From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id ECDF9C83F1B for ; Wed, 16 Jul 2025 12:39:45 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5B5ED8D0002; Wed, 16 Jul 2025 08:39:45 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 58D8D8D0001; Wed, 16 Jul 2025 08:39:45 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4A3AC8D0002; Wed, 16 Jul 2025 08:39:45 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 3A3FF8D0001 for ; Wed, 16 Jul 2025 08:39:45 -0400 (EDT) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 81522140412 for ; Wed, 16 Jul 2025 12:39:44 +0000 (UTC) X-FDA: 83670084288.30.FDB8FC2 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.11]) by imf28.hostedemail.com (Postfix) with ESMTP id 3E7BBC0010 for ; Wed, 16 Jul 2025 12:39:41 +0000 (UTC) Authentication-Results: imf28.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=DGfUkElA; spf=pass (imf28.hostedemail.com: domain of xiaoyao.li@intel.com designates 192.198.163.11 as permitted sender) smtp.mailfrom=xiaoyao.li@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1752669582; a=rsa-sha256; cv=none; b=rqpB1Na9gzi1LE1tH5TotiSRvJ1F2IR7dSyhBj0mujVFFgDeSHIUqp+EjHthLeMgoArFsc 3hpxXhfJTY2IGo+7p5PLTGgiwtq8LpmMEUd0iPmfBFS1Dbaeg4N76OWmnT92uI7nD222xx tqMzqmk3rgE7p1KOLDRzZv7rgNV8Dwg= ARC-Authentication-Results: i=1; imf28.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=DGfUkElA; spf=pass (imf28.hostedemail.com: domain of xiaoyao.li@intel.com designates 192.198.163.11 as permitted sender) smtp.mailfrom=xiaoyao.li@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1752669582; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=EgO5RnuShsc3VPWvirg4sqm7PY1kLgyadMBIp96bz8Y=; b=ogNS50fgSwXwBdbuJKvMitVYMSE5RoMZglOrZZnr+vxMWjdfgePpJFTZWUwxyZpTa8ZIdl HgBXefuxewbcCpUquiuCCaMivlgeNMqW/tvIhqVVNoQ9T9CreXXI7v8IvwlKUbaSyj5uzL jyXlvwx/iDzDNqIcJDUEGfJn2dUtAkU= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1752669581; x=1784205581; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=cHjkb9Opsdc3THxe/4NAVACMMW673IYb7HqjRSyKF7I=; b=DGfUkElAyyj0KXJstDwHvleTNMTenwQLFRucnweTqWqQ9dFojm7FjYuS BHnrwddFD1flUwwI/fpk1B0SETQcIsUW6v6SwbvTtPFwSFgEC4tav8CAz OtWv5IgNO7dhv6RLwNkg475pOB4qojjUFJmVkD7TpVBA9Rb++s+CdlMsp dY8+XrWoVKmDP8pQgDd8BSk9qdt/4h7hRv78lD8HSkGCHLzk64c/WfrkU sqgVPgPkB6wWqaiQxKeyzeq12NSyW3fSgzogYkG4aFqIG37/SMc+Sm3aV j7VkM26jA2MGmXCF28lvuqNHxBEXlChGFxeme4IrK0nqIFjtxCEbIWoEv A==; X-CSE-ConnectionGUID: wMTFMngLTO21I/i+IdS07w== X-CSE-MsgGUID: w9WkvsSWRiy5GsM+SAtHAw== X-IronPort-AV: E=McAfee;i="6800,10657,11493"; a="65482618" X-IronPort-AV: E=Sophos;i="6.16,316,1744095600"; d="scan'208";a="65482618" Received: from fmviesa008.fm.intel.com ([10.60.135.148]) by fmvoesa105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jul 2025 05:39:39 -0700 X-CSE-ConnectionGUID: mvq7H6+oQaikv0WazwLfTg== X-CSE-MsgGUID: aqXX1s79TyCTOFMuOZuDyw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.16,316,1744095600"; d="scan'208";a="158047006" Received: from xiaoyaol-hp-g830.ccr.corp.intel.com (HELO [10.124.247.1]) ([10.124.247.1]) by fmviesa008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jul 2025 05:39:25 -0700 Message-ID: Date: Wed, 16 Jul 2025 20:39:21 +0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v14 02/21] KVM: Rename CONFIG_KVM_GENERIC_PRIVATE_MEM to CONFIG_KVM_GENERIC_GMEM_POPULATE To: Fuad Tabba , David Hildenbrand Cc: kvm@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-mm@kvack.org, kvmarm@lists.linux.dev, pbonzini@redhat.com, chenhuacai@kernel.org, mpe@ellerman.id.au, anup@brainfault.org, paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, seanjc@google.com, viro@zeniv.linux.org.uk, brauner@kernel.org, willy@infradead.org, akpm@linux-foundation.org, yilun.xu@intel.com, chao.p.peng@linux.intel.com, jarkko@kernel.org, amoorthy@google.com, dmatlack@google.com, isaku.yamahata@intel.com, mic@digikod.net, vbabka@suse.cz, vannapurve@google.com, ackerleytng@google.com, mail@maciej.szmigiero.name, michael.roth@amd.com, wei.w.wang@intel.com, liam.merwick@oracle.com, isaku.yamahata@gmail.com, kirill.shutemov@linux.intel.com, suzuki.poulose@arm.com, steven.price@arm.com, quic_eberman@quicinc.com, quic_mnalajal@quicinc.com, quic_tsoni@quicinc.com, quic_svaddagi@quicinc.com, quic_cvanscha@quicinc.com, quic_pderrin@quicinc.com, quic_pheragu@quicinc.com, catalin.marinas@arm.com, james.morse@arm.com, yuzenghui@huawei.com, oliver.upton@linux.dev, maz@kernel.org, will@kernel.org, qperret@google.com, keirf@google.com, roypat@amazon.co.uk, shuah@kernel.org, hch@infradead.org, jgg@nvidia.com, rientjes@google.com, jhubbard@nvidia.com, fvdl@google.com, hughd@google.com, jthoughton@google.com, peterx@redhat.com, pankaj.gupta@amd.com, ira.weiny@intel.com References: <20250715093350.2584932-1-tabba@google.com> <20250715093350.2584932-3-tabba@google.com> <418ddbbd-c25e-4047-9317-c05735e02807@intel.com> <778ca011-1b2f-4818-80c6-ac597809ec77@redhat.com> <6927a67b-cd2e-45f1-8e6b-019df7a7417e@intel.com> <47395660-79ad-4d22-87b0-c5bf891f708c@redhat.com> Content-Language: en-US From: Xiaoyao Li In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspam-User: X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 3E7BBC0010 X-Stat-Signature: 6cey3nh99wb5et5ycuz9xjdhrojypn1a X-HE-Tag: 1752669581-791351 X-HE-Meta: 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 +IweocEe yP0FME/FNNmBuvumwNTGJo4c+7sj3FN5+/f4VXXyDHDcYyT/lHCYoqLS7nXWk25SyedYCITJKsmjsDKFLL3YICbRmXEsg5m9YlGR0XhOZAvFLSKfsKDKUxcC3KmTyeylwXmCTTjWL2hzLGMsjKzzXJgSX0HBPcUP34uu/Xv9D3bqtUS/kgueXnQiDVEaVgq1ADvk2AWAvpMOtjKA+NSDgdW//mKvVjA4u+jceh3aqcyDSw7zNBkl+1Ts4pkCo93NBb8wi653MUQboNM0yCK79OGR5zDehZWUafSCurCcvu//fXeHEiy3wl+rMALmIrZRMQ9IF5xCpBllOJXaUvXeevKmlSwq5ujXfAeoetF9K+dOCUuIIOLzEMstcpR0z0FvoU1yZrBXllk49xZCA0hq2dfyEJA== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 7/16/2025 8:24 PM, Fuad Tabba wrote: > On Wed, 16 Jul 2025 at 13:14, David Hildenbrand wrote: >> >> On 16.07.25 14:01, Xiaoyao Li wrote: >>> On 7/16/2025 7:15 PM, David