kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: isaku.yamahata@intel.com
To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org
Cc: isaku.yamahata@intel.com, isaku.yamahata@gmail.com,
	Paolo Bonzini <pbonzini@redhat.com>,
	erdemaktas@google.com, Sean Christopherson <seanjc@google.com>,
	Sagi Shahar <sagis@google.com>, Kai Huang <kai.huang@intel.com>,
	chen.bo@intel.com, hang.yuan@intel.com, tina.zhang@intel.com,
	Xiaoyao Li <xiaoyao.li@intel.com>
Subject: [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
Date: Mon, 26 Feb 2024 00:25:41 -0800	[thread overview]
Message-ID: <5eca97e6a3978cf4dcf1cff21be6ec8b639a66b9.1708933498.git.isaku.yamahata@intel.com> (raw)
In-Reply-To: <cover.1708933498.git.isaku.yamahata@intel.com>

From: Isaku Yamahata <isaku.yamahata@intel.com>

TDX requires additional parameters for TDX VM for confidential execution to
protect the confidentiality of its memory contents and CPU state from any
other software, including VMM.  When creating a guest TD VM before creating
vcpu, the number of vcpu, TSC frequency (the values are the same among
vcpus, and it can't change.)  CPUIDs which the TDX module emulates.  Guest
TDs can trust those CPUIDs and sha384 values for measurement.

Add a new subcommand, KVM_TDX_INIT_VM, to pass parameters for the TDX
guest.  It assigns an encryption key to the TDX guest for memory
encryption.  TDX encrypts memory per guest basis.  The device model, say
qemu, passes per-VM parameters for the TDX guest.  The maximum number of
vcpus, TSC frequency (TDX guest has fixed VM-wide TSC frequency, not per
vcpu.  The TDX guest can not change it.), attributes (production or debug),
available extended features (which configure guest XCR0, IA32_XSS MSR),
CPUIDs, sha384 measurements, etc.

Call this subcommand before creating vcpu and KVM_SET_CPUID2, i.e.  CPUID
configurations aren't available yet.  So CPUIDs configuration values need
to be passed in struct kvm_tdx_init_vm.  The device model's responsibility
to make this CPUID config for KVM_TDX_INIT_VM and KVM_SET_CPUID2.

Signed-off-by: Xiaoyao Li <xiaoyao.li@intel.com>
Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>

---
v19:
- Check NO_RBP_MOD of feature0 and set it
- Update the comment for PT and CET

v18:
- remove the change of tools/arch/x86/include/uapi/asm/kvm.h
- typo in comment. sha348 => sha384
- updated comment in setup_tdparams_xfam()
- fix setup_tdparams_xfam() to use init_vm instead of td_params

v15 -> v16:
- Removed AMX check as the KVM upstream supports AMX.
- Added CET flag to guest supported xss

v14 -> v15:
- add check if the reserved area of init_vm is zero

Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
---
 arch/x86/include/uapi/asm/kvm.h |  27 ++++
 arch/x86/kvm/cpuid.c            |   7 +
 arch/x86/kvm/cpuid.h            |   2 +
 arch/x86/kvm/vmx/tdx.c          | 273 ++++++++++++++++++++++++++++++--
 arch/x86/kvm/vmx/tdx.h          |  18 +++
 arch/x86/kvm/vmx/tdx_arch.h     |   6 +
 6 files changed, 323 insertions(+), 10 deletions(-)

diff --git a/arch/x86/include/uapi/asm/kvm.h b/arch/x86/include/uapi/asm/kvm.h
index e28189c81691..9ac0246bd974 100644
--- a/arch/x86/include/uapi/asm/kvm.h
+++ b/arch/x86/include/uapi/asm/kvm.h
@@ -570,6 +570,7 @@ struct kvm_pmu_event_filter {
 /* Trust Domain eXtension sub-ioctl() commands. */
 enum kvm_tdx_cmd_id {
 	KVM_TDX_CAPABILITIES = 0,
+	KVM_TDX_INIT_VM,
 
 	KVM_TDX_CMD_NR_MAX,
 };
@@ -621,4 +622,30 @@ struct kvm_tdx_capabilities {
 	struct kvm_tdx_cpuid_config cpuid_configs[];
 };
 
+struct kvm_tdx_init_vm {
+	__u64 attributes;
+	__u64 mrconfigid[6];	/* sha384 digest */
+	__u64 mrowner[6];	/* sha384 digest */
+	__u64 mrownerconfig[6];	/* sha384 digest */
+	/*
+	 * For future extensibility to make sizeof(struct kvm_tdx_init_vm) = 8KB.
+	 * This should be enough given sizeof(TD_PARAMS) = 1024.
+	 * 8KB was chosen given because
+	 * sizeof(struct kvm_cpuid_entry2) * KVM_MAX_CPUID_ENTRIES(=256) = 8KB.
+	 */
+	__u64 reserved[1004];
+
+	/*
+	 * Call KVM_TDX_INIT_VM before vcpu creation, thus before
+	 * KVM_SET_CPUID2.
+	 * This configuration supersedes KVM_SET_CPUID2s for VCPUs because the
+	 * TDX module directly virtualizes those CPUIDs without VMM.  The user
+	 * space VMM, e.g. qemu, should make KVM_SET_CPUID2 consistent with
+	 * those values.  If it doesn't, KVM may have wrong idea of vCPUIDs of
+	 * the guest, and KVM may wrongly emulate CPUIDs or MSRs that the TDX
+	 * module doesn't virtualize.
+	 */
+	struct kvm_cpuid2 cpuid;
+};
+
 #endif /* _ASM_X86_KVM_H */
diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c
index adba49afb5fe..8cdcd6f406aa 100644
--- a/arch/x86/kvm/cpuid.c
+++ b/arch/x86/kvm/cpuid.c
@@ -1443,6 +1443,13 @@ int kvm_dev_ioctl_get_cpuid(struct kvm_cpuid2 *cpuid,
 	return r;
 }
 
+struct kvm_cpuid_entry2 *kvm_find_cpuid_entry2(
+	struct kvm_cpuid_entry2 *entries, int nent, u32 function, u64 index)
+{
+	return cpuid_entry2_find(entries, nent, function, index);
+}
+EXPORT_SYMBOL_GPL(kvm_find_cpuid_entry2);
+
 struct kvm_cpuid_entry2 *kvm_find_cpuid_entry_index(struct kvm_vcpu *vcpu,
 						    u32 function, u32 index)
 {
diff --git a/arch/x86/kvm/cpuid.h b/arch/x86/kvm/cpuid.h
index 856e3037e74f..215d1c68c6d1 100644
--- a/arch/x86/kvm/cpuid.h
+++ b/arch/x86/kvm/cpuid.h
@@ -13,6 +13,8 @@ void kvm_set_cpu_caps(void);
 
 void kvm_update_cpuid_runtime(struct kvm_vcpu *vcpu);
 void kvm_update_pv_runtime(struct kvm_vcpu *vcpu);
+struct kvm_cpuid_entry2 *kvm_find_cpuid_entry2(struct kvm_cpuid_entry2 *entries,
+					       int nent, u32 function, u64 index);
 struct kvm_cpuid_entry2 *kvm_find_cpuid_entry_index(struct kvm_vcpu *vcpu,
 						    u32 function, u32 index);
 struct kvm_cpuid_entry2 *kvm_find_cpuid_entry(struct kvm_vcpu *vcpu,
diff --git a/arch/x86/kvm/vmx/tdx.c b/arch/x86/kvm/vmx/tdx.c
index 1cf2b15da257..b11f105db3cd 100644
--- a/arch/x86/kvm/vmx/tdx.c
+++ b/arch/x86/kvm/vmx/tdx.c
@@ -8,7 +8,6 @@
 #include "mmu.h"
 #include "tdx_arch.h"
 #include "tdx.h"
-#include "tdx_ops.h"
 #include "x86.h"
 
