Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp3057133rdb; Mon, 4 Dec 2023 15:50:47 -0800 (PST) X-Google-Smtp-Source: AGHT+IEyh+UjK1kpNHSRBuiyX9kK4Xx532A8C4hFx3Yy9OkJdFWlrCB0ti69UghoSQhxKgytcOPZ X-Received: by 2002:a05:6a21:3387:b0:18f:97c:5b76 with SMTP id yy7-20020a056a21338700b0018f097c5b76mr2169632pzb.68.1701733847422; Mon, 04 Dec 2023 15:50:47 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1701733847; cv=pass; d=google.com; s=arc-20160816; b=IdTqlznJIyAmjkZEs8ApcZqEH+z7VdY1EkbqvOP4+KKLcHcE4A3BnPVLRztf4540mi 3Ba6vIQ/uWgBDwZworTcXfxPE17nbqb7hLNlJE0rgESvx9XQIQ2laD6XqlTD95YhIXEY MMjZT3fFdY1sO/YdTQB69xpdWxJpSN9S/+SbqgWBW6H+ftfbyT+CJQvBDYpBDd9zPOHV DobKY3o1c9ySK1bcuMFqHy6VV5K29xxXIUCrpPFMMt7AG0zHq42DAkk9XwYgdM9S3tBh l22lrtjQ0lMKfEBPSPTmGAsBboKnLsmGAAOUzcrLuLzgAp/QpYQatzyWByuqWf9qJ4PP 0cJA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:in-reply-to:content-disposition :references:message-id:subject:cc:to:from:date:dkim-signature; bh=hNRf+fJhwxBxEOKoSL6qsV47dYsFXFlBGph7NcBpngI=; fh=v7UkqICzFlB5sKxqShC6XWsWIcjQRzdRZiTHXOKHpW8=; b=OlDn5nmWxMp0V5C4VyszZhtUzy1VuhQIfqLYyFWbJfM4BKMsWNTpL4kYpYMUOXizE8 lSrdiT9jOZaWm4THN9zGRnmj5JqtSxjOYoqEGY+KEbppAuPc11O3uaFz8xv1miIHyM4/ vMk52xAUdO9WCVmj432yD5dLr6TEm69VV2aoSegLAln9yyA0EeK2i79/T4FWnuulgvgn O4CzWeCz2MmYwInn1EPxVsmR2EblNv0KNNekf+JDBTndClXoLUIdIRw3vGDRv77v49EW Co2iEGyWf0FYAHzRo6JJ4XBJEjSN57dStK0wA8fa8Zl4Wk+Gs0A8kDMhE03N2+pOxWnI KFvA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@Nvidia.com header.s=selector2 header.b=hExalkHU; arc=pass (i=1 spf=pass spfdomain=nvidia.com dkim=pass dkdomain=nvidia.com dmarc=pass fromdomain=nvidia.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nvidia.com Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id u8-20020a170902e5c800b001d094766f1fsi2931215plf.404.2023.12.04.15.50.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Dec 2023 15:50:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@Nvidia.com header.s=selector2 header.b=hExalkHU; arc=pass (i=1 spf=pass spfdomain=nvidia.com dkim=pass dkdomain=nvidia.com dmarc=pass fromdomain=nvidia.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nvidia.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 0657E806B047; Mon, 4 Dec 2023 15:50:21 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343566AbjLDXuA (ORCPT + 99 others); Mon, 4 Dec 2023 18:50:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53390 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235536AbjLDXtn (ORCPT ); Mon, 4 Dec 2023 18:49:43 -0500 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2063.outbound.protection.outlook.com [40.107.237.63]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 617FC1735; Mon, 4 Dec 2023 15:49:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IjDfkdeoXkC22txmPdgg4bL02OeKiuROtaSg/1PF6xb4Qml4K1YgmAsC814kLqcRJ0ji4SNc5YdXOYFn96WmwgM8sJa3eLzDyhlvqMcokhAaaL8yLXrYG1tndA3jyMmC/kjhuoG/rCLyLKLHyvE/Wvu1PV+okd9HjysUHwSVHLfMHO8qnCuAjg+TQoUx+x9QHRlB64+uVLb4TuMMywX1mA1CtUnaa/vSvw/ZHXD1ifcYUaOb5duV7EDZv6Hlb3nETcl/bPfVl/ggY/kNcX9XrslL9LKbpPvSL9gOgzD5IQB3/vCABZ1D9xtIM1PyU/Voqpq9ae7gGjYx14zNeTo+SQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hNRf+fJhwxBxEOKoSL6qsV47dYsFXFlBGph7NcBpngI=; b=Dt6se8zLeeoGFuivliFyhR0hq9negwM37JQVCGUsG2WaJ2FqLfaVRUqutQiE7yTpTqIky56Ev5KG160PBmtMluBnyCpIrYded/qC/98qPDlYYI6IzRalVDzHEtD1SqK7esqnt+zYiSRC2p73i6cJmmMQfh/Plczs96a2+GxRt8Cz3y8v9QsCneM4XAJkpQ3z/eq53hMeiP/h0RbXduka07CZu0b7yOMqNcwsXLwu2Yh3Mr/hGecck/Azsssde1IeS4mdmZrtpbmGtKq3xC+J+2oJecZ8/qXiU1oev7bJiRjydiD+qIdM9AiH6CzPBlT2C0dFWtClyg5aahEyOy9FtQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hNRf+fJhwxBxEOKoSL6qsV47dYsFXFlBGph7NcBpngI=; b=hExalkHUuWAKgGX3T8jIHnwwoZ1altrNE/8joqDn0AZADKZr2NaUh0rTpSam7xtQqFsYLbbLwwg9ty7lXdh71MTOHG9Q4116gsAqUhLjFfrP3BX/rV31tIRdKrCu/axPSYQ9b+S/Si6jhcHFReLP/j/3fTMQBQ0s0Lty5wTRsUTTNGjvCui+n5RYcCh/06GY8/b4DCkyxwoxdmmg8m3lWkpnlpa5utMfCYztuk2ngEVeTV8lMazIznqEFPT1FOULDR1ZDV5JXE8tv8P7zs8cmTkgYCuecmqQP1+7EcNEz7drkr54YYErQn1pXlFFFoAsUQZFWjGG7vEVW2HG1pMTTA== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; Received: from LV2PR12MB5869.namprd12.prod.outlook.com (2603:10b6:408:176::16) by DM4PR12MB5230.namprd12.prod.outlook.com (2603:10b6:5:399::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7046.33; Mon, 4 Dec 2023 23:49:37 +0000 Received: from LV2PR12MB5869.namprd12.prod.outlook.com ([fe80::60d4:c1e3:e1aa:8f93]) by LV2PR12MB5869.namprd12.prod.outlook.com ([fe80::60d4:c1e3:e1aa:8f93%4]) with mapi id 15.20.7046.033; Mon, 4 Dec 2023 23:49:37 +0000 Date: Mon, 4 Dec 2023 19:49:36 -0400 From: Jason Gunthorpe To: Sean Christopherson Cc: Yan Zhao , iommu@lists.linux.dev, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, alex.williamson@redhat.com, pbonzini@redhat.com, joro@8bytes.org, will@kernel.org, robin.murphy@arm.com, kevin.tian@intel.com, baolu.lu@linux.intel.com, dwmw2@infradead.org, yi.l.liu@intel.com Subject: Re: [RFC PATCH 00/42] Sharing KVM TDP to IOMMU Message-ID: <20231204234936.GB2692119@nvidia.com> References: <20231202091211.13376-1-yan.y.zhao@intel.com> <20231204173028.GJ1493156@nvidia.com> <20231204195055.GA2692119@nvidia.com> Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-ClientProxiedBy: