Patch Series

Subject KVM: x86/mmu: TDX post-populate cleanups
Author seanjc@google.com
Date 2025-10-30 20:09:24 +0000 UTC
Version 4
Cc ackerleytng@google.com anup@brainfault.org aou@eecs.berkeley.edu binbin.wu@linux.intel.com borntraeger@linux.ibm.com chenhuacai@kernel.org frankja@linux.ibm.com imbrenda@linux.ibm.com ira.weiny@intel.com kai.huang@intel.com kas@kernel.org kvm-riscv@lists.infradead.org kvm@vger.kernel.org kvmarm@lists.linux.dev linux-arm-kernel@lists.infradead.org linux-coco@lists.linux.dev linux-kernel@vger.kernel.org linux-mips@vger.kernel.org linux-riscv@lists.infradead.org linuxppc-dev@lists.ozlabs.org loongarch@lists.linux.dev maddy@linux.ibm.com maobibo@loongson.cn maz@kernel.org michael.roth@amd.com oliver.upton@linux.dev palmer@dabbelt.com pbonzini@redhat.com pjw@kernel.org rick.p.edgecombe@intel.com seanjc@google.com vannapurve@google.com x86@kernel.org yan.y.zhao@intel.com zhaotianrui@loongson.cn

Patches (28)

Name Content [All]
[PATCH v4 01/28] KVM: Make support for kvm_arch_vcpu_async_ioctl() mandatory [Body]
[PATCH v4 02/28] KVM: Rename kvm_arch_vcpu_async_ioctl() to kvm_arch_vcpu_unlocked_ioctl() [Body]
[PATCH v4 03/28] KVM: TDX: Drop PROVE_MMU=y sanity check on to-be-populated mappings [Body]
[PATCH v4 04/28] KVM: x86/mmu: Add dedicated API to map guest_memfd pfn into TDP MMU [Body]
[PATCH v4 05/28] KVM: x86/mmu: WARN if KVM attempts to map into an invalid TDP MMU root [Body]
[PATCH v4 06/28] Revert "KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU" [Body]
[PATCH v4 07/28] KVM: x86/mmu: Rename kvm_tdp_map_page() to kvm_tdp_page_prefault() [Body]
[PATCH v4 08/28] KVM: TDX: Drop superfluous page pinning in S-EPT management [Body]
[PATCH v4 09/28] KVM: TDX: Return -EIO, not -EINVAL, on a KVM_BUG_ON() condition [Body]
[PATCH v4 10/28] KVM: TDX: Fold tdx_sept_drop_private_spte() into tdx_sept_remove_private_spte() [Body]
[PATCH v4 11/28] KVM: x86/mmu: Drop the return code from kvm_x86_ops.remove_external_spte() [Body]
[PATCH v4 12/28] KVM: TDX: WARN if mirror SPTE doesn't have full RWX when creating S-EPT mapping [Body]
[PATCH v4 13/28] KVM: TDX: Avoid a double-KVM_BUG_ON() in tdx_sept_zap_private_spte() [Body]
[PATCH v4 14/28] KVM: TDX: Use atomic64_dec_return() instead of a poor equivalent [Body]
[PATCH v4 15/28] KVM: TDX: Fold tdx_mem_page_record_premap_cnt() into its sole caller [Body]
[PATCH v4 16/28] KVM: TDX: ADD pages to the TD image while populating mirror EPT entries [Body]
[PATCH v4 17/28] KVM: TDX: Fold tdx_sept_zap_private_spte() into tdx_sept_remove_private_spte() [Body]
[PATCH v4 18/28] KVM: TDX: Combine KVM_BUG_ON + pr_tdx_error() into TDX_BUG_ON() [Body]
[PATCH v4 19/28] KVM: TDX: Derive error argument names from the local variable names [Body]
[PATCH v4 20/28] KVM: TDX: Assert that mmu_lock is held for write when removing S-EPT entries [Body]
[PATCH v4 21/28] KVM: TDX: Add macro to retry SEAMCALLs when forcing vCPUs out of guest [Body]
[PATCH v4 22/28] KVM: TDX: Add tdx_get_cmd() helper to get and validate sub-ioctl command [Body]
[PATCH v4 23/28] KVM: TDX: Convert INIT_MEM_REGION and INIT_VCPU to "unlocked" vCPU ioctl [Body]
[PATCH v4 24/28] KVM: TDX: Use guard() to acquire kvm->lock in tdx_vm_ioctl() [Body]
[PATCH v4 25/28] KVM: TDX: Don't copy "cmd" back to userspace for KVM_TDX_CAPABILITIES [Body]
[PATCH v4 26/28] KVM: TDX: Guard VM state transitions with "all" the locks [Body]
[PATCH v4 27/28] KVM: TDX: Bug the VM if extending the initial measurement fails [Body]
[PATCH v4 28/28] KVM: TDX: Fix list_add corruption during vcpu_load() [Body]

Session 2025-10-30

ID (for dev) b98ebb88-3936-498a-b231-3e4199e0aac3
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 8fec172c82c2b5f6f8e47ab837c1dc91ee3d1b87 [Config] passed [Log]
[KASAN] Boot test: Base 8fec172c82c2b5f6f8e47ab837c1dc91ee3d1b87 [Config] passed
[KASAN] Build Patched 8fec172c82c2b5f6f8e47ab837c1dc91ee3d1b87 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 8fec172c82c2b5f6f8e47ab837c1dc91ee3d1b87 [Config] [patched] passed
[KASAN] Fuzzing 8fec172c82c2b5f6f8e47ab837c1dc91ee3d1b87 [Config] 8fec172c82c2b5f6f8e47ab837c1dc91ee3d1b87 [Config] [patched] passed [Log] [Artifacts]