From: isaku.yamahata@intel.com
To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org
Cc: isaku.yamahata@intel.com, isaku.yamahata@gmail.com,
Paolo Bonzini <pbonzini@redhat.com>,
erdemaktas@google.com, Sean Christopherson <seanjc@google.com>,
Sagi Shahar <sagis@google.com>, Kai Huang <kai.huang@intel.com>,
chen.bo@intel.com, hang.yuan@intel.com, tina.zhang@intel.com
Subject: [PATCH v18 023/121] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
Date: Mon, 22 Jan 2024 15:52:59 -0800 [thread overview]
Message-ID: <ed33ebe29b231e8e657cd610a983fa603b10f530.1705965634.git.isaku.yamahata@intel.com> (raw)
In-Reply-To: <cover.1705965634.git.isaku.yamahata@intel.com>
From: Isaku Yamahata <isaku.yamahata@intel.com>
TDX has its own limitation on the maximum number of vcpus that the guest
can accommodate. Allow x86 kvm backend to implement its own KVM_ENABLE_CAP
handler and implement TDX backend for KVM_CAP_MAX_VCPUS. user space VMM,
e.g. qemu, can specify its value instead of KVM_MAX_VCPUS.
Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
---
v18:
- use TDX instead of "x86, tdx" in subject
- use min(max_vcpu, TDX_MAX_VCPU) instead of
min3(max_vcpu, KVM_MAX_VCPU, TDX_MAX_VCPU)
- make "if (KVM_MAX_VCPU) and if (TDX_MAX_VCPU)" into one if statement
---
arch/x86/include/asm/kvm-x86-ops.h | 2 ++
arch/x86/include/asm/kvm_host.h | 2 ++
arch/x86/kvm/vmx/main.c | 22 ++++++++++++++++++++++
arch/x86/kvm/vmx/tdx.c | 29 +++++++++++++++++++++++++++++
arch/x86/kvm/vmx/x86_ops.h | 5 +++++
arch/x86/kvm/x86.c | 4 ++++
6 files changed, 64 insertions(+)
diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h
index 943b21b8b106..2f976c0f3116 100644
--- a/arch/x86/include/asm/kvm-x86-ops.h
+++ b/arch/x86/include/asm/kvm-x86-ops.h
@@ -21,6 +21,8 @@ KVM_X86_OP(hardware_unsetup)
KVM_X86_OP(has_emulated_msr)
KVM_X86_OP(vcpu_after_set_cpuid)
KVM_X86_OP(is_vm_type_supported)
+KVM_X86_OP_OPTIONAL(max_vcpus);
+KVM_X86_OP_OPTIONAL(vm_enable_cap)
KVM_X86_OP(vm_init)
KVM_X86_OP_OPTIONAL(vm_destroy)
KVM_X86_OP_OPTIONAL_RET0(vcpu_precreate)
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index 26f4668b0273..db44a92e5659 100644
--- a/arch/x86/include/asm/kvm_host.h
+++ b/arch/x86/include/asm/kvm_host.h
@@ -1602,7 +1602,9 @@ struct kvm_x86_ops {
void (*vcpu_after_set_cpuid)(struct kvm_vcpu *vcpu);
bool (*is_vm_type_supported)(unsigned long vm_type);
+ int (*max_vcpus)(struct kvm *kvm);
unsigned int vm_size;
+ int (*vm_enable_cap)(struct kvm *kvm, struct kvm_enable_cap *cap);
int (*vm_init)(struct kvm *kvm);
void (*vm_destroy)(struct kvm *kvm);
diff --git a/arch/x86/kvm/vmx/main.c b/arch/x86/kvm/vmx/main.c
index 50da807d7aea..4611f305a450 100644
--- a/arch/x86/kvm/vmx/main.c
+++ b/arch/x86/kvm/vmx/main.c
@@ -6,6 +6,7 @@
#include "nested.h"
#include "pmu.h"
#include "tdx.h"
+#include "tdx_arch.h"
static bool enable_tdx __ro_after_init;
module_param_named(tdx, enable_tdx, bool, 0444);
@@ -16,6 +17,17 @@ static bool vt_is_vm_type_supported(unsigned long type)
(enable_tdx && tdx_is_vm_type_supported(type));
}
+static int vt_max_vcpus(struct kvm *kvm)
+{
+ if (!kvm)
+ return KVM_MAX_VCPUS;
+
+ if (is_td(kvm))
+ return min(kvm->max_vcpus, TDX_MAX_VCPUS);
+
+ return kvm->max_vcpus;
+}
+
static int vt_hardware_enable(void)
{
int ret;
@@ -54,6 +66,14 @@ static void vt_hardware_unsetup(void)
vmx_hardware_unsetup();
}
+static int vt_vm_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
+{
+ if (is_td(kvm))
+ return tdx_vm_enable_cap(kvm, cap);
+
+ return -EINVAL;
+}
+
static int vt_vm_init(struct kvm *kvm)
{
if (is_td(kvm))
@@ -91,7 +111,9 @@ struct kvm_x86_ops vt_x86_ops __initdata = {
.has_emulated_msr = vmx_has_emulated_msr,
.is_vm_type_supported = vt_is_vm_type_supported,
+ .max_vcpus = vt_max_vcpus,
.vm_size = sizeof(struct kvm_vmx),
+ .vm_enable_cap = vt_vm_enable_cap,
.vm_init = vt_vm_init,
.vm_destroy = vmx_vm_destroy,
diff --git a/arch/x86/kvm/vmx/tdx.c b/arch/x86/kvm/vmx/tdx.c
index 8c463407f8a8..876ad7895b88 100644