 #undef pr_fmt
@@ -350,18 +349,21 @@ static int tdx_do_tdh_mng_key_config(void *param)
 	return 0;
 }
 
-static int __tdx_td_init(struct kvm *kvm);
-
 int tdx_vm_init(struct kvm *kvm)
 {
+	/*
+	 * This function initializes only KVM software construct.  It doesn't
+	 * initialize TDX stuff, e.g. TDCS, TDR, TDCX, HKID etc.
+	 * It is handled by KVM_TDX_INIT_VM, __tdx_td_init().
+	 */
+
 	/*
 	 * TDX has its own limit of the number of vcpus in addition to
 	 * KVM_MAX_VCPUS.
 	 */
 	kvm->max_vcpus = min(kvm->max_vcpus, TDX_MAX_VCPUS);
 
-	/* Place holder for TDX specific logic. */
-	return __tdx_td_init(kvm);
+	return 0;
 }
 
 static int tdx_get_capabilities(struct kvm_tdx_cmd *cmd)
@@ -416,9 +418,162 @@ static int tdx_get_capabilities(struct kvm_tdx_cmd *cmd)
 	return ret;
 }
 
-static int __tdx_td_init(struct kvm *kvm)
+static int setup_tdparams_eptp_controls(struct kvm_cpuid2 *cpuid,
+					struct td_params *td_params)
+{
+	const struct kvm_cpuid_entry2 *entry;
+	int max_pa = 36;
+
+	entry = kvm_find_cpuid_entry2(cpuid->entries, cpuid->nent, 0x80000008, 0);
+	if (entry)
+		max_pa = entry->eax & 0xff;
+
+	td_params->eptp_controls = VMX_EPTP_MT_WB;
+	/*
+	 * No CPU supports 4-level && max_pa > 48.
+	 * "5-level paging and 5-level EPT" section 4.1 4-level EPT
+	 * "4-level EPT is limited to translating 48-bit guest-physical
+	 *  addresses."
+	 * cpu_has_vmx_ept_5levels() check is just in case.
+	 */
+	if (!cpu_has_vmx_ept_5levels() && max_pa > 48)
+		return -EINVAL;
+	if (cpu_has_vmx_ept_5levels() && max_pa > 48) {
+		td_params->eptp_controls |= VMX_EPTP_PWL_5;
+		td_params->exec_controls |= TDX_EXEC_CONTROL_MAX_GPAW;
+	} else {
+		td_params->eptp_controls |= VMX_EPTP_PWL_4;
+	}
+
+	return 0;
+}
+
+static void setup_tdparams_cpuids(struct kvm_cpuid2 *cpuid,
+				  struct td_params *td_params)
+{
+	int i;
+
+	/*
+	 * td_params.cpuid_values: The number and the order of cpuid_value must
+	 * be same to the one of struct tdsysinfo.{num_cpuid_config, cpuid_configs}
+	 * It's assumed that td_params was zeroed.
+	 */
+	for (i = 0; i < tdx_info->num_cpuid_config; i++) {
+		const struct kvm_tdx_cpuid_config *c = &tdx_info->cpuid_configs[i];
+		/* KVM_TDX_CPUID_NO_SUBLEAF means index = 0. */
+		u32 index = c->sub_leaf == KVM_TDX_CPUID_NO_SUBLEAF ? 0 : c->sub_leaf;
+		const struct kvm_cpuid_entry2 *entry =
+			kvm_find_cpuid_entry2(cpuid->entries, cpuid->nent,
+					      c->leaf, index);
+		struct tdx_cpuid_value *value = &td_params->cpuid_values[i];
+
+		if (!entry)
+			continue;
+
+		/*
+		 * tdsysinfo.cpuid_configs[].{eax, ebx, ecx, edx}
+		 * bit 1 means it can be configured to zero or one.
+		 * bit 0 means it must be zero.
+		 * Mask out non-configurable bits.
+		 */
+		value->eax = entry->eax & c->eax;
+		value->ebx = entry->ebx & c->ebx;
+		value->ecx = entry->ecx & c->ecx;
+		value->edx = entry->edx & c->edx;
+	}
+}
+
+static int setup_tdparams_xfam(struct kvm_cpuid2 *cpuid, struct td_params *td_params)
+{
+	const struct kvm_cpuid_entry2 *entry;
+	u64 guest_supported_xcr0;
+	u64 guest_supported_xss;
+
+	/* Setup td_params.xfam */
+	entry = kvm_find_cpuid_entry2(cpuid->entries, cpuid->nent, 0xd, 0);
+	if (entry)
+		guest_supported_xcr0 = (entry->eax | ((u64)entry->edx << 32));
+	else
+		guest_supported_xcr0 = 0;
+	guest_supported_xcr0 &= kvm_caps.supported_xcr0;
+
+	entry = kvm_find_cpuid_entry2(cpuid->entries, cpuid->nent, 0xd, 1);
+	if (entry)
+		guest_supported_xss = (entry->ecx | ((u64)entry->edx << 32));
+	else
+		guest_supported_xss = 0;
+
+	/*
+	 * PT and CET can be exposed to TD guest regardless of KVM's XSS, PT
+	 * and, CET support.
+	 */
+	guest_supported_xss &=
+		(kvm_caps.supported_xss | XFEATURE_MASK_PT | TDX_TD_XFAM_CET);
+
+	td_params->xfam = guest_supported_xcr0 | guest_supported_xss;
+	if (td_params->xfam & XFEATURE_MASK_LBR) {
+		/*
+		 * TODO: once KVM supports LBR(save/restore LBR related
+		 * registers around TDENTER), remove this guard.
+		 */
+#define MSG_LBR	"TD doesn't support LBR yet. KVM needs to save/restore IA32_LBR_DEPTH properly.\n"
+		pr_warn(MSG_LBR);
+		return -EOPNOTSUPP;
+	}
+
+	return 0;
+}
+
+static int setup_tdparams(struct kvm *kvm, struct td_params *td_params,
+			struct kvm_tdx_init_vm *init_vm)
+{
+	struct kvm_cpuid2 *cpuid = &init_vm->cpuid;
+	int ret;
+
+	if (kvm->created_vcpus)
+		return -EBUSY;
+
+	if (init_vm->attributes & TDX_TD_ATTRIBUTE_PERFMON) {
+		/*
+		 * TODO: save/restore PMU related registers around TDENTER.
+		 * Once it's done, remove this guard.
+		 */
+#define MSG_PERFMON	"TD doesn't support perfmon yet. KVM needs to save/restore host perf registers properly.\n"
+		pr_warn(MSG_PERFMON);
+		return -EOPNOTSUPP;
+	}
+
+	td_params->max_vcpus = kvm->max_vcpus;
+	td_params->attributes = init_vm->attributes;
+	td_params->exec_controls = TDX_CONTROL_FLAG_NO_RBP_MOD;
+	td_params->tsc_frequency = TDX_TSC_KHZ_TO_25MHZ(kvm->arch.default_tsc_khz);
+
+	ret = setup_tdparams_eptp_controls(cpuid, td_params);
+	if (ret)
+		return ret;
+	setup_tdparams_cpuids(cpuid, td_params);
+	ret = setup_tdparams_xfam(cpuid, td_params);
+	if (ret)
+		return ret;
+
+#define MEMCPY_SAME_SIZE(dst, src)				\
+	do {							\
+		BUILD_BUG_ON(sizeof(dst) != sizeof(src));	\
+		memcpy((dst), (src), sizeof(dst));		\
+	} while (0)
+
+	MEMCPY_SAME_SIZE(td_params->mrconfigid, init_vm->mrconfigid);
+	MEMCPY_SAME_SIZE(td_params->mrowner, init_vm->mrowner);
+	MEMCPY_SAME_SIZE(td_params->mrownerconfig, init_vm->mrownerconfig);
+
+	return 0;
+}
+
+static int __tdx_td_init(struct kvm *kvm, struct td_params *td_params,
+			 u64 *seamcall_err)
 {
 	struct kvm_tdx *kvm_tdx = to_kvm_tdx(kvm);
+	struct tdx_module_args out;
 	cpumask_var_t packages;
 	unsigned long *tdcs_pa = NULL;
 	unsigned long tdr_pa = 0;
@@ -426,6 +581,7 @@ static int __tdx_td_init(struct kvm *kvm)
 	int ret, i;
 	u64 err;
 
+	*seamcall_err = 0;
 	ret = tdx_guest_keyid_alloc();
 	if (ret < 0)
 		return ret;
@@ -540,10 +696,23 @@ static int __tdx_td_init(struct kvm *kvm)
 		}
 	}
 
-	/*
-	 * Note, TDH_MNG_INIT cannot be invoked here.  TDH_MNG_INIT requires a dedicated
-	 * ioctl() to define the configure CPUID values for the TD.
-	 */
+	err = tdh_mng_init(kvm_tdx->tdr_pa, __pa(td_params), &out);
+	if ((err & TDX_SEAMCALL_STATUS_MASK) == TDX_OPERAND_INVALID) {
+		/*
+		 * Because a user gives operands, don't warn.
+		 * Return a hint to the user because it's sometimes hard for the
+		 * user to figure out which operand is invalid.  SEAMCALL status
+		 * code includes which operand caused invalid operand error.
+		 */
+		*seamcall_err = err;
+		ret = -EINVAL;
+		goto teardown;
+	} else if (WARN_ON_ONCE(err)) {
+		pr_tdx_error(TDH_MNG_INIT, err, &out);
+		ret = -EIO;
+		goto teardown;
+	}
+
 	return 0;
 
 	/*
@@ -586,6 +755,76 @@ static int __tdx_td_init(struct kvm *kvm)
 	return ret;
 }
 
+static int tdx_td_init(struct kvm *kvm, struct kvm_tdx_cmd *cmd)
+{
+	struct kvm_tdx *kvm_tdx = to_kvm_tdx(kvm);
+	struct kvm_tdx_init_vm *init_vm = NULL;
+	struct td_params *td_params = NULL;
+	int ret;
+
+	BUILD_BUG_ON(sizeof(*init_vm) != 8 * 1024);
+	BUILD_BUG_ON(sizeof(struct td_params) != 1024);
+
+	if (is_hkid_assigned(kvm_tdx))
+		return -EINVAL;
+
+	if (cmd->flags)
+		return -EINVAL;
+
+	init_vm = kzalloc(sizeof(*init_vm) +
+			  sizeof(init_vm->cpuid.entries[0]) * KVM_MAX_CPUID_ENTRIES,
+			  GFP_KERNEL);
+	if (!init_vm)
+		return -ENOMEM;
+	if (copy_from_user(init_vm, (void __user *)cmd->data, sizeof(*init_vm))) {
+		ret = -EFAULT;
+		goto out;
+	}
+	if (init_vm->cpuid.nent > KVM_MAX_CPUID_ENTRIES) {
+		ret = -E2BIG;
+		goto out;
+	}
+	if (copy_from_user(init_vm->cpuid.entries,
+			   (void __user *)cmd->data + sizeof(*init_vm),
+			   flex_array_size(init_vm, cpuid.entries, init_vm->cpuid.nent))) {
+		ret = -EFAULT;
+		goto out;
+	}
+
+	if (memchr_inv(init_vm->reserved, 0, sizeof(init_vm->reserved))) {
+		ret = -EINVAL;
+		goto out;
+	}
+	if (init_vm->cpuid.padding) {
+		ret = -EINVAL;
+		goto out;
+	}
+
+	td_params = kzalloc(sizeof(struct td_params), GFP_KERNEL);
+	if (!td_params) {
+		ret = -ENOMEM;
+		goto out;
+	}
+
+	ret = setup_tdparams(kvm, td_params, init_vm);
+	if (ret)
+		goto out;
+
+	ret = __tdx_td_init(kvm, td_params, &cmd->error);
+	if (ret)
+		goto out;
+
+	kvm_tdx->tsc_offset = td_tdcs_exec_read64(kvm_tdx, TD_TDCS_EXEC_TSC_OFFSET);
+	kvm_tdx->attributes = td_params->attributes;
+	kvm_tdx->xfam = td_params->xfam;
+
+out:
+	/* kfree() accepts NULL. */
+	kfree(init_vm);
+	kfree(td_params);
+	return ret;
+}
+
 int tdx_vm_ioctl(struct kvm *kvm, void __user *argp)
 {
 	struct kvm_tdx_cmd tdx_cmd;
@@ -602,6 +841,9 @@ int tdx_vm_ioctl(struct kvm *kvm, void __user *argp)
 	case KVM_TDX_CAPABILITIES:
 		r = tdx_get_capabilities(&tdx_cmd);
 		break;
+	case KVM_TDX_INIT_VM:
+		r = tdx_td_init(kvm, &tdx_cmd);
+		break;
 	default:
 		r = -EINVAL;
 		goto out;
@@ -725,6 +967,17 @@ static int __init tdx_module_setup(void)
 
 	tdx_info->nr_tdcs_pages = tdcs_base_size / PAGE_SIZE;
 
+	/*
+	 * Make TDH.VP.ENTER preserve RBP so that the stack unwinder
+	 * always work around it.  Query the feature.
+	 */
+	if (!(tdx_info->features0 & MD_FIELD_ID_FEATURES0_NO_RBP_MOD) &&
+	    !IS_ENABLED(CONFIG_FRAME_POINTER)) {
+		pr_err("Too old version of TDX module. Consider upgrade.\n");
+		ret = -EOPNOTSUPP;
+		goto error_out;
+	}
+
 	return 0;
 
 error_out:
diff --git a/arch/x86/kvm/vmx/tdx.h b/arch/x86/kvm/vmx/tdx.h
index ae117f864cfb..184fe394da86 100644
--- a/arch/x86/kvm/vmx/tdx.h
+++ b/arch/x86/kvm/vmx/tdx.h
@@ -12,7 +12,11 @@ struct kvm_tdx {
 	unsigned long tdr_pa;
 	unsigned long *tdcs_pa;
 
