From: Sean Christopherson <seanjc@google.com>
To: "Huang, Kai" <kai.huang@intel.com>
Cc: "dmatlack@google.com" <dmatlack@google.com>,
"sean.j.christopherson@intel.com"
<sean.j.christopherson@intel.com>,
"Shahar, Sagi" <sagis@google.com>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"Aktas, Erdem" <erdemaktas@google.com>,
"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
"pbonzini@redhat.com" <pbonzini@redhat.com>,
"zhi.wang.linux@gmail.com" <zhi.wang.linux@gmail.com>,
"isaku.yamahata@gmail.com" <isaku.yamahata@gmail.com>,
"Yamahata, Isaku" <isaku.yamahata@intel.com>
Subject: Re: [PATCH v11 018/113] KVM: TDX: create/destroy VM structure
Date: Mon, 23 Jan 2023 17:41:32 +0000 [thread overview]
Message-ID: <Y87GzHrx8vxZLBEJ@google.com> (raw)
In-Reply-To: <3951e178bc38191074f5cccadc442212ff15c737.camel@intel.com>
On Mon, Jan 23, 2023, Huang, Kai wrote:
> >
> >
> > Intel folks,
> >
> > Do you happen to know exactly what scenario prompted adding the freeze+unfreeze
> > code? Is there something I'm forgetting/missing, or is it possible we can go
> > with a simpler implementation?
>
> It's documented in the "TDX TDP MMU design doc" patch:
>
> +TDX concurrent populating
> +-------------------------
> ......
> +
> +Without freezing the entry, the following race can happen. Suppose two vcpus
> +are faulting on the same GPA and the 2M and 4K level entries aren't populated
> +yet.
> +
> +* vcpu 1: update 2M level EPT entry
> +* vcpu 2: update 4K level EPT entry
> +* vcpu 2: TDX SEAMCALL to update 4K secure EPT entry => error
> +* vcpu 1: TDX SEAMCALL to update 2M secure EPT entry
Ooh, the problem isn't that two SEAMCALLs to the same entry get out of order, it's
that SEAMCALLs operating on child entries can race ahead of the parent. Hrm.
TDX also has the annoying-but-understandable restriction that leafs need to be
removed before parents. A not-yet-relevant complication on that front is that the
TDP MMU's behavior of recursively removing children means we also have to worry
about PRESENT => !PRESENT transitions, e.g. zapping a child because the parent is
being removed can race with a different vCPU try to populate the child (because
the vCPU handling a page fault could have seen the PRESENT parent).
I think there's an opportunity and motivation to improve the TDP MMU as a whole on
this front though. Rather than recursively zap children in handle_removed_pt(),
we can use the RCU callback to queue the page table for removal. Setting the parent
(target page table) !PRESENT and flushing the TLBs ensures that all children are
unreachable, i.e. KVM doesn't need to immediately set children !PRESENT. Unlike
the shadow MMU, which maintains a hash table of shadow pages, once a parent page
table is removed from the TDP MMU, its children are unreachabled.
The RCU callback must run in near-constant time, but that's easy to solve as we
already have a workqueue for zapping page tables, i.e. the RCU callback can simply
add the target page to the zap workqueue. That would also allow for a (very minor)
simplification of other TDP MMU code: tdp_mmu_zap_root() wouldn't needed to zap in
two passes since zapping children of the top-level SPTEs would be deferred to the
workqueue.
Back to TDX, to play nice with the restriction that parents are removed only after
children are removed, I believe KVM can use TDH.MEM.RANGE.BLOCK to make the parent
!PRESENT. That will effectively prune the S-EPT entry and all its children, and
the RCU callback will again ensure all in-flight SEAMCALLs for the children complete
before KVM actually tries to zap the children.
And if we rework zapping page tables, I suspect we can also address David's concern
(and my not-yet-voiced concern) about polluting the TDP MMU code with logic that is
necessary only for S-EPT (freezing SPTEs before populating them). Rather than update
S-EPT _after_ the TDP MMU SPTE, do the S-EPT update first, i.e. invoke the KVM TDX
hook before try_cmpxchg64() (or maybe instead of?). That way KVM TDX can freeze the
to-be-installed SPTE without common TDP MMU needing to be aware of the change.
