public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: "Huang, Kai" <kai.huang@intel.com>
To: "pbonzini@redhat.com" <pbonzini@redhat.com>,
	"seanjc@google.com" <seanjc@google.com>,
	"nikunj@amd.com" <nikunj@amd.com>,
	"yosry.ahmed@linux.dev" <yosry.ahmed@linux.dev>
Cc: "thomas.lendacky@amd.com" <thomas.lendacky@amd.com>,
	"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
	"joao.m.martins@oracle.com" <joao.m.martins@oracle.com>,
	"santosh.shukla@amd.com" <santosh.shukla@amd.com>,
	"bp@alien8.de" <bp@alien8.de>
Subject: Re: [PATCH v5 8/8] selftests: KVM: x86: Add SEV PML dirty logging test
Date: Wed, 14 Jan 2026 22:44:31 +0000	[thread overview]
Message-ID: <76d16ce0d02a61ac8482b189ba0c811aa4b2cc67.camel@intel.com> (raw)
In-Reply-To: <6b2c88b2-ab73-41b2-a467-ee8f16a714b3@amd.com>

On Wed, 2026-01-14 at 19:57 +0530, Nikunj A. Dadhania wrote:
> 
> On 1/14/2026 5:06 PM, Huang, Kai wrote:
> > On Mon, 2026-01-05 at 06:36 +0000, Nikunj A Dadhania wrote:
> > > Add a KVM selftest to verify Page Modification Logging (PML) functionality
> > > with AMD SEV/SEV-ES/SEV-SNP guests. The test validates that
> > > hardware-assisted dirty page tracking works correctly across different SEV
> > > guest types.
> > 
> > Hi Nikunj,
> > 
> > Perhaps a dumb question -- Why do we need specific selftest case for SEV*
> > guests?
> 
> As there was a request from you to check if SEV supports PML,
> I wrote this test and thought to send it as part of this series.

Oh for that I just meant whether PML works for SEV* on hardware level, but
not asking any selftests to confirm.  Sorry about the confusion :-(

I had this question because TDX guests don't support PML, and we needed to
only set kvm->arch.cpu_dirty_log_size for VMX guests. 

Since your patch (IIRC) always sets cpu_dirty_log_size for all AMD VMs (in
svm_init_vm()):

+	if (pml)
+		kvm->arch.cpu_dirty_log_size = PML_LOG_NR_ENTRIES;
+

I thought it would be better to check whether SEV* guests work with PML
"on hardware level", otherwise we need TDX-similar treatment on AMD side,
i.e., to clear cpu_dirty_log_size for SEV* guests.

> 
> > In terms of GPA logging, my understanding is there's no difference between
> > normal AMD SVM guests and SEV* guests from hardware's point of view.  So
> > if PML works for normal AMD SVM guests, it should work for SEV* guests,
> > no?
> 
> Yes, that is correct.
> 
> > 
> > FWIW, a more reasonable selftest case is we probably need a AMD version of
> > vmx_dirty_log_test.c[*], which verifies PML is indeed not enabled when L2
> > runs.
> 
> Yosry has added the support here [1].

Thanks for the info.

Then I don't think we need this new selftest case specifically for SEV*
(assuming [1] will be merged, if it has not been done already).

Again, sorry for the confusion.

      reply	other threads:[~2026-01-14 22:44 UTC|newest]

Thread overview: 22+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-01-05  6:36 [PATCH v5 0/8] KVM: SVM: Add Page Modification Logging (PML) support Nikunj A Dadhania
2026-01-05  6:36 ` [PATCH v5 1/8] KVM: x86: Carve out PML flush routine Nikunj A Dadhania
2026-01-12 10:02   ` Huang, Kai
2026-01-14 13:57     ` Nikunj A. Dadhania
2026-01-05  6:36 ` [PATCH v5 2/8] KVM: x86: Move PML page to common vcpu arch structure Nikunj A Dadhania
2026-01-12 10:07   ` Huang, Kai
2026-01-05  6:36 ` [PATCH v5 3/8] KVM: VMX: Use cpu_dirty_log_size instead of enable_pml for PML checks Nikunj A Dadhania
2026-01-05  6:49   ` Gupta, Pankaj
2026-01-05  6:36 ` [PATCH v5 4/8] KVM: x86: Move nested CPU dirty logging logic to common code Nikunj A Dadhania
2026-01-12 10:08   ` Huang, Kai
2026-01-05  6:36 ` [PATCH v5 5/8] x86/cpufeatures: Add Page modification logging Nikunj A Dadhania
2026-01-05  6:36 ` [PATCH v5 6/8] KVM: SVM: Use BIT_ULL for 64-bit nested_ctl bit definitions Nikunj A Dadhania
2026-01-05  6:36 ` [PATCH v5 7/8] KVM: SVM: Add Page modification logging support Nikunj A Dadhania
2026-01-12 10:24   ` Huang, Kai
2026-01-14 14:03     ` Nikunj A. Dadhania
2026-01-14 23:10       ` Huang, Kai
2026-01-14 22:48   ` Huang, Kai
2026-01-16  4:12     ` Nikunj A. Dadhania
2026-01-05  6:36 ` [PATCH v5 8/8] selftests: KVM: x86: Add SEV PML dirty logging test Nikunj A Dadhania
2026-01-14 11:36   ` Huang, Kai
2026-01-14 14:27     ` Nikunj A. Dadhania
2026-01-14 22:44       ` Huang, Kai [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=76d16ce0d02a61ac8482b189ba0c811aa4b2cc67.camel@intel.com \
    --to=kai.huang@intel.com \
    --cc=bp@alien8.de \
    --cc=joao.m.martins@oracle.com \
    --cc=kvm@vger.kernel.org \
    --cc=nikunj@amd.com \
    --cc=pbonzini@redhat.com \
    --cc=santosh.shukla@amd.com \
    --cc=seanjc@google.com \
    --cc=thomas.lendacky@amd.com \
    --cc=yosry.ahmed@linux.dev \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox