Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5432798pxv; Wed, 28 Jul 2021 10:34:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz5Mkbs5wsv2pqtyyVqsNGbOxsYiwb78eIBRO1yi204A/wzfx5pRFxMXLh+pYWtfk5qi+xF X-Received: by 2002:a17:906:c44a:: with SMTP id ck10mr562009ejb.496.1627493660920; Wed, 28 Jul 2021 10:34:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627493660; cv=none; d=google.com; s=arc-20160816; b=BwVxuzA8yhpQaoscGpybYhif7+MmRKLW3KyvwEry3JNpECxMehvuO3RoPePCo3m2C1 /8+S2sGFFa6NV1G7fcdKxRU9cB9Tkd6v2FI6WEb+42rI1QwWJfqMdQd+NjXbd0pX7/EK IrXN7BW9PnH07tQqYOzeLND7icqJmKbHNZ/PhOYthPV9XUuF83BFFq+avrWCxyrflEtA rMZ7KM1ueXFNNSCCEotQ5G8DJd2Fv1adoGwL2XqfgXvkYm4+Y3z1ok78vbk9LYJNcyPo mXVKKrcC2qbhZVOIYEbQ1MXlBAnVnHSAl7dPQGmcJFflwFA60TN7/BMlMHCAYDTs9z0u UeNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=qCPT4bVwwR8ai3a6eA6/fF0tOyNcgHz50ZuIx8a534o=; b=ESwE5bVVbSZidy2kv5bGQj6F6d+dl2P3bL/bPq/Rat6++ciVHLBPfp/+wIUgz/fPgQ SltJexNLjRkaWSoCFidk0TBtUzxfCB5zRSaGiZGq1ArRXOLyqe2fMx6vInHXxHG0l7p9 LCbiiGJXMHivZdFp4mnKat2IPMa/ftDTIg05J4lqgdm60yTK9QFIh9IOCAfF3t0Rb01e mzm5e/StbZFbHD/jlZF99jLZwBK7fi+yusO90Px+rpWy+EoyZX9MuB357D8MF1c5DcI3 fiXiOBVq/OWsZ30cq63rLVdUG0tOyJccKhqQJfXS9iP5qGwno26v+L2/e/kW/MTygrut ZQlA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=dMzmTUSn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y8si164332edw.531.2021.07.28.10.33.57; Wed, 28 Jul 2021 10:34:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=dMzmTUSn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229693AbhG1Qv5 (ORCPT + 99 others); Wed, 28 Jul 2021 12:51:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44342 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229515AbhG1Qv5 (ORCPT ); Wed, 28 Jul 2021 12:51:57 -0400 Received: from mail-pl1-x62b.google.com (mail-pl1-x62b.google.com [IPv6:2607:f8b0:4864:20::62b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 713EFC061757 for ; Wed, 28 Jul 2021 09:51:55 -0700 (PDT) Received: by mail-pl1-x62b.google.com with SMTP id d1so3440045pll.1 for ; Wed, 28 Jul 2021 09:51:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=qCPT4bVwwR8ai3a6eA6/fF0tOyNcgHz50ZuIx8a534o=; b=dMzmTUSnosm/iHkWAoP9DVdTxjicL604f4Cb691mO0xLlWzl1lxDi0I5v80JbvapeL xi7SV7RTFrxsT600ehMokUmTeLg69m4nWFIpMWkg5/2VylXavXWLdX5m12NRv7gkznCv LC/keunwPko8qkM4Cmm42n8CIWUrHhCwdMeMeXWpqNnZIcwuJdV6LFztW+QUDQvG4HoM j2CKMaWMy2LQzHH7CioAkmfb4cSiv23lZ8yFvage+0fcOi5z88WDNwpPrk5Swv8kQucn wUSgw6uLYoqWEUM+7P/obhiyEnM4qy/4wUiSdayne+tI4zwFp/m09ycflePra7mYOZvu 8Nyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=qCPT4bVwwR8ai3a6eA6/fF0tOyNcgHz50ZuIx8a534o=; b=pe3BrN+nwtDVyH58F01OxzO2PzGyY1tt5/KgNIc/BN/EYenQJxOv3EDZtq6rl99nOL D8/dAZV05L00M/M+si6UbLURcO79yZG7ySwkYZ/4p2pTdj7A0OyBSwKewsbyL5fRBMaD mEYKYCWHYWWQG4EjEOcoKuZywhz4GfWGWUXMghhH8IC+64W0l4bBNiYUnRcy6+/pgwDR 9XSBxZtW2582jhh4NA2+ieHkgfbA0iQZWuyjd8TzjZGHHppKpvobNGA06tImYUIq4Ojw KgmBgdheKVcE8pyx7Fh2Wl/zWVOGDVSpnWlJBDHcSPkXkOlxnppXq4H16TEO/qlzaTAf XF/g== X-Gm-Message-State: AOAM533hALQYgPzi0sXhSn/vzY5kfKVmycqOUqDkui7dHoEALVeIBsJE eyOGx5010nZRAojR6LEvQyEbjg== X-Received: by 2002:a63:cd4d:: with SMTP id a13mr707167pgj.364.1627491114753; Wed, 28 Jul 2021 09:51:54 -0700 (PDT) Received: from google.com (157.214.185.35.bc.googleusercontent.com. [35.185.214.157]) by smtp.gmail.com with ESMTPSA id f16sm276873pgb.51.2021.07.28.09.51.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Jul 2021 09:51:54 -0700 (PDT) Date: Wed, 28 Jul 2021 16:51:50 +0000 From: Sean Christopherson To: Paolo Bonzini Cc: isaku.yamahata@intel.com, Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , erdemaktas@google.com, Connor Kuehl , x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, isaku.yamahata@gmail.com Subject: Re: [RFC PATCH v2 00/69] KVM: X86: TDX support Message-ID: References: <0d453d76-11e7-aeb9-b890-f457afbb6614@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0d453d76-11e7-aeb9-b890-f457afbb6614@redhat.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 26, 2021, Paolo Bonzini wrote: > On 03/07/21 00:04, isaku.yamahata@intel.com wrote: > > * Patch organization > > The patch 66 is main change. The preceding patches(1-65) The preceding > > patches(01-61) are refactoring the code and introducing additional hooks. > > > > - 01-12: They are preparations. introduce architecture constants, code > > refactoring, export symbols for following patches. > > - 13-40: start to introduce the new type of VM and allow the coexistence of > > multiple type of VM. allow/disallow KVM ioctl where > > appropriate. Especially make per-system ioctl to per-VM ioctl. > > - 41-65: refactoring KVM VMX/MMU and adding new hooks for Secure EPT. > > - 66: main patch to add "basic" support for building/running TDX. > > - 67: trace points for > > - 68-69: Documentation > > Queued 2,3,17-20,23,44-45, thanks. I strongly object to merging these two until we see the new SEAMLDR code: [RFC PATCH v2 02/69] KVM: X86: move kvm_cpu_vmxon() from vmx.c to virtext.h [RFC PATCH v2 03/69] KVM: X86: move out the definition vmcs_hdr/vmcs from kvm to x86 If the SEAMLDR code ends up being fully contained in KVM, then this is unnecessary churn and exposes code outside of KVM that we may not want exposed (yet). E.g. setting and clearing CR4.VMXE (in the fault path) in cpu_vmxon() may not be necessary/desirable for SEAMLDR, we simply can't tell without seeing the code.