From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B9C84C36010 for ; Mon, 7 Apr 2025 13:41:13 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A9C796B0005; Mon, 7 Apr 2025 09:41:12 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A4A1E6B0007; Mon, 7 Apr 2025 09:41:12 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 89BE16B0008; Mon, 7 Apr 2025 09:41:12 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 6A3226B0005 for ; Mon, 7 Apr 2025 09:41:12 -0400 (EDT) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id A08181CA3A4 for ; Mon, 7 Apr 2025 13:41:12 +0000 (UTC) X-FDA: 83307359184.08.48306D2 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by imf17.hostedemail.com (Postfix) with ESMTP id 34C2E40002 for ; Mon, 7 Apr 2025 13:41:09 +0000 (UTC) Authentication-Results: imf17.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=bB3m+bEm; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=HFrkEPZQ; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf17.hostedemail.com: domain of liam.howlett@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=liam.howlett@oracle.com ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1744033269; a=rsa-sha256; cv=pass; b=Kcf+Mn36x3nyR59htuDD+QOWKirVKu55kTPE3XpERJJMjFJMRQh1DFAwNwzxm4481b0wk2 lIQA+KvUrHzbXUeqSnRZSUwhmkVUWE7pmrBJohGUqi8n4yohe8NtCtiXQswYA45vYO4J9b qbbTyrXb6bBNgNzS93i2Bn1wCdN49rg= ARC-Authentication-Results: i=2; imf17.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=bB3m+bEm; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=HFrkEPZQ; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf17.hostedemail.com: domain of liam.howlett@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=liam.howlett@oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1744033269; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=NYxbchvmXcCWsYfxm00aB1se7WL5XVV2SahuG+t+O7o=; b=IVeDLlEEP38v0NMtw0bFDlnodoXNn4OO6rgZWZnoiRXFyGknDRZgEDS2m/9eYaXsEXgFsV yM6UScQ8ed28FwtC9jutCntHKUX3NsJtF7Qsqsra4RUc4lgnJnRVygytffm3PE+3ROcWHb PLR2h8vv1GKNr9mRJPwTU8a1yK2I+tw= Received: from pps.filterd (m0246630.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 537DGwFh017921; Mon, 7 Apr 2025 13:41:00 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=corp-2023-11-20; bh=NYxbchvmXcCWsYfxm0 0aB1se7WL5XVV2SahuG+t+O7o=; b=bB3m+bEms0NIlbq4LQrOYa4W/oPF+V+xJ6 eINUBjEK6sV4fsk7l5qN80Wvb0Q+OBqVWn/qGIDqBhYs04/Qiv/683mJBiMGYj5J IduK5xYCtpSN+iUEZkDqz83nE3EsmJdsCdiw2ztCuJD2poKntTIrS84ux0xojSBF 65hA4LuPjHKTEvmNQN7+oHbhGc0/H/R48Zf24Gb6iEdnzyItAsg8t2TtjQmRL5Kt 5IDQiwXORc2ZVfNQF6VcB8qg1CyJ0Pq03or97ce/NX5vp6dqL7yiHIwPqT+F/k7h axEIStSP+mniaHUd148sQ+nkqTQisjB40xwuITV/ypaiYBiVI+LQ== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 45ttxctmkt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 07 Apr 2025 13:40:59 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 