--- a/arch/x86/kvm/vmx/tdx.c
+++ b/arch/x86/kvm/vmx/tdx.c
@@ -100,6 +100,35 @@ struct tdx_info {
/* Info about the TDX module. */
static struct tdx_info *tdx_info;
+int tdx_vm_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
+{
+ int r;
+
+ switch (cap->cap) {
+ case KVM_CAP_MAX_VCPUS: {
+ if (cap->flags || cap->args[0] == 0)
+ return -EINVAL;
+ if (cap->args[0] > KVM_MAX_VCPUS ||
+ cap->args[0] > TDX_MAX_VCPUS)
+ return -E2BIG;
+
+ mutex_lock(&kvm->lock);
+ if (kvm->created_vcpus)
+ r = -EBUSY;
+ else {
+ kvm->max_vcpus = cap->args[0];
+ r = 0;
+ }
+ mutex_unlock(&kvm->lock);
+ break;
+ }
+ default:
+ r = -EINVAL;
+ break;
+ }
+ return r;
+}
+
static int tdx_get_capabilities(struct kvm_tdx_cmd *cmd)
{
struct kvm_tdx_capabilities __user *user_caps;
diff --git a/arch/x86/kvm/vmx/x86_ops.h b/arch/x86/kvm/vmx/x86_ops.h
index 6e238142b1e8..3a3be66888da 100644
--- a/arch/x86/kvm/vmx/x86_ops.h
+++ b/arch/x86/kvm/vmx/x86_ops.h
@@ -139,12 +139,17 @@ int __init tdx_hardware_setup(struct kvm_x86_ops *x86_ops);
void tdx_hardware_unsetup(void);
bool tdx_is_vm_type_supported(unsigned long type);
+int tdx_vm_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap);
int tdx_vm_ioctl(struct kvm *kvm, void __user *argp);
#else
static inline int tdx_hardware_setup(struct kvm_x86_ops *x86_ops) { return -EOPNOTSUPP; }
static inline void tdx_hardware_unsetup(void) {}
static inline bool tdx_is_vm_type_supported(unsigned long type) { return false; }
+static inline int tdx_vm_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
+{
+ return -EINVAL;
+};
static inline int tdx_vm_ioctl(struct kvm *kvm, void __user *argp) { return -EOPNOTSUPP; }
#endif
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index dd3a23d56621..a1389ddb1b33 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -4726,6 +4726,8 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
break;
case KVM_CAP_MAX_VCPUS:
r = KVM_MAX_VCPUS;
+ if (kvm_x86_ops.max_vcpus)
+ r = static_call(kvm_x86_max_vcpus)(kvm);
break;
case KVM_CAP_MAX_VCPU_ID:
r = KVM_MAX_VCPU_IDS;
@@ -6683,6 +6685,8 @@ int kvm_vm_ioctl_enable_cap(struct kvm *kvm,
break;
default:
r = -EINVAL;
+ if (kvm_x86_ops.vm_enable_cap)
+ r = static_call(kvm_x86_vm_enable_cap)(kvm, cap);
break;
}
return r;
--
2.25.1
next prev parent reply other threads:[~2024-01-22 23:55 UTC|newest]
Thread overview: 212+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-01-22 23:52 [PATCH v18 000/121] KVM TDX basic feature support isaku.yamahata
2024-01-22 23:52 ` [PATCH v18 001/121] x86/virt/tdx: Export TDX KeyID information isaku.yamahata
2024-02-01 1:57 ` Yuan Yao
2024-02-26 18:46 ` Isaku Yamahata
2024-01-22 23:52 ` [PATCH v18 002/121] x86/virt/tdx: Export SEAMCALL functions isaku.yamahata
2024-02-08 13:30 ` Paolo Bonzini
2024-02-26 17:51 ` Isaku Yamahata
2024-01-22 23:52 ` [PATCH v18 003/121] KVM: x86: Add is_vm_type_supported callback isaku.yamahata
2024-01-29 6:54 ` Yuan Yao
2024-01-22 23:52 ` [PATCH v18 004/121] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2024-01-29 7:03 ` Yuan Yao
2024-01-31 14:34 ` Xiaoyao Li
2024-01-22 23:52 ` [PATCH v18 005/121] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup() isaku.yamahata
2024-01-29 7:50 ` Yuan Yao
2024-01-22 23:52 ` [PATCH v18 006/121] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2024-02-01 1:41 ` Xiaoyao Li
2024-01-22 23:52 ` [PATCH v18 007/121] KVM: VMX: Reorder vmx initialization with kvm vendor initialization isaku.yamahata
2024-01-23 3:42 ` Binbin Wu
2024-01-29 8:56 ` Yuan Yao
2024-02-01 1:47 ` Xiaoyao Li
2024-02-01 9:34 ` Xiaoyao Li
2024-02-26 18:48 ` Isaku Yamahata
2024-01-22 23:52 ` [PATCH v18 008/121] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2024-02-01 8:55 ` Xiaoyao Li
2024-01-22 23:52 ` [PATCH v18 009/121] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2024-02-01 9:39 ` Xiaoyao Li
2024-01-22 23:52 ` [PATCH v18 010/121] KVM: TDX: Make TDX VM type supported isaku.yamahata
