linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: isaku.yamahata@intel.com
To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org
Cc: isaku.yamahata@intel.com, isaku.yamahata@gmail.com,
	Paolo Bonzini <pbonzini@redhat.com>,
	erdemaktas@google.com, Sean Christopherson <seanjc@google.com>,
	Sagi Shahar <sagis@google.com>,
	David Matlack <dmatlack@google.com>,
	Kai Huang <kai.huang@intel.com>,
	Zhi Wang <zhi.wang.linux@gmail.com>,
	chen.bo@intel.com, hang.yuan@intel.com, tina.zhang@intel.com,
	Sean Christopherson <sean.j.christopherson@intel.com>
Subject: [PATCH v16 009/116] KVM: TDX: Define TDX architectural definitions
Date: Mon, 16 Oct 2023 09:13:21 -0700	[thread overview]
Message-ID: <c38f6f8c217a32618a254d6a9c4ec114bc321ca2.1697471314.git.isaku.yamahata@intel.com> (raw)
In-Reply-To: <cover.1697471314.git.isaku.yamahata@intel.com>

From: Isaku Yamahata <isaku.yamahata@intel.com>

Define architectural definitions for KVM to issue the TDX SEAMCALLs.

Structures and values that are architecturally defined in the TDX module
specifications the chapter of ABI Reference.

Co-developed-by: Sean Christopherson <sean.j.christopherson@intel.com>
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
---
 arch/x86/kvm/vmx/tdx_arch.h | 213 ++++++++++++++++++++++++++++++++++++
 1 file changed, 213 insertions(+)
 create mode 100644 arch/x86/kvm/vmx/tdx_arch.h

diff --git a/arch/x86/kvm/vmx/tdx_arch.h b/arch/x86/kvm/vmx/tdx_arch.h
new file mode 100644
index 000000000000..845b6ef9f787
--- /dev/null
+++ b/arch/x86/kvm/vmx/tdx_arch.h
@@ -0,0 +1,213 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+/* architectural constants/data definitions for TDX SEAMCALLs */
+
+#ifndef __KVM_X86_TDX_ARCH_H
+#define __KVM_X86_TDX_ARCH_H
+
+#include <linux/types.h>
+
+/*
+ * TDX SEAMCALL API function leaves
+ */
+#define TDH_VP_ENTER			0
+#define TDH_MNG_ADDCX			1
+#define TDH_MEM_PAGE_ADD		2
+#define TDH_MEM_SEPT_ADD		3
+#define TDH_VP_ADDCX			4
+#define TDH_MEM_PAGE_RELOCATE		5
+#define TDH_MEM_PAGE_AUG		6
+#define TDH_MEM_RANGE_BLOCK		7
+#define TDH_MNG_KEY_CONFIG		8
+#define TDH_MNG_CREATE			9
+#define TDH_VP_CREATE			10
+#define TDH_MNG_RD			11
+#define TDH_MR_EXTEND			16
+#define TDH_MR_FINALIZE			17
+#define TDH_VP_FLUSH			18
+#define TDH_MNG_VPFLUSHDONE		19
+#define TDH_MNG_KEY_FREEID		20
+#define TDH_MNG_INIT			21
+#define TDH_VP_INIT			22
+#define TDH_MEM_SEPT_RD			25
+#define TDH_VP_RD			26
+#define TDH_MNG_KEY_RECLAIMID		27
+#define TDH_PHYMEM_PAGE_RECLAIM		28
+#define TDH_MEM_PAGE_REMOVE		29
+#define TDH_MEM_SEPT_REMOVE		30
+#define TDH_MEM_TRACK			38