+	u64 attributes;
+	u64 xfam;
 	int hkid;
+
+	u64 tsc_offset;
 };
 
 struct vcpu_tdx {
@@ -39,6 +43,20 @@ static inline struct vcpu_tdx *to_tdx(struct kvm_vcpu *vcpu)
 {
 	return container_of(vcpu, struct vcpu_tdx, vcpu);
 }
+
+static __always_inline u64 td_tdcs_exec_read64(struct kvm_tdx *kvm_tdx, u32 field)
+{
+	struct tdx_module_args out;
+	u64 err;
+
+	err = tdh_mng_rd(kvm_tdx->tdr_pa, TDCS_EXEC(field), &out);
+	if (unlikely(err)) {
+		pr_err("TDH_MNG_RD[EXEC.0x%x] failed: 0x%llx\n", field, err);
+		return 0;
+	}
+	return out.r8;
+}
+
 #else
 struct kvm_tdx {
 	struct kvm kvm;
diff --git a/arch/x86/kvm/vmx/tdx_arch.h b/arch/x86/kvm/vmx/tdx_arch.h
index e2c1a6f429d7..efc3c61c14ab 100644
--- a/arch/x86/kvm/vmx/tdx_arch.h
+++ b/arch/x86/kvm/vmx/tdx_arch.h
@@ -117,6 +117,12 @@ struct tdx_cpuid_value {
 #define TDX_TD_ATTRIBUTE_KL		BIT_ULL(31)
 #define TDX_TD_ATTRIBUTE_PERFMON	BIT_ULL(63)
 
+/*
+ * TODO: Once XFEATURE_CET_{U, S} in arch/x86/include/asm/fpu/types.h is
+ * defined, Replace these with define ones.
+ */
+#define TDX_TD_XFAM_CET	(BIT(11) | BIT(12))
+
 /*
  * TD_PARAMS is provided as an input to TDH_MNG_INIT, the size of which is 1024B.
  */
-- 
2.25.1


  parent reply	other threads:[~2024-02-26  8:28 UTC|newest]

