All of lore.kernel.org
 help / color / mirror / Atom feed
From: Zhi Wang <zhi.wang.linux@gmail.com>
To: Isaku Yamahata <isaku.yamahata@gmail.com>
Cc: isaku.yamahata@intel.com, kvm@vger.kernel.org,
	linux-kernel@vger.kernel.org, Paolo Bonzini <pbonzini@redhat.com>,
	erdemaktas@google.com, Sean Christopherson <seanjc@google.com>,
	Sagi Shahar <sagis@google.com>,
	David Matlack <dmatlack@google.com>,
	Kai Huang <kai.huang@intel.com>,
	Sean Christopherson <sean.j.christopherson@intel.com>
Subject: Re: [PATCH v13 016/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
Date: Fri, 31 Mar 2023 15:44:32 +0300	[thread overview]
Message-ID: <20230331154432.00001373@gmail.com> (raw)
In-Reply-To: <20230331001803.GE1112017@ls.amr.corp.intel.com>

On Thu, 30 Mar 2023 17:18:03 -0700
Isaku Yamahata <isaku.yamahata@gmail.com> wrote:

> On Wed, Mar 29, 2023 at 04:17:22PM -0700,
> Isaku Yamahata <isaku.yamahata@gmail.com> wrote:
> 
> > On Sat, Mar 25, 2023 at 10:43:06AM +0200,
> > Zhi Wang <zhi.wang.linux@gmail.com> wrote:
> > 
> > > On Sun, 12 Mar 2023 10:55:40 -0700
> > > isaku.yamahata@intel.com wrote:
> > > 
> > > Does this have to be a new generic ioctl with a dedicated new x86_ops? SNP
> > > does not use it at all and all the system-scoped ioctl of SNP going through
> > > the CCP driver. So getting system-scope information of TDX/SNP will end up
> > > differently.
> > > 
> > > Any thought, Sean? Moving getting SNP system-wide information to
> > > KVM dev ioctl seems not ideal and TDX does not have a dedicated driver like
> > > CCP. Maybe make this ioctl TDX-specific? KVM_TDX_DEV_OP?
> > 
> > We only need global parameters of the TDX module, and we don't interact with TDX
> > module at this point.  One alternative is to export those parameters via sysfs.
> > Also the existence of the sysfs node indicates that the TDX module is
> > loaded(initialized?) or not in addition to boot log.  Thus we can drop system
> > scope one.
> > What do you think?
> >

I like this idea and the patch below, it feels right for me now. It would be nice
if more folks can chime in and comment.
 
> > Regarding to other TDX KVM specific ioctls (KVM_TDX_INIT_VM, KVM_TDX_INIT_VCPU,
> > KVM_TDX_INIT_MEM_REGION, and KVM_TDX_FINALIZE_VM), they are specific to KVM.  So
> > I don't think it can be split out to independent driver.
> 

They can stay in KVM as they are KVM-specific. SNP also has KVM-specific ioctls
which wraps the SEV driver calls. At this level, both TDX and SNP go their specific
implementation without more abstraction other than KVM_ENCRYPT_MEMORY_OP. Their
strategies are aligned.

The problem of the previous approach was the abstraction that no other implementation
is using it. It is like, TDX wants a higher abstraction to cover both TDX and SNP,
but SNP is not using it, which makes the abstraction looks strange.

> Here is the patch to export those info via sysfs.
> 
> From e0744e506eb92e47d8317e489945a3ba804edfa7 Mon Sep 17 00:00:00 2001
> Message-Id: <e0744e506eb92e47d8317e489945a3ba804edfa7.1680221730.git.isaku.yamahata@intel.com>
> In-Reply-To: <8e0bc0e8e5d435f54f10c7642a862629ef2acb89.1680221729.git.isaku.yamahata@intel.com>
> References: <8e0bc0e8e5d435f54f10c7642a862629ef2acb89.1680221729.git.isaku.yamahata@intel.com>
> From: Isaku Yamahata <isaku.yamahata@intel.com>
> Date: Thu, 30 Mar 2023 00:05:03 -0700
> Subject: [PATCH] x86/virt/tdx: Export TD config params of TDX module via sysfs
> 
> TDX module has parameters for VMM to configure TD.  User space VMM, e.g.
