public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Zhi Wang <zhi.wang.linux@gmail.com>
To: isaku.yamahata@intel.com
Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org,
	isaku.yamahata@gmail.com, Paolo Bonzini <pbonzini@redhat.com>,
	erdemaktas@google.com, Sean Christopherson <seanjc@google.com>,
	Sagi Shahar <sagis@google.com>,
	David Matlack <dmatlack@google.com>,
	Kai Huang <kai.huang@intel.com>,
	Sean Christopherson <sean.j.christopherson@intel.com>,
	Xiaoyao Li <xiaoyao.li@intel.com>,
	Michael Roth <michael.roth@amd.com>
Subject: Re: [PATCH v12 5/6] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
Date: Tue, 11 Apr 2023 13:09:11 +0300	[thread overview]
Message-ID: <20230411130911.000070ed.zhi.wang.linux@gmail.com> (raw)
In-Reply-To: <fa6b8135913c7ad7c616da1dba162c860c246dfb.1677632938.git.isaku.yamahata@intel.com>

On Tue, 28 Feb 2023 17:19:15 -0800
isaku.yamahata@intel.com wrote:

> From: Sean Christopherson <sean.j.christopherson@intel.com>
> 
> Unlike default VMs, confidential VMs (Intel TDX and AMD SEV-ES) don't allow
> some operations (e.g., memory read/write, register state access, etc).
> 
> Introduce vm_type to track the type of the VM to x86 KVM.  Other arch KVMs
> already use vm_type, KVM_INIT_VM accepts vm_type, and x86 KVM callback
> vm_init accepts vm_type.  So follow them.  Further, a different policy can
> be made based on vm_type.  Define KVM_X86_DEFAULT_VM for default VM as
> default and define KVM_X86_TDX_VM for Intel TDX VM.  The wrapper function
> will be defined as "bool is_td(kvm) { return vm_type == VM_TYPE_TDX; }"
> 

Where is the KVM_X86_TDX_VM? It seems the comments are out of date. I guess
KVM_X86_PROTECTED_VM means a generic CC VM now, not specifically to SNP
or TDX.

Is it possible to have an additional vendor (TDX/SNP) VM type besides
KVM_X86_PROTECTED_VM? Although QEMU knows if SEV driver is existing or not
in a system by checking "/dev/sev", the only way it can know if KVM supports
SNP is to check KVM_X86_PROTECTED_VM through the KVM_CAP_VM_TYPES. For TDX,
QEMU only sees KVM_X86_PROTECTED_VM is set and !SEV_DRIVER. This doesn't
seems very clear to QEMU.

Is it better to split the bits in vm_type into two parts of bit fields: a.
generic part: (KVM_X86_{DEFAULT,PROTECTED}_VM). b. vendor part:
KVM_X86_{TDX,SNP}_PROTECTED_VM?

The KVM can still use KVM_X86_PROTECTED_VM in the code flow to deal with non-
vendor specific matter.

When QEMU queries the KVM_CAP_VM_TYPES, besides checking the vm_type in kvm_x86_is_vm_type_supported, KVM also let the vendor callback to set the
KVM_X86_{TDX,SNP}_PROTECTED_VM in the vendor part. Then QEMU would receive a
cap return value with (KVM_X86_PROTECTED_VM | KVM_X86_{TDX,SNP}_PROTECTED_VM)
and immediately know which bunch of the ioctls {TDX/SNP} are available in KVM.

