From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 43069C61DB2 for ; Fri, 13 Jun 2025 07:36:28 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BFD676B008A; Fri, 13 Jun 2025 03:36:27 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B85FC6B008C; Fri, 13 Jun 2025 03:36:27 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A27D16B0092; Fri, 13 Jun 2025 03:36:27 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 81E2E6B008A for ; Fri, 13 Jun 2025 03:36:27 -0400 (EDT) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 1C4ED5F78C for ; Fri, 13 Jun 2025 07:36:27 +0000 (UTC) X-FDA: 83549569614.08.C352A7C Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by imf23.hostedemail.com (Postfix) with ESMTP id 712F014000C for ; Fri, 13 Jun 2025 07:36:24 +0000 (UTC) Authentication-Results: imf23.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=UckNfmUL; spf=pass (imf23.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1749800184; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=g/KSy3wr0YzCsYvT1z88yXOYsPTy06KTgQEl479p0xk=; b=16j470mOlTgHwWDfz4QERYFmNU5ORlMDilYIsLYm1fJibciICgd/Bms2d3Q/Q6qkMFMw2M fcMiRB7GUO9nqFu8es4qYGLDmA1UzAqw6nbOD5xa1noJYXyLhiG6udb+o80lw9YgNM4aJ9 1o4aKKQnMDTGEn9ECA9tqy7nQFcYAzo= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1749800184; a=rsa-sha256; cv=none; b=EMCxxPYY8vIrqHkjvaUKdJ1l1YgNhK0Ks52PVfk07/Lk+agofOyJ/Wi4AmuSdOd5Zv158J dMFmlpXL8KKOLw69uJ1C59x//kX/vSfdJGgL6YtrCKK7hFkgYp/kDqzH/ZGgKDdc3DGPvA tWRPmNaCxVffWQqls0kS+35836Mk1Ug= ARC-Authentication-Results: i=1; imf23.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=UckNfmUL; spf=pass (imf23.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1749800183; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=g/KSy3wr0YzCsYvT1z88yXOYsPTy06KTgQEl479p0xk=; b=UckNfmULVW4NtsEPwZF9QPueoov+OJQ7SmpHk0ZWw18HI83IZESqou1BxamchZC+ywX2i9 RAjGvQBor1sD03kcVpBZUZaXdcSj8oZBXmRW004xCv+RywAHIanEXxSpat7M+cnOx6Gx28 i+YWFYkPw0EAurRu7gFMu4KfIoX0vAI= Received: from mail-wr1-f69.google.com (mail-wr1-f69.google.com [209.85.221.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-680-p_u-3r9KN9qh5cAaOGzfnA-1; Fri, 13 Jun 2025 03:36:22 -0400 X-MC-Unique: p_u-3r9KN9qh5cAaOGzfnA-1 X-Mimecast-MFC-AGG-ID: p_u-3r9KN9qh5cAaOGzfnA_1749800181 Received: by mail-wr1-f69.google.com with SMTP id ffacd0b85a97d-3a50049f8eeso868513f8f.3 for ; Fri, 13 Jun 2025 00:36:21 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1749800181; x=1750404981; h=content-transfer-encoding:in-reply-to:organization:autocrypt :content-language:from:references:cc:to:subject:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=g/KSy3wr0YzCsYvT1z88yXOYsPTy06KTgQEl479p0xk=; b=YcKD+MYt2qj3RIHGZki8KZC/IFmgPzWfRbeiFq2B3CCqFXKfb1a+vthMD7hZyYVC/H