From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C7DF9C54EBE for ; Mon, 16 Jan 2023 13:48:59 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4AB546B0073; Mon, 16 Jan 2023 08:48:59 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 45B646B0074; Mon, 16 Jan 2023 08:48:59 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2FC5F6B0075; Mon, 16 Jan 2023 08:48:59 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 233876B0073 for ; Mon, 16 Jan 2023 08:48:59 -0500 (EST) Received: from smtpin24.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id CFB92AAC6B for ; Mon, 16 Jan 2023 13:48:58 +0000 (UTC) X-FDA: 80360793156.24.4FCA5CF Received: from wnew2-smtp.messagingengine.com (wnew2-smtp.messagingengine.com [64.147.123.27]) by imf29.hostedemail.com (Postfix) with ESMTP id B8188120017 for ; Mon, 16 Jan 2023 13:48:56 +0000 (UTC) Authentication-Results: imf29.hostedemail.com; dkim=pass header.d=shutemov.name header.s=fm1 header.b=hzqSbnXX; dkim=pass header.d=messagingengine.com header.s=fm3 header.b=bO+dUcGv; spf=pass (imf29.hostedemail.com: domain of kirill@shutemov.name designates 64.147.123.27 as permitted sender) smtp.mailfrom=kirill@shutemov.name; dmarc=none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1673876937; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=LVIuqcNr+BEv3OVovuvPG4rkUA8Se79qo5nrRkoOk/4=; b=7Dv0BY4rkJKWw1QMvC9JlRSZYIFpUtlPEWEqV1x9QfruH8dEBFN3XM3+YYaJ8XrCN/jEdw RiecmOO7b3NJmW1SM+8Sy7xsreefK4EiX6N8QTxsAYPKwtU9iw3d8ApMX81yfD/fms6vzH kF4PkRPGhDLYhucUHp14V0bX7UFjZxU= ARC-Authentication-Results: i=1; imf29.hostedemail.com; dkim=pass header.d=shutemov.name header.s=fm1 header.b=hzqSbnXX; dkim=pass header.d=messagingengine.com header.s=fm3 header.b=bO+dUcGv; spf=pass (imf29.hostedemail.com: domain of kirill@shutemov.name designates 64.147.123.27 as permitted sender) smtp.mailfrom=kirill@shutemov.name; dmarc=none ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1673876937; a=rsa-sha256; cv=none; b=FxatWjyvcfAwFYhVZUBRqFEQ56YrFMZqXPT/xy4CJO/onpL+1CHA4O7MakNrXxyeXXXSBS wBEuGLDUU8jROhmfwwZI+c0HwZRnVdBgIgww4AqGAbHcmDZ59RnSbSzGkCFtyM1yoT8x5N dr80e0DILYgrMPaYRgxQ7x7N1MzWS+s= Received: from compute6.internal (compute6.nyi.internal [10.202.2.47]) by mailnew.west.internal (Postfix) with ESMTP id 53BD12B067C9; Mon, 16 Jan 2023 08:48:50 -0500 (EST) Received: from mailfrontend1 ([10.202.2.162]) by compute6.internal (MEProxy); Mon, 16 Jan 2023 08:48:53 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shutemov.name; h=cc:cc:content-type:date:date:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to; s=fm1; t=1673876929; x=1673884129; bh=LV IuqcNr+BEv3OVovuvPG4rkUA8Se79qo5nrRkoOk/4=; b=hzqSbnXXHX1g+A0/Ds g4Hdrbl+duGXBSNIacSKQ5cZs2CG5PwGXwtiLLZN/D1xVeIKrrYvQPopYIBziUJH gPXBXhBUjHNeNMXfFIzjHp9Pa1dA8lHudIk2RRGqQyo5jwy1ShZ4AnyiC5tk/r40 2tP/6afRYdUyPyv6NJCiu8ZeWYIveuXlAhsIdCZ8VNMSLGsrMkWlNB0yWBFfdsq6 D0/u+OuX/k+7NZQW0WeGyV4H/UWm1LOPuec8xME1t0TXJ/AZQz1MvhmIEgnm+7EF HgksJGu3O2yE/ei+qxkLuy8wmzA3Nh8veigRKWprNSGQ1Et7bGymXkWwi85bBVe8 FFYg== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:date:date:feedback-id :feedback-id:from:from:in-reply-to:in-reply-to:message-id :mime-version:references:reply-to:sender:subject:subject:to:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; t=1673876929; x=1673884129; bh=LVIuqcNr+BEv3OVovuvPG4rkUA8S e79qo5nrRkoOk/4=; b=bO+dUcGv+jEMy/lCF06LmFFcOFpJPrpvFNPqUv8hbFss wijIsi3XbIRQOiPx3CYSoIfNJ+kMvVXBvkEcXHbu1ioBlsHUVUcnCfsu0WNhjbCw g3xs8nJHkgJ8jePTUFPUALiOCs0E7rFIZKG2Hl749XrYY5YejpkedmN4Ug2y+F/5 UHyZFHbQatARsDjhWIKNsnEOUPbI+YhNeGdQ3px8ojanRDzOkO73gtJ9xxLgQ8hu um9K6q4z+hqC80ODYxw9kWYok0RENuF6rPlsUfzn13P45Peo7LfMmqClWZ6ejfXk f2bHJYrO6/QBvd8rDNTeGDZ9OJ4iL6BoykAGpaRgpw== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedruddtgedgheeiucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhepfffhvfevuffkfhggtggujgesthdttddttddtvdenucfhrhhomhepfdfmihhr ihhllhcutedrucfuhhhuthgvmhhovhdfuceokhhirhhilhhlsehshhhuthgvmhhovhdrnh grmhgvqeenucggtffrrghtthgvrhhnpefhieeghfdtfeehtdeftdehgfehuddtvdeuheet tddtheejueekjeegueeivdektdenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmh epmhgrihhlfhhrohhmpehkihhrihhllhesshhhuhhtvghmohhvrdhnrghmvg X-ME-Proxy: Feedback-ID: ie3994620:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 16 Jan 2023 08:48:46 -0500 (EST) Received: by box.shutemov.name (Postfix, from userid 1000) id 3ECD8109792; Mon, 16 Jan 2023 16:48:45 +0300 (+03) Date: Mon, 16 Jan 2023 16:48:45 +0300 From: "Kirill A. Shutemov" To: Sean Christopherson Cc: Chao Peng , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, linux-doc@vger.kernel.org, qemu-devel@nongnu.org, Paolo Bonzini , Jonathan Corbet , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Arnd Bergmann , Naoya Horiguchi , Miaohe Lin , x86@kernel.org, "H . Peter Anvin" , Hugh Dickins , Jeff Layton , "J . Bruce Fields" , Andrew Morton , Shuah Khan , Mike Rapoport , Steven Price , "Maciej S . Szmigiero" , Vlastimil Babka , Vishal Annapurve , Yu Zhang , "Kirill A . Shutemov" , luto@kernel.org, jun.nakajima@intel.com, dave.hansen@intel.com, ak@linux.intel.com, david@redhat.com, aarcange@redhat.com, ddutile@redhat.com, dhildenb@redhat.com, Quentin Perret , tabba@google.com, Michael Roth , mhocko@suse.com, wei.w.wang@intel.com Subject: Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM Message-ID: <20230116134845.vboraky2nd56szos@box.shutemov.name> References: <20221202061347.1070246-1-chao.p.peng@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspam-User: X-Rspamd-Server: rspam03 X-Stat-Signature: pj1xtm7mpkm87d6jthzictz1rundtycj X-Rspamd-Queue-Id: B8188120017 X-HE-Tag: 1673876936-407941 X-HE-Meta: U2FsdGVkX1+nLcljZ+1k6TZTuC4S6BjEyvySZb0wcDEqhYmEpiscGQqDa0+6kixzX+C+JGgEydiY8Lb83YZTa2Ef/hMrrbQqXktCw7E6Pr8IM55Ej/W4uZhKI3AR8kRe3Z4Feog+HZtBtEfc3jSRHf2GNFHRFfO0qLAKPNZPiGzEYiuT5pzl17CGXE2MUFfJnngtDoOgtXv/2cP/ket+HQEmJv/hiTkP8MHSriskgL9y4Zh/husJiqLxDmTgF65ovtPDHYjmAshmm2dLz9LNIT7qQ/0ToOu0+gs/sBsKKqL5XLphDuMEWVACNffu95uythMirbtawQdXPYw8ObBPPpi185bl5OrlO29xbbFHSMcZoQlEL5pCdX0166xAVsbzhAPqNq76vyvEmaOr8o1+WXNPSSfuCBI+lLn57AIMgeLsHfvRefkG/GHXpQ/ZPfTEGYDf9xz5uMqAllQAsKGGpwGjdC0+G4B7avWCvmvumqb+jsZTE20ZtuWgwvVd+W4at2WLE91SPXPk+LghWwXBSYVb66LlLvP8U3IMZuiJyflcF3jBylgAHeVfQmGOc/NipZkt4tmxLfdIbnGdVUjw7qF+UNyHDQNBMQktG331b1uPNhvPxgw0H3DP3f41UQ5AFNLM3DIunenxfc16AeACr4tMn/8OQsw8I64cB/yPQJKFdA5iQwo6C6D3yZD3OfX+axcUJYRUNayAWLg1EJi8wLg/ga+CMPdR+n6Ica5+8xVh0tafocZ+g70hE7ucJDDyi5i0oGjidTv6YWORm6XwcA0E0aNr6i/e+lgWIPexEqOMbCZPV4Gb/t9VZANaUNF/IRVSc6PUcE4P/RtTWeg9s7YoePbiVjFA+bYxwCgvC14XIrt2J/D/dOTCko+bn5tCrj9otd3fdaf38DrnnPMPM/OB1JA+6rIO1snDBFRTlIXuNNPfUENYpy8F8Tzr7VHWrQGlG1QP+zk= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Sat, Jan 14, 2023 at 12:37:59AM +0000, Sean Christopherson wrote: > On Fri, Dec 02, 2022, Chao Peng wrote: > > This patch series implements KVM guest private memory for confidential > > computing scenarios like Intel TDX[1]. If a TDX host accesses > > TDX-protected guest memory, machine check can happen which can further > > crash the running host system, this is terrible for multi-tenant > > configurations. The host accesses include those from KVM userspace like > > QEMU. This series addresses KVM userspace induced crash by introducing > > new mm and KVM interfaces so KVM userspace can still manage guest memory > > via a fd-based approach, but it can never access the guest memory > > content. > > > > The patch series touches both core mm and KVM code. I appreciate > > Andrew/Hugh and Paolo/Sean can review and pick these patches. Any other > > reviews are always welcome. > > - 01: mm change, target for mm tree > > - 02-09: KVM change, target for KVM tree > > A version with all of my feedback, plus reworked versions of Vishal's selftest, > is available here: > > git@github.com:sean-jc/linux.git x86/upm_base_support > > It compiles and passes the selftest, but it's otherwise barely tested. There are > a few todos (2 I think?) and many of the commits need changelogs, i.e. it's still > a WIP. > > As for next steps, can you (handwaving all of the TDX folks) take a look at what > I pushed and see if there's anything horrifically broken, and that it still works > for TDX? Minor build fix: diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c index 6eb5336ccc65..4a9e9fa2552a 100644 --- a/arch/x86/kvm/mmu/mmu.c +++ b/arch/x86/kvm/mmu/mmu.c @@ -7211,8 +7211,8 @@ void kvm_arch_set_memory_attributes(struct kvm *kvm, int level; bool mixed; - lockdep_assert_held_write(kvm->mmu_lock); - lockdep_assert_held(kvm->slots_lock); + lockdep_assert_held_write(&kvm->mmu_lock); + lockdep_assert_held(&kvm->slots_lock); /* * KVM x86 currently only supports KVM_MEMORY_ATTRIBUTE_PRIVATE, skip diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index 467916943c73..4ef60ba7eb1d 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -2304,7 +2304,7 @@ static inline void kvm_account_pgtable_pages(void *virt, int nr) #ifdef CONFIG_KVM_GENERIC_MEMORY_ATTRIBUTES static inline unsigned long kvm_get_memory_attributes(struct kvm *kvm, gfn_t gfn) { - lockdep_assert_held(kvm->mmu_lock); + lockdep_assert_held(&kvm->mmu_lock); return xa_to_value(xa_load(&kvm->mem_attr_array, gfn)); } -- Kiryl Shutsemau / Kirill A. Shutemov