Thread overview: 650+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-02-26  8:25 [PATCH v19 000/130] KVM TDX basic feature support isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 001/130] x86/virt/tdx: Rename _offset to _member for TD_SYSINFO_MAP() macro isaku.yamahata
2024-03-08  7:25   ` Binbin Wu
2024-03-08 10:36     ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 002/130] x86/virt/tdx: Move TDMR metadata fields map table to local variable isaku.yamahata
2024-03-08  7:36   ` Binbin Wu
2024-04-04 14:08   ` Kirill A. Shutemov
2024-04-04 20:18     ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 003/130] x86/virt/tdx: Unbind global metadata read with 'struct tdx_tdmr_sysinfo' isaku.yamahata
2024-03-08  7:46   ` Binbin Wu
2024-02-26  8:25 ` [PATCH v19 004/130] x86/virt/tdx: Support global metadata read for all element sizes isaku.yamahata
2024-02-26 14:32   ` Juergen Gross
2024-02-27  8:40     ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 005/130] x86/virt/tdx: Export global metadata read infrastructure isaku.yamahata
2024-03-06  9:05   ` Yi Sun
2024-03-06 21:23     ` Huang, Kai
2024-03-08  8:31   ` Binbin Wu
2024-02-26  8:25 ` [PATCH v19 006/130] x86/virt/tdx: Export TDX KeyID information isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 007/130] x86/virt/tdx: Export SEAMCALL functions isaku.yamahata
2024-03-15  0:02   ` Huang, Kai
2024-03-15  1:17     ` Edgecombe, Rick P
2024-03-15  1:33       ` Dave Hansen
2024-03-15 16:33         ` Sean Christopherson
2024-03-15 17:46           ` Sean Christopherson
2024-03-15 17:51             ` Edgecombe, Rick P
2024-03-15 19:20               ` Sean Christopherson
2024-03-15 17:48           ` Edgecombe, Rick P
2024-03-20 11:27             ` Huang, Kai
2024-03-15 18:28           ` Dave Hansen
2024-03-15 19:38             ` Sean Christopherson
2024-03-15 23:53               ` Dave Hansen
2024-03-20 12:09               ` Huang, Kai
2024-03-20 15:07                 ` Dave Hansen
2024-03-20 21:00                   ` Huang, Kai
2024-04-03 21:36                   ` Sean Christopherson
2024-04-10 12:49           ` Kirill A. Shutemov
2024-04-16 19:45             ` Edgecombe, Rick P
2024-04-18 14:16               ` kirill.shutemov
2024-04-18 18:26                 ` Sean Christopherson
2024-04-19 14:46                   ` kirill.shutemov
2024-04-19 19:53                     ` Sean Christopherson
2024-04-25 16:46                       ` kirill.shutemov
2024-04-19 20:04                     ` Edgecombe, Rick P
2024-04-22 11:46                       ` kirill.shutemov
2024-04-22 15:56                         ` Edgecombe, Rick P
2024-04-22 19:50                           ` Sean Christopherson
2024-04-23  0:28                             ` Edgecombe, Rick P
2024-02-26  8:25 ` [PATCH v19 008/130] x86/tdx: Warning with 32bit build shift-count-overflow isaku.yamahata
2024-02-28 22:49   ` Huang, Kai
2024-03-01 11:36     ` Kirill A. Shutemov
2024-03-05  8:12       ` Isaku Yamahata
2024-03-05 21:35         ` Huang, Kai
2024-03-06 22:17           ` Isaku Yamahata
2024-03-06 22:25             ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 009/130] KVM: x86: Add gmem hook for determining max NPT mapping level isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 010/130] KVM: x86: Pass is_private to gmem hook of gmem_max_level isaku.yamahata
2024-04-19  1:19   ` Yan Zhao
2024-04-19 18:28     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 011/130] KVM: Add new members to struct kvm_gfn_range to operate on isaku.yamahata
2024-03-12 13:33   ` Binbin Wu
2024-03-13 17:14     ` Isaku Yamahata
2024-03-19  2:50       ` Edgecombe, Rick P
2024-03-19 14:47         ` Edgecombe, Rick P
2024-03-19 21:50           ` Isaku Yamahata
2024-04-26  7:39             ` Fuad Tabba
2024-04-26 13:50               ` Edgecombe, Rick P
2024-04-26 15:28                 ` Sean Christopherson
2024-04-26 15:57                   ` Edgecombe, Rick P
2024-04-26 16:49                     ` Sean Christopherson
2024-04-26 17:01                       ` Edgecombe, Rick P
2024-04-26 17:13                         ` Sean Christopherson
2024-02-26  8:25 ` [PATCH v19 012/130] KVM: x86/mmu: Pass around full 64-bit error code for the KVM page fault isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 013/130] KVM: x86: Use PFERR_GUEST_ENC_MASK to indicate fault is private isaku.yamahata
2024-03-07  7:04   ` Yin Fengwei
2024-02-26  8:25 ` [PATCH v19 014/130] KVM: Add KVM vcpu ioctl to pre-populate guest memory isaku.yamahata
2024-03-07  7:01   ` Yin Fengwei
2024-03-08 21:01     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 015/130] KVM: Document KVM_MEMORY_MAPPING ioctl isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 016/130] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2024-03-06  7:13   ` Binbin Wu
2024-03-06 22:22     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 017/130] KVM: x86: Implement kvm_arch_{, pre_}vcpu_memory_mapping() isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 018/130] KVM: x86/mmu: Assume guest MMIOs are shared isaku.yamahata
2024-03-25 23:41   ` Edgecombe, Rick P
2024-03-27 17:22     ` Isaku Yamahata
2024-03-27 17:27       ` Edgecombe, Rick P
2024-04-04 22:31         ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 019/130] KVM: x86: Add is_vm_type_supported callback isaku.yamahata
2024-03-14  8:32   ` Chao Gao
2024-03-14 16:13     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 020/130] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 021/130] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_init() isaku.yamahata
2024-03-13 15:30   ` Binbin Wu
2024-03-13 17:36     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 022/130] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2024-03-11  5:32   ` Yin, Fengwei
2024-03-12  2:15     ` Isaku Yamahata
2024-03-12  2:21       ` Yin Fengwei
2024-03-12  4:42         ` Isaku Yamahata
2024-03-21 11:27   ` Huang, Kai
2024-03-22 17:39     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 023/130] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2024-03-14  2:05   ` Binbin Wu
2024-03-14 16:27     ` Isaku Yamahata
2024-03-15  4:44       ` Binbin Wu
2024-03-15 23:25         ` Isaku Yamahata
2024-03-21 12:39           ` Huang, Kai
2024-03-22 18:01             ` Isaku Yamahata
2024-03-21 13:07   ` Huang, Kai
2024-03-22 21:23     ` Isaku Yamahata
2024-04-10 13:12       ` Huang, Kai
2024-04-10 15:29         ` Sean Christopherson
2024-04-10 23:15           ` Huang, Kai
2024-04-11 14:03             ` Sean Christopherson
2024-04-11 22:58               ` Huang, Kai
2024-04-16 20:58                 ` Sean Christopherson
2024-04-17 13:20                   ` Huang, Kai
2024-04-17 14:40                     ` Sean Christopherson
2024-04-17 23:09                       ` Huang, Kai
2024-04-17 23:35                         ` Sean Christopherson
2024-04-18  0:47                           ` Huang, Kai
2024-04-18 14:30                             ` Sean Christopherson
2024-04-18 23:09                               ` Huang, Kai
2024-04-19 17:23                                 ` Sean Christopherson
2024-04-22 12:46                                   ` Huang, Kai
2024-04-22 16:54                                     ` Sean Christopherson
2024-04-22 22:47                                       ` Huang, Kai
2024-04-23  0:08                                         ` Sean Christopherson
2024-04-23  1:34                                           ` Huang, Kai
2024-04-23  1:45                                             ` Huang, Kai
2024-04-23 15:15                                               ` Sean Christopherson
2024-04-23 22:59                                                 ` Huang, Kai
2024-04-23 23:29                                                   ` Huang, Kai
2024-04-25 16:30                                                     ` Sean Christopherson
2024-04-25 22:34                                                       ` Huang, Kai
2024-04-25 22:43                                                         ` Sean Christopherson
2024-04-29 11:41                                                           ` Huang, Kai
2024-04-29 20:06                                                             ` Sean Christopherson
2024-04-29 23:12                                                               ` Huang, Kai
2024-04-30 16:13                                                                 ` Sean Christopherson
2024-05-01  2:56                                                                   ` Huang, Kai
2024-04-25 16:35                                                   ` Sean Christopherson
2024-04-25 21:53                                                     ` Huang, Kai