> qemu, needs to know it. Export them to user space via sysfs.
> 
> TDX 1.0 provides TDH.SYS.INFO to provide system information in
> TDSYSINFO_STRUCT.  Its future extensibility is limited because of its
> struct.  From TDX 1.5, TDH.SYS.RD(metadata field_id) to read the info
> specified by field id.  So instead of exporting TDSYSINFO_STRUCT, adapt
> metadata way to export those system information.
> 
> Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
> ---
>  Documentation/ABI/testing/sysfs-firmware-tdx |  23 +++
>  arch/x86/include/asm/tdx.h                   |  33 ++++
>  arch/x86/virt/vmx/tdx/tdx.c                  | 164 +++++++++++++++++++
>  arch/x86/virt/vmx/tdx/tdx.h                  |  18 ++
>  4 files changed, 238 insertions(+)
>  create mode 100644 Documentation/ABI/testing/sysfs-firmware-tdx
> 
> diff --git a/Documentation/ABI/testing/sysfs-firmware-tdx b/Documentation/ABI/testing/sysfs-firmware-tdx
> new file mode 100644
> index 000000000000..1f26fb178144
> --- /dev/null
> +++ b/Documentation/ABI/testing/sysfs-firmware-tdx
> @@ -0,0 +1,23 @@
> +What:           /sys/firmware/tdx/tdx_module/metadata
> +Date:           March 2023
> +KernelVersion:  6.3
> +Contact:        Isaku Yamahata <isaku.yamahata@intel.com>, kvm@vger.kernel.org
> +Users:          qemu, libvirt
> +Description:
> +                The TDX feature requires a firmware that is known as the TDX
> +                module.  The TDX module exposes its metadata in the following
> +                read-only files.  The information corresponds to the TDX global
> +                metadata specified by 64bit field id.  The file name is hex
> +                string in lower case.  The value is binary.
> +                User space VMM like qemu needs refer to them to determine what
> +                parameters are needed or allowed to configure guest TDs.
> +
> +                ================== ============================================
> +                1900000300000000   ATTRIBUTES_FIXED0
> +                1900000300000001   ATTRIBUTES_FIXED1
> +                1900000300000002   XFAM_FIXED0
> +                1900000300000003   XFAM_FIXED1
> +                9900000100000004   NUM_CPUID_CONFIG
> +                9900000300000400   CPUID_LEAVES
> +                9900000300000500   CPUID_VALUES
> +                ================== ============================================
> \ No newline at end of file
> diff --git a/arch/x86/include/asm/tdx.h b/arch/x86/include/asm/tdx.h
> index 05870e5ed131..c650ac22a916 100644
> --- a/arch/x86/include/asm/tdx.h
> +++ b/arch/x86/include/asm/tdx.h
> @@ -110,6 +110,39 @@ struct tdx_cpuid_config {
>  	u32	edx;
>  } __packed;
>  
> +struct tdx_cpuid_config_leaf {
> +	u32	leaf;
> +	u32	sub_leaf;
> +} __packed;
> +static_assert(offsetof(struct tdx_cpuid_config, leaf) ==
> +	      offsetof(struct tdx_cpuid_config_leaf, leaf));
> +static_assert(offsetof(struct tdx_cpuid_config, sub_leaf) ==
> +	      offsetof(struct tdx_cpuid_config_leaf, sub_leaf));
> +static_assert(offsetofend(struct tdx_cpuid_config, sub_leaf) ==
> +	      sizeof(struct tdx_cpuid_config_leaf));
> +
> +struct tdx_cpuid_config_value {
> +	u32	eax;
> +	u32	ebx;
> +	u32	ecx;
> +	u32	edx;
> +} __packed;
> +static_assert(offsetof(struct tdx_cpuid_config, eax) -
> +	      offsetof(struct tdx_cpuid_config, eax) ==
> +	      offsetof(struct tdx_cpuid_config_value, eax));
> +static_assert(offsetof(struct tdx_cpuid_config, ebx) -
> +	      offsetof(struct tdx_cpuid_config, eax) ==
> +	      offsetof(struct tdx_cpuid_config_value, ebx));
> +static_assert(offsetof(struct tdx_cpuid_config, ecx) -
> +	      offsetof(struct tdx_cpuid_config, eax) ==
> +	      offsetof(struct tdx_cpuid_config_value, ecx));
> +static_assert(offsetof(struct tdx_cpuid_config, edx) -
> +	      offsetof(struct tdx_cpuid_config, eax) ==
> +	      offsetof(struct tdx_cpuid_config_value, edx));
> +static_assert(offsetofend(struct tdx_cpuid_config, edx) -
> +	      offsetof(struct tdx_cpuid_config, eax) ==
> +	      sizeof(struct tdx_cpuid_config_value));
> +
>  #define TDSYSINFO_STRUCT_SIZE		1024
>  #define TDSYSINFO_STRUCT_ALIGNMENT	1024
>  
> diff --git a/arch/x86/virt/vmx/tdx/tdx.c b/arch/x86/virt/vmx/tdx/tdx.c
> index f9f9c1b76501..56ca520d67d6 100644
> --- a/arch/x86/virt/vmx/tdx/tdx.c
> +++ b/arch/x86/virt/vmx/tdx/tdx.c
> @@ -33,6 +33,12 @@
>  #include <asm/tdx.h>
>  #include "tdx.h"
>  
> +#ifdef CONFIG_SYSFS
> +static int tdx_sysfs_init(void);
> +#else
> +static inline int tdx_sysfs_init(void) { return 0;}
> +#endif
> +
>  u32 tdx_global_keyid __ro_after_init;
>  EXPORT_SYMBOL_GPL(tdx_global_keyid);
>  static u32 tdx_guest_keyid_start __ro_after_init;
> @@ -399,6 +405,10 @@ static int __tdx_get_sysinfo(struct tdsysinfo_struct *sysinfo,
>  	if (ret)
>  		return ret;
>  
> +	ret = tdx_sysfs_init();
> +	if (ret)
> +		return ret;
> +
>  	pr_info("TDX module: atributes 0x%x, vendor_id 0x%x, major_version %u, minor_version %u, build_date %u, build_num %u",
>  		sysinfo->attributes,	sysinfo->vendor_id,
>  		sysinfo->major_version, sysinfo->minor_version,
> @@ -1367,3 +1377,157 @@ int tdx_enable(void)
>  	return ret;
>  }
>  EXPORT_SYMBOL_GPL(tdx_enable);
> +
> +#ifdef CONFIG_SYSFS
> +
> +static struct kobject *tdx_kobj;
> +static struct kobject *tdx_module_kobj;
> +static struct kobject *tdx_metadata_kobj;
> +
> +#define TDX_METADATA_ATTR(_name, field_id_name, _size)		\
> +static struct bin_attribute tdx_metadata_ ## _name = {		\
> +	.attr = {						\
> +		.name = field_id_name,				\
> +		.mode = 0444,					\
> +	},							\
> +	.size = _size,						\
> +	.read = tdx_metadata_ ## _name ## _show,		\
> +}
> +
> +#define TDX_METADATA_ATTR_SHOW(_name, field_id_name)					\
> +static ssize_t tdx_metadata_ ## _name ## _show(struct file *filp, struct kobject *kobj,	\
> +					       struct bin_attribute *bin_attr,		\
> +					       char *buf, loff_t offset, size_t count)	\
> +{											\
> +	struct tdsysinfo_struct *sysinfo = &PADDED_STRUCT(tdsysinfo);			\
> +											\
> +	return memory_read_from_buffer(buf, count, &offset,				\
> +				       &sysinfo->_name,					\
> +				       sizeof(sysinfo->_name));				\
> +}											\
> +TDX_METADATA_ATTR(_name, field_id_name, sizeof_field(struct tdsysinfo_struct, _name))
> +
> +TDX_METADATA_ATTR_SHOW(attributes_fixed0, TDX_METADATA_ATTRIBUTES_FIXED0_NAME);
> +TDX_METADATA_ATTR_SHOW(attributes_fixed1, TDX_METADATA_ATTRIBUTES_FIXED1_NAME);
> +TDX_METADATA_ATTR_SHOW(xfam_fixed0, TDX_METADATA_XFAM_FIXED0_NAME);
> +TDX_METADATA_ATTR_SHOW(xfam_fixed1, TDX_METADATA_XFAM_FIXED1_NAME);
> +
> +static ssize_t tdx_metadata_num_cpuid_config_show(struct file *filp, struct kobject *kobj,
> +						  struct bin_attribute *bin_attr,
> +						  char *buf, loff_t offset, size_t count)
> +{
> +	struct tdsysinfo_struct *sysinfo = &PADDED_STRUCT(tdsysinfo);
> +	/*
> +	 * Although tdsysinfo_struct.num_cpuid_config is defined as u32 for
> +	 * alignment, TDX 1.5 defines metadata NUM_CONFIG_CPUID as u16.
