linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: isaku.yamahata@intel.com
To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org
Cc: isaku.yamahata@intel.com, isaku.yamahata@gmail.com,
	Paolo Bonzini <pbonzini@redhat.com>,
	erdemaktas@google.com, Sean Christopherson <seanjc@google.com>,
	Sagi Shahar <sagis@google.com>, Kai Huang <kai.huang@intel.com>,
	chen.bo@intel.com, hang.yuan@intel.com, tina.zhang@intel.com
Subject: [PATCH v19 062/130] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
Date: Mon, 26 Feb 2024 00:26:04 -0800	[thread overview]
Message-ID: <fc97847d04f2b469d8f4cfceee84c7ef055ab1ac.1708933498.git.isaku.yamahata@intel.com> (raw)
In-Reply-To: <cover.1708933498.git.isaku.yamahata@intel.com>

From: Isaku Yamahata <isaku.yamahata@intel.com>

Allocate protected page table for private page table, and add hooks to
operate on protected page table.  This patch adds allocation/free of
protected page tables and hooks.  When calling hooks to update SPTE entry,
freeze the entry, call hooks and unfreeze the entry to allow concurrent
updates on page tables.  Which is the advantage of TDP MMU.  As
kvm_gfn_shared_mask() returns false always, those hooks aren't called yet
with this patch.

When the faulting GPA is private, the KVM fault is called private.  When
resolving private KVM fault, allocate protected page table and call hooks
to operate on protected page table. On the change of the private PTE entry,
invoke kvm_x86_ops hook in __handle_changed_spte() to propagate the change
to protected page table. The following depicts the relationship.

  private KVM page fault   |
      |                    |
      V                    |
 private GPA               |     CPU protected EPTP
      |                    |           |
      V                    |           V
 private PT root           |     protected PT root
      |                    |           |
      V                    |           V
   private PT --hook to propagate-->protected PT
      |                    |           |
      \--------------------+------\    |
                           |      |    |
                           |      V    V
                           |    private guest page
                           |
                           |
     non-encrypted memory  |    encrypted memory
                           |
PT: page table

The existing KVM TDP MMU code uses atomic update of SPTE.  On populating
the EPT entry, atomically set the entry.  However, it requires TLB
shootdown to zap SPTE.  To address it, the entry is frozen with the special
SPTE value that clears the present bit. After the TLB shootdown, the entry
is set to the eventual value (unfreeze).

For protected page table, hooks are called to update protected page table
in addition to direct access to the private SPTE. For the zapping case, it
works to freeze the SPTE. It can call hooks in addition to TLB shootdown.
For populating the private SPTE entry, there can be a race condition
without further protection

  vcpu 1: populating 2M private SPTE
  vcpu 2: populating 4K private SPTE
  vcpu 2: TDX SEAMCALL to update 4K protected SPTE => error
  vcpu 1: TDX SEAMCALL to update 2M protected SPTE

To avoid the race, the frozen SPTE is utilized.  Instead of atomic update
of the private entry, freeze the entry, call the hook that update protected
SPTE, set the entry to the final value.

Support 4K page only at this stage.  2M page support can be done in future
patches.

Co-developed-by: Kai Huang <kai.huang@intel.com>
Signed-off-by: Kai Huang <kai.huang@intel.com>
Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>

---
v19:
- drop CONFIG_KVM_MMU_PRIVATE

v18:
- Rename freezed => frozen

v14 -> v15:
- Refined is_private condition check in kvm_tdp_mmu_map().
  Add kvm_gfn_shared_mask() check.
- catch up for struct kvm_range change

Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
---
 arch/x86/include/asm/kvm-x86-ops.h |   5 +
 arch/x86/include/asm/kvm_host.h    |  11 ++
 arch/x86/kvm/mmu/mmu.c             |  17 +-
 arch/x86/kvm/mmu/mmu_internal.h    |  13 +-
 arch/x86/kvm/mmu/tdp_iter.h        |   2 +-
 arch/x86/kvm/mmu/tdp_mmu.c         | 308 +++++++++++++++++++++++++----
 arch/x86/kvm/mmu/tdp_mmu.h         |   2 +-
 virt/kvm/kvm_main.c                |   1 +
 8 files changed, 320 insertions(+), 39 deletions(-)

diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h
index a8e96804a252..e1c75f8c1b25 100644
--- a/arch/x86/include/asm/kvm-x86-ops.h
+++ b/arch/x86/include/asm/kvm-x86-ops.h
@@ -101,6 +101,11 @@ KVM_X86_OP_OPTIONAL_RET0(set_tss_addr)
 KVM_X86_OP_OPTIONAL_RET0(set_identity_map_addr)
 KVM_X86_OP_OPTIONAL_RET0(get_mt_mask)
 KVM_X86_OP(load_mmu_pgd)
+KVM_X86_OP_OPTIONAL(link_private_spt)
+KVM_X86_OP_OPTIONAL(free_private_spt)
+KVM_X86_OP_OPTIONAL(set_private_spte)
+KVM_X86_OP_OPTIONAL(remove_private_spte)
+KVM_X86_OP_OPTIONAL(zap_private_spte)
 KVM_X86_OP(has_wbinvd_exit)
 KVM_X86_OP(get_l2_tsc_offset)
 KVM_X86_OP(get_l2_tsc_multiplier)
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index efd3fda1c177..bc0767c884f7 100644
--- a/arch/x86/include/asm/kvm_host.h
+++ b/arch/x86/include/asm/kvm_host.h
@@ -468,6 +468,7 @@ struct kvm_mmu {
 	int (*sync_spte)(struct kvm_vcpu *vcpu,
 			 struct kvm_mmu_page *sp, int i);
 	struct kvm_mmu_root_info root;
+	hpa_t private_root_hpa;
 	union kvm_cpu_role cpu_role;
 	union kvm_mmu_page_role root_role;
 
@@ -1740,6 +1741,16 @@ struct kvm_x86_ops {
 	void (*load_mmu_pgd)(struct kvm_vcpu *vcpu, hpa_t root_hpa,
 			     int root_level);
 
+	int (*link_private_spt)(struct kvm *kvm, gfn_t gfn, enum pg_level level,
+				void *private_spt);
+	int (*free_private_spt)(struct kvm *kvm, gfn_t gfn, enum pg_level level,
+				void *private_spt);
+	int (*set_private_spte)(struct kvm *kvm, gfn_t gfn, enum pg_level level,
+				 kvm_pfn_t pfn);
+	int (*remove_private_spte)(struct kvm *kvm, gfn_t gfn, enum pg_level level,
+				    kvm_pfn_t pfn);
+	int (*zap_private_spte)(struct kvm *kvm, gfn_t gfn, enum pg_level level);
+
 	bool (*has_wbinvd_exit)(void);
 
 	u64 (*get_l2_tsc_offset)(struct kvm_vcpu *vcpu);
diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c
index 30c86e858ae4..0e0321ad9ca2 100644
--- a/arch/x86/kvm/mmu/mmu.c
+++ b/arch/x86/kvm/mmu/mmu.c
@@ -3717,7 +3717,12 @@ static int mmu_alloc_direct_roots(struct kvm_vcpu *vcpu)
 		goto out_unlock;
 
 	if (tdp_mmu_enabled) {
-		root = kvm_tdp_mmu_get_vcpu_root_hpa(vcpu);
+		if (kvm_gfn_shared_mask(vcpu->kvm) &&
+		    !VALID_PAGE(mmu->private_root_hpa)) {
+			root = kvm_tdp_mmu_get_vcpu_root_hpa(vcpu, true);
+			mmu->private_root_hpa = root;
+		}
+		root = kvm_tdp_mmu_get_vcpu_root_hpa(vcpu, false);
 		mmu->root.hpa = root;
 	} else if (shadow_root_level >= PT64_ROOT_4LEVEL) {
 		root = mmu_alloc_root(vcpu, 0, 0, shadow_root_level);
@@ -4627,7 +4632,7 @@ int kvm_tdp_page_fault(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault)
 	if (kvm_mmu_honors_guest_mtrrs(vcpu->kvm)) {
 		for ( ; fault->max_level > PG_LEVEL_4K; --fault->max_level) {
 			int page_num = KVM_PAGES_PER_HPAGE(fault->max_level);
-			gfn_t base = gfn_round_for_level(fault->gfn,
+			gfn_t base = gfn_round_for_level(gpa_to_gfn(fault->addr),
 							 fault->max_level);
 
 			if (kvm_mtrr_check_gfn_range_consistency(vcpu, base, page_num))
@@ -4662,6 +4667,7 @@ int kvm_mmu_map_tdp_page(struct kvm_vcpu *vcpu, gpa_t gpa, u64 error_code,
 	};
 