> ( I guess such material will be more useful in the comment. And perhaps we can
> get rid of the "TDX TDP MMU design doc" patch in this series at least for now as
> probably nobody will look at it :-) )
Please keep the design doc, I'll definitely read it. I'm just chasing too many
things at the moment and haven't given the TDX series a proper review, i.e. haven't
even glanced through all of the patches or even the shortlog.
next prev parent reply other threads:[~2023-01-23 17:41 UTC|newest]
Thread overview: 221+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-01-12 16:31 [PATCH v11 000/113] KVM TDX basic feature support isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 003/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2023-01-13 12:31 ` Zhi Wang
2023-01-17 16:03 ` Isaku Yamahata
2023-01-17 21:41 ` Huang, Kai
2023-01-16 3:48 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 005/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs isaku.yamahata
2023-01-17 3:31 ` Binbin Wu
2023-01-12 16:31 ` [PATCH v11 006/113] KVM: TDX: Make TDX VM type supported isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 007/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 008/113] KVM: TDX: Define " isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 009/113] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 010/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 011/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 012/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 013/113] x86/cpu: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2023-01-13 12:47 ` Zhi Wang
2023-01-13 15:21 ` Sean Christopherson
2023-01-14 9:38 ` Zhi Wang
2023-01-12 16:31 ` [PATCH v11 014/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module isaku.yamahata
2023-01-16 4:19 ` Huang, Kai
2023-02-27 21:20 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 015/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 016/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2023-01-19 2:40 ` Huang, Kai
2023-02-27 21:22 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 017/113] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP isaku.yamahata
2023-01-13 12:55 ` Zhi Wang
2023-02-27 21:28 ` Isaku Yamahata
2023-01-16 4:44 ` Huang, Kai
2023-02-27 21:26 ` Isaku Yamahata
2023-02-28 21:57 ` Huang, Kai
2023-03-01 0:40 ` Isaku Yamahata
2023-03-01 0:54 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 018/113] KVM: TDX: create/destroy VM structure isaku.yamahata
2023-01-13 13:12 ` Zhi Wang
2023-01-13 15:16 ` Sean Christopherson
2023-01-14 9:16 ` Zhi Wang
2023-01-17 15:55 ` Sean Christopherson
2023-01-17 19:44 ` Zhi Wang
2023-01-17 20:56 ` Sean Christopherson
2023-01-17 21:01 ` Sean Christopherson
2023-01-19 11:31 ` Huang, Kai
2023-01-19 15:37 ` Sean Christopherson
2023-01-19 20:39 ` Huang, Kai
2023-01-19 21:36 ` Sean Christopherson
2023-01-19 23:08 ` Huang, Kai
2023-01-19 23:11 ` Sean Christopherson
2023-01-19 23:24 ` Huang, Kai
2023-01-19 23:25 ` Huang, Kai
2023-01-19 23:55 ` Huang, Kai
2023-01-20 0:16 ` Sean Christopherson
2023-01-20 22:21 ` David Matlack
2023-01-21 0:12 ` Sean Christopherson
2023-01-23 1:51 ` Huang, Kai
2023-01-23 17:41 ` Sean Christopherson [this message]
2023-01-26 10:54 ` Huang, Kai
2023-01-26 17:28 ` Sean Christopherson
2023-01-26 21:18 ` Huang, Kai
2023-01-26 21:59 ` Sean Christopherson
2023-01-26 22:27 ` Huang, Kai
2023-01-30 19:15 ` Sean Christopherson
2023-01-19 22:45 ` Zhi Wang
2023-01-19 22:51 ` Sean Christopherson
[not found] ` <080e0a246e927545718b6f427dfdcdde505a8859.camel@intel.com>
2023-01-19 15:29 ` Sean Christopherson
2023-01-19 20:40 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 019/113] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2023-01-13 14:58 ` Zhi Wang
2023-01-16 10:04 ` Huang, Kai
2023-02-27 21:32 ` Isaku Yamahata
2023-01-17 12:19 ` Huang, Kai
2023-02-27 21:44 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 020/113] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 021/113] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2023-01-16 10:23 ` Huang, Kai
2023-02-27 21:48 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 022/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 023/113] KVM: TDX: allocate/free TDX vcpu structure isaku.yamahata
2023-01-16 10:46 ` Zhi Wang
2023-02-27 23:49 ` Isaku Yamahata
2023-02-28 17:55 ` Zhi Wang
2023-02-28 20:20 ` Isaku Yamahata
2023-03-01 4:58 ` Zhi Wang
2023-01-19 0:45 ` Huang, Kai
2023-02-28 11:06 ` Isaku Yamahata
2023-02-28 11:52 ` Huang, Kai
2023-02-28 20:18 ` Isaku Yamahata
2023-02-28 21:49 ` Huang, Kai
2023-03-01 0:35 ` Isaku Yamahata
2023-03-01 0:49 ` Huang, Kai
2023-03-03 0:43 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 024/113] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2023-01-16 16:07 ` Zhi Wang
2023-02-28 11:17 ` Isaku Yamahata
2023-02-28 18:21 ` Zhi Wang
2023-01-19 10:37 ` Huang, Kai
2023-02-28 11:27 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 025/113] KVM: TDX: Use private memory for TDX isaku.yamahata
2023-01-16 10:45 ` Huang, Kai
2023-01-17 16:40 ` Sean Christopherson
2023-01-17 22:52 ` Huang, Kai
2023-01-18 1:16 ` Sean Christopherson
2023-01-12 16:31 ` [PATCH v11 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 030/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2023-01-25 9:24 ` Zhi Wang
2023-01-25 17:22 ` Sean Christopherson
2023-01-26 21:37 ` Huang, Kai
2023-01-26 22:01 ` Sean Christopherson
2023-02-27 21:52 ` Isaku Yamahata
2023-01-27 21:36 ` Zhi Wang
2023-02-27 21:50 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 031/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2023-01-16 10:54 ` Huang, Kai
2023-02-27 21:53 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 032/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask isaku.yamahata
2023-01-16 10:59 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 033/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2023-01-16 11:16 ` Huang, Kai
2023-02-27 21:58 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 034/113] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 035/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level isaku.yamahata
2023-01-16 11:29 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 036/113] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 037/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 038/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 039/113] KVM: x86/mmu: Require TDP MMU for TDX isaku.yamahata