> +	 */
> +	u16 tmp = (u16)sysinfo->num_cpuid_config;
> +
> +	WARN_ON_ONCE(tmp != sysinfo->num_cpuid_config);
> +	return memory_read_from_buffer(buf, count, &offset, &tmp, sizeof(tmp));
> +}
> +TDX_METADATA_ATTR(num_cpuid_config, TDX_METADATA_NUM_CPUID_CONFIG_NAME, sizeof(u16));
> +
> +static ssize_t tdx_metadata_cpuid_leaves_show(struct file *filp, struct kobject *kobj,
> +					      struct bin_attribute *bin_attr, char *buf,
> +					      loff_t offset, size_t count)
> +{
> +	struct tdsysinfo_struct *sysinfo = &PADDED_STRUCT(tdsysinfo);
> +	ssize_t r;
> +	struct tdx_cpuid_config_leaf *tmp;
> +	u32 i;
> +
> +	tmp = kmalloc(bin_attr->size, GFP_KERNEL);
> +	if (!tmp)
> +		return -ENOMEM;
> +
> +	for (i = 0; i < sysinfo->num_cpuid_config; i++) {
> +		struct tdx_cpuid_config *c = &sysinfo->cpuid_configs[i];
> +		struct tdx_cpuid_config_leaf *leaf = (struct tdx_cpuid_config_leaf *)c;
> +
> +		memcpy(tmp + i, leaf, sizeof(*leaf));
> +	}
> +
> +	r = memory_read_from_buffer(buf, count, &offset, tmp, bin_attr->size);
> +	kfree(tmp);
> +	return r;
> +}
> +
> +TDX_METADATA_ATTR(cpuid_leaves, TDX_METADATA_CPUID_LEAVES_NAME, 0);
> +
> +static ssize_t tdx_metadata_cpuid_values_show(struct file *filp, struct kobject *kobj,
> +					      struct bin_attribute *bin_attr, char *buf,
> +					      loff_t offset, size_t count)
> +{
> +	struct tdsysinfo_struct *sysinfo = &PADDED_STRUCT(tdsysinfo);
> +	struct tdx_cpuid_config_value *tmp;
> +	ssize_t r;
> +	u32 i;
> +
> +	tmp = kmalloc(bin_attr->size, GFP_KERNEL);
> +	if (!tmp)
> +		return -ENOMEM;
> +
> +	for (i = 0; i < sysinfo->num_cpuid_config; i++) {
> +		struct tdx_cpuid_config *c = &sysinfo->cpuid_configs[i];
> +		struct tdx_cpuid_config_value *value = (struct tdx_cpuid_config_value *)&c->eax;
> +
> +		memcpy(tmp + i, value, sizeof(*value));
> +	}
> +
> +	r = memory_read_from_buffer(buf, count, &offset, tmp, bin_attr->size);
> +	kfree(tmp);
> +	return r;
> +}
> +
> +TDX_METADATA_ATTR(cpuid_values, TDX_METADATA_CPUID_VALUES_NAME, 0);
> +
> +static struct bin_attribute *tdx_metadata_attrs[] = {
> +	&tdx_metadata_attributes_fixed0,
> +	&tdx_metadata_attributes_fixed1,
> +	&tdx_metadata_xfam_fixed0,
> +	&tdx_metadata_xfam_fixed1,
> +	&tdx_metadata_num_cpuid_config,
> +	&tdx_metadata_cpuid_leaves,
> +	&tdx_metadata_cpuid_values,
> +	NULL,
> +};
> +
> +static const struct attribute_group tdx_metadata_attr_group = {
> +	.bin_attrs = tdx_metadata_attrs,
> +};
> +
> +static int tdx_sysfs_init(void)
> +{
> +	struct tdsysinfo_struct *sysinfo;
> +	int ret;
> +
> +	tdx_kobj = kobject_create_and_add("tdx", firmware_kobj);
> +	if (!tdx_kobj) {
> +		pr_err("kobject_create_and_add tdx failed\n");
> +		return -EINVAL;
> +	}
> +
> +	tdx_module_kobj = kobject_create_and_add("tdx_module", tdx_kobj);
> +	if (!tdx_module_kobj) {
> +		pr_err("kobject_create_and_add tdx_module failed\n");
> +		return -EINVAL;
> +	}
> +	tdx_metadata_kobj = kobject_create_and_add("metadata", tdx_module_kobj);
> +	if (!tdx_metadata_kobj) {
> +		pr_err("Sysfs exporting tdx global metadata failed %d\n", ret);
> +		return -EINVAL;
> +	}
> +
> +	sysinfo = &PADDED_STRUCT(tdsysinfo);
> +	tdx_metadata_cpuid_leaves.size = sysinfo->num_cpuid_config *
> +		sizeof(struct tdx_cpuid_config_leaf);
> +	tdx_metadata_cpuid_values.size = sysinfo->num_cpuid_config *
> +		sizeof(struct tdx_cpuid_config_value);
> +	ret = sysfs_create_group(tdx_metadata_kobj, &tdx_metadata_attr_group);
> +	if (ret)
> +		pr_err("Sysfs exporting tdx module attributes failed %d\n", ret);
> +
> +	return ret;
> +}
> +#endif
> diff --git a/arch/x86/virt/vmx/tdx/tdx.h b/arch/x86/virt/vmx/tdx/tdx.h
> index db0cbcceb5b3..a48f38fe6cc4 100644
> --- a/arch/x86/virt/vmx/tdx/tdx.h
> +++ b/arch/x86/virt/vmx/tdx/tdx.h
> @@ -93,4 +93,22 @@ struct tdmr_info_list {
>  	int max_tdmrs;	/* How many 'tdmr_info's are allocated */
>  };
>  
> +/* TDX metadata base field id. */
> +#define TDX_METADATA_ATTRIBUTES_FIXED0		0x1900000300000000ULL
> +#define TDX_METADATA_ATTRIBUTES_FIXED1		0x1900000300000001ULL
> +#define TDX_METADATA_XFAM_FIXED0		0x1900000300000002ULL
