Received: by 2002:a05:7412:3784:b0:e2:908c:2ebd with SMTP id jk4csp1932590rdb; Tue, 3 Oct 2023 05:48:19 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFbuxwIq499yA6jmIJEcq6Zeb1JzX6LIh7Z5YHgNaHqxCn0CG5IWhwvgEVe8JvdOUKyY/hP X-Received: by 2002:a05:6a21:611:b0:15d:684d:f518 with SMTP id ll17-20020a056a21061100b0015d684df518mr13611916pzb.26.1696337299049; Tue, 03 Oct 2023 05:48:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696337299; cv=none; d=google.com; s=arc-20160816; b=MQOZg1gu4xvhyAlG5trgee94sf9xVjxP8TqQ8o+IJY8ruH88GSikgfe8QEik3Tq4H/ ntGVH7sN0Ja1UnSXF6kqEXv22bfeEHFSvraLLMGZnHm7J5zd/IfN2+RqtOmZdMT89zY2 ivEydGpxXuTgJhbZgPQf8wXZMo1BR9sgF2cP1/RgdWkqFMB0HF6F9JU88IP6VIFjbc2Z tggxMQxTQJOVkejM1yyLoVXj3h60EHnG4rRE73RV3nIX5Ck7b+SviCyl4QFacoX/B7Xr rZKeq/2x/uuntnF8xdG3M05WN2K4I3nOlfl+QTkvOdm/za2C1l5WuZm7x9rae4L0wyci Rt+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=YZe9z/CDJkweGhxZy3F+7e7AP42NZQg1sBDsRc6xWLw=; fh=q2aHyFhCniUuvy7y1p+sLvUrVciwBm1DOXORvQBj9MU=; b=W73p9YZ3Qacolh4cOfKN+HkOoCR8jg4zRS0sGas+I+0Ns5fNLubcn2muXpg3YvA1GD OYVoLpnONp1ajkFGnXur+lxnfsagMhgRIW727d5KJRt0tDTrRtRO9IczSk4ErEes2u2g JMMGfVfZoL2RG5Y/KmM82oZzUMRj1e/Tmhqa/fe3FsYzSqFYarvEpVKvdqgxT08uepUQ 7eN0xlGmNgOxImIOsRUUNrtv94Y/YpvPUtnCga665MhbFWcL3ugSCCsrjLFIjN93dmW/ awU81KVi2ihKDPI8TgtjwppCRRwIO3Dxqqr95MXPCGsqwUR9IVIlaMxwv2H0VyCul1PY EUBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=PeRLYOLi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id m9-20020a654389000000b00588fa0def2asi1318276pgp.778.2023.10.03.05.48.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Oct 2023 05:48:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=PeRLYOLi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 8A6BC80202C0; Tue, 3 Oct 2023 05:48:15 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230500AbjJCMsG (ORCPT + 99 others); Tue, 3 Oct 2023 08:48:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42264 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231478AbjJCMsF (ORCPT ); Tue, 3 Oct 2023 08:48:05 -0400 Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8A820B8 for ; Tue, 3 Oct 2023 05:48:01 -0700 (PDT) Received: by mail-qk1-x733.google.com with SMTP id af79cd13be357-774105e8c37so65301385a.3 for ; Tue, 03 Oct 2023 05:48:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1696337280; x=1696942080; darn=vger.kernel.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=YZe9z/CDJkweGhxZy3F+7e7AP42NZQg1sBDsRc6xWLw=; b=PeRLYOLioqfPAPyhLsjGm3+fHcCyHikDzkDViI+Rdq+SbLRi/yze7XyjZc95a9uN77 YN1HbMAWxHWMPoaRL/GFvagOUIEwUEnzRv4S5RQz58PqcXShypPksshtOxnOrvWvg7Hm CGTEyB8jpw0NY7dr73p/avmPyGHDFZUYbkEpedVaCnjjHCEDBx1eFwQ8e2sY0mdjwo7F 79Yurn8rvgb5bJ3PKQZcoxXinziOy/LH57awDKyc+1b8frx7JawX1I+o69MF7b2wMnMq nGeYnpY2hu3JsSONOtmhe1lfZjsgb2r6R3LQrwLjUxC0GR1RutNB+cpWLdbYmGVE+al0 A0OA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696337280; x=1696942080; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=YZe9z/CDJkweGhxZy3F+7e7AP42NZQg1sBDsRc6xWLw=; b=LSLuAq1V5d7cyL83FR7hY7VGdBszgibrlcwb2qs+AEQM1oYsSQ7sv57cEwklxFdFQ2 1oiFcBz7dAp2iZfgBdRvylnlY7jCOzm/t8bU94gaePQSsmNDlsKu+m9aRcmVevmMsnVF MmYvKbqLc0H4nd1ZC4iMW2v0JdgSZn3fosCnmQfMsoidFSDcf9XkXGFC05/l/aJ2XL+j OQpDraaRNJzJV/TxEobjCDOJUOy5EwIXB/sIuvdfskUw59Lzmp2MyIl+rGu38b6pOgSR bLcf+rOv3Ul/YFUz5LHKt86DBgvOATSjQT3ulSPBq6ZHnQ84Ov21/lHC8yhn+bkm2gxM QVKw== X-Gm-Message-State: AOJu0Yx7xrwkN3lPqvGm0JkVZGzUYt3xi3IKMbibBcGiwDL4cn4CoFxt YC/f48o3a3fuP0+otwHnY1EMZkinCm3KDbMHaR11NQ== X-Received: by 2002:a0c:e493:0:b0:656:347b:ea75 