2024-01-22 23:52 ` [PATCH v18 011/121] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2024-01-22 23:52 ` [PATCH v18 012/121] KVM: TDX: Define " isaku.yamahata
2024-01-31 6:51 ` Yuan Yao
2024-02-02 1:02 ` Xiaoyao Li
2024-01-22 23:52 ` [PATCH v18 013/121] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2024-01-31 7:22 ` Yuan Yao
2024-02-02 8:04 ` Xiaoyao Li
2024-01-22 23:52 ` [PATCH v18 014/121] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2024-01-31 8:12 ` Yuan Yao
2024-01-22 23:52 ` [PATCH v18 015/121] KVM: TDX: Retry SEAMCALL on the lack of entropy error isaku.yamahata
2024-01-23 8:32 ` Binbin Wu
2024-02-12 10:05 ` Paolo Bonzini
2024-01-22 23:52 ` [PATCH v18 016/121] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2024-02-01 1:47 ` Yuan Yao
2024-01-22 23:52 ` [PATCH v18 017/121] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2024-01-22 23:52 ` [PATCH v18 018/121] KVM: TDX: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2024-01-23 9:26 ` Binbin Wu
2024-01-22 23:52 ` [PATCH v18 019/121] KVM: TDX: Add helper function to read TDX metadata in array isaku.yamahata
2024-01-22 23:52 ` [PATCH v18 020/121] x86/virt/tdx: Get system-wide info about TDX module on initialization isaku.yamahata
2024-02-01 5:32 ` Yuan Yao
2024-01-22 23:52 ` [PATCH v18 021/121] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2024-01-22 23:52 ` [PATCH v18 022/121] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2024-01-22 23:52 ` isaku.yamahata [this message]
2024-01-24 1:17 ` [PATCH v18 023/121] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific Binbin Wu
2024-02-01 6:16 ` Yuan Yao
2024-02-04 2:00 ` Binbin Wu
2024-02-26 18:52 ` Isaku Yamahata
2024-03-14 10:39 ` Chao Gao
2024-01-22 23:53 ` [PATCH v18 024/121] KVM: TDX: create/destroy VM structure isaku.yamahata
2024-02-01 8:32 ` Yuan Yao
2024-02-26 18:56 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 025/121] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2024-01-25 2:19 ` Binbin Wu
2024-02-26 18:57 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 026/121] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 027/121] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 028/121] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 029/121] KVM: TDX: create/free TDX vcpu structure isaku.yamahata
2024-01-25 3:06 ` Binbin Wu
2024-02-26 18:58 ` Isaku Yamahata
2024-02-20 2:53 ` Yuan Yao
2024-01-22 23:53 ` [PATCH v18 030/121] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2024-01-25 7:56 ` Binbin Wu
2024-02-26 19:01 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 031/121] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 032/121] KVM: x86/mmu: introduce config for PRIVATE KVM MMU isaku.yamahata
2024-02-12 14:18 ` Paolo Bonzini
2024-02-13 2:57 ` Sean Christopherson
2024-02-13 16:47 ` Paolo Bonzini
2024-02-26 17:48 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 033/121] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 034/121] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 035/121] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 036/121] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 037/121] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2024-01-28 13:29 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 038/121] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 039/121] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2024-01-28 13:50 ` Binbin Wu
2024-02-26 19:03 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 040/121] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2024-01-28 13:56 ` Binbin Wu
2024-02-12 17:01 ` Paolo Bonzini
2024-02-26 17:55 ` Isaku Yamahata
2024-02-26 18:02 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 041/121] KVM: x86/mmu: Allow per-VM override of the TDP max page level isaku.yamahata
2024-01-28 14:12 ` Binbin Wu
2024-02-12 10:34 ` Paolo Bonzini
2024-01-22 23:53 ` [PATCH v18 042/121] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 043/121] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 044/121] KVM: x86/mmu: Assume guest MMIOs are shared isaku.yamahata
