kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Zhi Wang <zhi.wang.linux@gmail.com>
To: Sean Christopherson <seanjc@google.com>
Cc: isaku.yamahata@intel.com, kvm@vger.kernel.org,
	linux-kernel@vger.kernel.org, isaku.yamahata@gmail.com,
	Paolo Bonzini <pbonzini@redhat.com>,
	erdemaktas@google.com, Sagi Shahar <sagis@google.com>,
	David Matlack <dmatlack@google.com>,
	Sean Christopherson <sean.j.christopherson@intel.com>,
	Kai Huang <kai.huang@intel.com>
Subject: Re: [PATCH v11 018/113] KVM: TDX: create/destroy VM structure
Date: Fri, 20 Jan 2023 00:45:44 +0200	[thread overview]
Message-ID: <20230120004544.00003c50@gmail.com> (raw)
In-Reply-To: <Y8cLcY12zDWqO8nd@google.com>

On Tue, 17 Jan 2023 20:56:17 +0000
Sean Christopherson <seanjc@google.com> wrote:

> On Tue, Jan 17, 2023, Zhi Wang wrote:
> > On Tue, 17 Jan 2023 15:55:53 +0000
> > Sean Christopherson <seanjc@google.com> wrote:
> > 
> > > On Sat, Jan 14, 2023, Zhi Wang wrote:
> > > > On Fri, 13 Jan 2023 15:16:08 +0000 > Sean Christopherson <seanjc@google.com> wrote:
> > > > 
> > > > > On Fri, Jan 13, 2023, Zhi Wang wrote:
> > > > > > Better add a FIXME: here as this has to be fixed later.
> > > > > 
> > > > > No, leaking the page is all KVM can reasonably do here.  An improved
> > > > > comment would be helpful, but no code change is required.
> > > > > tdx_reclaim_page() returns an error if and only if there's an
> > > > > unexpected, fatal error, e.g. a SEAMCALL with bad params, incorrect
> > > > > concurrency in KVM, a TDX Module bug, etc.  Retrying at a later point is
> > > > > highly unlikely to be successful.
> > > > 
> > > > Hi:
> > > > 
> > > > The word "leaking" sounds like a situation left unhandled temporarily.
> > > > 
> > > > I checked the source code of the TDX module[1] for the possible reason to
> > > > fail when reviewing this patch:
> > > > 
> > > > tdx-module-v1.0.01.01.zip\src\vmm_dispatcher\api_calls\tdh_phymem_page_reclaim.c
> > > > tdx-module-v1.0.01.01.zip\src\vmm_dispatcher\api_calls\tdh_phymem_page_wbinvd.c
> > > > 
> > > > a. Invalid parameters. For example, page is not aligned, PA HKID is not zero...
> > > > 
> > > > For invalid parameters, a WARN_ON_ONCE() + return value is good enough as
> > > > that is how kernel handles similar situations. The caller takes the
> > > > responsibility.
> > > >  
> > > > b. Locks has been taken in TDX module. TDR page has been locked due to another
> > > > SEAMCALL, another SEAMCALL is doing PAMT walk and holding PAMT lock... 
> > > > 
> > > > This needs to be improved later either by retry or taking tdx_lock to avoid
> > > > TDX module fails on this.
> > > 
> > > No, tdx_reclaim_page() already retries TDH.PHYMEM.PAGE.RECLAIM if the target page
> > > is contended (though I'd question the validity of even that), and TDH.PHYMEM.PAGE.WBINVD
> > > is performed only when reclaiming the TDR.  If there's contention when reclaiming
> > > the TDR, then KVM effectively has a use-after-free bug, i.e. leaking the page is
> > > the least of our worries.
> > > 
> > 
> > Hi:
> > 
> > Thanks for the reply. "Leaking" is the consquence of even failing in retry. I
> > agree with this. But I was questioning if "retry" is really a correct and only
> > solution when encountering lock contention in the TDX module as I saw that there
> > are quite some magic numbers are going to be introduced because of "retry" and
> > there were discussions about times of retry should be 3 or 1000 in TDX guest
> > on hyper-V patches. It doesn't sound right.
> 
> Ah, yeah, I'm speaking only with respect to leaking pages on failure in this
> specific scenario.
> 
> > Compare to an typical *kernel lock* case, an execution path can wait on a
> > waitqueue and later will be woken up. We usually do contention-wait-and-retry
> > and we rarely just do contention and retry X times. In TDX case, I understand
> > that it is hard for the TDX module to provide similar solutions as an execution
> > path can't stay long in the TDX module.
> 
> Let me preface the below comments by saying that this is the first time that I've
> seen the "Single-Step and Zero-Step Attacks Mitigation Mechanisms" behavior, i.e.
> the first time I've been made aware that the TDX Module can apparently decide
> to take S-EPT locks in the VM-Enter path.
> 
> > 
> > 1) We can always take tdx_lock (linux kernel lock) when calling a SEAMCALL
> > that touch the TDX internal locks. But the downside is we might lose some
> > concurrency.
> 
> This isn't really feasible in practice.  Even if tdx_lock were made a spinlock
> (it's currently a mutex) so that it could it could be taken inside kvm->mmu_lock,
> acquiring a per-VM lock, let alone a global lock, in KVM's page fault handling
> path is not an option.  KVM has a hard requirement these days of being able to
> handle multiple page faults in parallel.
> 
> > 2) As TDX module doesn't provide contention-and-wait, I guess the following
> > approach might have been discussed when designing this "retry".
> > 
> > KERNEL                          TDX MODULE
> > 
> > SEAMCALL A   ->                 PATH A: Taking locks
> > 
> > SEAMCALL B   ->                 PATH B: Contention on a lock
> > 
> >              <-                 Return "operand busy"
> > 
> > SEAMCALL B   -|
> >               |  <- Wait on a kernel waitqueue
> > SEAMCALL B  <-|
> > 
> > SEAMCALL A   <-                 PATH A: Return
> > 
> > SEAMCALL A   -|
> >               |  <- Wake up the waitqueue
> > SEMACALL A  <-| 
> > 
> > SEAMCALL B  ->                  PATH B: Taking the locks
> > ...
> > 
> > Why not this scheme wasn't chosen?
> 
> AFAIK, I don't think a waitqueue approach as ever been discussed publicly.  Intel
> may have considered the idea internally, but I don't recall anything being proposed
> publically (though it's entirely possible I just missed the discussion).
> 
> Anways, I don't think a waitqueue would be a good fit, at least not for S-EPT
> management, which AFAICT is the only scenario where KVM does the arbitrary "retry
> X times and hope things work".  If the contention occurs due to the TDX Module
> taking an S-EPT lock in VM-Enter, then KVM won't get a chance to do the "Wake up
> the waitqueue" action until the next VM-Exit, which IIUC is well after the TDX
> Module drops the S-EPT lock.  In other words, immediately retrying and then punting
> the problem further up the stack in KVM does seem to be the least awful "solution"
> if there's contention.
>