> Add a capability KVM_CAP_VM_TYPES to effectively allow device model,
> e.g. qemu, to query what VM types are supported by KVM.  This (introduce a
> new capability and add vm_type) is chosen to align with other arch KVMs
> that have VM types already.  Other arch KVMs use different names to query
> supported vm types and there is no common name for it, so new name was
> chosen.
> 
> Co-developed-by: Xiaoyao Li <xiaoyao.li@intel.com>
> Signed-off-by: Xiaoyao Li <xiaoyao.li@intel.com>
> Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
> Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
> Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
> ---
>  Documentation/virt/kvm/api.rst        | 4 +++-
>  arch/x86/include/asm/kvm-x86-ops.h    | 1 +
>  arch/x86/include/asm/kvm_host.h       | 1 +
>  arch/x86/kvm/svm/svm.c                | 7 +++++++
>  arch/x86/kvm/vmx/main.c               | 1 +
>  arch/x86/kvm/vmx/vmx.c                | 5 +++++
>  arch/x86/kvm/vmx/x86_ops.h            | 1 +
>  arch/x86/kvm/x86.c                    | 8 +++++++-
>  arch/x86/kvm/x86.h                    | 2 ++
>  tools/arch/x86/include/uapi/asm/kvm.h | 3 +++
>  tools/include/uapi/linux/kvm.h        | 1 +
>  11 files changed, 32 insertions(+), 2 deletions(-)
> 
> diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst
> index 191aabc3af8c..fbff5cd6e404 100644
> --- a/Documentation/virt/kvm/api.rst
> +++ b/Documentation/virt/kvm/api.rst
> @@ -150,7 +150,9 @@ You probably want to use 0 as machine type.
>  X86:
>  ^^^^
>  
> -Supported X86 VM types can be queried via KVM_CAP_VM_TYPES.
> +Supported X86 VM types can be queried via KVM_CAP_VM_TYPES, which returns the
> +bitmap of supported vm types. The 1-setting of bit @n means vm type with value
> +@n is supported.
>  
>  S390:
>  ^^^^^
> diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h
> index 8dc345cc6318..eac4b65d1b01 100644
> --- a/arch/x86/include/asm/kvm-x86-ops.h
> +++ b/arch/x86/include/asm/kvm-x86-ops.h
> @@ -20,6 +20,7 @@ KVM_X86_OP(hardware_disable)
>  KVM_X86_OP(hardware_unsetup)
>  KVM_X86_OP(has_emulated_msr)
>  KVM_X86_OP(vcpu_after_set_cpuid)
> +KVM_X86_OP(is_vm_type_supported)
>  KVM_X86_OP(vm_init)
>  KVM_X86_OP_OPTIONAL(vm_destroy)
>  KVM_X86_OP_OPTIONAL_RET0(vcpu_precreate)
> diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
> index 8344945dece3..ffb85c35cacc 100644
> --- a/arch/x86/include/asm/kvm_host.h
> +++ b/arch/x86/include/asm/kvm_host.h
> @@ -1546,6 +1546,7 @@ struct kvm_x86_ops {
>  	bool (*has_emulated_msr)(struct kvm *kvm, u32 index);
>  	void (*vcpu_after_set_cpuid)(struct kvm_vcpu *vcpu);
>  
> +	bool (*is_vm_type_supported)(unsigned long vm_type);
>  	unsigned int vm_size;
>  	int (*vm_init)(struct kvm *kvm);
>  	void (*vm_destroy)(struct kvm *kvm);
> diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c
> index 8ed7e177e73d..d0b01956e420 100644
> --- a/arch/x86/kvm/svm/svm.c
> +++ b/arch/x86/kvm/svm/svm.c
> @@ -4682,6 +4682,12 @@ static void svm_vm_destroy(struct kvm *kvm)
>  	sev_vm_destroy(kvm);
>  }
>  
> +static bool svm_is_vm_type_supported(unsigned long type)
> +{
> +	/* FIXME: Check if CPU is capable of SEV. */
> +	return __kvm_is_vm_type_supported(type);
> +}
> +
>  static int svm_vm_init(struct kvm *kvm)
>  {
>  	if (!pause_filter_count || !pause_filter_thresh)
> @@ -4710,6 +4716,7 @@ static struct kvm_x86_ops svm_x86_ops __initdata = {
>  	.vcpu_free = svm_vcpu_free,
>  	.vcpu_reset = svm_vcpu_reset,
>  
> +	.is_vm_type_supported = svm_is_vm_type_supported,
>  	.vm_size = sizeof(struct kvm_svm),
>  	.vm_init = svm_vm_init,
>  	.vm_destroy = svm_vm_destroy,
> diff --git a/arch/x86/kvm/vmx/main.c b/arch/x86/kvm/vmx/main.c
> index d21a7c7d18ea..e1bbe06517b7 100644