 	WARN_ON_ONCE(!vcpu->arch.mmu->root_role.direct);
+	fault.gfn = gpa_to_gfn(fault.addr) & ~kvm_gfn_shared_mask(vcpu->kvm);
 	fault.slot = kvm_vcpu_gfn_to_memslot(vcpu, fault.gfn);
 
 	r = mmu_topup_memory_caches(vcpu, false);
@@ -6166,6 +6172,7 @@ static int __kvm_mmu_create(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu)
 
 	mmu->root.hpa = INVALID_PAGE;
 	mmu->root.pgd = 0;
+	mmu->private_root_hpa = INVALID_PAGE;
 	for (i = 0; i < KVM_MMU_NUM_PREV_ROOTS; i++)
 		mmu->prev_roots[i] = KVM_MMU_ROOT_INFO_INVALID;
 
@@ -7211,6 +7218,12 @@ int kvm_mmu_vendor_module_init(void)
 void kvm_mmu_destroy(struct kvm_vcpu *vcpu)
 {
 	kvm_mmu_unload(vcpu);
+	if (tdp_mmu_enabled) {
+		write_lock(&vcpu->kvm->mmu_lock);
+		mmu_free_root_page(vcpu->kvm, &vcpu->arch.mmu->private_root_hpa,
+				NULL);
+		write_unlock(&vcpu->kvm->mmu_lock);
+	}
 	free_mmu_pages(&vcpu->arch.root_mmu);
 	free_mmu_pages(&vcpu->arch.guest_mmu);
 	mmu_free_memory_caches(vcpu);
diff --git a/arch/x86/kvm/mmu/mmu_internal.h b/arch/x86/kvm/mmu/mmu_internal.h
index 002f3f80bf3b..9e2c7c6d85bf 100644
--- a/arch/x86/kvm/mmu/mmu_internal.h
+++ b/arch/x86/kvm/mmu/mmu_internal.h
@@ -6,6 +6,8 @@
 #include <linux/kvm_host.h>
 #include <asm/kvm_host.h>
 
+#include "mmu.h"
+
 #ifdef CONFIG_KVM_PROVE_MMU
 #define KVM_MMU_WARN_ON(x) WARN_ON_ONCE(x)
 #else
@@ -205,6 +207,15 @@ static inline void kvm_mmu_free_private_spt(struct kvm_mmu_page *sp)
 		free_page((unsigned long)sp->private_spt);
 }
 
+static inline gfn_t kvm_gfn_for_root(struct kvm *kvm, struct kvm_mmu_page *root,
+				     gfn_t gfn)
+{
+	if (is_private_sp(root))
+		return kvm_gfn_to_private(kvm, gfn);
+	else
+		return kvm_gfn_to_shared(kvm, gfn);
+}
+
 static inline bool kvm_mmu_page_ad_need_write_protect(struct kvm_mmu_page *sp)
 {
 	/*
@@ -363,7 +374,7 @@ static inline int kvm_mmu_do_page_fault(struct kvm_vcpu *vcpu, gpa_t cr2_or_gpa,
 	int r;
 
 	if (vcpu->arch.mmu->root_role.direct) {
-		fault.gfn = fault.addr >> PAGE_SHIFT;
+		fault.gfn = gpa_to_gfn(fault.addr) & ~kvm_gfn_shared_mask(vcpu->kvm);
 		fault.slot = kvm_vcpu_gfn_to_memslot(vcpu, fault.gfn);
 	}
 
diff --git a/arch/x86/kvm/mmu/tdp_iter.h b/arch/x86/kvm/mmu/tdp_iter.h
index e1e40e3f5eb7..a9c9cd0db20a 100644
--- a/arch/x86/kvm/mmu/tdp_iter.h
+++ b/arch/x86/kvm/mmu/tdp_iter.h
@@ -91,7 +91,7 @@ struct tdp_iter {
 	tdp_ptep_t pt_path[PT64_ROOT_MAX_LEVEL];
 	/* A pointer to the current SPTE */
 	tdp_ptep_t sptep;
-	/* The lowest GFN mapped by the current SPTE */
+	/* The lowest GFN (shared bits included) mapped by the current SPTE */
 	gfn_t gfn;
 	/* The level of the root page given to the iterator */
 	int root_level;
diff --git a/arch/x86/kvm/mmu/tdp_mmu.c b/arch/x86/kvm/mmu/tdp_mmu.c
index a90907b31c54..1a0e4baa8311 100644
--- a/arch/x86/kvm/mmu/tdp_mmu.c
+++ b/arch/x86/kvm/mmu/tdp_mmu.c
@@ -187,6 +187,9 @@ static struct kvm_mmu_page *tdp_mmu_alloc_sp(struct kvm_vcpu *vcpu,
 	sp->spt = kvm_mmu_memory_cache_alloc(&vcpu->arch.mmu_shadow_page_cache);
 	sp->role = role;
 
+	if (kvm_mmu_page_role_is_private(role))
+		kvm_mmu_alloc_private_spt(vcpu, sp);
+
 	return sp;
 }
 
@@ -209,7 +212,8 @@ static void tdp_mmu_init_sp(struct kvm_mmu_page *sp, tdp_ptep_t sptep,
 	trace_kvm_mmu_get_page(sp, true);
 }
 
-hpa_t kvm_tdp_mmu_get_vcpu_root_hpa(struct kvm_vcpu *vcpu)
+static struct kvm_mmu_page *kvm_tdp_mmu_get_vcpu_root(struct kvm_vcpu *vcpu,
+						      bool private)
 {
 	union kvm_mmu_page_role role = vcpu->arch.mmu->root_role;
 	struct kvm *kvm = vcpu->kvm;
@@ -221,6 +225,8 @@ hpa_t kvm_tdp_mmu_get_vcpu_root_hpa(struct kvm_vcpu *vcpu)
 	 * Check for an existing root before allocating a new one.  Note, the
 	 * role check prevents consuming an invalid root.
 	 */
+	if (private)
+		kvm_mmu_page_role_set_private(&role);
 	for_each_tdp_mmu_root(kvm, root, kvm_mmu_role_as_id(role)) {
 		if (root->role.word == role.word &&
 		    kvm_tdp_mmu_get_root(root))
@@ -244,12 +250,17 @@ hpa_t kvm_tdp_mmu_get_vcpu_root_hpa(struct kvm_vcpu *vcpu)
 	spin_unlock(&kvm->arch.tdp_mmu_pages_lock);
 
 out:
-	return __pa(root->spt);
+	return root;
+}
+
+hpa_t kvm_tdp_mmu_get_vcpu_root_hpa(struct kvm_vcpu *vcpu, bool private)
+{
+	return __pa(kvm_tdp_mmu_get_vcpu_root(vcpu, private)->spt);
 }
 
 static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn,
-				u64 old_spte, u64 new_spte, int level,
-				bool shared);
+				u64 old_spte, u64 new_spte,
+				union kvm_mmu_page_role role, bool shared);
 
 static void tdp_account_mmu_page(struct kvm *kvm, struct kvm_mmu_page *sp)
 {
@@ -376,12 +387,78 @@ static void handle_removed_pt(struct kvm *kvm, tdp_ptep_t pt, bool shared)
 							  REMOVED_SPTE, level);
 		}
 		handle_changed_spte(kvm, kvm_mmu_page_as_id(sp), gfn,
-				    old_spte, REMOVED_SPTE, level, shared);
+				    old_spte, REMOVED_SPTE, sp->role,
+				    shared);
+	}
+
+	if (is_private_sp(sp) &&
+	    WARN_ON(static_call(kvm_x86_free_private_spt)(kvm, sp->gfn, sp->role.level,
+							  kvm_mmu_private_spt(sp)))) {
+		/*
+		 * Failed to unlink Secure EPT page and there is nothing to do
+		 * further.  Intentionally leak the page to prevent the kernel
+		 * from accessing the encrypted page.
+		 */
+		kvm_mmu_init_private_spt(sp, NULL);
 	}
 
