From: Sean Christopherson <seanjc@google.com>
To: "Huang, Kai" <kai.huang@intel.com>
Cc: "dmatlack@google.com" <dmatlack@google.com>,
"isaku.yamahata@gmail.com" <isaku.yamahata@gmail.com>,
"Shahar, Sagi" <sagis@google.com>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"Aktas, Erdem" <erdemaktas@google.com>,
"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
"sean.j.christopherson@intel.com"
<sean.j.christopherson@intel.com>,
"zhi.wang.linux@gmail.com" <zhi.wang.linux@gmail.com>,
"pbonzini@redhat.com" <pbonzini@redhat.com>,
"Yamahata, Isaku" <isaku.yamahata@intel.com>
Subject: Re: [PATCH v11 018/113] KVM: TDX: create/destroy VM structure
Date: Thu, 26 Jan 2023 17:28:18 +0000 [thread overview]
Message-ID: <Y9K4Mnx/Je4j+RsD@google.com> (raw)
In-Reply-To: <e5912f7d04ce7a27a68ce4328fc50ce594295c6c.camel@intel.com>
On Thu, Jan 26, 2023, Huang, Kai wrote:
> On Mon, 2023-01-23 at 17:41 +0000, Sean Christopherson wrote:
> > I think there's an opportunity and motivation to improve the TDP MMU as a whole on
> > this front though. Rather than recursively zap children in handle_removed_pt(),
> > we can use the RCU callback to queue the page table for removal. Setting the parent
> > (target page table) !PRESENT and flushing the TLBs ensures that all children are
> > unreachable, i.e. KVM doesn't need to immediately set children !PRESENT. Unlike
> > the shadow MMU, which maintains a hash table of shadow pages, once a parent page
> > table is removed from the TDP MMU, its children are unreachabled.
>
> Do you mean something like (pseudo):
>
> rcu_callback(&removed_sp->rcu_head, handle_removed_pt);
Yep.
> > The RCU callback must run in near-constant time, but that's easy to solve as we
> > already have a workqueue for zapping page tables, i.e. the RCU callback can simply
> > add the target page to the zap workqueue. That would also allow for a (very minor)
> > simplification of other TDP MMU code: tdp_mmu_zap_root() wouldn't needed to zap in
> > two passes since zapping children of the top-level SPTEs would be deferred to the
> > workqueue.
>
> Do you mean zapping the entire page table (from root) doesn't need to be in RCU
> read-critical section, but can/should be done after grace period? I think this
> makes sense since zapping entire root must happen when root is already invalid,
> which cannot be used anymore when the new faults come in?
Yes, minus the "from root" restriction. When a page table (call it "branch" to
continue the analogy) PTE has been zapped/blocked ("pruned"), KVM just needs to
wait for all potential readers to go away. That guarantee is provided by RCU;
software walkers, i.e. KVM itself, are required to hold RCU, and hardware walkers,
i.e. vCPUs running in the guest, are protected by proxy as the zapper ("arborist"?)
is required to hold RCU until all running vCPUs have been kicked.
In other words, once the PTE is zapped/blocked (branch is pruned), it's completely
removed from the paging tree and no other tasks can access the branch (page table
and its children). I.e. the only remaining reference to the branch is the pointer
handed to the RCU callback. That means the RCU callback has exclusive access to the
branch, i.e. can operate as if it were holding mmu_lock for write. Furthermore, the
RCU callback also doesn't need to flush TLBs because that was again done when
pruning the branch.
It's the same idea that KVM already uses for root SPs, the only difference is how
KVM determines that there is exactly one entity that holds a reference to the SP.
> > Back to TDX, to play nice with the restriction that parents are removed only after
> > children are removed, I believe KVM can use TDH.MEM.RANGE.BLOCK to make the parent
> > !PRESENT. That will effectively prune the S-EPT entry and all its children, and
> > the RCU callback will again ensure all in-flight SEAMCALLs for the children complete
> > before KVM actually tries to zap the children.
