From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id F0532C83F17 for ; Tue, 15 Jul 2025 22:56:09 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5ED256B00A0; Tue, 15 Jul 2025 18:56:09 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 59E066B00A1; Tue, 15 Jul 2025 18:56:09 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 48CBD6B00A2; Tue, 15 Jul 2025 18:56:09 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 38BD16B00A0 for ; Tue, 15 Jul 2025 18:56:09 -0400 (EDT) Received: from smtpin09.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 9B4C857375 for ; Tue, 15 Jul 2025 22:56:08 +0000 (UTC) X-FDA: 83668008816.09.4D18412 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on2044.outbound.protection.outlook.com [40.107.94.44]) by imf22.hostedemail.com (Postfix) with ESMTP id 9CA01C000C for ; Tue, 15 Jul 2025 22:56:05 +0000 (UTC) Authentication-Results: imf22.hostedemail.com; dkim=pass header.d=amd.com header.s=selector1 header.b=AtBVXktA; spf=pass (imf22.hostedemail.com: domain of Michael.Roth@amd.com designates 40.107.94.44 as permitted sender) smtp.mailfrom=Michael.Roth@amd.com; dmarc=pass (policy=quarantine) header.from=amd.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1752620165; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=8Y678HHSQDH8/+Qj3NFpMXyWFC73x5o59TJyKcD2n0w=; b=HBvg8F/pwJ+1DbaZU4gRsqULmXMSUOHgiCofYnk6UvblHtl4ILED0eEdDNjRNgzWePOVhP aY7MiJj0u+e0gW2cZ6nd0I5DGnb2WicDG0/LZaCZ6wCUeJtuwWKxxAWft+kpGdB+r8vmrd 4YdHAHm9U0W5mECih0eB4p3w0swoOa0= ARC-Authentication-Results: i=2; imf22.hostedemail.com; dkim=pass header.d=amd.com header.s=selector1 header.b=AtBVXktA; spf=pass (imf22.hostedemail.com: domain of Michael.Roth@amd.com designates 40.107.94.44 as permitted sender) smtp.mailfrom=Michael.Roth@amd.com; dmarc=pass (policy=quarantine) header.from=amd.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1752620165; a=rsa-sha256; cv=pass; b=AARaFo/LceW0adobeFCVVaIYLXhLZkqj9wOVUjmjfy1H+PqGTLN9dK11oR5HfEzDSQe1LS f8P47ZmXy9k5w4Ls3hljkGxXJjem2NDl2cmBpPeXt2ASjZGBOjsmh0bYdiowWbVR7vMA2Q bCMoXzzGevq/9bSw4ZntF3MjnKM9TM8= ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=QBT8GOEwmNso58uhQshNiFZJ3UVtus6+qu6YbXDNiBOJ1ttc5pVO3TK0eOmaK4sE5/0XTSEOaoZanm2UatSUs5aK1NPh1OGRNHcDTexNOSRbHxOU/OrhJEis3PJsbL6+GlpwKaCBqgA/gY9x6rBRCffF8ddC27YJ9xt/ZaTz/IqCeNoKXZMKlNhAQSzFkzl8fjhxqrW/3aPQx7r52+qxBIlfuz4Cbp5DA1m5pdto1l+NTcD8uaM2k/RAVX0QaJ8NyDW5bxiqdYWb06ReVTv2LW8y0iuH4xyoomnIQwXnTz51fZsbssd42Fcwp4mdUbqNFdD4+LspigsgbifGo8I6jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8Y678HHSQDH8/+Qj3NFpMXyWFC73x5o59TJyKcD2n0w=; b=iPG/