From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.4 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 24E81C432C0 for ; Thu, 28 Nov 2019 04:57:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id DC43A215F1 for ; Thu, 28 Nov 2019 04:57:00 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=ozlabs.org header.i=@ozlabs.org header.b="n0YjGm0+" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727218AbfK1E4o (ORCPT ); Wed, 27 Nov 2019 23:56:44 -0500 Received: from bilbo.ozlabs.org ([203.11.71.1]:35697 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726401AbfK1E4o (ORCPT ); Wed, 27 Nov 2019 23:56:44 -0500 Received: by ozlabs.org (Postfix, from userid 1003) id 47NljP3y4zz9sPL; Thu, 28 Nov 2019 15:56:41 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ozlabs.org; s=201707; t=1574917001; bh=dq/B6bAPFmqaGLATrGnSHKh6kfJmN3b0JQehcdPnYtU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=n0YjGm0+WUE/mAWbwEBnHeHpoAhycAW4uSUqCMso72OfrvDMubpSw+IwhpyxQBZ// v0z8HWhAUtL5hdjF58njrD2mnP/URxH29lwcAU4ELS2YwUgpeCOebQ+LdBTLaAdq2n ws+r4hWglzx6/IEWg/K81C5ZJpk8UODMtJC/YZ08Wns5jCQW1sm7nhfXTu87bcqFbN TmFb3Z4uN4UDTEkZvK3njR7tjnpX6EcJRV23kkSgb0mHjnT8Tfkwst7djOPLlCULVz VBZxSCAFj9nqwu3/OqR+UYfPZ8FZzdh5Jxufyf4MbSqCIRKunWQFmOhL+piBwHjNe+ z5KxTH4tswrKw== Date: Thu, 28 Nov 2019 15:56:39 +1100 From: Paul Mackerras To: Paolo Bonzini , kvm@vger.kernel.org Cc: kvm-ppc@vger.kernel.org, Bharata B Rao Subject: Re: [GIT PULL] Please pull my kvm-ppc-uvmem-5.5 tag Message-ID: <20191128045639.GA28618@oak.ozlabs.ibm.com> References: <20191126052455.GA2922@oak.ozlabs.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191126052455.GA2922@oak.ozlabs.ibm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org On Tue, Nov 26, 2019 at 04:24:55PM +1100, Paul Mackerras wrote: > Paolo, > > If you are intending to send a second pull request for Linus for this > merge window, and you are OK with taking a new feature in PPC KVM code > at this stage, then please do a pull from my kvm-ppc-uvmem-5.5 tag. > This adds code to manage the movement of pages for a secure KVM guest > between normal memory managed by the host kernel and secure memory > managed by the ultravisor on Power systems with Protected Execution > Facility hardware and firmware. Secure memory is not accessible to > the host kernel and is represented as device memory using the > ZONE_DEVICE facility. > > The patch set has been around for a while and has been reasonably well > reviewed -- this branch contains v11 of the patch set. The code > changes are confined to PPC KVM code with the exception of a one-line > change to mm/ksm.c to export the ksm_madvise function, the addition of > a new ioctl number in include/uapi/linux/kvm.h, and the addition of a > Kconfig option in arch/powerpc/Kconfig (which Michael Ellerman is OK > with). Please hold off on this. Hugh Dickins sent some review comments identifying a problem (ksm_madvise needs mmap_sem held for writing, not just reading). I'll send an updated pull request shortly. Paul.