2024-04-25 22:07                                                       ` Sean Christopherson
2024-04-26  0:21                                                         ` Huang, Kai
2024-04-26  3:21                                                           ` Chao Gao
2024-04-26  9:44                                                             ` Huang, Kai
2024-05-07 12:40                                   ` Huang, Kai
2024-05-07 16:24                                     ` Sean Christopherson
2024-05-07 21:59                                       ` Huang, Kai
2024-04-09  0:37   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 024/130] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2024-03-14  6:21   ` Binbin Wu
2024-03-14 16:37     ` Isaku Yamahata
2024-03-21 21:37   ` Huang, Kai
2024-03-22 22:45     ` Isaku Yamahata
2024-03-25 10:22       ` Huang, Kai
2024-04-23 13:59       ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 025/130] KVM: TDX: Make TDX VM type supported isaku.yamahata
2024-03-14  6:29   ` Binbin Wu
2024-03-15 21:36     ` Isaku Yamahata
2024-03-21 21:40       ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 026/130] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 027/130] KVM: TDX: Define " isaku.yamahata
2024-03-01  7:25   ` Yan Zhao
2024-03-05  8:21     ` Isaku Yamahata
2024-04-16  0:55       ` Huang, Kai
2024-04-16 16:28         ` Isaku Yamahata
2024-04-16 22:06           ` Huang, Kai
2024-03-14  7:30   ` Binbin Wu
2024-03-14 16:48     ` Isaku Yamahata
2024-03-21 21:57   ` Huang, Kai
2024-03-22 23:15     ` Isaku Yamahata
2024-03-22  7:06   ` Yuan Yao
2024-03-22 23:17     ` Isaku Yamahata
2024-04-03 15:04   ` Sean Christopherson
2024-04-03 16:30     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 028/130] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2024-02-26 19:27   ` Isaku Yamahata
2024-03-14  7:45     ` Binbin Wu
2024-03-14 17:21       ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 029/130] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2024-03-15 17:41   ` Sean Christopherson
2024-03-15 19:23     ` Isaku Yamahata
2024-03-19 23:24   ` Edgecombe, Rick P
2024-03-20  0:09     ` Isaku Yamahata
2024-03-20  0:11       ` Edgecombe, Rick P
2024-03-20  5:41         ` Isaku Yamahata
2024-03-20 20:20           ` Isaku Yamahata
2024-03-20  0:03   ` Huang, Kai
2024-03-20 21:36     ` Isaku Yamahata
2024-03-20 22:37       ` Huang, Kai
2024-03-22  0:16         ` Isaku Yamahata
2024-03-22  4:33           ` Huang, Kai
2024-03-22 23:26             ` Isaku Yamahata
2024-04-24 10:50   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 030/130] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2024-03-20  0:29   ` Huang, Kai
2024-03-20 21:50     ` Isaku Yamahata
2024-03-20 23:09       ` Huang, Kai
2024-03-21 23:52         ` Isaku Yamahata
2024-03-22  4:37           ` Huang, Kai
2024-04-24  0:11   ` Huang, Kai
2024-04-26 18:38     ` Isaku Yamahata
2024-04-24 11:06   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 031/130] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 032/130] KVM: TDX: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2024-03-13  0:44   ` Edgecombe, Rick P
2024-03-13 17:44     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 033/130] KVM: TDX: Add helper function to read TDX metadata in array isaku.yamahata
2024-03-14  9:17   ` Binbin Wu
2024-03-14 14:35     ` Binbin Wu
2024-03-14 17:00       ` Isaku Yamahata
2024-03-14 22:27   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 034/130] KVM: TDX: Get system-wide info about TDX module on initialization isaku.yamahata
2024-03-14 15:06   ` Binbin Wu
2024-03-14 23:09   ` Huang, Kai
2024-03-15  2:18     ` Xiaoyao Li
2024-03-15  4:57       ` Huang, Kai
2024-03-15  5:11         ` Xiaoyao Li
2024-03-15  5:39           ` Huang, Kai
2024-03-15  5:50             ` Xiaoyao Li
2024-03-15 16:22     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 035/130] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2024-03-21 22:10   ` Huang, Kai
2024-03-22 23:36     ` Isaku Yamahata
2024-03-23  4:27       ` Huang, Kai
2024-03-26  3:10         ` Edgecombe, Rick P
2024-02-26  8:25 ` [PATCH v19 036/130] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2024-03-21 22:26   ` Huang, Kai
2024-03-23  0:28     ` Isaku Yamahata
2024-03-25  0:25       ` Huang, Kai
2024-04-24 10:30   ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific isaku.yamahata
2024-03-21 23:36   ` Huang, Kai
2024-03-23  1:13     ` Isaku Yamahata
2024-03-25  8:42       ` Binbin Wu
2024-03-25 21:31         ` Isaku Yamahata
2024-03-25 22:47           ` Huang, Kai
2024-03-25  8:43       ` Huang, Kai
2024-03-25 21:29         ` isaku.yamahata
2024-05-09 16:35   ` Sean Christopherson
2024-05-09 22:40     ` Huang, Kai
2024-05-09 22:47       ` Huang, Kai
2024-05-09 22:52       ` Sean Christopherson
2024-05-09 23:19         ` Huang, Kai
2024-05-09 23:55           ` Isaku Yamahata
2024-05-10 14:04             ` Sean Christopherson
2024-05-14  2:01               ` Huang, Kai
2024-02-26  8:25 ` [PATCH v19 038/130] KVM: TDX: create/destroy VM structure isaku.yamahata
2024-03-20  5:12   ` Chao Gao
2024-03-21 14:17     ` Isaku Yamahata
2024-03-22  3:46       ` Yuan Yao
2024-03-22  5:32         ` Yuan Yao
2024-03-22 23:44           ` Isaku Yamahata
2024-03-29  6:22       ` Binbin Wu
2024-04-01 22:55         ` Isaku Yamahata
2024-04-03 22:13       ` Huang, Kai
2024-04-04  1:03         ` Chao Gao
2024-04-04  1:24           ` Huang, Kai
2024-03-22  1:06   ` Huang, Kai
2024-03-23  1:36     ` Isaku Yamahata
2024-03-25  9:58   ` Binbin Wu
2024-03-25 21:48     ` Isaku Yamahata
2024-03-26  1:43   ` Huang, Kai
2024-03-27 22:53     ` Isaku Yamahata
2024-03-28  1:49       ` Huang, Kai
2024-03-28  5:34         ` Isaku Yamahata
2024-03-28 11:14           ` Huang, Kai
2024-03-28 14:12             ` Chao Gao
2024-03-28 20:39             ` Isaku Yamahata
2024-03-29  7:25               ` Binbin Wu
2024-04-02  6:16                 ` Isaku Yamahata
2024-04-01 10:41               ` Huang, Kai
2024-03-27 23:33   ` Huang, Kai
2024-04-03 17:24     ` Isaku Yamahata
2024-04-03 22:26       ` Huang, Kai
2024-04-15  8:17   ` Xiaoyao Li
2024-04-16 16:40     ` Isaku Yamahata
2024-02-26  8:25 ` isaku.yamahata [this message]
2024-03-20  6:12   ` [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters Chao Gao
2024-03-21 15:55     ` Isaku Yamahata
2024-03-28  1:12       ` Edgecombe, Rick P
2024-03-28  1:36         ` Xiaoyao Li
2024-03-28 18:26           ` Edgecombe, Rick P
2024-04-01  7:23             ` Xiaoyao Li
2024-03-20  8:15   ` Xiaoyao Li
2024-03-21 17:30     ` Isaku Yamahata
2024-03-22 11:20   ` Huang, Kai
2024-03-23  1:22     ` Isaku Yamahata
2024-03-25 10:39       ` Huang, Kai
2024-03-25 22:04         ` Isaku Yamahata
2024-04-03 23:59   ` Huang, Kai
2024-04-11 18:54     ` Isaku Yamahata
2024-04-08 18:38   ` Edgecombe, Rick P
2024-04-11 19:26     ` Isaku Yamahata
2024-04-11 19:51       ` Edgecombe, Rick P
2024-04-11 20:46         ` Isaku Yamahata
2024-04-11 21:03           ` Edgecombe, Rick P
2024-05-17 14:32   ` Kirill A. Shutemov
2024-05-17 14:37     ` Juergen Gross
2024-05-17 14:53       ` Kirill A. Shutemov
2024-05-17 15:00         ` Jürgen Groß
2024-05-17 16:25           ` Kirill A. Shutemov
2024-02-26  8:25 ` [PATCH v19 040/130] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2024-03-20  7:01   ` Chao Gao
2024-03-21 17:46     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 041/130] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2024-03-21  1:06   ` Chao Gao
2024-03-21 17:59     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 042/130] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 043/130] KVM: TDX: create/free TDX vcpu structure isaku.yamahata
2024-03-21  1:30   ` Chao Gao
2024-03-21 20:21     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 044/130] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2024-03-21  5:43   ` Chao Gao
2024-03-21 20:43     ` Isaku Yamahata
2024-03-27  0:27   ` Edgecombe, Rick P
2024-03-27 22:56     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 045/130] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 046/130] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2024-03-27  3:08   ` Chenyi Qiang
2024-03-27 14:09     ` Binbin Wu
2024-03-27 23:50       ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 047/130] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 048/130] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values isaku.yamahata
2024-03-26 15:53   ` Binbin Wu
2024-03-26 17:34     ` Isaku Yamahata
2024-03-27  0:47       ` Binbin Wu