>
> Reading the spec, it seems TDH.MEM.RANGE.BLOCK only sets the Secure EPT entry
> which points to the entire range as "blocked", but won't go down until leaf to
> mark all EPT entries as "blocked", which makes sense anyway.
>
> But it seems TDH.MEM.PAGE.REMOVE and TDH.MEM.SEPT.REMOVE both only checks
> whether that target EPT entry is "blocked", but doesn't check whether any parent
> has been marked as "blocked". Not sure whether this will be a problem. But
> anyway if this is a problem, we perhaps can get TDX module to fix.
Oh, I didn't mean to suggest KVM skip TDH.MEM.RANGE.BLOCK for children, I simply
forgot that all S-EPT entries need to be blocked before they can be removed.
> > And if we rework zapping page tables, I suspect we can also address David's concern
> > (and my not-yet-voiced concern) about polluting the TDP MMU code with logic that is
> > necessary only for S-EPT (freezing SPTEs before populating them). Rather than update
> > S-EPT _after_ the TDP MMU SPTE, do the S-EPT update first, i.e. invoke the KVM TDX
> > hook before try_cmpxchg64() (or maybe instead of?). That way KVM TDX can freeze the
> > to-be-installed SPTE without common TDP MMU needing to be aware of the change.
>
> I don't quite understand how putting SEAMCALL before the try_cmpxchg64() can
> work. Let's say one thread is populating a mapping and another is zapping it.
> The populating thread makes SEAMCALL successfully but then try_cmpxchg64()
> fails, in this case how to proceed?
Ah, sorry, that was unclear. By "invoke the KVM TDX hook" I didn't mean "do the
SEAMCALL", I meant KVM TDX could do its own manipulation of the KVM-managed SPTEs
before the common/standard flow. E.g. something like:
if (kvm_x86_ops.set_private_spte && private)
r = static_call(kvm_x86_set_private_spte(...)
else
r = try_cmpxchg64(...) ? 0 : -EBUSY;
so that the common code doesn't need to do, or even be aware of, the freezing.
Then I think we just need another hook in handle_removed_pt(), or maybe in what
is currently __kvm_tdp_mmu_write_spte()?
I.e. fully replace the "write" operations in the TDP MMU instead of trying to
smush S-EPT's requirements into the common path.
next prev parent reply other threads:[~2023-01-26 17:28 UTC|newest]
Thread overview: 221+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-01-12 16:31 [PATCH v11 000/113] KVM TDX basic feature support isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 003/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2023-01-13 12:31 ` Zhi Wang
2023-01-17 16:03 ` Isaku Yamahata
2023-01-17 21:41 ` Huang, Kai
2023-01-16 3:48 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 005/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs isaku.yamahata
2023-01-17 3:31 ` Binbin Wu
2023-01-12 16:31 ` [PATCH v11 006/113] KVM: TDX: Make TDX VM type supported isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 007/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 008/113] KVM: TDX: Define " isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 009/113] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 010/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 011/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 012/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 013/113] x86/cpu: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2023-01-13 12:47 ` Zhi Wang
2023-01-13 15:21 ` Sean Christopherson
2023-01-14 9:38 ` Zhi Wang
2023-01-12 16:31 ` [PATCH v11 014/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module isaku.yamahata
2023-01-16 4:19 ` Huang, Kai
2023-02-27 21:20 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 015/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 016/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2023-01-19 2:40 ` Huang, Kai
2023-02-27 21:22 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 017/113] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP isaku.yamahata
2023-01-13 12:55 ` Zhi Wang
2023-02-27 21:28 ` Isaku Yamahata
2023-01-16 4:44 ` Huang, Kai
2023-02-27 21:26 ` Isaku Yamahata
2023-02-28 21:57 ` Huang, Kai
2023-03-01 0:40 ` Isaku Yamahata
2023-03-01 0:54 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 018/113] KVM: TDX: create/destroy VM structure isaku.yamahata
2023-01-13 13:12 ` Zhi Wang
2023-01-13 15:16 ` Sean Christopherson
2023-01-14 9:16 ` Zhi Wang
2023-01-17 15:55 ` Sean Christopherson
2023-01-17 19:44 ` Zhi Wang
2023-01-17 20:56 ` Sean Christopherson
2023-01-17 21:01 ` Sean Christopherson
2023-01-19 11:31 ` Huang, Kai
2023-01-19 15:37 ` Sean Christopherson
2023-01-19 20:39 ` Huang, Kai
2023-01-19 21:36 ` Sean Christopherson
2023-01-19 23:08 ` Huang, Kai
2023-01-19 23:11 ` Sean Christopherson
2023-01-19 23:24 ` Huang, Kai
2023-01-19 23:25 ` Huang, Kai
2023-01-19 23:55 ` Huang, Kai
2023-01-20 0:16 ` Sean Christopherson
2023-01-20 22:21 ` David Matlack
