Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp2704612rwd; Fri, 26 May 2023 10:01:08 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7r7p2DFfCw0HlerlUmkZuS9mDMR2IUs0l3KYMhQe9SHFUU68hO9XbMbStPxKw18hHgCUEE X-Received: by 2002:a05:6a00:1891:b0:646:1f13:7fce with SMTP id x17-20020a056a00189100b006461f137fcemr4506088pfh.2.1685120468004; Fri, 26 May 2023 10:01:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685120467; cv=none; d=google.com; s=arc-20160816; b=dv1E9fs+KGGz7Dj24RIJJU+DZtM6cLSQBDdOF5G3JZxtPMzYI0QYaoGtvPAbl3rD/X fmg1nJJ6nBlV12LRFZtgGTAttihWtjrpfYWGfCfXydezP82StV2Jc4yt98XGFpynERyN 2ts4nChIODLUgris6oN1WclN+K8lIxtuPfVZksXSICRdrtv2cGocScWeEU//nBFzaRwJ xtwE7lC+Jc+D/tFnab+KIC6z2Rp4lfTzJ0zogITb9mBnFkd3kzKO4pVSZzf/dK5+d6aJ I/iXeqIkFtRfoGN2Jfd58xwFlocKOI6wSyciUWZbi+N5Zv+ryv/2p/DU+G8ZEA5LTN9o FPPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=UJLVDfVcn1dj/LbHO26In0hwpTHbWx8n0yVQTbJTXzg=; b=aPc8zi21gWWB+TgoTc4qaoNWXsWP2qeRqcaYrQcxb2c60gkW435ipeTWLShdZ7BRun WTI76KZNytLE0Pqe/TYE7Ic9KJi3hd0PJFtF2HxhZ3Z7rg5Pyyx9XjZXrRw2q7UCI3VQ TdULPPq6FC+hATDO0TS+RPmaUGeqY2YM3tCAcxxVFE1W66URIk0kkaZTjC+HAt4MAcOF Rhw2Fijnip0G64mRmUma1SPDz4XXjKBntnWQ4KfChxZsY1nksZ8+tKghv6imFh9tTYxY UI2gX25siyfYqnamI6/t0mgRIFOUcpoorNgcuDfLRf3Dm2AsNp5DCuM8e4Tk1OMkcmnT 5n3w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=uTc7Ntyr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l62-20020a622541000000b0063d6708d1c9si2864813pfl.105.2023.05.26.10.00.50; Fri, 26 May 2023 10:01:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=uTc7Ntyr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236624AbjEZQjM (ORCPT + 99 others); Fri, 26 May 2023 12:39:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231604AbjEZQjK (ORCPT ); Fri, 26 May 2023 12:39:10 -0400 Received: from mail-pf1-x449.google.com (mail-pf1-x449.google.com [IPv6:2607:f8b0:4864:20::449]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 14813DF for ; Fri, 26 May 2023 09:39:09 -0700 (PDT) Received: by mail-pf1-x449.google.com with SMTP id d2e1a72fcca58-64d285fc7ecso1286370b3a.2 for ; Fri, 26 May 2023 09:39:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1685119148; x=1687711148; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=UJLVDfVcn1dj/LbHO26In0hwpTHbWx8n0yVQTbJTXzg=; b=uTc7NtyrJIEyihrMxask05V/8VG2zI54ut3YHZH3bNGS8o2g4nwve/x4KAOzLEoS1S IXAZ1PG6u3KIHoMgF2pxBeM9CIX51efUEhyvbRBMIjPJHP4gF82/09htMUKnre97au7c 9/YztOVxQ38bgMzDxrFWa4RSrFDpstbFQmfrmKuoA9Zvv/5CEbOgGmFuNPMRdOc2MgIH MPlXg1ZAmV7sMmcpp9+sAjRnWt/Bx8WQvXohGS+YrTxYFDQo0JZRWpWwT2UVpH5tByzH rJctbSVbe6+xxofPqBfd1eaEYXTt5bOWaQINBB5t1/Ja2Dn3jOJjFxLwREgwVsntHcvt BHQQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685119148; x=1687711148; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=UJLVDfVcn1dj/LbHO26In0hwpTHbWx8n0yVQTbJTXzg=; b=ZCT7hnlgCHsEMj+H42ezDNrgSs4mSiyx4VJ27WDogwBotSZCC5Vo0TiG3e5fz2WYCw rMfS1LwvDty5aBhTesz+boejAcTyI+WF/djlDqQZpDgQcS0thbsQZhaUwWUMHXCHoVrG xG/F1d0pvVwoJMR956XDTjevupN14zaW5E+R9R21eIePttOFjUZ1xfy1RwjmG0tYig0Q FHMrc0etdmvKq9M9Cv3eJGpH3CpnocBiGodTL7uk1uapCpbzEPySkAU9Ige8hd1x4pqR YE7SwBcxzHrCSBtvu3CU4gg8u8STxLN3KrdVVvCAe4KUKCrNfS22RBMtkkbbWYZfA679 k0Gg== X-Gm-Message-State: AC+VfDwij5rE5NhOzIVQbY6OH/yEFepRsybEVTqnx6ecJyqLgj3UbX1K 6ZXW4Vk4j7NPmpF4sdcSqI9J4roSxBU= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a05:6a00:15d4:b0:643:a029:5b3f