> --- a/arch/x86/kvm/vmx/main.c
> +++ b/arch/x86/kvm/vmx/main.c
> @@ -45,6 +45,7 @@ struct kvm_x86_ops vt_x86_ops __initdata = {
>  	.hardware_disable = vmx_hardware_disable,
>  	.has_emulated_msr = vmx_has_emulated_msr,
>  
> +	.is_vm_type_supported = vmx_is_vm_type_supported,
>  	.vm_size = sizeof(struct kvm_vmx),
>  	.vm_init = vmx_vm_init,
>  	.vm_destroy = vmx_vm_destroy,
> diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
> index bddbdd2988f4..5bfdfc6f2190 100644
> --- a/arch/x86/kvm/vmx/vmx.c
> +++ b/arch/x86/kvm/vmx/vmx.c
> @@ -7470,6 +7470,11 @@ int vmx_vcpu_create(struct kvm_vcpu *vcpu)
>  	return err;
>  }
>  
> +bool vmx_is_vm_type_supported(unsigned long type)
> +{
> +	return type == KVM_X86_DEFAULT_VM;
> +}
> +
>  #define L1TF_MSG_SMT "L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.\n"
>  #define L1TF_MSG_L1D "L1TF CPU bug present and virtualization mitigation disabled, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.\n"
>  
> diff --git a/arch/x86/kvm/vmx/x86_ops.h b/arch/x86/kvm/vmx/x86_ops.h
> index 0f200aead411..e4dae9842550 100644
> --- a/arch/x86/kvm/vmx/x86_ops.h
> +++ b/arch/x86/kvm/vmx/x86_ops.h
> @@ -32,6 +32,7 @@ void vmx_hardware_unsetup(void);
>  int vmx_check_processor_compat(void);
>  int vmx_hardware_enable(void);
>  void vmx_hardware_disable(void);
> +bool vmx_is_vm_type_supported(unsigned long type);
>  int vmx_vm_init(struct kvm *kvm);
>  void vmx_vm_destroy(struct kvm *kvm);
>  int vmx_vcpu_precreate(struct kvm *kvm);
> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> index 45330273bad6..589844a27349 100644
> --- a/arch/x86/kvm/x86.c
> +++ b/arch/x86/kvm/x86.c
> @@ -4352,12 +4352,18 @@ static int kvm_ioctl_get_supported_hv_cpuid(struct kvm_vcpu *vcpu,
>  	return 0;
>  }
>  
> -static bool kvm_is_vm_type_supported(unsigned long type)
> +bool __kvm_is_vm_type_supported(unsigned long type)
>  {
>  	return type == KVM_X86_DEFAULT_VM ||
>  	       (type == KVM_X86_PROTECTED_VM &&
>  	        IS_ENABLED(CONFIG_KVM_PROTECTED_VM) && tdp_enabled);
>  }
> +EXPORT_SYMBOL_GPL(__kvm_is_vm_type_supported);
> +
> +static bool kvm_is_vm_type_supported(unsigned long type)
> +{
> +	return static_call(kvm_x86_is_vm_type_supported)(type);
> +}
>  
>  int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
>  {
> diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h
> index 9de72586f406..888f34224bba 100644
> --- a/arch/x86/kvm/x86.h
> +++ b/arch/x86/kvm/x86.h
> @@ -8,6 +8,8 @@
>  #include "kvm_cache_regs.h"
>  #include "kvm_emulate.h"
>  
> +bool __kvm_is_vm_type_supported(unsigned long type);
> +
>  struct kvm_caps {
>  	/* control of guest tsc rate supported? */
>  	bool has_tsc_control;
> diff --git a/tools/arch/x86/include/uapi/asm/kvm.h b/tools/arch/x86/include/uapi/asm/kvm.h
> index e48deab8901d..53ce363ba5fe 100644
> --- a/tools/arch/x86/include/uapi/asm/kvm.h
> +++ b/tools/arch/x86/include/uapi/asm/kvm.h
> @@ -529,4 +529,7 @@ struct kvm_pmu_event_filter {
>  #define KVM_VCPU_TSC_CTRL 0 /* control group for the timestamp counter (TSC) */
>  #define   KVM_VCPU_TSC_OFFSET 0 /* attribute for the TSC offset */
>  
> +#define KVM_X86_DEFAULT_VM	0
> +#define KVM_X86_PROTECTED_VM	1
> +
>  #endif /* _ASM_X86_KVM_H */
> diff --git a/tools/include/uapi/linux/kvm.h b/tools/include/uapi/linux/kvm.h
> index 55155e262646..63474f72ea34 100644
> --- a/tools/include/uapi/linux/kvm.h
> +++ b/tools/include/uapi/linux/kvm.h
> @@ -1175,6 +1175,7 @@ struct kvm_ppc_resize_hpt {
>  #define KVM_CAP_DIRTY_LOG_RING_ACQ_REL 223
>  #define KVM_CAP_S390_PROTECTED_ASYNC_DISABLE 224
>  #define KVM_CAP_DIRTY_LOG_RING_WITH_BITMAP 225
> +#define KVM_CAP_VM_TYPES 227
>  
>  #ifdef KVM_CAP_IRQ_ROUTING
>  


