kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Zhi Wang <zhi.wang.linux@gmail.com>
To: Isaku Yamahata <isaku.yamahata@gmail.com>
Cc: Zhi Wang <zhi.wang.linux@gmail.com>,
	isaku.yamahata@intel.com, kvm@vger.kernel.org,
	linux-kernel@vger.kernel.org, Paolo Bonzini <pbonzini@redhat.com>,
	erdemaktas@google.com, Sean Christopherson <seanjc@google.com>,
	Sagi Shahar <sagis@google.com>,
	David Matlack <dmatlack@google.com>,
	Sean Christopherson <sean.j.christopherson@intel.com>
Subject: Re: [PATCH v11 024/113] KVM: TDX: Do TDX specific vcpu initialization
Date: Tue, 28 Feb 2023 20:21:17 +0200	[thread overview]
Message-ID: <20230228202117.00001284@intel.com> (raw)
In-Reply-To: <20230228111752.GW4175971@ls.amr.corp.intel.com>

On Tue, 28 Feb 2023 03:17:52 -0800
Isaku Yamahata <isaku.yamahata@gmail.com> wrote:

> On Mon, Jan 16, 2023 at 06:07:19PM +0200,
> Zhi Wang <zhi.wang.linux@gmail.com> wrote:
> 
> > On Thu, 12 Jan 2023 08:31:32 -0800
> > isaku.yamahata@intel.com wrote:
> > 
> > > From: Isaku Yamahata <isaku.yamahata@intel.com>
> > > 
> > > TD guest vcpu need to be configured before ready to run which requests
> > > addtional information from Device model (e.g. qemu), one 64bit value is
> > > passed to vcpu's RCX as an initial value.  Repurpose KVM_MEMORY_ENCRYPT_OP
> > > to vcpu-scope and add new sub-commands KVM_TDX_INIT_VCPU under it for such
> > > additional vcpu configuration.
> > > 
> > 
> > Better add more details for this mystic value to save the review efforts.
> > 
> > For exmaple, refining the above part as:
> > 
> > ----
> > 
> > TD hands-off block(HOB) is used to pass the information from VMM to
> > TD virtual firmware(TDVF). Before KVM calls Intel TDX module to launch
> > TDVF, the address of HOB must be placed in the guest RCX.
> > 
> > Extend KVM_MEMORY_ENCRYPT_OP to vcpu-scope and add new... so that
> > TDH.VP.INIT can take the address of HOB from QEMU and place it in the
> > guest RCX when initializing a TDX vCPU.
> > 
> > ----
> > 
> > The below paragraph seems repeating the end of the first paragraph. Guess
> > it can be refined or removed.
> > 
> > 
> > > Add callback for kvm vCPU-scoped operations of KVM_MEMORY_ENCRYPT_OP and
> > > add a new subcommand, KVM_TDX_INIT_VCPU, for further vcpu initialization.
> > >
> 
> I don't think it's good idea to mention about new terminology HOB and TDVF.
> We can say, VMM can pass one parameter.
> Here is the updated one.
> 
>     TD guest vcpu needs TDX specific initialization before running.  Repurpose
>     KVM_MEMORY_ENCRYPT_OP to vcpu-scope, add a new sub-command
>     KVM_TDX_INIT_VCPU, and implement the callback for it.
>

Based on the experience of reviewing this patch, I think it depends on:

1) If the reviewer needs to understand the meaning of this parameter to review
this patch? If yes, a brief description of what it is (even one sentence) is
much better than "one parameter". If no, better mention the pointer, like
"Refer XXX spec for more details of xxx". (No need to mention chapter
according to Sean's maintainer book).

Direct and informative comment is always helpful for reviewing.

2) If describing this new terminology helps on the reviewing following patches?
If the following patches modify logic around this? If yes, should take this
opportunity to educate the reviewer with brief descriptions. If no, a pointer
is good enough.

> 
> > PS: I am curious if the value of guest RCX on each VCPU will be configured
> > differently? (It seems they are the same according to the code of tdx-qemu)
> > 
> > If yes, then it is just an approach to configure the value (even it is
> > through TDH.VP.XXX). It should be configured in the domain level in KVM. The
> > TDX vCPU creation and initialization can be moved into tdx_vcpu_create()
> > and TDH.VP.INIT can take the value from a per-vm data structure.
> 
> RCX can be set for each VCPUs as ABI (or TDX SEAMCALL API) between VMM and vcpu
> initial value.  It's convention between user space VMM(qemu) and guest
> firmware(TDVF) to pass same RCX value for all vcpu.  So KVM shouldn't enforce
> same RCX value for all vcpus.  KVM should allow user space VMM to set the value
> for each vcpus.
> 

I see. That makes sense then.