Gf07BFdLf3XsUXpuHHBtaRrZdY/FhuCeO3g7+kDLPEdAYO26uU089CqAyerrV8Yk2A5+wZu3xtc5+mpnDW+NSdSyfz/LacCa0R69w7m+ufC7ny03hoxscdbPIWkk3HqcI9u1pQAvs7+JhfDmR2n3/Nx73fDVgYsFINdpNOBm92/Fa2QfHb6F1HdpPvVxe1nx3FIK3Auj1GfWdr+3EAb21kaiHAIuIa/a7A/B+FwmVBytmdbxTN4hQOoh9Qx453Pk4Jh4RnaT9tVu+8FAPJpsswGZeakAcCCh6PTKYeiKnUsxPZNc/fZnEgLaa4kmBP54EgPi7ciqQgc9EWJ+4w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=google.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8Y678HHSQDH8/+Qj3NFpMXyWFC73x5o59TJyKcD2n0w=; b=AtBVXktA2PQHFVAQZV9jbOlTl8WaVBT7eFv39Mj+jMLiDvw+8yuzli11y/G7NsXSFAjhpQg2TlNmHRtcKgzcuflI1o0aTRpm4szTAVxcN4lpLZOTZMgyZx1QGFWMTBfQ79/yg9/c1SOuMhS6YN+yyzO9UHo5TBb2qgqia+v+rdc= Received: from SJ0PR03CA0216.namprd03.prod.outlook.com (2603:10b6:a03:39f::11) by PH7PR12MB5830.namprd12.prod.outlook.com (2603:10b6:510:1d5::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8922.32; Tue, 15 Jul 2025 22:56:00 +0000 Received: from CY4PEPF0000EDD4.namprd03.prod.outlook.com (2603:10b6:a03:39f:cafe::7f) by SJ0PR03CA0216.outlook.office365.com (2603:10b6:a03:39f::11) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8922.33 via Frontend Transport; Tue, 15 Jul 2025 22:56:00 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by CY4PEPF0000EDD4.mail.protection.outlook.com (10.167.241.200) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8922.22 via Frontend Transport; Tue, 15 Jul 2025 22:55:59 +0000 Received: from localhost (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 15 Jul 2025 17:55:58 -0500 Date: Tue, 15 Jul 2025 17:48:25 -0500 From: Michael Roth To: Vishal Annapurve CC: , , , , , , , , , , , , , , , , Subject: Re: [PATCH RFC v1 3/5] KVM: guest_memfd: Call arch invalidation hooks when converting to shared Message-ID: <20250715224825.gfeo5jdqjlvtn66l@amd.com> References: <20250613005400.3694904-1-michael.roth@amd.com> <20250613005400.3694904-4-michael.roth@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB04.amd.com (10.181.40.145) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PEPF0000EDD4:EE_|PH7PR12MB5830:EE_ X-MS-Office365-Filtering-Correlation-Id: e4d62f4c-3cb1-41ed-35c1-08ddc3f2c408 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|82310400026|36860700013|376014|7416014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?YkM2c2dWeEwwS0tXQ0xXOUNBbHpYeDgxTVRoWHZNclIwclgwaDlYdy9uOEZn?= =?utf-8?B?VHI0UGxIU3M2UmY4SHhMeTR0c09abnRtWTFuSGVJelRCaW5TYjVHYUk5VFpL?= =?utf-8?B?RENqNUtqQWlsNzVSUlIraEdTUFdwWlRoRkdWWHVYTnZuVkgwYTdqdFhlSGo2?= =?utf-8?B?Nkd5ZzdKa29leHZKaHNLbkVHeGZLdXhTMjgrWHFMSDVzN2loS3pNYzVVZkds?= =?utf-8?B?M2M2eHBuT0FLSlV1QmFrek1Dc2I5eWUxTDJ0Q044YUdad1BRekZvWktqaGEy?