2024-02-12 10:29 ` Paolo Bonzini
2024-02-26 18:06 ` Isaku Yamahata
2024-02-26 18:39 ` Sean Christopherson
2024-01-22 23:53 ` [PATCH v18 045/121] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 046/121] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2024-01-29 1:50 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 047/121] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2024-01-29 4:29 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 048/121] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2024-01-30 6:09 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 049/121] KVM: x86/tdp_mmu: Apply mmu notifier callback to only shared GPA isaku.yamahata
2024-01-30 7:19 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 050/121] KVM: x86/tdp_mmu: Sprinkle __must_check isaku.yamahata
2024-01-30 8:14 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 051/121] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 052/121] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 053/121] KVM: x86/mmu: TDX: Do not enable page track for TD guest isaku.yamahata
2024-02-04 8:46 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 054/121] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2024-02-04 8:53 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 055/121] KVM: VMX: Move setting of EPT MMU masks to common VT-x code isaku.yamahata
2024-02-04 9:21 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 056/121] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2024-02-05 1:53 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 057/121] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2024-02-05 2:23 ` Binbin Wu
2024-02-26 19:15 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 058/121] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2024-02-05 3:14 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 059/121] KVM: TDX: Require TDP MMU and mmio caching for TDX isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 060/121] KVM: TDX: TDP MMU TDX support isaku.yamahata
2024-01-23 8:43 ` Chenyi Qiang
2024-01-30 15:31 ` Binbin Wu
2024-02-26 19:21 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 061/121] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2024-02-19 5:20 ` Binbin Wu
2024-02-26 19:22 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 062/121] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 063/121] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2024-02-06 19:26 ` Sagi Shahar
2024-01-22 23:53 ` [PATCH v18 064/121] KVM: TDX: Create initial guest memory isaku.yamahata
2024-02-01 0:20 ` Sean Christopherson
2024-02-01 23:06 ` David Matlack
2024-02-26 18:07 ` Isaku Yamahata
2024-02-26 18:50 ` Sean Christopherson
2024-02-27 14:12 ` Isaku Yamahata
2024-02-27 17:30 ` Sean Christopherson
2024-03-08 1:07 ` Isaku Yamahata
2024-02-19 8:54 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 065/121] KVM: TDX: Finalize VM initialization isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 066/121] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 067/121] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2024-02-20 7:27 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 068/121] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 069/121] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2024-02-20 8:56 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 070/121] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 071/121] KVM: TDX: restore user ret MSRs isaku.yamahata
2024-02-20 9:14 ` Binbin Wu
2024-02-26 19:24 ` Isaku Yamahata
2024-01-22 23:53 ` [PATCH v18 072/121] KVM: TDX: Add TSX_CTRL msr into uret_msrs list isaku.yamahata
2024-02-21 6:59 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 073/121] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 074/121] KVM: TDX: complete interrupts after tdexit isaku.yamahata