2024-02-26  8:25 ` [PATCH v19 049/130] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 050/130] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 051/130] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 052/130] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2024-03-26  3:31   ` Edgecombe, Rick P
2024-03-27 23:58     ` Isaku Yamahata
2024-02-26  8:25 ` [PATCH v19 053/130] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 054/130] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 055/130] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2024-02-26  8:25 ` [PATCH v19 056/130] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2024-03-21  0:11   ` Edgecombe, Rick P
2024-03-21 21:24     ` Isaku Yamahata
2024-03-22  7:18       ` Chao Gao
2024-03-22 15:19         ` Isaku Yamahata
2024-04-20 19:05     ` Edgecombe, Rick P
2024-02-26  8:25 ` [PATCH v19 057/130] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2024-03-21  0:18   ` Edgecombe, Rick P
2024-03-21 21:59     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 058/130] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2024-03-13 20:51   ` Edgecombe, Rick P
2024-03-14 18:10     ` Isaku Yamahata
2024-03-14 21:23       ` Huang, Kai
2024-03-14 21:39         ` Edgecombe, Rick P
2024-03-15  1:09           ` Isaku Yamahata
2024-03-27 13:49             ` Binbin Wu
2024-03-28  0:02               ` Isaku Yamahata
2024-03-28  3:17                 ` Binbin Wu
2024-03-14 21:52       ` Edgecombe, Rick P
2024-03-15  0:24         ` Isaku Yamahata
2024-04-22  3:34   ` Yan Zhao
2024-04-22 17:30     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 059/130] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2024-03-18 23:46   ` Edgecombe, Rick P
2024-03-19 23:56     ` Isaku Yamahata
2024-03-20  0:56       ` Edgecombe, Rick P
2024-03-21  1:17         ` Edgecombe, Rick P
2024-03-21 22:59           ` Isaku Yamahata
2024-03-22  0:40             ` Edgecombe, Rick P
2024-03-25 19:05               ` Isaku Yamahata
2024-03-25 19:55                 ` Edgecombe, Rick P
2024-03-25 22:18                   ` Isaku Yamahata
2024-03-25 23:10                     ` Isaku Yamahata
2024-03-25 23:21                       ` Edgecombe, Rick P
2024-03-25 23:35                         ` Isaku Yamahata
2024-03-26  2:32                           ` Chao Gao
2024-03-26  2:42                             ` Edgecombe, Rick P
2024-03-26 11:13                               ` Chao Gao
2024-03-26 17:48                                 ` Isaku Yamahata
2024-03-27  2:54                                   ` Xiaoyao Li
2024-03-27 17:36                                     ` Edgecombe, Rick P
2024-03-28  0:06                                       ` Isaku Yamahata
2024-03-28  0:06                                       ` Xiaoyao Li
2024-03-28  0:36                                         ` Isaku Yamahata
2024-03-28  1:04                                           ` Xiaoyao Li
2024-03-28  0:45                                         ` Edgecombe, Rick P
2024-03-28  0:58                                           ` Xiaoyao Li
2024-03-28  1:06                                             ` Edgecombe, Rick P
2024-03-28  1:30                                               ` Xiaoyao Li
2024-03-28  3:04                                                 ` Edgecombe, Rick P
2024-03-28  3:40                                                   ` Xiaoyao Li
2024-03-28 10:17                                                     ` Chao Gao
2024-03-28 13:21                                                       ` Xiaoyao Li
2024-03-28 13:38                                                         ` Chao Gao
2024-03-28 14:45                                                           ` Xiaoyao Li
2024-03-28 16:57                                                             ` Edgecombe, Rick P
2024-03-28  9:53                                         ` Chao Gao
2024-03-28  0:23                   ` Xiaoyao Li
2024-03-21 22:39         ` Isaku Yamahata
2024-04-17  2:21   ` Chao Gao
2024-04-17  6:47     ` Isaku Yamahata
2024-04-21  1:58   ` Edgecombe, Rick P
2024-02-26  8:26 ` [PATCH v19 060/130] KVM: x86/tdp_mmu: Apply mmu notifier callback to only shared GPA isaku.yamahata
2024-03-28  8:29   ` Binbin Wu
2024-03-28 20:55     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 061/130] KVM: x86/tdp_mmu: Sprinkle __must_check isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 062/130] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2024-03-23 23:39   ` Edgecombe, Rick P
2024-03-25 20:01     ` Isaku Yamahata
2024-03-25 22:31       ` Edgecombe, Rick P
2024-03-26 18:06         ` Isaku Yamahata
2024-04-19 18:55           ` Edgecombe, Rick P
2024-03-27 13:07   ` Chao Gao
2024-03-28  0:25     ` Isaku Yamahata
2024-04-01  9:12   ` Binbin Wu
2024-04-02  6:37     ` Isaku Yamahata
2024-04-22  9:08   ` Yan Zhao
2024-02-26  8:26 ` [PATCH v19 063/130] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 064/130] KVM: x86/mmu: Do not enable page track for TD guest isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 065/130] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 066/130] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 067/130] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2024-04-01 15:49   ` Binbin Wu
2024-04-03 17:33     ` Isaku Yamahata
2024-04-06  0:09       ` Edgecombe, Rick P
2024-04-06  0:58         ` Huang, Kai
2024-04-07  1:32           ` Binbin Wu
2024-04-08 15:32             ` Edgecombe, Rick P
2024-02-26  8:26 ` [PATCH v19 068/130] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 069/130] KVM: TDX: Require TDP MMU and mmio caching for TDX isaku.yamahata
2024-03-28  5:24   ` Binbin Wu
2024-03-28 21:03     ` Isaku Yamahata
2024-04-01 17:34   ` Sean Christopherson
2024-04-02  6:03     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support isaku.yamahata
2024-03-28  3:12   ` Chao Gao
2024-03-28  3:55     ` Isaku Yamahata
2024-04-02  6:21   ` Binbin Wu
2024-04-03 17:50     ` Isaku Yamahata
2024-04-02  9:13   ` Binbin Wu
2024-04-03 18:01     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 071/130] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 072/130] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 073/130] KVM: x86: Add hooks in kvm_arch_vcpu_memory_mapping() isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 074/130] KVM: TDX: Create initial guest memory isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 075/130] KVM: TDX: Extend memory measurement with " isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 076/130] KVM: TDX: Finalize VM initialization isaku.yamahata
2024-04-11 16:39   ` Adrian Hunter
2024-04-12  1:08     ` Isaku Yamahata
2024-04-12 12:22       ` Adrian Hunter
2024-04-12 18:09         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 077/130] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 078/130] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2024-03-15 17:26   ` Sean Christopherson
2024-03-15 20:42     ` Isaku Yamahata
2024-04-07  1:42     ` Binbin Wu
2024-03-18 21:01   ` Edgecombe, Rick P
2024-03-18 23:40     ` Isaku Yamahata
2024-04-04 13:22   ` Kirill A. Shutemov
2024-04-04 21:51     ` Huang, Kai
2024-04-04 22:45       ` Sean Christopherson
2024-04-04 23:28         ` Huang, Kai
2024-02-26  8:26 ` [PATCH v19 079/130] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2024-04-07  3:02   ` Binbin Wu
2024-04-12 20:17     ` Isaku Yamahata
2024-04-18  7:57       ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 080/130] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2024-03-07  8:32   ` Chen Yu
2024-03-08 20:58     ` Isaku Yamahata
2024-03-09 16:28       ` Chen Yu
2024-03-12  2:03         ` Isaku Yamahata
2024-04-07  3:47   ` Binbin Wu
2024-04-12 20:19     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 081/130] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2024-04-07  5:36   ` Binbin Wu
2024-04-12 20:23     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 082/130] KVM: TDX: restore user ret MSRs isaku.yamahata
2024-04-07  5:59   ` Binbin Wu
2024-04-12 20:32     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 083/130] KVM: TDX: Add TSX_CTRL msr into uret_msrs list isaku.yamahata
2024-04-07  7:05   ` Binbin Wu
2024-04-12 20:35     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 084/130] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 085/130] KVM: TDX: Complete interrupts after tdexit isaku.yamahata
2024-04-16 18:23   ` Reinette Chatre
2024-04-17  6:56     ` Isaku Yamahata
2024-04-23 13:15     ` Binbin Wu
2024-04-23 14:48       ` Reinette Chatre
2024-02-26  8:26 ` [PATCH v19 086/130] KVM: TDX: restore debug store when TD exit isaku.yamahata
2024-04-16 18:24   ` Reinette Chatre
2024-04-17  4:03     ` Chao Gao
2024-02-26  8:26 ` [PATCH v19 087/130] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2024-04-07  9:03   ` Binbin Wu
