Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2288620pxp; Fri, 18 Mar 2022 07:28:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy5p49c1QtGa17rRIB6Xzrdll5FSVHQJwvnhE9PRZITcoBhEMFJpCToB3V1mA/qiNSC+zIj X-Received: by 2002:a63:1258:0:b0:381:640e:9be5 with SMTP id 24-20020a631258000000b00381640e9be5mr8134391pgs.184.1647613733037; Fri, 18 Mar 2022 07:28:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647613733; cv=none; d=google.com; s=arc-20160816; b=mY0VIKmgeutq6Hv7ZgMeSaoZR9K7rznonHSO4bBTzwYntmVo5twpc6ejBBUWIv8YEs ykPFCm2fXLFjZbzt56TxKF3T6J5lN6UyJMRaIWYKLsC8qknL6jq40GZxrnuktYfe2d3U MBXbQH7biNq5diEBOlXYvbgYNagAEz1Wa/0/10Cj3EPEmVQc81cBEvozJgTgtepHrSln aUcSuNMPW/ssrdwAbRu3yX6Q5L5t0hHJqwp6uiY7/F4cLpPs9N3hSLX+3VqDU5VXCYeE nrdDexCM1IbfzWHzkH/25pDIpOWZNs8G199tkAUe7EEtFwvvIdNYPRmTLqhaU9x/pO3S 0xVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=4wSZhgaqIYsP4hDMTAQTRgL+6/6cnifcNEpoVmoaMWU=; b=j9CBkkd/tYQls0waDuss2T5hxrFn+XU7eQnvNNFypJpq7EGl2MXzccdQrOCgWWuJFx EnCpss/tgIHFANpfqrp8F0HaZyTGZov8AazDsIxxXG9Lu5mPneKVHDECL6MgU/17EgzT o6GZ0Htznr9cyBFX74NtgI1e6ApriDRCpBHA/2Kk0qVBNfnIxrMLh8CGrISLUxvC+Nws 7qoGenUZ5+A08YtaXV9rri/JEBp1aucbN2JvQBjKIWBv05A2yRK+LhtAzpHcxNBmgktu cwkL9J8oqQd4uiS3H10D+bELCdm1BrzVrO2FJao0On+1DfyAQp7YS4XqJeewvIQUbSOp 4cCw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=cNnaZvPm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mn18-20020a17090b189200b001bd14e01f7fsi1428096pjb.109.2022.03.18.07.28.39; Fri, 18 Mar 2022 07:28:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=cNnaZvPm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236493AbiCRNE1 (ORCPT + 99 others); Fri, 18 Mar 2022 09:04:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54420 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236494AbiCRNEU (ORCPT ); Fri, 18 Mar 2022 09:04:20 -0400 Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64D4EE26 for ; Fri, 18 Mar 2022 06:03:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1647608581; x=1679144581; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=y13Cjuw2H7tEE+1BWa6OiwOSaXllXsUoc+JlxP8YghY=; b=cNnaZvPmV9NHfT7kcqBlufn3tdQtjL4cUj+veDTTi8yW8+MLm1XqgFr7 FnhOClRyC7QX1xljrdtrtAxXkJG3ELJz9rofiX46+YW3Va2MByz/AZ8b7 ipz6xcb6NFg+YwO3OOnNDSaNzwB0fNje2y9nmbAAMv1c7MtGZdXFM1q7K nOSUqQSIKA92JWD24qw7yER4fXCosNP9WO5sFoxBZNLuw2xhQaKbZuPjR uEeiB8VTQArX2rAYsXVWSFgk9GqkUHaLMjqmpP9mMQZu81cZEn6pqG6DK wQJx5aM1FnHTbo9I981ZgIg8uMM5iH09sFN0IQQkTtztK9bl7QbC+V/yB g==; X-IronPort-AV: E=McAfee;i="6200,9189,10289"; a="244586024" X-IronPort-AV: E=Sophos;i="5.90,192,1643702400"; d="scan'208";a="244586024" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Mar 2022 06:03:01 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,192,1643702400"; d="scan'208";a="822276642" Received: from black.fi.intel.com ([10.237.72.28]) by fmsmga005.fm.intel.com with ESMTP; 18 Mar 2022 06:02:54 -0700 Received: by black.fi.intel.com (Postfix, from userid 1000) id C806810E; Fri, 18 Mar 2022 15:03:13 +0200 (EET) Date: Fri, 18 Mar 2022 16:03:13 +0300 From: "Kirill A. Shutemov" To: Peter Zijlstra Cc: Dave Hansen , Thomas Gleixner , mingo@redhat.com, bp@alien8.de, luto@kernel.org, sathyanarayanan.kuppuswamy@linux.intel.com, aarcange@redhat.com, ak@linux.intel.com, dan.j.williams@intel.com, david@redhat.com, hpa@zytor.com, jgross@suse.com, jmattson@google.com, joro@8bytes.org, jpoimboe@redhat.com, knsathya@kernel.org, pbonzini@redhat.com, sdeep@vmware.com, seanjc@google.com, tony.luck@intel.com, vkuznets@redhat.com, wanpengli@tencent.com, thomas.lendacky@amd.com, brijesh.singh@amd.com, x86@kernel.org, linux-kernel@vger.kernel.org, Sean Christopherson , Dave Hansen Subject: Re: [PATCHv6 07/30] x86/traps: Add #VE support for TDX guest Message-ID: <20220318130313.tv7vecdahoakbetf@black.fi.intel.com> References: <20220316020856.24435-1-kirill.shutemov@linux.intel.com> <20220316020856.24435-8-kirill.shutemov@linux.intel.com> <877d8t2ykp.ffs@tglx> <20220317173354.rqymufl37lcrtmjh@black.fi.intel.com> <20220317202141.GO8939@worktop.programming.kicks-ass.net> <5b3bece3-5956-3116-a07c-a0b6f380fac8@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 18, 2022 at 11:55:11AM +0100, Peter Zijlstra wrote: > On Thu, Mar 17, 2022 at 01:32:07PM -0700, Dave Hansen wrote: > > > The TDX rules are *much* nicer than SEV. They're also a lot nicer on > > TDX _now_ than they used to be. There are a few stubborn people at > > Intel who managed to add some drops of sanity to the architecture. > > Right; that is saner than it used to be. I have definite memories that > pages could be taken back by the TDX thing and would need > re-authentication. A pool of 'fixed' pages was talked about. I'm glad to > hear all that is gone. Right, VMM can still pull memory form the guest at any point, but reference of such memory from the guest would lead not to #VE as before, but to TD termination. -- Kirill A. Shutemov