I should put both "waitqueue or spin" in the chart above to prevent misunderstanding.

I agree that S-EPT should be thought and treated differently than others as
any lock change on that path can affect the parallelization and performance. There are
many internal locks for protecting private data structures inside the security
firmware, like locks for TDR, TDCS, TDVPS. PAMT(mostly SEPT-related). Any contention
on these might result in a BUSY.

What I would like to clarify is: it would be better to have a mechanism to make sure a
SEAMCALL can succeed at a certain point (or at least trying to succeed) as the 
magic number would work like a lottery in reality. E.g. the CPU doing retry is running
at a higher freq than the CPU running the execution path which took the TDX inner
locks due to different P states. The retry loop might end much earlier than expectation.
Not even say when the same linux kernel binary with the same pre-determined number 
of retrying loop running on different CPU SKUs with different freqs.

We sometimes do retry in a driver to wait HW states ready is because the clock of a
device might be fixed or predictable. But I am in doubt if retrying loop works in the
case mentioned above.

It still likes a temporary workaround to me and I think we should be quite
careful of it.

> That said, I 100% agree that the arbitrary retry stuff is awful.  The zero-step
> interaction in particular isn't acceptable.
> 
> Intel folks, encountering "TDX_OPERAND_BUSY | TDX_OPERAND_ID_SEPT" on VM-Enter
> needs to be treated as a KVM bug, even if it means teaching KVM to kill the VM
> if a vCPU is on the cusp of triggerring the "pre-determined number" of EPT faults
> mentioned in this snippet:
> 
>   After a pre-determined number of such EPT violations occur on the same instruction,
>   the TDX module starts tracking the GPAs that caused Secure EPT faults and fails
>   further host VMM attempts to enter the TD VCPU unless previously faulting private
>   GPAs are properly mapped in the Secure EPT.
> 
> If the "pre-determined number" is too low to avoid false positives, e.g. if it can
> be tripped by a vCPU spinning while a different vCPU finishes handling a fault,
> then either the behavior of the TDX Module needs to be revisited, or KVM needs to
> stall vCPUs that are approaching the threshold until all outstanding S-EPT faults
> have been serviced.
>

That sharply hits the point. Let's keep this in mind and start from here.

I also saw the AMD SEV-SNP host patches had retry times like (2 * cpu cores).
But I haven't seen any explanation in the code and comment yet, like how it
supposes to be able to work in reality. Would ask this question in the patch
review. I start to feel this seems a common problem that needs to be sorted.