2024-04-12 16:15   ` Reinette Chatre
2024-04-12 21:42     ` Isaku Yamahata
2024-04-12 22:46       ` Sean Christopherson
2024-04-13  0:40         ` Isaku Yamahata
2024-04-15 13:49           ` Sean Christopherson
2024-04-15 22:48             ` Isaku Yamahata
2024-04-16  0:05               ` Huang, Kai
2024-04-16 16:44                 ` Isaku Yamahata
2024-04-18  1:09                   ` Huang, Kai
2024-04-23 12:13     ` Binbin Wu
2024-05-06 19:02       ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 088/130] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2024-04-07 10:52   ` Binbin Wu
2024-04-13  0:20     ` Isaku Yamahata
2024-05-06  3:30   ` Binbin Wu
2024-05-06 19:10     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 089/130] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2024-04-16 14:12   ` Edgecombe, Rick P
2024-02-26  8:26 ` [PATCH v19 090/130] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 091/130] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2024-02-27  8:52   ` Binbin Wu
2024-03-05  8:35     ` Isaku Yamahata
2024-03-28  8:12   ` Chao Gao
2024-03-28 21:10     ` Isaku Yamahata
2024-04-08  3:16       ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 092/130] KVM: TDX: Implement interrupt injection isaku.yamahata
2024-03-28 10:56   ` Chao Gao
2024-03-28 21:12     ` Isaku Yamahata
2024-04-08  7:01   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 093/130] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2024-03-29  1:54   ` Chao Gao
2024-04-02  6:52     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 094/130] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2024-03-29  2:11   ` Chao Gao
2024-04-02  7:09     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 095/130] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2024-03-29  2:55   ` Chao Gao
2024-02-26  8:26 ` [PATCH v19 096/130] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2024-04-09  8:52   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 097/130] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2024-03-29  3:24   ` Chao Gao
2024-04-03 18:34     ` Isaku Yamahata
2024-04-03 18:55       ` Sean Christopherson
2024-05-09  3:26       ` Binbin Wu
2024-04-09  9:28   ` Binbin Wu
2024-04-15 22:51     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 098/130] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2024-03-15 17:45   ` Sean Christopherson
2024-03-19 21:57     ` Isaku Yamahata
2024-04-09 10:36   ` Binbin Wu
2024-04-15 22:58     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 099/130] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 100/130] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2024-04-09 14:53   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 101/130] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2024-03-04  7:39   ` Chenyi Qiang
2024-04-01  4:10   ` Chao Gao
2024-04-03 18:42     ` Isaku Yamahata
2024-04-30 20:47       ` Reinette Chatre
2024-05-01 15:56         ` Isaku Yamahata
2024-05-01 16:54           ` Reinette Chatre
2024-05-01 18:19             ` Isaku Yamahata
2024-05-01 18:22               ` Reinette Chatre
2024-05-06  7:21             ` Chao Gao
2024-05-06 14:21               ` Sean Christopherson
2024-05-06 14:22   ` Sean Christopherson
2024-02-26  8:26 ` [PATCH v19 102/130] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2024-04-01  8:22   ` Chao Gao
2024-04-03 18:51     ` Isaku Yamahata
2024-04-17  3:05       ` Binbin Wu
2024-04-18  0:08         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 103/130] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI isaku.yamahata
2024-04-01  9:14   ` Chao Gao
2024-04-03 22:23     ` Isaku Yamahata
2024-05-07  7:06       ` Binbin Wu
2024-05-07 20:55         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 104/130] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2024-04-01  9:59   ` Chao Gao
2024-04-04  1:15     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 105/130] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2024-04-02  8:52   ` Chao Gao
2024-04-04  1:27     ` Isaku Yamahata
2024-04-17  6:16       ` Binbin Wu
2024-04-17  7:02         ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 106/130] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2024-04-03  2:49   ` Chao Gao
2024-04-03 15:58   ` Sean Christopherson
2024-04-04 23:02     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 107/130] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 108/130] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2024-04-03  3:25   ` Chao Gao
2024-04-03 14:49     ` Sean Christopherson
2024-04-04 23:25       ` Isaku Yamahata
2024-04-07  3:50         ` Chao Gao
2024-04-08 18:56           ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 109/130] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2024-04-17 12:51   ` Binbin Wu
2024-04-17 20:10     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 110/130] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2024-04-18  9:29   ` Binbin Wu
2024-04-18 11:04     ` Binbin Wu
2024-04-18 21:22       ` Isaku Yamahata
2024-04-19  1:42         ` Binbin Wu
2024-04-19 17:34           ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 111/130] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2024-04-03  6:51   ` Chao Gao
2024-04-03 15:07     ` Sean Christopherson
2024-04-03 15:14   ` Sean Christopherson
2024-04-04 23:42     ` Isaku Yamahata
2024-04-18 13:36       ` Binbin Wu
2024-04-18 13:54   ` Binbin Wu
2024-04-18 21:27     ` Isaku Yamahata
2024-04-19  2:33   ` Binbin Wu
2024-02-26  8:26 ` [PATCH v19 112/130] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 113/130] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 114/130] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 115/130] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2024-02-26  8:26 ` [PATCH v19 116/130] KVM: TDX: Silently discard SMI request isaku.yamahata
2024-04-19  7:04   ` Binbin Wu
2024-04-19 13:52   ` Sean Christopherson
2024-04-19 18:11     ` Isaku Yamahata
2024-02-26  8:26 ` [PATCH v19 117/130] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2024-04-19  8:31   ` Binbin Wu
2024-04-19 18:06     ` Isaku Yamahata
2024-02-26  8:27 ` [PATCH v19 118/130] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2024-04-19 10:04   ` Binbin Wu
2024-04-19 18:09     ` Isaku Yamahata
2024-02-26  8:27 ` [PATCH v19 119/130] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 120/130] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2024-03-15  0:06   ` Edgecombe, Rick P
2024-03-15  1:35     ` Isaku Yamahata
2024-03-15 14:01       ` Edgecombe, Rick P
2024-03-18 17:12         ` Isaku Yamahata
2024-03-18 17:43           ` Edgecombe, Rick P
2024-03-18 23:16             ` Isaku Yamahata
2024-03-22 22:57               ` Isaku Yamahata
2024-03-22 23:05                 ` Edgecombe, Rick P
2024-02-26  8:27 ` [PATCH v19 121/130] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 122/130] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 123/130] KVM: TDX: Ignore setting up mce isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 124/130] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 125/130] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2024-04-22  1:56   ` Binbin Wu
2024-04-22 17:34     ` Isaku Yamahata
2024-02-26  8:27 ` [PATCH v19 126/130] KVM: TDX: Inhibit APICv for TDX guest isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 127/130] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 128/130] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 129/130] RFC: KVM: x86: Add x86 callback to check cpuid isaku.yamahata
2024-02-26  8:27 ` [PATCH v19 130/130] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2 isaku.yamahata
2024-03-21 23:12   ` Edgecombe, Rick P
2024-03-22  7:10     ` Huang, Kai
2024-03-22 16:06       ` Edgecombe, Rick P
2024-03-25 11:14         ` Huang, Kai
2024-03-25 15:32           ` Edgecombe, Rick P
2024-03-25 21:17             ` Isaku Yamahata
2024-03-25 22:31             ` Huang, Kai
2024-03-25 22:37               ` Edgecombe, Rick P
2024-03-25 21:10           ` Isaku Yamahata
2024-03-23  1:54       ` Isaku Yamahata

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5eca97e6a3978cf4dcf1cff21be6ec8b639a66b9.1708933498.git.isaku.yamahata@intel.com \
    --to=isaku.yamahata@intel.com \
    --cc=chen.bo@intel.com \
    --cc=erdemaktas@google.com \
    --cc=hang.yuan@intel.com \
    --cc=isaku.yamahata@gmail.com \
    --cc=kai.huang@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=sagis@google.com \
    --cc=seanjc@google.com \
    --cc=tina.zhang@intel.com \
    --cc=xiaoyao.li@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).