[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9c726906-10d3-47c6-acec-18604eb83e0d@intel.com>
Date: Mon, 16 Dec 2024 20:35:16 +0800
From: "Huang, Kai" <kai.huang@...el.com>
To: Paolo Bonzini <pbonzini@...hat.com>, <linux-kernel@...r.kernel.org>,
<kvm@...r.kernel.org>
CC: <yan.y.zhao@...el.com>, <isaku.yamahata@...el.com>,
<binbin.wu@...ux.intel.com>, <rick.p.edgecombe@...el.com>
Subject: Re: [PATCH 09/18] KVM: x86/tdp_mmu: Extract root invalid check from
tdx_mmu_next_root()
On 14/12/2024 3:57 am, Paolo Bonzini wrote:
> From: Isaku Yamahata<isaku.yamahata@...el.com>
>
> Extract tdp_mmu_root_match() to check if the root has given types and use
> it for the root page table iterator. It checks only_invalid now.
>
> TDX KVM operates on a shared page table only (Shared-EPT), a mirrored page
> table only (Secure-EPT), or both based on the operation. KVM MMU notifier
> operations only on shared page table. KVM guest_memfd invalidation
> operations only on mirrored page table, and so on. Introduce a centralized
> matching function instead of open coding matching logic in the iterator.
> The next step is to extend the function to check whether the page is shared
> or private
Missing a period at the end of the sentence.
Powered by blists - more mailing lists