  reply	other threads:[~2023-04-11 10:09 UTC|newest]

Thread overview: 120+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-02-27  8:21 [PATCH v12 000/106] KVM TDX basic feature support isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 001/106] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 002/106] KVM: TDX: Define " isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 003/106] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 004/106] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 005/106] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 006/106] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 007/106] x86/cpu: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 008/106] x86/virt/tdx: Add a helper function to return system wide info about TDX module isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 009/106] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 010/106] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 011/106] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 012/106] KVM: x86/vmx, tdx: Allow VMX, TDX to override KVM_ENABLE_CAP isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 013/106] KVM: TDX: create/destroy VM structure isaku.yamahata
2023-03-01  7:24   ` Chenyi Qiang
2023-03-02  1:11     ` Isaku Yamahata
2023-02-27  8:22 ` [PATCH v12 014/106] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 015/106] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 016/106] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 017/106] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 018/106] KVM: TDX: allocate/free TDX vcpu structure isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 019/106] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 020/106] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 021/106] KVM: x86/mmu: introduce config for PRIVATE KVM MMU isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 022/106] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 023/106] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 024/106] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 025/106] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 026/106] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 027/106] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 028/106] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 029/106] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 030/106] KVM: x86/mmu: Allow per-VM override of the TDP max page level isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 031/106] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 032/106] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 033/106] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 034/106] KVM: x86/mmu: Require TDP MMU and mmio caching for TDX isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 035/106] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 036/106] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 037/106] KVM: Add flags to struct kvm_gfn_range isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 038/106] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 039/106] KVM: x86/tdp_mmu: Sprinkle __must_check isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 040/106] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 041/106] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 042/106] KVM: x86/mmu: Disallow dirty logging for x86 TDX isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 043/106] KVM: x86/mmu: TDX: Do not enable page track for TD guest isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 044/106] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 045/106] KVM: VMX: Move setting of EPT MMU masks to common VT-x code isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 046/106] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 047/106] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 048/106] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 049/106] KVM: TDX: TDP MMU TDX support isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 050/106] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2023-03-09  9:03   ` Chenyi Qiang
2023-03-10 21:18     ` Isaku Yamahata
2023-02-27  8:22 ` [PATCH v12 051/106] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 052/106] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 053/106] KVM: TDX: Create initial guest memory isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 054/106] KVM: TDX: Finalize VM initialization isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 055/106] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 056/106] KVM: TDX: Add helper assembly function to TDX vcpu isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 057/106] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 058/106] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 059/106] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2023-02-27  8:22 ` [PATCH v12 060/106] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 061/106] KVM: TDX: restore user ret MSRs isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 062/106] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 063/106] KVM: TDX: complete interrupts after tdexit isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 064/106] KVM: TDX: restore debug store when TD exit isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 065/106] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 066/106] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 067/106] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 068/106] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 069/106] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 070/106] KVM: TDX: Implement interrupt injection isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 071/106] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 072/106] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 073/106] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 074/106] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 075/106] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 076/106] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 077/106] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 078/106] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 079/106] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 080/106] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 081/106] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 082/106] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 083/106] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 084/106] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 085/106] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 086/106] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 087/106] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 088/106] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 089/106] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 090/106] KVM: TDX: Handle TDX PV report fatal error hypercall isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 091/106] KVM: TDX: Handle TDX PV map_gpa hypercall isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 092/106] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 093/106] KVM: TDX: Silently discard SMI request isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 094/106] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 095/106] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 096/106] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 097/106] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 098/106] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 099/106] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 100/106] KVM: TDX: Ignore setting up mce isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 101/106] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 102/106] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 103/106] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 104/106] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 105/106] RFC: KVM: TDX: Make busy with S-EPT on entry bug isaku.yamahata
2023-02-27  8:23 ` [PATCH v12 106/106] [MARKER] the end of (the first phase of) TDX KVM patch series isaku.yamahata
2023-02-28  8:03 ` [PATCH v12 000/106] KVM TDX basic feature support Xiaoyao Li
2023-03-01  0:45   ` Isaku Yamahata
2023-03-01  1:19     ` [PATCH v12 1/6] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2023-03-01  1:19       ` [PATCH v12 2/6] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2023-03-01  1:19       ` [PATCH v12 3/6] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2023-03-01  1:19       ` [PATCH v12 4/6] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2023-03-01  1:19       ` [PATCH v12 5/6] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs isaku.yamahata
2023-04-11 10:09         ` Zhi Wang [this message]
2023-03-01  1:19       ` [PATCH v12 6/6] KVM: TDX: Make TDX VM type supported isaku.yamahata

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230411130911.000070ed.zhi.wang.linux@gmail.com \
    --to=zhi.wang.linux@gmail.com \
    --cc=dmatlack@google.com \
    --cc=erdemaktas@google.com \
    --cc=isaku.yamahata@gmail.com \
    --cc=isaku.yamahata@intel.com \
    --cc=kai.huang@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=michael.roth@amd.com \
    --cc=pbonzini@redhat.com \
    --cc=sagis@google.com \
    --cc=sean.j.christopherson@intel.com \
    --cc=seanjc@google.com \
    --cc=xiaoyao.li@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox