024-02-26  8:25 ` [PATCH v19 049/130] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 050/130] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 051/130] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 052/130] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2024-03-26  3:31   ` Edgecombe, Rick P
2024-03-27 23:58     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 053/130] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 054/130] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 055/130] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 056/130] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2024-03-21  0:11   ` Edgecombe, Rick P
2024-03-21 21:24     ` Isaku Yamahata
2024-03-22  7:18       ` Chao Gao
2024-03-22 15:19         ` Isaku Yamahata
2024-04-20 19:05     ` Edgecombe, Rick P
2024-02-26  8:25 ` [PATCH v19 057/130] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2024-03-21  0:18   ` Edgecombe, Rick P
2024-03-21 21:59     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 058/130] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2024-03-13 20:51   ` Edgecombe, Rick P
2024-03-14 18:10     ` Isaku Yamahata
2024-03-14 21:23       ` Huang, Kai
2024-03-14 21:39         ` Edgecombe, Rick P
2024-03-15  1:09           ` Isaku Yamahata
2024-03-27 13:49             ` Binbin Wu
2024-03-28  0:02               ` Isaku Yamahata
2024-03-28  3:17                 ` Binbin Wu
2024-03-14 21:52       ` Edgecombe, Rick P
2024-03-15  0:24         ` Isaku Yamahata
2024-04-22  3:34   ` Yan Zhao
2024-04-22 17:30     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 059/130] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2024-03-18 23:46   ` Edgecombe, Rick P
2024-03-19 23:56     ` Isaku Yamahata
2024-03-20  0:56       ` Edgecombe, Rick P
2024-03-21  1:17         ` Edgecombe, Rick P
2024-03-21 22:59           ` Isaku Yamahata
2024-03-22  0:40             ` Edgecombe, Rick P
2024-03-25 19:05               ` Isaku Yamahata
2024-03-25 19:55                 ` Edgecombe, Rick P
2024-03-25 22:18                   ` Isaku Yamahata
2024-03-25 23:10                     ` Isaku Yamahata
2024-03-25 23:21                       ` Edgecombe, Rick P
2024-03-25 23:35                         ` Isaku Yamahata
2024-03-26  2:32                           ` Chao Gao
2024-03-26  2:42                             ` Edgecombe, Rick P
2024-03-26 11:13                               ` Chao Gao
2024-03-26 17:48                                 ` Isaku Yamahata
2024-03-27  2:54                                   ` Xiaoyao Li
2024-03-27 17:36                                     ` Edgecombe, Rick P
2024-03-28  0:06                                       ` Isaku Yamahata
2024-03-28  0:06                                       ` Xiaoyao Li
2024-03-28  0:36                                         ` Isaku Yamahata
2024-03-28  1:04                                           ` Xiaoyao Li
2024-03-28  0:45                                         ` Edgecombe, Rick P
2024-03-28  0:58                                           ` Xiaoyao Li
2024-03-28  1:06                                             ` Edgecombe, Rick P
2024-03-28  1:30                                               ` Xiaoyao Li
2024-03-28  3:04                                                 ` Edgecombe, Rick P
2024-03-28  3:40                                                   ` Xiaoyao Li
2024-03-28 10:17                                                     ` Chao Gao
2024-03-28 13:21                                                       ` Xiaoyao Li
2024-03-28 13:38                                                         ` Chao Gao
2024-03-28 14:45                                                           ` Xiaoyao Li
2024-03-28 16:57                                                             ` Edgecombe, Rick P
2024-03-28  9:53                                         ` Chao Gao
2024-03-28  0:23                   ` Xiaoyao Li
2024-03-21 22:39         ` Isaku Yamahata
2024-04-17  2:21   ` Chao Gao
2024-04-17  6:47     ` Isaku Yamahata
2024-04-21  1:58   ` Edgecombe, Rick P
2024-02-26  8:26 ` [PATCH v19 060/130] KVM: x86/tdp_mmu: Apply mmu notifier callback to only shared GPA isaku.yamahata
2024-03-28  8:29   ` Binbin Wu
2024-03-28 20:55     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 061/130] KVM: x86/tdp_mmu: Sprinkle __must_check isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 062/130] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2024-03-23 23:39   ` Edgecombe, Rick P
