Patch Series

Subject KVM: x86/mmu: TDX post-populate cleanups
Author seanjc@google.com
Date 2025-10-17 00:32:19 +0000 UTC
Version 3
Cc ackerleytng@google.com anup@brainfault.org aou@eecs.berkeley.edu binbin.wu@linux.intel.com borntraeger@linux.ibm.com chenhuacai@kernel.org frankja@linux.ibm.com imbrenda@linux.ibm.com ira.weiny@intel.com kai.huang@intel.com kas@kernel.org kvm-riscv@lists.infradead.org kvm@vger.kernel.org kvmarm@lists.linux.dev linux-arm-kernel@lists.infradead.org linux-coco@lists.linux.dev linux-kernel@vger.kernel.org linux-mips@vger.kernel.org linux-riscv@lists.infradead.org linuxppc-dev@lists.ozlabs.org loongarch@lists.linux.dev maddy@linux.ibm.com maobibo@loongson.cn maz@kernel.org michael.roth@amd.com oliver.upton@linux.dev palmer@dabbelt.com pbonzini@redhat.com pjw@kernel.org rick.p.edgecombe@intel.com seanjc@google.com vannapurve@google.com x86@kernel.org yan.y.zhao@intel.com zhaotianrui@loongson.cn

Patches (25)

Name Content [All]
[PATCH v3 01/25] KVM: Make support for kvm_arch_vcpu_async_ioctl() mandatory [Body]
[PATCH v3 02/25] KVM: Rename kvm_arch_vcpu_async_ioctl() to kvm_arch_vcpu_unlocked_ioctl() [Body]
[PATCH v3 03/25] KVM: TDX: Drop PROVE_MMU=y sanity check on to-be-populated mappings [Body]
[PATCH v3 04/25] KVM: x86/mmu: Add dedicated API to map guest_memfd pfn into TDP MMU [Body]
[PATCH v3 05/25] Revert "KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU" [Body]
[PATCH v3 06/25] KVM: x86/mmu: Rename kvm_tdp_map_page() to kvm_tdp_page_prefault() [Body]
[PATCH v3 07/25] KVM: TDX: Drop superfluous page pinning in S-EPT management [Body]
[PATCH v3 08/25] KVM: TDX: Return -EIO, not -EINVAL, on a KVM_BUG_ON() condition [Body]
[PATCH v3 09/25] KVM: TDX: Fold tdx_sept_drop_private_spte() into tdx_sept_remove_private_spte() [Body]
[PATCH v3 10/25] KVM: x86/mmu: Drop the return code from kvm_x86_ops.remove_external_spte() [Body]
[PATCH v3 11/25] KVM: TDX: Avoid a double-KVM_BUG_ON() in tdx_sept_zap_private_spte() [Body]
[PATCH v3 12/25] KVM: TDX: Use atomic64_dec_return() instead of a poor equivalent [Body]
[PATCH v3 13/25] KVM: TDX: Fold tdx_mem_page_record_premap_cnt() into its sole caller [Body]
[PATCH v3 14/25] KVM: TDX: Bug the VM if extended the initial measurement fails [Body]
[PATCH v3 15/25] KVM: TDX: ADD pages to the TD image while populating mirror EPT entries [Body]
[PATCH v3 16/25] KVM: TDX: Fold tdx_sept_zap_private_spte() into tdx_sept_remove_private_spte() [Body]
[PATCH v3 17/25] KVM: TDX: Combine KVM_BUG_ON + pr_tdx_error() into TDX_BUG_ON() [Body]
[PATCH v3 18/25] KVM: TDX: Derive error argument names from the local variable names [Body]
[PATCH v3 19/25] KVM: TDX: Assert that mmu_lock is held for write when removing S-EPT entries [Body]
[PATCH v3 20/25] KVM: TDX: Add macro to retry SEAMCALLs when forcing vCPUs out of guest [Body]
[PATCH v3 21/25] KVM: TDX: Add tdx_get_cmd() helper to get and validate sub-ioctl command [Body]
[PATCH v3 22/25] KVM: TDX: Convert INIT_MEM_REGION and INIT_VCPU to "unlocked" vCPU ioctl [Body]
[PATCH v3 23/25] KVM: TDX: Use guard() to acquire kvm->lock in tdx_vm_ioctl() [Body]
[PATCH v3 24/25] KVM: TDX: Guard VM state transitions with "all" the locks [Body]
[PATCH v3 25/25] KVM: TDX: Fix list_add corruption during vcpu_load() [Body]

Session 2025-10-17

ID (for dev) 450e5587-d202-4806-b916-6604de49830a
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 1fdbb3ff1233e204e26f9f6821ae9c125a055229 [Config] passed [Log]
[KASAN] Boot test: Base 1fdbb3ff1233e204e26f9f6821ae9c125a055229 [Config] passed
[KASAN] Build Patched 1fdbb3ff1233e204e26f9f6821ae9c125a055229 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 1fdbb3ff1233e204e26f9f6821ae9c125a055229 [Config] [patched] passed
[KASAN] Fuzzing 1fdbb3ff1233e204e26f9f6821ae9c125a055229 [Config] 1fdbb3ff1233e204e26f9f6821ae9c125a055229 [Config] [patched] passed [Log] [Artifacts]