oyVbnqyC4cFMdpzrGCV1+H6Jd+v6wBdnTDhOcwW9+t6yxFWpj/tm/6LQb//V/Zi7agf9 m/9gXgML+/rs6fLzVV7d3MU8KZoyzuBLn9v8sKQBDIdz+48/uC00wzHakVYJ4eZ+zfaK nAxvRRclm/KpRiBvVbOyW0LyC36GpwyCFvcrKfM/bC6Z0B2mFPInbmc9aTXtRNcGV/ub 1eHwF+vkzSoQFVefPUXEzVhhzr93qBzVodXS603B7pU/C5i7Sgqmr+ekLjOTf9cb1xes 3EwQ== X-Forwarded-Encrypted: i=1; AJvYcCWH+ZMqAnJdvAY9Pqq/tuF5dp6S7E+901Yep+IxK9iMpsluWqV/gmZRweJDBxWdeLiE5W7TdLqfMQ==@kvack.org X-Gm-Message-State: AOJu0Ywr2RX375Myndag8hOattlBhDZLipZbPOHT0aI/FTsWLqnFxcPl S6Nzj6H/loX/JDk3I/NS9JdVabX794nzvs//PkpEsZkVFw3Sf7sMOER2tpB0QoBeArqYxCzQ+/H E3OwSX1rfHiEAHSLYEt1bZ7jPfYa44W3JGK9eQxSRun1OM6WqkAgP X-Gm-Gg: ASbGnctAKZnHbaQjBd1y1WhfY+C/ftKn1XN9aIFmILCGJwIZmtRS+ZkDIX7sHV7OfNw MztAkKL9EmNckZixDsmODwjEITAcR7axwcoaGCGn1ruL3GSoJhlcMiI0ngSIPW/mf0jEjnP8Y6b iao+XJbnpCxMLbmzj4H+gYWULcKDtHgQt8cS7uY5FnPTMaUVAWXBJvBJuUCLuLQFcSaLXlmIYMO PCUYGYQiqGp7eWU0sd32HjIVc7W9H5+wN931Mvmr0cFQm7aEhMAQBW+o/I8oC24/1EWt2OT2gzX Z+das85ySVUEKPVbdzC4kchF2p6uB96e15nfnzbPOzJ/12ZF8Gohl6mVaP4UA5V43weS+BV19V6 qMd7/KIOZcFsDtDytxsKMvQqA6US+/p4BR1WoEaf3eal1ACP2uA== X-Received: by 2002:a05:6000:200d:b0:3a4:dd02:f565 with SMTP id ffacd0b85a97d-3a5686e46dcmr1695327f8f.3.1749800180754; Fri, 13 Jun 2025 00:36:20 -0700 (PDT) X-Google-Smtp-Source: AGHT+IG3E5xAucf59QCGzaz7TSQ1Q2JsqiFiIEKcGbgyzY70RtwYOnTLFta6yG1DaZATOftTdpFeSQ== X-Received: by 2002:a05:6000:200d:b0:3a4:dd02:f565 with SMTP id ffacd0b85a97d-3a5686e46dcmr1695304f8f.3.1749800180358; Fri, 13 Jun 2025 00:36:20 -0700 (PDT) Received: from ?IPV6:2003:d8:2f1a:3700:2982:b5f7:a04e:4cb4? (p200300d82f1a37002982b5f7a04e4cb4.dip0.t-ipconnect.de. [2003:d8:2f1a:3700:2982:b5f7:a04e:4cb4]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-3a568b18f96sm1535136f8f.66.2025.06.13.00.36.19 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 13 Jun 2025 00:36:19 -0700 (PDT) Message-ID: <12f88382-e1eb-4e40-9e47-dafb79a7f102@redhat.com> Date: Fri, 13 Jun 2025 09:36:18 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH RFC v1 0/5] KVM: guest_memfd: Support in-place conversion for CoCo VMs To: Michael Roth , kvm@vger.kernel.org Cc: linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-kernel@vger.kernel.org, tabba@google.com, vannapurve@google.com, ackerleytng@google.com, ira.weiny@intel.com, thomas.lendacky@amd.com, pbonzini@redhat.com, seanjc@google.com, vbabka@suse.cz, joro@8bytes.org, pratikrajesh.sampat@amd.com, liam.merwick@oracle.com, yan.y.zhao@intel.com, aik@amd.com References: <20250613005400.3694904-1-michael.roth@amd.com> From: David Hildenbrand Autocrypt: addr=david@redhat.com; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwZgEEwEIAEICGwMGCwkIBwMCBhUIAgkKCwQW AgMBAh4BAheAAhkBFiEEG9nKrXNcTDpGDfzKTd4Q9wD/g1oFAl8Ox4kFCRKpKXgACgkQTd4Q 9wD/g1oHcA//a6Tj7SBNjFNM1iNhWUo1lxAja0lpSodSnB2g4FCZ4R61SBR4l/psBL73xktp