537DWuBo023777; Mon, 7 Apr 2025 13:40:59 GMT Received: from nam04-bn8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2043.outbound.protection.outlook.com [104.47.74.43]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 45ttye27h4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 07 Apr 2025 13:40:58 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=y6Qh/bU/dsfIpPdgxMmf+Z6mzoYc0I9eCx/2ud5hQkFuItOA1CUugJNn3ndnTJpQxaS0MaiB7tgQINHNV435z/5ZahAfCEM0MUSjFB8dFkELicMor22wS0akiCXyV5cq1ib6ZZ6U2Bh/s/o5fdgTYDaVovgI6dtVpauXoNW+uy2jqyhcXd44kenG9t+0/GfIJNrakRTJShNB5n3A3omXfUqhNdrx4ps6wihazMH7KAYqUVz6gTFk6CPg0hJ0XETT0t/Tzvs1TH1kXoEn58qYOUiU4YQQPgmQXKaBbqqba1W7Yg8ukMxRg9CNc3s90dBFZqNEuV4z30JK1gCoBkVTRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NYxbchvmXcCWsYfxm00aB1se7WL5XVV2SahuG+t+O7o=; b=hZ0zCPUFducT+LJwEM4PWBvXcLb//k/HwxEvkGnnJmMGCY3heKJ2ERzG5wyDw/jz+GzWem5LPFLVi5J5nI/IIEjwps7UwXHet/7Bu6Y6iAbszqf+pNuYQKt1XI+fjQh2uyo2EbbToUxKJFUAHtM3g0K2t7WqfZN6sFnBVr/b3AWeIDVS2v0NSrcDVILtU2xwCGnTzKVodXL2UyEdaSb0WHvekLn3hYXfajTVUH+xWeR2ki/Xs3QmnHxp+5fJxBGnuCfjqp2taHrqxVHWOXfur29NCN1ruMNojFKljwiTDUhCQ5cndF1dWCjhNc+SQZWk6TiO/q6jfsAb0zGLmE04ow== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NYxbchvmXcCWsYfxm00aB1se7WL5XVV2SahuG+t+O7o=; b=HFrkEPZQMbBR/t6Iczt29FY+7tBU4AbgaZuus8+fMrShFWt6HOWEfFiXU/ujDdPy1k6Ujm1VuNHtsOgkI3yXV7L9RI+LFBBhR3ICSsxCv/KSQXQ+33JP6SpgyMrepVr7YDb08GuyPOn2EKw4jP8XDFbDHR+ycDyUwey+dYnP0pw= Received: from PH0PR10MB5777.namprd10.prod.outlook.com (2603:10b6:510:128::16) by IA4PR10MB8567.namprd10.prod.outlook.com (2603:10b6:208:566::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8606.32; Mon, 7 Apr 2025 13:40:56 +0000 Received: from PH0PR10MB5777.namprd10.prod.outlook.com ([fe80::75a8:21cc:f343:f68c]) by PH0PR10MB5777.namprd10.prod.outlook.com ([fe80::75a8:21cc:f343:f68c%7]) with mapi id 15.20.8606.029; Mon, 7 Apr 2025 13:40:56 +0000 Date: Mon, 7 Apr 2025 09:40:51 -0400 From: "Liam R. Howlett" To: Nikita Kalyazin Cc: Ackerley Tng , Vishal Annapurve , Fuad Tabba , akpm@linux-foundation.org, pbonzini@redhat.com, shuah@kernel.org, viro@zeniv.linux.org.uk, brauner@kernel.org, muchun.song@linux.dev, hughd@google.com, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, jack@suse.cz, lorenzo.stoakes@oracle.com, jannh@google.com, ryan.roberts@arm.com, david@redhat.com, jthoughton@google.com, peterx@redhat.com, graf@amazon.de, jgowans@amazon.com, roypat@amazon.co.uk, derekmn@amazon.com, nsaenz@amazon.es, xmarcalx@amazon.com Subject: Re: [PATCH v3 0/6] KVM: guest_memfd: support for uffd minor Message-ID: <63j2cdjh6oxzb5ehtetiaolobp6zzev7emgqvvfkf5tuwlnspx@7h5u4nrqwvsc> Mail-Followup-To: "Liam R. Howlett" , Nikita Kalyazin , Ackerley Tng , Vishal Annapurve , Fuad Tabba , akpm@linux-foundation.org, pbonzini@redhat.com, shuah@kernel.org, viro@zeniv.linux.org.uk, brauner@kernel.org, muchun.song@linux.dev, hughd@google.com, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, jack@suse.cz, lorenzo.stoakes@oracle.com, jannh@google.com, ryan.roberts@arm.com, david@redhat.com, jthoughton@google.com, peterx@redhat.com, graf@amazon.de, jgowans@amazon.com, roypat@amazon.co.uk, derekmn@amazon.com, nsaenz@amazon.es, xmarcalx@amazon.com References: <20250404154352.23078-1-kalyazin@amazon.com> <2iggdfimgfke5saxs74zmfrswgrxmmsyxzphq4mdfpj54wu4pl@5uiia4pzkxem> Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20240425 X-ClientProxiedBy: YT4PR01CA0009.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:d1::21) To PH0PR10MB5777.namprd10.prod.outlook.com (2603:10b6:510:128::16) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PH0PR10MB5777:EE_|IA4PR10MB8567:EE_ X-MS-Office365-Filtering-Correlation-Id: 13ee2f25-88a4-4565-7514-08dd75d9d2d7 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|7416014|366016|7053199007; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?U0xNlX1495MQK+JwLU2C5y+05g9SxJG3vyxi07Np4Co60GRAp5zOTGRtmUeY?= =?us-ascii?Q?Vi8B4YqAoQ9eIu5Q8+8ufy2VSwtI/a204xI8Ob8guJpwap4T60YY39iWxuT7?= =?us-ascii?Q?ytC50U1JpEgahxsCMmibEh0v4Is5sPkJlJQMMJI95W0n1JYhDibXSvldZUcA?= =?us-ascii?Q?aLvebx8JA4LWKB4N5JfgisiE9PXdL5Ns4dRkEUYa06O+uRb8Z3O+8+9fR776?= =?us-ascii?Q?taRxvqXZySfv0rFK3u2F7cC0VhMWGng00hM/Dlmy6SipDgcxwYdHubSmqIbS?= =?us-ascii?Q?ewArkLCH/F1AHPWjdXgHyK1hPgCcU2XWB9fNSGk9gLTZlnv69aSZWmTZcdY4?= =?us-ascii?Q?pJ/ZTMjM0+a45PHcQNb+n83vwkXdwf5T3IJjiesbup8QPRqIE2dg18f5SDRL?= =?us-ascii?Q?raxY0ncM6xbHAfrcgXKEtq/ZXmHvbfFBFt6NO/JzUjrJRlcBvn/2xraMQuz8?= =?us-ascii?Q?RppvPw991F6fSCaE/LarLT5n+7aeB5KY/kdo2OoZhbknkpvdlduNL4IxWojt?= =?us-ascii?Q?3gywobNLbmlU8MqYAp00oO5UWgsjTmOcPHQJEu3ezHztsFoHWNW1w6ZuDqgl?= =?us-ascii?Q?CcFv7sM6HOEbssoqfTQApW0LVvBDvAof/IFYJbfMrHWi/IiLYzC0Zm05xykc?= =?us-ascii?Q?t2AUAOfLqEsG9OBEZmKm0OAuEohZpYfSmsHH16QqH5xxXJKqGEU9/LPQINjn?= =?us-ascii?Q?0MH9TYxyXsMVFpFRcmmy/m7B9JGXtCcLRzTwjZQnrzoceLUCSp2qQtDEKs00?= =?us-ascii?Q?pb/dDAIGhnf/x/Evj7tT56zh331K7pGhyvfz2AGvWaBYwZhWzjuFVOgeWFy1?= =?us-ascii?Q?agbK5LGOkRQGiD7MZAAaF5Mg2QGdaX+0+4JHy8LhvHeiOQHKEA3ZADhlKPNa?= =?us-ascii?Q?5istO2NIzSdvHBvRS7puex+1lzA86eDUHZ65i3pZ/PqCBVts4lX08UvVBq3E?= =?us-ascii?Q?RdSewpQBJ9qEScXdxfP4ktXtyXeDh6b0gaHBNO1FUW406oYjmxQK9V6PyWU8?= =?us-ascii?Q?tT58Pjt3alZJL0du7jgtTdNu+FfwgUSDcpyx+yJDR/iiQthdVnRMzwhzznSM?= =?us-ascii?Q?hnd7Q5HC/r6IB9xnXELAaUzLgLyWZXV6FxK68/QOo5tmpCcW04ZyN9drk3wS?= =?us-ascii?Q?Ef9PY8iGarGnjPHLFdYimHlW8sVI7YPktc009PEpS3KGiwaBl0QMFyYy1HuK?= =?us-ascii?Q?k83QvqAV0P3/yKY1FhlGKK/MdGzhqnvFZZGhgvkMZd0puWX8zJdoL+j/ones?= =?us-ascii?Q?YGQUhnmhMfAy13EoYj9QZxPwefyEPXRrqtlHycXZWXTdkxFpHBOYNryN9kE1?= =?us-ascii?Q?6nurgEqv9KWcVKsMWq/1JolohH6NiSV8lyiy/Qrt9o+YUg=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR10MB5777.