 	call_rcu(&sp->rcu_head, tdp_mmu_free_sp_rcu_callback);
 }
 
+static void *get_private_spt(gfn_t gfn, u64 new_spte, int level)
+{
+	if (is_shadow_present_pte(new_spte) && !is_last_spte(new_spte, level)) {
+		struct kvm_mmu_page *sp = to_shadow_page(pfn_to_hpa(spte_to_pfn(new_spte)));
+		void *private_spt = kvm_mmu_private_spt(sp);
+
+		WARN_ON_ONCE(!private_spt);
+		WARN_ON_ONCE(sp->role.level + 1 != level);
+		WARN_ON_ONCE(sp->gfn != gfn);
+		return private_spt;
+	}
+
+	return NULL;
+}
+
+static void handle_removed_private_spte(struct kvm *kvm, gfn_t gfn,
+					u64 old_spte, u64 new_spte,
+					int level)
+{
+	bool was_present = is_shadow_present_pte(old_spte);
+	bool is_present = is_shadow_present_pte(new_spte);
+	bool was_leaf = was_present && is_last_spte(old_spte, level);
+	bool is_leaf = is_present && is_last_spte(new_spte, level);
+	kvm_pfn_t old_pfn = spte_to_pfn(old_spte);
+	kvm_pfn_t new_pfn = spte_to_pfn(new_spte);
+	int ret;
+
+	/* Ignore change of software only bits. e.g. host_writable */
+	if (was_leaf == is_leaf && was_present == is_present)
+		return;
+
+	/*
+	 * Allow only leaf page to be zapped.  Reclaim Non-leaf page tables at
+	 * destroying VM.
+	 */
+	WARN_ON_ONCE(is_present);
+	if (!was_leaf)
+		return;
+
+	/* non-present -> non-present doesn't make sense. */
+	KVM_BUG_ON(!was_present, kvm);
+	KVM_BUG_ON(new_pfn, kvm);
+
+	/* Zapping leaf spte is allowed only when write lock is held. */
+	lockdep_assert_held_write(&kvm->mmu_lock);
+	ret = static_call(kvm_x86_zap_private_spte)(kvm, gfn, level);
+	/* Because write lock is held, operation should success. */
+	if (KVM_BUG_ON(ret, kvm))
+		return;
+
+	ret = static_call(kvm_x86_remove_private_spte)(kvm, gfn, level, old_pfn);
+	KVM_BUG_ON(ret, kvm);
+}
+
 /**
  * handle_changed_spte - handle bookkeeping associated with an SPTE change
  * @kvm: kvm instance
@@ -389,7 +466,7 @@ static void handle_removed_pt(struct kvm *kvm, tdp_ptep_t pt, bool shared)
  * @gfn: the base GFN that was mapped by the SPTE
  * @old_spte: The value of the SPTE before the change
  * @new_spte: The value of the SPTE after the change
- * @level: the level of the PT the SPTE is part of in the paging structure
+ * @role: the role of the PT the SPTE is part of in the paging structure
  * @shared: This operation may not be running under the exclusive use of
  *	    the MMU lock and the operation must synchronize with other
  *	    threads that might be modifying SPTEs.
@@ -399,14 +476,18 @@ static void handle_removed_pt(struct kvm *kvm, tdp_ptep_t pt, bool shared)
  * and fast_pf_fix_direct_spte()).
  */
 static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn,
-				u64 old_spte, u64 new_spte, int level,
-				bool shared)
+				u64 old_spte, u64 new_spte,
+				union kvm_mmu_page_role role, bool shared)
 {
+	bool is_private = kvm_mmu_page_role_is_private(role);
+	int level = role.level;
 	bool was_present = is_shadow_present_pte(old_spte);
 	bool is_present = is_shadow_present_pte(new_spte);
 	bool was_leaf = was_present && is_last_spte(old_spte, level);
 	bool is_leaf = is_present && is_last_spte(new_spte, level);
-	bool pfn_changed = spte_to_pfn(old_spte) != spte_to_pfn(new_spte);
+	kvm_pfn_t old_pfn = spte_to_pfn(old_spte);
+	kvm_pfn_t new_pfn = spte_to_pfn(new_spte);
+	bool pfn_changed = old_pfn != new_pfn;
 
 	WARN_ON_ONCE(level > PT64_ROOT_MAX_LEVEL);
 	WARN_ON_ONCE(level < PG_LEVEL_4K);
@@ -473,7 +554,7 @@ static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn,
 
 	if (was_leaf && is_dirty_spte(old_spte) &&
 	    (!is_present || !is_dirty_spte(new_spte) || pfn_changed))
-		kvm_set_pfn_dirty(spte_to_pfn(old_spte));
+		kvm_set_pfn_dirty(old_pfn);
 
 	/*
 	 * Recursively handle child PTs if the change removed a subtree from
@@ -482,14 +563,82 @@ static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn,
 	 * pages are kernel allocations and should never be migrated.
 	 */
 	if (was_present && !was_leaf &&
-	    (is_leaf || !is_present || WARN_ON_ONCE(pfn_changed)))
+	    (is_leaf || !is_present || WARN_ON_ONCE(pfn_changed))) {
+		KVM_BUG_ON(is_private != is_private_sptep(spte_to_child_pt(old_spte, level)),
+			   kvm);
 		handle_removed_pt(kvm, spte_to_child_pt(old_spte, level), shared);
+	}
+
+	/*
+	 * Secure-EPT requires to remove Secure-EPT tables after removing
+	 * children.  hooks after handling lower page table by above
+	 * handle_remove_pt().
+	 */
+	if (is_private && !is_present)
+		handle_removed_private_spte(kvm, gfn, old_spte, new_spte, role.level);
 
 	if (was_leaf && is_accessed_spte(old_spte) &&
 	    (!is_present || !is_accessed_spte(new_spte) || pfn_changed))
 		kvm_set_pfn_accessed(spte_to_pfn(old_spte));
 }
 
+static int __must_check __set_private_spte_present(struct kvm *kvm, tdp_ptep_t sptep,
+						   gfn_t gfn, u64 old_spte,
+						   u64 new_spte, int level)
+{
+	bool was_present = is_shadow_present_pte(old_spte);
+	bool is_present = is_shadow_present_pte(new_spte);
+	bool is_leaf = is_present && is_last_spte(new_spte, level);
+	kvm_pfn_t new_pfn = spte_to_pfn(new_spte);
+	int ret = 0;
+
+	lockdep_assert_held(&kvm->mmu_lock);
+	/* TDP MMU doesn't change present -> present */
+	KVM_BUG_ON(was_present, kvm);
+
+	/*
+	 * Use different call to either set up middle level
+	 * private page table, or leaf.
+	 */
+	if (is_leaf)
+		ret = static_call(kvm_x86_set_private_spte)(kvm, gfn, level, new_pfn);
+	else {
+		void *private_spt = get_private_spt(gfn, new_spte, level);
+
+		KVM_BUG_ON(!private_spt, kvm);
+		ret = static_call(kvm_x86_link_private_spt)(kvm, gfn, level, private_spt);
+	}
+
+	return ret;
+}
+
+static int __must_check set_private_spte_present(struct kvm *kvm, tdp_ptep_t sptep,
+						 gfn_t gfn, u64 old_spte,
+						 u64 new_spte, int level)
+{
+	int ret;
+
+	/*
+	 * For private page table, callbacks are needed to propagate SPTE
+	 * change into the protected page table.  In order to atomically update
+	 * both the SPTE and the protected page tables with callbacks, utilize
+	 * freezing SPTE.
+	 * - Freeze the SPTE. Set entry to REMOVED_SPTE.
+	 * - Trigger callbacks for protected page tables.
+	 * - Unfreeze the SPTE.  Set the entry to new_spte.
+	 */
+	lockdep_assert_held(&kvm->mmu_lock);
+	if (!try_cmpxchg64(sptep, &old_spte, REMOVED_SPTE))
+		return -EBUSY;
+
+	ret = __set_private_spte_present(kvm, sptep, gfn, old_spte, new_spte, level);
+	if (ret)
+		__kvm_tdp_mmu_write_spte(sptep, old_spte);
+	else
+		__kvm_tdp_mmu_write_spte(sptep, new_spte);
+	return ret;
+}
+
 /*
  * tdp_mmu_set_spte_atomic - Set a TDP MMU SPTE atomically
  * and handle the associated bookkeeping.  Do not mark the page dirty
@@ -512,6 +661,7 @@ static inline int __must_check tdp_mmu_set_spte_atomic(struct kvm *kvm,
 						       u64 new_spte)
 {
 	u64 *sptep = rcu_dereference(iter->sptep);
+	bool frozen = false;
 
 	/*
 	 * The caller is responsible for ensuring the old SPTE is not a REMOVED
@@ -523,19 +673,45 @@ static inline int __must_check tdp_mmu_set_spte_atomic(struct kvm *kvm,
 
 	lockdep_assert_held_read(&kvm->mmu_lock);
 
-	/*
-	 * Note, fast_pf_fix_direct_spte() can also modify TDP MMU SPTEs and
-	 * does not hold the mmu_lock.  On failure, i.e. if a different logical
-	 * CPU modified the SPTE, try_cmpxchg64() updates iter->old_spte with
-	 * the current value, so the caller operates on fresh data, e.g. if it
-	 * retries tdp_mmu_set_spte_atomic()
-	 */
-	if (!try_cmpxchg64(sptep, &iter->old_spte, new_spte))
-		return -EBUSY;
+	if (is_private_sptep(iter->sptep) && !is_removed_spte(new_spte)) {
+		int ret;
 
-	handle_changed_spte(kvm, iter->as_id, iter->gfn, iter->old_spte,
-			    new_spte, iter->level, true);
+		if (is_shadow_present_pte(new_spte)) {
+			/*
+			 * Populating case. handle_changed_spte() can
+			 * process without freezing because it only updates
+			 * stats.
+			 */
+			ret = set_private_spte_present(kvm, iter->sptep, iter->gfn,
+						       iter->old_spte, new_spte, iter->level);
+			if (ret)
+				return ret;
+		} else {
+			/*
+			 * Zapping case. handle_changed_spte() calls Secure-EPT
+			 * blocking or removal.  Freeze the entry.
+			 */
+			if (!try_cmpxchg64(sptep, &iter->old_spte, REMOVED_SPTE))
+				return -EBUSY;
+			frozen = true;
+		}
+	} else {
+		/*
+		 * Note, fast_pf_fix_direct_spte() can also modify TDP MMU SPTEs
+		 * and does not hold the mmu_lock.  On failure, i.e. if a
+		 * different logical CPU modified the SPTE, try_cmpxchg64()
+		 * updates iter->old_spte with the current value, so the caller
+		 * operates on fresh data, e.g. if it retries
+		 * tdp_mmu_set_spte_atomic()
+		 */
+		if (!try_cmpxchg64(sptep, &iter->old_spte, new_spte))
+			return -EBUSY;
+	}
 