rDHrx4aSpwkRP6Epu6mLvhlfjmkRG4OynJ5HG1gfv7RJJfnUdUM1z5kdS8JBrOhMJS2c/gPf wv1TGRq2XdMPnfY2o0CxRqpcLkx4vBODvJGl2mQyJF/gPepdDfcT8/PY9BJ7FL6Hrq1gnAo4 3Iv9qV0JiT2wmZciNyYQhmA1V6dyTRiQ4YAc31zOo2IM+xisPzeSHgw3ONY/XhYvfZ9r7W1l pNQdc2G+o4Di9NPFHQQhDw3YTRR1opJaTlRDzxYxzU6ZnUUBghxt9cwUWTpfCktkMZiPSDGd KgQBjnweV2jw9UOTxjb4LXqDjmSNkjDdQUOU69jGMUXgihvo4zhYcMX8F5gWdRtMR7DzW/YE BgVcyxNkMIXoY1aYj6npHYiNQesQlqjU6azjbH70/SXKM5tNRplgW8TNprMDuntdvV9wNkFs 9TyM02V5aWxFfI42+aivc4KEw69SE9KXwC7FSf5wXzuTot97N9Phj/Z3+jx443jo2NR34XgF 89cct7wJMjOF7bBefo0fPPZQuIma0Zym71cP61OP/i11ahNye6HGKfxGCOcs5wW9kRQEk8P9 M/k2wt3mt/fCQnuP/mWutNPt95w9wSsUyATLmtNrwccz63XOwU0EVcufkQEQAOfX3n0g0fZz Bgm/S2zF/kxQKCEKP8ID+Vz8sy2GpDvveBq4H2Y34XWsT1zLJdvqPI4af4ZSMxuerWjXbVWb T6d4odQIG0fKx4F8NccDqbgHeZRNajXeeJ3R7gAzvWvQNLz4piHrO/B4tf8svmRBL0ZB5P5A 2uhdwLU3NZuK22zpNn4is87BPWF8HhY0L5fafgDMOqnf4guJVJPYNPhUFzXUbPqOKOkL8ojk CXxkOFHAbjstSK5Ca3fKquY3rdX3DNo+EL7FvAiw1mUtS+5GeYE+RMnDCsVFm/C7kY8c2d0G NWkB9pJM5+mnIoFNxy7YBcldYATVeOHoY4LyaUWNnAvFYWp08dHWfZo9WCiJMuTfgtH9tc75 7QanMVdPt6fDK8UUXIBLQ2TWr/sQKE9xtFuEmoQGlE1l6bGaDnnMLcYu+Asp3kDT0w4zYGsx 5r6XQVRH4+5N6eHZiaeYtFOujp5n+pjBaQK7wUUjDilPQ5QMzIuCL4YjVoylWiBNknvQWBXS lQCWmavOT9sttGQXdPCC5ynI+1ymZC1ORZKANLnRAb0NH/UCzcsstw2TAkFnMEbo9Zu9w7Kv AxBQXWeXhJI9XQssfrf4Gusdqx8nPEpfOqCtbbwJMATbHyqLt7/oz/5deGuwxgb65pWIzufa N7eop7uh+6bezi+rugUI+w6DABEBAAHCwXwEGAEIACYCGwwWIQQb2cqtc1xMOkYN/MpN3hD3 AP+DWgUCXw7HsgUJEqkpoQAKCRBN3hD3AP+DWrrpD/4qS3dyVRxDcDHIlmguXjC1Q5tZTwNB boaBTPHSy/Nksu0eY7x6HfQJ3xajVH32Ms6t1trDQmPx2iP5+7iDsb7OKAb5eOS8h+BEBDeq 3ecsQDv0fFJOA9ag5O3LLNk+3x3q7e0uo06XMaY7UHS341ozXUUI7wC7iKfoUTv03iO9El5f XpNMx/YrIMduZ2+nd9Di7o5+KIwlb2mAB9sTNHdMrXesX8eBL6T9b+MZJk+mZuPxKNVfEQMQ a5SxUEADIPQTPNvBewdeI80yeOCrN+Zzwy/Mrx9EPeu59Y5vSJOx/z6OUImD/GhX7Xvkt3kq Er5KTrJz3++B6SH9pum9PuoE/k+nntJkNMmQpR4MCBaV/J9gIOPGodDKnjdng+mXliF3Ptu6 3oxc2RCyGzTlxyMwuc2U5Q7KtUNTdDe8T0uE+9b8BLMVQDDfJjqY0VVqSUwImzTDLX9S4g/8 kC4HRcclk8hpyhY2jKGluZO0awwTIMgVEzmTyBphDg/Gx7dZU1Xf8HFuE+UZ5UDHDTnwgv7E th6RC9+WrhDNspZ9fJjKWRbveQgUFCpe1sa77LAw+XFrKmBHXp9ZVIe90RMe2tRL06BGiRZr jPrnvUsUUsjRoRNJjKKA/REq+sAnhkNPPZ/NNMjaZ5b8Tovi8C0tmxiCHaQYqj7G2rgnT0kt WNyWQQ== Organization: Red Hat In-Reply-To: <20250613005400.3694904-1-michael.roth@amd.com> X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: o5tFMrWJcsjfbvFoFNNMy0DE6ry4EIyixOkLyalGQKA_1749800181 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspam-User: X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: 712F014000C X-Stat-Signature: bcnhdzxzygjp57p3914t387r7qjs3zr4 X-HE-Tag: 1749800184-648296 X-HE-Meta: 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 hzsNcfbU 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 13.06.25 02:53, Michael Roth wrote: > This