Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp4965340rwb; Tue, 17 Jan 2023 07:35:51 -0800 (PST) X-Google-Smtp-Source: AMrXdXtcM/tx6YbRTMbS3WulyQ8gJhNCxgnaQbvP1woIwbquL+vSF32cfxxmuQK0oA1Q3UqJVghE X-Received: by 2002:a17:90b:18a:b0:228:c8a1:3510 with SMTP id t10-20020a17090b018a00b00228c8a13510mr3493944pjs.5.1673969751695; Tue, 17 Jan 2023 07:35:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673969751; cv=none; d=google.com; s=arc-20160816; b=BtZp+j+cWCbYMSYyAp3cXkeCvPZJrELveYzuswgXYlgG6Ne4c3XybrQlJqA07gHxqT Isrr/w7Ft8b/YI/VPS79C1hlp5CS4eVjNe05jX4aUjWcO1543Zt5r80hIEd5Gar7OK9N 1uJX3bJ/Ewtidvn9nPqsLzizT1+D53WdPFCQTKjBhJu2xCgzlxMmUgGJH5qceUQY0Ccm if234i8jW3SPOIxnvXuZtExxZwaDILU1jf34juMI+5sfh2L9MhSffwSEBqpWQ3/sqjwC +vagVL6q67CGfZAEFl4+fj3eVvckno3+72HoYT6RuFToMtJEixrGOIpFgwYtNBsqYKtL pSRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=7yhLGsprr4iGbKzba+JN1VXXF3TeC3cedN8+F9epKwY=; b=gjhi3caeOTSeJOQQl2M9yoArkyqdNZTVjOQKhV2YvYUoZ5Na2Nwar0YALnMSSRLM31 +XlEu28DajKPsuqVgXbsZiSxQrmzK6RXIzPuWCOJ2A2oYow3/zHaq+CSE4aJepez7riv NqBT6ifGdf2T7PVs5MAXeUlWyUsZKuJqqSDmG/YiIaKRfxpdDI+L9xhcIL2w74Y7/yup 1gQHM24SnaTj5sMskevc10ic9PZBdu09pRm9WL2yWvE1ut1xuArv3URdTo7lrBnLCx1U fg3F46/XB5ySKQmiDYyBXh9TuaO+lsJkxwJiVIz+MEvGydmrMBs07/T+9r/h1R10KBdN F6tg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=BWKfON0O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nv10-20020a17090b1b4a00b002290c209ccdsi16129374pjb.150.2023.01.17.07.35.44; Tue, 17 Jan 2023 07:35:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=BWKfON0O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231963AbjAQOdG (ORCPT + 48 others); Tue, 17 Jan 2023 09:33:06 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53552 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230167AbjAQOdA (ORCPT ); Tue, 17 Jan 2023 09:33:00 -0500 Received: from mail-lf1-x130.google.com (mail-lf1-x130.google.com [IPv6:2a00:1450:4864:20::130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9A3DC3C2A4 for ; Tue, 17 Jan 2023 06:32:58 -0800 (PST) Received: by mail-lf1-x130.google.com with SMTP id d30so42443142lfv.8 for ; Tue, 17 Jan 2023 06:32:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=7yhLGsprr4iGbKzba+JN1VXXF3TeC3cedN8+F9epKwY=; b=BWKfON0ONcZ0E/73kUupX7eOFbsTtnf5zb0RLvmJL0YAhZl6oEvSZL3c/NoN0rNReU TIh5gjrwA6Bj/3YkDzJiL+Gls11L2i8ze76yowGZvwzeuvcwTzbo+PdTF5RRopZcOu67 rqK/5DXAz0Cu8iK48baqurCP3Q8SHLQ3+La3MGi7OSiOLM50rap2pv9+NepuA7fvXVkZ JbAIYTYmlyf3SaXzCtregYhzAezlqMgzZgLa7aRWrX3Ls8Vi1NxO2mSedec1z7gAhtZm CjRS/N1ff7V0fQ/RSJMzu/O50kqFBmQcx8Ep1MMWXZfAdBITG7gqeNKqSuVwb7ryK8UD 4kmg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=7yhLGsprr4iGbKzba+JN1VXXF3TeC3cedN8+F9epKwY=; b=NUwFjY9RwBu/Cp6Khuz8vqs1+gzJfPYw1cWrmCsYEyZog1s9e5A1/MFMcM4+DWHMIY BBPknX8hfvwK7spKK8/OCJB+3Je4mvWKG+r9jKIax9bYwQz29WuhOAV5ZIQ8zWThoPXd +Q9DjaUfxWc24FpG/SenzlPbm1SZITXfb3RPWXVkqAYItKlGpUohSkSN/mPltu8dD1W+ 2333ZZeSAcuAKhGC3SYwgFivxqkufx4SqklrFYcAKEieJbpIlcejGI/QCOIBrys77KY5 vNyERk8DjHPmNHN171Ww0Gk56OrkzcK7ZvTAPUIkho0rX9Egcxamaz1djQVC7oMnMRYQ 2/Og== X-Gm-Message-State: AFqh2koo8YJvLODw5s/YgFZyR7uE696kWrOY0NTi+/nsJZpWcGdueaCy FXpf7SYqiqJ4DPloiS3BIl1hMFyaOuHPP+V9Hb1Y6w== X-Received: by 2002:a05:6512:3b9b:b0:4d5:850a:8330 with SMTP id g27-20020a0565123b9b00b004d5850a8330mr128086lfv.665.1673965976657; Tue, 17 Jan 2023 06:32:56 -0800 (PST) MIME-Version: 1.0 References: <20221202061347.1070246-1-chao.p.peng@linux.intel.com> In-Reply-To: From: Fuad Tabba Date: Tue, 17 Jan 2023 14:32:19 +0000 Message-ID: Subject: Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM To: Sean Christopherson Cc: Chao Peng , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, linux-doc@vger.kernel.org, qemu-devel@nongnu.org, Paolo Bonzini , Jonathan Corbet , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Arnd Bergmann , Naoya Horiguchi , Miaohe Lin , x86@kernel.org, "H . Peter Anvin" , Hugh Dickins , Jeff Layton , "J . Bruce Fields" , Andrew Morton , Shuah Khan , Mike Rapoport , Steven Price , "Maciej S . Szmigiero" , Vlastimil Babka , Vishal Annapurve , Yu Zhang , "Kirill A . Shutemov" , luto@kernel.org, jun.nakajima@intel.com, dave.hansen@intel.com, ak@linux.intel.com, david@redhat.com, aarcange@redhat.com, ddutile@redhat.com, dhildenb@redhat.com, Quentin Perret , Michael Roth , mhocko@suse.com, wei.w.wang@intel.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Sean, On Sat, Jan 14, 2023 at 12:38 AM Sean Christopherson wrote: > > On Fri, Dec 02, 2022, Chao Peng wrote: > > This patch series implements KVM guest private memory for confidential > > computing scenarios like Intel TDX[1]. If a TDX host accesses > > TDX-protected guest memory, machine check can happen which can further > > crash the running host system, this is terrible for multi-tenant > > configurations. The host accesses include those from KVM userspace like > > QEMU. This series addresses KVM userspace induced crash by introducing > > new mm and KVM interfaces so KVM userspace can still manage guest memory > > via a fd-based approach, but it can never access the guest memory > > content. > > > > The patch series touches both core mm and KVM code. I appreciate > > Andrew/Hugh and Paolo/Sean can review and pick these patches. Any other > > reviews are always welcome. > > - 01: mm change, target for mm tree > > - 02-09: KVM change, target for KVM tree > > A version with all of my feedback, plus reworked versions of Vishal's selftest, > is available here: > > git@github.com:sean-jc/linux.git x86/upm_base_support > > It compiles and passes the selftest, but it's otherwise barely tested. There are > a few todos (2 I think?) and many of the commits need changelogs, i.e. it's still > a WIP. > > As for next steps, can you (handwaving all of the TDX folks) take a look at what > I pushed and see if there's anything horrifically broken, and that it still works > for TDX? > > Fuad (and pKVM folks) same ask for you with respect to pKVM. Absolutely no rush > (and I mean that). Thanks for sharing this. I've had a look at the patches, and have ported them to work with pKVM. At a high level, the new interface seems fine and it works with the arm64/pKVM port. I have a couple of comments regarding some of the details, but they can wait until v11 is posted. Cheers, /fuad > On my side, the two things on my mind are (a) tests and (b) downstream dependencies > (SEV and TDX). For tests, I want to build a lists of tests that are required for > merging so that the criteria for merging are clear, and so that if the list is large > (haven't thought much yet), the work of writing and running tests can be distributed. > > Regarding downstream dependencies, before this lands, I want to pull in all the > TDX and SNP series and see how everything fits together. Specifically, I want to > make sure that we don't end up with a uAPI that necessitates ugly code, and that we > don't miss an opportunity to make things simpler. The patches in the SNP series to > add "legacy" SEV support for UPM in particular made me slightly rethink some minor > details. Nothing remotely major, but something that needs attention since it'll > be uAPI. > > I'm off Monday, so it'll be at least Tuesday before I make any more progress on > my side. > > Thanks!