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(7416014)(366016)(7053199007);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?gi/apUE3QahVq0octWq0rO8ShLrrDanmtj/amKb6MLVZG5ck0IS9vxIsU9kF?= =?us-ascii?Q?DWY8xtSpBKIYLOsSjV7D6Pu/HxJo9+Fne18lVpjWFyvjbdifoIt3ELuDiCXW?= =?us-ascii?Q?qsy6GmbkGb4unRlAASySovugSAMZyhaMZHxW300EHN/vJPb2derGeg381zi9?= =?us-ascii?Q?S0dceXJ18uTOEfEftjrj7yqbEqJbD3tJWaSQfWGJ5x5vcSc7w2YpB/eEtCNs?= =?us-ascii?Q?BzxMJvLad36GUUsxypijK+NdgbR5HpvA6auT6MyQZ6rwMKhse5ZbPPSjxGsl?= =?us-ascii?Q?0d5S/5OFHJmFAaH3Y/DtmuuJRXvocIXMQ3iDUlFrET4luQjaPrObu8PjbG5b?= =?us-ascii?Q?icCDRRu21TxkIwJnQpfMBm21VTAq4KSamuFDV4Q8e2EPXa5WjphMHxzUzyv0?= =?us-ascii?Q?oTSro9jAGnjTepboHN9n98IiLlolW2I9r5VQGcNiOOcYFpWQN3Zda8q7TPiB?= =?us-ascii?Q?sMgZmOvgRlBWnhGZgkeq0CzTSWZWTgVYfQh4Ng0KrqFPLwj+ibSYb5ESb2Qr?= =?us-ascii?Q?wBNic1/nw86Q/qTVSkLn5e/XyRQUxeP6xwm8lq3yebagYWTt0bLf2rmDpevC?= =?us-ascii?Q?MxkYU4jZSx+kr5U9sHDx7hLO70Wubbo41zhnIh+t8bCYpm2P8Usmz8hGtwiv?= =?us-ascii?Q?7BrG+7yAWQ4M81eKERjYKw6GHLJczBQjdQ9tiS6Hed8bp6LKP7Cpf29OVyA8?= =?us-ascii?Q?ms20uahpA9j1OYpXnXKt64gtn4kHnoCCFILvwG19H4ExnuG6bsnjsjiUBoAu?= =?us-ascii?Q?DQn5VE5zUTOSRkHSV+BCQccU5BEzMv9k64XrNGSttD/33YxKZaxQD5Xmle0T?= =?us-ascii?Q?+tMGiPIFL7qU5BDTkh28AgXbvh2XO4wUoGlZmiVSXSllGPd+aU55uhBrIssl?= =?us-ascii?Q?yoNKmxAnVZDk5VIL86oB/eHjZDAMcWHanAKhYDb9Hb0qw8cW7ym4HS5K7+u/?= =?us-ascii?Q?UQ0JSwZENc38jHZSSAG1WiRltDiA2QiLtj178HjgpQo1Ftnuf0Of9LTnGloG?= =?us-ascii?Q?TqvU/cJWNqRAxUFvOKSniJtXxWkpN/8o7mfmgkpr/CqWyxQAsmY8+Ph0zoNv?= =?us-ascii?Q?ByUZ6Z/INGhCkGPf3cTxnslFtIpPMSU24JSs1yKPrrWH9d9Tatb2+WCW01Al?= =?us-ascii?Q?fkNFcxI49SxRtWZvEVCfmMh9j4vT4RvHJXcxYmaq6xlmlI5JIoTKZWBsDOzL?= =?us-ascii?Q?BULN9Wdp4yYU4hbW1lA8mPwZAVcrEIXq/l1w/yu1Q//djcW3/tTieKFjlCul?= =?us-ascii?Q?FNPvXeJhqeULz+VwCWjSahRlxgBS5x1G7N3ufgGZxQaSD9ljcWsLuO317nD7?= =?us-ascii?Q?Ne1eqX9Gkh6yFr0wgLTBSkLFIM7dWXwP2gl0IKpU16dXUp1c2KNw5j3LmyVv?= =?us-ascii?Q?bf/ofwb+6W8L4ObkN5et6zn9tH1aFQzxxgVLj8mfT4712of1ouQsA/cUFEbH?= =?us-ascii?Q?gd0sCPEDc4IMviTSqPpmIoFCdNzGIsI1b5uU2VEJDFld4J/Qi+SIIclB5by4?= =?us-ascii?Q?FAIXc1CDqhvqqz3mPjostcs9wLYEYuVgYdOaxHhEhISCcKyHC7ZB6g0wmBI1?= =?us-ascii?Q?CI3TV8/cwV0SGd7eo16VySiyeM/IB7IaLm4SufiT?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 13ee2f25-88a4-4565-7514-08dd75d9d2d7 X-MS-Exchange-CrossTenant-AuthSource: PH0PR10MB5777.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Apr 2025 13:40:56.4402 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: +YEzlx/eHqdUm0nMTSS+OYrKTGhgjRQqasls2Nq2GneqhzabnBQbLbV2M+EXNPTyGxDQ77qEHQall0pcT+OOVg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA4PR10MB8567 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1095,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-04-07_04,2025-04-03_03,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 bulkscore=0 mlxscore=0 mlxlogscore=999 suspectscore=0 adultscore=0 spamscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502280000 