> +#define TDX_METADATA_XFAM_FIXED1		0x1900000300000003ULL
> +#define TDX_METADATA_NUM_CPUID_CONFIG		0x9900000100000004ULL
> +#define TDX_METADATA_CPUID_LEAVES		0x9900000300000400ULL
> +#define TDX_METADATA_CPUID_VALUES		0x9900000300000500ULL
> +
> +/* File name for sysfs: hex with lower case. */
> +#define TDX_METADATA_ATTRIBUTES_FIXED0_NAME	"1900000300000000"
> +#define TDX_METADATA_ATTRIBUTES_FIXED1_NAME	"1900000300000001"
> +#define TDX_METADATA_XFAM_FIXED0_NAME		"1900000300000002"
> +#define TDX_METADATA_XFAM_FIXED1_NAME		"1900000300000003"
> +#define TDX_METADATA_NUM_CPUID_CONFIG_NAME	"9900000100000004"
> +#define TDX_METADATA_CPUID_LEAVES_NAME		"9900000300000400"
> +#define TDX_METADATA_CPUID_VALUES_NAME		"9900000300000500"
> +
>  #endif


  reply	other threads:[~2023-03-31 12:47 UTC|newest]

Thread overview: 193+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-03-12 17:55 [PATCH v13 000/113] KVM TDX basic feature support isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2023-03-13 14:49   ` Wang, Wei W
2023-03-13 18:40     ` Isaku Yamahata
2023-03-14  1:57       ` Wang, Wei W
2023-05-23  2:23   ` Wen, Qian
2023-05-28  6:10     ` Isaku Yamahata
2023-03-12 17:55 ` [PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2023-03-14  2:38   ` Huang, Kai
2023-03-15  7:27     ` Isaku Yamahata
2023-03-15  9:46       ` Huang, Kai
2023-03-15 10:35         ` Huang, Kai
2023-03-16  0:27         ` Isaku Yamahata
2023-03-24 10:41           ` Huang, Kai
2023-03-28 23:58             ` Isaku Yamahata
2023-03-29  1:13               ` Huang, Kai
2023-03-29 21:56                 ` Isaku Yamahata
2023-03-29 23:17                   ` Huang, Kai
2023-03-30  1:04                     ` Isaku Yamahata
2023-04-05 20:07                       ` Isaku Yamahata
2023-04-05 23:10                         ` Huang, Kai
2023-03-12 17:55 ` [PATCH v13 004/113] KVM: TDX: Initialize logical processor when onlined isaku.yamahata
2023-03-15  9:57   ` Huang, Kai
2023-03-12 17:55 ` [PATCH v13 005/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2023-03-15 10:42   ` Huang, Kai
2023-03-16 15:41     ` Isaku Yamahata
2023-03-16 21:42       ` Huang, Kai
2023-03-12 17:55 ` [PATCH v13 006/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs isaku.yamahata
2023-03-15 10:44   ` Huang, Kai
2023-03-16 15:34     ` Isaku Yamahata
2023-03-12 17:55 ` [PATCH v13 007/113] KVM: TDX: Make TDX VM type supported isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 008/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 009/113] KVM: TDX: Define " isaku.yamahata
2023-03-13 11:37   ` Xiaoyao Li
2023-03-13 19:16     ` Isaku Yamahata
2023-03-12 17:55 ` [PATCH v13 010/113] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2023-03-24 15:19   ` Zhi Wang
2023-03-12 17:55 ` [PATCH v13 012/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 013/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 014/113] x86/cpu: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2023-03-24 16:35   ` Zhi Wang
2023-03-12 17:55 ` [PATCH v13 015/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 016/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2023-03-25  8:43   ` Zhi Wang
2023-03-29 23:17     ` Isaku Yamahata
2023-03-31  0:18       ` Isaku Yamahata
2023-03-31 12:44         ` Zhi Wang [this message]
2023-04-03  3:46           ` Xiaoyao Li
2023-04-03 14:28             ` Zhi Wang
2023-04-05 18:07               ` Isaku Yamahata
2023-04-06 16:25                 ` Zhi Wang
2024-01-31  6:25         ` Dan Williams
2023-03-31  6:59     ` Xiaoyao Li
2023-03-31 12:31       ` Zhi Wang
2023-03-12 17:55 ` [PATCH v13 017/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2023-03-25  9:05   ` Zhi Wang
2023-03-29 23:22     ` Isaku Yamahata
2023-03-12 17:55 ` [PATCH v13 018/113] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific isaku.yamahata
2023-03-25 18:13   ` Zhi Wang
2023-03-29 23:32     ` Isaku Yamahata
2023-04-01  7:00       ` Zhi Wang
2023-03-12 17:55 ` [PATCH v13 019/113] KVM: TDX: create/destroy VM structure isaku.yamahata