= =?utf-8?B?T1FUUGFyMXB6ckpqQWVWaHVtVmZVai90YS9QSWZpWFRBaXFLZUM5bzR1RHJn?= =?utf-8?B?YVZxY29WQ1BQK1FTTVBkM1J3amJ4bzRoV0VTUkJiV1ZUSGllNG8rdVJpWkU5?= =?utf-8?B?bjdTSXF1ZExqaGUyZy9ZcnlYSGM4ZE5aSEpyMUxLbG1mdUoxM0MxQ2ZEdlNa?= =?utf-8?B?MHdla1FUYXV4RmdVZTFPdkNoN3lNcVZXVFdMcCtVeGtUbnhwZUx5aEJrMklH?= =?utf-8?B?NWFiczhwRG1LM2JOQXdtQ3RmV3J6ZTFwYUhlaWt1SmdaSFFHMm9OMXVGSm5H?= =?utf-8?B?YmppdmZsZS9oWGJ4WTA3SGVWdEFsM3o3SGhpdXNsZVJ5QnkvTTdTZW5ZUUlI?= =?utf-8?B?Q2RlSHdOd3pKZis1NHhlNXd3Kytub3RKL01yZHhmby91VzhndnNOTU1LZlAx?= =?utf-8?B?ajVBeWp4LzZmanIrQ2s3SmtneHdwREN4c3JKeHVhK0syY0Z2UWpnODlhdVc2?= =?utf-8?B?MCtUWDhJbmh5YXZsaGpxK09hRWY4TFl3SWxSWW9BdjU2U01lVFlySFNmalNQ?= =?utf-8?B?RE9nVnJzTDQvdXlqcHo0MWpUZk4rNHd4UFppVGJ1Sm95OUNkMzZpKzNNN25q?= =?utf-8?B?NjM2TkkrUXBwNlZhb2hPSzVwWXgyNTlBM3JaZWJGVWRhbUxsRlBDWXFEVHdv?= =?utf-8?B?Qm8rWGFkUnRMSndJSHlubkd0M3VwYnpETXQySkdBNmE0bmR5U2pSeWhVNWFI?= =?utf-8?B?K2RjOUlQNk9wV0k4VHZBTGlwQ1B1c1IvLzYrZlpKWUVoMGJwN1hZNWRTK0NP?= =?utf-8?B?dGNVaDFRS1dCQ2s3bmRIZlFKSFFPdmJZMHVSUUZNc0FNRW84WnJXbHY1VzdE?= =?utf-8?B?OEtaaDJ4SDhRM2s1c0R0UGdDbG1MZjJKNU00Z1B3YjdKaGMrbDJ4enlCWnRL?= =?utf-8?B?bUs0UnFDUndJSjBJUkVHUjRQdVlzanRZRDQrS1JEV3hvNlk1SWhrcU1ZTzhI?= =?utf-8?B?bTB2Z1RKTmUyUE9Da016VElaREdIczRMNjhtTEQ4MUcvWG4rTHFRMXY3b1RU?= =?utf-8?B?MlZjZ0lPMEpHcllqcGlacHhTVVV6WVdLNG5kb21rbHZ0VnNBSERlQ3g2Y1lO?= =?utf-8?B?SU04UU0wNVE0VjlRYmZ1bThTMWlINTZQODhydUhFVVFpdUNobnQwUmhDV0l0?= =?utf-8?B?UlZzK1N4cGc1WVBOZ2JYVWJta1k5S0FtUy9pa21WRFFKM0REdTlnVXBmbFlT?= =?utf-8?B?ek94UTNNYUxJbzVYQjVHQWdZRVJzQzBMcHV0OE1ldmsySEFJYjAvZUZRQW40?= =?utf-8?B?UmdiRTYxR0F4UFNjK0ZsRHdEYUZEb1ZHQStkbVVTeldDUndUc1pmS1phVFlC?= =?utf-8?B?d3JybVV3K0J3SmJxWGtmemJQL1gyT3RnNVlVL2V3SlNvZmJXdWloV1ZoTEYx?= =?utf-8?B?MUwydWJKRjhuNkJINkQ1a2RuVFJGWHV3ZDVKVjRsWFZQVDFZeWV2eVFUdGpB?= =?utf-8?B?N0QyNzhoRk1QbG5jZTVSc01YZUxqWTc2aVdPa0pDdHFuMmJxN0RaaHJicHhZ?= =?utf-8?B?d1pCOWs3QVlINzBvZ2poN1F6a041Vlpna2h5bkM2UDBNR3BHUXRHcGo2U3Nl?= =?utf-8?B?TWZzUzYrRy8rNjdBdEI5L1ZvWUVFZ2pNbHJuT1lpY2J5UkN2U3owRC9SWkVi?= =?utf-8?B?NFBXRFNtcGdEZGR6cFRUQm5VMlZ2WHJQT1BTK1JTUEtpb1Z4aHpLTGJJMUdT?= =?utf-8?B?NGJaSFNXUFhrMXlNaTJWZ3ZDclpKR2U3Tk10Z1VyWHhwRlh1SURURCtVaFNO?= =?utf-8?Q?yK5S0q?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(82310400026)(36860700013)(376014)(7416014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Jul 2025 22:55:59.3962 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: e4d62f4c-3cb1-41ed-35c1-08ddc3f2c408 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000EDD4.