Hildenbrand wrote: >>>> On 16.07.25 13:05, Fuad Tabba wrote: >>>>> On Wed, 16 Jul 2025 at 12:02, Xiaoyao Li wrote: >>>>>> >>>>>> On 7/16/2025 6:25 PM, David Hildenbrand wrote: >>>>>>> On 16.07.25 10:31, Xiaoyao Li wrote: >>>>>>>> On 7/16/2025 4:11 PM, Fuad Tabba wrote: >>>>>>>>> On Wed, 16 Jul 2025 at 05:09, Xiaoyao Li wrote: >>>>>>>>>> On 7/15/2025 5:33 PM, Fuad Tabba wrote: >>>>>>>>>>> The original name was vague regarding its functionality. This >>>>>>>>>>> Kconfig >>>>>>>>>>> option specifically enables and gates the kvm_gmem_populate() >>>>>>>>>>> function, >>>>>>>>>>> which is responsible for populating a GPA range with guest data. >>>>>>>>>> Well, I disagree. >>>>>>>>>> >>>>>>>>>> The config KVM_GENERIC_PRIVATE_MEM was introduced by commit >>>>>>>>>> 89ea60c2c7b5 >>>>>>>>>> ("KVM: x86: Add support for "protected VMs" that can utilize private >>>>>>>>>> memory"), which is a convenient config for vm types that requires >>>>>>>>>> private memory support, e.g., SNP, TDX, and KVM_X86_SW_PROTECTED_VM. >>>>>>>>>> >>>>>>>>>> It was commit e4ee54479273 ("KVM: guest_memfd: let >>>>>>>>>> kvm_gmem_populate() >>>>>>>>>> operate only on private gfns") that started to use >>>>>>>>>> CONFIG_KVM_GENERIC_PRIVATE_MEM gates kvm_gmem_populate() >>>>>>>>>> function. But >>>>>>>>>> CONFIG_KVM_GENERIC_PRIVATE_MEM is not for kvm_gmem_populate() only. >>>>>>>>>> >>>>>>>>>> If using CONFIG_KVM_GENERIC_PRIVATE_MEM to gate >>>>>>>>>> kvm_gmem_populate() is >>>>>>>>>> vague and confusing, we can introduce KVM_GENERIC_GMEM_POPULATE >>>>>>>>>> to gate >>>>>>>>>> kvm_gmem_populate() and select KVM_GENERIC_GMEM_POPULATE under >>>>>>>>>> CONFIG_KVM_GENERIC_PRIVATE_MEM. >>>>>>>>>> >>>>>>>>>> Directly replace CONFIG_KVM_GENERIC_PRIVATE_MEM with >>>>>>>>>> KVM_GENERIC_GMEM_POPULATE doesn't look correct to me. >>>>>>>>> I'll quote David's reply to an earlier version of this patch [*]: >>>>>>>> >>>>>>>> It's not related to my concern. >>>>>>>> >>>>>>>> My point is that CONFIG_KVM_GENERIC_PRIVATE_MEM is used for selecting >>>>>>>> the private memory support. Rename it to KVM_GENERIC_GMEM_POPULATE is >>>>>>>> not correct. >>>>>>> >>>>>>> It protects a function that is called kvm_gmem_populate(). >>>>>>> >>>>>>> Can we stop the nitpicking? >>>>>> >>>>>> I don't think it's nitpicking. >>>>>> >>>>>> Could you loot into why it was named as KVM_GENERIC_PRIVATE_MEM in the >>>>>> first place, and why it was picked to protect kvm_gmem_populate()? >>>>> >>>>> That is, in part, the point of this patch. This flag protects >>>>> kvm_gmem_populate(), and the name didn't reflect that. Now it does. It >>>>> is the only thing it protects. >>>> >>>> I'll note that the kconfig makes it clear that it depends on >>>> KVM_GENERIC_MEMORY_ATTRIBUTES -- having support for private memory. >>>> >>>> In any case, CONFIG_KVM_GENERIC_PRIVATE_MEM is a bad name: what on earth >>>> is generic private memory. >>> >>> "gmem" + "memory_attribute" is the generic private memory. >>> >>> If KVM_GENERIC_PRIVATE_MEM