2023-03-24  2:27   ` Wang, Lei
2023-03-24  5:12     ` Wang, Wei W
2023-03-26 11:09   ` Zhi Wang
2023-03-30  1:01     ` Isaku Yamahata
2023-04-02  8:41       ` Zhi Wang
2023-04-05 18:16         ` Isaku Yamahata
2023-04-06 16:04           ` Zhi Wang
2023-05-23  8:17   ` Wen, Qian
2023-05-28  8:17     ` Isaku Yamahata
2023-03-12 17:55 ` [PATCH v13 020/113] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2023-04-04 19:23   ` Zhi Wang
2023-04-05 18:50     ` Isaku Yamahata
2023-03-12 17:55 ` [PATCH v13 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2023-04-02  8:50   ` Zhi Wang
2023-04-19  8:21     ` Like Xu
2023-05-28  8:26       ` Isaku Yamahata
2023-05-29 14:19         ` Like Xu
2023-05-30 23:00           ` Isaku Yamahata
2023-03-12 17:55 ` [PATCH v13 022/113] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 023/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 024/113] KVM: TDX: allocate/free TDX vcpu structure isaku.yamahata
2023-04-04 19:44   ` Zhi Wang
2023-04-05 19:06     ` Isaku Yamahata
2023-03-12 17:55 ` [PATCH v13 025/113] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 030/113] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values isaku.yamahata
2023-04-05  7:11   ` Zhi Wang
2023-03-12 17:55 ` [PATCH v13 031/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 032/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 033/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 034/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2023-03-12 17:55 ` [PATCH v13 035/113] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 036/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 037/113] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 038/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 039/113] KVM: x86/mmu: Assume guest MMIOs are shared isaku.yamahata
2023-03-28  2:39   ` Xu Yilun
2023-03-29 23:56     ` Isaku Yamahata
2023-03-12 17:56 ` [PATCH v13 040/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 041/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 042/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 043/113] KVM: Add flags to struct kvm_gfn_range isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 044/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 045/113] KVM: x86/tdp_mmu: Sprinkle __must_check isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 048/113] KVM: x86/mmu: Disallow dirty logging for x86 TDX isaku.yamahata
2023-04-22  8:18   ` Zhi Wang
2023-04-24 15:51     ` Sean Christopherson
2023-03-12 17:56 ` [PATCH v13 049/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 050/113] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 051/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 052/113] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 053/113] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 054/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 055/113] KVM: TDX: Require TDP MMU and mmio caching for TDX isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 056/113] KVM: TDX: TDP MMU TDX support isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 057/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2023-03-16 10:38   ` Huang, Kai
2023-03-25  1:12     ` Isaku Yamahata
2023-03-27  9:54       ` Huang, Kai
2023-03-30  1:15         ` Isaku Yamahata
2023-03-30  1:36           ` Huang, Kai
2023-03-12 17:56 ` [PATCH v13 058/113] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 059/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 060/113] KVM: TDX: Create initial guest memory isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 061/113] KVM: TDX: Finalize VM initialization isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 062/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 063/113] KVM: TDX: Add helper assembly function to TDX vcpu isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 064/113] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2023-04-11 12:49   ` Zhi Wang
2023-05-28  8:38     ` Isaku Yamahata