definitions=main-2504070096 X-Proofpoint-GUID: 5f6Qd0kkScLmZK1wjL087jElsCItVJN6 X-Proofpoint-ORIG-GUID: 5f6Qd0kkScLmZK1wjL087jElsCItVJN6 X-Rspamd-Queue-Id: 34C2E40002 X-Stat-Signature: rf56rw7hpbck3t7mcb4suhp7hjh4g6z4 X-Rspam-User: X-Rspamd-Server: rspam06 X-HE-Tag: 1744033268-866603 X-HE-Meta: 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 mTh1HPWr QIZIpMPgQoaKW92Zjq/1+bmzeOl6zeMvLmO/9UB1eJMdmxhzEMSFiztXe81VU/BJY+oX3Bbc3+9C6DvS3pTusG8rzxdWkKFpNU+7skCZBgJ1wsT+LHjaZA6srBLMbXDTsDeRU2yFBRnxHIssO2/z186okV9Lc18wOwtGuCp991hc9zdyPT87OHaGJFXvuGGgaLPX2Oeudr21ywO+JdNBAl7zFIBBR+uatT5qaddsiwU8iMWD6cQ+hnrNt7wRlFNYMG84jszQpT/se559g+jYYu6s9s6TWN6F0HL/nCIU5qKh/pJ3tEhJsShENU1j2J9Pw2XLRzNEqHUEorCaNVFE5sxjwevRMFeO5EZ+gDEBC6XhlaN22SID4u/SK1tEUcRh5NEoKJ9Jv9VFy9Sk+oRzjIK1dHC1WM1rHrKhHZlKq7L72mKvwY/n68xdvMdi2sn0Y8Mm7U+THPtvf/kv5O9GGCkywkIqvlMCauz8yagMc8fVeYxke1Susp0Oyrh+Eou4uGoVIUXG2U1My903z4nPUDD1dpWZT33ELgwRs/Pm0dRM/i6kkChAy6pdyOUFZ7txPev5E4voRwYIzjDuFk/JC3wqjuj+MU+rGm8BauRJelZ9qc91ixvKourqPC4rZpWAbn1F7lSvQxhGaKagqRmqFBZ+L0taRONKR66LN5Gl1r4b9uYv1NzMGzMh6Yn7XsMTQHM+ku+XdTHqFTJiknHkvGfQShBp62suVYkdr3IdvaVv770NWZSqpxac3nu/FpFmS/55H61Is9RgX5SuiAq81MLkRNOwBASxyn6xAUz1lsvL39xA= X-Bogosity: Ham, tests=bogofilter, spamicity=0.001709, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: * Nikita Kalyazin [250407 07:04]: > > > On 04/04/2025 18:12, Liam R. Howlett wrote: > > +To authors of v7 series referenced in [1] > > > > * Nikita Kalyazin [250404 11:44]: > > > This series is built on top of the Fuad's v7 "mapping guest_memfd backed > > > memory at the host" [1]. > > > > I didn't see their addresses in the to/cc, so I added them to my > > response as I reference the v7 patch set below. > > Hi Liam, > > Thanks for the feedback and for extending the list. > > > > > > > > > With James's KVM userfault [2], it is possible to handle stage-2 faults > > > in guest_memfd in userspace. However, KVM itself also triggers faults > > > in guest_memfd in some cases, for example: PV interfaces like kvmclock, > > > PV EOI and page table walking code when fetching the MMIO instruction on > > > x86. It was agreed in the guest_memfd upstream call on 23 Jan 2025 [3] > > > that KVM would be accessing those pages via userspace page tables. > > > > Thanks for being open about the technical call, but it would be better > > to capture the reasons and not the call date. I explain why in the > > linking section as well. > > Thanks for bringing that up. The document mostly contains the decision > itself. The main alternative considered previously was a temporary > reintroduction of the pages to the direct map whenever a KVM-internal access > is required. It was coming with a significant complexity of guaranteeing > correctness in all cases [1]. Since the memslot structure already contains > a guest