+	handle_changed_spte(kvm, iter->as_id, iter->gfn, iter->old_spte,
+			    new_spte, sptep_to_sp(sptep)->role, true);
+	if (frozen)
+		__kvm_tdp_mmu_write_spte(sptep, new_spte);
 	return 0;
 }
 
@@ -585,6 +761,8 @@ static inline int __must_check tdp_mmu_zap_spte_atomic(struct kvm *kvm,
 static u64 tdp_mmu_set_spte(struct kvm *kvm, int as_id, tdp_ptep_t sptep,
 			    u64 old_spte, u64 new_spte, gfn_t gfn, int level)
 {
+	union kvm_mmu_page_role role;
+
 	lockdep_assert_held_write(&kvm->mmu_lock);
 
 	/*
@@ -597,8 +775,17 @@ static u64 tdp_mmu_set_spte(struct kvm *kvm, int as_id, tdp_ptep_t sptep,
 	WARN_ON_ONCE(is_removed_spte(old_spte) || is_removed_spte(new_spte));
 
 	old_spte = kvm_tdp_mmu_write_spte(sptep, old_spte, new_spte, level);
+	if (is_private_sptep(sptep) && !is_removed_spte(new_spte) &&
+	    is_shadow_present_pte(new_spte)) {
+		lockdep_assert_held_write(&kvm->mmu_lock);
+		/* Because write spin lock is held, no race.  It should success. */
+		KVM_BUG_ON(__set_private_spte_present(kvm, sptep, gfn, old_spte,
+						      new_spte, level), kvm);
+	}
 
-	handle_changed_spte(kvm, as_id, gfn, old_spte, new_spte, level, false);
+	role = sptep_to_sp(sptep)->role;
+	role.level = level;
+	handle_changed_spte(kvm, as_id, gfn, old_spte, new_spte, role, false);
 	return old_spte;
 }
 
@@ -621,8 +808,11 @@ static inline void tdp_mmu_iter_set_spte(struct kvm *kvm, struct tdp_iter *iter,
 			continue;					\
 		else
 
-#define tdp_mmu_for_each_pte(_iter, _mmu, _start, _end)		\
-	for_each_tdp_pte(_iter, root_to_sp(_mmu->root.hpa), _start, _end)
+#define tdp_mmu_for_each_pte(_iter, _mmu, _private, _start, _end)	\
+	for_each_tdp_pte(_iter,						\
+		 root_to_sp((_private) ? _mmu->private_root_hpa :	\
+				_mmu->root.hpa),			\
+		_start, _end)
 
 /*
  * Yield if the MMU lock is contended or this thread needs to return control
@@ -784,6 +974,14 @@ static bool tdp_mmu_zap_leafs(struct kvm *kvm, struct kvm_mmu_page *root,
 	if (!zap_private && is_private_sp(root))
 		return false;
 
+	/*
+	 * start and end doesn't have GFN shared bit.  This function zaps
+	 * a region including alias.  Adjust shared bit of [start, end) if the
+	 * root is shared.
+	 */
+	start = kvm_gfn_for_root(kvm, root, start);
+	end = kvm_gfn_for_root(kvm, root, end);
+
 	rcu_read_lock();
 
 	for_each_tdp_pte_min_level(iter, root, PG_LEVEL_4K, start, end) {
@@ -960,10 +1158,26 @@ static int tdp_mmu_map_handle_target_level(struct kvm_vcpu *vcpu,
 
 	if (unlikely(!fault->slot))
 		new_spte = make_mmio_spte(vcpu, iter->gfn, ACC_ALL);
-	else
-		wrprot = make_spte(vcpu, sp, fault->slot, ACC_ALL, iter->gfn,
-					 fault->pfn, iter->old_spte, fault->prefetch, true,
-					 fault->map_writable, &new_spte);
+	else {
+		unsigned long pte_access = ACC_ALL;
+		gfn_t gfn = iter->gfn;
+
+		if (kvm_gfn_shared_mask(vcpu->kvm)) {
+			if (fault->is_private)
+				gfn |= kvm_gfn_shared_mask(vcpu->kvm);
+			else
+				/*
+				 * TDX shared GPAs are no executable, enforce
+				 * this for the SDV.
+				 */
+				pte_access &= ~ACC_EXEC_MASK;
+		}
+
+		wrprot = make_spte(vcpu, sp, fault->slot, pte_access, gfn,
+				   fault->pfn, iter->old_spte,
+				   fault->prefetch, true, fault->map_writable,
+				   &new_spte);
+	}
 
 	if (new_spte == iter->old_spte)
 		ret = RET_PF_SPURIOUS;
@@ -1041,6 +1255,8 @@ int kvm_tdp_mmu_map(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault)
 	struct kvm *kvm = vcpu->kvm;
 	struct tdp_iter iter;
 	struct kvm_mmu_page *sp;
+	gfn_t raw_gfn;
+	bool is_private = fault->is_private && kvm_gfn_shared_mask(kvm);
 	int ret = RET_PF_RETRY;
 
 	kvm_mmu_hugepage_adjust(vcpu, fault);
@@ -1049,7 +1265,17 @@ int kvm_tdp_mmu_map(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault)
 
 	rcu_read_lock();
 
-	tdp_mmu_for_each_pte(iter, mmu, fault->gfn, fault->gfn + 1) {
+	raw_gfn = gpa_to_gfn(fault->addr);
+
+	if (is_error_noslot_pfn(fault->pfn) ||
+	    !kvm_pfn_to_refcounted_page(fault->pfn)) {
+		if (is_private) {
+			rcu_read_unlock();
+			return -EFAULT;
+		}
+	}
+
+	tdp_mmu_for_each_pte(iter, mmu, is_private, raw_gfn, raw_gfn + 1) {
 		int r;
 
 		if (fault->nx_huge_page_workaround_enabled)
@@ -1079,9 +1305,14 @@ int kvm_tdp_mmu_map(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault)
 
 		sp->nx_huge_page_disallowed = fault->huge_page_disallowed;
 
-		if (is_shadow_present_pte(iter.old_spte))
+		if (is_shadow_present_pte(iter.old_spte)) {
+			/*
+			 * TODO: large page support.
+			 * Doesn't support large page for TDX now
+			 */
+			KVM_BUG_ON(is_private_sptep(iter.sptep), vcpu->kvm);
 			r = tdp_mmu_split_huge_page(kvm, &iter, sp, true);
-		else
+		} else
 			r = tdp_mmu_link_sp(kvm, &iter, sp, true);
 
 		/*
@@ -1362,6 +1593,8 @@ static struct kvm_mmu_page *__tdp_mmu_alloc_sp_for_split(gfp_t gfp, union kvm_mm
 
 	sp->role = role;
 	sp->spt = (void *)__get_free_page(gfp);
+	/* TODO: large page support for private GPA. */
+	WARN_ON_ONCE(kvm_mmu_page_role_is_private(role));
 	if (!sp->spt) {
 		kmem_cache_free(mmu_page_header_cache, sp);
 		return NULL;
@@ -1378,6 +1611,10 @@ static struct kvm_mmu_page *tdp_mmu_alloc_sp_for_split(struct kvm *kvm,
 	struct kvm_mmu_page *sp;
 
 	kvm_lockdep_assert_mmu_lock_held(kvm, shared);
+	KVM_BUG_ON(kvm_mmu_page_role_is_private(role) !=
+		   is_private_sptep(iter->sptep), kvm);
+	/* TODO: Large page isn't supported for private SPTE yet. */
+	KVM_BUG_ON(kvm_mmu_page_role_is_private(role), kvm);
 
 	/*
 	 * Since we are allocating while under the MMU lock we have to be
@@ -1802,7 +2039,7 @@ int kvm_tdp_mmu_get_walk(struct kvm_vcpu *vcpu, u64 addr, u64 *sptes,
 
 	*root_level = vcpu->arch.mmu->root_role.level;
 
-	tdp_mmu_for_each_pte(iter, mmu, gfn, gfn + 1) {
+	tdp_mmu_for_each_pte(iter, mmu, false, gfn, gfn + 1) {
 		leaf = iter.level;
 		sptes[leaf] = iter.old_spte;
 	}
@@ -1829,7 +2066,10 @@ u64 *kvm_tdp_mmu_fast_pf_get_last_sptep(struct kvm_vcpu *vcpu, u64 addr,
 	gfn_t gfn = addr >> PAGE_SHIFT;
 	tdp_ptep_t sptep = NULL;
 