> 
> > > Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
> > > Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
> > > ---
> > >  arch/x86/include/asm/kvm-x86-ops.h    |   1 +
> > >  arch/x86/include/asm/kvm_host.h       |   1 +
> > >  arch/x86/include/uapi/asm/kvm.h       |   1 +
> > >  arch/x86/kvm/vmx/main.c               |   9 ++
> > >  arch/x86/kvm/vmx/tdx.c                | 147 +++++++++++++++++++++++++-
> > >  arch/x86/kvm/vmx/tdx.h                |   7 ++
> > >  arch/x86/kvm/vmx/x86_ops.h            |  10 +-
> > >  arch/x86/kvm/x86.c                    |   6 ++
> > >  tools/arch/x86/include/uapi/asm/kvm.h |   1 +
> > >  9 files changed, 178 insertions(+), 5 deletions(-)
> > > 
> > > diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h
> > > index 1a27f3aee982..e3e9b1c2599b 100644
> > > --- a/arch/x86/include/asm/kvm-x86-ops.h
> > > +++ b/arch/x86/include/asm/kvm-x86-ops.h
> > > @@ -123,6 +123,7 @@ KVM_X86_OP(enable_smi_window)
> > >  #endif
> > >  KVM_X86_OP_OPTIONAL(dev_mem_enc_ioctl)
> > >  KVM_X86_OP_OPTIONAL(mem_enc_ioctl)
> > > +KVM_X86_OP_OPTIONAL(vcpu_mem_enc_ioctl)
> > >  KVM_X86_OP_OPTIONAL(mem_enc_register_region)
> > >  KVM_X86_OP_OPTIONAL(mem_enc_unregister_region)
> > >  KVM_X86_OP_OPTIONAL(vm_copy_enc_context_from)
> > > diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
> > > index 30f4ddb18548..35773f925cc5 100644
> > > --- a/arch/x86/include/asm/kvm_host.h
> > > +++ b/arch/x86/include/asm/kvm_host.h
> > > @@ -1698,6 +1698,7 @@ struct kvm_x86_ops {
> > >  
> > >  	int (*dev_mem_enc_ioctl)(void __user *argp);
> > >  	int (*mem_enc_ioctl)(struct kvm *kvm, void __user *argp);
> > > +	int (*vcpu_mem_enc_ioctl)(struct kvm_vcpu *vcpu, void __user *argp);
> > >  	int (*mem_enc_register_region)(struct kvm *kvm, struct kvm_enc_region *argp);
> > >  	int (*mem_enc_unregister_region)(struct kvm *kvm, struct kvm_enc_region *argp);
> > >  	int (*vm_copy_enc_context_from)(struct kvm *kvm, unsigned int source_fd);
> > > diff --git a/arch/x86/include/uapi/asm/kvm.h b/arch/x86/include/uapi/asm/kvm.h
> > > index b8f28d86d4fd..9236c1699c48 100644
> > > --- a/arch/x86/include/uapi/asm/kvm.h
> > > +++ b/arch/x86/include/uapi/asm/kvm.h
> > > @@ -536,6 +536,7 @@ struct kvm_pmu_event_filter {
> > >  enum kvm_tdx_cmd_id {
> > >  	KVM_TDX_CAPABILITIES = 0,
> > >  	KVM_TDX_INIT_VM,
> > > +	KVM_TDX_INIT_VCPU,
> > >  
> > >  	KVM_TDX_CMD_NR_MAX,
> > >  };
> > > diff --git a/arch/x86/kvm/vmx/main.c b/arch/x86/kvm/vmx/main.c
> > > index 59813ca05f36..23b3ffc3fe23 100644
> > > --- a/arch/x86/kvm/vmx/main.c
> > > +++ b/arch/x86/kvm/vmx/main.c
> > > @@ -103,6 +103,14 @@ static int vt_mem_enc_ioctl(struct kvm *kvm, void __user *argp)
> > >  	return tdx_vm_ioctl(kvm, argp);
> > >  }
> > >  
> > > +static int vt_vcpu_mem_enc_ioctl(struct kvm_vcpu *vcpu, void __user *argp)