2023-03-12 17:56 ` [PATCH v13 065/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 066/113] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 067/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 068/113] KVM: TDX: restore user ret MSRs isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 069/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 070/113] KVM: TDX: complete interrupts after tdexit isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 071/113] KVM: TDX: restore debug store when TD exit isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 072/113] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 073/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 074/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 075/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 076/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 077/113] KVM: TDX: Implement interrupt injection isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 078/113] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 079/113] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 080/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 081/113] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 082/113] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 083/113] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 084/113] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 085/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 086/113] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 087/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 088/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 089/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 090/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 091/113] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 092/113] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 093/113] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 094/113] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2023-03-12 17:56 ` [PATCH v13 095/113] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 096/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 097/113] KVM: TDX: Handle TDX PV report fatal error hypercall isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 098/113] KVM: TDX: Handle TDX PV map_gpa hypercall isaku.yamahata
2023-04-18 19:09   ` Vishal Annapurve
2023-04-19 10:38     ` Zhi Wang
2023-04-27  2:15       ` Vishal Annapurve
2023-04-27 15:51         ` Sean Christopherson
2023-04-28 19:17   ` Ryan Afranji
2023-03-12 17:57 ` [PATCH v13 099/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 100/113] KVM: TDX: Silently discard SMI request isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 101/113] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 102/113] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 103/113] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 104/113] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 105/113] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 106/113] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 107/113] KVM: TDX: Ignore setting up mce isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 108/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 109/113] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 110/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 111/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 112/113] RFC: KVM: TDX: Make busy with S-EPT on entry bug isaku.yamahata
2023-03-12 17:57 ` [PATCH v13 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series isaku.yamahata

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230331154432.00001373@gmail.com \
    --to=zhi.wang.linux@gmail.com \
    --cc=dmatlack@google.com \
    --cc=erdemaktas@google.com \
    --cc=isaku.yamahata@gmail.com \
    --cc=isaku.yamahata@intel.com \
    --cc=kai.huang@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=sagis@google.com \
    --cc=sean.j.christopherson@intel.com \
    --cc=seanjc@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.