> KVM shouldn't be spuriously zapping private S-EPT entries since the backing memory
> is pinned, which means the only way for a vCPU to truly get stuck faulting on a
> single instruction is if userspace is broken/malicious, in which case userspace
> gets to keep the pieces.


  parent reply	other threads:[~2023-01-19 22:59 UTC|newest]

Thread overview: 221+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-01-12 16:31 [PATCH v11 000/113] KVM TDX basic feature support isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 003/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2023-01-13 12:31   ` Zhi Wang
2023-01-17 16:03     ` Isaku Yamahata
2023-01-17 21:41       ` Huang, Kai
2023-01-16  3:48   ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 005/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs isaku.yamahata
2023-01-17  3:31   ` Binbin Wu
2023-01-12 16:31 ` [PATCH v11 006/113] KVM: TDX: Make TDX VM type supported isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 007/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 008/113] KVM: TDX: Define " isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 009/113] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 010/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 011/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 012/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 013/113] x86/cpu: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2023-01-13 12:47   ` Zhi Wang
2023-01-13 15:21     ` Sean Christopherson
2023-01-14  9:38       ` Zhi Wang
2023-01-12 16:31 ` [PATCH v11 014/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module isaku.yamahata
2023-01-16  4:19   ` Huang, Kai
2023-02-27 21:20     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 015/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 016/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2023-01-19  2:40   ` Huang, Kai
2023-02-27 21:22     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 017/113] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP isaku.yamahata
2023-01-13 12:55   ` Zhi Wang
2023-02-27 21:28     ` Isaku Yamahata
2023-01-16  4:44   ` Huang, Kai
2023-02-27 21:26     ` Isaku Yamahata
2023-02-28 21:57       ` Huang, Kai
2023-03-01  0:40         ` Isaku Yamahata
2023-03-01  0:54           ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 018/113] KVM: TDX: create/destroy VM structure isaku.yamahata
2023-01-13 13:12   ` Zhi Wang
2023-01-13 15:16     ` Sean Christopherson
2023-01-14  9:16       ` Zhi Wang
2023-01-17 15:55         ` Sean Christopherson
2023-01-17 19:44           ` Zhi Wang
2023-01-17 20:56             ` Sean Christopherson
2023-01-17 21:01               ` Sean Christopherson
2023-01-19 11:31                 ` Huang, Kai
2023-01-19 15:37                   ` Sean Christopherson
2023-01-19 20:39                     ` Huang, Kai
2023-01-19 21:36                       ` Sean Christopherson
2023-01-19 23:08                         ` Huang, Kai
2023-01-19 23:11                           ` Sean Christopherson
2023-01-19 23:24                             ` Huang, Kai
2023-01-19 23:25                               ` Huang, Kai
2023-01-19 23:55                         ` Huang, Kai
2023-01-20  0:16                           ` Sean Christopherson
2023-01-20 22:21                             ` David Matlack
2023-01-21  0:12                               ` Sean Christopherson
2023-01-23  1:51                                 ` Huang, Kai
2023-01-23 17:41                                   ` Sean Christopherson
2023-01-26 10:54                                     ` Huang, Kai
2023-01-26 17:28                                       ` Sean Christopherson
2023-01-26 21:18                                         ` Huang, Kai
2023-01-26 21:59                                           ` Sean Christopherson
2023-01-26 22:27                                             ` Huang, Kai
2023-01-30 19:15                                               ` Sean Christopherson
2023-01-19 22:45               ` Zhi Wang [this message]
2023-01-19 22:51                 ` Sean Christopherson
     [not found]   ` <080e0a246e927545718b6f427dfdcdde505a8859.camel@intel.com>
2023-01-19 15:29     ` Sean Christopherson
2023-01-19 20:40       ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 019/113] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2023-01-13 14:58   ` Zhi Wang
2023-01-16 10:04   ` Huang, Kai
2023-02-27 21:32     ` Isaku Yamahata
2023-01-17 12:19   ` Huang, Kai
2023-02-27 21:44     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 020/113] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 021/113] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2023-01-16 10:23   ` Huang, Kai
2023-02-27 21:48     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 022/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 023/113] KVM: TDX: allocate/free TDX vcpu structure isaku.yamahata
2023-01-16 10:46   ` Zhi Wang
2023-02-27 23:49     ` Isaku Yamahata
2023-02-28 17:55       ` Zhi Wang
2023-02-28 20:20         ` Isaku Yamahata
2023-03-01  4:58           ` Zhi Wang
2023-01-19  0:45   ` Huang, Kai
2023-02-28 11:06     ` Isaku Yamahata
2023-02-28 11:52       ` Huang, Kai
2023-02-28 20:18         ` Isaku Yamahata
2023-02-28 21:49           ` Huang, Kai
2023-03-01  0:35             ` Isaku Yamahata
2023-03-01  0:49               ` Huang, Kai
2023-03-03  0:43                 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 024/113] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2023-01-16 16:07   ` Zhi Wang
2023-02-28 11:17     ` Isaku Yamahata
2023-02-28 18:21       ` Zhi Wang
2023-01-19 10:37   ` Huang, Kai
2023-02-28 11:27     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 025/113] KVM: TDX: Use private memory for TDX isaku.yamahata
2023-01-16 10:45   ` Huang, Kai
2023-01-17 16:40     ` Sean Christopherson
2023-01-17 22:52       ` Huang, Kai
2023-01-18  1:16         ` Sean Christopherson
2023-01-12 16:31 ` [PATCH v11 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 030/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2023-01-25  9:24   ` Zhi Wang
2023-01-25 17:22     ` Sean Christopherson
2023-01-26 21:37       ` Huang, Kai
2023-01-26 22:01         ` Sean Christopherson
2023-02-27 21:52           ` Isaku Yamahata
2023-01-27 21:36       ` Zhi Wang
2023-02-27 21:50         ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 031/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2023-01-16 10:54   ` Huang, Kai
2023-02-27 21:53     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 032/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask isaku.yamahata
2023-01-16 10:59   ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 033/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2023-01-16 11:16   ` Huang, Kai