> > > +{
> > > +	if (!is_td_vcpu(vcpu))
> > > +		return -EINVAL;
> > > +
> > > +	return tdx_vcpu_ioctl(vcpu, argp);
> > > +}
> > > +
> > >  struct kvm_x86_ops vt_x86_ops __initdata = {
> > >  	.name = KBUILD_MODNAME,
> > >  
> > > @@ -249,6 +257,7 @@ struct kvm_x86_ops vt_x86_ops __initdata = {
> > >  
> > >  	.dev_mem_enc_ioctl = tdx_dev_ioctl,
> > >  	.mem_enc_ioctl = vt_mem_enc_ioctl,
> > > +	.vcpu_mem_enc_ioctl = vt_vcpu_mem_enc_ioctl,
> > >  };
> > >  
> > >  struct kvm_x86_init_ops vt_init_ops __initdata = {
> > > diff --git a/arch/x86/kvm/vmx/tdx.c b/arch/x86/kvm/vmx/tdx.c
> > > index 099f0737a5aa..e2f5a07ad4e5 100644
> > > --- a/arch/x86/kvm/vmx/tdx.c
> > > +++ b/arch/x86/kvm/vmx/tdx.c
> > > @@ -49,6 +49,11 @@ static __always_inline hpa_t set_hkid_to_hpa(hpa_t pa, u16 hkid)
> > >  	return pa | ((hpa_t)hkid << boot_cpu_data.x86_phys_bits);
> > >  }
> > >  
> > > +static inline bool is_td_vcpu_created(struct vcpu_tdx *tdx)
> > > +{
> > > +	return tdx->tdvpr_pa;
> > > +}
> > > +
> > >  static inline bool is_td_created(struct kvm_tdx *kvm_tdx)
> > >  {
> > >  	return kvm_tdx->tdr_pa;
> > > @@ -65,6 +70,11 @@ static inline bool is_hkid_assigned(struct kvm_tdx *kvm_tdx)
> > >  	return kvm_tdx->hkid > 0;
> > >  }
> > >  
> > > +static inline bool is_td_finalized(struct kvm_tdx *kvm_tdx)
> > > +{
> > > +	return kvm_tdx->finalized;
> > > +}
> > > +
> > >  static void tdx_clear_page(unsigned long page_pa)
> > >  {
> > >  	const void *zero_page = (const void *) __va(page_to_phys(ZERO_PAGE(0)));
> > > @@ -327,7 +337,21 @@ int tdx_vcpu_create(struct kvm_vcpu *vcpu)
> > >  
> > >  void tdx_vcpu_free(struct kvm_vcpu *vcpu)
> > >  {
> > > -	/* This is stub for now.  More logic will come. */
> > > +	struct vcpu_tdx *tdx = to_tdx(vcpu);
> > > +	int i;
> > > +
> > > +	/* Can't reclaim or free pages if teardown failed. */
> > > +	if (is_hkid_assigned(to_kvm_tdx(vcpu->kvm)))
> > > +		return;
> > > +
> > 
> > Should we have an WARN_ON_ONCE here?
> 
> No.  In normal case, it can come with hkid already reclaimed.
> 
> 
> > > +	if (tdx->tdvpx_pa) {
> > > +		for (i = 0; i < tdx_caps.tdvpx_nr_pages; i++)
> > > +			tdx_reclaim_td_page(tdx->tdvpx_pa[i]);
> > > +		kfree(tdx->tdvpx_pa);
> > > +		tdx->tdvpx_pa = NULL;
> > > +	}
> > > +	tdx_reclaim_td_page(tdx->tdvpr_pa);
> > > +	tdx->tdvpr_pa = 0;
> > >  }
> > >  
> > >  void tdx_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event)
> > > @@ -337,6 +361,8 @@ void tdx_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event)
> > >  	/* TDX doesn't support INIT event. */
> > >  	if (WARN_ON_ONCE(init_event))
> > >  		goto td_bugged;
> > > +	if (WARN_ON_ONCE(is_td_vcpu_created(to_tdx(vcpu))))
> > > +		goto td_bugged;
> > >  
> > >  	/* TDX rquires X2APIC. */
> > >  	apic_base_msr.data = APIC_DEFAULT_PHYS_BASE | LAPIC_MODE_X2APIC;