is a bad name, we can drop it, but not rename >>> it to CONFIG_KVM_GENERIC_GMEM_POPULATE. >>> >>>> If CONFIG_KVM_GENERIC_GMEM_POPULATE is for some reason I don't >>>> understand yet not the right name, can we have something that better >>>> expresses that is is about KVM .. GMEM ... and POPULATE? >>> >>> I'm not objecting the name of CONFIG_KVM_GENERIC_GMEM_POPULATE, but >>> objecting the simple rename. Does something below look reasonable? >>>> --- >>> diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconfig >>> index 2eeffcec5382..3f87dcaaae83 100644 >>> --- a/arch/x86/kvm/Kconfig >>> +++ b/arch/x86/kvm/Kconfig >>> @@ -135,6 +135,7 @@ config KVM_INTEL_TDX >>> bool "Intel Trust Domain Extensions (TDX) support" >>> default y >>> depends on INTEL_TDX_HOST >>> + select KVM_GENERIC_GMEM_POPULATE >>> help >>> Provides support for launching Intel Trust Domain Extensions >>> (TDX) >>> confidential VMs on Intel processors. >>> @@ -158,6 +159,7 @@ config KVM_AMD_SEV >>> depends on CRYPTO_DEV_SP_PSP && !(KVM_AMD=y && CRYPTO_DEV_CCP_DD=m) >>> select ARCH_HAS_CC_PLATFORM >>> select KVM_GENERIC_PRIVATE_MEM >>> + select KVM_GENERIC_GMEM_POPULATE >>> select HAVE_KVM_ARCH_GMEM_PREPARE >>> select HAVE_KVM_ARCH_GMEM_INVALIDATE >>> help >>> diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h >>> index 755b09dcafce..359baaae5e9f 100644 >>> --- a/include/linux/kvm_host.h >>> +++ b/include/linux/kvm_host.h >>> @@ -2556,7 +2556,7 @@ static inline int kvm_gmem_get_pfn(struct kvm *kvm, >>> int kvm_arch_gmem_prepare(struct kvm *kvm, gfn_t gfn, kvm_pfn_t pfn, >>> int max_order); >>> #endif >>> >>> -#ifdef CONFIG_KVM_GENERIC_PRIVATE_MEM >>> +#ifdef CONFIG_KVM_GENERIC_GMEM_POPULATE >>> /** >>> * kvm_gmem_populate() - Populate/prepare a GPA range with guest data >>> * >>> diff --git a/virt/kvm/Kconfig b/virt/kvm/Kconfig >>> index 49df4e32bff7..9b37ca009a22 100644 >>> --- a/virt/kvm/Kconfig >>> +++ b/virt/kvm/Kconfig >>> @@ -121,6 +121,10 @@ config KVM_GENERIC_PRIVATE_MEM >>> select KVM_GMEM >>> bool >>> >>> +config KVM_GENERIC_GMEM_POPULATE >>> + bool >>> + depends on KVM_GMEM && KVM_GENERIC_MEMORY_ATTRIBUTES >>> + >>> config HAVE_KVM_ARCH_GMEM_PREPARE >>> bool >>> depends on KVM_GMEM >>> diff --git a/virt/kvm/guest_memfd.c b/virt/kvm/guest_memfd.c >>> index b2aa6bf24d3a..befea51bbc75 100644 >>> --- a/virt/kvm/guest_memfd.c >>> +++ b/virt/kvm/guest_memfd.c >>> @@ -638,7 +638,7 @@ int kvm_gmem_get_pfn(struct kvm *kvm, struct >>> kvm_memory_slot *slot, >>> } >>> EXPORT_SYMBOL_GPL(kvm_gmem_get_pfn); >>> >>> -#ifdef CONFIG_KVM_GENERIC_PRIVATE_MEM >>> +#ifdef CONFIG_KVM_GENERIC_GMEM_POPULATE >>> long kvm_gmem_populate(struct kvm *kvm, gfn_t start_gfn, void __user >>> *src, long npages, >>> kvm_gmem_populate_cb post_populate, void *opaque) >>> { >>> >>> >> >> $ git grep KVM_GENERIC_PRIVATE_MEM >> arch/x86/kvm/Kconfig: select KVM_GENERIC_PRIVATE_MEM if KVM_SW_PROTECTED_VM >> arch/x86/kvm/Kconfig: select KVM_GENERIC_PRIVATE_MEM if INTEL_TDX_HOST >> arch/x86/kvm/Kconfig: select KVM_GENERIC_PRIVATE_MEM >> include/linux/kvm_host.h:#ifdef CONFIG_KVM_GENERIC_PRIVATE_MEM >> virt/kvm/Kconfig:config KVM_GENERIC_PRIVATE_MEM >> virt/kvm/guest_memfd.c:#ifdef CONFIG_KVM_GENERIC_PRIVATE_MEM >> >> >> Why should we leave KVM_GENERIC_PRIVATE_MEM around when there are no other users? >> If we don't want KVM_GENERIC_PRIVATE_MEM, we can further clean it up with another patch: ------8<----------- diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconfig index 3f87dcaaae83..12afc877c677 100644 --- a/arch/x86/kvm/Kconfig +++ b/arch/x86/kvm/Kconfig @@ -46,7 +46,8 @@ config KVM_X86 select HAVE_KVM_PM_NOTIFIER if PM select KVM_GENERIC_HARDWARE_ENABLING select KVM_GENERIC_PRE_FAULT_MEMORY - select KVM_GENERIC_PRIVATE_MEM if KVM_SW_PROTECTED_VM + select KVM_GENERIC_MEMORY_ATTRIBUTES if KVM_SW_PROTECTED_VM + select KVM_GMEM if KVM_SW_PROTECTED_VM select KVM_WERROR if WERROR config KVM @@ -95,7 +96,7 @@ config KVM_SW_PROTECTED_VM config KVM_INTEL tristate "KVM for Intel (and compatible) processors support" depends on KVM && IA32_FEAT_CTL - select KVM_GENERIC_PRIVATE_MEM if INTEL_TDX_HOST + select KVM_GMEM if INTEL_TDX_HOST select KVM_GENERIC_MEMORY_ATTRIBUTES if INTEL_TDX_HOST help Provides support for KVM on processors equipped with Intel's VT @@ -158,7 +159,8 @@ config KVM_AMD_SEV depends on KVM_AMD && X86_64 depends on CRYPTO_DEV_SP_PSP && !(KVM_AMD=y && CRYPTO_DEV_CCP_DD=m) select ARCH_HAS_CC_PLATFORM - select KVM_GENERIC_PRIVATE_MEM + select KVM_GMEM + select KVM_GENERIC_MEMORY_ATTRIBUTES select KVM_GENERIC_GMEM_POPULATE select HAVE_KVM_ARCH_GMEM_PREPARE select HAVE_KVM_ARCH_GMEM_INVALIDATE diff --git a/virt/kvm/Kconfig b/virt/kvm/Kconfig index 9b37ca009a22..67c626b1a637 100644 --- a/virt/kvm/Kconfig +++ b/virt/kvm/Kconfig @@ -116,11 +116,6 @@ config KVM_GMEM select XARRAY_MULTI bool -config KVM_GENERIC_PRIVATE_MEM - select KVM_GENERIC_MEMORY_ATTRIBUTES - select KVM_GMEM - bool - config KVM_GENERIC_GMEM_POPULATE bool depends on KVM_GMEM && KVM_GENERIC_MEMORY_ATTRIBUTES >> @fuad help me out, what am I missing? > > I'm not sure. Splitting it into two patches, one that introduces > CONFIG_KVM_GENERIC_GMEM_POPULATE followed by one that drops > CONFIG_KVM_GENERIC_PRIVATE_MEM ends up with the same result. Not really the same result. The two-step patches I proposed doesn't produce the below thing of this original patch. It doesn't make sense to select KVM_GENERIC_GMEM_POPULATE for KVM_SW_PROTECTED_VM from the name. diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconfig index 2eeffcec5382..df1fdbb4024b 100644 --- a/arch/x86/kvm/Kconfig +++ b/arch/x86/kvm/Kconfig @@ -46,7 +46,7 @@ config KVM_X86 select HAVE_KVM_PM_NOTIFIER if PM select KVM_GENERIC_HARDWARE_ENABLING select KVM_GENERIC_PRE_FAULT_MEMORY - select KVM_GENERIC_PRIVATE_MEM if KVM_SW_PROTECTED_VM + select KVM_GENERIC_GMEM_POPULATE if KVM_SW_PROTECTED_VM select KVM_WERROR if WERROR > Cheers, > /fuad > > >> -- >> Cheers, >> >> David / dhildenb >>