MN2PR02CA0005.namprd02.prod.outlook.com (2603:10b6:208:fc::18) To LV2PR12MB5869.namprd12.prod.outlook.com (2603:10b6:408:176::16) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: LV2PR12MB5869:EE_|DM4PR12MB5230:EE_ X-MS-Office365-Filtering-Correlation-Id: 12aecfbb-d6bd-4e8b-babe-08dbf523ac9c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: aoifjXeKK36hPHhycjwcE6ySXFknsPitf5IJI/Ms4X3SnsNkGDmC+3cIqqKJIlt01oyKba9t4rI2Ob2hyqZiN3uaypRyO7DdS7fTFyFHsblC/x4241wLnH83VIicOkIEhBl9FbulwElDLJgFbNBskpjRl1ijVTdLW9kx4Q3q1ykGhvl8PlZeuRsj/OdwpRJ0/3zQYXIkAM7+kLb/KRyJ+Bz7Rj2c1IVOcCB/3glaSSbIlFLDOXSfBvcQTGkS9DG3WkFrJsx0D9ypYVbcV3jhfYpl1LBk3fzOpuVa8V67+KIFvP5QvK9gcEPO/R9fiRmi38d+YWjSwwiXwLWWFgi2FMAWsju1QMN8f18IhNRneJqGWGH8RdIM/J8YN9jtP9kSh/k3x2oOpENTNzjrpFN+FRl5SpsCLzJHp2cnrwP4RladCTcBQcd5Ju0Iig+AXZ1F7Tosc9grOrRkR+a08cMmj6l19vh/+E358jqewTnYJtoJT16uFURD6min/OPGxhR4rOYfacg22qeTpvK8LOKw2gU0nl7oNnXbdi7PnRBQd2yFyTj+J0UGuWpIVKPBdH1J X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:LV2PR12MB5869.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(366004)(39860400002)(396003)(136003)(376002)(346002)(230922051799003)(186009)(451199024)(64100799003)(1800799012)(6916009)(316002)(66556008)(4326008)(86362001)(8936002)(8676002)(66946007)(66476007)(478600001)(6486002)(41300700001)(36756003)(7416002)(2906002)(5660300002)(33656002)(38100700002)(1076003)(2616005)(26005)(6506007)(83380400001)(6512007);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?BDmqVpHH1bMExtwlv5xUYWhEYRvSfCsC5WBeAUpuwTtUCwPrunW9yI1BBQFV?= =?us-ascii?Q?JZWouz1nivri7Ytmy/MD1j0u6iIQTWfFAY7vYBXA8DXFmapxJ8uECnNgQSc4?= =?us-ascii?Q?104EAgsTlxo5vuxyBZtNZ1oBwroVr2aSKdCLQq+6jCDNMD/94orpNWAyu9Zv?= =?us-ascii?Q?UMkCkYlF9jZlsViy6WAZxsHACHH3pohv/QmM4GeXtO7EzR3KyXKKkKp/FVg9?= =?us-ascii?Q?6hGwyH3RBy6GcM6cBe/8Mqr2JlKpRZoWMBuKZ6l25PLKa1VA7euI732mbZNn?= =?us-ascii?Q?LJkJ2D7wp18l4nmKUbVwYJwhRUmIWujHnHbHU7M3x/CqXhHT1ymwLaedzuIh?= =?us-ascii?Q?33WpB1L88hciZMlB90oERuCUCY/BcKp4bUDN4OtBI4pafZ0qDJ/yIO4bhRGE?= =?us-ascii?Q?/OKlBbbjis5kKCuJHZUwW1Y3XP8XTpjB69UxZa6TFlFwTLc9pwVTvtejaSpb?= =?us-ascii?Q?4o4NqnMr54fScNGzqSH/mAqDJa71fDOqnIC91eX6ZKeeB8qEX70Ler+WoaAQ?= =?us-ascii?Q?Ns9Hdovf4iYBztvLq0Q1jFkv7YxDMyD5d6Dph/AVgpYufmV7buuhq4eORpT8?= =?us-ascii?Q?vIyNGaJSNq1TE59EnHup7tQRRjzYwUpjIBRL76y09iAsx3T7agrGYDVEsc4O?= =?us-ascii?Q?v5yA67ktXZB6U2O/QhidUU6l31stZa4yFgc1lAjImQNskORdCwBl5tv8aBPq?= =?us-ascii?Q?9d/eM7ugPpnd8ug/z8lZR1SrvdJIoOvYJLdR/2D3rYXKjAN1GtESrHAo2s7v?= =?us-ascii?Q?T+1U4IV3zJlUItthaaDKNWBEGvf/7NgNzOk3zvnLW9vJYX8bSpprf7wViKyf?= =?us-ascii?Q?xjCgf0uvMlmC9Gsk1DTEg0+U8Qjb+ItazYIpZBwesFDnpeLjx+LNnYr+wItE?