2024-03-25 20:01     ` Isaku Yamahata
2024-03-25 22:31       ` Edgecombe, Rick P
2024-03-26 18:06         ` Isaku Yamahata
2024-04-19 18:55           ` Edgecombe, Rick P
2024-03-27 13:07   ` Chao Gao
2024-03-28  0:25     ` Isaku Yamahata
2024-04-01  9:12   ` Binbin Wu
2024-04-02  6:37     ` Isaku Yamahata
2024-04-22  9:08   ` Yan Zhao
2024-02-26  8:26 ` [PATCH v19 063/130] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 064/130] KVM: x86/mmu: Do not enable page track for TD guest isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 065/130] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 066/130] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 067/130] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2024-04-01 15:49   ` Binbin Wu
2024-04-03 17:33     ` Isaku Yamahata
2024-04-06  0:09       ` Edgecombe, Rick P
2024-04-06  0:58         ` Huang, Kai
2024-04-07  1:32           ` Binbin Wu
2024-04-08 15:32             ` Edgecombe, Rick P
2024-02-26  8:26 ` [PATCH v19 068/130] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 069/130] KVM: TDX: Require TDP MMU and mmio caching for TDX isaku.yamahata
2024-03-28  5:24   ` Binbin Wu
2024-03-28 21:03     ` Isaku Yamahata
2024-04-01 17:34   ` Sean Christopherson
2024-04-02  6:03     ` Isaku Yamahata
2024-02-26  8:26 ` isaku.yamahata [this message]
2024-03-28  3:12   ` [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support Chao Gao
2024-03-28  3:55     ` Isaku Yamahata
2024-05-26  8:45     ` Chen Yu
2024-05-29  0:55       ` Isaku Yamahata
2024-05-29  0:58         ` Isaku Yamahata
2024-05-29  7:56           ` Chen Yu
2024-05-31 22:16             ` Edgecombe, Rick P
2024-04-02  6:21   ` Binbin Wu
2024-04-03 17:50     ` Isaku Yamahata
2024-04-02  9:13   ` Binbin Wu
2024-04-03 18:01     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 071/130] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 072/130] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 073/130] KVM: x86: Add hooks in kvm_arch_vcpu_memory_mapping() isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 074/130] KVM: TDX: Create initial guest memory isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 075/130] KVM: TDX: Extend memory measurement with " isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 076/130] KVM: TDX: Finalize VM initialization isaku.yamahata
2024-04-11 16:39   ` Adrian Hunter
2024-04-12  1:08     ` Isaku Yamahata
2024-04-12 12:22       ` Adrian Hunter
2024-04-12 18:09         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 077/130] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 078/130] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2024-03-15 17:26   ` Sean Christopherson
2024-03-15 20:42     ` Isaku Yamahata
2024-04-07  1:42     ` Binbin Wu
2024-03-18 21:01   ` Edgecombe, Rick P
2024-03-18 23:40     ` Isaku Yamahata
2024-04-04 13:22   ` Kirill A. Shutemov
2024-04-04 21:51     ` Huang, Kai
2024-04-04 22:45       ` Sean Christopherson
2024-04-04 23:28         ` Huang, Kai
2024-02-26  8:26 ` [PATCH v19 079/130] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2024-04-07  3:02   ` Binbin Wu
2024-04-12 20:17     ` Isaku Yamahata
2024-04-18  7:57       ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 080/130] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2024-03-07  8:32   ` Chen Yu
2024-03-08 20:58     ` Isaku Yamahata
2024-03-09 16:28       ` Chen Yu
2024-03-12  2:03         ` Isaku Yamahata
2024-04-07  3:47   ` Binbin Wu
2024-04-12 20:19     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 081/130] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2024-04-07  5:36   ` Binbin Wu
2024-04-12 20:23     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 082/130] KVM: TDX: restore user ret MSRs isaku.yamahata
2024-04-07  5:59   ` Binbin Wu
2024-04-12 20:32     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 083/130] KVM: TDX: Add TSX_CTRL msr into uret_msrs list isaku.yamahata
2024-04-07  7:05   ` Binbin Wu
2024-04-12 20:35     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 084/130] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 085/130] KVM: TDX: Complete interrupts after tdexit isaku.yamahata
2024-04-16 18:23   ` Reinette Chatre
2024-04-17  6:56     ` Isaku Yamahata
2024-04-23 13:15     ` Binbin Wu
2024-04-23 14:48       ` Reinette Chatre
2024-02-26  8:26 ` [PATCH v19 086/130] KVM: TDX: restore debug store when TD exit isaku.yamahata
