Received: by 10.223.185.116 with SMTP id b49csp192wrg; Fri, 2 Mar 2018 12:26:45 -0800 (PST) X-Google-Smtp-Source: AG47ELuCZJe2vN7RNzJi/lqgIm9jBtFFlDenXa4mRr13KyGLzCn/GtTsIpSxN2rtWNz8T1GHVcmq X-Received: by 2002:a17:902:8b82:: with SMTP id ay2-v6mr6269862plb.12.1520022404864; Fri, 02 Mar 2018 12:26:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520022404; cv=none; d=google.com; s=arc-20160816; b=nh8KhtGAV59u6v8isHPFt6NL9NvC4CK31mDraYApjwo5xVMWsp2q/1uQf0vLdwRSL1 75qAy8ndOQqDUcJ14JitiLOjMxfZoPsGyqkUC2wPo136iFjE9rXEX1Gsr60YGUCyMjlu AdYM8u5glUTKtrxEMfyNJ98xSrlYgWM60T0NezjVCH29x9rZsuWKILqN0Dp578q2U7ur 53i20jL7vWaBeWpkTqDcz/+AKGvdFb8hRG/xjWkpYdo6x6E751LSziwS5CyFETRBatIm 0ZIVQRn8Mx6F+UC6YPmD6oX5VYZbrd5QLpaeXwgY4i/N24F3g21EAHdnezE8HMe8pXRF 9CAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=ZFr+pei3yfUI1YpMdhvUMDf5YO+dSgnHavta/g5W9tU=; b=uZEGMX8UxWLkYUmMrvc9zASpjvkzlWKzJkbhC5YEX7THuiyw1Lbd/ULk3lHCcmQaCy RD39VebhF2mw8QAgy+QEcLf5qqjwrzQI8pxL24CIlTmkVhmNbCBZLTkRQrdbm9+nAnDm gaFtsQU82bfgjNDJtI+PYY1UIXT5xLxtH5HKl39e4d6RSlefXrkcc+rvT7KIfpPVP/tK GHvRRgIKUd1BfGvzPhu2iKt3aw3YiGQOVvsqqsK21+X8jnJBiYFvMQGbwHjoUX0Uew6t li66CKr/OeexmBvTIX0R+5man/uMjks2BhT4MdkpKPHcgpHy+NEJBVQQlwSHKW/hGCns PzVg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h11si4439127pgq.28.2018.03.02.12.26.28; Fri, 02 Mar 2018 12:26:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1946810AbeCBRkt (ORCPT + 99 others); Fri, 2 Mar 2018 12:40:49 -0500 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:48606 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1946796AbeCBRkr (ORCPT ); Fri, 2 Mar 2018 12:40:47 -0500 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C5BF140FB658; Fri, 2 Mar 2018 17:40:46 +0000 (UTC) Received: from [10.36.116.70] (ovpn-116-70.ams2.redhat.com [10.36.116.70]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0FD94AB588; Fri, 2 Mar 2018 17:40:44 +0000 (UTC) Subject: Re: [PATCH 00/10] KVM/X86: Handle guest memory that does not have a struct page To: Jim Mattson , "Raslan, KarimAllah" Cc: "linux-kernel@vger.kernel.org" , "kvm@vger.kernel.org" , "x86@kernel.org" , "hpa@zytor.com" , "rkrcmar@redhat.com" , "tglx@linutronix.de" , "mingo@redhat.com" References: <1519235241-6500-1-git-send-email-karahmed@amazon.de> <1519917874.15908.41.camel@amazon.de> From: Paolo Bonzini Message-ID: <7003cc1a-fc0a-f814-a2fd-189974003605@redhat.com> Date: Fri, 2 Mar 2018 18:40:43 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Fri, 02 Mar 2018 17:40:46 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Fri, 02 Mar 2018 17:40:46 +0000 (UTC) for IP:'10.11.54.5' DOMAIN:'int-mx05.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'pbonzini@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/03/2018 18:51, Jim Mattson wrote: > No complaints here! It seems sane here too, I'll review the individual patches as soon as possible. Thanks, Paolo > On Thu, Mar 1, 2018 at 7:24 AM, Raslan, KarimAllah wrote: >> Jim/Paolo/Radim, >> >> Any complains about the current API? (introduced in 4/10) >> >> I have more patches on top and I would like to ensure that this is >> agreed upon at least before sending more revisions/patches. >> >> Also 1, 2, and 3 should be a bit straight forward and does not use >> this API. >> >> Thanks. >> >> On Wed, 2018-02-21 at 18:47 +0100, KarimAllah Ahmed wrote: >>> For the most part, KVM can handle guest memory that does not have a struct >>> page (i.e. not directly managed by the kernel). However, There are a few places >>> in the code, specially in the nested code, that does not support that. >>> >>> Patch 1, 2, and 3 avoid the mapping and unmapping all together and just >>> directly use kvm_guest_read and kvm_guest_write. >>> >>> Patch 4 introduces a new guest mapping interface that encapsulate all the >>> bioler plate code that is needed to map and unmap guest memory. It also >>> supports guest memory without "struct page". >>> >>> Patch 5, 6, 7, 8, 9, and 10 switch most of the offending code in VMX and hyperv >>> to use the new guest mapping API. >>> >>> This patch series is the first set of fixes. Handling SVM and APIC-access page >>> will be handled in a different patch series. >>> >>> KarimAllah Ahmed (10): >>> X86/nVMX: handle_vmon: Read 4 bytes from guest memory instead of >>> map->read->unmap sequence >>> X86/nVMX: handle_vmptrld: Copy the VMCS12 directly from guest memory >>> instead of map->copy->unmap sequence. >>> X86/nVMX: Update the PML table without mapping and unmapping the page >>> KVM: Introduce a new guest mapping API >>> KVM/nVMX: Use kvm_vcpu_map when mapping the L1 MSR bitmap >>> KVM/nVMX: Use kvm_vcpu_map when mapping the virtual APIC page >>> KVM/nVMX: Use kvm_vcpu_map when mapping the posted interrupt >>> descriptor table >>> KVM/X86: Use kvm_vcpu_map in emulator_cmpxchg_emulated >>> KVM/X86: hyperv: Use kvm_vcpu_map in synic_clear_sint_msg_pending >>> KVM/X86: hyperv: Use kvm_vcpu_map in synic_deliver_msg >>> >>> arch/x86/kvm/hyperv.c | 28 ++++----- >>> arch/x86/kvm/vmx.c | 144 +++++++++++++++-------------------------------- >>> arch/x86/kvm/x86.c | 13 ++--- >>> include/linux/kvm_host.h | 15 +++++ >>> virt/kvm/kvm_main.c | 50 ++++++++++++++++ >>> 5 files changed, 129 insertions(+), 121 deletions(-) >>> >> Amazon Development Center Germany GmbH >> Berlin - Dresden - Aachen >> main office: Krausenstr. 38, 10117 Berlin >> Geschaeftsfuehrer: Dr. Ralf Herbrich, Christian Schlaeger >> Ust-ID: DE289237879 >> Eingetragen am Amtsgericht Charlottenburg HRB 149173 B