+#define TDH_MEM_RANGE_UNBLOCK		39
+#define TDH_PHYMEM_CACHE_WB		40
+#define TDH_PHYMEM_PAGE_WBINVD		41
+#define TDH_VP_WR			43
+#define TDH_SYS_LP_SHUTDOWN		44
+
+#define TDG_VP_VMCALL_GET_TD_VM_CALL_INFO		0x10000
+#define TDG_VP_VMCALL_MAP_GPA				0x10001
+#define TDG_VP_VMCALL_GET_QUOTE				0x10002
+#define TDG_VP_VMCALL_REPORT_FATAL_ERROR		0x10003
+#define TDG_VP_VMCALL_SETUP_EVENT_NOTIFY_INTERRUPT	0x10004
+
+/* TDX control structure (TDR/TDCS/TDVPS) field access codes */
+#define TDX_NON_ARCH			BIT_ULL(63)
+#define TDX_CLASS_SHIFT			56
+#define TDX_FIELD_MASK			GENMASK_ULL(31, 0)
+
+#define __BUILD_TDX_FIELD(non_arch, class, field)	\
+	(((non_arch) ? TDX_NON_ARCH : 0) |		\
+	 ((u64)(class) << TDX_CLASS_SHIFT) |		\
+	 ((u64)(field) & TDX_FIELD_MASK))
+
+#define BUILD_TDX_FIELD(class, field)			\
+	__BUILD_TDX_FIELD(false, (class), (field))
+
+#define BUILD_TDX_FIELD_NON_ARCH(class, field)		\
+	__BUILD_TDX_FIELD(true, (class), (field))
+
+
+/* Class code for TD */
+#define TD_CLASS_EXECUTION_CONTROLS	17ULL
+
+/* Class code for TDVPS */
+#define TDVPS_CLASS_VMCS		0ULL
+#define TDVPS_CLASS_GUEST_GPR		16ULL
+#define TDVPS_CLASS_OTHER_GUEST		17ULL
+#define TDVPS_CLASS_MANAGEMENT		32ULL
+
+enum tdx_tdcs_execution_control {
+	TD_TDCS_EXEC_TSC_OFFSET = 10,
+};
+
+/* @field is any of enum tdx_tdcs_execution_control */
+#define TDCS_EXEC(field)		BUILD_TDX_FIELD(TD_CLASS_EXECUTION_CONTROLS, (field))
+
+/* @field is the VMCS field encoding */
+#define TDVPS_VMCS(field)		BUILD_TDX_FIELD(TDVPS_CLASS_VMCS, (field))
+
+enum tdx_vcpu_guest_other_state {
+	TD_VCPU_STATE_DETAILS_NON_ARCH = 0x100,
+};
+
+union tdx_vcpu_state_details {
+	struct {
+		u64 vmxip	: 1;
+		u64 reserved	: 63;
+	};
+	u64 full;
+};
+
+/* @field is any of enum tdx_guest_other_state */
+#define TDVPS_STATE(field)		BUILD_TDX_FIELD(TDVPS_CLASS_OTHER_GUEST, (field))
+#define TDVPS_STATE_NON_ARCH(field)	BUILD_TDX_FIELD_NON_ARCH(TDVPS_CLASS_OTHER_GUEST, (field))
+
+/* Management class fields */
+enum tdx_vcpu_guest_management {
+	TD_VCPU_PEND_NMI = 11,
+};
+
+/* @field is any of enum tdx_vcpu_guest_management */
+#define TDVPS_MANAGEMENT(field)		BUILD_TDX_FIELD(TDVPS_CLASS_MANAGEMENT, (field))
+
+#define TDX_EXTENDMR_CHUNKSIZE		256
+
+struct tdx_cpuid_value {
+	u32 eax;
+	u32 ebx;
+	u32 ecx;
+	u32 edx;
+} __packed;
+
+#define TDX_TD_ATTRIBUTE_DEBUG		BIT_ULL(0)
+#define TDX_TD_ATTR_SEPT_VE_DISABLE	BIT_ULL(28)
+#define TDX_TD_ATTRIBUTE_PKS		BIT_ULL(30)
+#define TDX_TD_ATTRIBUTE_KL		BIT_ULL(31)
+#define TDX_TD_ATTRIBUTE_PERFMON	BIT_ULL(63)
+
+/*
+ * TD_PARAMS is provided as an input to TDH_MNG_INIT, the size of which is 1024B.
