Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp898496pxt; Fri, 6 Aug 2021 17:22:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxkvEuNKG4j61qLmjleLKnk+l/ugboFKN9QXe0sO6AW9b5+h6QIvhVTA66N/c8O0ZV1NGWi X-Received: by 2002:a05:6638:303:: with SMTP id w3mr4775534jap.79.1628295731733; Fri, 06 Aug 2021 17:22:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628295731; cv=none; d=google.com; s=arc-20160816; b=dwx+GscZXmcQbpst8aYgWt3PAN5S4uvsa+boLOd9rw807Itbbrx5rGPyvBJof5AvT7 0HCrsSSFBOEXHSsHBL0GjbRNCWB8FUOoOkEmWhG2O4O8C4AR2+rJ1IDTUiaLrwntuI6p kd9XJ9LHS78/sSy8Ti5hCTI342hU2m9/evbpbfErDqp+ch+Ltxpdv4LSkRJXL2IfJZlV dOh7h+hZ2+vemH+P0ZPQr1ZIDatunNrkmbszlXQqI8n0kS4FE+sD6MAJPSlyztddDOqR 8PWGfimt4hJtzhjB4pnighjIQJeplw2nwftqL5YEBTGqXYfRSPh62L6oQSyL8zRl7VwI uTkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=qsTGDZKI9eiCRzf0+2pBzHw0K+2H4nblzECCoJCZYms=; b=Ua017i/S5SZAwmoKdtK9YV136pib0JfgZEnGAlAZZcgV7NmOuwhRBZKxd5zI9jzD+d cXdjYTSrPGIxFXqpfFcQfu3u7X7I0eY/OLOdhBI3lj0ETERoLd7acRAc0aSsPlCa7UB2 jWG2ZkI7NcH7iMiUumW0HbiYBiLiMar1ntSE0peXWnK/WZ6ZBdpD6AwjxqXAQfJU+HLq L4nW/jucmBifMbDOeCllZH0CGdyMRtH4BGS4aXRZDsNyifbWqt1DZcYia4sNFHZwONto VxAhPkmw4AcLARwuIDxc473WgiAuAJXDVbMUVzH8gafsZ42QuE5cdCySyxNl7QPcTpCw RpGw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y196si3762897iof.32.2021.08.06.17.22.00; Fri, 06 Aug 2021 17:22:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245524AbhHFWYq (ORCPT + 99 others); Fri, 6 Aug 2021 18:24:46 -0400 Received: from mga18.intel.com ([134.134.136.126]:44002 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241242AbhHFWYq (ORCPT ); Fri, 6 Aug 2021 18:24:46 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10068"; a="201633025" X-IronPort-AV: E=Sophos;i="5.84,301,1620716400"; d="scan'208";a="201633025" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Aug 2021 15:24:29 -0700 X-IronPort-AV: E=Sophos;i="5.84,301,1620716400"; d="scan'208";a="672548845" Received: from alsoller-mobl1.amr.corp.intel.com (HELO khuang2-desk.gar.corp.intel.com) ([10.254.16.75]) by fmsmga005-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Aug 2021 15:24:25 -0700 Date: Sat, 7 Aug 2021 10:24:23 +1200 From: Kai Huang To: Sean Christopherson Cc: isaku.yamahata@intel.com, Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , erdemaktas@google.com, Connor Kuehl , x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, isaku.yamahata@gmail.com, Rick Edgecombe Subject: Re: [RFC PATCH v2 41/69] KVM: x86: Add infrastructure for stolen GPA bits Message-Id: <20210807102423.f896d034690ef91cd1e18f44@intel.com> In-Reply-To: References: <20210805234424.d14386b79413845b990a18ac@intel.com> <20210806095922.6e2ca6587dc6f5b4fe8d52e7@intel.com> <20210807100006.3518bf9fbdecf13006030c22@intel.com> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 6 Aug 2021 22:09:35 +0000 Sean Christopherson wrote: > On Sat, Aug 07, 2021, Kai Huang wrote: > > So could we have your final suggestion? :) > > Try the kvm_mmu_page_role.private approach. So long as it doesn't end up splattering > code everywhere, I think that's more aligned with how KVM generally wants to treat > the shared bit. OK. > > In the changelog for this patch, make it very clear that ensuring different aliases > get different shadow page (if necessary) is the responsiblity of each individual > feature that leverages stolen gfn bits. Make sense. Thanks.