2023-01-19 11:37 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 040/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 041/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 042/113] KVM: Add flags to struct kvm_gfn_range isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 043/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 044/113] KVM: x86/tdp_mmu: Make handle_changed_spte() return value isaku.yamahata
2023-02-16 16:39 ` Zhi Wang
2023-01-12 16:31 ` [PATCH v11 045/113] KVM: x86/mmu: Make make_spte() aware of shared GPA for MTRR isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 048/113] KVM: x86/mmu: Disallow dirty logging for x86 TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 049/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 050/113] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs isaku.yamahata
2023-01-17 2:40 ` Huang, Kai
2023-02-27 22:00 ` Isaku Yamahata
2023-02-17 8:27 ` Zhi Wang
2023-02-27 22:02 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 051/113] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 052/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 053/113] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 054/113] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 055/113] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range isaku.yamahata
2023-01-17 2:06 ` Huang, Kai
2023-01-17 16:53 ` Sean Christopherson
2023-02-27 22:03 ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 056/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 057/113] KVM: TDX: TDP MMU TDX support isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 058/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2023-01-17 3:11 ` Huang, Kai
2023-02-27 23:30 ` Isaku Yamahata
2023-02-03 6:55 ` Yuan Yao
2023-02-27 22:15 ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 059/113] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 060/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 061/113] KVM: TDX: Create initial guest memory isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 062/113] KVM: TDX: Finalize VM initialization isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 063/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 064/113] KVM: TDX: Add helper assembly function to TDX vcpu isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 065/113] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 066/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 067/113] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 068/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 069/113] KVM: TDX: restore user ret MSRs isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 070/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 071/113] KVM: TDX: complete interrupts after tdexit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 072/113] KVM: TDX: restore debug store when TD exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 073/113] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 074/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 075/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 076/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 077/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 078/113] KVM: TDX: Implement interrupt injection isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 079/113] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 080/113] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 081/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 082/113] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 083/113] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 084/113] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 085/113] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 086/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 087/113] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 088/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 089/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 090/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 091/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 092/113] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 093/113] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 094/113] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 095/113] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 096/113] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 097/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 098/113] KVM: TDX: Handle TDX PV report fatal error hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 099/113] KVM: TDX: Handle TDX PV map_gpa hypercall isaku.yamahata
2023-01-31 1:30 ` Yuan Yao
2023-02-27 22:12 ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 100/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 101/113] KVM: TDX: Silently discard SMI request isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 102/113] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 103/113] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 104/113] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 105/113] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 106/113] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 107/113] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 108/113] KVM: TDX: Ignore setting up mce isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 109/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 110/113] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 111/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2023-01-12 16:33 ` [PATCH v11 112/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2023-01-12 16:33 ` [PATCH v11 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series isaku.yamahata
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y87GzHrx8vxZLBEJ@google.com \
--to=seanjc@google.com \
--cc=dmatlack@google.com \
--cc=erdemaktas@google.com \
--cc=isaku.yamahata@gmail.com \
--cc=isaku.yamahata@intel.com \
--cc=kai.huang@intel.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=sagis@google.com \
--cc=sean.j.christopherson@intel.com \
--cc=zhi.wang.linux@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).