2024-04-16 18:24   ` Reinette Chatre
2024-04-17  4:03     ` Chao Gao
2024-02-26  8:26 ` [PATCH v19 087/130] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2024-04-07  9:03   ` Binbin Wu
2024-04-12 16:15   ` Reinette Chatre
2024-04-12 21:42     ` Isaku Yamahata
2024-04-12 22:46       ` Sean Christopherson
2024-04-13  0:40         ` Isaku Yamahata
2024-04-15 13:49           ` Sean Christopherson
2024-04-15 22:48             ` Isaku Yamahata
2024-04-16  0:05               ` Huang, Kai
2024-04-16 16:44                 ` Isaku Yamahata
2024-04-18  1:09                   ` Huang, Kai
2024-04-23 12:13     ` Binbin Wu
2024-05-06 19:02       ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 088/130] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2024-04-07 10:52   ` Binbin Wu
2024-04-13  0:20     ` Isaku Yamahata
2024-05-06  3:30   ` Binbin Wu
2024-05-06 19:10     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 089/130] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2024-04-16 14:12   ` Edgecombe, Rick P
2024-02-26  8:26 ` [PATCH v19 090/130] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 091/130] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2024-02-27  8:52   ` Binbin Wu
2024-03-05  8:35     ` Isaku Yamahata
2024-03-28  8:12   ` Chao Gao
2024-03-28 21:10     ` Isaku Yamahata
2024-04-08  3:16       ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 092/130] KVM: TDX: Implement interrupt injection isaku.yamahata
2024-03-28 10:56   ` Chao Gao
2024-03-28 21:12     ` Isaku Yamahata
2024-04-08  7:01   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 093/130] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2024-03-29  1:54   ` Chao Gao
2024-04-02  6:52     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 094/130] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2024-03-29  2:11   ` Chao Gao
2024-04-02  7:09     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 095/130] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2024-03-29  2:55   ` Chao Gao
2024-02-26  8:26 ` [PATCH v19 096/130] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2024-04-09  8:52   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 097/130] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2024-03-29  3:24   ` Chao Gao
2024-04-03 18:34     ` Isaku Yamahata
2024-04-03 18:55       ` Sean Christopherson
2024-05-09  3:26       ` Binbin Wu
2024-04-09  9:28   ` Binbin Wu
2024-04-15 22:51     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 098/130] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2024-03-15 17:45   ` Sean Christopherson
2024-03-19 21:57     ` Isaku Yamahata
2024-04-09 10:36   ` Binbin Wu
2024-04-15 22:58     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 099/130] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 100/130] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2024-04-09 14:53   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 101/130] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2024-03-04  7:39   ` Chenyi Qiang
2024-04-01  4:10   ` Chao Gao
2024-04-03 18:42     ` Isaku Yamahata
2024-04-30 20:47       ` Reinette Chatre
2024-05-01 15:56         ` Isaku Yamahata
2024-05-01 16:54           ` Reinette Chatre
2024-05-01 18:19             ` Isaku Yamahata
2024-05-01 18:22               ` Reinette Chatre
2024-05-06  7:21             ` Chao Gao
2024-05-06 14:21               ` Sean Christopherson
2024-05-06 14:22   ` Sean Christopherson
2024-02-26  8:26 ` [PATCH v19 102/130] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2024-04-01  8:22   ` Chao Gao
2024-04-03 18:51     ` Isaku Yamahata
2024-04-17  3:05       ` Binbin Wu
2024-04-18  0:08         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 103/130] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI isaku.yamahata
2024-04-01  9:14   ` Chao Gao
2024-04-03 22:23     ` Isaku Yamahata
2024-05-07  7:06       ` Binbin Wu
2024-05-07 20:55         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 104/130] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2024-04-01  9:59   ` Chao Gao
2024-04-04  1:15     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 105/130] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2024-04-02  8:52   ` Chao Gao
2024-04-04  1:27     ` Isaku Yamahata
2024-04-17  6:16       ` Binbin Wu
2024-04-17  7:02         ` Isaku Yamahata
2024-05-27  0:57           ` Binbin Wu