= =?us-ascii?Q?e9ATaRwrX5aLk+kzZ51fUqd7PZKOjsK6MNu6JN5NybK4QjYd7TiPZsf0E2bA?= =?us-ascii?Q?RgfKPo+Mr99UDN3e+T+5vpgjeJxtFq0HCtT5ZVGoV7Sok4xjMyldSrwppKqU?= =?us-ascii?Q?ZCqwGrbOqyCYiTqDWlQvQG4pqLtO5xvKcbDpm7Gs8pnfhcJTF3f4vRTZvBBk?= =?us-ascii?Q?6gXOwrr0HgzCqUoRoo3D1f0gPQn12w4kLEBZm8Vq4TINNp4zBXX6IwjvbqCl?= =?us-ascii?Q?fua1U+MQTX+URyhHhjuN2d8gpe0roGV+Z3O9vTLDQK7MJaJESIpvfyXH3A1I?= =?us-ascii?Q?138Bxjp7NdD3i3py1ay/edK0fvElFLxbmNQHCvz6Wp+CIpC2IPjzpbbJF5vK?= =?us-ascii?Q?FmR3H2xBgFygJmYa1GHovsUOytpsvUJ4FcyObZzybaJ6WEyaXm1+k0m1rn94?= =?us-ascii?Q?sJYPaJtClDL5FjizLR+r17sUswhtJrr3urnEgm8N0j3dmqIrECXSHF7rCS7J?= =?us-ascii?Q?DtXZcGikA46rmFFyrvl5E66RR4Jbyv1mvf4T0UpYT1dwM6rDsewfe/4Es1AO?= =?us-ascii?Q?SpOShkyeW+ohIgrRmuDCCkbGma1xH8F5EZtUGa7zQ25emQF8jDYpSinBXnu7?= =?us-ascii?Q?lvuYLQ/RG1sWyUoRz0Nuw6cOjOxlg9fy1AaMhrhoKcrZSNuQOl2VaJ5x+07V?= =?us-ascii?Q?u1d6eMDivsdBaDLIi3Sdru8pb7dtNsihFsHTgUsT?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: 12aecfbb-d6bd-4e8b-babe-08dbf523ac9c X-MS-Exchange-CrossTenant-AuthSource: LV2PR12MB5869.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Dec 2023 23:49:37.2941 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: iQRwPB7IcBnduIhMaHRjpsJra91YIa8vUU5tFEMo07am9+rINzlTefsc66XPt7vm X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB5230 X-Spam-Status: No, score=-1.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FORGED_SPF_HELO, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Mon, 04 Dec 2023 15:50:21 -0800 (PST) On Mon, Dec 04, 2023 at 12:11:46PM -0800, Sean Christopherson wrote: > > could we design the memfd stuff to not have the same challenges with > > mirroring as normal VMAs? > > What challenges in particular are you concerned about? And maybe also define > "mirroring"? E.g. ensuring that the CPU and IOMMU page tables are synchronized > is very different than ensuring that the IOMMU page tables can only map memory > that is mappable by the guest, i.e. that KVM can map into the CPU page tables. IIRC, it has been awhile, it is difficult to get a new populated PTE out of the MM side and into an hmm user and get all the invalidation locking to work as well. Especially when the devices want to do sleeping invalidations. kvm doesn't solve this problem either, but pushing populated TDP PTEs to another observer may be simpler, as perhaps would pushing populated memfd pages or something like that? "mirroring" here would simply mean that if the CPU side has a popoulated page then the hmm side copying it would also have a populated page. Instead of a fault on use model. Jason