with SMTP id o20-20020a056a0015d400b00643a0295b3fmr1135381pfu.2.1685119148597; Fri, 26 May 2023 09:39:08 -0700 (PDT) Date: Fri, 26 May 2023 09:39:06 -0700 In-Reply-To: <88db2d9cb42e471692ff1feb0b9ca855906a9d95.camel@amazon.com> Mime-Version: 1.0 References: <2f19f26e-20e5-8198-294e-27ea665b706f@redhat.com> <88db2d9cb42e471692ff1feb0b9ca855906a9d95.camel@amazon.com> Message-ID: Subject: Re: [ANNOUNCE] KVM Microconference at LPC 2023 From: Sean Christopherson To: James Gowans Cc: "kvm@vger.kernel.org" , "pbonzini@redhat.com" , "linux-kernel@vger.kernel.org" , "maz@kernel.org" , Alexander Graf , Nicolas Saenz Julienne Content-Type: text/plain; charset="us-ascii" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 26, 2023, James Gowans wrote: > On Tue, 2023-05-09 at 11:55 +0200, Paolo Bonzini wrote: > > Hi all! > > > > We are planning on submitting a CFP to host a KVM Microconference at > > Linux Plumbers Conference 2023. To help justify the proposal, we would > > like to gather a list of folks that would likely attend, and crowdsource > > a list of topics to include in the proposal. > > Hi Paolo, > > This MC sounds great! There are two topics I'd be keen to discuss, both in > the KVM + memory-management realm: > > 1. Guest and kernel memory persistence across kexec for live update. > Specifically focussing on the host IOMMU pgtable persistence for DMA- > passthrough devices to support kexec while guest-driven DMA is still > running. There is some discussion happening now about this [1] and > hopefully the discussion and prototyping will continue in the run up to > LPC. I don't think a KVM MC conference would be the right venue for this discussion. IIUC, KVM does not need to be involved in preserving guest memory or the IOMMU page tables. > 2. Supporting more fine-grain memory management and access control APIs > for the virtualisation case specifically, for use-cases around live > migration, memory oversubscription, and "side-car" virtual machines. These > use cases would benefit from kernel support for things like dynamically > updating IOMMU and MMU permissions independently at fine granularity, all > without actually modifying the VMAs, to support fine-grain handling. And > linking this topic to the one above: being able to do these things when > not backed by struct pages. (There may be some overlap with "KVM guest > private memory" [2] here...) Yes, there's overlap with guest private memory. Though I actually think we should start viewing it as "guest first" memory (I'm mentally thinking of it as guest_memfd()), since there are potential benefits and applications beyond CoCo VMs for guest memory that doesn't *need* to be mapped into host userspace. If the guest_memfd() idea comes to fruition, then KVM would *need* a way to specify guest memory protections without VMAs. So yes, definitely overlap :-) If y'all are interested, guest_memfd() is the topic of discussion for the inaugural KVM upstream call (PUCK)[*]. I would also be more than happy to carve out a PUCK instance to discuss non-VMA-based MMU protections, i.e. we don't have to wait until LPC to start hashing out the KVM API(s) and implementation. [*] https://lore.kernel.org/all/20230525234735.2585977-1-seanjc@google.com