-	tdp_mmu_for_each_pte(iter, mmu, gfn, gfn + 1) {
+	/* fast page fault for private GPA isn't supported. */
+	WARN_ON_ONCE(kvm_is_private_gpa(vcpu->kvm, addr));
+
+	tdp_mmu_for_each_pte(iter, mmu, false, gfn, gfn + 1) {
 		*spte = iter.old_spte;
 		sptep = iter.sptep;
 	}
diff --git a/arch/x86/kvm/mmu/tdp_mmu.h b/arch/x86/kvm/mmu/tdp_mmu.h
index b3cf58a50357..bc9124737142 100644
--- a/arch/x86/kvm/mmu/tdp_mmu.h
+++ b/arch/x86/kvm/mmu/tdp_mmu.h
@@ -10,7 +10,7 @@
 void kvm_mmu_init_tdp_mmu(struct kvm *kvm);
 void kvm_mmu_uninit_tdp_mmu(struct kvm *kvm);
 
-hpa_t kvm_tdp_mmu_get_vcpu_root_hpa(struct kvm_vcpu *vcpu);
+hpa_t kvm_tdp_mmu_get_vcpu_root_hpa(struct kvm_vcpu *vcpu, bool private);
 
 __must_check static inline bool kvm_tdp_mmu_get_root(struct kvm_mmu_page *root)
 {
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index d399009ef1d7..e27c22449d85 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -201,6 +201,7 @@ struct page *kvm_pfn_to_refcounted_page(kvm_pfn_t pfn)
 
 	return NULL;
 }
+EXPORT_SYMBOL_GPL(kvm_pfn_to_refcounted_page);
 
 /*
  * Switches to specified vcpu, until a matching vcpu_put()
-- 
2.25.1


  parent reply	other threads:[~2024-02-26  8:28 UTC|newest]