+ */
+#define TDX_MAX_VCPUS	(~(u16)0)
+
+struct td_params {
+	u64 attributes;
+	u64 xfam;
+	u16 max_vcpus;
+	u8 reserved0[6];
+
+	u64 eptp_controls;
+	u64 exec_controls;
+	u16 tsc_frequency;
+	u8  reserved1[38];
+
+	u64 mrconfigid[6];
+	u64 mrowner[6];
+	u64 mrownerconfig[6];
+	u64 reserved2[4];
+
+	union {
+		DECLARE_FLEX_ARRAY(struct tdx_cpuid_value, cpuid_values);
+		u8 reserved3[768];
+	};
+} __packed __aligned(1024);
+
+/*
+ * Guest uses MAX_PA for GPAW when set.
+ * 0: GPA.SHARED bit is GPA[47]
+ * 1: GPA.SHARED bit is GPA[51]
+ */
+#define TDX_EXEC_CONTROL_MAX_GPAW      BIT_ULL(0)
+
+/*
+ * TDX requires the frequency to be defined in units of 25MHz, which is the
+ * frequency of the core crystal clock on TDX-capable platforms, i.e. the TDX
+ * module can only program frequencies that are multiples of 25MHz.  The
+ * frequency must be between 100mhz and 10ghz (inclusive).
+ */
+#define TDX_TSC_KHZ_TO_25MHZ(tsc_in_khz)	((tsc_in_khz) / (25 * 1000))
+#define TDX_TSC_25MHZ_TO_KHZ(tsc_in_25mhz)	((tsc_in_25mhz) * (25 * 1000))
+#define TDX_MIN_TSC_FREQUENCY_KHZ		(100 * 1000)
+#define TDX_MAX_TSC_FREQUENCY_KHZ		(10 * 1000 * 1000)
+
+union tdx_sept_entry {
+	struct {
+		u64 r		:  1;
+		u64 w		:  1;
+		u64 x		:  1;
+		u64 mt		:  3;
+		u64 ipat	:  1;
+		u64 leaf	:  1;
+		u64 a		:  1;
+		u64 d		:  1;
+		u64 xu		:  1;
+		u64 ignored0	:  1;
+		u64 pfn		: 40;
+		u64 reserved	:  5;
+		u64 vgp		:  1;
+		u64 pwa		:  1;
+		u64 ignored1	:  1;
+		u64 sss		:  1;
+		u64 spp		:  1;
+		u64 ignored2	:  1;
+		u64 sve		:  1;
+	};
+	u64 raw;
+};
+
+enum tdx_sept_entry_state {
+	TDX_SEPT_FREE = 0,
+	TDX_SEPT_BLOCKED = 1,
+	TDX_SEPT_PENDING = 2,
+	TDX_SEPT_PENDING_BLOCKED = 3,
+	TDX_SEPT_PRESENT = 4,
+};
+
+union tdx_sept_level_state {
+	struct {
+		u64 level	:  3;
+		u64 reserved0	:  5;
+		u64 state	:  8;
+		u64 reserved1	: 48;
+	};
+	u64 raw;
+};
+
+#endif /* __KVM_X86_TDX_ARCH_H */
-- 
2.25.1


  parent reply	other threads:[~2023-10-16 16:39 UTC|newest]

Thread overview: 120+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-10-16 16:13 [PATCH v16 000/116] KVM TDX basic feature support isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 001/116] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 002/116] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup() isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 003/116] KVM: x86/vmx: Refactor KVM VMX module init/exit functions isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 004/116] KVM: VMX: Reorder vmx initialization with kvm vendor initialization isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 005/116] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 006/116] KVM: TDX: Add placeholders for TDX VM/vcpu structure isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 007/116] KVM: TDX: Make TDX VM type supported isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 008/116] [MARKER] The start of TDX KVM patch series: TDX architectural definitions isaku.yamahata
2023-10-16 16:13 ` isaku.yamahata [this message]
2023-10-16 16:13 ` [PATCH v16 010/116] KVM: TDX: Add TDX "architectural" error codes isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 011/116] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 012/116] KVM: TDX: Retry SEAMCALL on the lack of entropy error isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 013/116] KVM: TDX: Add helper functions to print TDX SEAMCALL error isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 014/116] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 015/116] x86/cpu: Add helper functions to allocate/free TDX private host key id isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 016/116] x86/virt/tdx: Add a helper function to return system wide info about TDX module isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 017/116] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 018/116] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 019/116] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 020/116] KVM: TDX: create/destroy VM structure isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 021/116] KVM: TDX: initialize VM with TDX specific parameters isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 022/116] KVM: TDX: Make pmu_intel.c ignore guest TD case isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 023/116] KVM: TDX: Refuse to unplug the last cpu on the package isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 024/116] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 025/116] KVM: TDX: allocate/free TDX vcpu structure isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 026/116] KVM: TDX: Do TDX specific vcpu initialization isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 027/116] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 028/116] KVM: x86/mmu: introduce config for PRIVATE KVM MMU isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 029/116] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 030/116] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 031/116] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 032/116] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 033/116] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 034/116] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 035/116] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 036/116] KVM: x86/mmu: Disallow fast page fault on private GPA isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 037/116] KVM: x86/mmu: Allow per-VM override of the TDP max page level isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 038/116] KVM: VMX: Introduce test mode related to EPT violation VE isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 039/116] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 040/116] KVM: x86/mmu: Assume guest MMIOs are shared isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 041/116] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 042/116] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 043/116] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 044/116] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 045/116] KVM: x86/tdp_mmu: Sprinkle __must_check isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 046/116] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU isaku.yamahata
2023-10-16 16:13 ` [PATCH v16 047/116] [MARKER] The start of TDX KVM patch series: TDX EPT violation isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 048/116] KVM: x86/mmu: TDX: Do not enable page track for TD guest isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 049/116] KVM: VMX: Split out guts of EPT violation to common/exposed function isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 050/116] KVM: VMX: Move setting of EPT MMU masks to common VT-x code isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 051/116] KVM: TDX: Add accessors VMX VMCS helpers isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 052/116] KVM: TDX: Add load_mmu_pgd method for TDX isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 053/116] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 054/116] KVM: TDX: Require TDP MMU and mmio caching for TDX isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 055/116] KVM: TDX: TDP MMU TDX support isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 056/116] KVM: TDX: MTRR: implement get_mt_mask() for TDX isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 057/116] [MARKER] The start of TDX KVM patch series: TD finalization isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 058/116] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 059/116] KVM: TDX: Create initial guest memory isaku.yamahata
2023-11-17 12:56   ` Wang, Wei W
2023-11-17 20:15     ` Isaku Yamahata
2023-11-20 12:01       ` Wang, Wei W
2023-10-16 16:14 ` [PATCH v16 060/116] KVM: TDX: Finalize VM initialization isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 061/116] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 062/116] KVM: TDX: Implement TDX vcpu enter/exit path isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 063/116] KVM: TDX: vcpu_run: save/restore host state(host kernel gs) isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 064/116] KVM: TDX: restore host xsave state when exit from the guest TD isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 065/116] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 066/116] KVM: TDX: restore user ret MSRs isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 067/116] KVM: TDX: Add TSX_CTRL msr into uret_msrs list isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 068/116] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 069/116] KVM: TDX: complete interrupts after tdexit isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 070/116] KVM: TDX: restore debug store when TD exit isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 071/116] KVM: TDX: handle vcpu migration over logical processor isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 072/116] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 073/116] KVM: TDX: Add support for find pending IRQ in a protected local APIC isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 074/116] KVM: x86: Assume timer IRQ was injected if APIC state is proteced isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 