patchset is also available at: > > https://github.com/amdese/linux/commits/snp-inplace-conversion-rfc1 > > and is based on top of the following patches plucked from Ackerley's > HugeTLBFS series[1], which add support for tracking/converting guest_memfd > pages between private/shared states so the same physical pages can be used > to handle both private/shared accesses by the guest or by userspace: > > KVM: selftests: Update script to map shared memory from guest_memfd > KVM: selftests: Update private_mem_conversions_test to mmap guest_memfd > KVM: selftests: Add script to exercise private_mem_conversions_test > KVM: selftests: Test conversion flows for guest_memfd > KVM: selftests: Allow cleanup of ucall_pool from host > KVM: selftests: Refactor vm_mem_add to be more flexible > KVM: selftests: Test faulting with respect to GUEST_MEMFD_FLAG_INIT_PRIVATE > KVM: selftests: Test flag validity after guest_memfd supports conversions > KVM: guest_memfd: Add CAP KVM_CAP_GMEM_CONVERSION > KVM: Query guest_memfd for private/shared status > KVM: guest_memfd: Skip LRU for guest_memfd folios > KVM: guest_memfd: Introduce KVM_GMEM_CONVERT_SHARED/PRIVATE ioctls > KVM: selftests: Update guest_memfd_test for INIT_PRIVATE flag > KVM: guest_memfd: Introduce and use shareability to guard faulting > KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes > fs: Refactor to provide function that allocates a secure anonymous inode > > "[RFC PATCH v2 00/51] 1G page support for guest_memfd" > https://lore.kernel.org/lkml/cover.1747264138.git.ackerleytng@google.com/ > > which is in turn based on the following series[2] from Fuad which implements > the initial support for guest_memfd to manage shared memory and allow it to > be mmap()'d into userspace: > > "[PATCH v12 00/18] KVM: Mapping guest_memfd backed memory at the host for software protected VMs" > https://lore.kernel.org/kvm/20250611133330.1514028-1-tabba@google.com/ > > (One of the main goals of posting this series in it's current form is to > identify the common set of dependencies to enable in-place conversion > support for SEV-SNP, TDX, and pKVM, which have been coined "stage 2" > according to upstreaming plans discussed during guest_memfd bi-weekly calls > and summarized by David here[3] (Fuad's series[2] being "stage 1"), > so please feel free to chime in here if there's any feedback on whether > something like the above set of dependencies is a reasonable starting point > for "stage 2" and how best to handle setting up a common tree to track this > dependency.) If nobody else volunteers, I can soon start maintaining a guest_memfd preview tree. I suspect a good starting point would be once stage-2 is posted separately. -- Cheers, David / dhildenb