2023-01-21 0:12 ` Sean Christopherson
2023-01-23 1:51 ` Huang, Kai
2023-01-23 17:41 ` Sean Christopherson
2023-01-26 10:54 ` Huang, Kai
2023-01-26 17:28 ` Sean Christopherson [this message]
2023-01-26 21:18 ` Huang, Kai
2023-01-26 21:59 ` Sean Christopherson
2023-01-26 22:27 ` Huang, Kai
2023-01-30 19:15 ` Sean Christopherson
2023-01-19 22:45 ` Zhi Wang
2023-01-19 22:51 ` Sean Christopherson
[not found] ` <080e0a246e927545718b6f427dfdcdde505a8859.camel@intel.com>
2023-01-19 15:29 ` Sean Christopherson
2023-01-19 20:40 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 019/113] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2023-01-13 14:58 ` Zhi Wang
2023-01-16 10:04 ` Huang, Kai
2023-02-27 21:32 ` Isaku Yamahata
2023-01-17 12:19 ` Huang, Kai
2023-02-27 21:44 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 020/113] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 021/113] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2023-01-16 10:23 ` Huang, Kai
2023-02-27 21:48 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 022/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 023/113] KVM: TDX: allocate/free TDX vcpu structure isaku.yamahata
2023-01-16 10:46 ` Zhi Wang
2023-02-27 23:49 ` Isaku Yamahata
2023-02-28 17:55 ` Zhi Wang
2023-02-28 20:20 ` Isaku Yamahata
2023-03-01 4:58 ` Zhi Wang
2023-01-19 0:45 ` Huang, Kai
2023-02-28 11:06 ` Isaku Yamahata
2023-02-28 11:52 ` Huang, Kai
2023-02-28 20:18 ` Isaku Yamahata
2023-02-28 21:49 ` Huang, Kai
2023-03-01 0:35 ` Isaku Yamahata
2023-03-01 0:49 ` Huang, Kai
2023-03-03 0:43 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 024/113] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2023-01-16 16:07 ` Zhi Wang
2023-02-28 11:17 ` Isaku Yamahata
2023-02-28 18:21 ` Zhi Wang
2023-01-19 10:37 ` Huang, Kai
2023-02-28 11:27 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 025/113] KVM: TDX: Use private memory for TDX isaku.yamahata
2023-01-16 10:45 ` Huang, Kai
2023-01-17 16:40 ` Sean Christopherson
2023-01-17 22:52 ` Huang, Kai
2023-01-18 1:16 ` Sean Christopherson
2023-01-12 16:31 ` [PATCH v11 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 030/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2023-01-25 9:24 ` Zhi Wang
2023-01-25 17:22 ` Sean Christopherson
2023-01-26 21:37 ` Huang, Kai
2023-01-26 22:01 ` Sean Christopherson
2023-02-27 21:52 ` Isaku Yamahata
2023-01-27 21:36 ` Zhi Wang
2023-02-27 21:50 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 031/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2023-01-16 10:54 ` Huang, Kai
2023-02-27 21:53 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 032/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask isaku.yamahata
2023-01-16 10:59 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 033/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2023-01-16 11:16 ` Huang, Kai
2023-02-27 21:58 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 034/113] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 035/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level isaku.yamahata
2023-01-16 11:29 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 036/113] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 037/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 038/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 039/113] KVM: x86/mmu: Require TDP MMU for TDX isaku.yamahata
2023-01-19 11:37 ` Huang, Kai
2023-01-12 16:31 ` [PATCH v11 040/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 041/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 042/113] KVM: Add flags to struct kvm_gfn_range isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 043/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 044/113] KVM: x86/tdp_mmu: Make handle_changed_spte() return value isaku.yamahata
2023-02-16 16:39 ` Zhi Wang
2023-01-12 16:31 ` [PATCH v11 045/113] KVM: x86/mmu: Make make_spte() aware of shared GPA for MTRR isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 048/113] KVM: x86/mmu: Disallow dirty logging for x86 TDX isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 049/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest isaku.yamahata
2023-01-12 16:31 ` [PATCH v11 050/113] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs isaku.yamahata
2023-01-17 2:40 ` Huang, Kai
2023-02-27 22:00 ` Isaku Yamahata
2023-02-17 8:27 ` Zhi Wang
2023-02-27 22:02 ` Isaku Yamahata
2023-01-12 16:31 ` [PATCH v11 051/113] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 052/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 053/113] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 054/113] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 055/113] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range isaku.yamahata
2023-01-17 2:06 ` Huang, Kai
2023-01-17 16:53 ` Sean Christopherson