Thread overview: 660+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-02-26  8:25 [PATCH v19 000/130] KVM TDX basic feature support isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 001/130] x86/virt/tdx: Rename _offset to _member for TD_SYSINFO_MAP() macro isaku.yamahata
2024-03-08  7:25   ` Binbin Wu
2024-03-08 10:36     ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 002/130] x86/virt/tdx: Move TDMR metadata fields map table to local variable isaku.yamahata
2024-03-08  7:36   ` Binbin Wu
2024-04-04 14:08   ` Kirill A. Shutemov
2024-04-04 20:18     ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 003/130] x86/virt/tdx: Unbind global metadata read with 'struct tdx_tdmr_sysinfo' isaku.yamahata
2024-03-08  7:46   ` Binbin Wu
2024-02-26  8:25 ` [PATCH v19 004/130] x86/virt/tdx: Support global metadata read for all element sizes isaku.yamahata
2024-02-26 14:32   ` Juergen Gross
2024-02-27  8:40     ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 005/130] x86/virt/tdx: Export global metadata read infrastructure isaku.yamahata
2024-03-06  9:05   ` Yi Sun
2024-03-06 21:23     ` Huang, Kai
2024-03-08  8:31   ` Binbin Wu
2024-02-26  8:25 ` [PATCH v19 006/130] x86/virt/tdx: Export TDX KeyID information isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 007/130] x86/virt/tdx: Export SEAMCALL functions isaku.yamahata
2024-03-15  0:02   ` Huang, Kai
2024-03-15  1:17     ` Edgecombe, Rick P
2024-03-15  1:33       ` Dave Hansen
2024-03-15 16:33         ` Sean Christopherson
2024-03-15 17:46           ` Sean Christopherson
2024-03-15 17:51             ` Edgecombe, Rick P
2024-03-15 19:20               ` Sean Christopherson
2024-03-15 17:48           ` Edgecombe, Rick P
2024-03-20 11:27             ` Huang, Kai
2024-03-15 18:28           ` Dave Hansen
2024-03-15 19:38             ` Sean Christopherson
2024-03-15 23:53               ` Dave Hansen
2024-03-20 12:09               ` Huang, Kai
2024-03-20 15:07                 ` Dave Hansen
2024-03-20 21:00                   ` Huang, Kai
2024-04-03 21:36                   ` Sean Christopherson
2024-04-10 12:49           ` Kirill A. Shutemov
2024-04-16 19:45             ` Edgecombe, Rick P
2024-04-18 14:16               ` kirill.shutemov
2024-04-18 18:26                 ` Sean Christopherson
2024-04-19 14:46                   ` kirill.shutemov
2024-04-19 19:53                     ` Sean Christopherson
2024-04-25 16:46                       ` kirill.shutemov
2024-04-19 20:04                     ` Edgecombe, Rick P
2024-04-22 11:46                       ` kirill.shutemov
2024-04-22 15:56                         ` Edgecombe, Rick P
2024-04-22 19:50                           ` Sean Christopherson
2024-04-23  0:28                             ` Edgecombe, Rick P
2024-02-26  8:25 ` [PATCH v19 008/130] x86/tdx: Warning with 32bit build shift-count-overflow isaku.yamahata
2024-02-28 22:49   ` Huang, Kai
2024-03-01 11:36     ` Kirill A. Shutemov
2024-03-05  8:12       ` Isaku Yamahata
2024-03-05 21:35         ` Huang, Kai
2024-03-06 22:17           ` Isaku Yamahata
2024-03-06 22:25             ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 009/130] KVM: x86: Add gmem hook for determining max NPT mapping level isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 010/130] KVM: x86: Pass is_private to gmem hook of gmem_max_level isaku.yamahata
2024-04-19  1:19   ` Yan Zhao
2024-04-19 18:28     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 011/130] KVM: Add new members to struct kvm_gfn_range to operate on isaku.yamahata
2024-03-12 13:33   ` Binbin Wu
2024-03-13 17:14     ` Isaku Yamahata
2024-03-19  2:50       ` Edgecombe, Rick P
2024-03-19 14:47         ` Edgecombe, Rick P
2024-03-19 21:50           ` Isaku Yamahata
2024-04-26  7:39             ` Fuad Tabba
2024-04-26 13:50               ` Edgecombe, Rick P
2024-04-26 15:28                 ` Sean Christopherson
2024-04-26 15:57                   ` Edgecombe, Rick P
2024-04-26 16:49                     ` Sean Christopherson
2024-04-26 17:01                       ` Edgecombe, Rick P
2024-04-26 17:13                         ` Sean Christopherson
2024-02-26  8:25 ` [PATCH v19 012/130] KVM: x86/mmu: Pass around full 64-bit error code for the KVM page fault isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 013/130] KVM: x86: Use PFERR_GUEST_ENC_MASK to indicate fault is private isaku.yamahata
2024-03-07  7:04   ` Yin Fengwei
2024-02-26  8:25 ` [PATCH v19 014/130] KVM: Add KVM vcpu ioctl to pre-populate guest memory isaku.yamahata
2024-03-07  7:01   ` Yin Fengwei
2024-03-08 21:01     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 015/130] KVM: Document KVM_MEMORY_MAPPING ioctl isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 016/130] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2024-03-06  7:13   ` Binbin Wu
2024-03-06 22:22     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 017/130] KVM: x86: Implement kvm_arch_{, pre_}vcpu_memory_mapping() isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 018/130] KVM: x86/mmu: Assume guest MMIOs are shared isaku.yamahata
2024-03-25 23:41   ` Edgecombe, Rick P
2024-03-27 17:22     ` Isaku Yamahata
2024-03-27 17:27       ` Edgecombe, Rick P
2024-04-04 22:31         ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 019/130] KVM: x86: Add is_vm_type_supported callback isaku.yamahata
2024-03-14  8:32   ` Chao Gao
2024-03-14 16:13     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 020/130] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 021/130] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_init() isaku.yamahata
2024-03-13 15:30   ` Binbin Wu
2024-03-13 17:36     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 022/130] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2024-03-11  5:32   ` Yin, Fengwei
2024-03-12  2:15     ` Isaku Yamahata
2024-03-12  2:21       ` Yin Fengwei
2024-03-12  4:42         ` Isaku Yamahata
2024-03-21 11:27   ` Huang, Kai
2024-03-22 17:39     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 023/130] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2024-03-14  2:05   ` Binbin Wu
2024-03-14 16:27     ` Isaku Yamahata
2024-03-15  4:44       ` Binbin Wu
2024-03-15 23:25         ` Isaku Yamahata
2024-03-21 12:39           ` Huang, Kai
2024-03-22 18:01             ` Isaku Yamahata
2024-03-21 13:07   ` Huang, Kai
2024-03-22 21:23     ` Isaku Yamahata
2024-04-10 13:12       ` Huang, Kai
2024-04-10 15:29         ` Sean Christopherson
2024-04-10 23:15           ` Huang, Kai
2024-04-11 14:03             ` Sean Christopherson
2024-04-11 22:58               ` Huang, Kai
2024-04-16 20:58                 ` Sean Christopherson
2024-04-17 13:20                   ` Huang, Kai
2024-04-17 14:40                     ` Sean Christopherson
2024-04-17 23:09                       ` Huang, Kai
2024-04-17 23:35                         ` Sean Christopherson
2024-04-18  0:47                           ` Huang, Kai
2024-04-18 14:30                             ` Sean Christopherson
2024-04-18 23:09                               ` Huang, Kai
2024-04-19 17:23                                 ` Sean Christopherson
2024-04-22 12:46                                   ` Huang, Kai
2024-04-22 16:54                                     ` Sean Christopherson
2024-04-22 22:47                                       ` Huang, Kai
2024-04-23  0:08                                         ` Sean Christopherson
2024-04-23  1:34                                           ` Huang, Kai
2024-04-23  1:45                                             ` Huang, Kai
2024-04-23 15:15                                               ` Sean Christopherson
2024-04-23 22:59                                                 ` Huang, Kai
2024-04-23 23:29                                                   ` Huang, Kai
2024-04-25 16:30                                                     ` Sean Christopherson
2024-04-25 22:34                                                       ` Huang, Kai
2024-04-25 22:43                                                         ` Sean Christopherson
2024-04-29 11:41                                                           ` Huang, Kai
2024-04-29 20:06                                                             ` Sean Christopherson
2024-04-29 23:12                                                               ` Huang, Kai
2024-04-30 16:13                                                                 ` Sean Christopherson
2024-05-01  2:56                                                                   ` Huang, Kai
2024-04-25 16:35                                                   ` Sean Christopherson
2024-04-25 21:53                                                     ` Huang, Kai
2024-04-25 22:07                                                       ` Sean Christopherson
2024-04-26  0:21                                                         ` Huang, Kai
2024-04-26  3:21                                                           ` Chao Gao
2024-04-26  9:44                                                             ` Huang, Kai
2024-05-07 12:40                                   ` Huang, Kai
2024-05-07 16:24                                     ` Sean Christopherson
2024-05-07 21:59                                       ` Huang, Kai
2024-04-09  0:37   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 024/130] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2024-03-14  6:21   ` Binbin Wu
2024-03-14 16:37     ` Isaku Yamahata
2024-03-21 21:37   ` Huang, Kai
2024-03-22 22:45     ` Isaku Yamahata
2024-03-25 10:22       ` Huang, Kai
2024-04-23 13:59       ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 025/130] KVM: TDX: Make TDX VM type supported isaku.yamahata
2024-03-14  6:29   ` Binbin Wu
2024-03-15 21:36     ` Isaku Yamahata
2024-03-21 21:40       ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 026/130] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 027/130] KVM: TDX: Define " isaku.yamahata
2024-03-01  7:25   ` Yan Zhao
2024-03-05  8:21     ` Isaku Yamahata
2024-04-16  0:55       ` Huang, Kai
2024-04-16 16:28         ` Isaku Yamahata
2024-04-16 22:06           ` Huang, Kai
2024-03-14  7:30   ` Binbin Wu
2024-03-14 16:48     ` Isaku Yamahata
2024-03-21 21:57   ` Huang, Kai
2024-03-22 23:15     ` Isaku Yamahata
2024-03-22  7:06   ` Yuan Yao
2024-03-22 23:17     ` Isaku Yamahata
2024-04-03 15:04   ` Sean Christopherson
2024-04-03 16:30     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 028/130] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2024-02-26 19:27   ` Isaku Yamahata
2024-03-14  7:45     ` Binbin Wu
2024-03-14 17:21       ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 029/130] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2024-03-15 17:41   ` Sean Christopherson
2024-03-15 19:23     ` Isaku Yamahata
2024-03-19 23:24   ` Edgecombe, Rick P
2024-03-20  0:09     ` Isaku Yamahata
2024-03-20  0:11       ` Edgecombe, Rick P
2024-03-20  5:41         ` Isaku Yamahata
2024-03-20 20:20           ` Isaku Yamahata
2024-03-20  0:03   ` Huang, Kai
2024-03-20 21:36     ` Isaku Yamahata
2024-03-20 22:37       ` Huang, Kai
2024-03-22  0:16         ` Isaku Yamahata
2024-03-22  4:33           ` Huang, Kai
2024-03-22 23:26             ` Isaku Yamahata
2024-04-24 10:50   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 030/130] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2024-03-20  0:29   ` Huang, Kai
2024-03-20 21:50     ` Isaku Yamahata
2024-03-20 23:09       ` Huang, Kai
2024-03-21 23:52         ` Isaku Yamahata
2024-03-22  4:37           ` Huang, Kai
2024-04-24  0:11   ` Huang, Kai
2024-04-26 18:38     ` Isaku Yamahata