with SMTP id n19-20020a0ce493000000b00656347bea75mr13564335qvl.24.1696337280208; Tue, 03 Oct 2023 05:48:00 -0700 (PDT) MIME-Version: 1.0 References: <20230914015531.1419405-1-seanjc@google.com> <20230914015531.1419405-12-seanjc@google.com> In-Reply-To: <20230914015531.1419405-12-seanjc@google.com> From: Fuad Tabba Date: Tue, 3 Oct 2023 13:47:23 +0100 Message-ID: Subject: Re: [RFC PATCH v12 11/33] KVM: Introduce per-page memory attributes To: Sean Christopherson Cc: Paolo Bonzini , Marc Zyngier , Oliver Upton , Huacai Chen , Michael Ellerman , Anup Patel , Paul Walmsley , Palmer Dabbelt , Albert Ou , "Matthew Wilcox (Oracle)" , Andrew Morton , Paul Moore , James Morris , "Serge E. Hallyn" , kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Chao Peng , Jarkko Sakkinen , Anish Moorthy , Yu Zhang , Isaku Yamahata , Xu Yilun , Vlastimil Babka , Vishal Annapurve , Ackerley Tng , Maciej Szmigiero , David Hildenbrand , Quentin Perret , Michael Roth , Wang , Liam Merwick , Isaku Yamahata , "Kirill A . Shutemov" Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Tue, 03 Oct 2023 05:48:15 -0700 (PDT) Hi, > diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h > index d2d913acf0df..f8642ff2eb9d 100644 > --- a/include/uapi/linux/kvm.h > +++ b/include/uapi/linux/kvm.h > @@ -1227,6 +1227,7 @@ struct kvm_ppc_resize_hpt { > #define KVM_CAP_ARM_EAGER_SPLIT_CHUNK_SIZE 228 > #define KVM_CAP_ARM_SUPPORTED_BLOCK_SIZES 229 > #define KVM_CAP_USER_MEMORY2 230 > +#define KVM_CAP_MEMORY_ATTRIBUTES 231 > > #ifdef KVM_CAP_IRQ_ROUTING > > @@ -2293,4 +2294,17 @@ struct kvm_s390_zpci_op { > /* flags for kvm_s390_zpci_op->u.reg_aen.flags */ > #define KVM_S390_ZPCIOP_REGAEN_HOST (1 << 0) > > +/* Available with KVM_CAP_MEMORY_ATTRIBUTES */ > +#define KVM_GET_SUPPORTED_MEMORY_ATTRIBUTES _IOR(KVMIO, 0xd2, __u64) > +#define KVM_SET_MEMORY_ATTRIBUTES _IOW(KVMIO, 0xd3, struct kvm_memory_attributes) > + > +struct kvm_memory_attributes { > + __u64 address; > + __u64 size; > + __u64 attributes; > + __u64 flags; > +}; > + > +#define KVM_MEMORY_ATTRIBUTE_PRIVATE (1ULL << 3) > + In pKVM, we don't want to allow setting (or clearing) of PRIVATE/SHARED attributes from userspace. However, we'd like to use the attributes xarray to track the sharing state of guest pages at the host kernel. Moreover, we'd rather the default guest page state be PRIVATE, and only specify which pages are shared. All pKVM guest pages start off as private, and the majority will remain so. I'm not sure if this is the best way to do this: One idea would be to move the definition of KVM_MEMORY_ATTRIBUTE_PRIVATE to arch/*/include/asm/kvm_host.h, which is where kvm_arch_supported_attributes() lives as well. This would allow different architectures to specify their own attributes (i.e., instead we'd have a KVM_MEMORY_ATTRIBUTE_SHARED for pKVM). This wouldn't help in terms of preventing userspace from clearing attributes (i.e., setting a 0 attribute) though. The other thing, which we need for pKVM anyway, is to make kvm_vm_set_mem_attributes() global, so that it can be called from outside of kvm_main.c (already have a local patch for this that declares it in kvm_host.h), and not gate this function by KVM_GENERIC_MEMORY_ATTRIBUTES. This would let pKVM select only KVM_PRIVATE_MEM (as opposed to KVM_GENERIC_PRIVATE_MEM, which selects KVM_GENERIC_MEMORY_ATTRIBUTES), preventing userspace from setting these attributes, while allowing pKVM to call kvm_vm_set_mem_attributes(). What do you think? Thanks, /fuad