2023-02-27 21:58     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 034/113] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 035/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level isaku.yamahata
2023-01-16 11:29   ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 036/113] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 037/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 038/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 039/113] KVM: x86/mmu: Require TDP MMU for TDX isaku.yamahata
2023-01-19 11:37   ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 040/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 041/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 042/113] KVM: Add flags to struct kvm_gfn_range isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 043/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 044/113] KVM: x86/tdp_mmu: Make handle_changed_spte() return value isaku.yamahata
2023-02-16 16:39   ` Zhi Wang
2023-01-12 16:31 ` [PATCH v11 045/113] KVM: x86/mmu: Make make_spte() aware of shared GPA for MTRR isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 048/113] KVM: x86/mmu: Disallow dirty logging for x86 TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 049/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 050/113] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs isaku.yamahata
2023-01-17  2:40   ` Huang, Kai
2023-02-27 22:00     ` Isaku Yamahata
2023-02-17  8:27   ` Zhi Wang
2023-02-27 22:02     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 051/113] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 052/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 053/113] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 054/113] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 055/113] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range isaku.yamahata
2023-01-17  2:06   ` Huang, Kai
2023-01-17 16:53     ` Sean Christopherson
2023-02-27 22:03       ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 056/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 057/113] KVM: TDX: TDP MMU TDX support isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 058/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2023-01-17  3:11   ` Huang, Kai
2023-02-27 23:30     ` Isaku Yamahata
2023-02-03  6:55   ` Yuan Yao
2023-02-27 22:15     ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 059/113] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 060/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 061/113] KVM: TDX: Create initial guest memory isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 062/113] KVM: TDX: Finalize VM initialization isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 063/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 064/113] KVM: TDX: Add helper assembly function to TDX vcpu isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 065/113] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 066/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 067/113] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 068/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 069/113] KVM: TDX: restore user ret MSRs isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 070/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 071/113] KVM: TDX: complete interrupts after tdexit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 072/113] KVM: TDX: restore debug store when TD exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 073/113] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 074/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 075/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 076/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 077/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 078/113] KVM: TDX: Implement interrupt injection isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 079/113] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 080/113] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 081/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 082/113] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 083/113] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 084/113] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 085/113] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 086/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 087/113] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 088/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 089/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 090/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 091/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 092/113] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 093/113] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 094/113] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 095/113] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 096/113] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 097/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 098/113] KVM: TDX: Handle TDX PV report fatal error hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 099/113] KVM: TDX: Handle TDX PV map_gpa hypercall isaku.yamahata
2023-01-31  1:30   ` Yuan Yao
2023-02-27 22:12     ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 100/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 101/113] KVM: TDX: Silently discard SMI request isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 102/113] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 103/113] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 104/113] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 105/113] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 106/113] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 107/113] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 108/113] KVM: TDX: Ignore setting up mce isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 109/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 110/113] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 111/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2023-01-12 16:33 ` [PATCH v11 112/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2023-01-12 16:33 ` [PATCH v11 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series isaku.yamahata

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230120004544.00003c50@gmail.com \
    --to=zhi.wang.linux@gmail.com \
    --cc=dmatlack@google.com \
    --cc=erdemaktas@google.com \
    --cc=isaku.yamahata@gmail.com \
    --cc=isaku.yamahata@intel.com \
    --cc=kai.huang@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=sagis@google.com \
    --cc=sean.j.christopherson@intel.com \
    --cc=seanjc@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).