2024-04-24 11:06   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 031/130] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 032/130] KVM: TDX: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2024-03-13  0:44   ` Edgecombe, Rick P
2024-03-13 17:44     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 033/130] KVM: TDX: Add helper function to read TDX metadata in array isaku.yamahata
2024-03-14  9:17   ` Binbin Wu
2024-03-14 14:35     ` Binbin Wu
2024-03-14 17:00       ` Isaku Yamahata
2024-03-14 22:27   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 034/130] KVM: TDX: Get system-wide info about TDX module on initialization isaku.yamahata
2024-03-14 15:06   ` Binbin Wu
2024-03-14 23:09   ` Huang, Kai
2024-03-15  2:18     ` Xiaoyao Li
2024-03-15  4:57       ` Huang, Kai
2024-03-15  5:11         ` Xiaoyao Li
2024-03-15  5:39           ` Huang, Kai
2024-03-15  5:50             ` Xiaoyao Li
2024-03-15 16:22     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 035/130] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2024-03-21 22:10   ` Huang, Kai
2024-03-22 23:36     ` Isaku Yamahata
2024-03-23  4:27       ` Huang, Kai
2024-03-26  3:10         ` Edgecombe, Rick P
2024-02-26  8:25 ` [PATCH v19 036/130] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2024-03-21 22:26   ` Huang, Kai
2024-03-23  0:28     ` Isaku Yamahata
2024-03-25  0:25       ` Huang, Kai
2024-04-24 10:30   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific isaku.yamahata
2024-03-21 23:36   ` Huang, Kai
2024-03-23  1:13     ` Isaku Yamahata
2024-03-25  8:42       ` Binbin Wu
2024-03-25 21:31         ` Isaku Yamahata
2024-03-25 22:47           ` Huang, Kai
2024-03-25  8:43       ` Huang, Kai
2024-03-25 21:29         ` isaku.yamahata
2024-05-09 16:35   ` Sean Christopherson
2024-05-09 22:40     ` Huang, Kai
2024-05-09 22:47       ` Huang, Kai
2024-05-09 22:52       ` Sean Christopherson
2024-05-09 23:19         ` Huang, Kai
2024-05-09 23:55           ` Isaku Yamahata
2024-05-10 14:04             ` Sean Christopherson
2024-05-14  2:01               ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 038/130] KVM: TDX: create/destroy VM structure isaku.yamahata
2024-03-20  5:12   ` Chao Gao
2024-03-21 14:17     ` Isaku Yamahata
2024-03-22  3:46       ` Yuan Yao
2024-03-22  5:32         ` Yuan Yao
2024-03-22 23:44           ` Isaku Yamahata
2024-03-29  6:22       ` Binbin Wu
2024-04-01 22:55         ` Isaku Yamahata
2024-04-03 22:13       ` Huang, Kai
2024-04-04  1:03         ` Chao Gao
2024-04-04  1:24           ` Huang, Kai
2024-03-22  1:06   ` Huang, Kai
2024-03-23  1:36     ` Isaku Yamahata
2024-03-25  9:58   ` Binbin Wu
2024-03-25 21:48     ` Isaku Yamahata
2024-03-26  1:43   ` Huang, Kai
2024-03-27 22:53     ` Isaku Yamahata
2024-03-28  1:49       ` Huang, Kai
2024-03-28  5:34         ` Isaku Yamahata
2024-03-28 11:14           ` Huang, Kai
2024-03-28 14:12             ` Chao Gao
2024-03-28 20:39             ` Isaku Yamahata
2024-03-29  7:25               ` Binbin Wu
2024-04-02  6:16                 ` Isaku Yamahata
2024-04-01 10:41               ` Huang, Kai
2024-03-27 23:33   ` Huang, Kai
2024-04-03 17:24     ` Isaku Yamahata
2024-04-03 22:26       ` Huang, Kai
2024-04-15  8:17   ` Xiaoyao Li
2024-04-16 16:40     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2024-03-20  6:12   ` Chao Gao
2024-03-21 15:55     ` Isaku Yamahata
2024-03-28  1:12       ` Edgecombe, Rick P
2024-03-28  1:36         ` Xiaoyao Li
2024-03-28 18:26           ` Edgecombe, Rick P
2024-04-01  7:23             ` Xiaoyao Li
2024-03-20  8:15   ` Xiaoyao Li
2024-03-21 17:30     ` Isaku Yamahata
2024-03-22 11:20   ` Huang, Kai
2024-03-23  1:22     ` Isaku Yamahata
2024-03-25 10:39       ` Huang, Kai
2024-03-25 22:04         ` Isaku Yamahata
2024-04-03 23:59   ` Huang, Kai
2024-04-11 18:54     ` Isaku Yamahata
2024-04-08 18:38   ` Edgecombe, Rick P
2024-04-11 19:26     ` Isaku Yamahata
2024-04-11 19:51       ` Edgecombe, Rick P
2024-04-11 20:46         ` Isaku Yamahata
2024-04-11 21:03           ` Edgecombe, Rick P
2024-05-17 14:32   ` Kirill A. Shutemov
2024-05-17 14:37     ` Juergen Gross
2024-05-17 14:53       ` Kirill A. Shutemov
2024-05-17 15:00         ` Jürgen Groß
2024-05-17 16:25           ` Kirill A. Shutemov
2024-05-23 10:35             ` Kirill A. Shutemov
2024-05-23 10:37               ` Jürgen Groß
2024-05-23 23:37             ` Huang, Kai
2024-05-28  8:19               ` Kirill A. Shutemov
2024-02-26  8:25 ` [PATCH v19 040/130] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2024-03-20  7:01   ` Chao Gao
2024-03-21 17:46     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 041/130] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2024-03-21  1:06   ` Chao Gao
2024-03-21 17:59     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 042/130] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 043/130] KVM: TDX: create/free TDX vcpu structure isaku.yamahata
2024-03-21  1:30   ` Chao Gao
2024-03-21 20:21     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 044/130] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2024-03-21  5:43   ` Chao Gao
2024-03-21 20:43     ` Isaku Yamahata
2024-03-27  0:27   ` Edgecombe, Rick P
2024-03-27 22:56     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 045/130] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 046/130] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2024-03-27  3:08   ` Chenyi Qiang
2024-03-27 14:09     ` Binbin Wu
2024-03-27 23:50       ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 047/130] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 048/130] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values isaku.yamahata
2024-03-26 15:53   ` Binbin Wu
2024-03-26 17:34     ` Isaku Yamahata
2024-03-27  0:47       ` Binbin Wu
2024-02-26  8:25 ` [PATCH v19 049/130] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 050/130] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 051/130] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 052/130] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2024-03-26  3:31   ` Edgecombe, Rick P
2024-03-27 23:58     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 053/130] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 054/130] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 055/130] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 056/130] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2024-03-21  0:11   ` Edgecombe, Rick P
2024-03-21 21:24     ` Isaku Yamahata
2024-03-22  7:18       ` Chao Gao
2024-03-22 15:19         ` Isaku Yamahata
2024-04-20 19:05     ` Edgecombe, Rick P
2024-02-26  8:25 ` [PATCH v19 057/130] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2024-03-21  0:18   ` Edgecombe, Rick P
2024-03-21 21:59     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 058/130] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2024-03-13 20:51   ` Edgecombe, Rick P
2024-03-14 18:10     ` Isaku Yamahata
2024-03-14 21:23       ` Huang, Kai
2024-03-14 21:39         ` Edgecombe, Rick P
2024-03-15  1:09           ` Isaku Yamahata
2024-03-27 13:49             ` Binbin Wu
2024-03-28  0:02               ` Isaku Yamahata
2024-03-28  3:17                 ` Binbin Wu
2024-03-14 21:52       ` Edgecombe, Rick P
2024-03-15  0:24         ` Isaku Yamahata
2024-04-22  3:34   ` Yan Zhao
2024-04-22 17:30     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 059/130] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2024-03-18 23:46   ` Edgecombe, Rick P
2024-03-19 23:56     ` Isaku Yamahata
2024-03-20  0:56       ` Edgecombe, Rick P
2024-03-21  1:17         ` Edgecombe, Rick P
2024-03-21 22:59           ` Isaku Yamahata
2024-03-22  0:40             ` Edgecombe, Rick P
2024-03-25 19:05               ` Isaku Yamahata
2024-03-25 19:55                 ` Edgecombe, Rick P
2024-03-25 22:18                   ` Isaku Yamahata
2024-03-25 23:10                     ` Isaku Yamahata
2024-03-25 23:21                       ` Edgecombe, Rick P
2024-03-25 23:35                         ` Isaku Yamahata
2024-03-26  2:32                           ` Chao Gao
2024-03-26  2:42                             ` Edgecombe, Rick P
2024-03-26 11:13                               ` Chao Gao
2024-03-26 17:48                                 ` Isaku Yamahata
2024-03-27  2:54                                   ` Xiaoyao Li
2024-03-27 17:36                                     ` Edgecombe, Rick P
2024-03-28  0:06                                       ` Isaku Yamahata
2024-03-28  0:06                                       ` Xiaoyao Li
2024-03-28  0:36                                         ` Isaku Yamahata
2024-03-28  1:04                                           ` Xiaoyao Li
2024-03-28  0:45                                         ` Edgecombe, Rick P
2024-03-28  0:58                                           ` Xiaoyao Li
2024-03-28  1:06                                             ` Edgecombe, Rick P
2024-03-28  1:30                                               ` Xiaoyao Li
2024-03-28  3:04                                                 ` Edgecombe, Rick P
2024-03-28  3:40                                                   ` Xiaoyao Li
2024-03-28 10:17                                                     ` Chao Gao
2024-03-28 13:21                                                       ` Xiaoyao Li
2024-03-28 13:38                                                         ` Chao Gao
2024-03-28 14:45                                                           ` Xiaoyao Li
2024-03-28 16:57                                                             ` Edgecombe, Rick P
2024-03-28  9:53                                         ` Chao Gao
2024-03-28  0:23                   ` Xiaoyao Li
2024-03-21 22:39         ` Isaku Yamahata
2024-04-17  2:21   ` Chao Gao
2024-04-17  6:47     ` Isaku Yamahata
2024-04-21  1:58   ` Edgecombe, Rick P
2024-02-26  8:26 ` [PATCH v19 060/130] KVM: x86/tdp_mmu: Apply mmu notifier callback to only shared GPA isaku.yamahata
2024-03-28  8:29   ` Binbin Wu
2024-03-28 20:55     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 061/130] KVM: x86/tdp_mmu: Sprinkle __must_check isaku.yamahata
2024-02-26  8:26 ` isaku.yamahata [this message]
2024-03-23 23:39   ` [PATCH v19 062/130] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU Edgecombe, Rick P
2024-03-25 20:01     ` Isaku Yamahata
2024-03-25 22:31       ` Edgecombe, Rick P
2024-03-26 18:06         ` Isaku Yamahata
2024-04-19 18:55           ` Edgecombe, Rick P
2024-03-27 13:07   ` Chao Gao
2024-03-28  0:25     ` Isaku Yamahata
2024-04-01  9:12   ` Binbin Wu
2024-04-02  6:37     ` Isaku Yamahata
2024-04-22  9:08   ` Yan Zhao
2024-02-26  8:26 ` [PATCH v19 063/130] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 064/130] KVM: x86/mmu: Do not enable page track for TD guest isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 065/130] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 066/130] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 067/130] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2024-04-01 15:49   ` Binbin Wu
2024-04-03 17:33     ` Isaku Yamahata
2024-04-06  0:09       ` Edgecombe, Rick P
2024-04-06  0:58         ` Huang, Kai
2024-04-07  1:32           ` Binbin Wu
2024-04-08 15:32             ` Edgecombe, Rick P
2024-02-26  8:26 ` [PATCH v19 068/130] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 069/130] KVM: TDX: Require TDP MMU and mmio caching for TDX isaku.yamahata
2024-03-28  5:24   ` Binbin Wu
2024-03-28 21:03     ` Isaku Yamahata
2024-04-01 17:34   ` Sean Christopherson
2024-04-02  6:03     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support isaku.yamahata
2024-03-28  3:12   ` Chao Gao
2024-03-28  3:55     ` Isaku Yamahata
2024-05-26  8:45     ` Chen Yu
2024-05-29  0:55       ` Isaku Yamahata
2024-05-29  0:58         ` Isaku Yamahata