> > > @@ -791,6 +817,125 @@ int tdx_vm_ioctl(struct kvm *kvm, void __user *argp)
> > >  	return r;
> > >  }
> > >  
> > > +static int tdx_td_vcpu_init(struct kvm_vcpu *vcpu, u64 vcpu_rcx)
> > > +{
> > > +	struct kvm_tdx *kvm_tdx = to_kvm_tdx(vcpu->kvm);
> > > +	struct vcpu_tdx *tdx = to_tdx(vcpu);
> > > +	unsigned long *tdvpx_pa = NULL;
> > > +	unsigned long tdvpr_pa;
> > > +	unsigned long va;
> > > +	int ret, i;
> > > +	u64 err;
> > > +
> > > +	if (is_td_vcpu_created(tdx))
> > > +		return -EINVAL;
> > > +
> > > +	va = __get_free_page(GFP_KERNEL_ACCOUNT);
> > > +	if (!va)
> > > +		return -ENOMEM;
> > > +	tdvpr_pa = __pa(va);
> > > +
> > > +	tdvpx_pa = kcalloc(tdx_caps.tdvpx_nr_pages, sizeof(*tdx->tdvpx_pa),
> > > +			   GFP_KERNEL_ACCOUNT | __GFP_ZERO);
> > > +	if (!tdvpx_pa) {
> > > +		ret = -ENOMEM;
> > > +		goto free_tdvpr;
> > > +	}
> > > +	for (i = 0; i < tdx_caps.tdvpx_nr_pages; i++) {
> > > +		va = __get_free_page(GFP_KERNEL_ACCOUNT);
> > > +		if (!va)
> > > +			goto free_tdvpx;
> > > +		tdvpx_pa[i] = __pa(va);
> > > +	}
> > > +
> > > +	err = tdh_vp_create(kvm_tdx->tdr_pa, tdvpr_pa);
> > > +	if (WARN_ON_ONCE(err)) {
> > > +		ret = -EIO;
> > > +		pr_tdx_error(TDH_VP_CREATE, err, NULL);
> > > +		goto td_bugged_free_tdvpx;
> > > +	}
> > > +	tdx->tdvpr_pa = tdvpr_pa;
> > > +
> > > +	tdx->tdvpx_pa = tdvpx_pa;
> > > +	for (i = 0; i < tdx_caps.tdvpx_nr_pages; i++) {
> > > +		err = tdh_vp_addcx(tdx->tdvpr_pa, tdvpx_pa[i]);
> > > +		if (WARN_ON_ONCE(err)) {
> > > +			ret = -EIO;
> > > +			pr_tdx_error(TDH_VP_ADDCX, err, NULL);
> > > +			for (; i < tdx_caps.tdvpx_nr_pages; i++) {
> > > +				free_page((unsigned long)__va(tdvpx_pa[i]));
> > > +				tdvpx_pa[i] = 0;
> > > +			}
> > > +			goto td_bugged;
> > > +		}
> > > +	}
> > > +
> > > +	err = tdh_vp_init(tdx->tdvpr_pa, vcpu_rcx);
> > > +	if (WARN_ON_ONCE(err)) {
> > > +		ret = -EIO;
> > > +		pr_tdx_error(TDH_VP_INIT, err, NULL);
> > > +		goto td_bugged;
> > > +	}
> > > +
> > > +	vcpu->arch.mp_state = KVM_MP_STATE_RUNNABLE;
> > > +
> > > +	return 0;
> > > +
> > > +td_bugged_free_tdvpx:
> > > +	for (i = 0; i < tdx_caps.tdvpx_nr_pages; i++) {
> > > +		free_page((unsigned long)__va(tdvpx_pa[i]));
> > > +		tdvpx_pa[i] = 0;
> > > +	}
> > > +	kfree(tdvpx_pa);
> > > +td_bugged:
> > > +	vcpu->kvm->vm_bugged = true;
> > > +	return ret;
> > > +
> > > +free_tdvpx:
> > > +	for (i = 0; i < tdx_caps.tdvpx_nr_pages; i++)
> > > +		if (tdvpx_pa[i])
> > > +			free_page((unsigned long)__va(tdvpx_pa[i]));
> > > +	kfree(tdvpx_pa);
> > > +	tdx->tdvpx_pa = NULL;
> > > +free_tdvpr:
> > > +	if (tdvpr_pa)
> > > +		free_page((unsigned long)__va(tdvpr_pa));
> > > +	tdx->tdvpr_pa = 0;
> > > +
> > > +	return ret;
> > > +}
> > 
> > Same comments with using vm_bugged in the previous patch.
> 
> I converted it to KVM_BUG_ON().


