On Thu, Jun 15, 2023 at 09:46:59PM -0700, Dexuan Cui wrote: > The two patches (which are based on the latest x86/tdx branch in the tip > tree) are the x86/tdx part of the v6 patchset: > https://lwn.net/ml/linux-kernel/20230504225351.10765-1-decui@xxxxxxxxxxxxx/ > > The other patches of the v6 patchset needs more changes in preparation for > the upcoming paravisor support, so let me post the x86/tdx part first. > > This v7 patchset addressed Dave's comments on patch 1: > see https://lwn.net/ml/linux-kernel/SA1PR21MB1335736123C2BCBBFD7460C3BF46A@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/ > > Patch 2 is just a repost. There was a race between set_memory_encrypted() > and load_unaligned_zeropad(), which has been fixed by the 3 patches of > Kirill in the x86/tdx branch of the tip tree: > 3f6819dd192e ("x86/mm: Allow guest.enc_status_change_prepare() to fail") > 195edce08b63 ("x86/tdx: Fix race between set_memory_encrypted() and load_unaligned_zeropad()") > 94142c9d1bdf ("x86/mm: Fix enc_status_change_finish_noop()") > (see https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/log/?h=x86/tdx) > > If you want to view the patchset on github, it is here: > https://github.com/dcui/tdx/commits/decui/upstream-tip/x86/tdx/v7 JFYI, it won't apply to tip/master. Unaccepted memory changed the code you patching. -- Kiryl Shutsemau / Kirill A. Shutemov