075/116] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 076/116] KVM: TDX: Implement interrupt injection isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 077/116] KVM: TDX: Implements vcpu request_immediate_exit isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 078/116] KVM: TDX: Implement methods to inject NMI isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 079/116] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 080/116] KVM: VMX: Move NMI/exception handler to common helper isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 081/116] KVM: x86: Split core of hypercall emulation to helper function isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 082/116] KVM: TDX: Add a place holder to handle TDX VM exit isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 083/116] KVM: TDX: Handle vmentry failure for INTEL TD guest isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 084/116] KVM: TDX: handle EXIT_REASON_OTHER_SMI isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 085/116] KVM: TDX: handle ept violation/misconfig exit isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 086/116] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 087/116] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 088/116] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL) isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 089/116] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 090/116] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 091/116] KVM: TDX: Handle TDX PV CPUID hypercall isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 092/116] KVM: TDX: Handle TDX PV HLT hypercall isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 093/116] KVM: TDX: Handle TDX PV port io hypercall isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 094/116] KVM: TDX: Handle TDX PV MMIO hypercall isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 095/116] KVM: TDX: Implement callbacks for MSR operations for TDX isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 096/116] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 097/116] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 098/116] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 099/116] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 100/116] KVM: TDX: Silently discard SMI request isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 101/116] KVM: TDX: Silently ignore INIT/SIPI isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 102/116] KVM: TDX: Add methods to ignore accesses to CPU state isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 103/116] KVM: TDX: Add methods to ignore guest instruction emulation isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 104/116] KVM: TDX: Add a method to ignore dirty logging isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 105/116] KVM: TDX: Add methods to ignore VMX preemption timer isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 106/116] KVM: TDX: Add methods to ignore accesses to TSC isaku.yamahata
2023-10-16 16:14 ` [PATCH v16 107/116] KVM: TDX: Ignore setting up mce isaku.yamahata
2023-10-16 16:15 ` [PATCH v16 108/116] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch isaku.yamahata
2023-10-16 16:15 ` [PATCH v16 109/116] KVM: TDX: Add methods to ignore virtual apic related operation isaku.yamahata
2023-10-16 16:15 ` [PATCH v16 110/116] KVM: TDX: Inhibit APICv for TDX guest isaku.yamahata
2023-10-16 16:15 ` [PATCH v16 111/116] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX) isaku.yamahata
2023-10-16 16:15 ` [PATCH v16 112/116] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU isaku.yamahata
2023-10-16 16:15 ` [PATCH v16 113/116] KVM: TDX: Add hint TDX ioctl to release Secure-EPT isaku.yamahata
2023-10-16 16:15 ` [PATCH v16 114/116] RFC: KVM: x86: Add x86 callback to check cpuid isaku.yamahata
2023-10-16 16:15 ` [PATCH v16 115/116] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2 isaku.yamahata
2023-10-16 16:15 ` [PATCH v16 116/116] [MARKER] the end of (the first phase of) TDX KVM patch series isaku.yamahata

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c38f6f8c217a32618a254d6a9c4ec114bc321ca2.1697471314.git.isaku.yamahata@intel.com \
    --to=isaku.yamahata@intel.com \
    --cc=chen.bo@intel.com \
    --cc=dmatlack@google.com \
    --cc=erdemaktas@google.com \
    --cc=hang.yuan@intel.com \
    --cc=isaku.yamahata@gmail.com \
    --cc=kai.huang@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=sagis@google.com \
    --cc=sean.j.christopherson@intel.com \
    --cc=seanjc@google.com \
    --cc=tina.zhang@intel.com \
    --cc=zhi.wang.linux@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).