2024-02-22 14:37 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 075/121] KVM: TDX: restore debug store when TD exit isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 076/121] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 077/121] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2024-02-26 1:27 ` Binbin Wu
2024-01-22 23:53 ` [PATCH v18 078/121] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 079/121] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 080/121] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 081/121] KVM: TDX: Implement interrupt injection isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 082/121] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2024-01-22 23:53 ` [PATCH v18 083/121] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 084/121] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 085/121] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 086/121] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 087/121] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 088/121] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 089/121] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 090/121] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 091/121] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 092/121] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 093/121] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 094/121] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 095/121] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 096/121] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 097/121] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 098/121] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 099/121] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 100/121] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 101/121] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 102/121] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 103/121] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 104/121] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 105/121] KVM: TDX: Silently discard SMI request isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 106/121] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 107/121] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 108/121] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 109/121] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 110/121] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 111/121] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 112/121] KVM: TDX: Ignore setting up mce isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 113/121] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 114/121] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 115/121] KVM: TDX: Inhibit APICv for TDX guest isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 116/121] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 117/121] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 118/121] KVM: TDX: Add hint TDX ioctl to release Secure-EPT isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 119/121] RFC: KVM: x86: Add x86 callback to check cpuid isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 120/121] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2 isaku.yamahata
2024-01-22 23:54 ` [PATCH v18 121/121] [MARKER] the end of (the first phase of) TDX KVM patch series isaku.yamahata
2024-01-29 6:21 ` [PATCH v18 000/121] KVM TDX basic feature support Yuan Yao
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ed33ebe29b231e8e657cd610a983fa603b10f530.1705965634.git.isaku.yamahata@intel.com \
--to=isaku.yamahata@intel.com \
--cc=chen.bo@intel.com \
--cc=erdemaktas@google.com \
--cc=hang.yuan@intel.com \
--cc=isaku.yamahata@gmail.com \
--cc=kai.huang@intel.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=sagis@google.com \
--cc=seanjc@google.com \
--cc=tina.zhang@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).