memory pointer supplied by the userspace, KVM can use it directly > when in the VMM or vCPU context. I will add this in the cover for the next > version. Thank you. > > [1] https://lore.kernel.org/kvm/20240709132041.3625501-1-roypat@amazon.co.uk/T/#m4f367c52bbad0f0ba7fb07ca347c7b37258a73e5 > > > > > > In > > > order for such faults to be handled in userspace, guest_memfd needs to > > > support userfaultfd. > > > > > > Changes since v2 [4]: > > > - James: Fix sgp type when calling shmem_get_folio_gfp > > > - James: Improved vm_ops->fault() error handling > > > - James: Add and make use of the can_userfault() VMA operation > > > - James: Add UFFD_FEATURE_MINOR_GUEST_MEMFD feature flag > > > - James: Fix typos and add more checks in the test > > > > > > Nikita > > > > Please slow down... > > > > This patch is at v3, the v7 patch that you are building off has lockdep > > issues [1] reported by one of the authors, and (sorry for sounding harsh > > about the v7 of that patch) the cover letter reads a bit more like an > > RFC than a set ready to go into linux-mm. > > AFAIK the lockdep issue was reported on a v7 of a different change. > I'm basing my series on [2] ("KVM: Mapping guest_memfd backed memory at the > host for software protected VMs"), while the issue was reported on [2] > ("KVM: Restricted mapping of guest_memfd at the host and arm64 support"), > which is also built on top of [2]. Please correct me if I'm missing > something. I think you messed up the numbering in your statement above. I believe you are making the point that I messed up which patches depend on what and your code does not depend on faulty locking, which appears to be the case. There are a few issues with the required patch set? > > The key feature that is required by my series is the ability to mmap > guest_memfd when the VM type allows. My understanding is no-one is opposed > to that as of now, that's why I assumed it's safe to build on top of that. > > [2] https://lore.kernel.org/kvm/20250318161823.4005529-1-tabba@google.com/T/ > [3] https://lore.kernel.org/all/diqz1puanquh.fsf@ackerleytng-ctop.c.googlers.com/T/ All of this is extremely confusing because the onus of figuring out what the final code will look like is put on the reviewer. As it is, we have issues with people not doing enough review of the code (due to limited time). One way to get reviews is to make the barrier of entry as low as possible. I spent Friday going down a rabbit hole of patches referring to each other as dependencies and I gave up. It looks like I mistook one set of patches as required vs them requiring the same in-flight ones as your patches. I am struggling to see how we can adequately support all of you given the way the patches are sent out in batches with dependencies - it is just too time consuming to sort out. Thank you, Liam