  reply	other threads:[~2023-02-28 18:21 UTC|newest]

Thread overview: 221+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-01-12 16:31 [PATCH v11 000/113] KVM TDX basic feature support isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 003/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2023-01-13 12:31   ` Zhi Wang
2023-01-17 16:03     ` Isaku Yamahata
2023-01-17 21:41       ` Huang, Kai
2023-01-16  3:48   ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 005/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs isaku.yamahata
2023-01-17  3:31   ` Binbin Wu
2023-01-12 16:31 ` [PATCH v11 006/113] KVM: TDX: Make TDX VM type supported isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 007/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 008/113] KVM: TDX: Define " isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 009/113] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 010/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 011/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 012/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 013/113] x86/cpu: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2023-01-13 12:47   ` Zhi Wang
2023-01-13 15:21     ` Sean Christopherson
2023-01-14  9:38       ` Zhi Wang
2023-01-12 16:31 ` [PATCH v11 014/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module isaku.yamahata
2023-01-16  4:19   ` Huang, Kai
2023-02-27 21:20     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 015/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 016/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2023-01-19  2:40   ` Huang, Kai
2023-02-27 21:22     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 017/113] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP isaku.yamahata
2023-01-13 12:55   ` Zhi Wang
2023-02-27 21:28     ` Isaku Yamahata
2023-01-16  4:44   ` Huang, Kai
2023-02-27 21:26     ` Isaku Yamahata
2023-02-28 21:57       ` Huang, Kai
2023-03-01  0:40         ` Isaku Yamahata
2023-03-01  0:54           ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 018/113] KVM: TDX: create/destroy VM structure isaku.yamahata
2023-01-13 13:12   ` Zhi Wang
2023-01-13 15:16     ` Sean Christopherson
2023-01-14  9:16       ` Zhi Wang
2023-01-17 15:55         ` Sean Christopherson
2023-01-17 19:44           ` Zhi Wang
2023-01-17 20:56             ` Sean Christopherson
2023-01-17 21:01               ` Sean Christopherson
2023-01-19 11:31                 ` Huang, Kai
2023-01-19 15:37                   ` Sean Christopherson
2023-01-19 20:39                     ` Huang, Kai
2023-01-19 21:36                       ` Sean Christopherson
2023-01-19 23:08                         ` Huang, Kai
2023-01-19 23:11                           ` Sean Christopherson
2023-01-19 23:24                             ` Huang, Kai
2023-01-19 23:25                               ` Huang, Kai
2023-01-19 23:55                         ` Huang, Kai
2023-01-20  0:16                           ` Sean Christopherson
2023-01-20 22:21                             ` David Matlack
2023-01-21  0:12                               ` Sean Christopherson
2023-01-23  1:51                                 ` Huang, Kai
2023-01-23 17:41                                   ` Sean Christopherson
2023-01-26 10:54                                     ` Huang, Kai
2023-01-26 17:28                                       ` Sean Christopherson
2023-01-26 21:18                                         ` Huang, Kai
2023-01-26 21:59                                           ` Sean Christopherson
2023-01-26 22:27                                             ` Huang, Kai
2023-01-30 19:15                                               ` Sean Christopherson
2023-01-19 22:45               ` Zhi Wang
2023-01-19 22:51                 ` Sean Christopherson
     [not found]   ` <080e0a246e927545718b6f427dfdcdde505a8859.camel@intel.com>
2023-01-19 15:29     ` Sean Christopherson
2023-01-19 20:40       ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 019/113] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2023-01-13 14:58   ` Zhi Wang
2023-01-16 10:04   ` Huang, Kai
2023-02-27 21:32     ` Isaku Yamahata
2023-01-17 12:19   ` Huang, Kai
2023-02-27 21:44     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 020/113] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 021/113] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2023-01-16 10:23   ` Huang, Kai
2023-02-27 21:48     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 022/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 023/113] KVM: TDX: allocate/free TDX vcpu structure isaku.yamahata
2023-01-16 10:46   ` Zhi Wang
2023-02-27 23:49     ` Isaku Yamahata
2023-02-28 17:55       ` Zhi Wang
2023-02-28 20:20         ` Isaku Yamahata
2023-03-01  4:58           ` Zhi Wang
2023-01-19  0:45   ` Huang, Kai
2023-02-28 11:06     ` Isaku Yamahata
2023-02-28 11:52       ` Huang, Kai
2023-02-28 20:18         ` Isaku Yamahata
2023-02-28 21:49           ` Huang, Kai
2023-03-01  0:35             ` Isaku Yamahata
2023-03-01  0:49               ` Huang, Kai
2023-03-03  0:43                 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 024/113] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2023-01-16 16:07   ` Zhi Wang
2023-02-28 11:17     ` Isaku Yamahata
2023-02-28 18:21       ` Zhi Wang [this message]
2023-01-19 10:37   ` Huang, Kai
2023-02-28 11:27     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 025/113] KVM: TDX: Use private memory for TDX isaku.yamahata
2023-01-16 10:45   ` Huang, Kai
2023-01-17 16:40     ` Sean Christopherson
2023-01-17 22:52       ` Huang, Kai
2023-01-18  1:16         ` Sean Christopherson
2023-01-12 16:31 ` [PATCH v11 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 030/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2023-01-25  9:24   ` Zhi Wang
2023-01-25 17:22     ` Sean Christopherson
2023-01-26 21:37       ` Huang, Kai
2023-01-26 22:01         ` Sean Christopherson
2023-02-27 21:52           ` Isaku Yamahata
2023-01-27 21:36       ` Zhi Wang
2023-02-27 21:50         ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 031/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2023-01-16 10:54   ` Huang, Kai
2023-02-27 21:53     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 032/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask isaku.yamahata
2023-01-16 10:59   ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 033/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2023-01-16 11:16   ` Huang, Kai
2023-02-27 21:58     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 034/113] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 035/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level isaku.yamahata