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB5830 X-Rspam-User: X-Rspamd-Queue-Id: 9CA01C000C X-Rspamd-Server: rspam06 X-Stat-Signature: nd1tx9q7s84qxxn4s8w8haj7u3ddg6zs X-HE-Tag: 1752620165-575090 X-HE-Meta: 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 q1F5Gx5/ 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Tue, Jul 15, 2025 at 06:20:09AM -0700, Vishal Annapurve wrote: > On Thu, Jun 12, 2025 at 5:56 PM Michael Roth wrote: > > > > When guest_memfd is used for both shared/private memory, converting > > pages to shared may require kvm_arch_gmem_invalidate() to be issued to > > return the pages to an architecturally-defined "shared" state if the > > pages were previously allocated and transitioned to a private state via > > kvm_arch_gmem_prepare(). > > > > Handle this by issuing the appropriate kvm_arch_gmem_invalidate() calls > > when converting ranges in the filemap to a shared state. > > > > Signed-off-by: Michael Roth > > --- > > virt/kvm/guest_memfd.c | 22 ++++++++++++++++++++++ > > 1 file changed, 22 insertions(+) > > > > diff --git a/virt/kvm/guest_memfd.c b/virt/kvm/guest_memfd.c > > index b77cdccd340e..f27e1f3962bb 100644 > > --- a/virt/kvm/guest_memfd.c > > +++ b/virt/kvm/guest_memfd.c > > @@ -203,6 +203,28 @@ static int kvm_gmem_shareability_apply(struct inode *inode, > > struct maple_tree *mt; > > > > mt = &kvm_gmem_private(inode)->shareability; > > + > > + /* > > + * If a folio has been allocated then it was possibly in a private > > + * state prior to conversion. Ensure arch invalidations are issued > > + * to return the folio to a normal/shared state as defined by the > > + * architecture before tracking it as shared in gmem. > > + */ > > + if (m == SHAREABILITY_ALL) { > > + pgoff_t idx; > > + > > + for (idx = work->start; idx < work->start + work->nr_pages; idx++) { > > It is redundant to enter this loop for VM variants that don't need > this loop e.g. for pKVM/TDX. I think KVM can dictate a set of rules > (based on VM type) that guest_memfd will follow for memory management > when it's created, e.g. something like: > 1) needs pfn invalidation > 2) needs zeroing on shared faults > 3) needs zeroing on allocation Makes sense. Maybe internal/reserved GUEST_MEMFD_FLAG_*'s that can be passed to kvm_gmem_create()? -Mike > > > + struct folio *folio = filemap_lock_folio(inode->i_mapping, idx); > > + > > + if (!IS_ERR(folio)) { > > + kvm_arch_gmem_invalidate(folio_pfn(folio), > > + folio_pfn(folio) + folio_nr_pages(folio)); > > + folio_unlock(folio); > > + folio_put(folio); > > + } > > + } > > + } > > + > > return kvm_gmem_shareability_store(mt, work->start, work->nr_pages, m); > > } > > > > -- > > 2.25.1 > >