2024-05-29  7:56           ` Chen Yu
2024-04-02  6:21   ` Binbin Wu
2024-04-03 17:50     ` Isaku Yamahata
2024-04-02  9:13   ` Binbin Wu
2024-04-03 18:01     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 071/130] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 072/130] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 073/130] KVM: x86: Add hooks in kvm_arch_vcpu_memory_mapping() isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 074/130] KVM: TDX: Create initial guest memory isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 075/130] KVM: TDX: Extend memory measurement with " isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 076/130] KVM: TDX: Finalize VM initialization isaku.yamahata
2024-04-11 16:39   ` Adrian Hunter
2024-04-12  1:08     ` Isaku Yamahata
2024-04-12 12:22       ` Adrian Hunter
2024-04-12 18:09         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 077/130] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 078/130] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2024-03-15 17:26   ` Sean Christopherson
2024-03-15 20:42     ` Isaku Yamahata
2024-04-07  1:42     ` Binbin Wu
2024-03-18 21:01   ` Edgecombe, Rick P
2024-03-18 23:40     ` Isaku Yamahata
2024-04-04 13:22   ` Kirill A. Shutemov
2024-04-04 21:51     ` Huang, Kai
2024-04-04 22:45       ` Sean Christopherson
2024-04-04 23:28         ` Huang, Kai
2024-02-26  8:26 ` [PATCH v19 079/130] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2024-04-07  3:02   ` Binbin Wu
2024-04-12 20:17     ` Isaku Yamahata
2024-04-18  7:57       ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 080/130] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2024-03-07  8:32   ` Chen Yu
2024-03-08 20:58     ` Isaku Yamahata
2024-03-09 16:28       ` Chen Yu
2024-03-12  2:03         ` Isaku Yamahata
2024-04-07  3:47   ` Binbin Wu
2024-04-12 20:19     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 081/130] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2024-04-07  5:36   ` Binbin Wu
2024-04-12 20:23     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 082/130] KVM: TDX: restore user ret MSRs isaku.yamahata
2024-04-07  5:59   ` Binbin Wu
2024-04-12 20:32     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 083/130] KVM: TDX: Add TSX_CTRL msr into uret_msrs list isaku.yamahata
2024-04-07  7:05   ` Binbin Wu
2024-04-12 20:35     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 084/130] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 085/130] KVM: TDX: Complete interrupts after tdexit isaku.yamahata
2024-04-16 18:23   ` Reinette Chatre
2024-04-17  6:56     ` Isaku Yamahata
2024-04-23 13:15     ` Binbin Wu
2024-04-23 14:48       ` Reinette Chatre
2024-02-26  8:26 ` [PATCH v19 086/130] KVM: TDX: restore debug store when TD exit isaku.yamahata
2024-04-16 18:24   ` Reinette Chatre
2024-04-17  4:03     ` Chao Gao
2024-02-26  8:26 ` [PATCH v19 087/130] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2024-04-07  9:03   ` Binbin Wu
2024-04-12 16:15   ` Reinette Chatre
2024-04-12 21:42     ` Isaku Yamahata
2024-04-12 22:46       ` Sean Christopherson
2024-04-13  0:40         ` Isaku Yamahata
2024-04-15 13:49           ` Sean Christopherson
2024-04-15 22:48             ` Isaku Yamahata
2024-04-16  0:05               ` Huang, Kai
2024-04-16 16:44                 ` Isaku Yamahata
2024-04-18  1:09                   ` Huang, Kai
2024-04-23 12:13     ` Binbin Wu
2024-05-06 19:02       ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 088/130] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2024-04-07 10:52   ` Binbin Wu
2024-04-13  0:20     ` Isaku Yamahata
2024-05-06  3:30   ` Binbin Wu
2024-05-06 19:10     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 089/130] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2024-04-16 14:12   ` Edgecombe, Rick P
2024-02-26  8:26 ` [PATCH v19 090/130] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 091/130] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2024-02-27  8:52   ` Binbin Wu
2024-03-05  8:35     ` Isaku Yamahata
2024-03-28  8:12   ` Chao Gao
2024-03-28 21:10     ` Isaku Yamahata
2024-04-08  3:16       ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 092/130] KVM: TDX: Implement interrupt injection isaku.yamahata
2024-03-28 10:56   ` Chao Gao
2024-03-28 21:12     ` Isaku Yamahata
2024-04-08  7:01   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 093/130] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2024-03-29  1:54   ` Chao Gao
2024-04-02  6:52     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 094/130] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2024-03-29  2:11   ` Chao Gao
2024-04-02  7:09     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 095/130] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2024-03-29  2:55   ` Chao Gao
2024-02-26  8:26 ` [PATCH v19 096/130] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2024-04-09  8:52   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 097/130] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2024-03-29  3:24   ` Chao Gao
2024-04-03 18:34     ` Isaku Yamahata
2024-04-03 18:55       ` Sean Christopherson
2024-05-09  3:26       ` Binbin Wu
2024-04-09  9:28   ` Binbin Wu
2024-04-15 22:51     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 098/130] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2024-03-15 17:45   ` Sean Christopherson
2024-03-19 21:57     ` Isaku Yamahata
2024-04-09 10:36   ` Binbin Wu
2024-04-15 22:58     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 099/130] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 100/130] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2024-04-09 14:53   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 101/130] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2024-03-04  7:39   ` Chenyi Qiang
2024-04-01  4:10   ` Chao Gao
2024-04-03 18:42     ` Isaku Yamahata
2024-04-30 20:47       ` Reinette Chatre
2024-05-01 15:56         ` Isaku Yamahata
2024-05-01 16:54           ` Reinette Chatre
2024-05-01 18:19             ` Isaku Yamahata
2024-05-01 18:22               ` Reinette Chatre
2024-05-06  7:21             ` Chao Gao
2024-05-06 14:21               ` Sean Christopherson
2024-05-06 14:22   ` Sean Christopherson
2024-02-26  8:26 ` [PATCH v19 102/130] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2024-04-01  8:22   ` Chao Gao
2024-04-03 18:51     ` Isaku Yamahata
2024-04-17  3:05       ` Binbin Wu
2024-04-18  0:08         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 103/130] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI isaku.yamahata
2024-04-01  9:14   ` Chao Gao
2024-04-03 22:23     ` Isaku Yamahata
2024-05-07  7:06       ` Binbin Wu
2024-05-07 20:55         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 104/130] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2024-04-01  9:59   ` Chao Gao
2024-04-04  1:15     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 105/130] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2024-04-02  8:52   ` Chao Gao
2024-04-04  1:27     ` Isaku Yamahata
2024-04-17  6:16       ` Binbin Wu
2024-04-17  7:02         ` Isaku Yamahata
2024-05-27  0:57           ` Binbin Wu
2024-05-28 17:16             ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 106/130] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2024-04-03  2:49   ` Chao Gao
2024-04-03 15:58   ` Sean Christopherson
2024-04-04 23:02     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 107/130] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 108/130] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2024-04-03  3:25   ` Chao Gao
2024-04-03 14:49     ` Sean Christopherson
2024-04-04 23:25       ` Isaku Yamahata
2024-04-07  3:50         ` Chao Gao
2024-04-08 18:56           ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 109/130] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2024-04-17 12:51   ` Binbin Wu
2024-04-17 20:10     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 110/130] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2024-04-18  9:29   ` Binbin Wu
2024-04-18 11:04     ` Binbin Wu
2024-04-18 21:22       ` Isaku Yamahata
2024-04-19  1:42         ` Binbin Wu
2024-04-19 17:34           ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 111/130] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2024-04-03  6:51   ` Chao Gao
2024-04-03 15:07     ` Sean Christopherson
2024-04-03 15:14   ` Sean Christopherson
2024-04-04 23:42     ` Isaku Yamahata
2024-04-18 13:36       ` Binbin Wu
2024-04-18 13:54   ` Binbin Wu
2024-04-18 21:27     ` Isaku Yamahata
2024-04-19  2:33   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 112/130] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 113/130] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 114/130] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 115/130] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 116/130] KVM: TDX: Silently discard SMI request isaku.yamahata
2024-04-19  7:04   ` Binbin Wu
2024-04-19 13:52   ` Sean Christopherson
2024-04-19 18:11     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 117/130] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2024-04-19  8:31   ` Binbin Wu
2024-04-19 18:06     ` Isaku Yamahata
2024-02-26  8:27 ` [PATCH v19 118/130] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2024-04-19 10:04   ` Binbin Wu
2024-04-19 18:09     ` Isaku Yamahata
2024-02-26  8:27 ` [PATCH v19 119/130] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 120/130] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2024-03-15  0:06   ` Edgecombe, Rick P
2024-03-15  1:35     ` Isaku Yamahata
2024-03-15 14:01       ` Edgecombe, Rick P
2024-03-18 17:12         ` Isaku Yamahata
2024-03-18 17:43           ` Edgecombe, Rick P
2024-03-18 23:16             ` Isaku Yamahata
2024-03-22 22:57               ` Isaku Yamahata
2024-03-22 23:05                 ` Edgecombe, Rick P
2024-02-26  8:27 ` [PATCH v19 121/130] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 122/130] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 123/130] KVM: TDX: Ignore setting up mce isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 124/130] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 125/130] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2024-04-22  1:56   ` Binbin Wu
2024-04-22 17:34     ` Isaku Yamahata
2024-02-26  8:27 ` [PATCH v19 126/130] KVM: TDX: Inhibit APICv for TDX guest isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 127/130] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 128/130] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 129/130] RFC: KVM: x86: Add x86 callback to check cpuid isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 130/130] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2 isaku.yamahata
2024-03-21 23:12   ` Edgecombe, Rick P
2024-03-22  7:10     ` Huang, Kai
2024-03-22 16:06       ` Edgecombe, Rick P
2024-03-25 11:14         ` Huang, Kai
2024-03-25 15:32           ` Edgecombe, Rick P
2024-03-25 21:17             ` Isaku Yamahata
2024-03-25 22:31             ` Huang, Kai
2024-03-25 22:37               ` Edgecombe, Rick P
2024-03-25 21:10           ` Isaku Yamahata
2024-03-23  1:54       ` Isaku Yamahata

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=fc97847d04f2b469d8f4cfceee84c7ef055ab1ac.1708933498.git.isaku.yamahata@intel.com \
    --to=isaku.yamahata@intel.com \
    --cc=chen.bo@intel.com \
    --cc=erdemaktas@google.com \
    --cc=hang.yuan@intel.com \
    --cc=isaku.yamahata@gmail.com \
    --cc=kai.huang@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=sagis@google.com \
    --cc=seanjc@google.com \
    --cc=tina.zhang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).