2023-01-16 11:29   ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 036/113] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 037/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 038/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 039/113] KVM: x86/mmu: Require TDP MMU for TDX isaku.yamahata
2023-01-19 11:37   ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 040/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 041/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 042/113] KVM: Add flags to struct kvm_gfn_range isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 043/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 044/113] KVM: x86/tdp_mmu: Make handle_changed_spte() return value isaku.yamahata
2023-02-16 16:39   ` Zhi Wang
2023-01-12 16:31 ` [PATCH v11 045/113] KVM: x86/mmu: Make make_spte() aware of shared GPA for MTRR isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 048/113] KVM: x86/mmu: Disallow dirty logging for x86 TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 049/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 050/113] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs isaku.yamahata
2023-01-17  2:40   ` Huang, Kai
2023-02-27 22:00     ` Isaku Yamahata
2023-02-17  8:27   ` Zhi Wang
2023-02-27 22:02     ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 051/113] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 052/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 053/113] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 054/113] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 055/113] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range isaku.yamahata
2023-01-17  2:06   ` Huang, Kai
2023-01-17 16:53     ` Sean Christopherson
2023-02-27 22:03       ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 056/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 057/113] KVM: TDX: TDP MMU TDX support isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 058/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2023-01-17  3:11   ` Huang, Kai
2023-02-27 23:30     ` Isaku Yamahata
2023-02-03  6:55   ` Yuan Yao
2023-02-27 22:15     ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 059/113] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 060/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 061/113] KVM: TDX: Create initial guest memory isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 062/113] KVM: TDX: Finalize VM initialization isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 063/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 064/113] KVM: TDX: Add helper assembly function to TDX vcpu isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 065/113] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 066/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 067/113] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 068/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 069/113] KVM: TDX: restore user ret MSRs isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 070/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 071/113] KVM: TDX: complete interrupts after tdexit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 072/113] KVM: TDX: restore debug store when TD exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 073/113] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 074/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 075/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 076/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 077/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 078/113] KVM: TDX: Implement interrupt injection isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 079/113] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 080/113] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 081/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 082/113] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 083/113] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 084/113] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 085/113] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 086/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 087/113] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 088/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 089/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 090/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 091/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 092/113] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 093/113] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 094/113] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 095/113] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 096/113] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 097/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 098/113] KVM: TDX: Handle TDX PV report fatal error hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 099/113] KVM: TDX: Handle TDX PV map_gpa hypercall isaku.yamahata
2023-01-31  1:30   ` Yuan Yao
2023-02-27 22:12     ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 100/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 101/113] KVM: TDX: Silently discard SMI request isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 102/113] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 103/113] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 104/113] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 105/113] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 106/113] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 107/113] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 108/113] KVM: TDX: Ignore setting up mce isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 109/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 110/113] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 111/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2023-01-12 16:33 ` [PATCH v11 112/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2023-01-12 16:33 ` [PATCH v11 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series isaku.yamahata

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230228202117.00001284@intel.com \
    --to=zhi.wang.linux@gmail.com \
    --cc=dmatlack@google.com \
    --cc=erdemaktas@google.com \
    --cc=isaku.yamahata@gmail.com \
    --cc=isaku.yamahata@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=sagis@google.com \
    --cc=sean.j.christopherson@intel.com \
    --cc=seanjc@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).