2024-05-28 17:16             ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 106/130] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2024-04-03  2:49   ` Chao Gao
2024-04-03 15:58   ` Sean Christopherson
2024-04-04 23:02     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 107/130] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 108/130] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2024-04-03  3:25   ` Chao Gao
2024-04-03 14:49     ` Sean Christopherson
2024-04-04 23:25       ` Isaku Yamahata
2024-04-07  3:50         ` Chao Gao
2024-04-08 18:56           ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 109/130] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2024-04-17 12:51   ` Binbin Wu
2024-04-17 20:10     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 110/130] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2024-04-18  9:29   ` Binbin Wu
2024-04-18 11:04     ` Binbin Wu
2024-04-18 21:22       ` Isaku Yamahata
2024-04-19  1:42         ` Binbin Wu
2024-04-19 17:34           ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 111/130] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2024-04-03  6:51   ` Chao Gao
2024-04-03 15:07     ` Sean Christopherson
2024-04-03 15:14   ` Sean Christopherson
2024-04-04 23:42     ` Isaku Yamahata
2024-04-18 13:36       ` Binbin Wu
2024-04-18 13:54   ` Binbin Wu
2024-04-18 21:27     ` Isaku Yamahata
2024-04-19  2:33   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 112/130] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 113/130] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 114/130] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 115/130] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 116/130] KVM: TDX: Silently discard SMI request isaku.yamahata
2024-04-19  7:04   ` Binbin Wu
2024-04-19 13:52   ` Sean Christopherson
2024-04-19 18:11     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 117/130] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2024-04-19  8:31   ` Binbin Wu
2024-04-19 18:06     ` Isaku Yamahata
2024-02-26  8:27 ` [PATCH v19 118/130] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2024-04-19 10:04   ` Binbin Wu
2024-04-19 18:09     ` Isaku Yamahata
2024-02-26  8:27 ` [PATCH v19 119/130] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 120/130] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2024-03-15  0:06   ` Edgecombe, Rick P
2024-03-15  1:35     ` Isaku Yamahata
2024-03-15 14:01       ` Edgecombe, Rick P
2024-03-18 17:12         ` Isaku Yamahata
2024-03-18 17:43           ` Edgecombe, Rick P
2024-03-18 23:16             ` Isaku Yamahata
2024-03-22 22:57               ` Isaku Yamahata
2024-03-22 23:05                 ` Edgecombe, Rick P
2024-02-26  8:27 ` [PATCH v19 121/130] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 122/130] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 123/130] KVM: TDX: Ignore setting up mce isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 124/130] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 125/130] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2024-04-22  1:56   ` Binbin Wu
2024-04-22 17:34     ` Isaku Yamahata
2024-02-26  8:27 ` [PATCH v19 126/130] KVM: TDX: Inhibit APICv for TDX guest isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 127/130] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 128/130] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 129/130] RFC: KVM: x86: Add x86 callback to check cpuid isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 130/130] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2 isaku.yamahata
2024-03-21 23:12   ` Edgecombe, Rick P
2024-03-22  7:10     ` Huang, Kai
2024-03-22 16:06       ` Edgecombe, Rick P
2024-03-25 11:14         ` Huang, Kai
2024-03-25 15:32           ` Edgecombe, Rick P
2024-03-25 21:17             ` Isaku Yamahata
2024-03-25 22:31             ` Huang, Kai
2024-03-25 22:37               ` Edgecombe, Rick P
2024-03-25 21:10           ` Isaku Yamahata
2024-03-23  1:54       ` Isaku Yamahata

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=56cdb0da8bbf17dc293a2a6b4ff74f6e3e034bbd.1708933498.git.isaku.yamahata@intel.com \
    --to=isaku.yamahata@intel.com \
    --cc=chen.bo@intel.com \
    --cc=erdemaktas@google.com \
    --cc=hang.yuan@intel.com \
    --cc=isaku.yamahata@gmail.com \
    --cc=kai.huang@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=sagis@google.com \
    --cc=seanjc@google.com \
    --cc=tina.zhang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).