2023-02-27 22:03 ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 056/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 057/113] KVM: TDX: TDP MMU TDX support isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 058/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2023-01-17 3:11 ` Huang, Kai
2023-02-27 23:30 ` Isaku Yamahata
2023-02-03 6:55 ` Yuan Yao
2023-02-27 22:15 ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 059/113] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 060/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 061/113] KVM: TDX: Create initial guest memory isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 062/113] KVM: TDX: Finalize VM initialization isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 063/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 064/113] KVM: TDX: Add helper assembly function to TDX vcpu isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 065/113] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 066/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 067/113] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 068/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 069/113] KVM: TDX: restore user ret MSRs isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 070/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 071/113] KVM: TDX: complete interrupts after tdexit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 072/113] KVM: TDX: restore debug store when TD exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 073/113] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 074/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 075/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 076/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 077/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 078/113] KVM: TDX: Implement interrupt injection isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 079/113] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 080/113] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 081/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 082/113] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 083/113] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 084/113] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 085/113] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 086/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 087/113] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 088/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 089/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 090/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 091/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 092/113] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 093/113] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 094/113] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 095/113] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 096/113] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 097/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 098/113] KVM: TDX: Handle TDX PV report fatal error hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 099/113] KVM: TDX: Handle TDX PV map_gpa hypercall isaku.yamahata
2023-01-31 1:30 ` Yuan Yao
2023-02-27 22:12 ` Isaku Yamahata
2023-01-12 16:32 ` [PATCH v11 100/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 101/113] KVM: TDX: Silently discard SMI request isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 102/113] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 103/113] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 104/113] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 105/113] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 106/113] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 107/113] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 108/113] KVM: TDX: Ignore setting up mce isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 109/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 110/113] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2023-01-12 16:32 ` [PATCH v11 111/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2023-01-12 16:33 ` [PATCH v11 112/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2023-01-12 16:33 ` [PATCH v11 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series isaku.yamahata
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y9K4Mnx/Je4j+RsD@google.com \
--to=seanjc@google.com \
--cc=dmatlack@google.com \
--cc=erdemaktas@google.com \
--cc=isaku.yamahata@gmail.com \
--cc=isaku.yamahata@intel.com \
--cc=kai.huang@intel.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=sagis@google.com \
--cc=sean.j.christopherson@intel.com \
--cc=zhi.wang.linux@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).